نتایج جستجو برای: social threat

تعداد نتایج: 655959  

Journal: :CoRR 2012
Wajeb Gharibi Maha Shaabi

A social network is a social structure made up of individuals or organizations called nodes, which are connected by one or more specific types of interdependency, such as friendship, common interest, and exchange of finance, relationships of beliefs, knowledge or prestige. A cyber threat can be both unintentional and intentional, targeted or non targeted, and it can come from a variety of sourc...

2009
Justin Becker Hao Chen

Measuring privacy risk in online social networks is a challenging task. One of the fundamental difficulties is quantifying the amount of information revealed unintentionally. We present PrivAware, a tool to detect and report unintended information loss in online social networks. Our goal is to provide a rudimentary framework to identify privacy risk and provide solutions to reduce information l...

2012
Annette Sercombe Maria Papadaki

Social Networks have become part of daily life for millions of people and by their very nature they encourage information sharing. 2011 was a year that saw numerous targeted "Spear Phishing" attacks in which it was clear that attackers gained knowledge about victims prior to carrying out their attacks. There is evidence that social media has been utilised as the source for this information so t...

2010
WILLIAM EBERLE JEFFREY GRAVES

The authors present the use of graph-based approaches to discovering anomalous instances of structural patterns in data that represent insider threat activity. The approaches presented search for activities that appear to match normal transactions, but in fact are structurally different. The authors show the usefulness of applying graph theoretic approaches to discovering suspicious insider act...

2001
RANDOLPH M. NESSE

O nce you recognize them, commitments are everywhere. The commitment we all know is marriage. By giving up the option to leave for someone else, spouses gain security and an opportunity for a much deeper (and more efficient!) relationship than would otherwise be possible.Yet many commitments are not at all nice. When John F. Kennedy committed the United States to eliminating missiles from Cuba,...

2015
Patrick Roos Michele Gelfand Dana Nau Janetta Lun

The strengths of social norms vary considerably across cultures, yet little research has shown whether such differences have an evolutionary basis. Integrating research in cross-cultural psychology with evolutionary game theory, we show that groups that face a high degree of threat develop stronger norms for organizing social interaction, with a higher degree of norm–adherence and higher punish...

2008
Maxime Morge

To greater adoption of argumentation technologies, their links with other disciplines need attention. In particular, Sociology provides a pertinent and well-grounded background for analysing the social dimensions of multiagent organisations. In this paper, we explore the social science background which captures the notions of motivation and social power/relationship in order to provide a coordi...

Journal: :Social cognitive and affective neuroscience 2015
Belle Derks Jeffrey Stedehouder Tiffany A Ito

Two studies examined whether social identity processes, i.e. group identification and social identity threat, amplify the degree to which people attend to social category information in early perception [assessed with event-related brain potentials (ERPs)]. Participants were presented with faces of Muslims and non-Muslims in an evaluative priming task while ERPs were measured and implicit evalu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید