Search Results

You are looking at 1 - 10 of 21 items for :

  • "Mobile technology" x
  • All content x
Clear All

A very special artistic event can be held with the “virtual” sculpture exhibition. Cellular phones can be used in this project to show the public square as if a non-existing sculpture has been located on it. However, the idea of amplifying the environment with virtual objects is not a new concept, the limited performance of the used visualizing devices requires developing faster and more effective algorithms for this purpose. This paper discusses the arising problems during the development of this algorithm and gives proposals for solving them.

Restricted access

rhinitis and asthma multimorbidity using mobile technology. J Allergy Clin Immunol. 2019; 143: 864–879. 2 Bousquet JJ, Schünemann HJ, Togias A, et al

Open access

learning. In: Mobile Technology: The Future of Learning in Your Hands. Proc. MLEARN 2005. (http://www.mlearn.org.za/

Restricted access

Dispute Resolution Through the Use of Information Technology (CUP 2010 ). Poblet , Marta , Mobile Technologies for Conflict Management: Online Dispute Resolution

Full access

, J. ( 2012 ). Managing mobile technology: the shift from mobility to connectivity . MIS Quarterly Executive , 11 ( 4 ), 159 – 173 . Deshpande , R. , Grinstein , A. , Kim , S

Restricted access

. https://doi.org/10.1108/QMR-06-2013-0041 . Wilmer , H. H. , & Chein , J. M. ( 2016 ). Mobile technology habits: patterns of association among device usage, intertemporal preference, impulse control, and reward sensitivity . Psychonomic Bulletin

Open access
Society and Economy
Authors: Abbas Strømmen-Bakhtiar and Evgueni Vinogradov

://friendsoftheearth.uk/sites/default/files/downloads/agyeman_sharing_cities.pdf, accessed 20/09/2018. Brown , B. – Chalmers , M. ( 2003 ): Tourism and Mobile Technology . In The European Conference on Computer-Supported Cooperative Work . Springer , Dordrecht

Open access

, mobile technology, and infection control. Telemed. J. E. Health, 2012, 18 (4), 289–291. 38 Szalka, A.: The altered role of coagulase

Open access

Geser, H. (2006): Is the Cell Phone Undermining the Social Order? Understanding Mobile Technology from a Sociological Perspective. Knowledge, Technology and Policy 19(1): 8–18. Geser H

Restricted access

Risk reduction and harm prevention in technology use. •

A commentary on Swanton et al.'s (2020) ‘Problematic risk-taking involving emerging technologies: A stakeholder framework to minimize harms’

Journal of Behavioral Addictions
Author: Daria J. Kuss

governments and industry to safeguard users from harm and to develop a strategic multinational policy framework is indispensable in a time where ubiquitous and mobile technology use is the status quo. Vulnerable users need to be safeguarded and protected from

Open access