图书情报专题研究2012-3(5)

2019-04-23 11:41

described and the implications of this finding are discussed.

18. 题名:Students'and teachers'use of Facebook

出处:Computers in Human Behavior, Volume 27, Issue 2, March 2011, Pages 662-676 作者:Hew, K.F.

摘要:The purpose of this article is to review current published research studies focusing on the use of Facebook by students and teachers. The aim of the review is not to solely discuss Facebook in relation to teaching or learning purposes, or about its educational value per se, but also to present a detailed account of the participants‘ Facebook usage profile or the extent to which users are engaged in Facebook activities. The emphasis of this review will be upon empirical findings rather than opinion- or theoretical explanations. Following the review guidelines set by Creswell (Research Design Qualitative and Quantitative Approaches, 1994), I summarize the hitherto accumulated state of knowledge concerning Facebook and highlight questions or issues that research has left unresolved. This review is organized into three sections that cover the major topics of current research: (a) students‘ Facebook usage profile or extent of Facebook use (e.g., time students spend on Facebook each day, students‘ motives for using Facebook, as well as various factors that may affect these usage profiles), (b) the effects of Facebook use (e.g., effects of Facebook self-disclosure on teacher credibility, effects of Facebook use on student social presence and discussion, and effects of Facebook on students‘ academic performance), and (c) students‘ attitudes toward Facebook. The conclusions overall suggest that Facebook thus far has very little educational use, that students use Facebook mainly to keep in touch with known individuals, and that students tend to disclose more personal information about themselves on Facebook; hence attracting potential privacy risks upon themselves.

19. 题名:Recognition of power quality events by using multiwavelet-based neural networks 出处:International Journal of Electrical Power & Energy Systems, Volume 30, Issue 4, May 2008, Pages 254-260

作者:Kaewarsa, S.; Attakitmongcol, K.; Kulworawanichpong, T.

摘要:Recognition of power quality events by analyzing the voltage and current waveform disturbances is a very important task for the power system monitoring. This paper presents a novel approach for the recognition of power quality disturbances using multiwavelet transform and neural networks. The proposed method employs the multiwavelet transform using multiresolution signal decomposition techniques working together with multiple neural networks using a learning vector quantization network as a powerful classifier. Various transient events are tested, such as voltage sag, swell, interruption, notching, impulsive transient, and harmonic distortion show that the classifier can detect and classify different power quality signal types efficiency.

20. 题名:A tale of two sites: Twitter vs. Facebook and the personality predictors of social media usage

出处:Computers in Human Behavior, Volume 28, Issue 2, March 2012, Pages 561-569 作者:Hughes, D.J.; Rowe, M.; Batey, M.; Lee, A. 摘要:Social networking sites (SNS) are quickly becoming one of the most popular tools for social interaction and information exchange. Previous research has shown a relationship between users‘ personality and SNS use. Using a general population sample (N = 300), this study furthers such

18

investigations by examining the personality correlates (Neuroticism, Extraversion, Openness-to-Experience, Agreeableness, Conscientiousness, Sociability and Need-for-Cognition) of social and informational use of the two largest SNS: Facebook and Twitter. Age and Gender were also examined. Results showed that personality was related to online socialising and information seeking/exchange, though not as influential as some previous research has suggested. In addition, a preference for Facebook or Twitter was associated with differences in personality. The results reveal differential relationships between personality and Facebook and Twitter usage.

21. 题名:Multi-criteria decision making approaches for supplier evaluation and selection: A literature review

出处:European Journal of Operational Research, Volume 202, Issue 1, April 2010, Pages 16-24 作者:Ho, W.; Xu, X.; Dey, P.K.

摘要:Supplier evaluation and selection problem has been studied extensively. Various decision making approaches have been proposed to tackle the problem. In contemporary supply chain management, the performance of potential suppliers is evaluated against multiple criteria rather than considering a single factor-cost. This paper reviews the literature of the multi-criteria decision making approaches for supplier evaluation and selection. Related articles appearing in the international journals from 2000 to 2008 are gathered and analyzed so that the following three questions can be answered: (i) Which approaches were prevalently applied? (ii) Which evaluating criteria were paid more attention to? (iii) Is there any inadequacy of the approaches? Based on the inadequacy, if any, some improvements and possible future work are recommended. This research not only provides evidence that the multi-criteria decision making approaches are better than the traditional cost-based approach, but also aids the researchers and decision makers in applying the approaches effectively.

22. 题名:The effect of social networking websites on positive self-views: An experimental investigation

出处:Computers in Human Behavior, Volume 28, Issue 5, September 2012, Pages 1929-1933 作者:Gentile, B.; Twenge, J.M.; Freeman, E.C.; Campbell, W.K. 摘要:Millions of people use social networking sites (SNSs), but it is unclear how these sites shape personality traits and identity. In Experiment 1, college students were randomly assigned to either edit their MySpace page or complete a control task online (interacting with Google Maps). Those who focused on their MySpace page scored significantly higher on the Narcissistic Personality Inventory (NPI) than a control group. In Experiment 2, those who focused on their Facebook page scored significantly higher in general self-esteem, but not narcissism, than a control group. Thus, spending time on SNSs profiles causes young people to endorse more positive self-views, although the specific form this takes depends on the site. Consistent with previous research, narcissism was associated with a larger number of SNSs ―friends‖ in both experiments.

23. 题名:Data mining techniques and applications - A decade review from 2000 to 2011

出处:Expert Systems with Applications, Volume 39, Issue 12, September 2012, Pages 11303-11311

作者:Liao, S.H.; Chu, P.H.; Hsiao, P.Y.

摘要:In order to determine how data mining techniques (DMT) and their applications have

19

developed, during the past decade, this paper reviews data mining techniques and their applications and development, through a survey of literature and the classification of articles, from 2000 to 2011. Keyword indices and article abstracts were used to identify 216 articles concerning DMT applications, from 159 academic journals (retrieved from five online databases), this paper surveys and classifies DMT, with respect to the following three areas: knowledge types, analysis types, and architecture types, together with their applications in different research and practical domains. A discussion deals with the direction of any future developments in DMT methodologies and applications: (1) DMT is finding increasing applications in expertise orientation and the development of applications for DMT is a problem-oriented domain. (2) It is suggested that different social science methodologies, such as psychology, cognitive science and human behavior might implement DMT, as an alternative to the methodologies already on offer. (3) The ability to continually change and acquire new understanding is a driving force for the application of DMT and this will allow many new future applications.

24. 题名:Personnel selection based on computing with words and fuzzy MULTIMOORA 出处:Expert Systems with Applications, Volume 39, Issue 9, July 2012, Pages 7961-7967 作者:Balezentis, A.; Balezentis, T.; Brauers, W.K.M.

摘要:Personnel selection process is aimed at choosing the best candidate to fill the defined vacancy in a company. It determines the input quality of personnel and thus plays an important role in human resource management. Given the uncertain, ambiguous, and vague nature of personnel selection process, it requires the application of multi-criteria decision making (MCDM) methods for robust recruitment. This paper hence is aimed at extending the fuzzy MULTIMOORA for linguistic reasoning under group decision making. The fuzzy MULTIMOORA was further modified in this study. The fuzzy MULTIMOORA for group decision making (MULTIMOORA–FG) enables to aggregate subjective assessments of the decision-makers and thus offer an opportunity to perform more robust personnel selection procedures. A personnel selection problem illustrated the group decision-making procedure according to MULTIMOORA–FG: the enterprise has formed an executive committee consisting of four decision-makers to choose the best candidate from another four participants to fill the vacancy. The committee has decided to consider eight qualitative attributes expressed in linguistic variables. The numerical example exhibited possibilities for improvement of human resources management as well as any other business decision area by applying MULTIMOORA–FG.

25. 题名:Why do people use information technology? A critical review of the technology acceptance model

出处:Information & Management, Volume 40, Issue 3, January 2003, Pages 191-204 作者:Legris, P.; Ingham, J.; Collerette, P.

摘要:Information systems (IS) implementation is costly and has a relatively low success rate. Since the seventies, IS research has contributed to a better understanding of this process and its outcomes. The early efforts concentrated on the identification of factors that facilitated IS use. This produced a long list of items that proved to be of little practical value. It became obvious that, for practical reasons, the factors had to be grouped into a model in a way that would facilitate analysis of IS use.

20

In 1985, Fred Davis suggested the technology acceptance model (TAM). It examines the mediating role of perceived ease of use and perceived usefulness in their relation between systems characteristics (external variables) and the probability of system use (an indicator of system success). More recently, Davis proposed a new version of his model: TAM2. It includes subjective norms, and was tested with longitudinal research designs. Overall the two explain about 40% of system‘s use. Analysis of empirical research using TAM shows that results are not totally consistent or clear. This suggests that significant factors are not included in the models.

We conclude that TAM is a useful model, but has to be integrated into a broader one which would include variables related to both human and social change processes, and to the adoption of the innovation model.

三、IEL Top20(来源:http://ieeexplore.ieee.org/)

1.题名:Nonlinear Analysis of an Absolute Value Type of an Early-Late Gate Bit Synchronizer 作者:Simon, M.

出处:Communication Technology, IEEE Transactions on Volume: 18 Issue: 5 Date: October 1970 Page(s):589 - 596 Digital Object Identifier : 10.1109/TCOM.1970.1090410

摘要:The steady-state phase noise performance of an absolute value type of early-late gate bit synchronizer is developed using the Fokker-Planck method. The results are compared with the performance of two other commonly used bit synchronizer circuit topologies on the basis of either 1) equal equivalent signal to noise in the loop bandwidth in the linear region, or 2) equal loop bandwidth at each input signal-to-noise ratio Rs. These comparisons are made as a function of Rs. In both cases, the absolute value type of early-late gate yields the best performance (in the sense of minimum phase noise) at every value of Rs.

2.题名:A Delay-Aware Data Collection Network Structure for Wireless Sensor Networks 作者:Chi-Tsun Cheng Tse, C.K. Lau, F.C.M. 出处:Sensors Journal, IEEE

Volume: 11 Issue: 3 Date: March 2011 Page(s):699 - 710 Digital Object Identifier : 10.1109/JSEN.2010.2063020

摘要:Wireless sensor networks utilize large numbers of wireless sensor nodes to collect information from their sensing terrain. Wireless sensor nodes are battery-powered devices. Energy saving is always crucial to the lifetime of a wireless sensor network. Recently, many algorithms are proposed to tackle the energy saving problem in wireless sensor networks. In these algorithms, however, data collection efficiency is usually compromised in return for gaining longer network lifetime. There are strong needs to develop wireless sensor networks algorithms with optimization

21

priorities biased to aspects besides energy saving. In this paper, a delay-aware data collection network structure for wireless sensor networks is proposed. The objective of the proposed network structure is to minimize delays in the data collection processes of wireless sensor networks. Two network formation algorithms are designed to construct the proposed network structure in a centralized and a decentralized approach. Performances of the proposed network structure are evaluated using computer simulations. Simulation results show that, when comparing with other common network structures in wireless sensor networks, the proposed network structure is able to shorten the delays in the data collection process significantly.

3. 题名:Security threats in cloud computing 作者:Shaikh, F.B. Haider, S.

出处:Internet Technology and Secured Transactions (ICITST), 2011 International Conference for Page(s):214 - 219

摘要:Cloud computing is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via internet. General example of cloud services is Google apps, provided by Google and Microsoft SharePoint. The rapid growth in field of ―cloud computing‖ also increases severe security concerns. Security has remained a constant issue for Open Systems and internet, when we are talking about security cloud really suffers. Lack of security is the only hurdle in wide adoption of cloud computing. Cloud computing is surrounded by many security issues like securing data, and examining the utilization of cloud by the cloud computing vendors. The wide acceptance www has raised security risks along with the uncountable benefits, so is the case with cloud computing. The boom in cloud computing has brought lots of security challenges for the consumers and service providers. How the end users of cloud computing know that their information is not having any availability and security issues? Every one poses, Is their information secure? This study aims to identify the most vulnerable security threats in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing. Our work will enable researchers and security professionals to know about users and vendors concerns and critical analysis about the different security models and tools proposed.

4. 题名:Understanding Cloud Computing Vulnerabilities 作者:Grobauer, B. Walloschek, T. Stocker, E. 出处:Security & Privacy, IEEE

Volume: 9 Issue: 2 Date: March-April 2011 Page(s):50 - 57 Digital Object Identifier : 10.1109/MSP.2010.115

摘要:The current discourse about cloud computing security issues makes a well-founded assessment of cloud computing's security impact difficult for two primary reasons. First, as is true for many discussions about risk, basic vocabulary such as \often used as if they were interchangeable, without regard to their respective definitions. Second, not every issue that's raised is really specific to cloud computing. We can achieve an accurate understanding of the security issue \that cloud computing really adds by analyzing how cloud computing influences each risk factor. One important factor concerns vulnerabilities: cloud computing makes certain well-understood vulnerabilities more significant and adds new

22


图书情报专题研究2012-3(5).doc 将本文的Word文档下载到电脑 下载失败或者文档不完整,请联系客服人员解决!

下一篇:八年级投资组合报告的解释

相关阅读
本类排行
× 注册会员免费下载(下载后可以自由复制和排版)

马上注册会员

注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信: QQ: