|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 29 occurrences of 29 keywords
|
|
|
Results
Found 35 publication records. Showing 35 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
51 | John F. Banzhaf |
When your computer needs a lawyer. |
Commun. ACM |
1968 |
DBLP DOI BibTeX RDF |
constacts, criminals, evidence copying, income tax, lawyer, liabilty, negligence, record keeping records, slander of credit, standard of care, torts, warrantees, simulation, accounting, regulations, copyrights, evidence, law, patents, legal, copying, guarantees, crime, trade secrets |
41 | Myung Sil Choi, Yong Soo Park, Kwang Seon Ahn |
Enterprise Management System with Web-Crawler. |
APNOMS |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Urs Schweizer |
Negligence rules coping with hidden precaution. |
Math. Soc. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Mark Sangster |
When it comes to cyber security, ignorance isn't bliss - it's negligence. |
Netw. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Kelly Lynn Mulvey, Seçil Gönültas, Cameron B. Richardson |
Who Is to Blame? Children's and Adults' Moral Judgments Regarding Victim and Transgressor Negligence. |
Cogn. Sci. |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Scott McLachlan, Evangelia Kyrimi, Norman E. Fenton |
Public Authorities as Defendants: Using Bayesian Networks to determine the Likelihood of Success for Negligence claims in the wake of Oakden. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
31 | Robert Bevan, Alessandro Torrisi, Danushka Bollegala, Frans Coenen, Katie Atkinson |
Extracting Supporting Evidence from Medical Negligence Claim Texts. |
KDH@IJCAI |
2019 |
DBLP BibTeX RDF |
|
31 | Maurizio Naldi, Marta Flamini, Giuseppe D'Acquisto |
Negligence and sanctions in information security investments in a cloud environment. |
Electron. Mark. |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Sarah Elizabeth Kennedy |
The pathway to security - mitigating user negligence. |
Inf. Comput. Secur. |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Susanne Beck |
Intelligent agents and criminal law - Negligence, diffusion of liability and electronic personhood. |
Robotics Auton. Syst. |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Maurizio Naldi, Marta Flamini, Giuseppe D'Acquisto |
Information Security Investments: When Being Idle Equals Negligence. |
GECON |
2013 |
DBLP DOI BibTeX RDF |
|
31 | John Voiklis, Jeffrey Nickerson |
Tort Reform: Negligence Explains Attributions of Intentionality for Negative Side Effects. |
CogSci |
2011 |
DBLP BibTeX RDF |
|
31 | Farhah Abdullah, Jusoff Hj. Kamaruzaman, Hasiah Mohamed, Roszainora Setia |
Strict versus Negligence Software Product Liability. |
Comput. Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Pit Pichappan, P. Vijayakumar |
Negligence of Phrase Indexing in Search Engines. |
Int. J. Web Appl. |
2009 |
DBLP BibTeX RDF |
|
31 | Hina Shah, Mary Jean Harrold |
Exception handling negligence due to intra-individual goal conflicts. |
CHASE |
2009 |
DBLP DOI BibTeX RDF |
|
31 | John McMullan |
Negligence: Engineering Safety-Critical Systems. |
SCS |
2002 |
DBLP BibTeX RDF |
|
31 | Edward H. Freeman |
Director Liability in Computer Negligence Cases. |
Inf. Secur. J. A Glob. Perspect. |
2000 |
DBLP DOI BibTeX RDF |
|
31 | M. E. Kabay |
Distributed denial-of-service attacks, contributory negligence and downstream liability. |
Ubiquity |
2000 |
DBLP DOI BibTeX RDF |
|
31 | Diane Rowland |
Negligence, Professional Competence and Computer Systems. |
J. Inf. Law Technol. |
1999 |
DBLP BibTeX RDF |
|
31 | Anne M. Payton |
Data security breach: seeking a prescription for adequate remedy. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
data breach, data custodian, negligence, notification laws, identity theft, personal information, security breach |
31 | Cem Kaner |
Liability for defective content. |
SIGDOC |
2004 |
DBLP DOI BibTeX RDF |
defamation, information liability, libel, negligence, professional liability, warranty, documentation, web content |
21 | Nicolas Anciaux, Luc Bouganim, Harold van Heerde, Philippe Pucheral, Peter M. G. Apers |
Data degradation: making private data less sensitive over time. |
CIKM |
2008 |
DBLP DOI BibTeX RDF |
data degradation, limited retention, privacy |
21 | Pablo Sánchez 0002, Lidia Fuentes, Dominik Stein, Stefan Hanenberg, Rainer Unland |
Aspect-Oriented Model Weaving Beyond Model Composition and Model Transformation. |
MoDELS |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Yair Wiseman, Irit Gefner |
Conjugation-based compression for Hebrew texts. |
ACM Trans. Asian Lang. Inf. Process. |
2007 |
DBLP DOI BibTeX RDF |
Burrows-Wheeler algorithm, Hebrew text analysis, Root conjugations, semitic languages, Text compression |
21 | Barbara Endicott-Popovsky, Brian Chee, Deborah A. Frincke |
Calibration Testing Of Network Tap Devices. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2007 |
DBLP DOI BibTeX RDF |
aggregating tap, baseline testing, calibration, Network forensics |
21 | Yi Guan, Jian Zhao |
An Improved Feature Representation Method for Maximum Entropy Model. |
ICDM Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Kevin Borders, Xin Zhao 0016, Atul Prakash 0001 |
Securing sensitive content in a view-only file system. |
Digital Rights Management Workshop |
2006 |
DBLP DOI BibTeX RDF |
insider abuse, virtual machines, file systems, digital rights management, information leakage |
21 | Dinei A. F. Florêncio, Cormac Herley |
KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Laurie Werner |
Redefining computer literacy in the age of ubiquitous computing. |
SIGITE Conference |
2005 |
DBLP DOI BibTeX RDF |
home computer security, laboratory activities, pedagogy |
21 | Gregory L. Orgill, Gordon W. Romney, Michael G. Bailey, Paul M. Orgill |
The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems. |
SIGITE Conference |
2004 |
DBLP DOI BibTeX RDF |
user education, access control, social engineering, physical security |
21 | Wai Man Szeto, Man Hon Wong 0001 |
A Stream Segregation Algorithm for Polyphonic Music Databases. |
IDEAS |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Bran Selic |
Does Your Software Creak as It Runs? |
UML |
2002 |
DBLP DOI BibTeX RDF |
|
21 | Vitaly Shmatikov, John C. Mitchell |
Analysis of Abuse-Free Contract Signing. |
Financial Cryptography |
2000 |
DBLP DOI BibTeX RDF |
|
21 | Ali R. Hurson, Les L. Miller |
Modification operations in data base machines: where are they? |
ACM Conference on Computer Science |
1988 |
DBLP DOI BibTeX RDF |
|
21 | G. C. H. Sharman |
Update-by-Dialogue: An Interactive Approach to Database Modification. |
SIGMOD Conference |
1977 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #35 of 35 (100 per page; Change: )
|
|