1000 resultados para Internet.


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Internet has been shown to facilitate elements of internationalisation such as information accumulation and network opportunities. However, there is limited understanding of how the Internet combined with marketing capabilities drives international market growth. This study, based on a sample of 224 Australian firms, develops and tests, using structural equation modelling (SEM), a conceptual model of Internet marketing capabilities and international market growth. Results indicate that firms deploying Internet marketing capabilities will benefit due to the reduction of information uncertainty and increased capacity to develop international network capabilities. Moreover, Internet marketing capabilities indirectly lead to international market growth when the firm has a high level of international strategic orientation and international network capabilities. Overall, Internet marketing capabilities enhance the firm's ability to generate other internal capabilities within the firm, which in turn have a positive impact on the international market growth of the firm.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Rhipicephalus micro plus genome is large and complex in structure, making it difficult to assemble a genome sequence and costly to resource the required bioinformatics. In light of this, a consortium of international collaborators was formed to pool resources to begin sequencing this genome. We have acquired and assembled genomic DNA into contigs that represent over 1.8 Gigabase pairs of DNA from gene-enriched regions of the R. micro plus genome. We also have several datasets containing transcript sequences from a number of gene expression experiments conducted by the consortium. A web-based resource was developed to enable the scientific community to access our datasets and conduct analysis through a web-based bioinformatics environment called YABI. The collective bioinformatics resource is termed CattleTickBase. Our consortium has acquired genomic and transcriptomic sequence data at approximately 0.9X coverage of the gene-coding regions of the R. microplus genome. The YABI tool will facilitate access and manipulation of cattle tick genome sequence data as the genome sequencing of R. microplus proceeds. During this process the CattleTickBase resource will continue to be updated. Published by Elsevier Ltd. on behalf of Australian Society for Parasitology Inc.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background A cancer diagnosis elicits greater distress than any other medical diagnosis, and yet very few studies have evaluated the efficacy of structured online self-help therapeutic programs to alleviate this distress. This study aims to assess the efficacy over time of an internet Cognitive Behaviour Therapy (iCBT) intervention (‘Finding My Way’) in improving distress, coping and quality of life for individuals with a recent diagnosis of early stage cancer of any type. Methods/Design The study is a multi-site Randomised Controlled Trial (RCT) seeking to enrol 188 participants who will be randomised to either the Finding My Way Intervention or an attention-control condition. Both conditions are delivered online; with 6 modules released once per week, and an additional booster module released one month after program-completion. Participants complete online questionnaires on 4 occasions: at baseline (immediately prior to accessing the modules); post-treatment (immediately after program-completion); then three and six months later. Primary outcomes are general distress and cancer-specific distress, with secondary outcomes including Health-Related Quality of Life (HRQoL), coping, health service utilisation, intervention adherence, and user satisfaction. A range of baseline measures will be assessed as potential moderators of outcomes. Eligible participants are individuals recently diagnosed with any type of cancer, being treated with curative intent, aged over 18 years with sufficient English language literacy, internet access and an active email account and phone number. Participants are blinded to treatment group allocation. Randomisation is computer generated and stratified by gender. Discussion Compared to the few prior published studies, Finding My Way will be the first adequately powered trial to offer an iCBT intervention to curatively treated patients of heterogeneous cancer types in the immediate post-diagnosis/treatment period. If found efficacious, Finding My Way will assist with overcoming common barriers to face-to-face therapy in a cost-effective and accessible way, thus helping to reduce distress after cancer diagnosis and consequently decrease the cancer burden for individuals and the health system. Trial registration Australian New Zealand Clinical Trials Registry ACTRN12613000001​796 16.10.13

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper explores the endeavours of five small firms to develop web-based commerce capabilities within their existing operations. The focus is upon the strategic acquisition and exploitation of knowledge which underpins new value creating activates related to web-based commerce. A normative web-based commerce adoption model developed from a review of the extant literature related to electronic marketing, entrepreneurship, and the diffusion of new innovations was empirically tested. A multiple case study design enabled the exploration of contemporary marketing and entrepreneurship issues within the real life context of five small firms. The model aimed to emphasis best-practice adoption methods emphasizing the value of a firm's market orientation and entrepreneurial capabilities. A preliminary test of the model's theoretical contentions lent support to its overall focus, but found that the firm's existing