Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 62

What do you meme you can get sued for that social post?

https://news.temple.edu/nutshell/2023-03-20/what-do-you-meme-you-can-get-sued-social-post

Laney Griner, the mother of the child who became known as Success Kid and the person who snapped the iconic photo back in 2007, also filed another lawsuit against a fireworks company that used the image of her son to advertise one of its products. The fireworks company settled with Griner for an unspecified amount.

Introduction and Methodology - Temple University

https://community.mis.temple.edu/mis5203sec003spring2020/files/2019/01/COBIT-2019-Framework-Introduction-and-Methodology_res_eng_1118.pdf

About ISACA Nearing positive potential its 50th year, of technology. ISACA®(isaca.org) Technology powers global today’s association world helping and ISACA individuals knowledge, credentials, leverages the expertise of its half-million engaged professionals in information and cyber their organizations. education and community to advance their careers and transform equips professionals ...

THE USE OF FORCE AND CYBER COUNTERMEASURES

https://sites.temple.edu/ticlj/files/2020/02/32.2_Corn_Article02-header-deleted.pdf

ABSTRACT In a global environment where most unfriendly acts between nations fall below the threshold of a use of force, the doctrine of countermeasures can be an important tool for states. However, in the realm of cyber operations, the rules governing the application of countermeasures result in unrealistic constraints on states. Particularly when compared with the much lesser constraints on ...

MATRICES M - Temple University

https://cis.temple.edu/~latecki/Courses/CIS2166-Fall16/Lectures/MatrixAlg1.pdf

A matrix is a rectangular array of numbers or other mathematical objects, for which operations such as addition and multiplication are defined. Most of this article focuses on real matrices, i.e., matrices whose elements are real numbers. For instance, this is a real matrix: The numbers, symbols or expressions in the matrix are called its entries or its elements. The horizontal and vertical ...

Mutual Risk Sharing and Fintech: The Case of Xiang Hu Bao

https://www.fox.temple.edu/sites/fox/files/documents/Cummins%20Conference%202022/XiangHuBao-main-2022-03-23.pdf

Abstract Xiang Hu Bao (XHB), meaning ‘mutual treasury’ in Chinese, is a novel online mutual aid platform operated by Alibaba’s Ant Financial to facilitate risk sharing of critical illness exposures. XHB reached nearly 100 million members in less than one year since its launch and ofered its mem-bers critical illness protections at significantly lower cost than traditional critical ...

1 QoS-aware Online Service Provisioning and Updating in Cost-efficient ...

https://cis.temple.edu/~wu/research/publications/Publication_files/10_bare_jrnl_compsoc.pdf

1.1 Motivation and Challenges Service provisioning and updating refers to the decision-making process of the locations of services within a specific edge computing network to balance the interests of service providers and consumers to achieve the greatest eficiency possible [7]. Numerous mobile devices and sensors in edge networks need to interface with services and exchange data in real-time ...

FW_web.pdf - Temple University

https://community.mis.temple.edu/mis5206sec001fall2021/files/2017/08/ISACA_Risk-IT-Framework_fmk_Eng_0610.pdf

The table’s intent is to provide a one-page overview of the main communication flows on IT risk that should exist in one form or another in any enterprise. More detailed information, e.g., source and destination of information, can be found in the Risk IT process descriptions, in the input and output tables.

Microsoft Word - Article B Bricker.doc

https://sites.temple.edu/ticlj/files/2017/02/27.1.Bricker-TICLJ.pdf

Long ago, American legislatures and courts rejected such a defense for various reasons that make sense under both a utilitarian and retributivist model of punishment.2 Prior to developments in modern medicine, many injuries that are treatable today led to death3 and were treated as murder under different theories such as depraved heart murder. Further, based on the immutable facts in the above ...

Review Summary Generation in Online Systems: Frameworks for Supervised ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/WENJUNJIANG2021TWeb.pdf

In online systems, including e-commerce platforms, many users resort to the reviews or comments generated by previous consumers for decision making, while their time is limited to deal with many reviews. Therefore, a review summary, which contains all important features in user-generated reviews, is expected. In this paper, we study “how to generate a comprehensive review summary from a ...

Balancing Privacy and Accuracy using Significant Gradient Protection in ...

https://cis.temple.edu/~wu/research/publications/Publication_files/J-CT-2024-Balancing%20Privacy%20and%20Accuracy%20using%20Siginificant%20Gradient%20Protection%20in%20Federated%20Learning.pdf

Abstract—Previous state-of-the-art studies have demonstrated that adversaries can access sensitive user data by membership inference attacks (MIAs) in Federated Learning (FL). Intro-ducing differential privacy (DP) into the FL framework is an effective way to enhance the privacy of FL. Nevertheless, in differentially private federated learning (DP-FL), local gradients become excessively ...