Search results for "Cryptography"

showing 10 items of 657 documents

"Table 8" of "Freeze-out radii extracted from three-pion cumulants in pp, p-Pb and Pb-Pb collisions at the LHC"

2014

Gaussian radii and intercept parameters in pp collisions versus Nch at low KT3.

InclusiveProton-Proton ScatteringR7000.0Astrophysics::Earth and Planetary AstrophysicsP P --> PI+ XNuclear ExperimentP P --> PI- XlambdaComputer Science::Cryptography and Security
researchProduct

Digital Inequalities: A Review of Contributing Factors and Measures for Crossing the Divide

2019

Part 8: Digital Divide and Social Inclusion; International audience; This literature review focuses on the digital divide in contemporary technologically and economically advanced societies. Prior research shows that the digital divide entails more than physical accessibility and points to issues of technology acceptance and actual use. Recurring digital divide factors outside socioeconomic characteristics were identified in the articles reviewed. These factors relate to personality traits, motivation and digital skills. The factors can be used as the basis for a personality model for understanding acceptance and use of technology complementing models related to economic and social resource…

Inequalitymedia_common.quotation_subject02 engineering and technology[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringPersonalityICT acceptance[INFO]Computer Science [cs]SociologyBig Five personality traitsDigital divideSocioeconomic statusmedia_commonMotivationbusiness.industrySkills05 social sciencesFoundation (evidence)DigitalizationPublic relationsIntervention (law)ICT accessDigital divideKey (cryptography)business050203 business & managementPersonality
researchProduct

Formal Project Organization and Informal Social Networks: Regional Advantages in the Emergent Animation Industry in Oslo, Norway

2011

This article focuses on the social networks that facilitate projects based activities in one particular part of cultural industries. Cultural industries are dependent on flexible ways of organizing their work because they operate in unpredictable markets. However, the organization of work in temporary projects challenges some key assumptions when it comes to the need for long-term, stable relationships for innovative and effective organizations. A key question is thus how firms that do not have a formal organization that creates stable relationships manage to create continuity in what they do. The study is based on semi-structured interviews with core firms that operate within the animation…

Informal organizationCore (game theory)Knowledge managementWork (electrical)business.industryFormal organizationGeography Planning and DevelopmentKey (cryptography)SociologyAnimationMarketingbusinessProject organizationEuropean Planning Studies
researchProduct

Social support for collaboration and group awareness in life science research teams

2019

Background Next-generation sequencing (NGS) technologies have revolutionarily reshaped the landscape of ’-omics’ research areas. They produce a plethora of information requiring specific knowledge in sample preparation, analysis and characterization. Additionally, expertise and competencies are required when using bioinformatics tools and methods for efficient analysis, interpretation, and visualization of data. These skills are rarely covered in a single laboratory. More often the samples are isolated and purified in a first laboratory, sequencing is performed by a private company or a specialized lab, while the produced data are analyzed by a third group of researchers. In this scenario, …

Information Systems and ManagementComputer scienceHealth InformaticsSocial interactionslcsh:Computer applications to medicine. Medical informatics03 medical and health sciencesSocial supportWorking group awarenessLife science teams collaborationCommon knowledge030304 developmental biology0303 health sciencesSocial networkbusiness.industryInformation sharingSocial interactions; Working group awareness; Life science teams collaboration030302 biochemistry & molecular biologyData scienceComputer Science ApplicationsVisualizationWork (electrical)Key (cryptography)lcsh:R858-859.7businessSoftwareWorkflow management systemInformation SystemsSource Code for Biology and Medicine
researchProduct

Risky choices in strategic environments: An experimental investigation of a real options game

2019

Managers frequently make decisions under conditions of fundamental uncertainty due the stochastic nature of the outcomes and competitive rivalry. In this study, we experimentally test a theoretical model under fundamental uncertainty and competitive rivalry by designing a sequential interaction game between two players. The first mover can decide either to choose a sure outcome that assigns a risky outcome to the second mover or to pass the decision to the second mover. If the second player gets the chance to decide, she can choose between a sure outcome, conditioned by the assignment of a risky payoff to the first mover, or the sharing of the risky outcome with the first mover. We then int…

Information Systems and ManagementGeneral Computer ScienceComputer sciencemedia_common.quotation_subjectReal options game0211 other engineering and technologies02 engineering and technologyManagement Science and Operations ResearchOutcome (game theory)Industrial and Manufacturing EngineeringMicroeconomics0502 economics and businessBehavioural ORFunction (engineering)Continuous distributionRivalrymedia_commonStandard model (cryptography)050210 logistics & transportation021103 operations research05 social sciencesStochastic gameUncertaintySettore ING-IND/35 - Ingegneria Economico-GestionaleLaboratory experimentTest (assessment)Modeling and SimulationFirst-mover advantage
researchProduct

Exploring the relationships between tangible and intangible resources in a learning alliance dynamics: comment on the paper by Kapmeier

2008

Kapmeier (2008) focuses his research on common learning and firms’ opportunistic behaviour in learning alliances. A strategic alliance, as clearly stated by Gulati (1998, p. 293) is a voluntary arrangement between firms to exchange and share knowledge as well as resources with the intent of developing processes, products or services. This is a relevant topic not only for those firms that operate in industries characterized typically by high RD Larsson et al., 1998). Furthermore, this literature essentially takes a static view and it often neglects the postformation dynamics of alliances (Koza and Lewin, 2000; Das and Teng, 2001). Some key questions not yet profoundly investigated are: how c…

Information Systems and ManagementKnowledge managementAlliancebusiness.industryDynamics (music)Strategy and ManagementKey (cryptography)General Social SciencesIntangible Resources Learning Alliance Dynamics System DynamicsbusinessPsychologyStrategic allianceSystems Research and Behavioral Science
researchProduct

Key Information Systems Management Issues in Estonia for the 2000s and A Comparative Analysis

2006

AbstractThis study reports key information system (IS) management issues in Estonia, for a second time since 1993. The study enlists the views of knowledgeable practitioners from both the information technology (IT) and non-IT (business managers) fields. The primary objective was to compare and contrast the findings in the previous study with the present effort. Other secondary objectives included investigating the views across professional classifications and sectors. Further, a comparison between Estonia (an emerging economy) and Norway (a developed country) was made. The findings of the study indicate the following: 1) the past decade has produced salient changes in the ranking of key IS…

Information Systems and ManagementKnowledge managementbusiness.industryInformation technologyPublic relationsPrivate sectorEstonianlanguage.human_languageManagement information systemsRankingPolitical scienceKey (cryptography)Information systemlanguagebusinessEmerging marketsInformation SystemsJournal of Global Information Technology Management
researchProduct

Strategic leadership in cyber security, case Finland

2020

Cyber security has become one of the biggest priorities for businesses and governments. Streamlining and strengthening strategic leadership are key aspects in making sure the cyber security vision is achieved. The strategic leadership of cyber security implies identifying and setting goals based on the protection of the digital operating environment. Furthermore, it implies coordinating actions and preparedness as well as managing extensive disruptions. The aim of this article is to define what is strategic leadership of cyber security and how it is implemented as part of the comprehensive security model in Finland. In terms of effective strategic leadership of cyber security, it is vital t…

Information Systems and ManagementNational securitybusiness.industrystrateginen johtaminenComputer securitycomputer.software_genreCyber securityComputer Science ApplicationsStrategic leadershipKey (cryptography)strategic leadershiptietoturvakansallinen turvallisuusnational securitykyberturvallisuusbusinesscomputerComputingMilieux_MISCELLANEOUSSoftware
researchProduct

Distributed Coverage of Ego Networks in F2F Online Social Networks

2016

Although most online social networks rely on a centralized infrastructure, several proposals of Distributed Online Social Networks (DOSNs) have been recently presented. Since in DOSNs user profiles are stored on the peers of the users belonging to the network, one of the main challenges comes from guaranteeing the profile availability when the owner of the data is not online. In this paper, we propose a DOSN based on a friend-to-friend P2P overlay where the user's data is stored only on friend peers. Our approach is based on the ego-network concept, which models the social network from the local point of view of a single user. We propose a distributed algorithm which is based on the notion …

Information privacyComputer scienceCryptography02 engineering and technologyWorld Wide WebSet (abstract data type)Artificial IntelligenceDistributed online social networksDominating setServer0202 electrical engineering electronic engineering information engineering1707P2PSettore INF/01 - InformaticaSocial networkDistributed databasebusiness.industryFriend-to-friend networkComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsData AvailabilityDistributed Online Social NetworkDistributed Online Social Networks; P2P; Data Availability; friend-to-friend networksComputer Networks and CommunicationPrivacyDistributed algorithm020201 artificial intelligence & image processingfriend-to-friend networksbusinessComputer network2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld)
researchProduct

Internet of things and privacy preserving technologies

2009

In this paper we consider different approaches to technological protection of users' privacy in the world of internet of things. Particularly, we consider what kind of problems and which level of protection can be achieved by applying approaches using secure multi-party computations.

Information privacyUbiquitous computingPrivacy by Designbusiness.industryComputer sciencePrivacy softwareInternet privacyData securityCryptographyComputer securitycomputer.software_genreWeb of ThingsThe Internetbusinesscomputer2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology
researchProduct