Results 31 to 40 of about 27,090,693 (338)

Peers matter: The moderating role of social influence on information security policy compliance

open access: yesInformation Systems Journal, 2020
Information security in an organization largely depends on employee compliance with information security policy (ISP). Previous studies have mainly explored the effects of command-and-control and self-regulatory approaches on employee ISP compliance ...
Adel Yazdanmehr   +2 more
semanticscholar   +1 more source

Network Congestion Diffusion Model Considering Congestion Distribution Information

open access: yesIEEE Access, 2019
Network congestion diffusion has become the most stubborn disease and scourge of networks. With the help of widely used congestion distribution information, making full use of network capacity dynamically is a feasible and hopeful way to alleviate ...
Guoyi Wen, Ning Huang, Chunlin Wang
doaj   +1 more source

Information-based physics, influence, and forces [PDF]

open access: yesAIP Conference Proceedings, 2015
10 pages, 2 figures, MaxEnt 2014 Conference, Bayesian Inference and Maximum Entropy Methods in Science and Engineering, Amboise, FRANCE, 2014, edited by A. Mohammad-Djafari and F.
Knuth, Kevin H, Walsh, James
openaire   +2 more sources

Active Measures Concept Deconstruction Through the Lenses of Information Influence

open access: yesVojenské rozhledy
This study deconstructs the concept of active measures through the prism of information influence. It understands it as sophisticated methods of influencing public opinion and political decisions, originally used by the Soviet Union and now adapted to ...
Miroslava Pačková
doaj   +1 more source

Influence of information flow in the formation of economic cycles

open access: yes, 2005
A microscopic approach to macroeconomic features is intended. A model for macroeconomic behavior based on the Ausloos-Clippe-Pekalski model is built and investigated. The influence of a discrete time information transfer is investigated. The formation of
D. Huber   +10 more
core   +1 more source

User interests-based microblog tracing algorithm

open access: yes网络与信息安全学报, 2020
Microblog information tracing refers to finding the source set of microblog topics according to the analysis of crawled microblog texts and it’s of great significance in the aspect of public opinion control and information security.
YANG Xiao, CHEN Xiuzhen, MA Jin, LIANG Haozhe, LI Shenghong
doaj   +3 more sources

Learning user-specific latent influence and susceptibility from information cascades

open access: yes, 2015
Predicting cascade dynamics has important implications for understanding information propagation and launching viral marketing. Previous works mainly adopt a pair-wise manner, modeling the propagation probability between pairs of users using n^2 ...
Cheng, Xue-Qi   +3 more
core   +1 more source

The influence of social networks on the construction of historical memory

open access: yesCхід
The article is devoted to the study of the modern social networks’ impact on the content and form of historical memory as a social and personal phenomenon.
Kyrylo Dzihorа
doaj   +1 more source

Perceived eating norms and vegetable consumption in children [PDF]

open access: yes, 2015
open access articleBackground Beliefs about the eating behaviour of others (perceived eating norms) have been shown to influence eating behaviour in adults, but no research has examined whether young children are motivated by perceived eating norms ...
Robinson, Eric, Sharps, Maxine
core   +2 more sources

Информационно-пропагандистская поддержка процессов советизации в западных областях УССР в 1939-1941 годах [PDF]

open access: yesCodrul Cosminului, 2015
This article attempts to show the dimension of information and propaganda arsenal which supported the Sovietisation processes of the Western Regions, incorporated into the Ukrainian SSR after their annexation by the USSR. On the basis of archival sources
Юлия Левина
doaj  

Home - About - Disclaimer - Privacy