210,201 research outputs found
Theoretical insights into the development of health insurance in low-income countries
This Discussion Paper is concerned with the development of risk-sharing systems for health, in low- and middle-income countries. It questions whether insurance theory developed in wealthier economies, in particular the central ideas of adverse selection and moral hazard, has relevance in the context of poorer countries with high levels of unmet health needs, and low utilisation of health services. Empirical evidence on these two issues is reviewed, as is the debate around social capital and collective action, and its relevance to extending risk sharing in poorer countries. Drawing on thinking and evidence from development economics, it is argued that informal risksharing may crowd-out formal risk-sharing schemes, the reverse of arguments found in much of the literature. Rooted in a holistic framework of household risk-reducing strategies, the paper considers the dynamic of demand for insurance in poorer countries, influenced by factors such as social cohesion, perceived corruption, and duty to the state. A central argument in the paper is that much of the literature on health insurance in low-income countries fails to consider well-developed and highly relevant bodies of literature in development economics and sociology.health insurance
Security models for trusting network appliances
A significant characteristic of pervasive computing is the need for secure interactions between highly mobile entities and the services in their environment. Moreover,these decentralised systems are also characterised by partial views over the state of the global environment, implying that we cannot guarantee verification of the properties of the mobile entity entering an unfamiliar domain. Secure in this context encompasses both the need for cryptographic security and the need for trust, on the part of both parties, that the interaction is functioning as expected. In this paper we make a broad assumption that trust and cryptographic security can be considered as orthogonal concerns (i.e. cryptographic measures do not ensure transmission of correct information). We assume the existence of reliable encryption techniques and focus on the characteristics of a model that supports the management of the trust relationships between two devices during ad-hoc interactions
Intangible trust requirements - how to fill the requirements trust "gap"?
Previous research efforts have been expended in terms of the capture and subsequent instantiation of "soft" trust requirements that relate to HCI usability concerns or in relation to "hard" tangible security requirements that primarily relate to security a ssurance and security protocols. Little direct focus has been paid to managing intangible trust related requirements
per se. This 'gap' is perhaps most evident in the public B2C (Business to Consumer) E- Systems we all use on a daily basis. Some speculative suggestions are made as to how to fill the 'gap'.
Visual card sorting is suggested as a suitable evaluative tool; whilst deontic logic trust norms
and UML extended notation are the suggested (methodologically invariant) means by which software development teams can perhaps more fully capture hence visualize intangible trust requirements
Mathematical practice, crowdsourcing, and social machines
The highest level of mathematics has traditionally been seen as a solitary
endeavour, to produce a proof for review and acceptance by research peers.
Mathematics is now at a remarkable inflexion point, with new technology
radically extending the power and limits of individuals. Crowdsourcing pulls
together diverse experts to solve problems; symbolic computation tackles huge
routine calculations; and computers check proofs too long and complicated for
humans to comprehend.
Mathematical practice is an emerging interdisciplinary field which draws on
philosophy and social science to understand how mathematics is produced. Online
mathematical activity provides a novel and rich source of data for empirical
investigation of mathematical practice - for example the community question
answering system {\it mathoverflow} contains around 40,000 mathematical
conversations, and {\it polymath} collaborations provide transcripts of the
process of discovering proofs. Our preliminary investigations have demonstrated
the importance of "soft" aspects such as analogy and creativity, alongside
deduction and proof, in the production of mathematics, and have given us new
ways to think about the roles of people and machines in creating new
mathematical knowledge. We discuss further investigation of these resources and
what it might reveal.
Crowdsourced mathematical activity is an example of a "social machine", a new
paradigm, identified by Berners-Lee, for viewing a combination of people and
computers as a single problem-solving entity, and the subject of major
international research endeavours. We outline a future research agenda for
mathematics social machines, a combination of people, computers, and
mathematical archives to create and apply mathematics, with the potential to
change the way people do mathematics, and to transform the reach, pace, and
impact of mathematics research.Comment: To appear, Springer LNCS, Proceedings of Conferences on Intelligent
Computer Mathematics, CICM 2013, July 2013 Bath, U
Enhancing Ontario’s Rural Infrastructure Preparedness: Inter-Community Service Sharing in a Changing Climate — Environmental Scan
Given the research that has been done in this environmental scan and the gaps found in this research, it is our aim to find out: What types of service sharing are going on in Ontario municipalities, particularly in rural/remote areas? How can inter-community service sharing (ICSS) benefit the asset management planning process in these rural/remote areas to enhance capacities for climate change resilience?
Climate change (CC) will exacerbate deterioration to existing infrastructure and increase replacement costs. Improved preparedness reduces risks and increases efficiency, readiness and coping capacity. To increase the preparedness of Ontario rural communities, this project develops CC-Prepared Inter-Community Service Sharing (ICSS) as an innovative strategy that expands cost-effective solutions within Ontario’s standardized Asset Management Planning (AMP) process. Overseen by a Project Advisory Board (PAB), it identifies a suite of best practice ICSS processes and principles and a range of factors and indicators that influence the uptake of ICSS as a viable and practical opportunity targeted to enhance rural infrastructure preparedness for CC. It utilizes a multimethod, interdisciplinary approach involving an environmental scan, interviews, a survey and case studies and develops an ICSS Toolkit consisting of reports, workbook, policy brief and media kit. Knowledge translation and transfer (KTT) includes blogs, teleconferences, articles, presentations and a workshop.
For small rural Ontario communities, this study enhances management of CC impacts on infrastructure through the development of a CC-Prepared ICSS strategy, increasing anticipatory, collective actions that reduce dam age and increase efficiencies. It informs sound municipal/provincial level programs and policies about innovative ICSS that benefit rural communities through the identification of Ontario-wide trends, case study best practises and action-oriented recommendations
Investigating knowledge management factors affecting Chinese ICT firms performance: An integrated KM framework
This is an Author's Accepted Manuscript of an article published in the Journal of Information Systems Management, 28(1), 19 - 29, 2011, copyright Taylor & Francis, available online at: http://www.tandfonline.com/10.1080/10580530.2011.536107.This article sets out to investigate the critical factors of Knowledge Management (KM) which are considered to have an impact on the performance of Chinese information and communication technology (ICT) firms. This study confirms that the cultural environment of an enterprise is central to its success in the context of China. It shows that a collaborated, trusted, and learning environment within ICT firms will have a positive impact on their KM performance
Sector Wide Approaches to Education - A Strategic Analysis
Teaching/Communication/Extension/Profession,
- …