Learn More
Despite rapid technological advances in computer hardware and software, insecure behavior by individual computer users continues to be a significant source of direct cost and productivity loss. Why do individuals, many of whom are aware of the possible grave consequences of low-level insecure behaviors such as failure to backup work and disclosing(More)
Computer security issues have typically been approached from the perspective of building technical countermeasures to reduce risk. Recently, researchers have recognized that computer users play an important role in ensuring secure systems by implementing those technical countermeasures. As a means of encouraging safe computing practice, user training and(More)
can be found at: Small Group Research Additional services and information for http://sgr.sagepub.com/cgi/alerts Email Alerts: http://sgr.sagepub.com/subscriptions Subscriptions: http://www.sagepub.com/journalsReprints.nav Reprints: http://www.sagepub.com/journalsPermissions.nav Permissions: http://sgr.sagepub.com/cgi/content/refs/30/4/453 SAGE Journals(More)
Recent research in the treatment of sexual offenders suggests that comprehensive cognitive/behavioral approaches may yield lower recidivism. This study reviewed such a program, existing in Jackson County, Oregon, since 1982. Offenders were mandated into this community-based program upon conviction of a felony or misdemeanor sexual offense, and averaged 2-3(More)
  • Kregg Aytes
  • Computer Supported Cooperative Work (CSCW)
  • 1995
Collaborative drawing tools, which are designed to allow multiple users to share an electronic drawing space, have recently become the focus of many researchers' efforts. While advances have been made in the technological implementation of these tools, little is known about the effect these tools have on group processes. This paper discusses a study that(More)
Groups use procedural structures to organize their efforts in meetings. These structures are affected by group members’ preferences for the degree of procedural order they want in a meeting, as well as by the communication media available in the meeting environment. Analysis of thirty partially distributed experimental groups that met over a series of four(More)