589,742 research outputs found

    Acceptability of novel lifelogging technology to determine context of sedentary behaviour in older adults

    Get PDF
    <strong>Objective:</strong> Lifelogging, using body worn sensors (activity monitors and time lapse photography) has the potential to shed light on the context of sedentary behaviour. The objectives of this study were to examine the acceptability, to older adults, of using lifelogging technology and indicate its usefulness for understanding behaviour.<strong> </strong><strong>Method:</strong> 6 older adults (4 males, mean age: 68yrs) wore the equipment (ActivPAL<sup>TM</sup> and Vicon Revue<sup>TM</sup>/SenseCam<sup>TM</sup>) for 7 consecutive days during free-living activity. The older adultsā€™ perception of the lifelogging technology was assessed through semi-structured interviews, including a brief questionnaire (Likert scale), and reference to the researcher&#39;s diary. <strong>Results:</strong> Older adults in this study found the equipment acceptable to wear and it did not interfere with privacy, safety or create reactivity, but they reported problems with the actual technical functioning of the camera. <strong>Conclusion:</strong> This combination of sensors has good potential to provide lifelogging information on the context of sedentary behaviour

    Investigating e-business practices in tourism :a comparative analysis of three countries

    Get PDF
    This study examined the behaviour of tourist companies in relation to the adoption of e-business technologies and applications. The study aimed to identify groups of companies with homogenous behaviour among three European countries (Greece, Portugal and Norway). Based on data from a European survey, the study employed two-step cluster analysis which revealed 14 clusters of common behaviour (five clusters in Greece, five in Portugal and four in Norway). These clusters were named as: Leadersā€™ ā€˜Technology Expertsā€™, ā€˜Fast Adoptersā€™ ā€˜Beginnersā€™, ā€˜Late Adoptersā€™. In Norway, the group ā€˜Late Adoptersā€™ also included companies characterised as ā€˜Beginnersā€™ in the other two countries. We suggest further investigation among European countries in order to reveal more groups of similar behaviour toward e-business adoption

    Analysing how constraints impact architectural decision-making

    Get PDF
    Architectural design projects are characterised by a high number of constraints. Along with planning, energy performance and fire safety regulations, current designers have to face constraining factors related to budget, acoustics, orientation, wind turbulence, accessibility for the disabled, and so forth. These constraints steer the design process implicitly and explicitly in certain directions as soon as architectural designers aim at satisfying design briefs. We aim in this article at analysing the impact of such constraints on the design process. At this end, we have studied four design sessions in a particular (student) design use case. In analysing these four sessions, we used linkography as a method, because this appeared to be one of the better options to obtain a more quantitative assessment of the design process. The linkography method was combined with an interview of the student design team, in order to check the correctness of our conclusions

    Process monitoring and visualization solutions for hot-melt extrusion : a review

    Get PDF
    Objectives: Hot-melt extrusion (HME) is applied as a continuous pharmaceutical manufacturing process for the production of a variety of dosage forms and formulations. To ensure the continuity of this process, the quality of the extrudates must be assessed continuously during manufacturing. The objective of this review is to provide an overview and evaluation of the available process analytical techniques which can be applied in hot-melt extrusion. Key Findings: Pharmaceutical extruders are equipped with traditional (univariate) process monitoring tools, observing barrel and die temperatures, throughput, screw speed, torque, drive amperage, melt pressure and melt temperature. The relevance of several spectroscopic process analytical techniques for monitoring and control of pharmaceutical HME has been explored recently. Nevertheless, many other sensors visualizing HME and measuring diverse critical product and process parameters with potential use in pharmaceutical extrusion are available, and were thoroughly studied in polymer extrusion. The implementation of process analytical tools in HME serves two purposes: (1) improving process understanding by monitoring and visualizing the material behaviour and (2) monitoring and analysing critical product and process parameters for process control, allowing to maintain a desired process state and guaranteeing the quality of the end product. Summary: This review is the first to provide an evaluation of the process analytical tools applied for pharmaceutical HME monitoring and control, and discusses techniques that have been used in polymer extrusion having potential for monitoring and control of pharmaceutical HME

