7 resultados para Economics of information theory
em DigitalCommons@University of Nebraska - Lincoln
Resumo:
The spread of infectious disease among and between wild and domesticated animals has become a major problem worldwide. Upon analyzing the dynamics of wildlife growth and infection when the diseased animals cannot be identified separately from healthy wildlife prior to the kill, we find that harvest-based strategies alone have no impact on disease transmission. Other controls that directly influence disease transmission and/or mortality are required. Next, we analyze the socially optimal management of infectious wildlife. The model is applied to the problem of bovine tuberculosis among Michigan white-tailed deer, with non-selective harvests and supplemental feeding being the control variables. Using a two-state linear control model, we find a two-dimensional singular path is optimal (as opposed to a more conventional bang-bang solution) as part of a cycle that results in the disease remaining endemic in the wildlife. This result follows from non-selective harvesting and intermittent wildlife productivity gains from supplemental feeding.
Resumo:
The ability to utilize information systems (IS) effectively is becoming a necessity for business professionals. However, individuals differ in their abilities to use IS effectively, with some achieving exceptional performance in IS use and others being unable to do so. Therefore, developing a set of skills and attributes to achieve IS user competency, or the ability to realize the fullest potential and the greatest performance from IS use, is important. Various constructs have been identified in the literature to describe IS users with regard to their intentions to use IS and their frequency of IS usage, but studies to describe the relevant characteristics associated with highly competent IS users, or those who have achieved IS user competency, are lacking. This research develops a model of IS user competency by using the Repertory Grid Technique to identify a broad set of characteristics of highly competent IS users. A qualitative analysis was carried out to identify categories and sub-categories of these characteristics. Then, based on the findings, a subset of the model of IS user competency focusing on the IS-specific factors – domain knowledge of and skills in IS, willingness to try and to explore IS, and perception of IS value – was developed and validated using the survey approach. The survey findings suggest that all three factors are relevant and important to IS user competency, with willingness to try and to explore IS being the most significant factor. This research generates a rich set of factors explaining IS user competency, such as perception of IS value. The results not only highlight characteristics that can be fostered in IS users to improve their performance with IS use, but also present research opportunities for IS training and potential hiring criteria for IS users in organizations.
Resumo:
Stabilizing human population size and reducing human-caused impacts on the environment are keys to conserving threatened species (TS). Earth's human population is ~ 7 billion and increasing by ~ 76 million per year. This equates to a human birth-death ratio of 2.35 annually. The 2007 Red List prepared by the International Union for Conservation of Nature and Natural Resources (IUCN) categorized 16,306 species of vertebrates, invertebrates, plants, and other organisms (e.g., lichens, algae) as TS. This is ~ 1 percent of the 1,589,161 species described by IUCN or ~ 0.0033 percent of the believed 5,000,000 total species. Of the IUCN’s described species, vertebrates comprised relatively the most TS listings within respective taxonomic categories (5,742 of 59,811), while invertebrates (2,108 of 1,203,175), plants (8,447 of 297,326), and other species (9 of 28,849) accounted for minor class percentages. Conservation economics comprises microeconomic and macroeconomic principles involving interactions among ecological, environmental, and natural resource economics. A sustainable-growth (steady-state) economy has been posited as instrumental to preserving biological diversity and slowing extinctions in the wild, but few nations endorse this approach. Expanding growth principles characterize most nations' economic policies. To date, statutory fine, captive breeding cost, contingent valuation analysis, hedonic pricing, and travel cost methods are used to value TS in economic research and models. Improved valuation methods of TS are needed for benefit-cost analysis (BCA) of conservation plans. This Chapter provides a review and analysis of: (1) the IUCN status of species, (2) economic principles inherent to sustainable versus growth economies, and (3) methodological issues which hinder effective BCAs of TS conservation.
Resumo:
This paper discuses the influence of librarians' years of working experience and sources of acquisition of ICTs' knowledge and skills. The study is based on 169 librarians working in thirteen university libraries in the universities of six states located in the South-South zone of Nigeria. The purpose of the paper is to find out if years of working experience has an effect on librarians' sources/means of acquisition of ICT knowledge and skills. The questionnaires used were answered by two categories of librarians. Those with longer years of experience – 16 years and above and those with fewer years of working experience. It was concluded that librarians with fewer years of working experience explore means of acquiring ICTs knowledge and skills more than librarians with more years of working experience. It was recommended that librarians with longer years of working experience develop more interest in sources through which they can acquire ICT knowledge and skills.
Resumo:
The potential merits of Carver and Scheier's (1981) control theory in the prediction of targeted violence are reviewed and several novel indicators of risk that are consistent with this theory are suggested for study. It was hypothesized that: (a) similarity between inappropriate contact with politicians and extremist group literature and writings; (b) the temporal proximity to violent or otherwise criminal actions and notable anniversaries of such groups; (c) detailed specification of a plan to engage in problematic approach behavior, and; (d) self-focus, will be significant predictors of problematic approach behavior. A sample of 506 individuals who engaged in threatening or otherwise inappropriate contact toward members of the United States Congress was drawn from the case files of the United States Capitol Police. Results of the present research indicated that detailed specification of a plan to engage in problematic approach behavior was strongly predictive of actually engaging in problematic approach. Furthermore, high self-focus was significantly related to problematic approach between-persons, although within-person, higher-than-average self-focus showed no such relation. Neither temporal proximity to notable acts of extremist violence nor similarity to known extremist group writings was found to be associated with problematic approach in this sample.
Resumo:
Rural community development is a major issue for developing countries. Much attention has been given Information and Communication Technology (ICT) projects to connect rural communities with the global network. However, ICT resistance is a deterring factor in addressing the digital divide in developing countries. It is postulated that reversing the resistance to to ICT can be strategizedthrough "information acceptance." ICT can be accepted by rural communities by creating demand for information. The paper calls for the refocusing on the role of information in rural community development and ICT as a tool for change agent. Initiatives for rural community development must emphasize the importance of information in rural communities.