Young People s Security Behavior Intentions regarding Cloud Service Use: Suggestions

Size: px
Start display at page:

Download "Young People s Security Behavior Intentions regarding Cloud Service Use: Suggestions"

Transcription

1 Young People s Security Behavior Intentions regarding Cloud Service Use: Suggestions for Better Cloud Services P.I.M. Kamphuis pim.kamphuis@gmail.com P.I.M. Kamphuis (BA in Communication, Fontys, Tilburg the Netherlands 2015) is a graduate student at the Department of Interaction Science, Sungkyunkwan University, South Korea and currently working as a freelance cloud consultant (CoCreatures, 2014). His research interests include cloud computing, cloud security and global collaboration networks and platforms. He is currently involved with living labs - collaboration projects connecting universities, local governments and companies in South Korea and the Netherlands. Jang Hyun Kim jangkimuh@gmail.com Dr. Jang Hyun Kim (Ph.D. in Communication, State University of New York at Buffalo, 2007) is an Associate Professor and Department Chair of Department of Interaction Science, Sungkyunkwan University, South Korea. His research interests include data science, social and semantic network analysis, Internet of things, and other advanced technologies and, in particular, their impact on society. He also teaches user experiences and media management, media contents analysis using big data analysis, and other courses. 1

2 Abstract The purpose of this study is to measure intended security behaviors of university students using personal cloud services in Korea and the Netherlands, to examine what attitudinal factors influence these intentions and to find out if there is a difference in security intentions between Korean and Dutch students. The Theory of Planned Behavior (TPB) model is combined with external constructs from the Security Behavior Intention Scale (SeBIS) about security intentions of students cloud access devices. A questionnaire set comprising three TPB factors and four SeBIS factors was applied to a sample of 226 higher education students in Korea and the Netherlands. Results show that the students intention on securing cloud access devices (CADs) is found and that the two groups differ in terms of the TPB constructs and the actual security intention are significant. Key words: Cloud services, cross-cultural research, Theory of Planned Behavior, Security Behavior Intention Scale, user analysis, survey. 2

3 Introduction Emerging cloud services have been changing the ways in which people store, access and share their personal information. It also changed the way of communicating with each other; shifting from device storage based messaging techniques such as SMS and , to cloud-based messaging services like Facebook messenger, KakaoTalk, Gmail, and Telegram. Most cloud messaging service like Gmail, Outlook.com, and Naver offer free access to a cloud storage pool where users can store files including documents, pictures, and movies. In addition to free cloud storage that is offered by cloud messaging services, the popularity of dedicated cloud storage services like Dropbox and Mega keeps increasing. According to Gartner (2012), users will store over 36% of their personal data in the cloud in Students take a big share in worldwide users of personal cloud services (Hunsinger & Corley, 2012). They store and share their personal data using a cloud access device and often prefer to use their personal cloud storage account over the use of storage and sharing services that are provided by universities (Stantchev, Colomo-Palacios, Soto-Acosta, & Misra, 2014). To keep their data safe and confidential, users should take care of their credentials and devices. It is however questionable to what extend students intent to do so. In this study, we will examine students intention on securing their personal cloud accounts and cloud access devices and apply the Theory of Planned Behavior to see what factors influence this intention. The paper is structured as follows. The next section presents the literature and theories that form the framework for the study. Following that, the method for sampling and data collection is discussed. Finally, this paper ends/concludes with an analysis on the results and a discussion on the research findings. 3

4 Theoretical Approaches to Cloud Use Personal Cloud Services Personal cloud services facilitate highly scalable storage for end-users on demand, which is accessible globally at any time. Using cloud storage increases usability, since users do not have to drag and drop files to and from physical storage media (like USB flash drives); decreases the amount of data/bandwidth used when sharing media (a link to the shared cloud storage location will do); increases accessibility (files can be stored and accessed from anywhere as long as connected to the internet); can be used for disaster-recovery (no files will be lost in case of a stolen, broken or crashed device); and can save users costs for local storage since cloud storage is available from 3 cents per gigabyte and does not require local power to store information remotely (NT, 2014). One of the reasons for the rapid growth in availability and popularity of personal cloud services is the emergence of (smart) devices that provide access to personal cloud storage and services. Mobile devices that enable access to cloud services (e.g. laptops, tablets, and smartphones) became an essential part of modern life and are effective communication tools that are not bounded by time and place. However, the smaller and more portable the form factor, the less resources (e.g. battery capacity, cpu power and storage) it provides. Personal cloud services help users overcome these limitations, including (1) extending battery lifetime, (2) improving battery power, and (3) battery reliability. Battery life is one of the biggest concerns of smart phone users. Personal cloud services provide a variety of computation offloading techniques to use less CPU power, which results in longer battery life. In addition, improving data storage capacity and processing power is another way to enhance usability. Personal cloud services enable users to store and access a large amount of data in the cloud. The latest development in mobile devices includes the embedding and improvement of 4

5 camera modules and thus increases the demand for storage of high quality media such as video and pictures. Uploading media to the cloud right after the moment of capturing saves users a considerable amount of battery power and local storage, and they may access all media from any device instantly. Improving reliability is possible because personal cloud services store data on a spread grid of computers and take care of back-ups. Users can improve the reliability of their files and media by uploading their date to the cloud. This reduces the chances of loss of valuable personal data like pictures, videos, documents and other data in case of broken, lost or infected CADs (Dinh, Lee, Niyato, & Wang, 2013). To use a personal cloud services, users usually have to go through an identification and authentication process to gain access to their account or to create a session for an app (or apps) for easy and permanent use through CAD. The most common authentication mechanism is the use of credentials in the form of a combination of user ID and password. While most websites automatically end the session (log out) after closing the web browser or tab, dedicated cloud service apps installed on smartphones and tablets keep a session active/open until the user logs out or disables/uninstalls the application (Bang, Lee, Bae, & Ahn, 2012). Because of software to has the tendency to save credentials in web browsers and the emergence of apps that serve a permanent connection, special attention is required to securing cloud access devices in order to keep personal data safe and confidential. Security Intention Previous research on securing personal cloud services has focused on a wide range of technical aspects and concerns. Access security measures are generally considered in three steps: Authentication, Authorization, and Encryption (Yahya, 2015). However, Bang et al. (2012) suggest that cloud security is not merely a technical issue but also involves the behavior 5

6 of end-users, which are mostly users with a non-technical background and therefore low technical knowledge. Many scholars try to understand users security related behaviors or emphasize on security-enhancing actions, mostly in work environment settings. However, unlike employees, students are usually not provided with training or protection by an ITdepartment regarding the security of their online accounts. And despite the plethora of advice by all usable security and privacy communities, much of the advice stays unnoticed or ignored by the majority of the personal cloud service users (Das, 2016). In this paper, the intentions of students on securing their personal cloud service accounts are measured using the Security Intention Behavior Scale, and studied by applying the Theory of Planned Behavior in order to find out what attitudinal factors influence these intentions. Theory of planned behavior (TPB) According to the Theory of Planned Behavior, attitudes towards intention derive from behavioral beliefs that people hold (Ajzen, 1985;1991). The TBP suggests that behaviors with a desirable outcome are valued with a positive attitude, while negative attitudes address undesirable behaviors. The TPB model suggests three major factors that determine behavioral intentions (see figure 1): Attitudes: beliefs about consequences of the behavior and the corresponding judgments about these consequences. Simply put, students judgement that performing the behavior is good or bad. Subjective norms: beliefs about how other people, who are considered important to the person, would like them to behave and the motivation to comply with those normative beliefs. 6

7 Perceived behavior control: beliefs about factors that make it ease or difficult to perform the behavior and the corresponding power of these factors to influence the behavior (Ajzen, 1991). FIGURE 1 SIMPLIFIED ILLUSTRATION OF TPB MODEL AND SEBIS IMPLICATION Figure 1 illustrates the model for this paper and shows a simplified model of TPB and SeBIS. The TPB is devoted to identifying barriers and enablers to behavioral intentions and therefore an useful approach on explaining students security intentions. The theory can help to explain why students have high or low intentions on securing their cloud access devices, because it offers a clearly defined structure/model that allows the investigation of attitudinal factors. In addition, knowledge alone is not effective in changing behavior. When we understand the predictors of students security intention we can fine-tune campaigns to aim at attitudes, subjective norms or perceived behavior control in order to raise security on students cloud access devices. A review by East (1997) has indicated that, in recent years, the TPB has been applied to a wide variety of topics (e.g. physical activities, quitting cigarette smoking, blood donation, complaining, Internet use etc.) and that the model has provided reliable estimates. 7

8 The study focuses particularly upon the case of university students in Korea and the Netherlands, these countries are one of the most advanced countries with respect to the adoption and use of new communication technologies (Park, Kim, Shon, & Shin, 2013). According to Statista (2016), both Korea and the Netherlands top the list of countries with the largest share of high broadband connectivity and the list of countries with the highest average internet connection speed. This makes the use of personal cloud services enjoyably fast and a convenient way for students to safely store, share and collaborate on their personal and academic documents (Stantchev, Colomo-Palacios, Soto-Acosta, & Misra, 2014). Research question and hypotheses This study aims to examine the following research questions: RQ 1. What is the student s intention on securing their cloud access devices? RQ2. What factors influence students intention on securing their cloud access devices? H1. Students attitude influence intention on securing CADs. H2. Students subjective norms influence intention on securing CADs. H3. Students perceived behavior control influence intention on securing CADs. RQ3. Is there a significant difference between Korean and Dutch students on their intention to secure cloud access devices? The questions and hypotheses above are addressed in the following sections. Method and procedures The sample for this study consists of 226 students (n = 226), of which 120 were studying at a Korean university (53%) while the other 106 were studying in the Netherlands (47%). Most respondents are in the age between 21 and 26 (74.8%). A minority of the students 8

9 was younger than 21 (8%) and 39 respondents were older than 26 (17.3%). The sample included 139 women (61.5%) and 87 men (38.5%). An on-line survey was operationalized using Google Forms and administered via a short notice with hyperlink on both universities students portal. In the survey, respondents were asked questions which operationalized the Theory of Planned Behavior and items as applied to the Security Behavior Intention Scale. Recorded on a scale, their answers represent the salient believes answered about attitude, subjective norms and perceived behavior control and intentional behavior on device securement, password generation, proactive awareness and software updating. All questions were marked as required and the form could not be submitted without incomplete answers. Because of this, the dataset with responses does not include any invalid or uncomplete records. This was all done during the end of fall semester of The responses were collected during a one-week period. After this, the raw data from the questionnaires was exported from Google Forms, coded in Microsoft Excel and then analyzed using IBM SPSS. While this sampling strategy has clear advantages in terms of time- and cost-savings, as suggested by Margaryan, Littlejohn, and Vojt (2011), it does not account for the total number of potential participants, although it can be considered with enough statistical power given the total sample size. Security Intention Behavior Scale In 2015 Egelman and Peer developed the Security Intention Behavior Scale (SeBIS), a tool to measure security behaviors of end-users. In short, the scale measures users selfreported adherence to computer security advice and consists of 16 items that measure 4 underlying constructs: 9

10 Awareness: Do users pay attention to contextual cues, such as the web browser URL bar or various security iconography? Passwords: Do users create unique passwords that exceed minimum requirements and are therefore difficult to crack? Updating: Do users apply software security updates in a timely manner? Securement: Do users secure their devices with secret codes, such as using smartphone secure lock screens (i.e., requiring a PIN) or password-protected screen savers on desktops and laptops? To test if the measured intentions indeed correlate with actual behavior Egelman, Harbach and Peer performed three experiments to identify correlations between the four subscales of their measurement scale and actual security related behavior (2016). The results indicate that SeBIS predicts certain computer security behaviors and that it is a reliable and valid tool that should be used in future research. This paper adapts the SeBIS to measures students intention on securing their cloud access devices. The Theory of Planned Behavior is adapted to measure attitudinal factors that influence the security intentions. Measures Attitude Attitude towards securing CAD is a construct of TPB and was directly measured using four statements. Students were asked to indicate their level of desirability on a 5-point Likert scale (undesirable desirable) with each of the following statements: Att1. Making sure that my laptop/smart device is locked when I don t use it is Att2. Using a different and strong password for all my on-line accounts is Att3. Checking if forms I use and links I click on the internet are safe and secure is 10

11 Att4. Running the latest version of the software and apps that I use is Device security Device security is a construct of the SeBIS and was directly measured using four statements. Students were asked to indicate their level of agreement on a 5-point Likert scale (totally disagree totally agree) with each of the following statements: Ds1. I set my computer screen to automatically lock if I don t use it for a prolonged period of time. Ds2. I always use a password/passcode to unlock my laptop or tablet. Ds3. I manually lock my computer screen when I step away from it. Ds4. I use a PIN, fingerprint, or passcode to unlock my mobile phone. Subjective norms Subjective norms regarding securing CAD are a construct of TPB and was directly measured using four statements. Students were asked to indicate their level of desirability on a 5-point Likert scale (undesirable desirable) with each of the following statements: Sn1. My friends/family want me to secure my devices really well. Sn2. My friends/family expect me to use strong and different passwords for my accounts. Sn3. It is expected of me that I check if websites and links are safe before use. Sn4. It is expected of me that my apps and software are up-to-date. Password generation 11

12 Password generation is a construct of the SeBIS and was directly measured using four statements. Students were asked to indicate their level of agreement on a 5-point Likert scale (totally disagree totally agree) with each of the following statements: Pg1. I do not change my passwords, unless I have to. Pg2. I use different passwords for different accounts that I have. Pg3. When I create a new online account, I try to use a password that goes beyond the site s minimum requirements. Pg4. I do not include special characters in my password if it s not required. Perceived behavior control Perceived behavior control of securing CAD are a construct of TPB and was directly measured using five statements. Students were asked to indicate their level of desirability on a 5-point Likert scale (undesirable desirable) with each of the following statements: Bc1. It is difficult to remember a different password for every account. Bc2. It is easy to come up with a long password, consisting of small/caps letters, numbers and special characters. Bc3. It is difficult to remember to log out on a PC after using my on-line account. Bc4. I think it is hard to tell if some link is safe to click. Bc5. I think it is hard to determine if the used website/service is safe. Proactive awareness Proactive awareness is a construct of the SeBIS and was directly measured using four statements. Students were asked to indicate their level of agreement on a 5-point Likert scale (totally disagree totally agree) with each of the following statements: 12

13 Pa1. When someone sends me a link, I open it without first verifying where it goes. Pa2. I know what website I m visiting based on its look and feel, rather than by looking at the URL bar. Pa3. I submit file/information to cloud services without first verifying that it will be sent securely (e.g., SSL, a lock icon). Pa4. If I discover a security problem, I continue what I was doing because I assume someone else will fix it. Software updates Software updates is a construct of the SeBIS and was directly measured using three statements. Students were asked to indicate their level of agreement on a 5-point Likert scale (totally disagree totally agree) with each of the following statements: Su1. When I m prompted about a software update, I install it right away. Su2. I try to make sure that the apps and software I use are up-to-date. Su3. I verify that my anti-virus software has been regularly updating itself. Cronbach s alpha was used to measure the internal reliability of each construct. The calculated alphas of the SeBIS constructs meet the minimum acceptable value of.7, while only the subjective norm construct from the TPB section meets this threshold. BC2 and BC3 were excluded from the analysis in order to increase reliability of the perceived behavior control composite scale. Both attitude and pbc could not meet the reliability minimum. Table 1 shows an overview of the results for Cronbach Alpha of each construct. 13

14 TABLE 1 INTERNAL RELIABILITY OF THE 7 MEASURED COMPOSITE SCALES Cronbach s Alpha N of items Device Security Password Generation Proactive Awareness Software Updates Attitude Subjective Norm Perceived Behavior Control After calculating the reliability of the composite scales, an index was made for each construct by summing up the values of its items and divide the total by the number of items. An extra index was calculated by combining the 4 dimensions of the Security Behavior Intention Scale into one variable (SeBIS). Results To examine RQ1, frequency tables were used to see the means of the four dimensions of the Security Behavior Intention Scale. TABLE 2 MEANS OF THE 4 MEASURED SEBIS COMPOSITE SCALES N Valid Missing Mean Median Mode Std. Deviation Device Security ,7058 4,0000 4,00,96766 Password Generation ,6903 2,5000 2,00,77980 Proactive Awareness ,9502 3,0000 2,75,79268 Software Updates ,1121 3,0000 3,33,

15 From table 2 we can find that students have low behavior intentions on password generation (M=2.69), proactive awareness (M=2.95) and device updating (M=3.11). Students seem to have higher intentions on device securement (M=3.71). Linear regression was employed to address RQ2 and explore relationships between the TBP factors and the security intention (SeBIS). A low p-value (< 0.05) indicates that the hypotheses are grounded. TABLE 3 REGRESSION COEFFICIENTS Unstandardized Coefficients Standardized Coefficients Model B Std. Error Beta t Sig. 1 (Constant) 1,833,169 10,880,000 Attitude,185,034,318 5,382,000 Subjective Norm,234,035,391 6,710,000 Perceived Behavior Control -,035,038 -,055 -,938,349 a. Dependent Variable: SeBIS Regression analysis (table 3) shows that H1 is supported. The correlation between Attitude and Security Intention =.318. It is therefore concluded that Attitude is significantly and positively correlated with the intent of students to secure their CADs. H2 is also supported. The correlation between Subjective Norm and Security Intention =.391. Therefore, the data indicates that the Subjective Norm is significantly and positively correlated with the intent of students to secure their CADs. H3 is not supported. The correlation between Perceived Behavioral Control and Security Intention = Therefore, the data indicates Perceived Behavioral Control is not correlated with the intent of students to secure their CADs. The reason for a negative value is the use of a reversed scale to measure perceived behavior control. 15

16 However, when regression analysis is made between the composite variable Perceived Behavior Control and the separate dimension of the SeBIS, correlation is found between Perceived Behavior Control and the SeBIS constructs Password Generation and Proactive Awareness, as shown in table 4. TABLE 4 REGRESSION COEFFICIENTS Perceived Behavior Control Device Security Password Generation Proactive Awareness Software updates Pearson Correlation -,015,346 ** -,492 **,073 Sig. (2-tailed),819,000,000,278 N To answer RQ3, a descriptive and regression analysis was run again in split mode, dividing our collected data into two groups: one set of data collected from Korean students and one set from students studying in the Netherlands. No remarkable differences were found when analyzing the frequency tables and means of several constructs. In addition, when running a regression analysis with split data no significant differences were discovered. Discussion and limitations When we look at the results of this study we can conclude that there is room for improvement for student s intention on securing their cloud access devices. Overall, students seem to secure their devices above average using fingerprint and PIN security to gain access to their CAD. However, students seem to have low intentions on increasing password security, updating devices and being proactive about the safety of web-services, links, and forms. Through the results gathered from the survey, this study has provided a better understanding of 16

17 the factors which influence students intention on security. This is important for several reasons. If organizations (e.g. universities, banks, or personal cloud service providers) aim to increase the security intentions of students, they should focus on changing students attitude and removing barriers in perceived behavior control when trying to achieve better password generation and increase proactive awareness. Considering the strong support in the Theory of Planned Behavior literature indicating a significant relationship between the three constructs and behavioral intention, it was initially surprising to detect no significant difference between the correlation among the two groups. One of the limitations of this study is the low internal reliability of the TPB measurements. To increase internal reliability, the number of respondents should be doubled. In addition, the questionnaire items regarding TPB required more preparation. Due to the limit of available time for this research, the suggested interviews to derive more specific and effective items for the questionnaire and pilot testing of the survey were omitted. The sample size should be bigger to make the results more representative. 17

18 References Ajzen, I. (1991). The Theory of Planned Behavior. Organizational behavior and human decision processes, 50, Bang, Y., J., L. D., S., B. Y., & H., A. J. (2012). Improving information security management: An analysis of ID password usage and a new login vulnerability measure. international journal of information management, 32(5), Bang, Y., Lee, D.-J., Bae, Y.-S., & Ahn, J.-H. (2012). Improving information security management: An analysis of ID password usage and a new login vulnerability measure. International Journal of Information Management, 32, Das, S. (2016, 3 7). Understanding and Leveraging Social Influence to Improve End-User Security Sensitivity. Berkeley. Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013, 10 11). A survey of mobile cloud computing: architecture, applications, and approaches. WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, 13. Egelman, S., Harbach, M., & Peer, E. (2016). Behavior Ever Follows Intention? CHI '16 Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, Gartner. (2012, 6 25). Gartner Says That Consumers Will Store More Than a Third of Their Digital Content in the Cloud by Retrieved from Gartner: Hunsinger, D. S., & Corley, J. K. (2012). An Examination of the Factors Influencing Student Usage of Dropbox, a File Hosting Service. Proceedings of the Conference on Information Systems Applied Research. 18

