Sciweavers

679 search results - page 84 / 136
» What is disputed on the web
Sort
View
ECRIME
2007
13 years 11 months ago
Behavioral response to phishing risk
Tools that aim to combat phishing attacks must take into account how and why people fall for them in order to be effective. This study reports a pilot survey of 232 computer users...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
ACSAC
2004
IEEE
13 years 11 months ago
Open-Source Applications of TCPA Hardware
How can Alice trust computation occurring at Bob's computer? Since it exists and is becoming ubiquitous, the current-generation TCPA/TCG hardware might enable a solution. Whe...
John Marchesini, Sean W. Smith, Omen Wild, Joshua ...
ECIS
2004
13 years 9 months ago
From websites to portals: success factors for business community portals
Many Governments are using funding initiatives to encourage businesses, particularly small businesses to adopt e-commerce technology. One currently popular approach in Australia, ...
Julie Fisher, Annemieke Craig
CORR
2008
Springer
68views Education» more  CORR 2008»
13 years 7 months ago
Comparing human and automatic thesaurus mapping approaches in the agricultural domain
Knowledge organization systems (KOS), like thesauri and other controlled vocabularies, are used to provide subject access to information systems across the web. Due to the heterog...
Boris Lauser, Gudrun Johannsen, Caterina Caracciol...
CORR
2008
Springer
102views Education» more  CORR 2008»
13 years 7 months ago
Offloading Cognition onto Cognitive Technology
: "Cognizing" (i.e., thinking, understanding, knowing, and having the capacity to do what cognizers can do) is a mental state. Systems without mental states, such as cogn...
Itiel E. Dror, Stevan Harnad