نتایج جستجو برای: social threat
تعداد نتایج: 655959 فیلتر نتایج به سال:
Online Social Networks (OSNs), such as Facebook, Twitter, and Myspace, provide new and interesting ways to communicate, share, and meet on the Internet. On the one hand, these features have arguably made many of the OSNs quite popular among the general population but the growth of these networks has raised issues and concerns related to trust, privacy and security. On the other hand, some would...
Users’ awareness of the extent of information implicit in their geo-profiles on social networks is limited. This questions the validity of their consent to the collection, storage and use of their data. Tools for location privacy awareness are needed that provide users with accessible means for understanding the implicit content in their location information as well as a view of the level of ri...
The current study investigated the connection between aggression and the perception of threat in a group of children with learning and behavior problems (N = 103). Aggression was assessed by means of the aggressive behavior subscales of the Child Behavior Checklist (CBCL), Teacher Report Form (TRF), and Youth Self-Report (YSR). Perception of threat was measured by studying children's reactions ...
This article evaluates social movement perspectives on repression and movement-countermovement organization relative to the wave of policy setbacks that unions experienced in the pivotal two decades following the New Deal. An event history analysis of the adoption of right-to-work laws across states between 1944 and 1960 supports social movement perspectives that emphasize the relative threat p...
Two randomized field experiments tested a social-psychological intervention designed to improve minority student performance and increase our understanding of how psychological threat mediates performance in chronically evaluative real-world environments. We expected that the risk of confirming a negative stereotype aimed at one's group could undermine academic performance in minority students ...
Our task is to produce test data for a research program developing a new generation of insider threat detection technologies. Test data is created by injecting fictional malicious activity into a background of real user activity. We rely on fictional narratives to specify threats that simulate realistic social complexity, with “drama as data” as a central organizing metaphor. Test cases are scr...
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding and/or management of the overall security policy requirements, which may, in turn, unnecessarily expose the enterprise to known threats. This paper proposes a threat management approach, whereby knowledge about the eff...
Business process modeling has facilitated modern enterprises to cope with the constant need to increase their productivity, reduce costs and offer competitive products and services. Despite modeling’s and process management’s widespread success, one may argue that it lacks of built-in security mechanisms able to detect and deter threats that may manifest throughout the process. To this end, a v...
The Online Social Networks (OSN) open a new vista serving millions of users and have reshaped the way people interacts. Unfortunately these networks are an emerging platform for cybercrimes such as sending malicious URLs, spams, etc. which causes a huge financial loss and social damage. In this paper, it is reviewed that OSN is a new cybercrime platform for threating agents because of the secur...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید