897 resultados para conceptual understanding
Resumo:
Includes bibliography
Resumo:
Although information systems (IS) problem solving involves knowledge of both the IS and application domains, little attention has been paid to the role of application domain knowledge. In this study, which is set in the context of conceptual modeling, we examine the effects of both IS and application domain knowledge on different types of schema understanding tasks: syntactic and semantic comprehension tasks and schema-based problem-solving tasks. Our thesis was that while IS domain knowledge is important in solving all such tasks, the role of application domain knowledge is contingent upon the type of understanding task under investigation. We use the theory of cognitive fit to establish theoretical differences in the role of application domain knowledge among the different types of schema understanding tasks. We hypothesize that application domain knowledge does not influence the solution of syntactic and semantic comprehension tasks for which cognitive fit exists, but does influence the solution of schema-based problem-solving tasks for which cognitive fit does not exist. To assess performance on different types of conceptual schema understanding tasks, we conducted a laboratory experiment in which participants with high- and low-IS domain knowledge responded to two equivalent conceptual schemas that represented high and low levels of application knowledge (familiar and unfamiliar application domains). As expected, we found that IS domain knowledge is important in the solution of all types of conceptual schema understanding tasks in both familiar and unfamiliar applications domains, and that the effect of application domain knowledge is contingent on task type. Our findings for the EER model were similar to those for the ER model. Given the differential effects of application domain knowledge on different types of tasks, this study highlights the importance of considering more than one application domain in designing future studies on conceptual modeling.
Resumo:
Purpose Small and Medium-sized Enterprises (SMEs), which form a significant portion in many economies, are some of the most vulnerable to the impact of Extreme Weather Events (EWEs). This is of particular importance to the construction industry, as an overarching majority of construction companies are SMEs who account for the majority of employment and income generation within the industry. In the UK, previous research has identified construction SMEs as some of the worst affected by EWEs. Design/methodology/approach Given the recent occurrences of EWEs and predictions suggesting increases in both the intensity and frequency of EWEs in the future, improving the resilience of construction SMEs is vital for achieving a resilient construction industry. A conceptual framework is first developed which is then populated and expanded based on empirical evidence. Positioned within a pragmatic research philosophy, case study research strategy was adopted as the overall research strategy in undertaking this investigation. Findings Based on the findings of two in-depth case studies of construction SMEs, a framework was developed to represent EWE resilience of construction SMEs, where resilience was seen as a collective effect of vulnerability, coping strategies and coping capacities of SMEs, characteristics of the EWE and the wider economic climate. Originality/value The paper provides an original contribution towards the overarching agenda of the resilience of SMEs, and policy making in the area of EWE risk management by presenting a novel conceptual framework depicting the resilience of medium-sized construction companies.
Resumo:
This thesis developed a conceptual framework aimed at enhancing our understanding of contemporary child slavery. A new variety of slavery exists today, the result of forms of forced servitude that existed alongside slavery many centuries ago. This is tantamount to slavery. There is, however, a critical lack of awareness about important aspects of the reality of this new child slavery. The framework and definitions of slavery in usage today, though interesting and sufficient to cover historical situations, are unable to adequately describe the conditions of the child slavery. Using existing literature and research, this thesis conceptualized children's labor in a manner that allows a clearer perception of the exploitation of their labor within and beyond the household. Explanatory factors such as culture, the age of victims, the number of hours worked and the ability or not of the victim to volunteer or withdraw their participation in the specific activities were employed to determine if particular situations should be considered as child slavery, repressive child labor or merely as child work. Important distinctions were made between the use of children's mental and physical energy in defined activities. ^
Resumo:
We developed a conceptual ecological model (CEM) for invasive species to help understand the role invasive exotics have in ecosystem ecology and their impacts on restoration activities. Our model, which can be applied to any invasive species, grew from the eco-regional conceptual models developed for Everglades restoration. These models identify ecological drivers, stressors, effects and attributes; we integrated the unique aspects of exotic species invasions and effects into this conceptual hierarchy. We used the model to help identify important aspects of invasion in the development of an invasive exotic plant ecological indicator, which is described a companion paper in this special issue journal. A key aspect of the CEM is that it is a general ecological model that can be tailored to specific cases and species, as the details of any invasion are unique to that invasive species. Our model encompasses the temporal and spatial changes that characterize invasion, identifying the general conditions that allow a species to become invasive in a de novo environment; it then enumerates the possible effects exotic species may have collectively and individually at varying scales and for different ecosystem properties, once a species becomes invasive. The model provides suites of characteristics and processes, as well as hypothesized causal relationships to consider when thinking about the effects or potential effects of an invasive exotic and how restoration efforts will affect these characteristics and processes. In order to illustrate how to use the model as a blueprint for applying a similar approach to other invasive species and ecosystems, we give two examples of using this conceptual model to evaluate the status of two south Florida invasive exotic plant species (melaleuca and Old World climbing fern) and consider potential impacts of these invasive species on restoration.
Resumo:
A correct understanding about how computers run code is mandatory in order to effectively learn to program. Lectures have historically been used in programming courses to teach how computers execute code, and students are assessed through traditional evaluation methods, such as exams. Constructivism learning theory objects to students passiveness during lessons, and traditional quantitative methods for evaluating a complex cognitive process such as understanding. Constructivism proposes complimentary techniques, such as conceptual contraposition and colloquies. We enriched lectures of a Programming II (CS2) course combining conceptual contraposition with program memory tracing, then we evaluated students understanding of programming concepts through colloquies. Results revealed that these techniques applied to the lecture are insufficient to help students develop satisfactory mental models of the C++ notional machine, and colloquies behaved as the most comprehensive traditional evaluations conducted in the course.
