20 resultados para Online personal activity monitor

em Aston University Research Archive


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article uses a research project into the online conversations of sex offenders and the children they abuse to further the arguments for the acceptability of experimental work as a research tool for linguists. The research reported here contributes to the growing body of work within linguistics that has found experimental methods to be useful in answering questions about representation and constraints on linguistic expression (Hemforth 2013). The wider project examines online identity assumption in online paedophile activity and the policing of such activity, and involves dealing with the linguistic analysis of highly sensitive sexual grooming transcripts. Within the linguistics portion of the project, we examine theories of idiolect and identity through analysis of the ‘talk’ of perpetrators of online sexual abuse, and of the undercover officers that must assume alternative identities in order to investigate such crimes. The essential linguistic question in this article is methodological and concerns the applicability of experimental work to exploration of online identity and identity disguise. Although we touch on empirical questions, such as the sufficiency of linguistic description that will enable convincing identity disguise, we do not explore the experimental results in detail. In spite of the preference within a range of discourse analytical paradigms for ‘naturally occurring’ data, we argue that not only does the term prove conceptually problematic, but in certain contexts, and particularly in the applied forensic context described, a rejection of experimentally elicited data would limit the possible types and extent of analyses. Thus, it would restrict the contribution that academic linguistics can make in addressing a serious social problem.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objective: Between-participant research has shown that high negative affectivity predicts greater activity limitations and vice versa. This study examined both between- and within-participant associations of negative and positive affectivity with activity levels using ecological momentary assessment. Method: Participants were 25 people who had undergone joint replacement surgery 12 months previously. Participants made multiple reports of their activity and positive and negative affectivity over a single day using, a computerized diary. Activity was also objectively recorded using an activity monitor. The following day, participants made a self-report of their activity over the measurement day and general positive and negative affectivity levels were recorded. Results: Higher self-reported walking time over the whole measurement day was associated with higher general positive affectivity but not negative affectivity. However, using ecological momentary assessment, higher diary reports of negative affectivity predicted increased activity levels while positive affectivity neither predicted nor was predicted by activity. Conclusion: These findings demonstrate the importance of within-participant methodology in detecting subtle and immediate effects of individuals' mood on behavior that may differ from findings investigating between-participant effects over longer time periods.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Purpose - This paper aims to demonstrate the need for an improved understanding of the opportunities offered by privacy online. This is contextualized in the case of supermarket purchases of food in particular, often described as an intimate and personal choice. In the case of grocery shopping, the "intimacy" may be at the household level between members or/and between e-grocers' food offerings, and their other "non-food" related services Design/methodology/approach - This paper draws upon social practice theory research, retailing and consumer behaviour in order to develop a conceptual framework for understanding the value of positive privacy. The research uses 39 in-depth interviews of e-grocery shoppers in the area of Portsmouth (UK). Findings - This paper suggests a framework for embedded elements of positive privacy into retailing strategy as a driver for growth in the e-grocery sector. Three meta-themes requiring different approaches to privacy are uncovered. Positive privacy is dynamic and contextual at the consumer/household levels as well as for product/e-grocery brands. Research limitations/implications - This paper advocates the building of long-term sustainable relationship through sharing, offering, and exchange of information rather than pure technological chasing of data. Originality/value - A consumer centred bottom-up approach is employed demonstrating the value of two-way dialogues with consumers on sensitive issues. E-grocery is used as an illustration that involves regular re-purchase of a basket of staple goods over a long period of time where privacy becomes a latent long-term concern. © Emerald Group Publishing Limited.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper presents a model for measuring personal knowledge development in online learning environments. It is based on Nonaka‘s SECI model of organisational knowledge creation. It is argued that Socialisation is not a relevant mode in the context of online learning and was therefore not covered in the measurement instrument. Therefore, the remaining three of SECI‘s knowledge conversion modes, namely Externalisation, Combination, and Internalisation were used and a measurement instrument was created which also examines the interrelationships between the three modes. Data was collected using an online survey, in which online learners report on their experiences of personal knowledge development in online learning environments. In other words, the instrument measures the magnitude of online learners‘ Externalisation and combination activities as well as their level of internalisation, which is the outcome of their personal knowledge development in online learning.