98 resultados para readers


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article presents a novel approach to data mining that incorporates both positive and negative association rules into the analysis of outbound travelers. Using datasets collected from three large-scale domestic tourism surveys on Hong Kong residents' outbound pleasure travel, different sets of targeted rules were generated to provide promising information that will allow practitioners and policy makers to better understand the important relationship between condition attributes and target attributes. This article will be of interest to readers who want to understand methods for integrating the latest data mining techniques into tourism research. It will also be of use to marketing managers in destinations to better formulate strategies for receiving outbound travelers from Hong Kong, and possibly elsewhere.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose. The purpose of this article is to explore three concepts namely dignity, human rights and capabilities and to argue for their relevance in advancing the theory and practice of rehabilitation.

Method. A narrative review of selected academic writing on the three constructs is considered with respect to the rehabilitation literature.

Results. Each concept is defined and technical terms are explained for readers unfamiliar with these topics. Salient aspects of academic or scientific writing on each of these three topics is summarised and attempts are made to integrate these with rehabilitation.

Conclusions. 
Dignity, rights and capabilities are three concepts that have the potential to enhance theory development in rehabilitation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

E-book devices are changing current organizational practices by providing a source of e-learning, in which organizations and their employees can more easily access information about current business developments that impact on their existing practices. E-book devices (also referred to as e-book readers or e-readers) use electronic ink technology to display written words from books, newspapers, magazines and other documentation. They are portable devices that are the size of a paperback book and are a new technology that has only been mass-marketed to the general population in the past year. Most importantly for an organization is that e-books could transform and will certainly influence their current technology practices and how people communicate and perform their job tasks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Powerpoint presentation presenting an overview of e-books and e-content at Deakin University, revolving around the e-readers trials that were done in 2010 at Deakin University Library.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mass-marketed teen chick lit has become a publishing phenomenon and has begun to attract critical interest among children’s literature scholars. Much of this critical work, however, has shied away from robust critical assessment of the postfeminist conditions informing the production and reception of young adult series like Private, Gossip Girl and Choose Your Own Destiny. Existing analyses may nod to the origins of the genre in women’s chick lit, but do not investigate how the postfeminist construction of ‘empowered’ female (hetero) sexuality translates into chick lit for young adults. Paying particular attention to these issues, this paper draws on feminist critiques of postfeminism to interrogate the implications of the way these novels position readers to understand their sexuality. In doing so, it poses postfeminist criticism as an unconsidered yet significant framework to evaluate novels for teenage girls.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Electronic books (e-books) are rapidly gaining popularity as a technological innovation that will change the way people read books. A social cognitive perspective to understand how a person adopts an e-book device is utilised in this paper to empirically test the results of a survey. A portion of the conceptual model is supported by the results of the survey that demonstrates the importance of an individual's ethics and entrepreneurial orientation to the adoption behaviour they have about e-book devices. This paper highlights for practitioners the importance of focusing on marketing the ethical and innovativeness of e-book devices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

E-readers, or devices designed primarily for reading e-books, are taking the world by storm. Several papers in library studies and education have examined e-book consumption for academic reading. However, no previous marketing study has investigated consumers’ adoption of e-readers for pleasure reading. We address this gap by testing an extended version of the Technology Acceptance Model (TAM) with emotional attachment (TAME) in this context. Consumers’ attachment to paper books is proposed as a barrier to their adoption of e-readers. This speaks to a key deficiency of the TAM, being its focus on cognition at the expense of consumer emotion. A three-phase study finds support for the TAME, with 64% of the variance explained in consumers’ intentions to adopt e-readers. Emotional attachment to paper books is found to be weakly and negatively associated with consumers’ attitude toward using e-readers. The qualitative findings suggest that e-reader adoption may not involve a binary choice between paper and e-formats.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This book examines the source of Chinese civilization, foundations of traditional Chinese society and early patterns of power transition. It engages readers in a search for a broad understanding of China's traditional culture and the enduring legacies of the past-in-the-present. It questions the conventional view about China's past, be that of a Confucian, a Communist or a Western ethnocentric historiographer. Most theories concerning the history of China postulate a central culture based on the Yellow River valley and radiating out into the vast areas of what we know as China. Informed by the latest archaeological discoveries, the author points out an alternative view on formation and development of Chinese civilization. Exploring the social and political upheavals that characterized the continuous disintegration and annexation in the 1st millennium BC, the author offers a unique account of the process of periodic fragmentation and amalgamation. Though presented for specialists in the field, virtually every page of this book is intelligible to the lay person, opening a window for anyone interested in the subject to look at this ancient culture from a new angle.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The arena of ethics and business is a colossus: thousands of books, multiple dedicated journals, de rigueur organizational ethics policies and CSR initiatives - most of which we can be fairly confident would receive poor reviews by the editors and authors of Ethics and organizational practice: Questioning the moral foundations of management. This edited collection is a self-identified ‘critical’ take on business ethics, one that according to the editors’ introduction wishes to ‘expose business ethics to its crises’ and ‘critically investigate(s) what ethics means’. The ‘critical’ which Muhr, Sørensen and Vallentin invoke is one that would be familiar to authors and readers of Critical Management Studies – that is, to use Fournier and Grey’s (2000) oft-referenced depiction, the study of management and organization that is non-performative with regards to managerialist concerns of efficiency and profitability, that seeks to denaturalize taken-for-granted legitimations, and the normalization of current organizational practices and ideologies, and one which demonstrates significant reflexivity with regard to the philosophies and methodologies it deploys. To the above, we may also add pluralism, and indeed some playfulness, with a wide diversity of conceptual, theoretical, historical and popular sources mined for their potential to help us reconsider the organizational present.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we address the problem of securing networked RFID applications. We develop and present a RFID security protocol that allows mutual authentication between the reader and tag as well as secure communication of tag data. The protocol presented uses a hybrid method to provide strong security while ensuring the resource requirements are low. To this end it employs a mix of simple one way hashing and low-cost bit wise operations. Our protocol ensures the confidentiality and integrity of all data being communicated and allows for reliable mutual authentication between tags and readers. The protocol presented is also resistant to a large number of common attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

