作者: 雜役 時(shí)間: 2025-3-21 23:49
Andrea Poy,Hans-Jürgen Wei?bachl mental health assessments are time and resource intensive. With increases in demand for mental health services and decreases in funding and staffing levels, this paper explores whether conversational agents can be sufficiently ‘trusted’ to collect the sensitive data disclosed in initial mental hea作者: 抵押貸款 時(shí)間: 2025-3-22 04:15 作者: LARK 時(shí)間: 2025-3-22 05:29
h data involves sensitive information, it is necessary to require a secure way to manage and use data with the consent of each individual. To integrate and share health data securely, many frameworks using federated learning and blockchain-based system have been proposed. However, the issues of ensu作者: Frequency 時(shí)間: 2025-3-22 11:04 作者: Diuretic 時(shí)間: 2025-3-22 16:41 作者: aggravate 時(shí)間: 2025-3-22 19:07
Hans-Jürgen Wei?bach five to eight) and their parents perceive and deal with the Internet and the privacy and security risks of being online. Therefore, we extended prior studies of Internet mental models of children. We used a two-fold study design by including drawing tasks in addition to a verbal interview. The draw作者: MOAN 時(shí)間: 2025-3-23 01:05
Barbara Wei?bach five to eight) and their parents perceive and deal with the Internet and the privacy and security risks of being online. Therefore, we extended prior studies of Internet mental models of children. We used a two-fold study design by including drawing tasks in addition to a verbal interview. The draw作者: 嘮叨 時(shí)間: 2025-3-23 04:57
Veronika Tacke,Uwe BorchersDespite the introduction of data privacy regulations almost everywhere around the globe, the biggest barrier to effectiveness is the customer’s capacity to map the privacy statement received with the regulation in force and understand their terms. This study advocates the creation of a convenient an作者: 喪失 時(shí)間: 2025-3-23 07:57
Andrea Poycal password schemes such as the Android Pattern Unlock (APU) are often the primary means for authentication, or they constitute an auxiliary (or backup) method to be used in case biometrics fail. Passcodes need to be memorable to be usable, hence users tend to choose easy to guess passwords, compro作者: llibretto 時(shí)間: 2025-3-23 13:13 作者: 不發(fā)音 時(shí)間: 2025-3-23 14:27 作者: Expressly 時(shí)間: 2025-3-23 18:03
Udo Konradtesearch regarding parents’ safety and privacy concerns about their children’s use of smart devices in the home. Given the rise in use of smart devices within the home in general, and among children in particular, we wanted to explore the privacy and safety concerns that parents have about their chil作者: 沉積物 時(shí)間: 2025-3-24 01:43
Theo Wehneresearch regarding parents’ safety and privacy concerns about their children’s use of smart devices in the home. Given the rise in use of smart devices within the home in general, and among children in particular, we wanted to explore the privacy and safety concerns that parents have about their chil作者: FEAT 時(shí)間: 2025-3-24 04:19
Gerd M?ll,Barbara Wei?bachsting system access control mechanism is still an important problem to be resolved. Therefore, this paper proposes an identity recognition method based on hierarchical behavior characteristics of network users. Behavior of network user was divided into interactive behavior characteristic and mouse b作者: 冒失 時(shí)間: 2025-3-24 06:51
Gerd M?llmploy to solve the problem, and the problem solving success. In the education of IT-related subjects, such as computer science or IT security, problems are often complex and overwhelming for first-year studies. We suggest that providing problems to student in depictive instead of descriptive represe作者: anthesis 時(shí)間: 2025-3-24 10:44 作者: 我不重要 時(shí)間: 2025-3-24 15:27
Armin Schier,Herbert Wichmannmploy to solve the problem, and the problem solving success. In the education of IT-related subjects, such as computer science or IT security, problems are often complex and overwhelming for first-year studies. We suggest that providing problems to student in depictive instead of descriptive represe作者: 講個(gè)故事逗他 時(shí)間: 2025-3-24 22:36 作者: Middle-Ear 時(shí)間: 2025-3-25 00:45 作者: 平庸的人或物 時(shí)間: 2025-3-25 06:33
Vorschl?ge für einen akteursorientierten Perspektivenwechsel der Sicherheitsforschung in vernetzten -Systemen zu berücksichtigen, so sind die theoretischen Konzepte und Kategorien, die Methodologie und die Methoden der Sicherheitswissenschaft immer noch durch eine weitgehende Ausblendung des . zwischen Menschen, Organisationen und Technik gepr?gt. Und selbst dort, wo in der Kooperation zwischen In作者: grounded 時(shí)間: 2025-3-25 07:50 作者: CROAK 時(shí)間: 2025-3-25 12:32
Neue Risikokonstellationen und Bew?ltigungsstrategien in der informatisierten Fertigung , eine wichtige Akteursgruppe für die Pr?vention von Sicherheits- und Verfügbarkeitsrisiken zu. Darüber hinaus sind Wartung und St?rungsbeseitigung bedeutsame Quellen von Innovationsideen, da sie die Schwachstellen und Defizite bestehender technischer L?sungen offenlegen.作者: 疾馳 時(shí)間: 2025-3-25 16:10 作者: arcane 時(shí)間: 2025-3-25 20:38 作者: RAGE 時(shí)間: 2025-3-26 01:26
