|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 29 occurrences of 29 keywords
|
|
|
Results
Found 35 publication records. Showing 35 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
51 | John F. Banzhaf |
When your computer needs a lawyer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 11(8), pp. 543-549, 1968. The full citation details ...](Pics/full.jpeg) |
1968 |
DBLP DOI BibTeX RDF |
constacts, criminals, evidence copying, income tax, lawyer, liabilty, negligence, record keeping records, slander of credit, standard of care, torts, warrantees, simulation, accounting, regulations, copyrights, evidence, law, patents, legal, copying, guarantees, crime, trade secrets |
41 | Myung Sil Choi, Yong Soo Park, Kwang Seon Ahn |
Enterprise Management System with Web-Crawler. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: Challenges for Next Generation Network Operations and Service Management, 11th Asia-Pacific Network Operations and Management Symposium, APNOMS 2008, Beijing, China, October 22-24, 2008. Proceedings, pp. 539-542, 2008, Springer, 978-3-540-88622-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Urs Schweizer |
Negligence rules coping with hidden precaution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Math. Soc. Sci. ![In: Math. Soc. Sci. 119, pp. 108-117, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Mark Sangster |
When it comes to cyber security, ignorance isn't bliss - it's negligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Netw. Secur. ![In: Netw. Secur. 2020(12), pp. 8-12, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Kelly Lynn Mulvey, Seçil Gönültas, Cameron B. Richardson |
Who Is to Blame? Children's and Adults' Moral Judgments Regarding Victim and Transgressor Negligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cogn. Sci. ![In: Cogn. Sci. 44(4), 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Scott McLachlan, Evangelia Kyrimi, Norman E. Fenton |
Public Authorities as Defendants: Using Bayesian Networks to determine the Likelihood of Success for Negligence claims in the wake of Oakden. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2002.05664, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
31 | Robert Bevan, Alessandro Torrisi, Danushka Bollegala, Frans Coenen, Katie Atkinson |
Extracting Supporting Evidence from Medical Negligence Claim Texts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDH@IJCAI ![In: Proceedings of the 4th International Workshop on Knowledge Discovery in Healthcare Data co-located with the 28th International Joint Conference on Artificial Intelligence, KDH@IJCAI 2019, Macao, China, August 10th, 2019., pp. 50-54, 2019, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
31 | Maurizio Naldi, Marta Flamini, Giuseppe D'Acquisto |
Negligence and sanctions in information security investments in a cloud environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Mark. ![In: Electron. Mark. 28(1), pp. 39-52, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Sarah Elizabeth Kennedy |
The pathway to security - mitigating user negligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Comput. Secur. ![In: Inf. Comput. Secur. 24(3), pp. 255-264, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Susanne Beck |
Intelligent agents and criminal law - Negligence, diffusion of liability and electronic personhood. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Robotics Auton. Syst. ![In: Robotics Auton. Syst. 86, pp. 138-143, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Maurizio Naldi, Marta Flamini, Giuseppe D'Acquisto |
Information Security Investments: When Being Idle Equals Negligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECON ![In: Economics of Grids, Clouds, Systems, and Services - 10th International Conference, GECON 2013, Zaragoza, Spain, September 18-20, 2013. Proceedings, pp. 268-279, 2013, Springer, 978-3-319-02413-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
31 | John Voiklis, Jeffrey Nickerson |
Tort Reform: Negligence Explains Attributions of Intentionality for Negative Side Effects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CogSci ![In: Proceedings of the 33th Annual Meeting of the Cognitive Science Society, CogSci 2011, Boston, Massachusetts, USA, July 20-23, 2011, 2011, cognitivesciencesociety.org, 978-0-9768318-7-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
31 | Farhah Abdullah, Jusoff Hj. Kamaruzaman, Hasiah Mohamed, Roszainora Setia |
Strict versus Negligence Software Product Liability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Inf. Sci. ![In: Comput. Inf. Sci. 2(4), pp. 81-88, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Pit Pichappan, P. Vijayakumar |
Negligence of Phrase Indexing in Search Engines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Web Appl. ![In: Int. J. Web Appl. 1(1), pp. 47-54, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
31 | Hina Shah, Mary Jean Harrold |
Exception handling negligence due to intra-individual goal conflicts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHASE ![In: Proceedings of the 2009 ICSE Workshop on Cooperative and Human Aspects on Software Engineering, CHASE 2009, Vancouver, BC, Canada, 17 May 2009, pp. 80-83, 2009, IEEE Computer Society, 978-1-4244-3712-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | John McMullan |
Negligence: Engineering Safety-Critical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCS ![In: Safety Critical Systems and Software 2002, Seventh Australian Workshop on Safety-Related Programmable Systems, (SCS2002), Adelaide, Australia, 17-18 October 2002, pp. 63-72, 2002, Australian Computer Society, 0-909-92593-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
31 | Edward H. Freeman |
Director Liability in Computer Negligence Cases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. J. A Glob. Perspect. ![In: Inf. Secur. J. A Glob. Perspect. 9(1), pp. 1-5, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
31 | M. E. Kabay |
Distributed denial-of-service attacks, contributory negligence and downstream liability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ubiquity ![In: Ubiquity 2000(February), pp. 8, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
31 | Diane Rowland |
