Results 241 to 250 of about 162,835 (326)
Embedded Interactions and Selective Disclosure: Network Effects on Conversations aboard Skylab
How do absent others influence our interactions? We argue in this paper that interactions are embedded within networks formed by chains of specific relationships between known third parties. The anticipation of future interactions with external others conditions our interpretation of the current situation and affects our behavior in the interaction. We
Michael Schultz +2 more
wiley +1 more source
A secure data sharing scheme based on broadcast signcryption in data center. [PDF]
Dong R, Li Y, Zhu L.
europepmc +1 more source
Code based Secret Sharing Schemes for MANET
Padmavathi Guddeti +2 more
openalex +1 more source
This article introduces the concept of excluded participation to examine how inclusion and exclusion are negotiated in real time within a Danish fifth‐grade classroom. Using a micro‐sociological framework, particularly the work of Erving Goffman, the study focuses on the case of Anders, a student whose participation is symbolically recognized yet ...
Jørn Bjerre
wiley +1 more source
Edge-Enabled Hybrid Encryption Framework for Secure Health Information Exchange in IoT-Based Smart Healthcare Systems. [PDF]
Ghani NA +4 more
europepmc +1 more source
Accomplishing Ethics‐Work as a Generic Social Process
Existing systems of university research ethics are often criticized by those in the qualitative research tradition. A common thread is that ethics cannot be fully anticipated before the research begins, as is expected by most institutional review boards.
Deana Simonetto, Antony Puddephatt
wiley +1 more source
Efficient and Privacy-Preserving Power Distribution Analytics Based on IoT. [PDF]
Xu R, Xu J, Ren X, Deng H.
europepmc +1 more source

