Search results for "copying"
showing 9 items of 19 documents
A Mobile Healthcare System for Sub-saharan Africa
2013
The disparity between healthcare systems in developed countries and underdeveloped countries is huge, particularly due to the fact that the healthcare infrastructure of former is based on a sophisticated technological infrastructure. Efforts are being made worldwide to bridge this disparity and make healthcare services affordable even to the most remote areas of undeveloped countries. Recent growth of mobile networks in underdeveloped countries argues for building mHealth systems and applications on their basis. However, peculiarities of the area introduce difficulties into potential use cases of mobile devices, thus making the copying of mHealth services from developed countries inapplicab…
Implementing Digital Government in the Finnish Parliament
2005
The Finnish Parliament has been active in utilizing information and communication technologies in the parliamentary work as well as in communicating with citizens and other organizations. As common in public sectors, work, knowledge management, and communication in the environment is document-centric. A strategic issue in implementing digital government has been SGML/XML standardization. The Finnish Parliament has been a pioneer in the adoption of SGML/XML technologies. The chapter reports experiences from the standardization efforts. The implications of the standardization will be examined from the viewpoints of documents, information technology, work with documents, the Finnish Parliament…
New paradigm of ICT productivity – Increasing role of un-captured GDP and growing anger of consumers
2015
Abstract The dramatic advancement of the Internet has led all nations to an information communication technology (ICT) driven development trajectory. This trajectory has resulted in bi-polarization between ICT growing economies and ICT advanced economies. While the former enjoys a virtuous cycle between ICT advancement and productivity increase, the later has fallen into a trap of a vicious cycle between ICT advancement and productivity decrease. This paper identifies that this trap can be attributed to the two-faced nature of ICT in which advancement of ICT contributes to price increases due to functionality development while dramatic advancement of the Internet has resulted in price decre…
Structural Source of the Trap of ICT Advancement - Lessons from World ICT Top Leaders
2014
In light of the significant consequence of the trap of dramatic advancement of information and communication technology (ICT) in the global economy, both nations and firms that have been compelling their productivity decline. This resulted in great stagnation of ICT advanced economies and therefore its structural sources were analyzed. Based on an empirical analysis tracing, the trend in marginal productivity of ICT and its subsequent prices among the top ICT leaders in the world over the last two decades correlating with the effects of ICT, two faces of ICT advancement were identified. On one side, advancement of ICT contributes to its prices increase by new functionality development, its …
Investigating elementary school students’ text-based argumentation with multiple online information resources
2020
In this study, we explored how elementary school students used multiple information resources in responding to a text-based argumentation task asking them to research a set of online texts in order to state and justify their stance on a controversial health-related issue. Results showed that most students took a stance that was consistent with the majority of the information resources that they read, that they mainly drew on more reliable resources in their written task products, and that they justified their stance by providing one or more supporting reasons. Students relied much more on copying and paraphrasing content from the online resources than on integrating information within and a…
'No speech at my command will fit the forms in my mind': Shaping the Spiritual through Writing and Typing in George MacDonald’s Lilith Manuscripts
2020
International audience; In “Lilith B” (1893), the most extensively rewritten draft of George MacDonald’s fantasy novel Lilith (1895), puzzling triangular-shaped insertions, some handwritten and some typed, although not retained in the later versions of the text, allow for a better understanding of the creative process and show how the material crafting of the manuscript, through collage and combination techniques, played a part in the invention of fantasy. The introduction of the typewriter as a new drafting tool in MacDonald’s writing habits, not only for copying but also for revising, corresponds to a shift in the metaphorical and allegorical system which enables the parallel worlds of th…
Students in higher education with reading and writing difficulties
2015
The aim of this study is to explore adult students’ descriptions and understandings of their reading and writing difficulties, and to describe the ways they are copying with them. In higher level studies, information is typically gained by reading and giving evidence of knowledge acquisition in writing. When students have difficulties with these essential academic skills, studying and lifelong learning can be hard work as well as time-consuming. General understanding of dyslexia and reading difficulties at the higher education level has improved, although considerable ambiguity remains about what these mean in practice. This is a qualitative, interview-based study that seeks to improve our …
State of the art in passive digital image forgery detection: copy-move image forgery
2017
Authenticating digital images is increasingly becoming important because digital images carry important information and due to their use in different areas such as courts of law as essential pieces of evidence. Nowadays, authenticating digital images is difficult because manipulating them has become easy as a result of powerful image processing software and human knowledge. The importance and relevance of digital image forensics has attracted various researchers to establish different techniques for detection in image forensics. The core category of image forensics is passive image forgery detection. One of the most important passive forgeries that affect the originality of the image is cop…
Ecological and evolutionary consequences of selective interspecific information use
2023
Recent work has shown that animals frequently use social information from individuals of their own species as well as from other species; however, the ecological and evolutionary consequences of this social information use remain poorly understood. Additionally, information users may be selective in their social information use, deciding from whom and how to use information, but this has been overlooked in an interspecific context. In particular, the intentional decision to reject a behaviour observed via social information has received less attention, although recent work has indicated its presence in various taxa. Based on existing literature, we explore in which circumstances selective i…