WorldWideScience

Sample records for net-centric information sharing

  1. Autonomous Information Unit for Fine-Grain Data Access Control and Information Protection in a Net-Centric System

    Science.gov (United States)

    Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.

    2012-01-01

    As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are

  2. Group Centric Networking: Addressing Information Sharing Requirements at the Tactical Edge

    Science.gov (United States)

    2016-04-10

    Group Centric Networking: Addressing Information Sharing Requirements at the Tactical Edge Bow-Nan Cheng, Greg Kuperman, Patricia Deutsch, Logan...been a large push in the U.S. Department of Defense to move to an all Internet Protocol (IP) infrastructure, particularly on the tactical edge . IP and...lossy links, and scaling to large numbers of users. Unfortunately, these are the exact conditions military tactical edge networks must operate within

  3. Metrics for measuring net-centric data strategy implementation

    Science.gov (United States)

    Kroculick, Joseph B.

    2010-04-01

    An enterprise data strategy outlines an organization's vision and objectives for improved collection and use of data. We propose generic metrics and quantifiable measures for each of the DoD Net-Centric Data Strategy (NCDS) data goals. Data strategy metrics can be adapted to the business processes of an enterprise and the needs of stakeholders in leveraging the organization's data assets to provide for more effective decision making. Generic metrics are applied to a specific application where logistics supply and transportation data is integrated across multiple functional groups. A dashboard presents a multidimensional view of the current progress to a state where logistics data shared in a timely and seamless manner among users, applications, and systems.

  4. Cognition to Collaboration: User-Centric Approach and Information Behaviour Theories/Models

    Directory of Open Access Journals (Sweden)

    Alperen M Aydin

    2016-12-01

    Full Text Available Aim/Purpose: The objective of this paper is to review the vast literature of user-centric in-formation science and inform about the emerging themes in information behaviour science. Background:\tThe paradigmatic shift from system-centric to user-centric approach facilitates research on the cognitive and individual information processing. Various information behaviour theories/models emerged. Methodology: Recent information behaviour theories and models are presented. Features, strengths and weaknesses of the models are discussed through the analysis of the information behaviour literature. Contribution: This paper sheds light onto the weaknesses in earlier information behaviour models and stresses (and advocates the need for research on social information behaviour. Findings: Prominent information behaviour models deal with individual information behaviour. People live in a social world and sort out most of their daily or work problems in groups. However, only seven papers discuss social information behaviour (Scopus search. Recommendations for Practitioners\t: ICT tools used for inter-organisational sharing should be redesigned for effective information-sharing during disaster/emergency times. Recommendation for Researchers: There are scarce sources on social side of the information behaviour, however, most of the work tasks are carried out in groups/teams. Impact on Society: In dynamic work contexts like disaster management and health care settings, collaborative information-sharing may result in decreasing the losses. Future Research: A fieldwork will be conducted in disaster management context investigating the inter-organisational information-sharing.

  5. The Department of Defense Net-Centric Data Strategy: Implementation Requires a Joint Community of Interest (COI) Working Group and Joint COI Oversight Council

    National Research Council Canada - National Science Library

    Bigger, Clinton R

    2007-01-01

    In 2003, the ASD(NII) DoD CIO published the DoD Net-Centric Data Strategy providing guidance to DoD Components for the development of policies and practices to improve data sharing throughout the DoD...

  6. Achieving DoD's Net Centric Vision of Information Sharing While Overcoming Cultural Biases to Control Information

    National Research Council Canada - National Science Library

    Shaw, Paul M

    2008-01-01

    .... A culture change from a "need to know' to a "need to share" is the desired end state. This culture change is in contrast to known organizational and individual cultural biases to control information...

  7. Network Centric Information Structure - Crisis Information Management

    National Research Council Canada - National Science Library

    Aarholt, Eldar; Berg, Olav

    2004-01-01

    This paper presents a generic Network Centric Information Structure (NCIS) that can be used by civilian, military and public sectors, and that supports information handling applied to crises management and emergency response...

  8. An Extended Petri-Net Based Approach for Supply Chain Process Enactment in Resource-Centric Web Service Environment

    Science.gov (United States)

    Wang, Xiaodong; Zhang, Xiaoyu; Cai, Hongming; Xu, Boyi

    Enacting a supply-chain process involves variant partners and different IT systems. REST receives increasing attention for distributed systems with loosely coupled resources. Nevertheless, resource model incompatibilities and conflicts prevent effective process modeling and deployment in resource-centric Web service environment. In this paper, a Petri-net based framework for supply-chain process integration is proposed. A resource meta-model is constructed to represent the basic information of resources. Then based on resource meta-model, XML schemas and documents are derived, which represent resources and their states in Petri-net. Thereafter, XML-net, a high level Petri-net, is employed for modeling control and data flow of process. From process model in XML-net, RESTful services and choreography descriptions are deduced. Therefore, unified resource representation and RESTful services description are proposed for cross-system integration in a more effective way. A case study is given to illustrate the approach and the desirable features of the approach are discussed.

  9. Net-centric Information Sharing: Supporting the 21st Century Maritime Strategy

    National Research Council Canada - National Science Library

    Green, Daniel M

    2008-01-01

    .... The thesis introduces the concept of Ignorance Management as a risk reduction concept to help focus decision makers, and the IT professionals who support them, on getting the "right information...

  10. Cooperate to Validate. Observal-Net Experts' Report on Validation of Non-Formal and Informal Learning (VNIL) 2013

    Science.gov (United States)

    Weber Guisan, Saskia; Voit, Janine; Lengauer, Sonja; Proinger, Eva; Duvekot, Ruud; Aagaard, Kirsten

    2014-01-01

    The present publication is one of the outcomes of the OBSERVAL-NET project (followup of the OBSERVAL project). The main aim of OBSERVAL-NET was to set up a stakeholder centric network of organisations supporting the validation of non-formal and informal learning in Europe based on the formation of national working groups in the 8 participating…

  11. Cooperate to Validate: OBSERVAL-NET Experts' Report on Validation of Non-Formal and Informal Learning (VNIL) 2013

    Science.gov (United States)

    Weber Guisan, Saskia; Voit, Janine; Lengauer, Sonja; Proinger, Eva; Duvekot, Ruud; Aagaard, Kirsten

    2014-01-01

    The present publication is one of the outcomes of the OBSERVAL-NET project (follow-up of the OBSERVAL project). The main aim of OBSERVAL-NET was to set up a stakeholder-centric network of organisations supporting the validation of non-formal and informal learning in Europe based on the formation of national working groups in the 8 participating…

  12. User-Centric Multi-Criteria Information Retrieval

    Science.gov (United States)

    Wolfe, Shawn R.; Zhang, Yi

    2009-01-01

    Information retrieval models usually represent content only, and not other considerations, such as authority, cost, and recency. How could multiple criteria be utilized in information retrieval, and how would it affect the results? In our experiments, using multiple user-centric criteria always produced better results than a single criteria.

  13. A Reference Architecture for Network-Centric Information Systems

    National Research Council Canada - National Science Library

    Renner, Scott; Schaefer, Ronald

    2003-01-01

    This paper presents the "C2 Enterprise Reference Architecture" (C2ERA), which is a new technical concept of operations for building information systems better suited to the Network-Centric Warfare (NCW) environment...

  14. Model-centric approaches for the development of health information systems.

    Science.gov (United States)

    Tuomainen, Mika; Mykkänen, Juha; Luostarinen, Heli; Pöyhölä, Assi; Paakkanen, Esa

    2007-01-01

    Modeling is used increasingly in healthcare to increase shared knowledge, to improve the processes, and to document the requirements of the solutions related to health information systems (HIS). There are numerous modeling approaches which aim to support these aims, but a careful assessment of their strengths, weaknesses and deficiencies is needed. In this paper, we compare three model-centric approaches in the context of HIS development: the Model-Driven Architecture, Business Process Modeling with BPMN and BPEL and the HL7 Development Framework. The comparison reveals that all these approaches are viable candidates for the development of HIS. However, they have distinct strengths and abstraction levels, they require local and project-specific adaptation and offer varying levels of automation. In addition, illustration of the solutions to the end users must be improved.

  15. Bridging the Gap in Port Security; Network Centric Theory Applied to Public/Private Collaboration

    National Research Council Canada - National Science Library

    Wright, Candice L

    2007-01-01

    ...." Admiral Thad Allen, 2007 The application of Network Centric Warfare theory enables all port stakeholders to better prepare for a disaster through increased information sharing and collaboration...

  16. A design perspective on aligning process-centric and technology-centric approaches

    DEFF Research Database (Denmark)

    Siurdyban, Artur Henryk; Svejvig, Per; Møller, Charles

    2012-01-01

    Enterprise systems management (ESM) and business process management (BPM), although highly correlated, have evolved as alternative approaches to operational transformation. As a result, companies struggle to find the right balance when prioritizing technology and processes as change drivers....... The purpose of this paper is to propose a direction towards aligning the process-centric and technology-centric approaches. Using the case study method, we gain insight into two implementation projects: one of an information technology (IT) system and one of a process. We compare them using design thinking...... and strategic alignment theories. Based on the discussion, we assess the shortcomings of the process-centric and technology-centric approaches and argue that a conjoint design approach is required to achieve alignment between processes and technology. From a theoretical stance, this paper offers design-informed...

  17. SDN Based User-Centric Framework for Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Zhaoming Lu

    2016-01-01

    Full Text Available Due to the rapid growth of mobile data traffic, more and more basestations and access points (APs have been densely deployed to provide users with ubiquitous network access, which make current wireless network a complex heterogeneous network (HetNet. However, traditional wireless networks are designed with network-centric approaches where different networks have different quality of service (QoS strategies and cannot easily cooperate with each other to serve network users. Massive network infrastructures could not assure users perceived network and service quality, which is an indisputable fact. To address this issue, we design a new framework for heterogeneous wireless networks with the principle of user-centricity, refactoring the network from users’ perspective to suffice their requirements and preferences. Different from network-centric approaches, the proposed framework takes advantage of Software Defined Networking (SDN and virtualization technology, which will bring better perceived services quality for wireless network users. In the proposed user-centric framework, control plane and data plane are decoupled to manage the HetNets in a flexible and coadjutant way, and resource virtualization technology is introduced to abstract physical resources of HetNets into unified virtualized resources. Hence, ubiquitous and undifferentiated network connectivity and QoE (quality of experience driven fine-grained resource management could be achieved for wireless network users.

  18. Discussion on the nuclear information resources co-constructing and sharing under network information

    International Nuclear Information System (INIS)

    Wu Yang

    2010-01-01

    During the tenth five-year plan, along with the digitization of information, and the development of information transmission network, the co-construction and sharing of China's nuclear industry information is facing a new development opportunities and challenges. This paper is based on the analysis of the nuclear library status and characteristics, combined of the development process of nuclear information resources over the past 20 years. For the characteristic of information sharing and services in the net environment, the problem in the current co-construction and sharing of nuclear information, and the needs of the future nuclear research and development of nuclear production, this paper forecast the work trends of nuclear information, and gives some countermeasure to strength the development of the co-construction and sharing of nuclear information. (author)

  19. User centric monitoring (UCM) information service for the next generation of Grid-enabled scientists

    International Nuclear Information System (INIS)

    Alexander, D A; Li, C; Lauret, J; Fine, V

    2008-01-01

    Nuclear and high-energy physicists routinely execute data processing and data analysis jobs on a Grid and need to be able to easily and remotely monitor the execution of these jobs. Existing Grid monitoring tools provide abundant information about the whole system, but are geared towards production jobs and well suited for Grid administrators, while the information tailored towards an individual user is not readily available in a user-friendly and user-centric way. Such User Centric information includes monitoring information such as the status of the submitted job, queue position, time of the start/finish, percentage of being done, error messages, standard output, and reasons for failure. We proposed to develop a framework based on Grid service technology that allows scientists to track and monitor their jobs easily from a user-centric view. The proposed framework aims to be flexible so that it can be applied by any Grid Virtual Organization (VO) with various ways of collecting the user-centric job monitoring information built into the framework. Furthermore, the framework provides a rich and reusable set of methods of presenting the information to the user from within a Web browser and other clients. In this presentation, we will give an architectural overview of the UCM service, show an example implementation in the RHIC/STAR experiment context and discuss limitations and future collaborative work

  20. User centric monitoring (UCM) information service for the next generation of Grid-enabled scientists

    Energy Technology Data Exchange (ETDEWEB)

    Alexander, D A; Li, C [Tech-X Corporation, 5621 Arapahoe Avenue Suite A, Boulder, CO 80303 (United States); Lauret, J; Fine, V [Physics Department, Brookhaven National Laboratory, Upton, NY 11973 (United States)], E-mail: alexanda@txcorp.com

    2008-07-15

    Nuclear and high-energy physicists routinely execute data processing and data analysis jobs on a Grid and need to be able to easily and remotely monitor the execution of these jobs. Existing Grid monitoring tools provide abundant information about the whole system, but are geared towards production jobs and well suited for Grid administrators, while the information tailored towards an individual user is not readily available in a user-friendly and user-centric way. Such User Centric information includes monitoring information such as the status of the submitted job, queue position, time of the start/finish, percentage of being done, error messages, standard output, and reasons for failure. We proposed to develop a framework based on Grid service technology that allows scientists to track and monitor their jobs easily from a user-centric view. The proposed framework aims to be flexible so that it can be applied by any Grid Virtual Organization (VO) with various ways of collecting the user-centric job monitoring information built into the framework. Furthermore, the framework provides a rich and reusable set of methods of presenting the information to the user from within a Web browser and other clients. In this presentation, we will give an architectural overview of the UCM service, show an example implementation in the RHIC/STAR experiment context and discuss limitations and future collaborative work.

  1. A distributed name resolution system in information centric networks

    Science.gov (United States)

    Elbreiki, Walid; Arlimatti, Shivaleela; Hassan, Suhaidi; Habbal, Adib; Elshaikh, Mohamed

    2016-08-01

    Information Centric Networks (ICN) is the new paradigm that envisages to shift the Internet away from its existing Point-to-Point architecture to a data centric, where communication is based on named hosts rather than the information stored on these hosts. Name Resolution is the center of attraction for ICN, where Named Data Objects (NDO) are used for identifying the information and guiding for routing or forwarding inside ICN. Recently, several researches use distributed NRS to overcome the problem of interest flooding, congestion and overloading. Yet the distribution of NRS is based on random distribution. How to distribute the NRS is still an important and challenging problem. In this work, we address the problem of distribution of NRS by proposing a new mechanism called Distributed Name Resolution System (DNRS), by considering the time of publishing the NDOs in the NRS. This mechanism partitions the network to distribute the workload among NRSs by increasing storage capacity. In addition, partitioning the network increases flexibility and scalability of NRS. We evaluate the effectiveness of our proposed mechanism, which achieves lesser end-to-end delay with more average throughputs compared to random distribution of NRS without disturbing the underlying routing or forwarding strategies.

  2. Towards Web-based representation and processing of health information

    DEFF Research Database (Denmark)

    Gao, S.; Mioc, Darka; Yi, X.L.

    2009-01-01

    facilitated the online processing, mapping and sharing of health information, with the use of HERXML and Open Geospatial Consortium (OGC) services. It brought a new solution in better health data representation and initial exploration of the Web-based processing of health information. Conclusion: The designed......Background: There is great concern within health surveillance, on how to grapple with environmental degradation, rapid urbanization, population mobility and growth. The Internet has emerged as an efficient way to share health information, enabling users to access and understand data....... For the representation of health information through Web-mapping applications, there still lacks a standard format to accommodate all fixed (such as location) and variable (such as age, gender, health outcome, etc) indicators in the representation of health information. Furthermore, net-centric computing has not been...

  3. Shared decision-making during surgical consultation for gallstones at a safety-net hospital.

    Science.gov (United States)

    Mueck, Krislynn M; Leal, Isabel M; Wan, Charlie C; Goldberg, Braden F; Saunders, Tamara E; Millas, Stefanos G; Liang, Mike K; Ko, Tien C; Kao, Lillian S

    2018-04-01

    Understanding patient perspectives regarding shared decision-making is crucial to providing informed, patient-centered care. Little is known about perceptions of vulnerable patients regarding shared decision-making during surgical consultation. The purpose of this study was to evaluate whether a validated tool reflects perceptions of shared decision-making accurately among patients seeking surgical consultation for gallstones at a safety-net hospital. A mixed methods study was conducted in a sample of adult patients with gallstones evaluated at a safety-net surgery clinic between May to July 2016. Semi-structured interviews were conducted after their initial surgical consultation and analyzed for emerging themes. Patients were administered the Shared Decision-Making Questionnaire and Autonomy Preference Scale. Univariate analyses were performed to identify factors associated with shared decision-making and to compare the results of the surveys to those of the interviews. The majority of patients (N = 30) were female (90%), Hispanic (80%), Spanish-speaking (70%), and middle-aged (45.7 ± 16 years). The proportion of patients who perceived shared decision-making was greater in the Shared Decision-Making Questionnaire versus the interviews (83% vs 27%, P decision for operation was not associated with shared decision-making. Contributory factors to this discordance include patient unfamiliarity with shared decision-making, deference to surgeon authority, lack of discussion about different treatments, and confusion between aligned versus shared decisions. Available questionnaires may overestimate shared decision-making in vulnerable patients suggesting the need for alternative or modifications to existing methods. Furthermore, such metrics should be assessed for correlation with patient-reported outcomes, such as satisfaction with decisions and health status. Copyright © 2017 Elsevier Inc. All rights reserved.

  4. Firewall Mechanism in a User Centric Smart Card Ownership Model

    OpenAIRE

    Akram , Raja Naeem; Markantonakis , Konstantinos; Mayes , Keith

    2010-01-01

    International audience; Multi-application smart card technology facilitates applications to securely share their data and functionality. The security enforcement and assurance in application sharing is provided by the smart card firewall. The firewall mechanism is well defined and studied in the Issuer Centric Smart Card Ownership Model (ICOM), in which a smart card is under total control of its issuer. However, it is not analysed in the User Centric Smart Card Ownership Model (UCOM) that del...

  5. Featureous: infrastructure for feature-centric analysis of object-oriented software

    DEFF Research Database (Denmark)

    Olszak, Andrzej; Jørgensen, Bo Nørregaard

    2010-01-01

    The decentralized nature of collaborations between objects in object-oriented software makes it difficult to understand how user-observable program features are implemented and how their implementations relate to each other. It is worthwhile to improve this situation, since feature-centric program...... understanding and modification are essential during software evolution and maintenance. In this paper, we present an infrastructure built on top of the NetBeans IDE called Featureous that allows for rapid construction of tools for feature-centric analysis of object-oriented software. Our infrastructure...... encompasses a lightweight feature location mechanism, a number of analytical views and an API allowing for addition of third-party extensions. To form a common conceptual framework for future feature-centric extensions, we propose to structure feature centric analysis along three dimensions: perspective...

  6. Sharing information among existing data sources

    Science.gov (United States)

    Ashley, W. R., III

    1999-01-01

    share crucial investigative information across jurisdictional bounds by establishing a communications infrastructure for all of its law enforcement jurisdictions. The Criminal Justice Network (CJ-Net) is a statewide TCP/IP network, dedicated to the sharing of law enforcement information. CJ-Net is managed and maintained by the Florida Department of Law Enforcement (FDLE) and provides open access and privileges to any criminal justice agency, including the state court and penitentiary systems. In addition to Florida, other states, such as North Carolina, are also beginning to implement common protocol communication infrastructures and architectures in order to link local jurisdictions together throughout the state. The law enforcement domain in an optimum situation for information-sharing technologies. Communication infrastructures are continually established, and as such, action is required to effectively use these networks to their full potential. Information technologies that are best suited for the law enforcement domain, must be evaluated and implemented in a cost-effective manner. Unlike the Defense Department and other large federal agencies, individual jurisdictions at both the local and state level cannot afford to expend limited resources on research and development of prototype systems. Therefore, we must identify enabling technologies that have matured in related domains and transition them into law enforcement at a minimum cost. Crucial to this measure, is the selection of the appropriate levels of information-sharing technologies to be inserted. Information-sharing technologies that are unproven or have extensive recurring costs are not suitable for this domain. Information-sharing technologies traditionally exist between two distinct polar bounds: the data warehousing approach and mediation across distributed heterogeneous data sources. These two ends of the spectrum represent extremely different philosophies in accomplishing the same goal. In the

  7. Graph Theoretical Analysis of Network Centric Operations Using Multi-Layer Models

    National Research Council Canada - National Science Library

    Wong-Jiru, Ann

    2006-01-01

    .... The research incorporates the importance of understanding network topology for evaluating an environment for net-centricity and using network characteristics to help commanders assess the effects...

  8. Information sharing for consumption tax purposes : An empirical analysis

    NARCIS (Netherlands)

    Ligthart, Jenny E.

    The paper studies the determinants of information sharing between Swedish tax authorities and 14 EU tax authorities for value-added tax (VAT) purposes. It is shown that trade-related variables (such as the partner country's net trade position and population size), reciprocity, and legal arrangements

  9. Basic Study on Data-Centric design information integration system framework development for adapting Nuclear Power Plant construction in Korea

    Energy Technology Data Exchange (ETDEWEB)

    Lim, Byung Ki [KHNP, Gyeongju (Korea, Republic of)

    2016-05-15

    This study established the concept of data-centric design, which is the latest design technique, by analyzing the existing literature so that the data-centric design would be applied to the nuclear power plant projects in Korea and analyzed the status of data-centric design application by the advanced companies and the domestic design companies participating in the nuclear power plant projects. By analyzing the function of the 3D CAD commercial system and all design drawings used in the nuclear power plant projects in Korea, a data-centric design integrated system model has been developed. This study established the concept of data-centric design technology, analyzed the functions of the plant architect engineering (A/E) software being globally used in the plant field and the design process status of nuclear power plant projects in Korea. A design information integration system building model, which is capable of data-centric design, in the place of the existing document-centric system design such as P and ID and SLD, has been suggested through the investigation on the data-centric design cases of the advanced companies. The major functions of the suggested model required for the application to the domestic industry were drawn. The suggested framework builds the field design, which was performed in the 3D system of the constructor, as an owner's field design system, which can manage all design drawings generated from the field design and the related information in integrated way. An as-built full model integrated of plant architect engineering, supplier design and field design is built. It is handed over to the operation team at the O and M stage and utilized in the maintenance and repair. As a power plant full model of future construction project has been enabled, an improved design process has been suggested, in which only the design change information during the plant architect engineering (A/E) and the design change information during the field design

  10. Featureous: A Tool for Feature-Centric Analysis of Java Software

    DEFF Research Database (Denmark)

    Olszak, Andrzej; Jørgensen, Bo Nørregaard

    2010-01-01

    Feature-centric comprehension of source code is necessary for incorporating user-requested modifications during software evolution and maintenance. However, such comprehension is difficult to achieve in case of large object-oriented programs due to the size, complexity, and implicit character...... of mappings between features and source code. To support programmers in overcoming these difficulties, we present a feature-centric analysis tool, Featureous. Our tool extends the NetBeans IDE with mechanisms for efficient location of feature implementations in legacy source code, and an extensive analysis...

  11. Information Integration Platform for Patient-Centric Healthcare Services: Design, Prototype and Dependability Aspects

    Directory of Open Access Journals (Sweden)

    Yohanes Baptista Dafferianto Trinugroho

    2014-03-01

    Full Text Available Technology innovations have pushed today’s healthcare sector to an unprecedented new level. Various portable and wearable medical and fitness devices are being sold in the consumer market to provide the self-empowerment of a healthier lifestyle to society. Many vendors provide additional cloud-based services for devices they manufacture, enabling the users to visualize, store and share the gathered information through the Internet. However, most of these services are integrated with the devices in a closed “silo” manner, where the devices can only be used with the provided services. To tackle this issue, an information integration platform (IIP has been developed to support communications between devices and Internet-based services in an event-driven fashion by adopting service-oriented architecture (SOA principles and a publish/subscribe messaging pattern. It follows the “Internet of Things” (IoT idea of connecting everyday objects to various networks and to enable the dissemination of the gathered information to the global information space through the Internet. A patient-centric healthcare service environment is chosen as the target scenario for the deployment of the platform, as this is a domain where IoT can have a direct positive impact on quality of life enhancement. This paper describes the developed platform, with emphasis on dependability aspects, including availability, scalability and security.

  12. Theorizing Network-Centric Activity in Education

    Science.gov (United States)

    HaLevi, Andrew

    2011-01-01

    Networks and network-centric activity are increasingly prevalent in schools and school districts. In addition to ubiquitous social network tools like Facebook and Twitter, educational leaders deal with a wide variety of network organizational forms that include professional development, advocacy, informational networks and network-centric reforms.…

  13. Smart Collaborative Caching for Information-Centric IoT in Fog Computing

    Directory of Open Access Journals (Sweden)

    Fei Song

    2017-11-01

    Full Text Available The significant changes enabled by the fog computing had demonstrated that Internet of Things (IoT urgently needs more evolutional reforms. Limited by the inflexible design philosophy; the traditional structure of a network is hard to meet the latest demands. However, Information-Centric Networking (ICN is a promising option to bridge and cover these enormous gaps. In this paper, a Smart Collaborative Caching (SCC scheme is established by leveraging high-level ICN principles for IoT within fog computing paradigm. The proposed solution is supposed to be utilized in resource pooling, content storing, node locating and other related situations. By investigating the available characteristics of ICN, some challenges of such combination are reviewed in depth. The details of building SCC, including basic model and advanced algorithms, are presented based on theoretical analysis and simplified examples. The validation focuses on two typical scenarios: simple status inquiry and complex content sharing. The number of clusters, packet loss probability and other parameters are also considered. The analytical results demonstrate that the performance of our scheme, regarding total packet number and average transmission latency, can outperform that of the original ones. We expect that the SCC will contribute an efficient solution to the related studies.

  14. Smart Collaborative Caching for Information-Centric IoT in Fog Computing.

    Science.gov (United States)

    Song, Fei; Ai, Zheng-Yang; Li, Jun-Jie; Pau, Giovanni; Collotta, Mario; You, Ilsun; Zhang, Hong-Ke

    2017-11-01

    The significant changes enabled by the fog computing had demonstrated that Internet of Things (IoT) urgently needs more evolutional reforms. Limited by the inflexible design philosophy; the traditional structure of a network is hard to meet the latest demands. However, Information-Centric Networking (ICN) is a promising option to bridge and cover these enormous gaps. In this paper, a Smart Collaborative Caching (SCC) scheme is established by leveraging high-level ICN principles for IoT within fog computing paradigm. The proposed solution is supposed to be utilized in resource pooling, content storing, node locating and other related situations. By investigating the available characteristics of ICN, some challenges of such combination are reviewed in depth. The details of building SCC, including basic model and advanced algorithms, are presented based on theoretical analysis and simplified examples. The validation focuses on two typical scenarios: simple status inquiry and complex content sharing. The number of clusters, packet loss probability and other parameters are also considered. The analytical results demonstrate that the performance of our scheme, regarding total packet number and average transmission latency, can outperform that of the original ones. We expect that the SCC will contribute an efficient solution to the related studies.

  15. Smart Collaborative Caching for Information-Centric IoT in Fog Computing

    Science.gov (United States)

    Song, Fei; Ai, Zheng-Yang; Li, Jun-Jie; Zhang, Hong-Ke

    2017-01-01

    The significant changes enabled by the fog computing had demonstrated that Internet of Things (IoT) urgently needs more evolutional reforms. Limited by the inflexible design philosophy; the traditional structure of a network is hard to meet the latest demands. However, Information-Centric Networking (ICN) is a promising option to bridge and cover these enormous gaps. In this paper, a Smart Collaborative Caching (SCC) scheme is established by leveraging high-level ICN principles for IoT within fog computing paradigm. The proposed solution is supposed to be utilized in resource pooling, content storing, node locating and other related situations. By investigating the available characteristics of ICN, some challenges of such combination are reviewed in depth. The details of building SCC, including basic model and advanced algorithms, are presented based on theoretical analysis and simplified examples. The validation focuses on two typical scenarios: simple status inquiry and complex content sharing. The number of clusters, packet loss probability and other parameters are also considered. The analytical results demonstrate that the performance of our scheme, regarding total packet number and average transmission latency, can outperform that of the original ones. We expect that the SCC will contribute an efficient solution to the related studies. PMID:29104219

  16. Variable-scale Geo-information

    NARCIS (Netherlands)

    Meijers, B.M.

    2011-01-01

    The use of geo-information is changing by the advent of new mobile devices, such as tablet-pc's that harness a lot of computing power. This type of information is more and more applied in mainstream digital consumer products, in a net-centric environment (i.e. dissemination takes place via the

  17. Factors shaping effective utilization of health information technology in urban safety-net clinics.

    Science.gov (United States)

    George, Sheba; Garth, Belinda; Fish, Allison; Baker, Richard

    2013-09-01

    Urban safety-net clinics are considered prime targets for the adoption of health information technology innovations; however, little is known about their utilization in such safety-net settings. Current scholarship provides limited guidance on the implementation of health information technology into safety-net settings as it typically assumes that adopting institutions have sufficient basic resources. This study addresses this gap by exploring the unique challenges urban resource-poor safety-net clinics must consider when adopting and utilizing health information technology. In-depth interviews (N = 15) were used with key stakeholders (clinic chief executive officers, medical directors, nursing directors, chief financial officers, and information technology directors) from staff at four clinics to explore (a) nonhealth information technology-related clinic needs, (b) how health information technology may provide solutions, and (c) perceptions of and experiences with health information technology. Participants identified several challenges, some of which appear amenable to health information technology solutions. Also identified were requirements for effective utilization of health information technology including physical infrastructural improvements, funding for equipment/training, creation of user groups to share health information technology knowledge/experiences, and specially tailored electronic billing guidelines. We found that despite the potential benefit that can be derived from health information technologies, the unplanned and uninformed introduction of these tools into these settings might actually create more problems than are solved. From these data, we were able to identify a set of factors that should be considered when integrating health information technology into the existing workflows of low-resourced urban safety-net clinics in order to maximize their utilization and enhance the quality of health care in such settings.

  18. Grid Service for User-Centric Job

    Energy Technology Data Exchange (ETDEWEB)

    Lauret, Jerome

    2009-07-31

    The User Centric Monitoring (UCM) project was aimed at developing a toolkit that provides the Virtual Organization (VO) with tools to build systems that serve a rich set of intuitive job and application monitoring information to the VO’s scientists so that they can be more productive. The tools help collect and serve the status and error information through a Web interface. The proposed UCM toolkit is composed of a set of library functions, a database schema, and a Web portal that will collect and filter available job monitoring information from various resources and present it to users in a user-centric view rather than and administrative-centric point of view. The goal is to create a set of tools that can be used to augment grid job scheduling systems, meta-schedulers, applications, and script sets in order to provide the UCM information. The system provides various levels of an application programming interface that is useful through out the Grid environment and at the application level for logging messages, which are combined with the other user-centric monitoring information in a abstracted “data store”. A planned monitoring portal will also dynamically present the information to users in their web browser in a secure manor, which is also easily integrated into any JSR-compliant portal deployment that a VO might employ. The UCM is meant to be flexible and modular in the ways that it can be adopted to give the VO many choices to build a solution that works for them with special attention to the smaller VOs that do not have the resources to implement home-grown solutions.

  19. Task and Interruption Management in Activity-Centric Computing

    DEFF Research Database (Denmark)

    Jeuris, Steven

    to address these not in isolation, but by fundamentally reevaluating the current computing paradigm. To this end, activity-centric computing has been brought forward as an alternative computing paradigm, addressing the increasing strain put on modern-day computing systems. Activity-centric computing follows...... the scalability and intelligibility of current research prototypes. In this dissertation, I postulate that such issues arise due to a lack of support for the full set of practices which make up activity management. Most notably, although task and interruption management are an integral part of personal...... information management, they have thus far been neglected in prior activity-centric computing systems. Advancing the research agenda of activity-centric computing, I (1) implement and evaluate an activity-centric desktop computing system, incorporating support for interruptions and long-term task management...

  20. Resistance against brute-force attacks on stateless forwarding in information centric networking

    OpenAIRE

    Alzahrani, Bander A.; Reed, Martin J.; Vassilakis, Vassilios G.

    2015-01-01

    Line Speed Publish/Subscribe Inter-networking (LIPSIN) is one of the proposed forwarding mechanisms in Information Centric Networking (ICN). It is a stateless source-routing approach based on Bloom filters. However, it has been shown that LIPSIN is vulnerable to brute-force attacks which may lead to distributed denial-of-service (DDoS) attacks and unsolicited messages. In this work, we propose a new forwarding approach that maintains the advantages of Bloom filter based forwarding while allow...

  1. A cloud-based home health care information sharing system to connect patients with home healthcare staff -A case report of a study in a mountainous region.

    Science.gov (United States)

    Nomoto, Shinichi; Utsumi, Momoe; Sasayama, Satoshi; Dekigai, Hiroshi

    2017-01-01

    We have developed a cloud system, the e-Renraku Notebook (e-RN) for sharing of home care information based on the concept of "patient-centricity". In order to assess the likelihood that our system will enhance the communication and sharing of information between home healthcare staff members and home-care patients, we selected patients who were residing in mountainous regions for inclusion in our study. We herein report the findings.Eighteen staff members from 7 medical facilities and 9 patients participated in the present study.The e-RN was developed for two reasons: to allow patients to independently report their health status and to have staff members view and respond to the information received. The patients and staff members were given iPads with the pre-installed applications and the information being exchanged was reviewed over a 54-day period.Information was mainly input by the patients (61.6%), followed by the nurses who performed home visits (19.9%). The amount of information input by patients requiring high-level nursing care and their corresponding staff member was significantly greater than that input by patients who required low-level of nursing care.This patient-centric system in which patients can independently report and share information with a member of the healthcare staff provides a sense of security. It also allows staff members to understand the patient's health status before making a home visit, thereby giving them a sense of security and confidence. It was also noteworthy that elderly patients requiring high-level nursing care and their staff counterpart input information in the system significantly more frequently than patients who required low-level care.

