631 resultados para Group Concept Mapping
Resumo:
Purpose – Interactive information retrieval (IR) involves many human cognitive shifts at different information behaviour levels. Cognitive science defines a cognitive shift or shift in cognitive focus as triggered by the brain's response and change due to some external force. This paper aims to provide an explication of the concept of “cognitive shift” and then report results from a study replicating Spink's study of cognitive shifts during interactive IR. This work aims to generate promising insights into aspects of cognitive shifts during interactive IR and a new IR evaluation measure – information problem shift. Design/methodology/approach – The study participants (n=9) conducted an online search on an in-depth personal medical information problem. Data analysed included the pre- and post-search questionnaires completed by each study participant. Implications for web services and further research are discussed. Findings – Key findings replicated the results in Spink's study, including: all study participants reported some level of cognitive shift in their information problem, information seeking and personal knowledge due to their search interaction; and different study participants reported different levels of cognitive shift. Some study participants reported major cognitive shifts in various user-based variables such as information problem or information-seeking stage. Unlike Spink's study, no participant experienced a negative shift in their information problem stage or level of information problem understanding. Originality/value – This study builds on the previous study by Spink using a different dataset. The paper provides valuable insights for further research into cognitive shifts during interactive IR.
Resumo:
Customer perceived value is concerned with the experiences of consumers when using a service and is often referred to in the context of service provision or on the basis of service quality (Auh, et al., 2007; Chang, 2008; Jackson, 2007; Laukkanen, 2007; Padgett & Mulvey, 2007; Shamdasani, Mukherjee & Malhotra, 2008). Understanding customer perceived value has benefits for social marketing and allows scholars and practitioners alike to identify why consumers engage in positive social behaviours through the use of services. Understanding consumers’ use of wellness services in particular is important, because the use of wellness services demonstrates the fulfilment of social marketing aims; performing pro-active, positive social behaviours that are of benefit to the individual and to society (Andreasen, 1994). As consumers typically act out of self-interest (Rothschild, 1999), this research posits that a value proposition must be made to consumers in order to encourage behavioural change. Thus, this research seeks to identify how value is created for consumers of wellness services in social marketing. This results in the overall research question of this research: How is value created in social marketing wellness services? A traditional method towards understanding value has been the adoption of an economic approach, which considers the utility gained and where value is a direct outcome of a cost-benefit analysis (Payne & Holt, 1999). However, there has since been a shift towards the adoption of an experiential approach in understanding value. This experiential approach considers the consumption experience of the consumer which extends beyond the service exchange and includes pre- and post-consumption stages (Russell-Bennett, Previte & Zainuddin, 2009). As such, this research uses an experiential approach to identify the value that exists in social marketing wellness services. Four dimensions of value have been commonly conceptualised and identified in the commercial marketing literature; functional, emotional, social, and altruistic value (Holbrook, 1994; Sheth, Newman & Gross, 1991; Sweeney & Soutar, 2001). It is not known if these value dimensions also exist in social marketing. In addition, sources of value said to influence value dimensions have been conceptualised in the literature. Sources of value such as information, interaction, environment, service, customer co-creation, and social mandate have been conceptually identified both in the commercial and social marketing literature (Russell-Bennet, Previte & Zainuddin, 2009; Smith & Colgate, 2007). However, it is not clear which sources of value contribute to the creation of value for users of wellness services. Thus, this research seeks to explore these relationships. This research was conducted using a wellness service context, specifically breast cancer screening services. The primary target consumer of these services is women aged 50 to 69 years old (inclusive) who have never been diagnosed with breast cancer. It is recommended that women in this target group have a breast screen every 2 years in order to achieve the most effective medical outcomes from screening. A two-study mixed method approach was utilised. Study 1 was a qualitative exploratory study that analysed individual-depth interviews with 25 information-rich respondents. The interviews were transcribed verbatim and analysed using NVivo 8 software. The qualitative results provided evidence of the existence of the four value dimensions in social marketing. The results also allowed for the development of a typology of experiential value by synthesising current understanding of the value dimensions, with the activity aspects of experiential value identified by Holbrook (1994) and Mathwick, Malhotra and Rigdon (2001). The qualitative results also provided evidence for the existence of sources of value in social marketing, namely information, interaction, environment and consumer participation. In particular, a categorisation of sources of value was developed as a result of the findings from Study 1, which identify organisational, consumer, and third party sources of value. A proposed model of value co-creation and a set of hypotheses were developed based on the results of Study 1 for further testing in Study 2. Study 2 was a large-scale quantitative confirmatory study that sought to test the proposed model of value co-creation and the hypotheses developed. An online-survey was administered Australia-wide to women in the target audience. A response rate of 20.1% was achieved, resulting in a final sample of 797 useable responses after removing ineligible respondents. Reliability and validity analyses were conducted on the data, followed by Exploratory Factor Analysis (EFA) in PASW18, followed by Confirmatory Factor Analysis (CFA) in AMOS18. Following the preliminary analyses, the data was subject to Structural Equation Modelling (SEM) in AMOS18 to test the path relationships hypothesised in the proposed model of value creation. The SEM output revealed that all hypotheses were supported, with the exception of one relationship which was non-significant. In addition, post hoc tests revealed seven further significant non-hypothesised relationships in the model. The quantitative results show that organisational sources of value as well as consumer participation sources of value influence both functional and emotional dimensions of value. The experience of both functional and emotional value in wellness services leads to satisfaction with the experience, followed by behavioural intentions to perform the behaviour and use the service again. One of the significant non-hypothesised relationships revealed that emotional value leads to functional value in wellness services, providing further empirical evidence that emotional value features more prominently than functional value for users of wellness services. This research offers several contributions to theory and practice. Theoretically, this research addresses a gap in the literature by using social marketing theory to provide an alternative method of understanding individual behaviour in a domain that has been predominantly investigated in public health. This research also clarifies the concept of value and offers empirical evidence to show that value is a multi-dimensional construct with separate and distinct dimensions. Empirical evidence for a typology of experiential value, as well as a categorisation of sources of value is also provided. In its practical contributions, this research identifies a framework that is the value creation process and offers health services organisations a diagnostic tool to identify aspects of the service process that facilitate the value creation process.
Resumo:
This paper addresses the challenge of developing robots that map and navigate autonomously in real world, dynamic environments throughout the robot’s entire lifetime – the problem of lifelong navigation. Static mapping algorithms can produce highly accurate maps, but have found few applications in real environments that are in constant flux. Environments change in many ways: both rapidly and gradually, transiently and permanently, geometrically and in appearance. This paper demonstrates a biologically inspired navigation algorithm, RatSLAM, that uses principles found in rodent neural circuits. The algorithm is demonstrated in an office delivery challenge where the robot was required to perform mock deliveries to goal locations in two different buildings. The robot successfully completed 1177 out of 1178 navigation trials over 37 hours of around the clock operation spread over 11 days.
Resumo:
In this paper an existing method for indoor Simultaneous Localisation and Mapping (SLAM) is extended to operate in large outdoor environments using an omnidirectional camera as its principal external sensor. The method, RatSLAM, is based upon computational models of the area in the rat brain that maintains the rodent’s idea of its position in the world. The system uses the visual appearance of different locations to build hybrid spatial-topological maps of places it has experienced that facilitate relocalisation and path planning. A large dataset was acquired from a dynamic campus environment and used to verify the system’s ability to construct representations of the world and simultaneously use these representations to maintain localisation.
Resumo:
DeLone and McLean (1992, p. 16) argue that the concept of “system use” has suffered from a “too simplistic definition.” Despite decades of substantial research on system use, the concept is yet to receive strong theoretical scrutiny. Many measures of system use and the development of measures have been often idiosyncratic and lack credibility or comparability. This paper reviews various attempts at conceptualization and measurement of system use and then proposes a re-conceptualization of it as “the level of incorporation of an information system within a user’s processes.” The definition is supported with the theory of work systems, system, and Key-User-Group considerations. We then go on to develop the concept of a Functional- Interface-Point (FIP) and four dimensions of system usage: extent, the proportion of the FIPs used by the business process; frequency, the rate at which FIPs are used by the participants in the process; thoroughness, the level of use of information/functionality provided by the system at an FIP; and attitude towards use, a set of measures that assess the level of comfort, degree of respect and the challenges set forth by the system. The paper argues that the automation level, the proportion of the business process encoded by the information system has a mediating impact on system use. The article concludes with a discussion of some implications of this re-conceptualization and areas for follow on research.
Resumo:
The growth of technologies and tools branded as =new media‘ or =Web 2.0‘ has sparked much discussion about the internet and its place in all facets of social life. Such debate includes the potential for blogs and citizen journalism projects to replace or alter journalism and mainstream media practices. However, while the journalism-blog dynamic has attracted the most attention, the actual work of political bloggers, the roles they play in the mediasphere and the resources they use, has been comparatively ignored. This project will look at political blogging in Australia and France - sites commenting on or promoting political events and ideas, and run by citizens, politicians, and journalists alike. In doing so, the structure of networks formed by bloggers and the nature of communication within political blogospheres will be examined. Previous studies of political blogging around the world have focussed on individual nations, finding that in some cases the networks are divided between different political ideologies. By comparing two countries with different political representation (two-party dominated system vs. a wider political spectrum), this study will determine the structure of these political blogospheres, and correlate these structures with the political environment in which they are situated. The thesis adapts concepts from communication and media theories, including framing, agenda setting, and opinion leaders, to examine the work of political bloggers and their place within the mediasphere. As well as developing a hybrid theoretical base for research into blogs and other online communication, the project outlines new methodologies for carrying out studies of online activity through the analysis of several topical networks within the wider activity collected for this project. The project draws on hyperlink and textual data collected from a sample of Australian and French blogs between January and August 2009. From this data, the thesis provides an overview of =everyday‘ political blogging, showing posting patterns over several months of activity, away from national elections and their associated campaigns. However, while other work in this field has looked solely at cumulative networks, treating collected data as a static network, this project will also look at specific cases to see how the blogospheres change with time and topics of discussion. Three case studies are used within the thesis to examine how blogs cover politics, featuring an international political event (the Obama inauguration), and local political topics (the opposition to the =Création et Internet‘, or HADOPI, law in France, the =Utegate‘ scandal in Australia). By using a mixture of qualitative and quantitative methods, the study analyses data collected from a population of sites from both countries, looking at their linking patterns, relationship with mainstream media, and topics of interest. This project will subsequently help to further develop methodologies in this field and provide new and detailed information on both online networks and internet-based political communication in Australia and France.
Resumo:
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.
Resumo:
For more than a decade research in the field of context aware computing has aimed to find ways to exploit situational information that can be detected by mobile computing and sensor technologies. The goal is to provide people with new and improved applications, enhanced functionality and better use experience (Dey, 2001). Early applications focused on representing or computing on physical parameters, such as showing your location and the location of people or things around you. Such applications might show where the next bus is, which of your friends is in the vicinity and so on. With the advent of social networking software and microblogging sites such as Facebook and Twitter, recommender systems and so on context-aware computing is moving towards mining the social web in order to provide better representations and understanding of context, including social context. In this paper we begin by recapping different theoretical framings of context. We then discuss the problem of context- aware computing from a design perspective.
Resumo:
New knowledge has raised a concern about the cost-ineffective design methods and the true performance of railroad prestressed concrete ties. Because of previous knowledge deficiencies, railway civil and track engineers have been aware of the conservative design methods for structural components in any railway track that rely on allowable stresses and material strength reductions. In particular, railway sleeper (or railroad tie) is an important component of railway tracks and is commonly made of prestressed concrete. The existing code for designing such components makes use of the permissible stress design concept, whereas the fiber stresses over cross sections at initial and final stages are limited by some empirical values. It is believed that the concrete ties complying with the permissible stress concept possess unduly untapped fracture toughness, based on a number of proven experiments and field data. Collaborative research run by the Australian Cooperative Research Centre for Railway Engineering and Technologies (Rail CRC) was initiated to ascertain the reserved capacity of Australian railway prestressed concrete ties that were designed using the existing design code. The findings have led to the development of a new limit-states design concept. This paper highlights the conventional and the new limit-states design philosophies and their implication to both the railway community and the public. © 2011 American Society of Civil Engineers.
Resumo:
Since users have become the focus of product/service design in last decade, the term User eXperience (UX) has been frequently used in the field of Human-Computer-Interaction (HCI). Research on UX facilitates a better understanding of the various aspects of the user’s interaction with the product or service. Mobile video, as a new and promising service and research field, has attracted great attention. Due to the significance of UX in the success of mobile video (Jordan, 2002), many researchers have centered on this area, examining users’ expectations, motivations, requirements, and usage context. As a result, many influencing factors have been explored (Buchinger, Kriglstein, Brandt & Hlavacs, 2011; Buchinger, Kriglstein & Hlavacs, 2009). However, a general framework for specific mobile video service is lacking for structuring such a great number of factors. To measure user experience of multimedia services such as mobile video, quality of experience (QoE) has recently become a prominent concept. In contrast to the traditionally used concept quality of service (QoS), QoE not only involves objectively measuring the delivered service but also takes into account user’s needs and desires when using the service, emphasizing the user’s overall acceptability on the service. Many QoE metrics are able to estimate the user perceived quality or acceptability of mobile video, but may be not enough accurate for the overall UX prediction due to the complexity of UX. Only a few frameworks of QoE have addressed more aspects of UX for mobile multimedia applications but need be transformed into practical measures. The challenge of optimizing UX remains adaptations to the resource constrains (e.g., network conditions, mobile device capabilities, and heterogeneous usage contexts) as well as meeting complicated user requirements (e.g., usage purposes and personal preferences). In this chapter, we investigate the existing important UX frameworks, compare their similarities and discuss some important features that fit in the mobile video service. Based on the previous research, we propose a simple UX framework for mobile video application by mapping a variety of influencing factors of UX upon a typical mobile video delivery system. Each component and its factors are explored with comprehensive literature reviews. The proposed framework may benefit in user-centred design of mobile video through taking a complete consideration of UX influences and in improvement of mobile videoservice quality by adjusting the values of certain factors to produce a positive user experience. It may also facilitate relative research in the way of locating important issues to study, clarifying research scopes, and setting up proper study procedures. We then review a great deal of research on UX measurement, including QoE metrics and QoE frameworks of mobile multimedia. Finally, we discuss how to achieve an optimal quality of user experience by focusing on the issues of various aspects of UX of mobile video. In the conclusion, we suggest some open issues for future study.
Resumo:
This paper reports one aspect of a study of 28 young adults (18–26 years) engaging with the uncertain (contested) science of a television news report about recent research into mobile phone health risks. The aim of the study was to examine these young people’s ‘accounts of scientific knowledge’ in this context. Seven groups of friends responded to the news report, initially in focus group discussions. Later in semi-structured interviews they elaborated their understanding of the nature of science through their explanations of the scientists’ disagreement and described their mobile phone safety risk assessments. This paper presents their accounts in terms of their views of the nature of science and their concept understanding. Discussions were audio-recorded then analysed by coding the talk in terms of issues raised, which were grouped into themes and interpreted in terms of a moderate social constructionist theoretical framing. In this context, most participants expressed a ‘common sense’ view of the nature of science, describing it as an atheoretical, technical procedure of scientists testing their personal opinions on the issue, subject to the influence of funding sponsors. The roles of theory and data interpretation were largely ignored. It is argued that the nature of science understanding is crucial to engagement with contemporary socioscientific issues, particularly the roles of argumentation, theory, data interpretation, and the distinction of science from common sense. Implications for school science relate primarily to nature of science teaching and the inclusion of socioscientific issues in school science curricula. Future research directions are considered.
Resumo:
Previous research has shown resistance to extinction of fear conditioned to racial out-group faces, suggesting that these stimuli may be subject to prepared fear learning. The current study replicated and extended previous research by using a different racial out-group, and testing the prediction that prepared fear learning is unaffected by verbal instructions. Four groups of Caucasian participants were trained with male in-group (Caucasian) or out-group (Chinese) faces as conditional stimuli; one paired with an electro-tactile shock (CS+) and one presented alone (CS). Before extinction, half the participants were instructed that no more shocks would be presented. Fear conditioning, indexed by larger electrodermal responses to, and blink startle modulation during the CS+, occurred during acquisition in all groups. Resistance to extinction of fear learning was found only in the racial out-group, no instruction condition. Fear conditioned to a racial out-group face was reduced following verbal instructions, contrary to predictions for the nature of prepared fear learning.
Resumo:
Three types of shop scheduling problems, the flow shop, the job shop and the open shop scheduling problems, have been widely studied in the literature. However, very few articles address the group shop scheduling problem introduced in 1997, which is a general formulation that covers the three above mentioned shop scheduling problems and the mixed shop scheduling problem. In this paper, we apply tabu search to the group shop scheduling problem and evaluate the performance of the algorithm on a set of benchmark problems. The computational results show that our tabu search algorithm is typically more efficient and faster than the other methods proposed in the literature. Furthermore, the proposed tabu search method has found some new best solutions of the benchmark instances.
Resumo:
Acknowledgement that many children in Australia travel in restraints that do not offer them the best protection has led to recent changes in legislation such that the type of restraint for children under 7 years is now specified. This paper reports the results of two studies (observational; focus group/ survey) carried out in the state of Queensland to evaluate the effectiveness of these changes to the legislation. Observations suggested that almost all of the children estimated as aged 0-12 years were restrained (95%). Analysis of the type of restraint used for target-aged children (0-6 year olds) suggests that the proportion using an age-appropriate restraint has increased by an estimated 7% since enactment of the legislation. However, around 1 in 4 children estimated as aged under 7 years were using restraints too large for good fit. Results from the survey and focus group suggested parents were supportive of the changes in legislation. Non-Indigenous parents agreed that the changes had been necessary, were effective at getting children into the right restraints, were easy to understand as well as making it clear what restraint to use with children. Moreover, they did not see the legislation as too complicated or too hard to comply with. Indigenous parents who participated in a focus group also regarded the legislation as improving children’s safety. However, they identified the cost of restraints as an important barrier to compliance. In summary, the legislation appears to have had a positive effect on compliance levels and on raising parental awareness of the need to restrain children child-specific restraints for longer. However, it would seem that an important minority of parents transition their children into larger restraints too early for optimal protection. Intervention efforts should aim to better inform these parents about appropriate ages for transition, especially from forward facing childseats. This could potentially be through use of other important transitions that occur at the same age, such as starting school. The small proportion of parents who do not restrain their children at all are also an important community sector to target. Finally, obtaining restraints presents a significant barrier to compliance for parents on limited incomes and interventions are needed to address this.
Resumo:
We derive an explicit method of computing the composition step in Cantor’s algorithm for group operations on Jacobians of hyperelliptic curves. Our technique is inspired by the geometric description of the group law and applies to hyperelliptic curves of arbitrary genus. While Cantor’s general composition involves arithmetic in the polynomial ring F_q[x], the algorithm we propose solves a linear system over the base field which can be written down directly from the Mumford coordinates of the group elements. We apply this method to give more efficient formulas for group operations in both affine and projective coordinates for cryptographic systems based on Jacobians of genus 2 hyperelliptic curves in general form.