695 resultados para layered medium theory
Resumo:
I develop a model of individuals’ intentions to discontinue information system use. Understanding these intentions is important because they give insights into users’ willingness to carry out system tasks, and provide a basis for maintenance decisions as well as possible replacement decisions. I offer a first conceptualization of factors determining users’ discontinuance intentions on basis of existing literature on technology use, status quo bias and dual factor concepts. The model is grounded in rational choice theory to distinguish determinants of a conscious decision between continuing or discontinuing IS use. I provide details on the empirical test of the model through a field study of IS users in a retail organization. The work will have implications for theory on information systems continuance and dual-factor logic in information system use. The empirical findings will provide suggestions for managers dealing with cessation of information systems and work routine changes in organizations.
Resumo:
This study evaluated the physiological tolerance times when wearing explosive and chemical (>35kg) personal protective equipment (PPE) in simulated environmental extremes across a range of differing work intensities. Twelve healthy males undertook nine trials which involved walking on a treadmill at 2.5, 4 and 5.5 km.h-1 in the following environmental conditions, 21, 30 and 37 °C wet bulb globe temperature (WBGT). Participants exercised for 60 min or until volitional fatigue, core temperature reached 39 °C, or heart rate exceeded 90% of maximum. Tolerance time, core temperature, skin temperature, mean body temperature, heart rate and body mass loss were measured. Exercise time was reduced in the higher WBGT environments (WBGT37
Resumo:
There is a general perception that public confidence in the insolvency profession is low as the result of the recent unethical practices of a few high profile liquidators. As a result, the effectiveness of the current regulatory mechanisms has been questioned, leading to a review of the performance of insolvency practitioners and subsequent regulation proposals. The challenge for the insolvency profession is balancing the expectations of the general public whilst ensuring that the obligations and duties imposed upon them are performed to acceptable and realistic standards. It is difficult (if not impossible) for the profession to meet this challenge in the absence of a cohesive framework which identifies those issues that require further regulation as opposed to those that relate to general education on the insolvency process. This paper will examine the audit expectations gap theory in the context of insolvency practitioners and suggests that a model based on this theory provides an effective framework for evaluating the regulation of the insolvency industry.
Resumo:
This thesis examines the question why the automotive mode and the large technological system it creates, continues to dominate urban transport systems despite the availability of more cost-efficient alternatives. A number of theoretical insights are developed into the way these losses evolve from path dependent growth, and lead to market failure and lock-in. The important role of asymmetries of influence is highlighted. A survey of commuters in Jakarta Indonesia is used to provide a measure of transport modal lock-in (TML) in a developing country conurbation. A discrete choice experiment is used to provide evidence for the thesis central hypothesis that in such conurbations there is a high level of commuter awareness of the negative externalities generated by TML which can produce a strong level of support for its reversal. Why TML nevertheless remains a strong and durable feature of the transport system is examined with reference to the role of asymmetries of influence.
Resumo:
This research is a step forward in improving the accuracy of detecting anomaly in a data graph representing connectivity between people in an online social network. The proposed hybrid methods are based on fuzzy machine learning techniques utilising different types of structural input features. The methods are presented within a multi-layered framework which provides the full requirements needed for finding anomalies in data graphs generated from online social networks, including data modelling and analysis, labelling, and evaluation.
Resumo:
This article responds to the invitation extended by Carney to engage in a dialogue on the topic of graduate legal research units. In his paper, Carney stated the approach of the Sydney course as being to teach theory rather than skills, to "pursue academic goals over skill competencies... ". The Faculty of Law at Queensland University of Technology introduced a postgraduate legal research unit in 1993 with different perspectives and purposes to the Sydney course, and given this experience, the opportunity for a discussion on aspects of such units including the theoretical versus practical approach to teaching cannot be ignored.
Resumo:
The functions of the volunteer functions inventory were combined with the constructs of the theory of planned behaviour (i.e., attitudes, subjective norms, and perceived behavioural control) to establish whether a stronger, single explanatory model prevailed. Undertaken in the context of episodic, skilled volunteering by individuals who were retired or approaching retirement (N = 186), the research advances on prior studies which either examined the predictive capacity of each model independently or compared their explanatory value. Using hierarchical regression analysis, the functions of the volunteer functions inventory (when controlling for demographic variables) explained an additional 7.0% of variability in individuals’ willingness to volunteer over and above that accounted for by the theory of planned behaviour. Significant predictors in the final model included attitudes, subjective norms and perceived behavioural control from the theory of planned behaviour and the understanding function from the volunteer functions inventory. It is proposed that the items comprising the understanding function may represent a deeper psychological construct (e.g., self-actualisation) not accounted for by the theory of planned behaviour. The findings highlight the potential benefit of combining these two prominent models in terms of improving understanding of volunteerism and providing a single parsimonious model for raising rates of this important behaviour.
Resumo:
Software as a Service (SaaS) can provide significant benefits to small and medium enterprises (SMEs) due to advantages like ease of access, 7*24 availability, and utility pricing. However, underlying the SaaS delivery model is often the assumption that SMEs will directly interact with the SaaS vendor and use a self-service approach. In practice, we see the rise of SaaS intermediaries who can support SMEs with sourcing and leveraging SaaS. This paper reports on the roles of intermediaries and how they support SMEs with using SaaS. We conducted an empirical study of two SaaS intermediaries and analysed their business models, in particular their value propositions. We identified orientation (technology or customer) and alignment (operational or strategic) as themes for understanding their roles. The contributions of this paper include: (1) the identification and description of SaaS intermediaries for SMEs based on an empirical study and (2) understanding the different roles of SaaS intermediaries, in particular a more basic role based on technology orientation and operational alignment and a more value adding role based on customer orientation and strategic alignment. We propose that SaaS intermediaries can address SaaS adoption and implementation challenges of SMEs by playing a basic role and can also aim to support SMEs in creating business value with SaaS based solutions by playing an added value role.
Resumo:
This paper uses transaction cost theory to study cloud computing adoption. A model is developed and tested with data from an Australian survey. According to the results, perceived vendor opportunism and perceived legislative uncertainty around cloud computing were significantly associated with perceived cloud computing security risk. There was also a significant negative relationship between perceived cloud computing security risk and the intention to adopt cloud services. This study also reports on adoption rates of cloud computing in terms of applications, as well as the types of services used.
Resumo:
The wave of democratisation across Europe, Africa, Asia and Latin America in the early 1990s triggered an increase in donor funding to media assistance initiatives, primarily within good governance policy frameworks. However, few media assistance projects have managed to effectively evaluate the impacts of their work. This thesis explores how the impacts of Australian media assistance on social change and governance can be most effectively evaluated and understood. The findings of this research suggest the importance of early investment in participatory planning of evaluation designs, which are then periodically revisited. These evaluation designs should be based on a theoretically sound link between models of change, evaluative questions and methods.
Resumo:
The phenomenon which dialogism addresses is human interaction. It enables us to conceptualise human interaction as intersubjective, symbolic, cultural, transformative and conflictual, in short, as complex. The complexity of human interaction is evident in all domains of human life, for example, in therapy, education, health intervention, communication, and coordination at all levels. A dialogical approach starts by acknowledging that the social world is perspectival, that people and groups inhabit different social realities. This book stands apart from the proliferation of recent books on dialogism, because rather than applying dialogism to this or that domain, the present volume focuses on dialogicality itself to interrogate the concepts and methods which are taken for granted in the burgeoning literature.
Resumo:
Introduction: Ten years after the publication of Elaborated Intrusion (EI) Theory, there is now substantial research into its key predictions. The distinction between intrusive thoughts, which are driven by automatic processes, and their elaboration, involving controlled processing, is well established. Desires for both addictive substances and other desired targets are typically marked by imagery, especially when they are intense. Attention training strategies such as body scanning reduce intrusive thoughts, while concurrent tasks that introduce competing sensory information interfere with elaboration, especially if they compete for the same limited-capacity working memory resources. Conclusion: EI Theory has spawned new assessment instruments that are performing strongly and offer the ability to more clearly delineate craving from correlated processes. It has also inspired new approaches to treatment. In particular, training people to use vivid sensory imagery for functional goals holds promise as an intervention for substance misuse, since it is likely to both sustain motivation and moderate craving.
