نتایج جستجو برای: users violations

تعداد نتایج: 222582  

Journal: :Accident; analysis and prevention 2009
Samuel J Alper Ben-Tzion Karsh

It is widely known that intentional non-malevolent violations of safety procedures and norms occur and evidence shows that safety violations can increase the risk of accidents. However, little research about the causes of these violations in work settings exists. To help shed light on the causes, this paper systematically reviews the empirical causes of safety violations in industry. Electronic...

Journal: :Вестник Алтайской академии экономики и права 2019

Journal: :New Formations 2016

Journal: :Crítica (México D. F. En línea) 1982

Journal: :GATR Global Journal of Business and Social Science Review 2019

1995
Urs E. Gattiker Helen Kelley

Stories about computer-related action (e.g., placing a document about how a computer virus works on an electronic network?bulletin board) were presented to users. Data indicate that women end-users compared to men have a less libetiarian sense of what is right and wrong; as well, younger respondents are more libertarian than their older compatriots. Data also indicate that participants are less...

Journal: :Journal of consumer psychology : the official journal of the Society for Consumer Psychology 2014
Cindy Chan Leaf Van Boven Eduardo B Andrade Dan Ariely

Consumers frequently encounter moral violations in everyday life. They watch movies and television shows about crime and deception, hear news reports of corporate fraud and tax evasion, and hear gossip about cheaters and thieves. How does exposure to moral violations influence consumption? Because moral violations arouse disgust and because disgust is an evolutionarily important signal of conta...

2009
Nora Aranberri Johann Roturier

This paper presents the results of a case study focusing on the design and development of specific Controlled Language rules, which address readability and translatability issues generated by -ing words. This paper reviews several development and deployment iterations, whereby users’ feedback was taken into account for future development phases. We show that two complementary techniques may be ...

2007
A. SERMET ANAGUN

A neural network architecture is proposed to deal with a situation of multiple users where each user has his/her own password with different length. Two groups of experiments were conducted to find a better and a reliable way for a computer access security system. The neural networks are trained using time intervals between successive keystrokes during password entry through keyboard and voice ...

2009
Leucio Antonio Cutillo Refik Molva Thorsten Strufe

Existing on-line social networks (OSN) such as Facebook suffer from several weaknesses regarding privacy and security due to their inherent handling of personal data. As pointed out in [4], a preliminary analysis of existing OSNs shows that they are subject to a number of vulnerabilities, ranging from cloning legitimate users to sybil attacks through privacy violations. Starting from these OSN ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید