منابع مشابه
Users and Data Protection in Electronic
Based on the results of computer aided telephone interviews (CATI) and a web based questionnaire the author describes the dynamics of sociodemographic and psychographic human centered influences on the diffusion of Electronic Commerce. Items like the socioeconomic embedding of new technologies as electronic payment systems, related psychological and technological questions as trust , safety, se...
متن کاملTrust-Based Protection of Software Component Users and Designers
Software component technology supports the cost-effective design of applications suited to the particular needs of the application owners. This design method, however, causes two new security risks. At first, a malicious component may attack the application incorporating it. At second, an application owner may incriminate a component designer falsely for any damage in his application which in r...
متن کاملProtection from scrotal hyperthermia in laptop computer users.
OBJECTIVE To evaluate methods of prevention of scrotal hyperthermia in laptop computer (LC) users. DESIGN Experimental study. SETTING University hospital. PATIENT(S) Twenty-nine healthy male volunteers. INTERVENTION(S) Right and left scrotal temperature and LC and lap pad temperatures were recorded during three separate 60-minute sessions using a working LC in a laptop position: session...
متن کاملInterfered Users Protection Algorithm for Self-Organizing Networks
Small cells are generally used by telecom operators to effectively share the loading of conventional macrocells and backbone networks, because they cost considerably less to deploy and are also capable of improving communication quality and capacity. However, radio frequency spectrum resources are limited and expensive, so using the same frequency band to deploy small cells in densely populated...
متن کاملSupporting Users in Data Outsourcing and Protection in the Cloud
Moving data and applications to the cloud allows users and companies to enjoy considerable benefits. However, these benefits are also accompanied by a number of security issues that should be addressed. Among these, the need to ensure that possible requirements on security, costs, and quality of services are satisfied by the cloud providers, and the need to adopt techniques ensuring the proper ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Innovation Education and Research
سال: 2018
ISSN: 2411-2933,2411-3123
DOI: 10.31686/ijier.vol6.iss8.1116