نتایج جستجو برای: social control
تعداد نتایج: 1892596 فیلتر نتایج به سال:
the primary goal of the current project was to examine the effect of three different treatments, namely, models with explicit instruction, models with implicit instruction, and models alone on differences between the three groups of subjects in the use of the elements of argument structures in terms of toulmins (2003) model (i.e., claim, data, counterargument claim, counterargument data, rebutt...
Access control is the process by which authorized users are granted permission over resources. Access control models incorporate application requirements in their design and thus evolve with the applications. The rise of online social networks (OSN), like Facebook, has posed new requirements over the privacy of users’ data due to the presence of heterogeneous privacy circle. The traditional mod...
Social commerce (SC) has become a new business mode for e-commerce along with the increased popularity of social networking sites, such as Facebook, Twitter, and Pinterest. Although SC has enormous business potential for practitioners and broadens research areas for scholars, existing studies on SC were limited. Little is known about the underlying processes and factors of consumers’ social sha...
1 NOTICE: This is the author's version of a work accepted for publication by Elsevier. Changes resulting from the publishing process, including peer review, editing, corrections, structural formatting and other quality control mechanisms, may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. The definitive version has been publish...
critical thinking ability has an important role in education. accordingly, scholars around the world are searching for new ways for teaching and improving students critical thinking ability. in line with the studies in efl contexts supporting the positive relationship between critical thinking and writing performances, this study investigated the differential effects of halverson’s critical thi...
Do artifacts act? Should agency be assigned to them in accounts of social change? Or are human beings and social structures like groups and organisations the only social agents? This is a pivotal question for technology studies, but one that has not received an unequivocal answer so far. On the one hand, the literature in technology studies is filled with examples and cases that suggest that te...
This position paper first summarizes work done by the first author on location privacy and differential privacy. These techniques will help to solve privacy problems in decentralized mobile social networks, which is the main theme of his PhD research. The paper then briefly reviews the state-of-the-art in privacy-preservation of social graphs and clarifies the lack of attention to graph sharing...
Access control, as part of every software system, has evolved as computing has evolved. Its original aim was to limit unauthorized access to centralized systems, but the rise of social networks like Facebook has changed that. Now each person wants to control who sees photos or makes comments on their local wall by making and unmaking friends, i.e. dynamic, distributed rights control. Social net...
Social-related services like sharing, tagging or commenting are a mainstay of current web applications and platforms aimed at groups of users. These services not only enhance the purpose and main functionalities of their applications but also create a network of users and services that interconnects into a wider online ecosystem. Despite their success in general and recreational applications, t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید