629,139 research outputs found

    Permission request

    Get PDF

    Permission request

    Get PDF

    Permission request

    Get PDF

    Permission request

    Get PDF

    Permission request

    Get PDF

    Permission request

    Get PDF

    The Refusal Strategies Used by the Old and Young Foremen in a Bakery in Surabaya

    Full text link
    This study is mainly about the refusal strategies used by an old foreman and a young foreman in refusing request permission made by the workers. Specifically, it focuses on the comparison between how the old foreman and the young foreman employed the refusal strategies in refusing request. The findings show that both the old foreman and the young foreman mostly employed indirect strateg

    Permission request

    Get PDF

    Determining the Relevancy of Permissions Requested by an Application Software

    Get PDF
    This publication describes methods that an application software market (application market) uses to determine a relevancy-permission score on an application software’s (application) permission requests to access resources, features, user data (e.g., calendar, photos, biometric data), and hardware (e.g., microphones, cameras, global navigation satellite system (GNSS), accelerometers). Depending on the request, an operating system (OS) or the application market may prompt a user to approve the requests. The user, however, may be unsure whether they need to accept or deny a particular permission request made by an application. The user may be unclear whether the access is needed by the application most of the time, some of the time, not needed at all, or whether the request is abusive. To aid the user make informed decisions, the application market uses fuzzing techniques, scripted journeys, data analytics, and machine-learned models to evaluate the permissions requested by the application. After such evaluation, the application market generates a relevancy-permission score for each permission requested by an application, which can be easily-understood by the user of the application before they grant or deny such permission requests
    • …
    corecore