منابع مشابه
Patients Emotions during Meal Experience: Understanding through Critical Incident Technique
Background and Objectives: It was established that eating experience may affect patients emotionally. Acknowledging the role and understanding the basis of patients’ emotions in their food consumption may assist in identifying their nutritional status as well as their satisfaction with foodservice. To date, there are limited studies focusing on patients’ food-related emotional ...
متن کاملIncident Management and Incident Response: The Case of Sweden
This paper reports from an ongoing field study of police practice in Sweden. The field study consists of direct observations and conversational interviews. The paper discusses current police everyday practice in a district of Sweden in relation to the reactive policing model and to the problem oriented policing model. The paper proposes a tentative taxonomy combining the two models and discusse...
متن کاملAnaesthesia Incident Monitoring Study
The "critical incident technique" was described by Flanagan in 19541, when it was used to reduce loss of military pilots and aircraft during training. Jeffry Cooper in 1978 introduced it into anaesthesia as a method to study errors during administration of anaesthesia2 • He defined a critical incident as an occurrence that could have led (if not discovered or corrected in time) or did lead to a...
متن کاملLearning Traffic Incident Detectors
Automated traffic monitoring and traffic incident detection is becoming a reality thanks to expanding networks of traffic sensors placed on US highways. However, the current state-of-the-art incident detection systems employ algorithms that require significant manual tuning. In this work, we study machine learning traffic detection solutions that are intended to reduce the need for the time con...
متن کاملThe Internet Worm Incident
On the cvening of 2 November 1988. someone "inrccLcd" lhe Internet with a worm progrnm. That progrnm exploited flaws in utility progrnms in systems based on BSD-derived versions of UNIX. The flaws allowed lhc program to break into those machines and copy itself. thus infccling those syslems. This program eventually spread to thousands of machines. and disrupted nonnal activities and Inlcrnet co...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Blue Jay
سال: 1980
ISSN: 2562-5667,0006-5099
DOI: 10.29173/bluejay4577