Log Usage Analysis: What it Discloses about Use, Information Seeking and Trustworthiness

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Log Usage Analysis: What it Discloses about Use, Information Seeking and Trustworthiness

Article history: Received 8 March 2014 Revised 25 May 2014 Accepted 1 June 2014 The Trust and Authority in Scholarly Communications in the Light of the Digital Transition research project1) was a study which investigated the behaviours and attitudes of academic researchers as producers and consumers of scholarly information resources in respect to how they determine authority and trustworthines...

متن کامل

What is trustworthiness and what drives it?

This paper reports the results of experiments designed to isolate the impact of various combinations of the following motives on trustworthiness: (i) unconditional other-regarding preferences — like altruism, inequality aversion, quasi-maximin, etc.; (ii) deal-responsiveness — reacting to actions that allow for a mutual improvement by adopting behavior that implies a mutual improvement; (iii) g...

متن کامل

Quantum Information: What Is It All About?

This paper answers Bell’s question: What does quantum information refer to? It is about quantum properties represented by subspaces of the quantum Hilbert space, or their projectors, to which standard (Kolmogorov) probabilities can be assigned by using a projective decomposition of the identity (PDI or framework) as a quantum sample space. The single framework rule of consistent histories preve...

متن کامل

Undermining Information Hiding (and What to Do about It)

In the absence of hardware-supported segmentation, many state-of-the-art defenses resort to “hiding” sensitive information at a random location in a very large address space. This paper argues that information hiding is a weak isolation model and shows that attackers can find hidden information, such as CPI’s SafeStacks, in seconds—by means of thread spraying. Thread spraying is a novel attack ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Knowledge Content Development & Technology

سال: 2014

ISSN: 2234-0068

DOI: 10.5865/ijkct.2014.4.1.023