Search results for "informations"

showing 10 items of 428 documents

How Vulnerable is the Reaction Time Concealed Information Test to Faking?

2021

The reaction time-based Concealed Information Test (RT-CIT) can be used to detect information a suspect wishes to conceal. While it is often argued that it is easily faked, empirical research on its vulnerability to faking is scarce. In three experiments, we tested whether receiving faking instructions enables guilty participants to fake an innocent test outcome in an RT-CIT. In Experiment 1, when not using a response deadline, we found the RT-CIT to be vulnerable to faking (d = 1.06). Experiment 2 showed that when using a response deadline, faking was ineffective (d = −0.25). Critically, Experiment 3 replicated these findings within one between-subject design, showing again a faking effect…

ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciencesApplied psychologyVulnerabilityComputingMilieux_LEGALASPECTSOFCOMPUTING050109 social psychologyExperimental and Cognitive PsychologyOutcome (game theory)050105 experimental psychologyTest (assessment)ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSClinical PsychologyEmpirical researchComputingMilieux_COMPUTERSANDSOCIETY0501 psychology and cognitive sciencesSuspectPsychologyApplied PsychologyJournal of Applied Research in Memory and Cognition
researchProduct

Revenue models, in-app purchase, and the app performance: Evidence from Apple's App Store and Google Play

2016

The effect of revenue models on app performance depends on the app store.The effect of in-app purchase on app performance depends on the app store.Paid, freemium and in-purchase models are shown to be effective in app store.Freemium and in-app purchase models are shown to be less effective in Google Play.App category influences the effects of both revenue models and in-app purchase. In this paper, we empirically examine how the revenue model (paid, free, or freemium) adopted for a given app affects the app revenue performance as measured by the app daily revenue rank. We also study the impact of in-app purchase on this measure of performance. Moreover, we study how such relationships are co…

ComputerSystemsOrganization_COMPUTERSYSTEMIMPLEMENTATIONGeneralLiterature_INTRODUCTORYANDSURVEYComputer Networks and CommunicationsE-commerceApp storeGeneralLiterature_MISCELLANEOUSManagement of Technology and Innovationmental disorders0502 economics and businessRevenueMobile app market Online distribution Revenue model E-commerce Empirical analysis.MarketingMarketingbusiness.industryInformationSystems_INFORMATIONSYSTEMSAPPLICATIONS05 social sciencesAdvertisingSettore ING-IND/35 - Ingegneria Economico-GestionaleFreemiumComputer Science ApplicationsLarge sampleRevenue modelFree model050211 marketingbusiness050203 business & management
researchProduct

TOURISM MARKETING - KEY CONCEPT OF TOURISM IN A WORLD OF GLOBALIZATION

2012

The latest trends in tourism emphasize the power of the globalized tourist-consumer, in the context of mondialisation of the market and of the diversity of tourism services, the tourism organizations must answer to a range of different tourism motivations meant to meet the needs and wishes of the tourism consumers over the period they travel for. Tourism marketing is a result of globalization, since, just like the globalization process, it creates links between the states of the world, the authorized touristic organizations making efforts to provide maximum satisfaction to the tourists and implicitly, to maximize their profit.

ComputerSystemsOrganization_COMPUTERSYSTEMIMPLEMENTATIONGeneralLiterature_INTRODUCTORYANDSURVEYInformationSystems_INFORMATIONSYSTEMSAPPLICATIONSGeneralLiterature_MISCELLANEOUSRevista economica
researchProduct

Performing transnational family with the affordances of mobile apps : a case study of Polish mothers living in Finland

2020

Affordances provided by digital technologies and mobile apps (WhatsApp, Skype, Messenger) help in maintaining familyhood. These mobile apps enable the creation of in-app family groups. They also afford image sharing, which is used for phatic purposes. Digital connectivity provides the illusions of togetherness and belonging, and allows for performing family in a transnational context (emotional transnationalism). However, it also generates the feelings of guilt through infrequent communication. In the auto-driven visual elicitation interviews, the study looks at family constellations and technologically mediated communication from the perspective of five Polish mothers living in Finland. Ap…

