949 resultados para CONVIVENCIA ESCOLAR E INTERNET


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fundamental to the development of new customer value offerings via web-based commerce is a small firm's ability to strategically acquire and exploit knowledge. The focus of this paper is the empirical testing of a normative web-based commerce adoption model developed from a review of the extant literature related to electronic marketing, the Internet and the diffusion of new innovations. A preliminary test of the model's theoretical contentions lent support to its overall focus, but found that the firm's existing learning capabilities were diminished during the adoption of web-based commerce. Consequently, sub-optimal adoption outcomes were associated with insufficient knowledge development.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this thesis we study a series of multi-user resource-sharing problems for the Internet, which involve distribution of a common resource among participants of multi-user systems (servers or networks). We study concurrently accessible resources, which for end-users may be exclusively accessible or non-exclusively. For all kinds we suggest a separate algorithm or a modification of common reputation scheme. Every algorithm or method is studied from different perspectives: optimality of protocols, selfishness of end users, fairness of the protocol for end users. On the one hand the multifaceted analysis allows us to select the most suited protocols among a set of various available ones based on trade-offs of optima criteria. On the other hand, the future Internet predictions dictate new rules for the optimality we should take into account and new properties of the networks that cannot be neglected anymore. In this thesis we have studied new protocols for such resource-sharing problems as the backoff protocol, defense mechanisms against Denial-of-Service, fairness and confidentiality for users in overlay networks. For backoff protocol we present analysis of a general backoff scheme, where an optimization is applied to a general-view backoff function. It leads to an optimality condition for backoff protocols in both slot times and continuous time models. Additionally we present an extension for the backoff scheme in order to achieve fairness for the participants in an unfair environment, such as wireless signal strengths. Finally, for the backoff algorithm we suggest a reputation scheme that deals with misbehaving nodes. For the next problem -- denial-of-service attacks, we suggest two schemes that deal with the malicious behavior for two conditions: forged identities and unspoofed identities. For the first one we suggest a novel most-knocked-first-served algorithm, while for the latter we apply a reputation mechanism in order to restrict resource access for misbehaving nodes. Finally, we study the reputation scheme for the overlays and peer-to-peer networks, where resource is not placed on a common station, but spread across the network. The theoretical analysis suggests what behavior will be selected by the end station under such a reputation mechanism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is a widely held view that the nation-state has become less central to media and communications policy over the last two decades. As Jan van Cuilenberg and Denis McQuail (2003, p. 181) observed in their overview of trends in communications policy-making, 'the old normative media policies have been challenged and policy-makers are searching for a new communications policy paradigm'. There are characteristically five factors put forward as to why the nation-state has become less central to media in the twenty-first century

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile RFID services for the Internet of Things can be created by using RFID as an enabling technology in mobile devices. Humans, devices, and things are the content providers and users of these services. Mobile RFID services can be either provided on mobile devices as stand-alone services or combined with end-to-end systems. When different service solution scenarios are considered, there are more than one possible architectural solution in the network, mobile, and back-end server areas. Combining the solutions wisely by applying the software architecture and engineering principles, a combined solution can be formulated for certain application specific use cases. This thesis illustrates these ideas. It also shows how generally the solutions can be used in real world use case scenarios. A case study is used to add further evidence.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This work combines the cognitive theory of folk-theoretical thought with the classical Aristotelian theory of artistic proof in rhetoric. The first half of the work discusses the common ground shared by the elements of artistic proof (logos, pathos, ethos) and the elements of folk-theoretical thought (naïve physics, folk biology, folk psychology, naïve sociology). Combining rhetoric with the cognitive theory of folk-theoretical thought creates a new point of view for argumentation analysis. The logos of an argument can be understood as the inferential relations established between the different parts of an argument. Consequently, within this study the analysis of logos is to be viewed as the analysis of the inferential folk-theoretical elements that make the suggested factual states-of-things appear plausible within given argumentative structures. The pathos of an argumentative structure can be understood as determining the quality of the argumentation in question in the sense that emotive elements play a great part in what can be called a distinction between good and deceptive rhetoric. In the context of this study the analysis of pathos is to be viewed as the analysis of the emotive content of argumentative structures and of whether they aim at facilitating surface- or deep cognitive elaboration of the suggested matters. The ethos of an argumentative structure means both the speaker-presentation and audience-construct that can be discerned within a body of argumentation. In the context of this study, the analysis of ethos is to be understood as the analysis of mutually manifest cognitive environments in the context of argumentation. The theory is used to analyse Catholic Internet discussion concerning cloning. The discussion is divided into six themes: Human Dignity, Sacred Family, Exploitation / Dehumanisation, Playing God, Monsters and Horror Scenarios and Ensoulment. Each theme is analysed for both the rhetorical and the cognitive elements that can be seen creating persuasive force within the argumentative structures presented. It is apparent that the Catholic voices on the Internet extensively oppose cloning. The voices utilise rhetoric that is aggressive and pejorative more often than not. Furthermore, deceptive rhetoric (in the sense presented above) plays a great part in argumentative structures of the Catholic voices. The theory of folk-theoretical thought can be seen as a useful tool for analysing the possible reasons why the Catholic speakers think about cloning and choose to present cloning in their argumentation as they do. The logos utilized in the argumentative structures presented can usually be viewed as based on folk-theoretical inference concerning biology and psychology. The structures of pathos utilized generally appear to aim at generating fear appeal in the assumed audiences, often incorporating counter-intuitive elements. The ethos utilised in the arguments generally revolves around Christian mythology and issues of social responsibility. These structures can also be viewed from the point of view of folk psychology and naïve sociological assumptions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Globalization, along with its digital and information communication technology counterparts, including the Internet and cyberspace, may signify a whole new era for human rights, characterized by new tensions, challenges, and risks for human rights, as well as new opportunities. Human Rights and Risks in the Digital Era: Globalization and the Effects of Information Technologies explores the emergence and evolution of ‘digital’ rights that challenge and transform more traditional legal, political, and historical understandings of human rights. Academic and legal scholars will explore individual, national, and international democratic dilemmas--sparked by economic and environmental crises, media culture, data collection, privatization, surveillance, and security--that alter the way individuals and societies think about, regulate, and protect rights when faced with new challenges and threats. The book not only uncovers emerging changes in discussions of human rights, it proposes legal remedies and public policies to mitigate the challenges posed by new technologies and globalization.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Human age is surrounded by assumed set of rules and behaviors imposed by local culture and the society they live in. This paper introduces software that counts the presence of a person on the Internet and examines the activities he/she conducts online. The paper answers questions such as how "old" are you on the Internet? How soon will a newbie be exposed to adult websites? How long will it take for a new Internet user to know about social networking sites? And how many years a user has to surf online to celebrate his/her first "birthday" of Internet presence? Paper findings from a database of 105 school and university students containing their every click of first 24 hours of Internet usage are presented. The findings provide valuable insights for Internet Marketing, ethics, Internet business and the mapping of Internet life with real life. Privacy and ethical issues related to the study have been discussed at the end. © Springer Science+Business Media B.V. 2010.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In late 2010, the online nonprofit media organization WikiLeaks published classified documents detailing correspondence between the U.S. State Department and its diplomatic missions around the world, numbering around 250,000 cables. These diplomatic cables contained classified information with comments on world leaders, foreign states, and various international and domestic issues. Negative reactions to the publication of these cables came from both the U.S. political class (which was generally condemnatory of WikiLeaks, invoking national security concerns and the jeopardizing of U.S. interests abroad) and the corporate world, with various companies ceasing to continue to provide services to WikiLeaks despite no legal measure (e.g., a court injunction) forcing them to do so. This article focuses on the legal remedies available to WikiLeaks against this corporate suppression of its speech in the U.S. and Europe since these are the two principle arenas in which the actors concerned are operating. The transatlantic legal protection of free expression will be considered, yet, as will be explained in greater detail, the legal conception of this constitutional and fundamental right comes from a time when the state posed the greater threat to freedom. As a result, it is not generally enforceable against private, non-state entities interfering with speech and expression which is the case here. Other areas of law, namely antitrust/competition, contract and tort will then be examined to determine whether WikiLeaks and its partners can attempt to enforce their right indirectly through these other means. Finally, there will be some concluding thoughts about the implications of the corporate response to the WikiLeaks embassy cables leak for freedom of expression online.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We provide analytical models for capacity evaluation of an infrastructure IEEE 802.11 based network carrying TCP controlled file downloads or full-duplex packet telephone calls. In each case the analytical models utilize the attempt probabilities from a well known fixed-point based saturation analysis. For TCP controlled file downloads, following Bruno et al. (In Networking '04, LNCS 2042, pp. 626-637), we model the number of wireless stations (STAs) with ACKs as a Markov renewal process embedded at packet success instants. In our work, analysis of the evolution between the embedded instants is done by using saturation analysis to provide state dependent attempt probabilities. We show that in spite of its simplicity, our model works well, by comparing various simulated quantities, such as collision probability, with values predicted from our model. Next we consider N constant bit rate VoIP calls terminating at N STAs. We model the number of STAs that have an up-link voice packet as a Markov renewal process embedded at so called channel slot boundaries. Analysis of the evolution over a channel slot is done using saturation analysis as before. We find that again the AP is the bottleneck, and the system can support (in the sense of a bound on the probability of delay exceeding a given value) a number of calls less than that at which the arrival rate into the AP exceeds the average service rate applied to the AP. Finally, we extend the analytical model for VoIP calls to determine the call capacity of an 802.11b WLAN in a situation where VoIP calls originate from two different types of coders. We consider N-1 calls originating from Type 1 codecs and N-2 calls originating from Type 2 codecs. For G711 and G729 voice coders, we show that the analytical model again provides accurate results in comparison with simulations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This one-day workshop brings together researchers and practitioners to share knowledge and practices on how people can connect and interact with the Internet of Things in a playful way. Open to participants with a diverse range of interests and expertise, and by exploring novel ways to playfully connect people through their everyday objects and activities, the workshop will facilitate discussion across a range of HCI discipline areas. The outcomes from the workshop will include an archive of participants' initial position papers along with the materials created during the workshop. The result will be a road map to support the development of a Model of Playful Connectedness, focusing on how best to design and make playful networks of things, identifying the challenges that need to be addressed in order to do so.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Osallistavan suunnittelun määrä Suomessa on viime vuosina kasvanut huomattavasti. Asukaskyselyt ovat yksi tapa osallistaa asukkaita, ja ne sopivat erityisesti suuren yleisön osallistamiseen. Internetissä toteutetut asukaskyselyt nopeuttaisivat ja helpottaisivat asukaskyselyiden tekemistä mm. siksi, että tieto voidaan tallentaa suoraan sähköiseen muotoon. Internetin käyttö asukaskyselyiden tekemisessä on kuitenkin uusi menetelmä, josta on vasta vähän tutkimustietoa. Ongelmallista Internet-kyselyissä on se, että kasvaneista käyttäjämääristä huolimatta kaikilla ei edelleenkään ole mahdollisuutta käyttää Internetiä. Lisäksi Internet-kyselyn otos on yleensä valikoitunut ja otoskoon määritteleminen on hankalaa. Tutkielma toteutettiin osana Kuopion kaupungin Puijon alueen vuorovaikutteista suunnitteluprosessia. Tutkielman tavoitteena oli vertailla Internet-kyselyä postikyselyyn, jotta saataisiin selville, onko Internet-kysely kelvollinen osallistamismenetelmä. Lisäksi tavoitteena oli profiloida vastaajia mielipiteiden ja taustamuuttujien perusteella. Tutkielman aineistona oli Kuopiossa tammikuussa 2009 toteutetun, Puijon aluetta koskevan asukaskyselyn tulokset. Aineiston analysointiin käytettiin faktorianalyysia, klusterianalyysia, erotteluanalyysia ja korrespondenssianalyysia. Katoa tutkittiin ?2-testillä ja laskemalla ristitulosuhteet. SeInternet- että postikyselyn vastaajista muodostuivat Tyytymättömien, Tyytyväisten ja Luonnonsuojelijoiden vastaajaryhmät, joilla olivat melko samanlaiset mielipiteet ja taustamuuttujat molemmissa aineistoissa. Tyytymättömät olivat tyytymättömiä Puijon alueen nykytilaan eivätkä arvostaneet Puijoa. Myös Luonnonsuojelijat olivat tyytymättömiä Puijon alueen ja metsien nykyiseen hoitoon, mutta eivät kannattaneet metsänhoitoa. Tyytyväisten mielestä Puijon alueella kaikki on nyt kunnossa. Lisäksi postikyselyn aineistosta muodostui Kehittäjät-ryhmä ja Internet-kyselyn vastaajista Virkistäytyjät-ryhmä. Internet-kyselyssä 46–60-vuotiaat ja korkeakoulutetut olivat yliedustettuina, mutta kummallakaan kyselyllä ei saatu edustavaa otosta kuopiolaisista. Katoa oli paljon. Edes keskustelua herättänyt aihe ei riittänyt aktivoimaan kuopiolaisia vastaamaan kyselyyn ja tutkielmassa käytettyjen tutkimusmenetelmien kannalta kyselylomake oli puutteellinen. Tämän tutkielman tuloksista saatiin lopulta lähinnä suuntaviivoja Puijon suunnitelmaehdotuksille. Kunnissa tarvitaan uusia työkaluja osallistamiseen, ja tähän tarpeeseen Internet-kysely olisi kustannustehokas vastaus. Sen vuoksi Internet-kyselyä kannattaa edelleen tutkia ja kehittää. Internet-kyselyllä olisi mahdollista saada edustavampi otos, jos vastaajat valittaisiin satunnaisotannalla ja he saisivat salasanan kyselyyn. Myös kaikille avoimella kyselyllä voitaisiin kartoittaa mielipiteitä, kunhan tuloksia tulkittaisiin kriittisesti.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The current mainstream scientific-publication process has so far been only marginally affected by the possibilities offered by the Internet, despite some pioneering attempts with free electronic-only journals and electronic preprint archives. Additional electronic versions of traditional paper journals for which one needs a subscription are not a solution. A clear trend, for young researchers in particular, is to go around subscription barriers (both for paper and electronic material) and rely almost exclusively on what they can find free on the Internet, which often includes working versions posted on the home pages of the authors. A survey of how scientists retrieve publications was conducted in February 2000, aimed at measuring to what extent the opportunities offered by the Internet are already changing the scientific information exchange and how researchers feel about this. This paper presents the results based on 236 replies to an extensive Web-based questionnaire, which was announced to around 3,000 researchers in the domains of construction information technology and construction management. The questions dealt with how researchers find, access, and read different sources; how many and what publications they read; how often and to which conferences they travel; how much they publish, and criteria for where they eventually decide to publish. Some of the questions confronted traditional and electronic publishing, with one final section dedicated to opinions about electronic publishing. According to the survey, researchers already download half of the material that they read digitally from the Web. The most popular method for retrieving an interesting publication is downloading it for free from the author's or publisher's Web site. Researchers are not particularly willing to pay for electronic scientific publications. There is much support for a scenario of electronic journals available freely in their entirety on the Web, where the costs could be covered by, for instance, professional societies or the publishing university.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The World Wide Web provides the opportunity for a radically changed and much more efficient communication process for scientific results. A survey in the closely related domains of construction information technology and construction management was conducted in February 2000, aimed at measuring to what extent these opportunities are already changing the scientific information exchange and how researchers feel about the changes. The paper presents the results based on 236 replies to an extensive Web based questionnaire. 65% of the respondents stated their primary research interest as IT in A/E/C and 20% as construction management and economics. The questions dealt with how researchers find, access and read different sources; how much and what publications they read; how often and to which conferences they travel; how much they publish, and what are the criteria for where they eventually decide to publish. Some of the questions confronted traditional and electronic publishing with one final section dedicated to opinions about electronic publishing. According to the survey researchers already download half of the material that they read digitally from the Web. The most popular method for retrieving an interesting publication is downloading it for free from the author’s or publisher’s website. Researchers are not particularly willing to pay for electronic scientific publications. There is much support for a scenario of electronic journals available totally freely on the Web, where the costs could be covered by for instance professional societies or the publishing university. The shift that the Web is causing seems to be towards the "just in time" reading of literature. Also, frequent users of the Web rely less on scientific publications and tend to read fewer articles. If available with little effort, papers published in traditional journals are preferred; if not, the papers should be on the Web. In these circumstances, the role of paper-based journals published by established publishers is shifting from the core "information exchange" to the building of authors' prestige. The respondents feel they should build up their reputations by publishing in journals and relevant conferences, but then make their work freely available on the Web.