810 research outputs found
Data for Theorising the take-up of ICT : can Valsiner's three zones framework make a contribution?
This paper explores the contribution of theory to understanding the take-up of ICT and, in particular, it describes how Valsiner’s three zones framework came to be used in a study of lecturers in Saudi higher education institutions. The paper describes the value of theory and, in the process, illustrates some of the approaches taken in the literature on teachers’ use of ICT. The challenges faced in theorising are also covered. The paper then gives the background to a study of ICT use among university lecturers before moving to a discussion of methodology and presentation of key findings. Next, attention shifts to explaining key aspects of Valsiner’s zones framework and showing how this framework was applied to explain the modest but differentiated use of ICT across eight institutions. Finally, the paper discusses the strengths and limitations of the zones framework and highlights some of the wider challenges which theorisation pose
Theorising the take-up of ICT : can Valsiner's three zones framework make a contribution?
This paper explores the contribution of theory to understanding the take-up of ICT and, in particular, it describes how Valsiner’s three zones framework came to be used in a study of lecturers in Saudi higher education institutions. The paper describes the value of theory and, in the process, illustrates some of the approaches taken in the literature on teachers’ use of ICT. The challenges faced in theorising are also covered. The paper then gives the background to a study of ICT use among university lecturers before moving to a discussion of methodology and presentation of key findings. Next, attention shifts to explaining key aspects of Valsiner’s zones framework and showing how this framework was applied to explain the modest but differentiated use of ICT across eight institutions. Finally, the paper discusses the strengths and limitations of the zones framework and highlights some of the wider challenges which theorisation pose
Assessing social media adoption and maturity in small and medium enterprises: case of Saudi Arabia
The proliferation of social media has changed marketing and branding of organisations around the world. Social media has proved to create business value for companies; however, there is a lack of coherent and sequent studies in the field of social media for small and medium enterprises (SMEs) in Saudi Arabia. In addition, the literature lacks a systematic approach providing a practical means to support SMEs in getting value through social media. Since companies are affected by the social, economic and political circumstances in which they operate, this research focuses on Saudi Arabia-based SMEs.
The research aims to develop an online tool based on a social media maturity assessment model that includes maturity criteria, levels of progress and a formula to automatically calculate the overall maturity and provide guidance. Developing such a tool requires studying different aspects related to the use of social media in business and examining their statistical associations. The areas include investigation of social media adoption factors, examination of the social media value to SMEs as well as identification of barriers to success. Moreover, the research examines the maturity level of SMEs in using social media as well as consumers` social media readiness related to interacting with corporate social media accounts in Saudi Arabia. The research used cross-sectional surveys to collect primary data from SMEs, experts and social media users to answer the research questions.
The findings revealed that there is high awareness of the usefulness of social media as a marketing channel and strong support from the owners and top management in using such interactive technologies among Saudi SMEs. However, there is also clear evidence that there is a need for training in using social media in these companies which is something that the majority of companies do not provide. The main obstacles that SMEs face when using social media are insufficient dedicated staff as well as a lack of time and skills. The main reasons why SMEs do not use social media are the low perceived usefulness, the perception that there are types of businesses that do not need social media engagement as well as the lack of knowledge and skills in the field. Also, the findings demonstrate that Saudi consumers have positive perception towards using social media to interact with brands. However, there are concerns regarding trust and privacy when using corporate social media accounts.
The research develops a social media maturity assessment model for SMES and also discovers new maturity criteria which are statistically associated with the overall social media maturity of companies. These new criteria include: Number of hours dedicated for social media per week, LinkedIn corporate presence, perceived usefulness of social media, consistency of business goals with social media, providing social media training to employees, availability of financial resources and social media infrastructure in the company
Crystal structure of 1,1-dimethyl-3-(2-phenylethyl)urea, C11H16N2O
Abstract
C11H16N2O, orthorhombic, Pbca (no. 61), a = 10.7388(6) Å, b = 9.8449(5) Å, c = 21.1259(14) Å, V = 2233.5(2) Å3, Z = 8, R
gt
(F) = 0.0582, wR
ref
(F
2) = 0.1795, T = 293 K.</jats:p
Time-Dependent Physicochemical Changes of Carbonate Surfaces from SmartWater (Diluted Seawater) Flooding Processes for Improved Oil Recovery.
