نتایج جستجو برای: enhancing values
تعداد نتایج: 601335 فیلتر نتایج به سال:
Computer Supported Collaborative Learning (CSCL) support is currently widely accepted to provide reliable and valid formal and informal educational practices as proven to benefit students in onsite as well as distant educational settings. However, some results from case studies indicate that privacy problems could negatively affect CSCL implementation in educational settings. Privacy Enhancing ...
Should leaders pay more attention to values? The present study aims examine and explain the associations of engaging leadership (EL) with employees' perceptions organization's values, need fulfillment, employee engagement. EL is a recent concept drawing on self-determination theory, specifically fulfillment basic psychological needs autonomy, competence, relatedness. We expected associate emplo...
this study aims to investigate value conflicts between mothers and their daughters among families and influential factors on this conflict in yazd city. this study adopted a survey method and a questionnaire was used that its validity through construct validity (factor analysis) and its reliability by cronbach alpha were measured. the population of this study consists of all yazdian families th...
Der Beitrag befasst sich mit biometrischen Authentifizierungsverfahren zwischen Wahrung von Persönlichkeitsrechten einerseits und der Eignung zum Nachweis von Authentizität im elektronischen Rechtsverkehr insbesondere bei der Verwendung elektronischer Signaturen andererseits. Ein Vergleich mit herkömmlichen Authentifizierungsmechanismen wie dem Prinzip Besitz und Wissen ergibt entscheidende Sch...
The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system and the amount of protection offered by privacy-enhancing technologies. In this way, privacy metrics contribute to improving user privacy in the digital world. The diversity and complexity of privacy metrics in the literature makes an informed choice of metrics challenging. As a result, redundant new me...
It sounds good when knowing the privacy enhancing technologies 6th international workshop pet 2006 cambridge uk june 28 3
The rights of an Internet user acting anonymously conflicts with the rights of a Server victim identifying the malicious user. The ERPINA protocol, introduced in this paper, allows an honest user communicating anonymously with a Server through a PET, while the identity of a dishonest user is revealed. Prior research failed to distinguish objectively between an honest user and an attacker; and a...
sarvey values personality characteristtics of good and bad curtain gairls
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید