1,272 research outputs found

    A qualitative evaluation of the YMCA\u27s Physical Healthy and Driven Program (PHD).

    Get PDF

    Special Libraries, Summer 1992

    Get PDF
    Volume 83, Issue 3https://scholarworks.sjsu.edu/sla_sl_1992/1002/thumbnail.jp

    Mining Behavior of Citizen Sensor Communities to Improve Cooperation with Organizational Actors

    Get PDF
    Web 2.0 (social media) provides a natural platform for dynamic emergence of citizen (as) sensor communities, where the citizens generate content for sharing information and engaging in discussions. Such a citizen sensor community (CSC) has stated or implied goals that are helpful in the work of formal organizations, such as an emergency management unit, for prioritizing their response needs. This research addresses questions related to design of a cooperative system of organizations and citizens in CSC. Prior research by social scientists in a limited offline and online environment has provided a foundation for research on cooperative behavior challenges, including \u27articulation\u27 and \u27awareness\u27, but Web 2.0 supported CSC offers new challenges as well as opportunities. A CSC presents information overload for the organizational actors, especially in finding reliable information providers (for awareness), and finding actionable information from the data generated by citizens (for articulation). Also, we note three data level challenges: ambiguity in interpreting unconstrained natural language text, sparsity of user behaviors, and diversity of user demographics. Interdisciplinary research involving social and computer sciences is essential to address these socio-technical issues. I present a novel web information-processing framework, called the Identify-Match- Engage (IME) framework. IME allows operationalizing computation in design problems of awareness and articulation of the cooperative system between citizens and organizations, by addressing data problems of group engagement modeling and intent mining. The IME framework includes: a.) Identification of cooperation-assistive intent (seeking-offering) from short, unstructured messages using a classification model with declarative, social and contrast pattern knowledge, b.) Facilitation of coordination modeling using bipartite matching of complementary intent (seeking-offering), and c.) Identification of user groups to prioritize for engagement by defining a content-driven measure of \u27group discussion divergence\u27. The use of prior knowledge and interplay of features of users, content, and network structures efficiently captures context for computing cooperation-assistive behavior (intent and engagement) from unstructured social data in the online socio-technical systems. Our evaluation of a use-case of the crisis response domain shows improvement in performance for both intent classification and group engagement prioritization. Real world applications of this work include use of the engagement interface tool during various recent crises including the 2014 Jammu and Kashmir floods, and intent classification as a service integrated by the crisis mapping pioneer Ushahidi\u27s CrisisNET project for broader impact

    University of Wollongong Campus News August 1980

    Get PDF

    University of Wollongong Campus News August 1980

    Get PDF

    An Arts-Employment Analysis : the Effect of Government Funding on Employment at Deck Chair Theatre and Spare Parts Puppet Theatre

    Get PDF
    It is important for governments to recognise employment generation resulting from public expenditure. Funding alternatives that are a cost effective way of generating employment are key objectives in public finance. One funding alternative is the arts. The arts have to compete with other economic activities for a share of government funding. As a result of increased competition, the economic contribution of the arts has become an important issue in arts advocacy. Therefore, it is important that the measure of employment generated by arts funding is accurate and reliable. Arts employment data is generated by cultural organisations applying for public funding through the Australia Council. The problem is that the existing method of calculation, though reasonably detailed, ignores employment of contracting artists and inaccurately accounts for part-time employment. The purpose of this study is threefold: (1) To develop a more accurate measurement of employment in arts organisations than currently exists with the ·Australia Council via its employment data generation, by including in the measurement, the amount of part-time and contracted-artist employment. (2) To identify the amount of government funding that translates into equivalent full-time jobs. (3) To demonstrate and explain ii the problems and distortions that arise by the use of employment multipliers. These problems are addressed at a sample of two theatre companies: Deck Chair Theatre and Spare Parts Puppet Theatre. The measurement developed: The Government Arts-Funding Employment Ratio shows the amount of government funding that translates into equivalent full-time jobs. This is developed in two versions. One including the effects of an employment multiplier, the other ignoring these effects. The multiplier effect means that for every job within the theatres, 1.667 jobs are generated outside the theatres. The results, ignoring the multiplier effect, show that during 1989-1991, every 30,220ofgovernmentfundingtoSparePartsPuppetTheatre,translatedintooneequivalentfull−timejob.AtDeckChairTheatre,overthesameperiod,every30,220 of government funding to Spare Parts Puppet Theatre, translated into one equivalent full-time job. At Deck Chair Theatre, over the same period, every 25,821 of government funding translated into one equivalent full-time job

    Spartan Daily, December 5, 2003

    Get PDF
    Volume 121, Issue 66https://scholarworks.sjsu.edu/spartandaily/9932/thumbnail.jp

    Facing the Challenge of Mobile Technology: A Seminar on Strengthening Intimacy in Families at the Hendersonville Seventh-day Adventist Church

    Get PDF
    The Problem The new wave of smartphones and other forms of mobile technology presents an always available Internet connection that is hard for many families to manage. Without sufficient awareness of technology\u27s subtle impact on relationships and without appropriate boundaries, many suffer loss of face-to-face interaction, communication and intimacy within their family circles. The Method The purpose of this project was to investigate whether a five-session educational seminar would create greater awareness and motivate changes in mobile technology usage that is seen as beneficial to parents and family. The Results Of the 11 families who committed to coming to the five-session educational seminar, eight were able to attend all five sessions. A comparison of pre-interviews and post-interviews determined that the seminar was useful in raising awareness, stimulating more responsible use of mobile technology, and encouraging families toward deeper levels of intimacy. As a result of the many tools placed in the hands of the parents, members of each family made some type of change in their mobile technology usage and felt better equipped to talk with their children and each other about appropriate parameters. Conclusions This educational experience for the Hendersonville Seventh-day Adventist Church was useful in raising awareness regarding the advantages and dangers of mobile technology. Participants gained not only insights and practical skills in Internet management but greater understanding of their family dynamics as well as enhanced skill in dialogue and communication with each other

    Enhanced Password Security on Mobile Devices

    Get PDF
    <p>Sleek and powerful touchscreen devices with continuous access to high-bandwidth wireless data networks have transformed mobile into a first-class development platform. Many applications (i.e., "apps") written for these platforms rely on remote services such as Dropbox, Facebook, and Twitter, and require users to provide one or more passwords upon installation. Unfortunately, today's mobile platforms provide no protection for users' passwords, even as mobile devices have become attractive targets for password-stealing malware and other phishing attacks.</p><p>This dissertation explores the feasibility of providing strong protections for passwords input on mobile devices without requiring large changes to existing apps.</p><p>We propose two approaches to secure password entry on mobile devices: ScreenPass and VeriUI. ScreenPass is integrated with a device's operating system and continuously monitors the device's screen to prevent malicious apps from spoofing the system's trusted software keyboard. The trusted keyboard ensures that ScreenPass always knows when a password is input, which allows it to prevent apps from sending password data to the untrusted servers. VeriUI relies on trusted hardware to isolate password handling from a device's operating system and apps. This approach allows VeriUI to prove to remote services that a relatively small and well-known code base directly handled a user's password data.</p>Dissertatio

    Evangelical Visitor - March 10, 1981 Vol. XCIV. No. 5.

    Get PDF
    Vol. XCIV. No. 5
    • …
    corecore