Over the past few decades, field- and laboratory-scale studies have shown enhancements in oil recovery when reservoirs, which contain high-salinity formation water (FW), are waterflooded with modified-salinity salt water (widely referred to as the low-salinity, dilution, or SmartWater effect for improved oil recovery). In this study, we investigated the time dependence of the physicochemical processes that occur during diluted seawater (i.e., SmartWater) waterflooding processes of specific relevance to carbonate oil reservoirs. We measured the changes to oil/water/rock wettability, surface roughness, and surface chemical composition during SmartWater flooding using 10-fold-diluted seawater under mimicked oil reservoir conditions with calcite and carbonate reservoir rocks. Distinct effects due to SmartWater flooding were observed and found to occur on two different timescales: (1) a rapid (<15 min) increase in the colloidal electrostatic double-layer repulsion between the rock and oil across the SmartWater, leading to a decreased oil/water/rock adhesion energy and thus increased water wetness and (2) slower (>12 h to complete) physicochemical changes of the calcite and carbonate reservoir rock surfaces, including surface roughening via the dissolution of rock and the reprecipitation of dissolved carbonate species after exchanging key ions (Ca2+, Mg2+, CO32-, and SO42- in carbonates) with those in the flooding SmartWater. Our experiments using crude oil from a carbonate reservoir reveal that these reservoir rock surfaces are covered with organic-ionic preadsorbed films (ad-layers), which the SmartWater removes (detaches) as flakes. Removal of the organic-ionic ad-layers by SmartWater flooding enhances oil release from the surfaces, which was found to be critical to increasing the water wetness and significantly improving oil removal from carbonates. Additionally, the increase in water wetness is further enhanced by roughening of the rock surfaces, which decreases the effective contact (interaction) area between the oil and rock interfaces. Furthermore, we found that the rate of these slower physicochemical changes to the carbonate rock surfaces increases with increasing temperature (at least up to an experimental temperature of 75 °C). Our results suggest that the effectiveness of improved oil recovery from SmartWater flooding depends strongly on the formation of the organic-ionic ad-layers. In oil reservoirs where the ad-layer is fully developed and robust, injecting SmartWater would lead to significant removal of the ad-layer and improved oil recovery
Project Management Practice: Redefining Theoretical Challenges in the 21st Century
From the incessant project failures, project delay and cost overrun to extreme difficulty in agreeing on what constitute project success and project management success, project management practice is more challenging in the 21st century than previously propounded. Therefore, the theoretical challenges facing project management practice were examined and the research findings indicate several ways in which the use of project management methods and standards can help in delivering successful output. This work has significant implications in the way project managers actually manage projects in practice. For example, we proposed that project management theory and practice are interdependent only when project management theories are beneficial and can be applied. This proposition has implications on project management practice because if project management theories are not particularly applied to manage current projects then it would be difficult to assess project management validity. In conclusion, the research limitations are highlighted and recommendations for future research were made. Key words: project management practice, project failures, project and complexity, project evaluation and performance.
A framework for designing cloud forensic‑enabled services (CFeS)
Cloud computing is used by consumers to access cloud services. Malicious
actors exploit vulnerabilities of cloud services to attack consumers. The link
between these two assumptions is the cloud service. Although cloud forensics assists
in the direction of investigating and solving cloud-based cyber-crimes, in many
cases the design and implementation of cloud services falls back. Software designers
and engineers should focus their attention on the design and implementation of
cloud services that can be investigated in a forensic sound manner. This paper presents
a methodology that aims on assisting designers to design cloud forensic-enabled
services. The methodology supports the design of cloud services by implementing
a number of steps to make the services cloud forensic-enabled. It consists
of a set of cloud forensic constraints, a modelling language expressed through a
conceptual model and a process based on the concepts identified and presented in
the model. The main advantage of the proposed methodology is the correlation of
cloud services’ characteristics with the cloud investigation while providing software
engineers the ability to design and implement cloud forensic-enabled services via
the use of a set of predefined forensic related task
The Saudi experiment with career guidance
Saudi Arabia has recently embarked on an ambitious experiment with career guidance. The country has identified that career guidance offers a range of potential cultural, educational and economic benefits. These include supporting the Saudisation of the workforce, the development of the vocational education system and the engagement of the Saudi ‘youth bulge’ in the labour market and wider society. However, the country has a weak tradition of career guidance and a need to develop new policies and systems rapidly. The Saudi Ministry of Labour has driven the development of the country’s new career guidance system and has sought to learn from global best practice. However, Saudi Arabia offers a very different context from those where career guidance has flourished. Particularly distinctive features of Saudi society include its limited civil society, the central role that religion plays, the place of women, the role of oil within the economy and the high level of migrant workers in the labour market. Taken together these issues offer challenges of culture, theory, policy and practice. Negotiating these challenges and building an organic body of theory and practice will be critical to the success or otherwise of the Saudi experiment with career guidance.N/
Training Software Effectiveness Applied by the Mothers to Their Autistic Children at Home Remotely to Develop Their Self-Care Skills Under the Supervision of the Specialist
This study represented a Training software applied by mothers to their autistic children at home remotely to develop their self-care skills through computer activities such as toothbrushing, hand washing, toilet use skills, wearing and taking off clothes skills Under the supervision of the specialist, the Course-lab program will introduce the software & flowchart to define the flow of the software. The main objective of the study here is twofold, one of which is to develop the capacity of the mother in training her autistic child in self-care skills and to recognize the effectiveness of the software in developing the capacity of the autistic child. This study is based on an experimental approach. Researchers prepared a questionnaire consisting of 60 phrases to measure a childs performance on these skills before and after the use and practical application of the software. The participants consist of 11 children and 11 mothers in a six-month period, and a sample was collected from mothers and children of rehabilitation centers in the Eastern Province of Saudi Arabia. Data were analyzed by statistical methods using the SPSS program, version No. 24. The descriptive statistics were used to process data and the percentage of gains of Blacks Modifies adjustments. Among the most important findings of the study was the improved performance of children in acquiring self-care skills, as well as the improved performance of mothers in applying self-care skills to their children this is reflected in Blakes modified gains to detect the effectiveness of the application 1.42, indicating acceptable and highly effective categories, and average pre-training scores calculated. (Before the introduction of the self-care skills development program for children with autism) where the average in tribal measurement was 40.13 by contrast, the corresponding average in dimensional measurement was 88.43 in favor of dimensional measurement and the calculated Z value exceeded the scheduled test value of Z (0.05 and 0.01, respectively; p ≤ 0.000) indicating the effectiveness of the software used
- …
