Search

Your search keyword '"Computer users"' showing total 373 results

Search Constraints

Start Over You searched for: Descriptor "Computer users" Remove constraint Descriptor: "Computer users" Journal communications of the acm Remove constraint Journal: communications of the acm
373 results on '"Computer users"'

Search Results

1. Measuring Security Practices.

2. When SDN and Blockchain Shake Hands.

3. Declarative Machine Learning Systems.

4. Differential Privacy: The Pursuit of Protections by Default.

5. The European Perspective on Responsible Computing.

6. Skill Discovery in Virtual Assistants.

7. Corp to Cloud: Google's Virtual Desktops.

8. AI and Accessibility: A discussion of ethical considerations.

9. Ability-Based Design.

10. Abstracting the Geniuses Away from Failure Testing.

11. Technical Perspective: The Effectiveness of Security Measures.

12. Uncomfortable User Experience.

13. Rules for Mobile Performance Optimization.

14. Private Information Retrieval.

15. Examining User Involvement in Continuous Software Development (A case of error reporting system).

16. The Claremont Report on Database Research.

17. Security in the Browser.

18. Improving Performance on the Internet.

19. THE PSYCHOLOGY OF SECURITY.

20. UNINTENDED INVITATION: ORGANIZATIONAL WI-FI USE BY EXTERNAL ROAMING USERS.

21. DNSSEC: A PROTOCOL TOWARD SECURING THE INTERNET INFRASTRUCTURE.

22. POLARIS: VIRUS-SAFE COMPUTING for Windows XP.

23. EXTERNALLY VERIFIABLE CODE EXECUTION.

24. EXPLORATIONS IN NAMESPACE: WHITE-HAT HACKING ACROSS THE DOMAIN NAME SYSTEM.

25. A SYSTEMATIC APPROACH IN MANAGING POST-DEPLOYMENT SYSTEM CHANGES.

26. RECIPROCITY: THE GOLDEN RULE of IS-User Service Relationship Quality and Cooperation.

27. WIRELESS HOTSPOT: PETRI DISH OF WIRELESS SECURITY.

28. BEYOND STEREOTYPES OF IT PROFESSIONALS: IMPLICATIONS FOR IT HR PRACTICES.

29. A Framework for Spyware Assessment.

30. What Do Consumers Really Know About Spyware?

31. SPYWARE: A Little Knowledge is a Wonderful Thing.

32. A CLOSER LOOK AT ATTENTION TO DETAIL.

33. DIFFUSION, USE, AND EFFECT OF THE INTERNET IN CHINA.

34. WHY WE Blog.

35. THE Blogosphere.

36. STRUCTURE AND EVOLUTION OF Blogspace.

37. HAS THE INTERNET BECOME INDISPENSABLE?

38. ETIQUETTE ONLINE: From NICE to NECESSARY.

39. How to Quickly Find Articles in the Top IS Journals.

40. INTEROPERABILITY ARCHITECTURE USING RM-ODP.

41. A Human Capital Perspective of Skill Acquisition and Interface Loyalty.

42. Hidden Surveillance by Web Sites: Web Bugs in Contemporary Use.

43. End Users: Who are They?

44. FULL-SIZE PROJECTION KEYBOARD FOR HANDHELD DEVICES.

45. EXPERIENTIAL COMPUTING.

46. Bringing Non-Adopters Along: THE CHALLENGE FACING THE PC INDUSTRY.

47. A Framework for Using INSURANCE FOR CYBER-RISK MANAGEMENT.

48. ADAPTIVE BRAIN INTERFACES.

49. ALIGNING INTERNET USAGE WITH BUSINESS PRIORITIES.

50. Who Are We?

Catalog

Books, media, physical & digital resources