925 resultados para LIMITATIONS
Resumo:
Many of the teaching elements in Civil and Environmental Engineering and Spatial Science/Surveying are strongly related to multidisciplinary real-world situations. Professionals in each discipline commonly work collaboratively, knowing each other’s professional and technical limitations and requirements. Replication of such real-world situations allows students to gain an insight and acquire knowledge of professional practice for both civil engineering and spatial science disciplines. However, replication of an authentic design project is not always possible in a single unit basis where empirical project situations are often created with controlled sets of constraints, inputs and outputs. A cross-disciplinary design-based project that is designed to promote active student learning, engagement and professional integration would be the preferred option. The central aim of this collaborative project was to create positive and inclusive environments to promote engaging learning opportunities that cater for a range of learning styles with a two-way linkage involving third-year civil engineering and spatial science (surveying) students. This paper describes the cross-disciplinary project developed and delivered in 2010 and 2011. A survey was conducted at completion of the project to assess the degree of improvement in student engagement and their learning experiences. Improvements were assessed in a range of dimensions including student motivation, learning by cross-disciplinary collaboration and learning by authentic design project experiences. In this specific cross-disciplinary linkage project, the study findings showed that teaching approaches utilised have been effective in promoting active student learning and increasing engagement.
Resumo:
The main limitations with existing fungal spore traps are that they are stationary and cannot be used in inaccessible or remote areas of Australia. This may result in delayed assessment, possible spread of harmful crop infestations and loss of crop yield and productivity. Fitted with the developed smart spore trap the UAV can fly, detect and monitor spores of plant pathogens in areas which previously were almost impossible to monitor. The technology will allow for earlier detection of emergency plant pests (EPPs) incursions by providing efficient and effective airborne surveillance, helping to protect Australia’s crops, pastures and the environment. The project is led by the Cooperative Research Centre for National Plant Biosecurity, with ARCAA/ QUT, CSIRO and the Queensland Government also providing resources. The prototype airplane was exhibited at the Innovation in Australia event December 7.
Resumo:
Twitter is now well established as the world’s second most important social media platform, after Facebook. Its 140-character updates are designed for brief messaging, and its network structures are kept relatively flat and simple: messages from users are either public and visible to all (even to unregistered visitors using the Twitter website), or private and visible only to approved ‘followers’ of the sender; there are no more complex definitions of degrees of connection (family, friends, friends of friends) as they are available in other social networks. Over time, Twitter users have developed simple, but effective mechanisms for working around these limitations: ‘#hashtags’, which enable the manual or automatic collation of all tweets containing the same #hashtag, as well allowing users to subscribe to content feeds that contain only those tweets which feature specific #hashtags; and ‘@replies’, which allow senders to direct public messages even to users whom they do not already follow. This paper documents a methodology for extracting public Twitter activity data around specific #hashtags, and for processing these data in order to analyse and visualize the @reply networks existing between participating users – both overall, as a static network, and over time, to highlight the dynamic structure of @reply conversations. Such visualizations enable us to highlight the shifting roles played by individual participants, as well as the response of the overall #hashtag community to new stimuli – such as the entry of new participants or the availability of new information. Over longer timeframes, it is also possible to identify different phases in the overall discussion, or the formation of distinct clusters of preferentially interacting participants.
Resumo:
Purpose – This paper aims to outline the challenges and tasks involved in a organising and marketing a new venture from conception to sales. It presents an interesting situation with which readers can identify and apply knowledge and skills associated with entrepreneurship and marketing and link this with the key learning objectives of a new venture marketing study unit. Design/methodology/approach – The case is constructed around key principles of marketing and entrepreneurship linked to a description of a contemporary venture written from a participant observer perspective supplemented with knowledge from interviews and archival research. Findings – The case shows how effective a diligent, creative approach to developing and selling a new venture can be. It demonstrates that effective marketing requires more than rote adoption of basic principles – it requires creative thinking and enterprising adaption of relevant principles to address the specific and well defined objectives of the venture. Research limitations/implications – The case is not intended to prescribe a particular marketing method or process; rather it is meant to stimulate creativity in the use of marketing knowledge and skills. Practical implications – The case represents an effective resource for both formal and informal teaching and learning. It demonstrates the requirement for innovative and creative adoption of marketing concepts to fit the demands of a new venture. Originality/value – The case specifically addresses an identified need for learning resources and information tailored to the area of entrepreneurial new venture marketing.
Resumo:
Purpose: Web search engines are frequently used by people to locate information on the Internet. However, not all queries have an informational goal. Instead of information, some people may be looking for specific web sites or may wish to conduct transactions with web services. This paper aims to focus on automatically classifying the different user intents behind web queries. Design/methodology/approach: For the research reported in this paper, 130,000 web search engine queries are categorized as informational, navigational, or transactional using a k-means clustering approach based on a variety of query traits. Findings: The research findings show that more than 75 percent of web queries (clustered into eight classifications) are informational in nature, with about 12 percent each for navigational and transactional. Results also show that web queries fall into eight clusters, six primarily informational, and one each of primarily transactional and navigational. Research limitations/implications: This study provides an important contribution to web search literature because it provides information about the goals of searchers and a method for automatically classifying the intents of the user queries. Automatic classification of user intent can lead to improved web search engines by tailoring results to specific user needs. Practical implications: The paper discusses how web search engines can use automatically classified user queries to provide more targeted and relevant results in web searching by implementing a real time classification method as presented in this research. Originality/value: This research investigates a new application of a method for automatically classifying the intent of user queries. There has been limited research to date on automatically classifying the user intent of web queries, even though the pay-off for web search engines can be quite beneficial. © Emerald Group Publishing Limited.
Resumo:
Purpose - During multitasking, humans handle multiple tasks through task switching or engage in multitasking information behaviors. For example, a user switches between seeking new kitchen information and medical information. Recent studies provide insights these complex multitasking human information behaviors (HIB). However, limited studies have examined the interplay between information and non-information tasks. Design/methodology/approach - The goal of the paper was to examine the interplay of information and non-information task behaviors. Findings - This paper explores and speculates on a new direction in HIB research. The nature of HIB as a multitasking activity including the interplay of information and non-information behavior tasks, and the relation between multitasking information behavior to cognitive style and individual differences, is discussed. A model of multitasking between information and non-information behavior tasks is proposed. Practical implications/limitations - Multitasking information behavior models should include the interplay of information and non-information tasks, and individual differences and cognitive styles. Originality/value - The paper is the first information science theoretical examination of the interplay between information and non-information tasks. © Emerald Group Publishing Limited.
Resumo:
Purpose - The web is now a significant component of the recruitment and job search process. However, very little is known about how companies and job seekers use the web, and the ultimate effectiveness of this process. The specific research questions guiding this study are: how do people search for job-related information on the web? How effective are these searches? And how likely are job seekers to find an appropriate job posting or application? Design/methodology/approach - The data used to examine these questions come from job seekers submitting job-related queries to a major web search engine at three points in time over a five-year period. Findings - Results indicate that individuals seeking job information generally submit only one query with several terms and over 45 percent of job-seeking queries contain a specific location reference. Of the documents retrieved, findings suggest that only 52 percent are relevant and only 40 percent of job-specific searches retrieve job postings. Research limitations/implications - This study provides an important contribution to web research and online recruiting literature. The data come from actual web searches, providing a realistic glimpse into how job seekers are actually using the web. Practical implications - The results of this research can assist organizations in seeking to use the web as part of their recruiting efforts, in designing corporate recruiting web sites, and in developing web systems to support job seeking and recruiting. Originality/value - This research is one of the first studies to investigate job searching on the web using longitudinal real world data. © Emerald Group Publishing Limited.
Resumo:
Purpose – The work presented in this paper aims to provide an approach to classifying web logs by personal properties of users. Design/methodology/approach – The authors describe an iterative system that begins with a small set of manually labeled terms, which are used to label queries from the log. A set of background knowledge related to these labeled queries is acquired by combining web search results on these queries. This background set is used to obtain many terms that are related to the classification task. The system then ranks each of the related terms, choosing those that most fit the personal properties of the users. These terms are then used to begin the next iteration. Findings – The authors identify the difficulties of classifying web logs, by approaching this problem from a machine learning perspective. By applying the approach developed, the authors are able to show that many queries in a large query log can be classified. Research limitations/implications – Testing results in this type of classification work is difficult, as the true personal properties of web users are unknown. Evaluation of the classification results in terms of the comparison of classified queries to well known age-related sites is a direction that is currently being exploring. Practical implications – This research is background work that can be incorporated in search engines or other web-based applications, to help marketing companies and advertisers. Originality/value – This research enhances the current state of knowledge in short-text classification and query log learning. Classification schemes, Computer networks, Information retrieval, Man-machine systems, User interfaces
Resumo:
Background: The objective of this study was to scrutinize number line estimation behaviors displayed by children in mathematics classrooms during the first three years of schooling. We extend existing research by not only mapping potential logarithmic-linear shifts but also provide a new perspective by studying in detail the estimation strategies of individual target digits within a number range familiar to children. Methods: Typically developing children (n = 67) from Years 1 – 3 completed a number-to-position numerical estimation task (0-20 number line). Estimation behaviors were first analyzed via logarithmic and linear regression modeling. Subsequently, using an analysis of variance we compared the estimation accuracy of each digit, thus identifying target digits that were estimated with the assistance of arithmetic strategy. Results: Our results further confirm a developmental logarithmic-linear shift when utilizing regression modeling; however, uniquely we have identified that children employ variable strategies when completing numerical estimation, with levels of strategy advancing with development. Conclusion: In terms of the existing cognitive research, this strategy factor highlights the limitations of any regression modeling approach, or alternatively, it could underpin the developmental time course of the logarithmic-linear shift. Future studies need to systematically investigate this relationship and also consider the implications for educational practice.
Resumo:
Unstructured text data, such as emails, blogs, contracts, academic publications, organizational documents, transcribed interviews, and even tweets, are important sources of data in Information Systems research. Various forms of qualitative analysis of the content of these data exist and have revealed important insights. Yet, to date, these analyses have been hampered by limitations of human coding of large data sets, and by bias due to human interpretation. In this paper, we compare and combine two quantitative analysis techniques to demonstrate the capabilities of computational analysis for content analysis of unstructured text. Specifically, we seek to demonstrate how two quantitative analytic methods, viz., Latent Semantic Analysis and data mining, can aid researchers in revealing core content topic areas in large (or small) data sets, and in visualizing how these concepts evolve, migrate, converge or diverge over time. We exemplify the complementary application of these techniques through an examination of a 25-year sample of abstracts from selected journals in Information Systems, Management, and Accounting disciplines. Through this work, we explore the capabilities of two computational techniques, and show how these techniques can be used to gather insights from a large corpus of unstructured text.
Resumo:
Purpose – This study examines the nature of consumers’ perceptions of the value they derive from the everyday experiential consumption of mobile phones and how mobile marketing (m-marketing) can potentially enhance these value perceptions. Methodology – Q methodology is used to examine how consumers’ subjective perceptions and opinions are shared at a collective level. Forty participants undertook two Q sorts and the data was analysed using PQ-method. Findings – The first Q sort identified three profiles of perceived value: the Mobile Pragmatists, the Mobile Connectors and the Mobile Revellers. The second Q sort identified two profiles of perceived value of m-marketing: one emerging from the shared opinions of the Mobile Pragmatists and the Mobile Connectors, and the second from the Mobile Revellers. Implications/limitations – The findings show how consumers can be segmented based on their contextualised perceived value of consuming mobile phones and how the potential for m-marketing is perceived in ways that can enhance these value perceptions. Limitations relate to deriving statements for the Q sorts and the generalisability of the results. Practical implications – The findings highlight ways to tailor m-marketing strategies to complement consumers’ perceptions of the value offered through their mobile phones. Originality/value of paper – The study contributes to the literature through using Q methodology to examine two subjective areas of consumer behaviour, experiential consumption and consumer perceived value. Keywords mobile phones, mobile phone marketing, consumer perceived value, Q methodology, experiential consumption Classification Research paper
