Results 21 to 30 of about 4,132,791 (270)

Knowledge Workers’ Identities at the Beginning of their Professional Development: Evidence from the Medical Profession [PDF]

open access: yesJournal of Economic and Social Development (Varaždin), 2020
The identities of knowledge workers are shaped by organizational-level factors and by attributes of their occupation. Therefore, we distinguish between professional workers’ organizational and professional identification. Organizational identification is
CINDRIĆ Lana, TIPURIĆ Sandra
doaj  

The Longitudinal Effects of STEM Identity and Gender on Flourishing and Achievement in College Physics [PDF]

open access: yes, 2018
Background. Drawing on social identity theory and positive psychology, this study investigated women’s responses to the social environment of physics classrooms.
Abramzon, Nina   +5 more
core   +1 more source

Framework for Interrogative Knowledge Identification

open access: yesComputer and Information Science, 2009
The difficulty of defining and capitalizing the knowledge in an organization from the business data captured in text files. These text files defined as unstructured document that is without a specific format example, plain text. Hence, this paper presents an Interrogative Knowledge Identification framework to identify unstructured documents that ...
Sidi, Fatimah   +4 more
openaire   +2 more sources

Conferring resistance to digital disinformation: the innoculating influence of procedural news knowledge [PDF]

open access: yes, 2019
Despite the pervasiveness of digital disinformation in society, little is known about the individual characteristics that make some users more susceptible to erroneous information uptake than others, effectively dividing the media audience into prone and
Amazeen, M. A., Bucy, Erik
core   +1 more source

Physiotherapists’ identification and knowledge of Cervical Artery Dysfunction [PDF]

open access: yesPhysiotherapy, 2021
Purpose: Neck pain is the fourth leading cause of global disability, with its prevalence exceeding 30%. Consequently, physiotherapists assess a significant number of patients with neck pain. However, some conditions, such as vertebral artery dissection, are known to masquerade as musculoskeletal neck pain and require immediate medical referral.
Pickford, H, Stapleton, C
openaire   +1 more source

Outlier identification in radiation therapy knowledge-based planning: A study of pelvic cases. [PDF]

open access: yes, 2017
PURPOSE: The purpose of this study was to apply statistical metrics to identify outliers and to investigate the impact of outliers on knowledge-based planning in radiation therapy of pelvic cases.
Aggarwal   +23 more
core   +2 more sources

Evaluating effectiveness of linguistic technologies of knowledge identification in text collections [PDF]

open access: yes, 2014
The possibility of using integral coefficients of recall and precision to evaluate effectiveness of linguistic technologies of knowledge identification in texts is analyzed in the paper.
Khairova, N. F.   +2 more
core   +1 more source

Lone star or team player?:The interrelationship of different identification foci and the role of self-presentation concerns [PDF]

open access: yes, 2017
Work identity is important in the attraction and retention of staff, yet how the facets of such identity relate remains convoluted and unclear despite this being of interest to both scholars and practitioners.
Holtgrave, Max   +3 more
core   +4 more sources

Tactical knowledge is not dependent upon age or biological maturation in young soccer players

open access: yesSport TK, 2023
This study examined how chronological age and maturity status may affect tactical knowledge in young soccer players. Decimal age and maturity status of sixty-six U12 to U14 soccer players were calculated.
Iván Peña Gonzalez   +3 more
doaj   +3 more sources

An efficient identification protocol secure against concurrent-reset attacks

open access: yesJournal of Mathematical Cryptology, 2009
In this paper, first we discuss the security model for deterministic challenge-response identification protocols. For such protocols, we are able to simplify the CR2 security model in [Bellare, Fischlin, Goldwasser, and Micali, Identification protocols ...
Wu J., Stinson D. R.
doaj   +1 more source

Home - About - Disclaimer - Privacy