988 resultados para Information asymmetries
Resumo:
The policy instruments that provide information on a firm's or facility's environmental performance, such as the U.S. Toxic Release Inventory (TRI) and the Pollutant Release and Transfer Register system (PRTRs) used in some European countries and Japan, play an important role in encouraging firms or facilities to improve their environmental performance, if investors, consumers and residents recognize their environmental performance. This study uses a hedonic approach to explore how the Japanese rental housing market responds to carcinogenic risk arising from releases and transfers of chemical substances produced and used at close facilities. We found that residents do not perceive carcinogenic risk generated more than 1.0 km away from their residence and that they seem to recognize the increased carcinogenic risk at distances from 0.5 km to 1.0 km away; a 1% increase in carcinogenic risk reduces the average rent by 0.0007%. The distance at which residents perceive the risk arising from such facilities is less than in previous studies. This suggests that the risk perception recognized in previous studies may capture the other externalities in addition to the chemical risk because the risk is measured by the distance.
Resumo:
INTRODUCTION: I want to argue that understanding masculinity is an important part of understanding gender and sexuality as it relates to information and communications technologies (ICTs), specifically those under the lens of the information-systems community. In order to do this, the landscape of gender and sexuality research in general is referred to along with such research in the field of information systems (IS), with reference as necessary to masculinity studies. I will then suggest some possible areas where a more thorough going theorization may prove useful. In sum, future research might focus on the relation-ship between marginalised masculinities and the construction and consumption of is in work organisations and society…
Resumo:
Organisational dependence upon IT continues to grow yet experiences of satisfaction vary widely. Problematic, aged IT is often cited as being a fundamental problem in this respect and this is commonly termed legacy information systems. However, in this paper the author offers an alternative, and arguably more comprehensive, theory of legacy information systems that accommodates multiple viewpoints and recognises its inherent dynamism. The paper suggests a theory of legacy information systems that comprises of the concepts of temporal effects, interpretations and characteristics. It is argued that legacy information systems are constructed of many ‘legacies’ that are handed down continuously, forming an amorphous set of sociotechnical interdependencies and relationships.
Resumo:
The aim of spoken term detection (STD) is to find all occurrences of a specified query term in a large audio database. This process is usually divided into two steps: indexing and search. In a previous study, it was shown that knowing the topic of an audio document would help to improve the accuracy of indexing step which results in a better performance for STD system. In this paper, we propose the use of topic information not only in the indexing step, but also in the search step. Results of our experiments show that topic information could also be used in search step to improve the STD accuracy.
Resumo:
This thesis presents new methods for classification and thematic grouping of billions of web pages, at scales previously not achievable. This process is also known as document clustering, where similar documents are automatically associated with clusters that represent various distinct topic. These automatically discovered topics are in turn used to improve search engine performance by only searching the topics that are deemed relevant to particular user queries.
Resumo:
This practice framework is designed for health practitioners and allied health care workers. The framework provides empirically-based descriptions of ageing Australians’ experiences of health information literacy and suggests how these may provide a foundation for helping ageing Australians enhance their health information literacy. Health information literacy is understood here to be people’s use of relevant information to learn about health.
Resumo:
Introduction This research is the first to investigate the experiences of teacher-librarians as evidence-based practice. An empirically derived model is presented in this paper. Method This qualitative study utilised the expanded critical incident approach, and investigated the real-life experiences of fifteen Australian teacher-librarians, through semi-structured interviews and inductive data analysis. Data collection utilised semi-structured interviews, on-site observations, journaling and the rubric for contextual information. These approaches allowed each of the interviewees to tell their own story and provided richness to the data. Analysis The analysis involved two types of data categorisation: binary and thematic. Binary classification was used to identify factual details. Thematic analysis involved categorising the emerging themes. Results An empirically derived model for evidence-based practice was devised and associated critical findings identified. The results demonstrate that evidence-based practice for teacher-librarians is a holistic practice. It is not a linear, step-by-step process. Conclusions This study is significant for teacher-librarians and library and information professionals as it provides new understanding of evidence-based practice.
Resumo:
This digital poster (which was on display at "The Cube", Queensland University of Technology) demonstrates how specification parameters can be extracted from a product library repository for use in augmenting the information contents of the objects in a local BIM tool (Revit in this instance).
Resumo:
Building information models have created a paradigm shift in how buildings are built and managed by providing a dynamic repository for building data that is useful in many new operational scenarios. This change has also created an opportunity to use building information models as an integral part of security operations and especially as a tool to facilitate fine-grained access control to building spaces in smart buildings and critical infrastructure environments. In this paper, we identify the requirements for a security policy model for such an access control system and discuss why the existing policy models are not suitable for this application. We propose a new policy language extension to XACML, with BIM specific data types and functions based on the IFC specification, which we call BIM-XACML.
Resumo:
Building information models are increasingly being utilised for facility management of large facilities such as critical infrastructures. In such environments, it is valuable to utilise the vast amount of data contained within the building information models to improve access control administration. The use of building information models in access control scenarios can provide 3D visualisation of buildings as well as many other advantages such as automation of essential tasks including path finding, consistency detection, and accessibility verification. However, there is no mathematical model for building information models that can be used to describe and compute these functions. In this paper, we show how graph theory can be utilised as a representation language of building information models and the proposed security related functions. This graph-theoretic representation allows for mathematically representing building information models and performing computations using these functions.