首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The paper reports a study that investigated the construction of a common identity in an online Italian forum of psychologists based on asynchronous CMC. Discourse analysis was carried out on 20 discussions, and three Interpretative Repertoires were identified: (i) Professional Boundaries, (ii) disempowered psychology and (iii) psychology and health, which refer to three recurrent modalities of constructing the psychological profession. The study suggests that a framework drawing on social constructionism and Bourdieu's critical theory can help understand some aspects of identity in, and across, communities of practice. The main conclusion is that analysing critically how identities are constructed in learning environments, virtual or not, allows reconsidering the role of the cultural context in the production of those identities.  相似文献   

2.
The Internet, as a dynamic virtual medium for selling and buying information, services and products, is gaining increasing attention from researchers and practitioners. In this study, we examine the perceptions of adopters and non-adopters of online shopping in terms of demographic profile, consumer expectations of online stores, advantages and problems of online shopping and transaction cost. In addition, we also examine the types of products purchased, frequency of online purchase and the extent of communication with e-commerce vendors. The findings are useful in explaining consumers' buying behaviour in the electronic marketplace. Implications of the results are discussed.  相似文献   

3.
The Internet, as a dynamic virtual medium for selling and buying information, services and products, is gaining increasing attention from researchers and practitioners. In this study, we examine the perceptions of adopters and non-adopters of online shopping in terms of demographic profile, consumer expectations of online stores, advantages and problems of online shopping and transaction cost. In addition, we also examine the types of products purchased, frequency of online purchase and the extent of communication with e-commerce vendors. The findings are useful in explaining consumers' buying behaviour in the electronic marketplace. Implications of the results are discussed.  相似文献   

4.
Although the Internet is widely used by students in both formal and informal environments, little is known about how and where youth spend their time online. Using Internet search and Web analytics data, this study discovered a large‐scale phenomenon associated with the poor performance of elementary school students in the USA that has been overlooked by educational researchers. This study found that approximately 10 million Internet users in the USA, many of whom are presumably youth, spend about 89 million hours in a year on a popular math game site that targets children. The number of game site users is equivalent to half of the K‐5 Internet population in the USA. However, there is little evidence that the math games on the website meet the criteria for effective instruction as described in the literature. This study found a significant negative correlation between search volumes for the game site in the 50 states in the USA and 4th grade students' performance in mathematics and reading. Moreover, Internet users in the states with greater numbers of low‐income families and fewer college graduates were more likely to search for the game site. The implications of these findings are discussed.  相似文献   

5.
The advent of the Internet and social media has revolutionized the way society communicates, the speed in which news is disseminated, and the approach that people take in their daily decision-making. Online reviews are now common place on nearly every consumer-related website. Consequently, attorneys are also being publicly scrutinized by their clients on a range of topics from price, competence, satisfaction, personality, communication, and effectiveness. On one side of the coin, this new phenomenon can be very rewarding since attorneys were previously limited to receiving a small number of referrals from the word-of-mouth promotion before the creation of online reviews. However, the exact opposite is true. Negative online reviews, whether accurate or not, may deter potential clients from even giving the attorney a second thought. As a result, a firm's business can feel the immediate impact of negative reviews. Attorneys, who legitimately need and want to protect their business and reputation, cannot speak freely online to defend their honor. Rather, an attorney must be mindful of not disclosing confidential client information or crossing other ethical lines that may then expose the attorney to potential discipline. There are several interests that must be considered such as allowing attorneys to exercise their First Amendment right to free speech, respect and adherence to the ethical rules of non-disclosure of confidential information, allowing attorneys to preserve their reputation, and protecting an attorney's marketability and means of generating income. This article explores the trend in offering reviews online in a variety of industries, including legal services, the statistical findings regarding the prevalence of this information and consumers' reliance on the information while making a purchasing decision. This article also considers the positive and negative implications of the reviews being so widely spread, while highlighting unique considerations as it relates to the practice of law and factors that may greatly skew a reviewer and reader's perceptions. Next, this article outlines the ethical considerations of attorneys if they want to respond to negative online feedback, such as disclosure of confidential information. Then, this article analyzes the American Bar Association (ABA) and several US states' ethics opinions for guidance for attorneys who wish to respond negative reviews. Finally, this article details the author's recommendations for attorneys, the ABA, and the US states and propose the areas where additional ethics opinions, rules and guidelines should be focused to establish a proper balance between the valuable insights discovered from a client's review and attorneys' legitimate interests in protecting their reputation and livelihood from inaccurate, malicious, or erroneous postings.  相似文献   

6.
A range of responsible gambling systems have been developed, but they are not necessarily used by consumers. This requires an understanding of factors (e.g. risk and loss) influencing response to advice. Therefore, an experiment examined the use of decisional support in response to induced success or failure. A total of 21 university students played computer Blackjack at two levels of risk, and were informed as to whether the odds were in their favour (‘card count’), and were given online advice as to card selection (Basic). Winning streaks led to overconfidence, as indicated by larger mean bets, more Basic errors, and a failure to adjust wagering upon cessation of the winning streak. Participants were more cautious in response to losses, betting less, and were more likely to comply with advice. Participants attended and complied with advice earlier at low risk, but at high risk noticed advice later and did not comply. Induced emotional states (e.g. winning or losing) are important as they influence the likelihood that people will listen to online advice. Designers of Behaviour Change Support Systems should consider methods of contingently implementing advice.  相似文献   

7.
The present study examined the influence of gender and personality on individuals’ use of online social networking websites such as Facebook and MySpace. Participants were 238 undergraduate students who reported being members of Facebook, MySpace, or both. Based on prior research examining online behavior, we expected that gender and scores on the Big Five personality scale would moderate online social networking behavior. The results supported our predictions. Specifically, men reported using social networking sites for forming new relationships while women reported using them more for relationship maintenance. Furthermore, women low in agreeableness reported using instant messaging features of social networking sites more often than women high in agreeableness, whereas men low in openness reported playing more games on social networking sites compared to men high in openness. Overall, these results indicate the importance of examining individual differences in online behavior.  相似文献   

8.
The radical restructure of hybrid and online learning course delivery methods at university-level held in Second Life has been widely and positively acknowledged from a large academic literature body. However, it is still absent the clarification of students’ socio-cognitive factors that predict their choice to attend at least in one of these course delivery methods. The main purpose of this study is to examine the relation between several personal factors and students’ choice to participate in these contemporary methods. A targeted sample of 325 voluntary students (170 who participated in hybrid sessions and 155 who participated in online sessions) completed a survey to assess socio-cognitive factors (self-efficacy, metacognitive self-regulation and task value), achievement-related emotions (pride, anger, relief and shame) in academic settings (before and after finishing various learning activities) and satisfaction levels of each method with also final grades from their examination processes to be included. Logistic regression confirmed higher levels of students’ self-efficacy and satisfaction in learning outcomes for those who took part in (fully) online rather than those who enrolled in hybrid courses. The study results revealed that students would prefer to take further courses in the online course delivery method. Conclusive remarks may provide meaningful information to the educational community in order to understand better how the socio-cognitive constructs of motivation are related to the students’ participation in future-driven educational activities held in Second Life by using the online or hybrid course delivery methods.  相似文献   

9.
The principal objective of this study was to investigate the mediating and moderating effects of product involvement and trust toward websites in relation to the effects of the attributes of web advertisements on customers’ purchase intentions. We collected data consisting of a total of 264 responses from individuals with previous experience with purchasing products from online shopping mall sites, and utilized the PLS (partial least squares) method to analyze the collected data.  相似文献   

10.
Social presence, the ability to perceive others in an online environment, has been shown to impact student motivation and participation, actual and perceived learning, course and instructor satisfaction, and retention in online courses; yet very few researchers have attempted to look across contexts, disciplinary areas, or measures of social presence. This meta-analysis allowed us to look across these variables of the primary studies and identify the pattern of student outcomes (e.g., perceived learning and satisfaction) in relation to social presence through scrutiny of differences between the studies. The results showed a moderately large positive average correlation between social presence and satisfaction (r = 0.56, k = 26) and social presence and perceived learning (r = 0.51, k = 26). Large variation among correlations (86.7% for satisfaction and 92.8% for perceived learning, respectively) also indicated systematic differences among these correlations due to online course settings. We found that (a) the strength of the relationship between social presence and satisfaction was moderated by the course length, discipline area, and scale used to measure social presence; and (b) the relationship between social presence and perceived learning was moderated by the course length, discipline area, and target audience of the course. Implications and future research are discussed.  相似文献   

11.
BackgroundPositive bystander behavior in cyberbullying among adolescents may effectively mitigate cyberbullying and its harm for the victim. Limited, scattered, and sometimes only qualitative research is available on predictors of positive (e.g. defending, comforting or reporting) and negative (e.g. passive bystanding, joining, reinforcing) bystander behavior in cyberbullying. A multidimensional model and multilevel analysis were therefore applied in this study.MethodsA sample of 1979 adolescents in 7th -9th grade, in 16 schools and 158 classes participated in the study. Analyses were performed in MLwiN 2.32.ResultsAnalyses confirmed the multifaceted nature of bystander behavior and behavioral intention. No school level effects, and only limited class effects were found. Strongest individual predictors of positive bystander behavior were a positive intention, and friendship with the victim. Intention for positive bystander behavior was most predicted by positive outcome expectations of their actions for the victim. Negative bystander behavior was most predicted by intentions for negative behavior, and moral disengagement attitudes. Intentions to act as a negative bystander were most predicted by positive attitudes towards passive bystanding and a lack of skills (social, empathic, coping). Moral disengagement at classroom level also predicted positive behavior and behavioral intentions, and negative behavioral intentions, but not negative behavior. Information days for pupils on cyberbullying was a significant school-level predictor of the intention to act as a positive bystander.ConclusionsFuture research and interventions should take the multidimensional nature of cyberbullying bystander behavior into account. Implications for research and practice are discussed.  相似文献   

12.
13.
This study examines the relationships between various risks, beliefs, and behavioral intentions that are related to citizens' use of anti-/counter-terrorism e-Government websites. The data was collected through two surveys within a one-year interval — before and after the Iraqi regime was expelled by the US coalition army. The results suggest that perceived privacy risk from an anti/counter-terrorism authority is the major obstacle in citizen-to-government anti/counter-terrorism information flow, while citizens' belief in the authority's domain competence greatly influences citizens' dependence on anti/counter-terrorism website information. Other findings and implications are discussed, and directions for future research are suggested.  相似文献   

14.
Employing two studies, this paper investigates incidental exposure to news online in terms of its influence on individual learning about public affairs as well as its predictors in the social media environment. Study 1, using an experimental design, shows that incidental exposure to news has significant effects on an individual's recognition and recall of information in news stories. The effects of incidental exposure on recall are mediated by actual exposure to information in the news (spending some time on reading), suggesting gateway effects of initial exposure by accident. Employing a national survey, Study 2 finds that social media network heterogeneity and proportion of weak ties are positively associated with likelihood of incidental exposure to news online, while most variables of individual characteristics are not. The significant effects of structural factors found suggest that incidental exposure can limit consequences of selective exposure. Further implications of the findings are discussed.  相似文献   

15.
植被指数与退耕还林( 草) 初期的遥感监测应用   总被引:3,自引:1,他引:3       下载免费PDF全文
探讨了植被指数的几种主要形式( IDV 、NDVI、Tasseled Cap Greenness) 及其在退耕还林( 草) 初期( 2000~2002 年) 效能监测中的应用。运用遥感数据处理、GIS( ARC/ INFO) AML 编程统计出青藏-黄土高原结合部复杂地形条件下退耕还林( 草) 各类型地块的3 期平均植被指数, 及两年间相应的植被指数变化, 对比分析了各类型植被指数与其它属性数据间的关系, 发现7~9 月份积温和湿润度条件对植被指数的影响主要表现为累积效应。研究认为, 通过更详实的地表植被状态的适时调查, 建立并应用遥感成像前期地表水热因子与各类型的植被指数向量之间的映照关系, 上述方法将有更实际的意义。  相似文献   

16.
In this paper two novel intelligent buffer overflow controllers: the fuzzy logic controller (FLC) and the genetic algorithm controller (GAC) are proposed. In the FLC the extant algorithmic PID controller (PIDC) model, which combines the proportional (P), derivative (D) and integral (I) control elements, is augmented with fuzzy logic for higher control precision. The fuzzy logic divides the PIDC control domain into finer control regions. Every region is then defined either by a fuzzy rule or a ‘don't care’ state. The GAC combines the PIDC model with the genetic algorithm, which manipulates the parametric values of the PIDC as genes in a chromosome. The FLC and GAC operations are based on the objective function . The principle is that the controller should adaptively maintain the safety margin around the chosen reference point (represent by the ‘0’ of ) at runtime. The preliminary experimental results for the FLC and GAC prototypes indicate that they are both more effective and precise than the PIDC. After repeated timing analyses with the Intel's VTune Performer Analyzer, it was confirmed that the FLC can better support real‐time computing than the GAC because of its shorter execution time and faster convergence without any buffer overflow. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   

17.
Could we use Computer Vision in the Internet of Things for using pictures as sensors? This is the principal hypothesis that we want to resolve. Currently, in order to create safety areas, cities, or homes, people use IP cameras. Nevertheless, this system needs people who watch the camera images, watch the recording after something occurred, or watch when the camera notifies them of any movement. These are the disadvantages. Furthermore, there are many Smart Cities and Smart Homes around the world. This is why we thought of using the idea of the Internet of Things to add a way of automating the use of IP cameras. In our case, we propose the analysis of pictures through Computer Vision to detect people in the analysed pictures. With this analysis, we are able to obtain if these pictures contain people and handle the pictures as if they were sensors with two possible states. Notwithstanding, Computer Vision is a very complicated field. This is why we needed a second hypothesis: Could we work with Computer Vision in the Internet of Things with a good accuracy to automate or semi-automate this kind of events? The demonstration of these hypotheses required a testing over our Computer Vision module to check the possibilities that we have to use this module in a possible real environment with a good accuracy. Our proposal, as a possible solution, is the analysis of entire sequence instead of isolated pictures for using pictures as sensors in the Internet of Things.  相似文献   

18.
19.
This paper presents a method for simulating the kinematics of the vehicle ingress movement of elderly people and/or people with prostheses (represented by a humanoid mannequin with a head, trunk, pelvis and lower limbs) in variably-dimensioned vehicles, starting from real experimental data. To solve this “complex” problem, we propose a three-stage method. The first stage concerns the construction of an “exploitable” movement database, containing movements resulting from the numerical processing of the ingress movements measured in experiments carried out on two vehicles with 2 distinct geometries. The second stage, consisting of 4 phases, analyzes and automatically identifies the ingress movement strategies. By the end of this stage, 2 ingress strategies and 6 sub strategies were identified. The third stage is the simulation. It uses the results from stages 1 and 2 to simulate the ingress movement of a subject in the database, adopting a given sub-strategy for a vehicle with a different geometry. The simulation of the ingress movement of the same subject but for another vehicle is formulated as an inverse kinematics problem, which is solved by constrained nonlinear programming.Simulations involving elderly people and/or people with prostheses made it possible to validate the proposed method for the two ingress strategies. Despite the differences with the measured movements, the simulated movements conform to the sub-strategies adopted by the subjects during the experiments. Furthermore, the simulations made it possible to partially explain the shifts in strategy of some subjects when they changed vehicles during the experiments. Finally, simulations on fictitious vehicles highlighted some of the limitations of our simulation tool. This study opens several perspectives for future research. For example, we could improve the simulation tool by considering the subjects' intra-individual differences.Relevance to industryThis study can aid ergonomists and car manufacturers to simulate the ingress movement in variably-dimensioned vehicles for elderly and/or prosthesis having persons. The results of the simulations can be used in the products' (Vehicles) evaluation and adaptation processes. The developed methodology can be extended to the simulation of other movements as it can be integrated into digital human models (DHMs) software.  相似文献   

20.
The goal of this study is to better understand how the study participants’ cognitive discourse is displayed in their learning transaction in an asynchronous, text-based conferencing environment based on Garrison’s Practical Inquiry Model (2001). The authors designed an online information ethics course based on Bloom’s taxonomy of educational objectives and Bird’s 3C model (Content–Construction–Consolidation). The content analyzed included the participants’ message posts, the quality of the dialogue and the scaffolding strategies for mentoring used by group leaders and teachers.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号