...internet 10.1146/annurev.psych.55.090902.141922 0066-4308/04/0204-0000$14.00 BARGH MCKENNA Annu. Rev. Psychol. 2004. 55:X--X doi: 10.1146/annurev.psych.55.090902.141922 Copyright © 2004 by Annual Reviews. All rights reserved INTERNET AND SOCIAL LIFE THE INTERNET AND SOCIAL LIFE John A. Bargh and Katelyn Y.A. McKenna New York University, New York, New York 10003; email: john.bargh@nyu.edu, kym1@nyu.edu Key Words communication, groups, relationships, depression, loneliness Abstract The Internet is the latest in a series of technological breakthroughs in interpersonal communication, following the telegraph, telephone, radio, and television. It combines innovative features of its predecessors, such as bridging great distances and reaching a mass audience. However, the Internet has novel features as well, most critically the relative anonymity afforded to users and the provision of group venues in which to meet others with similar interests and values. We place the Internet in its historical context, and then examine the effects of Internet use on the user’s psychological well-being, the formation and maintenance of personal relationships, group memberships and social identity, the workplace, and community involvement. The evidence suggests that while these effects are largely dependent on the particular goals that users bring to the interaction---such as self-expression, affiliation, or competition---they also interact in important ways with the unique qualities of the...
Words: 9146 - Pages: 37
...CHAPTER I INTRODUCTION Background of the study “Drinking is the cause and the solution is drinking”. Teenager’s starts to sneak out, party all night and drinks excessively. The youth today is convinced that drinking liquor is part of being a teenager. They believe that to have a sense of adventure drinking liquor is one way to have fun, an exciting but dangerous way of seeking for adventure. The generation today is not fully aware of what danger these vices could do to them. They tend to overlook the fun and excitement it could bring instead of the Statement of the Problem To find out the disadvantages of drinking liquor as perceived by the Fourth Year male high school students of the College of the Holy Spirit (CHS). Specifically, this study aims to answer the following questions: What is the profile of the 4th year male students of C in terms of the following? Age Annual Family Income Academic Performance How many of the fourth year student experienced to drink liquor? What are their reasons in drinking liquor? How often the fourth year male students of C drink? How much did they spend in drinking liquor? Did their parents aware that they are drinking? What are disadvantages they foresee in drinking liquor? Scope and Limitation This study is conducted to determine the disadvantage of drinking liquor as perceived by the Fourth Year male high students of CHS. This study is limited only to the 4th year male students of the High School Department of CHS...
Words: 2573 - Pages: 11
...http://jom.sagepub.com/subscriptions Reprints: http://www.sagepub.com/journalsReprints.nav Permissions: http://www.sagepub.com/journalsPermissions.nav Citations: http://jom.sagepub.com/content/37/4/1228.refs.html Downloaded from jom.sagepub.com at The Hebrew University Library Authority on June 29, 2011 Journal of Management Vol. 37 No. 4, July 2011 1228-1261 DOI: 10.1177/0149206310380462 © The Author(s) 2011 Reprints and permission: http://www. sagepub.com/journalsPermissions.nav Servant Leadership: A Review and Synthesis Dirk van Dierendonck Erasmus University Servant leadership is positioned as a new field of research for leadership scholars. This review deals with the historical background of servant leadership, its key characteristics, the available measurement tools, and the results of relevant studies that have been conducted so far. An overall conceptual model of servant leadership is presented. It is argued that leaders who combine their motivation to lead with a need to serve display servant leadership. Personal characteristics and culture are positioned alongside the motivational dimension. Servant leadership is demonstrated by empowering and developing people; by expressing humility, authenticity, interpersonal acceptance, and stewardship; and by providing direction. A high-quality dyadic...
Words: 17936 - Pages: 72
...com/journalsReprints.nav Permissions: http://www.sagepub.com/journalsPermissions.nav Citations: http://jom.sagepub.com/content/37/4/1228.refs.html >> Version of Record - Jun 8, 2011 OnlineFirst Version of Record - Sep 2, 2010 What is This? Downloaded from jom.sagepub.com at OhioLink on February 1, 2013 Journal of Management Vol. 37 No. 4, July 2011 1228-1261 DOI: 10.1177/0149206310380462 © The Author(s) 2011 Reprints and permission: http://www. sagepub.com/journalsPermissions.nav Servant Leadership: A Review and Synthesis Dirk van Dierendonck Erasmus University Servant leadership is positioned as a new field of research for leadership scholars. This review deals with the historical background of servant leadership, its key characteristics, the available measurement tools, and the results of relevant studies that have been conducted so far. An overall conceptual model of servant leadership is presented. It is argued that leaders who combine their motivation to lead with a need to serve display servant leadership. Personal characteristics and culture are positioned alongside the motivational dimension. Servant leadership is demonstrated by empowering and developing people; by expressing humility, authenticity, interpersonal...
Words: 17750 - Pages: 71
...without the express, written consent IE is prohibited. INTRODUCTION Improving efficiency in health care is an acute issue. In the developed world this is due to increases in costs and quality issues (Aptel and Pourjalali, 2001; Spear, 2005); Western Europe currently spends 9% of its GDP on health care, and, if the trend continues, will spend over 20% by the year 2050 (Drouin et al., 2008.) In the developing world on the other hand demand exceed capacity; it was estimated that in 1997 over 12 million people were blind in India from cataracts, while a further 3.8 million new cases are developed each year, and current capacity for surgery is far below this level (Thulasiraj et al., 1997.) Better health care operations are clearly required to deal with issues of ageing population, increased costs and unmet demand. One case that provides clues to such means is Aravind, the largest eye care provider in the world, with over 2.5 million operations performed and 20 million patients treated in the last thirty years. An Indian non-for-profit organization in which two thirds of the patients are treated for free, Aravind attends its goals by strict attention to cost optimization. THE STORY OF DR. V Dr. Govindappa Venkataswamy (known as Dr. V) retired at age 58 from a life in public health as an ophthalmologist in India. He then started, with his sister and brother in law, an 11...
Words: 4108 - Pages: 17
...Communications of the Association for Information Systems (Volume13, 2004) 177-195 177 Business Intelligence by S. Negash BUSINESS INTELLIGENCE Solomon Negash Computer Science and Information Systems Department Kennesaw State University snegash@kennesaw.edu ABSTRACT Business intelligence systems combine operational data with analytical tools to present complex and competitive information to planners and decision makers. The objective is to improve the timeliness and quality of inputs to the decision process. Business Intelligence is used to understand the capabilities available in the firm; the state of the art, trends, and future directions in the markets, the technologies, and the regulatory environment in which the firm competes; and the actions of competitors and the implications of these actions. The emergence of the data warehouse as a repository, advances in data cleansing, increased capabilities of hardware and software, and the emergence of the web architecture all combine to create a richer business intelligence environment than was available previously. Although business intelligence systems are widely used in industry, research about them is limited. This paper, in addition to being a tutorial, proposes a BI framework and potential research topics. The framework highlights the importance of unstructured data and discusses the need to develop BI tools for its acquisition, integration, cleanup, search, analysis, and delivery. In addition, this paper...
Words: 8285 - Pages: 34
...Communications of the Association for Information Systems (Volume13, 2004) 177-195 177 BUSINESS INTELLIGENCE Solomon Negash Computer Science and Information Systems Department Kennesaw State University snegash@kennesaw.edu ABSTRACT Business intelligence systems combine operational data with analytical tools to present complex and competitive information to planners and decision makers. The objective is to improve the timeliness and quality of inputs to the decision process. Business Intelligence is used to understand the capabilities available in the firm; the state of the art, trends, and future directions in the markets, the technologies, and the regulatory environment in which the firm competes; and the actions of competitors and the implications of these actions. The emergence of the data warehouse as a repository, advances in data cleansing, increased capabilities of hardware and software, and the emergence of the web architecture all combine to create a richer business intelligence environment than was available previously. Although business intelligence systems are widely used in industry, research about them is limited. This paper, in addition to being a tutorial, proposes a BI framework and potential research topics. The framework highlights the importance of unstructured data and discusses the need to develop BI tools for its acquisition, integration, cleanup, search, analysis, and delivery. In addition, this paper explores a matrix for BI data types (structured...
Words: 8282 - Pages: 34
...Communications of the Association for Information Systems (Volume13, 2004) 177-195 177 BUSINESS INTELLIGENCE Solomon Negash Computer Science and Information Systems Department Kennesaw State University snegash@kennesaw.edu ABSTRACT Business intelligence systems combine operational data with analytical tools to present complex and competitive information to planners and decision makers. The objective is to improve the timeliness and quality of inputs to the decision process. Business Intelligence is used to understand the capabilities available in the firm; the state of the art, trends, and future directions in the markets, the technologies, and the regulatory environment in which the firm competes; and the actions of competitors and the implications of these actions. The emergence of the data warehouse as a repository, advances in data cleansing, increased capabilities of hardware and software, and the emergence of the web architecture all combine to create a richer business intelligence environment than was available previously. Although business intelligence systems are widely used in industry, research about them is limited. This paper, in addition to being a tutorial, proposes a BI framework and potential research topics. The framework highlights the importance of unstructured data and discusses the need to develop BI tools for its acquisition, integration, cleanup, search, analysis, and delivery. In addition, this paper explores a matrix for BI data types (structured...
Words: 8282 - Pages: 34
...WOMEN IN COMBAT AN INDISPENSIBLE ARMY 21 COMPONENT OR A SIMPLE CASE OF EQUAL OPPORTUNITY? Your mission remains fixed, determined, inviolable – it is to win our wars. Everything else in your professional career is but corollary to this vital dedication. All other public purposes … will find others for their accomplishment; but you are the ones who are trained to fight; yours is the profession to arms. General Douglas A. MacArthur to the West Point Graduating Class of 1962 INTRODUCTION Like the United States military, the infusion of women into the Singapore Armed Forces (SAF) was announced with great fanfare and the proclamation of the politically-correct notion that “women have as much a role to play in the Nation’s defence as the men”. Thankfully, unlike the US military, the inclusion of women into SAF did not result in controversies and scandals that the US military faced in recent years as exemplified in the Tailhook[1] and Aberdeen[2] scandals. Amidst continued declining birth rates and greater economic opportunities, the participation of women in the SAF has been generally accepted as an inexorable development within the organisation without much ado, trusting that the authorities have performed the necessary analysis. Is this naturally the case? Are there larger issues that we need to grapple with, given our unique circumstances, noting that up till today, the US military is still debating on the wisdom of opening up military career opportunities...
Words: 5592 - Pages: 23
...A Structured Analysis of PHISHING By Prasath Manimaran ID: 20038303 Table of Contents Chapter One – Introduction 1. Research Questions and Objectives……………….…………………………………………….5 Chapter Two – Literature Review & Definition of Phishing 2.1. Literature Review…………………………………………………………………………………………..8 2.1.2. Definitions of Phishing……………………………………………………………………..8 2.1.3. Outcomes of this Study…………………………………………………………………….16 2.2. Research Details 2.2.1. Scope of the Research……………………………………………………………………….17 2.2.2. Research Methodology……………………………………………………………………..17 2.2.3Inductive versus Deductive Study……..………………………………………………..20 2.2.4. Qualitative versus Quantative……………………………………………………..20 Chapter Three – Phishing in a Banking Context 3.1. Confidence in Internet Banking……………………………………………………………………22 3.1.1. Security Requirements………………………………………………………………………23 3.2. Threat Models……………………………………………………………………………………………….25 3.2.1. The Internet Threat Model……………………………………………………..25 3.2.2. Thompson Threat Model……………………………………………………….26 3.2.3. Viral Threaet Model………………………………………………………………26 3.3. The Phishing Threat Model…………………………………………………………………………..26 3.3.1. Identification of Internet Banking Components………………………………..27 3.3.2. Identification of Phishing Threats………………………………………………29 Chapter 4 – Analysis of Current Phishing Techniques 4.1. Modus Operandi………………………………………………………………………………………….…36 4.2. Roles of Adversary in Phishing………………………………………………………………………...
Words: 15039 - Pages: 61
...a review, without prior permission in writing from the publishers. Library of Congress Cataloging-in-Publication Data DeVries, Kelly, 1956– Medieval weapons : an illustrated history of their impact / Kelly DeVries and Robert D. Smith. p. cm. — (Weapons and warfare series) Includes bibliographical references and index. ISBN-10: 1-85109-526-8 (hard copy : alk. paper) ISBN-10: 1-85109-531-4 (ebook) ISBN-13: 978-1-85109-526-1 (hard copy : alk. paper) ISBN-13: 978-1-85109-531-5 (ebook) 1. Military weapons—Europe—History—To 1500. 2. Military art and science—Europe—History—Medieval, 500-1500. I. Smith, Robert D. (Robert Douglas), 1954– II. Title. U810.D48 2007 623.4094'0902—dc22 2006102102 11 10 09 08 07 10 9 8 7 6 5 4 3 2 1 Production Editor: Vicki...
