888 resultados para Information behaviour


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper seeks to address the widespread call in the literature for the cross-cultural examination ( and validation) of accepted concepts within consumer behaviour, such as consumer risk perceptions and information search. The findings of the study provide support for a number of accepted relationships, whilst identifying distinct cross cultural differences in external information search and willingness to buy genetically modified (GM) food products by consumers.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recommender Systems is one of the effective tools to deal with information overload issue. Similar with the explicit rating and other implicit rating behaviours such as purchase behaviour, click streams, and browsing history etc., the tagging information implies user’s important personal interests and preferences information, which can be used to recommend personalized items to users. This paper is to explore how to utilize tagging information to do personalized recommendations. Based on the distinctive three dimensional relationships among users, tags and items, a new user profiling and similarity measure method is proposed. The experiments suggest that the proposed approach is better than the traditional collaborative filtering recommender systems using only rating data.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the most predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Objective: To systematically review the published evidence of the impact of health information technology (HIT) on the quality of medical and health care specifically clinicians’ adherence to evidence-based guidelines and the corresponding impact this had on patient clinical outcomes. In order to be as inclusive as possible the research examined literature discussing the use of health information technologies and systems in both medical care such as clinical and surgical, and other health care such as allied health and preventive services.----- Design: Systematic review----- Data Sources: Relevant literature was systematically searched on English language studies indexed in MEDLINE and CINAHL(1998 to 2008), Cochrane Library, PubMed, Database of Abstracts of Review of Effectiveness (DARE), Google scholar and other relevant electronic databases. A search for eligible studies (matching the inclusion criteria) was also performed by searching relevant conference proceedings available through internet and electronic databases, as well as using reference lists identified from cited papers.----- Selection criteria: Studies were included in the review if they examined the impact of Electronic Health Record (EHR), Computerised Provider Order-Entry (CPOE), or Decision Support System (DS); and if the primary outcomes of the studies were focused on the level of compliance with evidence-based guidelines among clinicians. Measures could be either changes in clinical processes resulting from a change of the providers’ behaviour or specific patient outcomes that demonstrated the effectiveness of a particular treatment given by providers. ----- Methods: Studies were reviewed and summarised in tabular and text form. Due to heterogeneity between studies, meta-analysis was not performed.----- Results: Out of 17 studies that assessed the impact of health information technology on health care practitioners’ performance, 14 studies revealed a positive improvement in relation to their compliance with evidence-based guidelines. The primary domain of improvement was evident from preventive care and drug ordering studies. Results from the studies that included an assessment for patient outcomes however, were insufficient to detect either clinically or statistically important improvements as only a small proportion of these studies found benefits. For instance, only 3 studies had shown positive improvement, while 5 studies revealed either no change or adverse outcomes.----- Conclusion: Although the number of included studies was relatively small for reaching a conclusive statement about the effectiveness of health information technologies and systems on clinical care, the results demonstrated consistency with other systematic reviews previously undertaken. Widescale use of HIT has been shown to increase clinician’s adherence to guidelines in this review. Therefore, it presents ongoing opportunities to maximise the uptake of research evidence into practice for health care organisations, policy makers and stakeholders.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Social and psychological theories have provided a plethora of evidence showing that the physical difficulty to express appropriate social interactions between drivers expresses itself in aggression, selfish driving and anti-social behaviour. Therefore there is a need to improve interactions between drivers and allow clearer collective decision making between them. Personal characteristics and the driving situations play strong roles in driver’s aggression. Our approach is centered around the driving situation as opposed to focusing on personality characteristics. It examines aggression and manipulates contextual variables such as driver’s eye contact exchanges. This paper presents a new unobtrusive in-vehicle system that aims at communicating drivers’ intentions, elicit social responses and increasing mutual awareness. It uses eye gaze as a social cue to affect collective decision making with the view to contribute to safe driving. The authors used a driving simulator to design a case control experiment in which eye gaze movements are conveyed with an avatar. Participants were asked to drive through different types of intersections. An avatar representing the head of the other driver was displayed and driver behaviour was analysed. Significant eye gaze pattern difference where observed when an avatar was displayed. Drivers cautiously refer to the avatar when information is required on the intention of others (e.g. when they do not have the right of way). The majority of participants reported the perception of “being looked at”. The number of glances and time spent gazing at the avatar did not indicate an unsafe distraction by standards of in-vehicle device ergonomic design. Avatars were visually consulted primarily in less demanding driving situations, which underlines their non-distractive nature.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Market failures involving the sale of complex merchandise, such as residential property, financial products and credit, have principally been attributed to information asymmetries. Existing legislative and regulatory responses were developed having regard to consumer protection policies based on traditional economic theories that focus on the notion of the ‘rational consumer’. Governmental responses therefore seek to impose disclosure obligations on sellers of complex goods or products to ensure that consumers have sufficient information upon which to make a decision. Emergent research, based on behavioural economics, challenges traditional ideas and instead focuses on the actual behaviour of consumers. This approach suggests that consumers as a whole do not necessarily benefit from mandatory disclosure because some, if not most, consumers do not pay attention to the disclosed information before they make a decision to purchase. The need for consumer policies to take consumer characteristics and behaviour into account is being increasingly recognised by governments, and most recently in the policy framework suggested by the Australian Productivity Commission

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The call for the cross cultural examination and validation of commonly accepted relationships within consumer behaviour is strengthening. Consequently, this paper seeks to address this call by examining consumer risk perceptions, reliance on country of origin information and willingness to buy Genetically Modified (GM) food products on Australian and South Korean consumers. Findings indicate a number of cross cultural similarities and differences that have both theoretical and practical implications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Genetically modified (GM) food products are the source of much controversy and in the context of consumer behaviour, the way in which consumers perceive such food products is of paramount importance both theoretically and practically. Despite this, relatively little research has focused on GM food products from a consumer perspective, and as such, this study seeks to better understand what effects consumer willingness to buy GM food products in Australian consumers.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper illustrates the prediction of opponent behaviour in a competitive, highly dynamic, multi-agent and partially observable environment, namely RoboCup small size league robot soccer. The performance is illustrated in the context of the highly successful robot soccer team, the RoboRoos. The project is broken into three tasks; classification of behaviours, modelling and prediction of behaviours and integration of the predictions into the existing planning system. A probabilistic approach is taken to dealing with the uncertainty in the observations and with representing the uncertainty in the prediction of the behaviours. Results are shown for a classification system using a Naïve Bayesian Network that determines the opponent’s current behaviour. These results are compared to an expert designed fuzzy behaviour classification system. The paper illustrates how the modelling system will use the information from behaviour classification to produce probability distributions that model the manner with which the opponents perform their behaviours. These probability distributions are show to match well with the existing multi-agent planning system (MAPS) that forms the core of the RoboRoos system.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Remote monitoring of animal behaviour in the environment can assist in managing both the animal and its environmental impact. GPS collars which record animal locations with high temporal frequency allow researchers to monitor both animal behaviour and interactions with the environment. These ground-based sensors can be combined with remotely-sensed satellite images to understand animal-landscape interactions. The key to combining these technologies is communication methods such as wireless sensor networks (WSNs). We explore this concept using a case-study from an extensive cattle enterprise in northern Australia and demonstrate the potential for combining GPS collars and satellite images in a WSN to monitor behavioural preferences and social behaviour of cattle.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents research that is being conducted by the Commonwealth Scientific and Industrial Research Organisation (CSIRO) with the aim of investigating the use of wireless sensor networks for automated livestock monitoring and control. It is difficult to achieve practical and reliable cattle monitoring with current conventional technologies due to challenges such as large grazing areas of cattle, long time periods of data sampling, and constantly varying physical environments. Wireless sensor networks bring a new level of possibilities into this area with the potential for greatly increased spatial and temporal resolution of measurement data. CSIRO has created a wireless sensor platform for animal behaviour monitoring where we are able to observe and collect information of animals without significantly interfering with them. Based on such monitoring information, we can identify each animal's behaviour and activities successfully

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The popularity of social networking sites (SNSs) among adolescents has grown exponentially, with little accompanying research to understand the influences on adolescent engagement with this technology. The current study tested the validity of an extended theory of planned behaviour model (TPB), incorporating the additions of group norm and self-esteem influences, to predict frequent SNS use. Adolescents (N = 160) completed measures assessing the standard TPB constructs of attitude, subjective norm, perceived behavioural control (PBC), and intention, as well as group norm and self-esteem. One week later, participants reported their SNS use during the previous week. Support was found for the standard TPB variables of attitude and PBC, as well as group norm, in predicting intentions to use SNS frequently, with intention, in turn, predicting behaviour. These findings provide an understanding of the factors influencing frequent engagement in what is emerging as a primary tool for adolescent socialisation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Young drivers are at higher risk of crashes than other drivers when carrying passengers. Graduated Driver Licensing has demonstrated effectiveness in reducing fatalities however there is considerable potential for additional strategies to complement the approach. A survey with 276 young adults (aged 17-25 years, 64% females) was conducted to examine the potential and importance of strategies that are delivered via the Internet and potential strategies for passengers. Strategies delivered via the Internet represent opportunity for widespread dissemination and greater reach to young people at times convenient to them. The current study found some significant differences between males and females with regard to ways the Internet is used to obtain road safety information and the components valued in trusted road safety sites. There were also significant differences between males and females on the kinds of strategies used as passengers to promote driver safety and the context in which it occurred, with females tending to take more proactive strategies than males. In sum, young people see value in Internet delivery for passenger safety information (80% agreed/ strongly agreed) and more than 90% thought it was important to intervene while a passenger of a risky driver. Thus tailoring Internet road safety strategies to young people may differ for males and females however there is considerable potential for a passenger focus in strategies aimed at reducing young driver crashes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Before making a security or privacy decision, Internet users should evaluate several security indicators in their browser, such as the use of HTTPS (indicated via the lock icon), the domain name of the site, and information from extended validation certificates. However, studies have shown that human subjects infrequently employ these indicators, relying on other indicators that can be spoofed and convey no cryptographic assurances. We identify four simple security indicators that accurately represent security properties of the connection and then examine 125 popular websites to determine if the sites' designs result in correctly displayed security indicators during login. In the vast majority of cases, at least some security indicators are absent or suboptimal. This suggests users are becoming habituated to ignoring recommended security indicators.