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper reveals how activity fragmentation and multi-tasking become tools of consumer anti-choice in the online grocery sector: facilitated by new technology practices that positively encourage anti-choice. This is demonstrated through five long-term ethnographic case studies of households in the Portsmouth area of England. All the respondents made some form of conscious effort to minimize the amount of time they spent in ‘big box’ grocery stores. They spend more time at home in planning, searching, socializing online, cumulating and fulfilling internet orders than if they had visited a store: something that all could easily do. The findings suggest the need for constant innovation by internet grocers if they are to remain in tune with dynamic consumer lifestyles and advances in technology. Examples of upcoming technologies requiring retailers to re-think their internet strategies are discussed in view of the possibilities offered by activity fragmentation and multi-tasking.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

We apply prospect theory to explain how personal and corporate bankruptcy laws affect risk perceptions of entrepreneurs at time of entry and therefore their growth ambitions. Previous theories have reached ambiguous conclusions as to whether countries with more debtor-friendly bankruptcy laws (i.e. laws that are more forgiving towards debtors in bankruptcy proceedings) are likely to have more entrepreneurs, or whether, creditorfriendly regimes have positive effects on new ventures via enhanced incentives for the supply of credit to entrepreneurs. Responding to this ambiguity, we apply prospect theory to propose that entrepreneurs do not attach the same significance to different elements of bankruptcy codes—and to explain which aspects of debtor-friendly bankruptcy laws matter more to entrepreneurs. Based on this, we derive and confirm hypotheses about the impact of aspects of bankruptcy codes on entrepreneurial activity using the Global Entrepreneurship Monitor combined with data on both personal and corporate bankruptcyregulations for 15 developed OECD countries. We use multilevel random coefficient logistic regressions to take account of the hierarchical nature of the data (country and individual levels). Because entrepreneurs and creditors are sensitive to different elements of the codes, there is scope for optimisation of the legal design of bankruptcy law to achieve both an adequate supply of credit and to encourage high-ambition entrepreneurship.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The first chapter introduces the subject from a psychological and sociological perspective emphasising the basic human activity of helping those in need. Governmental prominence for policies that assist this activity is briefly discussed with special mention of the programmes that encourage volunteering. Programmes particularly directed at older people, such as the Age Concern ‘Debate of the Age’ are considered briefly. An extensive review of the extant literature is the subject of the second chapter. The pervious research is explored to discover the formulae used to define a volunteer. A definition relative to this research is created. Volunteering issues aggravated by the demographic situation of older people are explored. Empirical volunteer survey research by mutual organisations is explored to ascertain the extent and nature of the already recorded volunteer population. The penultimate section of this chapter investigates the nature of old age and the strategies that older people adopt to enjoy the benefits and contain the problems. The issue of diversity arises from consideration of the literature suggesting that, although it is an essential voluntary sector strength, it is also a further barrier to recruitment. A model diversity is proposed. Chapter three reviews the theoretical processes, procedures and technologies used to collect and analyse the data required to discover the answer to the research problem. Analysis of the questionnaire survey data received is the subject of chapter four. The discovery of the agency uniqueness of volunteer profiles is the principle finding of this part of the research. The fifth chapter is the qualitative analysis of the oral and written statements received. A content analysis of the scripts and texts provided rich data covering motivational factors. Motivational factors were the same for volunteers in the same organisation, but differed between organisations. Finally, the analysed data is collated and discussed progressively toward a theory of diversity. The individuality of each branch of each agency is progressively described culminating in the creation of a model that infers that diversity is a barrier that aggravates all other barriers. The personal realisations of the researcher are described.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis explores the innovative capacity of voluntary organizations in the field of the personal social services. It commences with a full literature review, which concludes that the wealth of research upon innovation in the organization studies field has not addressed this topic, whilst the specialist literatures upon voluntary organizations and upon the personal social services have neglected the study of innovation. The research contained in this thesis is intended to right this neglect and to integrate lessons from both fields. It combines a survey of the innovative activity of voluntary organizations in three localities with cross-sectional case studies of innovative, developmental and traditional organizations. The research concludes that innovation is an important, but not integral, characteristic of voluntary organizations. It develops a contingent model of this innovative capacity of voluntary organizations, which stresses the role of external environmental and institutional forces in shaping and releasing this capacity. It concludes by considering the contribution of this model both to organization studies and to the study of voluntary organizations.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This research explored how a more student-directed learning design can support the creation of togetherness and belonging in a community of distance learners in formal higher education. Postgraduate students in a New Zealand School of Education experienced two different learning tasks as part of their online distance learning studies. The tasks centered around two online asynchronous discussions each for the same period of time and with the same group of students, but following two different learning design principles. All messages were analyzed using a twostep analysis process, content analysis and social network analysis. Although the findings showed a balance of power between the tutor and the students in the first high e-moderated activity, a better pattern of group interaction and community feeling was found in the low e-moderated activity. The paper will discuss the findings in terms of the implications for learning design and the role of the tutor.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The aim of this study was to examine the views of moderators across a diverse and geographically broad range of online support groups about their moderator experiences and to explore both the personal benefits as well as challenges involved. Thirty-three patient moderators completed an online questionnaire which included a series of open-ended questions. Thematic analysis identified three themes: emergence, empowerment, nurturing. Several moderators declared their own diagnosis and for some, being able to share personal insights motivated them to establish the group and in turn offered validation. They felt empowered by helping others and learned more about the condition through accessing the "communal brain". Some felt the group aided patients' access to health services and their ability to communicate with health professionals while others worried about them becoming over-dependent. Moderators described needing to nurture their group to ensure it offered a safe space for members. Clear rules of engagement, trust, organisation skills, compassion and kindness were considered essential. Patient moderated online support groups can be successfully developed and facilitated and can be empowering for both the group member and moderator alike.© 2013 Elsevier Ltd. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Quantitative structure-activity relationship (QSAR) analysis is a cornerstone of modern informatics. Predictive computational models of peptide-major histocompatibility complex (MHC)-binding affinity based on QSAR technology have now become important components of modern computational immunovaccinology. Historically, such approaches have been built around semiqualitative, classification methods, but these are now giving way to quantitative regression methods. We review three methods--a 2D-QSAR additive-partial least squares (PLS) and a 3D-QSAR comparative molecular similarity index analysis (CoMSIA) method--which can identify the sequence dependence of peptide-binding specificity for various class I MHC alleles from the reported binding affinities (IC50) of peptide sets. The third method is an iterative self-consistent (ISC) PLS-based additive method, which is a recently developed extension to the additive method for the affinity prediction of class II peptides. The QSAR methods presented here have established themselves as immunoinformatic techniques complementary to existing methodology, useful in the quantitative prediction of binding affinity: current methods for the in silico identification of T-cell epitopes (which form the basis of many vaccines, diagnostics, and reagents) rely on the accurate computational prediction of peptide-MHC affinity. We have reviewed various human and mouse class I and class II allele models. Studied alleles comprise HLA-A*0101, HLA-A*0201, HLA-A*0202, HLA-A*0203, HLA-A*0206, HLA-A*0301, HLA-A*1101, HLA-A*3101, HLA-A*6801, HLA-A*6802, HLA-B*3501, H2-K(k), H2-K(b), H2-D(b) HLA-DRB1*0101, HLA-DRB1*0401, HLA-DRB1*0701, I-A(b), I-A(d), I-A(k), I-A(S), I-E(d), and I-E(k). In this chapter we show a step-by-step guide into predicting the reliability and the resulting models to represent an advance on existing methods. The peptides used in this study are available from the AntiJen database (http://www.jenner.ac.uk/AntiJen). The PLS method is available commercially in the SYBYL molecular modeling software package. The resulting models, which can be used for accurate T-cell epitope prediction, will be made are freely available online at the URL http://www.jenner.ac.uk/MHCPred.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book helps people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book is intended to help people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. Behind the doors of our own homes, we assume we are safe from predators, con artists, and other criminals wishing us harm. But the proliferation of personal computers and the growth of the Internet have invited these unsavory types right into our family rooms. With a little psychological knowledge a con man can start to manipulate us in different ways. A terrorist can recruit new members and raise money over the Internet. Identity thieves can gather personal information and exploit it for criminal purposes. Spammers can wreak havoc on businesses and individuals. Here, an expert helps readers recognize the signs of a would-be criminal in their midst. Focusing on the perpetrators, the author provides information about how they operate, why they do it, what they hope to do, and how to protect yourself from becoming a victim.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

