Artykuły w czasopismach na temat „Computer organization”

Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Computer organization.

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Computer organization”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Hewitt, Barbara, i Garry White. "Factors Influencing Security Incidents on Personal Computing Devices". Journal of Organizational and End User Computing 33, nr 4 (lipiec 2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.

Pełny tekst źródła
Streszczenie:
Organizations expect their employees to connect securely to the organization's computer systems. Often these employees use their personal computers to access the organization's networks. This research explores whether these same employees apply protective security measures to their personal computers. Perhaps these employees behave riskily based on their optimistic bias. Results indicate that while cyber optimistic bias and perceived vulnerability influence individuals to apply more protective security measures, the users still experienced security incidents. Thus, organization are vulnerable to cyber-attacks if they are allowing employees to use personal computers to access these databases.
Style APA, Harvard, Vancouver, ISO itp.
2

Vesa, Mikko, Juho Hamari, J. Tuomas Harviainen i Harald Warmelink. "Computer Games and Organization Studies". Organization Studies 38, nr 2 (27.09.2016): 273–84. http://dx.doi.org/10.1177/0170840616663242.

Pełny tekst źródła
Streszczenie:
Computer games and organizations are becoming increasingly interwoven in the 21st century. Sophisticated computer games connected by networks are turning into spaces for organizing. Therefore, it may not be surprising that conventional organizations are now scrounging these games for novel ways to enhance efficiency. The result is the formation of game/organization hybrids; uneasy recontextualizations of partly incompatible ideas, values and practices. We begin this essay by elucidating what it is socially that makes something a game by exploring the notion’s anthropological foundations. We then introduce two examples of actual game/organization hybrids; raiding in computer games and gamification in formal organizations. We conclude by discussing the implications of such hybridization and suggest venues for how organization and management scholars can benefit from studying computer games and theories of play.
Style APA, Harvard, Vancouver, ISO itp.
3

Magagnosc, David. "Simulation in computer organization". ACM SIGCSE Bulletin 26, nr 1 (12.03.1994): 178–82. http://dx.doi.org/10.1145/191033.191100.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Stojcev, M. "Computer Organization and Architecture". Microelectronics Journal 31, nr 5 (maj 2000): 375–76. http://dx.doi.org/10.1016/s0026-2692(99)00155-x.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Vanhala, Erno, Jussi Kasurinen i Kari Smolander. "Evolution of computer game developer organizations". Journal of Advances in Management Research 12, nr 3 (2.11.2015): 268–91. http://dx.doi.org/10.1108/jamr-10-2014-0059.

Pełny tekst źródła
Streszczenie:
Purpose – The purpose of this paper is to identify the peculiarity of computer game organizations and their human resources. It presents a stage model including four phases covering the growth from demo group to full business. This study extends the research on how computer game organizations are formed and what it takes them to grow to financially self-sufficient. The study also broadens the understanding of the beginning phase of an organization. Design/methodology/approach – The paper utilizes the grounded theory research method with 34 interview sessions among 11 computer game organizations. The interviewed persons include chief executive officers, designers and developers. Findings – This paper presents empirical findings on what a computer game organization go through when they evolve from demo group phase, which is not discussed in existing literature, to full business. The authors observed that the core team is formed over a game designer and one or more developers. The team fortifies as the organization moves onwards to next phases. At the same time its reliance on partners and outsourcing changes to need based. Research limitations/implications – As this is a qualitative study the observations are directly applicable only in the context of observed organizations. In the other context they are merely suggestions. Practical implications – The study presents concrete growth model that can be utilized when building a computer game organization. Originality/value – This paper illustrates the specialty of computer game organizations and their growth process. It also presents discussion of the beginning phase of organizations.
Style APA, Harvard, Vancouver, ISO itp.
6

Yulchiyev, I. I., Sh Sh Abdullayev, B. J. Ahmadaliyev i D. Sh Khidirov. "VISUAL ORGANIZATION OF GEOMETRY LESSONS WITH COMPUTER SOFTWARE". International Journal of Pedagogics 02, nr 05 (1.05.2022): 13–17. http://dx.doi.org/10.37547/ijp/volume02issue05-04.

Pełny tekst źródła
Streszczenie:
Improving the effectiveness of lessons, which are the main organizational part of the educational process, the organization of lessons in the form of demonstrations is one of the most pressing issues of education today. We now live in the 21st century - the age of information technology. Today, the use of information technology in the introduction of pedagogical technologies in the educational process serves to dramatically increase the effectiveness of education. There are several ways in which teaching and learning can be organized. Classes can be organized in the process of organizing with the use of new advanced pedagogical technologies and modern information technologies. In today's world, there is a growing interest in the use of computer graphics in the educational process. The organization of lessons using computer graphics and computer programs in the process of lesson organization creates several conveniences for both the teacher and the student. Geometry lessons by a teacher are given in the articleGeoGebra 3D, MS PowerPoint, When created using computer programs such as Macromedia Flash MX, 3D Maxstudio, Matlab, it is easier for students to understand and master the topic, and in this regard, the teacher can achieve very good results in the meaningful organization of the lesson.
Style APA, Harvard, Vancouver, ISO itp.
7

Michael J. Diacin i Jennifer L. VanSickle. "Computer Program Usage in Sport Organizations and Computer Competencies Desired by Sport Organization Personnel". IJASS(International Journal of Applied Sports Sciences) 26, nr 2 (grudzień 2014): 124–37. http://dx.doi.org/10.24985/ijass.2014.26.2.124.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Талипов, Алмамбет, Дамира Тагаева i Шахсонамхон Эргашева. "ORGANIZATION OF MATHEMATICS LESSONS USING INFORMATION TOOLS". Илимий-маалыматтык журналы 23, nr 6 (2023): 103–8. http://dx.doi.org/10.58494/esai.23(6).2023.19.

Pełny tekst źródła
Streszczenie:
In order to improve the computer literacy of students, the organization of lessons using computer technologies, their impact on the efficiency of counting, memorization, quick work of students, and the development of creative skills are described. Currently, there are no educational institutions that do not use computers and the Internet during the period when digitalization activities are actively carried out in the fields of education in all regions of the Kyrgyz Republic. In this direction, every teacher, student and parent should be aware of information technology. Therefore, it is necessary to make it mandatory to use computer technologies, their types and means in educational processes. The article notes that the use of computer technology in the organization of lessons will undoubtedly increase students’ interest in the subject.
Style APA, Harvard, Vancouver, ISO itp.
9

Zhang, Xuesong, Ken Surendran i Ming Wang. "A computer organization course project". ACM SIGCSE Bulletin 36, nr 2 (czerwiec 2004): 68–71. http://dx.doi.org/10.1145/1024338.1024375.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

VASILE, Cristinel Marius. "Firewall Technologies". International Journal of Information Security and Cybercrime 7, nr 1 (29.06.2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.

Pełny tekst źródła
Streszczenie:
Today, most businesses are based on a computer system, more or less developed. For daily activities the organization needs to be able to connect to the Internet, possibly from a local area network (LAN). But, once with the benefits of the Internet, there are also security risks that the organization must minimize by measures and appropriate controls. Among security issues arising from using the Internet include hacker attacks, computers infection with viruses, malware and spyware. In theory, hackers can enter inside the organization network and steal confidential data, damaging computers or the entire organization's local area network. In this sense, firewall implementation is a security measure needed to any organization. This paper presents firewall types and technologies, attacks on firewalls and some security measures on the internal network.
Style APA, Harvard, Vancouver, ISO itp.
11

Cumming, Alister. "Change, Organization, and Achievement: Teachers' Concerns in Implementing a Computer Learning Environment". Journal of Educational Technology Systems 17, nr 2 (grudzień 1988): 141–63. http://dx.doi.org/10.2190/19pp-58nc-vtjj-vt51.

