WorldWideScience

Sample records for cancer-related internet mailing

  1. Internet versus mail

    DEFF Research Database (Denmark)

    Olsen, Søren Bøye

    In a choice experiment setup, this paper suggests that internet surveys can be a viable alternative to traditional mail surveys when gathering feedback from a sample of respondents. In a study concerning preferences for avoiding encroachment of nature areas in future motorway planning in Denmark......, two samples of respondents are surveyed – one by internet and one by mail. Results suggest that additional self-selection mechanisms in the internet survey mode lead to the internet sample being less representative of the survey population than is the case for the mail sample. Similar response rates...... are obtained in the two samples, but the internet sample is apparently less prone to protest bidding. A thorough parametric analysis cannot reject that stated preferences elicited by use of the two different modes of sampling are identical. This suggests that the fear of a potential survey mode effect...

  2. How new subscribers use cancer-related online mailing lists.

    Science.gov (United States)

    Rimer, Barbara K; Lyons, Elizabeth J; Ribisl, Kurt M; Bowling, J Michael; Golin, Carol E; Forlenza, Michael J; Meier, Andrea

    2005-07-01

    Online cancer-related support is an under-studied resource that may serve an important function in the information seeking, care, and support of cancer patients and their families. With over 9.8 million cancer survivors (defined as anyone living with cancer) in the United States alone and the number growing worldwide, it is important to understand how they seek and use online resources to obtain the information they need, when they need it, and in a form and manner appropriate to them. These are stated cancer communication goals of the US National Cancer Institute. Our purposes are to (1) present background information about online mailing lists and electronic support groups, (2) describe the rationale and methodology for the Health eCommunities (HeC) study, and (3) present preliminary baseline data on new subscribers to cancer-related mailing lists. In particular, we describe subscribers' use of mailing lists, their reasons for using them, and their reactions to participating shortly after joining the lists. From April to August 2004, we invited all new subscribers to 10 Association of Cancer Online Resources mailing lists to complete Web-based surveys. We analyzed baseline data from the respondents to examine their perceptions about cancer-related mailing lists and to describe how cancer patients and survivors used these lists in the period shortly after joining them. Cumulative email invitations were sent to 1368 new mailing list subscribers; 293 Web surveys were completed within the allotted time frame (21.4% response rate). Most respondents were over age 50 (n = 203, 72%), white (n = 286, 98%), college graduates (n = 161, 55%), and had health insurance (n = 283, 97%). About 41% (n = 116) of new subscribers reported spending 1 to 3 hours per day reading and responding to list messages. They used the mailing lists for several reasons. Among the most frequently reported, 62% (n = 179) strongly agreed they used mailing lists to obtain information on how to deal

  3. Compulsory registration of mail servers in order to accept e-mail from the Internet

    CERN Multimedia

    IT Department

    2008-01-01

    This announcement is intended only for administrators of a mail server (sendmail, postfix, etc.). It concerns e-mails sent from the Internet to addresses of the following type: somemailbox@somehost.cern.ch. Mail server managers are requested to register their servers so that they can accept e-mail from outside CERN. In future the CERN mail infrastructure will relay messages from outside CERN only to officially registered mail servers. This rule applies only to messages sent from the Internet. There will be NO change with respect to messages sent from inside CERN. If you are responsible for a mail server that accepts e-mails from outside CERN, please read the following page: http://cern.ch/mail/Help/?kbid=191090, where you can find information about the new rule and check if your host is already registered in the system. If you wish to register a mail server please send a message to: mailto:mail.support@cern.ch. This rule will be gradually enforced from 20 February 2008 onwards. Thank you for your cooperation...

  4. A comparative analysis of mail and internet surveys

    Science.gov (United States)

    Benjamin D. Poole; David K. Loomis

    2010-01-01

    Th e field of survey research is constantly evolving with the introduction of new technologies. Each new mini-revolution brings criticism about the accuracy of the new survey method. The latest development in the survey research field has been increased reliance on Internet surveys. This paper compares data collected through a mixed-mode (mail and Internet) survey of...

  5. Cost and performance tradeoffs between mail and internet survey modes in a nonmarket valuation study

    Science.gov (United States)

    Robert M. Campbell; Tyron Venn; Nathaniel M. Anderson

    2018-01-01

    Using the results of a choice modeling survey, internet, mail-only and mixed internet and mail survey modes were examined with regards to their cost-effectiveness, representativeness, and willingness to pay (WTP). The topical focus of the study was biomass energy generation preferences of the residents of Montana, Colorado and Arizona, USA. Compared to the mail and...

  6. Nightly@nbc.com: Audience Scope and the Perception of Interactivity in Viewer Mail on the Internet.

    Science.gov (United States)

    Newhagen, John E.; And Others

    1995-01-01

    Examines 650 Internet mail messages sent to NBC Nightly News in response to an invitation during a series dealing with the impact of new technologies. Investigates to what degree Internet viewer comments resemble traditional viewer mail, and whether perceived interactivity was a factor in the character of Internet viewer mail. (SR)

  7. Health Literacy and Global Cognitive Function Predict E-Mail but Not Internet Use in Heart Failure Patients

    Directory of Open Access Journals (Sweden)

    Jared P. Schprechman

    2013-01-01

    Full Text Available Background. The internet offers a potential for improving patient knowledge, and e-mail may be used in patient communication with providers. However, barriers to internet and e-mail use, such as low health literacy and cognitive impairment, may prevent patients from using technological resources. Purpose. We investigated whether health literacy, heart failure knowledge, and cognitive function were related to internet and e-mail use in older adults with heart failure (HF. Methods. Older adults (N=119 with heart failure (69.84±9.09 years completed measures of health literacy, heart failure knowledge, cognitive functioning, and internet use in a cross-sectional study. Results. Internet and e-mail use were reported in 78.2% and 71.4% of this sample of patients with HF, respectively. Controlling for age and education, logistic regression analyses indicated that higher health literacy predicted e-mail (P<.05 but not internet use. Global cognitive function predicted e-mail (P<.05 but not internet use. Only 45% used the Internet to obtain information on HF and internet use was not associated with greater HF knowledge. Conclusions. The majority of HF patients use the internet and e-mail, but poor health literacy and cognitive impairment may prevent some patients from accessing these resources. Future studies that examine specific internet and email interventions to increase HF knowledge are needed.

  8. Internet, Phone, Mail, and Mixed-Mode Surveys: The Tailored Design Method, 4th Edition

    Science.gov (United States)

    Dillman, Don A.; Smyth, Jolene D.; Christian, Lean Melani

    2014-01-01

    For over two decades, Dillman's classic text on survey design has aided both students and professionals in effectively planning and conducting mail, telephone, and, more recently, Internet surveys. The new edition is thoroughly updated and revised, and covers all aspects of survey research. It features expanded coverage of mobile phones, tablets,…

  9. Internet/E-Mail Usage and Well-Being among 65-84 Year Olds in New Zealand: Policy Implications

    Science.gov (United States)

    Koopman-Boyden, Peggy G.; Reid, Sarah L.

    2009-01-01

    Research indicates that significant groups of older people are using Internet/e-mail technology. Using data from a 2007 random sample of 1,680 New Zealanders aged 65-84, predictors of Internet/e-mail usage and the impact of usage on well-being were investigated. Gender, age, education, household composition, income, and work were significant…

  10. PENGARUH PENERAPAN PERIKLANAN DI INTERNET DAN PEMASARAN MELALUI E-MAIL PRODUK UMKM DI WILAYAH DEPOK

    Directory of Open Access Journals (Sweden)

    Mujiyana Mujiyana

    2013-03-01

    Full Text Available Dewasa ini peran internet bukan hanya sebagai sarana mencari informasi, tapi juga mempunyai potensi besar sebagai media pemasaran dan perdagangan, khususnya periklanan. Bagi usaha mikro kecil dan menengah (UMKM, media periklanan melalui internet di Indonesia belum dimanfaatkan secara maksimal bahkan masih relatif kecil dan cenderung jauh dari sentuhan teknologi informasi yang mendukung kegiatan dan operasional perusahaan. Metode penelitian yang digunakan adalah deskriptif dan verifikatif. Konsep model penelitian ini adalah menguji kebenaran daru suatu hipotesis. Dalam penelitian ini telah dilakukan tiga tahapan selama tiga tahun berturut-turut, tahun pertama menguji manfaat penggunaan internet untuk periklanan bagi UMKM, tahun kedua membangun dan  mengembangkan portal situs web untuk periklanan produk UMKM, dan tahun ketiga mengukur pengaruh periklanan melalui internet bagi UMKM. Hasil penetilian dan kajian ini adalah produk teknologi infomasi yang dapat dimanfaatkan dalam pengelolaan usaha kecil, baik dari sisi kepentingan pelaku usaha maupun pihak terkait dalam pemberdayaan usaha kecil, dalam bentuk portal E-marketing yang dikelola oleh instansi pemerintah dan pihak asosiasi usaha kecil di wilayah kota Depok. Portal yang telah dibangun dapat diakses melalui http://www.gunadarma.ukmdepok.com Kata kunci : periklanan, e-commerce dan e-marketing, pemasaran melalui e-mail   Abstract Today the role of the Internet not only as a means of finding information, but it also has great potential as a medium of marketing and trade, particularly advertising. For micro small and medium enterprises (MSMEs, media advertising over the internet in Indonesia is not fully utilized even still relatively small and likely to be far from the touch of the information technology that supports the activities and operations of the company. The research method used is descriptive and verification. The concept model of this study was to test the truth of a hypothesis

  11. Gastric cancer-related information on the Internet: incomplete, poorly accessible, and overly commercial.

    LENUS (Irish Health Repository)

    Killeen, Shane

    2011-02-01

    Patients increasingly use the Internet for gastric cancer information. However, the quality of the information is questionable. We evaluated the accuracy, completeness, accessibility, reliability, and readability of gastric cancer websites.

  12. DSHEA's third-party literature exemption; mail order sales, direct marketing, and Internet use.

    Science.gov (United States)

    Raubicheck, C J

    1999-01-01

    This article examines ways in which marketers of dietary supplements can make use of the "third-party literature" section of the Dietary Supplement Health and Education Act of 1994 (DSHEA). This provision permits persons or entities, other than manufacturers or distributors, to distribute to consumers certain publications in connection with the sale of particular supplements. These publications may include statements about the therapeutic benefits of such products without subjecting the products to regulation by the Food and Drug Administration (FDA) as unapproved new drugs. Specifically, this article addresses the following: Can a dietary supplement manufacturer or distributor send third-party literature about a dietary supplement to a customer in a mail order sales transaction? Can third-party literature be disseminated by mail with dietary supplement catalogues only? Can third-party literature be disseminated by sales representatives engaged in direct marketing of dietary supplements? Can third-party literature appear on the Internet? The answer appears to be affirmative in each of these situations.

  13. An Internet treatment with weekly e-mail contacts used in a tobacco unit: clinical utility and predictors of outcome

    NARCIS (Netherlands)

    Gallego, M.J.; Modesto, M.; Muñoz, M.A.; Almajano, M.J.; Modolell, E.; Peris, C.P.; Emmelkamp, P.M.G.

    2014-01-01

    This work presents preliminary data on the clinical utility and outcome predictors of The San Francisco Stop Smoking Internet Site (SFSSIS) (Lenert et al., 2003) used with weekly e-mail contacts and the usual pharmacological treatment. Fifty smokers participated in the current series of cases, 24

  14. Ding Dong, You've Got Mail! A Lab Activity for Teaching the Internet of Things

    Science.gov (United States)

    Frydenberg, Mark

    2017-01-01

    Connecting ordinary devices to the Internet is a defining characteristic of the Internet of Things. In this hands-on lab activity, students will connect a wireless doorbell to the Internet using a Raspberry Pi computer. By modifying and running a program on the Raspberry Pi to send an email or text message notifying a recipient that someone is at…

  15. Resident use of the Internet, e-mail, and personal electronics in the care of surgical patients.

    Science.gov (United States)

    Plant, Mathew A; Fish, Joel S

    2015-01-01

    The use of smartphones, e-mail, and the Internet has affected virtually all areas of patient care. Current university and hospital policies concerning the use of devices may be incongruent with day-to-day patient care. The goal was to assess the current usage patterns of the Internet, e-mail, and personal electronics for clinical purposes by surgical residents as well as their communication habits and preferences. Also assessed was residents' knowledge regarding the institutional policies surrounding these issues. Surgical residents (n = 294) at a large teaching institution were surveyed regarding their knowledge of university policies as well as daily use of various communication technologies. Communication preferences were determined using theoretical clinical scenarios. Our survey with a response rate of 54.7% (n = 161) revealed that 93.8% of participants indicated daily Internet use for clinical duties. Most respondents (72%) were either completely unaware of the existence of guidelines for its use or aware but had no familiarity with their content. Use of e-mail for clinical duties was common (85%), and 74% of the respondents rated e-mail as "very important" or "extremely important" for patient care. Everyone who responded had a mobile phone with 98.7% being "smartphones," which the majority (82.9%) stated was "very important" or "extremely important" for patient care. Text messaging was the primary communication method for 57.8% of respondents. The traditional paging system was the primary communication method for only 1.3% of respondents and the preferred method for none. Daily use of technology is the norm among residents; however, knowledge of university guidelines was exceedingly low. Residents need better education regarding current guidelines. Current guidelines do not reflect current clinical practice. Hospitals should consider abandoning the traditional paging system and consider facilitating better use of residents' mobile phones.

  16. Comparison of internet and mailing methods to recruit couples into research on unaided smoking cessation.

    Science.gov (United States)

    Derrick, Jaye L; Eliseo-Arras, Rebecca K; Hanny, Courtney; Britton, Maggie; Haddad, Sana

    2017-12-01

    In smoking cessation studies with restrictive criteria (e.g., single-smoker couples), thousands of potential participants might need to be screened to obtain a reasonable sample size. Consideration of recruitment methodology is critical because recruitment methods influence both the success and cost effectiveness of recruitment. Although traditional recruitment methods are often used to recruit participants into smoking cessation research, newer technologies, such as paid Facebook advertising, might offer more cost-effective alternatives for recruitment. The current analysis compares two versions of paid Facebook advertising and a specialized mass mailing method used to recruit single-smoker couples into an intensive three-week study of unaided smoking cessation. The three methods are compared in terms of demographic characteristics, eligibility, and cost-effectiveness. Although Facebook's "Promote Your Page" mechanism achieved the fastest recruitment rate (2.75 couples per month; 498 USD per couple), Facebook's "Send People to Your Website" mechanism was the least expensive and provided the most demographically diverse sample (1.64 couples per month; 181 USD per couple). The specialized mailing method was not productive or cost-effective (0.80 couples per month; 454 USD per couple). Paid Facebook advertising fared better as a recruitment method than a specialized mailing method often used in survey research. Studies that have less restrictive eligibility criteria, that draw from a larger local population, or that recruit for a less intense study might find paid Facebook advertising to be quite feasible. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. E-mail survey with an attached Form: an off-line data collection alternative via the internet

    Directory of Open Access Journals (Sweden)

    Alexandre Reis Graeml

    2008-09-01

    Full Text Available As people start incorporating the Internet in their daily routine, using its resources to carry out their usual activities, it becomes easier to use the Web's environment also to collect data by means of electronic surveys. This paper reports the use of a quantitative research survey, which used an "intelligent" MS Word form, which was sent through e-mail to industrial manufacturers in the state of Sao Paulo - Brazil. The response speed was much better than usually achieved using the conventional procedure of sending the survey through regular mail. The return rate was satisfactory and the cost was much lower than usually incurred, due to the virtualization of the contact with the respondent. The initiative was so successful that the authors decided to share their experience with the academic community, contributing to the maturing of the e-mail survey methodology. Although the focus of this study was strictly academic, the authors believe that the adopted procedures are also suitable for market research, feedback gathering and other entrepreneurial needs.

  18. MAIL OFFICE Outgoing mail

    CERN Multimedia

    1999-01-01

    The Mail Office once again wishes to remind users that the Organisation's mail service is exclusively reserved for official mail._\tAll outgoing official mail must arrive at the Mail Office unfranked and with the sender's name and Division clearly marked under the Organsation's address (see example below).Private mail must be taken to the Post Offices at Meyrin (63-R-011) or Prévessin (866-R-C02)._\tPlease only use 'PRIORITY' envelopes for mail requiring priority handling. Internal mail_\tPlease do not forget to indicate your correspondent's 'MAILBOX' number on the internal mail envelopes either in the specific box provided (new envelopes) or next to his or her name (old envelopes). This will facilitate and accelerate the handling of your mail. Mailbox numbers can be found on: Macintosh\tin the 'Mailbox' field in 'VIPER'PC\tin the 'Mailbox' field of 'Phone book'Web: http://www.cern.ch/CERN/Phone.htmlin the 'MailBox' fieldonce you have selected your correspondent's name...

  19. Internet-based interventions for cancer-related distress: exploring the experiences of those whose needs are not met.

    Science.gov (United States)

    Gorlick, Amanda; Bantum, Erin O'Carroll; Owen, Jason E

    2014-04-01

    Low levels of engagement in Internet-based interventions are common. Understanding users' experiences with these interventions is a key to improving efficacy. Although qualitative methods are well-suited for this purpose, few qualitative studies have been conducted in this area. In the present study, we assessed experiences with an Internet-based intervention among cancer survivors who made minimal use of the intervention. Semi-structured interviews were conducted with 25 cancer survivors who were minimally engaged (i.e., spent around 1 h total on website) with the online intervention, health-space.net. The intervention was a 12-week, facilitated support group with social and informational components. Interviews were analyzed using an interpretive descriptive design. Three broad categories, consisting of 18 specific themes, were identified from the interviews, which included connecting with similar others, individual expectations, and problems with the site (Κ = 0.88). The 'similar others' category reflected the significance of interacting with relatable survivors (i.e., same cancer type), the 'individual expectations' category reflected the significance of participants' expectations about using online interventions (i.e., personally relevant information), and the 'problems with the site' category reflected the significance of study procedures (i.e., website structure). The data indicate that minimally engaged participants have high variability regarding their needs and preferences for Internet-based interventions. Using qualitative methodologies to identify and incorporate these needs into the next generation of interventions has the potential to increase engagement and outcomes. The current study provides a foundation for future research to characterize survivors' needs and offer suggestions for better meeting these needs. Copyright © 2013 John Wiley & Sons, Ltd.

  20. Uptake and adherence of a self-directed internet-based mental health intervention with tailored e-mail reminders in senior high schools in Norway.

    Science.gov (United States)

    Lillevoll, Kjersti R; Vangberg, Hans Christian B; Griffiths, Kathleen M; Waterloo, Knut; Eisemann, Martin R

    2014-01-21

    Internet-based cognitive behavioural therapy (ICBT) is a promising approach to the prevention and reduction of depressive symptoms among adolescents. This study aimed to evaluate the feasibility and efficacy of disseminating a self-directed internet-based mental health intervention (MoodGYM) in senior high schools. It also sought to investigate possible effects of tailored and weekly e-mail reminders on initial uptake and adherence to the intervention. A baseline survey was conducted in four senior high schools in two Norwegian municipalities (n = 1337). 52.8% (707/1337) of the students consented to further participation in the trial and were randomly allocated to one of three MoodGYM intervention groups (tailored weekly e-mail reminder (n = 175), standardized weekly e-mail reminder (n = 176 ) or no e-mail reminder (n = 175)) or a waitlist control group (n = 180). We tested for effects of the intervention on depression and self-esteem using multivariate analysis of variance, effects of tailored e-mail and self-reported current need of help on initial uptake of the intervention using logistic regression and the effect of weekly e-mails on adherence using ordinal regression. There was substantial non-participation from the intervention, with only 8.5% (45/527) participants logging on to MoodGYM, and few proceeding beyond the first part of the programme. No significant effect on depression or self-esteem was found among the sample as a whole or among participants with elevated depression scores at baseline. Having a higher average grade in senior high school predicted initial uptake of the intervention, but tailored e-mail and self-reported current need of help did not. Weekly e-mail prompts did not predict adherence. The main reasons for non-use reported were lack of time/forgetting about it and doubt about the usefulness of the program. Overall, disseminating a self-directed internet-based intervention to a school population proved difficult despite steps taken to

  1. Private mail

    CERN Multimedia

    GS Unit

    2008-01-01

    The internal mail service deals exclusively with the Organization’s official mail. Non-official mail with no stamp on the envelope will not be sent. Please write systematically your name and Department beneath CERN’s address so that the Mail Office can notify you in case of doubt. Anyone who has recently mailed goods is requested to call 75353 in order to make arrangements to recover them. Mail Office

  2. E-mail: Outlook Express

    Directory of Open Access Journals (Sweden)

    Zainul Bakri

    2012-10-01

    Full Text Available Salah satu layanan Internet yang sangat penting adalah electronic mail atau sering hanya disebut sebagai e-mail. Untuk menggunakan e-mail, diperlukan piranti lunak khusus supaya pengguna dapat mengirim dan menerima e-mail. Jenis piranti lunak e-mail diantaranya adalah Outlook Express yang merupakan satu paket yang didistribusikan bersama Internet Explorer versi 4. Piranti lunak ini dijalankan pada PC yang mempunyai sistem operasi Windows 95 atau 98. Jenis piranti lunak e-mail yang lain adalah Eudora, Pegasus dan sebagainya. Bahkan ada yang diintegrasikan dengan Web Browser (alat untuk menelusuri situs Web misalnya IE,dan Netscape.Sebagai layaknya pelayanan pos, maka setiap pengguna e-mail mempunyai alamat tertentu yang tidak mungkin dipunyai oleh pengguna lainnya diseluruh dunia. Untuk keperluan pendistribusian, maka e-mail mempunyai semacam kantor pos yang ditempatkan dalam sebuah komputer server (mail server atau sering disebut sebagai host. 

  3. Effectiveness, Mediators, and Effect Predictors of Internet Interventions for Chronic Cancer-Related Fatigue : The Design and an Analysis Plan of a 3-Armed Randomized Controlled Trial

    NARCIS (Netherlands)

    Wolvers, Marije Dj; Bruggeman-Everts, Fieke Z; Van der Lee, Marije L; Van de Schoot, Rens; Vollenbroek-Hutten, Miriam Mr

    2015-01-01

    BACKGROUND: Internet interventions offer advantages that especially cancer survivors who suffer from fatigue could benefit from. Given the growing number of such patients, Internet interventions could supplement and strengthen currently available health care. OBJECTIVE: This paper describes the

  4. Phase 1 pilot study of e-mail support for people with long term conditions using the Internet.

    Science.gov (United States)

    Sheaves, Bryony; Jones, Ray B; Williamson, Graham R; Chauhan, Rohan

    2011-04-05

    Use of the Internet for people with Long Term Conditions (LTCs) can have a positive effect on knowledge, social support, behavioural and clinical outcomes, yet there is concern that a 'digital divide' prevents some patients from benefitting. While some patients do not have access to the Internet, others that do may still lack expertise or the confidence to make full use of it. The aim of this pilot study was to develop an intervention and test methods for a definitive randomised controlled trial (RCT) of anonymous personal online email support for patients in this latter group. Recruitment success was evaluated by the number and appropriateness of participants recruited. A personalised e-health support intervention was developed. The provisional primary outcome was the extent to which the Internet affected the participants' confidence in dealing with their LTC. Primary outcome, seven process measures and two secondary outcomes measures were evaluated for completeness of data and sensitivity to detect changes. Thirty nine participants were recruited, 29 after personally receiving a leaflet, seven via email advertising, and three via leaflets left in waiting areas. Most participants (61%) were aged over 60. The majority (21/38) rated themselves as experienced Internet users although only 5/38 had used discussion forums for their LTC. Piloting the intervention identified support needed as: (i) technical help with some websites, (ii) advice about issues such as anonymity, (iii) help in judging information quality, (iv) identification of relevant information (via 'Information Prescriptions'), (v) motivational support to try new sites. Attrition was fairly high: 20/39 completed follow up questionnaires. Three process measures showed ceiling effects and two had too many missing values to be useable. E-health support is a promising way of addressing the problems faced by older generation e-health seekers. Face-to-face leaflet distribution recruited sufficient numbers but

  5. Phase 1 pilot study of e-mail support for people with long term conditions using the Internet

    Directory of Open Access Journals (Sweden)

    Williamson Graham R

    2011-04-01

    Full Text Available Abstract Background Use of the Internet for people with Long Term Conditions (LTCs can have a positive effect on knowledge, social support, behavioural and clinical outcomes, yet there is concern that a 'digital divide' prevents some patients from benefitting. While some patients do not have access to the Internet, others that do may still lack expertise or the confidence to make full use of it. The aim of this pilot study was to develop an intervention and test methods for a definitive randomised controlled trial (RCT of anonymous personal online email support for patients in this latter group. Methods Recruitment success was evaluated by the number and appropriateness of participants recruited. A personalised e-health support intervention was developed. The provisional primary outcome was the extent to which the Internet affected the participants' confidence in dealing with their LTC. Primary outcome, seven process measures and two secondary outcomes measures were evaluated for completeness of data and sensitivity to detect changes. Results Thirty nine participants were recruited, 29 after personally receiving a leaflet, seven via email advertising, and three via leaflets left in waiting areas. Most participants (61% were aged over 60. The majority (21/38 rated themselves as experienced Internet users although only 5/38 had used discussion forums for their LTC. Piloting the intervention identified support needed as: (i technical help with some websites, (ii advice about issues such as anonymity, (iii help in judging information quality, (iv identification of relevant information (via 'Information Prescriptions', (v motivational support to try new sites. Attrition was fairly high: 20/39 completed follow up questionnaires. Three process measures showed ceiling effects and two had too many missing values to be useable. Conclusion E-health support is a promising way of addressing the problems faced by older generation e-health seekers. Face

  6. Representativeness of two sampling procedures for an internet intervention targeting cancer-related distress: a comparison of convenience and registry samples

    OpenAIRE

    Owen, Jason E.; Bantum, Erin O'Carroll; Criswell, Kevin; Bazzo, Julie; Gorlick, Amanda; Stanton, Annette L.

    2013-01-01

    Internet interventions often rely on convenience sampling, yet convenience samples may differ in important ways from systematic recruitment approaches. The purpose of this study was to evaluate potential demographic, medical, and psychosocial differences between Internet-recruited and registry-recruited cancer survivors in an Internet-based intervention. Participants were recruited from a cancer registry (n = 80) and via broad Internet outreach efforts (n = 160). Participants completed a set ...

  7. Mail Office

    CERN Multimedia

    GS Department

    2011-01-01

    On the occasion of the annual closure of CERN, no mail will be distributed on Wednesday, 21 December 2011 but mail will be collected in the morning. Nevertheless, it will be possible for you to bring your outgoing mail to building 555-R-002 until 12:00 noon.

  8. Mail office

    CERN Multimedia

    2012-01-01

    In connection with CERN's annual closure, there will be no mail distributed on Friday 21 December 2012 but mail will be collected in the morning. Nevertheless, it will be possible for you to bring us your mail for it to be delivered until 12:00 noon at building 555-R-002.

  9. Mail Office

    CERN Multimedia

    GS Department

    2009-01-01

    The Mail Office wishes to remind users that the CERN mail service is exclusively reserved for official CERN mail. All external official mail must be sent to the Mail Office in an unstamped envelope on which your name and Department must be clearly indicated below the official CERN address (see example) to help us to find you in the event that it cannot be delivered. If you wish to send private mail from the CERN site you must use the post offices at Meyrin (63-R-011) or Prévessin (866-R-C02). Please use "PRIORITY" envelopes only in the case of urgent mail. Any mail containing merchandise (i.e. anything other than documents) must be sent using an EDH shipping request form. INTERNAL MAIL Please remember to include the recipient’s MAILBOX number on the internal mail envelopes, either in the relevant box (new envelopes) or next to the name (old envelopes). This information, which can be found in the CERN PHONEBOOK, simplifies our t...

  10. Representativeness of two sampling procedures for an internet intervention targeting cancer-related distress: a comparison of convenience and registry samples.

    Science.gov (United States)

    Owen, Jason E; Bantum, Erin O'Carroll; Criswell, Kevin; Bazzo, Julie; Gorlick, Amanda; Stanton, Annette L

    2014-08-01

    Internet interventions often rely on convenience sampling, yet convenience samples may differ in important ways from systematic recruitment approaches. The purpose of this study was to evaluate potential demographic, medical, and psychosocial differences between Internet-recruited and registry-recruited cancer survivors in an Internet-based intervention. Participants were recruited from a cancer registry (n = 80) and via broad Internet outreach efforts (n = 160). Participants completed a set of self-report questionnaires, and both samples were compared to a population-based sample of cancer survivors (n = 5,150). The Internet sample was younger, better educated, more likely to be female, had longer time since diagnosis, and had more advanced stage of disease (p's sample was over-represented by men and those with prostate or other cancer types (p's sample also exhibited lower quality of life and social support and greater mood disturbance (p's convenience and systematic samples differ has important implications for external validity and potential for dissemination of Internet-based interventions.

  11. Mail distribution

    CERN Multimedia

    2007-01-01

    Please note that starting from 1 March 2007, the mail distribution and collection times will be modified for the following buildings: 6, 8, 9, 10, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 29, 69, 40, 70, 101, 102, 109, 118, 152, 153, 154, 155, 166, 167, 169, 171, 174, 261, 354, 358, 576, 579 and 580. Complementary Information on the new times will be posted on the entry doors and left in the mail boxes of each building. TS/FM Group

  12. AstroMail: Electronic mail for the astrophysics community

    Science.gov (United States)

    Scherrer, Phillip H.; Bogart, Richard S.

    1993-01-01

    As part of the NASA Science Internet User Support Services program, NASA Goddard was interested in R&D which could extend the SolarMail system developed by members of the Wilcox Space Observatory at Stanford University to support a larger astrophysics user community. Specific objectives of the R&D effort were to include: a clone of the existing SolarMail system with additional documentation, enabling a parallel mail system to be established by populating the database; a cloned version of SolarMail functioning with a user database similar to that of the High Energy Astrophysics Division (HEAD) of the American Astronomical Society; a report on the status and surveyed usage of SolarMail and its clones into an extendable distributed mail system to serve as the basis for AstroMail, including a draft declaration of policy; a prototype AstroMail system based on the above specifications and including at least SolarMail and one of its clones supporting a set of astronomy user databases as subsets; and a report on the status of the prototype AstroMail with recommendations for future modifications to AstroMail.

  13. Mail Service

    CERN Multimedia

    TS-FM Group

    2004-01-01

    Tuesday 19 October 2004 Please note that the distribution and collection of mail are likely to be disrupted on Tuesday, October 19, 2004, because of traffic and other restrictions enforced on that day in connection with CERN's fiftieth anniversary celebrations. The service may be completely interrupted in certain areas. Group TS-FM, Tel. 77551

  14. Smooth Mailing

    Science.gov (United States)

    Palmer, Tracey

    2010-01-01

    In fundraising today, a wealth of communications tools makes it increasingly easier to contact prospective donors--but is it getting harder to really connect with them? Do the new tools work as well as the old ones? In the second decade of online marketing, all the tools of the trade are subject to scrutiny. Direct mail has been a mainstay of the…

  15. Internet

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Internet. The latest communication revolution surrounds Internet. Some stats*:. 210 billion emails sent daily; 15 billion phone calls everyday; ~40 billion WWW links served everyday. * Source : The Radicati group.

  16. Internet

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    微软想要统治Internet,Windows XP就是这个计划中的一个组成部分。微软已经努力争取提供连接Internet的最方便、最完整的方法。新的操作系统含有Internet Explorer 6(IE6)、新的保密功能以及防火墙保护。Windows XP甚至包含有一个Macromedia Flash播放器插件。但是对Sun微系统公司的打击就是

  17. Non-official mail

    CERN Multimedia

    2006-01-01

    The Mail Office wishes to remind users of the mail service that the latter is reserved exclusively for the Organization's official mail. Private mail, even if stamped, does not fall into this category, and any mail of this nature found in the 'Outgoing Mail' or 'Départ Courrier' boxes will no longer be collected or accepted by the Meyrin or Prévessin Mail Offices. The Mail Office declines all responsibility in the event of losses, delays or any other problems arising as a result of private mail being placed in these boxes. Thank you for your understanding. The Mail Office

  18. Cancer-related anemia

    International Nuclear Information System (INIS)

    Abdel-Rzaeq, Hikmat N.

    2004-01-01

    Anemia is the most common hematological abnormality in cancer patients is often under-recognized and undertreated. The pathogenesis of cancer anemia is complex and most of time multifactorial; involving factors related to the tumor itself or its therapy. While anemia can be present in a wide range of symptoms, involing almost every organ, it is beleived that it contributes much to cancer-related-fatigue, one of the most common symptoms in cancer patients. In addition there is increasing evidence to suggest that anemia is an independent factor adversely affecting tumor reponse and patient survival. While blood transfusion was the only option to treat cancer related anemia, the use of recombinant human erythropoietin (rHuEPO) is becomig the new standard of care, more so with the recent studies demonstrating the feasibility of a sigle weekly injection .Things are even getting better with the recent approval of a new form of rHuEPO; Darbepoetin an analogue with a 3-fold longer half-life. In addition to its effects in raising homoglobin, several well controlled studies demonstrated decrease in transfusion requirementsand better qualify of life assessed objectively using standard assesments scales. (author)

  19. E-mail marketing

    OpenAIRE

    Jurnečková, Jana

    2014-01-01

    The thesis deals with e-mail marketing. It focuses on identifying factors that affect the behavior of users of e-mail and newsletter subscribers. It evaluates the role of e-mail marketing as a part of communication mix of companies and e-shops, current trends, e-mail campaigns, e-mail marketing software provider. To study the behavior of users of e-mail and newsletter subscribers a questionnaire survey was conducted on a sample of 610 respondents and in-depth interviews (n = 30). Content anal...

  20. Federal Mail Expenditures

    Data.gov (United States)

    General Services Administration — Agencies annually report mail data using the Simplified Mail Accountability Reporting Tool (SMART), a web-based reporting tool cosponsored by GSA and the Department...

  1. Mail Delivery | 19 December

    CERN Multimedia

    Mail Office

    2014-01-01

    Due to the annual closure of CERN, no mail will be distributed on Friday, 19 December but mail will still be collected in the morning. Nevertheless, it will be possible for you to bring outgoing mail to building 555-R-002 until 12 noon.

  2. Mail Office annual closure

    CERN Multimedia

    2013-01-01

    On the occasion of the annual closure of CERN, there will be no mail distributed on Friday 20 December 2013 but mail will be collected in the morning. Nevertheless, you will still be able to bring your outgoing mail to Building 555-R-002 until 12 noon.  

  3. PENGIRIMAN E-MAIL SPAM SEBAGAI KEJAHATAN CYBER DI INDONESIA

    Directory of Open Access Journals (Sweden)

    Eka Nugraha Putra

    2018-01-01

    Full Text Available The Internet is part of the development of technology, where the internet provides many impacts, both positive and negative. Currently, privacy issues on the internet have also become a complicated legal issue, this is due to quite a number of privacy-related issues, but not all countries in the world manage privacy issues on the internet. As a means of communicating the Internet has introduced e-mail that provides convenience and practicality. But in its development e-mail has an adverse impact on its users in the form of e-mail spam. In terms of its actions, sending spam e-mail is quite a disadvantage, even violate the privacy. Some countries have also set it to one type of cybercrime (cybercrime. This research will discuss e-mail spam in Indonesia, how the legislation in Indonesia see the action of this spam e-mail, is there any possibility of spam e-mail is criminalized as a cybercrime. The research will also look at how spam e-mails violate privacy and review and analyze internet privacy settings in Indonesia in relation to the criminalization of spam email.

  4. Secure e-mail and Web browsing

    CERN Multimedia

    CERN. Geneva

    2009-01-01

    This is an entry-level 1.5-hour training course aimed to show how to detect and avoid typical security pitfalls encountered when e-mailing and browsing the Web. It is designed for non-technical users of Internet Explorer and Outlook. Register at CTA

  5. E-mail marketing

    OpenAIRE

    TŮMOVÁ, Kateřina

    2012-01-01

    The aim of this work is to specify the e-mail marketing and in the practical application to evaluate the pros and cons of e-mail marketing as a tool of targeted marketing communication.Based on personal interviews with representatives of the company was described their existing e-mail marketing.Through the survey it was found, how customers perceive the company's e-mail marketing.Based on the survey, changes were proposed at the end of the thesis.

  6. UNSOLICITED ELECTRONIC MAIL

    CERN Multimedia

    Judy RICHARDS

    1999-01-01

    Since November 1997 we have been actively trying to reduce the amount of unsolicited electronic mail, commonly known as SPAM mail that arrives in CERN mailboxes. Unfortunately this is not an easy job since the spammers are constantly finding new ways of breaking our defences! Today spammers are 'forging' addresses in the headers and envelopes of mail in such a way that it is difficult to distinguish between legitimate mail and spams. An additional problem, that does not directly affect most CERN users but does use CERN resources and affects the reputation of CERN, is caused by the spammers who try to make mail look as if it comes from a CERN machine.They either try to route the mail via a CERN machine or simply forge the mail headers to a CERN address so it will have less chance of being blocked by the recipient's anti-spam defences.Although some anti-spam measures can be automated, for many someone has to look at the system logs and spam reports from users and make a human judgement as to what should be bloc...

  7. Coding for Electronic Mail

    Science.gov (United States)

    Rice, R. F.; Lee, J. J.

    1986-01-01

    Scheme for coding facsimile messages promises to reduce data transmission requirements to one-tenth current level. Coding scheme paves way for true electronic mail in which handwritten, typed, or printed messages or diagrams sent virtually instantaneously - between buildings or between continents. Scheme, called Universal System for Efficient Electronic Mail (USEEM), uses unsupervised character recognition and adaptive noiseless coding of text. Image quality of resulting delivered messages improved over messages transmitted by conventional coding. Coding scheme compatible with direct-entry electronic mail as well as facsimile reproduction. Text transmitted in this scheme automatically translated to word-processor form.

  8. INTELLIGENT E-MAIL PERSONALIZATION SYSTEM

    Directory of Open Access Journals (Sweden)

    SHANMUGASUNDARAM HARIHARAN

    2011-02-01

    Full Text Available In Internet era E-mail has become the most important mode of communication in every day life. E-mail offers several advantages like secure delivery, speed, cheaper cost, acknowledgement report, transparent service, and distributed environment. As spammers try to induce large amount of spam or unsolicited mails, managing these E-mails’s in an efficient manner requires huge attention. This paper focus on personalizing the E-mail messages after eliminating the spam messages. The basic step starts with pre-processing the documents and classifying the contents into several folders or categories. The next step is to cluster the documents based on the relativeness they have using cosine similarity metric. This clustering approach is carried out using unsupervised method. The mail messages are the parsed through a filter that would identify the spam immediately. Studies on personalization of mails after spam identification, prioritizing the E-mail’s based on the importance and summarization of were also proposed. The results were quiet promising leading to efficient spam identification providing a platform for further improvements to build a domain independent personalizer system.

  9. E-mail security: mail clients must use encrypted protocols

    CERN Multimedia

    2006-01-01

    In the coming weeks, users of mail clients other than Outlook (e.g. Pine, Mozilla, Mac Mail, etc.) may receive an e-mail from Mail-service@cern.ch with instructions to update the security settings of their mail client. The aim of this campaign is to enforce the use of encrypted and authenticated mail protocols in order to prevent the propagation of viruses and protect passwords from theft. As a first step, from 6 June 2006 onwards, access to mail servers from outside CERN will require a securely configured mail client as described in the help page http://cern.ch/mmmservices/Help/?kbid=191040. On this page most users will also find tools that will update their mail client settings automatically. Note that Outlook clients and WebMail access are not affected. The Mail Team

  10. Chemokines in cancer related inflammation

    Energy Technology Data Exchange (ETDEWEB)

    Allavena, Paola; Germano, Giovanni; Marchesi, Federica [Department of Immunology and Inflammation, IRCCS Humanitas Clinical Institute, Via Manzoni 56, 20089, Rozzano, Milan (Italy); Mantovani, Alberto, E-mail: alberto.mantovani@humanitasresearch.it [Department of Immunology and Inflammation, IRCCS Humanitas Clinical Institute, Via Manzoni 56, 20089, Rozzano, Milan (Italy); Department of Translational Medicine, University of Milan (Italy)

    2011-03-10

    Chemokines are key players of the cancer-related inflammation. Chemokine ligands and receptors are downstream of genetic events that cause neoplastic transformation and are abundantly expressed in chronic inflammatory conditions which predispose to cancer. Components of the chemokine system affect multiple pathways of tumor progression including: leukocyte recruitment, neo-angiogenesis, tumor cell proliferation and survival, invasion and metastasis. Evidence in pre-clinical and clinical settings suggests that the chemokine system represents a valuable target for the development of innovative therapeutic strategies.

  11. 76 FR 7114 - International Mail: Mailing Services Price Change

    Science.gov (United States)

    2011-02-09

    ... POSTAL SERVICE 39 CFR Part 20 International Mail: Mailing Services Price Change AGENCY: Postal... States Postal Service, International Mail Manual (IMM[supreg]) for Mailing Services. This price change correlates to the Postal Service's January 13, 2011 filing of Docket No. R2011-2, Notice of Price Adjustment...

  12. The project for virus mails and junk mails

    International Nuclear Information System (INIS)

    Qi Fazhi; Shou Xuejian

    2003-01-01

    Along with the application of network, Email is becoming more and more important for people's communication. But like other net work applications, Email is being infracted by Virus Mails and Junk mails. Sendmail and Procmail are used to deal with Virus Mails and Junk mails in this paper. It is effective to prevent the IHCP (Institute of High Energy Physics Academia Sinica) mail server from attacks now

  13. PENGGUNAAN TEKNOLOGI INTERNET DALAM BISNIS

    OpenAIRE

    Oviliani Yuliana

    2000-01-01

    The uses of internet in business are for information exchange, product catalog, promotion media, electronic mail, bulletin boards, electronic questioner, and mailing list. Internet can also be used for dialog, discussion, and consultation with customer online, therefore consumer can be proactively and interactively involved in designing, developing, marketing, and selling products. There are 2 methods for marketing products via internet, which are push and pull marketing. The advantages of in...

  14. Penggunaan Teknologi Internet Dalam Bisnis

    OpenAIRE

    Yuliana, Oviliani

    2000-01-01

    The uses of internet in business are for information exchange, product catalog, promotion media, electronic mail, bulletin boards, electronic questioner, and mailing list. Internet can also be used for dialog, discussion, and consultation with customer online, therefore consumer can be proactively and interactively involved in designing, developing, marketing, and selling products. There are 2 methods for marketing products via internet, which are push and pull marketing. The advantages of in...

  15. Electronic Computer Originated Mail Service

    Science.gov (United States)

    Seto, Takao

    Electronic mail originated by computer is exactly a new communication media which is a product of combining traditional mailing with electrical communication. Experimental service of this type of mailing started in June 10, 1985 at Ministry of Posts and Telecommunications. Its location in various communication media, its comparison with facsimile type electronic mailing, and status quo of electronic mailing in foreign countries are described. Then, this mailing is briefed centering around the system organization and the services. Additional services to be executed in near future are also mentioned.

  16. 76 FR 4820 - New Mailing Standards for Domestic Mailing Services

    Science.gov (United States)

    2011-01-27

    .... The parcels do not bear a GS1-128 or Intelligent Mail package barcode. b. The parcels weigh less than... pieces in a mailing must be paid with the same method unless otherwise authorized by Business Mailer... pieces only if authorized by Business Mailer Support. 2.2 Affixed Postage for Presorted First-Class Mail...

  17. Social Studies by Electronic Mail.

    Science.gov (United States)

    Barr, Hugh

    1994-01-01

    Asserts that electronic mail provides opportunities to engage students actively in cross-cultural contact with students in other nations. Discusses advantages and problems with using electronic mail in the social studies classroom. Describes electronic mail projects that link students in New Zealand, England, and the United States. (CFR)

  18. Internet user behaviour

    Directory of Open Access Journals (Sweden)

    Radbâță, A.

    2011-01-01

    Full Text Available Internet is a useful tool for everybody in a technologically advanced world. As Internet appears and develops, it creates a totally new network environment. The development of commerce on the Internet based on virtual communities has become one of the most successful business models in the world. After analyzing the concept of internet, the e-commerce market and its marketing mix and the benefits and limitations of the Internet, we have presented a few studies on Internet user behaviour. Furthermore, the paper looks at a representative sample of Romanian internet users. The results reveal that the Romanians are using the Internet especially for information gathering, e-mail, entertainment and social networking.

  19. Technology Corner: Analysing E-mail Headers For Forensic Investigation

    Directory of Open Access Journals (Sweden)

    M. Tariq Banday

    2011-06-01

    Full Text Available Electronic Mail (E-Mail, which is one of the most widely used applications of Internet, has become a global communication infrastructure service.  However, security loopholes in it enable cybercriminals to misuse it by forging its headers or by sending it anonymously for illegitimate purposes, leading to e-mail forgeries. E-mail messages include transit handling envelope and trace information in the form of structured fields which are not stripped after messages are delivered, leaving a detailed record of e-mail transactions.  A detailed header analysis can be used to map the networks traversed by messages, including information on the messaging software and patching policies of clients and gateways, etc. Cyber forensic e-mail analysis is employed to collect credible evidence to bring criminals to justice. This paper projects the need for e-mail forensic investigation and lists various methods and tools used for its realization. A detailed header analysis of a multiple tactic spoofed e-mail message is carried out in this paper. It also discusses various possibilities for detection of spoofed headers and identification of its originator. Further, difficulties that may be faced by investigators during forensic investigation of an e-mail message have been discussed along with their possible solutions.

  20. BEBAN JARINGAN SAAT MENGAKSES EMAIL DARI BEBERAPA MAIL SERVER

    Directory of Open Access Journals (Sweden)

    Husni Thamrin

    2017-01-01

    Full Text Available Expensive internet facilities require prudent in its use both as a source of information and communication media. This paper discusses observations of the perceived burden of network bandwidth when accessing some of the mail server using a webmail application. Mail server in question consists of three commercial server and 2 non-commercial server. Data when it download home page, while logged in, open the email, and during idle logout recorded with sniffer Wireshark. Observations in various situations and scenarios indicate that access Yahoo email gives the network load is very high while the SquirrelMail gives the network load is very low than 5 other mail servers. For an institution, use a local mail server (institutional is highly recommended in the context of banddwidth savings.

  1. 76 FR 50414 - International Mail Manual; Incorporation by Reference

    Science.gov (United States)

    2011-08-15

    ... of providing affordable, universal mail service. It continues to: (1) increase the user's ability to find information; (2) increase the users' confidence that they have found the information they need...] Internet site at http://pe.usps.com . List of Subjects in 39 CFR Part 20 Foreign relations; Incorporation...

  2. Communicative In-Betweens of E-mail Communication

    DEFF Research Database (Denmark)

    Hansen, Ejvind

    2009-01-01

    In this paper I seek to deconstruct internet-based communication. I highlight Derrida’s focus on the margins and in-betweens of communication, and relate it to the genre of e-mail. I argue (i) that the silence between the dialogic turns becomes more marked, while (ii) the separation of present an...

  3. Hesitative introduction of E-mail consultations in general practice.

    NARCIS (Netherlands)

    Verheij, R.; Ton, C.; Tates, K.

    2008-01-01

    Introduction: The Dutch Council for Public Health and Health Care reported in 2005 that 70% of internet users would want to have the opportunity to consult their own general practitioner by e-mail [1]. Since January 1, 2006, general practitioners in the Netherlands are reimbursed 4.50 euro for

  4. A Comparative Analysis of E-Mail and Face-to-Face Communication in an Educational Environment

    Science.gov (United States)

    Lightfoot, Jay M.

    2006-01-01

    Electronic mail (e-mail) is an extremely important medium for Internet-based education. Due to its unique characteristics, there is reason to be concerned that students do not put appropriate care into writing messages that are sent via e-mail. This has significant implications for the effectiveness of online learning environments. This paper…

  5. Disclosure on the Internet

    International Nuclear Information System (INIS)

    Kratz, M.P.J.

    1998-01-01

    The key issues surrounding regulatory enforcement of Internet disclosure in the petroleum industry were discussed under three headings, i.e. (1) content problems, such as intellectual property, trademarks, copyright, licence limitations, accuracy of promotional and other information; (2) disclosure problems, including web site information, employee disclosure, electronic mail, and third party disclosures; and (3) regulatory issues that range from the Internet as the vehicle for stock manipulation, to transnational aspects, lack of editorial oversight, and multi-jurisdictional enforcement issues

  6. Securing E-mail Communication Using Hybrid Cryptosystem on Android-based Mobile Devices

    Directory of Open Access Journals (Sweden)

    Andri Zakariya

    2012-12-01

    Full Text Available One of the most popular internet services is electronic mail (e-mail. By using mobile devices with internet connection, e-mail can be widely used by anyone to exchange information anywhere and anytime whether public or confidential. Unfortunately, there are some security issues with email communication; e-mail is sent in over open networks and e-mail is stored on potentially insecure mail servers. Moreover, e-mail has no integrity protection so the body can be undectected altered in transit or on the e-mail server. E-mail also has no data origin authentication, so people cannot be sure that the emails they receive are from the e-mail address owner. In order to solve this problem, this study proposes a secure method of e-mail communication on Android-based mobile devices using a hybrid cryptosystem which combines symmetric encryption, asymmetric encryption and hash function. The experimental results show that the proposed method succeeded in meeting those aspects of information security including confidentiality, data integrity, authentication, and non-repudiation.

  7. Internet research in an international context.

    Science.gov (United States)

    Baernholdt, Marianne; Clarke, Sean P

    2006-02-01

    Computers and the Internet provide researchers with new options in surveying. When using electronic surveys, several practical and methodological issues need to be considered such as whether the majority of the surveyed population has Internet access and whether an e-mail or a Web-based survey is most appropriate. Other important considerations relate to Internet security issues and, in international research, the possibility of language barriers. Despite these challenges, electronic surveys offer a promising alternative to conventional mail surveys.

  8. World tour through the internet

    International Nuclear Information System (INIS)

    Jang, Ji Hwan; Kang, Ho Seong; Kim, Jong Hun

    1994-03-01

    This book deals with basic knowledge and familiarity with internet use, which is composed of seven chapters ; the world of internet, the basic knowledge for internet use such as telnet, mail, talk, basic command on Unix and command for communication, to access to the internet, if you get on the internet for the first time, useful service of internet such as archie service, gopher service, who is service, Use net, IRC and Netiquette on IRC, interesting internet trip like Billboard charts, TV-Rating, Solar Report, Agricultural Info, CARL, Nat'l Education BBS, internet service in Sydney university FEDIX, CAIR, NOAA, SDDAS, Stock, MUD and international Go server. The last chapter is computer networks connected to the internet ; computer services, BITNET, and FidoNet.

  9. World tour through the internet

    Energy Technology Data Exchange (ETDEWEB)

    Jang, Ji Hwan; Kang, Ho Seong; Kim, Jong Hun

    1994-03-15

    This book deals with basic knowledge and familiarity with internet use, which is composed of seven chapters ; the world of internet, the basic knowledge for internet use such as telnet, mail, talk, basic command on Unix and command for communication, to access to the internet, if you get on the internet for the first time, useful service of internet such as archie service, gopher service, who is service, Use net, IRC and Netiquette on IRC, interesting internet trip like Billboard charts, TV-Rating, Solar Report, Agricultural Info, CARL, Nat'l Education BBS, internet service in Sydney university FEDIX, CAIR, NOAA, SDDAS, Stock, MUD and international Go server. The last chapter is computer networks connected to the internet ; computer services, BITNET, and FidoNet.

  10. 76 FR 16588 - Combined Mailings of Standard Mail and Periodicals Flats

    Science.gov (United States)

    2011-03-24

    ... Standard Mail. These mailings must also be identified as Standard Mail when scheduling dropship... pending permit number), issue date, and advertising percentage. b. A consolidated postage statement...

  11. 76 FR 10757 - Combined Mailings of Standard Mail and Periodicals Flats

    Science.gov (United States)

    2011-02-28

    ... to Standard Mail. These mailings must also be identified as Standard Mail when scheduling dropship... advertising percentage. b. A consolidated postage statement register and postage statement for each...

  12. Open-Rate Controlled Experiment in E-Mail Marketing Campaigns

    OpenAIRE

    Biloš, Antun; Turkalj, Davorin; Kelić, Ivan

    2016-01-01

    Purpose – The main purpose of this paper is to test the controlled experiment (A/B split) methodology in B2C oriented e-mail marketing campaigns. Design/Methodology/Approach – E-mail marketing techniques have been a substantial part of e-marketing methodology since the early Internet days of the mid-1990s. From the very beginning of Internet utilization for business purposes, e-mail was one of the most widely used communication techniques in B2B and B2C markets alike. Due to high volumes o...

  13. An Introduction to Services Accessible on the Internet.

    Science.gov (United States)

    Giguere, Marlene

    1992-01-01

    Provides an overview of the INTERNET and INTERNET services of interest to libraries, including electronic mail, bulletin boards, electronic publishing, online public access catalogs and databases, and downloaded texts and software. (16 references) (MES)

  14. [Establishment of a comprehensive database for laryngeal cancer related genes and the miRNAs].

    Science.gov (United States)

    Li, Mengjiao; E, Qimin; Liu, Jialin; Huang, Tingting; Liang, Chuanyu

    2015-09-01

    By collecting and analyzing the laryngeal cancer related genes and the miRNAs, to build a comprehensive laryngeal cancer-related gene database, which differs from the current biological information database with complex and clumsy structure and focuses on the theme of gene and miRNA, and it could make the research and teaching more convenient and efficient. Based on the B/S architecture, using Apache as a Web server, MySQL as coding language of database design and PHP as coding language of web design, a comprehensive database for laryngeal cancer-related genes was established, providing with the gene tables, protein tables, miRNA tables and clinical information tables of the patients with laryngeal cancer. The established database containsed 207 laryngeal cancer related genes, 243 proteins, 26 miRNAs, and their particular information such as mutations, methylations, diversified expressions, and the empirical references of laryngeal cancer relevant molecules. The database could be accessed and operated via the Internet, by which browsing and retrieval of the information were performed. The database were maintained and updated regularly. The database for laryngeal cancer related genes is resource-integrated and user-friendly, providing a genetic information query tool for the study of laryngeal cancer.

  15. Mail2Print online tutorial

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    Mail2print is a feature which allows you to send documents to a printer by mail. This tutorial (text attached to the event page) explains how to use this service. Content owner: Vincent Nicolas Bippus Presenter: Pedro Augusto de Freitas Batista Tell us what you think via e-learning.support at cern.ch More tutorials in the e-learning collection of the CERN Document Server (CDS) https://cds.cern.ch/collection/E-learning%20modules?ln=en All info about the CERN rapid e-learning project is linked from http://twiki.cern.ch/ELearning  

  16. Security in the internet; Sicherheitsaspekte im Internet

    Energy Technology Data Exchange (ETDEWEB)

    Seibel, R.M.M.; Kocher, K.; Landsberg, P. [Witten-Herdecke Univ., Witten (Germany). Inst. fuer Diagnostische und Interventionelle Radiologie

    2000-04-01

    Aim of the study: Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Conclusions: Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet. (orig.) [German] Ziele der Studie und Analyse: Es sollten die Fragen beantwortet werden, ob es moeglich ist, das Internet als sicheres Uebermittlungsmedium fuer Telemedizin zu nutzen und welche Sicherheitsrisiken bestehen. Dazu wurden die gaengigen Sicherheitsmethoden analysiert. Telemedizin im Internet ist mit Sicherheitsrisiken behaftet, die durch die Oeffnung eines Intranets mit der Moeglichkeit zur unberechtigten Manipulation von aussen bedingt sind. Schlussfolgerung: Diese Sicherheitsrisiken koennen durch eine Firewall weitgehend unterbunden werden. Chipkarten wie die Health professional card ermoeglichen eine hohe Sicherheit bei digitaler Signatur und sicherer Authentifikation der Sender und Empfaenger von Daten im Internet. Auch Standards wie Pretty good privacy sind inzwischen fuer sichere e-mails einfach einzusetzen. Wichtige Voraussetzung fuer die Reduktion von Sicherheitsrisiken ist unter Beruecksichtigung der gesetzlichen Vorgaben die exakte Planung aller Aktivitaeten im Internet, bei denen medizinische Patientendaten versandt werden sollen, in einem Team aus Aerzten und Informatikern. (orig.)

  17. New Snail Mail Scanning Service

    CERN Multimedia

    2012-01-01

    Modernisation does not stop at the CERN postal service (GS/PS). “With more and more digitisation and the prevalence of e-mail throughout the site, we were hoping to provide more timely delivery of letters and make further saving in resources”, said Tueri Datta, head of GS/PS.   Instead of the standard delivery to your P.O. box, the CERN postal service will digitally scan all letters and books up to 100 pages on reception. These scans will subsequently be sent via e-mail to the corresponding recipient as PDF (Portable Data Format - you will need to install “Acrobat Reader” on your PC). Express mail will be handled with priority. Users without a valid CERN mailbox can register at mail.scan.service@cern.ch in order to have their letters read to them via the phone line (we are currently investigating whether we can use the voices of the last five DGs).   This service will start on 1st April 2012 on the Meyrin site and will gradually replace th...

  18. 39 CFR 121.3 - Standard Mail.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Standard Mail. 121.3 Section 121.3 Postal Service UNITED STATES POSTAL SERVICE POST OFFICE SERVICES [DOMESTIC MAIL] SERVICE STANDARDS FOR MARKET-DOMINANT MAIL PRODUCTS § 121.3 Standard Mail. (a) End-to-End. (1) The service standard for Sectional Center...

  19. Electronic Mail for Personal Computers: Development Issues.

    Science.gov (United States)

    Tomer, Christinger

    1994-01-01

    Examines competing, commercially developed electronic mail programs and how these technologies will affect the functionality and quality of electronic mail. How new standards for client-server mail systems are likely to enhance messaging capabilities and the use of electronic mail for information retrieval are considered. (Contains eight…

  20. 76 FR 16460 - Mail Classification Change for Priority Mail Flat Mail

    Science.gov (United States)

    2011-03-23

    ... online model and the retail model. The online model will allow customers to purchase packs from a Web... offer those packs in their stores directly to their customers. The Postal Service includes five... noticing a recently-filed Postal Service request to provide Forever postage on Priority Mail Flat Rate...

  1. Cancer-Related Fatigue in Cancer Survivorship.

    Science.gov (United States)

    Ebede, Chidinma C; Jang, Yongchang; Escalante, Carmen P

    2017-11-01

    Cancer-related fatigue (CRF) significantly interferes with usual functioning because of the distressing sense of physical, emotional, and cognitive exhaustion. Assessment of CRF is important and should be performed during the initial cancer diagnosis, throughout cancer treatment, and after treatment using a fatigue scoring scale (mild-severe). The general approach to CRF management applies to cancer survivors at all fatigue levels and includes education, counseling, and other strategies. Nonpharmacologic interventions include psychosocial interventions, exercise, yoga, physically based therapy, dietary management, and sleep therapy. Pharmacologic interventions include psychostimulants. Antidepressants may also benefit when CRF is accompanied by depression. Copyright © 2017 Elsevier Inc. All rights reserved.

  2. Comparing Two Survey Research Approaches: E-Mail and Web-Based Technology versus Traditional Mail.

    Science.gov (United States)

    Howes, Colleen M.; Mailloux, Mark R.

    2001-01-01

    Contrasted two survey methodologies: e-mail-Web and traditional mail. Found that: (1) e-mail-Web respondents were proportionately more likely to be male and enrolled in school full-time; (2) more individual question non-response was present for the e-mail-Web sample; and (3) e-mail-Web respondents value different aspects of graduate school. (EV)

  3. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  4. Enter your email-address: how German internet users manage their email addresses

    NARCIS (Netherlands)

    Utz, S.

    2004-01-01

    Writing E-mail is the most popular Internet activity. Meanwhile, many people have more than one E-mail address. The question how people manage their E-mail addresses, more specifically, whether they use them deliberately for different purposes, is the central question of this paper. E-mail addresses

  5. Simulating Policy Processes through Electronic Mail.

    Science.gov (United States)

    Flynn, John P.

    1987-01-01

    Focuses on the use of electronic mail for teaching and learning about social welfare policy processes and compares electronic mail as a simulation medium to more structured computer applications. (Author)

  6. PreciseMail anti-spam gateway allows users more control over spam definitions; unwanted email is eliminated with no false positives

    CERN Multimedia

    ten Bruggencate, J

    2003-01-01

    "PreciseMail Anti-Spam Gateway uses a combination of proven heuristic (rules-based) and artificial intelligence technologies that eliminates unwanted spam e-mail at an Internet gateway without filtering critical e-mail messages. Its highly effective filtering engine identifies spam and allows multiple levels of tuning and customization to meet each user's personal e-mail spam filtering requirements" (1 page).

  7. You've got mail! An examination of a statewide direct-mail marketing campaign to promote deceased organ donor registrations.

    Science.gov (United States)

    Quick, Brian L; LaVoie, Nicole R; Morgan, Susan E; Bosch, Dave

    2015-11-01

    This study extends previous direct-mail campaigns by evaluating the effectiveness of a marketing campaign promoting organ donation message strategies from the vantage point of organ donors, organ recipients, individuals on the waiting list, or a combination of these three frames. Illinois residents were randomly assigned to one of four organ donation brochures disseminated via U.S. postal mail. Registrations occurred via the Internet and U.S. postal mail. Individuals register at a greater rate following exposure to the combination framed message compared to organ donor, organ recipient, and waiting list narratives. The campaign revealed that individuals are more likely to register via U.S. postal mail than the Internet. Direct-mail marketing efforts were shown to be an effective approach to promote organ and tissue donation registrations. The results demonstrated a preference for the combination framed brochure. The results are discussed with an emphasis on the practical implications of utilizing direct-mail marketing efforts to promote organ donation among young adults. © 2015 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  8. 34 CFR 300.505 - Electronic mail.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 2 2010-07-01 2010-07-01 false Electronic mail. 300.505 Section 300.505 Education... DISABILITIES Procedural Safeguards Due Process Procedures for Parents and Children § 300.505 Electronic mail. A....508 by an electronic mail communication, if the public agency makes that option available. (Authority...

  9. 75 FR 10529 - Mail Classification Change

    Science.gov (United States)

    2010-03-08

    ... POSTAL REGULATORY COMMISSION [Docket Nos. MC2010-19; Order No. 415] Mail Classification Change...-filed Postal Service request to make a minor modification to the Mail Classification Schedule. The.... concerning a change in classification which reflects a change in terminology from Bulk Mailing Center (BMC...

  10. 77 FR 28259 - Mailings of Lithium Batteries

    Science.gov (United States)

    2012-05-14

    ... POSTAL SERVICE 39 CFR Part 111 Mailings of Lithium Batteries AGENCY: Postal Service TM . ACTION... international mailing of lithium batteries and devices containing lithium batteries. This prohibition also extends to the mailing of lithium batteries to and from an APO, FPO, or DPO location. However, this...

  11. Electronic Mail in the Library: A Perspective.

    Science.gov (United States)

    Whitaker, Becki

    1989-01-01

    Provides an overview of electronic mail in libraries. Topics discussed include general business applications; interlibrary loan; acquisition and claims systems; document delivery; complete text journal databases; reference requests and answers; obstacles to electronic mail usage; telecommunications; cost factors; and the impact of voice mail and…

  12. Electronic Mail and the Writing Instructor.

    Science.gov (United States)

    Hawisher, Gail E.; Moran, Charles

    1993-01-01

    Discusses the growing importance of electronic mail among academicians. Offers a rhetoric and a pedagogy that include electronic mail in their fields of vision. Argues that writing instructors should continue to do research into the issues inherent in electronic mail. (HB)

  13. Using Electronic Mail to Conduct Survey Research.

    Science.gov (United States)

    Thach, Liz

    1995-01-01

    Describes public and private online networks and the characteristics of electronic mail. Reviews the literature on survey research conducted via electronic mail, and examines the issues of design, implementation, and response. A table displays advantages and disadvantages of electronic mail surveys. (AEF)

  14. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire (IRSN), 92 - Fontenay-aux-Roses (France)

    2009-07-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection, and environment shared by sites in France, Europe, big agencies and non-ionizing radiations. (N.C.)

  15. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Societe Francaise de Radioprotection, 75 - Paris (France)

    2008-04-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection,radioecology, nuclear laws. To note three sites treat the accident of radiotherapy arisen to Toulouse. (N.C.)

  16. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    2010-01-15

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  17. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire, IRSN, 92 - Fontenay aux Roses (France)

    2009-10-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear medicine and ionizing radiation, nuclear activity, radiation protection for populations, radioactive waste management in France and Europe. (N.C.)

  18. PERSPEKTIF PSIKOLOGI PEMBELAJARAN TERHADAP PEMANFAATAN INTERNET

    Directory of Open Access Journals (Sweden)

    Syarwan Ahmad

    2011-08-01

    Full Text Available This article explains theories and thought of Psychology of Learning which support the idea of using Information Computer Technology in instructional program. It focuses on the rational of applying ICT and the role of E-mail, mailing list, website and mind-tools to improve learning program. In conclusion, the implementation of ICT, especially Internet, is really relevant to theories and new trend in the field of Psychology of Learning called constructivism. Email, mailing list, website and computer mind-tools improve instructional program. Therefore, ICT especially Internet is necessary to be inserted in all aspects of curriculum.

  19. Security, privacy, and confidentiality issues on the Internet

    OpenAIRE

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standa...

  20. The Internet for Educators: A User's Guide.

    Science.gov (United States)

    Monahan, Brian D.; Dharm, Matthew

    1995-01-01

    Presents a practical guide to use of the Internet. Topics discussed include getting connected; the UNIX operating system; electronic mail; FTP (File Transfer Protocol); Finger; Telnet; Archie; Veronica; Gopher; teacher education; the Yanoff List; and expansion of the Internet. (three references) (LRW)

  1. PENGGUNAAN TEKNOLOGI INTERNET DALAM BISNIS

    Directory of Open Access Journals (Sweden)

    Oviliani Yuliana

    2000-01-01

    Full Text Available The uses of internet in business are for information exchange, product catalog, promotion media, electronic mail, bulletin boards, electronic questioner, and mailing list. Internet can also be used for dialog, discussion, and consultation with customer online, therefore consumer can be proactively and interactively involved in designing, developing, marketing, and selling products. There are 2 methods for marketing products via internet, which are push and pull marketing. The advantages of internet in business strategy are global and interactive communication, information supply; consumer based service; increased cooperation; possibility to open new marketplace, product or services; and integrated the activity on-line. There are 2 applications in electronic commerce, which are business-to-business and business-to-consumer commerce. Electronic commerce payment transaction is arranged by Electronic Funds Transfer system, whereas the data security is governed by Secure Socket Layer, which then be developed to Secure Electronic Transaction. Abstract in Bahasa Indonesia : Internet dalam bisnis digunakan untuk pertukaran informasi, katalog produk, media promosi, surat elektronik, bulletin boards, kuesioner elektronik, dan mailing list. Internet juga bisa digunakan untuk berdialog, berdiskusi, dan konsultasi dengan konsumen secara on-line, sehingga konsumen dapat dilibatkan secara proaktif dan interaktif dalam perancangan, pengembangan, pemasaran, dan penjualan produk. Pemasaran lewat internet ada 2 metode, yaitu push dan pull marketing. Keunggulan strategi bisnis yang dapat diperoleh dari internet adalah komunikasi global dan interaktif; menyediakan informasi dan pelayanan sesuai dengan kebutuhan konsumen; meningkatkan kerja sama; memungkinkan untuk membuka pasar, produk, atau pelayanan baru; serta mengintegrasikan aktivitas secara on-line. Aplikasi Electronic Commerce ada 2, yaitu: Business-to-Consumer dan Business-to-Business Commerce. Pembayaran

  2. On Successful E-Mail Writing

    Directory of Open Access Journals (Sweden)

    Vesna Vulić

    2009-12-01

    Full Text Available This article is intended to be a simplified guide for the efficient use of e-mail in business and private communication in English. E-mailing is frequently used as a substitute for other kinds of communication in today’s working environment, due in particular, to the fact that messages are transmitted instantly, irrespective of the distance of the recipient. Due to the speed and volume of e-mail, mastering the art of effective e-mail writing includes the knowledge of Network Etiquette or ‘Netiquette’ and it is therefore important that whether it be for business or private use, the basics of e-mail etiquette are followed. When writing an e-mail it is important to consider the recipient. Careful consideration will determine the content and style of the e-mail. No less important is knowing the points of detail in writing e-mail. That is, to be clear and concise in the specific information that the e-mail should contain. Furthermore, abbreviations, acronyms and emoticons are frequently found in e-mail and their use should also be considered. An e-mail is a valuable communication tool and it is essential to use it effectively in order to improve both professional and private communication.

  3. Security in the internet

    International Nuclear Information System (INIS)

    Seibel, R.M.M.; Kocher, K.; Landsberg, P.

    2000-01-01

    Aim of the study: Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Conclusions: Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet. (orig.) [de

  4. Assessing e-mail intent and tasks in e-mail messages

    NARCIS (Netherlands)

    Sappelli, M.; Pasi, G.; Verberne, S.; Boer, M. de; Kraaij, W.

    2016-01-01

    In this paper, we analyze corporate e-mail messages as a medium to convey work tasks. Research indicates that categorization of e-mail could alleviate the common problem of information overload. Although e-mail clients provide possibilities of e-mail categorization, not many users spend effort on

  5. Urological cancer related to familial syndromes

    Directory of Open Access Journals (Sweden)

    Walter Henriques da Costa

    Full Text Available ABSTRACT Cancer related to hereditary syndromes corresponds to approximately 5-10% of all tumors. Among those from the genitourinary system, many tumors had been identified to be related to genetic syndromes in the last years with the advent of new molecular genetic tests. New entities were described or better characterized, especially in kidney cancer such as hereditary leiomyomatosis renal cell carcinoma (HLRCC, succinate dehydrogenase kidney cancer (SDH-RCC, and more recently BAP1 germline mutation related RCC. Among tumors from the bladder or renal pelvis, some studies had reinforced the role of germline mutations in mismatch repair (MMR genes, especially in young patients. In prostate adenocarcinoma, besides mutations in BRCA1 and BRCA2 genes that are known to increase the incidence of high-risk cancer in young patients, new studies have shown mutation in other gene such as HOXB13 and also polymorphisms in MYC, MSMB, KLK2 and KLK3 that can be related to hereditary prostate cancer. Finally, tumors from testis that showed an increased in 8 - 10-fold in siblings and 4 - 6-fold in sons of germ cell tumors (TGCT patients, have been related to alteration in X chromosome. Also genome wide association studies GWAS pointed new genes that can also be related to increase of this susceptibility.

  6. Mailing lists are preferred to newsgroups as teaching tools for undergraduate biology classes.

    Science.gov (United States)

    Machart, J M; Silverthorn, D U

    2000-06-01

    Effective communication between instructors and students is a challenge regardless of the instructor-to-student ratio. Instructors of large classes, in particular, have resorted to various forms of Internet communication, such as mailing lists and newsgroups, to supplement class time and office hours. Mailing lists are closed discussions among subscribers who receive and send messages via an electronic mail program (e.g., Eudora). Newsgroups are public discussions to which anyone can gain access and respond via a newsreader program (e.g., Nuntius). Newsgroup messages are posted to a bulletin board that the subscriber must visit to read. Mailing lists and newsgroups share many advantages (convenience, greater anonymity, and speed of communication) and disadvantages (computer access required, impersonal nature, junk mail, and lack of graphics in older programs). However, surveys of both faculty and students in biology indicate that mailing lists are generally favored over newsgroups. Reasons given for mailing list popularity included greater familiarity with the E-mail format and ease of access.

  7. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [IRSN, 92 - Fontenay-aux-Roses (France)

    2010-04-15

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection in nuclear medicine, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  8. Visuelle Analyse von E-mail-Verkehr

    OpenAIRE

    Mansmann, Florian

    2003-01-01

    Diese Arbeit beschreibt Methoden zur visuellen geographischen Analyse von E-mail Verkehr.Aus dem Header einer E-mail können Hostadressen und IP-Adressen herausgefiltert werden. Anhand einer Datenbank werden diesen Host- und IP-Adressen geographische Koordinaten zugeordnet.Durch eine Visualisierung werden in übersichtlicher Art und Weise mehrere tausend E-mail Routen dargestellt. Zusätzlich dazu wurden interktive Manipulationsmöglichkeiten vorgestellt, welche eine visuelle Exploration der Date...

  9. Application for automatic e-mail forwarding

    OpenAIRE

    Skupek, Rok

    2010-01-01

    The diploma thesis has two main goals: the first objective is to develop a dynamic library, which will contain methods able to download e-mail messages from mail server using POP3 protocol. The second objective involves development of application for processing and distribution of e-mail messages. Introduction cointains presentation of a practical application example in real time situation. Here are described procedures used for development of server - client communication library, which u...

  10. E-mail Communities--A Story of Collaboration between Students in Australia and Indonesia.

    Science.gov (United States)

    Lelong, Peter; Fearnley-Sander, Mary

    1999-01-01

    Describes two projects: the first linked teacher-education students in Australia and Indonesia through e-mail and then grew into a link between primary students; the second project was a prize-winning publication by the primary students on the Internet. Gives a list of different materials and guidelines for teachers. (CMK)

  11. Transparent Proxy for Secure E-Mail

    Science.gov (United States)

    Michalák, Juraj; Hudec, Ladislav

    2010-05-01

    The paper deals with the security of e-mail messages and e-mail server implementation by means of a transparent SMTP proxy. The security features include encryption and signing of transported messages. The goal is to design and implement a software proxy for secure e-mail including its monitoring, administration, encryption and signing keys administration. In particular, we focus on automatic public key on-the-fly encryption and signing of e-mail messages according to S/MIME standard by means of an embedded computer system whose function can be briefly described as a brouter with transparent SMTP proxy.

  12. Take control of Apple Mail in Leopard

    CERN Document Server

    Kissell, Joe

    2009-01-01

    Go under the hood with new (and old) features in Apple Mail in Leopard! Are you using Apple Mail in Leopard effectively? In this book, completely updated from its previous Panther and Tiger editions, author Joe Kissell provides comprehensive guidance, with a focus on new and updated features. You'll learn how to use and customize the Mail window, control the size and styling of incoming messages, and make rules to move messages into different mailboxes automatically. The book covers outgoing mail, showing you smart ways to address messages, send attachments, and send HTML-based messages. Bu

  13. On Successful E-Mail Writing

    OpenAIRE

    Vesna Vulić

    2009-01-01

    This article is intended to be a simplified guide for the efficient use of e-mail in business and private communication in English. E-mailing is frequently used as a substitute for other kinds of communication in today’s working environment, due in particular, to the fact that messages are transmitted instantly, irrespective of the distance of the recipient. Due to the speed and volume of e-mail, mastering the art of effective e-mail writing includes the knowledge of Network Etiquette o...

  14. Playing with the internet through world wide web

    International Nuclear Information System (INIS)

    Kim, Seon Tae; Jang, Jin Seok

    1995-07-01

    This book describes how to use the internet with world wide web. It is divided into six chapters, which are Let's go to the internet ocean, the internet in information superhighway are, connecting the world with a telephone wire such as link with the internet cable and telephone modem, internet service providers, text mode connection, Domain and IP address, the principle and use of world wide web ; business, music, fashion, movie and photo, internet news and e-mail, making internet map with web language, and from installation to application of base program such as TCP/IP, SLIP/PPP 3270 Emulator, Finger and NCSA Mosaic.

  15. Development of a Mailing List on Variable Stars, VSNET

    Science.gov (United States)

    Nogami, D.; Kato, T.; Baba, H.; Kunjaya, C.

    Various usages of the Internet have been developed and made remarkable progress these years, which is now dramatically changing the style of astronomical study. Among those, the maing list is thought to be most useful to study of unpredictable objects for the characteristics, especially rapidness and equality. We started a mailing list (VSNET) on variable stars, mainly on cataclysmic variables and supernovae, in 1994 July for mutual exchange of information and ideas between astronomers including professionals and amateurs. Up to now, the various articles have been distributed, for example, calls for follow up observations of transient objects discovered in the UV or X-ray region, calls for ground-based observations simultaneous with ones by the space telescopes, discoveries of supernovae, alert notices of outbursts in long dormant dwarf novae (EG Cnc, AL Com, UZ Boo, HT Cas, etc), and so on. You can get long-term light curves of variable stars drawn using VSNET data on the VSNET web pages http://www.kusastro.kyoto-u.ac.jp/vsnet/. The archives of VSNET mails are available via VSNET web pages and anonymous ftp ftp://ftp.kusastro.kyoto-u.ac.jp/pub/vsnet/Mail/. If you have any questions and suggestions on VSNET, please feel free to contact us (vsnet-adm@kusastro.kyoto-u.ac.jp).

  16. Management and Archiving e-mail Messages in Governmental Organization

    OpenAIRE

    Ashraf Mohamed A.Mohsen

    2006-01-01

    The study deals great issue of digital preservation that is e-mail archiving, it covered all aspects of the topic; it discuss: e-mail system, components of e-mail message, advantages and disadvantages of e-mail, official e-mail messages, management of e-mail messages, organizing and arrangement of e-mail messages, keeping and deleting messages, archiving e-mail messages, and some related issues like: privacy and security.

  17. 77 FR 70849 - International Mail Contract

    Science.gov (United States)

    2012-11-27

    ... POSTAL REGULATORY COMMISSION [Docket No. R2013-2; Order No.1550] International Mail Contract... Service filing concerning a Type 2 rate adjustment in conjunction with a mail contract with China Post... Equivalent Agreement, November 15, 2012 (Notice). Contract history and scope. The Agreement is a successor to...

  18. 14 CFR 1212.603 - Mailing lists.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Mailing lists. 1212.603 Section 1212.603 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION PRIVACY ACT-NASA REGULATIONS Instructions for NASA Employees § 1212.603 Mailing lists. NASA will not sell, rent, or otherwise disclose an...

  19. 39 CFR 233.3 - Mail covers.

    Science.gov (United States)

    2010-07-01

    .... For purpose of these regulations, the following terms are hereby defined. (1) Mail cover is the... criminal law. (3) When time is of the essence, the Chief Postal Inspector, or designee, may act upon an... furnish information as defined in § 233.3(c)(1) to any person, except as authorized by a mail cover order...

  20. 77 FR 71643 - Standard Mail Pricing

    Science.gov (United States)

    2012-12-03

    ... POSTAL REGULATORY COMMISSION [Docket No. R2013-1; Order No.1556] Standard Mail Pricing AGENCY: Postal Regulatory Commission. ACTION: Notice. SUMMARY: The Commission is noticing a recent Postal Service filing concerning Standard Mail pricing and related matters. This notice informs the public of the filing...

  1. Building mail server on distributed computing system

    International Nuclear Information System (INIS)

    Akihiro Shibata; Osamu Hamada; Tomoko Oshikubo; Takashi Sasaki

    2001-01-01

    The electronic mail has become the indispensable function in daily job, and the server stability and performance are required. Using DCE and DFS we have built the distributed electronic mail sever, that is, servers such as SMTP, IMAP are distributed symmetrically, and provides the seamless access

  2. Did You Get My E-Mail? Moving E-Mails beyond the Inbox

    Science.gov (United States)

    Ellis, Susan J.

    2011-01-01

    The challenge today is how to make e-mail and other forms of electronic communication effective in motivating volunteer action. Is it possible to make e-mails feel personal and welcoming? E-mail, instant messaging, texting, and social media are tools that allow individuals to communicate quickly and inexpensively, but they are lifeless without the…

  3. Internet Factories

    NARCIS (Netherlands)

    Strijkers, R.J.

    2014-01-01

    This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet

  4. Internet factories

    NARCIS (Netherlands)

    Strijkers, R.J.

    2014-01-01

    This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet

  5. Internet Economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1998-01-01

    Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing.......Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing....

  6. Internet economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1997-01-01

    A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect.......A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect....

  7. Composite magnetic nanoparticles: Synthesis and cancer-related applications

    International Nuclear Information System (INIS)

    Cai Ping; Chen Hong-Min; Xie Jin

    2014-01-01

    Recent advances in the preparation and applications of composite magnetic nanoparticles are reviewed and summarized, with a focus on cancer-related applications. (topical review - magnetism, magnetic materials, and interdisciplinary research)

  8. Internet marketing

    OpenAIRE

    Zelený, Martin

    2009-01-01

    In the bachelor thesis are introduced theoretical concepts of the Internet and marketing, accented the need of marketing mix along with its specifics of the internet environment. Next is interpreted which tools can be used for marketing of firms and which marketing instruments are to be deployed. Final chapter illustrates socio-demographics of Czech internet users along with media market allocation from the perspective of all media as well as in the segment of the Internet.

  9. Satisfaction with Service for Internet Medicare Replacement Cards

    Data.gov (United States)

    Social Security Administration — This dataset contains results of Internet Report Card iRequest Survey conducted by mail between April and June 2014 using a brief scannable “report card” style...

  10. Statin use and reduced cancer-related mortality

    DEFF Research Database (Denmark)

    Nielsen, Sune F; Nordestgaard, Børge G; Bojesen, Stig E

    2012-01-01

    A reduction in the availability of cholesterol may limit the cellular proliferation required for cancer growth and metastasis. We tested the hypothesis that statin use begun before a cancer diagnosis is associated with reduced cancer-related mortality.......A reduction in the availability of cholesterol may limit the cellular proliferation required for cancer growth and metastasis. We tested the hypothesis that statin use begun before a cancer diagnosis is associated with reduced cancer-related mortality....

  11. Discussion groups on the Internet: journaling.

    Science.gov (United States)

    Till, J E

    1995-09-01

    Interactive communication on the Internet, as illustrated by the e-mail-based breast cancer discussion group, provides an alternative to the telephone, the fax machine and regular mail, and is a resource for communications research, the potential of which is only beginning to be appreciated. At least some of the messages posted to such discussion groups could be regarded as a form of "journaling". Such messages are eminently suitable for qualitative data analysis.

  12. Internet accounting

    NARCIS (Netherlands)

    Pras, Aiko; van Beijnum, Bernhard J.F.; Sprenkels, Ron; Parhonyi, R.

    2001-01-01

    This article provides an introduction to Internet accounting and discusses the status of related work within the IETF and IRTF, as well as certain research projects. Internet accounting is different from accounting in POTS. To understand Internet accounting, it is important to answer questions like

  13. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  14. Cancer-related fatigue: Mechanisms, risk factors, and treatments

    Science.gov (United States)

    Bower, Julienne E.

    2015-01-01

    Fatigue is one of the most common and distressing side effects of cancer and its treatment, and may persist for years after treatment completion in otherwise healthy survivors. Cancer-related fatigue causes disruption in all aspects of quality of life and may be a risk factor for reduced survival. The prevalence and course of fatigue in cancer patients has been well characterized, and there is growing understanding of underlying biological mechanisms. Inflammation has emerged as a key biological pathway for cancer-related fatigue, with studies documenting links between markers of inflammation and fatigue before, during, and particularly after treatment. There is considerable variability in the experience of cancer-related fatigue that is not explained by disease- or treatment-related characteristics, suggesting that host factors may play an important role in the development and persistence of this symptom. Indeed, longitudinal studies have begun to identify genetic, biological, psychosocial, and behavioral risk factors for cancer-related fatigue. Given the multi-factorial nature of cancer-related fatigue, a variety of intervention approaches have been examined in randomized controlled trials, including physical activity, psychosocial, mind-body, and pharmacological treatments. Although there is currently no gold standard for treating fatigue, several of these approaches have shown beneficial effects and can be recommended to patients. This report provides a state of the science review of mechanisms, risk factors, and interventions for cancer-related fatigue, with a focus on recent longitudinal studies and randomized trials that have targeted fatigued patients. PMID:25113839

  15. The Uses of E-mail as a Medium on the Contante Justitie Proceedings on the Courts in Indonesia

    Directory of Open Access Journals (Sweden)

    Yasser S. Wahab

    2015-10-01

    Full Text Available This research aims to know how the contante justitie principle may be applied into the enforced legislation in Indonesia, and to investigate the synergy of proceedings by means of e-mail in realizing contante justitie. The research employed in this paper is normative research, using both primary and secondary legal sources. Primary sources obtained from compiling relevant rules on the research concerned, in addition to secondary sources taken from books, court decisions, newspapers, internet materials and others relevant with the issue; that is to oversee the contradictions of humanist and mechanical processes when utilizing the internet e-mail for the court proceedings. The use of internet media e-mail in the correspondence process is expected to cut down the time, cost and potential instability. Thus strongly supports the realization of the principle of contante justitie in court proceedings more effectively and efficiently.

  16. Self-rated health assessed by web versus mail modes in a mixed mode survey: the digital divide effect and the genuine survey mode effect.

    Science.gov (United States)

    Shim, Jae-Mahn; Shin, Eunjung; Johnson, Timothy P

    2013-09-01

    To investigate differences in self-rated health (SRH) between web and mail questionnaires in a mixed mode survey and to provide a model that explains those differences. A total of 15,200 mail respondents and 17,829 web respondents from the 2008 US National Health Survey conducted by the Gallup Panel. Respondents were recruited using random digit dialing and assigned to one of the two survey modes (web or mail). Respondents with household Internet connection and frequent Internet usage were invited to complete the survey through the web mode. Respondents who had no Internet connection or who used the Internet infrequently were invited to the mail mode. Thus, respondents with better Internet access used the web mode. Respondents completed a questionnaire that asked about SRH status, objective health conditions, health behaviors, and other socioeconomic variables. Statistical associations were analyzed with ordered Logit and negative binomial models. Web respondents reported better SRH than mail respondents. This difference is in part reflective of variability in objective health status between these two groups, and in part attributable to the effects of survey mode. These results maintained with age controlled. The alignment between survey mode selection, Internet access, and health disparities, as well as genuine survey mode characteristics, leads to web-mail differences in SRH. Unless the digital divide and its influences on survey mode selection are resolved and differential genuine mode effects are fully comprehended, we recommend that both modes be simultaneously used on a complementary basis.

  17. Internet, la xarxa de xarxes

    OpenAIRE

    Climent Serrano, Salvador

    1989-01-01

    Història d'Internet on es realitza una descripció de la transmissió de les dades per TCP / IP i s'explica el nombre IP. S'estudien els serveis d'Internet com, Correu electrònic (e-mail), Transferència de fitxers (ftp), World wide wed (la teranyina mundial), Navegadors, URL (Uniform Resource Locator), 4.5 Notícies (news), Xats (IRC ), Webphone, Archie, Gopher, Wais, Comerç electrònic els seus components.

  18. No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large

    OpenAIRE

    Mayer, Wilfried; Zauner, Aaron; Schmiedecker, Martin; Huber, Markus

    2015-01-01

    TLS is the most widely used cryptographic protocol on the Internet. While many recent studies focused on its use in HTTPS, none so far analyzed TLS usage in e-mail related protocols, which often carry highly sensitive information. Since end-to-end encryption mechanisms like PGP are seldomly used, today confidentiality in the e-mail ecosystem is mainly based on the encryption of the transport layer. A well-positioned attacker may be able to intercept plaintext passively and at global scale. In...

  19. Posttraumatic Stress and Attentional Bias towards Cancer-Related Stimuli in Parents of Children Recently Diagnosed with Cancer.

    Directory of Open Access Journals (Sweden)

    Martin Cernvall

    Full Text Available To investigate whether posttraumatic stress symptoms (PTSS are related to attentional bias towards cancer-related stimuli among parents of children recently diagnosed with cancer.Sixty-two parents completed questionnaires measuring PTSS, depression, and anxiety and the emotional Stroop task via the Internet. The emotional Stroop task included cancer-related words, cardiovascular disease-related words, and neutral words.Participants were split in two groups based on the median of PTSS: High-PTSS and Low-PTSS. There was a significant interaction between word-type and group and a planned contrast test of this interaction indicated that the High-PTSS group had longer response latencies on cancer-related words compared to the other word-type and group combinations.Findings suggest that PTSS are related to attentional bias towards cancer-related stimuli among parents of children recently diagnosed with cancer. Implications of this finding for the understanding of PTSS in this population, future research, and clinical practice are discussed.

  20. Oncology information on the Internet.

    Science.gov (United States)

    Goto, Yasushi; Nagase, Takahide

    2012-05-01

    Owing to new developments in Internet technologies, the amount of available oncology information is growing. Both patients and caregivers are increasingly using the Internet to obtain medical information. However, while it is easy to provide information, ensuring its quality is always a concern. Thus, many instruments for evaluating the quality of health information have been created, each with its own advantages and disadvantages. The increasing importance of online search engines such as Google warrants the examination of the correlation between their rankings and medical quality. The Internet also mediates the exchange of information from one individual to another. Mailing lists of advocate groups and social networking sites help spread information to patients and caregivers. While text messages are still the main medium of communication, audio and video messages are also increasing rapidly, accelerating the communication on the Internet. Future health information developments on the Internet include merging patients' personal information on the Internet with their traditional health records and facilitating the interaction among patients, caregivers and health-care providers. Through these developments, the Internet is expected to strengthen the mutually beneficial relationships among all stakeholders in the field of medicine.

  1. Internet piracy

    OpenAIRE

    Fiala, Jiří

    2012-01-01

    The main objective of this thesis is to describe the Internet piracy phenomenon and to define responsibility of individuals for copyright violations on the Internet from the view of valid Czech legislation. In order to prevent Internet piracy, countries are pushed to swiftly react on continuous development of new technologies used by pirates - these efforts of individual countries are described in several chapters of this thesis that are exploring the most significant court rulings. These rul...

  2. Troubleshooting Requests e-mail Confirmation

    CERN Multimedia

    TS Department

    2004-01-01

    In an ongoing effort to improve quality of the repair requests, a new e-mail confirmation automatic system will be implemented starting from the 21st October. All repair requests transmitted to the TCR (72201) or the FM Helpdesk (77777) will be confirmed in an e-mail to the requestor, provided that the latter has a valid e-mail address in the HR database. The e-mail will contain a reference number, a brief description of the problem, the location and a contact where more information can be obtained. A second e-mail will be sent when the processing of the repair request is finished. We hope that this initiative will improve the transparency and quality of our service. Helpdesk Troubleshooting Requests (reminder) We remind you that all the repair requests and other communication concerning the CERN machine buildings have to be transmitted to the TCR via 72201, whereas the ones concerning tertiary buildings are handled directly by the FM helpdesk under the phone number 77777, i.e. problems on systems and equ...

  3. E-mail to SMS service change

    CERN Multimedia

    IT Department

    2010-01-01

    If you have a CERN e-mail account, you have probably already used one of the popular services that CERN’s IT Department offers to CERN users: the mail2SMS service. It allows any CERN e-mail account holder to send short messages (SMS) free of charge to CERN GSM phone numbers. Further to recent negotiations with our GSM operator, this service has been extended. It is now possible to send short messages free of charge to any Swiss mobile number. This extension of service aims at replacing the similar service that was made available by SWITCH(1) to CERN users (address: mobilenumber@sms.switch.ch). Because of repeated abuse, this service will be definitively stopped for CERN users on 15th January 2010. Please keep in mind that CERN’s e-mail to SMS service still has some restrictions: messages can only be sent from CERN mail accounts, and not from personal ones, such as GMAIL, MSN, Yahoo; the maximum length of the message is 160 characters (standard maximum SMS length); and only Swiss mobile...

  4. The use of electronic mail in biomedical communication.

    Science.gov (United States)

    Costello, R; Shaw, A; Cheetham, R; Moots, R J

    2000-01-01

    To determine whether there are statistically significant differences in the content of electronic mail (e-mail) and conventional mail sent to authors of papers published in medical journals. Prospective study by postal questionnaire. Over two one-month periods, corresponding authors of papers published in medical journals were asked to record details of the correspondence prompted by their publications. Conventional and e-mail correspondence received. Reprint requests. Content of correspondence. Quality of correspondence. Eighty-two of 96 authors replied. Fifty received e-mail (mean, 5.7+/-8.8 e-mails per author) and 72 received conventional mail (15.5+/-32.8 letters per author) (p mails and only 53% of correspondence sent by conventional mail (p electronic mail. However, the content of e-mail may be of greater scientific relevance. Electronic mail can be encouraged without fear of diminishing the quality of the communications received.

  5. The Use of Electronic Mail in Biomedical Communication

    OpenAIRE

    Costello, Richard; Shaw, Anthony; Cheetham, Roz; Moots, Robert J.

    2000-01-01

    Objectives: To determine whether there are statistically significant differences in the content of electronic mail (e-mail) and conventional mail sent to authors of papers published in medical journals.

  6. [Internet addiction].

    Science.gov (United States)

    Korkeila, Jyrki

    2012-01-01

    Internet addiction is defined as uncontrolled and harmful use of Internet, which manifests in three forms: gaming, various sexual activities and excessive use of emails, chats or SMS messaging. Several studies have found that abuse of alcohol and other substances, depression and other health problems are associated with Internet addiction. In boys and men depression may be more a consequence of the addiction than a cause for it. ADHD seems to be a significant background factor for developing the condition. Because it is almost impossible to lead a life without Internet and computers nowadays, it is unrealistic to aim towards full abstinence. Treatment has generally followed the guidelines adapted for pathological gambling.

  7. Internet Policy

    Science.gov (United States)

    Lehr, William H.; Pupillo, Lorenzo Maria

    The Internet is now widely regarded as essential infrastructure for our global economy and society. It is in our homes and businesses. We use it to communicate and socialize, for research, and as a platform for E-commerce. In the late 1990s, much was predicted about what the Internet has become at present; but now, we have actual experience living with the Internet as a critical component of our everyday lives. Although the Internet has already had profound effects, there is much we have yet to realize. The present volume represents a third installment in a collaborative effort to highlight the all-encompassing, multidisciplinary implications of the Internet for public policy. The first installment was conceived in 1998, when we initiated plans to organize an international conference among academic, industry, and government officials to discuss the growing policy agenda posed by the Internet. The conference was hosted by the European Commission in Brussels in 1999 and brought together a diverse mix of perspectives on what the pressing policy issues would be confronting the Internet. All of the concerns identified remain with us today, including how to address the Digital Divide, how to modify intellectual property laws to accommodate the new realities of the Internet, what to do about Internet governance and name-space management, and how to evolve broadcast and telecommunications regulatory frameworks for a converged world.

  8. Effectiveness and Limitations of E-Mail Security Protocols

    OpenAIRE

    M. Tariq Banday

    2011-01-01

    Simple Mail Transport Protocol is the most widely adopted protocol for e-mail delivery. However, it lackssecurity features for privacy, authentication of sending party, integrity of e-mail message, nonrepudiationand consistency of e-mail envelope. To make e-mail communication secure and private,e-mail servers incorporate one or more security features using add-on security protocols. The add-onsecurity protocols provide a reasonable security but have several limitations. This paper discussesli...

  9. Internet use and attitudes towards illicit internet use behavior in a sample of Russian college students.

    Science.gov (United States)

    Palesh, Oxana; Saltzman, Kasey; Koopman, Cheryl

    2004-10-01

    This study assessed Internet use and attitudes toward illicit use of the Internet in a sample of Russian college students. A sample comprised of 198 students was recruited from a university in Moscow. Each participant completed a survey assessing demographic characteristics, Internet use, and attitudes towards engaging in illicit behaviors over the Internet. About half of the students reported that they used the Internet at least several times a year, with 8% reporting daily use of the Internet. Among Internet users, most reported having Internet access either at home or at a friends' home, and 16 % reported having Internet access from work, school, or a computer center. Among Internet users, the main purpose was for school-related activities (60%), followed by e-mail (55%), entertainment (50%), chatting (24%), and searching for pornography (6%). Although most students thought it was inappropriate to read someone else's e-mail, use someone else's password or credit card information without their permission, or break into someone's computer, many students did endorse those illicit behaviors. Over a fifth of the students reported that they knew hackers. Forty three percent of students agreed that people make too much fuss about watching videos, movies or downloading music on the Internet without paying. Males were more likely than females to report using the Internet for entertainment purposes (p = 0.006) and were more likely to agree that it was okay to break into someone's computer (p = 0.04). The results of this study suggest that these Russian college students predominately use the Internet to help with their schoolwork, to communicate with others, and for entertainment. These results also suggest that interventions may be useful to change attitudes endorsing illicit uses of the Internet.

  10. Can Weighting Compensate for Sampling Issues in Internet Surveys?

    NARCIS (Netherlands)

    Vaske, J.J.; Jacobs, M.H.; Sijtsma, M.T.J.; Beaman, J.

    2011-01-01

    While Internet surveys have increased in popularity, results may not be representative of target populations. Weighting is commonly used to compensate for sampling issues. This article compared two surveys conducted in the Netherlands—a random mail survey (n = 353) and a convenience Internet survey

  11. Internet Acceptable User Policies in Alabama School Systems.

    Science.gov (United States)

    Sun, Feng; McLean, James E.

    The purpose of this study was to determine the current status of and need for acceptable use policies (AUPs) for students' use of the Internet in Alabama school systems. Alabama superintendents were questioned using an electronic survey that could be returned via e-mail on an anonymous Internet site. Primary questions were: (1) What is your level…

  12. The Internet: A Bridge between Research and Practice.

    Science.gov (United States)

    Kuster, Judith Maginnis; Poburka, Bruce J.

    1998-01-01

    Examines Internet capabilities such as World Wide Web home pages, electronic journals, on-line bibliographies, mailing lists, and chat rooms in building bridges between research and practice in speech-language pathology. Numerous examples are provided. Cautions in using Internet resources are also noted. (Author/DB)

  13. Augmenting Instruction in Business Communication Courses with the Internet.

    Science.gov (United States)

    Cohen, Lance

    1994-01-01

    Outlines ways in which instructors of business communication can use the Internet more effectively while teaching. Argues that by augmenting business communication courses with e-mail and Internet protocols, instructors can reach larger segments of their classes, stimulate discussions, create simulations, and strengthen their relationships with…

  14. Internet: The Marketing Challenge of the Twentieth Century.

    Science.gov (United States)

    Herbig, Paul; Hale, Brian

    1997-01-01

    Previously thought to be above commercial activity, the Internet is proving to be an outstanding marketing tool. This article examines linkage via World Wide Web, electronic mail, and news groups; argues that a home page is vital for the success of any business today; and tries to assess the impact of the Internet on the discipline of marketing.…

  15. Take control of spam with Apple Mail

    CERN Document Server

    Kissell, Joe

    2009-01-01

    Questions answered in this book include: How does Mail's Junk Mail filtering really work?How does the spam filter use my Previous Recipients list?How could a spammer's email addresses get on my Previous Recipients list?What can I do to not get so much spam in the first place?What's the deal with email that pretends to come from my bank?What features should I look for in a spam-fighting utility or service?Should I try server-based filtering?

  16. Internet usage among women with breast cancer: an exploratory study.

    Science.gov (United States)

    Pereira, J L; Koski, S; Hanson, J; Bruera, E D; Mackey, J R

    2000-07-01

    An increasing number of breast cancer patients are accessing the Internet for medical information. A survey was administered to breast cancer patients and their families attending follow-up outpatient clinics in a comprehensive cancer care center to explore their frequency of Internet use, their motivation for online activity, the type of information they sought, and the perceived impact of the information they found on the Internet on their medical care. The survey was conducted over a 4-month period. A total of 107 surveys were returned. Seventy-nine of these (74%) were from patients while 28 (26%) were from family members and friends. Thirty-four of the patient responses (43%) indicated that the patient had used the Internet to look for cancer-related information. Patients who had used the Internet to access cancer-related information were significantly younger (P = 0.007), better educated (P = 0.027), and less satisfied with the amount of treatment-related information given by caregivers than those patients who had not used the Internet to access cancer-related information (P = 0.032). The majority of patient Internet users desired more information on their cancer and its treatment (91%), looked up information that was presented to them by their clinicians (66%), researched other treatment options (63%), and obtained more information on "alternative treatments" (63%). Patient Internet users generally found the cancer-related information on the Internet to be useful, and the majority discussed Internet-derived information with their health care providers and perceived that clinicians listened to such information. However, 53% were undecided about the trustworthiness of the medical information obtained via the Internet. Internet nonusers commonly lacked Internet access (53%) or were unfamiliar with the Internet (33%), but few (13%) distrusted Internet-derived information. This exploratory study underscores the need for more research in this area, specifically

  17. Factors That Impact Nurses’ Utilization of Electronic Mail (E-Mail).

    Science.gov (United States)

    1998-05-21

    of a system but did little to influence behavior. A study by Golden, Beauclair , & Sussman (1992) surveyed 200 electronic mail account holders at an...Aldine Publishing. Golden, P. A., Beauclair , R., & Sussman, L. (1992). Factors affecting electronic mail use. Computers in Human Behavior, 8, 297-311

  18. 78 FR 63915 - New Mailing Standards for Domestic Mailing Services Products

    Science.gov (United States)

    2013-10-25

    ... action, regardless of the class of mail or the extra service being purchased. This has resulted in... accountable mail, including a Return Receipt (Form 3811) purchased with the applicable extra service. Although... require a Form 1508 submission with the claim. Also, gift cards, most of which are replaceable, are being...

  19. 76 FR 76619 - International Mail: New Prices and Fee Changes-Mailing Services

    Science.gov (United States)

    2011-12-08

    ... fraction thereof)......... 0.80 Duplicate copy of PS Form 3606 1.15 * * * * * International Business Reply Service (382) [For each country that offers International Business Reply Service, revise the fees to read... POSTAL SERVICE 39 CFR Part 20 International Mail: New Prices and Fee Changes--Mailing Services...

  20. 78 FR 12234 - Promotions and Incentive Programs for First-Class Mail and Standard Mail

    Science.gov (United States)

    2013-02-22

    ... No. R2013-1) on October 11, 2012 to offer six new promotions in 2013 and the PRC approved the 2013... Promotional Programs The six promotional programs, in calendar order are: 1. Direct Mail Mobile Coupon and... preparer in the by/for fields. Full-service mailings are limited to 9,999 pieces if submitted via Postal...

  1. 76 FR 37655 - Combined Mailings of Standard Mail and Periodicals Flats

    Science.gov (United States)

    2011-06-28

    ... Periodicals flats to be made using a minimum of six (6) pieces, as is currently permitted for Periodicals... Regulations to reflect that the Standard Mail service standards apply to all Periodicals flats pieces entered... for Standard Mail of 200 pieces or 50 pounds. Periodicals publications must be authorized or have a...

  2. Patterns of cancer-related internet searches: reactiveness; risks; the role of affect.

    Science.gov (United States)

    Silva, Paulo Roberto Vasconcellos; Castiel, Luis David; Ferreira, Franciso Romão

    2016-03-01

    The popularization of ICTs and the availability of information have not influenced the habits of prevention - cancers are lately diagnosed, as before in the scarcity of information era. This paper analyzes patterns of accesses to the National Cancer Institute website (already described in previous articles) as well as contradictions between the purposes and results of cancer prevention campaigns. We identified a reactive pattern of queries which was indifferent to information on prevention, but interested in treatment technologies and news about celebrity's diseases. These findings contrast with the paradigm of the best data for decision making, based in the heteronomy of "banking education", its means and efficacy. We discussthe symbolic power of campaigns under the theoretical framework of emotional heuristic models - analytical tools rarely employed in studies of risks, but here considered essential elements to the comprehention of public perception of health. Ambiguities are portrayed and as well as its pendulum between certainties and uncertainties in the midst on which they are formed. It is discussed the risk tripartition - as perception, analysis and policy, the latest posed as a public clash between the first concerning the major risks aligned to their historical circumstances.

  3. Internet effects

    NARCIS (Netherlands)

    Valkenburg, P.M.; Peter, J.; Levesque, R.J.R.

    2011-01-01

    Adolescents’ extensive use of Internet communication and the uncertainty about its consequences call for an integrative perspective that helps to understand both the appeal of Internet communication and its risks and opportunities. The aim of this essay is to theorize, and if possible, substantiate

  4. [Security aspects on the Internet].

    Science.gov (United States)

    Seibel, R M; Kocher, K; Landsberg, P

    2000-04-01

    Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet.

  5. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire - IRSN, 92 - Clamart (France)

    2011-01-15

    This section gathers a selection of Internet links to online articles dealing with radiation protection issues. Below are the titles of the papers with their web site source: 1 - A mission of the European Commission verifies the proper enforcement by France of the EURATOM treaty dispositions relative to the control of radioactivity in the vicinity of uranium mines (http://www.asn.fr); 2 - tritium contamination at Saint-Maur-des-Fosses: new results from measurements performed by IRSN in the environment; 3 - status of radioactivity monitoring in French Polynesia in 2009 (http://www.irsn.fr); 4 - study of mortality and cancers impact near the Aube facility for low- and medium-activity waste storage (http://www.invs.sante.fr); 5 - Marcel Jurien de la Graviere appointed president of the guidance committee of the defense nuclear expertise of the Institute of radiation protection and nuclear safety (IRSN) (http://www.legifrance.gouv.fr); 6 - radiation protection 163: 'Childhood Leukaemia - Mechanisms and Causes'; 7- Radiation Protection 164: Radioactive effluents from nuclear power stations and nuclear fuel reprocessing sites in the European Union, 2004-08; 8 - Radiation Protection 165: Medical Effectiveness of Iodine Prophylaxis in a Nuclear Reactor Emergency Situation and Overview of European Practices Protection (http://ec.europa.eu); 9 - Report RIFE 15: Radioactivity in Food and the Environment - RIFE (SEPA - Scottish Environment Protection Agency, http://www.sepa.org.uk); 10 - HPA response statement: Advisory Group on Ionising Radiation's report on circulatory disease risk (HPA - Health Protection Agency, http://www.hpa.org.uk); 11 - launching of the national database for the voluntary registering of (quasi) incidents (AFCN - Federal agency of nuclear control, http://www.fanc.fgov.be); 12 - Radiation dose optimization in nuclear medicine (IAEA RPOP - Radiation Protection Of Patients, http://rpop.iaea.org); 13 - The government of Canada finances

  6. The management of breast cancer-related lymphoedema

    African Journals Online (AJOL)

    Definition. Breast cancer-related lymphoedema (BCRL) is a secondary form of lymphoedema and a major complication of post-breast cancer surgery and radiotherapy. It occurs when the network of lymphatic vessels and lymph nodes is damaged by disease, surgery or radiotherapy. The lymph, a protein-rich fluid, then ...

  7. Cancer-related fatigue--mechanisms, risk factors, and treatments.

    Science.gov (United States)

    Bower, Julienne E

    2014-10-01

    Fatigue is one of the most common adverse effects of cancer that might persist for years after treatment completion in otherwise healthy survivors. Cancer-related fatigue causes disruption in all aspects of quality of life and might be a risk factor of reduced survival. The prevalence and course of fatigue in patients with cancer have been well characterized and there is growing understanding of the underlying biological mechanisms. Inflammation seems to have a key role in fatigue before, during, and after cancer-treatment. However, there is a considerable variability in the presentation of cancer-related fatigue, much of which is not explained by disease-related or treatment-related characteristics, suggesting that host factors might be important in the development and persistence of this symptom. Indeed, longitudinal studies have identified genetic, biological, psychosocial, and behavioural risk factors associated with cancer-related fatigue. Although no current gold-standard treatment for fatigue is available, a variety of intervention approaches have shown beneficial effects in randomized controlled trials, including physical activity, psychosocial, mind-body, and pharmacological treatments. This Review describes the mechanisms, risk factors, and possible interventions for cancer-related fatigue, focusing on recent longitudinal studies and randomized trials that have targeted fatigued patients.

  8. Breast Cancer-Related Lymphedema: Implications for Family Leisure Participation

    Science.gov (United States)

    Radina, M. Elise

    2009-01-01

    An estimated 20% of breast cancer survivors face the chronic condition of breast cancer-related lymphedema. This study explored the ways in which women with this condition experienced changes in their participation in family leisure as one indicator of family functioning. Participants (N = 27) were interviewed regarding lifestyles before and after…

  9. Coding and encoding rights in internet infrastructure

    Directory of Open Access Journals (Sweden)

    Stefania Milan

    2017-01-01

    Full Text Available This article explores bottom-up grassroots ordering in internet governance, investigating the efforts by a group of civil society actors to inscribe human rights in internet infrastructure, lobbying the Internet Corporation for Assigned Names and Numbers. Adopting a Science and Technology Studies (STS perspective, we approach this struggle as a site of contestation, and expose the sociotechnical imaginaries animating policy advocacy. Combining quantitative mailing-list analysis, participant observation and qualitative discourse analysis, the article observes civil society in action as it contributes to shape policy in the realm of institutional and infrastructure design.

  10. 76 FR 47614 - Mail Classification Change

    Science.gov (United States)

    2011-08-05

    ... POSTAL REGULATORY COMMISSION [Docket No. MC2011-27; Order No. 785] Mail Classification Change...-filed Postal Service request for a change in classification to the ``Reply Rides Free'' program. The... Service filed a notice of classification change pursuant to 39 CFR 3020.90 and 3020.91 concerning the...

  11. 7 CFR 352.11 - Mail.

    Science.gov (United States)

    2010-01-01

    ..., plant pests, and soil which arrive in the United States in closed dispatches by international mail or international parcel post and which are in transit through the United States to another country shall be allowed... the Department of Agriculture (Continued) ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF...

  12. 77 FR 75200 - New International Mail Contract

    Science.gov (United States)

    2012-12-19

    ... Contract AGENCY: Postal Regulatory Commission. ACTION: Notice. SUMMARY: The Commission is noticing a recently-filed Postal Service request to enter into an additional international mail contract. This... contract (Agreement).\\1\\ The Notice was filed in accordance with 39 CFR 3015.5. Notice at 1. The Postal...

  13. 78 FR 11237 - International Mail Contract

    Science.gov (United States)

    2013-02-15

    ... POSTAL REGULATORY COMMISSION [Docket No. CP2013-49; Order No. 1654] International Mail Contract... Service filing concerning an additional Global Reseller Expedited Package Contract 1 Negotiated Service... additional Global Reseller Expedited Package Contracts 1 negotiated service agreement (Agreement).\\1\\ It...

  14. 77 FR 73699 - International Mail Contract

    Science.gov (United States)

    2012-12-11

    ... POSTAL REGULATORY COMMISSION [Docket No. CP2013-24; Order No. 1566] International Mail Contract AGENCY: Postal Regulatory Commission. ACTION: Notice. SUMMARY: The Commission is noticing a recent Postal... Service also identifies differences between the two contracts, such as the addition of several articles...

  15. 77 FR 72412 - International Mail Contract

    Science.gov (United States)

    2012-12-05

    ... POSTAL REGULATORY COMMISSION [Docket No. CP2013-22; Order No. 1557] International Mail Contract AGENCY: Postal Regulatory Commission. ACTION: Notice. SUMMARY: The Commission is noticing a recent Postal... Service also identifies differences between the two contracts, such as the deletion of an article, the...

  16. 77 FR 75452 - New International Mail Contract

    Science.gov (United States)

    2012-12-20

    ... Contract AGENCY: Postal Regulatory Commission. ACTION: Notice. SUMMARY: The Commission is noticing a recently-filed Postal Service request to enter into an additional international mail contract. This... contract (Agreement).\\1\\ The Postal Service seeks to have the Agreement included within the GEPS 3 product...

  17. 76 FR 72452 - International Mail Contract

    Science.gov (United States)

    2011-11-23

    ... POSTAL REGULATORY COMMISSION [Docket No. R2012-4; Order No. 981] International Mail Contract AGENCY: Postal Regulatory Commission. ACTION: Notice. SUMMARY: The Commission is noticing a recently-filed Postal Service request to enter into an additional bilateral agreement with HongKong Post Group...

  18. 77 FR 73062 - International Mail Contract

    Science.gov (United States)

    2012-12-07

    ... POSTAL REGULATORY COMMISSION [Docket No. CP2013-23; Order No. 1562] International Mail Contract AGENCY: Postal Regulatory Commission. ACTION: Notice. SUMMARY: The Commission is noticing a recent Postal.... The Postal Service also identifies differences between the two contracts, such as revisions to...

  19. 24 CFR 3500.11 - Mailing.

    Science.gov (United States)

    2010-04-01

    ... REAL ESTATE SETTLEMENT PROCEDURES ACT § 3500.11 Mailing. The provisions of this part requiring or... obtained by the lender or settlement agent, except that a revised address shall be used where the lender or settlement agent has been expressly informed in writing of a change in address. ...

  20. 78 FR 24239 - Temporary Mailing Promotion

    Science.gov (United States)

    2013-04-24

    ... POSTAL REGULATORY COMMISSION [Docket No. R2013-6; Order No. 1702] Temporary Mailing Promotion... offering a Technology Credit Promotion. This notice informs the public of the Postal Service's filing and... changes associated with offering a Technology Credit Promotion.\\1\\ The promotion is planned to begin on...

  1. 75 FR 41989 - Content of Periodicals Mail

    Science.gov (United States)

    2010-07-20

    ... the current advertising limitation on loose supplements, except for unwrapped copies of loose... discernable undesired movement of printed advertising materials, or other matter, from Standard Mail to... 1995 changes, although welcome, unduly limit creativity in designing publications that appeal to their...

  2. E-mail security a pocket guide

    CERN Document Server

    Furnell, Steven

    2010-01-01

    This pocket guide will help businesses to address the most important issues. Its comprehensive approach covers both the technical and the managerial aspects of the subject, offering valuable insights for IT professionals, managers and executives, as well as for individual users of e-mail.

  3. Suspecting Neurological Dysfunction From E Mail Messages ...

    African Journals Online (AJOL)

    A non medical person suspected and confirmed neurological dysfunction in an individual, based only on e mail messages sent by the individual. With email communication becoming rampant “peculiar” email messages may raise the suspicion of neurological dysfunction. Organic pathology explaining the abnormal email ...

  4. 78 FR 21632 - International Mail Product

    Science.gov (United States)

    2013-04-11

    ... POSTAL REGULATORY COMMISSION [Docket No. CP2013-59; Order No. 1692] International Mail Product AGENCY: Postal Regulatory Commission. ACTION: Notice. SUMMARY: The Commission is noticing a recent Postal... have the Agreement included within the existing IBRS Competitive Contract 3 product on grounds of...

  5. 78 FR 21633 - International Mail Product

    Science.gov (United States)

    2013-04-11

    ... POSTAL REGULATORY COMMISSION [Docket No. CP2013-58; Order No. 1691] International Mail Product... have the Agreement included within the existing IBRS Competitive Contract 3 product on grounds of... Contract 3 product in Docket No. CP2012-17, and is on behalf of the same customer as in Docket No. CP2012...

  6. 78 FR 21171 - International Mail Product

    Science.gov (United States)

    2013-04-09

    ... POSTAL REGULATORY COMMISSION [Docket No. CP2013-57; Order No. 1690] International Mail Product... have the Agreement included within the existing IBRS Competitive Contract 3 product on grounds of... Contract 3 product in Docket No. CP2012-18. Id. at 3. [[Page 21172

  7. 76 FR 74078 - Standard Mail Market Test

    Science.gov (United States)

    2011-11-30

    ... POSTAL REGULATORY COMMISSION [Docket No. MT2011-3; Order No. 998] Standard Mail Market Test AGENCY... Service application for an exemption from the annual revenue limitation that applies to market tests of... limitation in any year during the test of an experimental market dominant product.\\1\\ Pursuant to 39 U.S.C...

  8. 78 FR 29785 - Priority Mail Pricing

    Science.gov (United States)

    2013-05-21

    ... POSTAL REGULATORY COMMISSION [Docket No. R2013-7; Order No. 1714] Priority Mail Pricing AGENCY: Postal Regulatory Commission. ACTION: Notice. SUMMARY: The Commission is noticing a recently-filed Postal... that after the price change, the unused pricing authority available for the Special Services class will...

  9. 77 FR 74033 - Standard Mail Pricing

    Science.gov (United States)

    2012-12-12

    ... POSTAL REGULATORY COMMISSION [Docket No. R2012-5; Order No. 1568] Standard Mail Pricing AGENCY: Postal Regulatory Commission. ACTION: Notice. SUMMARY: The Commission is noticing a recent Postal Service filing concerning an amendment to an existing negotiated service agreement with Canada Post Corporation...

  10. Don’t let your mail leak

    CERN Multimedia

    Computer Security Team

    2012-01-01

    At CERN, data privacy is of paramount importance, and we are currently developing a comprehensive data protection policy. For example, your CERN mailbox and your “private” folders on AFS and DFS are considered yours...   You might feel like you have nothing to hide, but we are not only talking about personal e-mail: data privacy also pertains to financial mail (acquisitions, tenders), mail related to HR (contracts, assessments), medical information, etc.  As this is considered “private” even if it is work-related, the data cannot normally be accessed by your supervisor, the AFS/DFS/mail service administrators or even the Computer Security Team. Tight procedures have been established for the rare cases where such access is necessary, and these require the prior approval of the CERN Computer Security Officer or the IT Department Head, the Legal Service and the DG (see here for more details). Data privacy is not only the responsibility of the O...

  11. Censoring the Mails: What Is Your Opinion?

    Science.gov (United States)

    Alexander, Mary, Ed.; Childress, Marilyn, Ed.

    1982-01-01

    Contains a primary source document--a letter written in 1916 protesting U.S. Postal Service censorship of an anarchist publication--and suggests ways to use the document in secondary U.S. history classes. Samples of student surveys on mail censorship and a document analysis worksheet are included. (AM)

  12. Efficient communication in the electronic mail game

    NARCIS (Netherlands)

    de Jaegher, K.

    The literature on the electronic mail game shows that players’ mutual expectations may lock them into requiring an inefficiently large number of confirmations and confirmations of confirmations from one another. This paper shows that this result hinges on the assumption that, with the exception of

  13. A series of studies examining Internet treatment of obesity to inform Internet interventions for substance use and misuse.

    Science.gov (United States)

    Tate, Deborah F

    2011-01-01

    The feasibility and efficacy of Internet treatment programs for overweight and obese people have been demonstrated in a series of randomized trials. Initial studies examined various approaches to Internet behavioral treatment. Other studies have examined delivery of group behavioral counseling using Internet chat rooms, using the Internet for long-term maintenance of weight loss, and enhancing motivation in Internet programs. These interventions have produced weight losses of 4-7 kg over 6 months to 1 year when support via e-mail, automated messages, or chat rooms is provided. Outcomes and lessons learned with application to the treatment of substance use and misuse are provided.

  14. Internet printing

    Science.gov (United States)

    Rahgozar, M. Armon; Hastings, Tom; McCue, Daniel L.

    1997-04-01

    The Internet is rapidly changing the traditional means of creation, distribution and retrieval of information. Today, information publishers leverage the capabilities provided by Internet technologies to rapidly communicate information to a much wider audience in unique customized ways. As a result, the volume of published content has been astronomically increasing. This, in addition to the ease of distribution afforded by the Internet has resulted in more and more documents being printed. This paper introduces several axes along which Internet printing may be examined and addresses some of the technological challenges that lay ahead. Some of these axes include: (1) submission--the use of the Internet protocols for selecting printers and submitting documents for print, (2) administration--the management and monitoring of printing engines and other print resources via Web pages, and (3) formats--printing document formats whose spectrum now includes HTML documents with simple text, layout-enhanced documents with Style Sheets, documents that contain audio, graphics and other active objects as well as the existing desktop and PDL formats. The format axis of the Internet Printing becomes even more exciting when one considers that the Web documents are inherently compound and the traversal into the various pieces may uncover various formats. The paper also examines some imaging specific issues that are paramount to Internet Printing. These include formats and structures for representing raster documents and images, compression, fonts rendering and color spaces.

  15. Cancer-related identity and positive affect in survivors of prostate cancer.

    Science.gov (United States)

    Bellizzi, Keith M; Blank, Thomas O

    2007-03-01

    Despite a shift in the cancer culture and language used to describe individuals diagnosed with this disease, the extent to which individuals with cancer adopt a particular cancer-related identity and the impact of these identities in relation to their well-being is virtually unknown. Using a cross-sectional study design and a metropolitan tumor registry, a mail questionnaire to examine post-treatment quality of life was sent to prostate cancer (PCa) survivors. The sample consisted of 490 PCa survivors, ranging in age from 49-88 (M = 69.7; SD = 7.8), one to eight years after diagnosis. The outcome measure used in these analyses was the PANAS to assess positive and negative affect. The most frequently reported cancer-related identity was "someone who has had PCa" (57%). The least reported self view was "victim" (1%). Twenty-six percent of men self-identified as "survivors" while 6% thought of themselves as "cancer conquerors." Only 9% self-identified as a "patient." Multivariate analyses, adjusted for potential confounders, show respondents who identified themselves as "survivors" or "cancer conquerors" reported significantly higher scores on positive affect than men who self-identified as "patients" (p < .001). Although the majority of respondents identified themselves as "someone who has had cancer," identifying as a "survivor" or "someone who has conquered cancer" appears to have adaptive value for positive mood. Those who perceive themselves as survivors of prostate cancer may derive some benefit in well-being associated with this self assessment.

  16. 21 CFR 1321.01 - DEA mailing addresses.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false DEA mailing addresses. 1321.01 Section 1321.01 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE DEA MAILING ADDRESSES § 1321.01 DEA mailing addresses. The following table provides information regarding mailing addresses to be used...

  17. Discovery and analysis of e-mail-driven business processes

    NARCIS (Netherlands)

    Stuit, Marco; Wortmann, Hans

    E-mail is used as the primary tool for business communication and collaboration. This paper presents a novel e-mail interaction mining method to discover and analyze e-mail-driven business processes. An e-mail-driven business process is perceived as a human collaboration process that consists of

  18. 39 CFR 121.1 - First-Class Mail.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false First-Class Mail. 121.1 Section 121.1 Postal Service UNITED STATES POSTAL SERVICE POST OFFICE SERVICES [DOMESTIC MAIL] SERVICE STANDARDS FOR MARKET-DOMINANT MAIL PRODUCTS § 121.1 First-Class Mail. (a) For all intra-Sectional Center Facility (SCF) domestic...

  19. 75 FR 39477 - New Standards for Domestic Mailing Services

    Science.gov (United States)

    2010-07-09

    ... markets, test new mailpieces, and increase the frequency of their mailings at reduced net postage prices... growth of automation letter-size mail, particularly pieces that are part of full-service Intelligent Mail[supreg] automation mailings entered at PostalOne![supreg] acceptance facilities. Accordingly, we propose...

  20. Electronic Mail in Academic Settings: A Multipurpose Communications Tool.

    Science.gov (United States)

    D'Souza, Patricia Veasey

    1992-01-01

    Explores possible uses of electronic mail in three areas of the academic setting: instruction, research, and administration. Electronic mail is defined, the components needed to get started with electronic mail are discussed, and uses and benefits of electronic mail in diverse educational environments are suggested. (12 references) (DB)

  1. [Internet addiction].

    Science.gov (United States)

    Dannon, Pinhas Nadim; Iancu, Iulian

    2007-07-01

    The Internet provides inexpensive, interesting and comfortable recreation, but sometimes users get hooked. Thus, the computer-internet addiction concept has been proposed as an explanation for uncontrollable and damaging use. Symptoms of addiction could be compared to other addictive behaviors such as pathological gambling, kleptomania, trichotillomania, sex addiction and pyromania. Although criteria to diagnose this addiction have been proposed, methods of assessing excessive computer-internet use are limited. Early diagnosis could help the patient that suffers from this addiction before developing additional psychiatric diagnoses. A review of the proposed etiologies in the literature is summarized, together with recommendations for physicians and mental health officials.

  2. Internet Inquiry

    DEFF Research Database (Denmark)

    This collection of dialogues is the only textbook of its kind. Internet Inquiry: Conversations About Method takes students into the minds of top internet researchers as they discuss how they have worked through critical challenges as they research online social environments. Editors Annette N....... Markham and Nancy K. Baym illustrate that good research choices are not random but are deliberate, studied, and internally consistent. Rather than providing single "how to" answers, this book presents distinctive and divergent viewpoints on how to think about and conduct qualitative internet studies....

  3. Using viral e-mails to distribute tobacco control advertisements: an experimental investigation.

    Science.gov (United States)

    Carter, Owen B J; Donovan, Robert; Jalleh, Geoffrey

    2011-08-01

    The authors' objective was to conduct a trial of viral e-mail marketing as a distribution method for tobacco control advertisements. University students (n = 200) in the state of Western Australia were randomly allocated to receive 1 of 2 e-mails with hyperlinks to tobacco control advertisements ("Toilet" and "Rubbish") emphasizing the disgusting nature of smoking. Recipients followed a hyperlink to a Web page playing Toilet or Rubbish on endless loop. Viewers were encouraged to forward the e-mail to their friends and invited to complete an online survey about the advertisement. Unique downloads for each advertisement were identified by internet provider (IP) location and tallied by date and geographical location to assess subsequent dissemination beyond the initial 200 students. There were 826 unique viewings of the advertisements averaging 26.9 viewings per day for the first fortnight, followed by a lower average of 4.1 hits per day for the next 3.5 months. IP addresses identified hits from 3 other Australian states and 7 other countries. Online surveys were completed by 103 respondents (12.5% of total hits) but included few smokers (n = 9). Significantly more respondents rated Toilet as "funny" compared with Rubbish (40% vs. 11%; p e-mail sent but daily hits rapidly deteriorated over time. Entertainment appears to facilitate viral e-mails being forwarded onwards but only exceptionally compelling tobacco control materials are ever likely to become self-perpetuating.

  4. Internet culture

    CERN Document Server

    Porter, David

    2013-01-01

    The internet has recently grown from a fringe cultural phenomenon to a significant site of cultural production and transformation. Internet Culture maps this new domain of language, politics and identity, locating it within the histories of communication and the public sphere. Internet Culture offers a critical interrogation of the sustaining myths of the virtual world and of the implications of the current mass migration onto the electronic frontier. Among the topics discussed in Internet Culture are the virtual spaces and places created by the citizens of the Net and their claims to the hotly contested notion of "virtual community"; the virtual bodies that occupy such spaces; and the desires that animate these bodies. The contributors also examine the communication medium behind theworlds of the Net, analyzing the rhetorical conventions governing online discussion, literary antecedents,and potential pedagogical applications.

  5. Internet Connectivity

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Internet Connectivity. BSNL, SIFY, HCL in Guwahati; only BSNL elsewhere in NE (local player in Shillong). Service poor; All vendors lease BW from BSNL.

  6. Internet enlightens

    International Nuclear Information System (INIS)

    Figueiredo, S.

    2008-01-01

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection,radioecology, nuclear laws. To note three sites treat the accident of radiotherapy arisen to Toulouse. (N.C.)

  7. Internet enlightens

    International Nuclear Information System (INIS)

    Anon.

