210,201 research outputs found

    Theoretical insights into the development of health insurance in low-income countries

    Get PDF
    This Discussion Paper is concerned with the development of risk-sharing systems for health, in low- and middle-income countries. It questions whether insurance theory developed in wealthier economies, in particular the central ideas of adverse selection and moral hazard, has relevance in the context of poorer countries with high levels of unmet health needs, and low utilisation of health services. Empirical evidence on these two issues is reviewed, as is the debate around social capital and collective action, and its relevance to extending risk sharing in poorer countries. Drawing on thinking and evidence from development economics, it is argued that informal risksharing may crowd-out formal risk-sharing schemes, the reverse of arguments found in much of the literature. Rooted in a holistic framework of household risk-reducing strategies, the paper considers the dynamic of demand for insurance in poorer countries, influenced by factors such as social cohesion, perceived corruption, and duty to the state. A central argument in the paper is that much of the literature on health insurance in low-income countries fails to consider well-developed and highly relevant bodies of literature in development economics and sociology.health insurance

    Security models for trusting network appliances

    Get PDF
    A significant characteristic of pervasive computing is the need for secure interactions between highly mobile entities and the services in their environment. Moreover,these decentralised systems are also characterised by partial views over the state of the global environment, implying that we cannot guarantee verification of the properties of the mobile entity entering an unfamiliar domain. Secure in this context encompasses both the need for cryptographic security and the need for trust, on the part of both parties, that the interaction is functioning as expected. In this paper we make a broad assumption that trust and cryptographic security can be considered as orthogonal concerns (i.e. cryptographic measures do not ensure transmission of correct information). We assume the existence of reliable encryption techniques and focus on the characteristics of a model that supports the management of the trust relationships between two devices during ad-hoc interactions

    Intangible trust requirements - how to fill the requirements trust "gap"?

    Get PDF
    Previous research efforts have been expended in terms of the capture and subsequent instantiation of "soft" trust requirements that relate to HCI usability concerns or in relation to "hard" tangible security requirements that primarily relate to security a ssurance and security protocols. Little direct focus has been paid to managing intangible trust related requirements per se. This 'gap' is perhaps most evident in the public B2C (Business to Consumer) E- Systems we all use on a daily basis. Some speculative suggestions are made as to how to fill the 'gap'. Visual card sorting is suggested as a suitable evaluative tool; whilst deontic logic trust norms and UML extended notation are the suggested (methodologically invariant) means by which software development teams can perhaps more fully capture hence visualize intangible trust requirements

    Mathematical practice, crowdsourcing, and social machines

    Full text link
    The highest level of mathematics has traditionally been seen as a solitary endeavour, to produce a proof for review and acceptance by research peers. Mathematics is now at a remarkable inflexion point, with new technology radically extending the power and limits of individuals. Crowdsourcing pulls together diverse experts to solve problems; symbolic computation tackles huge routine calculations; and computers check proofs too long and complicated for humans to comprehend. Mathematical practice is an emerging interdisciplinary field which draws on philosophy and social science to understand how mathematics is produced. Online mathematical activity provides a novel and rich source of data for empirical investigation of mathematical practice - for example the community question answering system {\it mathoverflow} contains around 40,000 mathematical conversations, and {\it polymath} collaborations provide transcripts of the process of discovering proofs. Our preliminary investigations have demonstrated the importance of "soft" aspects such as analogy and creativity, alongside deduction and proof, in the production of mathematics, and have given us new ways to think about the roles of people and machines in creating new mathematical knowledge. We discuss further investigation of these resources and what it might reveal. Crowdsourced mathematical activity is an example of a "social machine", a new paradigm, identified by Berners-Lee, for viewing a combination of people and computers as a single problem-solving entity, and the subject of major international research endeavours. We outline a future research agenda for mathematics social machines, a combination of people, computers, and mathematical archives to create and apply mathematics, with the potential to change the way people do mathematics, and to transform the reach, pace, and impact of mathematics research.Comment: To appear, Springer LNCS, Proceedings of Conferences on Intelligent Computer Mathematics, CICM 2013, July 2013 Bath, U

    Enhancing Ontario’s Rural Infrastructure Preparedness: Inter-Community Service Sharing in a Changing Climate — Environmental Scan

    Get PDF
    Given the research that has been done in this environmental scan and the gaps found in this research, it is our aim to find out: What types of service sharing are going on in Ontario municipalities, particularly in rural/remote areas? How can inter-community service sharing (ICSS) benefit the asset management planning process in these rural/remote areas to enhance capacities for climate change resilience? Climate change (CC) will exacerbate deterioration to existing infrastructure and increase replacement costs. Improved preparedness reduces risks and increases efficiency, readiness and coping capacity. To increase the preparedness of Ontario rural communities, this project develops CC-Prepared Inter-Community Service Sharing (ICSS) as an innovative strategy that expands cost-effective solutions within Ontario’s standardized Asset Management Planning (AMP) process. Overseen by a Project Advisory Board (PAB), it identifies a suite of best practice ICSS processes and principles and a range of factors and indicators that influence the uptake of ICSS as a viable and practical opportunity targeted to enhance rural infrastructure preparedness for CC. It utilizes a multimethod, interdisciplinary approach involving an environmental scan, interviews, a survey and case studies and develops an ICSS Toolkit consisting of reports, workbook, policy brief and media kit. Knowledge translation and transfer (KTT) includes blogs, teleconferences, articles, presentations and a workshop. For small rural Ontario communities, this study enhances management of CC impacts on infrastructure through the development of a CC-Prepared ICSS strategy, increasing anticipatory, collective actions that reduce dam age and increase efficiencies. It informs sound municipal/provincial level programs and policies about innovative ICSS that benefit rural communities through the identification of Ontario-wide trends, case study best practises and action-oriented recommendations

    Investigating knowledge management factors affecting Chinese ICT firms performance: An integrated KM framework

    Get PDF
    This is an Author's Accepted Manuscript of an article published in the Journal of Information Systems Management, 28(1), 19 - 29, 2011, copyright Taylor & Francis, available online at: http://www.tandfonline.com/10.1080/10580530.2011.536107.This article sets out to investigate the critical factors of Knowledge Management (KM) which are considered to have an impact on the performance of Chinese information and communication technology (ICT) firms. This study confirms that the cultural environment of an enterprise is central to its success in the context of China. It shows that a collaborated, trusted, and learning environment within ICT firms will have a positive impact on their KM performance

    Sector Wide Approaches to Education - A Strategic Analysis

    Get PDF
    Teaching/Communication/Extension/Profession,
    corecore