Resumo:
Objectives: There is a need for a more comprehensive understanding of how coaching processes psychologically operate. This paper presents the findings from a study aimed to characterise the coaching process experience and to identify how specific experiences contribute to coaching outcomes. Design: A qualitative design was adopted. Data was analysed by Interpretative Phenomenological Analysis (Smith, 2008). Method: Data was collected from 10 participants, this included coaches (N=4), coachees (N=5) and one commissioner, three times along the coaching process. A total of 30 interviews were undertaken. Findings: Coaching outcomes can be generated by three essential mechanisms: Projection of Future Self; Perspectivation of Present Self; and Confirmation of Past/Present Self. Each mechanism’s name represents a particular effect on coachee’s self and may evolve diverse coaching behaviours. Although they all can be actively managed to generate sustainability of outcomes, each mechanism tends to contribute differently to that sustainability. Conclusion: The study provides a comprehensive understanding of the different methodological and experiential ingredients of the coaching process and its implications. While most coaching research is focused on identifying coaching results based on a retrospective analysis, this is one of the first studies accompanying longitudinally the coaching process and capturing an integrative understanding of its dynamics. Moreover, the study provides evidence of how coaching can differently deliver sustainable outcomes and be used as a valuable developmental tool in organisations. The study contributes to our understanding of theory building and raises questions for further research on the uniqueness of coaching interventions.
Resumo:
The next phase envisioned for the World Wide Web is automated ad-hoc interaction between intelligent agents, web services, databases and semantic web enabled applications. Although at present this appears to be a distant objective, there are practical steps that can be taken to advance the vision. We propose an extension to classical conceptual models to allow the definition of application components in terms of public standards and explicit semantics, thus building into web-based applications, the foundation for shared understanding and interoperability. The use of external definitions and the need to store outsourced type information internally, brings to light the issue of object identity in a global environment, where object instances may be identified by multiple externally controlled identification schemes. We illustrate how traditional conceptual models may be augmented to recognise and deal with multiple identities.
Resumo:
This program of research examines the experience of chronic pain in a community sample. While, it is clear that like patient samples, chronic pain in non-patient samples is also associated with psychological distress and physical disability, the experience of pain across the total spectrum of pain conditions (including acute and episodic pain conditions) and during the early course of chronic pain is less clear. Information about these aspects of the pain experience is important because effective early intervention for chronic pain relies on identification of people who are likely to progress to chronicity post-injury. A conceptual model of the transition from acute to chronic pain was proposed by Gatchel (1991a). In brief, Gatchel’s model describes three stages that individuals who have a serious pain experience move through, each with worsening psychological dysfunction and physical disability. The aims of this program of research were to describe the experience of pain in a community sample in order to obtain pain-specific data on the problem of pain in Queensland, and to explore the usefulness of Gatchel’s Model in a non-clinical sample. Additionally, five risk factors and six protective factors were proposed as possible extensions to Gatchel’s Model. To address these aims, a prospective longitudinal mixed-method research design was used. Quantitative data was collected in Phase 1 via a comprehensive postal questionnaire. Phase 2 consisted of a follow-up questionnaire 3 months post-baseline. Phase 3 consisted of semi-structured interviews with a subset of the original sample 12 months post follow-up, which used qualitative data to provide a further in-depth examination of the experience and process of chronic pain from respondents’ point of view. The results indicate chronic pain is associated with high levels of anxiety and depressive symptoms. However, the levels of disability reported by this Queensland sample were generally lower than those reported by clinical samples and consistent with disability data reported in a New South Wales population-based study. With regard to the second aim of this program of research, while some elements of the pain experience of this sample were consistent with that described by Gatchel’s Model, overall the model was not a good fit with the experience of this non-clinical sample. The findings indicate that passive coping strategies (minimising activity), catastrophising, self efficacy, optimism, social support, active strategies (use of distraction) and the belief that emotions affect pain may be important to consider in understanding the processes that underlie the transition to and continuation of chronic pain.
Resumo:
Classroom talk has long been recognised as central to student learning. Efforts are made therefore to 'stretch', 'extend' or 'push' English-language learners' (ELLS') linguistic and conceptual development by promoting more complex instructional talk. Conversation is a two-way activity, yet the focus is often directed to the ELL. To address this gap, this article suggests ideas for developing the capabilities of all students -- ELLS or otherwise -- for instructional conversations in mainstream classrooms where English is used by some as a first or only language, and by others as a second language.
Resumo:
Understanding the complex dynamic and uncertain characteristics of organisational employees who perform authorised or unauthorised information security activities is deemed to be a very important and challenging task. This paper presents a conceptual framework for classifying and organising the characteristics of organisational subjects involved in these information security practices. Our framework expands the traditional Human Behaviour and the Social Environment perspectives used in social work by identifying how knowledge, skills and individual preferences work to influence individual and group practices with respect to information security management. The classification of concepts and characteristics in the framework arises from a review of recent literature and is underpinned by theoretical models that explain these concepts and characteristics. Further, based upon an exploratory study of three case organisations in Saudi Arabia involving extensive interviews with senior managers, department managers, IT managers, information security officers, and IT staff; this article describes observed information security practices and identifies several factors which appear to be particularly important in influencing information security behaviour. These factors include values associated with national and organisational culture and how they manifest in practice, and activities related to information security management.