PROTECTION OF USERS

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Users and Data Protection in Electronic

Based on the results of computer aided telephone interviews (CATI) and a web based questionnaire the author describes the dynamics of sociodemographic and psychographic human centered influences on the diffusion of Electronic Commerce. Items like the socioeconomic embedding of new technologies as electronic payment systems, related psychological and technological questions as trust , safety, se...

متن کامل

Trust-Based Protection of Software Component Users and Designers

Software component technology supports the cost-effective design of applications suited to the particular needs of the application owners. This design method, however, causes two new security risks. At first, a malicious component may attack the application incorporating it. At second, an application owner may incriminate a component designer falsely for any damage in his application which in r...

متن کامل

Protection from scrotal hyperthermia in laptop computer users.

OBJECTIVE To evaluate methods of prevention of scrotal hyperthermia in laptop computer (LC) users. DESIGN Experimental study. SETTING University hospital. PATIENT(S) Twenty-nine healthy male volunteers. INTERVENTION(S) Right and left scrotal temperature and LC and lap pad temperatures were recorded during three separate 60-minute sessions using a working LC in a laptop position: session...

متن کامل

Interfered Users Protection Algorithm for Self-Organizing Networks

Small cells are generally used by telecom operators to effectively share the loading of conventional macrocells and backbone networks, because they cost considerably less to deploy and are also capable of improving communication quality and capacity. However, radio frequency spectrum resources are limited and expensive, so using the same frequency band to deploy small cells in densely populated...

متن کامل

Supporting Users in Data Outsourcing and Protection in the Cloud

Moving data and applications to the cloud allows users and companies to enjoy considerable benefits. However, these benefits are also accompanied by a number of security issues that should be addressed. Among these, the need to ensure that possible requirements on security, costs, and quality of services are satisfied by the cloud providers, and the need to adopt techniques ensuring the proper ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal for Innovation Education and Research

سال: 2018

ISSN: 2411-2933,2411-3123

DOI: 10.31686/ijier.vol6.iss8.1116