Sciweavers

917 search results - page 108 / 184
» What Context Matters
Sort
View
ITICSE
2006
ACM
14 years 2 months ago
Don't be a phish: steps in user education
Phishing, e-mails sent out by hackers to lure unsuspecting victims into giving up confidential information, has been the cause of countless security breaches and has experienced i...
Stefan A. Robila, James W. Ragucci
ISPW
2005
IEEE
14 years 2 months ago
Evolving Defect "Folklore": A Cross-Study Analysis of Software Defect Behavior
Abstract. Answering “macro-process” research issues – which require understanding how development processes fit or do not fit in different organizational systems and environm...
Victor R. Basili, Forrest Shull
JCDL
2005
ACM
136views Education» more  JCDL 2005»
14 years 2 months ago
Digital libraries' support for the user's 'information journey'
The temporal elements of users’ information requirements are a continually confounding aspect of digital library design. No sooner have users’ needs been identified and suppor...
Anne Adams, Ann Blandford
OTM
2005
Springer
14 years 2 months ago
OWL-Based User Preference and Behavior Routine Ontology for Ubiquitous System
In ubiquitous computing, behavior routine learning is the process of mining the context-aware data to find interesting rules on the user’s behavior, while preference learning tri...
Kim Anh Pham Ngoc, Young-Koo Lee, Sungyoung Lee
RE
2005
Springer
14 years 2 months ago
Contextual Risk Analysis for Interview Design
Interviews with stakeholders can be a useful method for identifying user needs and establishing requirements. However, interviews are also problematic. They are time consuming and...
Tira Cohene, Steve M. Easterbrook