Peers matter: The moderating role of social influence on information security policy compliance
Information security in an organization largely depends on employee compliance with information security policy (ISP). Previous studies have mainly explored the effects of command-and-control and self-regulatory approaches on employee ISP compliance ...
Adel Yazdanmehr +2 more
semanticscholar +1 more source
Network Congestion Diffusion Model Considering Congestion Distribution Information
Network congestion diffusion has become the most stubborn disease and scourge of networks. With the help of widely used congestion distribution information, making full use of network capacity dynamically is a feasible and hopeful way to alleviate ...
Guoyi Wen, Ning Huang, Chunlin Wang
doaj +1 more source
Information-based physics, influence, and forces [PDF]
10 pages, 2 figures, MaxEnt 2014 Conference, Bayesian Inference and Maximum Entropy Methods in Science and Engineering, Amboise, FRANCE, 2014, edited by A. Mohammad-Djafari and F.
Knuth, Kevin H, Walsh, James
openaire +2 more sources
Active Measures Concept Deconstruction Through the Lenses of Information Influence
This study deconstructs the concept of active measures through the prism of information influence. It understands it as sophisticated methods of influencing public opinion and political decisions, originally used by the Soviet Union and now adapted to ...
Miroslava Pačková
doaj +1 more source
Influence of information flow in the formation of economic cycles
A microscopic approach to macroeconomic features is intended. A model for macroeconomic behavior based on the Ausloos-Clippe-Pekalski model is built and investigated. The influence of a discrete time information transfer is investigated. The formation of
D. Huber +10 more
core +1 more source
User interests-based microblog tracing algorithm
Microblog information tracing refers to finding the source set of microblog topics according to the analysis of crawled microblog texts and it’s of great significance in the aspect of public opinion control and information security.
YANG Xiao, CHEN Xiuzhen, MA Jin, LIANG Haozhe, LI Shenghong
doaj +3 more sources
Learning user-specific latent influence and susceptibility from information cascades
Predicting cascade dynamics has important implications for understanding information propagation and launching viral marketing. Previous works mainly adopt a pair-wise manner, modeling the propagation probability between pairs of users using n^2 ...
Cheng, Xue-Qi +3 more
core +1 more source
The influence of social networks on the construction of historical memory
The article is devoted to the study of the modern social networks’ impact on the content and form of historical memory as a social and personal phenomenon.
Kyrylo Dzihorа
doaj +1 more source
Perceived eating norms and vegetable consumption in children [PDF]
open access articleBackground Beliefs about the eating behaviour of others (perceived eating norms) have been shown to influence eating behaviour in adults, but no research has examined whether young children are motivated by perceived eating norms ...
Robinson, Eric, Sharps, Maxine
core +2 more sources
Информационно-пропагандистская поддержка процессов советизации в западных областях УССР в 1939-1941 годах [PDF]
This article attempts to show the dimension of information and propaganda arsenal which supported the Sovietisation processes of the Western Regions, incorporated into the Ukrainian SSR after their annexation by the USSR. On the basis of archival sources
Юлия Левина
doaj

