نتایج جستجو برای: social sensitivity
تعداد نتایج: 936771 فیلتر نتایج به سال:
A drawback of traditional default logic is that there is no general mechanism for preferring one default rule over another. To remedy this problem, numerous default logics augmented with priority relations have been introduced. In this paper, we show how trust values, derived from web-based social networks, can be used to prioritize defaults. We provide a coupling between the method for computi...
This paper presents a theory of social policy preferences that emphasizes the role of skills. The key to our argument is that individuals who have made risky investments in skills will demand insurance against the possible future loss of income from those investments. Most income is derived from past investments in skills, and because the transferability of skills is inversely related to their ...
Integrated care is a key strategy in reforming health systems around the world. Despite its importance, the concept’s polymorphous nature and lack of specificity and clarity significantly hamper systematic understanding, successful application and meaningful evaluation. This article explores the many definitions, concepts, logics and methods found in health system and service integration. In ad...
Privacy is a well-documented issue for research with end-users routinely disclosing large amounts of sensitive information about themselves. The privacy paradox, for example, suggests that users are concerned about their online privacy yet behave in opposition to such stated concern. One potential reason for this paradoxical behaviour is that privacy suffers from a secondary goal problem; that ...
Disclosure control of natural language information (DCNL), which we are trying to realize, is described. DCNL will be used for securing human communications over the internet, such as through blogs and social network services. Before sentences in the communications are disclosed, they are checked by DCNL and any phrases that could reveal sensitive information are transformed or omitted so that ...
Paste the appropriate copyright statement here. ACM now supports three different copyright statements: • ACM copyright: ACM holds the copyright on the work. This is the historical approach. • License: The author(s) retain copyright, but ACM receives an exclusive publication license. • Open Access: The author(s) wish to pay for the work to be open access. The additional fee must be paid to ACM. ...
A drawback of traditional default logic is that there is no general mechanism for preferring one default rule over another. To remedy this problem, numerous default logics augmented with priority relations have been introduced. In this paper, we show how trust values, derived from web-based social networks, can be used to prioritize defaults. We provide a coupling between the method for computi...
Indirect access to protected information has been one of the key challenges facing the international community for the last decade. Providing techniques to control direct access to sensitive information remain insufficient against inference channels established when legitimate data reveal classified facts hidden from unauthorized users. Several techniques have been proposed in the literature to...
There are two facts related to the reallocation of physical assets across plants. In the macro level, capital reallocation, measured as the aggregate sales of used capital, is procyclical. In the micro level, selling used capital is costly. In this paper, I investigate the quantitative contribution of adverse selection in the used capital market towards generating the procyclical capital reallo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید