Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Eastman, Caroline
University of South Carolina
Columbia, South Carolina
 
   Reviewer Selected
Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 10 of 43 reviews

   
  Studying users’ computer security behavior: a health belief perspective
Ng B., Kankanhalli A., Xu Y. Decision Support Systems 46(4): 815-825, 2009.  Type: Article

Ng, Kankanhalli, and Xu advocate the use of the health belief model in the computer security area. This model is widely used in the health field to investigate the reasons why people do or do not engage in preventive health measures. T...

Oct 1 2010  
  Automatically refining the Wikipedia infobox ontology
Wu F., Weld D.  WWW 2008 (Proceeding of the 17th International Conference on the World Wide Web, Beijing, China, Apr 21-25, 2008) 635-644, 2008.  Type: Proceedings

Wikipedia is a vast store of relatively unstructured information, generally accessed through keywords. Wikipedia infoboxes allow the representation of relatively structured information across similar topics. A topical organization such...

Jul 23 2009  
  BRAP forensics
Berghel H. Communications of the ACM 51(6): 15-20, 2008.  Type: Article

What’s on your computer that you don’t know about? What’s on your computer that you don’t want someone else to know about? Many application programs keep records of their activities, often using ...

Jan 8 2009  
  Security, privacy and trust in modern data management (Data-centric Systems and Applications)
Petkovic M., Jonker W., Springer-Verlag New York, Inc., Secaucus, NJ, 2007. 472 pp.  Type: Book (9783540698609)

As database management systems (DBMS) become more ubiquitous in information technology (IT), DBMS security becomes more and more important. This book, part of the Springer-Verlag “Data-centric Systems and ApplicationsR...

May 8 2008  
  Automated email activity management: an unsupervised learning approach
Kushmerick N., Lau T.  Intelligent user interfaces (Proceedings of the 10th International Conference on Intelligent User Interfaces, San Diego, California, USA, Jan 10-13, 2005) 67-74, 2005.  Type: Proceedings

Have you ever spent time sorting or searching through your email in an attempt to find earlier messages related to your current task? If so, you are well aware of the problem Kushmerick and Lau address in this paper. A task, such as an...

Aug 22 2006  
  Computer insecurity: risking the system
Furnell S., Springer-Verlag New York, Inc., Secaucus, NJ, 2005. 240 pp.  Type: Book (9781852339432)

“Security is a journey rather than a destination” (page 114). If you want to know how to protect your computer system, this is not the book for you. If you want to know why you should protect your computer system or...

Mar 21 2006  
  A multilevel analysis of sociability, usability, and community dynamics in an online health community
Maloney-Krichmar D., Preece J. ACM Transactions on Computer-Human Interaction 12(2): 201-232, 2005.  Type: Article

What makes an online community work? What makes it at least viable and hopefully vital? Sharp focus and reliable systems are two of the answers, according to this report on an extended and comprehensive research study of one such commu...

Oct 17 2005  
   Evaluating Web sites: exploiting user”s expectations
De Marsico M., Levialdi S. International Journal of Human-Computer Studies 60(3): 381-416, 2004.  Type: Article, Reviews: (2 of 2)

Evaluating the usability of Web sites is an important problem, and this paper addresses this task from two different perspectives. After presenting an overview of current approaches to Web site evaluation, the cooperative form between ...

Aug 30 2004  
  An XML-based approach to combine firewalls and Web services security specifications
Cremonini M., di Vimercati S., Damiani E. (ed), Samarati P.  XML security (Proceedings of the 2003 ACM workshop, Fairfax, Virginia, Oct 31, 2003) 69-78, 2003.  Type: Proceedings

The authors extend their previous work on simple object access protocol (SOAP) security to address broader questions associated with the integration of Web services security with network security. They discuss the limitations of Web se...

Jun 4 2004  
  A checksum-based corruption detection technique
Barbará D., Goel R., Jajodia S. Journal of Computer Security 11(3): 315-329, 2003.  Type: Article

One way to protect a file is to compute a hashed signature based upon the contents of the file. Any change to the file will almost certainly result in a change to the signature as well, so an unauthorized change can be detected by ...

Nov 19 2003  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy