21 resultados para Information libraries, American.


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Children (N = 157) 4 to 8 years old participated 1 time (single) or 4 times (repeated) in an interactive event. Across each condition, half were questioned a week later about the only or a specific occurrence of the event (depth first) and then about what usually happens. Half were prompted in the reverse order (breadth first). Children with repeated experience who first were asked about what usually happens reported more eventrelated information overall than those asked about an occurrence first. All children used episodic language when describing an occurrence; however, children with repeated-event experience used episodic language less often when describing what usually happens than did those with a single experience. Accuracy rates did not differ between conditions. Implications for theories of repeated-event memory are discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The article discusses the Australian government's Higher Education Participation and Partnerships Program. The program aims to encourage greater participation of students from low socioeconomic backgrounds in higher education. The article identifies potential means by which a library may contribute to student retention and outlines one library's approach to investigating its contribution.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Any organisation that captures personal data in Canada for processing is deemed tohave a ‘real and substantial connection’ to Canada and thus fall within thejurisdiction of the Personal Information Protection and Electronic Documents Act(PIPEDA) and of the Office of the Privacy Commissioner of Canada (OPC). Whathas been the experience of enforcing Canadian privacy protection law on US-basedsocial networking services? We analyse some of the high-profile enforcement actionsby the Privacy Commissioner. We also test compliance through an analysis of theprivacy policies of the top 23 SNSs operating in Canada and through the use of accessto personal information requests. Our analysis suggests that non-compliance iswidespread, and is explained by the countervailing conceptions of jurisdictioninherent in corporate policy and technical system design.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent studies have determined that many Android applications in both official and non-official online markets expose details of the users' smartphones without user consent. In this paper, we explain why such applications leak, how they leak and where the data is leaked to. In order to achieve this, we combine static and dynamic analysis to examine Java classes and application behaviour for a set of popular, clean applications from the Finance and Games categories. We observed that all the applications in our data set which leaked information (10%) had third-party advertising libraries embedded in their respective Java packages.