    Cyber-crime Science = Crime Science + Information Security

    Get PDF
    Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality, integrity, and availability of information assets but is less strong on the empirical study of the effectiveness of these techniques. Crime Science studies the effect of crime prevention techniques empirically in the real world, and proposes improvements to these techniques based on this. Combining both approaches, Cyber-crime Science transfers and further develops Information Security techniques to prevent cyber-crime, and empirically studies the effectiveness of these techniques in the real world. In this paper we review the main contributions of Crime Science as of today, illustrate its application to a typical Information Security problem, namely phishing, explore the interdisciplinary structure of Cyber-crime Science, and present an agenda for research in Cyber-crime Science in the form of a set of suggested research questions

    Profiling and understanding student information behaviour: Methodologies and meaning

    Get PDF
    This paper draws on work conducted under the Joint Information Systems Committee (JISC) User Behaviour Monitoring and Evaluation Framework to identify a range of issues associated with research design that can form a platform for enquiry about knowledge creation in the arena of user behaviour. The Framework has developed a multidimensional set of tools for profiling, monitoring and evaluating user behaviour. The Framework has two main approaches: one, a broadā€based survey which generates both a qualitative and a quantitative profile of user behaviour, and the other a longitudinal qualitative study of user behaviour that (in addition to providing inā€depth insights) is the basis for the development of the EIS (Electronic Information Services) Diagnostic Toolkit. The strengths and weaknesses of the Framework approach are evaluated. In the context of profiling user behaviour, key methodological concerns relate to: representativeness, sampling and access, the selection of appropriate measures and the interpretation of those measures. Qualitative approaches are used to generate detailed insights. These include detailed narratives, case study analysis and gap analysis. The messages from this qualitative analysis do not lend themselves to simple summarization. One approach that has been employed to capture and interpret these messages is the development of the EIS Diagnostic Toolkit. This toolkit can be used to assess and monitor an institution's progress with embedding EIS into learning processes. Finally, consideration must be given to integration of insights generated through different strands within the Framework

    Integrating driving and traffic simulators for the study of railway level crossing safety interventions: a methodology

    Get PDF
    Safety at Railway Level Crossings (RLXs) is an important issue within the Australian transport system. Crashes at RLXs involving road vehicles in Australia are estimated to cost $10 million each year. Such crashes are mainly due to human factors; unintentional errors contribute to 46% of all fatal collisions and are far more common than deliberate violations. This suggests that innovative intervention targeting drivers are particularly promising to improve RLX safety. In recent years there has been a rapid development of a variety of affordable technologies which can be used to increase driverā€™s risk awareness around crossings. To date, no research has evaluated the potential effects of such technologies at RLXs in terms of safety, traffic and acceptance of the technology. Integrating driving and traffic simulations is a safe and affordable approach for evaluating these effects. This methodology will be implemented in a driving simulator, where we recreated realistic driving scenario with typical road environments and realistic traffic. This paper presents a methodology for evaluating comprehensively potential benefits and negative effects of such interventions: this methodology evaluates driver awareness at RLXs , driver distraction and workload when using the technology . Subjective assessment on perceived usefulness and ease of use of the technology is obtained from standard questionnaires. Driving simulation will provide a model of driving behaviour at RLXs which will be used to estimate the effects of such new technology on a road network featuring RLX for different market penetrations using a traffic simulation. This methodology can assist in evaluating future safety interventions at RLXs

    The onus on us? Stage one in developing an i-Trust model for our users.

    Get PDF
    This article describes a Joint Information Systems Committee (JISC)-funded project, conducted by a cross-disciplinary team, examining trust in information resources in the web environment employing a literature review and online Delphi study with follow-up community consultation. The project aimed to try to explain how users assess or assert trust in their use of resources in the web environment; to examine how perceptions of trust influence the behavior of information users; and to consider whether ways of asserting trust in information resources could assist the development of information literacy. A trust model was developed from the analysis of the literature and discussed in the consultation. Elements comprising the i-Trust model include external factors, internal factors and user's cognitive state. This article gives a brief overview of the JISC funded project which has now produced the i-Trust model (Pickard et. al. 2010) and focuses on issues of particular relevance for information providers and practitioners
    • ā€¦
    corecore