Spelling suggestions: "subject:"ehe internet"" "subject:"hhe internet""
101 |
Digital technologies and law : linking and framing on the World Wide WebStrasser, Sarah Elizabeth January 2002 (has links)
No description available.
|
102 |
Flexibility and interactivity in the context of web-based curriculum : managing changeWong, Wai Man Joseph January 2002 (has links)
The research for this thesis involves a case study about the development of a Web-based Curriculum (WBC) in the Institute of Vocational Education of Hong Kong (IVE), abased on a WBC Change Model which provides a research framework emphasizing the importance of managing change in relation to the flexibility and interactivity in the context of the WBC. Previous research studies on Web-based education about its effectiveness on learning outcomes are found to be highly controversial. There is an assertion that the failure to fully use technology in education may be due to academic and technical divide. With regard to this, the study gives a balanced consideration to both educational and technological issues. It shows how the flexibility provided by the addition of WBC contributes to student learning and serves the new needs in the IVE. It also explains how strict control can stifle the growth of the WBC. It is found that human interactions and interactive elements of the WBC are likely to improve student performance as compared with non-human and static elements respectively. The study explores the highly complicated effects of different types of virtual interaction on student learning. The overall effect can be zero or destructive if one or more components dominate the others. If this is the case, the theory of `no-significant difference' prevails but eventually fails to reflect the true picture. The thesis provides further evidence to support the theory of additional learning benefits for different types of interaction on the Web. This research uniquely addresses the distinct characteristics of language barriers for the native Chinese students in Hong Kong especially when the Internet is primarily designed for native English users. Finally, the study explains why and how the failure of the WBC in IVE is related to the curriculum and academic structure. It depicts the conditions to support the development of a unified WBC and illustrates why the educational institutions are slow to respond to technological change. It also identifies those critical success factors related to technology and explains why a mixed strategy on information technology (IT) is suitable for effective implementation of the WBC. The results of this study have significant and far-reaching effects on the formulation of academic policy, organization structure and IT strategy especially for higher and tertiary institutions in Hong Kong.
|
103 |
Detecção de Botnets P2P baseada em discriminantes de sub-fluxos / P2P Botnet Detection Based on Sub-flow Statistical Discriminators (Inglês)Marinho, Renato Rodrigues 29 November 2013 (has links)
Made available in DSpace on 2019-03-29T23:38:54Z (GMT). No. of bitstreams: 0
Previous issue date: 2013-11-29 / Botnet detection has received great attention from the academic community in recent years due to the potential threat they pose to Internet security. The P2P botnets are formed by infected computers with malicious code called zombies, capable of performing various types of malicious actions under the command of a botmaster. Its detection has received two approaches: based on network traffic or based on host behavior. This work analyzes the detection of P2P botnets based on the behavior of network traffic using J48 decision tree and Naive Bayes. The main contributions are: the use of sub-flow statistical discriminators and premature detection of known and unknown P2P botnets based on traffic C&C (command and control). Experimental results show that the approach is promising.
Keywords: P2P botnet detection, command and control, sub-flow discriminators / Detecção de botnets tem recebido uma grande atenção da comunidade acadêmica nos últimos anos dada a potencial ameaça que representam para a segurança na Internet. As botnets P2P são formadas por computadores infectados por códigos maliciosos denominados zumbis, capazes de executar diversos tipos de ações maliciosas sob o comando de umbotmaster. Sua detecção tem recebido duas abordagens: baseada em tráfego de rede ou baseada em comportamento de host. Este trabalho analisa a detecção prematura de botnets P2P com base no comportamento do tráfego de rede utilizando árvore de decisão J48 e Naive Bayes. As principais contribuições deste trabalho estão relacionadas à utilização de discriminantes estatísticos de sub-fluxo e a detecção de botnets P2P conhecidas e desconhecidas com base no tráfego C&C (comando e controle). Os resultados experimentais mostram que a abordagem é bastante promissora.
Palavras-chave: Detecção e botnets P2P, comando e controle, discriminantes de sub- fluxo
|
104 |
A study in cyber marketing.January 1998 (has links)
by Chan Kwok Wah Norman, Yue Man Chun. / Includes questionnaire. / Thesis (M.B.A.)--Chinese University of Hong Kong, 1998. / Includes bibliographical references (leaves 129-130). / ABSTRACT --- p.I / TABLE OF CONTENTS --- p.III / LIST OF ILLUSTRATIONS --- p.V / LIST OF TABLES --- p.VI / ACKNOWLEDGEMENTS --- p.VII / CHAPTER / Chapter I. --- INTRODUCTION --- p.1 / Chapter II. --- RESEARCH METHODLOGY --- p.7 / Descriptive Study ´ؤ Laying Down the Framework --- p.7 / Exploratory Research --- p.9 / Presentation of the Questionnaire --- p.9 / Sampling Method --- p.10 / Procedures of the Survey --- p.72 / Chapter III. --- BUILDING BLOCKS OF CYBER MARKETING --- p.14 / Interactivity --- p.15 / Reverse Marketing --- p.19 / Relationship Marketing --- p.22 / One-to-One Marketing --- p.28 / Market Segmentation in the Internet --- p.30 / Demographic Segmentation --- p.31 / Psycho graphics --- p.31 / Behavior Segmentation --- p.33 / Chapter IV. --- CYBER MARKETING TRANSACTION PLATFORM --- p.37 / An Overview --- p.37 / World Wide Web --- p.40 / E-mail --- p.41 / Newsgroups/Discussion lists --- p.42 / Internet Relay Chat --- p.43 / Chapter V. --- CYBER MARKETING IN ACTION --- p.46 / Cyber Marketing and conventional marketing ´ؤ a nominal difference --- p.46 / Nuts and Bolts in Establishing a Web Presence --- p.50 / Selecting a thread ´ؤ a strategic intent --- p.50 / Creating a theme --- p.57 / Web Page Authoring --- p.52 / Selecting a Domain name --- p.54 / Promoting the web presence --- p.54 / Marketing Mix in Cyber Marketing --- p.55 / Promotion --- p.56 / "Place, Price and Product" --- p.65 / Chapter VI. --- SURVEY ON CYBER MARKETING SUCCESS FACTORS --- p.68 / Questionnaire Design --- p.68 / The transaction platform --- p.68 / The transaction --- p.68 / Internet Usage Characteristics At A Glance --- p.69 / Survey results --- p.73 / General Comments --- p.73 / Demographics --- p.74 / Usage Pattern --- p.77 / Transaction Platform --- p.81 / User expectation and attitude --- p.86 / Chapter VII. --- ANALYSIS ON SURVEY DATA --- p.91 / Inferential Statistics --- p.91 / The age group above 25 --- p.92 / Chapter VIII. --- CONCLUSION --- p.99 / APPENDIX --- p.103 / Questionnaire --- p.103 / ANOVA analysis of survey data --- p.108 / REFERENCES --- p.129
|
105 |
An agent for online auctions: bidding and bundling goods for multiple clients.January 2003 (has links)
by Chi-Lun Chau. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2003. / Includes bibliographical references (leaves 91-93). / Abstracts in English and Chinese. / Abstract --- p.i / Acknowledgement --- p.iv / Table of Contents --- p.v / List of Figures --- p.viii / Definitions --- p.1 / Chapter Chapter 1 - --- Introduction --- p.2 / Chapter 1.1 --- Background --- p.2 / Chapter 1.2 --- Testing Environment --- p.4 / Chapter 1.2.1 --- Game Overview --- p.4 / Chapter 1.2.2 --- Auctions --- p.5 / Chapter 1.2.3 --- Utility and Scores --- p.8 / Chapter 1.3 --- Thesis Contribution and Organization --- p.10 / Chapter Chapter 2 - --- Relatfd Work --- p.12 / Chapter 2.1 --- Traditional auction theory --- p.12 / Chapter 2.2 --- Technologies related to online auctions --- p.13 / Chapter 2.3 --- Recent researches on online auctions --- p.14 / Chapter 2.3.1 --- Priceline (proposed by Amy Greenwald) --- p.16 / Chapter 2.3.2 --- ATTac: Integer Linear Programming (ILP) --- p.17 / Chapter 2.3.3 --- RoxyBot: Beam search --- p.19 / Chapter Chapter 3 - --- Theoretical model for agents in online auctions --- p.20 / Chapter 3.1 --- High-level planning --- p.20 / Chapter 3.2 --- Mathematical model --- p.21 / Chapter Chapter 4 - --- Agent Architecture and Mechanisms --- p.26 / Chapter 4.1 --- Architecture --- p.26 / Chapter 4.2 --- Cost Estimator (CE) --- p.29 / Chapter 4.2.1 --- Closed auction --- p.29 / Chapter 4.2.2 --- "Open ""take-it or leave-it"" market" --- p.30 / Chapter 4.2.3 --- Open continuous double auction (CDA) --- p.31 / Chapter 4.2.4 --- Open multi-unit ascending auction --- p.33 / Chapter 4.4.2.1 --- Historical clearing prices --- p.33 / Chapter 4.4.2.2 --- Increasing marginal costs --- p.35 / Chapter 4.4.2.3 --- Bid winning probability --- p.37 / Chapter 4.3 --- Allocation and Acquisition Solver (AAS) --- p.39 / Chapter 4.3.1 --- Un-coordinated VS coordinated aspiration --- p.39 / Chapter 4.3.2 --- Optimal VS heuristic approach --- p.40 / Chapter 4.3.3 --- An greedy approach with coordinated aspiration --- p.41 / Chapter 4.4 --- The Bidders --- p.44 / Chapter 4.4.1 --- """Take-it or leave-it"" market" --- p.44 / Chapter 4.4.2 --- Multi-unit ascending auction --- p.46 / Chapter 4.4.2.1 --- Budget bidding --- p.47 / Chapter 4.4.2.2 --- Low price bidding --- p.49 / Chapter 4.4.3 --- Continuous double auction (CDA) --- p.51 / Chapter 4.4.3.1 --- Review of fuzzy reasoning mechanism --- p.52 / Chapter 4.4.3.2 --- Fuzzy Reasoning in FL-strategy --- p.54 / Chapter 4.4.3.3 --- Adaptive Risk Attitude --- p.59 / Chapter Chapter 5 - --- Results --- p.61 / Chapter 5.1 --- TAC '02 Competition --- p.62 / Chapter 5.1.1 --- Tournament result of our working agent --- p.63 / Chapter 5.1.2 --- "Comparisons between CUHK, ATTac and Roxybot" --- p.65 / Chapter 5.1.3 --- Low-price Bidding --- p.66 / Chapter 5.2 --- Controlled Environment --- p.67 / Chapter 5.2.1 --- Software platform --- p.67 / Chapter 5.2.2 --- Aggressive agent vs. Adaptive agent --- p.68 / L-agent (aggressive agent) --- p.68 / S-agent (adaptive agent) --- p.69 / Experimental Setting --- p.70 / Experimental Results --- p.71 / The Hawk-Dove Game --- p.72 / Chapter 5.2.3 --- Our agent model --- p.73 / Experimental Setting --- p.73 / Experimental Results --- p.74 / Chapter 5.2.4 --- Historical clearing price --- p.75 / Experimental Setting --- p.76 / Experimental Result --- p.76 / Comparisons among different approaches --- p.77 / Chapter 5.2.5 --- Increasing marginal cost --- p.79 / Experimental Setting --- p.79 / Experimental Result --- p.79 / Chapter 5.2.6 --- Bid winning probability --- p.81 / Experimental Setting --- p.81 / Experimental Result --- p.81 / Chapter 5.2.7 --- FL-strategy --- p.82 / A-strategy --- p.83 / Experimental Setting --- p.84 / Experimental Result --- p.85 / Chapter Chapter 6 - --- Conclusion and Future work --- p.87 / Reference --- p.91
|
106 |
Design and control of an Internet telephony systemChin, Chi Kwan 01 January 2000 (has links)
No description available.
|
107 |
Internet advertising of banks in Sweden during the present financial crisisMalicki, Pawel Jr, Bousquie, Cecile Jr January 2009 (has links)
<p>The purpose of this study is to provide the view on the online advertising’s characteristics during the present financial crisis in Sweden. To achieve the purpose, multiple case study of four main Swedish banks is used with the predominance of descriptive method. The main finding of this study is close interaction between the advertising character and market trends impact. This main observation has a great impact on the character of the analysis and affects almost every functional aspect of the advertising. Besides that, also five other main observations were made. Following them, it is especially worth to mention that advertising can be a source of competitiveness, a way of differentiation or a way of conditioning customer. From all the study findings, clear image of ads typical features, functions and roles in the banks’ prosperity arises.</p>
|
108 |
Information behavior and meaning-making in virtual play spaces a case study of City of Heroes /Adams, Suellen S., January 1900 (has links) (PDF)
Thesis (Ph. D.)--University of Texas at Austin, 2006. / Vita. Includes bibliographical references.
|
109 |
Design of a trading mechanism in electronic marketplaces online multidimensional auction mechanism with enhanced negotiation support /Cho, Sungwon. January 2001 (has links)
Thesis (Ph. D.)--University of Hawaii at Manoa, 2001. / Includes bibliographical references (leaves 131-139). Also available on microfiche.
|
110 |
Internet advertising of banks in Sweden during the present financial crisisMalicki, Pawel Jr, Bousquie, Cecile Jr January 2009 (has links)
The purpose of this study is to provide the view on the online advertising’s characteristics during the present financial crisis in Sweden. To achieve the purpose, multiple case study of four main Swedish banks is used with the predominance of descriptive method. The main finding of this study is close interaction between the advertising character and market trends impact. This main observation has a great impact on the character of the analysis and affects almost every functional aspect of the advertising. Besides that, also five other main observations were made. Following them, it is especially worth to mention that advertising can be a source of competitiveness, a way of differentiation or a way of conditioning customer. From all the study findings, clear image of ads typical features, functions and roles in the banks’ prosperity arises.
|
Page generated in 0.0923 seconds