377 research outputs found
Bullying at work: the relation with physical health complaints and the influence of social support
Bullying at work: The relation with physical health complaints and the influence of social support Tessa Haesevoets, Francine Dehue & Mieneke Pouwelse, Gedrag & Organisatie, volume 25, November 2012, nr. 4, pp. 367-399. This survey among Belgian employees (N = 497) investigated, starting from the Michigan Stress Model, the relationships among the amount of and satisfaction with social support, being bullied in the workplace, and physical health complaints. Hierarchical regression analyses confirmed that both person-related and work-related bullying influenced perceived health of victimized employees negatively. There was some evidence for a moderation effect of satisfaction with social support: victims of work-related bullying, who experienced a lack of social support from colleagues, reported more health problems. In addition, it was found that satisfaction with received social support from supervisors affected the relationship between being bullied and health complaints indirectly (i.e., mediation). No effects were found for the amount of received support. These results emphasize the need for future studies investigating the influence of satisfaction with received social support on victimized employees
Building a privacy-preserving semantic overlay for Peer-to-Peer networks
Searching a Peer-to-Peer (P2P) network without using a central index has been widely investigated but proved to be very difficult. Various strategies have been proposed, however no practical solution to date also addresses privacy concerns. By clustering peers which have similar interests, a semantic overlay provides a method for achieving scalable search. Traditionally, in order to find similar peers, a peer is required to fully expose its preferences for items or content, therefore disclosing this private information. However, in a hostile environment, such as a P2P system, a peer can not know the true identity or intentions of fellow peers. In this paper, we propose two protocols for building a semantic overlay in a privacy-preserving manner by modifying existing solutions to the Private Set Intersection (PSI) problem. Peers in our overlay compute their similarity to other peers in the encrypted domain, allowing them to find similar peers. Using homomorphic encryption, peers can carrying out computations on encrypted values, without needing to decrypt them first. We propose two protocols, one based on the inner product of vectors, the other on multivariate polynomial evaluation, which are able to compute a similarity value between two peers. Both protocols are implemented on top of an existing P2P platform and are designed for actual deployment. Using a supercomputer and a dataset extracted from a real world instance of a semantic overlay, we emulate our protocols in a network consisting of a thousand peers. Finally, we show the actual computational and bandwidth usage of the protocols as recorded during those experiments
Pirates and Samaritans: A Decade of Measurements on Peer Production and their Implications for Net Neutrality and Copyright
This study traces the evolution of commons-based peer production by a measurementbased analysis of case studies and disusses the impact of peer production on net neutrality and copyright law. The measurements include websites such asSuprnova. org, Youtube.com, and Facebook.com, and the Peer-to-Peer (P2P) systems Kazaa, Bittorrent, and Tribler. The measurements show the two sides of peer production, the pirate side with free availability of Hollywood movies on these P2P systems and the samaritan side exhibited by the quick joining of 400,000+ people in a community to organize protests against events in Burma. The telecommunications and content industry are disrupted by this way of peer production. As a consequence, revenues of both industries are likely to suffer in the coming years. On the other hand, innovative P2P systems could win the battle on merit over classical distribution technologies. As a result, a continuation is expected of both legal actions against P2P and possible blocking actions of P2P traffic, violating net neutrality. It is argued that this hinders innovation and causes a large discrepancy between legal and user perspectives. A reform of copyright laws are clearly needed, otherwise they will be unenforceable around 2010. Key words: P2P, collaboration, commons-based peer production, copyright
- …
