Sciweavers

345 search results - page 7 / 69
» When Systems Loose their Identity
Sort
View
I3
2007
13 years 9 months ago
Identity: How to name it, How to find it
The main objective of this work is to exploit the relationship between the information findability problem and a subject-based organization of information. Identification of a sub...
Christo Dichev, Darina Dicheva, Jan Fischer
DIM
2009
ACM
14 years 8 days ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
ECIS
2004
13 years 9 months ago
Leveraging Theoretical Pluralism in qualitative IS research: The example of IS professionals' identity as a complex phenomenon
As Information Systems (IS) research increasingly acknowledges the importance of non-positivist approaches, the case for a plurality of theories to guide qualitative studies has g...
Jo-Ann Siregar, Michael T. K. Tan
COMSNETS
2012
222views more  COMSNETS 2012»
12 years 3 months ago
Assessing the veracity of identity assertions via OSNs
Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the ve...
Michael Sirivianos, Kyungbaek Kim, Jian Wei Gan, X...
CANDC
2009
ACM
13 years 11 months ago
Computational and cognitive infrastructures of stigma: empowering identity in social computing and gaming
Computing technologies such as games, social networking sites, and virtual environments often reproduce forms of social stigma encountered in everyday real life, as well as introd...
D. Fox Harrell