7,009 research outputs found

    Referent tracking for corporate memories

    Get PDF
    For corporate memory and enterprise ontology systems to be maximally useful, they must be freed from certain barriers placed around them by traditional knowledge management paradigms. This means, above all, that they must mirror more faithfully those portions of reality which are salient to the workings of the enterprise, including the changes that occur with the passage of time. The purpose of this chapter is to demonstrate how theories based on philosophical realism can contribute to this objective. We discuss how realism-based ontologies (capturing what is generic) combined with referent tracking (capturing what is specific) can play a key role in building the robust and useful corporate memories of the future

    Structural and Social Determinants of Opioid Abuse Among Florida-Based Hospitals

    Get PDF
    Background: With over two million people suffering from opioid abuse disorders, the Centers for Medicare and Medicaid Services has identified opioid abuse as a key priority. Florida is one of eight states labeled as a high-burden opioid abuse and is an “epicenter” for opioid use and misuse. Purpose: The purpose of this study was to discover potential predictors of opioid abuse in Florida by exploring specific healthcare delivery, geographic, and patient demographic factors. Methods: A retrospective longitudinal study design was used to examine four years (2014-2017) of Florida inpatient administrative discharge data across 173 hospitals of opioid abuse rate. Main measures included, opioid abuse counts (n=12,804) defined using both ICD-9-CM and ICD-10-CM systems. Negative binomial regression was used to estimate the association between hospital factors, county factor, and opioid abuse hospital rates. Results: We found a statistically significant association between hospital opioid abuse count and hospital size, location, teaching status, patients’ average age, gender, and race. The estimated probability of opioid abuse for a patient if treated in a large hospital is 0.23 (about 23%), significantly higher than small (8%) and medium (17%) size hospitals. The estimated probability of opioid abuse for a patient if treated in a rural hospital is 0.12 (about 12%), while in an urban hospital is higher at 0.17 (about 17%). The risk ratio is 0.71, which means the risk decreased by two-thirds when treated in rural hospitals. We also found that hospitals with a younger patient population, a higher percent of males and a higher proportion of Caucasian patients, are at a higher risk for an increase in opioid abuse counts. Discussion: These findings provide policymakers with crucial insight into Florida’s opioid crisis and the identification of predictive factors that contribute to opioid abuse

    Особенности реализации политики информационной безопасности в создании рациональной системы электронного документального сотрудничества для государственных и коммерческих структур Украины

    Get PDF
    The article presents an algorithm for a reasonable choice of a rational electronic document management system from an existing set of analogues. The main selection criteria are due to the functionality of the software and hardware architectures of the system, as well as the limited number of financial resources. The article substantiates that the information security policy of such a system: first, it will guarantee the adequacy of the level of information protection to the level of its criticality and profitability of implementing information protection measures; secondly, it will allow to evaluate and check the security of information; thirdly, it will ensure the personification of the provisions of the security policy (in relation to the subjects of the EDS) and the reporting (registration, audit) for all critical resources from the security point of view; Fourthly, it will provide visibility of measures to protect information, continuity of the operation of such a system and its restoration in case of unforeseen situations, and so on. Models of threats and the infringer of the chosen CSA will allow to determine the necessary levels of the functioning of the information security subsystem,namely the level of organizational and technical measures, the level of current control and the level of elimination of the consequences of the realized threatsВ статье изложен алгоритм обоснованного выбора рациональной системы электронного документооборота из существующего множества аналогов. Основные критерии выбора обусловлены функциональностью программной и аппаратной архитектур системы, а также ограниченным количеством финансовых ресурсов. В статье обосновано, что политика безопасности информации такой системы: во-первых, даст гарантии адекватности уровня защиты информации уровню ее критичности и рентабельности реализации мероприятий по защите информации; во-вторых, позволит оценить и проверить защищенность информации; в-третьих, обеспечит персонифицикацию положений политики безопасности (в отношении субъектов СЭД) и отчетности (регистрации, аудита)для всех критических с точки зрения безопасности ресурсов; в-четвертых, обеспечит наглядность мероприятий по защиты информации, непрерывность работы такой системы и ее восстановление в случае возникновения непредвиденных ситуаций, и так далее. Модели угроз и нарушителя выбранной СЭД позволят определить необходимые уровни функционирования подсистемы обеспечения безопасности информации, а именно уровень организационно-технических мероприятий, уровень текущего контроля и уровень устранения последствий реализованных угро

    A black art: Ontology, data, and the Tower of Babel problem

    Get PDF
    Computational ontologies are a new type of emerging scientific media (Smith, 2016) that process large quantities of heterogeneous data about portions of reality. Applied computational ontologies are used for semantically integrating (Heiler, 1995; Pileggi & Fernandez-Llatas, 2012) divergent data to represent reality and in so doing applied computational ontologies alter conceptions of materiality and produce new realities based on levels of informational granularity and abstraction (Floridi, 2011), resulting in a new type of informational ontology (Iliadis, 2013) the critical analysis of which requires new methods and frameworks. Currently, there is a lack of literature addressing the theoretical, social, and critical dimensions of such informational ontologies, applied computational ontologies, and the interdisciplinary communities of practice (Brown & Duguid, 1991; Wenger, 1998) that produce them. This dissertation fills a lacuna in communicative work in an emerging subfield of Science and Technology Studies (Latour & Woolgar, 1979) known as Critical Data Studies (boyd & Crawford, 2012; Dalton & Thatcher, 2014; Kitchin & Lauriault, 2014) by adopting a critical framework to analyze the systems of thought that inform applied computational ontology while offering insight into its realism-based methods and philosophical frameworks to gauge their ethical import. Since the early 1990s, computational ontologies have been used to organize massive amounts of heterogeneous data by individuating reality into computable parts, attributes, and relations. This dissertation provides a theory of computational ontologies as technologies of individuation (Simondon, 2005) that translate disparate data to produce informational cohesion. By technologies of individuation I mean engineered artifacts whose purpose is to partition portions of reality into computable informational objects. I argue that data are metastable entities and that computational ontologies restrain heterogeneous data via a process of translation to produce semantic interoperability. In this way, I show that computational ontologies effectively re-ontologize (Floridi, 2013) and produce reality and thus that have ethical consequences, specifically in terms of their application to social reality and social ontology (Searle, 2006). I use the Basic Formal Ontology (Arp, Smith, & Spear, 2015)—the world’s most widely used upper-level ontology—as a case study and analyze its methods and ensuing ethical issues concerning its social application in the Military Ontology before recommending an ethical framework. “Ontology” is a term that is used in philosophy and computer science in related but different ways—philosophical ontology typically concerns metaphysics while computational ontology typically concerns databases. This dissertation provides a critical history and theory of ontology and the interdisciplinary teams of researchers that came to adopt methods from philosophical ontology to build, persuade, and reason with applied computational ontology. Following a critical communication approach, I define applied computational ontology construction as a solution to a communication problem among scientists who seek to create semantic interoperability among data and argue that applied ontology is philosophical, informational in nature, and communicatively constituted (McPhee & Zaug, 2000). The primary aim is to explain how philosophy informs applied computational ontology while showing how such ontologies became instantiated in material organizations, how to study them, and describe their ethical implications

    Music 2025 : The Music Data Dilemma: issues facing the music industry in improving data management

    Get PDF
    © Crown Copyright 2019Music 2025ʼ investigates the infrastructure issues around the management of digital data in an increasingly stream driven industry. The findings are the culmination of over 50 interviews with high profile music industry representatives across the sector and reflects key issues as well as areas of consensus and contrasting views. The findings reveal whilst there are great examples of data initiatives across the value chain, there are opportunities to improve efficiency and interoperability

    A Distributed Object Model for CSCW in the Construction Industry

    Get PDF
    Information about products for the construction industry is increasingly often provided to designers in digital ways that enable them to apply the information directly in the design process. Digital product catalogues are provided using various media and formats and several initiatives are taken by the industry and by CAD developers to integrate this kind of information into CAD systems. Generally, current practice is to distribute the information to designers, for example, by using CD-ROMs or a website where the information can be downloaded. In our research we recognise that distributing information in this manner detaches it from the business processes in the construction supply chain, which is a major disadvantage. The project presented in this paper concerns the implementation in the Dutch construction industry of a methodology for sharing product information through a distributed object model. The methodology, which is called Concept Modelling, forms a generic basis for the support of collaborative design, but is applied in this project to the integration of information from the supply chain in the design process. Through the distributed object model, design information and product information can be integrated while the actual data objects remain at their source. This enables the supply chain to provide information of a high semantic level to designers while keeping the control over the information and maintaining the relationship of the information with their business processes. The advantages of this approach in which information is shared, rather than exchanged, are numerous. Redundancy of information is minimised, consistency is improved, and updated information is available immediately. Moreover, design and construction processes can benefit significantly from the dynamic aspects of accessing information that is tied to business processes in the supply chain. For example, product selection during design can be based on latest information on product details, prices, production methods, and variants of products. This information can be provided to designers automatically and on demand

    Usage Bibliometrics

    Full text link
    Scholarly usage data provides unique opportunities to address the known shortcomings of citation analysis. However, the collection, processing and analysis of usage data remains an area of active research. This article provides a review of the state-of-the-art in usage-based informetric, i.e. the use of usage data to study the scholarly process.Comment: Publisher's PDF (by permission). Publisher web site: books.infotoday.com/asist/arist44.shtm

    Population Objects: Interpassive Subjects

    Get PDF
    While Foucault described population as the object of biopower he did not investigate the practices that make it possible to know population. Rather, he tended to naturalise it as an object on which power can act. However, population is not an object awaiting discovery, but is represented and enacted by specific devices such as censuses and what I call population metrics. The latter enact populations by assembling different categories and measurements of subjects (biographical, biometric and transactional) in myriad ways to identify and measure the performance of populations. I account for both the object and subject by thinking about how devices consist of agencements, that is, specific arrangements of humans and technologies whose mediations and interactions not only enact populations but also produce subjects. I suggest that population metrics render subjects interpassive whereby other beings or objects take up the role and act in place of the subject
    corecore