Pełny tekst źródła
Streszczenie:
The viewpoints of two experienced teachers implementing a novel computer program in their grade five and six classes were documented through biweekly debriefing interviews over the period of one school year. The teachers proved to be fundamentally concerned with three issues: learning to accommodate changes required by this innovation; organizing new, efficient classroom routines around the computers; and seeking indications of students' achievements through their uses of the computers. These three considerations appeared integral to the teachers' senses that they were effectively implementing the computer learning environment in their classrooms.
Style APA, Harvard, Vancouver, ISO itp.
12

Lyu, Bing, Ami Tanaka i Lin Meng. "Computer-assisted Ancient Documents Re-organization". Procedia Computer Science 202 (2022): 295–300. http://dx.doi.org/10.1016/j.procs.2022.04.039.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
13

Barnes, Sue, i Leonore M. Greller. "Computer‐mediated communication in the organization". Communication Education 43, nr 2 (kwiecień 1994): 129–42. http://dx.doi.org/10.1080/03634529409378970.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
14

Lorenzen, Torben, Abdul Sattar i Lee Mondshein. "Tools for computer architecture and organization". ACM Inroads 2, nr 1 (25.02.2011): 29–30. http://dx.doi.org/10.1145/1929887.1929901.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
15

Estrin, Deborah. "Access to inter-organization computer networks". ACM SIGOIS Bulletin 7, nr 2-3 (grudzień 1986): 11–20. http://dx.doi.org/10.1145/15847.15849.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

Nadi, Najib. "Simulation programs for studying computer organization". ACM SIGCSE Bulletin 28, SI (2.06.1996): 233. http://dx.doi.org/10.1145/237477.237678.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
17

Parkinson, Stanley R., Norwood Sisson i Kathleen Snowberry. "Organization of broad computer menu displays". International Journal of Man-Machine Studies 23, nr 6 (grudzień 1985): 689–97. http://dx.doi.org/10.1016/s0020-7373(85)80063-8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Andreev, A. N., N. K. Yurkov i A. V. Blinov. "Model for organization of computer teaching". Measurement Techniques 43, nr 8 (sierpień 2000): 675–78. http://dx.doi.org/10.1007/bf02503633.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

Artamonov, Eugeniy. "Organization of computer-aided design systems". Mathematics and Computers in Simulation 33, nr 4 (grudzień 1991): 275–79. http://dx.doi.org/10.1016/0378-4754(91)90105-c.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Nadi, Najib. "Simulation programs for studying computer organization". ACM SIGCUE Outlook 24, nr 1-3 (styczeń 1996): 233. http://dx.doi.org/10.1145/1013718.237678.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Yallamanda, C., i P. Ramaiah Chowdary. "Computer business organization on cloud platform". Journal of Physics: Conference Series 1228 (maj 2019): 012029. http://dx.doi.org/10.1088/1742-6596/1228/1/012029.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Good, David J., i Robert W. Stone. "Computer technology and the marketing organization". Journal of Business Research 34, nr 3 (listopad 1995): 197–209. http://dx.doi.org/10.1016/0148-2963(94)00118-x.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
23

Thompson, Warren. "Marketing Information Systems and Management Information Systems: Education and Training". Journal of Educational Technology Systems 20, nr 2 (grudzień 1991): 143–52. http://dx.doi.org/10.2190/rj6q-car3-8cdf-2ra3.

Pełny tekst źródła
Streszczenie:
Computer education and computer training is becoming more important as technology advances. Human resource specialists will be forced to make crucial decisions that will impact the total organization as more organizations use computer technology. Information is important to the organization. Business executives and managers need to be educated and continuously trained on computer information systems. The benefits from computer education and training outweigh its costs. This is evident by the increasing interest in education and training in business organizations. This article compares and discusses management information systems and marketing information systems and focuses upon the training that is needed for today's managers and executives. It is an attempt to review the major concerns of MKIS and MIS education and training.
Style APA, Harvard, Vancouver, ISO itp.
24

Waguespack, Leslie J. "A structural computer system resource model for teaching computer organization". ACM SIGCSE Bulletin 17, nr 1 (marzec 1985): 63–67. http://dx.doi.org/10.1145/323275.323289.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
25

Hugentobler, Hans Kaspar. "Hacking the organization: Organizational Transformation by Design". Design Journal 20, sup1 (28.07.2017): S522—S530. http://dx.doi.org/10.1080/14606925.2017.1353001.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
26

Kaiser, Marcus. "Brain architecture: a design for natural computation". Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 365, nr 1861 (13.09.2007): 3033–45. http://dx.doi.org/10.1098/rsta.2007.0007.

Pełny tekst źródła
Streszczenie:
Fifty years ago, John von Neumann compared the architecture of the brain with that of the computers he invented and which are still in use today. In those days, the organization of computers was based on concepts of brain organization. Here, we give an update on current results on the global organization of neural systems. For neural systems, we outline how the spatial and topological architecture of neuronal and cortical networks facilitates robustness against failures, fast processing and balanced network activation. Finally, we discuss mechanisms of self-organization for such architectures. After all, the organization of the brain might again inspire computer architecture.
Style APA, Harvard, Vancouver, ISO itp.
27

Al-Fedaghi, Sabah. "Conceptual Modeling for Computer Organization and Architecture". Journal of Computer Science 17, nr 2 (1.02.2021): 123–34. http://dx.doi.org/10.3844/jcssp.2021.123.134.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

MARTIN, Willy. "On the Dynamic Organization of (Computer) Lexicons". Cahiers de l'Institut de Linguistique de Louvain 17, nr 1 (1.01.1991): 43–50. http://dx.doi.org/10.2143/cill.17.1.2016695.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
29

Cornford, James. "Computer Systems Development: History, organization and implementation". European Journal of Information Systems 1, nr 2 (marzec 1991): 144–45. http://dx.doi.org/10.1057/ejis.1991.24.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
30

Tew, Allison Elliott, Brian Dorn, William D. Leahy i Mark Guzdial. "Context as Support for Learning Computer Organization". Journal on Educational Resources in Computing 8, nr 3 (październik 2008): 1–18. http://dx.doi.org/10.1145/1404935.1404937.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
31

Frieze, Carol, i Lenore Blum. "Building an effective computer science student organization". ACM SIGCSE Bulletin 34, nr 2 (czerwiec 2002): 74–78. http://dx.doi.org/10.1145/543812.543835.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

Atamas, Sergei P. "Self-organization in computer simulated selective systems". Biosystems 39, nr 2 (styczeń 1996): 143–51. http://dx.doi.org/10.1016/0303-2647(96)01612-7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
33

Rein, Gail L., Clyde W. Holsapple i Andrew B. Whinston. "Computer support of organization design and learning". Journal of Organizational Computing 3, nr 1 (styczeń 1993): 87–120. http://dx.doi.org/10.1080/10919399309540196.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Levy, Paul, John Bessant, David Tranfield, Stuart Smith i Clive Ley. "Organization design implications of computer-integrated technologies". International Journal of Human Factors in Manufacturing 3, nr 2 (kwiecień 1993): 169–82. http://dx.doi.org/10.1002/hfm.4530030206.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Radivojevic, Zaharije, Zarko Stanisavljevic i Marija Punt. "Configurable simulator for computer architecture and organization". Computer Applications in Engineering Education 26, nr 5 (23.07.2018): 1711–24. http://dx.doi.org/10.1002/cae.22034.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
36

Iip Yulianto Windra. "Simulasi Perancangan Infrastruktur Jaringan Komputer Pada Institut Teknologi Keling Kumang Menggunakan Pendekatan Network Development Life Cycle (NDLC)". Hunatech 1, nr 2 (21.10.2022): 39–54. http://dx.doi.org/10.59967/hunatech.v1i2.24.

Pełny tekst źródła
Streszczenie:
At this time, the development of information technology is growing very quickly, so the information needed is very easy to obtain via smartphones, laptops or computers connected to the internet. To support information technology, so that it can be used by the community or organization, a good computer network infrastructure is needed. The Keling Kumang Institute of Technology (ITKK) is a newly established university and will continue to grow, requiring computer network infrastructure that is in accordance with ITKK needs so that work in each field is more effective and efficient. In this study, using the Network Development Life Cycle (NDLC) method that can be used in designing computer network infrastructure that is in line with the organization's business processes. The application used for computer network infrastructure simulation in this study is GNS3.
Style APA, Harvard, Vancouver, ISO itp.
37

Seshadri, T. V., i N. Kinra. "Marketing a Computer System: Implications of the Buyers' Decision Processes". Vikalpa: The Journal for Decision Makers 13, nr 1 (styczeń 1988): 25–32. http://dx.doi.org/10.1177/0256090919880104.

