427 research outputs found

    The deltaic aquifer of the Werribee irrigation district (WID)

    Full text link

    Using Excel to generate empirical sampling distributions

    Full text link
    Teachers in many introductory statistics courses demonstrate the Central Limit Theorem by using a computer to draw a large number of random samples of size n from a population distribution and plot the resulting empirical sampling distribution of the sample mean. There aremany computer applications that can be used for this (see, for example, the Rice Virtual Lab in Statistics: http://www.ruf.rice.edu/~lane/rvls.html). The effectiveness of such demonstrations has been questioned (see delMas et al (1999))) but in the work presented in this paper we do not rely on sampling distributions to convey or teach statistical concepts; only that the sampling distribution is independent of the distribution of the population, provided the sample size is sufficiently large.We describe a lesson that starts out with a demonstration of the CTL, but sample from a (finite) population where actual census data is provided; doing this may help students more easily relate to the concepts &ndash; they can see the original data as a column of numbers and if the samples are shown they can also see random samples being taken. We continue with this theme of sampling from census data to teach the basic ideas of inference. We end up with standard resampling/bootstrap procedures.We also demonstrate how Excel can provide a tool for developing a learning objects to support the program; a workbook called Sampling.xls is available from www.deakin.edu.au/~rodneyc/PS &gt; Sampling.xls.<br /

    Piloting a Student Digital Accessibility Program

    Get PDF
    In spring 2022, Furman University Libraries piloted an innovative program that provided student workers with foundational knowledge of digital accessibility concepts and facilitated their development of skills in creating, remediating, and checking the accessibility of Word and PDF documents. This article describes the pilot program in-depth, including set-up, costs, implementation, and results

    An empirical study of the influence of different organisation cultures on e-commerce adoption maturity

    Get PDF
    Drawing on Cameron and Quinn&rsquo;s organisational cultures typology that defines four types of organisational culture (i.e., clan, adhocracy, market, and hierarchy), and Daniel et al.&rsquo;s four-stage model of e-commerce adoption, this paper empirically examines the influence of different organisational cultures on e-commerce adoption maturity in small and medium-sized enterprises (SMEs) in Sri Lanka. The result indicates a positive correlation between adhocracy culture and e-commerce adoption. However, those firms with hierarchy cultural characteristics indicate a negative correlation in relation to e-commerce adoption. The organisational culture differences explain these issues

    Students` performance and perception linked to the use of group and audience response systems (GARS) in large classes

    Full text link
    This paper reports an investigation into the impact of Group and Audience Response Systems (GARS) on students&rsquo; learning outcomes, and perceptions of learning in large classes. Performance is compared between students who used the technology, and students who did not, based on progressive assignment and exam results. Perception is assessed based on an online survey questionnaire. The key findings of this study indicate that students who used the technology achieved, on average, 6.70% higher grades compared to those who did not. Further, use of the technology improved the overall achievement of students, on average, regardless of their perception of whether or not it would providean academic advantage. Key findings and future use of the technology are discussed.<br /

    Security and Privacy Concerns for Australian SMEs Cloud Adoption

    Get PDF
    Cloud Computing has become increasingly important for Small and Medium-sized Enterprises because of its cost-effective benefits. However, the adoption of Cloud Computing over the recent years raised challenging issues with regard to privacy and security. In this study, we explored and presented the findings of the influence of privacy and security on Cloud adoption by SMEs. Based on a survey of SMEs across Australia, we analysed the data using structural equation modelling. We found that Cloud privacy and Cloud security are major concerns for SMEs to adopt Cloud computing. The study findings are useful for IT practitioners and regulatory bodies to understand how SMEs consider privacy and security issues for Cloud adoption

    An Empirical Study of Factors Influencing Accounting Information Systems Adoption

    Get PDF
    This study investigates the factors that influence accounting information systems (AIS) adoption among accountants. Drawing on the unified theory of acceptance and use of technology (UTAUT), the task–technology fit (TTF) model and the institutional theory, we developed a research model for AIS adoption by accountants. Data was collected from 216 accountants and multiple linear regression was employed to test the research model. The results showed that five key factors, namely effort expectancy, perceived technology fit, facilitating conditions, self-efficacy and coercive pressure are able to influence the likelihood that accountants would adopt the AIS. This research confirms the need to integrate UTAUT, TTF and institutional theory when studying AIS adoption factors. The findings from this study are useful for senior management, technology consultants, software vendors and accounting professional bodies in promoting the adoption of AIS

    Cybersecurity Issues and Practices in Cloud Context: A comparison amongst Micro, Small and Medium Enterprises

    Get PDF
    The advancement and the proliferation of information systems among enterprises have given rise to cybersecurity. Cybersecurity practices provide a set of techniques and procedures to protect the systems, networks, programs and data from attack, damage, or unauthorised access (ACSC 2020). Such cybersecurity practices vary and are applied differently to different types of enterprises. The purpose of this research is to compare the critical cybersecurity threats and practices in the cloud context among micro, small, and medium enterprises. By conducting a survey among 289 micro, small and medium-sized enterprises in Australia, this study highlights the significant differences in their cloud security practices. It also concludes that future studies that focus on cybersecurity issues and practices in the context of cloud computing should pay attention to these differences
    • …
    corecore