887 resultados para Online Dating Network
Resumo:
The cybernetics revolution of the last years improved a lot our lives, having an immediate access to services and a huge amount of information over the Internet. Nowadays the user is increasingly asked to insert his sensitive information on the Internet, leaving its traces everywhere. But there are some categories of people that cannot risk to reveal their identities on the Internet. Even if born to protect U.S. intelligence communications online, nowadays Tor is the most famous low-latency network, that guarantees both anonymity and privacy of its users. The aim of this thesis project is to well understand how the Tor protocol works, not only studying its theory, but also implementing those concepts in practice, having a particular attention for security topics. In order to run a Tor private network, that emulates the real one, a virtual testing environment has been configured. This behavior allows to conduct experiments without putting at risk anonymity and privacy of real users. We used a Tor patch, that stores TLS and circuit keys, to be given as inputs to a Tor dissector for Wireshark, in order to obtain decrypted and decoded traffic. Observing clear traffic allowed us to well check the protocol outline and to have a proof of the format of each cell. Besides, these tools allowed to identify a traffic pattern, used to conduct a traffic correlation attack to passively deanonymize hidden service clients. The attacker, controlling two nodes of the Tor network, is able to link a request for a given hidden server to the client who did it, deanonymizing him. The robustness of the traffic pattern and the statistics, such as the true positive rate, and the false positive rate, of the attack are object of a potential future work.
Resumo:
In distribution system operations, dispatchers at control center closely monitor system operating limits to ensure system reliability and adequacy. This reliability is partly due to the provision of remote controllable tie and sectionalizing switches. While the stochastic nature of wind generation can impact the level of wind energy penetration in the network, an estimate of the output from wind on hourly basis can be extremely useful. Under any operating conditions, the switching actions require human intervention and can be an extremely stressful task. Currently, handling a set of switching combinations with the uncertainty of distributed wind generation as part of the decision variables has been nonexistent. This thesis proposes a three-fold online management framework: (1) prediction of wind speed, (2) estimation of wind generation capacity, and (3) enumeration of feasible switching combinations. The proposed methodology is evaluated on 29-node test system with 8 remote controllable switches and two wind farms of 18MW and 9MW nameplate capacities respectively for generating the sequence of system reconfiguration states during normal and emergency conditions.
Resumo:
AIMS: To determine the influence of strabismus on the ability to find a partner. METHODS: We interviewed Swiss dating agents retrieved from two Swiss online telephone directories using a validated questionnaire to determine whether strabismus has any impact on the ability to find a partner. During the interviews, subjects with internet access could view downloadable, digitally altered photographs of a strabismic man and women, as well as images of other computer-generated facial anomalies. RESULTS: Of the 40 dating agents, 92.5% judged that strabismic subjects have more difficulty finding a partner (p<0.001). Such difficulty was not associated with either gender or age but was perceived as being greater in exotropic than in esotropic persons (p<0.001). Among the seven facial disfigurements, strabismus was believed to have the third largest negative impact on finding a partner, after strong acne and a visible missing tooth. Dating agents also believed that potential partners perceive persons with strabismus as significantly less attractive (p<0.001), erotic (p<0.001), likeable (p<0.001), interesting (p<0.001), successful (p<0.001), intelligent (p = 0.001) and sporty (p = 0.01). CONCLUSIONS: Visible strabismus negatively influences the ability to find a partner. Because strabismus surgery in adults restores a normal functioning condition and reduces not only physical but also psychosocial difficulties, it cannot be considered a cosmetic procedure.
Resumo:
This article examines social network users’ legal defences against content removal under the EU and ECHR frameworks, and their implications for the effective exercise of free speech online. A review of the Terms of Use and content moderation policies of two major social network services, Facebook and Twitter, shows that end users are unlikely to have a contractual defence against content removal. Under the EU and ECHR frameworks, they may demand the observance of free speech principles in state-issued blocking orders and their implementation by intermediaries, but cannot invoke this ‘fair balance’ test against the voluntary removal decisions by the social network service. Drawing on practical examples, this article explores the threat to free speech created by this lack of accountability: Firstly, a shift from legislative regulation and formal injunctions to public-private collaborations allows state authorities to influence these ostensibly voluntary policies, thereby circumventing constitutional safeguards. Secondly, even absent state interference, the commercial incentives of social media cannot be guaranteed to coincide with democratic ideals. In light of the blurring of public and private functions in the regulation of social media expression, this article calls for the increased accountability of the social media services towards end users regarding the observance of free speech principles
Resumo:
The intention of an authentication and authorization infrastructure (AAI) is to simplify and unify access to different web resources. With a single login, a user can access web applications at multiple organizations. The Shibboleth authentication and authorization infrastructure is a standards-based, open source software package for web single sign-on (SSO) across or within organizational boundaries. It allows service providers to make fine-grained authorization decisions for individual access of protected online resources. The Shibboleth system is a widely used AAI, but only supports protection of browser-based web resources. We have implemented a Shibboleth AAI extension to protect web services using Simple Object Access Protocol (SOAP). Besides user authentication for browser-based web resources, this extension also provides user and machine authentication for web service-based resources. Although implemented for a Shibboleth AAI, the architecture can be easily adapted to other AAIs.
