Search

Your search keyword '"INTERNET USERS"' showing total 344 results

Search Constraints

Start Over You searched for: Descriptor "INTERNET USERS" Remove constraint Descriptor: "INTERNET USERS" Journal communications of the acm Remove constraint Journal: communications of the acm
344 results on '"INTERNET USERS"'

Search Results

1. Generative AI Degrades Online Communities.

2. Building a New Economy: Data, AI, and Web3: How distributed technologies could return more control to users.

3. A Year in Lockdown: How the Waves of COVID-19 Impact Internet Traffic.

4. Privacy: Cookie Monster.

5. Metrics That Matter.

6. Digital Nudging: Guiding Online User Choices through Interface Design.

7. Bias on the Web.

8. Contest Theory.

9. Who Owns the Social Web?

10. Recommender Systems--Beyond Matrix Completion.

11. Idle-Time Garbage-Collection Scheduling.

12. Internet Use and Psychological Well-Being: Effects of Activity and Audience.

13. Why People Post Benevolent and Malicious Comments Online.

14. Interactive Intent Modeling: Information Discovery Beyond Search.

15. Does the Internet Make Us Stupid?

16. Security Collapse in the HTTPS Market.

17. Wikidata: A Free Collaborative Knowledgebase.

18. Implementing the Argument Web.

19. Crowdsourcing Systems on the World-Wide Web.

20. Predicting the Popularity of Online Content.

21. Why Do People Tag? Motivations for Photo Tagging.

22. Wireless Insecurity: Examining User Security Behavior on Public Networks.

23. Search Engine Agendas.

24. Ballot Box Communication in Online Communities.

25. Improving Performance on the Internet.

26. PROMOTING PERSONAL RESPONSIBILITY for INTERNET SAFETY.

27. THE MYTHS AND TRUTHS OF WIRELESS SECURITY.

28. UNINTENDED INVITATION: ORGANIZATIONAL WI-FI USE BY EXTERNAL ROAMING USERS.

29. A Classification of Product Comparison Agents.

30. PRIVACY-ENHANCED PERSONALIZATION.

31. The Four Incremental Steps Toward ADVANCED MOBILE SERVICE ADOPTION.

32. DNSSEC: A PROTOCOL TOWARD SECURING THE INTERNET INFRASTRUCTURE.

33. Dynamic Personalization of Web Sites Without User Intervention.

34. HOW SENSITIVE ARE ONLINE GAMERS TO NETWORK QUALITY?

35. ANYONE CAN BROADCAST VIDEO OVER THE INTERNET.

36. LATENCY AND PLAYER ACTIONS IN ONLINE GAMES.

37. WHY SPOOFING IS SERIOUS INTERNET FRAUD.

38. FROM FINGERPRINT TO WRITEPRINT.

39. Phishing Mongers and Posers.

40. Mobile Web Surfing is the SAME as Web Surfing.

41. MANAGEMENT ISSUES of Internet/Web Systems.

42. NEO-TRIBES: THE POWER AND POTENTIAL OF ONLINE COMMUNITIES IN HEALTH CARE.

43. News In Essence: Summarizing: ONLINE NEWS TOPICS.

44. Personalization Technologies: A PROCESS-ORIENTED PERSPECTIVE.

45. Investigating Factors Affecting the Adoption of Anti-Spyware Systems.

46. The Deceptive Behaviors that OFFEND US MOST About Spyware.

47. PRIVACY IN E-COMMERCE: Stated Preferences vs. Actual Behavior.

48. WHY WE Blog.

49. THE Blogosphere.

50. Semantic Blogging AND DECENTRALIZED KNOWLEDGE MANAGEMENT.

Catalog

Books, media, physical & digital resources