ComputerSystemsOrganization_COMPUTERSYSTEMIMPLEMENTATIONcollageGeneralLiterature_INTRODUCTORYANDSURVEYInternet privacyaffordances0507 social and economic geographyperhe-elämäGeneralLiterature_MISCELLANEOUSArts and Humanities (miscellaneous)keskinäisviestintämental disorders050602 political science & public administrationtransnationaalisuusmobiilisovelluksetSociologyAffordancetransnational familyDemographymobile appsbusiness.industryInformationSystems_INFORMATIONSYSTEMSAPPLICATIONS05 social sciencesMobile appsPolish migrantsmaahanmuuttajat0506 political sciencevisual elicitationpuolalaisetperhesuhteetbusiness050703 geography
researchProduct

Research on Vocabulary Sizes and Codebook Universality

2014

Published version of an article in the journal: Abstract and Applied Analysis. Also available from the publisher at: http://dx.doi.org/10.1155/2014/697245 Open Access Codebook is an effective image representation method. By clustering in local image descriptors, a codebook is shown to be a distinctive image feature and widely applied in object classification. In almost all existing works on codebooks, the building of the visual vocabulary follows a basic routine, that is, extracting local image descriptors and clustering with a user-designated number of clusters. The problem with this routine lies in that building a codebook for each single dataset is not efficient. In order to deal with th…

ComputingMethodologies_PATTERNRECOGNITIONArticle SubjectApplied Mathematicslcsh:MathematicsInformationSystems_INFORMATIONSTORAGEANDRETRIEVALComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONVDP::Technology: 500::Information and communication technology: 550Analysis; Applied Mathematicslcsh:QA1-939Analysis
researchProduct

Supplementary material from Competition between strains of Borrelia afzelii inside the rodent host and the tick vector

2018

Supplementary material supporting the paper

ComputingMethodologies_SIMULATIONANDMODELINGInformationSystems_INFORMATIONSTORAGEANDRETRIEVALComputingMethodologies_DOCUMENTANDTEXTPROCESSINGComputingMilieux_COMPUTERSANDEDUCATIONComputerApplications_COMPUTERSINOTHERSYSTEMS
researchProduct

Revista Economica - Supplement No. 5/2012

2012

Applied Informatics in Economy

ComputingMilieux_GENERALInformationSystems_GENERALGeneralLiterature_INTRODUCTORYANDSURVEYComputingMilieux_COMPUTERSANDEDUCATIONGeneralLiterature_MISCELLANEOUSRevista economica
researchProduct

The Ghost Leader: An Empirical Study on Narrative Leadership

2012

Studies on leadership too often focus on the leader rather than on leadership. The starting point for this study is the argument that leadership is not equal to the leader as a "real" person but is at least partly costructed in organizational storytelling. This empirical study dissects the construction of leadership in storytelling in terms of typical organisational events, such as the arrival of a new leader, confronting resistance and a leader leaving an organisation. The data consists of interviews with a leader and his followers in a large high-tech organisation. The findings show that the leader existed in organisational storytelling before his first formal encounter and he remained in…

ComputingMilieux_GENERALInformationSystems_GENERALGeneralLiterature_REFERENCE(e.g.dictionariesencyclopediasglossaries)
researchProduct

DO WE NEED INTERNAL AUDIT, FINANCIAL AUDIT OR COACHING?

2014

ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSComputingMilieux_LEGALASPECTSOFCOMPUTINGRevista Economica
researchProduct

Additional file 3 of Low awareness and common misconceptions about schistosomiasis in endemic lowland areas in Western Ethiopia: a mixed-methods study

2021

Additional file 3: Supplementary file 3 Schistosoma infection risky behaviors observation guide.pdf

ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSData_FILESComputingMethodologies_DOCUMENTANDTEXTPROCESSINGComputingMilieux_COMPUTERSANDSOCIETYComputerApplications_COMPUTERSINOTHERSYSTEMS
researchProduct