首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Computer self-efficacy (CSE) is a person's judgment of his or her ability to use a computer system. We investigated cognitive engagement, prior experience, computer anxiety, and organizational support as determinants of CSE in the use of a multimedia ERP system's training tool. We also examined the impact of CSE on its acceptance. We determined the benefits of a sequential multi-method approach using structural equation modeling and neural network analysis. High reliability predictions of individual CSE were achieved with a sequential multi-method approach. Specifically, we obtained almost 68% perfect CSE group prediction overall, with almost 85% perfect CSE group prediction using fuzzy sets and over 94% accuracy within one group classification. The resulting CSE assessment and classification enables management interventions, such as allocating users to appropriate instruction for more effective training.  相似文献   

2.
数据结构是计算机学科的核心专业基础课程,线性表是数据结构中一个最基本的内容。本文分析了数据结构中单链表的建立、插入和删除运算的实现,并附以图示和相应的具体程序,在此基础上进一步介绍了双链表的建立、插入和删除运算,并以实例论述了链表的优点。使得在实际的学习中可以更形象、轻松的学习链表这部分的知识。  相似文献   

3.
It is often presumed that individuals with greater computer experience will easily adopt new or updated replacements of existing information technology. To examine this assumption, this study reviews prior computer experience research, identifies two key dimensions of computer experience i.e. computer use and computer proficiency and evaluates their effects individually. Analysis of survey data from 737 respondents using structural equation modeling indicates that each dimension had differential effects on behavioral intentions to use a newly introduced internet-based technology with computer use having curvilinear effects on adoption intentions. Implications for research and practice are discussed.  相似文献   

4.
5.
科学技术与社会水平的不断发展促进了计算机在各领域的普及和应用,随着人们生活节奏的加快,现代化科技水平在人们生活中所扮演的角色也随之越来越重要,而计算机技术正是这些现代化科技中的核心代表产物。在全球经济水平高速发展的同时,为了跟上现代生活中人们生活与工作的步伐,不断地开辟新型市场交易路径是其中的关键所在,而电子商务正是在这一前提下产生和发展的。当电子商务的规模逐渐壮大、影响力逐渐深远的同时,为了保障交易双方的信息安全从而使得电子商务得以正常顺畅的开展,加强计算机安全技术的应用十分必要。基于上述几点考虑,通过对计算机安全技术相关概念的阐述,结合实际案例对其在电子商务中的应用进行了全面的探讨,拟为计算机安全技术的进一步普及和发展提供可靠的依据。  相似文献   

6.
随着网络攻击现象的增长和攻击技术手段的千变万化,计算机取证就是对能够为法庭接受的,足够可靠和有说服性的,存在于计算机和相关外设中的电子证据的确定、收集、保护、分析、归档以及法庭出示的过程。因此电子证据的计算机取证技术研究就显得十分重要,通过电子取证技术主动获取非法黑客的攻击行为并完整重建,可以准确有效地打击非法黑客。  相似文献   

7.
The National Computer Systems Laboratory (NCSL) at the National Institute of Standards and Technology (NIST) performs computer and related telecommunications research, develops standards and guidelines for computer systems, and provides technical assistance and advisory services to US government agencies. These activities support requirements for interoperable hardware, software and communications systems, for the exchange of information between systems, and for the protection of information from threats of all kinds.  相似文献   

8.
在人们越来越依赖网络的今天,计算机网络的信息安全防护已经变得越来越重要。本文在计算机网络安全概念的基础上,分析了当前计算机网络安全的现状,最后提出几种常见的计算机网络安全防范技术。  相似文献   

9.
计算机网络技术的发展特别是远程访问技术的突破,使得大量的网络电子资源得到开发利用,促进经济发展和社会进步,国内高校图书馆在电子资源建设方面已有相当规模。从大学图书馆电子资源发展的现状、存在的问题及未来发展方向进行探讨和研究。  相似文献   

10.
Abstract Mathematics teachers in 40 secondary schools in the Greater Manchester region were sent questionnaires asking them, amongst other things, to comment on the availability of various forms of computer hardware for use in their teaching of mathematics. Seventy-five replies were received and analysed. In respect of a single computer in a classroom –a provision which teachers seem to see as being of little benefit–most believe they can achieve bookable access although spontaneous availability is unlikely for all but a minority. For computer suites–the more favoured provision–even booking in advance guarantees access for less than half of all teachers with spontaneous access granted to less than one teacher in ten. Some implications of these findings and possible ways forward are discussed.  相似文献   

11.
The acceptance and use of computer based assessment   总被引:1,自引:0,他引:1  
The effective development of a computer based assessment (CBA) depends on students’ acceptance. The purpose of this study is to build a model that demonstrates the constructs that affect students’ behavioral intention to use a CBA. The proposed model, Computer Based Assessment Acceptance Model (CBAAM) is based on previous models of technology acceptance such as Technology Acceptance Model (TAM), Theory of Planned Behavior (TPB), and the Unified Theory of Acceptance and Usage of Technology (UTAUT). Constructs from previous models were used such as Perceived Usefulness, Perceived Ease of Use, Computer Self Efficacy, Social Influence, Facilitating Conditions and Perceived Playfulness. Additionally, two new variables, Content and Goal Expectancy, were added to the proposed research model. Data were collected from 173 participants in an introductory informatics course using a survey questionnaire. Partial Least Squares (PLS) was used to test the measurement and the structural model. Results indicate that Perceived Ease of Use and Perceived Playfulness have a direct effect on CBA use. Perceived Usefulness, Computer Self Efficacy, Social Influence, Facilitating Conditions, Content and Goal Expectancy have only indirect effects. These eight variables explain approximately 50% of the variance of Behavioural Intention.  相似文献   

12.
Global competition has impelled numerous organisations to employ enterprise resource planning (ERP) systems, although quite frequently without success. Studies have demonstrated that a major factor for failure is employee resistance in organisations using these systems. Exactly the factors that facilitate ERP adoption among users have seldom been identified. This study examines the usage behaviour of a sample of users of the new technology of ERP system using a technology acceptance model (TAM). Furthermore, this paper incorporates an additional behavioural construct, computer self-efficacy (CSE), to improve the predictive value of the original TAM model, named revised TAM. Additionally, the structural equation model (SEM) is used to verify the causal relationships between variables. Analytical results confirm that not only is the TAM appropriate for explaining the use of ERP, but that incorporating CSE enhances the power of the model.  相似文献   

13.
Global competition has impelled numerous organisations to employ enterprise resource planning (ERP) systems, although quite frequently without success. Studies have demonstrated that a major factor for failure is employee resistance in organisations using these systems. Exactly the factors that facilitate ERP adoption among users have seldom been identified. This study examines the usage behaviour of a sample of users of the new technology of ERP system using a technology acceptance model (TAM). Furthermore, this paper incorporates an additional behavioural construct, computer self-efficacy (CSE), to improve the predictive value of the original TAM model, named revised TAM. Additionally, the structural equation model (SEM) is used to verify the causal relationships between variables. Analytical results confirm that not only is the TAM appropriate for explaining the use of ERP, but that incorporating CSE enhances the power of the model.  相似文献   

14.
The purpose of this introduction is to provide a brief overview of the articles in this special issue and also a framework for understanding, designing and evaluating strategies for co-operative learning in the workplace and in educational environments. The special edition is divided into two parts—Issue 1: Computer Supported Collaborative Learning in Formal Education, and Issue 2: Computer Supported Team and Organisational Learning in Workplaces. In general, Issue 1 focuses on collaborative learning in primary and secondary schools and in the University setting. Issue 2 is meant to focus on learning in complex and often highly stressful work situations which mostly require intensive communication in groups or teams and in each case allow for learning in the wider organisation. This introduction outlines a set of themes that can be found in the following papers and traces briefly how each paper fits within each discussion.  相似文献   

15.
Assessing the computer attitudes of students: An Asian perspective   总被引:2,自引:2,他引:0  
Research has found that computer attitudes play a key role in influencing the extent to which students accept the computer as a learning tool and in determining the likelihood that computer will be used in the future for learning and study. A sample of 183 students reported their computer attitudes using a Likert-type questionnaire with three subscales, computer importance, computer enjoyment, and computer anxiety. One-way MANOVA revealed no significant differences in computer attitudes by gender although male students reported more positive towards the computer than female students. There were significant differences between students who own computers at home and those who do not and students who own a computer at home also reported a lower level of computer anxiety compared to those who do not.  相似文献   

16.
在创建品牌特色专业工作中,立足本学科历史发展的基础,利用本学科学位点及科研方向的优势,结合新疆少数民族地区人才需求,确定以培养少数民族文字信息处理技术人才为特色的建设方案。探索创建品牌特色专业的人才培养方案与措施,着力培养为新疆经济建设、社会发展需要的特色人才,打造具有地方特色的品牌专业。  相似文献   

17.
现代社会已经步入电子信息科学时代,计算机科学和技术的发展要求学生具有一定的创新能力。作为培养计算机科学与技术专业学生的院校,针对时代的对人才的培养提出的要求,我们可以通过加强对教师资源建设、对专业人才的培养方案做出更符合要求的改革、导师的相关项目引导学生积极参与,此外还可以组织课内外的兴趣小组等相关的措施来提高教学方面的改革,以促进学生的创新能力和创新意识的形成。  相似文献   

18.
网络工程专业与计算机专业差异化教学研究   总被引:2,自引:2,他引:0  
从专业能力需求入手,对计算机专业和网络工程专业在能力构成、课程体系等方面的差异进行对比分析,并针对网络工程专业给出需要与计算机专业进行差异化教学的核心课程内容和方法。  相似文献   

19.
郑杰  李建平 《计算机科学》2015,42(10):60-64
网络协议是网络通信中一系列标准的集合,未知协议的识别和分析对网络监管、保障网络安全具有重大意义。协议识别技术多种多样,但大都不适用于二进制的协议识别。在此针对现有的协议识别技术的局限性,提出了一种在双方单协议通信环境下的多种类型二进制数据帧的协议识别方法。该方法首先利用n-gram技术对数据帧进行分割,然后利用无监督的特征选择算法提取特征串集合,从而利用聚类算法实现协议消息的识别。最后在ICMP上对该方法进行评估,消息识别的准确率和召回率均可达到90%以上。  相似文献   

20.
艺术设计理论课程体系由"艺术概论"、"设计概论"和"设计美学"三个部分组成,审美是艺术设计的灵魂,文章从存在方式,发挥作用、本质与目的、设计形态与设计过程等方面阐述了艺术设计理论课程体系中的审美特征、审美要求和审美实质,诠释了审美活动在艺术设计过程中重要意义。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号