Social software engineering

Results: 749



#Item
41Social engineering / Fraud / Spamming / Deception / Non-sufficient funds / ESET / Advance-fee scam / Lottery scam / Romance scam / David Harley / Antivirus software / Cheque fraud

October 2015 Feature Article: 419 Special Table of Contents 419s: This Time it’s (not very) Personal.....................................................................................................................

Add to Reading List

Source URL: www.virusradar.com

Language: English - Date: 2015-11-30 04:02:56
42Software engineering / Computing / Software / Scripting languages / Ruby / Object-oriented programming languages / Cross-platform software / JRuby / JavaScript / Sass / TypeScript

.ch/careers Ruby Developer cognita develops the issue and media monitoring service blueReport. We collect relevant information from all types of media (websites, social media, printed, TV, …) and provide our clients wi

Add to Reading List

Source URL: cognita.ch

Language: English - Date: 2016-01-05 04:55:42
43User interface techniques / Human communication / Virtual reality / Academia / Interpersonal communication / Software architecture / Multimodal interaction / Augmented reality / Symbolic interactionism / User interface / Social relation / Sound and music computing

Symbolic Objects in a Networked Gestural Sound Interface Eric Kabisch, * Amanda Williams, Paul Dourish *Arts, Computation and Engineering (ACE) University of California, Irvine Irvine, CA

Add to Reading List

Source URL: www.dourish.com

Language: English - Date: 2008-06-14 12:49:27
44

Task Patterns to support task-centric Social Software Engineering Benedikt Schmidt1 and Wolfgang Reinhardt2 1 SAP Research CEC Darmstadt, Bleichstrasse 8, 64283 Darmstadt, Germany,

Add to Reading List

Source URL: sunsite.informatik.rwth-aachen.de

Language: English - Date: 2009-07-31 15:18:32
    45

    Towards an application-specific expert finding repository on the Social Web Tom Tourw´e and Elena Tsiporkova Software Engineering & ICT Group, Sirris {tom.tourwe,elena.tsiporkova}@sirris.be

    Add to Reading List

    Source URL: www.wis.ewi.tudelft.nl

    Language: English - Date: 2011-05-19 03:59:27
      46Software requirements / Software / Computing / Project management software / Engineering / Jama Software / Social software / Business requirements / Requirement / Quality assurance / Traceability

      OMNIGON case study © Omnigon GAME CHANGERS WHO

      Add to Reading List

      Source URL: go.jamasoftware.com

      Language: English - Date: 2016-04-03 08:43:26
      47Software requirements / Systems engineering / Software / Business / Jama Software / Project management software / Social software / Computing / Product development / Requirements management / Jama / New product development

      Fortune100BestCompLogo2012_OC

      Add to Reading List

      Source URL: go.jamasoftware.com

      Language: English - Date: 2016-03-29 18:39:59
      48

      Improving the Software Testing Skills of Novices during Onboarding through Social Transparency Raphael Pham Software Engineering Group Leibniz Universität Hannover Hanover, Germany

      Add to Reading List

      Source URL: www.se.uni-hannover.de

      Language: English - Date: 2015-06-04 04:21:53
        49Computing / Software engineering / Software / Human communication / Humancomputer interaction / Cross-platform software / Graphic design / Usability / User interface design / JavaScript / User interface / Cascading Style Sheets

        Noah Liebman! ❖ noahliebman.net! Education! Northwestern University — Evanston, IL! TECHNOLOGY & SOCIAL BEHAVIOR — PH.D.

        Add to Reading List

        Source URL: noahliebman.net

        Language: English - Date: 2016-02-01 17:10:37
        50Software / Computing / Computer access control / Computer security / Hacking / Social engineering / User interface techniques / Security / Cross-site request forgery / Cross-site scripting / Phishing / Clickjacking

        A Trusted UI for the Mobile Web Bastian Braun1 , Johannes Koestler1 , Joachim Posegga1 , and Martin Johns2 1 Institute of IT Security and Security Law (ISL), University of Passau, Germany 2

        Add to Reading List

        Source URL: dl.dropboxusercontent.com

        Language: English
        UPDATE