The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Lately the development of information and communication technologies has led to the creation of a new type of economy, called information economy, based on the introduction of the latest advances in computer technology. The innovative economy expansion requires new advanced approaches in all areas of development, including engineering and economic education. In the last few years, the evolution of...
This article considers the results of a survey of the Internet space in order to identify interest and ideas about innovative activities and readiness for it. Understanding of the essence of innovation activity by respondents, its effectiveness, participation in innovation competitions, awareness of leading innovative programs, participation in the registration of intellectual property and other aspects...
Today, multimedia-based materials are the most significant source of information. The first conference of a series called ‘Multimedia in Education’ was organised in the town of Keszthely, Hungary, more than 21 years ago, in 1995. This series of conferences has been organised annually ever since - by different institutions and at different locations, but with the same professional enthusiasm and effort...
In order to be able to successfully defend an IT system it is useful to have an accurate appreciation of the cyber threat that goes beyond stereotypes. To effectively counter potentially decisive and skilled attackers it is necessary to understand, or at least model, their behavior. Although the real motives for untraceable anonymous attackers will remain a mystery, a thorough understanding of their...
The teaching development of university young teacher sets university training, university consulting and teaching reformation as its main content, and set personal development and organization development as basic purpose, moreover, it also organizes serious of activities which dedicate to improve the teaching capability of young teachers and carry forward the teaching culture. The application of...
With the increasing risk of data leakage, information guards have emerged as a novel concept in the field of security which bears similarity to spam filter that examine the content of the exchanged messages. A guard is defined as a high-assurance device used to control the information flow, typically from a domain with a "high" level of confidentiality, such as a corporate or military network,...
Practical work in the laboratory is the most important component in training of the polytechnic specialists. The usage of information and communication technologies as well as Internet makes it possible to increase the number of laboratory facilities available for training students. Bauman University has some laboratories of remote access specialized in such important disciplines like robotics, nanotechnologies,...
The paper summarizes success stories of Finnish and Russian research organizations that joined forces towards development of leading-edge ICT competences and their use in multidisciplinary applications. The partner organizations from both countries have developed close collaboration framework, which enabled them to implement three crossborder cooperation projects co-funded by the Karelia ENPI CBC...
Tie formation in social networks is driven by different motives that are not always apparent in the social network itself. These motives differ from one social network to another, depending on, e.g., the network's purpose, such as advice seeking or collaboration, and the effort it costs to establish a friendship relationship. A common factor that exists in almost all social networks is homophily:...
Use of the Internet has become our second nature. With each passing day computers and mobile devices are becoming ubiquitous in our society. In this backdrop the confidentiality of information is now a question of paramount importance. It is understood fact now that merely technical security solutions cannot guarantee security. End users are required to have solid understanding of the security issues...
Software development teams need highly valuable knowledge to carry out knowledge-intensive development activities. Agile teams are cross-functional teams that promote sharing of project-specific knowledge through frequent face-to-face interaction, effective communication and customer collaboration. Knowledge sharing is difficult for distributed Agile teams due to spatial, temporal, and cultural barriers,...
the purpose of this study was to probe how Appreciative Inquiry (AI) thinking training affects individual's performance in virtual environment. Sixty eight students of a university in Taiwan participated in the study. Thirty four of them received six hours of training courses. The remaining subjects serve as the control. All subjects were administrated the Emotion index before and after the AI thinking...
This paper analyzes the factors that influence new products' diffusion and illustrates the effect of corporate social capital on new products' diffusion. Some researches have showed that corporate social capital would promote the spread and diffusion of new products; it also contributes to develop opinion leaders and formulate a diffusion network that centers the opinion leaders. This paper has practical...
E-commerce is influencing China's social and economic competitiveness. With the speedy development of e-commerce, to train the high qualified talent is the opportunity and challenge to the educational organizations. However, how to settle the gap between the professional training and the needs of the employees is the priority to be considered.
Implementing e-learning in higher education institutions (HEIs) is influenced by various barriers and drivers. The majority of barriers are related to the challenging issue concerning the integration of e-learning into universities. Hence, it is deemed relevant to understand whether different stakeholders in HEIs tend to embrace or ostracize e-learning for their work. This study investigates the extent...
The utilization of information and communication technology (ICT) to enhance teaching and learning is the emphasis of the education reform in China. The purpose of this study was to construct an effective online learning model for the online learning. Through the analysis of the web learning problem, the article brings forward the important function of the online tutor in web learning and defines...
Since 1990, the Thai government has attempted to encourage universities to incorporate e-learning systems intheir curriculum. However, it seems that the number of completed e-learning courses is growing quite slowly, largelydue to the fact that many private and public universities in Thailand have no e-learning adoption readiness, such as policy, regulation, and technology. The necessary components...
Many organizations are using Distance Learning (DL) technology to expedite training. The military in particular is implementing DL because technology is transforming warfighting which means training loads are increasing. The demographics of the military are changing, with the Digital (D) Generation being the majority of new recruits. DL has been successful with the D Generation because they are very...
Security for conducting businesses online is vital and critical. Phishing is a security attack that seeks to trick people into revealing sensitive information about themselves and their Internet accounts. Countries around the world are working to reduce the impact of Phishing. In this paper, research was conducted to introduce and analyze a high level (a country-based) anti-phishing countermeasure...
Advances in computers and communication technology have changed traditional methods for learning and skills training. Today, distance learning is becoming an increasingly popular alternative to traditional programs. Based on the in-depth study and analysis of the network distance education, this paper mainly talk about how to use the theory, methods and techniques of network distance education in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.