849 resultados para 289900 Other Information, Computing and Communication Sciences
Resumo:
In a world of constant and rapid change there are greater demands placed on learners to not only gain content knowledge, but also to develop learning skills and to adopt new strategies that will enable them to produce better and faster learning outcomes. Especially in internationally advancing nations like Kuwait this will be a major challenge of the future. This literature review examines theoretical frameworks that enhance Kuwaiti teachers’ knowledge and skill to adopt culturally relevant reform practices across a number of disciplines and provide guidance in an exploration and use of newer pedagogical tools like graphic organisers. It analyses the effects of graphic organisers on higher order learning and evaluates how they can effect professional development and pedagogical change in Kuwait.
Resumo:
Gray‘s (2000) revised Reinforcement Sensitivity Theory (r-RST) was used to investigate personality effects on information processing biases to gain-framed and loss-framed anti-speeding messages and the persuasiveness of these messages. The r-RST postulates that behaviour is regulated by two major motivational systems: reward system or punishment system. It was hypothesised that both message processing and persuasiveness would be dependent upon an individual‘s sensitivity to reward or punishment. Student drivers (N = 133) were randomly assigned to view one of four anti-speeding messages or no message (control group). Individual processing differences were then measured using a lexical decision task, prior to participants completing a personality and persuasion questionnaire. Results indicated that participants who were more sensitive to reward showed a marginally significant (p = .050) tendency to report higher intentions to comply with the social gain-framed message and demonstrate a cognitive processing bias towards this message, than those with lower reward sensitivity.
Resumo:
Nowadays, everyone can effortlessly access a range of information on the World Wide Web (WWW). As information resources on the web continue to grow tremendously, it becomes progressively more difficult to meet high expectations of users and find relevant information. Although existing search engine technologies can find valuable information, however, they suffer from the problems of information overload and information mismatch. This paper presents a hybrid Web Information Retrieval approach allowing personalised search using ontology, user profile and collaborative filtering. This approach finds the context of user query with least user’s involvement, using ontology. Simultaneously, this approach uses time-based automatic user profile updating with user’s changing behaviour. Subsequently, this approach uses recommendations from similar users using collaborative filtering technique. The proposed method is evaluated with the FIRE 2010 dataset and manually generated dataset. Empirical analysis reveals that Precision, Recall and F-Score of most of the queries for many users are improved with proposed method.
Resumo:
Understanding how IT investments contribute to business value is an important issue, and this assists in the efficient use of technology resources in businesses. While there is an agreement that IT contributes to business value, we are unsure of how IT contributes to business value in the wider context, including developing countries. With the view that understanding the interaction between IT resources and the users may provide better insights on the potential of IT investments, this study investigates the businesses’ perception of the intangible benefits of their IT investments. The results indicate that businesses in developing countries perceive that their IT investments provide intangible benefits, especially at the process level, and this contributes to business value.
Resumo:
Understanding the business value of IT has mostly been studied in developed countries, but because most investment in developing countries is derived from external sources, the influence of that investment on business value is likely to be different. We test this notion using a two-layer model. We examine the impact of IT investments on firm processes, and the relationship of these processes to firm performance in a developing country. Our findings suggest that investment in different areas of IT positively relates to improvements in intermediate business processes and these intermediate business processes positively relate to the overall financial performance of firms in a developing country.
Resumo:
Understanding information technology’s (ITs) contribution to business value is an imperative issue, and while we have attempted to untangle the relationship between IT and business value with some success, our knowledge of specific factors leading to ITs contribution to business value still remains limited. In this paper we propose that complementing IT resources, by establishing a sound IT platform with capable organisational resources may aid in ITs ability to contribute to business value. We suggest that performance measurement of this contribution be undertaken at the business process level first, and then mapped through to firm level performance measurement to obtain a better understanding of the path of IT business value contribution.
Resumo:
The encryption method is a well established technology for protecting sensitive data. However, once encrypted, the data can no longer be easily queried. The performance of the database depends on how to encrypt the sensitive data. In this paper we review the conventional encryption method which can be partially queried and propose the encryption method for numerical data which can be effectively queried. The proposed system includes the design of the service scenario, and metadata.
Resumo:
Medical industries have brought Information Technology (IT) in their systems for both patients and medical staffs due to the numerous benefits of IT we experience at presently. Moreover, the Mobile healthcare (M-health) system has been developed as the first step of Ubiquitous Health Environment (UHE). With the mobility and multi-functions, M-health system will be able to provide more efficient and various services for both doctors and patients. Due to the invisible feature of mobile signals, hackers have easier access to hospital networks than wired network systems. This may result in several security incidents unless security protocols are well implemented. In this paper, user authentication and authorization procedures will applied as a featured component at each level of M-health systems inthe hospital environment. Accordingly, M-health system in the hospital will meet the optimal requirements as a countermeasure to its vulnerabilities.
Resumo:
In the recent past, there are some social issues when personal sensitive data in medical database were exposed. The personal sensitive data should be protected and access must be accounted for. Protecting the sensitive information is possible by encrypting such information. The challenge is querying the encrypted information when making the decision. Encrypted query is practically somewhat tedious task. So we present the more effective method using bucket index and bloom filter technology. We find that our proposed method shows low memory and fast efficiency comparatively. Simulation approaches on data encryption techniques to improve health care decision making processes are presented in this paper as a case scenario.
Resumo:
Efficient caring for the patient's information is an important aspect of caring for the patient. If these processes are possible to monitor anytime anywhere as per the patients' and doctors desecrations the cost of patient care could be minimised. In this connection, Ubiquitous Sensor Network is playing a key role on communication between physicians and patients as well as information sharing among health care providers with rapid access to medical information through reliable and trusted computer network systems. This paper argues possibilities of such scenarios by introducing a ubiquitous sensor network in patient care for 21st century's requirements and standards.
Resumo:
Critical incidents offer a focus for exploratory research about human experiences, including information use and information literacy learning. This paper describes how critical incidents underpinned research about international students’ use of online information resources at two Australian universities. It outlines the development and application of an expanded critical incident approach (ECIA), explaining how ECIA built upon critical incident technique (CIT) and incorporated information literacy theory. It discusses points of expansion (differences) between CIT and ECIA. While CIT initially proved useful in structuring the research, the pilot study revealed methodological limitations. ECIA allowed more nuanced data analysis and the integration of reflection. The study produced a multifaceted word picture of international students’ experience of using online information resources to learn, and a set of critical findings about their information literacy learning needs. ECIA offers a fresh approach for researching information use, information experience, evidence-based practice, information literacy and informed learning.
Resumo:
This article addresses the paucity of systematic data on graduate careers in the arts and humanities in the broader context of enduring public and policy debates about the benefits of education to society, the relation between public and private good that is derivable from education, and the specific disciplinary angle that can be brought to bear on these questions from media, cultural and communication studies. We report findings from a survey of ten years of graduates from Queensland University of Technology’s courses in media, cultural and communication studies which indicate very high employment levels and generally positive accounts of the relevance of courses to working life. A major insight that can be drawn from the research is that media, cultural and communication studies deliver capabilities, skills and orientations which are themselves strongly aligned with the kinds of transferable generic attributes which facilitate transition into the workplace.
Resumo:
Corporate activities are increasingly scrutinized for their effect on society and the environment. It is unthinkable that a corporation today will declare publicly that its only goal is to make money for its shareholders. Instead, corporations typically claim to balance the needs of society and the environment against the need to make a profit. That is, corporations say they practice corporate social responsibility (CSR). This edited volume explores the complexities of this seemingly simple claim.As such it is an essential resource to complement the latest academic thinking from management and communication research on how corporations communicate about CSR This chapter presents an overview of the book.
Resumo:
This paper describes an innovative platform that facilitates the collection of objective safety data around occurrences at railway level crossings using data sources including forward-facing video, telemetry from trains and geo-referenced asset and survey data. This platform is being developed with support by the Australian rail industry and the Cooperative Research Centre for Rail Innovation. The paper provides a description of the underlying accident causation model, the development methodology and refinement process as well as a description of the data collection platform. The paper concludes with a brief discussion of benefits this project is expected to provide the Australian rail industry.