Resumo:
Background and Aims Research into craving is hampered by lack of theoretical specification and a plethora of substance-specific measures. This study aimed to develop a generic measure of craving based on elaborated intrusion (EI) theory. Confirmatory factor analysis (CFA) examined whether a generic measure replicated the three-factor structure of the Alcohol Craving Experience (ACE) scale over different consummatory targets and time-frames. Design Twelve studies were pooled for CFA. Targets included alcohol, cigarettes, chocolate and food. Focal periods varied from the present moment to the previous week. Separate analyses were conducted for strength and frequency forms. Setting Nine studies included university students, with single studies drawn from an internet survey, a community sample of smokers and alcohol-dependent out-patients. Participants A heterogeneous sample of 1230 participants. Measurements Adaptations of the ACE questionnaire. Findings Both craving strength [comparative fit indices (CFI = 0.974; root mean square error of approximation (RMSEA) = 0.039, 95% confidence interval (CI) = 0.035–0.044] and frequency (CFI = 0.971, RMSEA = 0.049, 95% CI = 0.044–0.055) gave an acceptable three-factor solution across desired targets that mapped onto the structure of the original ACE (intensity, imagery, intrusiveness), after removing an item, re-allocating another and taking intercorrelated error terms into account. Similar structures were obtained across time-frames and targets. Preliminary validity data on the resulting 10-item Craving Experience Questionnaire (CEQ) for cigarettes and alcohol were strong. Conclusions The Craving Experience Questionnaire (CEQ) is a brief, conceptually grounded and psychometrically sound measure of desires. It demonstrates a consistent factor structure across a range of consummatory targets in both laboratory and clinical contexts.
Resumo:
National or International Significance Flows of cultural heritage in textual practices are vital to sustaining Indigenous communities - a national and international priority (Commonwealth of Australia, 2011). Indigenous heritage, whether passed on by oral tradition or ubiquitous social media, can be seen as a "conversation between the past and the future" (Fairclough, 2012, p. xv). Indigenous heritage involves appropriating memories within a cultural flow to pass on a spiritual legacy. This presentation reports ethnographic research of social media practices in a small independent Aboriginal school in Southeast Queensland, Australia that is resided over by the Yuggera elders and an Aboriginal principal. Quality of Research The purpose was to rupture existing notions of white literacies in schools, and to deterritorialize the uses of digital media by dominant cultures in the public sphere. Examples of learning experiences included the following: i. Integrating Indigenous language and knowledge into media text production; ii. Classroom visits from Indigenous elders; and iii. Publishing oral histories through digital scrapbooking. The program aligned with the Australian National Curriculum English (ACARA, 2014), which mandates the teaching of multimodal text creation. Data sources included a class set of digital scrapbooks collaboratively created in a preparatory-one primary classroom. The digital scrapbooks combined digitally encoded words, images of material artifacts, and digital music files. A key feature of the writing and digital design task was to retell and digitally display and archive a cultural narrative of significance to the Indigenous Australian community and its memories and material traces of the past for the future. Data analysis of the students' digital stories involved the application of key themes of negotiated, material, and digitally mediated forms of heritage practice. It drew on Australian Indigenous research by Keddie et al. (2013) to guard against the homogenizing of culture that can arise from a focus on a static view of culture. The interpretation of findings located Indigenous appropriation of social media within broader racialized politics that enables Indigenous literacy to be understood as a dynamic, negotiated, and transgenerational flows of practice. It demonstrates that Indigenous children's use of media production reflects "shifting and negotiated identities" in response to changing media environments that can function to sustain Indigenous cultural heritages (Appadurai, 1696, p. xv). Impact on practice, policy or theory The findings are important for teachers at a time when Aboriginal and Torres Strait Islander Histories and Cultures is a cross-curricular policy priority in the Australian Curriculum (ACARA, 2014). The findings show how curriculum policies can be applied to classroom practice in ways that are epistemologically consistent with Indigenous ways of knowing and being. Theoretically, it demonstrates how the children's experiences of culture are layered over time, as successive generations inherit, interweave, and hear others' cultural stories or maps. Practically, recommendations are provided for an approach to appropriating social media in schools that explicitly attends to the dynamic nature of Indigenous practices, negotiated through intercultural constructions and flows, and opening space for a critical anti-racist approach to multimodal text production. Timeliness The research is timely in the context of the accessibility and role of digital and multimodal forms of communication, including for Aboriginal and Torres Strait Islander communities.
Resumo:
We compare three alternative methods for eliciting retrospective confidence in the context of a simple perceptual task: the Simple Confidence Rating (a direct report on a numerical scale), the Quadratic Scoring Rule (a post-wagering procedure), and the Matching Probability (MP; a generalization of the no-loss gambling method). We systematically compare the results obtained with these three rules to the theoretical confidence levels that can be inferred from performance in the perceptual task using Signal Detection Theory (SDT). We find that the MP provides better results in that respect. We conclude that MP is particularly well suited for studies of confidence that use SDT as a theoretical framework.