منابع مشابه
Prevalence of Bad Habits Among Juvenile Convicts
Objectives: This study was done to assess the spread of bad habits among juvenile convicts and determine the motives for use and the consequences of addiction. Methods: This study was descriptive and carried out at the Federal State Healthcare Institution. The study group included 106 adolescents aged 14 to 19 years. Sample selection was based on a multi-stage sampling method. The research too...
متن کاملManaging away bad habits.
We've all worked with highly competent people who are held back by a seemingly fatal personality flaw. One person takes on too much work; another sees the downside in every proposed change; a third pushes people out of the way. At best, people with these "bad habits" create their own glass ceilings, which limit their success and their contributions to the company. At worst, they destroy their o...
متن کاملFour Bad Habits of Modern Psychologists
Four data sets from studies included in the Reproducibility Project were re-analyzed to demonstrate a number of flawed research practices (i.e., "bad habits") of modern psychology. Three of the four studies were successfully replicated, but re-analysis showed that in one study most of the participants responded in a manner inconsistent with the researchers' theoretical model. In the second stud...
متن کاملStrategies and Bad habits in dealing with email at work
Background and rationale The explosion of new technology communications – email in particular in the workplace, within the last ten to twenty years, has literally been phenomenal. It has changed the way that we organise and deal with our work, and altered our approach to communication entirely (Kraut and Attewell, 1997). Developments in email technology have progressed at a far greater pace tha...
متن کاملBreaking bad: avoiding the 10 worst IT admin habits
In conclusion, any effective mobile security solution should be easy to use, shouldn’t change how users interact with their devices, or adversely impact performance. This includes solutions that tailor responses when threats are identified so that the user experience is impacted only when absolutely necessary. Furthermore, especially when users are using personal devices for work purposes, it m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Index on Censorship
سال: 2004
ISSN: 0306-4220,1746-6067
DOI: 10.1177/030642200403300103