Search Results

You are looking at 51 - 60 of 105 items for :

  • "Information Technology" x
  • User-accessible content x
Clear All
International Review of Applied Sciences and Engineering
Authors: Ahmed S. Al-Zuhairi, Alaa H. Altimimy, Ali T. Al-Aqbi, and Hazim M. Al-Kargole

, “ “Connectivity and Coverage Preserving Schemes for Surveillance Applications in WSN”, School of Computer Science, Jaypee University of Informational Technology ,” Int. J. Comp. Appl. ( 0975 – 8887 ) vol. 50 , no. 19 , July 2012 . [6] R. Ali , “Abstract

Open access

use of information technologies, offices do not require high natural illumination intensity, hence the weaker illumination does not implicitly means disadvantage. Taking this into account, the thermal comfort considerations can yet justify external

Open access

comfort hours does not negatively effect the daylight situation in the offices, since in this building use today’s Information Technology (IT) does not require high daylight level in the spaces. Moreover, less illuminantion (but min. 500 lx) can even cause

Open access

Engineering and Information Technology, University of Pecs, Hungary. References [1] Van Voorst R. , Wisner B. , Hellman J. , Nooteboom G. Introduction to the ‘risky everyday’ , Disaster Prevention and Management , Vol. 24 , No, 4 , 2015 , pages

Free access

The “ABCDE” of video gaming control: Arguments, basic research, conceptual models, documented lessons, and evaluation

Commentary on: Policy responses to problematic video game use: A systematic review of current measures and future possibilities (Király et al., 2018)

Journal of Behavioral Addictions
Author: Shek Daniel T. L.

. , Mouttapa , M. , & Donato , E. ( 2015 ). Preventing problematic Internet use through video-based interventions: A theoretical model and empirical test . Behaviour & Information Technology, 34 ( 4

Open access

-smart-contract-platforms/ , accessed 01/04/2020 . Diniz , E. H. – Siqueira , É. – Van Heck , E. – Diniz , E. ( 2018 ): Taxonomy of Digital Community Currency Platforms . Information Technology for Development 25 ( 3 ): 1 – 23 . Dudás , G. – Boros , L . ( 2019 ): A

Open access

, technology and regional – levels. The first level is the development of selected strategic industries. 5 MiC25 highlights and prioritizes 10 industries: next-generation information technology, high-end computerised machinery and robots, aviation and space

Open access

.1177/0894439317741087 . 10.1177/0894439317741087 Fan , L. , Liu , X. , Wang , B. , & Wang , L. ( 2017 ). Interactivity, engagement, and technology dependence: Understanding users’ technology utilisation behaviour . Behaviour and Information Technology , 36 ( 2

Open access
Journal of Behavioral Addictions
Authors: Attila Körmendi, Zita Brutóczki, Bianka Petra Végh, and Rita Székely

.1177/1461444899001002003 Ling , R. ( 2000 ). “We will be reached”: The use of mobile phone telephony among Norwegian youth . Information Technology and People, 13, 102 – 120 . doi: 10.1108/09593840010339844 10

Open access

). Validating the distinction between computer addiction and engagement: Online game playing and personality . Behavior & Information Technology, 20, 601 – 613 . doi: 10.1080/01449290903401978 10

Open access