The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This research is conduced a full year after the implementation of numerous instant messaging services within National Gendarmerie. The objective is to study their use and impact on communication and information management, considering the specificities of this military institution. Our methodology confronts semi-directive interviews with gendarmes and commanders, with observations of real-life, work...
This study seeks to assess the impact of photography and social networks, checking how the photographs online are perceived by users of social networks. With the growing use of digital devices with internet access alongside with the democratization of photography, in digital format, it has been noticed an increase in the amount of photographs available online through social networks where the common...
We are forwards Big Data world, when we refer to the growth and data diversity, generated at high speed, connected to the truth and value of information, all driven by the current technology advances. Another point of interest concerns with the meeting points related with Audit and Big Data dimensions, inside a framework of minimum control requirements. This research present precise concepts by organizations...
Today big data is synonymous with every business and organization, so much so that data brokers have made a business of trading this big data like any other commodity. In turn, the buyers of this big data make massive profits. The only one who loses out on profits and his privacy is the internet user — the generator and owner of this big data. Our work looks at allowing the user to monetize on his...
Co-design is a process for creating interventions with representative participants of the target group. The co-design process ensures that the technologies are aligned with people's needs and removes the designer subjectivity. This paper discusses the co-design methodology and evaluation of the Pro-CEE serious game, an innovative intervention which is aimed to raise the awareness of prostate cancer...
In the late 80s, Ackoff first proposed a cognitive category upon the content of human mind, which included Data, Information, Knowledge and Wisdom, or DIKW. Since then, the DIKW hierarchy has attracted a flurry of further research studies. Its applications include ontology composition, decision making theory, domain specific engineering theory, software design thought process automation, etc., to...
This paper is devoted to the problems of information systems necessary for constructive data classification and decision-making process of operator depending on the cognitive characteristics.
Following the two trends of computerization and informatization, another emerging trend is cyberization in which numerous and various cyber entities in cyberspace will exist in cyber-enabled worlds, including the cyber world and cyber-conjugated physical, social, and mental worlds. Computer science and information science, as holistic fields, have, respectively, played important roles in computerization...
This paper presents a study that investigated three features to improve how users perform information gathering tasks on the web. These features were based on recommendations that were developed in a previous work. The results of the previous study indicated that tools supporting information gathering could be improved by: 1) keeping track of references to information as it is gathered for the task...
The report considers the benefits and effectiveness of information displaying by multimedia technology and the ability to fill its information content by different types of information.
Web information gathering includes tasks in which users attempt to locate, organize, and use information from different sources on the web to satisfy an information need, often over multiple sessions. An example is the case of writing a report or beginning an investigation. This paper presents the results of a research study to explore the difficulties users experience during such tasks. Twenty users...
A lot of questions appear in the construction course of the digital city, such as data islands, massive data storage and collaborative computing, etc. Traditional network processing methods do not meet the needs of the construction and application. The grid technology can solve these problems brought about. How to build digital cities In the grid environment, this paper presents a digital city spatial...
The purpose of this study is to provide a direction on developing effective web site marketing strategy for China hotels by evaluating, analyzing and comparing the web sites between China hotels and U.S. hotels. In the article, the web site marketing attributes were identified and categorized into four groups “information”, “communication”, “distribution” and “transaction” based on the ICDT model...
The present study classified 43 websites on information and entertainment profiles. The website profile comprised informativeness, organisation of information elements, entertainment properties and organisation of entertainment elements. The results revealed that out of 43 websites, 8 were high on both information and entertainment profiles, 15 were high on information and low on entertainment profiles,...
This paper describes a free and open source information system designed to be deployed in emergencies caused by sudden onset natural disasters. The aim is to streamline the communication flow and collaboration between media, aid workers and government agencies with the affected population, to help the latter get verified, accurate and actionable information that will enable them to make decisions...
The term security network intelligence is widely used in the field of communication security network. A number of new and potentially concepts and products based on the concept of security network intelligence have been introduced, including smart flows, intelligent routing, and intelligent Web switching. Many intelligent systems focus on a specific security service, function, or device, and do not...
In the recent past, television and radio has contributed most to creating McLuhan's dasiaglobal villagepsila but their virtually impersonal makes them incapable for users to combine the dialogic aspects of postal communication with the instantaneous features of electronic media. Schafermeyer M.J (1998). Hence after the introduction of e-mail since has been a form of focal information dissemination...
This study centers on multiple-scheme encryption using annotation technology. The objective was to propose a composite encryption framework that combines several encryption specifications. It was assumed that combining several encryption standards can further enhance information security. It divided a message to be encrypted into packets and each packet was coded with a methodology independent of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.