61 |
Behavioural complexity theory of media selection: A proposed theory for global virtual teamsShachaf, Pnina, Hara, Noriko January 2007 (has links)
This study proposes a behavioural complexity theory for media selection in global virtual teams. This theory captures multiple contingencies into one holistic approach to media selection. Unlike existing linear and mechanistic theories of media selection, this heuristic theory moves away from the universal models that were previously proposed. The behavioural complexity theory assumes ambiguity and complexity of the media selection process in a nonlinear, organic, and holistic way. Behavioural complexity theory of media selection emphasizes the role of media repertoire, the ability of individuals to differentiate situations according to multiple contingencies, and their flexibility to effectively use multiple media in any particular situation. This theory is examined in a context of exploratory case study of global virtual teamsâ media selection in one of the leading fortune 500 corporations.
|
62 |
Transforming Health Care Through Information TechnologyGray, James N., Hillis, W. Daniel, Kahn, Robert E., Kennedy, Ken, Miller, John P., Nagel, David C., Shortliffe, Edward H., Smarr, Larry, Thompson, Joe F., Vadasz, Leslie, Viterbi, Andrew J., Wallach, Steven J. 02 1900 (has links)
In Transforming Health Care Through Information Technology the PITAC offers six key recommendations that could significantly expand access to health care, improve its quality, reduce its costs, and transform the conduct of biomedical research. The PITAC sees these recommendations as critical steps toward addressing the challenges that exist to improving Americans' health and health care:
*Establish pilot projects and Enabling Technology Centers to extend the practical uses of information technology to health care systems and biomedical research;
*NIH, in close collaboration with NSF, DARPA, and DOE, should design and deploy a scalable national computing and information infrastructure to support the biomedical research community;
*Congress should enhance existing privacy rules by enacting legislation that assures sound practices for managing personally identifiable health information;
Establish programs to increase the pool of biomedical research and health care professionals with training at the intersection of health and information technology;
*DHHS should outline its vision for using IT to improve health care and subsequently devote the resources to conduct the IT research critical to accomplishing these goals in the long term; and
*DHHS should appoint a senior information technology leader to provide strategic leadership across DHHS and focus on the importance of information technology in addressing pressing problems in health care
|
63 |
An analysis of automated solutions for the Certification and Accreditation of navy medicine information assetsGonzales, Dominic V. 09 1900 (has links)
A process.
|
64 |
An Empirical Investigation of Factors Affecting Resistance to Using Multi-Method Authentication Systems in Public-Access EnvironmentsMarnell, Joseph W. 17 August 2016 (has links)
<p> Over the course of history, different means of object and person identification as well as verification have evolved for user authentication. In recent years, a new concern has emerged regarding the accuracy of verifiable authentication and protection of personal identifying information (PII), because previous misuses have resulted in significant financial loss. Such losses have escalated more noticeably because of human identity-theft incidents due to breaches of PII within multiple public-access environments. Although the use of various biometric and radio frequency identification (RFID) technologies is expanding, resistance to using these technologies for user authentication remains an issue. This study addressed the effect of individuals’ perceptions on their resistance to using multi-method authentication systems (RMS) in public-access environments and uncovered key constructs that may significantly contribute to such resistance.</p><p> This study was a predictive study to assess the contributions of individuals’ perceptions of the importance of organizational protection of their PII, noted as Perceived Value of Organizational Protection of PII (PVOP), authentication complexity (AC), and invasion of privacy (IOP) on their resistance to using multi-method authentication systems (RMS) in public-access environments. Moreover, this study also investigated if there were any significant differences on the aforementioned constructs based on age, gender, prior experience with identity theft, and acquaintance experience with identity theft. As part of this study, a rollout project was implemented of multi-factor biometric and RFID technologies for system authentication prior to electronic-commerce (e-commerce) use in public-access environments. The experimental group experienced the multi-factor authentication and also was trained on its use. Computer users (faculty & students) from a small, private university participated in the study to determine their level of PVOP, IOP, and AC on their resistance to using the technology in public-access environments. Multiple Linear Regression (MLR) was used to formulate a model and test predictive power along with the significance of the contribution of the aforementioned constructs on RMS. The results show that all construct measures demonstrated very high reliability. The results also indicate that the experimental group of the multi-factor authentication had lower resistance than the control group that didn’t use the technology. The mean increases indicate an overall statistically significant difference between the experimental and control groups overall. The results also demonstrate that students and participants’ increased levels of education indicate an overall statistically significant decrease in resistance. The findings demonstrate that overall computer authentication training do provide added value in the context of measuring resistance to using newer multi-method authentication technology.</p>
|
65 |
The application of natural language processing to open source intelligence for ontology development in the advanced persistent threat domainHolzer, Corey T. 09 March 2017 (has links)
<p> Over the past decade, the Advanced Persistent Threat (APT) has risen to forefront of cybersecurity threats. APTs are a major contributor to the billions of dollars lost by corporations around the world annually. The threat is significant enough that the <i>Navy Cyber Power 2020</i> plan identified them as a “must mitigate” threat in order to ensure the security of its warfighting network. </p><p> Reports, white papers, and various other open source materials offer a plethora of information to cybersecurity professionals regarding these APT attacks and the organizations behind them but mining and correlating information out of these various sources needs the support of standardized language and a common understand of terms that comes from an accepted APT ontology. </p><p> This paper and its related research applies the science of Natural Language Processing Open Source Intelligence in order to build an open source Ontology in the APT domain with the goal of building a dictionary and taxonomy for this complex domain.</p>
|
66 |
Les enjeux juridiques de l'accès à l'information génétique / Legal issues related to access of genetic informationPigeon, Anna 31 March 2016 (has links)
La circulation de l'information génétique humaine via internet connait un succès mondial aussi bien dans le monde scientifique que médical et qu'auprès du grand public. Dans le cas des propositions de tests génétiques directement au public par des entreprises, l'offre échappe de facto au cadre juridique national et au système de santé. Dès lors il convient tout d'abord de préciser le concept de l'information génétique et son statut, véritable enjeux juridique. Le cadre réglementaire français et européen est morcelé ce qui induit une insécurité juridique pour les acteurs impliqués. Il existe donc un véritable enjeu juridique dans la définition même de ce concept ainsi que dans la clarification et la proposition de ce statut. Le corpus juridique et normatif sera décrit et analysé afin de proposer une typologie de l'information génétique, de ses modes de production, et de ses utilisations. Puis une analyse des fondements juridiques qui justifient la spécificité de l'encadrement actuel de cette information génétique sera effectuée. La troisième étape consistera à analyser les spécificités de la disposition de l'information génétique via internet. Ce domaine est particulièrement riche d'enjeux juridiques nationaux et internationaux. Enfin des propositions critiques de cadres juridiques clôtureront la réflexion. / Le résumé en anglais n'a pas été communiqué par l'auteur.
|
67 |
Le rôle de l'information en droit des entreprises en difficulté / The Role of Information in bankruptcy lawOuld Eba, Moussa 16 December 2013 (has links)
L’information est un moyen de gestion fiable et une garantie indispensable pour la protection des intérêts des acteurs de l’activité économique. Elle joue un rôle important dans la prévention et le traitement des difficultés des entreprises. En effet, à la lumière des informations comptables, financières et sociales, les dirigeants peuvent prévenir les difficultés et prendre les décisions adaptées à la situation de l’entreprise. Toutefois, en cas de procédures collectives, le besoin de protection se substitue à celui de prévention. Le rôle de l’information est dès lors de garantir le bon déroulement de la procédure collective et d’assurer la protection des intérêts des parties. / Information is a reliable means of management and essential for the protection of the interests of actors in economic activity. It plays an important role in the prevention and treatment of business difficulties. Indeed, in light of the accounting, financial and social information, managers can prevent problems and make decisions appropriate to the situation of the company. However, in case of insolvency, the need for protection is substituted for that of prevention. The role of information is therefore to ensure the smooth running of insolvency and to protect the interests of the parties.
|
68 |
What Factors Influence the Use of the Public Library for Health Information?Unknown Date (has links)
The purpose of this study is to understand public library users' health information seeking behaviors and what factors may
influence the intention of an individual to use the public library as their health information resource. This study used the Theory of
Planned Behavior (TPB) as the theoretical framework, which provided essential motivation and behavior factors, including Attitude toward
seeking health information at the public library (ATT), Subjective Norm (SN), and Perceived Behavior Control (PBC). This study expanded on
TPB to add the perceptions of the quality of health information and an individual's health literacy level. These factors may indicate an
individual's intention to use the public library as a primary health information source. In this study, five hypotheses were measured and
analyzed. Attitude (H1), Subjective Norm (H2), Perceived Behavior Control (H3), Perception of health information quality (H4), and Health
literacy (H5) will independently influence the behavior intention to use the public library for health information. After IRB approval, a
pilot study was conducted to determine the reliability and validity of the survey questions. The survey consisted of three parts: (1)
questions about public library users' behavior; (2) measurement of health information seeking behavior, questions related to the TPB
variables and questions about the perception of the quality of health information, and health literacy; and (3) demographic information. A
purposive sampling method was used to select participants at public libraries. Based upon a population and racial balance, residents of
five counties in Florida were selected to participate in a print survey that was administered at public libraries. A total of 247 public
library users participated in this study. There were 83 males (34%) and 164 females (66%). Participants' ages ranged from 18 to 82 years
old with an average age of 42. The majority of participants were non-Hispanic White (n=117, 44%) and non-Hispanic Black (n=94, 35%). That
reflects the racial composition of the five counties. Hispanic (n=13, 5%) and Asian (n=15, 6%) were followed. Structural Equation Modeling
with Mplus (version 5) was used to analyze the five hypotheses. The construct and validation of the SEM model showed the adequacy of the
model. Goodness-Fix-Index, such as Comparative Fit Index (CFI), and Normed Fit Index (NFI) showed higher than .90. These GFI close to 1
indicated a good fit to the data. Badness-Fit-Index (BFI), such as Root Mean Square Error Approximation (RMSEA =.07), and Standardized
Root Mean Square Residual (SRMR= .04) indicate this instrument is a good fit. Overall two hypotheses were accepted. Subjective Norm (R2 =
.39, p<.01) (H2) and Perceived Behavior Control (R2 = .43, p<.01 (H3) were supported. The Subjective Norm and Perceived Behavior
Control influence the intention to use public library as individual's health information sources. This means an individual's family,
friend, or co-worker may influence their intention and wiliness to use public library for their health information needs. Public library
users also recognize that searching for health information is easy to do and they are confident about using health-related information
services at the public library. Therefore, the public library may to promote their health information sources to the community more
actively to introduce such resources. This outreach may increase the social aspect of health information at the public library. If more
people believe the public library is a good place to seek health information, public library usage will grow. / A Dissertation submitted to the School of Information in partial fulfillment of the requirements for
the degree of Doctor of Philosophy. / Fall Semester 2015. / November 19, 2015. / Health information, Health information seeking behavior, Public library, SEM, Theory of planned behavior / Includes bibliographical references. / Kathleen Burnett, Professor Directing Dissertation; Robert Glueckauf, University Representative;
Mia Liza A. Lustria, Committee Member; Sanghee Oh, Committee Member.
|
69 |
VIDEO TELECONFERENCING: AN EXPERIMENTAL STUDY OF THE EFFECT OF USING A VIDEO TELECONFERENCE MEETING CONDITION ON GROUP PROBLEM-SOLVING ABILITYUnknown Date (has links)
Investigation into group problem-solving performance in video versus face-to-face meeting conditions indicated that no research had been conducted to determine if there is a significant difference in the ability of a group to solve a complex problem when employing these two media. Past research was also inconclusive as to whether subjects' initial attitudes toward these two media are significantly different from their attitudes toward these two media after experiencing them. / The purpose of this study was to review and synthesize past research on video teleconferencing; to measure quantitatively the effectiveness of participants using two-way video teleconferencing versus participants in face-to-face meetings involving a complex group problem-solving task; and to measure the attitudes of first-time users toward video teleconferencing and face-to-face meetings before and after their experiences with both media. / The primary hypotheses--stated in the null--were: (1) No significant difference will exist in the quality of a solution arrived at by participants using the two media (face-to-face and video) when a complex problem-solving task is used. (2) No significant difference between the attitudes of subjects toward using video teleconferencing and face-to-face meetings to solve a complex task will exist before and after contact with these two media. / Two complex group problem-solving tasks were used to measure group problem-solving ability in both media. An attitude questionnaire, developed by the researcher, was used to examine subjects' attitudes prior to and after experiencing both media. The subjects were 160 undergraduate communication and business students attending the Florida State University. / A pilot study was conducted to test the experimental procedures and instruments. The Cronbach Alpha Reliability Test and Kruskal-Wallis One-Way Anova were used for the pilot's data analysis. A Wilcoxon Matched Pairs Test was used to test for significance in the main study. / Analysis of the data showed that the performance in video was significantly better than in face-to-face and that subjects' attitudes did not significantly change from initial attitudes in favor of face-to-face over video. / Source: Dissertation Abstracts International, Volume: 44-07, Section: A, page: 1959. / Thesis (Ph.D.)--The Florida State University, 1983.
|
70 |
END USER SEARCHERS OF ONLINE BIBLIOGRAPHIC DATABASES IN AN INDUSTRIAL SETTING: TRAINING, USE AND PERCEIVED BENEFITSUnknown Date (has links)
A study of potential end users of online bibliographic searches was conducted in three parts at a product development location of a consumer products company. Part one was a survey of the population. Part two included collection and analysis of search data from a sample trained to conduct online bibliographic searches in either a one-day course or a two-hour seminar. Part three consisted of interviews with the sample at the close of the data collection phase. The survey data showed that interest in learning to search was associated with highest degree earned and type of previous exposure to online searching principles. The search data could not be analyzed for statistical significance of differences between the two types of training due to uneven search activity by subjects. Approximately half of the subjects trained did not conduct searches during the nine-month study, and of the searches obtained, more than half were conducted by only two subjects. Interview data revealed that availability of intermediaries and alternative resources, the perception that needed materials would not be available online, and difficulties in using computers and telecommunications software contributed to information users' decision not to conduct online bibliographic searches. Searchers considered convenience, time saved, and convincing others to support a decision as positive attributes of online searches. Concerns about frustration in use and missed information were viewed as negative attributes. Nonsearchers considered online searches conducted for them to have the positive attribute of convenience, and the negative attributes of time used and cost. Searchers and nonsearchers considered non-online sources to have positive attributes of convenience, time saved, relevance, and expertise, and negative attributes of information overload, time used, concerns about correctness and / frustration in use. This research may be used in management decision-making regarding feasible approaches to training end users to conduct their own searches, or to communicate with intermediary searchers. / Source: Dissertation Abstracts International, Volume: 48-02, Section: A, page: 0238. / Thesis (Ph.D.)--The Florida State University, 1987.
|
Page generated in 0.0615 seconds