831 resultados para The Internet
Resumo:
The reason for this study is to propose a new quantitative approach on how to assess the quality of Open Access University Institutional Repositories. The results of this new approach are tested in the Spanish University Repositories. The assessment method is based in a binary codification of a proposal of features that objectively describes the repositories. The purposes of this method are assessing the quality and an almost automatically system for updating the data of the characteristics. First of all a database was created with the 38 Spanish institutional repositories. The variables of analysis are presented and explained either if they are coming from bibliography or are a set of new variables. Among the characteristics analyzed are the features of the software, the services of the repository, the features of the information system, the Internet visibility and the licenses of use. Results from Spanish universities ARE provided as a practical example of the assessment and for having a picture of the state of the development of the open access movement in Spain.
Resumo:
The integrated system of design for manufacturing and assembly (DFMA) and internet based collaborative design are presented to support product design, manufacturing process, and assembly planning for axial eccentric oil-pump design. The presented system manages and schedules group oriented collaborative activities. The design guidelines of internet based collaborative design & DFMA are expressed. The components and the manufacturing stages of axial eccentric oil-pump are expressed in detail. The file formats of the presented system include the data types of collaborative design of the product, assembly design, assembly planning and assembly system design. Product design and assembly planning can be operated synchronously and intelligently and they are integrated under the condition of internet based collaborative design and DFMA. The technologies of collaborative modelling, collaborative manufacturing, and internet based collaborative assembly for the specific pump construction are developed. A seven-security level is presented to ensure the security of the internet based collaborative design system.
Resumo:
Testaus on tänä päivänä olennainen osa tuotekehitysprosessia koko tuotteen elinkaaren ajan, myös tietoliikennetekniikassa. Tietoverkoille asetetut tiukat vaatimukset ympärivuorokautisen toimivuuden suhteen nostavatmyös niiden testauksen tason ja laadun merkitystä. Erityisesti verkkojen uudet toiminnallisuudet, joilla ei ole vielä vuosia kestäneen käytön ja kehityksen tuomaa varmuus- ja laatutasoa, tuovat haasteita testauksen toteutukselle. Televisiokuvan välityksen Internetin yli mahdollistavat ominaisuudet ovat esimerkki tällaisista toiminnallisuuksista. Tässä diplomityössä käsitellään Tellabs Oy:n tuotekehitysosastolla vuosina 2005 ja 2006 toteutetun, erään operaattorin laajakaistaliityntäverkon päivitysprojektin testausosuutta. Kattavamman tarkastelun kohteena ovat erityisesti verkkoon lisättyjen laajakaistatelevisio- eli IPTV-toiminnallisuuksien integraatio- ja systeemitestausmenetelmät.
Resumo:
Internetin käyttö on yleistynyt valtavasti viimeisen kymmenen vuoden aikana. Internetissä kuluttajalta puuttuu kasvokkainen kontakti myyjään, mikä voi vähentää kuluttajan luottamusta myyjää kohtaan. Tällaisessa tilanteessa kuluttaja voi käyttää brändejä viitteenä myyjän luotettavuudesta. Tämän tutkielman tarkoituksena on tutkia brändiluottamuksen vaikutusta kuluttajan tyytyväisyyteen, luottamukseen ja uskollisuuteen Internet-sivuja kohtaan. Tutkielman kysely (n=875) toteutettiin Vauva-lehden Internet-sivuilla. Tutkielman tulokset paljastavat, että brändiluottamuksella on merkittävä myönteinen vaikutus kuluttajan tyytyväisyyteen, luottamukseen ja uskollisuuteen Internet-sivuja kohtaan. Internet-sivujen aikaisempikäyttö sekä rekisteröityminen sivuille vaikuttavat myös luottamukseen Internet-sivuja kohtaan. Lisäksi brändiluottamuksen vaikutus brändiuskollisuuden osoittautui erittäin merkittäväksi.
Resumo:
This study focuses on the status of using the Internet in partnership development. The aim is to find out howthe parties in partnership can benefit from the available data networks (the Internet, Intranet and Extranet). The study also explains what the typical practices at the moment are and what features might be exploitable in the future. The research problem is to find out whether there are any possibilities to utilize the web more than is done at the moment. This study is a preliminary study for a more extensive study on the topic 'Information Technology in Business Relationships'.
