We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 10,000 results
  1. A modal approach to conscious social agents

    An agent’s awareness has previously been modelled as a modal operator in such a way that awareness can be iterated, and consciousness formalised as...

    Article 14 November 2023
  2. Exploring Rationality of Self Awareness in Social Networking for Logical Modeling of Unintentional Insiders

    Unawareness of privacy risks together with approval seeking motivations make humans enter too much detail into the likes of Facebook, Twitter, and...
    Florian Kammüller, Chelsea Mira Alvarado in HCI for Cybersecurity, Privacy and Trust
    Conference paper 2022
  3. eGovernance for Citizen Awareness and Corruption Mitigation

    ‘Corruption’ can be defined as the exploitation of delegated authority for illegitimate profits. We consider the kind of corruption happening on...
    A. B. Sagar, M. Nagamani, ... Preethi Kothari in Intelligent Human Computer Interaction
    Conference paper 2021
  4. Perception, Awareness, Presentation: Using Meditation Techniques to Teach Data Visualisation Literacy – A Case Study

    Inspired by the ideas of Gestalt and the practice of meditation, this paper describes an approach to bring together the corresponding techniques to...
    Conference paper 2022
  5. Awareness on Energy Efficient Products as Prediction on Intention to Subscribe to and Purchase Energy Efficient Services and Products

    Issues related to high energy consumption is contemporary and concerning socio-politic situation in this country. Thus, the study aims at gauging...
    Husni Mohd Radzi, Farhaniza Ghazali, ... Hazleen Aris in Advances in Visual Informatics
    Conference paper 2021
  6. A Wolf, Hyena, and Fox Game to Raise Cybersecurity Awareness Among Pre-school Children

    Currently, children have a greater exposure to cyberspace and cyber threats than any previous generation. Digital technologies are evolving...
    Dirk P. Snyman, Gunther R. Drevin, ... Johann Allers in Human Aspects of Information Security and Assurance
    Conference paper 2021
  7. A survey on context awareness in big data analytics for business applications

    The concept of context awareness has been in existence since the 1990s. Though initially applied exclusively in computer science, over time it has...

    Loan Thi Ngoc Dinh, Gour Karmakar, Joarder Kamruzzaman in Knowledge and Information Systems
    Article 21 April 2020
  8. Impact of the Cyber Hygiene Intelligence and Performance (CHIP) Interface on Cyber Situation Awareness and Cyber Hygiene

    A common theme across cybersecurity solutions is a lack of transparency for end-users. Our prototype, Cyber Hygiene Intelligence & Performance...
    Conference paper 2021
  9. Virtual Machines

    In the previous chapters, we gained a basic understanding of the essentials of the AWS cloud and awareness of the various tools and IDE extensions...
    William Penberthy, Steve Roberts in Pro .NET on Amazon Web Services
    Chapter 2023
  10. Creation and Future Development Process of a Serious Game: Raising Awareness of (Visual) Impairments

    Despite the UN Convention on the Rights of Persons with Disabilities and binding laws, digital accessibility is not yet a norm at universities....
    Linda Rustemeier, Sarah Voß-Nakkour, ... Imran Hossain in Serious Games
    Conference paper 2021
  11. System Environment and Context-Awareness

    Referring to the previous chapter, whenever a group of entities (actor-roles) collectively realize a goal, we consider them to belong to a system....
    Chapter 2020
  12. Emerging Paradigm of Smart Healthcare in the Management of COVID-19 Pandemic and Future Health Crisis

    Remote patient oriented healthcare is an effort to ensure “Health for all”. Smart health options such as e-Health, m-Health, Telemedicine is a...
    Soumik Gangopadhyay, Amitava Ukil, Somnath Chatterjee in Intelligent Healthcare
    Chapter 2022
  13. Towards Priority-Flexible Task Map** for Heterogeneous Multi-core NUMA Systems

    With the rapid development of heterogeneous multi-core processors, a new High Performance Computing (HPC) system architecture combining the...
    Yifan **, Mulya Agung, ... Hiroyuki Takizawa in Parallel and Distributed Computing, Applications and Technologies
    Conference paper 2023
  14. What is Your Information Worth? A Systematic Analysis of the Endowment Effect of Different Data Types

    Various smartphone and web applications use personal information to estimate the user’s behaviour among others for targeted advertising and...
    Vera Schmitt, Daniel Sivizaca Conde, ... Sebastian Möller in Secure IT Systems
    Conference paper 2024
  15. Virtual Reality Compensatory Aid for Improved Weapon Splash-Zone Awareness

    Military personnel often have very little time to make battlefield decisions. These decisions can include the identification of weapon splash-zones...
    Richi Rodriguez, Domenick Mifsud, ... Francisco R. Ortega in Virtual, Augmented and Mixed Reality
    Conference paper 2021
  16. Combing TRIZ and LCA for a Better Awareness of the Sustainability of a Technical Solution

    A reflection about the evaluation of the environmental impacts arising from a technical solution obtained by applying some of the most common TRIZ...
    Conference paper 2022
  17. Awareness Logic: A Kripke-Based Rendition of the Heifetz-Meier-Schipper Model

    Heifetz, Meier & Schipper (HMS) present a lattice model of awareness. The HMS model is syntax-free, which precludes the simple option to rely on...
    Gaia Belardinelli, Rasmus K. Rendsvig in Dynamic Logic. New Trends and Applications
    Conference paper 2020
  18. Literacy Toy for Enhancement Phonological Awareness: A Longitudinal Study

    In this report it is presented the results of a longitudinal pre-experimental study, it was realized a technological intervention to stimulate the...
    Carlos Ramos-Galarza, Hugo Arias-Flores, ... Janio Jadán-Guerrero in Computers Hel** People with Special Needs
    Conference paper Open access 2020
  19. A multi-layered security model to counter social engineering attacks: a learning-based approach

    Social engineering is a malicious technique that leverages deception and manipulation to exploit the cognitive biases and heuristics of human...

    Luke Edwards, Muhammad Zahid Iqbal, Mahmudul Hassan in International Cybersecurity Law Review
    Article 18 April 2024
  20. Towards more sustainable higher education institutions: Implementing the sustainable development goals and embedding sustainability into the information and computer technology curricula

    Lately, there has been a rising trend towards integrating sustainability issues and implementing sustainable development (SD) goals into higher...

    Maria Eftychia Angelaki, Fragkiskos Bersimis, ... Christos Douligeris in Education and Information Technologies
    Article Open access 13 July 2023
Did you find what you were looking for? Share feedback.