نتایج جستجو برای: User’s violations
تعداد نتایج: 222582 فیلتر نتایج به سال:
The Web allows users to share their work very effectively leading to the rapid re-use and remixing of content on the Web including text, images, and videos. Scientific research data, social networks, blogs, photo sharing sites and other such applications known collectively as the Social Web, and even general purpose Web sites, have lots of increasingly complex information. Such information from...
Online social networks contain plethora of information about its users. While users enjoy sharing information online, not all information is meant to be seen by the entire network. Managing the privacy of users has become an important aspect of such online networks. An important part of this is detecting privacy violations and notifying the users so that they can take appropriate actions. While...
Studying Expectation Violations in Socio-Technical Systems: a Case Study of the Mobile App Community
With information technology mediating most aspects of contemporary societies, it is important to explore how human-oriented concepts may be leveraged to explore human actions in this new dispensation. One such concept is expectation violations. Expectations govern nearly all aspect of human interactions. However, while this phenomenon has been studied in human-human contexts where violations ar...
In this demonstration, we present PriGuardTool, which is a Web-based tool that can detect privacy violations in online social networks and notify the users accordingly. Our tool comes up with an interface where the users input their privacy concerns. An agent represents a user in the online social network. Each agent is responsible for generating commitments between its user and the system to m...
Predictions of isospin asymmetries of valence and sea distributions are presented which are generated by QED leading Oalpha photon bremsstrahlung effects. Together with isospin violations arising from nonperturbative hadronic sources (such as quark and target mass differences) as well as with even a conservative contribution from a strangeness asymmetry (s not equal to s), the discrepancy betwe...
We consider the problems of coping with violations of semantic integrity constraints in applications requiring long-duration, user-controlled transaction. Such a transaction will typically violate many constraints, and will have a complicated semantics that is non-trivial to repair. We propose an approach to the related problems of explaining integrity violations, and presenting possible repair...
The Court of Justice the European Union has recently issued a judgment in joined cases C-682/18 (YouTube) and C-683/18 (Cyando) relating to operator's liability for copyright infringements committed by users its platform within meaning Art. 3, paragraph 1 Directive 2001/29 on information society. In cited Luxembourg, there are two specific platforms being concerned: popular video-sharing file h...
Social network users expect the social networks that they use to preserve their privacy. Traditionally, privacy breaches have been understood as malfunctioning of a given system. However, in online social networks, privacy breaches are not necessarily a malfunctioning of a system but a byproduct of its workings. The users are allowed to create and share content about themselves and others. When...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید