Supplementary Materials ANTICIPATION PHASE Neutral vs. gain
... To investigate areas of decreased activity during reward anticipation, we also examined the reverse contrast (neutral cues contrasted with gain cues). This yielded predictable activations in areas related to the default mode network (DMN) [40], including bilateral middle frontal gyrus, superior fron ...
... To investigate areas of decreased activity during reward anticipation, we also examined the reverse contrast (neutral cues contrasted with gain cues). This yielded predictable activations in areas related to the default mode network (DMN) [40], including bilateral middle frontal gyrus, superior fron ...
The Effectiveness of Online Advertising of Companies in Poland
... could not assess the effectiveness of this type of advertisement. Almost every third respondent thinks that the effectiveness of banners is optimal. A total of 38% claim that this type of advertising is weak (28%) or very weak (10%). Similarly to the advertisement in a form of a banner, the responde ...
... could not assess the effectiveness of this type of advertisement. Almost every third respondent thinks that the effectiveness of banners is optimal. A total of 38% claim that this type of advertising is weak (28%) or very weak (10%). Similarly to the advertisement in a form of a banner, the responde ...
Socio-economic impact of allocating 700 band to mobile in Asia Pacific
... BCG's client ("Third-Parties") may not, and it is unreasonable for any Third-Party to, rely on these materials for any purpose whatsoever. To the fullest extent permitted by law (and except to the extent otherwise agreed in a signed writing by BCG), BCG shall have no liability whatsoever to any Thir ...
... BCG's client ("Third-Parties") may not, and it is unreasonable for any Third-Party to, rely on these materials for any purpose whatsoever. To the fullest extent permitted by law (and except to the extent otherwise agreed in a signed writing by BCG), BCG shall have no liability whatsoever to any Thir ...
5. Parenthood
... nursery or pre-school between the ages of 3 and 4, dependent on when the parents feel they are ready. However, in Sweden, most children are placed in state provided day care from the age of one. In Japan, parents have reported allowing their children as young as four and seven years run errands for ...
... nursery or pre-school between the ages of 3 and 4, dependent on when the parents feel they are ready. However, in Sweden, most children are placed in state provided day care from the age of one. In Japan, parents have reported allowing their children as young as four and seven years run errands for ...
Information Revelation and Privacy in Online Social Networks (The
... conservative definition, most users tend to list anyone who they know and do not actively dislike. This often means that people are indicated as Friends even though the user does not particularly know or trust the person” [8] (p. 2). Second, while the number of strong ties that a person may maintain ...
... conservative definition, most users tend to list anyone who they know and do not actively dislike. This often means that people are indicated as Friends even though the user does not particularly know or trust the person” [8] (p. 2). Second, while the number of strong ties that a person may maintain ...
conceptualizing continuity and change
... accounting for both continuity and change over time. Models of path dependence based on increasing returns, inspired by the example of the QWERTY typewriter keyboard, have played an important role in the analysis of institutional continuity, but they have been criticized for their inability to accom ...
... accounting for both continuity and change over time. Models of path dependence based on increasing returns, inspired by the example of the QWERTY typewriter keyboard, have played an important role in the analysis of institutional continuity, but they have been criticized for their inability to accom ...
The Myth of Impoverished Signal
... decade, many of these practices are no longer followed, at least not by a substantial number of people. Yet myths die hard, and even those not using these early features of online communication “know” that they characterize the medium. As the meanings (and uses) of emoticons have evolved, so have th ...
... decade, many of these practices are no longer followed, at least not by a substantial number of people. Yet myths die hard, and even those not using these early features of online communication “know” that they characterize the medium. As the meanings (and uses) of emoticons have evolved, so have th ...
Digital Methods for Web Research
... so to speak, or the fact of the matter a posteriori. Finally, for user studies, how to migrate the methods online, or to the digital? How does one migrate to the medium the study of one’s consumption of health information, for example (Mager, 2012)? May one consult people’s browser histories? In all ...
... so to speak, or the fact of the matter a posteriori. Finally, for user studies, how to migrate the methods online, or to the digital? How does one migrate to the medium the study of one’s consumption of health information, for example (Mager, 2012)? May one consult people’s browser histories? In all ...
Chemical Effects of Ecstasy on the Human Brain
... Chemical Effects of Ecstasy on the Human Brain Ecstasy was synthesized and patented for the first time by a German Pharmaceutical company named Merck in the year 1914. It was originally created as an appetite suppressant. In the 1970’s it was being administer to patients receiving psychotherapy with ...
... Chemical Effects of Ecstasy on the Human Brain Ecstasy was synthesized and patented for the first time by a German Pharmaceutical company named Merck in the year 1914. It was originally created as an appetite suppressant. In the 1970’s it was being administer to patients receiving psychotherapy with ...
Always looking to manipulate, serial killers will
... work; drugs have not proven successful in treatment; and psychotherapy, which involves trust and a relationship with the therapist, is out of the question, because psychopaths are incapable of opening up to others. They don't want to change. ...
... work; drugs have not proven successful in treatment; and psychotherapy, which involves trust and a relationship with the therapist, is out of the question, because psychopaths are incapable of opening up to others. They don't want to change. ...
... of intrusion detection system. There is different session for each client, so if attacker attacks to a session of a specific user. It will only be affected to that client, rest of client are not affected. The container-based architecture not only provides the causal mapping, also provides a covering ...
Online journalism in Social Transformations: A community
... Online Journalism and Community 5 editorial orientation that often pushes the boundaries of what is politically permissible in China’s current political environment. As a result, some metro papers such as Nanfang Metropolitan Newspaper (NMN) have become both market successes and outspoken opinion l ...
... Online Journalism and Community 5 editorial orientation that often pushes the boundaries of what is politically permissible in China’s current political environment. As a result, some metro papers such as Nanfang Metropolitan Newspaper (NMN) have become both market successes and outspoken opinion l ...
FORMATION OF IDENTITY BY MEANS OF SOCIAL STEREOTYPES
... concentrating in cyberspace. In addition, a person still needs determination and self-determination. World full of modern information technologies gives people more possibilities, but at the same time makes them live according to new rules, acquire new values and standards. All these technological c ...
... concentrating in cyberspace. In addition, a person still needs determination and self-determination. World full of modern information technologies gives people more possibilities, but at the same time makes them live according to new rules, acquire new values and standards. All these technological c ...
Parents` Socialization of Gender in Children
... Dramatic transformations in women’s and men’s roles inside and outside of the family have occurred during the last half century in most of the industrialized world. The traditional image of the two-parent heterosexual family with the father serving as the provider and the mother as the homemaker is ...
... Dramatic transformations in women’s and men’s roles inside and outside of the family have occurred during the last half century in most of the industrialized world. The traditional image of the two-parent heterosexual family with the father serving as the provider and the mother as the homemaker is ...
Legal Support of the Users` Privacy in Cyber Space
... The meaning of this is that perpetration of the mere cyber crimes such as hacking as well as perpetration of some crimes such as traditional offences via the computer system such as breaching of the rights of moral and spiritual ownership have been considered criminalizing. In Iran, according to the ...
... The meaning of this is that perpetration of the mere cyber crimes such as hacking as well as perpetration of some crimes such as traditional offences via the computer system such as breaching of the rights of moral and spiritual ownership have been considered criminalizing. In Iran, according to the ...
Abuse of Customer Premise Equipment and Recommended
... from customary users (like home users’ routers, for example), the attack is almost impossible to block. However, creating this condition depends on some method by which the adversary can cause all these CPE devices to generate traffic to the intended victim. Unfortunately, this traffic generation is ...
... from customary users (like home users’ routers, for example), the attack is almost impossible to block. However, creating this condition depends on some method by which the adversary can cause all these CPE devices to generate traffic to the intended victim. Unfortunately, this traffic generation is ...
Communicating Global Activism
... and reduce the costs of pre-existing communication routines. On the other hand, newer, resource-poor organizations that tend to reject conventional politics may be defined in important ways by their Internet presence (Graber, Bimber, Bennett, Davis, and Norris, forthcoming). Understanding organizati ...
... and reduce the costs of pre-existing communication routines. On the other hand, newer, resource-poor organizations that tend to reject conventional politics may be defined in important ways by their Internet presence (Graber, Bimber, Bennett, Davis, and Norris, forthcoming). Understanding organizati ...
Potemkin
... Block all outbound packets: no TCP connections Only allow outbound packets to host that previously send packet: no outbound DNS, no botnet updates Allow outbound, but “scrub”: is this a best practice? In the end, need fairly flexible policy capabilities ...
... Block all outbound packets: no TCP connections Only allow outbound packets to host that previously send packet: no outbound DNS, no botnet updates Allow outbound, but “scrub”: is this a best practice? In the end, need fairly flexible policy capabilities ...
The Dark Side of Product Attachment: An fMRI Study of Reactivity of
... ads are not targeted directly to them. However, because these non-users have not built up the ability to resist the tempting urge response generated by the addictive product ads, brain regions necessary in order to resist the temptations are activated. Interestingly there is significant deactivation ...
... ads are not targeted directly to them. However, because these non-users have not built up the ability to resist the tempting urge response generated by the addictive product ads, brain regions necessary in order to resist the temptations are activated. Interestingly there is significant deactivation ...
caredata CD Full Text - copyright NISW/Russell House Publications
... may include drugs-related material, or hyperlinks to other more specific sites). For those working with young people in social welfare and those who need to research aspects of their social behaviour, the Internet can be an invaluable resource. However, it may actually exacerbate the tendency to ste ...
... may include drugs-related material, or hyperlinks to other more specific sites). For those working with young people in social welfare and those who need to research aspects of their social behaviour, the Internet can be an invaluable resource. However, it may actually exacerbate the tendency to ste ...
Supervised by Candyce Ossefort-Russell, LPC-S
... consent to use texting for Administrative Purposes. ...
... consent to use texting for Administrative Purposes. ...
читать статью - Вестник Омского университета. Серия Экономика
... options among other members (PRWeb, 2007). 2. Methodology The major research questions are related to opinions, attitudes and behavior of business students towards using social media networking sites for making purchase decisions and their level of trust and willingness to use product information th ...
... options among other members (PRWeb, 2007). 2. Methodology The major research questions are related to opinions, attitudes and behavior of business students towards using social media networking sites for making purchase decisions and their level of trust and willingness to use product information th ...
The right to freedom of expression versus media censorship
... for her constant support during the writing of this dissertation. Without her valuable comments and warm encouragement I wouldn’t be able to finish it. I would also like to thank Tormod Sund for inspiring me to write on this topic. I am grateful for the knowledge and guidance I have gained from Trom ...
... for her constant support during the writing of this dissertation. Without her valuable comments and warm encouragement I wouldn’t be able to finish it. I would also like to thank Tormod Sund for inspiring me to write on this topic. I am grateful for the knowledge and guidance I have gained from Trom ...
Video Communications
... • Streaming of stored video can tolerate long delays (e.g.Real and Microsoft use 5-15 secs) • Real-time interactive video can not tolerate long delays (maybe 150 ms) • Delay jitter is dynamic (time-varying) • Fixed playout delay is sub-optimal • Adaptive playout delay is better Estimate delay jitter ...
... • Streaming of stored video can tolerate long delays (e.g.Real and Microsoft use 5-15 secs) • Real-time interactive video can not tolerate long delays (maybe 150 ms) • Delay jitter is dynamic (time-varying) • Fixed playout delay is sub-optimal • Adaptive playout delay is better Estimate delay jitter ...
Raport - recodis
... identity to IP address resolution. Although DHTs provides scale, more research is needed on how to partition data and control plane functions in such architecture. For example, due to the need of placing standby gateways to the same trust domain networks, only DHTs with strong locality properties ma ...
... identity to IP address resolution. Although DHTs provides scale, more research is needed on how to partition data and control plane functions in such architecture. For example, due to the need of placing standby gateways to the same trust domain networks, only DHTs with strong locality properties ma ...
Psychological effects of Internet use
Various researchers have undertaken efforts to examine the psychological effects of Internet use. Some research employs studying brain functions in Internet users. Some studies assert that these changes are harmful, while others argue that asserted changes are beneficial.