  2. Information Sharing and Knowledge Sharing as Communicative Activities

    Science.gov (United States)

    Savolainen, Reijo

    2017-01-01

    Introduction: This paper elaborates the picture of information sharing and knowledge sharing as forms of communicative activity. Method: A conceptual analysis was made to find out how researchers have approached information sharing and knowledge sharing from the perspectives of transmission and ritual. The findings are based on the analysis of one…

  3. A Cloud Computing Based Patient Centric Medical Information System

    Science.gov (United States)

    Agarwal, Ankur; Henehan, Nathan; Somashekarappa, Vivek; Pandya, A. S.; Kalva, Hari; Furht, Borko

    This chapter discusses an emerging concept of a cloud computing based Patient Centric Medical Information System framework that will allow various authorized users to securely access patient records from various Care Delivery Organizations (CDOs) such as hospitals, urgent care centers, doctors, laboratories, imaging centers among others, from any location. Such a system must seamlessly integrate all patient records including images such as CT-SCANS and MRI'S which can easily be accessed from any location and reviewed by any authorized user. In such a scenario the storage and transmission of medical records will have be conducted in a totally secure and safe environment with a very high standard of data integrity, protecting patient privacy and complying with all Health Insurance Portability and Accountability Act (HIPAA) regulations.

  4. Secure Peer-to-Peer Networks for Scientific Information Sharing

    Science.gov (United States)

    Karimabadi, Homa

    2012-01-01

    The most common means of remote scientific collaboration today includes the trio of e-mail for electronic communication, FTP for file sharing, and personalized Web sites for dissemination of papers and research results. With the growth of broadband Internet, there has been a desire to share large files (movies, files, scientific data files) over the Internet. Email has limits on the size of files that can be attached and transmitted. FTP is often used to share large files, but this requires the user to set up an FTP site for which it is hard to set group privileges, it is not straightforward for everyone, and the content is not searchable. Peer-to-peer technology (P2P), which has been overwhelmingly successful in popular content distribution, is the basis for development of a scientific collaboratory called Scientific Peer Network (SciPerNet). This technology combines social networking with P2P file sharing. SciPerNet will be a standalone application, written in Java and Swing, thus insuring portability to a number of different platforms. Some of the features include user authentication, search capability, seamless integration with a data center, the ability to create groups and social networks, and on-line chat. In contrast to P2P networks such as Gnutella, Bit Torrent, and others, SciPerNet incorporates three design elements that are critical to application of P2P for scientific purposes: User authentication, Data integrity validation, Reliable searching SciPerNet also provides a complementary solution to virtual observatories by enabling distributed collaboration and sharing of downloaded and/or processed data among scientists. This will, in turn, increase scientific returns from NASA missions. As such, SciPerNet can serve a two-fold purpose for NASA: a cost-savings software as well as a productivity tool for scientists working with data from NASA missions.

  5. Using a layered model to place EW in context within the information sphere

    CSIR Research Space (South Africa)

    Maasdorp, FDV

    2012-11-01

    Full Text Available In recent years, a discussion on the relationship between Electronic Warfare (EW), Information Warfare (IW), Cyber Operations, Net-Centric Warfare, Command and Control, Information Operations (IO) and other constructs have emerged. This paper...

  6. Challenges in sharing information effectively

    DEFF Research Database (Denmark)

    Sonnenwald, Diane H.

    2006-01-01

    collaborating successfully, i.e., a deceptively false shared understanding had emerged. These incidents were analysed to discover what led to these unsuspected breakdowns in information sharing. Results. Unsuspected breakdowns in information sharing emerged when: differences in implementations of shared symbols......Introduction. The goal of information sharing is to change a person's image of the world and to develop a shared working understanding. It is an essential component of collaboration. This paper examines barriers to sharing information effectively in dynamic group work situations. Method. Three...... types of battlefield training simulations were observed and open-ended interviews with military personnel were conducted. Analysis. Observation notes and interview transcripts were analysed to identify incidents when group members erroneously believed they had shared information effectively and were...

  7. GoFFish: A Sub-Graph Centric Framework for Large-Scale Graph Analytics1

    Energy Technology Data Exchange (ETDEWEB)

    Simmhan, Yogesh; Kumbhare, Alok; Wickramaarachchi, Charith; Nagarkar, Soonil; Ravi, Santosh; Raghavendra, Cauligi; Prasanna, Viktor

    2014-08-25

    Large scale graph processing is a major research area for Big Data exploration. Vertex centric programming models like Pregel are gaining traction due to their simple abstraction that allows for scalable execution on distributed systems naturally. However, there are limitations to this approach which cause vertex centric algorithms to under-perform due to poor compute to communication overhead ratio and slow convergence of iterative superstep. In this paper we introduce GoFFish a scalable sub-graph centric framework co-designed with a distributed persistent graph storage for large scale graph analytics on commodity clusters. We introduce a sub-graph centric programming abstraction that combines the scalability of a vertex centric approach with the flexibility of shared memory sub-graph computation. We map Connected Components, SSSP and PageRank algorithms to this model to illustrate its flexibility. Further, we empirically analyze GoFFish using several real world graphs and demonstrate its significant performance improvement, orders of magnitude in some cases, compared to Apache Giraph, the leading open source vertex centric implementation. We map Connected Components, SSSP and PageRank algorithms to this model to illustrate its flexibility. Further, we empirically analyze GoFFish using several real world graphs and demonstrate its significant performance improvement, orders of magnitude in some cases, compared to Apache Giraph, the leading open source vertex centric implementation.

  8. Establishment of the National Nuclear Regulatory Portal (NNRP) as the key element of the Global Nuclear Safety and Security Network and Regulatory Network (GNSSN/RegNet) for sharing of nuclear safety information and knowledge among the Global Expert Community

    International Nuclear Information System (INIS)

    Kuvshinnikov, A.V.

    2011-01-01

    The Global Nuclear Safety and Security Network (GNSSN) implements the concept of the Global Nuclear Safety and Security Framework (GNSSF) as outlined in INSAG 21. This is the framework of instruments and resources for achieving and maintaining worldwide a high level of safety and security at nuclear facilities and activities as stated in SF-1 and supporting safety standards or recommendations such as INSAG-12. National efforts are and should be augmented by the activities of a variety of international enterprises that facilitate safety and security. The IAEA standard GS-R-3 requires that information and knowledge is managed as a resource. Further strengthening of GNSSN in particular regulatory networking as intended by GNSSN/RegNet has to be based on current national priorities, on existing regional and thematic networks and on the established mechanisms of international co-operation as presented for example on the websites of the IAEA or the OECD-NEA. Current design and operation of RegNet are flexible enough to accommodate differences in national and international approaches and practices and to facilitate exchange and cooperation on regulatory matters. The main role of GNSSN/RegNet is sharing knowledge and bringing people together to enhance and promote nuclear safety and security. The objectives of GNSSN/RegNet: enhancing safety and security by international cooperation, sharing information and best practices, enabling adequate access to relevant safety and security information and promoting the dissemination of this information, implementing active collaboration in the relevant areas related to safety and security, such as joint projects, peer reviews, enabling synergies among existing networks and initiatives, informing the public on the relevant safety and security areas and the related international collaboration. In the RegNet part of the GNSSN exist the National Nuclear Regulatory Portal (NNRP) which is on one hand a part of the global RegNet and on the

  9. Understanding Health Information Seeking from an Actor-Centric Perspective

    Directory of Open Access Journals (Sweden)

    Simon Batchelor

    2015-07-01

    Full Text Available This paper presents a conceptual approach for discussing health information seeking among poor households in Africa and Asia. This approach is part of a larger research endeavor aimed at understanding how health systems are adapting; with possibilities and constraints emerging. These health systems can be found in a context of the changing relationships between states, markets and civil society in low and middle income countries. The paper starts from an understanding of the health sector as a “health knowledge economy”, organized to provide people with access to knowledge and advice. The use of the term “health knowledge economy” draws attention to the ways the health sector is part of a broader knowledge economy changing the way individuals and households obtain and use specialist information. The paper integrates an actor centric approach with the theory of planned behavior. It seeks to identify the actors engaged in the health knowledge economy as a precursor to longer term studies on the uptake of innovations integrating health services with mobile phones, commonly designated as mHealth, contributing to an understanding of the potential vulnerabilities of poor people, and highlighting possible dangers if providers of health information and advice are strongly influenced by interest groups.

  10. The New Global Information Economy: Implications and Recommendations for Service-Oriented Architectures (SOAs)

    National Research Council Canada - National Science Library

    Bass, Tim; Donahue, William

    2005-01-01

    Service-oriented architecture (SOA), a term often used today in conjunction with net-centric operations, implies that existing and future DoD information capabilities will be engineered to publish product and/or service offerings...

  11. Information sharing model in supporting implementation of e-procurement service: Case of Bandung city

    Science.gov (United States)

    Ramantoko, Gadang; Irawan, Herry

    2017-10-01

    This research examines the factors influencing the Information Sharing Model in Supporting Implementation of e-Procurement Services: Case of Bandung City in its early maturity stage. The early maturity of information sharing stage was determined using e-Government Maturity Stage Conceptual Framework from Estevez. Bandung City e-Procurement Information Sharing system was categorized at stage 1 in Estevez' model where the concern was mainly on assessing the benefit and risk of implementing the system. The Authors were using DeLone & McLean (D&M) Information System Success model to study benefit and risk of implementing the system in Bandung city. The model was then empirically tested by employing survey data that was collected from the available 40 listed supplier firms. D&M's model adjusted by Klischewski's description was introducing Information Quality, System Quality, and Service Quality as independent variable; Usability and User Satisfaction as intermediate dependent variable; and Perceived Net Benefit as final dependent variable. The findings suggested that, all of the predictors in D&M's model significantly influenced the net perceived benefit of implementing the e-Procurement system in the early maturity stage. The theoretical contribution of this research suggested that D&M's model might find useful in modeling complex information technology successfulness such as the one used in e-Procurement service. This research could also have implications for policy makers (LPSE) and system providers (LKPP) following the introduction of the service. However, the small number of respondent might be considered limitation of the study. The model needs to be further tested using larger number of respondents by involving the population of the firms in extended boundary/municipality area around Bandung.

  12. The Case for a Paradigm Shift in Extension from Information-Centric to Community-Centric Programming

    Science.gov (United States)

    Strong, Emma; Rowntree, Jason; Thurlow, Kable; Raven, Matt R.

    2015-01-01

    Since its establishment through the Smith-Lever Act, the Cooperative Extension Service has sought to use non-formal education programs centered on community needs to provide research-based information. However, the onset of the information age has transformed the way knowledge is shared and as a result altered the way people access information.…

  13. Revisiting video game ratings: Shift from content-centric to parent-centric approach

    Directory of Open Access Journals (Sweden)

    Jiow Hee Jhee

    2017-01-01

    Full Text Available The rapid adoption of video gaming among children has placed tremendous strain on parents’ ability to manage their children’s consumption. While parents refer online to video games ratings (VGR information to support their mediation efforts, there are many difficulties associated with such practice. This paper explores the popular VGR sites, and highlights the inadequacies of VGRs to capture the parents’ concerns, such as time displacement, social interactions, financial spending and various video game effects, beyond the widespread panics over content issues, that is subjective, ever-changing and irrelevant. As such, this paper argues for a shift from content-centric to a parent-centric approach in VGRs, that captures the evolving nature of video gaming, and support parents, the main users of VGRs, in their management of their young video gaming children. This paper proposes a Video Games Repository for Parents to represent that shift.

  14. Group Centric Networking: Large Scale Over the Air Testing of Group Centric Networking

    Science.gov (United States)

    2016-11-01

    Large Scale Over-the-Air Testing of Group Centric Networking Logan Mercer, Greg Kuperman, Andrew Hunter, Brian Proulx MIT Lincoln Laboratory...performance of Group Centric Networking (GCN), a networking protocol developed for robust and scalable communications in lossy networks where users are...devices, and the ad-hoc nature of the network . Group Centric Networking (GCN) is a proposed networking protocol that addresses challenges specific to

  15. A Web Service-Based Framework Model for People-Centric Sensing Applications Applied to Social Networking

    Directory of Open Access Journals (Sweden)

    Jorge Sá Silva

    2012-02-01

    Full Text Available As the Internet evolved, social networks (such as Facebook have bloomed and brought together an astonishing number of users. Mashing up mobile phones and sensors with these social environments enables the creation of people-centric sensing systems which have great potential for expanding our current social networking usage. However, such systems also have many associated technical challenges, such as privacy concerns, activity detection mechanisms or intermittent connectivity, as well as limitations due to the heterogeneity of sensor nodes and networks. Considering the openness of the Web 2.0, good technical solutions for these cases consist of frameworks that expose sensing data and functionalities as common Web-Services. This paper presents our RESTful Web Service-based model for people-centric sensing frameworks, which uses sensors and mobile phones to detect users’ activities and locations, sharing this information amongst the user’s friends within a social networking site. We also present some screenshot results of our experimental prototype.

  16. A Web Service-based framework model for people-centric sensing applications applied to social networking.

    Science.gov (United States)

    Nunes, David; Tran, Thanh-Dien; Raposo, Duarte; Pinto, André; Gomes, André; Silva, Jorge Sá

    2012-01-01

    As the Internet evolved, social networks (such as Facebook) have bloomed and brought together an astonishing number of users. Mashing up mobile phones and sensors with these social environments enables the creation of people-centric sensing systems which have great potential for expanding our current social networking usage. However, such systems also have many associated technical challenges, such as privacy concerns, activity detection mechanisms or intermittent connectivity, as well as limitations due to the heterogeneity of sensor nodes and networks. Considering the openness of the Web 2.0, good technical solutions for these cases consist of frameworks that expose sensing data and functionalities as common Web-Services. This paper presents our RESTful Web Service-based model for people-centric sensing frameworks, which uses sensors and mobile phones to detect users' activities and locations, sharing this information amongst the user's friends within a social networking site. We also present some screenshot results of our experimental prototype.

  17. 2013 Information Sharing Environment Performance Data

    Data.gov (United States)

    Information Sharing Environment — This is a survey of federal departments and agencies who share terrorism information and are therefore considered part of the Information Sharing Environment. The...

  18. 2012 Information Sharing Environment Performance Data

    Data.gov (United States)

    Information Sharing Environment — This is a survey of federal departments and agencies who share terrorism information and are therefore considered part of the Information Sharing Environment. The...

  19. TwiddleNet: Smartphones as Personal Servers

    OpenAIRE

    Gurminder, Singh; Center for the Study of Mobile Devices and Communications

    2012-01-01

    TwiddleNet uses smartphones as personal servers to enable instant content capture and dissemination for firstresponders. It supports the information sharing needs of first responders in the early stages of an emergency response operation. In TwiddleNet, content, once captured, is automatically tagged and disseminated using one of the several networking channels available in smartphones. TwiddleNet pays special attention to minimizing the equipment, network set-up time, and content...

  20. FEATUREOUS: AN INTEGRATED ENVIRONMENT FOR FEATURE-CENTRIC ANALYSIS AND MODIFICATION OF OBJECT-ORIENTED SOFTWARE

    DEFF Research Database (Denmark)

    Olszak, Andrzej; Jørgensen, Bo Nørregaard

    2011-01-01

    The decentralized nature of collaborations between objects in object-oriented software makes it difficult to understand the implementations of user-observable program features and their respective interdependencies. As feature-centric program understanding and modification are essential during...... software maintenance and evolution, this situation needs to change. In this paper, we present Featureous, an integrated development environment built on top of the NetBeans IDE that facilitates feature-centric analysis of object-oriented software. Our integrated development environment encompasses...... a lightweight feature location mechanism, a number of reusable analytical views, and necessary APIs for supporting future extensions. The base of the integrated development environment is a conceptual framework comprising of three complementary dimensions of comprehension: perspective, abstraction...

  1. Towards new information resources for public health--from WordNet to MedicalWordNet.

    Science.gov (United States)

    Fellbaum, Christiane; Hahn, Udo; Smith, Barry

    2006-06-01

    In the last two decades, WordNet has evolved as the most comprehensive computational lexicon of general English. In this article, we discuss its potential for supporting the creation of an entirely new kind of information resource for public health, viz. MedicalWordNet. This resource is not to be conceived merely as a lexical extension of the original WordNet to medical terminology; indeed, there is already a considerable degree of overlap between WordNet and the vocabulary of medicine. Instead, we propose a new type of repository, consisting of three large collections of (1) medically relevant word forms, structured along the lines of the existing Princeton WordNet; (2) medically validated propositions, referred to here as medical facts, which will constitute what we shall call MedicalFactNet; and (3) propositions reflecting laypersons' medical beliefs, which will constitute what we shall call the MedicalBeliefNet. We introduce a methodology for setting up the MedicalWordNet. We then turn to the discussion of research challenges that have to be met to build this new type of information resource. We build a database of sentences relevant to the medical domain. The sentences are generated from WordNet via its relations as well as from medical statements broken down into elementary propositions. Two subcorpora of sentences are distinguished, MedicalBeliefNet and MedicalFactNet. The former is rated for assent by laypersons; the latter for correctness by medical experts. The sentence corpora will be valuable for a variety of applications in information retrieval as well as in research in linguistics and psychology with respect to the study of expert and non-expert beliefs and their linguistic expressions. Our work has to meet several considerable challenges. These include accounting for the distinction between medical experts and laypersons, the social issues of expert-layperson communication in different media, the linguistic aspects of encoding medical knowledge, and

  2. cMapper: gene-centric connectivity mapper for EBI-RDF platform.

    Science.gov (United States)

    Shoaib, Muhammad; Ansari, Adnan Ahmad; Ahn, Sung-Min

    2017-01-15

    In this era of biological big data, data integration has become a common task and a challenge for biologists. The Resource Description Framework (RDF) was developed to enable interoperability of heterogeneous datasets. The EBI-RDF platform enables an efficient data integration of six independent biological databases using RDF technologies and shared ontologies. However, to take advantage of this platform, biologists need to be familiar with RDF technologies and SPARQL query language. To overcome this practical limitation of the EBI-RDF platform, we developed cMapper, a web-based tool that enables biologists to search the EBI-RDF databases in a gene-centric manner without a thorough knowledge of RDF and SPARQL. cMapper allows biologists to search data entities in the EBI-RDF platform that are connected to genes or small molecules of interest in multiple biological contexts. The input to cMapper consists of a set of genes or small molecules, and the output are data entities in six independent EBI-RDF databases connected with the given genes or small molecules in the user's query. cMapper provides output to users in the form of a graph in which nodes represent data entities and the edges represent connections between data entities and inputted set of genes or small molecules. Furthermore, users can apply filters based on database, taxonomy, organ and pathways in order to focus on a core connectivity graph of their interest. Data entities from multiple databases are differentiated based on background colors. cMapper also enables users to investigate shared connections between genes or small molecules of interest. Users can view the output graph on a web browser or download it in either GraphML or JSON formats. cMapper is available as a web application with an integrated MySQL database. The web application was developed using Java and deployed on Tomcat server. We developed the user interface using HTML5, JQuery and the Cytoscape Graph API. cMapper can be accessed at

  3. The Power of Information: Where it's Needed, When it's Needed, To Those Who Need It

    National Research Council Canada - National Science Library

    2006-01-01

    .... Ensuring timely and trusted information is available where it is needed, when it is needed, and to those who need it is at the heart of the capability needed to conduct Net-Centric Operations (NCO...

  4. From unified messaging towards I-centric Services for the virtual home environment

    CERN Document Server

    van der Meer, S

    2001-01-01

    The vision of user centric information and an architecture for the realization of user centric services was discussed. The illustrated framework shows that these ideas can be assembled to set up an environment where services that allow users to interact with their environment are possible. The technologies integrated into the system were platform localization capabilities, environment awareness, communication capabilities and information storage capabilities. (Edited abstract)

  5. A Lightweight TwiddleNet Portal

    National Research Council Canada - National Science Library

    Rimikis, Antonios M

    2008-01-01

    TwiddleNet is a distributed architecture of personal servers that harnesses the power of the mobile devices, enabling real time information and file sharing of multiple data types from commercial-off-the-shelf platforms...

  6. Target-Centric Network Modeling

    DEFF Research Database (Denmark)

    Mitchell, Dr. William L.; Clark, Dr. Robert M.

    In Target-Centric Network Modeling: Case Studies in Analyzing Complex Intelligence Issues, authors Robert Clark and William Mitchell take an entirely new approach to teaching intelligence analysis. Unlike any other book on the market, it offers case study scenarios using actual intelligence...... reporting formats, along with a tested process that facilitates the production of a wide range of analytical products for civilian, military, and hybrid intelligence environments. Readers will learn how to perform the specific actions of problem definition modeling, target network modeling......, and collaborative sharing in the process of creating a high-quality, actionable intelligence product. The case studies reflect the complexity of twenty-first century intelligence issues by dealing with multi-layered target networks that cut across political, economic, social, technological, and military issues...

  7. Internet application: production-technical information system MoNET

    International Nuclear Information System (INIS)

    Tomiga, J.

    2004-01-01

    MoNET is the production-technical information system supporting engineering, operational and maintenance processes of distribution network administrator. It utilizes the model of distribution network that is situated in the geo-space relational database. The geo-space database represents an information base of operational-technical processes. It contains elements and equipment s of the distribution network, failures, operational events, maintenance records, but also, parcels, reference planimetry, e.g. and other subjects for which is relevant the positional datum - geo-space information. MoNET is typically exploited in the fields: - evidence of the subjects and equipment of network, technical documentation; - property administration; - planning of network development, support of designing and construction; - technical calculation; - breakdown controller centre; - maintenance management. MoNET can be implemented as the desktop application, however its first benefit is derived from its usage as the intranet application MoNET WEB for the whole enterprise or organisation. This version enables an unrestricted number of end-users to enter this system. The end-users don't need any special software to enter the data of MoNet WEB application, the pre-installed Internet Explorer will do. (author)

  8. An Integrated Framework to Achieve Interoperability in Person-Centric Health Management

    Directory of Open Access Journals (Sweden)

    Fabio Vergari

    2011-01-01

    Full Text Available The need for high-quality out-of-hospital healthcare is a known socioeconomic problem. Exploiting ICT's evolution, ad-hoc telemedicine solutions have been proposed in the past. Integrating such ad-hoc solutions in order to cost-effectively support the entire healthcare cycle is still a research challenge. In order to handle the heterogeneity of relevant information and to overcome the fragmentation of out-of-hospital instrumentation in person-centric healthcare systems, a shared and open source interoperability component can be adopted, which is ontology driven and based on the semantic web data model. The feasibility and the advantages of the proposed approach are demonstrated by presenting the use case of real-time monitoring of patients' health and their environmental context.

  9. Filtering and Trust as Tools for the Operational Commander in the Information Age

    National Research Council Canada - National Science Library

    Davis, Alan D

    2006-01-01

    ... has. An analysis of this environment points to the impact of network centric warfare, information superiority, shared situational awareness, adaptability, and transparency on the commander's decision-making process...

  10. Concept of „long centric"

    Directory of Open Access Journals (Sweden)

    Martinović Željko

    2004-01-01

    Full Text Available The objective of this paper was to show the historical perspective of the „long centric" occlusal concept and its importance in the modern dentistry, especially from the gnathological aspect. The „long centric" concept represents therapeutic modality used in modern dentistry and occlusal adjustment in all patients showing differences in strong and weak closure of the lower jaw starting from the position of physiological rest/long centric" concept is applied only for anterior teeth and occlusal movements from rather than toward the center. Whenever the „long centric" parameters are not adequate, occlusal disturbance, resulting from the „wedge" effect during the initial closure of the lower jaw, is present. Different degrees of abrasion or hypermobility of the teeth are often the result of the above-mentioned occlusal disturbances and can potentially trigger bruxism and malfunction. Modus procedendi should be the regular approach of every dentist to any occlusion, because only the built-in „long centric" efficiently contributes to the occlusal stability of the anterior portion of the dentition. All occlusions should be routinely tested regarding their need for „long centric", especially when the extensive therapeutic interventions (conservative, prosthetics of the occlusal complex are required.

  11. 2005 Net Centric Operations, Interoperability and Systems Integration Conference - Facilitating Net Centric Operations and Warfare

    Science.gov (United States)

    2005-03-24

    QoS to “the edge” – High bandwidth tactical ad-hoc mobile communications – Laser communications and high bandwidth RF relays – QoS management...Information Management Information Assurance Director, Information Assurance Cross- Cutting & Inter-Dependent Domains ASD(NII)/CIO leads Intelligence...Layer Common ServicesDCGS Integration Backbone (DIB) Data level – J2EE and the Metadata Framework ( MDF ) Application level – J2EE and the workflow engine

  12. Concept of „long centric"

    OpenAIRE

    Martinović Željko; Obradović-Đuričić Kosovka; Teodorović Nevenka S.; Živković Rade

    2004-01-01

    The objective of this paper was to show the historical perspective of the „long centric" occlusal concept and its importance in the modern dentistry, especially from the gnathological aspect. The „long centric" concept represents therapeutic modality used in modern dentistry and occlusal adjustment in all patients showing differences in strong and weak closure of the lower jaw starting from the position of physiological rest/long centric" concept is applied only for anterior teeth and occlusa...

  13. Enhancing the Internet with the CONVERGENCE system an information-centric network coupled with a standard middleware

    CERN Document Server

    Andrade, Maria; Melazzi, Nicola; Walker, Richard; Hussmann, Heinrich; Venieris, Iakovos

    2014-01-01

    Convergence proposes the enhancement of the Internet with a novel, content-centric, publish–subscribe service model based on the versatile digital item (VDI): a common container for all kinds of digital content, including digital representations of real-world resources. VDIs will serve the needs of the future Internet, providing a homogeneous method for handling structured information, incorporating security and privacy mechanisms. CONVERGENCE subsumes the following areas of research: ·         definition of the VDI as a new fundamental unit of distribution and transaction; ·         content-centric networking functionality to complement or replace IP-address-based routing; ·         security and privacy protection mechanisms; ·         open-source middleware, including a community dictionary service to enable rich semantic searches; ·         applications, tested under real-life conditions. This book shows how CONVERGENCE allows publishing, searching and subscri...

  14. Ontology-centric integration and navigation of the dengue literature.

    Science.gov (United States)

    Rajapakse, Menaka; Kanagasabai, Rajaraman; Ang, Wee Tiong; Veeramani, Anitha; Schreiber, Mark J; Baker, Christopher J O

    2008-10-01

    Uninhibited access to the unstructured information distributed across the web and in scientific literature databases continues to be beyond the reach of scientists and health professionals. To address this challenge we have developed a literature driven, ontology-centric navigation infrastructure consisting of a content acquisition engine, a domain-specific ontology (in OWL-DL) and an ontology instantiation pipeline delivering sentences derived by domain-specific text mining. A visual query tool for reasoning over A-box instances in the populated ontology is presented and used to build conceptual queries that can be issued to the knowledgebase. We have deployed this generic infrastructure to facilitate data integration and knowledge sharing in the domain of dengue, which is one of the most prevalent viral diseases that continue to infect millions of people in the tropical and subtropical regions annually. Using our unique methodology we illustrate simplified search and discovery on dengue information derived from distributed resources and aggregated according to dengue ontology. Furthermore we apply data mining to the instantiated ontology to elucidate trends in the mentions of dengue serotypes in scientific abstracts since 1974.

  15. What to Share and Why to Share? A Case Study of CrossBoundary Information Sharing in Taiwan e-Government

    Directory of Open Access Journals (Sweden)

    Tung-Mou Yang

    2013-06-01

    Full Text Available In the public sector, cross-boundary information sharing has been an important theme among governmental collaboration and is critical to organizational efficiency and performance. This research explores the types and characteristics of shared information and the intended purposes of information sharing. In the case study, the cross-boundary shared information can be abstracted into five fundamental types: the collected raw data, the value-added information, the administration oriented information, the administration-oriented knowledge, and the domain-oriented knowledge. Another framework is proposed to conceptualize the purposes of interagency information sharing. The identified seven purposes are administrative work, information search and verification, information aggregation, business process chain, innovative service, experience-based knowledge sharing, and crisis and emergency. The seven purposes do not mean to be an exhaustive list but to provide an initial conceptualization to perceive the functionalities and roles that cross-boundary information sharing plays among government agencies. The two proposed frameworks can help both researchers and practitioners perceive and clarify the fundamental part of cross-boundary information sharing in the public sector. The finding of this research is also expected to enrich the current information-sharing theories and to contribute to the current e-Government literature from an international perspective.

  16. Multiprocessor shared-memory information exchange

    International Nuclear Information System (INIS)

    Santoline, L.L.; Bowers, M.D.; Crew, A.W.; Roslund, C.J.; Ghrist, W.D. III

    1989-01-01

    In distributed microprocessor-based instrumentation and control systems, the inter-and intra-subsystem communication requirements ultimately form the basis for the overall system architecture. This paper describes a software protocol which addresses the intra-subsystem communications problem. Specifically the protocol allows for multiple processors to exchange information via a shared-memory interface. The authors primary goal is to provide a reliable means for information to be exchanged between central application processor boards (masters) and dedicated function processor boards (slaves) in a single computer chassis. The resultant Multiprocessor Shared-Memory Information Exchange (MSMIE) protocol, a standard master-slave shared-memory interface suitable for use in nuclear safety systems, is designed to pass unidirectional buffers of information between the processors while providing a minimum, deterministic cycle time for this data exchange

  17. User-centric networking future perspectives

    CERN Document Server

    Aldini, Alessandro

    2014-01-01

    This work represents a milestone for the? 'ULOOP User-centric Wireless Local Loop' project funded by the EU IST Seventh Framework Programme.ULOOP is focused on the robust, secure, and autonomic deployment of user-centric wireless networks. Contributions by ULOOP partners as well as invited tutorials by international experts in the field. The expected impact is to increase awareness to user-centric networking in terms, e.g., of business opportunities and quality of experience, and to present adequate technology to sustain the growth of user-friendly wireless architectures.Throughout the last 3

  18. Understanding Interdependency Through Complex Information Sharing

    Directory of Open Access Journals (Sweden)

    Fernando Rosas

    2016-01-01

    Full Text Available The interactions between three or more random variables are often nontrivial, poorly understood and, yet, are paramount for future advances in fields such as network information theory, neuroscience and genetics. In this work, we analyze these interactions as different modes of information sharing. Towards this end, and in contrast to most of the literature that focuses on analyzing the mutual information, we introduce an axiomatic framework for decomposing the joint entropy that characterizes the various ways in which random variables can share information. Our framework distinguishes between interdependencies where the information is shared redundantly and synergistic interdependencies where the sharing structure exists in the whole, but not between the parts. The key contribution of our approach is to focus on symmetric properties of this sharing, which do not depend on a specific point of view for differentiating roles between its components. We show that our axioms determine unique formulas for all of the terms of the proposed decomposition for systems of three variables in several cases of interest. Moreover, we show how these results can be applied to several network information theory problems, providing a more intuitive understanding of their fundamental limits.

  19. Upscaling key ecosystem functions across the conterminous United States by a water‐centric ecosystem model

    Science.gov (United States)

    Ge Sun; Peter Caldwell; Asko Noormets; Steven G. McNulty; Erika Cohen; al. et.

    2011-01-01

    We developed a water‐centric monthly scale simulation model (WaSSI‐C) by integrating empirical water and carbon flux measurements from the FLUXNET network and an existing water supply and demand accounting model (WaSSI). The WaSSI‐C model was evaluated with basin‐scale evapotranspiration (ET), gross ecosystem productivity (GEP), and net ecosystem exchange (NEE)...

  20. Human Systems Integration Assessment of Network Centric Command and Control

    National Research Council Canada - National Science Library

    Quashnock, Dee; Kelly, Richard T; Dunaway, John; Smillie, Robert J

    2004-01-01

    .... FORCEnet is the operational construct and architectural framework for Naval Network Centric Warfare in the information age that integrates warriors, sensors, networks, command and control, platforms...

  1. Athena: Towards Decision-Centric Anticipatory Sensor Information Delivery

    Directory of Open Access Journals (Sweden)

    Jongdeog Lee

    2018-01-01

    Full Text Available The paper introduces a new direction in quality-of-service-aware networked sensing that designs communication protocols and scheduling policies for data delivery that are optimized specifically for decision needs. The work complements present decision monitoring and support tools and falls in the larger framework of decision-driven resource management. A hallmark of the new protocols is that they are aware of the inference structure used to arrive at decisions (from logical predicates, as well as the data (and data quality that need to be furnished to successfully evaluate the unknowns on which these decisions are based. Such protocols can therefore anticipate and deliver precisely the right data, at the right level of quality, from the right sources, at the right time, to enable valid and timely decisions at minimum cost to the underlying network. This paper presents the decision model used and the protocol design philosophy, reviews the key recent results and describes a novel system, called Athena, that is the first to embody the aforementioned data delivery paradigm. Evaluation results are presented that compare the performance of decision-centric anticipatory information delivery to several baselines, demonstrating its various advantages in terms of decision timeliness, validity and network resources used. The paper concludes with a discussion of remaining future challenges in this emerging area.

  2. Tactical Web Services: Using XML and Java Web Services to Conduct Real-Time Net-Centric Sonar Visualization

    National Research Council Canada - National Science Library

    Rosetti, Scott

    2004-01-01

    With the unveiling of ForceNet, the Navy's architectural framework for how naval warfare is to be conducted in the information age, much of the technological focus has been placed on Web technology...

  3. Manned/Unmanned Common Architecture Program (MCAP) net centric flight tests

    Science.gov (United States)

    Johnson, Dale

    2009-04-01

    Properly architected avionics systems can reduce the costs of periodic functional improvements, maintenance, and obsolescence. With this in mind, the U.S. Army Aviation Applied Technology Directorate (AATD) initiated the Manned/Unmanned Common Architecture Program (MCAP) in 2003 to develop an affordable, high-performance embedded mission processing architecture for potential application to multiple aviation platforms. MCAP analyzed Army helicopter and unmanned air vehicle (UAV) missions, identified supporting subsystems, surveyed advanced hardware and software technologies, and defined computational infrastructure technical requirements. The project selected a set of modular open systems standards and market-driven commercial-off-theshelf (COTS) electronics and software, and, developed experimental mission processors, network architectures, and software infrastructures supporting the integration of new capabilities, interoperability, and life cycle cost reductions. MCAP integrated the new mission processing architecture into an AH-64D Apache Longbow and participated in Future Combat Systems (FCS) network-centric operations field experiments in 2006 and 2007 at White Sands Missile Range (WSMR), New Mexico and at the Nevada Test and Training Range (NTTR) in 2008. The MCAP Apache also participated in PM C4ISR On-the-Move (OTM) Capstone Experiments 2007 (E07) and 2008 (E08) at Ft. Dix, NJ and conducted Mesa, Arizona local area flight tests in December 2005, February 2006, and June 2008.

  4. Attributable effects from information and outreach programs: Net to gross, NEBs, and beyond

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, David Juri; Skumatz, Lisa A. [Skumatz Economic Research Associates, Inc. (SERA) (United States)

    2007-07-01

    Education, outreach, advertising, and training programs provide particular difficulties in evaluation, as they focus on modifying behaviors and purchases rather than directly installing measures. This paper summarizes the results of a literature review of more than 80 studies evaluating strengths and weaknesses of evaluation work on outreach and education programs. Then, the paper presents the results of several applications of advanced evaluation techniques that are being applied to outreach, education, and training programs. This paper provides the results from detailed net-to-gross (NTG) and non-energy benefits (NEB) evaluations of outreach, training, and education programs, including:A training and education geared toward commercial architects and engineers; Two similar programs geared toward residential builders and remodelers; Residential appliance-related education and outreach programs (Energy Star); and An information-based university program.We provide information from detailed evaluations of the share of energy savings and attributable effects that are due to the program's efforts (net-to-gross ratio), and the non-energy benefits (NEBs) recognized by participants. These results augment the usual evaluation studies, and provide insights that can guide informational, outreach, and training programs to maximize their effectiveness. The attribution and NEB results provide a fuller picture of the benefits from the program, support more sophisticated benefit-cost analysis, provide direction for maximizing program 'bang for the buck', and help support program decision-making and marketing.

  5. On Lifecycle Constraints of Artifact-Centric Workflows

    Science.gov (United States)

    Kucukoguz, Esra; Su, Jianwen

    Data plays a fundamental role in modeling and management of business processes and workflows. Among the recent "data-aware" workflow models, artifact-centric models are particularly interesting. (Business) artifacts are the key data entities that are used in workflows and can reflect both the business logic and the execution states of a running workflow. The notion of artifacts succinctly captures the fluidity aspect of data during workflow executions. However, much of the technical dimension concerning artifacts in workflows is not well understood. In this paper, we study a key concept of an artifact "lifecycle". In particular, we allow declarative specifications/constraints of artifact lifecycle in the spirit of DecSerFlow, and formulate the notion of lifecycle as the set of all possible paths an artifact can navigate through. We investigate two technical problems: (Compliance) does a given workflow (schema) contain only lifecycle allowed by a constraint? And (automated construction) from a given lifecycle specification (constraint), is it possible to construct a "compliant" workflow? The study is based on a new formal variant of artifact-centric workflow model called "ArtiNets" and two classes of lifecycle constraints named "regular" and "counting" constraints. We present a range of technical results concerning compliance and automated construction, including: (1) compliance is decidable when workflow is atomic or constraints are regular, (2) for each constraint, we can always construct a workflow that satisfies the constraint, and (3) sufficient conditions where atomic workflows can be constructed.

  6. PathNet: a tool for pathway analysis using topological information

    Directory of Open Access Journals (Sweden)

    Dutta Bhaskar

    2012-09-01

    Full Text Available Abstract Background Identification of canonical pathways through enrichment of differentially expressed genes in a given pathway is a widely used method for interpreting gene lists generated from high-throughput experimental studies. However, most algorithms treat pathways as sets of genes, disregarding any inter- and intra-pathway connectivity information, and do not provide insights beyond identifying lists of pathways. Results We developed an algorithm (PathNet that utilizes the connectivity information in canonical pathway descriptions to help identify study-relevant pathways and characterize non-obvious dependencies and connections among pathways using gene expression data. PathNet considers both the differential expression of genes and their pathway neighbors to strengthen the evidence that a pathway is implicated in the biological conditions characterizing the experiment. As an adjunct to this analysis, PathNet uses the connectivity of the differentially expressed genes among all pathways to score pathway contextual associations and statistically identify biological relations among pathways. In this study, we used PathNet to identify biologically relevant results in two Alzheimer’s disease microarray datasets, and compared its performance with existing methods. Importantly, PathNet identified de-regulation of the ubiquitin-mediated proteolysis pathway as an important component in Alzheimer’s disease progression, despite the absence of this pathway in the standard enrichment analyses. Conclusions PathNet is a novel method for identifying enrichment and association between canonical pathways in the context of gene expression data. It takes into account topological information present in pathways to reveal biological information. PathNet is available as an R workspace image from http://www.bhsai.org/downloads/pathnet/.

  7. Information partnerships--shared data, shared scale.

    Science.gov (United States)

    Konsynski, B R; McFarlan, F W

    1990-01-01

    How can one company gain access to another's resources or customers without merging ownership, management, or plotting a takeover? The answer is found in new information partnerships, enabling diverse companies to develop strategic coalitions through the sharing of data. The key to cooperation is a quantum improvement in the hardware and software supporting relational databases: new computer speeds, cheaper mass-storage devices, the proliferation of fiber-optic networks, and networking architectures. Information partnerships mean that companies can distribute the technological and financial exposure that comes with huge investments. For the customer's part, partnerships inevitably lead to greater simplification on the desktop and more common standards around which vendors have to compete. The most common types of partnership are: joint marketing partnerships, such as American Airline's award of frequent flyer miles to customers who use Citibank's credit card; intraindustry partnerships, such as the insurance value-added network service (which links insurance and casualty companies to independent agents); customer-supplier partnerships, such as Baxter Healthcare's electronic channel to hospitals for medical and other equipment; and IT vendor-driven partnerships, exemplified by ESAB (a European welding supplies and equipment company), whose expansion strategy was premised on a technology platform offered by an IT vendor. Partnerships that succeed have shared vision at the top, reciprocal skills in information technology, concrete plans for an early success, persistence in the development of usable information for all partners, coordination on business policy, and a new and imaginative business architecture.

  8. Sharing Elderly Healthcare information on Cloud Computing

    OpenAIRE

    Lu, Fangjie; Khan, Israr

    2012-01-01

    Context: Due to rapid increase in the population of elderly people, sharing healthcare information has become an essential requirement for the development of e-health system. By conducting a research in e-health and cloud computing we have explored the advantages and disadvantages of sharing healthcare information for elderly people through cloud computing. Objectives: The main purpose of this research is to investigate the suitability of cloud computing to share healthcare information. The s...

  9. Large scale network-centric distributed systems

    CERN Document Server

    Sarbazi-Azad, Hamid

    2014-01-01

    A highly accessible reference offering a broad range of topics and insights on large scale network-centric distributed systems Evolving from the fields of high-performance computing and networking, large scale network-centric distributed systems continues to grow as one of the most important topics in computing and communication and many interdisciplinary areas. Dealing with both wired and wireless networks, this book focuses on the design and performance issues of such systems. Large Scale Network-Centric Distributed Systems provides in-depth coverage ranging from ground-level hardware issu

  10. Sharing and helping: predictors of adolescents' willingness to share diabetes personal health information with peers.

    Science.gov (United States)

    Vaala, Sarah E; Lee, Joyce M; Hood, Korey K; Mulvaney, Shelagh A

    2018-02-01

    Sharing personal information about type 1 diabetes (T1D) can help adolescents obtain social support, enhance social learning, and improve self-care. Diabetes technologies, online communities, and health interventions increasingly feature data-sharing components. This study examines factors underlying adolescents' willingness to share personal T1D information with peers. Participants were 134 adolescents (12-17 years of age; 56% female) who completed an online survey regarding experiences helping others with T1D, perceived social resources, beliefs about the value of sharing information and helping others, and willingness to share T1D information. Hemoglobin A1c values were obtained from medical records. Adolescents were more willing to share how they accomplished T1D tasks than how often they completed them, and least willing to share glucose control status. In multivariate analyses, sharing/helping beliefs (β = 0.26, P value; β = -0.26, P personal health information. Glucose control moderated relationships such that adolescents with worse A1c values had stronger relationships between sharing/helping beliefs and willingness to share (β = 0.18, P personal health information, particularly if they have better diabetes health status and a stronger belief in the benefits of sharing. Social learning and social media components may improve intervention participation, engagement, and outcomes by boosting adolescents' beliefs about the benefits of sharing information and helping others. © The Author 2017. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  11. Global games with noisy sharing of information

    KAUST Repository

    Touri, Behrouz; Shamma, Jeff S.

    2014-01-01

    We provide a framework for the study of global games with noisy sharing of information. In contrast to the previous works where it is shown that an intuitive threshold policy is an equilibrium for such games, we show that noisy sharing of information leads to non-existence of such an equilibrium. We also investigate the group best-response dynamics of two groups of agents sharing the same information to threshold policies based on each group's observation and show the convergence of such dynamics.

  12. System Dynamics Modeling for Supply Chain Information Sharing

    Science.gov (United States)

    Feng, Yang

    In this paper, we try to use the method of system dynamics to model supply chain information sharing. Firstly, we determine the model boundaries, establish system dynamics model of supply chain before information sharing, analyze the model's simulation results under different changed parameters and suggest improvement proposal. Then, we establish system dynamics model of supply chain information sharing and make comparison and analysis on the two model's simulation results, to show the importance of information sharing in supply chain management. We wish that all these simulations would provide scientific supports for enterprise decision-making.

  13. Anonymity versus privacy: selective information sharing in online cancer communities.

    Science.gov (United States)

    Frost, Jeana; Vermeulen, Ivar E; Beekers, Nienke

    2014-05-14

    Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients' prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. The goal of the present study is to document patient preferences for sharing information within online health platforms. A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F1,114=135.59, P=.001, η(2)=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Respondents' information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity information. The results suggest the need to focus on

  14. Information Sharing and Channel Construction of Supply Chain under Asymmetric Demand Information

    Directory of Open Access Journals (Sweden)

    Guangdong Wu

    2014-01-01

    Full Text Available Information sharing and marketing channel building have become an important problem of supply chain management theory and practice. The research of information sharing focused on traditional channel of supply chain between upstream and downstream enterprises; however, the research ignores the behavior of information sharing with potential entrants and composite structure characteristics about traditional marketing channel with the direct channel. This paper uses the model to research the effects brought about sharing demand information with potential entrants and building marketing channel, which reveals information sharing and channel building mechanism in the supply chain. The study found that the five-force model of Porter regards potential entrants only as a threat that is one-sided. When the channel competitiveness meets certain conditions, manufacturer and retailer will share demand information with potential entrants. Building composite marketing channel is the manufacturer's absolute dominant strategy. Channel construction will increase the entry barriers for potential entrants and weaken the effect of double marginalization; meanwhile, the performance of supply chain will be augmented.

  15. Global games with noisy sharing of information

    KAUST Repository

    Touri, Behrouz

    2014-12-15

    We provide a framework for the study of global games with noisy sharing of information. In contrast to the previous works where it is shown that an intuitive threshold policy is an equilibrium for such games, we show that noisy sharing of information leads to non-existence of such an equilibrium. We also investigate the group best-response dynamics of two groups of agents sharing the same information to threshold policies based on each group\\'s observation and show the convergence of such dynamics.

  16. Information Sharing and Information Acqusition in Credit Markets

    NARCIS (Netherlands)

    Karapetyan, A.; Stacescu, B.

    2009-01-01

    Since information asymmetries have been identified as an important source of bank profits, it may seem that the establishment of information sharing arrangements such as credit registers and bureaus will lead to lower investment in acquiring information. However, banks base their decisions on both

  17. Development of patient centric virtual organizations (PCVOs) in clinical environment for patient information management.

