The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The purpose of this study was to analyze and compare the digital citizenship behavior of college students from differing socioeconomic regions of origin. Data was collected with the Digital Citizenship Scale from 712 college students in central China. The results showed students from higher socioeconomic regions of origin displayed more appropriate digital citizenship behaviors than students from...
The purpose of this study is to explore the acceptance of Tablet PCs in K-12 education among parents and communities. Because of the obstacles and controversies existed in world-wide "One Tablet PC per Child" projects, the authors used the Technology Acceptance Model to identify the potential factors that may influence the acceptance of Tablet PCs from the perspectives of parents and communities,...
This case study investigated mathematics teachers' perspectives and the status of the applications of information technology (IT) in a key senior high school in China. A questionnaire was conducted to collect data. This research focused on teachers' perceptions on the role of IT in mathematics classroom instruction, as well as the status of the technology integration in their class. Results of the...
Web 2.0 is the general designation of a kind of interactive Internet application, the main characteristic of Web 2.0 relative to Web 1.0 is that more attention paid to the interaction with the customer. The important content of Customer Relationship Management is the interaction between the corporation and the customer, so most technology and application of Web 2.0 can be used in Customer Relationship...
Online shopping is already a common feature in the Internet world. Under certain circumstances, they are not able to satisfy a small group of consumers who actively pursue new technologies, products and fashions that are not yet available in the local mainstream retail (both physical and virtual) market. They either have to purchase via overseas websites or engage the service of e-purchasing/auction...
This research studies users' adoption process of WiMAX. This process cannot be viewed in isolation and must consider the effect of co-existing telecommunication networks and a highly saturated market. WiMAX success would involve getting existing mobile subscribers to switch over to WiMAX. Hence, 2/2.5G and 3G subscribers are used separately as subjects of investigation because they are likely to form...
Meta-search is a search engine that sends users' requests to several other search engines and/or databases and returns the results from each one. Concepts are defined in a semantic network that contains links to the original terms. This article provides a framework of three layers, meta-search layer, concept layer, concept clustering and sorting layer to guide user to refine the query terms. The first...
Web services have led a revolution of Internet technology architecture by their platform-independence, language- independence and other characters. But traditional Web service architecture is based on "Client/Server" model, where server is always providing service reactively. Software agents are now increasingly used in commercial applications to solve complex engineering problems, for their...
False data injection is a severe attack that compromised sensor nodes ("moles"1) can launch. These moles inject large amount of bogus traffic that can lead to application failures and exhausted network resources. Existing sensor network security proposals only passively mitigate the damage by filtering injected packets; they do not provide active means for fight back. This paper studies...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.