Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
922 result(s) for "Personal information management Computer programs."
Sort by:
Outlook 2019 for dummies
Of the millions of people who use Outlook, most only use about two percent of its features. Don't stay in the dark! Outlook 2019 For Dummies shows you how to take advantage of often-overlooked tips and tricks to make it work even better for you. Inside, you'll find information on navigating the user interface; utilizing the To-Do bar; filtering junk email; smart scheduling; RSS support; using electronic business cards; accessing data with two-way sync and offline and cloud based access, and much more!
Outlook 2013 for dummies
The fun and friendly way to manage your busy life with the new Outlook 2013 As the number one e-mail client and personal information manager, Microsoft Outlook offers a set of uncomplicated features that maximize the management of your e-mail, schedule, and general daily activities, with the least amount of hassle possible. This easy-to-understand guide walks you through Outlook 2013 and introduces you to the latest features. You'll learn how to find information quickly, handle e-mail, coordinate schedules, keep current with contacts and social networks, and much more. * Walks you through getting started with Outlook 2013 and then provides you with complete coverage on e-mail basics, advanced e-mail features, working with the calendar, managing contacts, and integrating Outlook with other applications * Shows you how to track tasks, take notes, and record items in the journal, as well as filter out junk e-mail, activate Outlook's privacy and security features, and more * Explains how to customize your Outlook, manage all the information within Outlook, and take Outlook on the road Outlook 2013 For Dummies offers you a whole new outlook on Outlook 2013!
OneNote 2013 for dummies
OneNote lets you organize, access, and share notes on multiple devices. This guide shows you how to take full advantage of everything it offers-- text recognition, the ability to include data from other Office apps, and more!
Microsoft Outlook 2007 Programming
Microsoft Outlook is the most widely used e-mail program and offers the most programmability. Sue Mosher introduces key concepts for programming Outlook using Visual Basic for Applications, custom Outlook forms, and external scripts, without the need for additional development tools. For those who manage Outlook installations, it demonstrates how to use new features in the Outlook 2007 programming model such as building scripts that can create rules and views and manage categories. Power users will discover how to enhance Outlook with custom features, such as the ability to process incoming mail and extract key information. Aimed at the non-professional programmer, it also provides a quick guide to Outlook programming basics for pro developers who want to dive into Outlook integration. *Dozens of new programming objects detailed including views, rules, categories, searches*No previous coding experience or additional development tools required*Examples outline issues using real-world functionality
Storytelling with data
Don't simply show your data—tell a story with it!Storytelling with Data teaches you the fundamentals of data visualization and how to communicate effectively with data. You'll discover the power of storytelling and the way to make data a pivotal point in your story. The lessons in this illuminative text are grounded in theory, but made accessible through numerous real-world examples—ready for immediate application to your next graph or presentation.Storytelling is not an inherent skill, especially when it comes to data visualization, and the tools at our disposal don't make it any easier. This book demonstrates how to go beyond conventional tools to reach the root of your data, and how to use your data to create an engaging, informative, compelling story. Specifically, you'll learn how to:Understand the importance of context and audienceDetermine the appropriate type of graph for your situationRecognize and eliminate the clutter clouding your informationDirect your audience's attention to the most important parts of your dataThink like a designer and utilize concepts of design in data visualizationLeverage the power of storytelling to help your message resonate with your audienceTogether, the lessons in this book will help you turn your data into high impact visual stories that stick with your audience. Rid your world of ineffective graphs, one exploding 3D pie chart at a time. There is a story in your data—Storytelling with Data will give you the skills and power to tell it!
Nonrivalry and the Economics of Data
Data is nonrival: a person’s location history, medical records, and driving data can be used by many firms simultaneously. Nonrivalry leads to increasing returns. As a result, there may be social gains to data being used broadly across firms, even in the presence of privacy considerations. Fearing creative destruction, firms may choose to hoard their data, leading to the inefficient use of nonrival data. Giving data property rights to consumers can generate allocations that are close to optimal. Consumers balance their concerns for privacy against the economic gains that come from selling data broadly.
Why do people play mobile social games? An examination of network externalities and of uses and gratifications
Purpose – The purpose of this paper is to identify the factors that influence people to play socially interactive games on mobile devices. Based on network externalities and theory of uses and gratifications (U&G), it seeks to provide direction for further academic research on this timely topic. Design/methodology/approach – Based on 237 valid responses collected from online questionnaires, structural equation modeling technology was employed to examine the research model. Findings – The results reveal that both network externalities and individual gratifications significantly influence the intention to play social games on mobile devices. Time flexibility, however, which is one of the mobile device features, appears to contribute relatively little to the intention to play mobile social games. Originality/value – This research successfully applies a combination of network externalities theory and U&G theory to investigate the antecedents of players’ intentions to play mobile social games. This study is able to provide a better understanding of how two dimensions – perceived number of users/peers and individual gratification – influence mobile game playing, an insight that has not been examined previously in the mobile apps literature.
The relationship between mobile self-efficacy and mobile-based personal information management practices
PurposeThe purpose of this study is to explore the relationship between mobile self-efficacy and personal information management (PIM) practices through mobile phones and smartphones, and additionally, to explore the challenges of using a smart device for PIM.Design/methodology/approachThis study followed Preferred Reporting Items for the Systematic Review and Meta-analysis (PRISMA) guidelines to achieve the objectives. A comprehensive search strategy, inclusion criteria and exclusion criteria were formulated in light of PRISMA guidelines. The data were collected from different scholarly repositories, databases and core journals of PIM. The studies were included after four steps, i.e. identification, screening, eligibility and inclusion of studies.FindingsFindings revealed that there was a positive relationship between mobile self-efficacy and PIM via mobile phones. People used two techniques for finding and re-finding information via mobile phones/smartphones. These techniques include browsing and searching information. People send information, share with others and save in draft folders to emails in mobile phones/smartphones for keeping information for future use. They organize their personal information in folders and use different applications such as Evernote, Google Calendar, alarm and organizer. They uninstall and update mobile applications with new versions, clear phone call history and backup personal information to desktop devices and cloud services to maintain personal information. PIM via mobile phone/smartphone challenges were also identified. These challenges were classified as information related challenges, technical challenges, mobile phone adaptability challenges and miscellaneous challenges.Originality/valueThis study will help library professionals and decision makers to devise information literacy instruction programs according to the users' needs. The results of this study will also open new horizons for system designers to devise mobile-based PIM tools according to users' needs.
Understanding of blockchain-based identity management system adoption in the public sector
PurposeThis study aims to understand the benefits and challenges associated with the adoption of a blockchain-based identity management system in public services by conducting an academic literature review, and to explore the design of such a system that can be applied to the Korean government.Design/methodology/approachThis study explores the adoption of a blockchain-based identity management system using a literature review and an actual design case intended for use by the government sector.FindingsBlockchain-based identity management systems can significantly improve transparency, accountability, and reliability in the user control of one's own data while reducing the time and cost needed to deliver public services, as well as increasing administrative efficiency. However, it is not always easy to implement such systems, and introducing new technologies in the government field requires a complicated, time-consuming process. There is currently an appetite for research extending beyond the typical technology-driven approach to elucidate the government adoption of new technologies and explore its implications.Practical implicationsThe idea behind this system is that by storing and managing personal information on the blockchain and providing mobile apps to customers, users can log in or retrieve previously authenticated personal information without having to go through an authentication process. Since users do not need to go through the verification process every time, it is expected that they will be able to access only the necessary personal information more quickly and conveniently without having to deal with unnecessary details. In addition, the blockchain-based operation of a public service effectively increases the transparency and reliability of that service and reduces the social costs caused by personal information leakage.Originality/valueThis study introduces the design of a blockchain-based identity management system that can be used in public services, specifically in the Korean government sector for the first time. Along with a literature review, the implications that this study gleans from these real-world use cases can contribute to this field of research.
The Influence of Individual, Contextual, and Social Factors on Perceived Behavioral Control of Information Technology: A Field Theory Approach
Organizations are increasingly concerned about ensuring that workers have sufficient sense of control over the information technology (IT) that they use. However, we know little about the antecedents of the end user's perceived behavioral control (PBC) with respect to IT. Drawing on Kurt Lewin's field theory, the present study responds to this concern by formulating and testing a model whereby individual, contextual, and social forces influence PBC directly and indirectly via computer anxiety. In order to test the model, a survey was conducted in France with IT end users enrolled in professional training programs. The results show that increasing autonomy, offering appropriate managerial support, reducing work overload, and perceived innovativeness with IT can together reduce computer anxiety and increase PBC. These findings emphasize the forces that managers can manipulate in order to foster users' feelings of control with respect to IT in the workplace. Following this, the paper makes three main contributions to research. First, it increases our knowledge of the nomological net surrounding PBC by shedding light on the joint influences of internal, external, and social forces on this variable. Second, it reveals the role of computer anxiety, emphasizing that it is an important conduit through which these forces influence workers' PBC. Third, the paper shows how Lewin's field theory can help to create richer and less fragmented models in order to capture more fully the determinants of IT adoption and adaptation. The practical implications regarding the actions that managers can take in order to increase workers' PBC are discussed.