learning capabilities were diminished during the adoption of web-based commerce, and that a lack of vision and prior knowledge produced sub-optimal adoption outcomes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fundamental to the development of new customer value offerings via web-based commerce is a small firm's ability to strategically acquire and exploit knowledge. The focus of this paper is the empirical testing of a normative web-based commerce adoption model developed from a review of the extant literature related to electronic marketing, the Internet and the diffusion of new innovations. A preliminary test of the model's theoretical contentions lent support to its overall focus, but found that the firm's existing learning capabilities were diminished during the adoption of web-based commerce. Consequently, sub-optimal adoption outcomes were associated with insufficient knowledge development.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this thesis we study a series of multi-user resource-sharing problems for the Internet, which involve distribution of a common resource among participants of multi-user systems (servers or networks). We study concurrently accessible resources, which for end-users may be exclusively accessible or non-exclusively. For all kinds we suggest a separate algorithm or a modification of common reputation scheme. Every algorithm or method is studied from different perspectives: optimality of protocols, selfishness of end users, fairness of the protocol for end users. On the one hand the multifaceted analysis allows us to select the most suited protocols among a set of various available ones based on trade-offs of optima criteria. On the other hand, the future Internet predictions dictate new rules for the optimality we should take into account and new properties of the networks that cannot be neglected anymore. In this thesis we have studied new protocols for such resource-sharing problems as the backoff protocol, defense mechanisms against Denial-of-Service, fairness and confidentiality for users in overlay networks. For backoff protocol we present analysis of a general backoff scheme, where an optimization is applied to a general-view backoff function. It leads to an optimality condition for backoff protocols in both slot times and continuous time models. Additionally we present an extension for the backoff scheme in order to achieve fairness for the participants in an unfair environment, such as wireless signal strengths. Finally, for the backoff algorithm we suggest a reputation scheme that deals with misbehaving nodes. For the next problem -- denial-of-service attacks, we suggest two schemes that deal with the malicious behavior for two conditions: forged identities and unspoofed identities. For the first one we suggest a novel most-knocked-first-served algorithm, while for the latter we apply a reputation mechanism in order to restrict resource access for misbehaving nodes. Finally, we study the reputation scheme for the overlays and peer-to-peer networks, where resource is not placed on a common station, but spread across the network. The theoretical analysis suggests what behavior will be selected by the end station under such a reputation mechanism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is a widely held view that the nation-state has become less central to media and communications policy over the last two decades. As Jan van Cuilenberg and Denis McQuail (2003, p. 181) observed in their overview of trends in communications policy-making, 'the old normative media policies have been challenged and policy-makers are searching for a new communications policy paradigm'. There are characteristically five factors put forward as to why the nation-state has become less central to media in the twenty-first century

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile RFID services for the Internet of Things can be created by using RFID as an enabling technology in mobile devices. Humans, devices, and things are the content providers and users of these services. Mobile RFID services can be either provided on mobile devices as stand-alone services or combined with end-to-end systems. When different service solution scenarios are considered, there are more than one possible architectural solution in the network, mobile, and back-end server areas. Combining the solutions wisely by applying the software architecture and engineering principles, a combined solution can be formulated for certain application specific use cases. This thesis illustrates these ideas. It also shows how generally the solutions can be used in real world use case scenarios. A case study is used to add further evidence.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This work combines the cognitive theory of folk-theoretical thought with the classical Aristotelian theory of artistic proof in rhetoric. The first half of the work discusses the common ground shared by the elements of artistic proof (logos, pathos, ethos) and the elements of folk-theoretical thought (naïve physics, folk biology, folk psychology, naïve sociology). Combining rhetoric with the cognitive theory of folk-theoretical thought creates a new point of view for argumentation analysis. The logos of an argument can be understood as the inferential relations established between the different parts of an argument. Consequently, within this study the analysis of logos is to be viewed as the analysis of the inferential folk-theoretical elements that make the suggested factual states-of-things appear plausible within given argumentative structures. The pathos of an argumentative structure can be understood as determining the quality of the argumentation in question in the sense that emotive elements play a great part in what can be called a distinction between good and deceptive rhetoric. In the context of this study the analysis of pathos is to be viewed as the analysis of the emotive content of argumentative structures and of whether they aim at facilitating surface- or deep cognitive elaboration of the suggested matters. The ethos of an argumentative structure means both the speaker-presentation and audience-construct that can be discerned within a body of argumentation. In the context of this study, the analysis of ethos is to be understood as the analysis of mutually manifest cognitive environments in the context of argumentation. The theory is used to analyse Catholic Internet discussion concerning cloning. The discussion is divided into six themes: Human Dignity, Sacred Family, Exploitation / Dehumanisation, Playing God, Monsters and Horror Scenarios and Ensoulment. Each theme is analysed for both the rhetorical and the cognitive elements that can be seen creating persuasive force within the argumentative structures presented. It is apparent that the Catholic voices on the Internet extensively oppose cloning. The voices utilise rhetoric that is aggressive and pejorative more often than not. Furthermore, deceptive rhetoric (in the sense presented above) plays a great part in argumentative structures of the Catholic voices. The theory of folk-theoretical thought can be seen as a useful tool for analysing the possible reasons why the Catholic speakers think about cloning and choose to present cloning in their argumentation as they do. The logos utilized in the argumentative structures presented can usually be viewed as based on folk-theoretical inference concerning biology and psychology. The structures of pathos utilized generally appear to aim at generating fear appeal in the assumed audiences, often incorporating counter-intuitive elements. The ethos utilised in the arguments generally revolves around Christian mythology and issues of social responsibility. These structures can also be viewed from the point of view of folk psychology and naïve sociological assumptions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Globalization, along with its digital and information communication technology counterparts, including the Internet and cyberspace, may signify a whole new era for human rights, characterized by new tensions, challenges, and risks for human rights, as well as new opportunities. Human Rights and Risks in the Digital Era: Globalization and the Effects of Information Technologies explores the emergence and evolution of ‘digital’ rights that challenge and transform more traditional legal, political, and historical understandings of human rights. Academic and legal scholars will explore individual, national, and international democratic dilemmas--sparked by economic and environmental crises, media culture, data collection, privatization, surveillance, and security--that alter the way individuals and societies think about, regulate, and protect rights when faced with new challenges and threats. The book not only uncovers emerging changes in discussions of human rights, it proposes legal remedies and public policies to mitigate the challenges posed by new technologies and globalization.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Human age is surrounded by assumed set of rules and behaviors imposed by local culture and the society they live in. This paper introduces software that counts the presence of a person on the Internet and examines the activities he/she conducts online. The paper answers questions such as how "old" are you on the Internet? How soon will a newbie be exposed to adult websites? How long will it take for a new Internet user to know about social networking sites? And how many years a user has to surf online to celebrate his/her first "birthday" of Internet presence? Paper findings from a database of 105 school and university students containing their every click of first 24 hours of Internet usage are presented. The findings provide valuable insights for Internet Marketing, ethics, Internet business and the mapping of Internet life with real life. Privacy and ethical issues related to the study have been discussed at the end. © Springer Science+Business Media B.V. 2010.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In late 2010, the online nonprofit media organization WikiLeaks published classified documents detailing correspondence between the U.S. State Department and its diplomatic missions around the world, numbering around 250,000 cables. These diplomatic cables contained classified information with comments on world leaders, foreign states, and various international and domestic issues. Negative reactions to the publication of these cables came from both the U.S. political class (which was generally condemnatory of WikiLeaks, invoking national security concerns and the jeopardizing of U.S. interests abroad) and the corporate world, with various companies ceasing to continue to provide services to WikiLeaks despite no legal measure (e.g., a court injunction) forcing them to do so. This article focuses on the legal remedies available to WikiLeaks against this corporate suppression of its speech in the U.S. and Europe since these are the two principle arenas in which the actors concerned are operating. The transatlantic legal protection of free expression will be considered, yet, as will be explained in greater detail, the legal conception of this constitutional and fundamental right comes from a time when the state posed the greater threat to freedom. As a result, it is not generally enforceable against private, non-state entities interfering with speech and expression which is the case here. Other areas of law, namely antitrust/competition, contract and tort will then be examined to determine whether WikiLeaks and its partners can attempt to enforce their right indirectly through these other means. Finally, there will be some concluding thoughts about the implications of the corporate response to the WikiLeaks embassy cables leak for freedom of expression online.