نتایج جستجو برای: users violations
تعداد نتایج: 222582 فیلتر نتایج به سال:
It is widely known that intentional non-malevolent violations of safety procedures and norms occur and evidence shows that safety violations can increase the risk of accidents. However, little research about the causes of these violations in work settings exists. To help shed light on the causes, this paper systematically reviews the empirical causes of safety violations in industry. Electronic...
Stories about computer-related action (e.g., placing a document about how a computer virus works on an electronic network?bulletin board) were presented to users. Data indicate that women end-users compared to men have a less libetiarian sense of what is right and wrong; as well, younger respondents are more libertarian than their older compatriots. Data also indicate that participants are less...
Consumers frequently encounter moral violations in everyday life. They watch movies and television shows about crime and deception, hear news reports of corporate fraud and tax evasion, and hear gossip about cheaters and thieves. How does exposure to moral violations influence consumption? Because moral violations arouse disgust and because disgust is an evolutionarily important signal of conta...
This paper presents the results of a case study focusing on the design and development of specific Controlled Language rules, which address readability and translatability issues generated by -ing words. This paper reviews several development and deployment iterations, whereby users’ feedback was taken into account for future development phases. We show that two complementary techniques may be ...
A neural network architecture is proposed to deal with a situation of multiple users where each user has his/her own password with different length. Two groups of experiments were conducted to find a better and a reliable way for a computer access security system. The neural networks are trained using time intervals between successive keystrokes during password entry through keyboard and voice ...
Existing on-line social networks (OSN) such as Facebook suffer from several weaknesses regarding privacy and security due to their inherent handling of personal data. As pointed out in [4], a preliminary analysis of existing OSNs shows that they are subject to a number of vulnerabilities, ranging from cloning legitimate users to sybil attacks through privacy violations. Starting from these OSN ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید