منابع مشابه
Looking at Information Security through a Prospect Theory Lens
Traditional accounts of decision-making under uncertainty have taken the Von Neumann and Morgenstern approach of Expected Utility Theory that considers how decisions under uncertainty should be made. This prescriptive model states that, when faced with a choice, a rational decision maker will pick the prospect that offers the highest expected utility. But as has been demonstrated by Kahnemann a...
متن کاملThe Symbiosis of Human and Semantic Technology Through the Lens of Actor-Network Theory
Background: Semantic technologies (STs) have made machine reasoning possible by providing intelligent data management methods. This capability has created new forms of interaction between humans and STs, which is called "semantic interaction." The increasing spread of this form of interaction in daily life reveals the need to identify the factors affecting it and introduce the requirements of...
متن کاملFocusing on Vision Through an Environmental Lens
Background: Extracting biological information from high-density Affymetrix arrays is a multi-step process that begins with the accurate annotation of microarray probes. Shortfalls in the original Affymetrix probe annotation have been described; however, few studies have provided rigorous solutions for routine data analysis. Results: Using AceView, a comprehensive human transcript database, we h...
متن کاملUnderstanding eating interventions through an evolutionary lens.
Health psychologists aim to improve eating behaviour to achieve health. Yet the effectiveness of healthy eating interventions is often minimal. This ineffectiveness may be in part because many healthy eating interventions are in a battle against evolved mechanisms (e.g., hedonic and related systems) that promote the consumption of energy-dense foods. Such foods, once rare, are now abundant in o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Human Security
سال: 2008
ISSN: 1835-3800
DOI: 10.3316/jhs0403036