820 resultados para information grounds theory


Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper presents the notion of Context-based Activity Design (CoBAD) that represents context with its dynamic changes and normative activities in an interactive system design. The development of CoBAD requires an appropriate context ontology model and inference mechanisms. The incorporation of norms and information field theory into Context State Transition Model, and the implementation of new conflict resolution strategies based on the specific situation are discussed. A demonstration of CoBAD using a human agent scenario in a smart home is also presented. Finally, a method of treating conflicting norms in multiple information fields is proposed.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The purpose of this study is to empirically analyze the main factors that determine the first-day return and the Flipping activity in Brazilian IPOs, taking into account expected results according to national and international researches. The data base encompasses IPOs that took place between May 2004 and February 2011, summing up to 129 IPOs and approximately R$ 128 billion offering. The first-day return, which means the “money left on the table”, was on average 4.6% taking into consideration the issue price, while the Flipping activity totalized R$ 7.2 billion, meaning 5.6% of the offering. The first-day return was analyzed before and after the first trade, and evidences were found supporting (a) the exogenous determination of the issue price, (b) the opening price dependence of prospectus disclosure and of other variables, observable previously to the bookbuilding process, and (c) the cascade behavior of investors in the pricing after the first trade, particularly driven by the underwriter behavior. In regards to the Flipping, it was notorious depending on how much the IPO succeeded, being concentrated in and homogeneous along the first-day, despite the intense negotiation in the first minute. As a general contribution to literature, it was concluded that Information Asymmetry Theory arguments are not sufficient to explain the first-day Underpricing and the Flipping, being necessary arguments based on Behavioral Finance adapted to an intraday perspective.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

O insider trading é ilícito de elevado potencial danoso, pois impacta não só as pessoas diretamente relacionadas com a operação realizada com a informação privilegiada, mas também o mercado de capitais como um todo, afetando a confiança dos investidores. É importante, portanto, a repressão severa do ilícito nas esferas administrativa, civil e penal, destacando-se o papel regulador da Comissão de Valores Mobiliários, enquanto representante da intervenção do poder estatal no âmbito do mercado de capitais. Não obstante, para a responsabilização pelo ilícito do insider trading, deve-se exigir um conjunto probatório robusto, ainda que apenas indiciário. A utilização de uma espécie de muralha segregadora, se minimiza situações de conflito de interesses ao evitar o acesso amplo a informações relevantes não divulgadas ao mercado, não é, por si só, capaz de excluir responsabilidade por eventual insider trading. Importante ter cuidado com construções teóricas, como a da “mente corporativa”, capazes de esvaziar de utilidade barreiras como uma Chinese Wall. Impossível transpor a teoria do domínio do fato à apuração de ilícitos de insider trading.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Esse estudo teve como objetivo examinar possíveis alterações na dinâmica intrínseca de crianças e adultos decorrentes de informações externas na realização de uma tarefa de manutenção da postura ereta. Participaram do estudo dez crianças de 8 anos de idade e dez adultos jovens de ambos os gêneros. Eles permaneceram na posição ereta dentro de uma sala móvel que foi movimentada continuamente para frente e para trás. Os participantes recebiam informação sobre o movimento da sala e eram solicitados a não oscilar ou a oscilar junto com o movimento da mesma. Os resultados mostraram que a manipulação da informação visual induziu oscilação corporal correspondente (dinâmica intrínseca) em crianças e adultos. Informação sobre o movimento da sala e solicitação de uma ação (informação comportamental) alteraram o relacionamento entre informação visual e oscilação corporal. Crianças apresentaram mais dificuldades em alterar a dinâmica intrínseca do que adultos, indicando que elas são mais dependentes da dinâmica intrínseca do que adultos. Esses resultados trazem implicações importantes para a situação de ensino-aprendizagem, pois indica que aprendizagem envolvendo crianças deve ser estruturada propiciando condições mais favoráveis para alterações na dinâmica intrínseca para que os objetivos da mesma sejam alcançados.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Introduction: According to the theoretical model of Cranach, Ochsenbein, and Valach (1986) understanding group actions needs consideration of aspects at both the group level and the level of individual members. For example individual action units constituting group actions are motivated at the individual level while potentially being affected by characteristics of the group. Theoretically, group efficacy beliefs could be a part of this motivational process as they are an individual’s cognitive contents about group-level abilities to perform well in a specific task. Positive relations between group level efficacy-beliefs and group performance have been reported and Bandura and Locke (2003) argue that this relationship is being mediated by motivational processes and goal setting. The aims of this study were a) to examine the effects of group characteristics on individual performance motivation and b) to test if those are mediated by individual group efficacy beliefs. Methods: Forty-seven students (M=22.83 years, SD=2.83, 34% women) of the university of Berne participated in this scenario based experiment. Data were collected on two collection points. Subjects were provided information about fictive team members with whom they had to perform a group triathlon. Three values (low, medium, high) of the other team members’ abilities to perform in their parts of the triathlon (swimming and biking respectively) were combined in a 3x3 full factorial design (Anderson, 1982) yielding nine groups. Subjects were asked how confident they were that the teams would perform well in the task (individual group efficacy beliefs), and to provide information about their motivation to perform at their best in the respective group contexts (performance motivation). Multilevel modeling (Mplus) was used to estimate the effects of the factors swim and bike, and the context-varying covariate individual group efficacy beliefs on performance motivation. Further analyses were undertaken to test if the effects of group contexts on performance motivation are mediated by individual group efficacy beliefs. Results: Significant effects were reported for both the group characteristics (βswim = 7.86; βbike = 8.57; both p < .001) and the individual group efficacy beliefs (βigeb; .40, p < .001) on performance motivation. The subsequent mediation model indicated that the effects of group characteristics on performance motivation were partly mediated by the individual group efficacy beliefs of the subjects with significant mediation effects for both factors swim and bike. Discussion/Conclusion: The results of the study provide further support for the motivational character of efficacy beliefs and point out a mechanism by which team characteristics influence performance relevant factors at the level of individual team members. The study indicates that high team abilities lead to augmented performance motivation, adding a psychological advantage to teams already high on task relevant abilities. Future investigations will be aiming at possibilities to keep individual performance motivation high in groups with low task relevant abilities. One possibility could be the formulation of individual task goals. References: Anderson, N. H. (1982). Methods of information integration theory. New York: Academic Press. Bandura, A. & Locke, E. A. (2003). Negative self-efficacy and goal effects revisited. Journal of Applied Psychology, 88, 87-99. Cranach, M. von, Ochsenbein, G. & Valach, L. (1986). The group as a self-active system: Outline of a theory of group action. European Journal of Social Psychology, 16, 193-229.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Urban economic activities are an essential facet in defining city identity. Traditional approaches rely very often on the most theoretical and quantitative features of the studies, excluding de-facto a direct association between those findings and the tangible subject of the analysis. To fill the gap, the Big Data era and information visualization methodologies could help analysts, stakeholders and general audience to gain a new insight on the field. In this paper, we want to provide some food for thought about new opportunities arising in visual urban economies as well as present some visual results on possible scenarios.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In the cerebral cortex, the small volume of the extracellular space in relation to the volume enclosed by synapses suggests an important functional role for this relationship. It is well known that there are atoms and molecules in the extracellular space that are absolutely necessary for synapses to function (e.g., calcium). I propose here the hypothesis that the rapid shift of these atoms and molecules from extracellular to intrasynaptic compartments represents the consumption of a shared, limited resource available to local volumes of neural tissue. Such consumption results in a dramatic competition among synapses for resources necessary for their function. In this paper, I explore a theory in which this resource consumption plays a critical role in the way local volumes of neural tissue operate. On short time scales, this principle of resource consumption permits a tissue volume to choose those synapses that function in a particular context and thereby helps to integrate the many neural signals that impinge on a tissue volume at any given moment. On longer time scales, the same principle aids in the stable storage and recall of information. The theory provides one framework for understanding how cerebral cortical tissue volumes integrate, attend to, store, and recall information. In this account, the capacity of neural tissue to attend to stimuli is intimately tied to the way tissue volumes are organized at fine spatial scales.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Enterprise systems interoperability (ESI) is an important topic for business currently. This situation is evidenced, at least in part, by the number and extent of potential candidate protocols for such process interoperation, viz., ebXML, BPML, BPEL, and WSCI. Wide-ranging support for each of these candidate standards already exists. However, despite broad acceptance, a sound theoretical evaluation of these approaches has not yet been provided. We use the Bunge-Wand-Weber (BWW) models, in particular, the representation model, to provide the basis for such a theoretical evaluation. We, and other researchers, have shown the usefulness of the representation model for analyzing, evaluating, and engineering techniques in the areas of traditional and structured systems analysis, object-oriented modeling, and process modeling. In this work, we address the question, what are the potential semantic weaknesses of using ebXML alone for process interoperation between enterprise systems? We find that users will lack important implementation information because of representational deficiencies; due to ontological redundancy, the complexity of the specification is unnecessarily increased; and, users of the specification will have to bring in extra-model knowledge to understand constructs in the specification due to instances of ontological excess.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In order to bridge the “Semantic gap”, a number of relevance feedback (RF) mechanisms have been applied to content-based image retrieval (CBIR). However current RF techniques in most existing CBIR systems still lack satisfactory user interaction although some work has been done to improve the interaction as well as the search accuracy. In this paper, we propose a four-factor user interaction model and investigate its effects on CBIR by an empirical evaluation. Whilst the model was developed for our research purposes, we believe the model could be adapted to any content-based search system.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Risk and knowledge are two concepts and components of business management which have so far been studied almost independently. This is especially true where risk management is conceived mainly in financial terms, as, for example, in the banking sector. The banking sector has sophisticated methodologies for managing risk, such as mathematical risk modeling. However. the methodologies for analyzing risk do not explicitly include knowledge management for risk knowledge creation and risk knowledge transfer. Banks are affected by internal and external changes with the consequent accommodation to new business models new regulations and the competition of big players around the world. Thus, banks have different levels of risk appetite and policies in risk management. This paper takes into consideration that business models are changing and that management is looking across the organization to identify the influence of strategic planning, information systems theory, risk management and knowledge management. These disciplines can handle the risks affecting banking that arise from different areas, but only if they work together. This creates a need to view them in an integrated way. This article sees enterprise risk management as a specific application of knowledge in order to control deviation from strategic objectives, shareholders' values and stakeholders' relationships. Before and after a modeling process it necessary to find insights into how the application of knowledge management processes can improve the understanding of risk and the implementation of enterprise risk management. The article presents a propose methodology to contribute to providing a guide for developing risk modeling knowledge and a reduction of knowledge silos, in order to improve the quality and quantity of solutions related to risk inquiries across the organization.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Heterogeneous and incomplete datasets are common in many real-world visualisation applications. The probabilistic nature of the Generative Topographic Mapping (GTM), which was originally developed for complete continuous data, can be extended to model heterogeneous (i.e. containing both continuous and discrete values) and missing data. This paper describes and assesses the resulting model on both synthetic and real-world heterogeneous data with missing values.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The information constitutes one of the most valuable strategic assets for the organization. However, the organizational environment in which it is inserted is very complex and heterogeneous, making emerging issues relevant to the Governance of information technology (IT) and Information Security. Academic Studies and market surveys indicate that the origin of most accidents with the information assets is the behavior of people organization itself rather than external attacks. Taking as a basis the promotion of a culture of safety among users and ensuring the protection of information in their properties of confidentiality, integrity and availability, organizations must establish its Information Security Policy (PSI). This policy is to formalise the guidelines in relation to the security of corporate information resources, in order to avoid that the asset vulnerabilities are exploited by threats and can bring negative consequences to the business. But, for the PSI being effective, it is required that the user have readiness to accept and follow the procedures and safety standards. In the light of this context, the present study aims to investigate what are the motivators extrinsic and intrinsic that affect the willingness of the user to be in accordance with the organization's security policies. The theoretical framework addresses issues related to IT Governance, Information Security, Theory of deterrence, Motivation and Behavior Pro-social. It was created a theoretical model based on the studies of Herath and Rao (2009) and D'Arcy, Hovav and Galletta (2009) that are based on General Deterrence Theory and propose the following influencing factors in compliance with the Policy: Severity of Punishment, Certainty of Detection, Peer Behaviour, Normative Beliefs, Perceived Effectiveness and Moral Commitment. The research used a quantitative approach, descriptive. The data were collected through a questionnaire with 18 variables with a Likert scale of five points representing the influencing factors proposed by the theory. The sample was composed of 391 students entering the courses from the Center for Applied Social Sciences of the Universidade Federal do Rio Grande do Norte. For the data analysis, were adopted the techniques of Exploratory Factor Analysis, Analysis of Cluster hierarchical and nonhierarchical, Logistic Regression and Multiple Linear Regression. As main results, it is noteworthy that the factor severity of punishment is what contributes the most to the theoretical model and also influences the division of the sample between users more predisposed and less prone. As practical implication, the research model applied allows organizations to provide users less prone and, with them, to carry out actions of awareness and training directed and write Security Policies more effective.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This chapter examines disclosures of US asset-backed securities in terms of information asymmetry theory and risk symmetry.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This article presents results of two research projects that explored the coverage of the Student Movement 2011 carried out by two chains of newspaper of Chile: El Mercurio S.A.P and Diarios Mi Voz, in three regions of the country. These press chains correspond to paper and digital press, respectively. In this research, we analyze information and photographs allowed to establish changes in journalistic practices as well as similarities in the ways of representing the student movement.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Ageing of the population is a worldwide phenomenon. Numerous ICT-based solutions have been developed for elderly care but mainly connected to the physiological and nursing aspects in services for the elderly. Social work is a profession that should pay attention to the comprehensive wellbeing and social needs of the elderly. Many people experience loneliness and depression in their old age, either as a result of living alone or due to a lack of close family ties and reduced connections with their culture of origin, which results in an inability to participate actively in community activities (Singh & Misra, 2009). Participation in society would enhance the quality of life. With the development of information technology, the use of technology in social work practice has risen dramatically. The aim of this literature review is to map out the state of the art of knowledge about the usage of ICT in elderly care and to figure out research-based knowledge about the usability of ICT for the prevention of loneliness and social isolation of elderly people. The data for the current research comes from the core collection of the Web of Science and the data searching was performed using Boolean? The searching resulted in 216 published English articles. After going through the topics and abstracts, 34 articles were selected for the data analysis that is based on a multi approach framework. The analysis of the research approach is categorized according to some aspects of using ICT by older adults from the adoption of ICT to the impact of usage, and the social services for them. This literature review focused on the function of communication by excluding the applications that mainly relate to physical nursing. The results show that the so-called ‘digital divide’ still exists, but the older adults have the willingness to learn and utilise ICT in daily life, especially for communication. The data shows that the usage of ICT can prevent the loneliness and social isolation of older adults, and they are eager for technical support in using ICT. The results of data analysis on theoretical frames and concepts show that this research field applies different theoretical frames from various scientific fields, while a social work approach is lacking. However, a synergic frame of applied theories will be suggested from the perspective of social work.