نتایج جستجو برای: by enacting laws

تعداد نتایج: 7069902  

2000
Reinhard Oppermann Marcus Specht

The paper describes a nomadic guide that considers the context of use (CoU) for information selection and presentation. A nomadic system is defined by continuous access to information spaces independent from specific devices. The CoU is defined by the location and characteristics of the user. Interests of the user deduced from the navigation in the physical and information space are the main go...

2013
Upasna A Agarwal

Education In contemporary knowledge-intensive organizations, which are characterized by short product life cycles and unhindered access to information and resources, organizational survival, let alone success, necessitates higher-than-average performance. Engaged and committed employees are considered critical resources for organizational survival and business success. Research suggests that th...

2015
Athanasios Drigas Yannis Papagerasimou

It is a well-known fact that despite the rapid growth of technology over the past years, not all people have equal access to information and knowledge. Senior citizens are one major example of people being excluded from the abundance of services that technology has to offer nowadays, which results in feelings of inactiveness, loneliness and isolation. This paper presents a European Project in t...

2007
Hilke Stuempel Gauri Salokhe Anne Aubert Johannes Keizer Andrew Nadeau Stephen Katz Stephen Rudgard

Capacity and institution building is a core function of the Food and Agricultural Organization of the United Nations (FAO). FAO has recently started the “Capacity and Institution Building Portal” to provide structured access to information on FAO’s capacity and institution building services and learning resources. To ensure that the Portal can be searched by users and to enable interoperability...

2007
Lei Zheng

This paper addresses cross-national information policy conflict regarding access to information. This type of information policy conflict appears more complex and controversial than conflicts within one country’s territory. The paper attempts to explore the nature of this cross-national conflict. The responses of the US and Chinese governments and the practices of three multinational companies ...

2013
Arthur Campbell Dina Mayzlin Jiwoong Shin Alessandro Bonatti Odilon Camara Florian Ederer

We model the incentives of individuals to engage in word of mouth (or buzz) about a product, and how a firm may strategically influence this process through its information release and advertising strategies. Individuals receive utility by improving how others perceive them. A firm restricts access to information, advertising may crowd out word of mouth and a credible commitment not to engage i...

Journal: :CoRR 2016
Radoslava Kraleva Velin Kralev Dafina Kostadinova

This article focuses on the possibilities of using mobile learning in the Bulgarian preschool education of young children. The state preschool educational regulations are presented and discussed. The problem concerning the children's safety when using mobile devices in terms of access to information on the Internet is revealed and analyzed. Two conceptual models of applications for mobile learn...

2002
Helen F. Hastie Rashmi Prasad Marilyn A. Walker

Spoken dialogue systems promise efficient and natural access to information services from any phone. Recently, spoken dialogue systems for widely used applications such as email, travel information, and customer care have moved from research labs into commercial use. These applications can receive millions of calls a month. This huge amount of spoken dialogue data has led to a need for fully au...

1998
Claude Frasson Louis Martin Guy Gouardères Esma Aïmeur

The use of Internet as a general vehicle to support distance learning is a recent orientation of learning with multiple positive and negative consequences. The important disadvantage of such an approach is to forget the difference between information and knowledge, between consultation and pedagogy, leading to poor training as a consequence. The need of providing access to information to a larg...

2015
Yurita Abdul Talib Gurpreet Dhillon

Incidents of computer abuse, proprietary information leaks and other security lapses have been on an increase. Most often, such security lapses are attributed to internal employees in organizations subverting established organizational information security policy (ISP). As employee compliance with ISP is the key to escalating information security breaches, understanding employee motivation for ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید