Results 61 to 70 of about 18,788 (185)

Content and popularity analysis of Tor hidden services [PDF]

open access: yes, 2014
Tor hidden services allow running Internet services while protecting the location of the servers. Their main purpose is to enable freedom of speech even in situations in which powerful adversaries try to suppress it.
Biryukov, Alex   +3 more
core   +2 more sources

Human Factors in Information-Age Trade Secret Protection [PDF]

open access: yes, 2011
[Excerpt] Trade secret information security involves a multi-dimensional array of human, legal, and technological factors. I argue that organizational culture, employee policies, and other human factors are fundamental prerequisites to the successful ...
Elbaum, Dan
core   +1 more source

O paradoxo dos Direitos Humanos: cibercultura, wikileaks e o controle sistêmico-hegemônico

open access: yesConversas & Controvérsias, 2017
Há um paradoxo dos Direitos Humanos na sociedade mundial: suas expectativas só podem ser reconhecidas por meio de suas violações. A sociedade comunica tais violações, entretanto, mesmo com o acesso a novas tecnologias comunicacionais, há ...
Jorge Alberto de Macedo Acosta Junior
doaj  

New explainability method for BERT-based model in fake news detection. [PDF]

open access: yesSci Rep, 2021
Szczepański M   +3 more
europepmc   +1 more source

Enabling the Autonomic Management of Federated Identity Providers [PDF]

open access: yes, 2013
The autonomic management of federated authorization infrastructures (federations) is seen as a means for improving the monitoring and use of a service provider’s resources. However, federations are comprised of independent management domains with varying
Bailey, Christopher   +3 more
core   +2 more sources

The Rhetorical Algorithm: WikiLeaks and the Elliptical Secrets of Donald J. Trump [PDF]

open access: yes, 2018
Algorithms were a generative force behind many of the leaks and secrets that dominated the 2016 election season. Taking the form of the identity-anonymizing Tor software that protected the identity of leakers, mathematical protocols occupied a prominent ...
Hallsby, Atilla
core   +2 more sources

Revisiting the political biases of ChatGPT. [PDF]

open access: yesFront Artif Intell, 2023
Fujimoto S, Takemoto K.
europepmc   +1 more source

Le fondateur peut-il être un représentant ? Le cas Assange/WikiLeaks dans le New York Times

open access: yesSociologies, 2019
This paper articulates the concepts of representation, authority and singularity through the analysis of the figuration of Julian Assange and WikiLeaks in the pages of the New York Times.
Léonore Cabin
doaj  

The meaning of Freedom after Covid-19. [PDF]

open access: yesHist Philos Life Sci, 2021
Farina M, Lavazza A.
europepmc   +1 more source

Open access publishing: What is world’s best practice? [PDF]

open access: yes, 2013
Open access publishing delivers on the dream of centuries - the free and unfettered access to the written word. However there are shades of openness and the question raised is 'what is world's best practice for open access publishing?' Four criteria are
Paull, John
core  

Home - About - Disclaimer - Privacy