Resumo:
The aim of this project is to investigate the use of gender-fair language from a cross-linguistic perspective. Specifically, we are interested in whether the use of gender-fair language correlates with socio-economic rankings of gender equality and with structural features of a language. We decided to analyze online job advertisements, as they reflect common language use and can easily be compared across languages. Moreover, formulations in job advertisements have been shown to impact personnel selection via the way target groups are addressed and referred to. In the present study we examined to what extent job advertisements are formulated in a gender-fair way and how this correlates with factors such as language, culture as well as status and gender-typicality of the job advertised. The data consisted of job advertisements published online in four European countries which occupy different positions in socio-economic rankings of gender equality (World Economic Forum, 2011): Switzerland (10), Austria (rank 34), Poland (42), and Czech Republic (75). We randomly selected 100 job advertisements from four lines of business characterized by different proportions of female employees – steels/metals, science, restaurants/food services, and health care. The advertisements were analyzed with regard to the linguistic form of the job title and the remaining text; we also noted indicators of job status, reference to gender-typical traits, pictures of women/men and other information which might be relevant to the use of gender-fair language (e.g., equal opportunity policies). A first analysis of the data indicates that the phrasing of job titles is closely related to the gender-typicality of a profession. While mainly gender-fair forms are used in healthcare, masculine forms are used more often in the domain of steels and metals. Feminine forms only, however, are almost never used. Cultural differences as well as correlations with associated variables will be discussed.
Resumo:
On online social networks such as Facebook, massive self-disclosure by users has attracted the attention of industry players and policymakers worldwide. Despite the impressive scope of this phenomenon, very little is understood about what motivates users to disclose personal information. Integrating focus group results into a theoretical privacy calculus framework, we develop and empirically test a Structural Equation Model of self-disclosure with 259 subjects. We find that users are primarily motivated to disclose information because of the convenience of maintaining and developing relationships and platform enjoyment. Countervailing these benefits, privacy risks represent a critical barrier to information disclosure. However, users’ perception of risk can be mitigated by their trust in the network provider and availability of control options. Based on these findings, we offer recommendations for network providers.
Resumo:
Driven by privacy-related fears, users of Online Social Networks may start to reduce their network activities. This trend can have a negative impact on network sustainability and its business value. Nevertheless, very little is understood about the privacy-related concerns of users and the impact of those concerns on identity performance. To close this gap, we take a systematic view of user privacy concerns on such platforms. Based on insights from focus groups and an empirical study with 210 subjects, we find that (i) Organizational Threats and (ii) Social Threats stemming from the user environment constitute two underlying dimensions of the construct “Privacy Concerns in Online Social Networks”. Using a Structural Equation Model, we examine the impact of the identified dimensions of concern on the Amount, Honesty, and Conscious Control of individual self-disclosure on these sites. We find that users tend to reduce the Amount of information disclosed as a response to their concerns regarding Organizational Threats. Additionally, users become more conscious about the information they reveal as a result of Social Threats. Network providers may want to develop specific mechanisms to alleviate identified user concerns and thereby ensure network sustainability.
Resumo:
Unprecedented success of Online Social Networks, such as Facebook, has been recently overshadowed by the privacy risks they imply. Weary of privacy concerns and unable to construct their identity in the desired way, users may restrict or even terminate their platform activities. Even though this means a considerable business risk for these platforms, so far there have been no studies on how to enable social network providers to address these problems. This study fills this gap by adopting a fairness perspective to analyze related measures at the disposal of the provider. In a Structural Equation Model with 237 subjects we find that ensuring interactional and procedural justice are two important strategies to support user participation on the platform.
Resumo:
Popularity of Online Social Networks has been recently overshadowed by the privacy problems they pose. Users are getting increasingly vigilant concerning information they disclose and are strongly opposing the use of their information for commercial purposes. Nevertheless, as long as the network is offered to users for free, providers have little choice but to generate revenue through personalized advertising to remain financially viable. Our study empirically investigates the ways out of this deadlock. Using conjoint analysis we find that privacy is indeed important for users. We identify three groups of users with different utility patterns: Unconcerned Socializers, Control-conscious Socializers and Privacy-concerned. Our results provide relevant insights into how network providers can capitalize on different user preferences by specifically addressing the needs of distinct groups in the form of various premium accounts. Overall, our study is the first attempt to assess the value of privacy in monetary terms in this context.
Resumo:
During the last decade, medical education in the German-speaking world has been striving to become more practice-oriented. This is currently being achieved in many schools through the implementation of simulation-based instruction in Skills Labs. Simulators are thus an essential part of this type of medical training, and their acquisition and operation by a Skills Lab require a large outlay of resources. Therefore, the Practical Skills Committee of the Medical Education Society (GMA) introduced a new project, which aims to improve the flow of information between the Skills Labs and enable a transparent assessment of the simulators via an online database (the Simulator Network).