METPEX is a 3 year, FP7 project which aims to develop a PanEuropean tool to measure the quality of the passenger's experience of multimodal transport. Initial work has led to the development of a comprehensive set of variables relating to different passenger groups, forms of transport and journey stages. This paper addresses the main challenges in transforming the variables into usable, accessible computer based tools allowing for the real time collection of information, across multiple journey stages in different EU countries. Non-computer based measurement instruments will be used to gather information from those who may not have or be familiar with mobile technology. Smartphone-based measurement instruments will also be used, hosted in two applications. The mobile applications need to be easy to use, configurable and adaptable according to the context of use. They should also be inherently interesting and rewarding for the participant, whilst allowing for the collection of high quality, valid and reliable data from all journey types and stages (from planning, through to entry into and egress from different transport modes, travel on public and personal vehicles and support of active forms of transport (e.g. cycling and walking). During all phases of the data collection and processing, the privacy of the participant is highly regarded and is ensured. © 2014 Springer International Publishing.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

With the advent of GPS enabled smartphones, an increasing number of users is actively sharing their location through a variety of applications and services. Along with the continuing growth of Location-Based Social Networks (LBSNs), security experts have increasingly warned the public of the dangers of exposing sensitive information such as personal location data. Most importantly, in addition to the geographical coordinates of the user’s location, LBSNs allow easy access to an additional set of characteristics of that location, such as the venue type or popularity. In this paper, we investigate the role of location semantics in the identification of LBSN users. We simulate a scenario in which the attacker’s goal is to reveal the identity of a set of LBSN users by observing their check-in activity. We then propose to answer the following question: what are the types of venues that a malicious user has to monitor to maximize the probability of success? Conversely, when should a user decide whether to make his/her check-in to a location public or not? We perform our study on more than 1 million check-ins distributed over 17 urban regions of the United States. Our analysis shows that different types of venues display different discriminative power in terms of user identity, with most of the venues in the “Residence” category providing the highest re-identification success across the urban regions. Interestingly, we also find that users with a high entropy of their check-ins distribution are not necessarily the hardest to identify, suggesting that it is the collective behaviour of the users’ population that determines the complexity of the identification task, rather than the individual behaviour.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Online enquiry communities such as Question Answering (Q&A) websites allow people to seek answers to all kind of questions. With the growing popularity of such platforms, it is important for community managers to constantly monitor the performance of their communities. Although different metrics have been proposed for tracking the evolution of such communities, maturity, the process in which communities become more topic proficient over time, has been largely ignored despite its potential to help in identifying robust communities. In this paper, we interpret community maturity as the proportion of complex questions in a community at a given time. We use the Server Fault (SF) community, a Question Answering (Q&A) community of system administrators, as our case study and perform analysis on question complexity, the level of expertise required to answer a question. We show that question complexity depends on both the length of involvement and the level of contributions of the users who post questions within their community. We extract features relating to askers, answerers, questions and answers, and analyse which features are strongly correlated with question complexity. Although our findings highlight the difficulty of automatically identifying question complexity, we found that complexity is more influenced by both the topical focus and the length of community involvement of askers. Following the identification of question complexity, we define a measure of maturity and analyse the evolution of different topical communities. Our results show that different topical communities show different maturity patterns. Some communities show a high maturity at the beginning while others exhibit slow maturity rate. Copyright 2013 ACM.