9,692 research outputs found

    Risk assessment through argumentation over contractual data

    Get PDF
    Argumentation and trust models have been increasingly used in multi-agent systems research, with applications in several domains such as e-commerce. Negotiation is a form of interaction in which argumentation and trust can play a relevant role. Argumentation in a negotiation context has been defined as a way of interaction between trading parties that enables them to exchange information in order to explain their current position with the intention of increasing the chance of success. We propose an argumentation model based on past contractual data aiming at enriching electronic contracting processes. The idea behind this argumentation model is to prevent failures in future agreements. For that, an important step is to define a reasoning model that allows trading parties to point out some past contractual failures or explain such past failures. The purpose of this paper is then to investigate on how argumentation-based negotiation using historical contractual data may affect the outcome of a contracting process, taken as a comprehensive activity ranging from negotiation, monitoring and enactment assessment. This may be achieved through a careful selection of the partner with whom a contract is to be established, complemented with an argumentation-based negotiation of contract terms

    Patients' acceptance of new procedures in healthcare

    Get PDF
    The dissertation "Patients' Acceptance of New Procedures in Healthcare" is based on four different research articles that thematically investigate acceptance via intention to use new procedures in healthcare from the patient's perspective. Both digital and analog procedures are used. As a basis, an Integrated Theoretical Framework (ITF) is developed, which includes theories from healthcare, information systems, and psychology perspectives to study the intention to use. The ITF is applied to study individual decision-making behavior for different decisions and different levels of risk.Die Dissertation "Patients' Acceptance of New Procedures in Healthcare" basiert auf 4 Beiträgen, die thematisch die Akzeptanz über die Nutzungsabsicht neuer Verfahren im Gesundheitswesen aus Patientensicht untersuchen. Dabei werden digitale und analoge Verfahren eingesetzt. Als Basis wird ein Integriertes Theoretisches Framework (ITF) entwickelt, das Theorien aus Gesundheitswesen, Informationssystemen und Psychologie zur Untersuchung der Nutzungsabsicht umfasst. Das ITF wird angewandt, um das individuelle Entscheidungsverhalten für verschiedene Entscheidungen und Risikoniveaus zu untersuchen

    An Empirical Investigation Of The Influence Of Fear Appeals On Attitudes And Behavioral Intentions Associated With Recommended Individual Computer Security Actions

    Get PDF
    Through persuasive communication, IT executives strive to align the actions of end users with the desired security posture of management and of the firm. In many cases, the element of fear is incorporated within these communications. However, within the context of computer security and information assurance, it is not yet clear how these fear-inducing arguments, known as fear appeals, will ultimately impact the actions of end users. The purpose of this study is to examine the influence of fear appeals on the compliance of end users with recommendations to enact specific individual computer security actions toward the amelioration of threats. A two-phase examination was adopted that involved two distinct data collection and analysis procedures, and culminated in the development and testing of a conceptual model representing an infusion of theories based on prior research in Social Psychology and Information Systems (IS), namely the Extended Parallel Process Model (EPPM) and the Unified Theory of Acceptance and Use of Technology (UTAUT). Results of the study suggest that fear appeals do impact end users attitudes and behavioral intentions to comply with recommended individual acts of security, and that the impact is not uniform across all end users, but is determined in part by perceptions of self-efficacy, response efficacy, threat severity, threat susceptibility, and social influence. The findings suggest that self-efficacy and, to a lesser extent, response efficacy predict attitudes and behavioral intentions to engage individual computer security actions, and that these relationships are governed by perceptions of threat severity and threat susceptibility. The findings of this research will contribute to IS expectancy research, human-computer interaction, and organizational communication by revealing a new paradigm in which IT users form perceptions of the technology, not on the basis of performance gains, but on the basis of utility for threat amelioration

    In the Dock. Examining the UK’s Criminal Justice Response to Trafficking.

    Get PDF
    This document is part of a digital collection provided by the Martin P. Catherwood Library, ILR School, Cornell University, pertaining to the effects of globalization on the workplace worldwide. Special emphasis is placed on labor rights, working conditions, labor market changes, and union organizing.ASI_2013_SUK_UK_In_the_dock.pdf: 350 downloads, before Oct. 1, 2020.0-ASI_2013_SUK_UK_In the dock summary.pdf: 18 downloads, before Oct. 1, 2020

    Vertical integration and firm boundaries : the evidence

    Get PDF
    Since Ronald H. Coase's (1937) seminal paper, a rich set of theories has been developed that deal with firm boundaries in vertical or input–output structures. In the last twenty-five years, empirical evidence that can shed light on those theories also has been accumulating. We review the findings of empirical studies that have addressed two main interrelated questions: First, what types of transactions are best brought within the firm and, second, what are the consequences of vertical integration decisions for economic outcomes such as prices, quantities, investment, and profits. Throughout, we highlight areas of potential cross-fertilization and promising areas for future work

    Unlocking the secrets of Miri country music festival in Malaysia: a moderated-mediation model examining the power of FOMO, flow and festival satisfaction in driving revisiting intentions

    Get PDF
    This study explores how the fear of missing out (FOMO) affects the flow experience, festival satisfaction, and revisitation intention of attendees at a country music festival. Based on the cognitive appraisal theory, the study surveyed 317 participants and found that several factors contribute to the flow experience, which in turn impacts festival satisfaction and revisitation intention. The results reveal that participants with higher FOMO levels have a higher intention to revisit, with festival satisfaction mediating the relationship. This research repositions FOMO as the fear of missing out on the same event that individuals are attending. By highlighting this alternative understanding, the study suggests that FOMO can be leveraged as a resource for event organizers, potentially providing opportunities for engagement and enhancing attendee experiences. The proposed conceptual model and the insights gained from this research offer valuable contributions to the field and provide a foundation for further investigation and theoretical development

    The role of motivation in regulating the extent to which data visualisation literacy influences business intelligence and analytics use in organisations

    Get PDF
    Dissertation (MCom (Informatics))--University of Pretoria 2022.The ability to read and interpret visualised data is a critical skill to have in this information age where business intelligence and analytics (BI&A) systems are increasingly used to support decision-making. Data visualisation literacy is seen as the foundation of analytics. Moreover, there is great hype about data-driven analytical culture and data democratisation, where users are encouraged to have wide access to data and fully use BI&A to reap the benefits. Motivation is a stimulant to the richer use of any information system (IS), yet literature provides a limited understanding of the evaluation of data visualisation literacy and the effect of motivation in the BI&A context. Thus, this study aims to explain the role of motivation in regulating the extent to which data visualisation literacy influences BI&A’s exploitative and explorative use in organisations. Data visualisation literacy is measured using six data visualisations that focus on the five cognitive basic intelligent analytical tasks that assess the user's ability to read and interpret visualised data. Two types of motivations are assessed using perceived enjoyment as an intrinsic motivator and perceived usefulness as an extrinsic motivator. The model is tested using quantitative data collected from 111 users, applying Structural Equation Modelling (SEM). The results indicate that intrinsic motivation exerts a positive effect on BI&A exploitative and explorative use while extrinsic motivation has a positive effect on BI&A exploitative use but weakens innovation with a negative effect on explorative use. The results further show an indirect relationship between data visualisation literacy with BI&A use through motivation. In addition, exploitation leads to creativity with exploitation positively being associated with exploration.InformaticsMCom (Informatics)Unrestricte
    • …
    corecore