• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 42
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 49
  • 49
  • 49
  • 13
  • 10
  • 8
  • 7
  • 7
  • 7
  • 7
  • 7
  • 5
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Influence of e-message prompting on the adherence to a desk situated exercise program

Lambeth, Meghan Whelan 01 March 2010 (has links)
This quasi-experimental, pre-and-post-test, multi-method design examined e-prompting, and its impact on adherence to a desk-situated workplace exercise program. Fifty volunteer inactive office workers were recruited from a Canadian college. The intervention tested the effectiveness of a 12-week, twice-daily, low resistance, exercise band program with or without e-prompting. Pre-and-post-test data were collected through two questionnaires and measurements of strength/endurance. Additionally, the intranet exercise web site recorded participants' frequency log in data. Quantitative findings showed significant strength improvements in three of the measures (leg press, chest press, bicep curl). Data from the pre-and-post questionnaires found significant positive movement in four questions. Analysis of qualitative data identified two themes, barrier to physical activity and convenience suggesting that the intervention enhanced participants' self-efficacy to perform and adhere to an exercise program. The combination of e-prompting combined with a desk exercise program appears to have the potential to increase physical activity among inactive office workers.
32

Policy-controlled email services

Kaushik, Saket. January 2007 (has links)
Thesis (Ph. D.)--George Mason University, 2007. / Title from PDF t.p. (viewed Jan. 18, 2008). Thesis directors: Paul Amman, Duminda Wijesekera. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Vita: p. 198. Includes bibliographical references (p. 189-197). Also available in print.
33

Beyond the schoolyard: examining electronic bullying among Canadian youth /

Stys, Yvonne, January 1900 (has links)
Thesis (M.A.)--Carleton University, 2005. / Includes bibliographical references (p. 104-113). Also available in electronic format on the Internet.
34

Email overload in academia /

Hole, Jeffrey D. January 2008 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2008. / Typescript. Includes bibliographical references (leaves 84-90).
35

E-shape analysis

Sroufe, Paul. Dantu, Ram, January 2009 (has links)
Thesis (M.S.)--University of North Texas, Dec., 2009. / Title from title page display. Includes bibliographical references.
36

Workplace privacy in the internet age : recommendations for a policy framework in Sri Lanka /

Mahanamahewa, Sri Warna Prathiba. January 2005 (has links) (PDF)
Thesis (Ph.D.) - University of Queensland, 2006. / Includes bibliography.
37

Assessing communication strategies at higher education institutions : a case of Walter Sisulu University

Mgweba, Chulumanco January 2017 (has links)
Submitted in fulfilment of the requirement for Masters in Management Sciences specialising in Public Relations, Durban University of Technology, Durban, South Africa. 2017. / In South Africa the National Plan for Higher Education (NPHE, 2001) brought with it distinct changes to the higher education landscape. Amongst the major changes were the mergers of various higher education institutions. In 2005, the Walter Sisulu University for Technology (WSU) was established through the merger of the former Border Technikon, Eastern Cape Technikon and the University of Transkei. The University caters for students from the Eastern Cape’s Border and Kei regions resulting in communication with a large number of stakeholders. Effective communication as well as developing and maintaining relationships with key stakeholders therefore become pivotal. This study set out to examine the perceived effectiveness of communication strategies between the Walter Sisulu University and students. A mixed method approach found that although respondents felt that communication was satisfactory, concerns were however, raised about the effectiveness of the communication strategies being utilised. The study recommended e-communication as a key strategy to facilitate communication with students. / M
38

E-mail forensic authorship attribution

Lalla, Himal January 2010 (has links)
E-mails have become the standard for business as well as personal communication. The inherent security risks within e-mail communication present the problem of anonymity. If an author of an e-mail is not known, the digital forensic investigator needs to determine the authorship of the e-mail using a process that has not been standardised in the e-mail forensic field. This research project examines many problems associated with e-mail communication and the digital forensic domain; more specifically e-mail forensic investigations, and the recovery of legally admissible evidence to be presented in a court of law. The Research Methodology utilised a comprehensive literature review in combination with Design Science which results in the development of an artifact through intensive research. The Proposed E-Mail Forensic Methodology is based on the most current digital forensic investigation process and further validation of the process was established via expert reviews. The opinions of the digital forensic experts were an integral portion of the validation process which adds to the credibility of the study. This was performed through the aid of the Delphi technique. This Proposed E-Mail Forensic Methodology adopts a standardised investigation process applied to an e-mail investigation and takes into account the South African perspective by incorporating various checks with the laws and legislation. By following the Proposed E-mail Forensic Methodology, e-mail forensic investigators can produce evidence that is legally admissible in a court of law.
39

Text Classification: Exploiting the Social Network

Alkhereyf, Sakhar Badr M January 2021 (has links)
Within the context of social networks, existing methods for document classification tasks typically only capture textual semantics while ignoring the text’s metadata, e.g., the users who exchange emails and the communication networks they form. However, some work has shown that incorporating the social network information in addition to information from language is useful for various NLP applications, including sentiment analysis, inferring user attributes, and predicting interpersonal relations. In this thesis, we present empirical studies of incorporating social network information from the underlying communication graphs for various text classification tasks. We show different graph representations for different problems. Also, we introduce social network features extracted from these graphs. We use and extend graph embedding models for text classification. Our contributions are as follows. First, we have annotated large datasets of emails with fine-grained business and personal labels. Second, we propose graph representations for the social networks induced from documents and users and apply them on different text classification tasks. Third, we propose social network features extracted from these structures for documents and users. Fourth, we exploit different methods for modeling the social network of communication for four tasks: email classification into business and personal, overt display of power detection in emails, hierarchical power detection in emails, and Reddit post classification. Our main findings are: incorporating the social network information using our proposed methods improves the classification performance for all of the four tasks, and we beat the state-of-the-art graph embedding based model on the three tasks on email; additionally, for the fourth task (Reddit post classification), we argue that simple methods with the proper representation for the task can outperform a state-of-the-art generic model.
40

Examining the relationship between training in ethics, work setting, and the ethical reasoning process of I/O psychologists using an electronic mail survey

Hoffmaster, Kimberly Ann 01 January 1999 (has links)
No description available.

Page generated in 0.0684 seconds