派博傳思國(guó)際中心

標(biāo)題: Titlebook: Risiken informatisierter Produktion; Theoretische und emp Hans-Jürgen Wei?bach,Andrea Poy Textbook 1993 Springer Fachmedien Wiesbaden 1993 [打印本頁(yè)]

作者: INEPT    時(shí)間: 2025-3-21 16:32
書目名稱Risiken informatisierter Produktion影響因子(影響力)




書目名稱Risiken informatisierter Produktion影響因子(影響力)學(xué)科排名




書目名稱Risiken informatisierter Produktion網(wǎng)絡(luò)公開度




書目名稱Risiken informatisierter Produktion網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Risiken informatisierter Produktion被引頻次




書目名稱Risiken informatisierter Produktion被引頻次學(xué)科排名




書目名稱Risiken informatisierter Produktion年度引用




書目名稱Risiken informatisierter Produktion年度引用學(xué)科排名




書目名稱Risiken informatisierter Produktion讀者反饋




書目名稱Risiken informatisierter Produktion讀者反饋學(xué)科排名





作者: 雜役    時(shí)間: 2025-3-21 23:49
Andrea Poy,Hans-Jürgen Wei?bachl mental health assessments are time and resource intensive. With increases in demand for mental health services and decreases in funding and staffing levels, this paper explores whether conversational agents can be sufficiently ‘trusted’ to collect the sensitive data disclosed in initial mental hea
作者: 抵押貸款    時(shí)間: 2025-3-22 04:15

作者: LARK    時(shí)間: 2025-3-22 05:29
h data involves sensitive information, it is necessary to require a secure way to manage and use data with the consent of each individual. To integrate and share health data securely, many frameworks using federated learning and blockchain-based system have been proposed. However, the issues of ensu
作者: Frequency    時(shí)間: 2025-3-22 11:04

作者: Diuretic    時(shí)間: 2025-3-22 16:41

作者: aggravate    時(shí)間: 2025-3-22 19:07
Hans-Jürgen Wei?bach five to eight) and their parents perceive and deal with the Internet and the privacy and security risks of being online. Therefore, we extended prior studies of Internet mental models of children. We used a two-fold study design by including drawing tasks in addition to a verbal interview. The draw
作者: MOAN    時(shí)間: 2025-3-23 01:05
Barbara Wei?bach five to eight) and their parents perceive and deal with the Internet and the privacy and security risks of being online. Therefore, we extended prior studies of Internet mental models of children. We used a two-fold study design by including drawing tasks in addition to a verbal interview. The draw
作者: 嘮叨    時(shí)間: 2025-3-23 04:57
Veronika Tacke,Uwe BorchersDespite the introduction of data privacy regulations almost everywhere around the globe, the biggest barrier to effectiveness is the customer’s capacity to map the privacy statement received with the regulation in force and understand their terms. This study advocates the creation of a convenient an
作者: 喪失    時(shí)間: 2025-3-23 07:57
Andrea Poycal password schemes such as the Android Pattern Unlock (APU) are often the primary means for authentication, or they constitute an auxiliary (or backup) method to be used in case biometrics fail. Passcodes need to be memorable to be usable, hence users tend to choose easy to guess passwords, compro
作者: llibretto    時(shí)間: 2025-3-23 13:13

作者: 不發(fā)音    時(shí)間: 2025-3-23 14:27

作者: Expressly    時(shí)間: 2025-3-23 18:03
Udo Konradtesearch regarding parents’ safety and privacy concerns about their children’s use of smart devices in the home. Given the rise in use of smart devices within the home in general, and among children in particular, we wanted to explore the privacy and safety concerns that parents have about their chil
作者: 沉積物    時(shí)間: 2025-3-24 01:43
Theo Wehneresearch regarding parents’ safety and privacy concerns about their children’s use of smart devices in the home. Given the rise in use of smart devices within the home in general, and among children in particular, we wanted to explore the privacy and safety concerns that parents have about their chil
作者: FEAT    時(shí)間: 2025-3-24 04:19
Gerd M?ll,Barbara Wei?bachsting system access control mechanism is still an important problem to be resolved. Therefore, this paper proposes an identity recognition method based on hierarchical behavior characteristics of network users. Behavior of network user was divided into interactive behavior characteristic and mouse b
作者: 冒失    時(shí)間: 2025-3-24 06:51
Gerd M?llmploy to solve the problem, and the problem solving success. In the education of IT-related subjects, such as computer science or IT security, problems are often complex and overwhelming for first-year studies. We suggest that providing problems to student in depictive instead of descriptive represe
作者: anthesis    時(shí)間: 2025-3-24 10:44

作者: 我不重要    時(shí)間: 2025-3-24 15:27
Armin Schier,Herbert Wichmannmploy to solve the problem, and the problem solving success. In the education of IT-related subjects, such as computer science or IT security, problems are often complex and overwhelming for first-year studies. We suggest that providing problems to student in depictive instead of descriptive represe
作者: 講個(gè)故事逗他    時(shí)間: 2025-3-24 22:36

作者: Middle-Ear    時(shí)間: 2025-3-25 00:45

作者: 平庸的人或物    時(shí)間: 2025-3-25 06:33
Vorschl?ge für einen akteursorientierten Perspektivenwechsel der Sicherheitsforschung in vernetzten -Systemen zu berücksichtigen, so sind die theoretischen Konzepte und Kategorien, die Methodologie und die Methoden der Sicherheitswissenschaft immer noch durch eine weitgehende Ausblendung des . zwischen Menschen, Organisationen und Technik gepr?gt. Und selbst dort, wo in der Kooperation zwischen In
作者: grounded    時(shí)間: 2025-3-25 07:50

作者: CROAK    時(shí)間: 2025-3-25 12:32
Neue Risikokonstellationen und Bew?ltigungsstrategien in der informatisierten Fertigung , eine wichtige Akteursgruppe für die Pr?vention von Sicherheits- und Verfügbarkeitsrisiken zu. Darüber hinaus sind Wartung und St?rungsbeseitigung bedeutsame Quellen von Innovationsideen, da sie die Schwachstellen und Defizite bestehender technischer L?sungen offenlegen.
作者: 疾馳    時(shí)間: 2025-3-25 16:10

作者: arcane    時(shí)間: 2025-3-25 20:38

作者: RAGE    時(shí)間: 2025-3-26 01:26
parable to completing forms online which are sent from a mental health service provider, or requested through social media. Participants (n?=?236; female?=?58%, non-binary?=?5%, Prefer not to say?=?1%, age 18–80+yrs) were recruited from a UK mental health service provider and through social media..O
作者: FLEET    時(shí)間: 2025-3-26 05:38
Andrea Poy,Hans-Jürgen Wei?bachparable to completing forms online which are sent from a mental health service provider, or requested through social media. Participants (n?=?236; female?=?58%, non-binary?=?5%, Prefer not to say?=?1%, age 18–80+yrs) were recruited from a UK mental health service provider and through social media..O
作者: 颶風(fēng)    時(shí)間: 2025-3-26 11:20

作者: ADAGE    時(shí)間: 2025-3-26 14:20
on scenarios for sharing and utilization of personal health data and visualization feedback to users. Various types of health data are collected and integrated into the system with decentralized data analysis while sharing results and models and reducing data transmission for privacy-preserving. The
作者: Serenity    時(shí)間: 2025-3-26 20:17

作者: OVERT    時(shí)間: 2025-3-26 23:31

作者: 詢問    時(shí)間: 2025-3-27 01:32
Hans-Jürgen Wei?bachal background..We found that children’s mental models start to take shape beyond physically tangible components between the age of seven to eight years. Hence, we argue that it is important to educate children about the Internet as well as security and privacy issues before that age. For younger chi
作者: 預(yù)示    時(shí)間: 2025-3-27 05:42

作者: Measured    時(shí)間: 2025-3-27 10:39
Veronika Tacke,Uwe Borchersr objective, we need large enough and specialised dataset and we plan to apply state-of-the-art Natural Language Processing (NLP) techniques in the field of open domain question answering. This paper describes the initial steps and some early results we achieved in this direction and the next steps
作者: conception    時(shí)間: 2025-3-27 14:04
Andrea Poyility remains frequently a hard task. In this paper we propose a novel graphical password scheme built on the foundations of the well-accepted APU method, which is usable, inclusive, universal, and robust against shoulder surfing and smudge attacks. Our scheme, named ., features a dynamic user inter
作者: 使成整體    時(shí)間: 2025-3-27 19:34
red that parents feel it is their responsibility to keep their children from harm when they use smart devices, and that parents do not trust applications, devices, smart device manufacturers or Internet providers to do so. Our findings can help researchers better understand the different device usag
作者: curriculum    時(shí)間: 2025-3-28 00:09

作者: 我就不公正    時(shí)間: 2025-3-28 06:03
Udo Konradtred that parents feel it is their responsibility to keep their children from harm when they use smart devices, and that parents do not trust applications, devices, smart device manufacturers or Internet providers to do so. Our findings can help researchers better understand the different device usag
作者: glamor    時(shí)間: 2025-3-28 06:29
Theo Wehnerred that parents feel it is their responsibility to keep their children from harm when they use smart devices, and that parents do not trust applications, devices, smart device manufacturers or Internet providers to do so. Our findings can help researchers better understand the different device usag
作者: Intruder    時(shí)間: 2025-3-28 14:01

作者: DAMP    時(shí)間: 2025-3-28 17:42

作者: Abduct    時(shí)間: 2025-3-28 21:26

作者: 破譯    時(shí)間: 2025-3-29 00:00

作者: genuine    時(shí)間: 2025-3-29 06:59

作者: Radiation    時(shí)間: 2025-3-29 10:55

作者: FATAL    時(shí)間: 2025-3-29 11:58

作者: Cervical-Spine    時(shí)間: 2025-3-29 19:12
Theoretische und methodische Fragen der Risikoanalyse in komplexen informatisierten Systemen ,Die in diesem ersten Kapitel zusammengestellten Beitr?ge sind zwar aus jeweils unterschiedlichen projektspezifischen Motivationen heraus entstanden, weisen aber über einen unmittelbaren Projektbezug hinaus auf allgemeine Methodenprobleme und Grundsatzdiskussjonen in der Risikoforschung.
作者: Relinquish    時(shí)間: 2025-3-29 22:59

作者: fidelity    時(shí)間: 2025-3-30 02:58

作者: 中和    時(shí)間: 2025-3-30 06:36
https://doi.org/10.1007/978-3-322-94237-1Arbeitsorganisation; Arbeitsprozess; Arbeitswissenschaft; Organisation; Organisationspsychologie; Psychol
作者: Diastole    時(shí)間: 2025-3-30 10:23
Einige Aspekte technischer Zuverl?ssigkeit und menschlichen Gef?hrdungserlebens in der Gro?chemie?llen von Gro?anlagen gesamtwirtschaftliche Dimensionen und zum anderen erfordert die massenhafte Nutzung hochwirksamer Technologien, auch deren ungewollte Wirkungen genauer abzusch?tzen (vgl. Brack 1979, 11).
作者: genesis    時(shí)間: 2025-3-30 14:08

作者: MAG    時(shí)間: 2025-3-30 16:36
Risiken informatisierter Produktion978-3-322-94237-1Series ISSN 0175-615X
作者: 強(qiáng)所    時(shí)間: 2025-3-30 22:18
0175-615X Overview: 978-3-531-12456-8978-3-322-94237-1Series ISSN 0175-615X
作者: ingenue    時(shí)間: 2025-3-31 01:49
Editorialrschungsans?tze, die . aus dem Kontext der traditionellen Arbeitsschutzforschung stammen, auf ihre Anwendbarkeit im Rahmen von Analysen der Risiken informatisierter und vernetzter .systeme überprüft werden.
作者: 大都市    時(shí)間: 2025-3-31 07:59

作者: 冒失    時(shí)間: 2025-3-31 11:22

作者: patriarch    時(shí)間: 2025-3-31 16:08





歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
仪陇县| 彰化县| 大悟县| 新田县| 平阳县| 巴青县| 克东县| 内黄县| 宣恩县| 和政县| 沿河| 循化| 湄潭县| 科技| 三门县| 兰溪市| 峡江县| 大宁县| 彰武县| 辉南县| 宽甸| 沐川县| 沁水县| 小金县| 福州市| 泸水县| 洱源县| 石城县| 辽中县| 台山市| 华亭县| 邛崃市| 胶州市| 廊坊市| 诸城市| 深水埗区| 靖边县| 闵行区| 德阳市| 伊宁市| 临西县|