Pełny tekst źródła
Streszczenie:
Who, in the organization, buys the computer system? How are various departments involved in the organizational decision process? T V Seshadri and N Kinra analyse the decision processes of 30 organizations that had bought a computer system—mini, mainframe, or macro. Based on a questionnaire study and factor analysis, the authors conclude that the EDP department and Board of Directors are critical in the buying grids of the purchasing organizations. They draw implications of their findings for managers marketing computer systems.
Style APA, Harvard, Vancouver, ISO itp.
38

Wheeler, Thomas L. "Organization Security Metrics: Can Organizations Protect Themselves?" Information Security Journal: A Global Perspective 17, nr 5-6 (5.12.2008): 228–42. http://dx.doi.org/10.1080/19393550802541200.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
39

Xie, Linjiang, Zhouyuan Liao i Hanruo Li. "Research and Design of an Automated Security Event Analysis and Handling Framework Based on Threat Intelligence". Scalable Computing: Practice and Experience 25, nr 3 (12.04.2024): 1872–81. http://dx.doi.org/10.12694/scpe.v25i3.2779.

Pełny tekst źródła
Streszczenie:
In order to deeply explore and utilize the value of threat intelligence, strengthen research on attack organizations, and grasp the correlation between attack organizations, the author proposes the research and design of an automated security event analysis and handling framework based on threat intelligence. The author extracts the behavioral characteristics of the attack organization based on known APT attacks, and uses the machine learning framework Light GBM to establish a multi classification model to complete the analysis of unknown APT attack organizations. Through the study of multi-dimensional analysis of multi-source threat intelligence, attack organization correlation and judgment, an attack organization correlation and judgment system has been designed and implemented. The system includes six modules: threat intelligence collection module, threat intelligence multi-dimensional analysis module, attack organization fingerprint library module, attack organization correlation module, attack organization analysis module, and user module, providing attack organization correlation and judgment services for network security. The test results show that the intelligence reading and search query function can achieve the reading of various information of attack organizations, and achieve visual display of threat intelligence. The intelligence management function can achieve operations such as adding, deleting, and updating intelligence. The user management function of the system can achieve the management of administrator users and ordinary users. After testing, all functions of the system have been implemented and meet expectations.
Style APA, Harvard, Vancouver, ISO itp.
40

Saleh, Mohamed Munser. "A Review of Security Threats by The Unauthorized in The E-Learning". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, nr 11 (11.08.2015): 6240–43. http://dx.doi.org/10.24297/ijct.v14i11.1808.

Pełny tekst źródła
Streszczenie:
Computers have become an integral part of our everyday existence. They are used to store and to send among students’ letters and sensitive documents, materials. In today's focused world, each Organization is endeavoring to enhance its proficiency and guarantee the nature of data asset. Computer networking technologies - intranet, web - have progressed to the point where data can be put away, transmitted, and available to people accessing the resource anytime and from anywhere. These advantages additionally push organizations into executing web based innovation without considering the security dangers that this involves.
Style APA, Harvard, Vancouver, ISO itp.
41

Bakhrombekovna, Djuraeva Ra'no. "Organization of computer monitoring in assessing student knowledge of a computer system". ACADEMICIA: An International Multidisciplinary Research Journal 10, nr 6 (2020): 532. http://dx.doi.org/10.5958/2249-7137.2020.00535.2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
42

SUSANTO, YULIUS KURNIA, i RATIH HANDAYANI. "INTENSITAS ANCAMAN KEAMANAN SISTEM INFORMASI AKUNTANSI KOMPUTERISASIAN". Jurnal Bisnis dan Akuntansi 10, nr 3 (19.04.2018): 113–26. http://dx.doi.org/10.34208/jba.v10i3.223.

