645,553 research outputs found

    Acceptability of novel lifelogging technology to determine context of sedentary behaviour in older adults

    Get PDF
    <strong>Objective:</strong> Lifelogging, using body worn sensors (activity monitors and time lapse photography) has the potential to shed light on the context of sedentary behaviour. The objectives of this study were to examine the acceptability, to older adults, of using lifelogging technology and indicate its usefulness for understanding behaviour.<strong> </strong><strong>Method:</strong> 6 older adults (4 males, mean age: 68yrs) wore the equipment (ActivPAL<sup>TM</sup> and Vicon Revue<sup>TM</sup>/SenseCam<sup>TM</sup>) for 7 consecutive days during free-living activity. The older adultsā€™ perception of the lifelogging technology was assessed through semi-structured interviews, including a brief questionnaire (Likert scale), and reference to the researcher&#39;s diary. <strong>Results:</strong> Older adults in this study found the equipment acceptable to wear and it did not interfere with privacy, safety or create reactivity, but they reported problems with the actual technical functioning of the camera. <strong>Conclusion:</strong> This combination of sensors has good potential to provide lifelogging information on the context of sedentary behaviour

    The role of information systems in the prevention and detection of transnational and international crime

    Get PDF
    Ā© Cambridge University Press 2014. All around the world criminal activity remains at the forefront of governmental concerns, not only as a problem that distorts the very fabric of society within the confines of national jurisdictions, but also as a problem that cuts across national borders to exhibit a global dimension. The international dimension of criminal activity remains critical and is generally characterized by a complexity that is unique and requires action on many different levels. Criminals set out to mask their illegal activities and deliberately generate complexity as a means of concealment. In doing so, they exploit new developments in technology that assist them in achieving their ends. This criminality exhibits forms of innovation that stretch far beyond traditional criminal activity (e.g., drug and human trafficking) and manages to attach itself within the broader fabric of society by exploiting the very latest developments. This evolution is necessary as criminals seek not only to escape arrest, prosecution and conviction, but also to enjoy the fruits of their criminality (mostly financial gains). Thus, they seek to develop ways of exploiting the various diffuse norms of social interaction (e.g., trust), financial modes of conduct (e.g., cash-based economies), technological and communication developments (e.g., Internet), and thereby minimize the possibility for detection. By limiting the resources that can be made available for prevention (or making them obsolete when developing new criminal behaviour), they participate in this co-evolution actively; and this they achieve by generating complexity

    Dimensions of web site credibility and their relation to active trust and behavioural impact

    Get PDF
    This paper discusses two trends that threaten to undermine the effectiveness of online social marketing interventions: growing mistrust and competition. As a solution, this paper examines the relationships between Web site credibility, target audiencesā€™ active trust and behaviour. Using structural equation modelling to evaluate two credibility models, this study concludes that Web site credibility is best considered a three-dimensional construct composed of expertise, trustworthiness and visual appeal, and that trust plays a partial mediating role between Web site credibility and behavioural impacts. The paper examines theoretical implications of conceptualizing Web sites according to a human credibility model, and factoring trust into Internet-based behavioural change interventions. Practical guidelines suggest ways to address these findings when planning online social marketing interventions

    Analysing how constraints impact architectural decision-making

    Get PDF
    Architectural design projects are characterised by a high number of constraints. Along with planning, energy performance and fire safety regulations, current designers have to face constraining factors related to budget, acoustics, orientation, wind turbulence, accessibility for the disabled, and so forth. These constraints steer the design process implicitly and explicitly in certain directions as soon as architectural designers aim at satisfying design briefs. We aim in this article at analysing the impact of such constraints on the design process. At this end, we have studied four design sessions in a particular (student) design use case. In analysing these four sessions, we used linkography as a method, because this appeared to be one of the better options to obtain a more quantitative assessment of the design process. The linkography method was combined with an interview of the student design team, in order to check the correctness of our conclusions

    Investigating e-business practices in tourism :a comparative analysis of three countries

    Get PDF
    This study examined the behaviour of tourist companies in relation to the adoption of e-business technologies and applications. The study aimed to identify groups of companies with homogenous behaviour among three European countries (Greece, Portugal and Norway). Based on data from a European survey, the study employed two-step cluster analysis which revealed 14 clusters of common behaviour (five clusters in Greece, five in Portugal and four in Norway). These clusters were named as: Leadersā€™ ā€˜Technology Expertsā€™, ā€˜Fast Adoptersā€™ ā€˜Beginnersā€™, ā€˜Late Adoptersā€™. In Norway, the group ā€˜Late Adoptersā€™ also included companies characterised as ā€˜Beginnersā€™ in the other two countries. We suggest further investigation among European countries in order to reveal more groups of similar behaviour toward e-business adoption

    Intelligent Integrated Management for Telecommunication Networks

    Get PDF
    As the size of communication networks keeps on growing, faster connections, cooperating technologies and the divergence of equipment and data communications, the management of the resulting networks gets additional important and time-critical. More advanced tools are needed to support this activity. In this article we describe the design and implementation of a management platform using Artificial Intelligent reasoning technique. For this goal we make use of an expert system. This study focuses on an intelligent framework and a language for formalizing knowledge management descriptions and combining them with existing OSI management model. We propose a new paradigm where the intelligent network management is integrated into the conceptual repository of management information called Managed Information Base (MIB). This paper outlines the development of an expert system prototype based in our propose GDMO+ standard and describes the most important facets, advantages and drawbacks that were found after prototyping our proposal

    Context-aware adaptation in DySCAS

    Get PDF
    DySCAS is a dynamically self-configuring middleware for automotive control systems. The addition of autonomic, context-aware dynamic configuration to automotive control systems brings a potential for a wide range of benefits in terms of robustness, flexibility, upgrading etc. However, the automotive systems represent a particularly challenging domain for the deployment of autonomics concepts, having a combination of real-time performance constraints, severe resource limitations, safety-critical aspects and cost pressures. For these reasons current systems are statically configured. This paper describes the dynamic run-time configuration aspects of DySCAS and focuses on the extent to which context-aware adaptation has been achieved in DySCAS, and the ways in which the various design and implementation challenges are met

    Social Intelligence Design for Mediated Communication

    Get PDF
    Without abstract

    Kompetensi pembimbing syarikat bertauliah Sistem Latihan Dual Nasional (SLDN)

    Get PDF
    Sistem Latihan Dual Nasional (SLDN) merupakan satu sistem latihan dan usahasama antara sektor awam dan sektor swasta dilaksanakan untuk melahirkan tenaga mahir k-worker selari dengan keperluan industri masa kini untuk membangunkan ekonomi negara. Pihak kerajaan dan syarikat swasta menaja pekerja pilihan mereka sebagai pelatih dalam sistem latihan ini bagi mempertingkatkan kebolehan pekerja mereka. Selain itu, pelatih juga terdiri daripada pelajar yang tidak dapat melanjutkan pelajaran ke mana-mana institusi pengajian tinggi awam mahupun swasta. Sistem ini menjalankan pendekatan day release iaitu pelatih menjalani latihan selama empat hari di industri dan satu hari di institusi latihan atau block release iaitu pelatih menjalani latihan kemahiran di industri empat bulan dan satu bulan di institusi latihan mengikut kesesuaian industri tersebut. Kajian berbentuk deskriptif dijalankan untuk melihat melihat tahap kompetensi pembimbing SLDN. Selain itu juga, kajian ini dijalankan bagi melihat perbezaan terhadap tahap pengetahuan, kemahiran dan sikap pembimbing SLDN berdasarkan jantina. Kajian ini juga dibuat bagi menentukan hubungan kompetensi pembimbing berdasarkan pengalaman bekerja. Penyelidikan tinjauan deskriptif ini menggunakan borang soal selidik sebagai instrumen kajian berskala Likert. Seramai 84 orang responden yang terdiri daripada pembimbing syarikat bertauliah SLDN terlibat di dalam kajian ini. Data dianalisis menggunakan SPSS versi 16.0. Hasil analisis mendapati pembimbing mempunyai pengetahuan yang tinggi di samping kemahiran dan sikap. Keputusan inferensi pula menunjukkan tidak terdapat perbezaan antara tahap pengetahuan, kemahiran dan sikap pembimbing berdasarkan jantina manakala analisis korelasi Pearson menunjukkan tidak terdapat hubungan antara kompetensi pembimbing berdasarkan pengalaman bekerja

    Improved resource efficiency and cascading utilisation of renewable materials

    Get PDF
    In light of various environmental problems and challenges concerning resource allocation, the utilisation of renewable resources is increasingly important for the efficient use of raw materials. Therefore, cascading utilisation (i.e., the multiple material utilisations of renewable resources prior to their conversion into energy) and approaches that aim to further increase resource efficiency (e.g., the utilisation of by-products) can be considered guiding principles. This paper therefore introduces the Special Volume ā€œImproved Resource Efficiency and Cascading Utilisation of Renewable Materialsā€. Because both research aspects, resource efficiency and cascading utilisation, belong to several disciplines, the Special Volume adopts an interdisciplinary perspective and presents 16 articles, which can be divided into four subjects: Innovative Materials based on Renewable Resources and their Impact on Sustainability and Resource Efficiency, Quantitative Models for the Integrated Optimisation of Production and Distribution in Networks for Renewable Resources, Information Technology-based Collaboration in Value Generating Networks for Renewable Resources, and Consumer Behaviour towards Eco-friendly Products. The interdisciplinary perspective allows a comprehensive overview of current research on resource efficiency, which is supplemented with 15 book reviews showing the extent to which textbooks of selected disciplines already refer to resource efficiency. This introductory article highlights the relevance of the four subjects, presents summaries of all papers, and discusses future research directions. The overall contribution of the Special Volume is that it bridges the resource efficiency research of selected disciplines and that it presents several approaches for more environmentally sound production and consumption
    • ā€¦
    corecore