Search results for "NETWORKS"

showing 10 items of 3260 documents

Efectos de las consultas boca a boca en redes sociales en la compra de cosméticos en Ecuador.

2022

Las redes sociales han reestructurado el paradigma de la comunicación en el marketing. Investigaciones recientes demuestran que la conducta de consultar reseñas está adquiriendo un rol fundamental en la decisión de compra de los consumidores. En este contexto, el presente estudio desarrolló un marco de investigación para determinar la cadena de relación entre influencia social, credibilidad percibida del boca a boca, adopción del boca a boca e intención de compra aplicada a la industria cosmética del Ecuador. A través de una muestra de 406 consumidores y la aplicación del método de análisis de ecuaciones estructurales, los resultados evidencian el vínculo existente entre las variables plant…

influencia socialadopción del eWOMStrategy and ManagementConsumidoresPublicidad boca a boca//vocabularies.unesco.org/thesaurus/concept1545 [http]IntentionCosmeticsMercadeo en Internet//id.loc.gov/authorities/subjects/sh85067189 [http]Social mediaSocial influencePreferencias de los consumidoresWord-of-mouth advertising//id.loc.gov/authorities/subjects/sh91001924 [http]AdvertisingManagement of Technology and InnovationConsumidor//vocabularies.unesco.org/thesaurus/concept5657 [http]Influencia socialMarketingCosmeticosintención de compraM31 MarketingConsumer behaviourCredibilidad percibida del eWOMComercio electrónico//id.loc.gov/authorities/subjects/sh85033139 [http]eWOM en redes socialesAdopción del eWOMIntenciónIntención de compraPersuasion (Psychology)//id.loc.gov/authorities/subjects/sh96008434 [http]Internet marketingRelaciones socialesInternet personalitiesEconomics and EconometricsPersuasión (Psicología)Medios socialesElectronic commerceComportamiento del consumidorOnline social networks in businessPublicidad//vocabularies.unesco.org/thesaurus/concept6377 [http]//vocabularies.unesco.org/thesaurus/concept1532 [http]ShoppingRedes de informaciónMercadeo//id.loc.gov/authorities/subjects/sh87006429 [http]Information networksComercializaciónBusiness and International ManagementCompraCompras//id.loc.gov/authorities/subjects/sh85100175 [http]Redes sociales en línea en los negociosCosméticos//id.loc.gov/authorities/subjects/sh85121778 [http]//id.loc.gov/authorities/subjects/sh2015001935 [http]//vocabularies.unesco.org/thesaurus/concept12431 [http]UNESCO::CIENCIAS ECONÓMICAS//id.loc.gov/authorities/subjects/sh95005028 [http]//vocabularies.unesco.org/thesaurus/concept17089 [http]Consumer behavior//id.loc.gov/authorities/subjects/sh2015001634 [http]Purchasingcredibilidad percibida del eWOMConsumers' preferences//id.loc.gov/authorities/subjects/sh85031496 [http]Social relationshipsConsumersInfluenciadoresFinance//id.loc.gov/authorities/subjects/sh94006574 [http]
researchProduct

Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions

2022

In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security research. Our review of IS research applying DT highlights that many fundamental assumptions of DT are unrecognized and therefore unexamined. This may have resulted in misunderstandings and conceptual confusions regarding some of the basic concepts of DT. For example, some IS studies confuse general deterrence with specific deterrence or do not recognize the difference between the two. Moreover, these fundamental assumptions, when directly examined, may provide importan…

information security policy complianceComputer Networks and Communicationsohjeidenmukainen käyttäytyminentietoturvapolitiikkatietoturvadeterrent effectpelotteetpeloteteoriadeterrence theoryManagement Information Systemstietojärjestelmät
researchProduct

Information Systems Architecture and Technology: Proceedings of 38th International Conference on Information Systems Architecture and Technology – IS…

2018

This three-volume set of books presents advances in the development of concepts and techniques in the area of new technologies and contemporary information system architectures. It guides readers through solving specific research and analytical problems to obtain useful knowledge and business value from the data. Each chapter provides an analysis of a specific technical problem, followed by the numerical analysis, simulation and implementation of the solution to the problem. The books constitute the refereed proceedings of the 2017 38th International Conference “Information Systems Architecture and Technology,” or ISAT 2017, held on September 17–19, 2017 in Szklarska Poręba, Poland. The con…

information systems architectureCorrectnessbusiness.industryComputer scienceProcess (engineering)Multi-agent systemIntelligent decision support systeminformation systemscomputer.software_genrerisk managementAutomationExpert systemSystems engineeringComputer Aided DesignDesign processcomputer networks ISAT 2017businesscomputer
researchProduct

Kyberin taskutieto : keskeisin kybermaailmasta jokaiselle

2017

information warfarecyber securityinformation networksinformaatiosodankäyntiinfrastruktuuritdigitalisationtietoturvakyberturvallisuustietoverkotdigitalisaatiodata securitydata systemsinfrastructurestietojärjestelmät
researchProduct

The territorial and social metamorphosis of the Inner Peripheries

2019

The paper debates the theme of the Inner Peripheries that, in their complexity and diversity, represent those territories in which a rethinking of the rural/urban, society/territory, society/economy, territory/production and community/landscape relationship is increasingly urgent for the sustainability, to interrupt the process of abandonment and to strengthen and network the small experiences of innovation that are taking place and that are showing that they can be welcoming and functional places, capable of realizing new local centralities with global attractiveness. With the aim of opening a debate on the role that inner peripheries can take in a multi-scale territorial scenario and on t…

inner peripheries networks local developmentSettore ICAR/21 - Urbanistica
researchProduct

Current transformers effects on the measurement of harmonic active power in LV and MV networks

2011

The harmonic active power is used to determine the location of polluting loads, the direction of harmonic power flow and to estimate how consequential a certain current harmonic source is. The highest uncertainties, when measuring harmonic active power, are introduced by the current and voltage transducers. This paper presents experimental results which show the impact of current transformers (CTs) on the accuracy of the harmonic power measurements. An expression for the evaluation of the power error in distorted conditions was developed which can be easily utilized in the case of linear current transducers. It is shown how CTs cannot be considered linear transducers and how the higher the …

instrument transformersEngineeringVoltage and current harmonicsSwitched-mode power supplyAcousticsActive powerTransducersEnergy Engineering and Power TechnologyLinear currentsPower factorHarmonic powerLinear transducersPower errorsPower transformersVoltage transducersHarmonic analysisHarmonic analysisMaximum valuesCurrent transformerElectrical and Electronic EngineeringPower measurementPhase anglesAbsolute valuesHarmonic power flowTotal harmonic distortionbusiness.industryElectric power distributionCurrent harmonicsElectrical engineeringAC powerCurrent transformerMV networksHarmonicsAccuracy classElectric instrument transformersHarmonicPower system harmonicsCurrent transformers (CTs) instrument transformerspower measurement power system harmonics.businessSettore ING-INF/07 - Misure Elettriche E Elettroniche
researchProduct

Cultural networks and democratic legitimacy in the European Union

2005

interest representationdemokratiakulttuurisuhteetdemocratic legitimacycultural networkslegitimiteettiEuropean UnionEuroopan unioniedunvalvonta
researchProduct

Lessons learned on student engagement from the nature of pervasive socio‐digital interests and related network participation of adolescents

2021

The rise of modern socio-digital technologies has fundamentally changed the everyday environments in which young people communicate with each other and cultivate interests. To gain a more sophisticated understanding of this phenomenon, this study provides in-depth, qualitative insights into adolescents’ experiences of their socio-digital developmental ecologies. The 15 interview participants were recruited based on a previously conducted questionnaire. The semi-structured theme interview addressed the socio-digital aspects of the participants’ interest-driven behaviours and related networks with the aid of participant-generated egocentric maps. The data not only qualitatively enrich the pic…

interestoppiminenmedia_common.quotation_subjectONLINECHILDREN050109 social psychologyStudent engagementGAMESEducationsocio&#8208sosiaaliset verkostotnuoretNATIVES0501 psychology and cognitive sciencesegocentric networksdigitalisaatiomedia_commonosallistuminenHYPOTHESISdigital participationbusiness.industrypervasive technology4. EducationMEMORYSOCIOMETRIC STATUS05 social sciencesEducational technologyconnected learning050301 educationMOTIVATIONteknologinen kehitysPERFORMANCEPublic relationsdigital engagementWORKINGComputer Science ApplicationsFriendshipPervasive technologyConnected learningubiikkiyhteiskuntaSociometric statussocio‐digital participation516 Educational sciencesComputer-mediated communicationbusinessPsychology0503 education
researchProduct

INTERNATIONAL MIGRATION IN THE EUROPEAN UNION: EMIGRATION FROM LATVIA TO THE UNITED KINGDOM

2013

Elektroniskā versija nesatur pielikumus

international migration (Latvia United Kingdom)Emigrācija un imigrācijaĢeogrāfijamigrant social networksemigrationCilvēka ģeogrāfijaĢeogrāfijas un zemes zinātnes
researchProduct

One Dimensional Convolutional Neural Networks for Seizure Onset Detection Using Long-term Scalp and Intracranial EEG

2021

Epileptic seizure detection using scalp electroencephalogram (sEEG) and intracranial electroencephalogram (iEEG) has attracted widespread attention in recent two decades. The accurate and rapid detection of seizures not only reflects the efficiency of the algorithm, but also greatly reduces the burden of manual detection during long-term electroencephalogram (EEG) recording. In this work, a stacked one-dimensional convolutional neural network (1D-CNN) model combined with a random selection and data augmentation (RS-DA) strategy is proposed for seizure onset detection. Firstly, we segmented the long-term EEG signals using 2-sec sliding windows. Then, the 2-sec interictal and ictal segments w…

intracranial electroencephalogram (iEEG)convolutional neural networks (CNN).signaalinkäsittelyscalp electroencephalogram (sEEG)epilepsyseizure detectionsignaalianalyysineuroverkotEEGepilepsia
researchProduct