نتایج جستجو برای: third parties
تعداد نتایج: 269630 فیلتر نتایج به سال:
Protecting privacy against bribery/coercion is a necessary requirement in electronic services, like e-voting, e-auction and e-health. Domain-specific privacy properties have been proposed to capture this. We generalise these properties as enforced privacy : a system enforces a user’s privacy even when the user collaborates with the adversary. In addition, we account for the influence of third p...
Several of themajor U.S. federal and state laws regulating the collection, use and disclosure of personal information by business entities only regulate the activities of entities that receive personal information directly from consumerswhile ignoring third-parties that receive this personal information through onward transfers. This regulatory gap opens the door for such third parties to use o...
In recent years, there has been an abundance of rich and fine-grained data about individuals in domains such as healthcare, finance, retail, web search, and social networks. It is desirable for data collectors to enable third parties to perform complex data mining applications over such data. However, privacy is a natural obstacle that arises when sharing data about individuals with third parti...
Why do some new political parties take root after rising to electoral prominence, while others collapse after their initial success? Although strong parties are critical for stable, high-quality democracy, relatively little is known about the conditions under which strong parties emerge. The classic literature on party-system development is largely based on studies of the United States and West...
Our purpose is to investigate auditor independence by developing a model that includes both financial and nonfinancial incentives and to test this model using an experiment. We develop the Gatekeeper Game: a three player game, where a gatekeeper makes a decision that affects the wealth of two parties (a proposer and a third party) who have conflicting interests. We find that gatekeepers represe...
In this paper, comparative study of different available Secure Multiparty Computation (SMC) protocols have been addressed. In SMC, a set of parties wishes to jointly compute some function on their inputs. This computation must preserve certain security properties, like privacy and correctness. The general approach for such kind of computation is to make use of trusted third party to do the comp...
We compare three common dispute resolution processes – negotiation, mediation, and arbitration – in the framework of Crawford and Sobel [V. Crawford, J. Sobel, Strategic information transmission, Econometrica 50 (6) (1982) 1431–1451]. Under negotiation, the two parties engage in (possibly arbitrarily long) face-to-face cheap talk. Under mediation, the parties communicate with a neutral third pa...
Social and Personality Psychology Compass 2016; 10: 67 Abstract Society generally encourages individuals to forgive their transgressors because forgiveness can yield many psychological, physiological, and social benefits (Exline & Baumeister, 2000). Nevertheless, victims face barriers to forgiving others, and other people face obstacles that prevent them from encouraging victims to forgive. We ...
Costly third party punishment has been interpreted as a tool for studying the enforcement of social norms. Experiments on this topic typically involve a third party observer who can pay to decrease the payoff of a player who has behaved selfishly (or generously) toward another. We investigate whether third parties are also willing to engage in costly rewarding, and whether third party responses...
The new wireless technologies for telecommunications networks and devices will enable new kinds of mobile services [7] and create enormous business opportunities [2]. Effective use of these business opportunities requires cooperation with other companies and using applications developed by third parties. The teleoperators today have a dominant position across all markets, and third parties can ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید