979 resultados para internet economy
Resumo:
The Rabinovitz/Rabb family arrived in Boston from Russia in the 1890s. Around 1914 they founded Economy Grocery Stores, which became Stop & Shop in 1946. In addition to building their grocery company into a successful business, the family is known for its philanthropy and active involvement in the Jewish community. The collection contains materials relating to the Rabb family and to the business operations of Stop & Shop until 1989. The materials in this collection include historical sketches, newspaper clippings, press releases, correspondence, memoranda, minutes, reports, advertisements, certificates, speeches, interviews, films, and photographs.
Resumo:
Background A cancer diagnosis elicits greater distress than any other medical diagnosis, and yet very few studies have evaluated the efficacy of structured online self-help therapeutic programs to alleviate this distress. This study aims to assess the efficacy over time of an internet Cognitive Behaviour Therapy (iCBT) intervention (‘Finding My Way’) in improving distress, coping and quality of life for individuals with a recent diagnosis of early stage cancer of any type. Methods/Design The study is a multi-site Randomised Controlled Trial (RCT) seeking to enrol 188 participants who will be randomised to either the Finding My Way Intervention or an attention-control condition. Both conditions are delivered online; with 6 modules released once per week, and an additional booster module released one month after program-completion. Participants complete online questionnaires on 4 occasions: at baseline (immediately prior to accessing the modules); post-treatment (immediately after program-completion); then three and six months later. Primary outcomes are general distress and cancer-specific distress, with secondary outcomes including Health-Related Quality of Life (HRQoL), coping, health service utilisation, intervention adherence, and user satisfaction. A range of baseline measures will be assessed as potential moderators of outcomes. Eligible participants are individuals recently diagnosed with any type of cancer, being treated with curative intent, aged over 18 years with sufficient English language literacy, internet access and an active email account and phone number. Participants are blinded to treatment group allocation. Randomisation is computer generated and stratified by gender. Discussion Compared to the few prior published studies, Finding My Way will be the first adequately powered trial to offer an iCBT intervention to curatively treated patients of heterogeneous cancer types in the immediate post-diagnosis/treatment period. If found efficacious, Finding My Way will assist with overcoming common barriers to face-to-face therapy in a cost-effective and accessible way, thus helping to reduce distress after cancer diagnosis and consequently decrease the cancer burden for individuals and the health system. Trial registration Australian New Zealand Clinical Trials Registry ACTRN12613000001796 16.10.13
Resumo:
This paper explores the endeavours of five small firms to develop web-based commerce capabilities within their existing operations. The focus is upon the strategic acquisition and exploitation of knowledge which underpins new value creating activates related to web-based commerce. A normative web-based commerce adoption model developed from a review of the extant literature related to electronic marketing, entrepreneurship, and the diffusion of new innovations was empirically tested. A multiple case study design enabled the exploration of contemporary marketing and entrepreneurship issues within the real life context of five small firms. The model aimed to emphasis best-practice adoption methods emphasizing the value of a firm's market orientation and entrepreneurial capabilities. A preliminary test of the model's theoretical contentions lent support to its overall focus, but found that the firm's existing learning capabilities were diminished during the adoption of web-based commerce, and that a lack of vision and prior knowledge produced sub-optimal adoption outcomes.
Resumo:
Fundamental to the development of new customer value offerings via web-based commerce is a small firm's ability to strategically acquire and exploit knowledge. The focus of this paper is the empirical testing of a normative web-based commerce adoption model developed from a review of the extant literature related to electronic marketing, the Internet and the diffusion of new innovations. A preliminary test of the model's theoretical contentions lent support to its overall focus, but found that the firm's existing learning capabilities were diminished during the adoption of web-based commerce. Consequently, sub-optimal adoption outcomes were associated with insufficient knowledge development.
Resumo:
In this thesis we study a series of multi-user resource-sharing problems for the Internet, which involve distribution of a common resource among participants of multi-user systems (servers or networks). We study concurrently accessible resources, which for end-users may be exclusively accessible or non-exclusively. For all kinds we suggest a separate algorithm or a modification of common reputation scheme. Every algorithm or method is studied from different perspectives: optimality of protocols, selfishness of end users, fairness of the protocol for end users. On the one hand the multifaceted analysis allows us to select the most suited protocols among a set of various available ones based on trade-offs of optima criteria. On the other hand, the future Internet predictions dictate new rules for the optimality we should take into account and new properties of the networks that cannot be neglected anymore. In this thesis we have studied new protocols for such resource-sharing problems as the backoff protocol, defense mechanisms against Denial-of-Service, fairness and confidentiality for users in overlay networks. For backoff protocol we present analysis of a general backoff scheme, where an optimization is applied to a general-view backoff function. It leads to an optimality condition for backoff protocols in both slot times and continuous time models. Additionally we present an extension for the backoff scheme in order to achieve fairness for the participants in an unfair environment, such as wireless signal strengths. Finally, for the backoff algorithm we suggest a reputation scheme that deals with misbehaving nodes. For the next problem -- denial-of-service attacks, we suggest two schemes that deal with the malicious behavior for two conditions: forged identities and unspoofed identities. For the first one we suggest a novel most-knocked-first-served algorithm, while for the latter we apply a reputation mechanism in order to restrict resource access for misbehaving nodes. Finally, we study the reputation scheme for the overlays and peer-to-peer networks, where resource is not placed on a common station, but spread across the network. The theoretical analysis suggests what behavior will be selected by the end station under such a reputation mechanism.
Resumo:
There is a widely held view that the nation-state has become less central to media and communications policy over the last two decades. As Jan van Cuilenberg and Denis McQuail (2003, p. 181) observed in their overview of trends in communications policy-making, 'the old normative media policies have been challenged and policy-makers are searching for a new communications policy paradigm'. There are characteristically five factors put forward as to why the nation-state has become less central to media in the twenty-first century
Resumo:
Mobile RFID services for the Internet of Things can be created by using RFID as an enabling technology in mobile devices. Humans, devices, and things are the content providers and users of these services. Mobile RFID services can be either provided on mobile devices as stand-alone services or combined with end-to-end systems. When different service solution scenarios are considered, there are more than one possible architectural solution in the network, mobile, and back-end server areas. Combining the solutions wisely by applying the software architecture and engineering principles, a combined solution can be formulated for certain application specific use cases. This thesis illustrates these ideas. It also shows how generally the solutions can be used in real world use case scenarios. A case study is used to add further evidence.
Resumo:
This work combines the cognitive theory of folk-theoretical thought with the classical Aristotelian theory of artistic proof in rhetoric. The first half of the work discusses the common ground shared by the elements of artistic proof (logos, pathos, ethos) and the elements of folk-theoretical thought (naïve physics, folk biology, folk psychology, naïve sociology). Combining rhetoric with the cognitive theory of folk-theoretical thought creates a new point of view for argumentation analysis. The logos of an argument can be understood as the inferential relations established between the different parts of an argument. Consequently, within this study the analysis of logos is to be viewed as the analysis of the inferential folk-theoretical elements that make the suggested factual states-of-things appear plausible within given argumentative structures. The pathos of an argumentative structure can be understood as determining the quality of the argumentation in question in the sense that emotive elements play a great part in what can be called a distinction between good and deceptive rhetoric. In the context of this study the analysis of pathos is to be viewed as the analysis of the emotive content of argumentative structures and of whether they aim at facilitating surface- or deep cognitive elaboration of the suggested matters. The ethos of an argumentative structure means both the speaker-presentation and audience-construct that can be discerned within a body of argumentation. In the context of this study, the analysis of ethos is to be understood as the analysis of mutually manifest cognitive environments in the context of argumentation. The theory is used to analyse Catholic Internet discussion concerning cloning. The discussion is divided into six themes: Human Dignity, Sacred Family, Exploitation / Dehumanisation, Playing God, Monsters and Horror Scenarios and Ensoulment. Each theme is analysed for both the rhetorical and the cognitive elements that can be seen creating persuasive force within the argumentative structures presented. It is apparent that the Catholic voices on the Internet extensively oppose cloning. The voices utilise rhetoric that is aggressive and pejorative more often than not. Furthermore, deceptive rhetoric (in the sense presented above) plays a great part in argumentative structures of the Catholic voices. The theory of folk-theoretical thought can be seen as a useful tool for analysing the possible reasons why the Catholic speakers think about cloning and choose to present cloning in their argumentation as they do. The logos utilized in the argumentative structures presented can usually be viewed as based on folk-theoretical inference concerning biology and psychology. The structures of pathos utilized generally appear to aim at generating fear appeal in the assumed audiences, often incorporating counter-intuitive elements. The ethos utilised in the arguments generally revolves around Christian mythology and issues of social responsibility. These structures can also be viewed from the point of view of folk psychology and naïve sociological assumptions.
Resumo:
This licentiate's thesis analyzes the macroeconomic effects of fiscal policy in a small open economy under a flexible exchange rate regime, assuming that the government spends exclusively on domestically produced goods. The motivation for this research comes from the observation that the literature on the new open economy macroeconomics (NOEM) has focused almost exclusively on two-country global models and the analyses of the effects of fiscal policy on small economies are almost completely ignored. This thesis aims at filling in the gap in the NOEM literature and illustrates how the macroeconomic effects of fiscal policy in a small open economy depend on the specification of preferences. The research method is to present two theoretical model that are extensions to the model contained in the Appendix to Obstfeld and Rogoff (1995). The first model analyzes the macroeconomic effects of fiscal policy, making use of a model that exploits the idea of modelling private and government consumption as substitutes in private utility. The model offers intuitive predictions on how the effects of fiscal policy depend on the marginal rate of substitution between private and government consumption. The findings illustrate that the higher the substitutability between private and government consumption, (i) the bigger is the crowding out effect on private consumption (ii) and the smaller is the positive effect on output. The welfare analysis shows that the less fiscal policy decreases welfare the higher is the marginal rate of substitution between private and government consumption. The second model of this thesis studies how the macroeconomic effects of fiscal policy depend on the elasticity of substitution between traded and nontraded goods. This model reveals that this elasticity a key variable to explain the exchange rate, current account and output response to a permanent rise in government spending. Finally, the model demonstrates that temporary changes in government spending are an effective stabilization tool when used wisely and timely in response to undesired fluctuations in output. Undesired fluctuations in output can be perfectly offset by an opposite change in government spending without causing any side-effects.
Resumo:
Globalization, along with its digital and information communication technology counterparts, including the Internet and cyberspace, may signify a whole new era for human rights, characterized by new tensions, challenges, and risks for human rights, as well as new opportunities. Human Rights and Risks in the Digital Era: Globalization and the Effects of Information Technologies explores the emergence and evolution of ‘digital’ rights that challenge and transform more traditional legal, political, and historical understandings of human rights. Academic and legal scholars will explore individual, national, and international democratic dilemmas--sparked by economic and environmental crises, media culture, data collection, privatization, surveillance, and security--that alter the way individuals and societies think about, regulate, and protect rights when faced with new challenges and threats. The book not only uncovers emerging changes in discussions of human rights, it proposes legal remedies and public policies to mitigate the challenges posed by new technologies and globalization.
Resumo:
Human age is surrounded by assumed set of rules and behaviors imposed by local culture and the society they live in. This paper introduces software that counts the presence of a person on the Internet and examines the activities he/she conducts online. The paper answers questions such as how "old" are you on the Internet? How soon will a newbie be exposed to adult websites? How long will it take for a new Internet user to know about social networking sites? And how many years a user has to surf online to celebrate his/her first "birthday" of Internet presence? Paper findings from a database of 105 school and university students containing their every click of first 24 hours of Internet usage are presented. The findings provide valuable insights for Internet Marketing, ethics, Internet business and the mapping of Internet life with real life. Privacy and ethical issues related to the study have been discussed at the end. © Springer Science+Business Media B.V. 2010.
Resumo:
This paper considers the second-best strategy of correcting a wide variety of trade distortions in a small open economy with perfect competition in all markets. Using the tools of duality, we obtain some general properties of the structure and the levels of the optimal taxlsubsidy rates. The paper also analyzes the welfare effects of unilateral piecemeal trade policy reforms when some of the quota distortions—imposed by the foreign countries—are unalterable. It is shown that the merits of unilateral trade policy reforms that are emphasized in the literature crucially depend on the absence of unalterable foreign imposed quotas.
Resumo:
In late 2010, the online nonprofit media organization WikiLeaks published classified documents detailing correspondence between the U.S. State Department and its diplomatic missions around the world, numbering around 250,000 cables. These diplomatic cables contained classified information with comments on world leaders, foreign states, and various international and domestic issues. Negative reactions to the publication of these cables came from both the U.S. political class (which was generally condemnatory of WikiLeaks, invoking national security concerns and the jeopardizing of U.S. interests abroad) and the corporate world, with various companies ceasing to continue to provide services to WikiLeaks despite no legal measure (e.g., a court injunction) forcing them to do so. This article focuses on the legal remedies available to WikiLeaks against this corporate suppression of its speech in the U.S. and Europe since these are the two principle arenas in which the actors concerned are operating. The transatlantic legal protection of free expression will be considered, yet, as will be explained in greater detail, the legal conception of this constitutional and fundamental right comes from a time when the state posed the greater threat to freedom. As a result, it is not generally enforceable against private, non-state entities interfering with speech and expression which is the case here. Other areas of law, namely antitrust/competition, contract and tort will then be examined to determine whether WikiLeaks and its partners can attempt to enforce their right indirectly through these other means. Finally, there will be some concluding thoughts about the implications of the corporate response to the WikiLeaks embassy cables leak for freedom of expression online.