نتایج جستجو برای: users violations
تعداد نتایج: 222582 فیلتر نتایج به سال:
“Interdependent” privacy violations occur when users share private photos and information about other people in social media without permission. This research investigated user characteristics associated with interdependent perceptions, by asking to rate photo-based memes depicting strangers on the degree which they were too share. Users also completed questionnaires measuring usage personality...
This paper provides an overview of the empirical literature on cyberethics issues within academic environment, specifically young adults’ behaviours in using cyber technology. While digital media is a part institutional and societal drive for informational inclusion knowledge development, ethical practices among users technology have raised questions users’ awareness understanding implications ...
<p>There is an enormous number of mobile apps, leading users to be concerned about the security and privacy their data. But few are aware what meant by app permissions, which sometimes do not illustrate kind data gathered. Therefore, still risks privacy, with little knowledge experience awareness. Users depend on ratings, may fake, or keep track sense install app, like read reviews. To so...
Designers of software components can use finite-state properties to denote behavioral interface specifications which enforce client-side programming rules that state how the components ought to be used. This allows users of these components to check their client code for compliance with these rules, both statically and at runtime. In this dissertation we explain the design and implementation of...
Illegal sale of extra building density (footages) and building violations all are being considered as the most important measures regarding urban management rent issues in Tehran, between 1991-2001. This in turn, intensifies the occurrence of building violations and instability regarding to Tehran’s spatial organization during the mentioned decade. This study aims to investigate the type,...
The development of ticketing system must be more dynamic to solve various problems traffic violations. In Yogyakarta, an electronic based assessment method that began in mid-2020 managed record 315 violations, but the use this is still being rejected by some users. purpose study determine effectiveness e-traffic which applied legal area Yogyakarta city and analyze aspects justice ticket fines m...
Background My Health Record is Australia's electronic personal health record system, which was introduced in July 2012. As of August 2017, approximately 21 percent of Australia's total population was registered to use My Health Record. Internationally, usability issues have been shown to negatively influence the uptake and use of electronic health record systems, and this scenario may particula...
Pekanbaru - Dumai toll road is one of the segments Trans Sumatra roads built by PT Hutama Karya. The connects economic centers in Riau Province, including Dumai-Duri-Kandis-Petapahan-Minas-Pekanbaru. On Pekanbaru-Dumai road, problems with service quality were found. This research has two objectives: to analyze and level satisfaction users assessed from users. second objective formulate referral...
Several static analysis tools, such as Splint or FindBugs, have been proposed to the software development community to help detect security vulnerabilities or bad programming practices. However, the adoption of these tools is hindered by their high false positive rates. If the false positive rate is too high, developers may get acclimated to violation reports from these tools, causing concrete ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید