Search Results
. Z. ( 2009 ). Features and predictors of problematic Internet use in Chinese college students . Behaviour & Information Technology, 28 ( 5 ), 485 – 490 . doi: 10.1080/01449290701485801 10
, K. , & O'Malley , K. ( 2015 ). Educational technology: A review of the integration, resources, and effectiveness of technology in K-12 classrooms . Journal of Information Technology Education: Research , 14 , 397 – 416 . 10.28945/2298 Doiz
& Information Technology, 35 ( 7 ), 520 – 525 . doi: 10.1080/0144929X.2016.1158319 10.1080/0144929X.2016.1158319 Epstein , N. B. , Bishop , D
.1080/15389588.2013.822075 Census and Statistics Department . ( 2017 ). Thematic household survey no. 62: Information technology usage and penetration . Hong Kong Special Administrative Region . Retrieved from http://www.statistics.gov.hk/pub/B11100062016AN16B0100.pdf
University of Nyíregyháza at 1997. Then, he earned a Master’s degree as an Information Technology Teacher from the University of Debrecen at 2000. He is currently working at the University of Debrecen Faculty of Health. He is studying at the Doctoral School
use of information technologies, offices do not require high natural illumination intensity, hence the weaker illumination does not implicitly means disadvantage. Taking this into account, the thermal comfort considerations can yet justify external
Engineering and Information Technology, University of Pecs, Hungary. References [1] Van Voorst R. , Wisner B. , Hellman J. , Nooteboom G. Introduction to the ‘risky everyday’ , Disaster Prevention and Management , Vol. 24 , No, 4 , 2015 , pages
comfort hours does not negatively effect the daylight situation in the offices, since in this building use today’s Information Technology (IT) does not require high daylight level in the spaces. Moreover, less illuminantion (but min. 500 lx) can even cause
, “ “Connectivity and Coverage Preserving Schemes for Surveillance Applications in WSN”, School of Computer Science, Jaypee University of Informational Technology ,” Int. J. Comp. Appl. ( 0975 – 8887 ) vol. 50 , no. 19 , July 2012 . [6] R. Ali , “Abstract
The “ABCDE” of video gaming control: Arguments, basic research, conceptual models, documented lessons, and evaluation
Commentary on: Policy responses to problematic video game use: A systematic review of current measures and future possibilities (Király et al., 2018)
. , Mouttapa , M. , & Donato , E. ( 2015 ). Preventing problematic Internet use through video-based interventions: A theoretical model and empirical test . Behaviour & Information Technology, 34 ( 4