期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
利用层次分析法研究科技信息最终用户计算机检索介入程度 被引量:2
1
作者 王桂凤 《情报学报》 CSSCI 北大核心 2001年第4期451-459,共9页
在专家咨询和用户调查的基础上 ,建立了信息最终用户对计算机检索介入程度的层次分析模型。分析了影响我国科技信息最终用户计算机检索介入程度的主要因素。针对不同用户群的特点 ,具体分析各自计算机信息检索的介入程度 ,并提出相应的... 在专家咨询和用户调查的基础上 ,建立了信息最终用户对计算机检索介入程度的层次分析模型。分析了影响我国科技信息最终用户计算机检索介入程度的主要因素。针对不同用户群的特点 ,具体分析各自计算机信息检索的介入程度 ,并提出相应的建议 ,以提高最终用户信息检索自我满足能力。 展开更多
关键词 计算机检索 信息检索 信息最终用户 层次分析法 介入程度
下载PDF
关于对兽药经营环节监管的思考 被引量:1
2
作者 牛庆斐 《动物科学与动物医学》 2004年第3期27-28,26,共3页
关键词 中国 兽药经营 监督管理 市场准入制度 从业人员素质 最终用户信息反馈制度 药政监管网络建设
下载PDF
UGC-Driven Social Influence Study in Online Micro- Blogging Sites
3
作者 LI Hui SHEN Bingqing +1 位作者 CUI Jiangtao MA Jianfeng 《China Communications》 SCIE CSCD 2014年第12期141-151,共11页
In Web 2.0 era,the content on a web page is increasingly generated by end users,rather than limited number of administrators.Hence,large number of User Generated Content(UGC) has driven the explosion of content in the... In Web 2.0 era,the content on a web page is increasingly generated by end users,rather than limited number of administrators.Hence,large number of User Generated Content(UGC) has driven the explosion of content in the web.Thanks to UGC,the pattern of web usage has evolved from download dominated way to a hybrid one with both information download and upload.Large number of UGC has unveiled great capacity of information that is unavailable for researchers before,such as individual preferences,social connections,and etc.In this paper,we propose a novel model which studies the UGC in micro-blogging web sites,the largest and fastest information diffusion media online,and evaluate the social influence for an arbitrary individual.Experimental results show that our model outperforms state-of-the-art techniques in social influence evaluation in both the running time and accuracy. 展开更多
关键词 user generated content microblog social influence communications
下载PDF
Ethically Inspired Care Information Technology Can Enable Freedom of Choice of Older Users
4
作者 Narciso Gonzalez-Vega Anna Kamarainen Outi Kalla 《Sociology Study》 2011年第6期452-459,共8页
The goal of this paper is to present the ethical issues that are relevant at the concept development stage and inspiring its development during the CONFIDENCE (Ubiquitous Care System to Support Independent Living) p... The goal of this paper is to present the ethical issues that are relevant at the concept development stage and inspiring its development during the CONFIDENCE (Ubiquitous Care System to Support Independent Living) project. We propose that the technology must support principles such as human rights, privacy, safety, and dignity. The voluntary contribution of people as participants in research must undergo the scrutiny of research plans by ethical review boards. Informed consent processes and procedures must be observed in this realm. Ethical issues arising in heterogeneous fields involving technology, end-users, service providers, and formal and informal caregivers pose important challenges. Attempting to maximize the ethical compliance of the results of this ICT (information and communication technology) project, we explore and suggest preventive measures for possible scenarios of misuse of this or related technology. Concluding, the observation of ethical principles throughout the development process can empower users to make informed decisions on the acceptance of ICT systems and services when these reach the market. 展开更多
关键词 Care information technology ETHICS informed consent older people CONFIDENCE
下载PDF
Information Security Service Support-Helping End-Users Cope with Security
5
作者 Rahul Rastogi Rossouw yon Solms 《Computer Technology and Application》 2011年第2期137-147,共11页
Organizations implement an information security program for the protection of their information assets. The success of such a program depends primarily on the effective implementation and execution of associated infor... Organizations implement an information security program for the protection of their information assets. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls. These policies and controls depend directly upon the resultant behavior and actions of end-users. Hence, end-users play a critical role in the effective implementation and running of an information security program in any organization. However, end-users are often unable to navigate and comprehend the various policies, controls and associated issues. Support to end-users is therefore a vital element, but is often neglected by present information security management systems. In the service industry, support to customers is established as an important determinant of customer perceived service quality. This paper applies the same philosophy to provide support to end-users, who are the customers of the Information Security Service. 展开更多
关键词 Information security management information security service management (ISSM) service management informationsecurity service support (ISSS) service encounter.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部