19 Margaryana, A., Littlejohna, A., & Gabrielle Vojtb. (2011). Are digital natives a myth or reality? University students use of digital technologies. Computers & Education, 56(2), NT, B. (2014, 7 28). 5 advantages and disadvantages of Cloud Storage. Retrieved 6 17, 2016, from Big Data made simple: Park, N., Kim, Y.-C., Shon, H., & Shin, H. (2013, 3 27). Factors influencing smartphone use and dependency in South Korea. Com puters in Human Behavior, 29, Stantchev, V., Colomo-Palacios, R., Soto-Acosta, P., & Misra, S. (2014). Learning management systems and cloud file hosting services: A study on students acceptance. Computers in Human Behavior, 31, Statista. (2016, 3 1). Statista. Retrieved 4 29, 2016, from Countries with the highest average internet connection speed as of 4th quarter 2015 : Yahya, F. W. (2015). Protecting data in personal cloud storage with security classifications. Science and Information Conference (pp ). SAI: IEEE. 19

Online Journal for Weightlifters & Coaches

Online Journal for Weightlifters & Coaches Online Journal for Weightlifters & Coaches WWW.WL-LOG.COM Genadi Hiskia Dublin, October 7, 2016 WL-LOG.com Professional Online Service for Weightlifters & Coaches Professional Online Service for Weightlifters

More information

Title: The Theory of Planned Behavior (TPB) and Texting While Driving Behavior in College Students MS # Manuscript ID GCPI

Title: The Theory of Planned Behavior (TPB) and Texting While Driving Behavior in College Students MS # Manuscript ID GCPI Title: The Theory of Planned Behavior (TPB) and Texting While Driving Behavior in College Students MS # Manuscript ID GCPI-2015-02298 Appendix 1 Role of TPB in changing other behaviors TPB has been applied

More information

myphonak app User Guide

myphonak app User Guide myphonak app User Guide Getting started myphonak is an app developed by Sonova, the world leader in hearing solutions based in Zurich, Switzerland. Read the user instructions thoroughly in order to benefit

More information

USER GUIDE: NEW CIR APP. Technician User Guide

USER GUIDE: NEW CIR APP. Technician User Guide USER GUIDE: NEW CIR APP. Technician User Guide 0 Table of Contents 1 A New CIR User Interface Why?... 3 2 How to get started?... 3 3 Navigating the new CIR app. user interface... 6 3.1 Introduction...

More information

Measurement of Constructs in Psychosocial Models of Health Behavior. March 26, 2012 Neil Steers, Ph.D.

Measurement of Constructs in Psychosocial Models of Health Behavior. March 26, 2012 Neil Steers, Ph.D. Measurement of Constructs in Psychosocial Models of Health Behavior March 26, 2012 Neil Steers, Ph.D. Importance of measurement in research testing psychosocial models Issues in measurement of psychosocial

More information

AMERICAN CANCER SOCIETY FUNDRAISING APP FAQS

AMERICAN CANCER SOCIETY FUNDRAISING APP FAQS AMERICAN CANCER SOCIETY FUNDRAISING APP FAQS We're here to answer any questions you might have about the American Cancer Society Fundraising App. Below are answers to some of the most frequently asked

More information

Instructor Guide to EHR Go

Instructor Guide to EHR Go Instructor Guide to EHR Go Introduction... 1 Quick Facts... 1 Creating your Account... 1 Logging in to EHR Go... 5 Adding Faculty Users to EHR Go... 6 Adding Student Users to EHR Go... 8 Library... 9 Patients

More information

Data Management System (DMS) User Guide

Data Management System (DMS) User Guide Data Management System (DMS) User Guide Eversense and the Eversense logo are trademarks of Senseonics, Incorporated. Other brands and their products are trademarks or registered trademarks of their respective

More information

Quick guide to connectivity and the Interton Sound app

Quick guide to connectivity and the Interton Sound app Quick guide to connectivity and the Interton Sound app Content Compatibility: Hearing aids and mobile devices... 4 Get started with your iphone, ipad or ipod touch... 6 Pair with your Interton hearing

More information

Topic 1 Social Networking Service (SNS) Users Theory of Planned Behavior (TPB)

Topic 1 Social Networking Service (SNS) Users Theory of Planned Behavior (TPB) Topic 1 Social Networking Service (SNS) Users Theory of Planned Behavior (TPB) Flow Experience Perceived Enjoyment Trust Attitude Subjective Norm Actual Use Self Efficacy Perceived Behavioral Control Introduction

More information

Content Part 2 Users manual... 4

Content Part 2 Users manual... 4 Content Part 2 Users manual... 4 Introduction. What is Kleos... 4 Case management... 5 Identity management... 9 Document management... 11 Document generation... 15 e-mail management... 15 Installation

More information

ReSound Forte and ReSound Smart 3D App For Android Users Frequently Asked Questions

ReSound Forte and ReSound Smart 3D App For Android Users Frequently Asked Questions ReSound Forte and ReSound Smart 3D App For Android Users Frequently Asked Questions GENERAL Q. I have an Android phone. Can I use ReSound Forte? Q. What Android devices are compatible with ReSound Forte

More information

The Hospital Anxiety and Depression Scale Guidance and Information

The Hospital Anxiety and Depression Scale Guidance and Information The Hospital Anxiety and Depression Scale Guidance and Information About Testwise Testwise is the powerful online testing platform developed by GL Assessment to host its digital tests. Many of GL Assessment

More information

KINOMAP FITNESS. Version Android KINOMAP FITNESS

KINOMAP FITNESS. Version Android KINOMAP FITNESS Version 1.1 - Android With Kinomap Fitness, ride more than 100,000 km of geolocated videos all over the world uploaded by users themselves. Try to follow their rhythm under the same conditions at the time

More information

Data Management System (DMS) User Guide

Data Management System (DMS) User Guide Data Management System (DMS) User Guide Eversense and the Eversense logo are trademarks of Senseonics, Incorporated. Other brands and their products are trademarks or registered trademarks of their respective

More information

Internet Banking - FAQ -

Internet Banking - FAQ - Internet Banking - FAQ - About Hong Leong Connect services Q1. What is Hong Leong Connect? A1. Hong Leong Connect brings you a host of digital banking services offered by Hong Leong Bank (Cambodia) Plc.

More information

PSYCHOLOGY HUMAN SUBJECT POOL AY

PSYCHOLOGY HUMAN SUBJECT POOL AY General Features of the Psychology Human Subject Pool The Psychology Human Subject Pool (Subject Pool) provides a system for coordinating enrollment in Department research involving human subjects. The

More information

Table of Contents. Contour Diabetes App User Guide

Table of Contents. Contour Diabetes App User Guide Table of Contents Introduction... 3 About the CONTOUR Diabetes App... 3 System and Device Requirements... 3 Intended Use... 3 Getting Started... 3 Downloading CONTOUR... 3 Apple... 3 Android... 4 Quick

More information

All major devices and browsers. ADHD Diploma

All major devices and browsers. ADHD Diploma ADHD Diploma DURATION LOCATION COMPATIBILITY SUPPORT 12 hours Online All major devices and browsers We are here to help if you have any problems ADHD Diploma The ADHD course will give you the information

More information

More skilled internet users behave (a little) more securely

More skilled internet users behave (a little) more securely More skilled internet users behave (a little) more securely Elissa Redmiles eredmiles@cs.umd.edu Shelby Silverstein shelby93@umd.edu Wei Bai wbai@umd.edu Michelle L. Mazurek mmazurek@umd.edu University

More information

COLUMBIA UNIVERSITY INSTITUTIONAL REVIEW BOARD GUIDANCE ON ELECTRONIC INFORMED CONSENT

COLUMBIA UNIVERSITY INSTITUTIONAL REVIEW BOARD GUIDANCE ON ELECTRONIC INFORMED CONSENT COLUMBIA UNIVERSITY INSTITUTIONAL REVIEW BOARD GUIDANCE ON ELECTRONIC INFORMED CONSENT I. BACKGROUND Electronic consenting ( e-consenting ) is the use of electronic systems and processes, whether in person

More information

Connectivity guide for ReSound Smart 3D app

Connectivity guide for ReSound Smart 3D app Connectivity guide for ReSound Smart 3D app Table of contents Introduction to ReSound Smart Hearing Aids... 3 Mobile Devices that Work with ReSound Smart Hearing Aids... 3 Connectivity and ReSound Smart

More information

UpToDate Anywhere. Registration Guide. This Registration Guide outlines how to: Register for a free account Access UpToDate Stay current

UpToDate Anywhere. Registration Guide. This Registration Guide outlines how to: Register for a free account Access UpToDate Stay current When you have to be right UpToDate Anywhere Registration Guide This Registration Guide outlines how to: Register for a free account Access UpToDate Stay current www.uptodate.com www.wolterskluwer.com Your

More information

WALK MS 2014 WELCOME PACKET

WALK MS 2014 WELCOME PACKET Central & Eastern Virginia Chapter 2014 WALK MS 2014 WELCOME PACKET WALK TO CREATE A WORLD FREE OF MS National MS Society, Central & Eastern Virginia Chapter Richmond Office: 4200 Innslake Drive, Suite

More information

Connect to your client. Guide

Connect to your client. Guide Connect to your client Guide Welcome Thank you for your participation in this limited introduction of RemoteCare Oticon RemoteCare allows you to send updated settings and make adjustments real-time to

More information

User Manual. RaySafe i2 dose viewer

User Manual. RaySafe i2 dose viewer User Manual RaySafe i2 dose viewer 2012.03 Unfors RaySafe 5001048-A All rights are reserved. Reproduction or transmission in whole or in part, in any form or by any means, electronic, mechanical or otherwise,

More information

Nokia Health Mate app

Nokia Health Mate app Your Activity Tracker and Life Coach User Guide EN - 1 Table of Contents What is the?...3 Requirements 3 Smartphone or device 3 Installing the app...4 Accounts 4 App Navigation...7 The Timeline 7 Dashboard

More information

Contour Diabetes app User Guide

Contour Diabetes app User Guide Contour Diabetes app User Guide Contents iii Contents Chapter 1: Introduction...5 About the CONTOUR DIABETES app...6 System and Device Requirements...6 Intended Use...6 Chapter 2: Getting Started...7

More information

About this consent form

About this consent form Protocol Title: Development of the smoking cessation app Smiling instead of Smoking Principal Investigator: Bettina B. Hoeppner, Ph.D. Site Principal Investigator: n/a Description of Subject Population:

More information

Keywords: consultation, drug-related problems, pharmacists, Theory of Planned Behavior

Keywords: consultation, drug-related problems, pharmacists, Theory of Planned Behavior DEVELOPMENT OF A QUESTIONNAIRE BASED ON THE THEORY OF PLANNED BEHAVIOR TO IDENTIFY FACTORS AFFECTING PHARMACISTS INTENTION TO CONSULT PHYSICIANS ON DRUG-RELATED PROBLEMS Teeranan Charoenung 1, Piyarat

More information

THIM User Manual 1.0 GETTING STARTED 3 WHAT YOU LL FIND IN THE BOX 3

THIM User Manual 1.0 GETTING STARTED 3 WHAT YOU LL FIND IN THE BOX 3 User Manual THIM is not a medical device. The information contained in this document is not intended to be used as medical information or as a substitute for your own health professional s advice. As a

More information

Diabetes Management App. Instruction Manual

Diabetes Management App. Instruction Manual Diabetes Management App Instruction Manual Accu-Chek Connect Diabetes Management App Overview The Accu-Chek Connect diabetes management app (hereafter referred to as the app) is designed to help you: Transfer

More information

Share/Follow. User Guide. A feature of Dexcom G5 Mobile CGM System

Share/Follow. User Guide. A feature of Dexcom G5 Mobile CGM System Share/Follow User Guide A feature of Dexcom G5 Mobile CGM System IMPORTANT USER INFORMATION Please review your product instructions before using your continuous glucose monitoring system. Contraindications,

More information

Step-by-Step Guide to Using Salesforce ( to Request an Interpreter

Step-by-Step Guide to Using Salesforce (  to Request an Interpreter Victim Services Interpreter Bank Getting Started Step-by-Step Guide to Using Salesforce (https://interpreterbank.force.com) to Request an Interpreter Login Credentials To sign into Ayuda s interpreter

More information

Enhanced Asthma Management with Mobile Communication

Enhanced Asthma Management with Mobile Communication Enhanced Asthma Management with Mobile Communication P.S. Ngai, S. Chan, C.T. Lau, K.M. Lau Abstract In this paper, we propose a prototype system to enhance the management of asthma condition in patients

More information

Available online at ScienceDirect. Procedia Computer Science 67 (2015 )

Available online at   ScienceDirect. Procedia Computer Science 67 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 67 (2015 ) 185 192 6th International Conference on Software Development and Technologies for Enhancing Accessibility and

More information

WALK MS 2015 WELCOME PACKET

WALK MS 2015 WELCOME PACKET WALK MS 2015 WELCOME PACKET Virginia West Virginia Chapter 2015 WALK TO CREATE A WORLD FREE OF MS National MS Society, Virginia - West Virginia Chapter Richmond Office: 4200 Innslake Drive, Suite 301,

More information

Connectivity guide for. BeMore app

Connectivity guide for. BeMore app Connectivity guide for BeMore app Compatible AGXR aids These AGXR aids work with the BeMore app. If you re in doubt, please ask your hearing care professional. Table of contents Introduction to AGXR hearing

More information

Collecting & Making Sense of

Collecting & Making Sense of Collecting & Making Sense of Quantitative Data Deborah Eldredge, PhD, RN Director, Quality, Research & Magnet Recognition i Oregon Health & Science University Margo A. Halm, RN, PhD, ACNS-BC, FAHA Director,

More information

RESULTS REPORTING MANUAL. Hospital Births Newborn Screening Program June 2016

RESULTS REPORTING MANUAL. Hospital Births Newborn Screening Program June 2016 RESULTS REPORTING MANUAL Hospital Births Newborn Screening Program June 2016 CONTENTS GETTING STARTED... 1 Summary... 1 Logging In... 1 Access For New Hires... 2 Reporting Parental Refusals... 3 Adding

More information

Crime Scene Investigation. Story

Crime Scene Investigation. Story Crime Scene Investigation Story Joe works as Detective in the Crime Scene Unit (CSU), which is a part of the SPD Detective Bureau's Forensic Investigations Division in Smallville City Police Department.

More information

Improving Informed Consent to Clinical Research. Charles W. Lidz Ph.D.

Improving Informed Consent to Clinical Research. Charles W. Lidz Ph.D. Improving Informed Consent to Clinical Research Charles W. Lidz Ph.D. Housekeeping Items Please note that this broadcast is being recorded and will be available soon for viewing on SPARC s website. Please

More information

Quick guide to connectivity and the ReSound Smart 3D app

Quick guide to connectivity and the ReSound Smart 3D app Quick guide to connectivity and the ReSound Smart 3D app 2 Content Compatibility: Hearing aids and mobile devices...4 Get started with your iphone, ipad or ipod touch...6 Pair with your ReSound Smart Hearing

More information

Elemental Kinection. Requirements. 2 May Version Texas Christian University, Computer Science Department

Elemental Kinection. Requirements. 2 May Version Texas Christian University, Computer Science Department Elemental Kinection Requirements Version 2.1 2 May 2016 Elemental Kinection Requirements i Revision History All revision history listed below. Version Change Summary Date 1.0 Initial Draft 10 November

More information

Business Research Methods. Introduction to Data Analysis

Business Research Methods. Introduction to Data Analysis Business Research Methods Introduction to Data Analysis Data Analysis Process STAGES OF DATA ANALYSIS EDITING CODING DATA ENTRY ERROR CHECKING AND VERIFICATION DATA ANALYSIS Introduction Preparation of

More information

SMS USA PHASE ONE SMS USA BULLETIN BOARD FOCUS GROUP: MODERATOR S GUIDE

SMS USA PHASE ONE SMS USA BULLETIN BOARD FOCUS GROUP: MODERATOR S GUIDE SMS USA PHASE ONE SMS USA BULLETIN BOARD FOCUS GROUP: MODERATOR S GUIDE DAY 1: GENERAL SMOKING QUESTIONS Welcome to our online discussion! My name is Lisa and I will be moderating the session over the

More information

INFLUENCING FLU VACCINATION BEHAVIOR: Identifying Drivers & Evaluating Campaigns for Future Promotion Planning

INFLUENCING FLU VACCINATION BEHAVIOR: Identifying Drivers & Evaluating Campaigns for Future Promotion Planning INFLUENCING FLU VACCINATION BEHAVIOR: Identifying Drivers & Evaluating Campaigns for Future Promotion Planning Cathy St. Pierre, MS ACHA 2011 Annual Conference June 1, 2011 H1N1 Flu Media Coverage Source:

More information

Student Guide to EHR Go

Student Guide to EHR Go Student Guide to EHR Go I. Introduction... 1 II. Quick Facts... 1 III. Creating your Account... 1 IV. Applying Your Subscription... 4 V. Logging in to EHR Go... 7 VI. Library... 8 VII. Receiving Assignments

More information

How-To Evaluate a Veterinary Digital Radiography System A SPECIAL REPORT

How-To Evaluate a Veterinary Digital Radiography System A SPECIAL REPORT How-To Evaluate a Veterinary Digital Radiography System A SPECIAL REPORT INTRODUCTION The more information you have, the easier decisions are to make. Experiencing a live hands-on demonstration will take

More information

Can Multimodal Real Time Information Systems Induce a More Sustainable Mobility?

Can Multimodal Real Time Information Systems Induce a More Sustainable Mobility? 1 Can Multimodal Real Time Information Systems Induce a More Sustainable Mobility? José Pedro Ramalho Veiga Simão University of Applied Sciences and Arts of Southern Switzerland SUPSI Institute for Applied

More information

The product website contains useful information and videos that cover both the patient and the clinician interfaces for mycopd

The product website contains useful information and videos that cover both the patient and the clinician interfaces for mycopd mycopd universal guidance The product website contains useful information and videos that cover both the patient and the clinician interfaces for mycopd https://mymhealth.com/mymhealth/mycopd The clinician

More information

Internal Consistency and Reliability of the Networked Minds Measure of Social Presence

Internal Consistency and Reliability of the Networked Minds Measure of Social Presence Internal Consistency and Reliability of the Networked Minds Measure of Social Presence Chad Harms Iowa State University Frank Biocca Michigan State University Abstract This study sought to develop and

More information

Flu season. Making the most of online appointments. August 2018

Flu season. Making the most of online appointments. August 2018 Flu season Making the most of online appointments August 2018 Dear colleagues, Over the last four years GP Online Services have been implemented by practices across England. Over 14 million patients -

More information

Kinomap Trainer app is set for fitness machines including exercise bikes, ellipticals and cross trainers, treadmills and rowers.

Kinomap Trainer app is set for fitness machines including exercise bikes, ellipticals and cross trainers, treadmills and rowers. Kinomap Trainer app is set for fitness machines including exercise bikes, ellipticals and cross trainers, treadmills and rowers. Version 1.1 1 With Kinomap Fitness, ride more than 100,000 km of geolocated

More information

Issues in Information Systems

Issues in Information Systems ANALYZING THE ROLE OF SOME PERSONAL DETERMINANTS IN WEB 2.0 APPLICATIONS USAGE Adel M. Aladwani, Kuwait University, adel.aladwani@ku.edu.kw ABSTRACT This study examines the personal determinants of Web

More information

User Manual CentrePoint Data Hub

User Manual CentrePoint Data Hub User Manual CentrePoint Data Hub CentrePoint Data Hub Revision: 0 Released: 07//07 User Manual CentrePoint Data Hub CentrePoint Data Hub Revision: 0 Released: 07//07 Contents Overview Getting Started Assigning

More information

Data Management, Data Management PLUS User Guide

Data Management, Data Management PLUS User Guide Data Management, Data Management PLUS User Guide Table of Contents Introduction 3 SHOEBOX Data Management and Data Management PLUS (DM+) for Individual Users 4 Portal Login 4 Working With Your Data 5 Manually

More information

Data Management System (DMS) User Guide

Data Management System (DMS) User Guide Data Management System (DMS) User Guide Eversense and the Eversense logo are trademarks of Senseonics, Incorporated. Other brands and their products are trademarks or registered trademarks of their respective

More information

CHAPTER 3 RESEARCH METHODOLOGY. In this chapter, research design, data collection, sampling frame and analysis

CHAPTER 3 RESEARCH METHODOLOGY. In this chapter, research design, data collection, sampling frame and analysis CHAPTER 3 RESEARCH METHODOLOGY 3.1 Introduction In this chapter, research design, data collection, sampling frame and analysis procedure will be discussed in order to meet the objectives of the study.

More information

EDUCATIONAL TECHNOLOGY MAKING AUDIO AND VIDEO ACCESSIBLE

EDUCATIONAL TECHNOLOGY MAKING AUDIO AND VIDEO ACCESSIBLE EDUCATIONAL TECHNOLOGY MAKING AUDIO AND VIDEO ACCESSIBLE Videos integrated in courses must be accessible by all users. An accessible video includes captions, that is a transcript of the audio description

More information

Give a Meal Team Challenge Toolkit

Give a Meal Team Challenge Toolkit Give a Meal Team Challenge Toolkit PARTICIPANT GUIDE Welcome to Give A Meal Team Challenge! We re so excited that you have joined Give A Meal Team Challenge to help fight hunger in your community. Your

More information

mehealth for ADHD Parent Manual

mehealth for ADHD Parent Manual mehealth for ADHD adhd.mehealthom.com mehealth for ADHD Parent Manual al Version 1.0 Revised 11/05/2008 mehealth for ADHD is a team-oriented approach where parents and teachers assist healthcare providers

More information

INVESTIGATING THE ADOPTION AND USE OF CONSUMER INTERNET TELEPHONY IN THAILAND

INVESTIGATING THE ADOPTION AND USE OF CONSUMER INTERNET TELEPHONY IN THAILAND INVESTIGATING THE ADOPTION AND USE OF CONSUMER INTERNET TELEPHONY IN THAILAND Alexander M. Janssens Siam University Bangkok, Thailand research@alexanderjanssens.com ABSTRACT This research investigates

More information

Undertaking statistical analysis of

Undertaking statistical analysis of Descriptive statistics: Simply telling a story Laura Delaney introduces the principles of descriptive statistical analysis and presents an overview of the various ways in which data can be presented by

More information

My Fitness Pal Health & Fitness Tracker A User s Guide

My Fitness Pal Health & Fitness Tracker A User s Guide My Fitness Pal Health & Fitness Tracker A User s Guide By: Angela McCall Introduction My Fitness Pal is an online diet, health, and fitness tracker that allows you to track your nutrition and fitness goals

More information

the best of care Managing diabetes with the FORA Diamond MINI and tools from Discovery Health Medical Scheme

the best of care Managing diabetes with the FORA Diamond MINI and tools from Discovery Health Medical Scheme the best of care 2014 Managing diabetes with the FORA Diamond MINI and tools from Discovery Health Medical Scheme contents What this document is about This document gives an overview of the FORA Diamond

More information

Perceived usefulness. Intention Use E-filing. Attitude. Ease of use Perceived behavioral control. Subjective norm

Perceived usefulness. Intention Use E-filing. Attitude. Ease of use Perceived behavioral control. Subjective norm Project Guidelines Perceived usefulness Attitude Intention Use E-filing Ease of use Perceived behavioral control Subjective norm Introduction Introduction should include support/justification why the research

More information

App user guide. resound.com

App user guide. resound.com App user guide resound.com Introduction The ReSound apps are made to enhance your hearing experience and enable you to get more out of your ReSound hearing aids. ReSound s innovative sound technology and

More information

3Shape TRIOS Orthodontics Impress your patients

3Shape TRIOS Orthodontics Impress your patients 3shape.com About 3Shape 3Shape is changing dentistry together with dental professionals across the world by developing innovations that provide superior dental care for patients. Our portfolio of 3D scanners

More information

My Review of John Barban s Venus Factor (2015 Update and Bonus)

My Review of John Barban s Venus Factor (2015 Update and Bonus) My Review of John Barban s Venus Factor (2015 Update and Bonus) December 26, 2013 by Erin B. White 202 Comments (Edit) This article was originally posted at EBWEIGHTLOSS.com Venus Factor is a diet program

More information

Audit Firm Administrator steps to follow

Audit Firm Administrator steps to follow Contents Audit Firm Administrator steps to follow... 3 What to know before you start... 3 Understanding CaseWare Cloud in a nutshell... 3 How to do the once off set up for the Audit Firm or Organisation...

More information

Connectivity guide for ReSound Smart 3D app

Connectivity guide for ReSound Smart 3D app Connectivity guide for ReSound Smart 3D app Table of contents Introduction to ReSound Smart Hearing Aids... 3 Mobile Devices that Work with ReSound Smart Hearing Aids... 3 Connectivity and ReSound Smart

More information

User Acceptance of E-Government Services

User Acceptance of E-Government Services User Acceptance of E-Government Services PACIS 2007 Track (Human Computer Interaction, Social and Cultural Aspects of IS) (Full Paper) Abstract In order to provide more accessible, accurate, real-time

More information

Instruction Manual Wellness Coach - Sleep

Instruction Manual Wellness Coach - Sleep Instruction Manual Wellness Coach - Sleep V1.4 JUNE 2018 TABLE OF CONTENTS INSTALL THE MOBILE APP WELLNESS COACH SLEEP...4 LOGIN TO WELLNESS COACH SLEEP...5 Login with a Wellness Coach Health account...5

More information

FUNDRAISING GUIDE. Make A Difference. walktocurearthritis.org. #WalkToCureArthritis

FUNDRAISING GUIDE. Make A Difference. walktocurearthritis.org. #WalkToCureArthritis FUNDRAISING GUIDE ONE Can Make A Difference walktocurearthritis.org #WalkToCureArthritis Welcome to the Walk to Cure Arthritis Walk to Cure Arthritis is the largest arthritis gathering in the world, celebrating

More information

The SEVEN TOUCHES PROGRAM

The SEVEN TOUCHES PROGRAM The SEVEN TOUCHES PROGRAM Connects you to success National Association of Insurance and Financial Advisors Background: the seven touches The Seven Touches of Membership (Seven Touches) is based on a study

More information

Qualitative and Quantitative Approaches Workshop. Comm 151i San Jose State U Dr. T.M. Coopman Okay for non-commercial use with attribution

Qualitative and Quantitative Approaches Workshop. Comm 151i San Jose State U Dr. T.M. Coopman Okay for non-commercial use with attribution Qualitative and Quantitative Approaches Workshop Comm 151i San Jose State U Dr. T.M. Coopman Okay for non-commercial use with attribution This Workshop This is a research skill workshop. This workshop

More information

Internal Consistency and Reliability of the Networked Minds Social Presence Measure

Internal Consistency and Reliability of the Networked Minds Social Presence Measure Internal Consistency and Reliability of the Networked Minds Social Presence Measure Chad Harms, Frank Biocca Iowa State University, Michigan State University Harms@iastate.edu, Biocca@msu.edu Abstract

More information

Your Dental Benefits. The Local Choice Dental Benefits Program

Your Dental Benefits. The Local Choice Dental Benefits Program Your Dental Benefits The Local Choice Dental Benefits Program Welcome to Delta Dental of Virginia In addition to the largest network of dentists in Virginia* and valuable benefits that help keep your out-of-pocket

More information

3Shape TRIOS Orthodontics. Impress your patients

3Shape TRIOS Orthodontics. Impress your patients 3Shape TRIOS Orthodontics Impress your patients Keep improving with TRIOS Orthodontics Going digital with your orthodontic practice means that you are more efficient, more precise and your patients more

More information

User Instruction Guide

User Instruction Guide User Instruction Guide Table of Contents Logging In and Logging Out of MMSx 1 Creating a TPN (Terminal Profile Number) 2 Single Merchant 2 From Navigation Bar 2 From Home Page Link 4 Multiple Merchants

More information

We, at Innovatech Group, have designed xtrack, an easy-to-use workout application that tracks the fitness progress of the user, asking the user to

We, at Innovatech Group, have designed xtrack, an easy-to-use workout application that tracks the fitness progress of the user, asking the user to 2 We, at Innovatech Group, have designed xtrack, an easy-to-use workout application that tracks the fitness progress of the user, asking the user to input information before and after each workout session.

More information

...better to use a lock screen than to worry about saving a few seconds of time : Effect of Fear Appeal in the Context of Smartphone Locking Behavior

...better to use a lock screen than to worry about saving a few seconds of time : Effect of Fear Appeal in the Context of Smartphone Locking Behavior ...better to use a lock screen than to worry about saving a few seconds of time : Effect of Fear Appeal in the Context of Smartphone Locking Behavior Yusuf Albayram, Mohammad Maifi Hasan Khan, Theodore

More information

Overview. Video calling today. Who we are 8/21/12. Video Quality and Interoperability across Videophones Today and in the Future

Overview. Video calling today. Who we are 8/21/12. Video Quality and Interoperability across Videophones Today and in the Future Overview Video Quality and Interoperability across Videophones Today and in the Future Christian Vogler and Norman Williams Technology Access Program, Gallaudet University Who we are The state of video

More information

Realtime A Cost-Effective Solution

Realtime A Cost-Effective Solution Realtime A Cost-Effective Solution Realtime - A Cost-Effective Solution In April 2013, NCRA was invited by Judge David A. Nuffer to participate in choosing the most tech-savvy and cost-effective solution

More information

Human Research Participant Protection Program

Human Research Participant Protection Program Human Research Participant Protection Program Guidance on IRB Review of International Research Issued: 6/3/14 I. Subject: Research conducted by Cornell University investigators outside of the United States

More information

Software Version 2.0. User s Guide

Software Version 2.0. User s Guide Software Version 2.0 User s Guide Table of Contents Contents Contents Important Information About Your FreeStyle Auto-Assist Software...1 Intended Use...1 System Requirements...1 Connecting to your Abbott

More information

Must be the music: Validation of a theory-based survey

Must be the music: Validation of a theory-based survey Must be the music: Validation of a theory-based survey Brian C. Gordon, PhD, 1 Michael A. Perko, PhD, 2 Lori W. Turner, PhD, 1 James D. Leeper, PhD, 3 Samory T. Pruitt, PhD, 4 and Stuart L. Usdan, PhD

More information

Data-driven hearing care with time-stamped data-logging

Data-driven hearing care with time-stamped data-logging Data-driven hearing care with time-stamped data-logging NIELS HENRIK PONTOPPIDAN 1,*, XI LI 1, LARS BRAMSLØW 1, BENJAMIN JOHANSEN 1,2, CLAUS NIELSEN 1, ATEFEH HAFEZ 1, AND MICHAEL KAI PETERSEN 1, 2 1 Eriksholm

More information

MNSCREEN TRAINING MANUAL Hospital Births Newborn Screening Program October 2015

MNSCREEN TRAINING MANUAL Hospital Births Newborn Screening Program October 2015 MNSCREEN TRAINING MANUAL Hospital Births Newborn Screening Program October 2015 CONTENTS PART 1: GETTING STARTED... 2 Logging In... 2 Access for New Hires... 2 Reporting Refusals... 3 Adding Patient Records...

More information

Proteome Discoverer Version 1.3

Proteome Discoverer Version 1.3 Xcalibur Proteome Discoverer Version 1.3 Installation Guide XCALI-97359 Revision A May 2011 2011 Thermo Fisher Scientific Inc. All rights reserved. Xcalibur is a registered trademark of Thermo Fisher Scientific

More information

Overview, page 1 Shortcut Keys for Cisco Unity Connection Administration, page 1 Other Unity Connection Features, page 4

Overview, page 1 Shortcut Keys for Cisco Unity Connection Administration, page 1 Other Unity Connection Features, page 4 Overview, page 1 Shortcut Keys for Cisco Unity Connection Administration, page 1 Other Unity Connection Features, page 4 Overview Cisco Unity Connection supports various shortcut s and features that provides

More information

An Overview of ProviderConnect. For Applied Behavior Analysis (ABA) Providers

An Overview of ProviderConnect. For Applied Behavior Analysis (ABA) Providers An Overview of ProviderConnect For Applied Behavior Analysis (ABA) Providers ABA and ProviderConnect ProviderConnect is an easy-to-use online application that providers can use to complete everyday service

More information

LiteLink mini USB. Diatransfer 2

LiteLink mini USB. Diatransfer 2 THE ART OF MEDICAL DIAGNOSTICS LiteLink mini USB Wireless Data Download Device Diatransfer 2 Diabetes Data Management Software User manual Table of Contents 1 Introduction... 3 2 Overview of operating

More information

Broadband and Deaf People. Discussion Paper

Broadband and Deaf People. Discussion Paper Broadband and Deaf People Discussion Paper What is a Discussion Paper? A discussion paper is a document that is sent to the Deaf community, for you to read and think about things that are in this Discussion

More information

Karen Hirt General Assembly June GoVax IMMUNIZATION RECORDS COMPROBANTE DE IMMUNIZACIÓN. Mobile Manager for Immunization & Travel Vaccines

Karen Hirt General Assembly June GoVax IMMUNIZATION RECORDS COMPROBANTE DE IMMUNIZACIÓN. Mobile Manager for Immunization & Travel Vaccines Karen Hirt General Assembly June 2018 GoVax IMMUNIZATION RECORDS COMPROBANTE DE IMMUNIZACIÓN Mobile Manager for Immunization & Travel Vaccines GoVax Travel vaccines and immunization manager for individuals

More information

Optimal Flow Experience in Web Navigation

Optimal Flow Experience in Web Navigation Optimal Flow Experience in Web Navigation Hsiang Chen, Rolf T. Wigand and Michael Nilan School of Information Studies, Syracuse University Syracuse, NY 13244 Email: [ hchen04, rwigand, mnilan]@mailbox.syr.edu

More information

How Doctors Feel About Electronic Health Records. National Physician Poll by The Harris Poll

How Doctors Feel About Electronic Health Records. National Physician Poll by The Harris Poll How Doctors Feel About Electronic Health Records National Physician Poll by The Harris Poll 1 Background, Objectives, and Methodology New research from Stanford Medicine, conducted with The Harris Poll

More information

Patient Online Flu Clinic campaign for GP practices

Patient Online Flu Clinic campaign for GP practices Patient Online Flu Clinic campaign for GP practices WebEx recording This presentation has been recorded as a WebEx. The webinar lasts for 33 minutes and shares lots of ideas as to how you can create one

More information