NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Shehroze Farooqi – ProQuest LLC, 2021
Popular platforms such as Facebook and Twitter integrate third-party apps from developers to enhance the experience of their users. While third-party apps are widely used to provide legitimate functionality, the abuse of third-party apps by attackers is also becoming prevalent. Attackers are abusing third-party apps to orchestrate their malicious…
Descriptors: Social Media, Computer Security, Crime Prevention, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Smith, Shana Shiang-Fong – Journal of Technology Studies, 2004
Due to the now widespread use of the Internet, most companies now require computer aided design (CAD) tools that support distributed collaborative design on the Internet. Such CAD tools should enable designers to share product models, as well as related data, from geographically distant locations. However, integrated collaborative design…
Descriptors: Intellectual Property, Internet, Distance Education, Computer Assisted Design