Negligence, Professional Competence and Computer Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Law Technol. ![In: J. Inf. Law Technol. 1999(2), 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
31 | Anne M. Payton |
Data security breach: seeking a prescription for adequate remedy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 162-167, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
data breach, data custodian, negligence, notification laws, identity theft, personal information, security breach |
31 | Cem Kaner |
Liability for defective content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGDOC ![In: Proceedings of the 22nd Annual International Conference on Design of Communication: The Engineering of Quality Documentation, SIGDOC 2004, Memphis, Tennessee, USA, October 10-13, 2004, pp. 145-151, 2004, ACM, 1-58113-809-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
defamation, information liability, libel, negligence, professional liability, warranty, documentation, web content |
21 | Nicolas Anciaux, Luc Bouganim, Harold van Heerde, Philippe Pucheral, Peter M. G. Apers |
Data degradation: making private data less sensitive over time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 17th ACM Conference on Information and Knowledge Management, CIKM 2008, Napa Valley, California, USA, October 26-30, 2008, pp. 1401-1402, 2008, ACM, 978-1-59593-991-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data degradation, limited retention, privacy |
21 | Pablo Sánchez 0002, Lidia Fuentes, Dominik Stein, Stefan Hanenberg, Rainer Unland |
Aspect-Oriented Model Weaving Beyond Model Composition and Model Transformation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoDELS ![In: Model Driven Engineering Languages and Systems, 11th International Conference, MoDELS 2008, Toulouse, France, September 28 - October 3, 2008. Proceedings, pp. 766-781, 2008, Springer, 978-3-540-87874-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Yair Wiseman, Irit Gefner |
Conjugation-based compression for Hebrew texts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Asian Lang. Inf. Process. ![In: ACM Trans. Asian Lang. Inf. Process. 6(1), pp. 4, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Burrows-Wheeler algorithm, Hebrew text analysis, Root conjugations, semitic languages, Text compression |
21 | Barbara Endicott-Popovsky, Brian Chee, Deborah A. Frincke |
Calibration Testing Of Network Tap Devices. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics III - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 28-31, 2007, pp. 3-19, 2007, Springer, 978-0-387-73741-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
aggregating tap, baseline testing, calibration, Network forensics |
21 | Yi Guan, Jian Zhao |
An Improved Feature Representation Method for Maximum Entropy Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM Workshops ![In: Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 18-22 December 2006, Hong Kong, China, pp. 400-406, 2006, IEEE Computer Society, 0-7695-2702-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Kevin Borders, Xin Zhao 0016, Atul Prakash 0001 |
Securing sensitive content in a view-only file system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the Sixth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006, pp. 27-36, 2006, ACM, 1-59593-555-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
insider abuse, virtual machines, file systems, digital rights management, information leakage |
21 | Dinei A. F. Florêncio, Cormac Herley |
KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA, pp. 67-76, 2006, IEEE Computer Society, 0-7695-2716-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Laurie Werner |
Redefining computer literacy in the age of ubiquitous computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 6th Conference on Information Technology Education, SIGITE 2005, Newark, NJ, USA, October 20-22, 2005, pp. 95-99, 2005, ACM, 1-59593-252-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
home computer security, laboratory activities, pedagogy |
21 | Gregory L. Orgill, Gordon W. Romney, Michael G. Bailey, Paul M. Orgill |
The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 5th Conference on Information Technology Education, SIGITE 2004, 2004, Salt Lake City, UT, USA, October 28-30, 2004, pp. 177-181, 2004, ACM, 1-58113-936-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
user education, access control, social engineering, physical security |
21 | Wai Man Szeto, Man Hon Wong 0001 |
A Stream Segregation Algorithm for Polyphonic Music Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAS ![In: 7th International Database Engineering and Applications Symposium (IDEAS 2003), 16-18 July 2003, Hong Kong, China, pp. 130-138, 2003, IEEE Computer Society, 0-7695-1981-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Bran Selic |
Does Your Software Creak as It Runs? ![Search on Bibsonomy](Pics/bibsonomy.png) |
UML ![In: UML 2002 - The Unified Modeling Language, 5th International Conference, Dresden, Germany, September 30 - October 4, 2002, Proceedings, pp. 162, 2002, Springer, 3-540-44254-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
21 | Vitaly Shmatikov, John C. Mitchell |
Analysis of Abuse-Free Contract Signing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings, pp. 174-191, 2000, Springer, 3-540-42700-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
21 | Ali R. Hurson, Les L. Miller |
Modification operations in data base machines: where are they? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Conference on Computer Science ![In: Proceedings of the Sixteenth ACM Annual Conference on Computer Science, Atlanta, Georgia, USA, February 23-25, 1988, pp. 636-643, 1988, ACM, 0-89791-260-8. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
21 | G. C. H. Sharman |
Update-by-Dialogue: An Interactive Approach to Database Modification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the 1977 ACM SIGMOD International Conference on Management of Data, Toronto, Canada, August 3-5, 1977., pp. 21-29, 1977, ACM, 978-1-4503-7343-2. The full citation details ...](Pics/full.jpeg) |
1977 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #35 of 35 (100 per page; Change: )
|
|