نتایج جستجو برای: third parties

تعداد نتایج: 269630  

2013
Naipeng Dong Hugo L. Jonker Jun Pang

Protecting privacy against bribery/coercion is a necessary requirement in electronic services, like e-voting, e-auction and e-health. Domain-specific privacy properties have been proposed to capture this. We generalise these properties as enforced privacy : a system enforces a user’s privacy even when the user collaborates with the adversary. In addition, we account for the influence of third p...

2010
Raghu Bryan Seshadri

Several of themajor U.S. federal and state laws regulating the collection, use and disclosure of personal information by business entities only regulate the activities of entities that receive personal information directly from consumerswhile ignoring third-parties that receive this personal information through onward transfers. This regulatory gap opens the door for such third parties to use o...

Journal: :CoRR 2012
Krishnaram Kenthapadi Aleksandra Korolova Ilya Mironov Nina Mishra

In recent years, there has been an abundance of rich and fine-grained data about individuals in domains such as healthcare, finance, retail, web search, and social networks. It is desirable for data collectors to enable third parties to perform complex data mining applications over such data. However, privacy is a natural obstacle that arises when sharing data about individuals with third parti...

2016
Brandon Van Dyck

Why do some new political parties take root after rising to electoral prominence, while others collapse after their initial success? Although strong parties are critical for stable, high-quality democracy, relatively little is known about the conditions under which strong parties emerge. The classic literature on party-system development is largely based on studies of the United States and West...

2008
Amy K. Choy David Levine Gary Miller Mark Penno

Our purpose is to investigate auditor independence by developing a model that includes both financial and nonfinancial incentives and to test this model using an experiment. We develop the Gatekeeper Game: a three player game, where a gatekeeper makes a decision that affects the wealth of two parties (a proposer and a third party) who have conflicting interests. We find that gatekeepers represe...

2011
Zulfa Shaikh Poonam Garg

In this paper, comparative study of different available Secure Multiparty Computation (SMC) protocols have been addressed. In SMC, a set of parties wishes to jointly compute some function on their inputs. This computation must preserve certain security properties, like privacy and correctness. The general approach for such kind of computation is to make use of trusted third party to do the comp...

2009
MARIA GOLTSMAN JOHANNES HÖRNER GREGORY PAVLOV FRANCESCO SQUINTANI Maria Goltsman Johannes Hörner Gregory Pavlov Francesco Squintani

We compare three common dispute resolution processes – negotiation, mediation, and arbitration – in the framework of Crawford and Sobel [V. Crawford, J. Sobel, Strategic information transmission, Econometrica 50 (6) (1982) 1431–1451]. Under negotiation, the two parties engage in (possibly arbitrarily long) face-to-face cheap talk. Under mediation, the parties communicate with a neutral third pa...

2016
Medha Raj Scott S. Wiltermuth

Social and Personality Psychology Compass 2016; 10: 67 Abstract Society generally encourages individuals to forgive their transgressors because forgiveness can yield many psychological, physiological, and social benefits (Exline & Baumeister, 2000). Nevertheless, victims face barriers to forgiving others, and other people face obstacles that prevent them from encouraging victims to forgive. We ...

2010
Johan Almenberg Anna Dreber Coren L. Apicella David G. Rand Martin A. Nowak Magnus Johannesson Thomas Pfeiffer David Cesarini Drew Fudenberg Manfred Milinski Hisashi Ohtsuki Jorge M. Pacheco Bettina Rockenbach

Costly third party punishment has been interpreted as a tool for studying the enforcement of social norms. Experiments on this topic typically involve a third party observer who can pay to decrease the payoff of a player who has behaved selfishly (or generously) toward another. We investigate whether third parties are also willing to engage in costly rewarding, and whether third party responses...

2003
Päivi Kallio Arto Matilainen Daniela Boggio Giorgio De Matteis

The new wireless technologies for telecommunications networks and devices will enable new kinds of mobile services [7] and create enormous business opportunities [2]. Effective use of these business opportunities requires cooperation with other companies and using applications developed by third parties. The teleoperators today have a dominant position across all markets, and third parties can ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید