Spelling suggestions: "subject:"6electronic data processing"" "subject:"belectronic data processing""
541 |
Exploring the relationship between continuing professional education and job satisfaction for information technology professionals in higher education.Bennett, Sandra M. 05 1900 (has links)
The study had four main hypotheses that examined the relationships between job satisfaction and the reasons for attending continuing professional education (CPE). The purpose of this study was to examine the relationships between training and job satisfaction with the objective of adding to the body of knowledge related to both job satisfaction and training and development. Participation Reasons Scale was used to measure the reasons for attending CPE activities, and the Job in General Scale and Job Descriptive Index was used to measure job satisfaction. The surveys were administered over the Internet to information technology professionals working in higher education. The participants were contacted by email with a message explaining the purpose of the research and a Web link that took the participants directly to the survey. After collecting the data, it was exported into SPSS and analyzed using Spearman Rho and Mann Whitney U statistics and a simple structure exploratory factor to determine any underlying structures between the job satisfaction and CPE.
|
542 |
漫長的電子革命: 計算機與紅色中國的技術政治1955-1984 = Machine for a long revolution : computer as the nexus of technology and class politics in China 1955-1984. / 計算機與紅色中國的技術政治1955-1984 / Machine for a long revolution: computer as the nexus of technology and class politics in China 1955-1984 / Man chang de dian zi ge ming: ji suan ji yu hong se Zhongguo de ji shu zheng zhi 1955-1984 = Machine for a long revolution : computer as the nexus of technology and class politics in China 1955-1984. / Ji suan ji yu hong se Zhongguo de ji shu zheng zhi 1955-1984January 2014 (has links)
這項研究探討信息科技在中國的技術政治。研究試圖書寫電子計算機作為一種新的電子信息科技在中國早期設置過程的技術政治社會史,並在理論層面上尝试构建一個拓展了的「技術、社會、與勞動」的進路。源於冷戰的地緣政治結構,不像韓國、台灣、或香港等其他亞洲國家和地區 ,在1980年代改革開放以前,中國大陸的計算機工業已經經歷了近30年(1955-1984)連續且激進的獨立發展。特別需要指出的是,中國社會主義時代的計算機發展不僅僅是爲了滿足冷戰中的國防需要和技術民族主義意識形態下社會動員的需要,同時高度嵌入了有關階級政治和技術哲學的社會主義「社會實驗」當中。而隨著文革群眾運動的終結和中國的「改革開放」,鄧小平為首的國家決策層爲了回應來自外部的壓力和來自社會主義內部的危機,用實用主義的技術發展觀取代了社會主義的技術民主實踐。1984年,隨著阿尔文.托夫勒(Alvin Toffler)的《第三次浪潮》(The Third Wave)風靡中國大陸,革命中國的計算機工業和技術政策逐步被隨新自由主義全球化而來的「信息社會」和「矽谷模式」所取代。 / 作為一個技術和文化的雙重物件,電子計算機及其衍生科技(臺式計算機、筆記本電腦、智慧手機、平板電腦等)是理解當代資本主義生產、消費、與勞動關係的指標性科技。然而在社會主義中國的革命現代化進程中,它卻曾經一度拐入了一條另類的發展路徑。中國的信息化(informationalization)或曰計算機化(computerization)過程中的技術路線鬥爭和轉型是如何發生的,這一進程與中國「從毛到鄧」的獨特現代化道路之間是怎樣的關係?時至今日,批判的傳播研究對這段歷史依然所知甚少。本文試圖重訪這個歷史轉折,探查計算機在中國的早期技術政治史。通過追蹤關鍵的歷史事件、人物、思潮、和政策,論文試圖探尋冷戰架構下東西方技術政治之間的交鋒,如何在被計算機仲介的生產與勞動關係中顯影。從這個「閃回」中得到的知識,有助我們將對今日中國信息產業和信息勞動的理解,重新納入中國革命現代性的潮起潮落之中。 / This paper traces the political and social history for the installation process of digital technology in China, in order to shed light on the ways in which computer interacted with the transformation of Chinese socialism. Due to geopolitical structure of the Cold War, unlike other East Asian countries, before 1980s China had developed its independent computer industry for more than 30 years. This development was not just under the rubric of techno-nationalism, which mainly helps to fulfill military and national defense aims, but also embedded into proletariat political debates. Maoist China developed a dialectical approach to technology, in which the most powerful productive power is the revolutionary proletariat class per se, not the machine or technology. So the process of socialist technology development, like the process of socialist culture and arts development is also a dialectical process, which must follow mass line to not just develop productive force, but also transform production relations and create socialist subjectivity. Instead, the post-Mao leadership under Deng Xiaoping responded to external Cold War pressures and the profound internal crises of state socialism by a massive market-oriented "reform and open-up" process. It is during the same period that the self-reliant computer industry system was replaced step-by-step by a western-oriented system, signified by the popularity of Alvin Toffler’s The Third Wave. In this context, computer became a machine for labor control and scientific management, no longer a machine for people’s emancipation. / With a focus on technology politics of computer in China during 1955-1984, this study examines how the concept of computer was introduced into the country and conceived by key players at the time, how such discourses led to the production and consumption of computer by different actors, and how this process triggered the transformation of hegemony and practice related to computer-mediated labor relationship, and finally how such a historical formation was conditioned by the post-cold war structure in East Asia, as well as struggles between Maoist socialist legacy and transborder neo-liberalism ethic. This dissertation revisits this transformation, traces its Key Figures and several historical moments, which shows debates and struggles on computer as the articulation of technology and class politics. Reflections from this flashback will rehistorize China’s working-class formation in its electronic industry nowadays into the ebbs and flows of China’s revolutionary modernity. / Detailed summary in vernacular field only. / Detailed summary in vernacular field only. / 王洪喆. / Thesis (Ph.D.) Chinese University of Hong Kong, 2014. / Includes bibliographical references (leaves 336-360). / Abstracts also in English. / Wang Hongzhe.
|
543 |
Educational requirements for data processing professionals: research report.January 1981 (has links)
by Kwong Chak Chung, Wong Buen Fung Gabriel. / Thesis (M.B.A.)--Chinese University of Hong Kong, 1981. / Bibliography: leaves 74-76.
|
544 |
A study of PC and LAN training in Hong Kong and the business opportunities.January 1991 (has links)
by Chan Chi-ming and Mak Pak Yick, Philip. / Thesis (M.B.A.)--Chinese University of Hong Kong, 1991. / Bibliography: leaves [169-170] / ACKNOWLEDGEMENT --- p.i / ABSTRACT --- p.ii / TABLE OF CONTENTS --- p.iii / CHAPTER / Chapter 1. --- INTRODUCTION --- p.1 / Objectives --- p.1 / Background and why this topic was chosen --- p.2 / The Solution - Training --- p.7 / Computer Training --- p.8 / Chapter 2. --- BACKGROUND OF THE COMPUTER INDUSTRY AND COMPUTER TRAINING IN HONG KONG --- p.10 / The Computer Industry --- p.10 / Computer Training in Hong Kong --- p.12 / Chapter 3. --- METHODOLOGY --- p.21 / Literature Survey --- p.22 / Problem statement --- p.24 / Theoretical Framework --- p.24 / Field Survey Design Details --- p.25 / Chapter 4. --- DATA ANALYSIS OF THE SURVEY --- p.32 / Data Analysis Method --- p.32 / Feel for Data --- p.32 / Testing and Analysis --- p.55 / Chapter 5. --- BUSINESS OPPORTUNITIES --- p.76 / High Demand for Training --- p.76 / Computer Aided Training will be a growth area --- p.77 / Conclusion --- p.78 / APPENDIX I --- p.80 / APPENDIX II --- p.89 / APPENDIX III --- p.101
|
545 |
Parallel remote interactive management modelZuriekat, Faris Nabeeh 01 January 2007 (has links)
This thesis discusses PRIMM which stands for Parallel Remote Interactive Management Model. PRIMM is a framework for object oriented applications that relies on grid computing. It works as an interface between the remote applications and the parallel computing system. The thesis shows the capabilities that could be achieved from PRIMM architecture.
|
546 |
Protecting security in cloud and distributed environmentsHe, Yijun, 何毅俊 January 2012 (has links)
Encryption helps to ensure that information within a session is not compromised. Authentication and access control measures ensure legitimate and appropriate access to information, and prevent inappropriate access to such resources. While encryption, authentication and access control each has its own responsibility in securing a communication session, a combination of these three mechanisms can provide much better protection for information.
This thesis addresses encryption, authentication and access control related problems in cloud and distributed environments, since these problems are very common in modern organization environment. The first one is a User-friendly Location-free Encryption System for Mobile Users (UFLE). It is an encryption and authentication system which provides maximum security to sensitive data in distributed environment: corporate, home and outdoors scenarios, but requires minimum user effort (i.e. no biometric entry, or possession of cryptographic tokens) to access the data. It makes users securely and easily access data any time and any place, as well as avoids data breach due to stolen/lost laptops and USB flash. The multi-factor authentication protocol provided in this scheme is also applicable to cloud storage.
The second one is a Simple Privacy-Preserving Identity-Management for Cloud Environment (SPICE). It is the first digital identity management system that can satisfy “unlinkability”and “delegatable authentication” in addition to other desirable properties in cloud environment. Unlinkability ensures that none of the cloud service providers (CSPs), even if they collude, can link the transactions of the same user. On the other hand, delegatable authentication is unique to the cloud platform, in which several CSPs may join together to provide a packaged service, with one of them being the source provider which interacts with the clients and performs authentication, while the others are receiving CSPs which will be transparent to the clients. The authentication should be delegatable such that the receiving CSP can authenticate a user without a direct communication with either the user or the registrar, and without fully trusting the source CSP.
The third one addresses re-encryption based access control issue in cloud and distributed storage. We propose the first non-transferable proxy re-encryption scheme [16] which successfully achieves the non-transferable property. Proxy re-encryption allows a third-party (the proxy) to re-encrypt a ciphertext which has been encrypted for one party without seeing the underlying plaintext so that it can be decrypted by another. A proxy re-encryption scheme is said to be non-transferable if the proxy and a set of colluding delegatees cannot re-delegate decryption rights to other parties. The scheme can be utilized for a content owner to delegate content decryption rights to users in the untrusted cloud storage. The advantages of using such scheme are: decryption keys are managed by the content owner, and plaintext is always hidden from cloud provider. / published_or_final_version / Computer Science / Doctoral / Doctor of Philosophy
|
547 |
Design of versatile, multi-channeled, data acquisition moduleGateno, Leon W. January 2011 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries
|
548 |
Synchronize and stabilize: a framework for best practicesSathiparsad, Nalin 31 January 2003 (has links)
Computing / (M.Sc. (Information Systems))
|
549 |
A knowledge-based electronic messaging system: Framework, design, prototype development, and validation.Motiwalla, Luvai Fazlehusen. January 1989 (has links)
Although electronic messaging systems (EMS) are an attractive business communication medium several studies on the usage and impact of EMS have shown that despite the benefits, they have been generally used for routine and informal communication activities. Theoretically, EMS have yet to find their niche in organizational communications. Technically, EMS designs are not flexible to support communication activities of managers, are not maintainable to permit easy integration with other office applications and access to information from data/knowledge bases, and are not easily extendible beyond the scope of their initial design. Behaviorally, end users are not directly involved in the development of EMS. This dissertation attempts to bridge the transition of EMS technology from message processing systems to communication support systems. First, the dissertation provides an analysis for a knowledge-based messaging system (KMS) through a framework. The framework provides a theoretical basis to link management theory to EMS technology. It suggests that the communication needs of the managers vary depending on the activity level, implying related variations in EMS functionality. Second, the dissertation provides a design for the KMS through an architecture which incorporates the design and implementation issues such as, flexibility, maintainability, and extendibility. The superimposition of the KMS on an existing EMS provides flexibility, the loose coupling between the KMS-interface components and the KMS-functions increases its maintainability, and the strong functional decomposition and cohesion enhances the extendibility of the system beyond the scope of its initial design. Finally, the dissertation provides a implementation through the development of a prototype KMS which involves users into the design process through a validation study conducted at University of Arizona. The prototype used GDSS tools in eliciting message attributes for the personal knowledge base. This method proved effective in reducing the bottleneck observed in the acquisition of knowledge from multiple experts, simultaneously. Similarly, the combination of observation with interviews proved effective in eliciting the organizational knowledge base. The validation method measured the system's accuracy (which was very accurate) in prioritizing messages for the users.
|
550 |
Data capturing system using cellular phone, verified against propagation modelsVisser, Schalk W. J. (Schalk Willem Jacobus) 12 1900 (has links)
Thesis (MScIng)--University of Stellenbosch, 2004. / ENGLISH ABSTRACT: Data capturing equipment are an expensive part of testing the coverage of a deployed or planned wireless
service. This thesis presents the development of such a data capturing system that make use of 1800MHz
GSM base stations as transmitters and a mobile phone connected to a laptop as receiver. The
measurements taken, are then verified against know propagation models.
Datavaslegging toerusting wat gebruik word om die dekking van draadlose stelsels te toets is baie duur en
moeilik bekombaar. Hierdie tesis beskryf die ontwikkeling van so ’n datavaslegger wat baie goedkoper is en
maklik gebruik kan word. Dit maak gebruik van ’n sellulêr foon en GPS gekoppel aan ’n skootrekenaar,
wat die ontvanger is. Cell C basis staties word gebruik as die senders. Die data wat gemeet is word dan
geverifieer deur gebruik te maak van bestaande radio frekwensie voortplanting modelle.
|
Page generated in 0.1296 seconds