نتایج جستجو برای: awareness

تعداد نتایج: 109891  

Journal: :journal of teaching language skills 2015
andisheh saniei parviz birjandi esmaeel abdollahzadeh majid nemati

the purpose of the present study was to explore the effectiveness of raising iranian learners’ pragmatic awareness of intercultural rhetoric in enhancing their l2 writing ability, as well as their written complexity and accuracy. to this end, two 25-member groups of efl learners who were taking basic writing course at islamic azad university, roudehen branch, were selected based on their perfor...

2014
Ann G. Phillips Paul J. Silvia

Objective self-awareness theory contends that focusing attention on the self initiates an automatic comparison of self to standards. To gain evidence for automatic self–standard comparison processes, two experiments manipulated attention to self with subliminal first-name priming. People completed a computer-based parity task after being instructed that the standard was to be fast or to be accu...

1999
Philip M. Merikle Daniel Smilek John D. Eastwood

Four basic approaches that have been used to demonstrate perception without awareness are described. Each approach re ̄ects one of two types of experimental logic and one of two possible methods for controlling awareness. The experimental logic has been either to demonstrate a dissociation between a measure of perception with awareness and a measure that is sensitive to perception without awaren...

Journal: :British journal of anaesthesia 2015
G A Mashour M S Avidan

Intraoperative awareness, with or without recall, continues to be a topic of clinical significance and neurobiological interest. In this article, we review evidence pertaining to the incidence, sequelae, and prevention of intraoperative awareness. We also assess which aspects of the complication are well understood (i.e. non-controversial) and which require further research for clarification (i...

2013
Felix Haeussinger Johann Kranz

Employees’ information security awareness (ISA) is a key antecedent of information security behavior. However, to date we know very little about the factors that are responsible for some employees having a higher level of ISA than others. Our study addresses this gap. We propose a model that comprises institutional, individual, and environmental factors preceding ISA. The model was empirically ...

2007
Yoko Kunii Frank Richey

Researcher: Yoko Kunii Title: Student Pilot Situational Awareness: The Effects of Trust in Technology Institution: Embry-Riddle Aeronautical University Degree: Master of Science in Aeronautics Year: 2006 The purpose of this research was to evaluate the general level of trust in technology in student pilots and then to determine the relationship between pilots’ trust and their situational awaren...

2006
Hennie A. Kruger Lynette Drevin Tjaart Steyn

ICT resources are important assets of any organization and the protection of these resources are equally important. To be able to protect themselves and their profitability, many organizations have established information security awareness programs. In order for a security awareness program to add value to an organization and at the same time make a contribution to the field of information sec...

2014
Deborah Agostino

This article examines the level of diffusion of social software (SS) in Italian local administrations and the effectiveness of these technologies in supporting public engagement, focusing on the specific case of Facebook in Italian municipalities. Public engagement refers to the involvement of citizens in public decisions and public life. This activity is h...

2010
Hans van Ditmarsch Tim French

We examine a logic that combines knowledge, awareness, and change of awareness. An agent can become aware of factual propositions but also of other agents or of herself. The dual operation to becoming aware, forgetting, can also be modelled. We show that the logic is decidable, and we present a complete axiomatization.

2008
Santos M. Galvez Indira R. Guzman

In this paper, the authors discuss employees’ beliefs about their abilities to competently use computer information security tools in the determination of effective information security practices within organizations. In the first section the authors present a background about information security practices at work. Then, the authors present a research approach based on social cognitive theory ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید