Demirsandoval5016

Z Iurium Wiki

Verze z 13. 10. 2024, 13:17, kterou vytvořil Demirsandoval5016 (diskuse | příspěvky) (Založena nová stránka s textem „Also methodologically, this is an endeavour to validate a new approach which uses social media data for developing a inferential theoretical model.This pap…“)
(rozdíl) ← Starší verze | zobrazit aktuální verzi (rozdíl) | Novější verze → (rozdíl)

Also methodologically, this is an endeavour to validate a new approach which uses social media data for developing a inferential theoretical model.This paper reports an experiment designed to assess the influence of workplace arrangements on the reactions to (the absence of) control. We compare behavior in an Internet and a laboratory principal-agent game where the principal can control the agent by implementing a minimum effort requirement. Then the agent chooses an effort costly to her but beneficial to the principal. Our design captures meaningful differences between working from home and working at the office arrangements. Online subjects enjoy greater anonymity than lab subjects, they interact in a less constrained environment than the laboratory, and there is a larger physically-oriented social distance between them. Control is significantly more effective online than in the laboratory. Positive reactions to the principal's choice not to control are observed in both treatments, but they are significantly weaker online than in the laboratory. Principals often choose the highest control level, which maximizes their earnings.In many search environments, searchers are learning about the distribution of offers in the market. I conduct an experiment exploring a broad class of search problems with learning about the distribution of payoffs. My results support the prediction that learning results in declining reservation values, providing evidence that learning may be an explanation for recall. Theory predicts a "one step" reservation value strategy, but many subjects instead choose to set a high reservation value in order to learn about the distribution before adjusting based on their observations. Under-searching in search experiments may stem from a reinforcement heuristic and lack of negative feedback after using sub-optimal strategies.Our romantic lives are influenced, to a large extent, by our perceptions of physical attractiveness - and the societal beauty standards that shape them. But what if we could free our desires from this fixation on looks? Science fiction writer Ted Chiang has explored this possibility in a fascinating short story - and scientific developments might, in the future, move it beyond the realm of fiction. In this paper, I lay out the prudential case for using "attraction-expanding technology," and then consider it from a moral point of view. Using the technology would, in one respect, be morally good it would benefit those whom prevailing beauty standards marginalize. But attraction-expanding technology also raises a moral concern - one that can be cast in non-harm-based and harm-based terms. I argue that the non-harm-based objection should be rejected, because it is incompatible with a moral principle central to queer rights. find more And the harm-based objection, I argue, is outweighed by the benefits of attraction-expanding technology, and undermined by the prerogative you have over your personal romantic choices. I conclude by considering whether, from the perspective of society, the development of attraction-expanding technology would be desirable.This paper offers an ethical consideration of how fear can be a tool of agents, used to deliberately shift people away from existing beliefs, commitments, or habits, or towards new ones. It contends that properly understanding the ethical dimensions of such uses of fear depends in part on a clear understanding of the dynamics of disorientation that can be involved in such uses. Section two begins with a clarification of the connections between fear, orientation, and disorientation. It suggests that experiences of fear are in some cases either orienting or disorienting, and that the disorienting aspects of fear are in need of more attention. Section three shows how experiences of fear can be tools-they can be cultivated and wielded by agents deliberately for multiple reasons, including sometimes in order to disorient or re-orient others. Section four turns to a moral evaluation of these uses of fear, attending specifically to why the dynamics of disorientation and orientation often involved in experiences of fear are important for understanding the moral status of uses of fear.The philosophical literature on well-being and the good life contains very little explicit discussion of what makes for a better or worse death. The purpose of this essay is to highlight some commonly held views about the good death and investigate whether these views are recognized by the leading theories of well-being. While the most widely discussed theories do have implications about what constitutes a good death, they seem unable to fully accommodate these popular good death views. I offer two partial explanations for why these views have been neglected in discussions of well-being and make two corresponding recommendations for future work in the philosophy of well-being.Monitoring location updates from mobile users has important applications in many areas, ranging from public health (e.g., COVID-19 contact tracing) and national security to social networks and advertising. However, sensitive information can be derived from movement patterns, thus protecting the privacy of mobile users is a major concern. Users may only be willing to disclose their locations when some condition is met, for instance in proximity of a disaster area or an event of interest. Currently, such functionality can be achieved using searchable encryption. Such cryptographic primitives provide provable guarantees for privacy, and allow decryption only when the location satisfies some predicate. Nevertheless, they rely on expensive pairing-based cryptography (PBC), of which direct application to the domain of location updates leads to impractical solutions. We propose secure and efficient techniques for private processing of location updates that complement the use of PBC and lead to significant gains in performance by reducing the amount of required pairing operations. We implement two optimizations that further improve performance materialization of results to expensive mathematical operations, and parallelization. We also propose an heuristic that brings down the computational overhead through enlarging an alert zone by a small factor (given as system parameter), therefore trading off a small and controlled amount of privacy for significant performance gains. Extensive experimental results show that the proposed techniques significantly improve performance compared to the baseline, and reduce the searchable encryption overhead to a level that is practical in a computing environment with reasonable resources, such as the cloud.

Autoři článku: Demirsandoval5016 (Henderson Ahmad)