iConference 2008 Posters

Recent AdditionsRSS feed

  • Wash, Rick; MacKie-Mason, Jeffrey King (2008-02-28)
    People are the weakest link in security (Anderson, 1993). People write passwords on sticky notes on the screen. People don't patch their home systems and become botnet zombies. People choose whether to label a patch ...

    application/pdf

    application/pdfPDF (102Kb)
  • Ho, Shuyuan Mary (2008-02-28)
    This proposal is intended to examine human trustworthiness as a key component for countering insider threats in the arena of corporate personnel security. Employees with access and authority have the most potential to ...

    application/pdf

    application/pdfPDF (286Kb)
  • Russell, Terrell (2008-02-28)
    Our collective understanding of the world around us is largely constructed upon what others think. We trust our neighbors more than strangers. We know things because we have either seen them ourselves or because we have ...

    application/msword

    application/mswordMicrosoft Word (56Kb)
  • Inoue, Keisuke (2008-02-28)
    The goal of this study is to model conversation data from digital reference services and reconstruct the processes of the reference interviews as a conversation repository. By doing so, I am hoping that the study will ...

    application/pdf

    application/pdfPDF (64Kb)
  • Marwick, Alice E. (2008-02-28)
    This paper is about moral panics over contemporary technology, which I call “technopanics.” I use two examples, the cyberporn panic of 1996 and the contemporary panic over online predators and MySpace, to demonstrate the ...

    application/msword

    application/mswordMicrosoft Word (70Kb)

Collection Statistics

  • Total Downloads: 11329
  • Downloads this Month: 9
  • Downloads Today: 1
  • Statistics Report