Resumo:
This research is one of several ongoing studies conducted within the IT Professional Services (ITPS) research programme at Queensland University of Technology (QUT). In 2003, ITPS introduced the IS-Impact model, a measurement model for measuring information systems success from the viewpoint of multiple stakeholders. The model, along with its instrument, is robust, simple, yet generalisable, and yields results that are comparable across time, stakeholders, different systems and system contexts. The IS-Impact model is defined as “a measure at a point in time, of the stream of net benefits from the Information System (IS), to date and anticipated, as perceived by all key-user-groups”. The model represents four dimensions, which are ‘Individual Impact’, ‘Organizational Impact’, ‘Information Quality’ and ‘System Quality’. The two Impact dimensions measure the up-to-date impact of the evaluated system, while the remaining two Quality dimensions act as proxies for probable future impacts (Gable, Sedera & Chan, 2008). To fulfil the goal of ITPS, “to develop the most widely employed model” this research re-validates and extends the IS-Impact model in a new context. This method/context-extension research aims to test the generalisability of the model by addressing known limitations of the model. One of the limitations of the model relates to the extent of external validity of the model. In order to gain wide acceptance, a model should be consistent and work well in different contexts. The IS-Impact model, however, was only validated in the Australian context, and packaged software was chosen as the IS understudy. Thus, this study is concerned with whether the model can be applied in another different context. Aiming for a robust and standardised measurement model that can be used across different contexts, this research re-validates and extends the IS-Impact model and its instrument to public sector organisations in Malaysia. The overarching research question (managerial question) of this research is “How can public sector organisations in Malaysia measure the impact of information systems systematically and effectively?” With two main objectives, the managerial question is broken down into two specific research questions. The first research question addresses the applicability (relevance) of the dimensions and measures of the IS-Impact model in the Malaysian context. Moreover, this research question addresses the completeness of the model in the new context. Initially, this research assumes that the dimensions and measures of the IS-Impact model are sufficient for the new context. However, some IS researchers suggest that the selection of measures needs to be done purposely for different contextual settings (DeLone & McLean, 1992, Rai, Lang & Welker, 2002). Thus, the first research question is as follows, “Is the IS-Impact model complete for measuring the impact of IS in Malaysian public sector organisations?” [RQ1]. The IS-Impact model is a multidimensional model that consists of four dimensions or constructs. Each dimension is represented by formative measures or indicators. Formative measures are known as composite variables because these measures make up or form the construct, or, in this case, the dimension in the IS-Impact model. These formative measures define different aspects of the dimension, thus, a measurement model of this kind needs to be tested not just on the structural relationship between the constructs but also the validity of each measure. In a previous study, the IS-Impact model was validated using formative validation techniques, as proposed in the literature (i.e., Diamantopoulos and Winklhofer, 2001, Diamantopoulos and Siguaw, 2006, Petter, Straub and Rai, 2007). However, there is potential for improving the validation testing of the model by adding more criterion or dependent variables. This includes identifying a consequence of the IS-Impact construct for the purpose of validation. Moreover, a different approach is employed in this research, whereby the validity of the model is tested using the Partial Least Squares (PLS) method, a component-based structural equation modelling (SEM) technique. Thus, the second research question addresses the construct validation of the IS-Impact model; “Is the IS-Impact model valid as a multidimensional formative construct?” [RQ2]. This study employs two rounds of surveys, each having a different and specific aim. The first is qualitative and exploratory, aiming to investigate the applicability and sufficiency of the IS-Impact dimensions and measures in the new context. This survey was conducted in a state government in Malaysia. A total of 77 valid responses were received, yielding 278 impact statements. The results from the qualitative analysis demonstrate the applicability of most of the IS-Impact measures. The analysis also shows a significant new measure having emerged from the context. This new measure was added as one of the System Quality measures. The second survey is a quantitative survey that aims to operationalise the measures identified from the qualitative analysis and rigorously validate the model. This survey was conducted in four state governments (including the state government that was involved in the first survey). A total of 254 valid responses were used in the data analysis. Data was analysed using structural equation modelling techniques, following the guidelines for formative construct validation, to test the validity and reliability of the constructs in the model. This study is the first research that extends the complete IS-Impact model in a new context that is different in terms of nationality, language and the type of information system (IS). The main contribution of this research is to present a comprehensive, up-to-date IS-Impact model, which has been validated in the new context. The study has accomplished its purpose of testing the generalisability of the IS-Impact model and continuing the IS evaluation research by extending it in the Malaysian context. A further contribution is a validated Malaysian language IS-Impact measurement instrument. It is hoped that the validated Malaysian IS-Impact instrument will encourage related IS research in Malaysia, and that the demonstrated model validity and generalisability will encourage a cumulative tradition of research previously not possible. The study entailed several methodological improvements on prior work, including: (1) new criterion measures for the overall IS-Impact construct employed in ‘identification through measurement relations’; (2) a stronger, multi-item ‘Satisfaction’ construct, employed in ‘identification through structural relations’; (3) an alternative version of the main survey instrument in which items are randomized (rather than blocked) for comparison with the main survey data, in attention to possible common method variance (no significant differences between these two survey instruments were observed); (4) demonstrates a validation process of formative indexes of a multidimensional, second-order construct (existing examples mostly involved unidimensional constructs); (5) testing the presence of suppressor effects that influence the significance of some measures and dimensions in the model; and (6) demonstrates the effect of an imbalanced number of measures within a construct to the contribution power of each dimension in a multidimensional model.
Resumo:
There is significant interest in Human-computer interaction methods that assist in the design of applications for use by children. Many of these approaches draw upon standard HCI methods,such as personas, scenarios, and probes. However, often these techniques require communication and kinds of thinking skills that are designer centred,which prevents children with Autism Spectrum Disorders or other learning and communication disabilities from being able to participate. This study investigates methods that might be used with children with ASD or other learning and communication disabilities to inspire the design of technology based intervention approaches to support their speech and language development. Similar to Iversen and Brodersen, we argue that children with ASD should not be treated as being in some way “cognitively incomplete”. Rather they are experts in their everyday lives and we cannot design future IT without involving them. However, how do we involve them Instead of beginning with HCI methods, we draw upon easy to use technologies and methods used in the therapy professions for child engagement, particularly utilizing the approaches of Hanen (2011) and Greenspan (1998). These approaches emphasize following the child’s lead and ensuring that the child always has a legitimate turn at a detailed level of interaction. In a pilot project, we have studied a child’s interactions with their parents about activities over which they have control – photos that they have taken at school on an iPad. The iPad was simple enough for this child with ASD to use and they enjoyed taking and reviewing photos. We use this small case study as an example of a child-led approach for a child with ASD. We examine interactions from this study in order to assess the possibilities and limitations of the child-led approach for supporting the design of technology based interventions to support speech and language development.
Resumo:
Interaction with a mobile device remains difficult due to inherent physical limitations. This dif-ficulty is particularly evident for search, which re-quires typing. We extend the One-Search-Only search paradigm by adding a novel link-browsing scheme built on top of automatic link discovery. A prototype was built for iPhone and tested with 12 subjects. A post-use interview survey suggests that the extended paradigm improves the mobile information seeking experience.
Resumo:
Over the last decade nations around the world have renewed their efforts to address the problem of human trafficking, following the introduction of the United Nations Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children. In Australia and the United States, legislators sought to quantify and characterise the human trafficking phenomenon, seeking to answer the question — how large is the problem of trafficking? This article explores the attempts of legislators in Australia and the United States to determine how many victims are trafficked into their countries, highlighting the significant uncertainty that still surrounds data on human trafficking. The challenges researchers face in measuring human trafficking are also explored. These challenges include disputes over the definition of a trafficking victim, the limitations of research using sampling to measure the trafficked population, and the mischaracterisation of the trafficking problem as a result of politicisation of the trafficking debate and a focus on trafficking for sexual exploitation versus other forms of labour. This article argues that in the absence of reliable data on trafficking, policy is often informed by misleading or false information.