scholarly journals Facilitating Mentoring Relationships: The Case for New Technology

10.28945/2736 ◽  
2003 ◽  
Author(s):  
Pamela J. Kalbfleisch ◽  
Valina K. Eckley

This paper describes a research project that analyzes how new technology can facilitate mentoring relationships. The specific new technology assessed in this research is the Internet. This is a particularly useful medium for communication in mentoring relationships because it expands the number and variety of mentoring relationships that can be facilitated, and it expands the time and space available for these relationships. This research supports the mentoring enactment theory developed by Kalbfleisch (2002) and expands our knowledge of how the Internet can play an influential role in the development and maintenance of mentoring relationships.

2019 ◽  
Author(s):  
Zhanna Borisovna Erzhanova ◽  
Zhanna Borisovna Erzhanova

Some words about attitudes to technology: many people are afraid of new technology and, with the increasing presence of the Internet and computers, the term technophobe has appeared to refer to those of us who might be wary of these new developments. More recently, the term digital native has been coined to refer to someone who grows up using technology, and who thus feels comfortable and confident with it there is a tendency to call computer users either technophobes or technogeeks ( a term for a technology enthusiast) the truth is that most of us probably fall somewhere between the two extremes. A large part of the negative attitudes teachers have towards technology is usually the result of a lack of confidence, a lack of facilities or a lack of training, resulting in an inability to see the benefit of using technologies in the classroom. It is also often the case that teachers may not be fully in control of their work situations. A teacher may want to use more technology in their teaching, but the school may not have the facilities, or, on the other hand, a teacher may be instructed to start using technology for which they feel unprepared or untrained.


2003 ◽  
Vol 2 (2) ◽  
Author(s):  
Fumiko Hayashi ◽  
Elizabeth Klee

Consumers pay for hundreds of goods and services each year, but across households and across goods, consumers do not choose to pay the same way. This paper posits that payment choices depend in part on consumers' propensity to adopt new technologies and in part on the nature of the transaction. To test this hypothesis, this paper analyzes consumer's payment instrument use at the point of sale and for bill payment. The sample includes consumers surveyed in 2001, who are primarily users of the Internet. The results indicate that consumers who use new technology or computers are more likely to use electronic forms of payment, such as debit cards and electronic bill payments. Particularly, the use of direct deposit is a significant predictor of electronic payment use. Furthermore, the results indicate that payment choice depends on the characteristics of the transaction, such as the transaction value, the physical characteristics of the point of sale, and a bill's frequency and value variability.


2012 ◽  
Vol 6-7 ◽  
pp. 957-963 ◽  
Author(s):  
Shun Bing Zhu ◽  
Chun Quan Du ◽  
Miao Miao Niu

The wisdom community is the basic unit of the smart city, is a set of urban management, public services, social services, residents’ autonomy and mutual aid services in one of the new technology applications. This article analyzes the current situation and existing problems of the wisdom community, then described the Internet of Things architecture, equipment features, community cloud computing platform and structure, the last detailed analysis of the wisdom community features and community network video intercom, home security, appliance control, non-contact card access control, card consumption management, community security, community e-service technology and other technical content and features.


2018 ◽  
Vol 25 (3) ◽  
pp. 166-176
Author(s):  
Lisa Gardiner

SUMMARYSexual and relationships difficulties are not uncommon among psychiatric patients. A presenting complaint of anxiety or depression may relate to an underlying sexual or relationship difficulty; commonly used psychotropic medications cause sexual side-effects that can have a significant impact quality of life, relationship maintenance and treatment adherence; patients may exhibit unusual or excessive sexual behaviours when acutely unwell, including risky use of apps to meet sexual partners and accessing online pornography in unsafe ways; patients may have used technology such as the internet to harm others or they may be victims of such harm; the internet and social media might even be influencing sexual expression, for example gender identity. Therefore, psychosexual history-taking remains a key competency for psychiatrists. They must also understand the new language used to describe sexuality, sexual behaviours and the use of social media, apps and so on to form relationships. This article outlines the key areas to consider in carrying out a structured psychosexual assessment. It also gives an overview of current sexual terminology, observed influences of the internet on sexuality and sexual behaviour, and its implications for mental health and potential sexual offending.LEARNING OBJECTIVESAfter reading this article you will be able to: •outline a framework for psychosexual history-taking•recognise emerging terminology relating to sexual behaviours and identity•understand the relevance of the internet, social media and technology-based apps to human relationships, including the use of technology in sexual offendingDECLARATION OF INTERESTNone.


2018 ◽  
Vol 4 (2) ◽  
pp. 85-95 ◽  
Author(s):  
Justyna Masłyk

Abstract The main purpose of this article is to present the results of research concerning the use of social media by companies from the SME sector in Podkarpackie Province. The article includes data obtained in the first stage of the study, which is a part of a research project on the use of social media in the area of creating the image of an organization / company as an employer.The survey covered the entire population of companies from the SME sector, which are registered in Podkarpackie Province (REGON database). The research phase, the results of which are presented in this article, mainly involved the analysis of data on companies from the SME sector in Podkarpackie Province in terms of their presence on the Internet (having an individual website, having company profiles on selected social networks). The results of the first stage of the study confirm that the companies see the potential of the online presence / functioning in social media (more and more companies have their own website, Facebook profiles). The dynamics of changes in this area is definitely not adequate to the pace of new media development. On the basis of preliminary results of further stages of the research, it can also be concluded that in the vast majority of cases, however, these are non-strategic and non-systematic activities.


Author(s):  
Adam N. Joinson ◽  
Carina B. Paine

This article examines the extant research literature on self-disclosure and the Internet, in particular by focusing on disclosure in computer-mediated communication and web-based forms – both in surveys and in e-commerce applications. It also considers the links between privacy and self-disclosure, and the unique challenges (and opportunities) that the Internet poses for the protection of privacy. Finally, the article proposes three critical issues that unite the ways in which we can best understand the links between privacy, self-disclosure, and new technology: trust and vulnerability, costs and benefits, and control over personal information. Central to the discussion is the notion that self-disclosure is not simply the outcome of a communication encounter: rather, it is both a product and process of interaction, as well as a way of regulating interaction dynamically. By adopting a privacy approach to understanding disclosure online, it becomes possible to consider not only media effects that encourage disclosure, but also the wider context and implications of such communicative behaviours.


2020 ◽  
Vol 1 (1) ◽  
pp. 11-22
Author(s):  
Asaad A. Hani

There is a great research in the field of data security these days. Storing information digitally in the cloud and transferring it over the internet proposes risks of disclosure and unauthorized access; thus, users, organizations, and businesses are adapting new technology and methods to protect their data from breaches. In this paper, we introduce a method to provide higher security for data transferred over the internet, or information based in the cloud. The introduced method for the most part depends on the Advanced Encryption Standard (AES) algorithm, which is currently the standard for secret key encryption. A standardized version of the algorithm was used by The Federal Information Processing Standard 197 called Rijndael for the AES. The AES algorithm processes data through a combination of exclusive-OR operations (XOR), octet substitution with an S-box, row and column rotations, and MixColumn operations. The fact that the algorithm could be easily implemented and run on a regular computer in a reasonable amount of time made it highly favorable and successful. In this paper, the proposed method provides a new dimension of security to the AES algorithm by securing the key itself such that even when the key is disclosed; the text cannot be deciphered. This is done by enciphering the key using Output Feedback Block Mode Operation. This introduces a new level of security to the key in a way, in which deciphering the data requires prior knowledge of the key and the algorithm used to encipher the key for the purpose of deciphering the transferred text.


2021 ◽  
Vol 150 (3) ◽  
pp. 1-23
Author(s):  
Katarzyna Śledziewska ◽  
Renata Włoch

In this article we focus on identifying the specificity of digital transformation within the public sector. The aim of the article is to present the main mechanisms resulting from the introduction of digital innovations that have changed the functioning of the public sector. Starting from a discussion on the technological requirements of digital transformation, we briefly characterise the use of computers and the Internet in public administration, resulting in the development of e-services and administration. The main part of the article is devoted to discussing the specificity of the implementation of the new digital technologies in public administration, focusing mainly on artificial intelligence and blockchain technologies. Our thesis is that the impact of innovative digital technologies on the operation standards and structure of public administration should be analysed through the prism of interrelated mechanisms of datafication and platformisation, characteristic for the digital economy. The adopted methodology, which is based on an analysis of the subject literature and an analysis of new technology implementations in public administration in EU countries, indicates the pilot, random and non-transformational nature of these implementations, partly due to the lack of well-established methodologies to study and assess the maturity of digital transformation within the public sector.


Author(s):  
Pedro R. Palos-Sanchez ◽  
Marisol B. Correia

This chapter aims to expose the current situation of the adoption of cloud computing in companies in general and in enterprises of the tourism sector in particular. For this, a review of the literature has been carried out to establish the conceptual framework of technology and of the new economic model that underlies its adoption. Cloud computing is one of the technologies less known to many organizations and especially users, as it is a new technology based on the Internet, through which information is stored on servers, is provided as a service and on clients' demand. Therefore, the main theories of adoption that have been used to explain the different adoption models are presented, as well as, the different solutions that are being used in the tourist industry.


Sign in / Sign up

Export Citation Format

Share Document