16 resultados para Social Service Providers
em BORIS: Bern Open Repository and Information System - Berna - Suiça
Resumo:
By enabling connections between individuals, Social Networking Sites, such as Facebook, promise to create significant individual as well as social value. Encouraging connections between users is also crucial for service providers who increasingly rely on social advertising and viral marketing campaigns as important sources of their revenue. Consequently, understanding user’s network construction behavior becomes critical. However, previous studies offer only few scattered insights into this research question. In order to fill this gap, we employ Grounded Theory methodology to derive a comprehensive model of network construction behavior on social networking sites. In the following step we assess two Structural Equation Models to gain refined insights into the motivation to send and accept friendship requests – two network expansion strategies. Based on our findings, we offer recommendations for social network providers.
Resumo:
Worldwide social networks, like Facebook, face fierce competition from local platforms when expanding globally. To remain attractive social network providers need to encourage user self-disclosure. Yet, little research exists on how cultural differences impact selfdisclosure on these platforms. Addressing this gap, this study explores the differences in perceptions of disclosure-relevant determinants between German and US users. Survey of Facebook members indicates that German users expect more damage and attribute higher probability to privacy-related violations. On the other hand, even though American users show higher level of privacy concern, they extract more benefits from their social networking activities, have more trust in the service provider and legal assurances as well as perceive more control. These factors may explain a higher level of self-disclosure indicated by American users. Our results provide relevant insights for the social network providers who can adjust their expansion strategy with regard to cultural differences.
Resumo:
Cotton is a leading agricultural non-food commodity associated with soil degradation, water pollution and pesticide poisoning due to high levels of agrochemical inputs. Organic farming is often promoted as a means of addressing the economic, environmental and health risks of conventional cotton production, and it is slowly gaining ground in the global cotton market. Organic and fair trade cotton are widely seen as opportunities for smallholder farmers to improve their livelihoods thanks to higher returns, lower input costs and fewer risks. Despite an increasing number of studies comparing the profitability of organic and non-organic farming systems in developing and industrialized countries, little has been published on organic farming in Central Asia. The aim of this article is to describe the economic performance and perceived social and environmental impacts of organic cotton in southern Kyrgyzstan, drawing on a comparative field study conducted by the author in 2009. In addition to economic and environmental aspects, the study investigated farmers’ motivations toward and assessment of conversion to organic farming. Cotton yields on organic farms were found to be 10% lower, while input costs per unit were 42% lower; as a result, organic farmers’ cotton revenues were 20% higher. Due to lower input costs as well as organic and fair trade price premiums, the average gross margin from organic cotton was 27% higher. In addition to direct economic benefits, organic farmers enjoy other benefits, such as easy access to credit on favorable terms, provision of uncontaminated cottonseed cooking oil and cottonseed cake as animal feed, and marketing support as well as extension and training services provided by newly established organic service providers. The majority of organic farmers perceive improved soil quality, improved health conditions, and positively assess their initial decision to convert to organic farming. The major disadvantage of organic farming is the high manual labor input required. In the study area, where manual farm work is mainly women's work and male labor migration is widespread, women are most affected by this negative aspect of organic farming. Altogether, the results suggest that, despite the inconvenience of a higher workload, the advantages of organic farming outweigh its disadvantages and that conversion to organic farming improves the livelihoods of small-scale farmers.
Resumo:
Unprecedented success of Online Social Networks, such as Facebook, has been recently overshadowed by the privacy risks they imply. Weary of privacy concerns and unable to construct their identity in the desired way, users may restrict or even terminate their platform activities. Even though this means a considerable business risk for these platforms, so far there have been no studies on how to enable social network providers to address these problems. This study fills this gap by adopting a fairness perspective to analyze related measures at the disposal of the provider. In a Structural Equation Model with 237 subjects we find that ensuring interactional and procedural justice are two important strategies to support user participation on the platform.
Resumo:
Despite their enormous success the motivation behind user participation in Online Social Networks is still little understood. This study explores a variety of possible incentives and provides an empirical evaluation of their subjective relevance. The analysis is based on survey data from 129 test subjects. Using Structural Equation Modeling, we identified that the satisfaction of the needs for belongingness and the esteem needs through self-presentation together with peer pressure are the main drivers of participation. The analysis of a sub-sample of active users pointed out the satisfaction of the cognitive needs as an additional participation determinant. Based on these findings, recommendations for online social network providers are made.