Resumo:
Eine zumindest bis vor kurzem in der Schweiz noch populäre Ansicht lautet, dass eine Karriere in der Armee den beruflichen Erfolg im zivilen Leben stark befördert. Obwohl militärische und berufliche Karriere als Besonderheit des schweizerischen Milizsystems im biografischen Verlauf miteinander verschränkt sind, bleibt aber der tatsächliche Einfluss der militärischen Karriere auf den Berufserfolg empirisch noch nachzuweisen. Zudem ist auch die Frage nach den möglichen Gründen zu stellen. Ziel dieses Beitrags ist also erstens die empirische Prüfung des positiven Effekts der militärischen auf die zivile Karriere. Zweitens sollen mögliche Ursachen gegenübergestellt werden. Als solche werden insbesondere Selbstselektion, der Erwerb von Humankapital (Führungskompetenzen) und der Aufbau eines wirkungsvollen Beziehungsnetzes in Betracht gezogen. Die Analysen anhand der Daten des Schweizer Arbeitsmarktsurveys 1998 zeigen erstens, dass höhere militärische Ränge auch bei Kontrolle von Bildung und Berufserfahrung mit erhöhtem Erwerbseinkommen einhergehen. Zweitens zeigt sich, dass dieser Einkommensbonus allem Anschein nach weder auf Mechanismen der Selbstselektion noch auf dem Erwerb von besonders gewinnbringendem Humankapital beruht. Vielmehr ist zu vermuten, dass der größere Berufserfolg von Milizoffizieren mit ihrem an "wertvollen" Beziehungen reichen sozialen Netzwerk zusammenhängt.
Resumo:
A fast and automatic method for radiocarbon analysis of aerosol samples is presented. This type of analysis requires high number of sample measurements of low carbon masses, but accepts precisions lower than for carbon dating analysis. The method is based on online Trapping CO2 and coupling an elemental analyzer with a MICADAS AMS by means of a gas interface. It gives similar results to a previously validated reference method for the same set of samples. This method is fast and automatic and typically provides uncertainties of 1.5–5% for representative aerosol samples. It proves to be robust and reliable and allows for overnight and unattended measurements. A constant and cross contamination correction is included, which indicates a constant contamination of 1.4 ± 0.2 μg C with 70 ± 7 pMC and a cross contamination of (0.2 ± 0.1)% from the previous sample. A Real-time online coupling version of the method was also investigated. It shows promising results for standard materials with slightly higher uncertainties than the Trapping online approach.
Resumo:
Neolithic and Bronze Age wetland sites around the Alps (so called pile-dwellings, Pfahlbauten or palafittes in German/French) are of outstanding universal value (UNESCO-world heritage since 2011). Typical sites are in lakes, rivers and bogs, dating between 5300 and 800 BC. Of common character is the perfect conservation of wood, textiles from plant fabrics and many other organic materials. Larger quantities of sub-fossilized wood, as in the peri-alpine sites, offer the possibility of high-precision dating by dendrochronology. Research in these wetland sites started in the mid-19th century. Through large scale rescue excavations since the 1970s and the evolution of underwater archaeology in the same period the Swiss accumulated a thorough experience with these specific sites. Research in wetland sites is shared between cantonal institutions and universities and led to a worldwide unique accumulation of knowledge. Comparable sites exist outside of the Alpine area, but in much smaller quantities. Regions like Russia (small lakes in NW-Russia) and Macedonia (medium size lakes in the border zone of Macedonia, Albania and Greece) have a high scientific potential; rivers in Ukraine are supposed to have the same type of sites.
Resumo:
Fertility-preservation techniques for medical reasons are increasingly offered in national networks. Knowledge of the characteristics of counselled patients and techniques used are essential. The FertiPROTEKT network registry was analysed between 2007 and 2013, and included up to 85 university and non-university centres in Germany, Austria and Switzerland; 5159 women were counselled and 4060 women underwent fertility preservation. In 2013, fertility-preservation counselling for medical reasons increased significantly among nullipara and women aged between 21 and 35 years (n = 1043; P < 0.001). Frequency of GnRH applications slowly decreased, whereas tissue, oocytes and zygote cryopreservation increased. In 2013, women with breast cancer mainly opted for tissue freezing, whereas women with lymphoma opted for GnRH agonist. Women younger than 20 years predominantly opted for GnRH agonists and ovarian tissue cryopreservation; women aged between 20 and 40 years underwent a variety of techniques; and women over 40 years opted for GnRH agonists. The average number of aspirated oocytes per stimulation cycle decreased as age increased (< 30 years: 12.9; 31-35 years: 12.3; 36-46: 9.0; > 41 years: 5.7). For ovarian tissue cryopreservation, removal and cryopreservation of fewer than one ovary was preferred and carried out in 97% of cases in 2013.