178 resultados para Use of information
Resumo:
The use of seafood ecolabels is expanding in the world marketplace, but so are labels indicating other product attributes, such as country of origin and wild vs. farmed. The interactive effects of these labels and attributes in evaluating consumers' preferences for ecolabeled seafood are relatively unexplored. In this paper we investigate (1) the direct and interactive effects of seafood ecolabels with other common fish labels, and (2) how consumers' perceptions about the state of marine stocks and the valuation of ecolabels may be affected by different information. We find moderate interactive effects between ecolabels and country of origin labels, whereas the valuation for seafood ecolabels is fairly high. In terms of information, we find that consumers' perceptions about fish stock levels changed (negatively) after receiving information on declining stock levels, and more sensationalized information led to increased change. However, valuation for a seafood ecolabel increases only when the information was perceived positively (credible/interesting); whereas exaggerated information (which was also perceived less credible) had insignificant effects on WTP.
Resumo:
Objective People diagnosed with pancreatic cancer have the worst survival prognosis of any cancer. No previous research has documented the supportive care needs of this population. Our objective was to describe people’s needs and use of support services and to examine whether these differed according to whether or not patients had undergone surgical resection. Methods Queensland pancreatic or ampullary cancer patients (n=136, 54% of those eligible) completed a survey which assessed 34 needs across 5 domains (SCNS-SF34) and use of health services. Differences by resection were compared with Chi-squared tests. Results Overall, 96% of participants reported having some needs. More than half reported moderate-to-high unmet physical (54%) or psychological (52%) needs whereas, health system/information (32%), patient care (21%) and sexuality needs (16%) were described less frequently. The three most frequently reported moderate-to-high needs included ‘not being able to do things they used to do’ (41%), ‘concerns about the worries of those close’ (37%), and ‘uncertainty about the future’ (30%). Patients with non-resectable disease reported greater individual information needs but their needs were otherwise similar to patients with resectable disease. Self-reported use of support was low; only 35% accessed information, 28%, 18% and 15% consulted a dietician, complementary medicine practitioner or mental health practitioner, respectively. Palliative care access was greater (59% vs 27%) among those with non-resectable disease. Conclusion Very high levels of needs were reported by people with pancreatic or ampullary cancer. Future work needs to elucidate why uptake of appropriate supportive care is low and which services are required.
Resumo:
The potential benefits of shared eHealth records systems are promising for the future of improved healthcare. However, the uptake of such systems is hindered by concerns over the security and privacy of patient information. The use of Information Accountability and so called Accountable-eHealth (AeH) systems has been proposed to balance the privacy concerns of patients with the information needs of healthcare professionals. However, a number of challenges remain before AeH systems can become a reality. Among these is the need to protect the information stored in the usage policies and provenance logs used by AeH systems to define appropriate use of information and hold users accountable for their actions. In this paper, we discuss the privacy and security issues surrounding these accountability mechanisms, define valid access to the information they contain, discuss solutions to protect them, and verify and model an implementation of the access requirements as part of an Information Accountability Framework.
The dual nature of information systems in enabling a new wave of hardware ventures: Towards a theory
Resumo:
Hardware ventures are emerging entrepreneurial firms that create new market offerings based on development of digital devices. These ventures are important elements in the global economy but have not yet received much attention in the literature. Our interest in examining hardware ventures is specifically in the role that information system (IS) resources play in enabling them. We ask how the role of IS resources for hardware ventures can be conceptualized and develop a framework for assessment. Our framework builds on the distinction of operand and operant resources and distinguishes between two key lifecycle stages of hardware ventures: start-up and growth. We show how this framework can be used to discuss the role, nature, and use of IS for hardware ventures and outline empirical research strategies that flow from it. Our work contributes to broadening and enriching the IS field by drawing attention to its role in significant and novel phenomena.
Resumo:
Modal flexibility is a widely accepted technique to detect structural damage using vibration characteristics. Its application to detect damage in long span large diameter cables such as those used in suspension bridge main cables has not received much attention. This paper uses the modal flexibility method incorporating two damage indices (DIs) based on lateral and vertical modes to localize damage in such cables. The competency of those DIs in damage detection is tested by the numerically obtained vibration characteristics of a suspended cable in both intact and damaged states. Three single damage cases and one multiple damage case are considered. The impact of random measurement noise in the modal data on the damage localization capability of these two DIs is next examined. Long span large diameter cables are characterized by the two critical cable parameters named bending stiffness and sag-extensibility. The influence of these parameters in the damage localization capability of the two DIs is evaluated by a parametric study with two single damage cases. Results confirm that the damage index based on lateral vibration modes has the ability to successfully detect and locate damage in suspended cables with 5% noise in modal data for a range of cable parameters. This simple approach therefore can be extended for timely damage detection in cables of suspension bridges and thereby enhance their service during their life spans.
Resumo:
Remote networked collaboration with business model documentation has many communication problems. The aim of this project is to solve some of these communication problems by using digital 3D representations of human visual cues. Results from this project increased our understanding of the role and effects of visual cues in remote collaboration, specifically for validating business process models. Technology designs to support such cues across a distance have been proposed in this thesis with qualitative and quantitative methods of analysis being combined to analyse the impact of these cues on the communication, coordination and performance of a team collaborating remotely.
Resumo:
Flos Chrysanthemum is a generic name for a particular group of edible plants, which also have medicinal properties. There are, in fact, twenty to thirty different cultivars, which are commonly used in beverages and for medicinal purposes. In this work, four Flos Chrysanthemum cultivars, Hangju, Taiju, Gongju, and Boju, were collected and chromatographic fingerprints were used to distinguish and assess these cultivars for quality control purposes. Chromatography fingerprints contain chemical information but also often have baseline drifts and peak shifts, which complicate data processing, and adaptive iteratively reweighted, penalized least squares, and correlation optimized warping were applied to correct the fingerprint peaks. The adjusted data were submitted to unsupervised and supervised pattern recognition methods. Principal component analysis was used to qualitatively differentiate the Flos Chrysanthemum cultivars. Partial least squares, continuum power regression, and K-nearest neighbors were used to predict the unknown samples. Finally, the elliptic joint confidence region method was used to evaluate the prediction ability of these models. The partial least squares and continuum power regression methods were shown to best represent the experimental results.
Resumo:
Acoustic recordings play an increasingly important role in monitoring terrestrial environments. However, due to rapid advances in technology, ecologists are accumulating more audio than they can listen to. Our approach to this big-data challenge is to visualize the content of long-duration audio recordings by calculating acoustic indices. These are statistics which describe the temporal-spectral distribution of acoustic energy and reflect content of ecological interest. We combine spectral indices to produce false-color spectrogram images. These not only reveal acoustic content but also facilitate navigation. An additional analytic challenge is to find appropriate descriptors to summarize the content of 24-hour recordings, so that it becomes possible to monitor long-term changes in the acoustic environment at a single location and to compare the acoustic environments of different locations. We describe a 24-hour ‘acoustic-fingerprint’ which shows some preliminary promise.
Resumo:
This research aimed to inform the design of effective information literacy lessons in higher education. Phenomenography, a research approach designed to study human experience, was used to explore the experiences of a teacher and undergraduate students using information to learn about language and gender issues. The findings show that the way learners use information influences content-focused learning outcomes, and reveal an instructional pattern for enabling students to use information while becoming aware of the topic they are investigating. Based on the findings, a design model is offered in which learning outcomes are realized through targeted information literacy activities.
Resumo:
Meaningful use of eHealth, as seen through four key lenses: Usability; Usefulness; Utility; and Safety, is achieved through Accountable-eHealth systems.
