23 research outputs found

    Methods to Study Centrosomes and Cilia in Drosophila

    Get PDF
    The deposited item is a book chapter and is part of the series " Methods in Molecular Biology book series ([MIMB, volume 1454]) published by the publisher Humana Press.The deposited book chapter is a pre-print version and hasn't been submitted to peer reviewing.There is no public supplementary material available for this publication.This publication hasn't any creative commons license associated.Centrioles and cilia are highly conserved eukaryotic organelles. Drosophila melanogaster is a powerful genetic and cell biology model organism, extensively used to discover underlying mechanisms of centrosome and cilia biogenesis and function. Defects in centrosomes and cilia reduce fertility and affect different sensory functions, such as proprioception, olfaction, and hearing. The fly possesses a large diversity of ciliary structures and assembly modes, such as motile, immotile, and intraflagellar transport (IFT)-independent or IFT-dependent assembly. Moreover, all the diverse ciliated cells harbor centrioles at the base of the cilia, called basal bodies, making the fly an attractive model to better understand the biology of this organelle. This chapter describes protocols to visualize centrosomes and cilia by fluorescence and electron microscopy.Fundação Portuguesa para a Ciência e Tecnologia grants: (SFRH/BPD/87479/2012, SFRH/BD/52176/2013); EMBO installation grant; ERC starting grant.info:eu-repo/semantics/publishedVersio

    Software piracy in the workplace: A model and empirical test

    No full text
    Theft of software and other intellectual property has become one of the most visible problems in computing today. This paper details the development and empirical validation of a model of software piracy by individuals in the workplace. The model was developed from the results of prior research into software piracy, and the reference disciplines of the theory of planned behavior, expected utility theory, and deterrence theory. A survey of 201 respondents was used to test the model. The results indicate that individual attitudes, subjective norms, and perceived behavioral control are significant precursors to the intention to illegally copy software. In addition, punishment severity, punishment certainty, and software cost have direct effects on the individual's attitude toward software piracy, whereas punishment certainty has a significant effect on perceived behavioral control. Consequently, strategies to reduce software piracy should focus on these factors. The results add to a growing stream of information systems research into illegal software copying behavior and have significant implications for organizations and industry groups aiming to reduce software piracy

    How endogenous motivations influence user intentions: Beyond the dichotomy of extrinsic and intrinsic user motivations

    No full text
    Information technology (IT) adoption research recognizes theoretical limitations in discerning if and when user behavior results from perceived external influences or from personal volition. A clear understanding of this issue requires a precise distinction between mandatory and volitional behaviors. Consistent with organismic integration theory (OIT), this study situates the locus of user motivations inside the user. Drawing upon an endogenous view of behaviors, this research makes three key contributions. First, it develops the theoretical basis for clearly discerning if and when behavior results from perceived external influences or from personal volition. Specifically, it examines how endogenous psychological feelings of autonomy, freedom, conflict, and external pressure can predict and explain user intentions. Second, it proposes that behavior may result from combinations of perceived external influences and personal volition. Recognizing how such "collections of motivations" together influence behavior advances our understanding beyond the "dichotomy" of extrinsic versus intrinsic motivations often adopted in prior research. Third, it proposes that some desired behaviors may be thwarted or impeded by a conflict between perceived external influences and personal volition. The theoretically grounded research model was empirically validated in a field study on Blackboard, a Web-based education platform at a large university. Data collected from a sample of 211 users were tested using structural equation models of initial system adoption and experienced use. Empirical support was found for the proposed model and related hypotheses. The results of this study advance our understanding about user motivations for adopting IT. © 2008 M.E. Sharpe, Inc

    The effects of computer monitoring on the medical transcriptionist's performance and stress

    No full text
    This study serves to evaluate the effects of computer monitoring on the performance of medical transcriptionists. The results of the study show that performance increases in the monitored state but that perceived levels of stress decrease in the monitored state. Previous studies are discussed in light of health information managers' use of monitoring technology to increase the effectiveness of medical transcriptionists

    Knowledge exploration and exploitation: The impacts of psychological climate and knowledge management system access

