منابع مشابه
Threats to Feminist Identity and Reactions to Gender Discrimination
The aim of this research was to examine conditions that modify feminists' support for women as targets of gender discrimination. In an experimental study we tested a hypothesis that threatened feminist identity will lead to greater differentiation between feminists and conservative women as victims of discrimination and, in turn, a decrease in support for non-feminist victims. The study was con...
متن کاملTrust vs. Threats: Recovery and Survival in Electronic Commerce
This paper analyzes threats and attacks in the Internet Commerce world and suggests schemes to detect the attacks when they occur, prevent further loss once an attack is detected, and provides remedial corrective actions so as to enable victims of commercerelated attacks to resume conducting business transactions. Some commerce based transaction recovery mechanisms are suggested to recover from...
متن کاملThreats and Security using Trust Techniques in Wireless Sensor Networks
Wireless Sensor Networks are implementing on large scale in real time environments due to its incredible uses in real life. Wireless Sensor Networks don’t need human interference for its working so they can place where human cannot reach easily. As sensor nodes are placed in an open and insecure environment, they are prone to security attacks by adversaries. So, the security is an impo rtant is...
متن کاملCombining Trust and Behavioral Analysis to Detect Security Threats in Open Environments
Open computing environments are under a deluge of network attacks from complex threats. These threats are distributed, decentralized , dynamic, and operate over multiple timescales. Trusted Computing environments provide a means to manage cryptographic identity and authentication operations in the form of static assertions, but were not developed to provide complete end-to-end security for hete...
متن کاملMerging Similarity and Trust Based Social Networks to Enhance the Accuracy of Trust-Aware Recommender Systems
In recent years, collaborative filtering (CF) methods are important and widely accepted techniques are available for recommender systems. One of these techniques is user based that produces useful recommendations based on the similarity by the ratings of likeminded users. However, these systems suffer from several inherent shortcomings such as data sparsity and cold start problems. With the dev...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Bulletin of the Psychonomic Society
سال: 1973
ISSN: 0090-5054
DOI: 10.3758/bf03334392