Results 101 to 110 of about 11,955,824 (269)

A Categorization of Transparency-Enhancing Technologies [PDF]

open access: yesarXiv, 2015
A variety of Transparency-Enhancing Technologies has been presented during the past years. However, investigation of frameworks for classification and assessment of Transparency-Enhancing Technologies has lacked behind. The lack of precise classification and categorization approaches poses an obstacle not only to systematic requirements analysis for ...
arxiv  

Technological Complexity Based on Japanese Patent Data [PDF]

open access: yesarXiv
As international competition intensifies in technologies, nations need to identify key technologies to foster innovation. However, the identification is difficult because a technology is independent, therefore has complex nature. Here, this study aims to assess patent technological fields by applying Technological Complexity Index from a corporate ...
arxiv  

A Contextual Approach to Technological Understanding and Its Assessment [PDF]

open access: yesarXiv
Technological understanding is not a singular concept but varies depending on the context. Building on De Jong and De Haro's (2025) notion of technological understanding as the ability to realise an aim by using a technological artefact, this paper further refines the concept as an ability that varies by context and degree.
arxiv  

Botnets Drilling Away Privacy Infrastructure [PDF]

open access: yesarXiv, 2015
In this paper, we explore various technologies and their roles in subverting the privacy infrastructure of the Internet. We also provide mitigation techniques on the attack vectors the technologies provide, and assess the overall severity of these threats.
arxiv  

A Security Risk Assessment Method for Distributed Ledger Technology (DLT) based Applications: Three Industry Case Studies [PDF]

open access: yesarXiv
Distributed ledger technologies have gained significant attention and adoption in recent years. Despite various security features distributed ledger technology provides, they are vulnerable to different and new malicious attacks, such as selfish mining and Sybil attacks.
arxiv  

Ethics Readiness of Technology: The case for aligning ethical approaches with technological maturity [PDF]

open access: yesarXiv
The ethics of emerging technologies faces an anticipation dilemma: engaging too early risks overly speculative concerns, while engaging too late may forfeit the chance to shape a technology's trajectory. Despite various methods to address this challenge, no framework exists to assess their suitability across different stages of technological ...
arxiv  

Windows technology assessment [PDF]

open access: yes, 1995
This assessment estimates that energy loss through windows is approximately 15 percent of all the energy used for space heating and cooling in residential and commercial buildings in New York State. The rule of thumb for the nation as a whole is about 25 percent.
openaire   +3 more sources

Home - About - Disclaimer - Privacy