theory of evidenceuncertainty based informationtotal uncertaintyconflictnon-specificityInformation and communication technology (ICT) acceptance and use is a prolific research stream in the information systems field. Yet studies on attitude have gone through ups and downs yielding inconsistent and inconclusive...
Structured Systems Analysis and Design Method (abbr. SSADM) is a method developed in Great Britain and accepted in 1993 as a national standard for information systems development and analysis. SSADM is based on Data Flow Diagrams and is characterized with presence of clear sequence of steps at pr...
Complex adaptive systems (e.g. Philips & Ritala, 2019)Service-dominant logic (e.g. Vargo & Lusch, 2004)Self-determination theory (e.g. Nijhuis et al., 2012)Platform (e.g. Gawer & Cusumano, 2014)Inter-organizational network (Shipilov & Gawer, 2020) Qualitative research synthesis method (...
Studies on Ict and Internet Awareness and Access to E-Resources Under UGC-Infonet Digital Library Consortium: A Survey of Assam University Library Users The paper, a survey of users, presents views on the extent of ICT/Internet awareness and status on use of e-resources by the Assam University...
Intersection and union of type-n fuzzy sets This paper recursively extends the fundamental set theory operations of intersection and union to Type-3 and higher level fuzzy sets. A generalized form of... J Aisbett,JT Rickard,D Morgenthaler - IEEE International Conference on Fuzzy Systems 被引量:...
manufacture of hydraulic filtration systems (more than 35000types offilters and filteringelements)forall industries. g-sochi.ru g-sochi.ru 派克是燃料分離技術、 設計中的世界領先的創始人和製造的液壓過濾系統 (超過35000類型的篩選器和篩選元素)的所有行業。
ICT centreswithvarious types ofcommunity media, including print and both cable radio and television; (2) building on existing assets and networks of the poor, particularly women’s self-help groups (SHGs) and local youth clubs; (3) strengthening horizontal linkages, for instance between the poor...
This chapter describes the legal and contractual considerations for organisations wishing to use ICT in their virtual organisation. The chapter describes a number of legal and contractual conditions, (mainly contracts), that must be met ... M Shelbourn,T Hassan,C Carter - Springer US 被引量: ...
compensation amountsfordifferent types oflostassets) might be more appropriate than overly complex systems. daccess-ods.un.org daccess-ods.un.org 在某些情 况下,简单的、行政的、非官僚程序(例如:不同类型的资产损失的赔偿标准数 额)可能比过于复杂的程序更合适。
Types of Computer Security Here are a few types of computer security tactics that are used widely for the protection of software, hardware, electronic data, and network in computer systems. Application Security Application security is the introduction of security features in applications during their ...