Search results

1 – 10 of 33
Article
Publication date: 1 July 2001

Tim O’Shea

As a young researcher the author met Gordon Pask who subsequently had a great influence on the author’s work. Here are some recollections.

113

Abstract

As a young researcher the author met Gordon Pask who subsequently had a great influence on the author’s work. Here are some recollections.

Details

Kybernetes, vol. 30 no. 5/6
Type: Research Article
ISSN: 0368-492X

Keywords

Abstract

Details

Mental Health Review Journal, vol. 9 no. 4
Type: Research Article
ISSN: 1361-9322

Article
Publication date: 1 December 2004

Elizabeth Parker

Abstract

Details

Mental Health Review Journal, vol. 9 no. 4
Type: Research Article
ISSN: 1361-9322

Content available
Article
Publication date: 30 September 2013

14

Abstract

Details

International Journal of Health Care Quality Assurance, vol. 26 no. 8
Type: Research Article
ISSN: 0952-6862

Keywords

Article
Publication date: 1 July 2001

David Hawkridge

Gordon Pask worked with the author at the Open University and became his friend as well as colleague. Here are some recollections.

247

Abstract

Gordon Pask worked with the author at the Open University and became his friend as well as colleague. Here are some recollections.

Details

Kybernetes, vol. 30 no. 5/6
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 1 December 1995

Eric Chiusolo and Brian H. Kleiner

Software, to be useful to executives, must be flexible, easy‐to‐useand enable executives to digest vast amounts of information in a waythat diminishes their computer inhibitions…

479

Abstract

Software, to be useful to executives, must be flexible, easy‐to‐use and enable executives to digest vast amounts of information in a way that diminishes their computer inhibitions. Describes the characteristics and technical aspects of executive information systems (EISs), a class of software that meets the requirements of executives in all their many and varied roles.

Details

Industrial Management & Data Systems, vol. 95 no. 10
Type: Research Article
ISSN: 0263-5577

Keywords

Content available
Article
Publication date: 1 October 2001

Kinshuk

52

Abstract

Details

Library Hi Tech News, vol. 18 no. 10
Type: Research Article
ISSN: 0741-9058

Article
Publication date: 4 December 2020

Nguyen Thi Thao Ho, Subarna Sivapalan, Hiep Hung Pham, Lan Thi Mai Nguyen, Anh Thi Van Pham and Hung Viet Dinh

By using a technology acceptance model (TAM) on survey results collected from two member schools of a Vietnamese educational institution, this study aims to uncover the key…

4833

Abstract

Purpose

By using a technology acceptance model (TAM) on survey results collected from two member schools of a Vietnamese educational institution, this study aims to uncover the key factors that affect students’ acceptance of e-learning during the Covid-19 period.

Design/methodology/approach

A bilingual questionnaire in English and Vietnamese was delivered. It was pre-tested on 30 participants before it was finalized. The authors first reviewed the measurement model and made adjustments to the theoretical TAM model. Then the adjusted TAM was used to investigate the relationships of the constructs in the model.

Findings

The results of the structural model show that computer self-efficacy (CSE) has a positive impact on perceived ease of use (PEOU). There is also a positive relationship between system interactivity (SI) and PEOU. Surprisingly, the authors documented that PEOU has no significant impact on students’ attitudes (ATT). The results show that SI can moderately affect ATT. Finally, it is noted that the social factor (SF) directly affects the student’s attitudes (ATT).

Research/limitations/implications

This study contains three limitations. First, as this study only focuses on undergraduate programs, readers should be careful in applying the findings and/or implications of this study to other education levels such as K-12, vocational training and postgraduate programs. Second, the findings are generated within the context of one type of e-learning, conducted via Google Meet. Therefore, future research is needed to provide further validation and comparison across other forms of e-learning. Finally, to further prevent the common bias problem, future research should use both five-point and seven-point Likert scales for the response options in the survey, as well as use negatively worded items. This will help prevent respondents from providing similar answers to all questions.

Originality/value

This study has both theoretical and practical implications. From a theoretical perspective, the study can provide a solid framework for similar studies. From a practical perspective, this study offers implications for governments and universities in the process of adopting e-learning, given that the Covid-19 pandemic is currently in its second and more dangerous wave.

Details

Interactive Technology and Smart Education, vol. 18 no. 2
Type: Research Article
ISSN: 1741-5659

Keywords

Article
Publication date: 1 January 1986

Emerson Hilker

We have long been obsessed with the dream of creating intelligent machines. This vision can be traced back to Greek civilization, and the notion that mortals somehow can create…

1917

Abstract

We have long been obsessed with the dream of creating intelligent machines. This vision can be traced back to Greek civilization, and the notion that mortals somehow can create machines that think has persisted throughout history. Until this decade these illusions have borne no substance. The birth of the computer in the 1940s did cause a resurgence of the cybernaut idea, but the computer's role was primarily one of number‐crunching and realists soon came to respect the enormous difficulties in crafting machines that could accomplish even the simplest of human tasks.

Details

Collection Building, vol. 7 no. 3
Type: Research Article
ISSN: 0160-4953

Article
Publication date: 24 August 2010

Sarel Lavy and Manish K. Dixit

The purpose of this paper is to identify key risks that are posed to the security of a site and building perimeters in the first and second lines of defense against terrorism, and…

1060

Abstract

Purpose

The purpose of this paper is to identify key risks that are posed to the security of a site and building perimeters in the first and second lines of defense against terrorism, and are relevant to facility managers.

Design/methodology/approach

A qualitative approach to the literature review was applied. This involved an extensive literature search of existing peer‐reviewed research papers, as well as state and federal reports to mark crucial issues relating to the security of a facility. Strategies to deal with the critical issues pertaining to the security of a facility were reviewed, based on the literature.

Findings

The paper identifies major security risks suggested by the literature and lists strategies to address those risks. The paper also proposes recommendations made by the literature; their implementation may provide a higher level of security to key areas located in the first and second lines of building defense.

Practical implications

The site and building perimeter areas that offer great potential for avoiding and deterring terror attacks are often neglected in terms of security planning, which seriously hampers efforts to provide an enhanced level of security to the facility. The paper points out these areas and major security issues related to them, so they can be taken care of by design professionals as well as facility managers.

Originality/value

The paper provides a comprehensive and detailed review of various aspects tied to the security level of critical areas of the building and site perimeters that could be useful to facility managers of critical facilities.

Details

Facilities, vol. 28 no. 11/12
Type: Research Article
ISSN: 0263-2772

Keywords

1 – 10 of 33