Words: 118320 - Pages: 474
...Impact of Celebrity Endorsements on Brand Image Debiprasad Mukherjee* August 2009 * Debiprasad Mukherjee is a Business Process Management Consultant in IT Telecom domain. He has experience of working with Siemens, IBM, and Tech Mahindra in India and abroad. He holds Post graduation in Management from Indian Institute of Social Welfare & Business Management, India and Bachelor in Technology in Electrical Engineering. His areas of interest are Brand Management, Consumer Behavior, Advertisement, Customer Relationship Management, Data Warehousing, Business Intelligence, Master Data Management etc. Email:- debiprasad.mukherjee@techmahindra.com / debiprasad.mukherjee@gmail.com Contact: - Techno India Building, 6th Floor EM-4/1, Sector V, SaltLake, Kolkata-700091, INDIA Tel No: +91 334002 8146 / +91 9830318394 This paper can be downloaded from the Social Science Research Network Electronic Paper Collection: http://ssrn.com/abstract=1444814 Electronic copy available at: http://ssrn.com/abstract=1444814 Abstract Celebrity endorsement has been established as one of the most popular tools of advertising in recent time. It has become a trend and perceived as a winning formula for product marketing and brand building. It is easy to choose a celebrity but it is tough to establish a strong association between the product and the endorser. While the magnitude of the impact of celebrity endorsement remains under the purview of gray spectacles, this paper is an effort to analyze...
Words: 12521 - Pages: 51
...RESEARCH AND PRACTICE IN HUMAN RESOURCE MANAGEMENT [pic] [pic] • Volume 16: Issue 2 • Editorial • Keynote • Articles • Research Note • Reviews Highlight, copy & paste to cite: Pio, E. (2008). Threads of Constraint: Ethnic Minority Migrant Women and Employment, Research and Practice in Human Resource Management, 16(2), 25-40. Threads of Constraint: Ethnic Minority Migrant Women and Employment Edwina Pio Abstract Nations, organisations and ethnic minority migrants are compelled to deal with issues emerging from the perceptions and politicisation of ethnicity. Issues of ethnicity are often fore grounded in the zone of work where the complexities of migration, ethnicity, gender and employment intersect. This paper highlights the perceptions of university business students in a New Zealand university with reference to ethnic minority women and employment. Through a study of various databases and the construction of parables on ethnic minority women in New Zealand, the experiences of recruitment and selection, diversity management and career progression emerge as themes in the perceived employment experiences of ethnic minority migrant women. The paper argues for the need to highlight narratives of ethnic minority women through creative pedagogy in order to sensitise business students and future managers to the consequences of migration and a need for the intelligent utilisation of human resources in a world that is...
Words: 8683 - Pages: 35
...logic and computer viruses may exploit is undertaken. 1. Introduction A computer virus is a sequence of instructions that copies itself into other programs in such a way that executing the program also executes that sequence of instructions. Rarely has something seemingly so esoteric captured the imagination of so many people; magazines from Business Week to the New England Journal of Medicine [39][48][60][72][135], books [20][22][31][40][50][67][83][90][108][124], and newspaper articles [85][91][92][94][114][128] have discussed viruses, applying the name to various types of malicious programs. As a result, the term “computer virus” is often misunderstood. Worse, many who do understand it do not understand protection in computer systems, for example believing that conventional security mechanisms can prevent virus infections, or are flawed because they cannot. But computer viruses use a number of well-known techniques in an unusual order; they do not employ previously-unknown methods. So, although existing computer security mechanisms were not designed specifically to counter computer viruses, many of those mechanisms were designed to deal...
Words: 12539 - Pages: 51
...Gordon Reading Specialist New York City Schools . . . Invest fifteen minutes a day for forty-six weeks in order to master 920 new words and almost 200 useful idioms < previous page page_i next page > < previous page page_ii next page > Page ii © Copyright 2000 by Barron's Educational Series, Inc. Prior edition © Copyright 1993, 1987, 1971 by Barron's Educational Series, Inc. All rights reserved. No part of this book may be reproduced in any form, by photostat, microfilm, xerography, or any other means, or incorporated into any information retrieval system, electronic or mechanical, without the written permission of the copyright owner. All inquiries should be addressed to: Barron's Educational Series, Inc. 250 Wireless Boulevard Hauppauge, NY 11788 http://www.barronseduc.com Library of Congress Catalog Card No. 00-030344 International Standard Book Number 0-7641-1365-8 Library of Congress Cataloging-in-Publication Data Bromberg, Murray. 1100 words you need to know / Murray Bromberg, Melvin Gordon. p. cm. Includes index. ISBN 0-7641-1365-8 1. Vocabulary. I. Title: Eleven hundred words you need to know. II. Gordon, Melvin. III. Title. PE1449.B643 2000 428.1dc21 00-030344 PRINTED IN THE UNITED STATES OF AMERICA 987654321 < previous page page_ii next page > < previous page page_iii next page > Page iii Contents Full Pronunciation Key Weeks 146 Buried Words Words in Context Analogy Review Answers Final Review Test The Panorama of Words...
Words: 125626 - Pages: 503