3 resultados para Information in biology
em Digital Commons at Florida International University
Resumo:
A study was conducted to investigate the effectiveness, as measured by performance on course posttests, of mindmapping versus traditional notetaking in a corporate training class. The purpose of this study was to increase knowledge concerning the effectiveness of mindmapping as an information encoding tool to enhance the effectiveness of learning. Corporations invest billions of dollars, annually, in training programs. Given this increased demand for effective and efficient workplace learning, continual reliance on traditional notetaking is questionable for the high-speed and continual learning required on workers.^ An experimental, posttest-only control group design was used to test the following hypotheses: (1) there is no significant difference in posttest scores on an achievement test, administered immediately after the course, between adult learners using mindmapping versus traditional notetaking methods in a training lecture, and (2) there is no significant difference in posttest scores on an achievement test, administered 30 days after the course, between adult learners using mindmapping versus traditional notetaking methods in a training lecture. After a 1.5 hour instruction on mindmapping, the treatment group used mindmapping throughout the course. The control group used traditional notetaking. T-tests were used to determine if there were significant differences between mean posttest scores between the two groups. In addition, an attitudinal survey, brain hemisphere dominance survey, course dynamics observations, and course evaluations were used to investigate preference for mindmapping, its perceived effect on test performance, and the effectiveness of mindmapping instruction.^ This study's principal finding was that although the mindmapping group did not perform significantly higher on posttests administered immediately and 30 days after the course, than the traditional notetaking group, the mindmapping group did score higher on both posttests and reported higher ratings of the course on every evaluation criteria. Lower educated, right brain dominant learners reported a significantly positive learning experience. These results suggest that mindmapping enhances and reinforces the preconditions of learning. Recommendations for future study are provided. ^
Resumo:
The search-experience-credence framework from economics of information, the human-environment relations models from environmental psychology, and the consumer evaluation process from services marketing provide a conceptual basis for testing the model of "Pre-purchase Information Utilization in Service Physical Environments." The model addresses the effects of informational signs, as a dimension of the service physical environment, on consumers' perceptions (perceived veracity and perceived performance risk), emotions (pleasure) and behavior (willingness to buy). The informational signs provide attribute quality information (search and experience) through non-personal sources of information (simulated word-of-mouth and non-personal advocate sources).^ This dissertation examines: (1) the hypothesized relationships addressed in the model of "Pre-purchase Information Utilization in Service Physical Environments" among informational signs, perceived veracity, perceived performance risk, pleasure, and willingness to buy, and (2) the effects of attribute quality information and sources of information on consumers' perceived veracity and perceived performance risk.^ This research is the first in-depth study about the role and effects of information in service physical environments. Using a 2 x 2 between subjects experimental research procedure, undergraduate students were exposed to the informational signs in a simulated service physical environment. The service physical environments were simulated through color photographic slides.^ The results of the study suggest that: (1) the relationship between informational signs and willingness to buy is mediated by perceived veracity, perceived performance risk and pleasure, (2) experience attribute information shows higher perceived veracity and lower perceived performance risk when compared to search attribute information, and (3) information provided through simulated word-of-mouth shows higher perceived veracity and lower perceived performance risk when compared to information provided through non-personal advocate sources. ^
Resumo:
If we classify variables in a program into various security levels, then a secure information flow analysis aims to verify statically that information in a program can flow only in ways consistent with the specified security levels. One well-studied approach is to formulate the rules of the secure information flow analysis as a type system. A major trend of recent research focuses on how to accommodate various sophisticated modern language features. However, this approach often leads to overly complicated and restrictive type systems, making them unfit for practical use. Also, problems essential to practical use, such as type inference and error reporting, have received little attention. This dissertation identified and solved major theoretical and practical hurdles to the application of secure information flow. ^ We adopted a minimalist approach to designing our language to ensure a simple lenient type system. We started out with a small simple imperative language and only added features that we deemed most important for practical use. One language feature we addressed is arrays. Due to the various leaking channels associated with array operations, arrays have received complicated and restrictive typing rules in other secure languages. We presented a novel approach for lenient array operations, which lead to simple and lenient typing of arrays. ^ Type inference is necessary because usually a user is only concerned with the security types for input/output variables of a program and would like to have all types for auxiliary variables inferred automatically. We presented a type inference algorithm B and proved its soundness and completeness. Moreover, algorithm B stays close to the program and the type system and therefore facilitates informative error reporting that is generated in a cascading fashion. Algorithm B and error reporting have been implemented and tested. ^ Lastly, we presented a novel framework for developing applications that ensure user information privacy. In this framework, core computations are defined as code modules that involve input/output data from multiple parties. Incrementally, secure flow policies are refined based on feedback from the type checking/inference. Core computations only interact with code modules from involved parties through well-defined interfaces. All code modules are digitally signed to ensure their authenticity and integrity. ^