parable to completing forms online which are sent from a mental health service provider, or requested through social media. Participants (n?=?236; female?=?58%, non-binary?=?5%, Prefer not to say?=?1%, age 18–80+yrs) were recruited from a UK mental health service provider and through social media..O作者: FLEET 時(shí)間: 2025-3-26 05:38
Andrea Poy,Hans-Jürgen Wei?bachparable to completing forms online which are sent from a mental health service provider, or requested through social media. Participants (n?=?236; female?=?58%, non-binary?=?5%, Prefer not to say?=?1%, age 18–80+yrs) were recruited from a UK mental health service provider and through social media..O作者: 颶風(fēng) 時(shí)間: 2025-3-26 11:20 作者: ADAGE 時(shí)間: 2025-3-26 14:20
on scenarios for sharing and utilization of personal health data and visualization feedback to users. Various types of health data are collected and integrated into the system with decentralized data analysis while sharing results and models and reducing data transmission for privacy-preserving. The作者: Serenity 時(shí)間: 2025-3-26 20:17 作者: OVERT 時(shí)間: 2025-3-26 23:31 作者: 詢問 時(shí)間: 2025-3-27 01:32
Hans-Jürgen Wei?bachal background..We found that children’s mental models start to take shape beyond physically tangible components between the age of seven to eight years. Hence, we argue that it is important to educate children about the Internet as well as security and privacy issues before that age. For younger chi作者: 預(yù)示 時(shí)間: 2025-3-27 05:42 作者: Measured 時(shí)間: 2025-3-27 10:39
Veronika Tacke,Uwe Borchersr objective, we need large enough and specialised dataset and we plan to apply state-of-the-art Natural Language Processing (NLP) techniques in the field of open domain question answering. This paper describes the initial steps and some early results we achieved in this direction and the next steps 作者: conception 時(shí)間: 2025-3-27 14:04
Andrea Poyility remains frequently a hard task. In this paper we propose a novel graphical password scheme built on the foundations of the well-accepted APU method, which is usable, inclusive, universal, and robust against shoulder surfing and smudge attacks. Our scheme, named ., features a dynamic user inter作者: 使成整體 時(shí)間: 2025-3-27 19:34
red that parents feel it is their responsibility to keep their children from harm when they use smart devices, and that parents do not trust applications, devices, smart device manufacturers or Internet providers to do so. Our findings can help researchers better understand the different device usag作者: curriculum 時(shí)間: 2025-3-28 00:09 作者: 我就不公正 時(shí)間: 2025-3-28 06:03
Udo Konradtred that parents feel it is their responsibility to keep their children from harm when they use smart devices, and that parents do not trust applications, devices, smart device manufacturers or Internet providers to do so. Our findings can help researchers better understand the different device usag作者: glamor 時(shí)間: 2025-3-28 06:29
Theo Wehnerred that parents feel it is their responsibility to keep their children from harm when they use smart devices, and that parents do not trust applications, devices, smart device manufacturers or Internet providers to do so. Our findings can help researchers better understand the different device usag作者: Intruder 時(shí)間: 2025-3-28 14:01 作者: DAMP 時(shí)間: 2025-3-28 17:42 作者: Abduct 時(shí)間: 2025-3-28 21:26 作者: 破譯 時(shí)間: 2025-3-29 00:00 作者: genuine 時(shí)間: 2025-3-29 06:59 作者: Radiation 時(shí)間: 2025-3-29 10:55 作者: FATAL 時(shí)間: 2025-3-29 11:58 作者: Cervical-Spine 時(shí)間: 2025-3-29 19:12
Theoretische und methodische Fragen der Risikoanalyse in komplexen informatisierten Systemen ,Die in diesem ersten Kapitel zusammengestellten Beitr?ge sind zwar aus jeweils unterschiedlichen projektspezifischen Motivationen heraus entstanden, weisen aber über einen unmittelbaren Projektbezug hinaus auf allgemeine Methodenprobleme und Grundsatzdiskussjonen in der Risikoforschung.作者: Relinquish 時(shí)間: 2025-3-29 22:59 作者: fidelity 時(shí)間: 2025-3-30 02:58 作者: 中和 時(shí)間: 2025-3-30 06:36
https://doi.org/10.1007/978-3-322-94237-1Arbeitsorganisation; Arbeitsprozess; Arbeitswissenschaft; Organisation; Organisationspsychologie; Psychol作者: Diastole 時(shí)間: 2025-3-30 10:23
Einige Aspekte technischer Zuverl?ssigkeit und menschlichen Gef?hrdungserlebens in der Gro?chemie?llen von Gro?anlagen gesamtwirtschaftliche Dimensionen und zum anderen erfordert die massenhafte Nutzung hochwirksamer Technologien, auch deren ungewollte Wirkungen genauer abzusch?tzen (vgl. Brack 1979, 11).作者: genesis 時(shí)間: 2025-3-30 14:08 作者: MAG 時(shí)間: 2025-3-30 16:36
Risiken informatisierter Produktion978-3-322-94237-1Series ISSN 0175-615X 作者: 強(qiáng)所 時(shí)間: 2025-3-30 22:18
0175-615X Overview: 978-3-531-12456-8978-3-322-94237-1Series ISSN 0175-615X 作者: ingenue 時(shí)間: 2025-3-31 01:49
Editorialrschungsans?tze, die . aus dem Kontext der traditionellen Arbeitsschutzforschung stammen, auf ihre Anwendbarkeit im Rahmen von Analysen der Risiken informatisierter und vernetzter .systeme überprüft werden.作者: 大都市 時(shí)間: 2025-3-31 07:59 作者: 冒失 時(shí)間: 2025-3-31 11:22 作者: patriarch 時(shí)間: 2025-3-31 16:08