    2010-01-01

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  8. Internet Censorship

    Science.gov (United States)

    Jyotsna; Kapil; Aayush

    2012-09-01

    Censorship on Internet has always wet its hands in the water of controversies, It is said to go in with synonym of "FILTERING THE NET" i.e. Either done to protect minors or for nationís privacy, some take it as snatching their freedom over internet and some take it as an appropriate step to protect minor, It has its supporters as well as opponents.Google has reported a whooping number of requests from Governments of U.K, China, Poland, Spain, and Canada to remove videos and search links that led to harassment, sensitive issues or suspicious people. This paper deals with the cons of censorship on internet and to make people aware of the fact that Internet is not a single body owned by an org. but an open sky of information shared equally by all. Research done has found out many unseen aspects of different people's view point.

  9. Open-Rate Controlled Experiment in E-Mail Marketing Campaigns

    Directory of Open Access Journals (Sweden)

    Antun Biloš

    2016-06-01

    Full Text Available Purpose – The main purpose of this paper is to test the controlled experiment (A/B split methodology in B2C oriented e-mail marketing campaigns. Design/Methodology/Approach – E-mail marketing techniques have been a substantial part of e-marketing methodology since the early Internet days of the mid-1990s. From the very beginning of Internet utilization for business purposes, e-mail was one of the most widely used communication techniques in B2B and B2C markets alike. Due to high volumes of spamming and progression of online communication clutter, some practitioners began to question the usability of e-mail as a marketing communication channel, while others embarked on working on improving the message itself. Efforts were invested into improving message quality, as well as into better understanding user expectations. One of the most commonly used techniques to test specific e-mail message elements is the controlled experiment. Findings and implications – This paper explores several types of controlled experiments in a specific Croatian B2C market. Tests were run to determine subscriber behavior towards several newsletter components, including sending time, sending day, sender’s name, and subject line. Open and click rates for tested campaigns, and several other metrics were investigated using MailChimp software. An N − 1 two-proportion test using an adjusted Wald confidence interval around the difference in the proportions was used for comparing the open-rate measure in the controlled experiments between subjects. Limitation – Controlled experiments (A/B split tests showed a lot of potential as a way of measuring behavior and preferences of subscribers, although several apparent limitations (the data-set scope, comparability issues indicated a clear need for standardization on a managerial and scientific level. Originality – This paper provides an up-to-date e-mail marketing effectiveness literature review, describes and tests the

  10. Contrast enhancement of mail piece images

    Science.gov (United States)

    Shin, Yong-Chul; Sridhar, Ramalingam; Demjanenko, Victor; Palumbo, Paul W.; Hull, Jonathan J.

    1992-08-01

    A New approach to contrast enhancement of mail piece images is presented. The contrast enhancement is used as a preprocessing step in the real-time address block location (RT-ABL) system. The RT-ABL system processes a stream of mail piece images and locates destination address blocks. Most of the mail pieces (classified into letters) show high contrast between background and foreground. As an extreme case, however, the seasonal greeting cards usually use colored envelopes which results in reduced contrast osured by an error rate by using a linear distributed associative memory (DAM). The DAM is trained to recognize the spectra of three classes of images: with high, medium, and low OCR error rates. The DAM is not forced to make a classification every time. It is allowed to reject as unknown a spectrum presented that does not closely resemble any that has been stored in the DAM. The DAM was fairly accurate with noisy images but conservative (i.e., rejected several text images as unknowns) when there was little ground and foreground degradations without affecting the nondegraded images. This approach provides local enhancement which adapts to local features. In order to simplify the computation of A and (sigma) , dynamic programming technique is used. Implementation details, performance, and the results on test images are presented in this paper.

  11. Factors that impact nurses' use of electronic mail (e-mail).

    Science.gov (United States)

    Hughes, J A; Pakieser, R A

    1999-01-01

    As electronic applications are used increasingly in healthcare, nurses are being challenged to adopt them. Electronic mail (e-mail) is an electronic tool with general as well as healthcare uses. E-mail use may be an opportunity to learn a tool that requires skills similar to those used in other applications. This study aimed to identify barriers and facilitators that impact nurses' use of e-mail in the workplace. Data for this study were gathered using focus group methodology. Content analysis identified and labeled factors into seven major categories. Specific factors identified were generally consistent with those previously described in the literature as affecting use of computers in general. However, there were several additional factors identified that were not reported in other previous studies: lack of face-to-face communication, individual writing skills, recency of any educational experience, volume of mail received, password integrity, and technical support. Findings from this study provide information for any individual involved in introducing or updating an e-mail system in a healthcare environment.

  12. Effect of aerobic exercise on cancer-related fatigue

    Directory of Open Access Journals (Sweden)

    Jaivika Govindbhai Patel

    2017-01-01

    Full Text Available Background: Fatigue is the most common side effect of cancer treatment with chemotherapy and/or radiation therapy, selected biologic response modifiers. The main purpose of this study is to evaluate the effects of aerobic exercise on cancer-related fatigue in patients of the solid tumor after chemotherapy and radiotherapy. Methods: After screening for cancer-related fatigue, 34 patients fulfilled the inclusive criteria and were assigned into two groups (n = 17 recruited in the intervention group and n = 17 in control group. The intervention group received aerobic exercise program which included treadmill walking with low to moderate intensity (50%–70% of maximum heart rate, for 20–40 min/day for 5 days/week. Control group were taught stretching exercises of hamstrings, gastrocnemius, and soleus (to be done at home and were encouraged to remain active. Outcome measures such as brief fatigue inventory (BFI, 6-min walk test, and functional assessment of cancer therapy-general (FACT-G were taken at baseline and after 6-weeks. Results: The data were analyzed using the Wilcoxon matched-pairs signed rank test for within group and Mann–Whitney U-test for between group comparisons. The results of this study showed that there was a significant reduction in cancer-related fatigue BFI score (P < 0.0001,, also there was significant improvement in the physical performance as in 6-min walk distance (P < 0.0001 and quality of life, FACT-G score (P = 0.0001. Conclusion: Aerobic exercise for 6 weeks has beneficial effects on cancer-related fatigue in patients with solid tumor after chemotherapy and/or radiotherapy.

  13. Voting-based Classification for E-mail Spam Detection

    Directory of Open Access Journals (Sweden)

    Bashar Awad Al-Shboul

    2016-06-01

    Full Text Available The problem of spam e-mail has gained a tremendous amount of attention. Although entities tend to use e-mail spam filter applications to filter out received spam e-mails, marketing companies still tend to send unsolicited e-mails in bulk and users still receive a reasonable amount of spam e-mail despite those filtering applications. This work proposes a new method for classifying e-mails into spam and non-spam. First, several e-mail content features are extracted and then those features are used for classifying each e-mail individually. The classification results of three different classifiers (i.e. Decision Trees, Random Forests and k-Nearest Neighbor are combined in various voting schemes (i.e. majority vote, average probability, product of probabilities, minimum probability and maximum probability for making the final decision. To validate our method, two different spam e-mail collections were used.

  14. E-mail, decisional styles, and rest breaks.

    Science.gov (United States)

    Baker, James R; Phillips, James G

    2007-10-01

    E-mail is a common but problematic work application. A scale was created to measure tendencies to use e-mail to take breaks (e-breaking); and self-esteem and decisional style (vigilance, procrastination, buck-passing, hypervigilance) were used to predict the self-reported and actual e-mail behaviors of 133 participants (students and marketing employees). Individuals who were low in defensive avoidance (buck-passing) engaged in more e-mailing per week, both in time spent on e-mail and message volume. E-breakers were more likely to engage in behavioral procrastination and spent more time on personal e-mail.

  15. Global surveillance of emerging diseases: the ProMED-mail perspective

    Directory of Open Access Journals (Sweden)

    John P. Woodall

    2001-01-01

    Full Text Available The Internet is changing the way global disease surveillance is conducted. Countries and international organizations are increasingly placing their outbreak reports on the Internet, which speeds up distribution and therefore prevention and control. The World Health Organization (WHO has recognized the value of nongovernmental organizations and the media in reporting outbreaks, which it then attempts to verify through its country offices. However, WHO and other official sources are constrained in their reporting by the need for bureaucratic clearance. ProMED-mail has no such constraints, and posts outbreak reports 7 days a week. It is moderated by infectious disease specialists who add relevant comments. Thus, ProMED-mail complements official sources and provides early warning of outbreaks. Its network is more than 20,000 people in over 150 countries, who place their computers and time at the network's disposal and report on outbreaks of which they have knowledge. Regions and countries could benefit from adopting the ProMED-mail approach to complement their own disease surveillance systems.

  16. Data Leakage Prevention: E-Mail Protection via Gateway

    Science.gov (United States)

    Kaur, Kamaljeet; Gupta, Ishu; Singh, Ashutosh Kumar

    2018-01-01

    Protection of digital assets and intellectual property is becoming a challenge for most of the companies. Due to increasing availability of database services on internet, data may be insecure after passing through precarious networks. To protect intellectual property (IP) is a major concern for today's organizations, because a leakage that compromises IP means, sensitive information of a company is in the hands of biggest competitors. Electronic information processing and communication is replacing paper in many applications increasingly. Instead of paper, an email is being used for communication at workplace and from social media logins to bank accounts. Nowadays an email is becoming a mainstream business tool. An email can be misused to leave company’s sensitive data open to compromise. So, it may be of little surprise that attacks on emails are common. So, here we need an email protection system (EPS) that will protect information to leave organization via mail. In this paper, we developed an algorithm that will offer email protection via gateway during data transfer. This algorithm matches the patterns with the keywords stored in the database and then takes the actions accordingly to protect the data. This paper describes why email protection is important? How companies can protect their confidential information from being leaked by insiders.

  17. Everyone's Internet

    Institute of Scientific and Technical Information of China (English)

    YAO BIN

    2010-01-01

    @@ After more than 20 years, the Internet in China has become a big success. The country has the world's largest Intemet population that topped 420 million at the end of June. In the first six months of this year, China's Internet market reached 74.3 billion yuan ($10.9 billion), the equivalent of 2009's total. Local businesses have risen to leaders on the Chinese market, as Chinese language search, instant messaging and online auction service providers have overwhelming advantages over foreign rivals.

  18. Internet Sexualities

    Science.gov (United States)

    Döring, Nicola

    The term “internet sexuality” (or OSA, online sexual activities) refers to sexual-related content and activities observable on the internet (cf. Adams, Oye, & Parker, 2003; Cooper, McLoughlin, & Campbell, 2000; Leiblum & Döring, 2002). It designates a variety of sexual phenomena (e.g., pornography, sex education, sexual contacts) related to a wide spectrum of online services and applications (e.g., websites, online chat rooms, peer-to-peer networks). If an even broader range of computer networks - such as the Usenet or bulletin board systems - is included in this extensional definition, one speaks of “online sexuality” or “cybersexuality.”

  19. Internet bullying.

    Science.gov (United States)

    Donnerstein, Ed

    2012-06-01

    There is substantial literature on the impact of the mass media on children's and adolescents' health and development. The question of what role new technology plays in the media's influence is now a subject of both review and discussion, particularly regarding health risks and intervention. This article takes a brief look at online usage and the theoretical mechanisms that might make Internet access more problematic in terms of risks, compared with more traditional media such as television and film. One of these risks, known today as cyberbullying or Internet harassment, is scrutinized in detail. Copyright © 2012 Elsevier Inc. All rights reserved.

  20. Internet: la red de redes

    OpenAIRE

    Climent Serrano, Salvador

    1998-01-01

    Historia de I nternet en donde se realiza una descripción de la transmisión de los datos por TCP/IP y se explica el número IP. Se estudian los servicios de Internet como, Correo electrónico (e-mail), Transferencia de ficheros (ftp), World wide wed (la telaraña mundial), Navegadores, URL (Uniform Resource Locator), 4.5 Noticias (news), Chats (IRC), Webphone, Archie, Gopher, Wais, Comercio electrónico sus componentes.

  1. Adding tools to the open source toolbox: The Internet

    Science.gov (United States)

    Porth, Tricia

    1994-01-01

    The Internet offers researchers additional sources of information not easily available from traditional sources such as print volumes or commercial data bases. Internet tools such as e-mail and file transfer protocol (ftp) speed up the way researchers communicate and transmit data. Mosaic, one of the newest additions to the Internet toolbox, allows users to combine tools such as ftp, gopher, wide area information server, and the world wide web with multimedia capabilities. Mosaic has quickly become a popular means of making information available on the Internet because it is versatile and easily customizable.

  2. Teleradiology applications with DICOM-e-mail

    International Nuclear Information System (INIS)

    Weisser, G.; Ruggiero, S.; Runa, A.; Engelmann, U.; Schroeter, A.; Baur, S.; Walz, M.

    2007-01-01

    For the connection of several partners to a Dicom-e-mail based teleradiology network concepts were developed to allow the integration of different teleradiology applications. The organisational and technical needs for such an integration were analysed. More than 60 institutions including 23 hospitals in the Rhein-Neckar-Region, Germany were connected. The needed functionality was grouped in six teleradiology applications (emergency consultation, tele-guided examinations, expert consultations, cooperative work, scientific cooperations and homework with on call services) and their technical and organisational needs according to availability, speed of transfer, workflow definitions and data security needs was analysed. For the local integration of teleradiology services the setup and workflow is presented for a standalone teleradiology workstation and a server based teleradiology gateway. The line type needed for different groups of applications and users is defined. The security concept and fallback strategies are laid out, potential security problems and sources of errors are discussed. The specialties for the emergency teleradiology application are presented. The DICOM-e-mail protocol is a flexible and powerful protocol that can be used for a variety of teleradiology applications. It can meet the conditions for emergency applications but is limited if synchronous applications like teleconferences are needed. (orig.)

  3. Internet Policy

    Science.gov (United States)

    1999-11-17

    equipment, including information technology , includes, but is not limited to, personal computers and related peripheral equipment and software, office...classified or Sensitive Unclassified Information through the Internet unless the Designated Approving Authority has approved the method of transmission in...writing. 2. Government office equipment, including Information Technology (IT), shall only be used for official purposes, except as specifically

  4. Internet Shopping

    Institute of Scientific and Technical Information of China (English)

    刘洪毓

    2004-01-01

    Nowadays you no longer need to walk round hundreds of shops looking for the items you need. You can shop for just about anything from your armchair. All you need is a computer and access(进入) to the Internet.

  5. [Internet addiction].

    Science.gov (United States)

    Nakayama, Hideki; Higuchi, Susumu

    2015-09-01

    Internet technologies have made a rapid progress, bringing convenience to daily life. On the other hand, internet use disorder and internet addiction (IA) have become reportedly serious health and social problems. In 2013, internet gaming disorder criteria have been proposed in the section of Conditions for Further Study of DSM-5. Existing epidemiological studies by questionnaire methods have reported that the prevalence of IA ranges between 2.8% and 9.9% among youths in Japan. Attention deficit hyperactivity disorder (ADHD), sleeping disorders, depression, obsessive compulsive disorder, and phobic anxiety disorder are extremely common comorbid mental disorders with IA. Some psychotherapies (e.g., cognitive behavioral therapy, motivational interviewing) and medical treatments (e.g., antidepressant drugs, methylphenidate) for comorbid mental disorders as well as rehabilitation (e.g., treatment camp) are effective for IA remission. However, some serious cases of IA may be difficult to treat, and prevention is very important. In future, the prevention, rehabilitations and treatments for IA will be more required in Japan.

  6. O impacto do e-mail marketing no processo de decisão do consumidor final

    OpenAIRE

    Mouro, Ana Catarina Ruas

    2015-01-01

    Mestrado em Comunicação Cultura e Tecnologias da Informação Esta dissertação recai sobre o tema do E-mail Marketing e sobretudo sobre o impacto que tem junto do consumidor final. Nesta dissertação abordou-se primeiramente o impacto que a internet e o mundo digital teve no marketing. Esta perceção é fundamental para que possamos entender a importância que tem o E-mail Marketing nos dias de hoje e a utilidade que esta ferramenta pode vir a ter se bem utilizada. Foi realizado um estudo ...

  7. Internet Censorship in China - Recent Developments and Perception of Internet Censorship by Chinese Internet Users

    OpenAIRE

    Thünken, Florian

    2009-01-01

    With the launch of economic reforms and the opening up in 1978, China started to catch up with the industrial nations. During the 1980s and 90s great importance was attached to the development of the science and educational sector. Development of the first Chinese intranet and connection to the internet became a key to developing science and economy. In 1987 the China Academic Network (CAnet, Zhongguo xueshu wangluo) was established. In the same year the first e-mail was sent from China to th...

  8. 75 FR 29893 - Business Reply Mail Online Application Option

    Science.gov (United States)

    2010-05-28

    ... POSTAL SERVICE 39 CFR Part 111 Business Reply Mail Online Application Option AGENCY: Postal Service TM . ACTION: Final rule. SUMMARY: The Postal Service TM will revise the Mailing Standards of the... option to obtain a Business Reply Mail[supreg] (BRM) permit online. Additionally, the electronic version...

  9. 7 CFR 319.55-7 - Importations by mail.

    Science.gov (United States)

    2010-01-01

    ... foreign mailing point by a special mailing tag directing the package to a Plant Protection and Quarantine... 7 Agriculture 5 2010-01-01 2010-01-01 false Importations by mail. 319.55-7 Section 319.55-7 Agriculture Regulations of the Department of Agriculture (Continued) ANIMAL AND PLANT HEALTH INSPECTION...

  10. 31 CFR 560.508 - Telecommunications and mail transactions authorized.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Telecommunications and mail... REGULATIONS Licenses, Authorizations and Statements of Licensing Policy § 560.508 Telecommunications and mail... telecommunications and mail between the United States and Iran are authorized. For purposes of this section, the term...

  11. 19 CFR 145.2 - Mail subject to Customs examination.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Mail subject to Customs examination. 145.2 Section 145.2 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) MAIL IMPORTATIONS General Provisions § 145.2 Mail subject to Customs...

  12. Ovarian cancer-related hypophosphatemic osteomalacia--a case report.

    Science.gov (United States)

    Lin, Hung-An; Shih, Shyang-Rong; Tseng, Yu-Ting; Chen, Chi-Hau; Chiu, Wei-Yih; Hsu, Chih-Yao; Tsai, Keh-Sung

    2014-12-01

    Tumor-induced osteomalacia (TIO) is a rare paraneoplastic syndrome caused primarily by benign mesenchymal tumors. It has been associated with malignancies in rare cases. High serum levels of fibroblast growth factor (FGF) 23 reported in a group of patients with ovarian cancer had normal serum phosphate levels. There had been no ovarian cancer-related hypophosphatemic osteomalacia in a search of the literature. We investigated a 57-year-old woman with progressive low back pain. Clinical, biochemical, and radiological assessments were performed. The patient's serum phosphate and FGF23 levels were evaluated at baseline and after treatment for ovarian cancer. The patient presented with progressive low back pain and weight loss during the previous 6 months. Imaging studies revealed low bone mineral density and multiple suspicious spinal metastatic lesions. Laboratory examination showed hypophosphatemia, hyperphosphaturia, normocalcemia, an elevated serum alkaline phosphatase level, and an elevated serum FGF23 level. Because TIO was suspected, a tumor survey was performed, and ovarian carcinoma with multiple metastasis was detected. After surgery and chemotherapy treatments for ovarian cancer, the serum phosphate and FGF23 levels returned to normal, and the low back pain improved. To our knowledge, this is the first case of ovarian cancer-related hypophosphatemic osteomalacia reported in the literature. TIO should be considered in patients with ovarian cancer presenting with weakness, bone pain, and fractures. Investigation of TIO is appropriate when these patients present hypophosphatemia.

  13. Ovarian Cancer-Related Hypophosphatemic Osteomalacia—A Case Report

    Science.gov (United States)

    Lin, Hung-An; Shih, Shyang-Rong; Tseng, Yu-Ting; Chen, Chi-Hau; Chiu, Wei-Yih; Hsu, Chih-Yao

    2014-01-01

    Context: Tumor-induced osteomalacia (TIO) is a rare paraneoplastic syndrome caused primarily by benign mesenchymal tumors. It has been associated with malignancies in rare cases. High serum levels of fibroblast growth factor (FGF) 23 reported in a group of patients with ovarian cancer had normal serum phosphate levels. There had been no ovarian cancer-related hypophosphatemic osteomalacia in a search of the literature. Objective: We investigated a 57-year-old woman with progressive low back pain. Design and Intervention: Clinical, biochemical, and radiological assessments were performed. The patient's serum phosphate and FGF23 levels were evaluated at baseline and after treatment for ovarian cancer. Results: The patient presented with progressive low back pain and weight loss during the previous 6 months. Imaging studies revealed low bone mineral density and multiple suspicious spinal metastatic lesions. Laboratory examination showed hypophosphatemia, hyperphosphaturia, normocalcemia, an elevated serum alkaline phosphatase level, and an elevated serum FGF23 level. Because TIO was suspected, a tumor survey was performed, and ovarian carcinoma with multiple metastasis was detected. After surgery and chemotherapy treatments for ovarian cancer, the serum phosphate and FGF23 levels returned to normal, and the low back pain improved. Conclusions: To our knowledge, this is the first case of ovarian cancer-related hypophosphatemic osteomalacia reported in the literature. TIO should be considered in patients with ovarian cancer presenting with weakness, bone pain, and fractures. Investigation of TIO is appropriate when these patients present hypophosphatemia. PMID:25181387

  14. The effects of mailing design characteristics on direct mail campaign performance

    NARCIS (Netherlands)

    Feld, S.; Frenzen, H.; Krafft, Manfred; Peters, K.; Verhoef, P.C.

    Designing effective direct mail pieces is considered a key success factor in direct marketing. However, related published empirical research is scarce while design recommendations are manifold and often conflicting. Compared with prior work, our study aims to provide more elaborate and empirically

  15. 78 FR 76533 - New Mailing Standards for Domestic Mailing Services Products

    Science.gov (United States)

    2013-12-18

    ... accountable mail, including a Return Receipt (Form 3811) purchased with the applicable extra service. Although..., and for firearms to require a Form 1508 submission with the claim. Also, gift cards, most of which are... delivery record by purchasing a return receipt. Bulk proof of delivery service (6.0) is also available if...

  16. 77 FR 64775 - New Mailing Standards for Domestic Mailing Services Products

    Science.gov (United States)

    2012-10-23

    ...'s Web site at www.prc.gov . The Postal Service's proposed rule includes several mail classification... Tracing \\TM\\ We are removing language concerning the old Confirm[supreg] service from DMM 503.15.0, because all Confirm subscriptions will end by January of 2013. IMb Tracing now provides a service similar...

  17. 39 CFR 111.2 - Availability of the Mailing Standards of the United States Postal Service, Domestic Mail Manual.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Availability of the Mailing Standards of the United States Postal Service, Domestic Mail Manual. 111.2 Section 111.2 Postal Service UNITED STATES POSTAL SERVICE POST OFFICE SERVICES [DOMESTIC MAIL] GENERAL INFORMATION ON POSTAL SERVICE § 111.2...

  18. 39 CFR 111.1 - Mailing Standards of the United States Postal Service, Domestic Mail Manual; incorporated by...

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Mailing Standards of the United States Postal Service, Domestic Mail Manual; incorporated by reference of regulations governing domestic mail services... the approval of the Director of the Federal Register.” In conformity with that provision, and with 39...

  19. A brain-computer interface controlled mail client.

    Science.gov (United States)

    Yu, Tianyou; Li, Yuanqing; Long, Jinyi; Wang, Cong

    2013-01-01

    In this paper, we propose a brain-computer interface (BCI) based mail client. This system is controlled by hybrid features extracted from scalp-recorded electroencephalographic (EEG). We emulate the computer mouse by the motor imagery-based mu rhythm and the P300 potential. Furthermore, an adaptive P300 speller is included to provide text input function. With this BCI mail client, users can receive, read, write mails, as well as attach files in mail writing. The system has been tested on 3 subjects. Experimental results show that mail communication with this system is feasible.

  20. An additional DNS feature for different routing of electronic mail inside and outside of a campus network

    International Nuclear Information System (INIS)

    Bobyshev, A.; Ernst, M.

    2001-01-01

    Several years ago DESY faced the need to change the Electronic Mail Service to support it on a central cluster of servers. The centralized architecture was necessary for deployment of unified internal E-Mail standards, better quality of service and security. To implement a new policy for Electronic Mail Service and avoid huge modifications to a few hundreds network nodes, an additional DNS feature has been added to ISC's (Internet Software Consortium) software bind-4.9.7. The DNS servers running at DESY are capable of distinguishing between DNS queries coming from inside and outside of the campus network and reply with different list of MX (Mail Exchanger) records. The external hosts always get a list of MX records pointing to the central mail servers while the internal hosts may use different paths for mail exchange within the campus network. A modified version of DNS software has been used at DESY since 1997. It is fully compliant with the original goal of the project and shows good operational performance and reliability

  1. Privacy in the Internet: Myth or reality

    Directory of Open Access Journals (Sweden)

    Mikarić Bratislav

    2016-01-01

    Full Text Available The present time, unthinkable without using Internet - from e-mail, through social networks, cloud services, GPS, to YouTube and mobile computing in business, as well as on a private level, poses a question: Is there a way to protect data and their privacy on the Internet? What are the ways to control what personal information we will publicly share with others and is there a safe way to protect privacy on the world's global computer network? The paper gives an overview of the situation in the field, as well as tips for achieving the desired level of data protection.

  2. Internet Alternatifs

    OpenAIRE

    Dulong de Rosnay , Melanie; Musiani , Francesca

    2015-01-01

    International audience; L'Internet est constitué de différents éléments et couches, qui peuvent être développés, façonnés et organisés de plusieurs manières : le réseau, l'hébergement, les applications, la connexion locale, les contenus. Si le concept de décentralisation est en quelque sorte inscrit dans le principe même de l'Internet – et notamment dans l'organisation de la circulation des flux – son urbanisme actuel semble n'intégrer ce principe que de manière limitée, et certains des risqu...

  3. Spinal cord stimulation for cancer-related pain in adults.

    Science.gov (United States)

    Peng, Lihua; Min, Su; Zejun, Zhou; Wei, Ke; Bennett, Michael I

    2015-06-29

    This is an update of a review first published in The Cochrane Library in Issue 3, 2013. Cancer-related pain places a heavy burden on public health with related high expenditure. Severe pain is associated with a decreased quality of life in patients with cancer. A significant proportion of patients with cancer-related pain are under-treated. There is a need for more effective control of cancer-related pain. Spinal cord stimulation (SCS) may have a role in pain management. The effectiveness and safety of SCS for patients with cancer-related pain is currently unknown. This systematic review evaluated the effectiveness of SCS for cancer-related pain compared with standard care using conventional analgesic medication. We also appraised risk and potential adverse events associated with the use of SCS. This is an update of a review first published in The Cochrane Library in Issue 3, 2013. The search strategy for the update was the same as in the original review. We searched the following bibliographic databases in order to identify relevant studies: the Cochrane Central Register of Controlled Trials (CENTRAL) in The Cochrane Library; MEDLINE; EMBASE; and CBM (Chinese Biomedical Database) in October 2014. We also handsearched relevant journals. There were no language restrictions. We planned to include randomised controlled trials (RCTs) that directly compared SCS with other interventions with regards to the effectiveness of pain management. We also planned to include cross-over trials that compared SCS with another treatment. We planned to identify non-randomised controlled trials but these would only be included if no RCTs could be found. The literature search for the update of this review found 121 potentially eligible articles. The initial search strategy yielded 430 articles. By scrutinising titles and abstracts, we found 412 articles irrelevant to the analytical purpose of this systematic review due to different scopes of diseases or different methods of intervention

  4. Improving Cancer-Related Outcomes with Connected Health - Objective 4

    Science.gov (United States)

    The full benefits of connected health cannot be achieved unless everyone in the United States who wants to participate and the organizations that support health and deliver healthcare have adequate access to high-speed Internet service. Access depends both on the availability of broadband service and the resources needed to obtain and maintain service.

  5. Altered resting brain connectivity in persistent cancer related fatigue

    Directory of Open Access Journals (Sweden)

    Johnson P. Hampson

    2015-01-01

    Full Text Available There is an estimated 3 million women in the US living as breast cancer survivors and persistent cancer related fatigue (PCRF disrupts the lives of an estimated 30% of these women. PCRF is associated with decreased quality of life, decreased sleep quality, impaired cognition and depression. The mechanisms of cancer related fatigue are not well understood; however, preliminary findings indicate dysfunctional activity in the brain as a potential factor. Here we investigate the relationship between PCRF on intrinsic resting state connectivity in this population. Twenty-three age matched breast cancer survivors (15 fatigued and 8 non-fatigued who completed all cancer-related treatments at least 12 weeks prior to the study, were recruited to undergo functional connectivity magnetic resonance imaging (fcMRI. Intrinsic resting state networks were examined with both seed based and independent component analysis methods. Comparisons of brain connectivity patterns between groups as well as correlations with self-reported fatigue symptoms were performed. Fatigued patients displayed greater left inferior parietal lobule to superior frontal gyrus connectivity as compared to non-fatigued patients (P < 0.05 FDR corrected. This enhanced connectivity was associated with increased physical fatigue (P = 0.04, r = 0.52 and poor sleep quality (P = 0.04, r = 0.52 in the fatigued group. In contrast greater connectivity in the non-fatigued group was found between the right precuneus to the periaqueductal gray as well as the left IPL to subgenual cortex (P < 0.05 FDR corrected. Mental fatigue scores were associated with greater default mode network (DMN connectivity to the superior frontal gyrus (P = 0.05 FDR corrected among fatigued subjects (r = 0.82 and less connectivity in the non-fatigued group (r = −0.88. These findings indicate that there is enhanced intrinsic DMN connectivity to the frontal gyrus in breast cancer survivors with persistent

  6. Supervised exercise reduces cancer-related fatigue: a systematic review

    Directory of Open Access Journals (Sweden)

    José F Meneses-Echávez

    2015-01-01

    Full Text Available Question: Does supervised physical activity reduce cancer-related fatigue? Design: Systematic review with meta-analysis of randomised trials. Participants: People diagnosed with any type of cancer, without restriction to a particular stage of diagnosis or treatment. Intervention: Supervised physical activity interventions (eg, aerobic, resistance and stretching exercise, defined as any planned or structured body movement causing an increase in energy expenditure, designed to maintain or enhance health-related outcomes, and performed with systematic frequency, intensity and duration. Outcome measures: The primary outcome measure was fatigue. Secondary outcomes were physical and functional wellbeing assessed using the Functional Assessment of Cancer Therapy Fatigue Scale, European Organisation for Research and Treatment of Cancer Quality of Life Questionnaire, Piper Fatigue Scale, Schwartz Cancer Fatigue Scale and the Multidimensional Fatigue Inventory. Methodological quality, including risk of bias of the studies, was evaluated using the PEDro Scale. Results: Eleven studies involving 1530 participants were included in the review. The assessment of quality showed a mean score of 6.5 (SD 1.1, indicating a low overall risk of bias. The pooled effect on fatigue, calculated as a standardised mean difference (SMD using a random-effects model, was –1.69 (95% CI –2.99 to –0.39. Beneficial reductions in fatigue were also found with combined aerobic and resistance training with supervision (SMD = –0.41, 95% CI –0.70 to –0.13 and with combined aerobic, resistance and stretching training with supervision (SMD = –0.67, 95% CI –1.17 to –0.17. Conclusion: Supervised physical activity interventions reduce cancer-related fatigue. These findings suggest that combined aerobic and resistance exercise regimens with or without stretching should be included as part of rehabilitation programs for people who have been diagnosed with cancer

  7. Who's talking about breast cancer? Analysis of daily breast cancer posts on the internet.

    Science.gov (United States)

    Quinn, Edel M; Corrigan, Mark A; McHugh, Seamus M; Murphy, David; O'Mullane, John; Hill, Arnold D; Redmond, Henry Paul

    2013-02-01

    Breast cancer is the cancer most commonly searched for on the internet. Our aim was to assess daily new breast cancer related posting on the internet. We analyzed numbers of new daily posts for common cancers for one month and subsequently analyzed content of 1426 breast cancer related posts. We also assessed use of online discussion forums for breast cancer related dialogue. Breast related topics had significantly more posts per day compared to others (mean 66.7, p Anonymous posts were common (55%) and less likely to be accurate (p internet has become a primary forum within which health information, particularly relating to breast cancer, is both sought and shared. Increasingly information is provided by patients themselves. Copyright © 2012 Elsevier Ltd. All rights reserved.

  8. Basic research on cancer related to radiation associated medical researches

    International Nuclear Information System (INIS)

    Lee, Jong In; Hwang, Dae Yong; Bang, Ho Yoon

    2000-12-01

    Basic Research on Cancer related to Radiation Associated Medical Researches including 1. Establishment of animal model of colorectal cancer liver metastasis and measurement of angiogenesis, 2. Tissue expression of Tie-1 and Tie-2 in human colorectal cancer, 3. Enhancement of G2/Mphase Cell Fraction by Adenovirus-mediated p53 Gene Transfer in Ovarian Cancer Cell Lines, 4. Clinical Characteristics of the patients with Non-B Non-C Hepatocellular Carcinoma and Frequency of HBV, HCV and TTV Viremia in these Patients, 5. Significance of serum iron and ferritin in patients with stomach cancer, 6. Telomerase assay for early detection of lung cancer, 7. Study on the Usefulness of Aldehyde dehydrogenase-2 Genotyping for Risk Group of Alcohol-related Cancer Screening, 8. Gene therapy using hepatoma specific promoter, 9. Study on the Influence of DNA repair gene, XRCC1 Genotypes on the Risk of Head and Neck Cancer were performed

  9. Lymphoedema management in breast cancer-related lymphoedema.

    Science.gov (United States)

    Jones, Joanne

    2013-04-01

    Due to developments in diagnosis and treatment of breast cancer, survival rates are rising. This leads to a population of mainly women, who also experience breast cancer-related lymphoedema (BCRL). Long after the cancer has been treated, lymphoedema persists at a time when individuals have returned to work. Large limb volumes can present a problem to these individuals and innovative treatments are needed, in order to retain as much normality as possible and reduce excessive limb volumes that patients can experience with lymphoedema long after treatment. It is also important that these treatments do not disrupt daily living and, for some, work-life balance. With the introduction of wrap around compression systems and collaborative working with the patient, it is possible to achieve an acceptable outcome to those patients with these issues. This approach leads to patient satisfaction and stabilisation of limb volume to within acceptable limits for these patients, in conjunction with the therapist.

  10. Basic research on cancer related to radiation associated medical researches

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jong In; Hwang, Dae Yong; Bang, Ho Yoon [and others

    2000-12-01

    Basic Research on Cancer related to Radiation Associated Medical Researches including 1. Establishment of animal model of colorectal cancer liver metastasis and measurement of angiogenesis, 2. Tissue expression of Tie-1 and Tie-2 in human colorectal cancer, 3. Enhancement of G2/Mphase Cell Fraction by Adenovirus-mediated p53 Gene Transfer in Ovarian Cancer Cell Lines, 4. Clinical Characteristics of the patients with Non-B Non-C Hepatocellular Carcinoma and Frequency of HBV, HCV and TTV Viremia in these Patients, 5. Significance of serum iron and ferritin in patients with stomach cancer, 6. Telomerase assay for early detection of lung cancer, 7. Study on the Usefulness of Aldehyde dehydrogenase-2 Genotyping for Risk Group of Alcohol-related Cancer Screening, 8. Gene therapy using hepatoma specific promoter, 9. Study on the Influence of DNA repair gene, XRCC1 Genotypes on the Risk of Head and Neck Cancer were performed.

  11. XMRV Discovery and Prostate Cancer-Related Research

    Directory of Open Access Journals (Sweden)

    David E. Kang

    2011-01-01

    Full Text Available Xenotropic murine leukemia virus-related virus (XMRV was first reported in 2006 in a study of human prostate cancer patients with genetic variants of the antiviral enzyme, RNase L. Subsequent investigations in North America, Europe, Asia, and Africa have either observed or failed to detect XMRV in patients (prostate cancer, chronic fatigue syndrome-myalgic encephalomyelitis (CFS-ME, and immunosuppressed with respiratory tract infections or normal, healthy, control individuals. The principal confounding factors are the near ubiquitous presence of mouse-derived reagents, antibodies and cells, and often XMRV itself, in laboratories. XMRV infects and replicates well in many human cell lines, but especially in certain prostate cancer cell lines. XMRV also traffics to prostate in a nonhuman primate model of infection. Here, we will review the discovery of XMRV and then focus on prostate cancer-related research involving this intriguing virus.

  12. Cancer related fatigue: implementing guidelines for optimal management.

    Science.gov (United States)

    Pearson, Elizabeth J M; Morris, Meg E; McKinstry, Carol E

    2017-07-18

    Cancer-related fatigue (CRF) is a key concern for people living with cancer and can impair physical functioning and activities of daily living. Evidence-based guidelines for CRF are available, yet inconsistently implemented globally. This study aimed to identify barriers and enablers to applying a cancer fatigue guideline and to derive implementation strategies. A mixed-method study explored the feasibility of implementing the CRF guideline developed by the Canadian Association for Psychosocial Oncology (CAPO). Health professionals, managers and consumers from different practice settings participated in a modified Delphi study with two survey rounds. A reference group informed the design of the study including the surveys. The first round focused on guideline characteristics, compatibility with current practice and experience, and behaviour change. The second survey built upon and triangulated the first round. Forty-five health practitioners and managers, and 68 cancer survivors completed the surveys. More than 75% of participants endorsed the CAPO cancer related fatigue guidelines. Some respondents perceived a lack of resources for accessible and expert fatigue management services. Further barriers to guideline implementation included complexity, limited practical details for some elements, and lack of clinical tools such as assessment tools or patient education materials. Recommendations to enhance guideline applicability centred around four main themes: (1) balancing the level of detail in the CAPO guideline with ease of use, (2) defining roles of different professional disciplines in CRF management, (3) how best to integrate CRF management into policy and practice, (4) how best to ensure a consumer-focused approach to CRF management. Translating current knowledge on optimal management of CRF into clinical practice can be enhanced by the adoption of valid guidelines. This study indicates that it is feasible to adopt the CAPO guidelines. Clinical application may

  13. INTERNET ADVERTISING: A PRIMER

    OpenAIRE

    Matthew N. O. Sadiku*, Shumon Alam, Sarhan M. Musa

    2017-01-01

    Internet advertising (IA) is using the Internet to market products and services to a large audience. In the current era of Internet commerce, companies have chosen to use Internet advertising and the trend is irreversible. The goal of Internet advertising is to drive customers to your website. Understanding some key concepts of Internet advertising is crucial to creating a strategy that will suit one’s business. This paper provides a brief introduction to Internet or online advertising.

  14. Internet utilization by radiation oncology patients

    International Nuclear Information System (INIS)

    Metz, J.M.; Devine, P.; DeNittis, A.; Stambaugh, M.; Jones, H.; Goldwein, J.; Whittington, R.

    2001-01-01

    Purpose: Studies describing the use of the Internet by radiation oncology patients are lacking. This multi-institutional study of cancer patients presenting to academic (AC), community (CO) and veterans (VA) radiation oncology centers was designed to analyze the use of the Internet, predictive factors for utilization, and barriers to access to the Internet. Materials and Methods: A questionnaire evaluating the use of the Internet was administered to 921 consecutive patients presenting to radiation oncology departments at AC, CO and VA Medical Centers. The study included 436 AC patients (47%), 284 CO patients (31%), and 201 VA patients (22%). A computer was available at home to 427 patients (46%) and 337 patients (37%) had Email access. The mean age of the patient population was 64 years (range=14-93). Males represented 70% of the patient population. The most common diagnoses included prostate cancer (33%), breast cancer (13%), and lung cancer (11%). Results: Overall, 265/921 patients (29%) were using the Internet to find cancer related information. The Internet was used by 42% of AC patients, 25% of CO patients and only 5% of VA patients (p<.0001). A computer was available at home in 62% AC vs. 45% CO vs. 12% VA patients (p<.0001). Patients < 60 years were much more likely to use the Internet than older patients (p<.0001). Most of the Internet users considered the information either very reliable (22%) or somewhat reliable (70%). Most patients were looking for information regarding treatment of their cancer (90%), management of side effects of treatment (74%), alternative/complementary treatments (65%) and clinical trials (51%). Unconventional medical therapies were purchased over the Internet by 12% of computer users. Products or services for the treatment or management of cancer were purchased online by 12% of Internet users. Conclusion: A significant number of cancer patients seen in radiation oncology departments at academic and community medical centers

  15. The impact of the Internet on cancer outcomes.

    Science.gov (United States)

    Eysenbach, Gunther

    2003-01-01

    Each day, more than 12.5 million health-related computer searches are conducted on the World Wide Web. Based on a meta-analysis of 24 published surveys, the author estimates that in the developed world, about 39% of persons with cancer are using the Internet, and approximately 2.3 million persons living with cancer worldwide are online. In addition, 15% to 20% of persons with cancer use the Internet "indirectly" through family and friends. Based on a comprehensive review of the literature, the available evidence on how persons with cancer are using the Internet and the effect of Internet use on persons with cancer is summarized. The author distinguishes four areas of Internet use: communication (electronic mail), community (virtual support groups), content (health information on the World Wide Web), and e-commerce. A conceptual framework summarizing the factors involved in a possible link between Internet use and cancer outcomes is presented, and future areas for research are highlighted.

  16. Internet Telephony

    OpenAIRE

    Perri, Richard.

    1999-01-01

    During the mid 90s, data and voice began to merge, propelled by advances in compression technology. The ubiquity of routed Internet Protocol (IP) networks, and the desire to trim telephony costs are the major driving forces of the deployment of Voice over IP (VoIP). One advantage of VoIP technologies is that they leverage existing network resources and dramatically reduce, or major eliminate telephone costs. If there is an existing Wide Area Network (WAN) then VoIP could be employed over the ...

  17. Important update of CERN Mail Services

    CERN Multimedia

    IT Department

    2009-01-01

    The CERN Mail Services are evolving. In the course of June and July 2009, all CERN mailboxes will be updated with a new infrastructure for hosting mailboxes, running Exchange 2007. This update is taking place in order to provide the capacity upgrade for the constantly growing volume of CERN mailboxes. It is also the opportunity to provide a number of improvements to CERN mailboxes: new and improved Outlook Web Access (the web interface used to access your mailbox from a web browser, also known as "webmail"), new features in the Out-of-Office auto-reply assistant, easier spam management... The update will preserve the mailbox configuration and no specific action is required by users. During the next weeks, each mailbox will be individually notified of the upcoming update the day before it takes place. We invite all users to carefully read this notification as it will contain the latest information for this update. The mailbox will be unavailable for a short time during the ni...

  18. Internet dynamics

    Science.gov (United States)

    Lukose, Rajan Mathew

    The World Wide Web and the Internet are rapidly expanding spaces, of great economic and social significance, which offer an opportunity to study many phenomena, often previously inaccessible, on an unprecedented scale and resolution with relative ease. These phenomena are measurable on the scale of tens of millions of users and hundreds of millions of pages. By virtue of nearly complete electronic mediation, it is possible in principle to observe the time and ``spatial'' evolution of nearly all choices and interactions. This cyber-space therefore provides a view into a number of traditional research questions (from many academic disciplines) and creates its own new phenomena accessible for study. Despite its largely self-organized and dynamic nature, a number of robust quantitative regularities are found in the aggregate statistics of interesting and useful quantities. These regularities can be understood with the help of models that draw on ideas from statistical physics as well as other fields such as economics, psychology and decision theory. This thesis develops models that can account for regularities found in the statistics of Internet congestion and user surfing patterns and discusses some practical consequences. practical consequences.

  19. Survey o methods for secure connection to the internet; Internet tono anzenna setsuzoku hoshiki no genjo

    Energy Technology Data Exchange (ETDEWEB)

    Matsui, S

    1994-04-01

    This paper describes a study of a security method of protecting inside network computers against outside miscreants and unwelcome visitors and a control method when these computers are connected with the Internet. In the present Internet, a method to encipher all data cannot be used, so that it is necessary to utilize PEM (Privacy Enhanced Mail) capable of the encipherment and conversion of secret information. For preventing miscreant access by eavesdropping password, one-time password is effective. The most cost-effective method is a firewall system. This system lies between the outside and inside network. By limiting computers that directly communicate with the Internet, control is centralized and inside network Security is protected. If the security of firewall systems is strictly controlled under correct setting, security within the network can be secured even in open networks such as the Internet. 35 refs., 3 figs.

  20. E-mail security: new restriction on attachments

    CERN Multimedia

    The Mail Team

    2006-01-01

    In order to further protect CERN mail users against viruses that spread using malicious files, from 1st March onwards dangerous file types already forbidden as mail attachments will also be forbidden as contents of an archive attachment (.zip and .rar compressed files). More details, including a list of blocked file types, can be found at http://cern.ch/mmmservices/Help/?kbid=171010 The Mail Team

  1. E-mail security: new restriction on attachments

    CERN Multimedia

    The Mail Team

    2006-01-01

    In order to further protect CERN mail users against viruses that spread using malicious files, from 1st March onwards dangerous file types already forbidden as mail attachments will also be forbidden as contents of an archive attachment (.zip and .rar compressed files). More details, including a list of blocked file types, can be found at http://cern.ch/mmmservices/Help/?kbid=171010. The Mail Team

  2. Electronic mail : attitudes, self-efficacy, and effective communication

    OpenAIRE

    Kandies, Jerry T.

    1994-01-01

    The purpose of this study was (a) to investigate the functional use of e-mail in a university setting and the relationship of attitudes toward and self-efficacy with email technology, and (b) to evaluate writing effectiveness in an electronic medium. The study also sought to determine if certain personal characteristics could serve as predictor variables for explaining e-mail use, attitudes toward email, and self-efficacy with e-mail technology. The population of inter...

  3. Internet-Based Communication

    Science.gov (United States)

    Gernsbacher, Morton Ann

    2014-01-01

    Google the question, "How is the Internet changing the way we communicate?," and you will find no shortage of opinions, or fears, about the Internet altering the way we communicate. Although the Internet is not necessarily making communication briefer (neither is the Internet making communication less formal), the Internet is manifesting…

  4. Papayas and Pedagogy: Geographically Dispersed Teams and Internet Self-Efficacy.

    Science.gov (United States)

    O'Malley, Michelle; Kelleher, Tom

    2002-01-01

    Describes how public relations (PR) students' Internet self-efficacy (e-mail, bulletin board system, real-time chat, and Web research) was measured before, immediately after, and 7 weeks after they worked in either geographically dispersed (Kansas and Hawaii) or local (Kansas only) teams to develop a PR issue statement. Finds Internet efficacy…

  5. Symptom report in detecting breast cancer-related lymphedema

    Directory of Open Access Journals (Sweden)

    Fu MR

    2015-10-01

    Full Text Available Mei R Fu,1 Deborah Axelrod,2,3 Charles M Cleland,1 Zeyuan Qiu,4 Amber A Guth,2,3 Robin Kleinman,2 Joan Scagliola,2 Judith Haber1 1College of Nursing, New York University, 2Department of Surgery, NYU School of Medicine, 3NYU Clinical Cancer Center, New York, NY, 4Department of Chemistry and Environmental Science, New Jersey Institute of Technology, Newark, NJ, USA Abstract: Breast cancer-related lymphedema is a syndrome of abnormal swelling coupled with multiple symptoms resulting from obstruction or disruption of the lymphatic system associated with cancer treatment. Research has demonstrated that with increased number of symptoms reported, breast cancer survivors' limb volume increased. Lymphedema symptoms in the affected limb may indicate a latent stage of lymphedema in which changes cannot be detected by objective measures. The latent stage of lymphedema may exist months or years before overt swelling occurs. Symptom report may play an important role in detecting lymphedema in clinical practice. The purposes of this study were to: 1 examine the validity, sensitivity, and specificity of symptoms for detecting breast cancer-related lymphedema and 2 determine the best clinical cutoff point for the count of symptoms that maximized the sum of sensitivity and specificity. Data were collected from 250 women, including healthy female adults, breast cancer survivors with lymphedema, and those at risk for lymphedema. Lymphedema symptoms were assessed using a reliable and valid instrument. Validity, sensitivity, and specificity were evaluated using logistic regression, analysis of variance, and areas under receiver operating characteristic curves. Count of lymphedema symptoms was able to differentiate healthy adults from breast cancer survivors with lymphedema and those at risk for lymphedema. A diagnostic cutoff of three symptoms discriminated breast cancer survivors with lymphedema from healthy women with a sensitivity of 94% and a specificity of 97

  6. Adult recall of tobacco advertising on the Internet.

    Science.gov (United States)

    Hrywna, Mary; Delnevo, Cristine D; Lewis, M Jane

    2007-11-01

    This study examined the prevalence and characteristics of New Jersey adults who reported seeing tobacco products advertised on the Internet and described the means by which these products were advertised. Data were analyzed from the New Jersey Adult Tobacco Survey (NJATS), a repeated, cross-sectional, random-digit-dial telephone survey conducted with a statewide representative sample. We used logistic regression to determine factors associated with recall of tobacco Internet advertising, adjusting for demographics, smoking behavior variables, and receipt of tobacco industry direct mail. Participants included 3,930 adults who completed the 2001 NJATS, 4,004 adults who completed the 2002 survey, and 3,062 adults who completed the 2005 survey. The proportion of adult Internet users reporting exposure to tobacco product advertising on the Internet has increased each year (6.9% in 2001, 15.6% in 2002, 17.8% in 2005). Based on 2005 data, recall of tobacco product advertising on the Internet was higher among males young adults aged 18-24 years, Asians, adults who reported receipt of direct mail advertising, and adults with a postcollege education. In addition, adult Internet users most often reported seeing tobacco products advertised on the Internet via pop-up or banner ads (60.7%), followed by E-mail messages (24.6%), and Web sites (14.9%). Recall of tobacco advertising by Internet users increased between 2001 and 2005 and was particularly high among certain subgroups. An urgent need exists for expanded surveillance of Internet tobacco sales and marketing practices.

  7. Internet Learning In Control Engineering: A Fuzzy Control Course

    DEFF Research Database (Denmark)

    Jantzen, Jan

    2003-01-01

    This educational study is based on a course taught over the Internet for seven years. The objective of the study is to evaluate the didactic method, e-mail tutoring. An average of about 45 students complete the course every year. The course evaluation is based on 42 - 51 student responses...

  8. Impact of the Internet on Academic Performance of Students in ...

    African Journals Online (AJOL)

    was also revealed that Power outage, slow internet speed, lack of computer ... mail, online chat, file transfer, the interlinked Web pages and other documents of the World ..... If cybercafés are provided with wireless access points, it will become ...

  9. Ophthalmology on the information superhighway : An introduction to the internet

    Directory of Open Access Journals (Sweden)

    Prasad Somdutt

    1997-01-01

    Full Text Available Internet, e-mail, world wide web and the information superhighway have fast become part of the modern human vocabulary. How are we as ophthalmologists affected by this revolution and how can we utilise the enormous potential of this revolution? This article provides an overview of the practicalities and possibilities of this new medium.

  10. Internet Adoption Among Lecturers In Ghana\\'s premier University ...

    African Journals Online (AJOL)

    Electronic mail is the most commonly used tool in research whilst educational databases are the most commonly used tools in teaching. Recommendations for making the resource more available included providing broadband Internet access and the government promoting private sector investment. Article Type: Case ...

  11. Internet access and use among Nigerian dental students ...

    African Journals Online (AJOL)

    Objective: The aim of this study was to determine access to internet /e-mail and its usage among Nigerian clinical dental students in year 4 to year 6. Methods: This is a cross-sectional study involving clinical dental students in year 4 to year 6 of the College of Medicine, University of Lagos. Information obtained from the ...

  12. Influence of the Internet on the Sexual Health of University ...

    African Journals Online (AJOL)

    Findings showed that internet exposure, particularly exposure to pornographic sites, e-mailing and on–line chatting had negative effects on the students. For instance, it was noted that these have corrupted the minds of the students (most of who were in their late teens or early twenties) by exciting their curiosity about sex; ...

  13. Poultry Internet

    Science.gov (United States)

    Cheok, Adrian David

    Poultry are one of the most badly treated animals in the modern world. It has been shown that they have high levels of both cognition and feelings, and as a result there has been a recent trend of promoting poultry welfare. There is also a tradition of keeping poultry as pets in some parts of the world. However, in modern cities and societies, it is often difficult to maintain contact with pets, particularly for office workers. We propose and describe a novel cybernetics system to use mobile and Internet technology to improve human-pet interaction. It can also be used for people who are allergic to touching animals and thus cannot stroke them directly. This interaction encompasses both visualization and tactile sensation of real objects.

  14. Internet Astrometry

    Science.gov (United States)

    Caballero, Rafael; Argyle, R. W.

    Amateur astronomers can carry out scientific research in many different ways. Some activities require expensive telescopes, cameras, and often access to dark skies. But those who live in highly polluted areas, or do not have access to very specialized equipment, still have many possibilities; amongst which is using the online resources available from the internet. In this chapter we explore Aladin, Simbad, and VizieR, three resources created and maintained by the Centre de Données astronomiques de Strasbourg (CDS). Although these applications are intended for professional astronomers, they are also freely available for amateurs. They allow us to find and measure old neglected difficult pairs, discover new double stars, and in general have a better understanding of those tiny pairs of points of light that we love to observe, photograph and measure.

  15. PREVALENCE, MECHANISMS, AND MANAGEMENT OF CANCER-RELATED COGNITIVE IMPAIRMENT

    Science.gov (United States)

    Janelsins, Michelle C.; Kesler, Shelli R.; Ahles, Tim A.; Morrow, Gary R.

    2014-01-01

    This review summarizes the current literature on cancer-related cognitive impairment (CRCI) with a focus on prevalence, mechanisms, and possible interventions for CRCI in those who receive adjuvant chemotherapy for non-central nervous system tumors and is primarily focused on breast cancer. CRCI is characterized as deficits in areas of cognition including memory, attention, concentration, and executive function. Development of CRCI can impair quality of life and impact treatment decisions. CRCI is highly prevalent; these problems can be detected in up to 30% of patients prior to chemotherapy; up to 75% of patients report some form of CRCI during treatment, and CRCI is still present in up to 35% of patients many years following completion of treatment. While the trajectory of CRCI is becoming better understood, the mechanisms underlying the development of CRCI are still obscure; however, host characteristics, immune dysfunction, neural toxicity, and genetics may play key roles in the development and trajectory of CRCI. Intervention research is limited, though strategies to maintain function are being studied with promising preliminary findings. This review highlights key research being conducted in these areas, both in patient populations and in animals, which will ultimately result in better understanding and effective treatments for CRCI. PMID:24716504

  16. Traditional Chinese medical comprehensive therapy for cancer-related fatigue.

    Science.gov (United States)

    Yang, Lu; Li, Tian-Tian; Chu, Yu-Ting; Chen, Ke; Tian, Shao-Dan; Chen, Xin-Yi; Yang, Guo-Wang

    2016-01-01

    Cancer-related fatigue (CRF) is a common and one of the most severe symptom in the period of onset, diagnosis, treatment and rehabilitation process of cancer. But there are no confirmed measures to relieve this problem at present. Traditional Chinese medical comprehensive therapy has its advantages in dealing with this condition. Based on the research status of CRF, the following problems have been analyzed and solved: the term of CRF has been defined and recommended, and the definition has been made clear; the disease mechanism is proposed, i.e. healthy qi has been impaired in the long-term disease duration, in the process of surgery, chemotherapy, radiotherapy and biology disturbing; it is clear that the clinical manifestations are related to six Chinese medicine patterns: decreased functioning of the Pi (Spleen) and Wei (Stomach), deficiency of the Pi with dampness retention, deficiency of the Xin (Heart) and Pi, disharmony between the Gan (Liver) and Pi, deficiency of the Pi and Shen (Kidney), and deficiency of the Fei (Lung) and Shen. Based on its severity, the mild patients are advised to have non-drug psychological intervention and sleep treatment in cooperation with appropriate exercise; diet therapy are recommended to moderate patients together with sleep treatment and acupuncture, severe patients are recommended to have herbal treatment based on pattern differentiation together with physiological sleep therapy.

  17. The Impact of a Targeted Training Program on E-Mail System Processing Capabilities and Self-Perception of E-Mail Overload

    Science.gov (United States)

    Einstein, Michael M.

    2014-01-01

    As business e-mail volumes continue to grow and employees spend increasingly larger portions of their day processing e-mail, there is strong evidence of the negative impacts of e-mail processing, especially with respect to e-mail overload. This study sought to determine whether a training program focused on select e-mail features and processing…

  18. Target Marketing and Direct Mail: A Smart Campaign Combination.

    Science.gov (United States)

    Brostoff, Mark J.

    1994-01-01

    Market segmentation is a marketing strategy that helps identify and classify a camp's product or service and determine the needs of a targeted market for the purpose of allocating marketing resources. Offers strategies for defining a target market and discusses the benefits of direct mail, deriving a mailing list, and suggestions for using a…

  19. 20 CFR 638.516 - Laundry, mail, and telephone service.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Laundry, mail, and telephone service. 638.516... PROGRAM UNDER TITLE IV-B OF THE JOB TRAINING PARTNERSHIP ACT Center Operations § 638.516 Laundry, mail, and telephone service. (a) The center operator shall provide adequate laundry services and supplies at...

  20. 76 FR 3679 - Market Test of Marketing Mail Made Easy

    Science.gov (United States)

    2011-01-20

    ... POSTAL REGULATORY COMMISSION [Docket No. MT2011-3; Order No. 649] Market Test of Marketing Mail... recently-filed Postal Service proposal to conduct a 2-year market test involving the sale of Marketing Mail..., 2011. ADDRESSES: Submit comments electronically via the Commission's Filing Online system at http://www...

  1. 9. mail Moskvasse minna ei tohi / Heiki Suurkask

    Index Scriptorium Estoniae

    Suurkask, Heiki, 1972-

    2004-01-01

    Autori arvates tähendaks Eesti Vabariigi presidendi visiit 9. mail Moskvasse sõjaroimarite õigeksmõistmist. Lisa: Kas Eesti president peaks minema 9. mail Moskvasse? Küsimusele vastavad: Heiki Ahonen, Dimitri Klenski, Karmo Tüür

  2. 77 FR 68069 - Outbound International Mailings of Lithium Batteries

    Science.gov (United States)

    2012-11-15

    ... POSTAL SERVICE 39 CFR Part 20 Outbound International Mailings of Lithium Batteries AGENCY: Postal... primary and secondary lithium cells or lithium batteries internationally, or to and from an APO, FPO, or... prohibited the mailing of lithium batteries and cells internationally and when sent to and from any Army Post...

  3. 76 FR 55799 - Outbound International Mailings of Lithium Batteries

    Science.gov (United States)

    2011-09-09

    ... POSTAL SERVICE 39 CFR Part 20 Outbound International Mailings of Lithium Batteries AGENCY: Postal... would incorporate new maximum limits for the outbound mailing of lithium batteries to international, or... equipment with lithium metal or lithium-ion batteries that were to be effective October 3, 2011. These...

  4. 76 FR 53056 - Outbound International Mailings of Lithium Batteries

    Science.gov (United States)

    2011-08-25

    ... POSTAL SERVICE 39 CFR Part 20 Outbound International Mailings of Lithium Batteries AGENCY: Postal... incorporate new maximum limits for the outbound mailing of lithium batteries. This is consistent with [email protected] , with a subject line of ``International Lithium Batteries.'' Faxed comments are not...

  5. 15 CFR 748.2 - Obtaining forms; mailing addresses.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Obtaining forms; mailing addresses... APPLICATIONS (CLASSIFICATION, ADVISORY, AND LICENSE) AND DOCUMENTATION § 748.2 Obtaining forms; mailing addresses. (a) You may obtain the forms required by the EAR from any U.S. Department of Commerce District...

  6. A Discourse Analysis of School Counseling Supervisory E-Mail

    Science.gov (United States)

    Luke, Melissa; Gordon, Cynthia

    2011-01-01

    This article is a discourse analysis of weekly computer-mediated communications between 8 school counseling interns and their e-mail supervisor over a 16-week semester. Course-required e-mail supervision was provided as an adjunct to traditional face-to-face individual and group supervision. School counselor supervisees and supervisor enacted 3…

  7. 76 FR 61947 - Timely Mailing Treated as Timely Filing

    Science.gov (United States)

    2011-10-06

    ... regulations affect taxpayers who mail Federal tax documents to the Internal Revenue Service or the United... DEPARTMENT OF THE TREASURY Internal Revenue Service 26 CFR Part 301 [TD 9543] RIN 1545-BA99 Timely Mailing Treated as Timely Filing AGENCY: Internal Revenue Service, Treasury. ACTION: Correcting amendment...

  8. 76 FR 62607 - Timely Mailing Treated as Timely Filing

    Science.gov (United States)

    2011-10-11

    ... affect taxpayers who mail Federal tax documents to the Internal Revenue service or the United States Tax... DEPARTMENT OF THE TREASURY Internal Revenue Service 26 CFR Part 301 [TD 9543] RIN 1545-BA99 Timely Mailing Treated as Timely Filing AGENCY: Internal Revenue Service (IRS), Treasury. ACTION: Correction to...

  9. Private E-Mail Requests and the Diffusion of Responsibility.

    Science.gov (United States)

    Barron, Greg; Yechiam, Eldad

    2002-01-01

    Discussion of e-mail technology and requesting information from multiple sources simultaneously focuses on an experiment demonstrating that addressing e-mails simultaneously to multiple recipients may actually reduce the number of helpful responses. Discusses diffusion of responsibility and implications for the application of social cueing theory…

  10. E-Mail at Work: Is it Really Private?

    Science.gov (United States)

    Rosenblum, Cindy

    This paper examines the controversy of e-mail privacy in the workplace. Once an employee uses an e-mail system that belongs to the employer, according to recent case law, their privacy rights are forfeited. Employers will now have to start creating policies to safeguard themselves from expensive litigation, and employees will have to be more…

  11. Problem Resolution through Electronic Mail: A Five-Step Model.

    Science.gov (United States)

    Grandgenett, Neal; Grandgenett, Don

    2001-01-01

    Discusses the use of electronic mail within the general resolution and management of administrative problems and emphasizes the need for careful attention to problem definition and clarity of language. Presents a research-based five-step model for the effective use of electronic mail based on experiences at the University of Nebraska at Omaha.…

  12. Gender Differences in Perceived Gratifications Obtained through Electronic Mail

    Science.gov (United States)

    Harper, Vernon B., Jr.; Harper, Erika J.

    2010-01-01

    Electronic mail provides users with unique positive psychological consequences that differentiate it from other media. These consequences or gratifications have been mentioned separately across the electronic mail literature, yet there is no specific measure for these gratifications. The study found that females (M = 7.7; SD = 1.8) achieve higher…

  13. Differences between Males and Females Concerning Perceived Electronic Mail Appropriateness

    Science.gov (United States)

    Harper, Vernon B., Jr.

    2008-01-01

    Electronic mail is one of the most successfully diffused modern communication technologies. Yet, few researchers have investigated whether gender differences exist in perceptions of the types of appropriateness embedded within electronic mail messages. A framework originally created by Wiemann and Backlund (1980) served as the basis for the…

  14. 1 CFR 5.7 - Delivery and mailing.

    Science.gov (United States)

    2010-01-01

    ... 1 General Provisions 1 2010-01-01 2010-01-01 false Delivery and mailing. 5.7 Section 5.7 General Provisions ADMINISTRATIVE COMMITTEE OF THE FEDERAL REGISTER THE FEDERAL REGISTER GENERAL § 5.7 Delivery and mailing. The Government Printing Office shall distribute the Federal Register by delivery or by deposit at...

  15. E-mail communication in pain practice: The importance of being earnest.

    Science.gov (United States)

    Ruiz, Irene Solera; García, Guadalupe Población; Riquelme, Irene

    2014-07-01

    Information technology can play a vital role in meeting patient needs and reinforcing the relationship among patients and their pain physicians. However, strong resistance remains on the medical side to this type of non-frontal care. The primary objective of this study was to assess the effectiveness of an E-mail intervention on customers' satisfaction. The secondary goals were to analyze the messages from patients to their clinician (not only the volume but also the content) and the impact on client, professional and health services outcomes. A prospective, non-randomized evaluation of patients undergoing treatment for chronic pain from September 2011 to May 2012. A private, specialty referral center in Spain. Participants were users visiting the Pain Management Unit evaluated by one physician. The E-mail address of the facility was written in every medical report provided. Patient satisfaction at the end of the 8-month trial period was assessed and outcomes recorded. Patients reported better communication with their therapist and greater satisfaction with overall care. 780 E-mails were read. Specialists received an average of 5 messages per day (standard deviation 0,3). None of them was unsuitable. This is a prospective, single center evaluation performed by one doctor. There was no control group due to ethical considerations. Electronic communication is a cheap, easy and feasible way to address a wide range of concerns, thus enhancing patients' satisfaction. More efforts are needed to implement routinely usage of this tool. If used appropriately, E-mail can facilitate physician-dependent interactions, promote access to care, save time and reduce costs. Concerns about billing, improper utilization, privacy and confidentiality might complicate its introduction and acceptance. Internet access remains a significant barrier to online patient-provider transference.

  16. E-mail communication in pain practice: The importance of being earnest

    Directory of Open Access Journals (Sweden)

    Irene Solera Ruiz

    2014-01-01

    Full Text Available Background: Information technology can play a vital role in meeting patient needs and reinforcing the relationship among patients and their pain physicians. However, strong resistance remains on the medical side to this type of non-frontal care. Objectives: The primary objective of this study was to assess the effectiveness of an E-mail intervention on customers′ satisfaction. The secondary goals were to analyze the messages from patients to their clinician (not only the volume but also the content and the impact on client, professional and health services outcomes. Study Design: A prospective, non-randomized evaluation of patients undergoing treatment for chronic pain from September 2011 to May 2012. Setting: A private, specialty referral center in Spain. Materials and Methods: Participants were users visiting the Pain Management Unit evaluated by one physician. The E-mail address of the facility was written in every medical report provided. Patient satisfaction at the end of the 8-month trial period was assessed and outcomes recorded. Results: Patients reported better communication with their therapist and greater satisfaction with overall care. 780 E-mails were read. Specialists received an average of 5 messages per day (standard deviation 0,3. None of them was unsuitable. Limitations: This is a prospective, single center evaluation performed by one doctor. There was no control group due to ethical considerations. Conclusion s : Electronic communication is a cheap, easy and feasible way to address a wide range of concerns, thus enhancing patients′ satisfaction. More efforts are needed to implement routinely usage of this tool. If used appropriately, E-mail can facilitate physician-dependent interactions, promote access to care, save time and reduce costs. Concerns about billing, improper utilization, privacy and confidentiality might complicate its introduction and acceptance. Internet access remains a significant barrier to online

  17. Randomized Trial of a Social Networking Intervention for Cancer-Related Distress.

    Science.gov (United States)

    Owen, Jason E; O'Carroll Bantum, Erin; Pagano, Ian S; Stanton, Annette

    2017-10-01

    Web and mobile technologies appear to hold promise for delivering evidence-informed and evidence-based intervention to cancer survivors and others living with trauma and other psychological concerns. Health-space.net was developed as a comprehensive online social networking and coping skills training program for cancer survivors living with distress. The purpose of this study was to evaluate the effects of a 12-week social networking intervention on distress, depression, anxiety, vigor, and fatigue in cancer survivors reporting high levels of cancer-related distress. We recruited 347 participants from a local cancer registry and internet, and all were randomized to either a 12-week waiting list control group or to immediate access to the intervention. Intervention participants received secure access to the study website, which provided extensive social networking capabilities and coping skills training exercises facilitated by a professional facilitator. Across time, the prevalence of clinically significant depression symptoms declined from 67 to 34 % in both conditions. The health-space.net intervention had greater declines in fatigue than the waitlist control group, but the intervention did not improve outcomes for depression, trauma-related anxiety symptoms, or overall mood disturbance. For those with more severe levels of anxiety at baseline, greater engagement with the intervention was associated with higher levels of symptom reduction over time. The intervention resulted in small but significant effects on fatigue but not other primary or secondary outcomes. Results suggest that this social networking intervention may be most effective for those who have distress that is not associated with high levels of anxiety symptoms or very poor overall psychological functioning. The trial was registered with the ClinicalTrials.gov database ( ClinicalTrials.gov #NCT01976949).

  18. 75 FR 76282 - Domestic Shipping Services Pricing and Mailing Standards Changes

    Science.gov (United States)

    2010-12-08

    ... United States Postal Service, Domestic Mail Manual (DMM[reg]), to reflect changes to prices and mailing standards for the following Shipping Services: Express Mail[reg], Priority Mail[reg], Parcel Select[reg... following changes to Mailing Standards of the United States Postal Service, Domestic Mail Manual (DMM...

  19. Current experiences with internet telepathology and possible evolution in the next generation of Internet services.

    Science.gov (United States)

    Della Mea, V; Beltrami, C A

    2000-01-01

    The last five years experience has definitely demonstrated the possible applications of the Internet for telepathology. They may be listed as follows: (a) teleconsultation via multimedia e-mail; (b) teleconsultation via web-based tools; (c) distant education by means of World Wide Web; (d) virtual microscope management through Web and Java interfaces; (e) real-time consultations through Internet-based videoconferencing. Such applications have led to the recognition of some important limits of the Internet, when dealing with telemedicine: (i) no guarantees on the quality of service (QoS); (ii) inadequate security and privacy; (iii) for some countries, low bandwidth and thus low responsiveness for real-time applications. Currently, there are several innovations in the world of the Internet. Different initiatives have been aimed at an amelioration of the Internet protocols, in order to have quality of service, multimedia support, security and other advanced services, together with greater bandwidth. The forthcoming Internet improvements, although induced by electronic commerce, video on demand, and other commercial needs, are of real interest also for telemedicine, because they solve the limits currently slowing down the use of Internet. When such new services will be available, telepathology applications may switch from research to daily practice in a fast way.

  20. Internet Usage Habits and Internet Usage in Educational Studies of Vocational School Students

    Directory of Open Access Journals (Sweden)

    Zehra Deniz Yakıncı

    2018-04-01

    Full Text Available Internet is the easiest way to access information. It provides positive contributions to individual and surroundings, in learning and information era. At this point the answers of the questions: ‘How do young people use internet and how much do they use internet for their education?’ come into prominence. In order to find the answers; a questionnaire prepared by resarchers and Young Internet Addiction Test- Short Form (YIAT-SF was used on ‘Health Services Vocational High School’ students, in this study. 3.4 % of students were found to have internet addiction and the average internet usage was found to be 5 hours daily. When students were asked to enumerate the internet sites they use, the result was: social media, news sites, movie and series sites, educational and informational content sites, play sites, e-mail, shopping sites, and sexual content sites in order of usage preferance. While social media was preferred by 79.4% in the first place, educational content sites were determined to be preferred by 5.7% in the first place among others. The second most frequently used sites by students were movies and series (22.8%. Educational / informational content (20.2 % sites were the fifth preferred sites in the preference order.

  1. Analysis of E-mail Transactions in Virtual Reference Services

    Directory of Open Access Journals (Sweden)

    Astutik Nur Qomariyah

    2016-01-01

    Full Text Available Today, the use of traditional reference desk in the academic libraries has been rarely used, thus expanding or even move to a virtual reference service. A minimum level of virtual reference services are provided in the academic library is currently in general is the electronic mail (e-mail. One of the academic library specifically provide virtual reference services via e-mail is a Petra Christian University (PCU Library (ref-desk@petra.ac.id.. In such services librarians provide assistance to users in finding information and answer questions. This study aimed to analyze the transaction reference services virtually through e-mail at the PCU Library, with a view of the types of questions based on user background, the writing style of language communication interaction used based on user background, and cultural values are revealed behind the user in virtual reference services (e-mail. This study uses content analysis (content analysis of the transcript e-mail received librarians of reference services began March 10 until June 16, 2015. The results showed that the types of questions asked in reference service virtual (e-mail in the Library UK Petra include: specific search, access online resources, operation of online resources, policies and procedures for services, and library holdings with background the student (PCU and non-PCU, faculty, and librarians. Based on the background of users found that overall more types of questions asked in virtual reference services (e-mail is a problem of access to online resources, and generally submitted by the students. Then, the writing style of the user's language in interaction reference service virtual (e-mail tends to be formal, which includes the word greeting, the message will be delivered, and regards cover, either by the student (PCU and non-PCU, lecturer, or librarians. While cultural values that revealed the background behind the user in virtual reference services (e-mail is obedience, courtesy and

  2. Classification of Cancer-related Death Certificates using Machine Learning

    Directory of Open Access Journals (Sweden)

    Luke Butt

    2013-05-01

    Full Text Available BackgroundCancer monitoring and prevention relies on the critical aspect of timely notification of cancer cases. However, the abstraction and classification of cancer from the free-text of pathology reports and other relevant documents, such as death certificates, exist as complex and time-consuming activities.AimsIn this paper, approaches for the automatic detection of notifiable cancer cases as the cause of death from free-text death certificates supplied to Cancer Registries are investigated.Method A number of machine learning classifiers were studied. Features were extracted using natural language techniques and the Medtex toolkit. The numerous features encompassed stemmed words, bi-grams, and concepts from the SNOMED CT medical terminology. The baseline consisted of a keyword spotter using keywords extracted from the long description of ICD-10 cancer related codes.ResultsDeath certificates with notifiable cancer listed as the cause of death can be effectively identified with the methods studied in this paper. A Support Vector Machine (SVM classifier achieved best performance with an overall F-measure of 0.9866 when evaluated on a set of 5,000 free-text death certificates using the token stem feature set. The SNOMED CT concept plus token stem feature set reached the lowest variance (0.0032 and false negative rate (0.0297 while achieving an F-measure of 0.9864. The SVM classifier accounts for the first 18 of the top 40 evaluated runs, and entails the most robust classifier with a variance of 0.001141, half the variance of the other classifiers.ConclusionThe selection of features significantly produced the most influences on the performance of the classifiers, although the type of classifier employed also affects performance. In contrast, the feature weighting schema created a negligible effect on performance. Specifically, it is found that stemmed tokens with or without SNOMED CT concepts create the most effective feature when combined with

  3. Projecting productivity losses for cancer-related mortality 2011 - 2030.

    Science.gov (United States)

    Pearce, Alison; Bradley, Cathy; Hanly, Paul; O'Neill, Ciaran; Thomas, Audrey Alforque; Molcho, Michal; Sharp, Linda

    2016-10-18

    When individuals stop working due to cancer this represents a loss to society - the loss of productivity. The aim of this analysis was to estimate productivity losses associated with premature mortality from all adult cancers and from the 20 highest mortality adult cancers in Ireland in 2011, and project these losses until 2030. An incidence-based method was used to estimate the cost of cancer deaths between 2011 and 2030 using the Human Capital Approach. National data were used for cancer, population and economic inputs. Both paid work and unpaid household activities were included. Sensitivity analyses estimated the impact of assumptions around future cancer mortality rates, retirement ages, value of unpaid work, wage growth and discounting. The 233,000 projected deaths from all invasive cancers in Ireland between 2011 and 2030 will result in lost productivity valued at €73 billion; €13 billion in paid work and €60 billion in household activities. These losses represent approximately 1.4 % of Ireland's GDP annually. The most costly cancers are lung (€14.4 billion), colorectal and breast cancer (€8.3 billion each). However, when viewed as productivity losses per cancer death, testis (€364,000 per death), cervix (€155,000 per death) and brain cancer (€136,000 per death) are most costly because they affect working age individuals. An annual 1 % reduction in mortality reduces productivity losses due to all invasive cancers by €8.5 billion over 20 years. Society incurs substantial losses in productivity as a result of cancer-related mortality, particularly when household production is included. These estimates provide valuable evidence to inform resource allocation decisions in cancer prevention and control.

  4. 76 FR 17787 - Market Dominant Negotiated Service Agreement (NSA) for First-Class Mail and Standard Mail

    Science.gov (United States)

    2011-03-31

    ... POSTAL SERVICE 39 CFR Part 111 Market Dominant Negotiated Service Agreement (NSA) for First- Class....1, to establish a new Negotiated Service Agreement (NSA) Market Dominant product for First-Class... Gifford at 202-268-8082. SUPPLEMENTARY INFORMATION: This new NSA for First-Class Mail and Standard Mail is...

  5. [Information exchange via internet--possibilities, limits, future].

    Science.gov (United States)

    Schmiedl, S; Geishauser, M; Klöppel, M; Biemer, E

    1998-01-01

    Today, the exchange of information in the Internet is dominated by the WWW and e-mail. Discussion groups like mailing lists and newsgroups also permit communication in groups. Information retrieval becomes a crucial challenge in using the Internet. In the field of medicine, three more aspects are of special importance: privacy, legal requirements, and the necessity of transferring large amounts of data. For these problems, today's Internet doesn't provide a sufficient solution yet. Future developments will not only improve the existing services, but also lead to fundamental changes in the transfer technologies: Safer data transfer is to be ensured by new encrypting software together with the planned transfer protocol IPv6. Introducing the new transfer mode ATM will lead to better and resource saving transmission. Computer, telephone and TV networks will grow together, resulting in convergence of media.

  6. Medical teleconference about thoracic surgery using free Internet software.

    Science.gov (United States)

    Obuchi, Toshiro; Shiono, Hiroyuki; Shimada, Junichi; Kaga, Kichizo; Kurihara, Masatoshi; Iwasaki, Akinori

    2011-11-01

    Surgical teleconferences using advanced academic networks are becoming common; however, reports regarding Internet teleconferencing using free software packages such as Skype, USTREAM, and Dropbox are very rare. Teleconferences concerning mainly surgical techniques were held five times between Fukuoka University Hospital and other institutions from April to September 2010. These teleconferences used Skype and USTREAM as videophones to establish communication. Both PowerPoint presentations and surgical videos were made. These presentation files were previously sent to all stations via mail, e-mail, or Dropbox, and shared. A slide-show was simultaneously performed following the presenter's cue in each station. All teleconferences were successfully completed, even though there were minor instances of the Skype link being broken for unknown reasons during the telecommunication. Internet surgical teleconferences using ordinary software are therefore considered to be sufficiently feasible. This method will become more convenient and common as the Internet environments advance.

  7. INTERNET & INTRANET

    Institute of Scientific and Technical Information of China (English)

    刘硬

    1999-01-01

    <正> 一、什么是INTERNET,INTRANET 说起INTERNET大家都知道它是我们平时接触最多的国际互联网。而INTRANET是最近两年才发展起来的新事物,被企业界称为企业内部网。 INTERNET是一组全球范围内信息资源的名字。这些资源非常巨大,不是一般人所能想象的。它于20世纪70年代创建。他们从一称为ARPANET的网络开始,是由美国国防部发起的用于军事情报的调查与军队之间的联络。原来的ARPANET早已被扩展与替代了,今天它已成为我们所说的INTERNET的全球主干网。

  8. Cancer-Related Post-traumatic Stress (PDQ®)—Patient Version

    Science.gov (United States)

    Cancer-related post-traumatic stress can occur any time from diagnosis to after treatment ends. Shock, fear, helplessness, or horror can be felt by cancer patients and lead to cancer-related post-traumatic stress. Learn about the causes and ways doctors can help manage these symptoms of distress in this expert-reviewed summary.

  9. Internet addiction or excessive internet use.

    Science.gov (United States)

    Weinstein, Aviv; Lejoyeux, Michel

    2010-09-01

    Problematic Internet addiction or excessive Internet use is characterized by excessive or poorly controlled preoccupations, urges, or behaviors regarding computer use and Internet access that lead to impairment or distress. Currently, there is no recognition of internet addiction within the spectrum of addictive disorders and, therefore, no corresponding diagnosis. It has, however, been proposed for inclusion in the next version of the Diagnostic and Statistical Manual of Mental Disorder (DSM). To review the literature on Internet addiction over the topics of diagnosis, phenomenology, epidemiology, and treatment. Review of published literature between 2000-2009 in Medline and PubMed using the term "internet addiction. Surveys in the United States and Europe have indicated prevalence rate between 1.5% and 8.2%, although the diagnostic criteria and assessment questionnaires used for diagnosis vary between countries. Cross-sectional studies on samples of patients report high comorbidity of Internet addiction with psychiatric disorders, especially affective disorders (including depression), anxiety disorders (generalized anxiety disorder, social anxiety disorder), and attention deficit hyperactivity disorder (ADHD). Several factors are predictive of problematic Internet use, including personality traits, parenting and familial factors, alcohol use, and social anxiety. Although Internet-addicted individuals have difficulty suppressing their excessive online behaviors in real life, little is known about the patho-physiological and cognitive mechanisms responsible for Internet addiction. Due to the lack of methodologically adequate research, it is currently impossible to recommend any evidence-based treatment of Internet addiction.

  10. Save our inboxes! Use e-mail wisely

    CERN Multimedia

    Achintya Rao

    2013-01-01

    At CERN, with collaborators all over the world, e-mail is inevitably the primary means of communication: we use it for everything from coordinating projects to organising lunches. But e-mail can also be one of the most inefficient means of communication we have! Here's how to fix it.   Let’s get straight to the point: we receive too many e-mails. Think about all the e-mails that you deleted without a second thought. Think about the times you’ve unnecessarily been in CC. Take a look at the unread e-mails sitting in your inbox at this very moment, ones that you have no intention of ever looking at. You can, however, tame this overload with a few simple measures and turn e-mail into an important communication and productivity tool. Many recommendations for improving e-mail etiquette suggest an abrasive approach riddled with bullet points. In a vastly multi-cultural setting such as CERN, however this approach may fail. So, here are a few dos and don’ts based o...

  11. Responsible Internet Use.

    Science.gov (United States)

    Truett, Carol; And Others

    1997-01-01

    Provides advice for making school Internet-use guidelines. Outlines responsible proactive use of the Internet for educators and librarians, discusses strengths and weaknesses of Internet blocking software and rating systems, and describes acceptable-use policies (AUP). Lists resources for creating your own AUP, Internet filtering software, and…

  12. The Internet and tourism

    OpenAIRE

    Verner, Zbyněk

    2012-01-01

    This work concentrates on Internet and its influence on tourism. It describes history of Internet, tourism and interactions among them. Next this work deals with the newest trends of Internet and their influence on tourism. Last but not least, it analyzes the influence of Internet on demand in tourism in Czech Republic.

  13. Internet Addiction among Adolescence

    Science.gov (United States)

    Sargin, Nurten

    2012-01-01

    Each innovation brings along many risks. One of the risks related with the Internet use is Internet addiction. The aim of this study is to examine Internet addiction in adolescence in terms of gender, Internet access at home and grades. The research design used was survey method. The study population consisted of second stage students attending…

  14. Internet Economics IV

    Science.gov (United States)

    2004-08-01

    edts.): Internet Economics IV Technical Report No. 2004-04, August 2004 Information Systems Laboratory IIS, Departement of Computer Science University of...level agreements (SLA), Information technology (IT), Internet address, Internet service provider 16. PRICE CODE 17. SECURITY CLASSIFICATION 18... technology and its economic impacts in the Internet world today. The second talk addresses the area of AAA protocol, summarizing authentication

  15. Psychological barriers to Internet usage among older adults in the UK.

    Science.gov (United States)

    Adams, Nichola; Stubbs, David; Woods, Valerie

    2005-03-01

    The Internet is an important tool in assisting the older population to lead independent and social lives. However, the majority of Internet users are under 55. This study investigated the following psychological barriers to Internet use by older adults: perceived usefulness, perceived ease of use, Internet efficacy, perceived complexity of navigation and perceived complexity of terminology. Twenty-three subjects (aged 55 - 75 years) were interviewed in the UK. The influences of age, computer and Internet experience, and training on these psychological barriers were explored. The results showed that the majority of the older adults who had a positive perception of usefulness, ease of use, and efficacy of the Internet or e-mail, used the Internet or e-mail more often. In addition, it was found that computer or Internet experience increased perceptions of ease of use and efficacy of the Internet and reduced perceived complexity of navigation. There was no difference between the two age groups (55 - 65 and 66 - 75 years) in these psychological barriers. It was concluded that increased marketing of the Internet (aimed at the older user), more simple and uniformly designed Internet pages, more user-friendly online help and error message terminology, and increased provision of training for the older user would assist uptake of the World Wide Web.

  16. Did Your Mailed Ballot Count: The Unrecognized Unreliability of Voting By Mail

    Directory of Open Access Journals (Sweden)

    Alec Yasinsac

    2012-10-01

    Full Text Available Voting By Mail (VBM was developed to support absentee voters. It was originally intended to handle canonical absentee voters who now fall under the Uniformed and Overseas Citizens Voting Act (UOCAVA and those with legally acceptable reasons for being unable to appear at the polls on Election Day. Its use slowly expanded to more casual justifications, such as those with planned Election Day travel. More recently, there has been a trend of further expansion to on-demand VBM in many states. As a result, the percentage of VBM ballots has skyrocketed, with little research regarding its impacts on security, privacy, reliability, and accuracy on U. S. elections. In virtually every close election, the outcome must await tabulation of VBM ballots. Yet, VBM may be the least reliable voting approach in wide spread use today. Vote By Mail fraud is recognized by some as possibly the single greatest security vulnerability in U. S. elections. The lack of in-person, at-the-polls accountability makes absentee ballots the tool of choice for those inclined to commit fraud," the Florida Department of Law Enforcement concluded in 1998, after a mayoral election in Miami was thrown out when officials learned that "vote brokers" had signed hundreds of phony absentee ballots.1 Conversely, others recognize theoretical weaknesses in VBM, but generally dismiss its practical impact [1, 2]. Others continue to promote VBM expansion [3, 4]. In this paper, we identify inherent, widespread vulnerability in VBM systems and illustrate their practical impact with numerous examples. We show specifically why VBM systems are not auditable and demonstrate how their unreliability can negatively impact real elections.

  17. Internet-kulttuuri nykytaiteessa

    OpenAIRE

    Höyssä, Timo

    2016-01-01

    Internet-kulttuuri nykytaiteessa Tutkimuksessa tarkastellaan internet-taiteen historiaa ja nykyisiä esityskäytäntöjä sekä sitä miten globaali internet-kulttuuri on muokannut nykytaidetta sekä galleriassa että webissä. Tutkimuksessa kysytään miten internetin kehitys on vaikuttanut internet-taiteeseen sekä post-internet-taiteen syntyyn? Mikä on internetin paikka nykytaiteessa sekä populaarikulttuurissa? Internet culture in contemporary art A study on the history of Internet art and it’...

  18. Analysis of E-mail Transactions in Virtual Reference Services

    Directory of Open Access Journals (Sweden)

    Astutik Nur Qomariyah

    2018-01-01

    Full Text Available Today, the use of traditional reference desk in the academic libraries has been rarely used, thus expanding or even move to a virtual reference service. A minimum level of virtual reference services are provided in the academic library is currently in general is the electronic mail (e-mail. One of the academic library specifically provide virtual reference services via e-mail is a Petra Christian University (PCU Library (refdesk@petra.ac.id.. In such services librarians provide assistance to users in finding information and answer questions. This study aimed to analyze the transaction reference services virtually through e-mail at the PCU Library, with a view of the types of questions based on user background, the writing style of language communication interaction used based on user background, and cultural values are revealed behind the user in virtual reference services (e-mail. This study uses content analysis (content analysis of the transcript e-mail received librarians of reference services began March 10 until June 16, 2015. The results showed that the types of questions asked in reference service virtual (e-mail in the Library UK Petra include: specific search, access online resources, operation of online resources, policies and procedures for services, and library holdings with background the student (PCU and non-PCU, faculty, and librarians. Based on the background of users found that overall more types of questions asked in virtual reference services (e-mail is a problem of access to online resources, and generally submitted by the students. Then, the writing style of the user's language in interaction reference service virtual (e-mail tends to be formal, which includes the word greeting, the message will be delivered, and regards cover, either by the student (PCU and non-PCU, lecturer, or librarians. While cultural values that revealed the background behind the user in virtual reference services (e-mail is obedience, courtesy and

  19. Direct e-mail marketing: Case of Serbia

    Directory of Open Access Journals (Sweden)

    Končar Jelena A.

    2005-01-01

    Full Text Available Direct e-mail marketing refers to approaching customers directly, without employing intermediaries. It represents a direct mode of communication with the target population, which affects the creation of stronger and more loyal relationships with prospective customers, compared to traditional direct marketing resources (TV, radio, print and advertising panels, etc. The main goal of direct e-mail marketing is building long-term "one to one" relationships with current and prospective customers. Direct e-mail marketing is not aimed at momentary sale, but at boosting certain product preferences due to the engagement of numerous electronic media.

  20. Self-esteem, interpersonal risk, and preference for e-mail to face-to-face communication.

    Science.gov (United States)

    Joinson, Adam N

    2004-08-01

    The media choices made by high and low self-esteem Internet users were studied using web-based methodology (n = 265). Participants were asked to rank four media (face-to-face, e-mail, letter, and telephone) in order of preference across four different communication scenarios designed to pose an interpersonal risk. The level of interpersonal risk posed by two of the scenarios (asking for a pay rise and asking for a date) were also experimentally manipulated by randomly allocating participants to a 25%, 50%, or 75% chance of rejection. Low self-esteem users (LSE) showed a significant preference toward e-mail communication compared to high self-esteem users (HSE). This pattern was reversed for face-to-face preferences. Similarly, a greater chance of rejection in a scenario led to e-mail being preferred to face-to-face communication. The results are discussed in light of both the strategic use of different media and the motivated Internet user.

  1. Trends in Internet Marketing

    OpenAIRE

    Panchanathan, Nitin

    2005-01-01

    Internet marketing involves the usage of the Internet to market and sell goods or services. In this thesis we wished to seek answers for the following questions with the help of web, email surveys taking into consideration consumer perspective, company perspective and 3rd party internet marketing agency perspective. Our survey sample was based on a small set of companies, consumers and internet marketing agencies. The survey results helped us in predicting the trends in internet marketing. We...

  2. Internet - a resource for nuclear utilities

    International Nuclear Information System (INIS)

    Slone, B.J. III; Richardson, C.E.

    1993-01-01

    Internet is the name of the largest computer network in the world. It is actually a collection of many networks all running the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite, connected through gateways and sharing common names and address spaces. Its purpose is to facilitate sharing of resources at participating organizations, which include government agencies, educational institutions, and private corporations. The Internet roots begin with the creation of the Advanced Research Projects Agency (ARPA) within the U.S. Department of Defense (DOD) in 1958. In 1969, the DOD formed a computer network for ARPA and gave it the name ARPANET. It was designed to help government scientists communicate and share information by allowing remote computer log-in and program execution, but it quickly became a tool for sharing information through file transfer, electronic mail, and interest-group mailing lists. In 1970, ARPA became the Defense Advanced Research Projects Agency (DARPA) and ARPANET became DARPANET. By 1980, the DARPANET had grown in size, and other connecting networks were being developed. To support system growth and performance, it was recognized that a new communication protocol was required. In 1983, DARPANET split into DARPANET and MILNET (Military Network), and the Internet was formed when the Defense Communications Agency, which managed both networks, mandated the use of TCP/IP for connected hosts. In 1986, the National Science Foundation (NSF) joined Internet. The NSF created NSFNET to link several national supercomputer centers to support scholarly research. It now comprises 17 networks, connecting to 23 midlevel wide-area networks across the continent. In turn, the midlevel networks link computers in more than 1000 university, government, and commercial research organizations throughout the world

  3. Internet and education for the patient

    Directory of Open Access Journals (Sweden)

    Bastos, Bárbara Guimarães

    2011-10-01

    Full Text Available Introduction: The process of education of a patient aims to improve knowledge and skill of the patient and/or family, in a way to influence attitudes and behaviors needed to maintain or improve health. Must be a integral part of interpersonal communication between health professionals and patients, and this can happen through interpersonal communication and various other means such as pamphlets, manuals and, more recently, computer resources. Goal: This update article approach the patient education and the internet potential for this process, still presenting some initiatives in the audiology área. Discussion: The informations, related to health are popular in the internet, and include interactive websites, portals, e-mails, telehealth aplications, and others. The education of the patients supported by the internet can help to solve a big ethical, political and economic issue: the problem to conciliate the needs and the expectations of the patients with the characteristics and limitations of the health system. Although the use of internet in the education of the patient is promising, this is not a solution to be used without careful planning, monitoring and evaluation. In audiology there are few initiatives with the use of e-mails and websites for complement of the patient education. Final Considerations: The health professionals, including the speech therapists, must check if their patients use internet resources, recognize that behavior change and prepare not only to discuss the information obtained with the patient, but also suggest websites with reliable information and help them to evaluate the quality of the information available online.

  4. HIV and STD status among MSM and attitudes about Internet partner notification for STD exposure.

    Science.gov (United States)

    Mimiaga, Matthew J; Tetu, Ashley M; Gortmaker, Steven; Koenen, Karestan C; Fair, Andrew D; Novak, David S; Vanderwarker, Rodney; Bertrand, Thomas; Adelson, Stephan; Mayer, Kenneth H

    2008-02-01

    This study assessed the acceptability and perceived utility of Internet-based partner notification (PN) of sexually transmitted disease (STD) exposure for men who have sex with men (MSM) by human immunodeficiency virus (HIV) serostatus. We recruited 1848 US MSM via a banner advertisement posted on an MSM website for meeting sexual partners between October and November 2005. Even though there was broad acceptance of a PN e-mail across HIV serostatus groups, HIV-infected men rated the importance of each component (e.g., information about where to get tested/treated, additional education regarding the STD exposed to, a mechanism for verifying the authenticity of the PN e-mail) lower than HIV-uninfected or status-unknown participants (all P's e-mail (if they were to receive an e-mail notifying them of possible STD exposure in the future), and were less likely to inform their partners of possible STD exposure via an Internet notification system in the future (all P's e-mail. If public health officials consider using Internet notification services, they may need to anticipate and address concerns of HIV-infected MSM, and will need to use a culturally-sensitive, social marketing campaign to ensure that those who may benefit from these services are willing to use this modality for PN. Internet PN should be considered as a tool to decrease rising STD and HIV rates among MSM who use the Internet to meet sexual partners.

  5. 14 CFR 223.24 - Transportation of empty mail bags.

    Science.gov (United States)

    2010-01-01

    ... PROCEEDINGS) ECONOMIC REGULATIONS FREE AND REDUCED-RATE TRANSPORTATION International Travel § 223.24 Transportation of empty mail bags. Any carrier authorized to engage in foreign air transportation may transport...

  6. Direct e-mail marketing: Case of Serbia

    OpenAIRE

    Končar Jelena A.; Vukmirović Goran; Katai Žita

    2005-01-01

    Direct e-mail marketing refers to approaching customers directly, without employing intermediaries. It represents a direct mode of communication with the target population, which affects the creation of stronger and more loyal relationships with prospective customers, compared to traditional direct marketing resources (TV, radio, print and advertising panels, etc). The main goal of direct e-mail marketing is building long-term "one to one" relationships with current and prospective customers....

  7. Program For Local-Area-Network Electronic Mail

    Science.gov (United States)

    Weiner, Michael J.

    1989-01-01

    MailRoom is computer program for local-area network (LAN) electronic mail. Enables users of LAN to exchange electronically notes, letters, reminders, or any sort of communication via their computers. Links all users of LAN into communication circle in which messages created, sent, copied, printed, downloaded, uploaded, and deleted through series of menu-driven screens. Includes feature that enables users to determine whether messages sent have been read by receivers. Written in Microsoft QuickBasic.

  8. Cancer-related direct-to-consumer advertising: awareness, perceptions, and reported impact among patients undergoing active cancer treatment.

    Science.gov (United States)

    Abel, Gregory A; Burstein, Harold J; Hevelone, Nathanael D; Weeks, Jane C

    2009-09-01

    Although cancer-related direct-to-consumer advertising (CR-DTCA) is prevalent, little is known about cancer patients' experiences with this controversial medium of medical communication. We administered a 41-item, mailed questionnaire to consecutive patients with breast and hematologic malignancies who were undergoing active treatment at our institution. We assessed awareness of CR-DTCA within the prior year, perceptions of CR-DTCA, and CR-DTCA-prompted patient and provider behaviors. We received 348 completed questionnaires (response rate, 75.0%). Overall, 86.2% reported being aware of CR-DTCA, most frequently from television (77.7%). Awareness did not vary with clinical or sociodemographic factors except that patients were more likely to be aware of CR-DTCA for products specific to their cancer types (P advertised medication, although less than one fifth of those reported receiving a prescription for the advertised medication. The patients in our cohort were highly aware of CR-DTCA. CR-DTCA was found to be accessible and useful; however, it decreased some patients' confidence in their providers' judgment. CR-DTCA prompted a modest amount of patient-provider discussion but infrequent patient-reported changes in therapy.

  9. Internet for the internationals: effects of internet use motivations on international students' college adjustment.

    Science.gov (United States)

    Lee, Eun-Ju; Lee, Lu; Jang, Jeongwoo

    2011-01-01

    Drawing upon the uses and gratifications approach, the current study examined how international students' Internet use motivations affect their academic, social, and emotional adjustments in the new environment. A total of 166 Chinese students studying in Korea participated in a web-based survey. First, a factor analysis identified four distinct motivations for Internet use: homeland orientation (to stay connected to the home country), local information seeking (to learn about the host society), local social interaction (to form interpersonal relationships locally), and entertainment. After controlling for the effects of sociodemographic variables (i.e., gender, year at school, length of residence, Korean language proficiency) and personality traits (i.e., extraversion, openness to experience, neuroticism), Internet use motivations were found to be significant predictors of international students' social and emotional adjustments. Specifically, those seeking to build a local social network through the Internet reported greater satisfaction with their social life, whereas homeland orientation was associated with poorer emotional adaptation. Various Internet activities, such as e-mail, blogging, and instant messaging, were not significantly related to college adjustments, suggesting the multi-functionality of Internet-based communication channels.

  10. Social and psychological determinants of participation in internet-based cancer support groups

    DEFF Research Database (Denmark)

    Høybye, Mette Terp; Dalton, Susanne Oksbjerg; Christensen, Jane

    2010-01-01

    PURPOSE: In this study, we identified the social and psychological characteristics of Danish cancer patients that determine use of the internet for support. MATERIALS AND METHODS: We invited 230 cancer patients taking part in a public rehabilitation program to participate in an internet module...... observed no difference between the two groups in quality of life or psychological well-being, while coping to some extent seemed related to participation in internet support groups. CONCLUSION: This study adds to the discussion on social inequality in internet use by cancer patients, showing that patients...... comprising training in the retrieval of cancer-related information from the internet and self-support groups. Persons who were motivated to join the internet groups (N = 100; 47%) were compared with persons who chose not to participate (N = 111) on the basis of self-reported baseline questionnaire data...

  11. Astronomy research via the Internet

    Science.gov (United States)

    Ratnatunga, Kavan U.

    Small developing countries may not have a dark site with good seeing for an astronomical observatory or be able to afford the financial commitment to set up and support such a facility. Much of astronomical research today is however done with remote observations, such as from telescopes in space, or obtained by service observing at large facilities on the ground. Cutting-edge astronomical research can now be done with low-cost computers, with a good Internet connection to get on-line access to astronomical observations, journals and most recent preprints. E-mail allows fast easy collaboration between research scientitists around the world. An international program with some short-term collaborative visits, could mine data and publish results from available astronomical observations for a fraction of the investment and cost of running even a small local observatory. Students who have been trained in the use of computers and software by such a program would also be more employable in the current job market. The Internet can reach you wherever you like to be and give you direct access to whatever you need for astronomical research.

  12. Web-based surveys as an alternative to traditional mail methods.

    Science.gov (United States)

    Fleming, Christopher M; Bowden, Mark

    2009-01-01

    Environmental economists have long used surveys to gather information about people's preferences. A recent innovation in survey methodology has been the advent of web-based surveys. While the Internet appears to offer a promising alternative to conventional survey administration modes, concerns exist over potential sampling biases associated with web-based surveys and the effect these may have on valuation estimates. This paper compares results obtained from a travel cost questionnaire of visitors to Fraser Island, Australia, that was conducted using two alternate survey administration modes; conventional mail and web-based. It is found that response rates and the socio-demographic make-up of respondents to the two survey modes are not statistically different. Moreover, both modes yield similar consumer surplus estimates.

  13. Remote upgrade and control system of NAT crossing based on mail protocol

    Directory of Open Access Journals (Sweden)

    Chen Lei

    2017-02-01

    Full Text Available This paper proposes a new scheme which uses transmits information such as related IP address and port by the mail server POP3 and SMTP protocol to realize net address turning (NAT crossing.The UDP connection between client and device node is realized by using "burrow" technology.Compared to the scheme that uses procedure server to realize NAT crossing schemes by the "burrow" technology,our scheme has advantages of saving operating costs,improving the stability of the system and enhancing the transferability of the system.With multiple equipment node,and a variety of network environment,we introduces the firmware update module,designs and realizes the remote upgrade and the control system of an intelligent device of Internet of Things based on the proposed scheme,and discusses the robustness of the system.

  14. Reasons anglers did not respond to an internet survey and evaluation of data quality

    Science.gov (United States)

    Gigliotti, Larry M.; Henderson, Kjetil R.

    2015-01-01

    Natural resource management agencies have traditionally used statewide mail surveys to gather information from anglers, but cost savings and faster returns occur using the internet. This study examined mail or internet fishery survey return rates and associated data by license type of South Dakota resident anglers. Junior anglers (ages 16-18; Junior Combination license) had the lowest internet and mail survey return rates (20% and 28%, respectively), followed by adult anglers (ages 19-64; Adult Fishing and Adult Combination licenses; 30% and 39%, respectively), and senior anglers (ages 65+; Senior Fishing and Senior Combination licenses; 42% and 66%, respectively). The three age groups were significantly different on three email use characteristics (shared email, frequency of use, and comfort level). The primary reason for not responding to the internet survey was not receiving or noticing the email request, and secondarily, being too busy to respond. Although having a relatively low response rate, data collected by the internet compared to follow-up mail surveys of internet non-respondents were similar.

  15. PHS terminal 'TEGACKY' dedicated to e-mailing; Mail senyo PHS tanmatsu 'TEGACKY

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-03-01

    The e-mail utilization rate at mobile communication terminals is increasing at a remarkable rate, as if to grow above the rate of communication by voice. Under the circumstances, a PHS (Personal Handyphone System) terminal 'TEGACKY' (type name: PM-T101) has been developed, designed exclusively for use for e-mailing. 'TEGACKY' is characterized in that its icons may be activated with pen, that input may be made by handwriting, and that its large screen allows a 48-character message consisting of 4 lines of 12 characters to be displayed at one time despite its compact size. It can also perform communication directly with other terminals or e-mail via center, and is provided with an information service function. 'TEGACKY' having such distinguished features has created a new category of terminals which are at once e-mailing tools. (translated by NEDO)

  16. Social networks and cooperation in electronic communities : a theoretical-empirical analysis of academic communication and Internet discussion groups

    NARCIS (Netherlands)

    Matzat, Uwe

    2001-01-01

    The study examines the use of academic e-mailing lists and newsgroups on the Internet by university researchers in the Netherlands and England. Their use is related to three clusters of problems that are analyzed. Firstly, while there are considerable time costs for using Internet Discussion Groups,

  17. 75 FR 70132 - New Incentive Programs and Other Changes for Domestic Mailing Services

    Science.gov (United States)

    2010-11-17

    ...) Intelligent Mail prices. b. Letters must include a reply card or envelope, either Business Reply Mail or... pieces that are part of full-service Intelligent Mail [supreg] automation mailings entered at PostalOne... conditions. Reply pieces must bear an Intelligent Mail barcode as of May 1, 2011. This new program provides...

  18. The Educational Impact of E-Mail: Extraverted versus Introverted Students.

    Science.gov (United States)

    Kunderewicz, Larisa; Michener, Stacey; Chambliss, Catherine

    College students (N=151) completed surveys assessing the relationship between e-mail use and extraversion. The variables studied included time spent on e-mail; the frequency of e-mail usage; and the purposes e-mail served for each student. The results suggest that extraverts use e-mail as a form of procrastination more than introverts, and that…

  19. Internet Commerce Managing Financial on the Internet

    Directory of Open Access Journals (Sweden)

    Chandra Wibowo Widhianto

    2001-03-01

    Full Text Available Article explain how to business through internet which are web business clarification, strategy effect, how to make profit, and business electronic changes consist of criptografy, EDI, signature, digital notarisation, file, payment, and how to get succes in internet business.

  20. Cancer-Related Post-traumatic Stress (PDQ®)—Health Professional Version

    Science.gov (United States)

    Cancer-related post-traumatic stress (PTS) can occur any time from diagnosis until the end of treatment; treatment used in PTSD can be useful in reducing distress. Get comprehensive information on PTS in this summary for clinicians.

  1. Commercialisation of Internet

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik

    An anthology dealing with the commercialisation of Internet and the development of new services.......An anthology dealing with the commercialisation of Internet and the development of new services....

  2. Internet flash of lightning

    International Nuclear Information System (INIS)

    Anon.

    2005-01-01

    Seven Internet sites are given relative to European Research and IAEA; Three sites in relation with optimization of radiation protection and environment, Google scolar, medicine, radioecology, finally seventeen Internet sites are detailed in this article. (N.C.)

  3. Internet Addiction and Antisocial Internet Behavior of Adolescents

    OpenAIRE

    Ma, Hing Keung

    2011-01-01

    Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial) use of Internet is discussed. It is argued ...

  4. SPAM: Beware of e-mails asking for passwords

    CERN Multimedia

    IT Department

    2008-01-01

    CERN’s Computing Rules (Operational Circular No. 5) require that passwords remain confidential and never be given to anyone, not even helpdesk or other support personnel. If you think that your password could have been exposed then you must immediately change it. Cybercriminals are making growing use of fake e-mail messages and Web sites to steal account and identity information from users. This technique is called ‘phishing’. The fake e-mails often look real and try to trick you into giving your password or other personal data. CERN has recently been targeted by a fake e-mail message which requested users to send their username, password and date of birth. This case was promptly blocked by the CERN Mail Service, but future cases may still occur. Users need to be vigilant regarding any requests for passwords or personal data. Fake e-mails should be immediately deleted. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN IT Department

  5. Towards understanding and managing the learning process in mail sorting.

    Science.gov (United States)

    Berglund, M; Karltun, A

    2012-01-01

    This paper was based on case study research at the Swedish Mail Service Division and it addresses learning time to sort mail at new districts and means to support the learning process on an individual as well as organizational level. The study population consisted of 46 postmen and one team leader in the Swedish Mail Service Division. Data were collected through measurements of time for mail sorting, interviews and a focus group. The study showed that learning to sort mail was a much more complex process and took more time than expected by management. Means to support the learning process included clarification of the relationship between sorting and the topology of the district, a good work environment, increased support from colleagues and management, and a thorough introduction for new postmen. The identified means to support the learning process require an integration of human, technological and organizational aspects. The study further showed that increased operations flexibility cannot be reinforced without a systems perspective and thorough knowledge about real work activities and that ergonomists can aid businesses to acquire this knowledge.

  6. Survey of methods for secure connection to the internet

    Science.gov (United States)

    Matsui, Shouichi

    1994-04-01

    This paper describes a study of a security method of protecting inside network computers against outside miscreants and unwelcome visitors and a control method when these computers are connected with the Internet. In the present Internet, a method to encipher all data cannot be used, so that it is necessary to utilize PEM (Privacy Enhanced Mail) capable of the encipherment and conversion of secret information. For preventing miscreant access by eavesdropping password, one-time password is effective. The most cost-effective method is a firewall system. This system lies between the outside and inside network. By limiting computers that directly communicate with the Internet, control is centralized and inside network security is protected. If the security of firewall systems is strictly controlled under correct setting, security within the network can be secured even in open networks such as the Internet.

  7. The roles of internet using in Turkish language through the change of society-the individual structure

    OpenAIRE

    Ertuğrul1, İrfan; Keskin2, Nuray

    2012-01-01

    OBJECTIVE: As a result of expansion of internet using, computer technology has beenadvanced very much day by day. Nowadays, it’s common to use e-mail andinstant messaging programs. The new generation internet users were introducedmany concepts like website, blog, twitter and iphone and they started to usethem. Internet users effect many audiences including firstly youngs, then fromchildren to olds, from ladies to men. This rapid development brings technologicalfacilities, but has a bad effect...

  8. The internet for radiologists

    International Nuclear Information System (INIS)

    Caramella, D.; Pavone, P.

    1999-01-01

    This book provides information on all aspects of the Internet of interest to radiologists. It also provides non-experts with all the information necessary to profit from the Internet and to explore the different possibilities offered by the www. Its use should be recommended to all radiologists who use the Internet. (orig.)

  9. Advertising on the Internet.

    Science.gov (United States)

    Jugenheimer, Donald W.

    1996-01-01

    States that although many advertisers have intentions of utilizing the Internet for advertising, which can provide specific audience targeting and buyer/seller interactivity, few have been successful. Explains advantages and disadvantages of using the Internet for advertising purposes. Cites special problems with Internet advertising and successes…

  10. Impact of the Internet.

    Science.gov (United States)

    Balajthy, Ernest

    1997-01-01

    Discusses the impact and the potential of the Internet on education. Suggests that educators and parents need to deal with the lack of quality assurance of the Internet. Addresses readability and appropriateness for children. Notes that successful use of the Internet by children requires that teachers provide instruction in multiple sources and…

  11. Internet Bad Neighborhoods

    NARCIS (Netherlands)

    Moreira Moura, Giovane

    2013-01-01

    A significant part of current Internet attacks originates from hosts that are distributed all over the Internet. However, there is evidence that most of these hosts are, in fact, concentrated in certain parts of the Internet. This behavior resembles the crime distribution in the real world: it

  12. Internet Addiction in Adolescents

    Science.gov (United States)

    Rebisz, Slawomir; Sikora, Ilona

    2016-01-01

    The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the…

  13. Konsep Pemasaran Melalui Internet

    OpenAIRE

    Nurbasari, Anny

    2002-01-01

    Tulisan ini mencoba membuka wawasan kita untuk mengenal dan mendalami paradigma baru dalam manajemen pemasaran, yang berkaitan dengan kemajuan teknologi pemasaran khususnya pemasaran internet (internet marketing).Pemasaran lewat internet sebagai media komunikasi baru makin lazim dilakukan dan makin berpengaruh karena efisiensinya (lengkap, detail, akurat, cepat, mudah, hemat, murah, dan berjangkauan luas). Secara otomatis ini meningkatkan customer intimacy dan customer satisfaction.

  14. The Sensing Internet

    DEFF Research Database (Denmark)

    Heller, Alfred

    2015-01-01

    . Sensor networks can be seen as an important part of the Internet of Things and may even constitute an Internet of Sensors, since the communication layers can differ from the Internet standards. The current paper describes the case for application, followed by a discussion of the observed adaptive...

  15. Internet from Above.

    Science.gov (United States)

    Sullivan, Laura

    1998-01-01

    Explains how fast and reliable Internet access can be obtained by using satellite communications based on experiences at a high school in Mississippi. Discusses Internet communications; how it was implemented in the media center; local area networks; the need for Ethernet-based connection to the Internet; and price. (LRW)

  16. Measuring the internet

    NARCIS (Netherlands)

    Zhou, X.

    2006-01-01

    The Internet is a collection of networks that use the TCP/IP suite of protocols. It has a huge impact on human activity. There are currently hundreds of millions of computers connected to the Internet, generating several petabytes traffic a day. Internet is still growing rapidly. However, the

  17. Internet Addiction and Psychopathology

    Science.gov (United States)

    Koc, Mustafa

    2011-01-01

    This study examined the relationships between university students' internet addiction and psychopathology in Turkey. The study was based on data drawn from a national survey of university students in Turkey. 174 university students completed the SCL-90-R scale and Addicted Internet Users Inventory. Results show that students who use internet six…

  18. Potential Limitations of E-mail and Text Messaging in Improving Adherence in Glaucoma and Ocular Hypertension.

    Science.gov (United States)

    Saeedi, Osamah J; Luzuriaga, Christine; Ellish, Nancy; Robin, Alan

    2015-01-01

    To determine how receptive patients are to the use of e-mail and text message reminders for appointments and medications. We conducted a consecutive cross-sectional survey of eligible patients with glaucoma or ocular hypertension at a private glaucoma subspecialty practice with 3 locations from February 2011 to January 2012. Main outcome measures were answers to survey questions regarding how receptive patients are to e-mail and text messaging reminders for appointments and medications. Of 989 patients, 404 (40.8%) patients reported that e-mail reminders would help remember appointments and 185 (18.7%) reported that they would help for medications. Among those with access to text messaging, 280 (68.9%) reported text messaging would help them remember appointments and 193 (47.5%) reported it would help with medications. Patients who reported e-mail would help them remember medications were more likely to live in an urban location [P=0.05, odds ratio (OR)=1.84], check the internet at least daily (P≤0.001, OR=1.04), check e-mail when not at home or the office (P=0.02, OR=1.62), and know how to open attachments (P=0.03, OR=1.87). Patients who reported that text messaging would help them remember their medications were more likely to be 40 or less (P≤0.001, OR=8.54) and African American (Ptext messaging reminders currently may have a limited utility in improving adherence in the general glaucoma population but may be useful in younger patients with glaucoma.

  19. Ethical issues in transnational "mail order" oocyte donation.

    Science.gov (United States)

    Heng, B C

    2006-12-01

    The rising demand for donor oocytes in developed countries has led to what is referred to as transnational or international oocyte donation, or the outsourcing of oocyte donation to poorer countries. In a further twist, frozen sperm from a recipient's partner can also be mailed to a foreign clinic to fertilize donor oocytes, and the resulting embryos are mailed back, cryopreserved, for transfer to the recipient. Among the numerous ethical concerns raised by this practice of mail order oocyte donation, the most obvious are that underprivileged women from poorer countries are often exploited; fertility physicians from richer counties abdicate responsibility for the welfare of donors; and responsibility could become an issue of contention if transmission of disease to the oocyte recipient or congenital defects in offspring born from such oocyte donation were to occur. Moreover, savings from utilizing donors from poorer countries ought to be shared with oocyte recipients.

  20. Nonresponse Error in Mail Surveys: Top Ten Problems

    Directory of Open Access Journals (Sweden)

    Jeanette M. Daly

    2011-01-01

    Full Text Available Conducting mail surveys can result in nonresponse error, which occurs when the potential participant is unwilling to participate or impossible to contact. Nonresponse can result in a reduction in precision of the study and may bias results. The purpose of this paper is to describe and make readers aware of a top ten list of mailed survey problems affecting the response rate encountered over time with different research projects, while utilizing the Dillman Total Design Method. Ten nonresponse error problems were identified, such as inserter machine gets sequence out of order, capitalization in databases, and mailing discarded by postal service. These ten mishaps can potentiate nonresponse errors, but there are ways to minimize their frequency. Suggestions offered stem from our own experiences during research projects. Our goal is to increase researchers' knowledge of nonresponse error problems and to offer solutions which can decrease nonresponse error in future projects.

  1. The Manufacture of Mail in Medieval Europe: A technical note

    Directory of Open Access Journals (Sweden)

    Williams, Alan R.

    1980-12-01

    Full Text Available THE oldest specimen of interlinked mail yet found has been excavated from a 3rd cent. B. C. Celtic grave in Romania, and this was probably developed from protective garments made up of rings threaded onto cords, like netting. A fragment of such a garment has been found in a Hallstatt grave, perhaps of the 8th cent. B. C. in Bohemia. Representations of Roman soldiers prior to the 1st cent. A. D. show them clad in mail-shirts rather than in plate. Mail returned to favour in the straitened economic circumstances of the Migration Period. and. indeed. remained the basis of most personal armour in the Middle Ages until gradually replaced by plate again in the 15th cent.

    No disponible.

  2. Urology on the internet - introduction and update

    Directory of Open Access Journals (Sweden)

    Inumpudi Anand

    2000-01-01

    Full Text Available The Internet, which has truly united the developed and developing nations, is an extensive network of inter-linked computers storing immense bytes of information, which can be accessed by anyone transcending all geographi-cal barriers and this has become the ultimate frontier to access information. The Urology and Andrology informa-tion on Internet is exponentially growing. The urologist need not know the intricacies of the hardware and soft-ware but can start right away navigating through this web. We reviewed methods available to take advantage of this network to provide a glimpse to busy urologists to accrue the benefits easily and efficiently rather than to be lost in the information-ocean by surfing individually. By getting connected to Internet, an urologist of any part of the world gains enormous information by interacting with other urologists of the rest of the world. This could be of use to gain knowledge and to offer the best and the most modern treatment to the patient. Internet has revolutionised the scientific publication by virtue of its faster and accurate transmission of manuscripts. We can send manuscripts by this channel and also access journals obviating the lag period inherent in snail mail. The on-line journals have virtually brought the library to the desktop.

  3. A survey of selected Internet pharmacies in the United States.

    Science.gov (United States)

    Peterson, A M

    2001-01-01

    To determine whether differences in the provision of pharmacy services exist among different types of Internet pharmacies. Survey of selected pharmacies with a presence on the Internet. Data were abstracted onto a data collection form for further analysis. Data collection was limited to 3 weeks. U.S.-based Internet pharmacies that allow patients to purchase prescription medications online. Pharmacies were identified using a metasearch engine with the search terms "Internet pharmacy" and "Internet pharmacist." Survey. Comparisons of availability of 10 commonly used products representing a variety of product categories, prescription verification methods, and privacy issues; and determinations of site navigability, drug information and provider access, and payment methods. Sites were categorized as "chain pharmacy extensions," "mail order pharmacies," "independent pharmacy extensions," and "online pharmacies." Thirty-three sites were reviewed. There was significant variation among the four types of pharmacies selling prescriptions over the Internet. Most pharmacies provided all of the drugs in the survey. Patients were required to provide their own prescription at 88% of the sites, and 75% of sites used mail or fax to verify prescription integrity. More than 50% of sites had privacy policies posted, and 64% used cookies. Chain pharmacy extensions required completion of an average of 10.2 pages to order drugs versus 2.4 to 4 pages for all other site types. Drug information was written at an eighth-grade reading level at 36% of the sites. More than two-thirds of the sites provided a toll-free telephone for a health care professional. Nearly 80% of the sites accepted health insurance, and 95% accepted credit cards; however, only 40% used a secure transmission mechanism for patient or payment information. Internet pharmacies provide varying levels of service. Policies regarding the use of the Internet for obtaining medications should focus on improving the privacy of

  4. Midwives' use of the Internet: an Australian study.

    Science.gov (United States)

    McKenna, Lisa; McLelland, Gayle

    2011-02-01

    to report findings on midwives' use of the Internet drawn from a larger study that explored midwives' attitudes and experiences to online and computer-based learning. a descriptive, quantitative design using anonymous questionnaires was employed to obtain information from a sample of midwives in Victoria, Australia. questionnaires were forwarded by mail to a sample of 300 members of the Victorian branch of the Australian College of Midwives. A total of 169 questionnaires were returned by reply paid mail, representing a response rate of 56%. around 92.3% of respondents reported that they used the Internet. However, 31.5% did not find navigating it to be easy, 34.7% reported that finding information was not easy, and 27.2% were not confident using the Internet. many midwives have insufficient Internet competence to be able to access necessary evidence to support practice and to assist women with decision making. ongoing education and training is needed to ensure that midwives have the skills to source evidence to support practice, and are able to effectively critique Internet information. Crown Copyright © 2009. Published by Elsevier Ltd. All rights reserved.

  5. Publication’s e-mail marketing procedure

    OpenAIRE

    Ebrahim, Nader Ale

    2016-01-01

    Your research findings and publications have to reach thousands of your peers and colleagues by sending an email. If you have recently published a study that would be of interest to others in your field, market it through email. “E-mail marketing” allow the researchers to increase the research impact and citations for their publications. This workshop will provide various techniques to increase the visibility and enhance the impact of researcher’s output by employing the publications E-mail m...

  6. Discourse strategies in professional e-mail negotiation

    DEFF Research Database (Denmark)

    Jensen, Astrid

    2009-01-01

    The purpose of this article is to report on some of the preliminary results of an on-going study on the use of discourse strategies in e-mail negotiation. The analysis aims at showing how relations between the participants develop through the use of specific discourse strategies in their e......-mail communication which covers a period of three months, during which the relationship progresses from initial contact to on-going business. Drawing on Hyland's (2005) concept of metadiscourse combined with Charles' (1996) categories of ‘old and new relationship negotiations', this study provides insights...

  7. BEWARE OF OPENING ATTACHMENTS IN E-MAIL

    CERN Multimedia

    2000-01-01

    Following the recent e-mail viruses you are asked to be cautious when opening e-mail attachments on your PC. Attachments that are apparently harmless might hide active content producing nasty effects as soon as they are opened. Some of these so called 'Trojan horses' can conceal themselves in very attractive pictures and funny slide shows.On the PC Windows infrastructure, CERN runs software to protect users from known viruses, but new ones can sometimes arrive before our software recognises them. They can enter your system when you open an attachment. To remove them it may be necessary to re-install the Windows software on your PC.

  8. Promotion and communication through e-mail marketing campaigns

    Directory of Open Access Journals (Sweden)

    Raluca Dania TODOR

    2017-07-01

    Full Text Available The main purpose of this article is to try to emphasize the e-mail marketing campaigns importance and efficiency and the way they increase the interaction between a company and potential customers and to increase their interest in a company’s products and services and finally trigger the buying decision. Also the present paper’s aim is to exemplify how business can gain benefits by using marketing automation tools like e-mail marketing campaigns which is considered nowadays a form of direct marketing which is less expensive than the traditional direct marketing alternatives.

  9. Unraveling mulitple translatorship through an e-mail correspondence

    DEFF Research Database (Denmark)

    Jansen, Hanne

    2017-01-01

    The aim of this study is to shed light on questions of “multiple translatorship” and particularly on translation collaboration processes. The empirical material consists of more than three hundred e-mails exchanged between two co-translators who translated Claudio Magris’s novel Alla cieca (2005......) into Danish. The theoretical framework presents a double perspective through which the e-mail correspondence is studied: on the one hand, as an ethnographic “thick description” (focusing on translation as an event), with the aim of uncovering who the agents involved are, how they interact, and what...

  10. Internet in the workplace: censorship, liability, and freedom of speech.

    Science.gov (United States)

    Sherwill-Navarro, P

    1998-01-01

    Most hospital medical libraries are supported by private, corporate funds and thus fall under the corporation's policies in regard to discrimination, harassment, and sexual harassment. With the free flow of information available on the Internet and through e-mail, it is mandatory to create a corporate policy for appropriate use and review of materials. Access to "questionable" or inappropriate Internet sites is not a freedom of speech issue in a private corporation; it is a potential liability for the corporation, the library, and the librarian. It is also a misuse of company resources.

  11. 77 FR 64724 - International Mail Manual; Incorporation by Reference

    Science.gov (United States)

    2012-10-23

    ...) Increase the user's ability to find information; (2) increase the users' confidence that they have found... the Postal Explorer[supreg] Internet site at http://pe.usps.com . List of Subjects in 39 CFR Part 20...

  12. 78 FR 68868 - First-Class Mail Postage Payment Option

    Science.gov (United States)

    2013-11-15

    ... Option AGENCY: Postal Regulatory Commission. ACTION: Notice. SUMMARY: The Commission is noticing a recent... the option of increasing the value of the pre-approved envelopes by applying a customized Picture... encourages increased mail volume (factors 1 and 7) and, by providing a more convenient option for sending...

  13. E-mail et Web : pour une navigation sans risque

    CERN Multimedia

    CERN. Geneva

    2010-01-01

    Présentation orale en français, support visuel en anglais. À travers des exemples concrets, vous consoliderez vos connaissances et pourrez ainsi réajuster vos habitudes concernant l’utilisation sécurisée de votre boîte e-mail et de votre navigateur Web.

  14. 7 CFR 319.41-6 - Importations by mail.

    Science.gov (United States)

    2010-01-01

    ... the package to a Plant Protection and Quarantine Programs inspection station for inspection in... 7 Agriculture 5 2010-01-01 2010-01-01 false Importations by mail. 319.41-6 Section 319.41-6 Agriculture Regulations of the Department of Agriculture (Continued) ANIMAL AND PLANT HEALTH INSPECTION...

  15. Changing a Course of Action: Teachers' E-mail Discussion.

    Science.gov (United States)

    Serafin, Ana Gil

    This study examined the e-mail interactions of teachers who were graduate students in an educational leadership program at a commuter university. Participants attended a 3-hour-per-week course. The instructor inserted into the course syllabus an assessment plan that required computer use, making the students responsible for accessing the…

  16. Beneficial long communication in the multiplayer electronic mail game

    NARCIS (Netherlands)

    De Jaegher, K.J.M.

    2015-01-01

    In the two-player electronic mail game (EMG), as is well-known, the probability of collective action is lower the more confirmations and reconfirmations are made available to players. In the multiplayer EMG, however, we show players may coordinate on equilibria where they require only few of the

  17. Colleges Get out of E-Mail Business

    Science.gov (United States)

    Carnevale, Dan

    2008-01-01

    Frantic troubleshooting by an overworked staff versus someone else fixing problems smoothly. A sliver of server space per person versus a five-gigabyte chunk. Half a million dollars versus free. That's what colleges are faced with as they decide whether to continue running their own e-mail services or outsource them to a professional service like…

  18. E-Mail from Professor Enhances Student Motivation and Attitudes

    Science.gov (United States)

    Legg, Angela M.; Wilson, Janie H.

    2009-01-01

    Traditionally, professors use the first day of class to build rapport. However, current technology allows professors to contact students prior to the first day of class. This study assessed how the receipt of a welcoming e-mail from a female professor 1 week before the first day of class affected student motivation and attitudes toward the…

  19. Analysis of the Spanish-speaking mailing list RADIOLOGIA

    International Nuclear Information System (INIS)

    Rodriguez-Recio, Francisco Javier; Sendra-Portero, Francisco

    2007-01-01

    The objective of this study was to analyse the mailing list RADIOLOGIA during its first 5 years of operation (from 1998 to 2003). A survey questionnaire was sent to evaluate the characteristics of subscribers and to score (from 0 to 9) the functionality, usefulness and quality of the mailing list. All messages sent to the list during the evaluated period were classified and quantified. A social network analysis was performed from all messages replied to during 2001 and 2002 with the option 'reply to' included in the subject. One hundred and forty (36.8%) responses were collected from 380 subscribers, mainly radiologists (90.0%). 80% of responders were located in Spain, 16% in Latin America, and 4% in other places. The obtained scores (mean ± standard deviation) were: functionality 7.4 ± 1.3; usefulness 7.0 ± 1.4; and quality of e-mail contents 6.0 ± 1.4. During the evaluated period 2700 e-mail messages were sent to the list, with a monthly distribution of 44.3 ± 26.0. The list functioning has been based on an active minority of subscribers that provided information and responses to the rest of the subscribers, a ring of active members that participated in discussions, and about 50% of passive members

  20. The non addressed mail; Le courrier non adresse

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    In 1999, the non addressed mail aggregated i million tons. Today there is no selective collection of these wastes. The ADEME (french agency for the environment and the energy mastership) drove a study to propose and evaluate the cost of a selective collection. This document presents the results of the study. (A.L.B.)

  1. Võidupüha 8. mail? / Leonti Kährik

    Index Scriptorium Estoniae

    Kährik, Leonti

    2005-01-01

    Eesti peaks väärikalt tähistama võidupüha kui euroopalike demokraatlike väärtuste võitu natsismi ja fašismi üle. Lähtudes 1940. a. juunini Eestis kehtinud vööndiajast, võiks võidupüha tähistada 8. mail

  2. 75 FR 56922 - Implementation of the Intelligent Mail Package Barcode

    Science.gov (United States)

    2010-09-17

    ... in planning for future mailings and preparing for system changes necessary to adopt the new IMpb... Code 128 barcodes, which make use of Application Identifiers (AI) to define the encoded data and how it... capabilities, the Postal Service is providing advance notice of a future proposal to require customers to...

  3. The Communicative Functions of Emoticons in Workplace E-Mails :-)

    DEFF Research Database (Denmark)

    Skovholt, Karianne; Grønning, Anette; Kankaanranta, Anne

    2014-01-01

    CMC research presents emoticons as visual representations of writers' emotions. We argue that the emoticons in authentic workplace e-mails do not primarily indicate writers' emotions. Rather, they provide information about how an utterance is supposed to be interpreted. We show that emoticons...

  4. Using Computer Conferencing and Electronic Mail to Facilitate Group Projects.

    Science.gov (United States)

    Anderson, Margaret D.

    1996-01-01

    Reports on the use of electronic mail and an electronic conferencing system to conduct group projects in three educational psychology courses at the State University of New York College at Cortland. Course design is explained and group project design is described, including assignments and oral presentations during regular class sessions.…

  5. 37 CFR 1.8 - Certificate of mailing or transmission.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Certificate of mailing or transmission. 1.8 Section 1.8 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND TRADEMARK OFFICE, DEPARTMENT OF COMMERCE GENERAL RULES OF PRACTICE IN PATENT CASES General Provisions General Information and...

  6. On the Efficiency of Spam Mailing and Portal Advertising

    OpenAIRE

    Martin Bandulet

    2005-01-01

    The objective of this paper is to provide a simple approach endogenizing the welfare reducing or welfare enhancing effect of informative advertising. Using this approach, it is possible to analyse the welfare consequences of a technology shock that reduces unit information costs, and to explain whether electronic junk mails or portal advertising will cause welfare gains or losses in a competitive environment.

  7. The development of efficient coding for an electronic mail system

    Science.gov (United States)

    Rice, R. F.

    1983-01-01

    Techniques for efficiently representing scanned electronic documents were investigated. Major results include the definition and preliminary performance results of a Universal System for Efficient Electronic Mail (USEEM), offering a potential order of magnitude improvement over standard facsimile techniques for representing textual material.

  8. An assesment of measurement invariance between online and mail surveys

    NARCIS (Netherlands)

    Deutskens, E.C.; Ruyter, de J.C.; Wetzels, M.G.M.

    2005-01-01

    One of the latest trends in marketing research is the increasing use of online surveys, which offer lower costs and faster responses. Yet, critics question whether data collected via online surveys are equivalent to data collected via traditional mail surveys. Since existing evidence from the

  9. Global surveillance of emerging diseases: the ProMED-mail perspective Vigilância global de doenças emergentes: a perspectiva da ProMED-mail

    Directory of Open Access Journals (Sweden)

    John P. Woodall

    2001-01-01

    Full Text Available The Internet is changing the way global disease surveillance is conducted. Countries and international organizations are increasingly placing their outbreak reports on the Internet, which speeds up distribution and therefore prevention and control. The World Health Organization (WHO has recognized the value of nongovernmental organizations and the media in reporting outbreaks, which it then attempts to verify through its country offices. However, WHO and other official sources are constrained in their reporting by the need for bureaucratic clearance. ProMED-mail has no such constraints, and posts outbreak reports 7 days a week. It is moderated by infectious disease specialists who add relevant comments. Thus, ProMED-mail complements official sources and provides early warning of outbreaks. Its network is more than 20,000 people in over 150 countries, who place their computers and time at the network's disposal and report on outbreaks of which they have knowledge. Regions and countries could benefit from adopting the ProMED-mail approach to complement their own disease surveillance systems.A Internet está mudando a condução da vigilância global de doenças. Cada vez mais, os países e as organizações internacionais estão divulgando seus informes na Internet, o que acelera não apenas a distribuição desta informação, como também, consequentemente, a prevenção e controle das doenças. A Organização Mundial da Saúde (OMS já reconheceu a importância das ONGs e da imprensa na notificação de surtos, que procura verificar posteriormente através de suas agências locais. Entretanto, a OMS e outras fontes oficiais sofrem restrições em seus relatórios pela obrigatoriedade da autorização burocrática, além de só publicarem informes nos dias úteis. A ProMED-mail não está sujeita a tais restrições. A rede é moderada por especialistas em doenças infecciosas, que acrescentam comentários relevantes. Assim, a ProMED-mail

  10. Efficacy and Safety of Two Methadone Titration Methods for the Treatment of Cancer-Related Pain: The EQUIMETH2 Trial (Methadone for Cancer-Related Pain).

    Science.gov (United States)

    Poulain, Philippe; Berleur, Marie-Pierre; Lefki, Shimsi; Lefebvre, Danièle; Chvetzoff, Gisèle; Serra, Eric; Tremellat, Fibra; Derniaux, Alain; Filbet, Marilène

    2016-11-01

    In the European Association for Palliative Care recommendations for cancer pain management, there was no consensus regarding the indications, titration, or monitoring of methadone. This national, randomized, multicenter trial aimed to compare two methadone titration methods (stop-and-go vs. progressive) in patients with cancer-related pain who were inadequately relieved by or intolerant to Level 3 opioids. The primary end point was the rate of success/failure at Day 4, defined as pain relief (reduction of at least two points on the visual scale and a pain score methods were considered equally easy to perform by nearly 60% of the clinicians. Methadone is an effective and sustainable second-line alternative opioid for the treatment of cancer-related pain. The methods of titration are comparable in terms of efficacy, safety, and ease of use. Copyright © 2016 American Academy of Hospice and Palliative Medicine. Published by Elsevier Inc. All rights reserved.

  11. Relationship between cancer-related fatigue and physical activity in inpatient cancer rehabilitation.

    Science.gov (United States)

    Kummer, Franziska; Catuogno, Silvio; Perseus, Josef M; Bloch, Wilhelm; Baumann, Freerk T

    2013-08-01

    Fatigue is a serious problem for the majority of patients with cancer. In this context, several studies have shown benefits of physical activity during and following treatment. However, uncertainties remain regarding the optimal type and duration of physical activity. Therefore, this study examined the relationship between cancer-related fatigue and physical activity in the course of inpatient rehabilitation. Fatigue (Multidimensional Fatigue Inventory) and physical activity (Freiburg Questionnaire of Physical Activity) were assessed in a consecutive series of 35 patients with cancer attending oncological inpatient rehabilitation during a six-month study period. The three-week rehabilitation program included daily exercise therapy consisting of aerobic endurance training, moderate resistance training, coordination exercises, relaxation training and individual physiotherapy. At discharge, a significant improvement in each dimension of cancer-related fatigue (p=0.001-0.003) and a significant increase of physical activity levels (p=0.001) were observed. A small, but significant negative correlation was found between cancer-related fatigue and the level of physical activity (R=-0.438, p=0.004). The largest effects were associated with a weekly energy expenditure of 3000 kcal through physical activity. The results support a non-linear dose-response relationship between cancer-related fatigue and physical activity. Since this is the first study providing specific exercise recommendations for an effective treatment of cancer-related fatigue in the context of inpatient rehabilitation, further research is required to validate the observed trends.

  12. [Cancer related fatigue in patients with breast cancer after chemotherapy and coping style].

    Science.gov (United States)

    Jiang, Pinglan; Wang, Shuhong; Jiang, Dongmei; Yu, Lingli

    2011-04-01

    To study the relevance between cancer related fatigue and coping styles in breast cancer patients after chemotherapy. A survey was conducted in 396 patients with breast cancer after chemotherapy on cancer related fatigue scale and Jalowiec coping scale, and the relation was analyzed. The rate of overall fatigue in breast cancer patients was 96.97%, mostly moderate fatigue. The rate of fatigue dimensions from high to low was physical fatigue, feeling fatigue and cognitive fatigue, respectively. The score of coping styles in patients with breast cancer after chemotherapy from high to low was optimistic coping, facing bravely, support seeking, self-reliance, emotional catharsis, avoidance, fatalism, and conservation. The most widely used coping style was optimistic coping style, and the least was emotional catharisis. There was a positive correlation between coping style of emotional catharsis and cancer related fatigue of all dimensions (Pself-reliance, or conservation (P<0.05). There was also a negative correlation between physical fatigue and optimistic or support seeking (P<0.05), but there was a positive correlation between avoidance or fatalism and the dimensions of general fatigue, physical fatigue, and cognitive fatigue (P<0.05). There is prevalent cancer related fatigue in patients with breast cancer after chemotherapy. We should guide the patients to more active coping styles, to enhance the ability of psychological adaption in patients, reduce cancer related fatigue, and improve the quality of life.

  13. Chinese herbal medicine for cancer-related fatigue: a systematic review of randomized clinical trials.

    Science.gov (United States)

    Su, Chun-Xiang; Wang, Li-Qiong; Grant, Suzanne J; Liu, Jian-Ping

    2014-06-01

    To assess the effectiveness and safety of Chinese herbal medicine for the treatment of cancer-related fatigue. We systematically searched seven electronic databases and two trial registries for randomized clinical trials of Chinese herbal medicine for cancer-related fatigue. Two authors independently extracted data and assessed the methodological quality of the included trials using the Cochrane risk of bias tool. Data were synthesized using RevMan 5.2 software. A total of 10 trials involving 751 participants with cancer-related fatigue were identified and the methodological quality of the included trials was generally poor. Chinese herbal medicine used alone or in combination with chemotherapy or supportive care showed significant relief in cancer-related fatigue compared to placebo, chemotherapy or supportive care based on single trials. Chinese herbal medicine plus chemotherapy or supportive care was superior to chemotherapy or supportive care in improving quality of life. Data from one trial demonstrated Chinese herbal medicine exerted a greater beneficial effect on relieving anxiety but no difference in alleviating depression. Seven trials reported adverse events and no severe adverse effects were found in Chinese herbal medicine groups. The findings from limited number of trials suggest that Chinese herbal medicine seems to be effective and safe in the treatment of cancer-related fatigue. However, the current evidence is insufficient to draw a confirmative conclusion due to the poor methodological quality of included trials. Thus, conducting rigorously designed trials on potential Chinese herbal medicine is warranted. Copyright © 2014 Elsevier Ltd. All rights reserved.

  14. Security, privacy, and confidentiality issues on the Internet

    Science.gov (United States)

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to `sign' a message whereby the private key of an individual can be used to `hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a `digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers. PMID:12554559

  15. Security, privacy, and confidentiality issues on the Internet.

    Science.gov (United States)

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to 'sign' a message whereby the private key of an individual can be used to 'hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a 'digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers.

  16. Do e-mail alerts of new research increase knowledge translation? A "Nephrology Now" randomized control trial.

    Science.gov (United States)

    Tanna, Gemini V; Sood, Manish M; Schiff, Jeffrey; Schwartz, Daniel; Naimark, David M

    2011-01-01

    As the volume of medical literature increases exponentially, maintaining current clinical practice is becoming more difficult. Multiple, Internet-based journal clubs and alert services have recently emerged. The purpose of this study is to determine whether the use of the e-mail alert service, Nephrology Now, increases knowledge translation regarding current nephrology literature. Nephrology Now is a nonprofit, monthly e-mail alert service that highlights clinically relevant articles in nephrology. In 2007-2008, the authors randomized 1,683 subscribers into two different groups receiving select intervention articles, and then they used an online survey to assess both groups on their familiarity with the articles and their acquisition of knowledge. Of the randomized subscribers, 803 (47.7%) completed surveys, and the two groups had a similar number of responses (401 and 402, respectively). The authors noted no differences in baseline characteristics between the two groups. Familiarity increased as a result of the Nephrology Now alerts (0.23 ± 0.087 units on a familiarity scale; 95% confidence interval [CI]: 0.06-0.41; P = .007) especially in physicians (multivariate odds ratio 1.83; P = .0002). No detectable improvement in knowledge occurred (0.03 ± 0.083 units on a knowledge scale; 95% CI: -0.13 to 0.20; P = .687). An e-mail alert service of new literature improved a component of knowledge translation--familiarity--but not knowledge acquisition in a large, randomized, international population.

  17. 75 FR 14076 - Express Mail Open and Distribute and Priority Mail Open and Distribute Changes and Updates

    Science.gov (United States)

    2010-03-24

    ... tray boxes to address Open and Distribute customers' concerns on the security of their mail in a letter tray during processing. The current tray box sizes were a result of customer feedback. The decision to... processing of Open and Distribute containers. In response to customer needs, the Postal Service is...

  18. 39 CFR 20.3 - Availability of the International Mail Manual.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Availability of the International Mail Manual. 20.3 Section 20.3 Postal Service UNITED STATES POSTAL SERVICE INTERNATIONAL MAIL INTERNATIONAL POSTAL SERVICE § 20.3 Availability of the International Mail Manual. Copies of the International Mail Manual may...

  19. 39 CFR 20.2 - Effective date of the International Mail Manual.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Effective date of the International Mail Manual. 20.2 Section 20.2 Postal Service UNITED STATES POSTAL SERVICE INTERNATIONAL MAIL INTERNATIONAL POSTAL SERVICE § 20.2 Effective date of the International Mail Manual. The provisions of the International Mail...

  20. 39 CFR 20.4 - Amendments to the International Mail Manual.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Amendments to the International Mail Manual. 20.4 Section 20.4 Postal Service UNITED STATES POSTAL SERVICE INTERNATIONAL MAIL INTERNATIONAL POSTAL SERVICE § 20.4 Amendments to the International Mail Manual. New issues of the International Mail Manual will be...

  1. 77 FR 65279 - Domestic Competitive Products Pricing and Mailing Standards Changes

    Science.gov (United States)

    2012-10-26

    ... POSTAL SERVICE 39 CFR Part 111 Domestic Competitive Products Pricing and Mailing Standards Changes... and mailing standards for the following competitive products: Express Mail[supreg], Priority Mail.... SUPPLEMENTARY INFORMATION: This final rule describes new prices and product features for competitive products...

  2. 41 CFR 102-192.130 - What are your general responsibilities as an agency mail manager?

    Science.gov (United States)

    2010-07-01

    ... responsibilities as an agency mail manager? 102-192.130 Section 102-192.130 Public Contracts and Property... ADMINISTRATIVE PROGRAMS 192-MAIL MANAGEMENT Agency Mail Manager Requirements § 102-192.130 What are your general responsibilities as an agency mail manager? In addition to carrying out the responsibilities in Subparts B, C, D...

  3. 41 CFR 102-192.145 - Which program levels should have a mail manager?

    Science.gov (United States)

    2010-07-01

    ... should have a mail manager? 102-192.145 Section 102-192.145 Public Contracts and Property Management... have a mail manager? Every program level within a Federal agency that generates a significant quantity of outgoing mail should have its own mail manager. Each agency must decide which programs will have a...

  4. 41 CFR 102-192.120 - Must we have an agency mail manager?

    Science.gov (United States)

    2010-07-01

    ... mail manager? 102-192.120 Section 102-192.120 Public Contracts and Property Management Federal Property... MANAGEMENT Agency Mail Manager Requirements § 102-192.120 Must we have an agency mail manager? Yes, every Federal agency as defined in § 102-192.35 must have an agency mail manager. Agencies that are not “large...

  5. Internet marketing global features

    Directory of Open Access Journals (Sweden)

    Rakita Branko

    2005-01-01

    Full Text Available Business environment incessantly bringing a yard of a new challenges to market entities. One of the greatest challenges that companies faced during the last couple of decades was development of information systems as well as a large scale usage of world's greatest computer network - Internet - no matter how big they were or what their activities included. There are many papers about Internet, its development, social and economic significance. However, there is no paper or article written by a local author that systematically and thoroughly treats marketing importance of Internet. This paper presents potentials and business importance of internet marketing in new millennium. It considers internet as a communication, trade and distribution channel. In addition, the paper highlights research potentials of Internet.

  6. Adoption Assessment of Internet Usage Amongst Undergraduates In Nigeria Universities -A Case Study Approach

    Directory of Open Access Journals (Sweden)

    Michael Olusesan Awoleye

    2008-04-01

    Full Text Available This study focused on the level of penetration of Internet usage among undergraduate students in Nigeria using Obafemi Awolowo University as a case study. Result showed that about 92% of undergraduate students have embraced the Internet and are using it consistently. The online mean time is 3.5hrs/week while on the average, undergraduate experience of Internet usage is about 4years. We found also that the students use the Internet mostly for e-mail, information search and online chatting; all of these were found to have significant impact on their academics and social life. Further analysis revealed that gender attitude is also an important issue; male students appear to use the Internet more than their female counterparts; just as science based students use it more than the non-science based students. The paper therefore recommends appropriate policies for all higher schools of learning in Nigeria to facilitate further diffusion and use of the Internet.

  7. ICan: an integrated co-alteration network to identify ovarian cancer-related genes.

    Science.gov (United States)

    Zhou, Yuanshuai; Liu, Yongjing; Li, Kening; Zhang, Rui; Qiu, Fujun; Zhao, Ning; Xu, Yan

    2015-01-01

    Over the last decade, an increasing number of integrative studies on cancer-related genes have been published. Integrative analyses aim to overcome the limitation of a single data type, and provide a more complete view of carcinogenesis. The vast majority of these studies used sample-matched data of gene expression and copy number to investigate the impact of copy number alteration on gene expression, and to predict and prioritize candidate oncogenes and tumor suppressor genes. However, correlations between genes were neglected in these studies. Our work aimed to evaluate the co-alteration of copy number, methylation and expression, allowing us to identify cancer-related genes and essential functional modules in cancer. We built the Integrated Co-alteration network (ICan) based on multi-omics data, and analyzed the network to uncover cancer-related genes. After comparison with random networks, we identified 155 ovarian cancer-related genes, including well-known (TP53, BRCA1, RB1 and PTEN) and also novel cancer-related genes, such as PDPN and EphA2. We compared the results with a conventional method: CNAmet, and obtained a significantly better area under the curve value (ICan: 0.8179, CNAmet: 0.5183). In this paper, we describe a framework to find cancer-related genes based on an Integrated Co-alteration network. Our results proved that ICan could precisely identify candidate cancer genes and provide increased mechanistic understanding of carcinogenesis. This work suggested a new research direction for biological network analyses involving multi-omics data.

  8. Internet Geo-Location

    Science.gov (United States)

    2017-12-01

    INTERNET GEO-LOCATION DUKE UNIVERSITY DECEMBER 2017 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED STINFO COPY AIR...REPORT TYPE FINAL TECHNICAL REPORT 3. DATES COVERED (From - To) MAY 2014 – MAY 2017 4. TITLE AND SUBTITLE INTERNET GEO-LOCATION 5a. CONTRACT...of SpeedTest servers that are used by end users to measure the speed of their Internet connection. The servers log the IP address and the location

  9. INTERNET AND SENIORS

    OpenAIRE

    Rain, Tomáš; Ivana Švarcová

    2010-01-01

    The article deals about the possibilities of using the internet for seniors. Authors suggest using www pages as alternative of retrospective therapy. Authors describe barriers of internet access for seniors. The authors of the article consider about utilization of internet for the reminiscent therapy of seniors. The target group of this article are the workers of the information centres, gerontopeds and the other persons working as the pedagogues. The objective of this article is to summarize...

  10. International Mathematical Internet Olympiad

    Directory of Open Access Journals (Sweden)

    Alexander Domoshnitsky

    2012-10-01

    Full Text Available Modern Internet technologies open new possibilities in wide spectrum of traditional methods used in mathematical education. One of the areas, where these technologies can be efficiently used, is an organization of mathematical competitions. Contestants can stay at their schools or universities and try to solve as many mathematical problems as possible and then submit their solutions through Internet. Simple Internet technologies supply audio and video connection between participants and organizers.

  11. Everyone’s Internet

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    After more than 20 years,the Internet in China has become a big success.The country has the world’s largest Internet population that topped 420 million at the end of June.In the first six months of this year,China’s Internet market reached 74.3 billion yuan($10.9 billion),the equivalent of 2009’s total.Local businesses have risen to

  12. Privacy and internet services

    OpenAIRE

    Samec, Marek

    2010-01-01

    This thesis is focused on internet services user privacy. Goal of this thesis is to determine level of user awareness of how is their privacy approached while using internet services. Then suggest procedure to improve this awareness, or that will lead to better control of individual privacy. In theoretical part I analyze general and legislative approach to privacy, followed by analysis of behaviour of internet service users and providers. Part of this analysis deals with usage of web cookies ...

  13. Internet and Privacy

    OpenAIRE

    Al-Fadhli, Meshal Shehab

    2007-01-01

    The concept of privacy is hard to understand and is not easy to define, because this concept is linked with several dimensions. Internet Privacy is associated with the use of the Internet and most likely appointed under communications privacy, involving the user of the Internet’s personal information and activities, and the disclosure of them online. This essay is going to present the meaning of privacy and the implications of it for Internet users. Also, this essay will demonstrate some of t...

  14. Privacy driven internet ecosystem

    OpenAIRE

    Trinh, Tuan Anh; Gyarmati, Laszlo

    2012-01-01

    The dominant business model of today's Internet is built upon advertisements; users can access Internet services while the providers show ads to them. Although significant efforts have been made to model and analyze the economic aspects of this ecosystem, the heart of the current status quo, namely privacy, has not received the attention of the research community yet. Accordingly, we propose an economic model of the privacy driven Internet ecosystem where privacy is handled as an asset that c...

  15. Internet Addiction in Adolescents

    OpenAIRE

    Rębisz Sławomir; Sikora Ilona

    2016-01-01

    The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the twentieth century, usually appears in the literature in the context of young people who have been found to be most vulnerable. The phenomenon is known...

  16. INTERNET AND SENIORS

    Directory of Open Access Journals (Sweden)

    Rain, Tomáš

    2010-12-01

    Full Text Available The article deals about the possibilities of using the internet for seniors. Authors suggest using www pages as alternative of retrospective therapy. Authors describe barriers of internet access for seniors. The authors of the article consider about utilization of internet for the reminiscent therapy of seniors. The target group of this article are the workers of the information centres, gerontopeds and the other persons working as the pedagogues. The objective of this article is to summarize ways of using internet for helping seniors to better life. The authors describe terms e-senior. The authors suggest methodological approach to exercising user’s skills.

  17. Internet dalam Konteks Perpustakaan

    Directory of Open Access Journals (Sweden)

    Roni Rodhin

    2017-02-01

    Full Text Available The presence of internet would bring a variaty of effects in all areas of human life. The impac of bias could be both a positive and negative. On the other side for libraries it would bring a disparate impact, engaged  in the service and information. In the contect of libraries, the internet is very helpfull to disseminate information that is available in it. It means internet becomes a partner in the dissemination of information. Therefore, the existence of internet is very important for the library.

  18. Modeling the Internet.

    Energy Technology Data Exchange (ETDEWEB)

    Kelic, Andjelka; Mitchell, Michael David; Shirah, Donald N.

    2017-12-01

    The National Infrastructure Simulations and Analysis Center (NISAC) has developed a nationwide model of the Internet to study the potential impact of the loss of physical facilities on the network and on other infrastructures that depend on the Internet for services. The model looks at the Internet from the perspective of Internet Service Providers (ISPs) and their connectivity and can be used to determine how the network connectivity could be modified to assist in mitigating an event. In addition the model could be used to explore how portions of the network could be made more resilient to disruptive events.

  19. Moxibustion for cancer-related fatigue: study protocol for a randomized controlled trial.

    Science.gov (United States)

    Kim, Mikyung; Kim, Jung-Eun; Lee, Hye-Yoon; Kim, Ae-Ran; Park, Hyo-Ju; Kwon, O-Jin; Kim, Eun-Jung; Park, Yeon-Cheol; Seo, Byung-Kwan; Cho, Jung Hyo; Kim, Joo-Hee

    2017-07-05

    Cancer-related fatigue is one of the most common symptoms experienced by cancer patients, and it diminishes their quality of life. However, there is currently no confirmed standard treatment for cancer-related fatigue, and thus, many patients who suffer cancer-related fatigue seek complementary and alternative medicines such as moxibustion. Moxibustion is one of the most popular therapies in traditional Korean medicine used to manage fatigue. Recent studies have also demonstrated that moxibustion is effective for treating chronic fatigue. However, there is insufficient evidence supporting the effect of moxibustion against cancer-related fatigue. The aim of this study is to assess the efficacy and safety of moxibustion treatment for cancer-related fatigue. A multi-center, three-armed parallel, randomized controlled trial will be conducted. Ninety-six patients with cancer-related fatigue will be recruited from three clinical research centers. They will be randomly allocated to one of three groups in a 1:1:1 ratio. The moxibustion group will receive moxibustion treatment at CV8, CV12, LI4 and ST36. The sham moxibustion group will receive sham moxibustion at non-acupoints. Both the moxibustion and sham moxibustion groups will receive 30-min treatments twice a week for 8 weeks. The usual care group will not receive moxibustion treatment. All participants will be educated via a brochure on how to manage cancer-related fatigue in daily life. The outcome measurements will be evaluated at baseline, week 5, week 9, and week 13 by assessors who are blinded to the group allocation. The primary outcome measure will be the mean change in the average scores of the Brief Fatigue Inventory before and after treatments between groups. The secondary outcome measures will be the mean difference in changes from baseline of the Brief Fatigue Inventory, functional assessments of cancer therapy-fatigue, European Organization for Research and Treatment of Cancer Quality of Life

  20. 4th June: AIS and NICE/MAIL unique authentication

    CERN Multimedia

    AIS and NICE teams

    2007-01-01

    Over the past few years, the IT department has been in the process of streamlining CERN users' access to all central computing services. The long term goal is to converge on a unique computer account, which will increase computer security and simplify account maintenance. The next step of this process will occur on 4th June 2007, as of when authenticating on the AIS applications (EDH, HRT, CET, APT, ERT, CRA, Foundation, ...) and on NICE (Windows) and MAIL will be done using the same username and password. As a reminder, this account can also be used on EDMS, INDICO, CDS and SIMBA. So starting on 4th June 2007, authentication on the AIS applications must be done using your AIS username and your MAIL/NICE password. Thanks for your understanding, The AIS and NICE teams

  1. 4th June: AIS and NICE/MAIL unique authentication

    CERN Multimedia

    The AIS and NICE teams

    2007-01-01

    Over the past few years, the IT department has been in the process of streamlining CERN users' access to all central computing services. The long term goal is to converge on a unique computer account, which will increase computer security and simplify account maintenance. The next step of this process will occur on the 4th June 2007, as of when authenticating on the AIS applications (EDH, HRT, CET, APT, ERT, CRA, Foundation, ...) and on NICE (Windows) and MAIL will be done using the same username and password. As a reminder, this account can also be used on EDMS, INDICO, CDS and SIMBA. Thus starting on the 4th June 2007, authentication on the AIS applications must be done using your AIS username and your MAIL/NICE password. Thanks for your understanding, The AIS and NICE teams

  2. Optimization of territory control of the mail carrier by using Hungarian methods

    Science.gov (United States)

    Supian, S.; Wahyuni, S.; Nahar, J.; Subiyanto

    2018-03-01

    In this paper, the territory control of the mail carrier from the central post office Bandung in delivering the package to the destination location was optimized by using Hungarian method. Sensitivity analysis against data changes that may occur was also conducted. The sampled data in this study are the territory control of 10 mail carriers who will be assigned to deliver mail package to 10 post office delivery centers in Bandung. The result of this research is the combination of territory control optimal from 10 mail carriers as follows: mail carrier 1 to Cikutra, mail carrier 2 to Ujung Berung, mail carrier 3 to Dayeuh Kolot, mail carrier 4 to Padalarang, mail carrier 5 to Situ Saeur, mail carrier 6 to Cipedes, mail carrier 7 to Cimahi, mail carrier 8 to Soreang, mail carrier 9 to Asia-Afrika, mail carrier 10 to Cikeruh. Based on this result, manager of the central post office Bandung can make optimal decisions to assign tasks to their mail carriers.

  3. Harmonizing the Interests of Free Speech, Obscenity and Child Pornography on Cyberspace: The New Roles of Parents, Technology and Legislation for Internet Safety

    Science.gov (United States)

    Olagunju, Amos O.

    2008-01-01

    Incorrect access to Web site addresses and spam e-mails are continuing to make pornography rampant on the Internet at schools, homes and libraries. Collectively, parents, teachers and members of communities must become more aware of the risks and consequences of open access to the Internet, and the distinction between censorship and Internet…

  4. Differential psychological impact of internet exposure on Internet addicts.

    Directory of Open Access Journals (Sweden)

    Michela Romano

    Full Text Available The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and autism traits. High internet-users also showed a pronounced decrease in mood following internet use compared to the low internet-users. The immediate negative impact of exposure to the internet on the mood of internet addicts may contribute to increased usage by those individuals attempting to reduce their low mood by re-engaging rapidly in internet use.

  5. Differential psychological impact of internet exposure on Internet addicts.

    Science.gov (United States)

    Romano, Michela; Osborne, Lisa A; Truzoli, Roberto; Reed, Phil

    2013-01-01

    The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and autism traits. High internet-users also showed a pronounced decrease in mood following internet use compared to the low internet-users. The immediate negative impact of exposure to the internet on the mood of internet addicts may contribute to increased usage by those individuals attempting to reduce their low mood by re-engaging rapidly in internet use.

  6. E-mail communication patterns and job burnout

    Science.gov (United States)

    2018-01-01

    A considerable body of research has documented the negative effects of job burnout on employees and their organizations, emphasizing the importance of the identification of early signs of the phenomenon for the purposes of prevention and intervention. However, such timely identification is difficult due to the time and cost of assessing the burnout levels of all employees in an organization using established scales. In this paper, we propose an innovative way to identify employees at risk of job burnout by analyzing their e-mail communication patterns. Building on the Job Demands–Resources model, we theorize about the relationship between e-mail communication patterns and levels of employee exhaustion and disengagement (two dimensions of burnout). We analyzed 52,190 e-mails exchanged between 57 employees of a medium sized R&D company over a five-month period. We then related these employees’ communication patterns to their levels of burnout, collected using an established scale (the OLBI–Oldenburg Burnout Inventory). Our results provide support for the overall proposition of the paper, that e-mail communications can be used to identify individuals at risk of job burnout. Our models explain up to 34% of the variance of burnout and up to 37% and 19% respectively of the variance of exhaustion and disengagement. They also successfully distinguish between employees with a higher risk of burnout and those with lower levels of risk (F1 score of 84% with recall of 100% and 73% precision). We discuss the implications of our results and present suggestions for future research. PMID:29518128

  7. 77 FR 62446 - Every Door Direct Mail-Retail

    Science.gov (United States)

    2012-10-15

    ..., the maximum number of EDDM-Retail pieces per day is 5000 per 5-digit ZIP Code. 1.3 Delivery Statistics...) under 145, using delivery statistics obtained from the EDDM web tool at the Web site eddm.usps.com/eddm... title and introductory text of 2.2.2 as follows:] 2.2.2 Dimensions for Standard Mail and EDDM-Retail...

  8. A proposed evolution for the Italian certified electronic mail system

    OpenAIRE

    Buzzi, Marina; Ferrucci, Luca; Francesco, Gennai; Petrucci, Claudio

    2016-01-01

    One the main objective of the European Commission is to innovate and bring ICT to its full potential in any sector, including eGovernment, eCommerce, and eHealth services. Certified Electronic Mail (CEM) systems of Member States are currently not interoperable, thus impacting on economic growth and competitiveness. The paper investigates the use of the DNSSec technology as a technological evolution of the Italian CEM System and the first step towards interoperability and adherence to internat...

  9. The ethics of research using electronic mail discussion groups.

    Science.gov (United States)

    Kralik, Debbie; Warren, Jim; Price, Kay; Koch, Tina; Pignone, Gino

    2005-12-01

    The aim of this paper is to identify and discuss the ethical considerations that have confronted and challenged the research team when researchers facilitate conversations using private electronic mail discussion lists. The use of electronic mail group conversations, as a collaborative data generation method, remains underdeveloped in nursing. Ethical challenges associated with this approach to data generation have only begun to be considered. As receipt of ethics approval for a study titled; 'Describing transition with people who live with chronic illness' we have been challenged by many ethical dilemmas, hence we believe it is timely to share the issues that have confronted the research team. These discussions are essential so we can understand the possibilities for research interaction, communication, and collaboration made possible by advanced information technologies. Our experiences in this study have increased our awareness for ongoing ethical discussions about privacy, confidentiality, consent, accountability and openness underpinning research with human participants when generating data using an electronic mail discussion group. We describe how we work at upholding these ethical principles focusing on informed consent, participant confidentiality and privacy, the participants as threats to themselves and one another, public-private confusion, employees with access, hackers and threats from the researchers. A variety of complex issues arise during cyberspace research that can make the application of traditional ethical standards troublesome. Communication in cyberspace alters the temporal, spatial and sensory components of human interaction, thereby challenging traditional ethical definitions and calling to question some basic assumptions about identity and ones right to keep aspects of it confidential. Nurse researchers are bound by human research ethics protocols; however, the nature of research by electronic mail generates moral issues as well as ethical

  10. Analyzing E-mail communication of prospective learners

    Directory of Open Access Journals (Sweden)

    Anurag SAXENA

    2005-10-01

    Full Text Available Analyzing E-mail communication of prospective learners Vibha JOSHIAnurag SAXENA Reader School of Management IGNOU, New Delhi, INDIA ABSTRACT Today, computer has replaced all means of communication significantly. E-mail is the most popular means of communication through computers. It has vanished the boundaries between the cities, countries and continents. Earlier Studies that used this medium, had shown evidence of higher quality of responses and also significant cost savings feature of this method (mainly for convenience of dispatch for research purposes. In this communication, an attempt has been made to utilize email responses of prospective learners in education discipline based programs offered through open learning system. The inception of this study is linked to the creation of website (http://www.ignou.ac.in/ and availability of information related to all activated and prospective programs of studies, various school of studies, faculty email addresses and faculty vis-à-vis program coordinator in the University. The present study analyzed 65 email responses received from July 2002 to till date by the researcher on her email ID. These respondents got the email ID from the University website and due to their eagerness to attain qualifications in the field of education/guidance/educational management, sent an e-mail to the program coordinator(s. These email responses were analyzed in order to visualize the learner profiles and viability of the ongoing as well as prospective programs of studies. This paper tries to analyze the e-mail responses of the people who either by surfing IGNOU’s website or from other sources came to know about the various programs of studies offered by the School of Education. The study validates that there is an amount of hidden information even in the curiosity of the learners.

  11. Internet resources and web pages for pediatric surgeons.

    Science.gov (United States)

    Lugo-Vicente, H

    2000-02-01

    The Internet, the largest network of connected computers, provides immediate, dynamic, and downloadable information. By re-architecturing the work place and becoming familiar with Internet resources, pediatric surgeons have anticipated the informatics capabilities of this computer-based technology creating a new vision of work and organization in such areas as patient care, teaching, and research. This review aims to highlight how Internet navigational technology can be a useful educational resource in pediatric surgery, examines web pages of interest, and defines ideas of network communication. Basic Internet resources are electronic mail, discussion groups, file transfer, and the Worldwide Web (WWW). Electronic mailing is the most useful resource extending the avenue of learning to an international audience through news or list-servers groups. Pediatric Surgery List Server, the most popular discussion group, is a constant forum for exchange of ideas, difficult cases, consensus on management, and development of our specialty. The WWW provides an all-in-one medium of text, image, sound, and video. Associations, departments, educational sites, organizations, peer-reviewed scientific journals and Medline database web pages of prime interest to pediatric surgeons have been developing at an amazing pace. Future developments of technological advance nurturing our specialty will consist of online journals, telemedicine, international chatting, computer-based training for surgical education, and centralization of cyberspace information into database search sites.

  12. Mail survey on cardiovascular disease study, Hiroshima and Nagasaki

    Energy Technology Data Exchange (ETDEWEB)

    Kato, Hiroo; Johnson, K G; Yano, Kasuhiko

    1966-07-21

    A mail survey was conducted on 13,000 males in the JNIH-ABCC Life Span Study population aged 40 to 69 in January 1965. The information sought was largely related to what are considered to be risk factors in the development of cerebral and cardiovascular diseases. The questionnaire included such items as residential history, occupation, physical activity, smoking, dietary custom, educational history, medical history, and family history. The final response rate was high (93%) after three mailings and supplemental field visits. As a preliminary analysis, the distribution of these variables was compared by city and exposure status. This analysis revealed that Hiroshima subjects were more educated, were more often managers, clerical workers, and sales workers, performed less physical activity, had more living space and ate a more Western type diet than Nagasaki subjects. It was also shown that the distribution of such variables as place of birth, present address, occupation, marital status, and education differed by the exposure status of subjects. Some methodological problems inherent in a mail survey such as completeness and reliability of obtained information were discussed. 15 references, 1 figure, 28 tables.

  13. Differential Psychological Impact of Internet Exposure on Internet Addicts

    OpenAIRE

    Romano, Michela; Osborne, Lisa A.; Truzoli, Roberto; Reed, Phil

    2013-01-01

    The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and aut...

  14. Piecing together the Internet

    CERN Multimedia

    Rae-Dupree, J

    2002-01-01

    No one group or person can take credit for inventing the Internet. Key ideas came from both military and academic researchers, DOE money got it up and running. Article giving a chronological timeline of the development of the internet from the 1960s to the present day (2 PC screens).

  15. Interlinguistics and the Internet.

    Science.gov (United States)

    Fettes, Mark

    1997-01-01

    Argues that the Internet offers new opportunities for the development, use, and study of planned languages. Notes that while most Web pages on "constructed" languages are the work of individual hobbyists, a few projects have small communities of users. The paper concludes that the use of Esperanto on the Internet reflects increased socialization…

  16. Creating Pupils' Internet Magazine

    Science.gov (United States)

    Bognar, Branko; Šimic, Vesna

    2014-01-01

    This article presents an action research, which aimed to improve pupils' literary creativity and enable them to use computers connected to the internet. The study was conducted in a small district village school in Croatia. Creating a pupils' internet magazine appeared to be an excellent way for achieving the educational aims of almost all…

  17. The Internet Erlang Formula

    DEFF Research Database (Denmark)

    Iversen, Villy Bæk

    2012-01-01

    This paper presents a robust and efficient algorithm for evaluating multi-service multi-rate queueing systems, including finite buffer systems and loss systems. Vint Cerf listed in 2007 seven research problems concerning the Internet. This paper responds to the second problem: an Internet Erlang...

  18. Trust Drives Internet Use

    DEFF Research Database (Denmark)

    Ljunge, Jan Martin

    This paper estimates the effect of trust on internet use by studying the general population as well as second generation immigrants in 29 European countries with ancestry in 87 nations. There is a significant positive effect of trust on internet use. The positive trust effect is not universal...

  19. Teaching on the Internet.

    Science.gov (United States)

    Kubala, Tom

    1998-01-01

    Discusses Internet graduate teaching experiences at the University of Central Florida and explores the pros and cons of online instruction. Describes Internet courses as asynchronous, allowing students to participate at any time and place. States that faculty must be excellent teachers, able to translate their styles into effective,…

  20. The Internet Debate.

    Science.gov (United States)

    Wampler, Angela Mallicote

    1996-01-01

    Examines whether the Internet will be an equalizer or will increase social stratification, whether the Internet will be a boon to rural areas, and how it can be made more appealing or acceptable to rural areas. Discusses the "missionary movement" model of economic change and rural issues related to access to infrastructure, censorship,…

  1. Internet Bad Neighborhoods Aggregation

    NARCIS (Netherlands)

    Moreira Moura, Giovane; Sadre, R.; Sperotto, Anna; Pras, Aiko; Paschoal Gaspary, L.; De Turk, Filip

    Internet Bad Neighborhoods have proven to be an innovative approach for fighting spam. They have also helped to understand how spammers are distributed on the Internet. In our previous works, the size of each bad neighborhood was fixed to a /24 subnetwork. In this paper, however, we investigate if

  2. Ethics and Internet Measurements

    NARCIS (Netherlands)

    van der Ham, Jeroen; van Rijswijk, Roland M.

    2017-01-01

    Over the past decade the Internet has changed from a helpful tool to an important part of our daily lives for most of the world’s population. Where in the past the Internet mostly served to look up and exchange information, it is now used to stay in touch with friends, perform financial transactions

  3. Internet accounting dictionaries

    DEFF Research Database (Denmark)

    Nielsen, Sandro; Mourier, Lise

    2005-01-01

    An examination of existing accounting dictionaries on the Internet reveals a general need for a new type of dictionary. In contrast to the dictionaries now accessible, the future accounting dictionaries should be designed as proper Internet dictionaries based on a functional approach so they can...

  4. Wireless mobile Internet security

    CERN Document Server

    Rhee, Man Young

    2013-01-01

      The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr

  5. LIFE ON THE INTERNET

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    The fast development of the Internet has not only changed people’s lifestyles but also had a deep impact on social structure the rapidly growing Internet has not only changed ways of collecting and using information,but also exerted a farreaching influence on social

  6. Internet and information

    Institute of Scientific and Technical Information of China (English)

    王文龙

    2001-01-01

    As the society develops, information becomesmore important than ever before. Computers willgradually be familiar to more and more people andbe used in more and more ways. Internet makes theworld integrated(合并) as a whole. So, it is important to learn how to make use of the Internet.

  7. Measuring internet skills

    NARCIS (Netherlands)

    van Deursen, Alexander Johannes Aloysius Maria; van Dijk, Johannes A.G.M.

    2010-01-01

    Research that considers Internet skills often lacks theoretical justifications and does not go beyond basic button knowledge. There is a strong need for a measurement framework that can guide future research. In this article, operational definitions for measuring Internet skills are proposed,

  8. Banking on the Internet.

    Science.gov (United States)

    Internet Research, 1996

    1996-01-01

    Electronic ground was broken in 1995 with the development of the completely Internet-based bank Security First Network Bank. This article discusses the need for developing online services, outlines the reasons for the formation of an Internet-based bank and argues that to remain competitive financial services providers must provide easier customer…

  9. Resilience and positive affect contribute to lower cancer-related fatigue among Chinese patients with gastric cancer.

    Science.gov (United States)

    Zou, Guiyuan; Li, Ye; Xu, Ruicai; Li, Ping

    2018-04-01

    To investigate the prevalence of cancer-related fatigue and explore the relationship between resilience, positive affect, and fatigue among Chinese patients with gastric cancer. Cancer-related fatigue is the most distressing symptom reported frequently by cancer patients during both treatment and survival phases. Resilience and positive affect as vital protective factors against cancer-related fatigue have been examined, but the underlying psychological mechanisms are not well understood. A cross-sectional study. Two hundred and three gastric cancer patients were enrolled from three hospitals in China. The Cancer Fatigue Scale, the positive affect subscale of the Positive and Negative Affect Schedule and the Connor-Davidson Resilience Scale (CD-RISC10) were administered. Hierarchical linear regression modelling was conducted to examine the association between resilience and cancer-related fatigue, and the mediating effect of positive affect. The incidence of clinically relevant fatigue among patients with gastric cancer was 91.6%. Regression analysis showed that resilience was negatively associated with cancer-related fatigue, explaining 15.4% of variance in cancer-related fatigue. Mediation analysis showed that high resilience was associated with increased positive affect, which was associated with decreased cancer-related fatigue. Cancer-related fatigue is prevalent among patients with gastric cancer. Positive affect may mediate the relationship between resilience and cancer-related fatigue. Interventions that attend to resilience training and promotion of positive affect may be the focus for future clinical and research endeavours. © 2017 John Wiley & Sons Ltd.

  10. Analysis of factors related to arm weakness in patients with breast cancer-related lymphedema.

    Science.gov (United States)

    Lee, Daegu; Hwang, Ji Hye; Chu, Inho; Chang, Hyun Ju; Shim, Young Hun; Kim, Jung Hyun

    2015-08-01

    The aim of this study was to evaluate the ratio of significant weakness in the affected arm of breast cancer-related lymphedema patients to their unaffected side. Another purpose was to identify factors related to arm weakness and physical function in patients with breast cancer-related lymphedema. Consecutive patients (n = 80) attended a single evaluation session following their outpatient lymphedema clinic visit. Possible independent factors (i.e., lymphedema, pain, psychological, educational, and behavioral) were evaluated. Handgrip strength was used to assess upper extremity muscle strength and the disabilities of arm, shoulder, and hand (DASH) questionnaire was used to assess upper extremity physical function. Multivariate logistic regression was performed using factors that had significant differences between the handgrip weakness and non-weakness groups. Out of the 80 patients with breast cancer-related lymphedema, 29 patients (36.3 %) had significant weakness in the affected arm. Weakness of the arm with lymphedema was not related to lymphedema itself, but was related to the fear of using the affected limb (odds ratio = 1.76, 95 % confidence interval = 1.30-2.37). Fears of using the affected limb and depression significantly contributed to the variance in DASH scores. Appropriate physical and psychological interventions, including providing accurate information and reassurance of physical activity safety, are necessary to prevent arm weakness and physical dysfunction in patients with breast cancer-related lymphedema.

  11. I'm so tired: biological and genetic mechanisms of cancer-related fatigue

    NARCIS (Netherlands)

    Barsevick, Andrea; Frost, Marlene; Zwinderman, Aeilko; Hall, Per; Halyard, Michele; Abertnethy, Amy P.; Baas, Frank; Barsevick, Andrea M.; Bartels, Meike; Boomsma, Dorret I.; Chauhan, Cynthia; Cleeland, Charles S.; Dueck, Amylou C.; Frost, Marlene H.; Halyard, Michele Y.; Klepstad, Pål; Martin, Nicholas G.; Miaskowski, Christine; Mosing, Miriam; Movsas, Benjamin; van Noorden, Cornelis J. F.; Patrick, Donald L.; Pedersen, Nancy L.; Ropka, Mary E.; Shi, Quiling; Shinozaki, Gen; Singh, Jasvinder A.; Sloan, Jeff A.; Sprangers, Mirjam A. G.; Veenhoven, Ruut; Yang, Ping

    2010-01-01

    Objective The goal of this paper is to discuss cancer-related fatigue (CRF) and address issues related to the investigation into potential biological and genetic causal mechanisms. The objectives are to: (1) describe CRF as a component of quality of life (QOL); (2) address measurement issues that

  12. Australian internet policy

    Directory of Open Access Journals (Sweden)

    Angela Daly

    2017-03-01

    Full Text Available This special issue focussing on internet policy in Australia provides a snapshot of developments on various topics (access, privacy, censorship as a means of understanding better the state of play in Australia, and also how this compares to internet policy in other parts of the world, especially Europe and North America. Given changing geopolitics, the influence of internet policy in the rest of the Asia Pacific through vehicles such as the Regional Comprehensive Economic Partnership (RCEP may become increasingly important in Australia in the coming years. This leaves Australia, and its internet policy, at a crossroads, which may reflect broader dynamics in internet policy internationally, and makes this an interesting time in which to explore what is happening in this particular country.

  13. The Internet drag race

    CERN Document Server

    Fitchard, Kevin

    2004-01-01

    The Internet2 consortium members from California Institute of Technology and CERN developed effective fiber optic network, sending data upto 11,000 kilometers between Caltech's LA laboratories and CERN's campus in Geneva at a rate of 6.25 Gb/s. The 68,431 terabit- meters per second data transfer was accomplished using the IPv4 protocols that power the public Internet. Network run by Internet2, called Abilene maintains the highest capacities in the world, connecting dozens of GigaPOP's with OC-192c 10 Gb/s Ip backbone. The member institutions of Internet2 keep Abilene 10% to 15% full, but the researchers also use the network as a base for the latest Internet technologies and experiments, which include development of IPv6. (Edited abstract).

  14. Therapist Factors in Internet-Delivered Cognitive Behavioural Therapy for Major Depressive Disorder

    NARCIS (Netherlands)

    Almlov, J.; Carlbring, P.; Berger, T.; Cuijpers, P.; Andersson, G.

    2009-01-01

    Internet-delivered cognitive behavioural therapy (CBT) can be an effective method for treating major depression, but it often works best when therapist support is provided in the form of e-mail support or telephone calls. The authors investigated whether there were any intraclass correlations within

  15. Four Days That Changed the World (and Other Amazing Internet Stories).

    Science.gov (United States)

    McCarty, Paul J.

    1995-01-01

    An elementary school principal shares some anecdotes about Utah schools' leadership in using the Internet. He describes Salt Lake City youngsters' e-mail communications with other elementary schoolers in Russia, England, Hong Kong, and elsewhere. Although cost can be a limiting factor, the educational benefits of Net-surfing are substantial. (MLH)

  16. Internet Use for Health Information

    Science.gov (United States)

    ... Health Services Utilization > Internet use for Health Information Internet use for Health Information Narrative Due in part ... adults in the United States who use the Internet has increased substantially, from 47 percent in 2000 ...

  17. Causes of Internet Addiction Disorder

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    The Internet Addiction Disorder diagnostic manual approved by psychologists on November 8 divides Internet addiction into five categories,which are addiction to online games,pornography,social networking,Internet information and Internetshopping.

  18. 39 CFR 111.3 - Amendments to the Mailing Standards of the United States Postal Service, Domestic Mail Manual.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Amendments to the Mailing Standards of the United.... 39 June 16, 1991 56 FR 56015 40 September 15, 1991 56 FR 56013 41 December 15, 1991 57 FR 21611 42... July 1, 1997 62 FR 30457 53 January 1, 1998 62 FR 63851 54 January 10, 1999 64 FR 39 55 January 10...

  19. Internet use in radiology: results of a nationwide survey

    Energy Technology Data Exchange (ETDEWEB)

    Vorbeck, F; Zimmermann, C; Vorbeck-Meister, I; Kainberger, F; Imhof, H

    1999-08-01

    Purpose: To determine the number of radiologists who currently have Internet access, their use patterns on the Internet for Radiology purposes, the web sites they would recommend, and the potential site access to the Internet that they would like to see in the future. In addition, this study analyzed the best way to find nationwide radiological sites and their content. Materials and Methods: In a nationwide survey, 854 Austrian radiologist were asked to fill out and return a questionnaire about Internet access, current problems, current and future use, which web site they recommend, and about the use of e-mail. Next, the available nationwide radiological sites were searched with seven major search engines using 37 different keywords, as well as by category search, and by searching for links on the homepages of the radiological departments of all Universities of Austria. Then, the offered information of the founded pages was classified in categories. Results: Of the 210 (24.6%) radiologists who returned the questionnaire, 154 (73%) had Internet access. Time expenditure was considered the main problem using the Internet. The Internet was used for literature research by 69% of the radiologists with Internet access, for e-mail by 60%, and for congress information by 57%. In future, 43% would like to read electronic journals more often and 39% would like to use the web more intensively for scientific congresses. At the present time, we found 17 radiological web sites in Austria. The most promising way to find these sites was to use the search engines Alta Vista and Hotbot. Fifteen (88%) sites offered information for patients, seven (41%) for radiologists, five (29%) for students, and four (24%) for researchers. Summary: Many radiologists in Austria already have Internet access, although time expenditure was considered the main problem with Internet use. Survey responses showed a need for electronic journals. To our point of view, Universities and radiological societies

  20. Internet use in radiology: results of a nationwide survey

    International Nuclear Information System (INIS)

    Vorbeck, F.; Zimmermann, C.; Vorbeck-Meister, I.; Kainberger, F.; Imhof, H.

    1999-01-01

    Purpose: To determine the number of radiologists who currently have Internet access, their use patterns on the Internet for Radiology purposes, the web sites they would recommend, and the potential site access to the Internet that they would like to see in the future. In addition, this study analyzed the best way to find nationwide radiological sites and their content. Materials and Methods: In a nationwide survey, 854 Austrian radiologist were asked to fill out and return a questionnaire about Internet access, current problems, current and future use, which web site they recommend, and about the use of e-mail. Next, the available nationwide radiological sites were searched with seven major search engines using 37 different keywords, as well as by category search, and by searching for links on the homepages of the radiological departments of all Universities of Austria. Then, the offered information of the founded pages was classified in categories. Results: Of the 210 (24.6%) radiologists who returned the questionnaire, 154 (73%) had Internet access. Time expenditure was considered the main problem using the Internet. The Internet was used for literature research by 69% of the radiologists with Internet access, for e-mail by 60%, and for congress information by 57%. In future, 43% would like to read electronic journals more often and 39% would like to use the web more intensively for scientific congresses. At the present time, we found 17 radiological web sites in Austria. The most promising way to find these sites was to use the search engines Alta Vista and Hotbot. Fifteen (88%) sites offered information for patients, seven (41%) for radiologists, five (29%) for students, and four (24%) for researchers. Summary: Many radiologists in Austria already have Internet access, although time expenditure was considered the main problem with Internet use. Survey responses showed a need for electronic journals. To our point of view, Universities and radiological societies

  1. The node-weighted Steiner tree approach to identify elements of cancer-related signaling pathways.

    Science.gov (United States)

    Sun, Yahui; Ma, Chenkai; Halgamuge, Saman

    2017-12-28

    Cancer constitutes a momentous health burden in our society. Critical information on cancer may be hidden in its signaling pathways. However, even though a large amount of money has been spent on cancer research, some critical information on cancer-related signaling pathways still remains elusive. Hence, new works towards a complete understanding of cancer-related signaling pathways will greatly benefit the prevention, diagnosis, and treatment of cancer. We propose the node-weighted Steiner tree approach to identify important elements of cancer-related signaling pathways at the level of proteins. This new approach has advantages over previous approaches since it is fast in processing large protein-protein interaction networks. We apply this new approach to identify important elements of two well-known cancer-related signaling pathways: PI3K/Akt and MAPK. First, we generate a node-weighted protein-protein interaction network using protein and signaling pathway data. Second, we modify and use two preprocessing techniques and a state-of-the-art Steiner tree algorithm to identify a subnetwork in the generated network. Third, we propose two new metrics to select important elements from this subnetwork. On a commonly used personal computer, this new approach takes less than 2 s to identify the important elements of PI3K/Akt and MAPK signaling pathways in a large node-weighted protein-protein interaction network with 16,843 vertices and 1,736,922 edges. We further analyze and demonstrate the significance of these identified elements to cancer signal transduction by exploring previously reported experimental evidences. Our node-weighted Steiner tree approach is shown to be both fast and effective to identify important elements of cancer-related signaling pathways. Furthermore, it may provide new perspectives into the identification of signaling pathways for other human diseases.

  2. Do Cancer-Related Beliefs Influence the Severity, Incidence, and Persistence of Psychological Symptoms?

    Science.gov (United States)

    Desautels, Caroline; Trudel-Fitzgerald, Claudia; Ruel, Sophie; Ivers, Hans; Savard, Josée

    Previous studies have suggested that negative beliefs about cancer may impair patients' psychological well-being, but only a few of these studies focused on specific psychological symptoms, and many were cross-sectional. The aim of this study was to investigate longitudinally the relationship of cancer-related cognitions with the severity, incidence, and persistence of anxiety, fear of cancer recurrence, depression, and insomnia symptoms during an 18-month period. Patients scheduled to undergo surgery for cancer (N = 962) completed a questionnaire assessing cancer-related cognitions at baseline (T1), the Hospital Anxiety and Depression Scale, the severity subscale of the Fear of Cancer Recurrence Inventory, and the Insomnia Severity Index at baseline (T1) and 2 (T2), 6 (T3), 10 (T4), 14 (T5), and 18 (T6) months later. Group × time factorial analyses using mixed models revealed that participants endorsing more negative cancer-related cognitions consistently reported more severe symptoms throughout the 18-month period. Logistic regression analyses suggested that endorsing more negative cancer-related cognitions at T1 significantly increased incidence and persistence rates of clinical levels of psychological symptoms. These findings suggest that the endorsement of negative cancer-related beliefs at the perioperative period influences the longitudinal evolution of anxiety, fear of cancer recurrence, depression, and insomnia symptoms in the following months. These results highlight the relevance of using cognitive restructuring early during the cancer care trajectory to potentially revise erroneous beliefs about cancer and prevent the incidence and persistence of psychological disturbances over time.

  3. Internet Addiction in Adolescents

    Directory of Open Access Journals (Sweden)

    Rębisz Sławomir

    2016-08-01

    Full Text Available The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the twentieth century, usually appears in the literature in the context of young people who have been found to be most vulnerable. The phenomenon is known as Adolescent Internet Addiction. Compulsive use of the Internet is a complex phenomenon, its effects being visible in almost all aspects of a young person’s social life. It is manifested in a variety of pathological behaviors and emotional states grouped into several major psycho-physical and social effects that may appear simultaneously, e.g. anger, depression, loneliness or anxiety associated with the lack of access to the network, the weakening of social ties, withdrawal from real life, lack of educational achievement, chronic fatigue or deteriorating health. The authors of this study aim to assess the level of Internet addiction among adolescents in Poland and indicate its main behavioral manifestations, in the students surveyed, which influence their pathological use of the Internet. Our study involved a total of 505 students from three high schools located in Rzeszow (N = 505 and was carried out by questionnaires, including, among others, The Problematic Use of the Internet (PUI which is the Polish adaptation of Kimberly Young’s Internet Addiction Test (IAT (Cronbach’s α = 0.89. Statistical analysis of responses from the PUI test allowed us to determine (1 the level of Internet addiction among these adolescents, whereas the univariate (ANOVA analysis enabled us (2 to verify the hypothesis of the existence of differences in the level of Internet addiction among the investigated groups as far as gender, place of residence or grade are concerned

  4. Internet Addiction and Antisocial Internet Behavior of Adolescents

    Directory of Open Access Journals (Sweden)

    Hing Keung Ma

    2011-01-01

    Full Text Available Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial use of Internet is discussed. It is argued that the behavior of Internet use is similar to daily life social behavior. In other words, Internet behavior is a kind of social behavior. Kohlberg's theory of moral development is employed to delineate the moral reasoning of the antisocial Internet behavior. The following behaviors are regarded as antisocial Internet behavior: (1 the use of Internet to carry out illegal activities such as selling faked products or offensive pornographic materials, (2 the use of Internet to bully others (i.e., cyberbullying such as distributing libelous statements against a certain person, (3 the use of Internet to cheat others, and (4 the use of Internet to do illegal gambling. The characteristics of the moral stages that are associated with these antisocial Internet behaviors are investigated in detail.

  5. Internet Addiction and Antisocial Internet Behavior of Adolescents

    Science.gov (United States)

    Ma, Hing Keung

    2011-01-01

    Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial) use of Internet is discussed. It is argued that the behavior of Internet use is similar to daily life social behavior. In other words, Internet behavior is a kind of social behavior. Kohlberg's theory of moral development is employed to delineate the moral reasoning of the antisocial Internet behavior. The following behaviors are regarded as antisocial Internet behavior: (1) the use of Internet to carry out illegal activities such as selling faked products or offensive pornographic materials, (2) the use of Internet to bully others (i.e., cyberbullying) such as distributing libelous statements against a certain person, (3) the use of Internet to cheat others, and (4) the use of Internet to do illegal gambling. The characteristics of the moral stages that are associated with these antisocial Internet behaviors are investigated in detail. PMID:22125466

  6. EDITORIAL: The Internet and physics

    Science.gov (United States)

    Burton, Paul

    1998-05-01

    Feature Issue Editor The World Wide Web has been described as a `distributed heterogeneous collaborative multimedia information system'. It began as a networked information project at CERN, where Tim Berners-Lee, now Director of the World Wide Web Consortium [W3C], developed a vision of the project. The Web has a body of software and a set of protocols and conventions. Through the use of hypertext and multimedia techniques, the Web is easy for anyone to roam, browse and contribute to. It was developed by physicists at CERN to fulfil a communication need, and is one of the fastest growing resources worldwide. The number of available sites increases hourly, the ability to find information becomes easier, and contacting anyone with an e-mail address is as easy as picking up the telephone and talking to them. A pupil researching a project on say `alternative energy' simply launches a web browser with the relevant search criteria. Some 13 500 references later they cut and paste sections together and, hey presto, they have their article. The teacher, on the other hand, has to discern what input to this work the pupil has made! What credit should be given for such an attempt? I believe we are going to have to teach how to value a site, by comparing it with other similar sites and exercising some judgement on what we find. Using a search with `physics' as my only keyword found more than 3.5 million references! Clearly the researcher has to become discerning, being judge and jury as it were. Will the Internet catch on? I fear so, is the simple answer. However, I am concerned that with so much information available the ability to discern quality sites from inferior ones and fact from fiction will become a major issue for educationalists. Pupils are going to have to be taught how to assess a site, how to judge its validity and learn to give correct references in their reports. Because Internet sites are ephemeral, a reference given today may not be active next week. Indeed

  7. Towards Marxian Internet Studies

    Directory of Open Access Journals (Sweden)

    Christian Fuchs

    2012-05-01

    Full Text Available This article gives an overview of example approaches of Critical Internet Studies and points out key concepts of this field. Critical Cyberculture Studies and Critical Political Economy/Critical Theory of the Internet are identified as two approaches in Critical Internet Studies. The paper also discusses the role of 11 Marxian concepts for Critical Internet Studies. Marxian concepts that have been reflected in Critical Internet Studies include: dialectics, capitalism, commodification, surplus value/exploitation/alienation/class, globalization, ideology, class struggle, commons, public sphere, communism, and aesthetics. The paper points out the importance of explicitly acknowledging the importance of Karl Marx’s thinking in Critical Internet Studies. Marx’s concepts are today frequently used implicitly, without acknowledging and engaging with their roots. A critique of the approach of “Critical” Cyberculture Studies is advanced. This approach is compared to the approaches of Critical Theory and Critical Political Economy of the Internet. The difference between these two approaches reflects the debate about class exploitation and non-class domination between Cultural Studies and Critical Political Economy in Media and Communication Studies.

  8. SEGMENTASI LAYANAN INTERNET BANKING

    Directory of Open Access Journals (Sweden)

    Ellen Theresia Sihotang

    2017-04-01

    Full Text Available The purpose of this study is to analyze internet banking�s users based on their experiences. It can be used to set marketing program of internet banking that appropriate with customers needs, in order to anticipate tight competition. This research methods starts with focus group discussion and clustering analysis to classify 312 respondents of internet banking users based on demographic, benefit and behavioral segmentation. The sampling method uses purposive sampling and snowball sampling. K-Means Clustering method�s produces four optimal clusters. The benefit orientation of the first cluster in on time saving. Second cluster, concern on the ease of getting and operating internet banking so this cluster does not need auxiliary features such as video guide to use internet banking. The third cluster�s orientation is on the modern lifestyle and the ease of getting and operating internet banking service with detailed daily mutation transaction The fourth cluster, concerns on the detailed daily mutation transaction but they are not sure with the security of personal data via internet banking. �

  9. Safety in the Internet

    Directory of Open Access Journals (Sweden)

    Semenko T.V.

    2016-11-01

    Full Text Available the modern world is the world of computer technology, and the children living in this world feel comfortable in it, they master the computer, mobile devices, new-fangled gadgets easily and use them skillfully. However, their knowledge of the safety in the Internet lags behind their ability to develop new devices. The number of the Internet users is increased every year, so the problem of children safety in the Internet is very urgent. It is necessary for parents, educators and teachers to conduct explanatory conversations and activities for explanation and consolidation the rules of “The Safe Internet”.

  10. Are internet prices sticky?

    OpenAIRE

    Lünnemann, Patrick; Wintr, Ladislav

    2006-01-01

    This paper studies the behaviour of Internet prices. It compares price rigidities on the Internet and in traditional brick-and-mortar stores and provides a cross-country perspective. The data set covers a broad range of items typically sold over the Internet. It includes more than 5 million daily price quotes downloaded from price comparison web sites in France, Germany, Italy, the UK and the US. The following results emerge from our analysis. First, and contrary to the recent findings for co...

  11. Internet plan and planning

    Directory of Open Access Journals (Sweden)

    Kahriman Emina

    2008-01-01

    Full Text Available Paper discuss specific features of internet plan as well as planning as management process in general in the contemporary environment. No need to stress out that marketing plan and marketing planning is core activity in approaching to market. At the same time, there are a lot specific c request in preparing marketing plan comparing to business planning due to marketing plan is an essential part. The importance of internet plan and planning rely on specific features of the internet network but as a part of general corporate as well as marketing strategy.

  12. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...... the speed of technological obsolescence, market share dominance, and the black boxing of technology influence consumer intention to adopt WiMax and 3G wireless internet for their laptop computers. The results, implications for industry, and areas for further research are discussed....

  13. INTERNET AND PIRACY

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    Internet has penetrated into all the aspects of our life and work.We can study and work by it;we can find a job by it;we can communicate by it;we can entertain by it;we can buy and sell by it.We can do almost everything on the Internet,and almost anywhere anytime. However,at the same time Internet provides services for us,it is inevitably invading our privacy to some degree.The services on most websites require our registering. If we want to enjoy these services,we have to provide much private informa-

  14. Towards the Tactile Internet

    DEFF Research Database (Denmark)

    Szabó, Dávid; Gulyás, András; Fitzek, Frank

    2015-01-01

    5G communication networks enable the steering and control of Internet of Things and therefore require extreme low latency communication referred to as the tactile Internet. In this paper we show that the massive use of network coding throughout the network significantly improves latency and reduce...... the frequency of packet re-transmission, so an architecture built around network coding may be a feasible road towards realizing the tactile internet vision. Our contribution is threefold: (i) we show how network coding improves latency and reduces packet re-transmission with respect to other coding schemes...

  15. Rumors and Internet

    Directory of Open Access Journals (Sweden)

    RENARD, Jean-Bruno

    2011-12-01

    Full Text Available This paper will address the rumors and the Internet in two ways: rumors as the subject of the Internet and the Internet as a channel of dissemination of rumors. We define rumors in a broadly way as an unverified information circulating within a social group. In a strict sense, rumors can be understand as false information that people believe. A rumor is an urban myth, a legend, a hoax, or a contemporary narrative, a tale of everyday life, false or dubious, but in which we believed because it is likely, and it conveys a moral message.

  16. Privacidad en internet

    OpenAIRE

    Rodríguez Gómez, José Luis

    2010-01-01

    Análisis de la privacidad en internet, y, en particular, en las redes sociales y la blogosfera. Se parte del concepto jurídico de privacidad y se analizan los riesgos crecientes que la acosan. Anàlisi de la privacitat a Internet, i, en particular, en les xarxes socials i la blogosfera. Es parteix del concepte jurídic de privacitat i s'analitzen els riscos creixents que l'assetgen. Analysis of Internet privacy, and in particular, social networks and the blogosphere. It begins with legal ...

  17. Midwest Growers’ Mail Survey of Contributors to Migrant Health and Nutrition

    Science.gov (United States)

    Kilanowski, Jill F.

    2014-01-01

    The purpose of this study was to solicit information from farm owners (growers), as representatives of their farm businesses, regarding descriptive information on migrant camp housing that may contribute to the health and nutritional status of employed workers and their families. This cross–sectional descriptive mail survey was sent to 802 growers in Indiana, Michigan, Ohio, and Pennsylvania via the US Postal Service. The growers were identified by an Internet search for licensed agricultural work camps in Midwest departments of agriculture. Response rate was 34%. Overall, growers reported a median of one migrant camp with 23 residents, employing workers seasonally for either 10 weeks or 6 months, with seven accompanying children on site. Individual kitchen appliances varied across the states, potentially influencing the preparation of healthy meals. Three themes were identified from the results. First, over one third of owners lacked or had limited knowledge about the health services available to migrant families. Second, migrant workers may have limited access to a variety of fresh produce for household meal preparation. Third, migrant children were unable to easily access public play areas, and families lacked recreational spaces in agricultural work camps. Play areas in migrant camps were mostly identified as open fields with little play equipment on site. Knowledge learned can influence future agricultural camp practices and the design of future research studies, and provide direction for grower education topics presented at agricultural conferences and by extension services. PMID:22994639

  18. Nuclear medicine resources in the internet

    International Nuclear Information System (INIS)

    Obaldo, J.M.

    1996-01-01

    The internet is a global collection of networked computers linked by a set of protocols which allows the otherwise disperate computer systems to communicate with each other. In contrast to text-only data available previously, the World Wide Web allows multimedia content to be available on the internet. Graphics can now likewise be used as links. The development of World Wide Web client software such as Mosaic, or the currently more popular Netscape Navigator, makes linking from one document to another (colloquially referred to as 'surfing the Net') fast and simple. While these software are commonly called Web browsers their function extends to the other internet services such as e-mail, file transfer protocol, remote login, Gopher and WAIS. A prototype application being developed as a case-based teaching file which could include clinical data and case discussion, aside of course from the nuclear medicine and related images. Contributions from various institutions can be made available on their own servers and linked together through hypertext. Examples of these are websites of the Mallinckrodt Institute of Radiology and the Joint Program in Nuclear Medicine of the Harvard Medical School. The university of Iowa also has its Virtual Hospital, a collection of clinical cases with radiologic images. Most major universities and medical centers have websites where information on on-going research, facilities and personnel are made available. Links to various special interest discussion groups (e.g. those developing the common image file format) are also accessible and the documents often contain further links to related fields in nuclear technology. The very nature of the hypertext transfer protocol of the World Wide Web makes it a relatively simple matter for a developer of a teaching system to include links to necessary resources. It is envisioned that an internet-based teaching module will be incorporated in some nuclear medicine training programs in the United States

  19. Direct-to-consumer advertisements of prescription medications over the Internet.

    Science.gov (United States)

    Fogel, Joshua; Novick, Daniel

    2009-01-01

    This study sought data on the impact of direct-to-consumer (DTC) advertisements and both intentions and frequency to seek more information about the drug being advertised. Data were collected from 498 college students regarding intention to seek and how frequently they obtained more information about prescription medications. For intentions, grocery or pharmacy and radio advertisements were associated with lesser intentions. For frequency, Internet advertisements were associated, while newspaper and spam e-mail advertisements were not. Types of sources associated with seeking additional information were doctor, Internet, and 1-800 information numbers. A significant interaction existed for seeing Internet advertisements for drugs and then seeking additional information from a doctor and not from the Internet. In conclusion, Internet advertising is associated with seeking additional information from a reliable source such as a doctor.

  20. Grid to supersede internet

    CERN Multimedia

    Goodard, A

    2000-01-01

    British scientists are developing a successor to the internet that will not only give researchers access to information but also raw computing power via seamless connections to the rest of the world (1 page).

  1. Race to replace internet

    CERN Multimedia

    Ahuja, A

    2000-01-01

    British scientists are urging the Government to support a project to build a computing 'Grid' to succeed the Internet. They believe that fortunes await the countries and companies who commit themselves from the very beginning (1 page).

  2. Scientists planning new internet

    CERN Multimedia

    Cookson, C

    2000-01-01

    British scientists are preparing to build the next generation internet - 'The Grid'. The government is expected to announce about 100 million pounds of funding for the project, to be done in collaboration with CERN (1/2 p).

  3. Internet research in psychology.

    Science.gov (United States)

    Gosling, Samuel D; Mason, Winter

    2015-01-03

    Today the Internet plays a role in the lives of nearly 40% of the world's population, and it is becoming increasingly entwined in daily life. This growing presence is transforming psychological science in terms of the topics studied and the methods used. We provide an overview of the literature, considering three broad domains of research: translational (implementing traditional methods online; e.g., surveys), phenomenological (topics spawned or mediated by the Internet; e.g., cyberbullying), and novel (new ways to study existing topics; e.g., rumors). We discuss issues (e.g., sampling, ethics) that arise when doing research online and point to emerging opportunities (e.g., smartphone sensing). Psychological research on the Internet comes with new challenges, but the opportunities far outweigh the costs. By integrating the Internet, psychological research has the ability to reach large, diverse samples and collect data on actual behaviors, which will ultimately increase the impact of psychological research on society.

  4. Nasionalisme di Era Internet

    Directory of Open Access Journals (Sweden)

    Danu Widhyatmoko

    2015-04-01

    Full Text Available Nationalism and nationality of a country life are moving into the new phase. Internet has become a new medium that opens up so many opportunities to create a sense of nationalism for the country. This paper contains a review of nationalism in the age of the Internet. This paper begins with understanding nationalism, the character of the Internet, social media and nationalism in the era of the Internet. Research method used in this paper is literature study, continued with reflective data analysis. With reflective analysis method, the authors analyzed data from the data collection has been carried out for comparison between the existing literature by circumstances or phenomena that occur, so that the conclusions of rational and scientific data can be obtained. 

  5. Countering Internet Extremism

    National Research Council Canada - National Science Library

    Thomas, Timothy L

    2009-01-01

    ... that. Extremists' use of the Internet has developed rapidly since the Chechen-Russian conflict. Now they are more creative, and more importantly, more persuasive in their methods to recruit members, gain financial support, and provide proof of success...

  6. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  7. 76 FR 13666 - Pitney Bowes, Inc., Mailing Solutions Management, Global Engineering Group, Including On-Site...

    Science.gov (United States)

    2011-03-14

    ...., Mailing Solutions Management, Global Engineering Group, Including On-Site Leased Workers From Guidant... workers and former workers of Pitney Bowes, Inc., Mailing Solutions Management Division, Engineering... reviewed the certification to clarify the subject worker group's identity. Additional information revealed...

  8. Combating the corporate paper war: Electronic mail abuse

    Directory of Open Access Journals (Sweden)

    M. M. Botha

    2008-11-01

    Full Text Available The primary objective of the research was to investigate the mailing practices and filing methods in a computer support or administrative environment involving the resulting abuse of paper. In applied research, an exploratory investigation focused on selected higher education institutions in Gauteng with a structured questionnaire as measuring instrument. In the analysis and interpretations of the findings, correlation and cross-tabulation on all sets of variables determined whether any meaningful associations could be found. The investigation indicated that the war against paper abuse is not over by any means. Perceptions regarding a paperless office and assumptions that technology could assist organisations to combat paper abuse were unfounded, mainly because of a lack of guidance, training interventions and control measures. Consequently, follow-up research is presently conducted whereby models will be designed and implemented concomitant with specified computer software features in order to counteract the abuse of paper and facilitate the effective use of information and communication technology interfaced work processes and procedures. This article focuses only on the electronic mail and filing components of the investigation.

  9. Ombuds' corner: Code of Conduct and e-mails

    CERN Multimedia

    Vincent Vuillemin

    2011-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.   Luke* holds a key position in the coordination of a large project. He is also a recognized expert in modeling complicated structures. Because of his expertise in the field, he receives a considerable number of e-mails every day which he has trouble responding to in addition to his responsibilities of management and development. Constantly interrupted, he tends to answer his emails quickly, sometimes even in an instinctive way, which leads to somewhat laconic messages. One day he receives an e-mail from Dave* challenging some of the decisions taken by the project’s management. Luke agrees with Dave’s remarks, which seem justified given his own expertise of the su...

  10. AN EFFECTIVE SPAM FILTERING FOR DYNAMIC MAIL MANAGEMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    S. Arun Mozhi Selvi

    2012-04-01

    Full Text Available Spam is commonly defined as unsolicited email messages and the goal of spam categorization is to distinguish between spam and legitimate email messages. The economics of spam details that the spammer has to target several recipients with identical and similar email messages. As a result a dynamic knowledge sharing effective defense against a substantial fraction of spam has to be designed which can alternate the burdens of frequent training stand alone spam filter. A weighted email attribute based classification is proposed to mainly focus to encounter the issues in normal email system. These type of classification helps to formulate an effective utilization of our email system by combining the concepts of Bayesian Spam Filtering Algorithm, Iterative Dichotmiser 3(ID3 Algorithm and Bloom Filter. The details captured by the system are processed to track the original sender causing disturbances and prefer them to block further mails from them. We have tested the effectiveness of our scheme by collecting offline data from Yahoo mail & Gmail dumps. This proposal is implemented using .net and sample user-Id for knowledge base.

  11. Send and Receive fax documents using electronic mail

    CERN Multimedia

    2005-01-01

    Any CERN Staff Member can now send and receive faxes directly through email using the new fax service. To do so, you need to register and obtain your “personal” fax number using the page http://cern.ch/fax. Once you have your fax number, you can fax someone by sending an email message to the address of the form name@number.mail2fax.cern.ch, for example: Joe.Bloggs@000441719999999.mail2fax.cern.ch In the example, “000441719999999” is the fax number to call, as seen from inside CERN, in this case, in London. “Joe.Bloggs” is the name of your correspondent and it will appear on the cover page along with your name, email address, your “personal” fax number, and the subject of the email. Documentation and additional examples of fax addresses are on http://cern.ch/fax The eventual text of your email will be transmitted in the fax, followed by the optional attachments, as extra pages. Attachments can be in Acrobat (.pdf), Text (.txt), Word (.doc) , Excel (.xls) or Powerpoint (.ppt) formats. Once the ...

  12. Send and Receive fax documents using electronic mail

    CERN Multimedia

    2005-01-01

    Any CERN Staff Member can now send and receive faxes directly through email using the new fax service. To do so, you need to register and obtain your “personal” fax number using the page http://cern.ch/fax. Once you have your fax number, you can fax someone by sending an email message to the address of the form name@number.mail2fax.cern.ch, for example: Joe.Bloggs@000441719999999.mail2fax.cern.ch In the example, “000441719999999” is the fax number to call, as seen from inside CERN, in this case, in London. “Joe.Bloggs” is the name of your correspondent and it will appear on the cover page along with your name, email address, your “personal” fax number, and the subject of the email. Documentation and additional examples of fax addresses are on http://cern.ch/fax The eventual text of your email will be transmitted in the fax, followed by the optional attachments, as extra pages. Attachments can be in Acrobat (.pdf), Text (.txt), Word (.doc) , Excel (.xls) or Powerpoint (.ppt) formats. Once ...

  13. Stability of carboxyhemoglobin in stored and mailed blood samples.

    Science.gov (United States)

    Hampson, Neil B

    2008-02-01

    Elevated blood carboxyhemoglobin (COHb) levels are used to confirm a clinical diagnosis of exposure to carbon monoxide (CO) and, in some instances, assess severity of poisoning. However, many hospital laboratories cannot measure COHb because they do not have CO-oximeters. In such instances, blood samples are often sent to outside laboratories or with a transported patient for measurement at the receiving hospital. This study was conducted to assess the stability of COHb in stored and mailed blood samples anticoagulated with heparin. Adult human blood was drawn into standard sample tubes anticoagulated with sodium heparin. Carbon monoxide gas was infused to raise the COHb level to 25% to 35%. Samples were then refrigerated or stored at room temperature, and serial COHb determinations were performed for 28 days. Additional samples were measured after being mailed locally or across the United States and back. No significant changes in COHb levels were seen in samples stored either in refrigeration or at room temperature over a period of 28 days or in samples shipped without refrigeration locally or across the United States. Carboxyhemoglobin levels in whole blood samples anticoagulated with heparin are stable with or without refrigeration for up to 4 weeks. If COHb measurement capability is not available, such samples may be shipped or transported with patients with confidence that the COHb level will be stable when measured at a later time.

  14. Learning Internet of Things

    CERN Document Server

    Waher, Peter

    2015-01-01

    If you're a developer or electronics engineer who is curious about Internet of Things, then this is the book for you. With only a rudimentary understanding of electronics, Raspberry Pi, or similar credit-card sized computers, and some programming experience using managed code such as C# or Java, you will be taught to develop state-of-the-art solutions for Internet of Things in an instant.

  15. Internet of things

    OpenAIRE

    Salazar Soler, Jorge; Silvestre Bergés, Santiago

    2015-01-01

    This is an introductory course to the IoT (Internet of things). In the early chapters the basics about the IoT are introduced. Then basics of IPv6 internet protocol that is the most used in IoT environment as well as main applications, the current state of the market and the technologies that enable the existence of the IoT are described. Finally the future challenges that are considered most important are discussed. Peer Reviewed

  16. Saving the internet.

    Science.gov (United States)

    Zittrain, Jonathan

    2007-06-01

    The Internet goose has laid countless golden eggs, along with a growing number of rotten ones. But it's the rotten ones that now tempt commercial, governmental, and consumer interests to threaten the Internet's uniquely creative power. The expediently selected, almost accidentally generative properties of the Internet - its technical openness, ease of access and mastery, and adaptability - have combined, especially when coupled with those of the PC, to produce an unsurpassed environment for innovative experiment. Those same properties, however, also make the Internet hospitable to various forms of wickedness: hacking, porn, spam, fraud, theft, predation, and attacks on the network itself. As these undesirable phenomena proliferate, business, government, and many users find common cause for locking down Internet and PC architecture in the interests of security and order. PC and Internet security vulnerabilities are a legitimate menace. However, the most likely reactions - if they are not forestalled - will be at least as unfortunate as the security problems themselves. Consider the growing profusion of "tethered appliances" - devices whose functions cannot readily be altered by their owners (think TiVo). Such appliances take Internet innovations and wrap them up in a neat, easy-to-use package, which is good - but only if the Internet and PC can remain sufficiently in the center of the digital ecosystem to produce the next round of innovations and to generate competition. People buy these devices for their convenience or functionality and may appreciate the fact that they are safer to use (they limit the damage users can do through ignorance or carelessness). But the risk is that users, by migrating to such appliances, will unwittingly trade away the future benefits of generativity - a loss that will go unappreciated even as innovation tapers off.

  17. Internet and computer crimes

    OpenAIRE

    Janýšková, Zuzana

    2010-01-01

    INTERNET AND COMPUTER CRIME (SUMMARY) The purpose of this thesis is to provide an introduction to the basic problems of Internet and computer crime (furthermore also "cyber crime"), which is a type of crime that is still relatively new, but fast developing in a similar pace as the information technologies. The thesis contains seven substantial chapters. First chapter is an introduction of this thesis, which focuses on its structure and summary of the content. Second chapter presents the most ...

  18. Acne and the Internet.

    Science.gov (United States)

    Zeichner, Joshua A; Del Rosso, James Q

    2016-04-01

    The Internet provides both education and miseducation for acne patients. Although some sites provide disease background information and objective treatment guidance, support networks, and research findings, others may seem to be objective on the surface, but are in reality run by untrained, self-proclaimed experts or are promotional in nature. Providers must be aware of the potential benefits and pitfalls the Internet provides for those suffering with acne. Copyright © 2016 Elsevier Inc. All rights reserved.

  19. Strategy and the Internet.

    Science.gov (United States)

    Porter, M E

    2001-03-01

    Many of the pioneers of Internet business, both dot-coms and established companies, have competed in ways that violate nearly every precept of good strategy. Rather than focus on profits, they have chased customers indiscriminately through discounting, channel incentives, and advertising. Rather than concentrate on delivering value that earns an attractive price from customers, they have pursued indirect revenues such as advertising and click-through fees. Rather than make trade-offs, they have rushed to offer every conceivable product or service. It did not have to be this way--and it does not have to be in the future. When it comes to reinforcing a distinctive strategy, Michael Porter argues, the Internet provides a better technological platform than previous generations of IT. Gaining competitive advantage does not require a radically new approach to business; it requires building on the proven principles of effective strategy. Porter argues that, contrary to recent thought, the Internet is not disruptive to most existing industries and established companies. It rarely nullifies important sources of competitive advantage in an industry; it often makes them even more valuable. And as all companies embrace Internet technology, the Internet itself will be neutralized as a source of advantage. Robust competitive advantages will arise instead from traditional strengths such as unique products, proprietary content, and distinctive physical activities. Internet technology may be able to fortify those advantages, but it is unlikely to supplant them. Porter debunks such Internet myths as first-mover advantage, the power of virtual companies, and the multiplying rewards of network effects. He disentangles the distorted signals from the marketplace, explains why the Internet complements rather than cannibalizes existing ways of doing business, and outlines strategic imperatives for dot-coms and traditional companies.

  20. Security in Internet

    Directory of Open Access Journals (Sweden)

    Felician ALECU

    2006-01-01

    Full Text Available A very good method that can be used to protect a private network is the implementation of a firewall between Internet and Intranet. This firewall will filter the packets that transit the network according with the security policy defined at the system level. The SSL protocol allows verifying the identity of a WEB server based on a digital certificate issued by a certification authority. Secure data transport over the Internet is done by using encryption methods.