1,326 research outputs found

    Employing Visual Analytics to Understand Worldwide Prevalence and Impact of Diabetes Epidemic

    Get PDF
    The International Diabetes Federation (IDF) has declared diabetes to be one of the largest global health emergencies of the 21st century (International Diabetes Federation). IDF estimates about 415 million adults have diabetes currently and about 318 million adults having impaired glucose tolerance, making them highly susceptible to develop diabetes. As per the estimate in the year 2012, 29.1 million Americans, or 9.3% of the population, had diabetes, and diabetes was the 7th leading cause of death in the United States (American Diabetes Association). Also, the United States has the 3rd largest number of confirmed cases of diabetes after China and India (Albert Einstein College of Medicine). Diabetes is dangerous because it engenders gradual long-term complications like cardiovascular disease, nerve and kidney damage, blindness, hearing loss, and Alzheimer’s disease (Mayoclinic). In this study, we employ visual analytics to analyze and understand the prevalence and impact of diabetes worldwide and within the United States. Our analysis uncovers countries and the counties in the United States that are at higher risk of diabetes, where preventive measures and early detection can help save lives and reduce medical expenses

    Do CIOs Matter? Assessing the Value of CIO Presence in Top Management Teams

    Get PDF
    Though the importance of Chief Information Officers (CIOs) is well recognized in academic literature, concerns have often been expressed about the status of CIOs and their waning influence. In fact, not all firms choose to have Chief Information Officers (CIOs)as a part of their top management teams. This research investigates whether CIO presence/absence in top management teams affect firm performance. We assembled a multi-industry dataset of 205 firms that included CIOs in their TMTs and assessed their financial and market performance over a three year period (2002-2004). We found firms that included CIOs in their top management teams to have significantly better financial performance than their peer firms who did not. The results and their implications are discussed. This study provides an initial step towards understanding the empirical linkages between IT leadership and firm performance

    Examining the Compensation of Chief Information Officers: Do Firm Performance, Size and Industry Membership Matter?

    Get PDF
    Increased uncertainty in the economic and business environments have placed IS function and IS leadership in a quandary today. In this paper, we empirically examine the remuneration of CIOs, and examine their association with firm performance, size and industry membership. Based on compensation data of 213 CIOs in 2002, we test several hypotheses linking the total, annual cash, and long term components of the CIO compensation with firm and industry variables. Our results indicate a strong relationship between CIO compensation and performance, firm size, and industry membership. Firm performance exhibited a strong positive association with all components of CIO pay. Firm size was found to have significant positive association with the total pay and the annual cash components. We also found support for association between specific industry memberships (finance and insurance, manufacturing, and professional services) and CIO pay

    Adoption of RFID Technology: An Exploratory Examination from Supplier\u27s Perspective

    Get PDF
    RFID technology has attracted the attention of several businesses and experts worldwide. Given the potential benefits of RFID such as efficient inventory, streamlined supply chain, reduced stock outs and cost reductions, several retailers such as Wal-Mart and Target have decided to adopt RFID technologies. They have also mandated their suppliers to adopt and use RFID technologies. However, anecdotal reports suggest several challenges that suppliers need to address in the process of RFID adoption. Drawing upon innovation diffusion and inter-organizational technology adoption literature, we seek to understand the RFID adoption process in supplier firms and identify key factors affecting RFID adoption by suppliers. We propose a two-stage research design involving exploratory interviews, followed by a survey. Preliminary results from our ongoing research project will be discussed at AMCIS

    Efficacy of Withania somnifera on lipid profile of endosulfan induced toxicity in Swiss albino mice

    Get PDF
    India is an agrarian country with crops cultivated at a huge scale. Pesticides in recent times have caused serious health hazards in the population which are widely used by the farmers for the better yield of crops. Endosulfan is an organochlorine pesticide, which is widely used by the farmers. But, in the present times, it has caused serious health hazards in the exposed population causing various diseases, including cancer. Hence, the present study on animal aims to observe the protective effect of Withania somnifera against endosulfan induced toxicity in Swiss albino mice. Endosulfan at the dose of 3mg/Kg body weight per day was administered orally to Swiss albino mice for 4 weeks. Then after, W. somnifera at the dose of 1000 mg/Kg b.w. was orally administered for 4 weeks. Mice were sacrificed after the completion of the entire treatment. After dissection, the blood samples were collected for biochemical assay, especially for lipid profile analysis. The lipid profile study showed inclination in the Total cholesterol level (117±6.686 mg/dl), Cholesterol (LDL) (78.83±4.151mg/dl), level and Triglycerides level (60.83±2.613mg/dl), while declination in Cholesterol (HDL) (13.50±1.33mg/dl), level after Endosulfan exposure. But, upon W. somnifera treatment to the endosulfan treated group showed significant (p<0.001) normalisation in the lipid profile levels. Therefore, it was concluded that W. somnifera played a vital role to control the endosulfan induced toxicity

    Behavioral Model For Live Detection of Apps Based Attack

    Full text link
    Smartphones with the platforms of applications are gaining extensive attention and popularity. The enormous use of different applications has paved the way to numerous security threats. The threats are in the form of attacks such as permission control attacks, phishing attacks, spyware attacks, botnets, malware attacks, privacy leakage attacks. Moreover, other vulnerabilities include invalid authorization of apps, compromise on the confidentiality of data, invalid access control. In this paper, an application-based attack modeling and attack detection is proposed. Due to A novel attack vulnerability is identified based on the app execution on the smartphone. The attack modeling involves an end-user vulnerable application to initiate an attack. The vulnerable application is installed at the background end on the smartphone with hidden visibility from the end-user. Thereby, accessing the confidential information. The detection model involves the proposed technique of an Application-based Behavioral Model Analysis (ABMA) scheme to address the attack model. The model incorporates application-based comparative parameter analysis to perform the process of intrusion detection. The ABMA is estimated by using the parameters of power, battery level, and the data usage. Based on the source internet accessibility, the analysis is performed using three different configurations as, WiFi, mobile data, and the combination of the two. The simulation results verify and demonstrates the effectiveness of the proposed model
    • …
    corecore