One of the most critical issues facing investigative organisations is how best to administer effective practice opportunities in investigative interviewing on a global scale. Interviewer evaluation research across the world has highlighted inadequacies in the adherence to and maintenance of best-practice interview approaches, and insufficient opportunities for practice and feedback are the major reasons attributed by experts for poor interviewer competency. “Unreal Interviewing: Virtual Forensic Interviewing of a Child” (an e-simulation created at Deakin University, Australia) was developed as a way to ‘expand the reach’ of trainers in the investigative interviewing area. The simulation enables trainers to provide ongoing professional development for forensic interviewers in dispersed work environments, without the financial burden on organisations of extracting large numbers of professionals from the workplace to the classroom. This chapter provides readers with: an overview of the key stages involved in the development of Unreal Interviewing and the education and technical decisions that needed to be made; and a review of the application of “Unreal Interviewing” in the training and continuing professional development of trainees in their workplace.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Radio Frequency Identification (RFID) technology is becoming increasingly popular as an automated tool for object monitoring and identification in a cost-efficient manner. RFID systems are made up of heterogeneous components consisting of both hardware and software. RFID components such as the readers are prone to failures with serious consequences to the overall system. Thus, issues such as reliability and dependability of RFID systems are receiving attention recently. This mandates fault management that includes monitoring the health of RFID readers and accessing the RFID reader configurations remotely. Therefore, an approach that detects the faulty readers with the aim to minimize the impacts of the faulty readers on the system reliability and dependability is of paramount importance. In this chapter, the authors discuss an approach to detect faulty readers in networked RFID system environments. Performance evaluation of the approach against other techniques is presented and shows that it performs reasonably well in the presence of faulty readers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the last decade RFID technology has become a major contender for managing large scale logistics operations and generating and distributing the massive amount of data involved in such operations. One of the main obstacles to the widespread deployment and adoption of RFID systems is the security issues inherent in them. This is compounded by a noticeable lack of literature on how to identify the vulnerabilities of a RFID system and then effectively identify and develop counter measures to combat the threats posed by those vulnerabilities. In this chapter, the authors develop a conceptual framework for analysing the threats, attacks, and security requirements pertaining to networked RFID systems. The vulnerabilities of, and the threats to, the system are identified using the threat model. The security framework itself consists of two main concepts: (1) the attack model, which identifies and classifies the possible attacks, and (2) the system model, which identifies the security requirements. The framework gives readers a method with which to analyse the threats any given system faces. Those threats can then be used to identify the attacks possible on that system and get a better understanding of those attacks. It also allows the reader to easily identify all the security requirements of that system and identify how those requirements can be met.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The blogosphere has grown to be a mainstream forum of social interaction as well as a commercially attractive source of information and influence. Tools are needed to better understand how communities that adhere to individual blogs are constituted in order to facilitate new personal, socially-focused browsing paradigms, and understand how blog content is consumed, which is of interest to blog authors, big media, and search. We present a novel approach to blog subcommunity characterization by modeling individual blog readers using mixtures of an extension to the LDA family that jointly models phrases and time, Ngram Topic over Time (NTOT), and cluster with a number of similarity measures using Affinity Propagation. We experiment with two datasets: a small set of blogs whose authors provide feedback, and a set of popular, highly commented blogs, which provide indicators of algorithm scalability and interpretability without prior knowledge of a given blog. The results offer useful insight to the blog authors about their commenting community, and are observed to offer an integrated perspective on the topics of discussion and members engaged in those discussions for unfamiliar blogs. Our approach also holds promise as a component of solutions to related problems, such as online entity resolution and role discovery.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The social interactions manifest in blogs by the network of comments left by owners and readers are an under-used resource, both for blog pundits and industry. We present a web-based feed reader that renders these relationships with a graph representation, and enables exploration by displaying people and blogs who are proximate to a user's network. Social Reader is an example of Casual Information Visualization, and aims to help the user understand and explore blog-based social networks in a daily, real-life setting. A six week study of the software involving 20 users confirmed the usefulness of the novel visual display, via a quantitative analysis of use logs, and an exit survey.