Resumo:
Bug fixing is a highly cooperative work activity where developers, testers, product managers and other stake-holders collaborate using a bug tracking system. In the context of Global Software Development (GSD), where software development is distributed across different geographical locations, we focus on understanding the role of bug trackers in supporting software bug fixing activities. We carried out a small-scale ethnographic fieldwork in a software product team distributed between Finland and India at a multinational engineering company. Using semi-structured interviews and in-situ observations of 16 bug cases, we show that the bug tracker 1) supported information needs of different stake holder, 2) established common-ground, and 3) reinforced issues related to ownership, performance and power. Consequently, we provide implications for design around these findings.
Resumo:
Over recent years, the focus in road safety has shifted towards a greater understanding of road crash serious injuries in addition to fatalities. Police reported crash data are often the primary source of crash information; however, the definition of serious injury within these data is not consistent across jurisdictions and may not be accurately operationalised. This study examined the linkage of police-reported road crash data with hospital data to explore the potential for linked data to enhance the quantification of serious injury. Data from the Queensland Road Crash Database (QRCD), the Queensland Hospital Admitted Patients Data Collection (QHAPDC), Emergency Department Information System (EDIS), and the Queensland Injury Surveillance Unit (QISU) for the year 2009 were linked. Nine different estimates of serious road crash injury were produced. Results showed that there was a large amount of variation in the estimates of the number and profile of serious road crash injuries depending on the definition or measure used. The results also showed that as the definition of serious injury becomes more precise the vulnerable road users become more prominent. These results have major implications in terms of how serious injuries are identified for reporting purposes. Depending on the definitions used, the calculation of cost and understanding of the impact of serious injuries would vary greatly. This study has shown how data linkage can be used to investigate issues of data quality. It has also demonstrated the potential improvements to the understanding of the road safety problem, particularly serious injury, by conducting data linkage.
Resumo:
Social media platforms such as Facebook and Twitter are now widely recognised as playing an increasingly important role in the dissemination of information during crisis events. They are used by emergency management organisations as well as by the public to share information and advice. However, the official use of social media for crisis communication within emergency management organisations is still relatively new and ad hoc, rather than being systematically embedded within or effectively coordinated across agencies. This policy report suggests a more effectively coordinated approach to leverage social media use, involving stronger networking between social media staff within emergency management organisations. This could be realised by establishing a national network of social media practitioners managed by the Australia-New Zealand Emergency Management Committee (ANZEMC), reinforced by a Federal government task force that promotes further policy initiatives in this space.
Resumo:
We investigate the extent and nature of use of use of twitter for financial reporting by ASX listed companies. We consider 199 financial information related tweets from 14 ASX listed companies’ Twitter accounts. A thematic analysis of these tweets shows ‘Earnings’ and ‘Operational Performance’ are the most discussed financial reporting themes. Further, a comparison across industry sectors reveals that listed companies from varies industries show different usage patterns of financial reporting on Twitter. The examination of tweet sentiments also indicates a reporting bias within these tweets, as listed companies are more willing to disclose positive financial reporting tweets.
Resumo:
We discuss three approaches to the use of technology as a teaching and learning tool that we are currently implementing for a target group of about one hundred second level engineering mathematics students. Central to these approaches is the underlying theme of motivating relatively poorly motivated students to learn, with the aim of improving learning outcomes. The approaches to be discussed have been used to replace, in part, more traditional mathematics tutorial sessions and lecture presentations. In brief, the first approach involves the application of constructivist thinking in the tertiary education arena, using technology as a computational and visual tool to create motivational knowledge conflicts or crises. The central idea is to model a realistic process of how scientific theory is actually developed, as proposed by Kuhn (1962), in contrast to more standard lecture and tutorial presentations. The second approach involves replacing procedural or algorithmic pencil-and-paper skills-consolidation exercises by software based tasks. Finally, the third approach aims at creating opportunities for higher order thinking via "on-line" exploratory or discovery mode tasks. The latter incorporates the incubation period method, as originally discussed by Rubinstein (1975) and others.