Resumo:
1. Introduction "The one that has compiled ... a database, the collection, securing the validity or presentation of which has required an essential investment, has the sole right to control the content over the whole work or over either a qualitatively or quantitatively substantial part of the work both by means of reproduction and by making them available to the public", Finnish Copyright Act, section 49.1 These are the laconic words that implemented the much-awaited and hotly debated European Community Directive on the legal protection of databases,2 the EDD, into Finnish Copyright legislation in 1998. Now in the year 2005, after more than half a decade of the domestic implementation it is yet uncertain as to the proper meaning and construction of the convoluted qualitative criteria the current legislation employs as a prerequisite for the database protection both in Finland and within the European Union. Further, this opaque Pan-European instrument has the potential of bringing about a number of far-reaching economic and cultural ramifications, which have remained largely uncharted or unobserved. Thus the task of understanding this particular and currently peculiarly European new intellectual property regime is twofold: first, to understand the mechanics and functioning of the EDD and second, to realise the potential and risks inherent in the new legislation in economic, cultural and societal dimensions. 2. Subject-matter of the study: basic issues The first part of the task mentioned above is straightforward: questions such as what is meant by the key concepts triggering the functioning of the EDD such as presentation of independent information, what constitutes an essential investment in acquiring data and when the reproduction of a given database reaches either qualitatively or quantitatively the threshold of substantiality before the right-holder of a database can avail himself of the remedies provided by the statutory framework remain unclear and call for a careful analysis. As for second task, it is already obvious that the practical importance of the legal protection providedby the database right is in the rapid increase. The accelerating transformationof information into digital form is an existing fact, not merely a reflection of a shape of things to come in the future. To take a simple example, the digitisation of a map, traditionally in paper format and protected by copyright, can provide the consumer a markedly easier and faster access to the wanted material and the price can be, depending on the current state of the marketplace, cheaper than that of the traditional form or even free by means of public lending libraries providing access to the information online. This also renders it possible for authors and publishers to make available and sell their products to markedly larger, international markets while the production and distribution costs can be kept at minimum due to the new electronic production, marketing and distributionmechanisms to mention a few. The troublesome side is for authors and publishers the vastly enhanced potential for illegal copying by electronic means, producing numerous virtually identical copies at speed. The fear of illegal copying canlead to stark technical protection that in turn can dampen down the demand for information goods and services and furthermore, efficiently hamper the right of access to the materials available lawfully in electronic form and thus weaken the possibility of access to information, education and the cultural heritage of anation or nations, a condition precedent for a functioning democracy. 3. Particular issues in Digital Economy and Information Networks All what is said above applies a fortiori to the databases. As a result of the ubiquity of the Internet and the pending breakthrough of Mobile Internet, peer-to-peer Networks, Localand Wide Local Area Networks, a rapidly increasing amount of information not protected by traditional copyright, such as various lists, catalogues and tables,3previously protected partially by the old section 49 of the Finnish Copyright act are available free or for consideration in the Internet, and by the same token importantly, numerous databases are collected in order to enable the marketing, tendering and selling products and services in above mentioned networks. Databases and the information embedded therein constitutes a pivotal element in virtually any commercial operation including product and service development, scientific research and education. A poignant but not instantaneously an obvious example of this is a database consisting of physical coordinates of a certain selected group of customers for marketing purposes through cellular phones, laptops and several handheld or vehicle-based devices connected online. These practical needs call for answer to a plethora of questions already outlined above: Has thecollection and securing the validity of this information required an essential input? What qualifies as a quantitatively or qualitatively significant investment? According to the Directive, the database comprises works, information and other independent materials, which are arranged in systematic or methodical way andare individually accessible by electronic or other means. Under what circumstances then, are the materials regarded as arranged in systematic or methodical way? Only when the protected elements of a database are established, the question concerning the scope of protection becomes acute. In digital context, the traditional notions of reproduction and making available to the public of digital materials seem to fit ill or lead into interpretations that are at variance with analogous domain as regards the lawful and illegal uses of information. This may well interfere with or rework the way in which the commercial and other operators have to establish themselves and function in the existing value networks of information products and services. 