𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Information matters


Publisher
Elsevier Science
Year
2003
Weight
61 KB
Volume
2003
Category
Article
ISSN
1351-4180

No coin nor oath required. For personal study only.


📜 SIMILAR VOLUMES


Information matters: Beyond OASIS
✍ V.C. Ramesh 📂 Article 📅 1997 🏛 Elsevier Science 🌐 English ⚖ 435 KB

Congestion on the Internet and the overwhelming volume of information are two important issues to consider as energy markets

Gatekeeping versus direct-access when pa
✍ Paula González 📂 Article 📅 2009 🏛 John Wiley and Sons 🌐 English ⚖ 486 KB

## Abstract We develop a principal‐agent model in which the health authority acts as a principal for both a patient and a general practitioner (GP). The goal of the paper is to weigh the merits of gatekeeping versus non‐gatekeeping approaches to health care when patient self‐health information and

Information search using the balanced sc
✍ Bruce R. Neumann; Michael L. Roberts; Eric Cauvin 📂 Article 📅 2010 🏛 John Wiley and Sons 🌐 English ⚖ 84 KB

## Abstract Information overload has been rightly called one of the "deadly sins" of balanced scorecards. To help organizations make their scorecards balanced, this article discusses how many and what types of measures to use. © 2010 Wiley Periodicals, Inc.

Information Processing Biases and Anxiet
✍ Hadwin, Julie A.; Field, Andy P. 📂 Article 📅 2010 🏛 John Wiley & Sons, Ltd 🌐 English ⚖ 545 KB

anxiety Is An Emotion That Appears Early In Childhood And Follows A Typical Developmental Course. This Book Provides A Comprehensive Overview Of Relevant Theory And Research Related  To The Origins Of Information Processing Biases And Its Contribution To clinical Levels Of Anxiety in Children And Ad

Information Security (Principles and Pra
✍ Stamp, Mark 📂 Article 📅 2011 🏛 John Wiley & Sons, Inc. 🌐 English ⚖ 797 KB

"As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not si