Pełny tekst źródła
Streszczenie:
The objective of the paper was (1) there are significant security threats of CAIS on the organization types, (2) there is difference among the organization types regarding the security threats of CAIS, (3) there are difference between integration-on line and integration-manual CAIS regarding the security threats of CAIS. Eighty four respondents from Jakarta organizations had participated in this research. The collecting data used a questionnaire survey via electronicmail and post. Data were analyzed using a Kruskal-Wallis test. The resultsshowed that first there is significant security threats of CAIS in Jakarta Organizations, like that the accidental entry of bad data, accidental destruction of data, employees’ sharing of passwords and introduction of computer viruses the to CAIS are the significant security threats of CAIS in Jakarta Organizations. Second, there is no difference among the organization types regarding the security threats of CAIS. Third, there is no difference between integration-on line and integration-manual CAIS regarding the security threats of CAIS. But, there is difference between integration-on line and integration-manual CAIS regarding introduction of computer viruses to the CAIS.
Style APA, Harvard, Vancouver, ISO itp.
43

Hoogendoorn, Mark, Catholijn M. Jonker, Martijn C. Schut i Jan Treur. "Modeling centralized organization of organizational change". Computational and Mathematical Organization Theory 13, nr 2 (1.09.2006): 147–84. http://dx.doi.org/10.1007/s10588-006-9004-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
44

Crable, Elaine A., James D. Brodzinski, Robert F. Scherer i Phillip D. Jones. "The Impact of Cognitive Appraisal, Locus of Control, and Level of Exposure on the Computer Anxiety of Novice Computer Users". Journal of Educational Computing Research 10, nr 4 (czerwiec 1994): 329–40. http://dx.doi.org/10.2190/k2yh-mmjv-gbbl-yttu.

Pełny tekst źródła
Streszczenie:
With the mass introduction of computers in the workplace researchers have spent considerable time, over the last two decades, investigating methods to effectively integrate this technology into the daily routines of employees at all levels within the organization [1–3]. An exogenous variable, and precursor to introduction of computers, is computer anxiety [4–6]. Computer anxiety is generally defined as an anxious response by the individual to the anticipated or actual contact with computers [7]. This article examined the relationship of cognitive appraisal, locus of control, prior exposure, and computer anxiety. It was hypothesized that an individual's appraisal of a computing situation, whether the person was internally or externally focused, and their prior experience with computers would affect their level of computer anxiety as measured by the Computer Concerns Questionnaire. A stepwise multiple regression was performed and the results indicated that cognitive appraisal and exposure were significant predictors of computer anxiety. The authors conclude that early assessments of a novice user's appraisal of the situation should be used to tailor training programs to the specific individual's needs.
Style APA, Harvard, Vancouver, ISO itp.
45

Hristov, Hristo, Petar Boyanov i Tihomir Trifonov. "APPROACHES TO IDENTIFY VULNERABILITIES IN THE SECURITY SYSTEM OF THE SOCIAL ORGANIZATION AND COMPUTER RESOURCES". Journal scientific and applied research 5, nr 1 (5.05.2014): 101–7. http://dx.doi.org/10.46687/jsar.v5i1.115.

Pełny tekst źródła
Streszczenie:
Essential component of organizing stage of the counteraction for the en-croachment against the business organization is to identify vulnerabilities of the social organization. The purpose of this stage is to identify all existing and potential weaknesses and disadvantages of the security system of the organization, creating a circumstance for adversely effects on the sources of threat.
Style APA, Harvard, Vancouver, ISO itp.
46

Kleshchev, A. S., i S. V. Smagin. "Organization of computer experiments on inductive knowledge discovery". Automatic Documentation and Mathematical Linguistics 42, nr 1 (luty 2008): 17–26. http://dx.doi.org/10.3103/s0005105508010032.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
47

Chen, P. M. "An Automated Feedback System for Computer Organization Projects". IEEE Transactions on Education 47, nr 2 (maj 2004): 232–40. http://dx.doi.org/10.1109/te.2004.825220.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
48

Aronson, Jay E., i Gary Klein. "A Clustering Algorithm for Computer-Assisted Process Organization". Decision Sciences 20, nr 4 (grudzień 1989): 730–45. http://dx.doi.org/10.1111/j.1540-5915.1989.tb01416.x.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
49

Scragg, Greg W. "Most computer organization courses are built upside down". ACM SIGCSE Bulletin 23, nr 1 (marzec 1991): 341–46. http://dx.doi.org/10.1145/107005.107079.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
50

Fekete, Alan. "Enhancing generic skills in the computer organization course". ACM SIGCSE Bulletin 27, nr 1 (15.03.1995): 273–77. http://dx.doi.org/10.1145/199691.199817.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii