7 research outputs found

    Increased Knowledge Transfer and Content Management

    Get PDF
    Is it possible to have too much information? This is a question that organizations are trying to address. In today’s information-driven world, organizations have more data than ever to store, access, and retrieve. But how do organizations transform this wealth of information it into a knowledge asset and a strategic advantage? Furthermore, these knowledge assets need to be accessed and retrieved by different parts of an organization. This paper looks at the challenges encountered by United States Northern Command (USNORTHCOM) to transform documents and content into knowledge that different groups within the organization could leverage. Based on the challenges experienced by USNORTHCOM, this paper proposes a model to assist organizations with the transfer of knowledge between groups

    A Statistical Comparison of Classification Algorithms on a Single Data Set

    Get PDF
    This research uses four classification algorithms in standard and boosted forms to predict members of a class for an online community. We compare two performance measures, area under the curve (AUC) and accuracy in the standard and boosted forms. The research compares four popular algorithms Bayes, logistic regression, J48 and Nearest Neighbor (NN). The analysis shows that there are significant differences among the base classification algorithms—J48 had the best accuracy. Additionally, the results show that boosted methods improved the accuracy of logistic regression. ANOVA was used to detect the differences between the algorithms; post hoc analysis shows the differences between specific algorithms

    A Comparative Analysis of Persona Clustering Methods

    Get PDF
    Current and future information systems require a better understanding of the interactions between users and systems in order to improve system use, and ultimately, success. The use of personas as design tools is becoming more widespread as academicians and practitioners discover its benefits. This paper presents an empirical study comparing the performance of existing qualitative and quantitative clustering techniques at the task of identifying personas and grouping system users into those personas. A method based on Factor (Principal Component) Analysis outperforms two others using Latent Semantic Analysis and Multivariate Cluster Analysis

    What Do We Mean by Law and Social Transformation?

    Get PDF
    In Canada the entrenchment of the Charter of Rights and Freedoms generated a good deal of debate about the possibility of using law in the struggle for social transformation. Although couched in general terms, the current debate is ultimately about the possibility of asserting liberal democratic legal rights in courts in order to transform existing relations of subordination and domination. Somewhat remarkably, the positive claim that litigating entrenched legal rights encourages social transformation tends to be made almost exclusively at the theoretical level. Theoretical possibilities, rather than concrete victories, are invoked to support the claim for the transformative capacity of liberal legal rights. Instead of approaching the question of litigating social change from an exclusively theoretical perspective, this paper examines contemporary examples in order to illustrate some of the possibilities of and limits to this strategy. Specifically, the paper examines how both the labour and women\u27s movements have used the Canadian Charter of Rights and Freedoms to further their social, political and economic goals. Not only did these two groups adopt widely different strategies during the entrenchment process, what is entailed by the assertion of bourgeois legal rights has a different meaning for each. Thus, by contrasting the experience of the labour and women\u27s movements in invoking the Charter it is possible to begin to suggest the limits of liberal rights in the struggle for social transformation

    Why Your Intuition About Cyber Warfare is Probably Wrong

    No full text
    Since the dawn of time, when one caveman first struck another, humans have relied on a natural understanding of their physical environment to conduct warfare. We have an inborn ability to understand the laws of the physical world. In order to shoot an artillery round farther, just add more powder; to provide cover for protection against bullets, hide behind a rock. A private might accidentally shoot the wrong target, but the potential damage is limited by the maximum range of his or her rifle. The laws of physics, however, are counterintuitive in cyberspace. In cyberspace, our understanding of the “laws of physics” is turned on its head. Weapons can be reproduced instantly, “bullets” travel at near the speed of light, destroyed targets can be brought back from the dead, and a seventeen year old can command an army. As human beings we are at a distinct disadvantage when thinking intuitively about cyber warfare. In this article we study where our intuition fails us in cyber warfare and suggest alternate ways to think about the conduct of cyber war that account for the vast differences between the kinetic and the non-kinetic fight. A correct understanding and appreciation of these differences and common misconceptions is absolutely necessary to conduct cyber warfare and to integrate cyber effects into the kinetic battlefield. To ground this work we need to define the term “cyber.” There is significant and evolving debate regarding the precise definition of cyber. For purposes of this article we define cyber as a spectrum of cyberspace operations including Computer Network Attack (CNA), Computer Network Exploitation (CNE), and Computer Network Defense (CND)

    The Case for Cyber

    No full text
    Cyber warfare isn’t hype; it’s real. America’s decisive technological advantage now contains the seed of our undoing. Our technological dependence is woven into the fabric of our way of life and our national defense. GPS satellites guide troops and weapon systems, algorithms fly aircraft and allocate supplies, websites drive personnel assignments and promotion boards, and official and personal data and voice communications almost exclusively transit computer networks. If these critical networks begin to fail, we aren’t a twenty-first century fighting force; we are a 1980-era military. This estimate is generous. In 1980, we knew how to fight using face-to-face communications, manual land navigation, analog radios, and acetate overlays. Today is different. Information technology has largely kept its allure of dramatically increased efficiency at low cost. Thus, we no longer have “stubby pencil” warfighting skills or the extra personnel to handle these myriad manual tasks

    Patient Perceptions of Electronic Medical Records: Physician Satisfaction, Portability, Security, and Quality of Care

    No full text
    Physicians are adopting electronic medical records in much greater numbers today and are escalating the rate of adoption. The American Recovery and Reinvestment Act of 2009 provides incentives for physicians to adopt this technology. The objectives of this paper are to determine whether patient satisfaction is affected by computer use in the exam room and whether patients who have experienced computers in the exam room perceive differences in the utility of electronic medical records. Physicians received higher overall satisfaction scores when a computer was used to retrieve patient information. Physicians received similar satisfaction scores when a computer was used to enter patient information. Patients who have experienced electronic medical records perceive benefits such as increased portability of the record but do not believe that physicians who use electronic medical records produce better health outcomes. Patients who have experienced electronic medical records do not desire more control over their record than those who have traditional medical records
    corecore