Partici- pants were sent a consent form to fill out and have ready for the interview. At the beginning of the interview, the participant was greeted by the first author and thanked for their attendance. The pur
To be able to carry out this mapping exercise, we choose to focus on contrast- ing concepts that address the protection of privacy in a datafied society. This allows to illustrate the variety of approaches and their implications. From the outset, we focus on legal approaches with the ...
using a Feedback Model that complements the Configuration Model for feedback analysis.To test this approach, we introduce FEACKER, an extension to pure::variants as the variability manager. FE
Participants associated digital technology use with a loss of time, a desire to fill all time, a propensity to forget time and, as a result, a desire to gain greater control of time. As a result, the experience of loss of time to digital technology was associated with feelings of guilt,...
3. Intervening variables in the legitimation process 4. Method 5. Results 6. Discussion 7. Conclusion Declaration of Competing Interest Acknowledgment Appendix A ReferencesShow full outline Cited by (12) Figures (3) Tables (6) Table 1 Table 2 Table 3 Table 4 Table 5 Table A1Public...
After each situation, the participants completed a questionnaire (in the form of a checklist) in which they selected features they considered important to the situation. According to Spicer, young people and drivers who had been involved in accidents were less precise than drivers without an ...