4. International sphere After the expiry of the implementation period for the European Community Directive on legal protection of databases, the goals of the Directive must have been consolidated into the domestic legislations of the current twenty-five Member States within the European Union. On one hand, these fundamental questions readily imply that the problemsrelated to correct construction of the Directive underlying the domestic legislation transpire the national boundaries. On the other hand, the disputes arisingon account of the implementation and interpretation of the Directive on the European level attract significance domestically. Consequently, the guidelines on correct interpretation of the Directive importing the practical, business-oriented solutions may well have application on European level. This underlines the exigency for a thorough analysis on the implications of the meaning and potential scope of Database protection in Finland and the European Union. This position hasto be contrasted with the larger, international sphere, which in early 2005 does differ markedly from European Union stance, directly having a negative effect on international trade particularly in digital content. A particular case in point is the USA, a database producer primus inter pares, not at least yet having aSui Generis database regime or its kin, while both the political and academic discourse on the matter abounds. 5. The objectives of the study The above mentioned background with its several open issues calls for the detailed study of thefollowing questions: -What is a database-at-law and when is a database protected by intellectual property rights, particularly by the European database regime?What is the international situation? -How is a database protected and what is its relation with other intellectual property regimes, particularly in the Digital context? -The opportunities and threats provided by current protection to creators, users and the society as a whole, including the commercial and cultural implications? -The difficult question on relation of the Database protection and protection of factual information as such. 6. Dsiposition The Study, in purporting to analyse and cast light on the questions above, is divided into three mainparts. The first part has the purpose of introducing the political and rationalbackground and subsequent legislative evolution path of the European database protection, reflected against the international backdrop on the issue. An introduction to databases, originally a vehicle of modern computing and information andcommunication technology, is also incorporated. The second part sets out the chosen and existing two-tier model of the database protection, reviewing both itscopyright and Sui Generis right facets in detail together with the emergent application of the machinery in real-life societal and particularly commercial context. Furthermore, a general outline of copyright, relevant in context of copyright databases is provided. For purposes of further comparison, a chapter on the precursor of Sui Generi, database right, the Nordic catalogue rule also ensues. The third and final part analyses the positive and negative impact of the database protection system and attempts to scrutinize the implications further in the future with some caveats and tentative recommendations, in particular as regards the convoluted issue concerning the IPR protection of information per se, a new tenet in the domain of copyright and related rights.
Resumo:
AIM: This study examined whether problematic Internet use was associated with substance use among young adolescents and assessed whether this association accounted for the use of tobacco, alcohol, cannabis and other drugs. METHODS: Using the Internet Addiction Test, we divided a representative sample of 3067 adolescents in Switzerland (mean age 14 years) into regular and problematic Internet users. We performed a bivariate analysis and two logistic regression models, to analyse substances separately and simultaneously, and developed a log-linear model to define the associations between significant variables. RESULTS: Problematic Internet users were more likely to be female, to use substances, to come from nonintact families, to report poor emotional well-being and to be below average students. The first model showed significant associations between problematic users and each substance, with adjusted odds ratios of 2.05 for tobacco, 1.72 for alcohol, 1.94 for cannabis and 2.73 for other drugs. Only smoking remained significant in the second model, with an adjusted odds ratio of 1.71. CONCLUSION: Problematic Internet use is associated with other risky behaviours and may be an important early predictor of adolescent substance use. Therefore, it should be included in the psychosocial screening of adolescents.
Resumo:
Tässä diplomityössä perehdytään WAP:in Push -viitekehykseen. WAP-standardit määrittelevät kuinka Internet-tyyppisiä palveluita, joita voidaan käyttää erilaisia mobiileja päätelaiteitteita käyttäen, toteutetaan tehokkaalla ja verkkoteknologiasta riippumattomalla tavalla. WAP pohjautuu Internet:iin, mutta huomioi pienten päätelaitteiden ja mobiiliverkkojen rajoitukset ja erikoisominaisuudet. WAP Push viitekehys määrittelee verkon aloittaman palvelusisällön toimittamisen. Työn teoriaosassa käydään läpi yleinen WAP-arkkitehtuuri ja WAP-protokollapino käyttäen vertailukohtina lanka-Internetin arkkitehtuuria ja protokollapinoa. Edellistä perustana käyttäen tutustaan WAP Push -viitekehykseen. Käytännönosassa kuvataan WAP Push -välityspalvelimen suunnittelu ja kehitystyö. WAP Push -välityspalvelin on keskeinen verkkoelementti WAP Push -viitekehyksessä. WAP Push -välityspalvelin yhdistää Internetin ja mobiiliverkon tavalla, joka piilottaa teknologiaeroavaisuudet Internetissä olevalta palveluntuottajalta.
Resumo:
The objective of this Master’s Thesis was to develop an Internet advertising planning process. After the process had been created, it was compared to case-companies. Case-companies Sek & Grey and Hasan & Partners are the biggest advertising agencies in Finland. Case companies Dagmar and OMD Finland are the biggest media agencies in Finland. Eera Finland completed Sek & Grey´s view of the Internet advertising. Eera Finland is one of the most successful consulting agencies in Finland. In the theoretical part of this thesis, an advertising planning process, used for traditional media, was researched. Because Internet is a global medium, the influence of global advertising on Internet advertising has also been examined. Internet has important characteristics that affect the advertising process. The qualitative part of the study was implemented by interviewing these case-companies. The study used Yin’s ´multiple-case unit of analysis´ approach. Empirical part presented a four companies way to do Internet advertising. Their Internet advertising models were based on advertising processes used for traditional media. Case-companies Internet advertising models and the way to practice Internet advertising are very similar. The final chapter in the end concluded the main findings, theoretical contribution, managerial implications and suggested subjects for further research.
Resumo:
Neljännen sukupolven mobiiliverkot yhdistävät saumattomasti televerkot, Internetin ja niiden palvelut. Alkuperin Internetiä käytettiin vain paikallaan pysyviltä tietokoneilta perinteisten televerkkojen tarjotessa puhelin- ja datapalveluita. Neljännen sukupolven mobiiliverkkojen käyttäjät voivat käyttää sekä Internetiin perustuvia että perinteisten televerkkojen palveluita liikkuessaankin. Tämä diplomityö esittelee neljännen sukupolven mobiiliverkon yleisen arkkitehtuurin. Arkkitehtuurin perusosat kuvaillaan ja arkkitehtuuria verrataan toisen ja kolmannen sukupolven mobiiliverkkoihin. Aiheeseen liittyvät Internet-standardit esitellään ja niiden soveltuvuutta mobiiliverkkoihin pohditaan. Langattomia, lyhyen kantaman nopeita liitäntäverkkotekniikoita esitellään. Neljännen sukupolven mobiiliverkoissa tarvittavia päätelaitteiden ja käyttäjien liikkuvuuden hallintamenetelmiä esitellään. Esitelty arkkitehtuuri perustuu langattomiin, lyhyen kantaman nopeisiin liitäntäverkkotekniikoihin ja Internet-standardeihin. Arkkitehtuuri mahdollistaa yhteydet toisiin käyttäjiin ilman tietoa heidän senhetkisestä päätelaitteesta tai sijainnista. Internetin palveluitavoidaan käyttää missä tahansa neljännen sukupolven mobiiliverkon alueella. Yleiskäytöistä liikkuvuuden hallintamenetelmää yhden verkon alueelle ehdotetaan. Menetelmää voidaan käyttää yhdessä esitellyn arkkitehtuurin kanssa.
Resumo:
Workflow technology is expanding rapidly. In doing so, new technologies are employed. The internet, which is one such technology, could allow every user within an organization to make use of workflow. The internet- based workflows are discussed in this thesis from technical and, also, from economical points of view. First, as an ampler introduction, there are presented the basic concepts related to this topic: the workflow concept, about processes and workflows and the workflow management system. Also in this introduction it is discussed about the XML language and the overview of the Web Services stack. Then is explained how the internet-based workflows work: is presented the architecture of an internet-based enterprise and, also, the flows between web-services. Finally, there are presented, briefly, some workflow languages. In addition, based on this knowledge, a sample workflow was implemented.
Resumo:
Internet-palveluntarjoaja haluaa tarjota palveluitaan vain omille asiakkailleen. Niinpä Internetin käyttäjien autentikointi on tärkeä osa Internet-palveluntarjoajan kokonaisjärjestelmässä. Jopa asiakkaiden laskutus saattaa perustua luotettavaan autentikointiin. Internet-palveluntarjoajan autentikointijärjestelmä perustuu usein AAA-malliin, joka pitää sisällään käyttäjien autentikoinnin, auktorisoinnin ja käyttötilastojen keräämisen. Tässä työssä esitellään AAA-mallia ja autentikointijärjestelmään läheisesti liittyviä muita teknologioita. Työn käytännön osassa tutustutaan Internet-palveluntarjoajan AAA-ohjelmiston uusimiseen. Tuloksena oli tulevaisuuden tarpeisiin paremmin sopiva AAAjärjestelmä. Samalla esitellään myös joitakin ideoita järjestelmän kehittämiseksi edelleen.
