8 resultados para Publicly Available Online Service

em Digital Commons at Florida International University


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The purpose of this study was to empirically investigate the adoption of retail electronic commerce (REC). REC is a business transaction which takes place over the Internet between a casual consumer and a firm. The consumer has no long-term relationship with the firm, orders a good or service, and pays with a credit card. To date, most REC applications have not been profitable. To build profitable REC applications a better understanding of the system's users is required. ^ The research model hypothesizes that the level of REC buying is dependent upon the Buying Characteristics of Internet Use and Search Experience plus the Channel Characteristics of Beliefs About Internet Vendors and Beliefs About Internet Security. The effect of these factors is modified by Time. Additional research questions ask about the different types of REC buyers, the differences between these groups, and how these groups evolved over time. ^ To answer these research questions I analyzed publicly available data collected over a three-year period by the Georgia Institute of Technology Graphics and Visualization Unit over the Internet. Findings indicate the model best predicts Number of Purchases in a future period, and that Buyer Characteristics are most important to this determination. Further, this model is evolving over Time making Buyer Characteristics predict Number of Purchases better in more recent survey administrations. Buyers clustered into five groups based on level of buying and move through various levels and buy increasing Number of Purchases over time. ^ This is the first large scale research project to investigate the evolution of REC. This implications are significant. Practitioners with casual consumer customers need to deploy a finely tuned REC strategy, understand their buyers, capitalize on the company reputation on the Internet, install an Internet-compatible infrastructure, and web-enable order-entry/inventory/fulliment/shipping applications. Researchers might wish to expand on the Buyer Characteristics of the model and/or explore alternative dependent variables. Further, alternative theories such as Population Ecology or Transaction Cost Economics might further illuminate this new I.S. research domain. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The purpose of this study is to produce a model to be used by state regulating agencies to assess demand for subacute care. In accomplishing this goal, the study refines the definition of subacute care, demonstrates a method for bed need assessment, and measures the effectiveness of this new level of care. This was the largest study of subacute care to date. Research focused on 19 subacute units in 16 states, each of which provides high-intensity rehabilitative and/or restorative care carried out in a high-tech unit. Each of the facilities was based in a nursing home, but utilized separate staff, equipment, and services. Because these facilities are under local control, it was possible to study regional differences in subacute care demand.^ Using this data, a model for predicting demand for subacute care services was created, building on earlier models submitted by John Whitman for the American Hospital Association and Robin E. MacStravic. The Broderick model uses the "bootstrapping" method and takes advantage of high technology: computers and software, databases in business and government, publicly available databases from providers or commercial vendors, professional organizations, and other information sources. Using newly available sources of information, this new model addresses the problems and needs of health care planners as they approach the challenges of the 21st century. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The influence of hydrological dynamics on vegetation distribution and the structuring of wetland environments is of growing interest as wetlands are modified by human action and the increasing threat from climate change. Hydrological properties have long been considered a driving force in structuring wetland communities. We link hydrological dynamics with vegetation distribution across Everglades National Park (ENP) using two publicly available datasets to study the probability structure of the frequency, duration, and depth of inundation events along with their relationship to vegetation distribution. This study is among the first to show hydrologic structuring of vegetation communities at wide spatial and temporal scales, as results indicate that the percentage of time a location is inundated and its mean depth are the principal structuring variables to which individual communities respond. For example, sawgrass, the most abundant vegetation type within the ENP, is found across a wide range of time inundated percentages and mean depths. Meanwhile, other communities like pine savanna or red mangrove scrub are more restricted in their distribution and found disproportionately at particular depths and inundations. These results, along with the probabilistic structure of hydropatterns, potentially allow for the evaluation of climate change impacts on wetland vegetation community structure and distribution.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

As most hospitality industry managers in the U.S. are already aware, there is a growing and persistent shortage of labor available for service-sector, non-career jobs, the very jobs so vital to the industry. In most cases, recruitment efforts for these jobs are targeted toward younger workers, those under age 25. The authors explore issues regarding the attractiveness of non-career jobs in the eyes of young persons and suggest that, in addition to factors related to the job itself (pay, hours, type of work), the type of procedures used by employers to make selection decisions are equally influential. Recommendations are made concerning how hospitality employers with non-career positions to fill can maximize the chances of successfully staffing their organizations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In a post-Cold War, post-9/11 world, the advent of US global supremacy resulted in the installation, perpetuation, and dissemination of an Absolutist Security Agenda (hereinafter, ASA). The US ASA explicitly and aggressively articulates and equates US national security interests with the security of all states in the international system, and replaced the bipolar, Cold War framework that defined international affairs from 1945-1992. Since the collapse of the USSR and the 11 September 2001 terrorist attacks, the US has unilaterally defined, implemented, and managed systemic security policy. The US ASA is indicative of a systemic category of knowledge (security) anchored in variegated conceptual and material components, such as morality, philosophy, and political rubrics. The US ASA is based on a logic that involves the following security components: (1) hyper militarization, (2) intimidation,(3) coercion, (4) criminalization, (5) panoptic surveillance, (6) plenary security measures, and (7) unabashed US interference in the domestic affairs of select states. Such interference has produced destabilizing tensions and conflicts that have, in turn, produced resistance, revolutions, proliferation, cults of personality, and militarization. This is the case because the US ASA rests on the notion that the international system of states is an extension, instrument of US power, rather than a system and/or society of states comprised of functionally sovereign entities. To analyze the US ASA, this study utilizes: (1) official government statements, legal doctrines, treaties, and policies pertaining to US foreign policy; (2) militarization rationales, budgets, and expenditures; and (3) case studies of rogue states. The data used in this study are drawn from information that is publicly available (academic journals, think-tank publications, government publications, and information provided by international organizations). The data supports the contention that global security is effectuated via a discrete set of hegemonic/imperialistic US values and interests, finding empirical expression in legal acts (USA Patriot ACT 2001) and the concept of rogue states. Rogue states, therefore, provide test cases to clarify the breadth, depth, and consequentialness of the US ASA in world affairs vis-à-vis the relationship between US security and global security.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In 2005 we initiated a project designed to better understand tree island structure and function in the Everglades and the wetlands bordering it. Focus was on the raised portions at the upstream end of the islands, where tropical hardwood species adapted to well-drained conditions usually are the most prominent component of the vegetation. The study design is hierarchical, with four levels; in general, a large number of sites is to be surveyed once for a limited set of parameters, and increasingly small sets of islands are to be sampled more intensively, more frequently, and for more aspects of ecosystem function. During the first year of the 3-year study, we completed surveys of 41 Level 1 (i.e., the least intensive level) islands, and established permanent plots in two and three islands of Levels 2 and 4 intensity, respectively. Tree species richness and structural complexity was highest in Shark Slough “hammocks”, while islands in Northeast Shark Slough and Water Conservation Area 3B, which receive heavy human use, were simpler, more park-like communities. Initial monitoring of soil moisture in Level 4 hammocks indicated considerable local variation, presumably associated with antecedent rainfall and current water levels in the adjacent marsh. Tree islands throughout the study area were impacted significantly by Hurricanes Katrina and Wilma in 2005, but appear to be recovering rapidly. As the project continues to include more islands and repeated measurements, we expect to develop a better grasp of tree island dynamics across the Everglades ecosystem, especially with respect to moisture relations and water levels in the adjacent marsh. The detailed progress report which follows is also available online at http://www.fiu.edu/~serp1/projects/treeislands/tree_islands_2005_annual_report.pd

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The purpose of this study is to produce a model to be used by state regulating agencies to assess demand for subacute care. In accomplishing this goal, the study refines the definition of subacute care, demonstrates a method for bed need assessment, and measures the effectiveness of this new level of care. This was the largest study of subacute care to date. Research focused on 19 subacute units in 16 states, each of which provides high-intensity rehabilitative and/or restorative care carried out in a high-tech unit. Each of the facilities was based in a nursing home, but utilized separate staff, equipment, and services. Because these facilities are under local control, it was possible to study regional differences in subacute care demand. Using this data, a model for predicting demand for subacute care services was created, building on earlier models submitted by John Whitman for the American Hospital Association and Robin E. MacStravic. The Broderick model uses the "bootstrapping" method and takes advantage of high technology: computers and software, databases in business and government, publicly available databases from providers or commercial vendors, professional organizations, and other information sources. Using newly available sources of information, this new model addresses the problems and needs of health care planners as they approach the challenges of the 21st century.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In a post-Cold War, post-9/11 world, the advent of US global supremacy resulted in the installation, perpetuation, and dissemination of an Absolutist Security Agenda (hereinafter, ASA). The US ASA explicitly and aggressively articulates and equates US national security interests with the security of all states in the international system, and replaced the bipolar, Cold War framework that defined international affairs from 1945-1992. Since the collapse of the USSR and the 11 September 2001 terrorist attacks, the US has unilaterally defined, implemented, and managed systemic security policy. The US ASA is indicative of a systemic category of knowledge (security) anchored in variegated conceptual and material components, such as morality, philosophy, and political rubrics. The US ASA is based on a logic that involves the following security components: 1., hyper militarization, 2., intimidation, 3., coercion, 4., criminalization, 5., panoptic surveillance, 6., plenary security measures, and 7., unabashed US interference in the domestic affairs of select states. Such interference has produced destabilizing tensions and conflicts that have, in turn, produced resistance, revolutions, proliferation, cults of personality, and militarization. This is the case because the US ASA rests on the notion that the international system of states is an extension, instrument of US power, rather than a system and/or society of states comprised of functionally sovereign entities. To analyze the US ASA, this study utilizes: 1., official government statements, legal doctrines, treaties, and policies pertaining to US foreign policy; 2., militarization rationales, budgets, and expenditures; and 3., case studies of rogue states. The data used in this study are drawn from information that is publicly available (academic journals, think-tank publications, government publications, and information provided by international organizations). The data supports the contention that global security is effectuated via a discrete set of hegemonic/imperialistic US values and interests, finding empirical expression in legal acts (USA Patriot ACT 2001) and the concept of rogue states. Rogue states, therefore, provide test cases to clarify the breadth, depth, and consequentialness of the US ASA in world affairs vis-a-vis the relationship between US security and global security.