Results 71 to 80 of about 70,028 (351)

Building Community Amidst the Institutional Whiteness of Graduate Study: Black Joy and Maroon Moves in an Academic Marronage

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT This article reflects on the construction of a supportive community of Black Afro‐diasporic graduate students and their supervisors researching issues relating to race in the field of education in Australia. It draws on the concept of marronage—a term rooted in the fugitive act of becoming a maroon, where enslaved people enacted an escape in ...
Hellen Magoi   +6 more
wiley   +1 more source

Protection of IP-telefony networks on the basis of Asterisk from interception of data

open access: yesҚарағанды университетінің хабаршысы. Физика сериясы, 2017
Nowadays the new round of technologies development on voice transfer, and IP-telephony is observed. In a type of the growing levels of demand and popularity of IP-telephony as bases of corporate communication infrastructure creation there is a question ...
M.Z. Yakubova   +3 more
doaj  

The Dawn of Social Intelligence (SOCINT) [PDF]

open access: yes, 2015
More information about citizens’ lives is recorded than ever before. Because the data is digitized, it can be accessed, analyzed, shared, and combined with other information to generate new knowledge.
Donohue, Laura K.
core   +1 more source

‘Hurry Up and Get Me out of Here’: The Experience of People Under 65 Years (Still) Stuck in Aged Care

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT Following the Royal Commission into Aged Care Quality and Safety, the Australian Government set a target for no‐one under 65 years of age to be living in residential aged care (RAC) by 2025. The numbers of young people in residential aged care (YPIRAC) have significantly declined since the start of the targets.
Elroy Dearn   +4 more
wiley   +1 more source

Mobile telephony - cooperation and value-added are key to further success [PDF]

open access: yes
The current problems in mobile telephony are leading critics to make overly pessimistic predictions that 3G – the third-generation mobile phone system – will never become profitable.
Stefan Heng
core  

The impact of mobile telephony on developing country micro-enterprises: a Nigerian case study [PDF]

open access: yes, 2008
Informational challenges-absence, uncertainty, asymmetry-shape the working of markets and commerce in many developing countries. For developing country micro-enterprises, which form the bulk of all enterprises worldwide, these challenges shape the ...
Heeks, R., Jagun, A,, Whalley, J.L.
core  

Implementing an Indigenous Research Methodology to Develop a Culturally Appropriate Survey and Yarning Protocol: Challenges With Retention of the Aboriginal Health, Ageing and Disability Workforce

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT Aboriginal staff play a vital part in improving culturally safe and effective services and supports for Aboriginal people. Research on the Aboriginal workforce helps advance a culturally safe environment for workers and Aboriginal people accessing health and community services. This study aims to identify the barriers and enablers to workforce
F. Talbot   +10 more
wiley   +1 more source

Analysis and Development of Customer Billing Telephony System

open access: yesمجلة بغداد للعلوم, 2019
The telecommunications industry has gone through series of development efforts to provide quality services to their consumers. Generally, telecommunication industry provides two main services such as telephony and internet which involved customer ...
Raziera et al.
doaj   +1 more source

Diffusion of Digital Mobile Telephony: Are Developing Countries Different? [PDF]

open access: yes
mobile telephony, technology diffusion, Gompertz model, developing ...
Rouvinen, Petri
core  

How Smart is your Android Smartphone? [PDF]

open access: yes, 2010
Smart phones are ubiquitous today. These phones generally have access to sensitive personal information and, consequently, they are a prime target for attackers.
Mulani, Deepika
core   +3 more sources

Home - About - Disclaimer - Privacy