role hierarchy
Recently Published Documents


TOTAL DOCUMENTS

43
(FIVE YEARS 4)

H-INDEX

8
(FIVE YEARS 1)

Linguistics ◽  
2020 ◽  
Vol 58 (4) ◽  
pp. 1059-1115
Author(s):  
Markus Bader

AbstractThis paper presents a corpus study of the position of object pronouns relative to a non-pronominal subject in embedded clauses of German. A total of 4322 embedded clauses from the deWaC corpus (Baroni, Marco, Silvia Bernardini, Adriano Ferraresi & Eros Zanchetta. 2009. The WaCky Wide Web: A collection of very large linguistically processed web-crawled corpora. Language Resources and Evaluation Journal 23(3). 209–226), a corpus of written German Internet texts, were analyzed. In 67.0% of all clauses, the object pronoun occurred in front of the subject. Several factors that have been proposed in the literature on word order alternations were found to govern the choice between subject–object and object–subject order in the corpus under investigation. The most important findings are: (i) The Extended Animacy Hierarchy and the Semantic Role Hierarchy independently contribute to the choice of word order. (ii) The Definiteness Hierarchy has a strong effect on the position of the object pronoun. (iii) Word order effects of constituent weight, measured as length in number of words, cannot be reduced to effects of grammatical factors, nor can effects of grammatical factors be reduced to effects of weight.


2020 ◽  
pp. 1485-1501
Author(s):  
Shalini Bhartiya ◽  
Deepti Mehrotra ◽  
Anup Girdhar

Health professionals need an access to various dimensions of Electronic Health Records (EHR). Depending on technical constraints, each organization defines its own access control schema exhibiting heterogeneity in organizational rules and policies. Achieving interoperability between such schemas often result in contradictory rules thereby exposing data to undue disclosures. Permitting interoperable sharing of EHRs and simultaneously restricting unauthorized access is the major objective of this paper. An Extensible Access Control Markup Language (XACML)-based framework, Hierarchy Similarity Analyser (HSA), is proposed which fine-grains access control policies of disparate healthcare organizations to achieve interoperable and secured sharing of EHR under set authorizations. The proposed framework is implemented and verified using automated Access Control Policy Testing (ACPT) tool developed by NIST. Experimental results identify the users receive secured and restricted access as per their authorizations and role hierarchy in the organization.


2020 ◽  
pp. 204-220
Author(s):  
Shalini Bhartiya ◽  
Deepti Mehrotra ◽  
Anup Girdhar

Health professionals need an access to various dimensions of Electronic Health Records (EHR). Depending on technical constraints, each organization defines its own access control schema exhibiting heterogeneity in organizational rules and policies. Achieving interoperability between such schemas often result in contradictory rules thereby exposing data to undue disclosures. Permitting interoperable sharing of EHRs and simultaneously restricting unauthorized access is the major objective of this paper. An Extensible Access Control Markup Language (XACML)-based framework, Hierarchy Similarity Analyser (HSA), is proposed which fine-grains access control policies of disparate healthcare organizations to achieve interoperable and secured sharing of EHR under set authorizations. The proposed framework is implemented and verified using automated Access Control Policy Testing (ACPT) tool developed by NIST. Experimental results identify the users receive secured and restricted access as per their authorizations and role hierarchy in the organization.


2019 ◽  
Vol 65 (2) ◽  
pp. 314-358 ◽  
Author(s):  
Jian Bai Li ◽  
Henning Piezunka

Actors in a multiplex relationship—one crossing multiple domains—can struggle to transition into new roles in one domain without disrupting existing interactions and the role hierarchy in another. Via an inductive study of intergenerational leadership successions in seven Chinese family firms, we examine how actors can complete such a single-domain role transition. We find that a succession between the founder/father and the successor/son is successful when the mother (i.e., the founder’s wife) is active in the family but not the firm, acting as a trustworthy third party to the founder and successor in the family while staying nonpartisan to their business disagreements. Limiting her involvement to the family allows the mother to help the founder and successor maintain their existing family roles and interactions while transitioning into new roles in the firm. A mother involved in both firm and family could not stay nonpartisan between the founder and successor, which compromised their trust in her and prevented her from legislating over their multiplex relationship and facilitating the succession. We conceptualize the position of the uniplex third: the network position an actor occupies when she or he is connected in only one domain to two actors who have a multiplex dyadic relationship. Our cases reveal that the uniplex third position grants an actor authority via establishing trustworthiness and nonpartisanship relative to a multiplex dyadic relationship. The uniplex third party can thus facilitate change in one domain and maintain stability in another. We also observe how the mother is inhibited from occupying the uniplex third position when her kin are involved in the firm’s top management. If conflicts exist in the firm between the mother’s nuclear family and her kin, we find the mother disengages from succession-aiding activities in both family and firm domains.


2018 ◽  
Vol 7 (2.8) ◽  
pp. 554
Author(s):  
Geetanjali Sinha ◽  
Prabhu Shankar K.C ◽  
Shaurya Jain

Hospitals across the world are adapting to Electronic Hospital Information Systems and are moving away from the manual paper systems to provide patients efficient services. Numerous Access ControlModels have been deployed for securing patient privacy one of them being Role Based Access Control Model (RBAC). The current models merely allow access on the basis of roles and role hierarchy without actually understanding the real intention of the person accessing the system. This could lead to a compromise of patient privacy and thus new methods have been evolving. In this survey we will see an evolution of the access control models which lead to the discovery of KC-RBAC (Knowledge Constrained Role Based Access Control) Model which takes into consideration the knowledge related to the medical domain along with the role to provide authorization.


2017 ◽  
Vol 7 (3) ◽  
pp. 29-53 ◽  
Author(s):  
Parham Porouhan ◽  
Wichian Premchaiswadi

Interactive tabletops alone cannot automatically analyze and interpret students' digital footprints (event logs). Moreover, the final artifacts created by groups provide imperfect information about each individual's contribution to the group task. This research is divided into two main parts. In the first part of the study, a quantitative survey was conducted in order to identify the most significant indicators affecting the collaboration process in an online and networked context-aware multi-tabletop environment. In the second part of the study, several process mining techniques such as social network mining, basic performance analysis, role hierarchy mining, and dotted chart analysis were used with the purpose of increasing the instructor's awareness/knowledge about the collaborative dynamics in each group. The empirical findings showed that the levels of symmetry of actions (or similarity of tasks) and symmetry of roles (or low division of labor) were much higher in the high-performance groups compared with the low performance groups. Consequently, high performance groups showed increased tendencies to work on the same range of actions ‘together'. Quite the opposite, low performance groups showed increased tendencies to work on a dissimilar range of actions ‘individually'.


2017 ◽  
Vol 11 (3) ◽  
pp. 314-329 ◽  
Author(s):  
Cate Watson ◽  
Valerie Drew

Recent constructions view leadership as a process of social influence which coordinates processes of change. Moreover, such processes are not necessarily linked to role hierarchy but may be emergent and distributed within teams. However, the micro-processes through which this occurs are not well understood. The significance of the article lies in its contribution to an understanding of the emergence of leadership in teams, and in particular how humour and laughter are drawn on as a resource by which to exert social influence. Here, we use the construct of the play frame, ‘non-serious’ talk in which participants jointly construct extended humorous sequences as improvisations, to analyse how team members manoeuvre in order to accomplish influence, decision-making and leadership. In taking this approach, we are not concerned with considerations of how managers use jokes to exercise control, or workers use humour to subvert management. Rather, we examine how humour, and particularly the laughter it engenders, can contribute to an understanding of organisations as centred on communication and founded on the precept that organisations are ‘talked into being’. We show how talk in a play frame institutes a context which can be utilised by participants to exert influence, and we demonstrate the highly contingent and contextual nature of the emergence of leadership within teams.


Author(s):  
Rubina Ghazal ◽  
Ahmad Kamran Malik ◽  
Nauman Qadeer ◽  
Mansoor Ahmed

The information sharing tends to be dynamic in multi-domains because different teams are sharing information in a Collaborative Working Environment (CWE). The secure information sharing is a challenge in such environments. The Role Based Access Control (RBAC) is an efficient model for rights management in large systems, but it does not handle dynamisms of collaboration in multi-domain environments to access resources at a fine-grained level. The research aimed to address this issue of secure information and data sharing across multiple domains. The proposed model extends the RBAC model using intelligent agents, ontologies and design patterns. It introduces multi-agent monitors for role and permission assignments, session tracking, constraint handling and maintaining role hierarchy semantically. These agents use deductive learning to adapt changes and help in decision making for role and permission assignment. The model's working is discussed using a case scenario to ensure secure collaboration in a multi-domain environment.


Sign in / Sign up

Export Citation Format

Share Document