    No full text
    Firms need to balance efficiency gains obtained through exploiting existing knowledge assets with long-term Fcompetitive viability achieved through exploring new knowledge resources. Because the use of knowledge management systems (KMSs) continues to expand, understanding how these systems affect exploration and exploitation practices at the individual level is important to advance both knowledge management theory and practice. This study reports the results of a multi-industry survey investigating how psychological climate and KMS access influence solution reuse (exploitation) and solution innovation (exploration) in the context of technical support work. Our results show that KMS access does not directly determine solution innovation or solution reuse. Instead, KMS access strengthens the positive relationship between a climate for innovation and solution innovation and reverses the positive relationship between a climate for autonomy and solution innovation. The implications for knowledge management research and practice are discussed. © 2011 INFORMS

    Spreadsheet Presentation and Error Detection: An Experimental Study

    No full text
    The pervasiveness and impact of electronic spreadsheets have generated serious concerns about their integrity and validity when used in significant decision-making settings. Previous studies have shown that few of the errors that might exist in any given spreadsheet are found, even when the reviewer is explicitly looking for errors. It was hypothesized that differences in the spreadsheets' presentation and their formulas could affect the detection rate of these errors. A sample of 113 M.B.A. students volunteered to search for eight errors planted in a one-page spreadsheet. The spreadsheet was presented in five different formats. A 2x2 design specified that four groups were given apparently conventional spreadsheets for comparing paper and screen and the presence or absence of formulas. A fifth group received a special printed spreadsheet with formulas visibly integrated into the spreadsheet - printed in a small font directly under the resultant values. As in previous studies, only about 50 percent of the errors were found overall. Subjects with printed spreadsheets found more errors than their colleagues with screen-only spreadsheets but they took longer to do so. There was no discernible formula effect; subjects who were able to refer to formulas did not outperform subjects with access to only the final numbers. The special format did not facilitate error finding. Exploratory analysis uncovered some interesting results. The special experimental integrated paper format appeared to diminish the number of correct items falsely identified as errors. There also seemed to be differences in performance that were accounted for by the subjects' self-reported error-finding strategy. Researchers should focus on other factors that might facilitate error finding, and practitioners should be cautious about relying on spreadsheets' accuracy, even those that have been "audited."

    An empirical study of spreadsheet error-finding performance

    No full text
    Several well-founded concerns exist about the integrity and validity of electronic spreadsheets. Thirty CPAs and 30 MBA students volunteered to seek up to two errors planted in each of six spread-sheets to discover if expertise in the domain of accounting and the spreadsheet program would facilitate error-finding performance. Subjects only found, on average, about 55% of the simple, conspicuous errors on the small spreadsheets. As expected, both accounting and spreadsheeting expertise contributed to the subjects' error-finding rate, and those who performed this task with both types of expertise found the largest number of errors in the shortest time. Interestingly, while CPAs were more accurate than non-CPAs in finding accounting-related errors, spreadsheet experts did not outperform novices in finding spreadsheet formula errors. Also, while spreadsheet expertise contributed to greater speed, accounting expertise did not. Future research would further investigate the contribution of spreadsheet expertise to the error-finding task. Practitioners should be aware of the difficulties in finding even simple errors, and develop training programs to facilitate spreadsheet auditors' performance. © 1993

    Problem solving of low data throughput on mobile devices by artefacts prebuffering

    Get PDF
    The paper deals with a problem of low data throughput on wirelessly connected mobile devices and a possibility to solve this problem by prebuffering of selected artefacts. The basics are in determining the problem parts of a mobile device and solve the problem by a model of data prebuffering-based system enhancement for locating and tracking users inside the buildings. The framework uses a WiFi network infrastructure to allow the mobile device determine its indoor position. User location is used for data prebuffering and for pushing information from a server to PDAs. All server data are saved as artefacts with its indoor position information. Accessing prebuffered data on a mobile device can significantly improve a response time needed to view large multimedia data. The solution was tested on a facility management information system built on purpose with a testing collection of about hundred large size artefacts
    corecore