772 research outputs found

    Egress of Adult Sport Fish from an Estuarine Reserve within Merritt Island National Wildlife Refuge, Florida

    Get PDF
    A tag-recapture study was conducted within Merritt Island National Wildlife Refuge in the waters surrounding Kennedy Space Center, Florida (where public access has been restricted since 1962), to document egress of adult sport fish from an estuarine reserve. A total of 3,358 sport fish were tagged within the restricted areas. The species tagged were red drum Sciaenops ocellatus (n = 1,366), spotted seatrout Cynoscion nebulosus (n = 927), black drum Pogonias cromis (n = 760), and common snook Centropomis undecimalis (n = 305). Results showed that adult sport fish moved from the restricted areas within Merritt Island National Wildlife Refuge to surrounding areas open to fishing. The recapture rates, based on angler responses outside of the restricted areas, were 3.1%, 0.8%, 2.9%, and 16.1% for red drum, spotted seatrout, black drum, and common snook, respectively. In general, red drum, spotted seatrout, and black drum were recaptured in waters adjacent to the restricted areas. Common snook, however, migrated from the restricted areas south to inlets. Tag recaptures for red drum, spotted seatrout, and black drum, together with a previous study that found greater abundance and size of sport fish in the restricted areas than in adjacent areas open to fishing, substantiate the fish replenishment zone function of the restricted areas. The restricted areas within Merritt Island National Wildlife Refuge protect fish populations and large adult sport fish egress to surrounding waters open to fishing

    Speech Communication

    Get PDF
    Contains reports on two research projects.U. S. Air Force Cambridge Research Laboratories, Office of Aerospace Research, under Contract F19628-69-C-0044National Institutes of Health (Grant 2 RO1 NB-04332-06

    Analyzing Students’ Technology Use Motivations: An Interpretive Structural Modeling Approach

    Get PDF
    Despite being more meaningful and accurate to consider student technology use motivations as a set of interactive needs and expectations, the possible underlying hierarchical relationships among motivations receive little attention. Drawn from Uses and Gratifications (U&G) approach and from Means-End Chain (MEC) theory, this study investigates how student technology use motivations can be represented as a set of interrelated and hierarchically organized elements. A set of relevant data concerning students’ technology use motivations was collected by the Repertory Grid Interview Technique (RGT) and analyzed qualitatively using content analysis. Eleven identified student technology use motivations were structured by adopting interpretive structure modeling (ISM) technique. By using Multiplication Applied to Classification (MICMAC) technique, eleven identified factors were further classified into three different types of variables: means, consequences, and ends. The findings of this study have significant theoretical and practical implications to both researchers and managers

    A \u27uses and gratifications\u27 approach to understanding the role of wiki technology in enhancing teaching and learning outcomes

    Get PDF
    The use of the Wikis in both post-graduate and undergraduate teaching is rapidly increasing in popularity. Much of the research into the use of this technology has focused on the practical aspects of how the technology can be used and is yet to address why it is used, or in what way it enhances teaching and learning outcomes. A comparison of the key characteristics of the constructivist learning approach and Wikis suggests that Wikis could provide considerable support of this approach, however research into the motivations for using the technology is required so that good teaching practices may be applied to the use of Wikis when utilized in the higher education context. This study articulates a research design grounded in the Technology Mediated Learning (TML) paradigm that could be used to explore teachers and students’ motivations for using Wiki technology to enhance teaching and learning outcomes. Using the ‘Uses and Gratification’ approach, a popular technique used for understanding user motivation in technology adoption, a two-stage research design is set out. Finally, the paper concludes with a discussion of the implications for both information systems researchers and higher education

    An Investigation of the Impact of Corporate Culture on Employee Information Systems Security Behaviour

