Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In China, "Special Equipment" refers to boilers, pressure vessels (including gas cylinders), pressure pipelines, elevators, lifting appliances, passenger ropeways, large amusement devices, and non-road vehicles, which have high risks. The safety supervision to special equipment in China has been implemented for over 60 years, how to change the function and position of government to reform...
The original design of the Internet was a resilient, distributed system, that may be able to route around (and therefore recover from) massive disruption—up to and including nuclear war. However, network routing effects and business decisions cause traffic to often be routed through a relatively small set of Autonomous Systems (ASes). This is not merely an academic issue; it has practical...
In this paper we present the report on the design and development of a platform for the inter-generational exchange of favors. This platform was designed using participatory design approach during a 24-hour hackathon by a team consisting of younger programmers and older adults. The findings of this report show that inter-generational cooperation in which the older adults serve as representatives of...
Under the surplices of the infrastructure of the internet and because of many types of Web 2.0, a great development has happened in the services offered throughout the nets; this appeared because of plenty of huge save spaces, and high quick speed of the internet. Besides, the variable of great number of programs by which the learner can use the sets without the need of software programs. These programs...
The development of MOOC brings opportunities and challenges to higher education. Based on the analysis of MOOC and traditional classroom teaching, a teaching mode based on MOOC for computer specialty is presented to improve the teacher-centered and rigid teaching mode in traditional education. The proposed teaching mode promotes the teaching reform in favor of the advantages of MOOC and classroom...
The application of computer technology and network communication technology in accounting changed the way accountants work. It does not only bring new opportunities and challenges to the accounting, but also give the internal accounting control new problems and risks. The original accounting internal control cannot keep up with new change. Therefore, it is necessary to innovate and perfect internal...
This paper presents an economic e-Learning prototype for boosting up agricultural knowledge in rural regions of Thailand. The proposed prototype is designed on low-resource and mobility concepts. An e-Learning service is utilized for local self-learning and local staff to instruct contents. Due to the limitations and problems of ICT infrastructure, we design our system to function in two modes which...
Used by both information systems designers and security personnel, the Attack Tree method provides a graphical analysis of the ways in which an entity (a computer system or network, an entire organization, etc.) can be attacked and indicates the countermeasures that can be taken to prevent the attackers to reach their objective. In this paper, we built an Attack Tree focused on the goal “compromising...
The purpose of this study was to analyze and compare the digital citizenship behavior of college students from differing socioeconomic regions of origin. Data was collected with the Digital Citizenship Scale from 712 college students in central China. The results showed students from higher socioeconomic regions of origin displayed more appropriate digital citizenship behaviors than students from...
Currently, we realize that in general tourists spend a lot of time planning their trips because they need to make the most of every moment. In this sense, technology has been a great ally, especially to make this planning as well as to adapt in the event of some unforeseen during the journey. In the last decade, an increasing trend was observed, the traveler or tourist is always connected to mobile...
Recently, the Internet is accessible by the children in the rural area. The purpose of this paper is to understand what affects their true information findings based on the analysis of the survey. Data collection is obtained from the secondary school students (N=237) in Serian, a rural area of Sarawak. A self-administered questionnaire was conducted in three public secondary schools to obtain a socio-demographic...
Social commerce is a new phenomenon of e-commerce that utilizes social medial platforms and applications to conduct e-commerce activities. Uncertainty and high level of risk are the main characteristics of online environment. Trust is always a critical issue influencing people's adoption of e-commerce environment. Most studies focused on trust in e-commerce, but there are a limited number of works...
HTML5 is the latest markup language that includes features to allow developers to do most of the production work throughout the browsers without relying too much on third-party add-ons. HTML5 is always accompanied with JavaScript that gives those browsers the ability to perform the program logic locally. IndexedDB is a NoSQL database supported by HTML5 that is capable of storing JSON objects. In this...
The development of data services (internet) in Indonesia is increasing for each year. The research firm emarketer said that the population netter in Indonesia reached 83.7 million people in 2014, and in 2017 is estimated to reach 112 million people. pt. xyz is a company with business in telecommunications by providing data services as one of its business processes. But in that business process, often...
In the recently approved Information Security Doctrine (Dec 5, 2016) Russia openly aims “to deploy a national system of managing the Russian segment of the internet”. For some time, we have observed how Russia has been conducting intellectual, legislative and technical measures in order to create a purely domestic network disconnected from the global internet by 2020. In the Russian way of thinking,...
is dedicated to the practical application of information technologies and tools in competitive intelligence. The concept of competitive intelligence, the intelligence cycle and the algorithm of the process of competitive intelligence are studied. Software for collection, storage, processing and dissemination of information is reviewed. Special attention is given to the competitive intelligence tools...
In order to promote the integration of information technology and professional curriculum, optimize the teaching process and effect of higher vocational curriculum, and improve the ability of teachers to use modern information technology. At the same time, the modern vocational education advocates “work and study, the integration of theory and practice, do in Teaching, learning by doing.” Numerical...
With the development of Internet and information technology, the virtual brand community can be regarded as a communication means of relationship marketing. Through the network virtual brand community can overcome the limitations of time and space, develop the potential value, and today it has now become an important marketing tool. In order to cope with the homogenization of service content, as well...
In the age of big data, "Internet plus traffic" pattern, which is deeply integrated new generation information technology with transportation, has become the effective method to improve urban traffic. Combined the problems existed in technology integration with innovative application of traffic big data, this paper puts forward transformation strategy of traffic planning technology from...
To assess cybersecurity capabilities in developing countries, governments need to develop a social influence strategy. The main aim is to explore the social influence in the cyberworld and its ability to improve the cybersecurity capabilities in cyberspace' users. Developing countries are from the most source and target of cybercrime in the world, however, their poor infrastructures make them as an...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.