On-line Versus Real World Impressions

2000 ◽  
Author(s):  
Christian End ◽  
Egon Kraan ◽  
Alison Cole ◽  
Jamie Klausner ◽  
Zachary Birchmeier ◽  
...  
Keyword(s):  
2020 ◽  
Author(s):  
Jaimie Krems ◽  
Keelah Williams ◽  
Douglas Kenrick ◽  
Athena Aktipis

Friendships can foster happiness, health, and reproductive fitness. But friendships end—even when we might not want them to. A primary reason for this is interference from third parties. Yet little work has explored how people meet the challenge of maintaining friendships in the face of real or perceived threats from third parties, as when our friends inevitably make new friends or form new romantic relationships. In contrast to earlier conceptualizations from developmental research, which viewed friendship jealousy as solely maladaptive, we propose that friendship jealousy is one overlooked tool of friendship maintenance. We derive and test—via a series of 11 studies (N = 2918) using hypothetical scenarios, recalled real-world events, and manipulation of on-line emotional experiences—whether friendship jealousy possesses the features of a tool well-designed to help us retain friends in the face of third-party threats. Consistent with our proposition, findings suggest that friendship jealousy is (1) uniquely evoked by third-party threats to friendships (but not the prospective loss of the friendship alone), (2) sensitive to the value of the threatened friendship, (3) strongly calibrated to cues that one is being replaced, even over more intuitive cues (e.g., the amount of time a friend and interloper spend together), and (4) ultimately motivates behavior aimed at countering third-party threats to friendship (“friend guarding”). Even as friendship jealousy may be negative to experience, it may include features designed for beneficial—and arguably prosocial—ends: to help maintain friendships.


2021 ◽  
Author(s):  
Lyndsay Roach

The study of networks has been propelled by improvements in computing power, enabling our ability to mine and store large amounts of network data. Moreover, the ubiquity of the internet has afforded us access to records of interactions that have previously been invisible. We are now able to study complex networks with anywhere from hundreds to billions of nodes; however, it is difficult to visualize large networks in a meaningful way. We explore the process of visualizing real-world networks. We first discuss the properties of complex networks and the mechanisms used in the network visualizing software Gephi. Then we provide examples of voting, trade, and linguistic networks using data extracted from on-line sources. We investigate the impact of hidden community structures on the analysis of these real-world networks.


Author(s):  
Jan Žižka ◽  
František Dařena

Gaining new and keeping existing clients or customers can be well-supported by creating and monitoring feedbacks: “Are the customers satisfied? Can we improve our services?” One of possible feedbacks is allowing the customers to freely write their reviews using a simple textual form. The more reviews that are available, the better knowledge can be acquired and applied to improving the service. However, very large data generated by collecting the reviews has to be processed automatically as humans usually cannot manage it within an acceptable time. The main question is “Can a computer reveal an opinion core hidden in text reviews?” It is a challenging task because the text is written in a natural language. This chapter presents a method based on the automatic extraction of expressions that are significant for specifying a review attitude to a given topic. The significant expressions are composed using significant words revealed in the documents. The significant words are selected by a decision-tree generator based on the entropy minimization. Words included in branches represent kernels of the significant expressions. The full expressions are composed of the significant words and words surrounding them in the original documents. The results are here demonstrated using large real-world multilingual data representing customers' opinions concerning hotel accommodation booked on-line, and Internet shopping. Knowledge discovered in the reviews may subsequently serve for various marketing tasks.


Author(s):  
Paolo Giudici ◽  
Emanuela Raffinetti

AbstractIn a world that is increasingly connected on-line, cyber risks become critical. Cyber risk management is very difficult, as cyber loss data are typically not disclosed. To mitigate the reputational risks associated with their disclosure, loss data may be collected in terms of ordered severity levels. However, to date, there are no risk models for ordinal cyber data. We fill the gap, proposing a rank-based statistical model aimed at predicting the severity levels of cyber risks. The application of our approach to a real-world case shows that the proposed models are, while statistically sound, simple to implement and interpret.


2019 ◽  
Vol 53 (3) ◽  
pp. 244-259 ◽  
Author(s):  
M. Le Breton ◽  
M. Psichoudaki ◽  
M. Hallquist ◽  
Å. K. Watne ◽  
A. Lutz ◽  
...  

Author(s):  
Krittika KD Singh ◽  
Anurag Jain

OAuth 2.0 protocol has enjoyed wide adoption by on-line Social Network (OSN) suppliers since its origination. Though the safety guideline of OAuth two.0 is well mentioned in RFC6749 and RFC6819, many real-world attacks because of the implementation speciVcs of OAuth 2.0 in varied OSNs are discovered. According to our information, previously discovered loopholes square measure all supported the misuse of OAuth and many of them deem supplier facet or application facet vulnerabilities/faults on the far side the scope of the OAuth protocol. It was generally believed that correct use of OAuth two.0 is secure. During this paper OAuth is studied with its varied aspects and characteristics.


Author(s):  
Robert Wrembel

A data warehouse architecture (DWA) has been developed for the purpose of integrating data from multiple heterogeneous, distributed, and autonomous external data sources (EDSs) as well as for providing means for advanced analysis of integrated data. The major components of this architecture include: an external data source (EDS) layer, and extraction-transformation-loading (ETL) layer, a data warehouse (DW) layer, and an on-line analytical processing (OLAP) layer. Methods of designing a DWA, research developments, and most of the commercially available DW technologies tacitly assumed that a DWA is static. In practice, however, a DWA requires changes among others as the result of the evolution of EDSs, changes of the real world represented in a DW, and new user requirements. Changes in the structures of EDSs impact the ETL, DW, and OLAP layers. Since such changes are frequent, developing a technology for handling them automatically or semi-automatically in a DWA is of high practical importance. This chapter discusses challenges in designing, building, and managing a DWA that supports the evolution of structures of EDSs, evolution of an ETL layer, and evolution of a DW. The challenges and their solutions presented here are based on an experience of building a prototype Evolving-ETL and a prototype Multiversion Data Warehouse (MVDW). In details, this chapter presents the following issues: the concept of the MVDW, an approach to querying the MVDW, an approach to handling the evolution of an ETL layer, a technique for sharing data between multiple DW versions, and two index structures for the MVDW.


2019 ◽  
Vol 41 (2) ◽  
pp. 224-230
Author(s):  
Aníbal Ferreira ◽  
Bruno Pinto ◽  
David Navarro ◽  
João Aniceto ◽  
Pedro L Neves ◽  
...  

Abstract Introduction: Hyperphosphatemia is a serious consequence of chronic kidney disease and has been associated with an increased risk for cardiovascular disease. Controlling serum phosphorus levels in patients on dialysis is a challenge for the clinicians and implies, in most cases, the use of phosphate binders (PB). Part of the reason for this challenge is poor adherence to treatment because of the high pill burden in this patient group. Objective: To assess the real-world effectiveness of sucroferric oxyhydroxide (SO) in controlling serum phosphorus levels and determine the associated pill burden. Methods: A multicenter, quantitative, retrospective, before-after study was conducted with patients receiving online hemodiafiltration. Patients who switched to SO as a part of routine care were included in the study. PB treatment, number of pills, serum phosphorus levels, and intravenous iron medication and dosage were collected monthly during the six months of treatment with either PB or SO. Results: A total of 42 patients were included in the study. After switching from a PB to SO, the prescribed pills/day was reduced 67% from 6 pills/day to 2 pills/day (p < 0.001) and the frequency of pill intake was lowered from 3 times/day to 2 times/day (p < 0.001). During the treatment with SO, the proportion of patients with serum phosphorus ≤ 5.5 mg/dL increased from 33.3% at baseline to 45% after six months of treatment. Conclusion: During the six-month follow-up with SO, serum phosphorus levels were controlled with one third of the pills/day compared to other PB.


Sign in / Sign up

Export Citation Format

Share Document