Resumo:
Background Men who have sex with men (MSM) remain the group most at risk of acquiring HIV infection in Britain. HIV prevalence appears to vary widely between MSM from different ethnic minority groups in this country for reasons that are not fully understood. The aim of the MESH project was to examine in detail the sexual health of ethnic minority MSM living in Britain. Methods/Design The main objectives of the MESH project were to explore among ethnic minority MSM living in Britain: (i) sexual risk behaviour and HIV prevalence; (ii) their experience of stigma and discrimination; (iii) disclosure of sexuality; (iv) use of, and satisfaction with sexual health services; (v) the extent to which sexual health services (for treatment and prevention) are aware of the needs of ethnic minority MSM. The research was conducted between 2006 and 2008 in four national samples: (i) ethnic minority MSM living in Britain; (ii) a comparison group of white British MSM living in Britain; (iii) NHS sexual health clinic staff in 15 British towns and cities with significant ethnic minority communities and; (iv) sexual health promotion/HIV prevention service providers. We also recruited men from two "key migrant" groups living in Britain: MSM born in Central or Eastern Europe and MSM born in Central or South America. Internet-based quantitative and qualitative research methods were used. Ethnic minority MSM were recruited through advertisements on websites, in community venues, via informal networks and in sexual health clinics. White and "key migrant" MSM were recruited mostly through Gaydar, one of the most popular dating sites used by gay men in Britain. MSM who agreed to take part completed a questionnaire online. Ethnic minority MSM who completed the online questionnaire were asked if they would be willing to take part in an online qualitative interview using email. Service providers were identified through the British Association of Sexual Health and HIV (BASHH) and the Terrence Higgins Trust (THT) CHAPS partnerships. Staff who agreed to take part were asked to complete a questionnaire online. The online survey was completed by 1241 ethnic minority MSM, 416 men born in South and Central America or Central and Eastern Europe, and 13,717 white British MSM; 67 ethnic minority MSM took part in the online qualitative interview. In addition 364 people working in sexual health clinics and 124 health promotion workers from around Britain completed an online questionnaire. Discussion The findings from this study will improve our understanding of the sexual health and needs of ethnic minority MSM in Britain.
Resumo:
10.1 In the severely injured infant and child the following age-specific facts should be kept in mind: ■ Larger head to body weight ratio (head often exposed to injury, neck injury) ■ Larger body surface area to body volume ratio (hypothermia) ■ More elastic thoracic wall (internal injury possible without external signs) ■ Thinner abdominal wall where abdominal organs are below the rib cage (liver, spleen injury) ■ Smaller total blood volume ■ Narrow airways ■ Long compensation of blood loss by tachycardia followed by rapid decompensation of circulatory status if left untreated 10.2 Child abuse is frequent: about 3%–7% of children under 18 years suffer from child abuse in some manner. The incidence and prevalence depend on the development of a country’s social service agencies and on the level of health professionals’ awareness of the problem. The estimated number of unreported cases is high. Child abuse affects children of all socioeconomic, ethnic, and religious boundaries. There is no gender preponderance. It occurs at any age, but infants and toddler have a higher risk than older children.
Resumo:
Since 2010, the client base of online-trading service providers has grown significantly. Such companies enable small investors to access the stock market at advantageous rates. Because small investors buy and sell stocks in moderate amounts, they should consider fixed transaction costs, integral transaction units, and dividends when selecting their portfolio. In this paper, we consider the small investor’s problem of investing capital in stocks in a way that maximizes the expected portfolio return and guarantees that the portfolio risk does not exceed a prescribed risk level. Portfolio-optimization models known from the literature are in general designed for institutional investors and do not consider the specific constraints of small investors. We therefore extend four well-known portfolio-optimization models to make them applicable for small investors. We consider one nonlinear model that uses variance as a risk measure and three linear models that use the mean absolute deviation from the portfolio return, the maximum loss, and the conditional value-at-risk as risk measures. We extend all models to consider piecewise-constant transaction costs, integral transaction units, and dividends. In an out-of-sample experiment based on Swiss stock-market data and the cost structure of the online-trading service provider Swissquote, we apply both the basic models and the extended models; the former represent the perspective of an institutional investor, and the latter the perspective of a small investor. The basic models compute portfolios that yield on average a slightly higher return than the portfolios computed with the extended models. However, all generated portfolios yield on average a higher return than the Swiss performance index. There are considerable differences between the four risk measures with respect to the mean realized portfolio return and the standard deviation of the realized portfolio return.
Resumo:
The intention of an authentication and authorization infrastructure (AAI) is to simplify and unify access to different web resources. With a single login, a user can access web applications at multiple organizations. The Shibboleth authentication and authorization infrastructure is a standards-based, open source software package for web single sign-on (SSO) across or within organizational boundaries. It allows service providers to make fine-grained authorization decisions for individual access of protected online resources. The Shibboleth system is a widely used AAI, but only supports protection of browser-based web resources. We have implemented a Shibboleth AAI extension to protect web services using Simple Object Access Protocol (SOAP). Besides user authentication for browser-based web resources, this extension also provides user and machine authentication for web service-based resources. Although implemented for a Shibboleth AAI, the architecture can be easily adapted to other AAIs.
Resumo:
In recent years, development of information systems (IS) has rapidly changed towards increasing division of labor between firms. Two trends are emerging. First, client companies increasingly outsource software development to external service providers. Second, the formerly oligopolistic enterprise application software industry has started to disintegrate into focal partnership networks – so called platform ecosystems. Despite the increasing prominence of IS outsourcing and platform ecosystems, many of these inter-organizational partnerships fail to achieve expected benefits. Ineffective governance and control frequently plays a pivotal role in producing these failures. While designing effective governance and control mechanisms is always challenging, inter-organizational software development projects are often business-critical and exhibit additional dynamics and uncertainty. As a consequence governance and control have to be adapted over time. The three research projects included in this book provide a better understanding of how and why governance and control can be effectively adapted over time. The implications for successful management of inter-organizational software development projects are highly relevant for theory and practice.
Resumo:
Since 2010, the client base of online-trading service providers has grown significantly. Such companies enable small investors to access the stock market at advantageous rates. Because small investors buy and sell stocks in moderate amounts, they should consider fixed transaction costs, integral transaction units, and dividends when selecting their portfolio. In this paper, we consider the small investor’s problem of investing capital in stocks in a way that maximizes the expected portfolio return and guarantees that the portfolio risk does not exceed a prescribed risk level. Portfolio-optimization models known from the literature are in general designed for institutional investors and do not consider the specific constraints of small investors. We therefore extend four well-known portfolio-optimization models to make them applicable for small investors. We consider one nonlinear model that uses variance as a risk measure and three linear models that use the mean absolute deviation from the portfolio return, the maximum loss, and the conditional value-at-risk as risk measures. We extend all models to consider piecewise-constant transaction costs, integral transaction units, and dividends. In an out-of-sample experiment based on Swiss stock-market data and the cost structure of the online-trading service provider Swissquote, we apply both the basic models and the extended models; the former represent the perspective of an institutional investor, and the latter the perspective of a small investor. The basic models compute portfolios that yield on average a slightly higher return than the portfolios computed with the extended models. However, all generated portfolios yield on average a higher return than the Swiss performance index. There are considerable differences between the four risk measures with respect to the mean realized portfolio return and the standard deviation of the realized portfolio return.
Resumo:
Trade, investment and migration are strongly intertwined, being three key factors in international production. Yet, law and regulation of the three has remained highly fragmented. Trade is regulated by the WTO on the multilateral level, and through preferential trade agreements on the regional and bilateral levels – it is fragmented and complex in its own right. Investment, on the other hand, is mainly regulated through bilateral investment treaties with no strong links to the regulation of trade or migration. And, finally, migration is regulated by a web of different international, regional and bilateral agreements which focus on a variety of different aspects of migration ranging from humanitarian to economic. The problems of institutional fragmentation in international law are well known. There is no organizational forum for coherent strategy-making on the multilateral level covering all three areas. Normative regulations may thus contradict each other. Trade regulation may bring about liberalization of access for service providers, but eventually faces problems in recruiting the best people from abroad. Investors may withdraw investment without being held liable for disruptions to labour and to the livelihood and infrastructure of towns and communities affected by disinvestment. Finally, migration policies do not seem to have a significant impact as long as trade policies and investment policies are not working in a way that is conducive to reducing migration pressure, as trade and investment are simply more powerful on the regulatory level than migration. This chapter addresses the question as to how fragmentation of the three fields could be reme-died and greater coherence between these three areas of factor allocation in international economic relations and law could be achieved. It shows that migration regulation on the international level is lagging behind that on trade and investment. Stronger coordination and consideration of migration in trade and investment policy, and stronger international cooperation in migration, will provide the foundations for a coherent international architecture in the field.
Resumo:
Service providers make use of cost-effective wireless solutions to identify, localize, and possibly track users using their carried MDs to support added services, such as geo-advertisement, security, and management. Indoor and outdoor hotspot areas play a significant role for such services. However, GPS does not work in many of these areas. To solve this problem, service providers leverage available indoor radio technologies, such as WiFi, GSM, and LTE, to identify and localize users. We focus our research on passive services provided by third parties, which are responsible for (i) data acquisition and (ii) processing, and network-based services, where (i) and (ii) are done inside the serving network. For better understanding of parameters that affect indoor localization, we investigate several factors that affect indoor signal propagation for both Bluetooth and WiFi technologies. For GSM-based passive services, we developed first a data acquisition module: a GSM receiver that can overhear GSM uplink messages transmitted by MDs while being invisible. A set of optimizations were made for the receiver components to support wideband capturing of the GSM spectrum while operating in real-time. Processing the wide-spectrum of the GSM is possible using a proposed distributed processing approach over an IP network. Then, to overcome the lack of information about tracked devices’ radio settings, we developed two novel localization algorithms that rely on proximity-based solutions to estimate in real environments devices’ locations. Given the challenging indoor environment on radio signals, such as NLOS reception and multipath propagation, we developed an original algorithm to detect and remove contaminated radio signals before being fed to the localization algorithm. To improve the localization algorithm, we extended our work with a hybrid based approach that uses both WiFi and GSM interfaces to localize users. For network-based services, we used a software implementation of a LTE base station to develop our algorithms, which characterize the indoor environment before applying the localization algorithm. Experiments were conducted without any special hardware, any prior knowledge of the indoor layout or any offline calibration of the system.
Resumo:
Service providers make use of cost-effective wireless solutions to identify, localize, and possibly track users using their carried MDs to support added services, such as geo-advertisement, security, and management. Indoor and outdoor hotspot areas play a significant role for such services. However, GPS does not work in many of these areas. To solve this problem, service providers leverage available indoor radio technologies, such as WiFi, GSM, and LTE, to identify and localize users. We focus our research on passive services provided by third parties, which are responsible for (i) data acquisition and (ii) processing, and network-based services, where (i) and (ii) are done inside the serving network. For better understanding of parameters that affect indoor localization, we investigate several factors that affect indoor signal propagation for both Bluetooth and WiFi technologies. For GSM-based passive services, we developed first a data acquisition module: a GSM receiver that can overhear GSM uplink messages transmitted by MDs while being invisible. A set of optimizations were made for the receiver components to support wideband capturing of the GSM spectrum while operating in real-time. Processing the wide-spectrum of the GSM is possible using a proposed distributed processing approach over an IP network. Then, to overcome the lack of information about tracked devices’ radio settings, we developed two novel localization algorithms that rely on proximity-based solutions to estimate in real environments devices’ locations. Given the challenging indoor environment on radio signals, such as NLOS reception and multipath propagation, we developed an original algorithm to detect and remove contaminated radio signals before being fed to the localization algorithm. To improve the localization algorithm, we extended our work with a hybrid based approach that uses both WiFi and GSM interfaces to localize users. For network-based services, we used a software implementation of a LTE base station to develop our algorithms, which characterize the indoor environment before applying the localization algorithm. Experiments were conducted without any special hardware, any prior knowledge of the indoor layout or any offline calibration of the system.