1,416 research outputs found

    DOES PRIVACY THREAT MATTER IN MOBILE HEALTH SERVICE? FROM HEALTH BELIEF MODEL PERSPECTIVE

    Get PDF
    A lot of mobile health (mHealth) service apps have been launched in the market with advances in technology. When people decide to use these mHealth service apps, they have to provide their personal data or personal health data more or less to the service providers. However, the health data is more sensitive data than general personal data. In addition, the behaviour of using mHealth service apps includes technology use behaviour and health promotion behaviour. Therefore, we employed HBM to be the theory foundation to find out what factors will impact on the intention to upload personal health data via a mHealth service app. Online questionnaires were distributed and 133 valid questionnaires were returned. The results showed the perceived benefits is the only factor to influence an individual intention to upload personal health data. The specific information privacy concerns has no significant effect on the behaviour intention. That means people value the benefits that the mhealth service app can bring more than the threat of privacy they perceived. The construct, disposition to value privacy (DTVP), have strong effects on perceived vulnerability, perceived severity, and specific information privacy concerns. Future studies will be recommended

    Inflation and Growth: Impatience and a Qualitative Equivalence

    Get PDF
    This paper studies the role of an endogenous time preference on the relationship between inflation and growth in the long run in both the money-in-utility-function (MIUF) and transaction costs (TC) models. We establish a qualitative equivalence between the two models in a setup without a labor-leisure tradeoff. When the time preference is decreasing (or increasing) in consumption and real balances, both the MIUF and TC models are qualitatively equivalent in terms of predicting a negative (or positive) relationship between inflation and growth in a steady state. Both a decreasing and an increasing time preference in consumption are consistent with the arguments in the literature. While a decreasing time preference in real balances corroborates with empirical evidence, there is no evidence in support of an increasing time preference in real balances.endogenous time preferences, superneutrality, qualitative equivalence

    Status and Multiple Growth Regimes

    Get PDF
    In order to explain multiple growth regimes, one of the working hypotheses is based on initial conditions. Using a standard optimal growth with the status effect represented by wealth a la Friedman (1953), this paper obtains multiple growth regimes based on initial conditions without reliance on other assumptions such as nonlinearities of production or consumption functions and heterogeneous agents/savings behavior. With the status effect, the resulting equilibrium distribution is characterized by a group with a lower level of income and another group with a higher level of income. Globally, a sufficiently strong monetary policy may be an instrument in order for an economy in poverty traps to take off and become wealthy in the long run. Locally, our model sheds light on the relationship between money/inflation and capital in the long run that, given general cash-in-advance constraints on investment relative to consumption, is determined by the curvature of the utilities of wealth and consumption.one-sector growth model, wealth effect, CIA constraint, takeoff

    A study of the Effects of Information Security Advocacy

    Get PDF
    This study adopted protection motivation theory, construal-level theory, and regulatory focus theory to build a model to understand the effects of information security advocacy. The purposes are as follows: first, understand the impacts on the threat/coping appraisals that different construal-level of security warning messages have. Second, understand the impacts on the information security compliance intention that threat/coping appraisals have. Lastly, understand the moderating effects of different regulatory foci on the relationship between different construallevel of warning messages and the threat/coping appraisals or between the threat/coping appraisals and the compliance intention. In this study, the experimental method and survey are employed. Eight different scenarios related to mobile phone authority setting are designed to proceed with the experiments. At the beginning of this experiment, the participants will be manipulated to a particular regulatory focus (prevention or promotion), then be assigned to one of eight scenarios randomly

    The Influence of Information Security Stress on Security Policy Compliance: A Protection Motivation Theory Perspective

    Get PDF
    The occurrence of security incidents will not only cause substantial loss to the enterprise but also serious damage to goodwill. An enterprise has to formulate and implement effective security policies to reduce the occurrence of security incidents. However, the process of promoting the security policy will put stress on employees. The focus of this paper is whether these pressures will affect staff\u27s compliance with the security policies based on the protection motivation theory. This study uses a survey method and 324 responses are collected. The results show that security task stress and security job stress have a significant impact on the formation of security role stress. Security role stress impacts threat and coping appraisals leading to security compliance

    BIOMECHANICS ANALYSIS OF WATER POLO THROWING

    Get PDF
    The purpose of this study is to investigate the parameters of displacement. velocity, and acceleration of water polo over arm throwing. Six water polo athletes participated in this study. Kwon 3D was utilized to analyze arm movement of water polo shooting, including the displacement, velocity, and acceleration of wrist, elbow, shoulder, and ball. The results indicated, first, the displacement of arm movement was quadratic polynomial at a frequency of 0.6 second with maximum distance of 130.97 cm for ball, 117.17 cm for wrist, 107.04 cm for elbow, and 94.22 cm for shoulder. Second, the velocity of arm movement was a cubic curve with maximum speed of 25.368 m/s for ball, 20.092 m/s for wrist, 19.732 rn/s for elbow, and 23.846 m/s for shoulder. Moreover, the change of maximum velocity of ball and wrist occurred after 1.5 seconds, while the velocity of elbow and shoulder both decreased for 0.5 seconds. Third, the acceleration of arm movement showed a 6th order polynomial at a frequency of 0.2 second with maximum acceleration of 505.082 m/s2 for ball, 545.526 m/s2 for wrist, 401.82 m/s2 for elbow, and 568.26 m/s2 for shoulder

    The Computational Intelligence of MoGo Revealed in Taiwan's Computer Go Tournaments

    Get PDF
    International audienceTHE AUTHORS ARE EXTREMELY GRATEFUL TO GRID5000 for helping in designing and experimenting around Monte-Carlo Tree Search. In order to promote computer Go and stimulate further development and research in the field, the event activities, "Computational Intelligence Forum" and "World 99 Computer Go Championship," were held in Taiwan. This study focuses on the invited games played in the tournament, "Taiwanese Go players versus the computer program MoGo," held at National University of Tainan (NUTN). Several Taiwanese Go players, including one 9-Dan professional Go player and eight amateur Go players, were invited by NUTN to play against MoGo from August 26 to October 4, 2008. The MoGo program combines All Moves As First (AMAF)/Rapid Action Value Estimation (RAVE) values, online "UCT-like" values, offline values extracted from databases, and expert rules. Additionally, four properties of MoGo are analyzed including: (1) the weakness in corners, (2) the scaling over time, (3) the behavior in handicap games, and (4) the main strength of MoGo in contact fights. The results reveal that MoGo can reach the level of 3 Dan with, (1) good skills for fights, (2) weaknesses in corners, in particular for "semeai" situations, and (3) weaknesses in favorable situations such as handicap games. It is hoped that the advances in artificial intelligence and computational power will enable considerable progress in the field of computer Go, with the aim of achieving the same levels as computer chess or Chinese chess in the future

    Detection of the inferred interaction network in hepatocellular carcinoma from EHCO (Encyclopedia of Hepatocellular Carcinoma genes Online)

    Get PDF
    BACKGROUND: The significant advances in microarray and proteomics analyses have resulted in an exponential increase in potential new targets and have promised to shed light on the identification of disease markers and cellular pathways. We aim to collect and decipher the HCC-related genes at the systems level. RESULTS: Here, we build an integrative platform, the Encyclopedia of Hepatocellular Carcinoma genes Online, dubbed EHCO , to systematically collect, organize and compare the pileup of unsorted HCC-related studies by using natural language processing and softbots. Among the eight gene set collections, ranging across PubMed, SAGE, microarray, and proteomics data, there are 2,906 genes in total; however, more than 77% genes are only included once, suggesting that tremendous efforts need to be exerted to characterize the relationship between HCC and these genes. Of these HCC inventories, protein binding represents the largest proportion (~25%) from Gene Ontology analysis. In fact, many differentially expressed gene sets in EHCO could form interaction networks (e.g. HBV-associated HCC network) by using available human protein-protein interaction datasets. To further highlight the potential new targets in the inferred network from EHCO, we combine comparative genomics and interactomics approaches to analyze 120 evolutionary conserved and overexpressed genes in HCC. 47 out of 120 queries can form a highly interactive network with 18 queries serving as hubs. CONCLUSION: This architectural map may represent the first step toward the attempt to decipher the hepatocarcinogenesis at the systems level. Targeting hubs and/or disruption of the network formation might reveal novel strategy for HCC treatment
    corecore