769 research outputs found
Tracing the Sagittarius stream with blue horizontal branch stars
The definitive version is available at www.blackwell-synergy.com--Copyright Blackwell Publishing DOI : 10.1111/j.1365-2966.2006.10110.xPeer reviewe
Recommended from our members
Mining learning preferences in web-based instruction: Holists vs. Serialists
Web-based instruction programs are used by learners with diverse knowledge, skills and needs. These differences determine their preferences for the design of Web-based instruction programs and ultimately influence learners' success in using them. Cognitive style has been found to significantly affect learners' preferences of web-based instruction programs. However, the majority of previous studies focus on Field Dependence/Independence. Pask's Holist/Serialist dimension has conceptual links with Field Dependence/Independence but it is left mostly unstudied. Therefore, this study focuses on identifying how this dimension of cognitive style affects learner preferences of Web-based instruction programs. A data mining approach is used to illustrate the difference in preferences between Holists and Serialists. The findings show that there are clear differences in regard to content presentation and navigation support. A set of design features were then produced to help designers incorporate cognitive styles into the development of Web-based instruction programs to ensure that they can accommodate learners' different preferences.This work is partially funded by National Science Council, Taiwan, ROC (NSC 98-2511-S-008-012- MY3; NSC 99-
2511-S-008 -003 -MY2; NSC 99-2631-S-008-001)
The vulnerability of rules in complex work environments: dynamism and uncertainty pose problems for cognition
Many complex work environments rely heavily on cognitive operators using rules. Operators sometimes fail to implement rules, with catastrophic human, social and economic costs. Rule-based error is widely reported, yet the mechanisms of rule vulnerability have received less attention. This paper examines rule vulnerability in the complex setting of airline transport operations. We examined ‘the stable approach criteria rule’, which acts as a system defence during the approach to land. The study experimentally tested whether system state complexity influenced rule failure. The results showed increased uncertainty and dynamism led to increased likelihood of rule failure. There was also an interaction effect, indicating complexity from different sources can combine to further constrain rule-based response. We discuss the results in relation to recent aircraft accidents and suggest that ‘rule-based error’ could be progressed to embrace rule vulnerability, fragility and failure. This better reflects the influence that system behaviour and cognitive variety have on rule-based response. Practitioner Summary: In this study, we examined mechanisms of rule vulnerability in the complex setting of airline transport operations. The results suggest work scenarios featuring high uncertainty and dynamism constrain rule-based response, leading to rules becoming vulnerable, fragile or failing completely. This has significant implications for rule-intensive, safety critical work environments
Dynamic cyber-incident response
Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial purposes is granted providing that copies bear this notice and a full citation on the first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE.Traditional cyber-incident response models have not changed significantly since the early days of the Computer Incident Response with even the most recent incident response life cycle model advocated by the US National Institute of Standards and Technology (Cichonski, Millar, Grance, & Scarfone, 2012) bearing a striking resemblance to the models proposed by early leaders in the field e.g. Carnegie-Mellon University (West-Brown, et al., 2003) and the SANS Institute (Northcutt, 2003). Whilst serving the purpose of producing coherent and effective response plans, these models appear to be created from the perspectives of Computer Security professionals with no referenced academic grounding. They attempt to defend against, halt and recover from a cyber-attack as quickly as possible. However, other actors inside an organisation may have priorities which conflict with these traditional approaches and may ultimately better serve the longer-term goals and objectives of an organisation
Genetic analysis reveals the complex structure of HIV-1 transmission within defined risk groups
We explored the epidemic history of HIV-1 subtype B in the United Kingdom using
statistical methods that infer the population history of pathogens from sampled gene
sequence data. Phylogenetic analysis of HIV-1 pol gene sequences from Britain showed
at least six large transmission chains, indicating a genetically variable, but
epidemiologically homogeneous, epidemic among men having sex with men. Through
coalescent-based analysis we showed that these chains arose through separate
introductions of subtype B strains into the United Kingdom in the early-to-mid 1980s.
After an initial period of exponential growth, the rate of spread generally slowed in the
early 1990s, which is more likely to correlate with behaviour change than with reduced
infectiousness resulting from highly active antiretroviral therapy. Our results provide new
insights into the complexity of HIV-1 epidemics that must be considered when
developing HIV monitoring and prevention initiatives
Recommended from our members
The influence of human factors on user's preferences of web-based applications: A data mining approach
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University on 20/12/2010.As the Web is fast becoming an integral feature in many of our daily lives, designers are faced with the challenge of designing Web-based applications for an increasingly diverse user group. In order to develop applications that successfully meet the needs of this user group, designers have to understand the influence of human factors upon users‘ needs and preferences. To address this issue, this thesis presents an investigation that analyses the influence of three human factors, including cognitive style, prior knowledge and gender differences, on users‘ preferences for Web-based applications. In particular, two applications are studied: Web search tools and Web-based instruction tools. Previous research has suggested a number of relationships between these three human factors, so this thesis was driven by three research questions. Firstly, to what extent is the similarity between the two cognitive style dimensions of Witkin‘s Field Dependence/Independence and Pask‘s Holism/Serialism? Secondly, to what extent do computer experts have the same preferences as Internet experts and computer novices have the same preferences as Internet novices? Finally, to what extent are Field Independent users, experts and males alike, and Field Dependent users, novices and females alike? As traditional statistical analysis methods would struggle to effectively capture such relationships, this thesis proposes an integrated data mining approach that combines feature selection and decision trees to effectively capture users‘ preferences. From this, a framework is developed that integrates the combined effect of the three human factors and can be used to inform system designers.
The findings suggest that firstly, there are links between these three human factors. In terms of cognitive style, the relationship between Field Dependent users and Holists can be seen more clearly than the relationship between Field Independent users and Serialists. In terms of prior knowledge, although it is shown that there is a link between computer experience and Internet experience, computer experts are shown to have similar preferences to Internet novices. In terms of the relationship between all three human factors, the results of this study highlighted that the links between cognitive style and gender and between cognitive style and system experience were found to be stronger than the relationship between system experience and gender. This work contributes both theory and methodology to multiple academic communities, including human-computer interaction, information retrieval and data mining. In terms of theory, it has helped to deepen the understanding of the effects of single and multiple human factors on users‘ preferences for Web-based applications. In terms of methodology, an integrated data mining analysis approach was proposed and was shown that is able to capture users‘ preferences
- …