Spelling suggestions: "subject:"femail"" "subject:"esmail""
501 |
A Research of the Intra-organizational Media Usage of Kaohsiung's Journalist: by Media Richness and Social Influence ModelHuang, Hui-Wen 28 July 2000 (has links)
¡mAbstract¡n
This research examines six presses of Kaohsiung journalists', China Times, Liberty Times, United Daily News, Taiwan Times, Taiwan Shin Wen Daily News, and Public Daily News, the intra-organization media usage for Media Richness and Social Influence Model.
It tests four media which are face to face, telephone, e-mail, and written document, and tests which one is suitable for Kaohsiung journalists use in formal communication and informal communication. The result is that the most journalist use face to face as their intra-organization media.
Not only testing media usage, this research is also examining the prediction of media usage by Media Richness and Social Influence Model. The result is except downward communication media usage which lacks sufficient samples, the other communication flows' media usage prediction are Media Richness explanation of predicting media usage is better than Social Influence Model.
For each press, face to face is the main choice for six presses' journalists in upward communication, horizontal communication and downward communication flow. However, United Daily News' journalists use written document as the main media in informal communication, but the other presses' still use face to face
The finding in formal and upward communication, the prediction of media usage by Media Richness and Social Influence Model in Liberty Times doesn¡¦t have significant level. Meanwhile, Liberty Times and Taiwan Shin Wen News' prediction of media usage in horizontal communication don¡¦t have significant level. At last, there are only Liberty Times and Public Daily News's media usage prediction have significant level in informal communication.
Keywords:intra-organization, media usage, face to face, telephone, e-mail, written
document, formal communication, informal communication, upward communication, horizontal communication, downward communication, Media Richness, Social Influence Model.
|
502 |
Applications Of Social Network Analysis To Community DynamicsNaimisha, Kolli 03 1900 (has links)
This thesis concerns Social Network Analysis as a mechanism for exploring Community Dynamics. To be able to use the Social Network methodologies, relationships existing between the modeling entities are required. In this thesis, we use two different kinds of relationships: e-mails exchanged and co-authorship of papers. The e-mails exchanged, as an indicator of information exchange in an organization, is used to facilitate the emergence of structure within the organization. In this thesis we demonstrate the effectiveness of using e-mail communication patterns for crisis detection in a hierarchically set organization. We compare the performance of a Social Network based Classifier with some of the traditional classifiers from the data mining framework for inferring this hierarchy. A generic framework for studying dynamic group transformations is presented and the co-authorship of papers, as an indicator of collaboration in an academic institution, is used to study the community behavioral patterns evolving over time. Enron e-mail corpus and the IISc Co-authorship Dataset are utilized for illustrative purposes.
|
503 |
Personlig integritet i arbetslivet : Arbetsgivarens möjlighet till kontroll av arbetstagarens Internet- och e-postanvändningBengtsson, Sofi January 2008 (has links)
<p>Sammanfattning</p><p>Skyddet för arbetstagarens personliga integritet är ett aktuellt ämne där teknikutvecklingen</p><p>ger arbetsgivaren ökade möjligheter att kontrollera arbetstagaren. Därmed äventyras skyddet</p><p>för arbetstagarens personliga integritet. Det finns i dagsläget inte någon direkt</p><p>specialanpassad lagstiftning till skydd för den personliga integriteten i arbetslivet och svensk</p><p>lagstiftning saknar en enhetlig definition på begreppet personlig integritet. Det är oklart vilka</p><p>möjligheter arbetsgivaren har att vidta kontrollåtgärder av arbetstagarens Internet- och epostanvändning</p><p>samt vilket skydd arbetstagaren har för sin personliga integritet.</p><p>Syftet med uppsatsen är att reda ut vilket rättsligt skydd arbetstagaren på den svenska</p><p>arbetsmarknaden har för sin personliga integritet, vilka möjligheter arbetsgivaren har att vidta</p><p>kontrollåtgärder av arbetstagarens Internet- och e-postanvändning, samt vad begreppet god</p><p>sed på arbetsmarknaden i detta fall innebär. För att uppnå syftet används en rättsdogmatisk</p><p>metod, som innebär att aktuella rättskällor det vill säga lagtext, förarbeten, praxis från</p><p>Arbetsdomstolen och doktrin kommer att studeras.</p><p>Arbetsgivaren ges möjlighet att vidta integritetskänsliga åtgärder såsom kontroll av</p><p>arbetstagarens Internet- och e-postanvändning med stöd av den allmänna arbetsledningsrätten,</p><p>avtal, kollektivavtal eller lagstiftning. Dock begränsas möjligheterna till att åtgärden inte får</p><p>stå i strid med god sed på arbetsmarknaden. För att avgöra vad nämnda begränsning innebär</p><p>gör Arbetsdomstolen en intresseavvägning. Arbetstagarens intresse av skydd för sin</p><p>personliga integritet jämförs med arbetsgivarens intresse av kontroll av arbetstagarens</p><p>Internet- och e-postanvändning. Dessutom måste det finnas en rimlig proportion mellan mål</p><p>och medel för kontrollåtgärden, alltså måste intrånget i arbetstagarens privatliv som åtgärden</p><p>vållar stå i rimlig proportion till arbetsgivarens syfte med kontrollen.</p><p>Avslutningsvis kan sägas att vilka kontrollåtgärder arbetsgivaren får vidta och vilket skydd</p><p>arbetstagaren har för sin personliga integritet är en fråga som får avgöras efter bedömning av</p><p>det enskilda fallet.</p> / <p>Abstract</p><p>The protection for the employee’s personal integrity is a current subject where the technology</p><p>development gives the employer increased possibilities to check upon the employee. Thereby</p><p>the protection for the employee’s personal integrity is jeopardized. At present there is no</p><p>special legislation of protection for the personal working life integrity and the Swedish</p><p>legislation lacks a uniform definition of the concept personal integrity. It is unclear which</p><p>possibilities the employer has to take control measures of the employee’s Internet- and e-mail</p><p>use and which protection the employee has for its personal integrity.</p><p>The purpose with the essay is to find out which legal protections the employee on the Swedish</p><p>labour market has for its personal integrity, which possibilities the employer has to take</p><p>control measures of the employee’s Internet- and e-mail use, and what the concept of good</p><p>labour market practice means.</p><p>In order to achieve the purpose a law dogmatic method is used, which means that current</p><p>sources of law i.e. law text, preparation of law text, good practice from labour court and</p><p>doctrine will be studied.</p><p>The employer is given the possibility to take integrity sensitive actions, like control of the</p><p>employee’s Internet- and e-mail use by virtue of the right to direct work, agreement,</p><p>collective agreement or legislation. However, the possibilities are limited as the action must</p><p>not go against good labour market practice. In order to decide what stands against good labour</p><p>market practice the labour court does a weighing of interest. The employee’s interests of</p><p>protection for its personal integrity are compared with the employer’s interests of control of</p><p>the employee’s Internet- and e-mail use. Moreover, there must be a reasonable proportion</p><p>between the objective and means for the control measure, therefore the trespass in the</p><p>employee’s private life that the measure causes must stand in reasonable proportion to the</p><p>employer’s aim with the control.</p><p>In conclusion can be said that which control measures the employer can take and which</p><p>protection the employee has for its personal integrity is a question that must be decided after</p><p>assessment of every individual case.</p>
|
504 |
Der Vorteil des ersten Zugriffs durch "Webpositioning" - das Internet als Schnittstelle von Markenrecht und Wettbewerbsrecht /Rousseau, Marc-André. January 2007 (has links) (PDF)
Universiẗat, Diss.--Freiburg. i. Br., 2005. / Literaturverz. S. 274 - 285.
|
505 |
Information security issues facing internet café users.Kgopa, Alfred Thaga. January 2013 (has links)
M. Tech. Business Information Systems / Although owners of Internet cafés extend the freedom to have Internet access to the community, they fail to tighten their computer security to safeguard the private information of their customers. This dissertation provides a conceptual framework for improving information security in the Internet Café, to help and ensure data privacy, data integrity, risk management and information security (IS) behaviour. The study investigated the information security issues that are faced by users of Internet cafés and explored the effects of these issues. The framework shows how users can improve their physical security to reach higher standards of information privacy over the Internet.
|
506 |
Teachers' perceptions of using e-mail as a communication tool in student guidance in primary schools: a casestudyChung, Lai-kam, Kathy., 鐘麗金. January 2001 (has links)
published_or_final_version / Education / Master / Master of Education
|
507 |
Įmonės „Stoke Travel” internetinio marketingo priemonės / Company’s „Stoke Travel” Internet marketing toolsGaškaitė, Giedrė 20 June 2013 (has links)
Bakalauro baigiamajame darbe nagrinėjamos įmonės „Stoke Travel” interentinio marketingo priemonės. Pagrindinis tyrimo tikslas, aptarus internetinio marketingo priemones teoriniu požiūriu ir atlikus anketinę apklausą, bei interviu, ištirti kaip respondentai vertina įmones naudojamas internetinio marketingo priemones, bei pasiūlyti įmonei tinkamiausias interentinio marketingo priemones. / In this Bachelor’s Degree Work companies “Stoke Travel” Internet marketing tools are analyzing. The main objective is after researching theoretical background of the subject to conduct a survey and interview to find out companies internet marketing tools dimension, their clients internet use peculiarity and clients evaluation to the companies used internet marketing tools.
|
508 |
Automatic identification and removal of low quality online informationWebb, Steve 17 November 2008 (has links)
The advent of the Internet has generated a proliferation of online information-rich environments, which provide information consumers with an unprecedented amount of freely available information. However, the openness of these environments has also made them vulnerable to a new class of attacks called Denial of Information (DoI) attacks. Attackers launch these attacks by deliberately inserting low quality information into information-rich environments to promote that information or to deny access to high quality information. These attacks directly threaten the usefulness and dependability of online information-rich environments, and as a result, an important research question is how to automatically identify and remove this low quality information from these environments. The first contribution of this thesis research is a set of techniques for automatically recognizing and countering various forms of DoI attacks in email systems. We develop a new DoI attack based on camouflaged messages, and we show that spam producers and information consumers are entrenched in a spam arms race. To break free of this arms race, we propose two solutions. One solution involves refining the statistical learning process by associating disproportionate weights to spam and legitimate features, and the other solution leverages the existence of non-textual email features (e.g., URLs) to make the classification process more resilient against attacks. The second contribution of this thesis is a framework for collecting, analyzing, and classifying examples of DoI attacks in the World Wide Web. We propose a fully automatic Web spam collection technique and use it to create the Webb Spam Corpus -- a first-of-its-kind, large-scale, and publicly available Web spam data set. Then, we perform the first large-scale characterization of Web spam using content and HTTP session analysis. Next, we present a lightweight, predictive approach to Web spam classification that relies exclusively on HTTP session information. The final contribution of this thesis research is a collection of techniques that detect and help prevent DoI attacks within social environments. First, we provide detailed descriptions for each of these attacks. Then, we propose a novel technique for capturing examples of social spam, and we use our collected data to perform the first characterization of social spammers and their behaviors.
|
509 |
Der Vorteil des ersten Zugriffs durch "Webpositioning" - das Internet als Schnittstelle von Markenrecht und Wettbewerbsrecht /Rousseau, Marc-André. January 2007 (has links)
Thesis (doctoral)--Albert-Ludwigs-Universität Freiburg im Breisgau, 2007. / Includes bibliographical references (p. 271-284).
|
510 |
The framing of the coverage of the Gaza withdrawal by Israeli forces in the Cape Times, Mail & Guardian and Sunday Times from July 1, 2005 to September 12, 2005Silke, Bryan David 03 1900 (has links)
Thesis (MPhil)--University of Stellenbosch, 2007. / ENGLISH ABSTRACT: The Israeli-Palestinian conflict cannot be classified as an isolated conflict. Today’s clashes
were not triggered by a single event, but rather are as a result of thousands of years of violent
and at times restrained disagreements about the rights of Jews, Muslims and other ethnic
groups to the disputed land known collectively today as Israel and the Palestinian Territories.
This study examines the media coverage of one event during the conflict, i.e. the withdrawal
by Israeli settlers from the Gaza area. The study tracks coverage over ten weeks in the South
African media context, specifically the Mail & Guardian, Cape Times and the Sunday Times
– a media setting in itself highly diverse and compelling.
Using a qualitative framing analysis as the central methodology, the study focused on
six core frames in analysing all articles/reports relating to the Gaza withdrawal. In addition,
the editors of the respective newspapers were interviewed to complement the textual analysis.
The methodological approach addressed how each story was packaged and presented, and
then questioned why certain frames dominated and others did not.
The study found that conflict (a combination of violent and non-violent) was the
dominant frame chosen. Consequences and Attribution of Responsibility were the next two
most prominent frames. Both these frames were found to apportion blame to a particular side
in presenting the news reports and when providing comment. Whilst all three newspapers
argued that they practiced a balanced coverage, it was this perceived “balance” in using
several different frames of presentation that neglected a key “historical” frame. This lack of
historical context was one of the key results of the other frames being so dominant. / AFRIKAANSE OPSOMMING: Die konflik tussen Israel en Palestina kan nie gesien word as ’n geïsoleerde konflik nie. Die
huidige konflik is nie veroorsaak deur ’n enkele gebeurtenis nie, maar spruit uit die
voortslepende geweld tussen Jode, Moslems en ander etniese groepe wat reeds duisende jare
lank duur, as gevolg van betwiste aansprake op die grondgebied gesamentlik bekend as Israel
en die Palestynse grondgebied. Dié studie ondersoek die mediadekking van een gebeurtenis in
die konflik, naamlik die onttrekking van Israeli setlaars in die Gaza-gebied. Die studie volg
mediadekking oor tien weke deur drie Suid-Afrikaanse publikasies, Mail & Guardian, Cape
Times en Sunday Times.
Met behulp van kwalitatiewe raming-analise as die sentrale metodologie, konsentreer
dié studie op ses rame in die analise van artikels, wat verband hou met die onttrekking uit die
Gasastrook. Die navorsing word aangevul met onderhoude met die redakteurs van die
koerante. Die metodologie is toegespits op die manier waarop die stories verpak en aangebied
word, en bevraagteken waarom sekere raamwerke oorheers en ander van minder belang is.
Die studie bevind dat Konflik (’n samestelling van geweldadige en nie-geweldadige
konflik) die oorheersende raam was waarbinne artikels in dié tydperk aangebied is. Die
Gevolge- en Toeskrywing van Verantwoordelikheid-rame kom ná konflik die meeste voor.
By albei raamwerke word bevind dat skuld aan die een of ander kant toegeskryf word in die
aanbiedeing van nuusverslae en wanneer kommentaar gelewer word. Hoewel al drie koerante
volhou dat hulle gebalanseerde dekking aanbied, word ’n belangrike “historiese” raam in dié
aanbieding verontagsaam as gevolg van die gebruik van verskeie rame om balans te
bewerkstellig. Die gebrek aan ’n historiese konteks is een van die vernaamste gevolge van die
oorheersing van die ander rame.
|
Page generated in 0.0653 seconds