19 research outputs found

    Graduate Bulletin, 1964-1966

    Get PDF
    https://encompass.eku.edu/g_cat/1009/thumbnail.jp

    Bard Observer, Vol. 7, No. 3 (November 24, 1964)

    Get PDF
    The Official Publication of the Bard College Communityhttps://digitalcommons.bard.edu/observer/1034/thumbnail.jp

    Computer analysis of EEG data for a normative library Final report, Sep. 24, 1963 - Jan. 31, 1966

    Get PDF
    Computer analysis of electroencephalographic data for development of normative criteri

    Homologues of bacterial TnpB_IS605 are widespread in diverse eukaryotic transposable elements

    Full text link

    Freeform User Interfaces for Graphical Computing

    Get PDF
    報告番号: 甲15222 ; 学位授与年月日: 2000-03-29 ; 学位の種別: 課程博士 ; 学位の種類: 博士(工学) ; 学位記番号: 博工第4717号 ; 研究科・専攻: 工学系研究科情報工学専

    Personal Privacy in the Computer Age: The Challenge of a New Technology in an Information-Oriented Society

    Get PDF
    The purpose of this Article is to survey the new technology\u27s implications for personal privacy and to evaluate the contemporary common-law and statutory pattern relating to data-handling. In the course of this examination, it will appraise the existing framework\u27s capacity to deal with the problems created by society\u27s growing awareness of the primordial character of information. The Article is intended to be suggestive; any attempt at definitiveness would be premature. Avowedly, it was written with the bias of one who believes that the new information technology has enormous long-range societal implications and who is concerned about the consequences of the notion that man shapes his tools and then they shape him. The assumption throughout is that the computer is not simply a sophisticated indexing machine, a miniaturized library, or an electronic abacus; it is the keystone of a new communications medium that eventually will have global dimensions. Thus, it would be overly simplistic to examine the computer-privacy issue from the perspective of a particular machine or group of machines operating in a federal office building, in the headquarters of one of the nation\u27s major industrial complexes, or in the recesses of a great university. Indeed, the analogy between the forces that gave rise to the multifaceted regulation of the airlines, railroads, radio, and television and the problems that already are generating pressure for the regulation of computer transmissions and facilities seems obvious. It is against the template of the potential need for a comprehensive regulatory scheme embracing some uses of the technology in both the public and private sectors that the question of protecting individual privacy in the computer age must be placed

    UTPA Undergraduate Catalog 2007-2009

    Get PDF
    https://scholarworks.utrgv.edu/edinburglegacycatalogs/1074/thumbnail.jp

    Organizational Identity and Strategy: An Exploratory Study of Parallelisms

    Get PDF
    The goals set by an organization and the plans, resources and people deployed to work towards these objectives have an impact on firm performance and ultimately firm survivability. An organization’s identity, what is central, enduring and distinct about a firm may also have an impact on firm performance and ultimately its survivability (Albert & Whetten, 1985). A neglected area of study, the relationship between strategy and organizational identity, will be the core focus of this exploratory study. This thesis aims to explore whether parallelisms between organizational identity and strategy exist, and whether these parallelisms may affect firm performance. Using the constructs of Organizational Identity Orientation (Brickson, 2005; Brickson, 2007) and Strategic Typology (Miles & Snow, 1978), the research questions are explored through a multimethod approach. 25 firms in the Information Technology consulting industry in Ottawa participated in this study; a top management representative from each firm participated in an interview and completed a questionnaire. Qualitative and quantitative results suggest support for some parallelisms between the constructs, such as the compatibilities shared between Relational organizational identity and Defender strategy. Limitations of study are discussed, and propositions for future research are developed and contributions to the field explored
    corecore