首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
Smart card technology is being used in an Austrian museum to offer visitors individually-tailored and interactive ways of experiencing the exhibition.This is a short news story only. Visit www.compseconline.com for the latest computer security industry news.  相似文献   

3.
4.
This letter highlights a fundamental inconsistency in the formulation of the Gravitational search algorithm (GSA) (Rashedi et al., Inf Sci 2232?C48, 2009). GSA is said to be based on the law of gravity, that is, candidate solutions attract each other in the search space based on their relative distances and ??masses?? (qualities). We show that, contrary to what is claimed, GSA does not take the distances between solutions into account, and therefore cannot be considered to be based on the law of gravity.  相似文献   

5.
In this paper we present a modal approach to contrastive logic, the logic of contrasts as these appear in natural language conjunctions such as but. We use a simple modal logic, which is an extension of the well-knownS5 logic, and base the contrastive operators proposed by Francez in [2] on the basic modalities that appear in this logic. We thus obtain a logic for contrastive operators that is more in accord with the tradition of intensional logic, and that, moreover — we argue — has some more natural properties. Particularly, attention is paid to nesting contrastive operators. We show that nestings of but give quite natural results, and indicate how nestings of other contrastive operators can be done adequately. Finally, we discuss the example of the Hangman's Paradox and some similarities (and differences) with default reasoning. But but us no buts, as they say.Also partially supported by Nijmegen University, Toernooiveld, 6525 ED Nijmegen, The Netherlands.  相似文献   

6.
This paper examines the digital divides for women in rural areas within the Information Society, referring particularly to the Galician experience (Autonomous Region in the North West of Spain). In order to explore the barriers to social and labor exclusion it was elaborated a survey relating with the use and impact of ITC in social and labor experiences of rural women. The results showed that rural women are aware of the key role played for ITC on their way to achieve the participation on decision making process as well as in social life and labor. The main barriers to the Internet penetration in women social life were employment, education and income. From an individual point of view, the existence of non-users was explained by a combination of access problems, lack of ICT skills or rather negative attitudes towards ITC. Finally, a bunch of policy recommendations is proposed focus on providing better Internet access in rural areas and to sensitize the population, particularly the oldest, about the importance of gender equality in access to technology in order to avoid digital barriers for rural women and reduce social exclusion of this group.  相似文献   

7.
It will be found that the great majority, given the premiss that thought is not distinct from corporeal motion, take a much more rational line and maintain that thought is the same in the brutes as in us, since they observe all sorts of corporeal motions in them, just as in us. And they will add that the difference, which is merely one of degree, does not imply any essential difference; from this they will be quite justified in concluding that, although there may be a smaller degree of reason in the beasts than there is in us, the beasts possess minds which are of exactly the same type as ours. (Descartes 1642: 288–289.)  相似文献   

8.
Recently, the popularity of smart phones has brought about changes in how people work and take breaks. This paper focuses on whether taking a break with a smart phones (e.g., browsing the internet or using social network services) has a different association with regaining vitality after ‘conventional breaks’ (e.g., walking or chatting face to face with friends). We surveyed a total of 450 workers in Korea with a diary questionnaire to see if there were differences in the effects of breaks via two theoretical paths of association: positively in terms of vigor and negatively in terms of emotional exhaustion. Empirical results show that psychological detachments by breaks, independent of break modes, did increase vigor and reduce emotional exhaustion, consistent with the existing literature. However, we also found that the effects, particularly in reducing emotional exhaustion, were significantly lower for the smart phone break group versus the conventional group. We discuss some theoretical and practical implications of these findings.  相似文献   

9.
We report on a project to annotate biblical texts in order to create an aligned multilingual Bible corpus for linguistic research, particularly computational linguistics, including automatically creating and evaluating translation lexicons and semantically tagged texts. The output of this project will enable researchers to take advantage of parallel translations across a wider number of languages than previously available, providing, with relatively little effort, a corpus that contains careful translations and reliable alignment at the near-sentence level. We discuss the nature of the text, our annotation process, preliminary and planned uses for the corpus, and relevant aspects of the Corpus Encoding Standard (CES) with respect to this corpus. We also present a quantitative comparison with dictionary and corpus resources for modern-day English, confirming the relevance of this corpus for research on present day language.  相似文献   

10.
We consider Luciano Floridi's proposal for a structural realism based on an Informational Structural Realism which, as he describes in his book (p. 339): ‘As a form of realism … is committed to the existence of a mind-independent reality addressed by, and constraining knowledge’. In doing this, we inform and reform aspects of the argument within a mathematical and, specifically, computability theoretic context.  相似文献   

11.
Trade Shows (TSs) provide “high-quality information,” as thousands of specialists and experts are gathered in one place at one time. Thus, information technology systems become essential for TSs. This study explores the characteristics of TSs’ onsite Information Technology (IT). This study aim to explore the relationships among onsite IT usage, visitors’ effectiveness and perception through the innovation characteristics (i.e., relative advantage, compatibility, and complexity). The study was conducted at a representative TS in Korea and used a survey approach to empirically understand the perception of onsite IT usage. The findings suggest that the four characteristics of product intelligence are influential factors of TSs’ onsite IT. Among them, relative advantage and compatibility had positive impacts on TS effectiveness, while complexity did not. In addition, discussions of the results, theoretical and practical implications for practitioners, limitations, and suggestions for future studies are presented.  相似文献   

12.
《Ergonomics》2012,55(5):417-419
Jerison's remarks (Ergonomics, 1966, 9, 413) are discussed in relation to the results of a further experiment on ' unwanted ' signals in which (a) the original interaction between the effects of signal probability and signal disc location was not observed, and (b) it was demonstrated that a search requirement is not a necessary condition for eliciting the main effects previously found.  相似文献   

13.
《Ergonomics》2012,55(9):809-820
Abstract

The Oxylog is a portable instrument designed to measure the oxygen consumption ([Vdot]02) an ambulatory subject. Steady-state measurements have been made, using an Oxylog, of inspiratory volume ( [Vdot]1) [Vdot]02 during bicycle ergometer exercise at work rates ranging from 30 to 150 W. These measurements have been compared with simultaneous measurements of expiratory volume ([Vdot] E) and [Vdot]O2 made using a dry gas meter and mass spectrometer.

Four experiments were conducted, during which a total of 433 comparative measurements were made. In two experiments the Oxylog significantly underestimated [Vdot]O2 (by 4-4 and 5-6%). Averaging over the four experiments, however, the underestimate reduced to 1-5%, which could be accounted for by a respiratory exchange ratio of approximately 0-9. There was, overall, no significant difference between [Vdot] 1 and [Vdot] E.

It is concluded that the Oxylog is sufficiently accurate for the reliable determination of [Vdot]02 and of energy expenditure under field conditions.  相似文献   

14.
In an opinion paper in the preceding issue of the European Journal of Information Systems, history is used to illustrate some differences in the research plot and performance of the Information Systems field. In this response, history is rewritten to show that the differences are natural, even to be welcomed, and that an understanding of their origins is sufficient for peace to break out and for harmony to be the natural state.  相似文献   

15.
Prior research has established the phenomenon of the ‘Chilling Effect’ where people constrain the self they present online due to peer-to-peer surveillance on Social Network Sites (SNS). However currently uninvestigated is the possibility that the threat of such surveillance on these sites might constrain the self presented offline in ‘reality’, known here as ‘the extended chilling effect’. The purpose of this study is to examine the existence of this ‘extended chilling effect’. Drawing on theories of self-awareness and self-presentation, the impact of surveillance in SNS is theorized to lead to an awareness of online audiences in offline domains, stimulating a self-comparison process that results in impression management. A mixed methods study of semi-structured interviews (n = 28) and a 2 × 2 between-subjects experiment (n = 80), provides support for offline impression management in order to avoid an undesired image being projected to online audiences. The novel finding that the chilling effect has extended highlights the potential dangers of online peer-to-peer surveillance for autonomy and freedom of expression in our offline lives.  相似文献   

16.
17.
18.
Exemplars of open innovation have revealed that intellectual property (IP) need not only be sourced through existing hierarchical or market relationships. Rather IP can be acquired from individuals and firms with whom an organization has no prior relationship. In such cases, an intermediary, operating as an innovation exchange or brokerage, frequently facilitates the development and acquisition of IP. This paper examines one type of innovation intermediary, the ‘Solver Brokerage,’ which enables innovation exchanges between organizations and unknown external firms and individuals (i.e. a crowdsourcing process). While the commercial success of Solver Brokerages indicates the potency of arguments concerning the potential of crowdsourcing, little is known about the operation of such brokerages or the crowdsourcing processes that they enable. This paper examines extant research on innovation networks, crowdsourcing, and electronic marketplaces to identify three processes (knowledge mobility, appropriability and stability) that we argue are necessary to ‘orchestrate’ crowdsourcing. Using a field study of four Solver Brokerages, an innovation seeking organization, as well as 15 innovation providers (i.e. members of the ‘crowd’), the paper illustrates the ways in which the three orchestration processes are enhanced in Solver Brokerages. It reveals that while knowledge mobility and appropriability processes can be enhanced by activities under the control of the Solver Brokerage, stability is largely determined by innovation seeking organizations and the innovation providers. The paper concludes that broker-provided value-added ‘orchestration’ services need to enable knowledge mobility and appropriability, and to ensure that ‘unsuccessful’ innovation seekers and providers appropriate sufficient value to participate again.  相似文献   

19.
Managers who oversee cybersecurity policies commonly rely on managerial encouragement (e.g., rewards) and employee characteristics (e.g., attitude) to drive compliant behaviour. However, whereas some cybersecurity initiatives are perceived as reasonable by employees, others are viewed as a ‘waste of time’. This research introduces employee judgements of cybersecurity legitimacy as a new angle for understanding employee compliance with cybersecurity policies over time. Drawing on theory from the organisational legitimacy and cybersecurity literature, we conduct a three-wave survey of 529 employees and find that, for each separate wave, negative legitimacy judgements mediate the relationship between management support and compliance, as well as between cybersecurity inconvenience and compliance. Our results provide support for cybersecurity legitimacy as an important influence on employee compliance with cybersecurity initiatives. This is significant because it highlights to managers the importance of not simply expecting compliant employee behaviour to follow from the introduction of cybersecurity initiatives, but that employees need to be convinced that the initiatives are fair and reasonable. Interestingly, we did not find sufficient support for our expectation that the increased likelihood of a cybersecurity incident will moderate the legitimacy-policy compliance relationship. This result suggests that the legitimacy perceptions of employees are unyielding to differences in the risk characteristics of the cybersecurity incidents facing organisations.  相似文献   

20.
This rejoinder contains a few remarks on my paper published in this journal with the title ‘A Constructive Proof of the Existence of Collateral Equilibrium for a Two-Period Exchange Economy Based on a Smooth Interior-Point Path’ and Ragupathy and Velupillai’s notes on a ‘Constructive Proof of the Existence of Collateral Equilibrium’ published recently in the same journal.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号