Resumo:
Diplomityö on tehty Lappeenrannan teknillisen korkeakoulun tuotantotalouden osastolla. Työ on osa Asiakastarpeiden kustannus- ja aikatehokas selvittäminen kansainvälisiltä markkinoilta (Kannasta) -projektia. Työn tarkoituksena oli tutkia Internetiä asiakastarvekartoituksessa. Työn tavoitteena oli kar-toittaa Internetin avulla käytettäviä asiakastarvetiedon lähteitä tuotekehitykselle ja esitellä Internetin avulla tapahtuvan asiakastarvetiedon keräyksen toimintatapa sekä tiedon keräyksen apuvälineet. Internetin avulla voidaan yrityksen liiketoimintaympäristöstä kerätä asiakastarvetietoja. Tietojen keräys voidaan tehdä kirjoituspöytätutkimuksena tai kvantitatiivis-kvalitatiivisena tutkimuksena. Internetin avulla tehtävässä kirjoituspöytätutkimuksessa tietoa asiakkaista, asiakkaiden tarpeista ja kilpailijoista voidaan kerätä World Wide Web -sivuilta tai tietopankeista. Kvantitatiivis-kvalitatiivisessa tutkimuksessa tietoja asiakkaiden tarpeista ja vaatimuksista kerätään Internet-työkaluilla yrityksen asiakkailta ja muilta sen sidosryhmiltä. Työssä on esitelty kolme eri asiakastarvekartoituksen Internet-työkalua. Internetin avulla saadaan parannettua yrityksen ja sen asiakkaiden välistä viestintää sekä tehostettua asiakastarvetiedon keräystä.
Resumo:
Työn tavoitteena oli selvittää Suomalaisten Internet-kauppojen palvelutasoa. Ensin tehtiin tutkimus, jossa mitattiin eri muuttujia, jotka vaikuttavat kaupan palvelutasoon. Internet-kaupasta ostettiin tuote ja kun tuote oli saapunut, se palautettiin takaisin kauppiaalle. Tutkimusosuus päättyi siihen, kun kauppias oli palauttanut rahat asiakkaan tilille. Tutkimuksen jälkeen kerätty data analysoitiin ja etsittiin mahdollisia ongelmia koko ostoprosessista. Ongelmakohtiin tehtiin vaihtoehtoisia ratkaisumalleja, joiden avulla pyritään löytämään paras toimintatapa kussakin tilanteessa. Ongelmina esille tulivat koodausvirheet kauppojen sivuilla, kuolleiden linkkien määrä Solo-torin portaalissa, kauppiaan osoitetietojen puuttuminen kaupan sivuilta ja kuluttajansuojalain kiertäminen tuotteen palautusoikeuden osalta. Pääratkaisuvaihtoehdot ongelmien osalta ovat parempi kuluttajansuojalakien noudattaminen tai toisaalta viranomaisten taholta tarkempi valvonta ja toisaalta Solo-torin linkkien tarkistus tasaisin väliajoin ja osoitetietojen päivitys Internet-kauppojen sivuille.
Resumo:
While problematic Internet use is recognized to be predominant among male adolescents, a female trend is gradually becoming apparent. Our study aimed at investigating the characteristics of female Internet users and distinguishing between the online activities of problematic and regular Internet users' on school days. Data were retrieved from a cross-sectional survey of a representative sample of 3067 8th graders in the canton of Vaud, Switzerland, that completed an online questionnaire in 2012. Only females were included. Based on the Internet addiction test, the sample was divided into regular (RUs) (IAT < 50, n = 1339) and problematic users (PIUs) (IAT ≥ 50, n = 201). Groups were compared regarding sociodemographic variables, online activities, devices used to access the Internet, substance use, and physical activity. Significant variables were included in a backward logistic regression. At the multivariate level, PIUs were more prone to spend time online for leisure activities (odds ratio [OR] 2.38) and to access the Internet through a smartphone (OR 1.79) or tablet (OR 1.84). PIUs were less likely to be physically active (OR 0.86) and more likely to present poor emotional well-being (OR 2.67) and to smoke (OR 1.88). CONCLUSION: A sizeable percentage of female adolescents are problematic Internet users. When performing a comprehensive biopsychosocial assessment, teenagers owning numerous devices to access the Internet, presenting other health-compromising behaviors or poor emotional well-being should be specifically targeted. WHAT IS KNOWN: ? Problematic Internet use has been found to be predominant among males. ? Specific online activities have been identified as being addictive for young men and women differently. ? Problematic Internet use is known to impact in several ways the general health and daily functioning of teenagers. What is New: ? A sizeable percentage of female adolescents are problematic Internet users. ? Tobacco use, poor well-being, as well as compact devices to access the Internet are positively related to problematic Internet use. ? In addition to their special interest in online social and communicational activities, female problematic Internet users also reported more online gambling.