current information
Recently Published Documents


TOTAL DOCUMENTS

546
(FIVE YEARS 153)

H-INDEX

26
(FIVE YEARS 5)

2022 ◽  
Vol 6 (1) ◽  
pp. 251261
Author(s):  
Marcela De Oliveira e Silva Loureiro ◽  
Natália Araujo Pacheco ◽  
Janaína Carla Kovalski

Objective: To identify and compare the most relevant attributes for consumers when deciding to buy olive oil in Brazil and Portugal.Method: In the first study, 10 olive oil consumers were interviewed to understand and identify the attributes that influence the decision process. In the second study, a survey was conducted with 338 consumers to compare the importance of the attributes.Findings: Taste, type of olive oil, acidity and price were among the five most important attributes for both nationalities, along with brand (only for Brazilians) and country of origin (only for Portuguese). Among the most important attributes, price was the least important and was used as a tie-breaker between similar products.Originality: Despite the economic importance of this market (€856 million in 2019), little is known about the attributes that are most relevant to consumers. This research provides current information on these attributes.


2022 ◽  
Vol 13 (1) ◽  
Author(s):  
Akinobu Suzuki ◽  
Sakurako Kosugi ◽  
Emi Murayama ◽  
Eri Sasakawa ◽  
Noriaki Ohkawa ◽  
...  

AbstractWhen processing current sensory inputs, animals refer to related past experiences. Current information is then incorporated into the related neural network to update previously stored memories. However, the neuronal mechanism underlying the impact of memories of prior experiences on current learning is not well understood. Here, we found that a cellular ensemble in the posterior parietal cortex (PPC) that is activated during past experience mediates an interaction between past and current information to update memory through a PPC-anterior cingulate cortex circuit in mice. Moreover, optogenetic silencing of the PPC ensemble immediately after retrieval dissociated the interaction without affecting individual memories stored in the hippocampus and amygdala. Thus, a specific subpopulation of PPC cells represents past information and instructs downstream brain regions to update previous memories.


2022 ◽  
pp. 1-22
Author(s):  
Amy Jo Clark ◽  
Melanie K. Van Dyke ◽  
Jill T. Tussey ◽  
Leslie Haas

This chapter focuses on oral language development in children birth to third grade. Additionally, the effects of poverty on oral language development in children is explored. Subject matter includes typical language development, common language disorders, and current information regarding the interplay of language and technology. Particular attention is paid to the ways the home environment influences early language in infants and toddlers. Strategies to support language development in young children through the language experience approach, literacy, text sets, and technology are explained. Resources, materials, and suggested activities for parents, caregivers, and educators are embedded.


Author(s):  
Eko Saputra Utama ◽  
Nining Sudiar ◽  
Vita Amelia

The purpose of this study is to determine the relevance of library collections to users’ information needs at Forestry Faculty Library, Lancang Kuning University, Pekanbaru. This research uses quantitative approach with descriptive method. The results show that: (1) Current information need approach: 57 respondents searched for collection from scientific aspect, meanwhile in terms of collection availability of Unilak Fahutan Library on current information need, it is found that the most widely provided collection based on cover collection was 454 titles. (2) Everyday information need approach: 50 respondents needed results of researches by lecturers (journals) and by students (theses), meanwhile in terms of collection availability of Unilak Fahutan Library on everyday information need, it is found that the most widely provided collections were books, reports, modules, theses, and journals often used in completing lecture assignments with the total of 1,216 titles. (3) Exhaustive information need approach: 61 respondents needed printed works (books, magazines, reports, etc.), meanwhile the collection availability of Unilak Fahutan Library on exhaustive information need, 886 titles of theses, book journals, proceedings, books, and magazines were available. (4) The need of information at a glance: 64 respondents needed a list of new collection titles to find information, meanwhile in terms of collection availability of Unilak Fahutan Library on the need of information at a glance, it is found that there were 761 titles of brief and clear information such as magazines, bulletin, reports and books.


2021 ◽  
Vol 2021 ◽  
pp. 1-7
Author(s):  
Jian Xiao

Based on the unprecedented development of current information technology, under the prevalence of third-party payment, in order to increase the utilization rate of idle resources and meet the diversified economic needs of today’s era, as an emerging economic model-the “sharing economy”, combined with Internet big data, it has effectively realized the perfect connection between supply and demand, and it has quickly swept through all walks of life. However, while promoting economic development, the lack of regulatory measures and the imperfect credit system have severely restricted the further development of the sharing economy. Blockchain technology (BT), as a new distributed infrastructure and computing method, has always been the core technology of Bitcoin. Based on the development of generalized economic model and BT, this paper analyzes the shortcomings of generalized economic model and blockchain technology through information fusion big data and proposes a kind of information based on information fusion big data+public BT. The security management system adapts to the status quo of the sharing economy and uses the functions of information fusion big data+blockchain technology to solve the current information security risks faced by the sharing economy. The experimental results of this article show that the sharing economy information security management system based on information fusion big data+blockchain technology has good protection capabilities. The interception rate of external information reached 95%, and the interception rate of system information reached 93%. Better protection of privacy leaks is needed.


Author(s):  
Danuta Łazarska

Why is it worth reading poems by Zbigniew Herbert also with the students of 1st-year classes of reformed high school? In order to find answers to such questions, the author of the article refers, among other things, to current information from Ministry of National Education and focuses her attention on reflections by writers and literature scholars, which point out the value of reading Herbert’s poetry. In addition, she presents selected results of empirical research. The latter allow diagnosing why, according to high school students of 1st year, it is worth reading the works written by the poet. In view of the gathered material, she draws final conclusions.


2021 ◽  
Vol 2136 (1) ◽  
pp. 012044
Author(s):  
Yuxi Zhou ◽  
Mingjie Ma ◽  
Zenghui Jiang

Abstract As the focus of the development of the whole society in the era of big data, information security is also the main direction of the practice and development of technological innovation. On the basis of understanding the current information transmission security and its algorithm research, this paper analyzes how to use this technology to guarantee information security according to the block encryption principle.


Author(s):  
Mohammad Abdu Al-esaiy ◽  
Nagi Ali Al-Shaibany

ISMS is a set of policies, activities, and procedures implemented by the Information Security Department to maintain the confidentiality, integrity, and availability of information from threats and risks. Activities and procedures include identifying security needs, strategies required for implementation, and measuring results for security improvement. This paper aims to review the previous literature to verify the factors that affect information security management. Examination of current information security frameworks and standards, and this paper concluded that, for an organization to adopt a specific framework, this framework must be evaluated based on the security needs of the organization. The framework must include all factors that affect information security from all organizational aspects, people, and technology. Otherwise, the organization will face difficulties and obstacles in implementing the framework and improving security.


Sign in / Sign up

Export Citation Format

Share Document