    Get PDF
    Information security poses a variety of challenges for any organisation. One such challenge, though often overlooked, is that of the threat posed by users. Whilst a variety of methods are available to control this, none have been particularly successful. An alternative suggested in the literature is the use of organisational culture via corporate governance to improve the security behaviours of individuals (Thomson & von Solms, 2005; von Solms & von Solms, 2004; Mishra & Dhillon, 2006). At the core of these alternative theories is the assumption that culture affects information security, though no literature could be found that tests this relationship. Previous research into the effects of organisational culture on other aspects of an organisation has lead to uncertainty as to the existence of such a relationship, and therefore it needs to be evaluated before these theories can be tested or further utilised. The purpose of this study is twofold, viz, to test the relationship between organisational culture and information security behaviour, and to test the viability of using the Partial Least Squares (PLS) method advocated by Chin & Newstead ( 1999) for this type of research. A model was developed to represent information security attitudes, which, combined with Hofstede’s (1990) model of culture, was used to develop the survey. The model and survey were piloted via interview in the organisations. The results lead us to question the existence of a relationship between organisational culture and information security attitudes

    The Multidimensionality of IT Outsourcing Risks

    Get PDF
    Abstract: IT outsourcing is a complex endeavour with multiple sources of risks. The body of knowledge on the subject is vast but scattered. Our project aims to create an integrated risk and controls framework. This paper discusses the multidimensional nature of outsourcing risks that needs to be addressed when such framework is developed. This paper presents findings from two workshops where risks, their classifications and dimensions where discussed by a group of experienced risk practitioners. The results highlight that practitioners see strategy, stakeholders and the different phases of the outsourcing as important dimensions that create risk and need to be addressed when organisations are planning or running an outsourcing venture. This research confirms that there are a number of dimensions in IT outsourcing risk and it has provided depth to the understanding of these dimensions

    A Typology and Hierarchical Framework of Technology Use in Digital Natives’ Learning

    Get PDF
    The technological capability of digital natives is thought to have considerable implications on the way they communicate, socialize, think and learn. Some researchers have even suggested that fundamental changes to the educational system are required to cater for the needs of this new cohort of learner, although such claims have little empirical support. In this study, we adopt a structural approach to the investigation of the digital natives’ motivations for using technologies in learning. Based on in-depth interviews with 16 digital natives, a cluster analysis was used to segment respondents into two distinct groups: independent learners and traditional learners. Interpretive Structural Modelling (ISM) was used to develop a hierarchical structural model of technology use motivations for each group. The results show that these two groups are driven to achieve the same learning goals by different paths. Implications are drawn for both educators and managers from both research and practical perspectives

    Speech Communication

    Get PDF
    Contains reports on two research projects.National Institutes of Health (Grant MH-04737-03)National Science Foundation (Grant G-16526)National Aeronautics and Space Administration (Grant NsG-496)United States Air Force, Electronic Systems Division (Contract AF19(604)-6102

    Patterns of fish use and piscivore abundance within a reconnected saltmarsh impoundment in the northern Indian River Lagoon, Florida

    Get PDF
    Nearly all saltmarshes in east-central, Florida were impounded for mosquito control during the 1960s. The majority of these marshes have since been reconnected to the estuary by culverts, providing an opportunity to effectively measure exchange of aquatic organisms. A multi-gear approach was used monthly to simultaneously estimate fish standing stock (cast net), fish exchange with the estuary (culvert traps), and piscivore abundance (gill nets and bird counts) to document patterns of fish use in a reconnected saltmarsh impoundment. Changes in saltmarsh fish abundance, and exchange of fish with the estuary reflected the seasonal pattern of marsh flooding in the northern Indian River Lagoon system. During a 6-month period of marsh flooding, resident fish had continuous access to the marsh surface. Large piscivorous fish regularly entered the impoundment via creeks and ditches to prey upon small resident fish, and piscivorous birds aggregated following major fish movements to the marsh surface or to deep habitats. As water levels receded in winter, saltmarsh fish concentrated into deep habitats and emigration to the estuary ensued (200% greater biomass left the impoundment than entered). Fish abundance and community structure along the estuary shoreline (although fringed with marsh vegetation) were not analogous to marsh creeks and ditches. Perimeter ditches provided deep-water habitat for large estuarine predators, and shallow creeks served as an alternative habitat for resident fish when the marsh surface was dry. Use of the impoundment as nursery by transients was limited to Mugil cephalus Linnaeus, but large juvenile and adult piscivorous fish used the impoundment for feeding. In conclusion, the saltmarsh impoundment was a feeding site for piscivorous fish and birds, and functioned as a net exporter of forage fish to adjacent estuarine waters
    • …
    corecore