997 resultados para Sim authentication messaggistica online
Resumo:
The Internet provides a new tool to investigate old questions in experimental social psychology regarding Person x Context interaction. We examined the interaction of self-reported shyness and context on computer-mediated communication measures. Sixty female undergraduates unfamiliar were paired in dyads and engaged in a 10 min free chat conversation on the Internet with and without a live webcam. Free chat conversations were archived, transcripts were objectively coded for communication variables, and a linear mixed model used for data analysis of dyadic interaction was performed on each communication measure. As predicted, increases in self-reported shyness were significantly related to decreases in the number of prompted self-disclosures (after controlling for the number of opportunities to self-disclose) only in the webcam condition. Self-reported shyness was not related to the number of prompted self-disclosures in the no webcam condition, suggesting that shyness was context dependent. The present study appears to be the first to objectively code measures of Internet behaviour in relation to the study of personality in general and shyness in particular. Theoretical and clinical implications for understanding the contextual nature of shyness are discussed. (C) 2006 Elsevier Inc. All rights reserved.
Resumo:
A novel most significant digit first CORDIC architecture is presented that is suitable for the VLSI design of systolic array processor cells for performing QR decomposition. This is based on an on-line CORDIC algorithm with a constant scale factor and a latency independent of the wordlength. This has been derived through the extension of previously published CORDIC algorithms. It is shown that simplifying the calculation of convergence bounds also greatly simplifies the derivation of suitable VLSI architectures. Design studies, based on a 0.35-µ CMOS standard cell process, indicate that 20 such QR processor cells operating at rates suitable for radar beamfoming can be readily accommodated on a single chip.
Resumo:
The research examines the relationships between three common trust considerations (vendor, Internet and third parties) and attitudes towards online purchasing. The study incorporates privacy and security concerns as a moderating variable and finds that these relationships vary depending on the level of concerns a consumer has when purchasing online. The study suggests that "fears" surrounding the Internet as a place to do business still hinder the use of it for e-commerce purposes, but that the presence of a reputable agent might in some manner mitigate this risk. In the context of business to consumer relationships trust in the vendor is important for the consumer to accept any risk associated with a transaction. Theoretical implications for online customer behavior theory are also discussed. © 2009 Elsevier Inc.
Resumo:
Although e-commerce adoption and customers initial purchasing behavior have been well studied in the literature, repeat purchase intention and its antecedents remain understudied. This study proposes a model to understand the extent to which trust mediates the effects of vendor-specific factors on customers intention to repurchase from an online vendor. The model was tested and validated in two different country settings. We found that trust fully mediates the relationships between perceived reputation, perceived capability of order fulfillment, and repurchasing intention, and partially mediates the relationship between perceived website quality and repurchasing intention in both countries. Moreover, multi-group analysis reveals no significant between-country differences of the model with regards to the antecedents and outcomes of trust, except the effect of reputation on trust. Academic and practical implications and future research are discussed. © 2009 Operational Research Society Ltd.
Resumo:
Over the years, researchers from different disciplines have used a wide variety of research methods to assess the views of children. Qualitative methods such as focus groups and small group discussions are particularly common. Much rarer are large-scale quantitative surveys that are a valuable way of comparing data from across different age groups and countries and over time. To test the feasibility of carrying out large-scale quantitative research with children, the authors undertook a pilot survey in Northern Ireland in June 2008. There were two notable innovations: First, it was a survey of all Primary 7 children (age 10 and 11 years); second, it used the Internet to gather the information, which has not been done on this scale before. This article discusses the methodology used to implement the pilot study and evaluates the use of the Internet for carrying out survey research with children.
Resumo:
The provision of security in mobile ad hoc networks is of paramount importance due to their wireless nature. However, when conducting research into security protocols for ad hoc networks it is necessary to consider these in the context of the overall system. For example, communicational delay associated with the underlying MAC layer needs to be taken into account. Nodes in mobile ad hoc networks must strictly obey the rules of the underlying MAC when transmitting security-related messages while still maintaining a certain quality of service. In this paper a novel authentication protocol, RASCAAL, is described and its performance is analysed by investigating both the communicational-related effects of the underlying IEEE 802.11 MAC and the computational-related effects of the cryptographic algorithms employed. To the best of the authors' knowledge, RASCAAL is the first authentication protocol which proposes the concept of dynamically formed short-lived random clusters with no prior knowledge of the cluster head. The performance analysis demonstrates that the communication losses outweigh the computation losses with respect to energy and delay. MAC-related communicational effects account for 99% of the total delay and total energy consumption incurred by the RASCAAL protocol. The results also show that a saving in communicational energy of up to 12.5% can be achieved by changing the status of the wireless nodes during the course of operation. Copyright (C) 2009 G. A. Safdar and M. P. O'Neill (nee McLoone).
Resumo:
A research project in Web-enabled collaborative design and manufacture has been conducted. The major tasks of the project include the development of a Web-enabled environment for collaboration, online collaborative CAD/CAM, remote execution of large size programs (RELSP), and distributed product design. The tasks and Web/Internet techniques involved are presented first, followed by detail description of two approaches developed for implementation of the research: (1) a client-server approach for RELSP, where the following Internet techniques are utilized: CORBA, Microsoft’s Internet information server, Tomcat server, JDBC and ODBC; (2) Web-Services supported collaborative CAD which enables geographically dispersed designers jointly conduct a design task in the way of speaking and seeing each other and instantaneously modifying the CAD drawing online.