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We provide analytical models for capacity evaluation of an infrastructure IEEE 802.11 based network carrying TCP controlled file downloads or full-duplex packet telephone calls. In each case the analytical models utilize the attempt probabilities from a well known fixed-point based saturation analysis. For TCP controlled file downloads, following Bruno et al. (In Networking '04, LNCS 2042, pp. 626-637), we model the number of wireless stations (STAs) with ACKs as a Markov renewal process embedded at packet success instants. In our work, analysis of the evolution between the embedded instants is done by using saturation analysis to provide state dependent attempt probabilities. We show that in spite of its simplicity, our model works well, by comparing various simulated quantities, such as collision probability, with values predicted from our model. Next we consider N constant bit rate VoIP calls terminating at N STAs. We model the number of STAs that have an up-link voice packet as a Markov renewal process embedded at so called channel slot boundaries. Analysis of the evolution over a channel slot is done using saturation analysis as before. We find that again the AP is the bottleneck, and the system can support (in the sense of a bound on the probability of delay exceeding a given value) a number of calls less than that at which the arrival rate into the AP exceeds the average service rate applied to the AP. Finally, we extend the analytical model for VoIP calls to determine the call capacity of an 802.11b WLAN in a situation where VoIP calls originate from two different types of coders. We consider N-1 calls originating from Type 1 codecs and N-2 calls originating from Type 2 codecs. For G711 and G729 voice coders, we show that the analytical model again provides accurate results in comparison with simulations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This one-day workshop brings together researchers and practitioners to share knowledge and practices on how people can connect and interact with the Internet of Things in a playful way. Open to participants with a diverse range of interests and expertise, and by exploring novel ways to playfully connect people through their everyday objects and activities, the workshop will facilitate discussion across a range of HCI discipline areas. The outcomes from the workshop will include an archive of participants' initial position papers along with the materials created during the workshop. The result will be a road map to support the development of a Model of Playful Connectedness, focusing on how best to design and make playful networks of things, identifying the challenges that need to be addressed in order to do so.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Osallistavan suunnittelun määrä Suomessa on viime vuosina kasvanut huomattavasti. Asukaskyselyt ovat yksi tapa osallistaa asukkaita, ja ne sopivat erityisesti suuren yleisön osallistamiseen. Internetissä toteutetut asukaskyselyt nopeuttaisivat ja helpottaisivat asukaskyselyiden tekemistä mm. siksi, että tieto voidaan tallentaa suoraan sähköiseen muotoon. Internetin käyttö asukaskyselyiden tekemisessä on kuitenkin uusi menetelmä, josta on vasta vähän tutkimustietoa. Ongelmallista Internet-kyselyissä on se, että kasvaneista käyttäjämääristä huolimatta kaikilla ei edelleenkään ole mahdollisuutta käyttää Internetiä. Lisäksi Internet-kyselyn otos on yleensä valikoitunut ja otoskoon määritteleminen on hankalaa. Tutkielma toteutettiin osana Kuopion kaupungin Puijon alueen vuorovaikutteista suunnitteluprosessia. Tutkielman tavoitteena oli vertailla Internet-kyselyä postikyselyyn, jotta saataisiin selville, onko Internet-kysely kelvollinen osallistamismenetelmä. Lisäksi tavoitteena oli profiloida vastaajia mielipiteiden ja taustamuuttujien perusteella. Tutkielman aineistona oli Kuopiossa tammikuussa 2009 toteutetun, Puijon aluetta koskevan asukaskyselyn tulokset. Aineiston analysointiin käytettiin faktorianalyysia, klusterianalyysia, erotteluanalyysia ja korrespondenssianalyysia. Katoa tutkittiin ?2-testillä ja laskemalla ristitulosuhteet. Sekä Internet- että postikyselyn vastaajista muodostuivat Tyytymättömien, Tyytyväisten ja Luonnonsuojelijoiden vastaajaryhmät, joilla olivat melko samanlaiset mielipiteet ja taustamuuttujat molemmissa aineistoissa. Tyytymättömät olivat tyytymättömiä Puijon alueen nykytilaan eivätkä arvostaneet Puijoa. Myös Luonnonsuojelijat olivat tyytymättömiä Puijon alueen ja metsien nykyiseen hoitoon, mutta eivät kannattaneet metsänhoitoa. Tyytyväisten mielestä Puijon alueella kaikki on nyt kunnossa. Lisäksi postikyselyn aineistosta muodostui Kehittäjät-ryhmä ja Internet-kyselyn vastaajista Virkistäytyjät-ryhmä. Internet-kyselyssä 46–60-vuotiaat ja korkeakoulutetut olivat yliedustettuina, mutta kummallakaan kyselyllä ei saatu edustavaa otosta kuopiolaisista. Katoa oli paljon. Edes keskustelua herättänyt aihe ei riittänyt aktivoimaan kuopiolaisia vastaamaan kyselyyn ja tutkielmassa käytettyjen tutkimusmenetelmien kannalta kyselylomake oli puutteellinen. Tämän tutkielman tuloksista saatiin lopulta lähinnä suuntaviivoja Puijon suunnitelmaehdotuksille. Kunnissa tarvitaan uusia työkaluja osallistamiseen, ja tähän tarpeeseen Internet-kysely olisi kustannustehokas vastaus. Sen vuoksi Internet-kyselyä kannattaa edelleen tutkia ja kehittää. Internet-kyselyllä olisi mahdollista saada edustavampi otos, jos vastaajat valittaisiin satunnaisotannalla ja he saisivat salasanan kyselyyn. Myös kaikille avoimella kyselyllä voitaisiin kartoittaa mielipiteitä, kunhan tuloksia tulkittaisiin kriittisesti.