Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Fred Mtenzi"'
Autor:
Saalim Koomar, Winston Massam, Kristeen Chachage, WinifridaJacob Mrope, Mustafa Malibiche, Emmanuel Mutura, Taskeen Adam, Sara Hennessy, Fred Mtenzi, Aneth Komba, Fika Mwakabungu
An output of the EdTech Hub, https://edtechhub.org
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6bbf923581bb4707751cb1f8ad98c1a4
https://doi.org/10.53832/edtechhub.0167
https://doi.org/10.53832/edtechhub.0167
Publikováno v:
International Journal for Information Security Research. 5:529-537
Phishing takes advantage of the way humans interact with computers or interpret messages. A security ceremony is one way of extending the reach of current methods for social, technical and contextual analysis of security protocols to include humans.
Publikováno v:
CHI Extended Abstracts
Conference papers
Conference papers
Personas are artificial character based representations of user goals, attitudes, motivations and abilities which enable designers to focus their design efforts on key, targeted users. The success of personas in design is due to their capacity to ena
Publikováno v:
Conference papers
Tackling Society's Grand Challenges with Design Science ISBN: 9783319392936
DESRIST
Tackling Society's Grand Challenges with Design Science ISBN: 9783319392936
DESRIST
This paper builds upon the existing concept of an everyday designer as a non-expert designer who carries out design activities using available resources in a given environment. It does so by examining the design activities undertaken by non-expert, i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::16173d8d95c727e100a152da8a8a60a7
https://arrow.tudublin.ie/scschcomcon/382
https://arrow.tudublin.ie/scschcomcon/382
Publikováno v:
ICITST
Phishing takes advantage of the way humans interact with computers or interpret messages; and also that many online authentication protocols place a disproportional burden on human abilities. A security ceremony is an extension of the concept of netw
Publikováno v:
Other
The scientific community is in the midst of a data analysis crisis. The increasing capacity of scientific CCD instrumentation and their falling costs is contributing to an explosive generation of raw photometric data. This data must go through a proc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c94d050897fd78de7e72c24a06319c44
https://arrow.tudublin.ie/ascnetoth/5
https://arrow.tudublin.ie/ascnetoth/5
Publikováno v:
ICITST
Scopus-Elsevier
Scopus-Elsevier
Due to sensitivity nature of the data in e-healthcare and the need of these data to different “Healthcare Team”, privacy is one of the important issues to consider for its use. Without highly consideration of privacy issues, available data will n
Publikováno v:
2009 First International Conference on Networked Digital Technologies.
Growth of various technologies such as the internet, wireless computing and different storage devices, results in to collection and sharing of numerous individuals' data. This data may contain different kind of personal identifiable information (PII)
Publikováno v:
2009 First International Conference on Networked Digital Technologies.
Computer Security and Forensics is an emerging academic discipline in which there are many challenges facing educational institutions in teaching, from both an educational and technical perspective. The School of Computing in Dublin Institute of Tech
Publikováno v:
Conference papers
Ubiquitous Intelligence and Computing ISBN: 9783540692928
UIC
Ubiquitous Intelligence and Computing ISBN: 9783540692928
UIC
This paper presents a review of RFID based approaches used for the development of smart spaces and smart objects. We explore approaches that enable RFID technology to make the transition from the recognized applications such as retail to ubiquitous c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::58c4cf1fb7eba7874e8fdf1e50e5e738
https://arrow.tudublin.ie/engschececon/52
https://arrow.tudublin.ie/engschececon/52