Search results

1 – 10 of 26
Per page
102050
Citations:
Loading...
Available. Content available
Book part
Publication date: 1 December 2023

Gail Anne Mountain

Abstract

Details

Occupational Therapy With Older People into the Twenty-First Century
Type: Book
ISBN: 978-1-83753-043-4

Available. Content available
Book part
Publication date: 15 May 2023

Free Access. Free Access

Abstract

Details

Pandemic Pedagogy: Preparedness in Uncertain Times
Type: Book
ISBN: 978-1-80071-470-0

Available. Content available
Book part
Publication date: 20 June 2017

David Shinar

Free Access. Free Access

Abstract

Details

Traffic Safety and Human Behavior
Type: Book
ISBN: 978-1-78635-222-4

Available. Content available
Book part
Publication date: 27 November 2020

Arthur Seakhoa-King, Marcjanna M Augustyn and Peter Mason

Free Access. Free Access

Abstract

Details

Tourism Destination Quality
Type: Book
ISBN: 978-1-83909-558-0

Available. Content available
Book part
Publication date: 4 October 2021

Dariusz Dziewanski

Abstract

Details

Gang Entry and Exit in Cape Town
Type: Book
ISBN: 978-1-83909-731-7

Available. Open Access. Open Access
Article
Publication date: 2 July 2020

Zheming Yang and Wen Ji

The multiple factors of intelligence measurement are critical in intelligent science. The intelligence measurement is typically built as a model based on multiple factors. The…

669

Abstract

Purpose

The multiple factors of intelligence measurement are critical in intelligent science. The intelligence measurement is typically built as a model based on multiple factors. The different agent is generally difficult to measure because of the uncertainty between multiple factors. The purpose of this paper is to solve the problem of uncertainty between multiple factors and propose an effective method for universal intelligence measurement for the different agents.

Design/methodology/approach

In this paper, the authors propose a universal intelligence measurement method based on meta-analysis for crowd network. First, the authors get study data through keywords in the database and delete the low-quality data. Second, they compute the effect value by odds ratio, relative risk and risk difference. Then, they test the homogeneity by Q-test and analyze the bias by funnel plots. Third, they select the fixed effect and random effect as a statistical model. Finally, through the meta-analysis of time, complexity and reward, the weight of each factor in the intelligence measurement is obtained and then the meta measurement model is constructed.

Findings

This paper studies the relationship among time, complexity and reward through meta-analysis and effectively combines the measurement of heterogeneous agents such as human, machine, enterprise, government and institution.

Originality/value

This paper provides a universal intelligence measurement model for crowd network. And it can provide a theoretical basis for the research of crowd science.

Details

International Journal of Crowd Science, vol. 4 no. 3
Type: Research Article
ISSN: 2398-7294

Keywords

Available. Open Access. Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Available. Open Access. Open Access
Article
Publication date: 16 October 2018

Jing Liu, Zhiwen Pan, Jingce Xu, Bing Liang, Yiqiang Chen and Wen Ji

With the development of machine learning techniques, the artificial intelligence systems such as crowd networks are becoming more autonomous and smart. Therefore, there is a…

1293

Abstract

Purpose

With the development of machine learning techniques, the artificial intelligence systems such as crowd networks are becoming more autonomous and smart. Therefore, there is a growing demand for developing a universal intelligence measurement so that the intelligence of artificial intelligence systems can be evaluated. This paper aims to propose a more formalized and accurate machine intelligence measurement method.

Design/methodology/approach

This paper proposes a quality–time–complexity universal intelligence measurement method to measure the intelligence of agents.

Findings

By observing the interaction process between the agent and the environment, we abstract three major factors for intelligence measure as quality, time and complexity of environment.

Originality/value

This paper proposes a calculable universal intelligent measure method through considering more than two factors and the correlations between factors which are involved in an intelligent measurement.

Details

International Journal of Crowd Science, vol. 2 no. 2
Type: Research Article
ISSN: 2398-7294

Keywords

Available. Open Access. Open Access
Article
Publication date: 9 December 2019

Xiaoni Wang, Zhiwen Pan, Zhouxia Li, Wen Ji and Feng Yang

This paper aims to optimize and evaluating the performance of the crowd networks through analyzing their information sharing patterns. That is, in a crowd network, the qualities…

639

Abstract

Purpose

This paper aims to optimize and evaluating the performance of the crowd networks through analyzing their information sharing patterns. That is, in a crowd network, the qualities of accomplishing tasks are highly dependent on the effective information sharing among intelligent subjects within the networks. Hence, proposing an adaptive information-sharing approach can help improve the performance of crowd networks on accomplishing tasks that are assigned to them.

Design/methodology/approach

This paper first introduces the factors that affect effectiveness of information-sharing pattern: the network topology, the resources owned by intelligent subjects and the degree of information demand. By analyzing the correlation between these factors and the performance of crowd networks, an Adaptive Information Sharing Approach for Crowd Networks (AISCN approach) is proposed. By referring to information needed for accomplishing the historical tasks that are assigned to a crowd network, the AISCN approach can explore the optimized information-sharing pattern based on the predefined composite objective function. The authors implement their approach on two crowd networks including bee colony and supply chain, to prove the effectiveness of the approach.

Findings

The shared information among intelligent subjects affects the efficiency of task completion in the crowd network. The factors that can be used to describe the effectiveness of information-sharing patterns include the network topology, the resources owned by intelligent subjects and the degree of information demand. The AISCN approach used heuristic algorithm to solve a composite objective function which takes all these factors into consideration, so that the optimized information-sharing pattern can be obtained.

Originality/value

This paper introduces a set of factors that can be used to describe the correlation between information-sharing pattern and performance of crowd network. By quantifying such correlation based on these factors, this paper proposes an adaptive information-sharing approach which can explore the optimized information-sharing pattern for a variety of crowd networks. As the approach is a data-driven approach that explores the information-sharing pattern based on the network’s performance on historical tasks and network’s characteristics, it is adaptive to the dynamic change (change of incoming tasks, change of network characteristics) of the target crowd network. To ensure the commonality of the information-sharing approach, the proposed approach is not designed for a specific optimization algorithm. In this way, during the implementation of the proposed approach, heuristic algorithms can be chosen according to the complexity of the target crowd network.

Details

International Journal of Crowd Science, vol. 3 no. 3
Type: Research Article
ISSN: 2398-7294

Keywords

Available. Open Access. Open Access
Article
Publication date: 14 August 2017

Jassim Happa and Michael Goldsmith

Several attack models attempt to describe behaviours of attacks with the intent to understand and combat them better. However, all models are to some degree incomplete. They may…

1308

Abstract

Purpose

Several attack models attempt to describe behaviours of attacks with the intent to understand and combat them better. However, all models are to some degree incomplete. They may lack insight about minor variations about attacks that are observed in the real world (but are not described in the model). This may lead to similar attacks being classified as the same type of attack, or in some cases the same instance of attack. The appropriate solution would be to modify the model or replace it entirely. However, doing so may be undesirable as the model may work well for most cases or time and resource constraints may factor in as well. This paper aims to explore the potential value of adding information about attacks and attackers to existing models.

Design/methodology/approach

This paper investigates used cases of minor variations in attacks and how it may and may not be appropriate to communicate subtle differences in existing attack models through the use of annotations. In particular, the authors investigate commonalities across a range of existing models and identify where and how annotations may be helpful.

Findings

The authors propose that nuances (of attack properties) can be appended as annotations to existing attack models. Using annotations appropriately should enable analysts and researchers to express subtle but important variations in attacks that may not fit the model currently being used.

Research limitations/implications

This work only demonstrated a few simple, generic examples. In the future, the authors intend to investigate how this annotation approach can be extended further. Particularly, they intend to explore how annotations can be created computationally; the authors wish to obtain feedback from security analysts through interviews, identify where potential biases may arise and identify other real-world applications.

Originality/value

The value of this paper is that the authors demonstrate how annotations may help analysts communicate and ask better questions during identification of unknown aspects of attacks faster,e.g. as a means of storing mental notes in a structured manner, especially while facing zero-day attacks when information is incomplete.

Details

PSU Research Review, vol. 1 no. 2
Type: Research Article
ISSN: 2399-1747

Keywords

1 – 10 of 26
Per page
102050