    Science.gov (United States)

    Mohyuddin; Gray, W A; Bailey, Hazel; Jones, Wendy; Morrey, David

    2007-01-01

    A novel Virtual Organization framework which incorporates wireless technology support is presented in the research work. The Virtual Organization is designed for a clinical environment to provide better patient information management and enhanced collaborative working of multidisciplinary care teams. The analysis studies the current clinical practices and looks at the general patient information resource structure currently in use for patient care. Based on this problem analysis and current requirements of the multi-disciplinary care team members, we propose a generic and sustainable Patient Centric Virtual Organization (PCVO) framework to complement the functionality of the existing infrastructure by incorporating wireless technologies support for improved patient information provision at the point of care. The preliminary results of the study identify and classify the specific point of care tasks suited to appropriate information resources needed by the care team members. This paper concentrates on the patient information management aspects brought in by incorporating wireless technologies at the point of care using patient information resources in a decentralized and distributed computing environment. This applied research is carried out in the secondary and tertiary care sector in the cancer domain. For the analysis and results of the pilot project, we have used a case study of a local NHS Cancer Hospital.

  18. Anonymity Versus Privacy: Selective Information Sharing in Online Cancer Communities

    Science.gov (United States)

    Vermeulen, Ivar E; Beekers, Nienke

    2014-01-01

    Background Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients’ prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. Objective The goal of the present study is to document patient preferences for sharing information within online health platforms. Methods A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Results Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F 1,114=135.59, P=.001, η2=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Conclusions Respondents’ information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity

  19. Issue in Information Sharing of Halal Food Supply Chain

    Directory of Open Access Journals (Sweden)

    Masrom Nor Ratna

    2017-01-01

    Full Text Available Information sharing serves as an essential approach for the companies and antecedents of supply chain integration. Nowadays, with the highly competitive in halal food market, information sharing has become more conceivable. Furthermore, information sharing in supply chains has become more efficient by having meaningful relationship with the members of halal supply chain. There is a lack information regarding information shared within members in halal food supply chain literature. The information needed in order to shed the light of how companies nowadays can be more competitive. The purpose of this study is to investigate to what extent the information can be shared among the members of the halal food supply chain. This study elaborates the barriers of information sharing leading to enhanced supply chain integration among enterprises, as a result. The interview with four managers from halal certified food manufactures has been deployed to get rich data about the information sharing. The finding shows that most of cases halal certified food manufacturers has low communication with their suppliers. Trust is the key enablers within the members of halal food supply chain.

  20. Classification of Beta-lactamases and penicillin binding proteins using ligand-centric network models.

    Directory of Open Access Journals (Sweden)

    Hakime Öztürk

    Full Text Available β-lactamase mediated antibiotic resistance is an important health issue and the discovery of new β-lactam type antibiotics or β-lactamase inhibitors is an area of intense research. Today, there are about a thousand β-lactamases due to the evolutionary pressure exerted by these ligands. While β-lactamases hydrolyse the β-lactam ring of antibiotics, rendering them ineffective, Penicillin-Binding Proteins (PBPs, which share high structural similarity with β-lactamases, also confer antibiotic resistance to their host organism by acquiring mutations that allow them to continue their participation in cell wall biosynthesis. In this paper, we propose a novel approach to include ligand sharing information for classifying and clustering β-lactamases and PBPs in an effort to elucidate the ligand induced evolution of these β-lactam binding proteins. We first present a detailed summary of the β-lactamase and PBP families in the Protein Data Bank, as well as the compounds they bind to. Then, we build two different types of networks in which the proteins are represented as nodes, and two proteins are connected by an edge with a weight that depends on the number of shared identical or similar ligands. These models are analyzed under three different edge weight settings, namely unweighted, weighted, and normalized weighted. A detailed comparison of these six networks showed that the use of ligand sharing information to cluster proteins resulted in modules comprising proteins with not only sequence similarity but also functional similarity. Consideration of ligand similarity highlighted some interactions that were not detected in the identical ligand network. Analysing the β-lactamases and PBPs using ligand-centric network models enabled the identification of novel relationships, suggesting that these models can be used to examine other protein families to obtain information on their ligand induced evolutionary paths.

  1. Game-centric pedagogy and curriculums in higher education

    DEFF Research Database (Denmark)

    Nørgård, Rikke Toft; Murray, John; Morgan, James

    2017-01-01

    This paper examines some recent trends in game-centric education for STEAM (science, technology,engineering, art and mathematics) fields, especially those that explore and promote collaborationamong multiple disciplines. We discuss various multimodal design research activities that draw uponthe...... applications and usage of popular technical hackathons and game design jams in educationalenvironments. The intent of this work is to guide and inform new approaches to the corecomponents of STEAM curriculums.Game-centric methods appear to be well-suited to a variety of education and trainingcircumstances...... a valuable vehicle for enhancing general education andlong-term life skills.We conclude by describing some opportunities to undertake qualitative and quantitative research on teams of participants in popular game development events, such as the multinational Global GameJam (GGJ) series. This process involves...

  2. Contracting and Information Sharing Under Supply Chain Competition

    OpenAIRE

    Albert Y. Ha; Shilu Tong

    2008-01-01

    We investigate contracting and information sharing in two competing supply chains, each consisting of one manufacturer and one retailer. The two supply chains are identical, except they may have different investment costs for information sharing. The problem is studied using a two-stage game. In the first stage, the manufacturers decide whether to invest in information sharing. In the second stage, given the information structure created in the first stage, the manufacturers offer contracts t...

  3. China's Chemical Information Online Service: ChI2Net.

    Science.gov (United States)

    Naiyan, Yu; And Others

    1997-01-01

    Describes the Chemical Integrated Information Service Network (ChI2Net), a comprehensive online information service system which includes chemical, technical, economic, market, news, and management information based on computer and modern communication technology that was built by the China National Chemical Information Centre. (Author/LRW)

  4. A Strategic Analysis of Information Sharing Among Cyber Attackers

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2015-10-01

    Full Text Available We build a game theory model where the market design is such that one firm invests in security to defend against cyber attacks by two hackers. The firm has an asset, which is allocated between the three market participants dependent on their contest success. Each hacker chooses an optimal attack, and they share information with each other about the firm’s vulnerabilities. Each hacker prefers to receive information, but delivering information gives competitive advantage to the other hacker. We find that each hacker’s attack and information sharing are strategic complements while one hacker’s attack and the other hacker’s information sharing are strategic substitutes. As the firm’s unit defense cost increases, the attack is inverse U-shaped and reaches zero, while the firm’s defense and profit decrease, and the hackers’ information sharing and profit increase. The firm’s profit increases in the hackers’ unit cost of attack, while the hackers’ information sharing and profit decrease. Our analysis also reveals the interesting result that the cumulative attack level of the hackers is not affected by the effectiveness of information sharing between them and moreover, is also unaffected by the intensity of joint information sharing. We also find that as the effectiveness of information sharing between hackers increases relative to the investment in attack, the firm’s investment in cyber security defense and profit are constant, the hackers’ investments in attacks decrease, and information sharing levels and hacker profits increase. In contrast, as the intensity of joint information sharing increases, while the firm’s investment in cyber security defense and profit remain constant, the hackers’ investments in attacks increase, and the hackers’ information sharing levels and profits decrease. Increasing the firm’s asset causes all the variables to increase linearly, except information sharing which is constant. We extend

  5. Privacy Protection Standards for the Information Sharing Environment

    Science.gov (United States)

    2009-09-01

    enable ISE participants to share information and data (see ISE Implementation Plan, p. 51, ISE Enterprise Architecture Framework, pp. 67, 73–74 and...of frontiers. This article shall not prevent States from requiring the licensing of broadcasting, television or cinema enterprises. 2. The exercise...5 U.S.C. § 552a, as amended. Program Manager-Information Sharing Environment. (2008). Information Sharing Enterprise Architecture Framework

  6. Understanding "Understanding" Flow for Network-Centric Warfare: Military Knowledge-Flow Mechanics

    National Research Council Canada - National Science Library

    Nissen, Mark

    2002-01-01

    Network-centric warfare (NCW) emphasizes information superiority for battlespace efficacy, but it is clear that the mechanics of how knowledge flows are just as important as those pertaining to the networks and communication...

  7. COORDINATION IN MULTILEVEL NETWORK-CENTRIC CONTROL SYSTEMS OF REGIONAL SECURITY: APPROACH AND FORMAL MODEL

    Directory of Open Access Journals (Sweden)

    A. V. Masloboev

    2015-01-01

    Full Text Available The paper deals with development of methods and tools for mathematical and computer modeling of the multilevel network-centric control systems of regional security. This research is carried out under development strategy implementation of the Arctic zone of the Russian Federation and national safeguarding for the period before 2020 in the Murmansk region territory. Creation of unified interdepartmental multilevel computer-aided system is proposed intended for decision-making information support and socio-economic security monitoring of the Arctic regions of Russia. The distinctive features of the investigated system class are openness, self-organization, decentralization of management functions and decision-making, weak hierarchy in the decision-making circuit and goal generation capability inside itself. Research techniques include functional-target approach, mathematical apparatus of multilevel hierarchical system theory and principles of network-centric control of distributed systems with pro-active components and variable structure. The work considers network-centric management local decisions coordination problem-solving within the multilevel distributed systems intended for information support of regional security. The coordination problem-solving approach and problem formalization in the multilevel network-centric control systems of regional security have been proposed based on developed multilevel recurrent hierarchical model of regional socio-economic system complex security. The model provides coordination of regional security indexes, optimized by the different elements of multilevel control systems, subject to decentralized decision-making. The model specificity consists in application of functional-target technology and mathematical apparatus of multilevel hierarchical system theory for coordination procedures implementation of the network-centric management local decisions. The work-out and research results can find further

  8. Information Sharing and Channel Construction of Supply Chain under Asymmetric Demand Information

    OpenAIRE

    Wu, Guangdong; Kong, Qingshan; Shi, Jian-gang; Karimi, Hamid Reza; Zhang, Wei

    2014-01-01

    Information sharing and marketing channel building have become an important problem of supply chain management theory and practice. The research of information sharing focused on traditional channel of supply chain between upstream and downstream enterprises; however, the research ignores the behavior of information sharing with potential entrants and composite structure characteristics about traditional marketing channel with the direct channel. This paper uses the model to research the eff...

  9. Laying the Foundation for a Genomic Rosetta Stone: Creating Information Hubs through the User of Consensus Idenifiers

    Energy Technology Data Exchange (ETDEWEB)

    Van Brabant, Bart; Kyrpides, Nikos; Glockner, Frank Oliver; Gray, Tanya; Field, Dawn; De Vos, Paul; De Baets, Bernard; Dawyndt, Peter

    2007-05-01

    This paper presents a holistic approach that illustrates how the semantic hurdle for integration of biological databases might be overcome when mapping sources that provide information on individual genes and complete genomes to sources that provide information on the biological resources from which these sequences where derived, and vice versa. In particular we will explain how each of the completed and ongoing whole-genome sequencing projects in the Genomes OnLine Database and each of the ribosomal RNA sequences in the SILVA ribosomal RNA database have been persistently cross-referenced with the StrainInfo.net bioportal, serving both a genome centric and an organism centric view to the life on our blue planet as one more stepping stone towards the establishment of fully integrated and flexible biological information networks.

  10. Informal milk sharing: what nurses need to know.

    Science.gov (United States)

    Martino, Kimberly; Spatz, Diane

    2014-01-01

    Human milk is the ideal food for human infants. However, some infants will be in situations wherein there is insufficient human milk to meet their needs. This article addresses formal breast milk donation (donor milk) and informal sharing of breast milk. Healthcare providers are likely to encounter families who access milk by informal breast milk sharing or cross-nursing. Both practices rely heavily on receiving human milk from women who are potentially unscreened for disease, medication, and illicit substances. Therefore, it is important for perinatal nurses to have adequate information to be able to inform these families of the risks and benefits of breast milk sharing. Two case exemplars are provided to illustrate the nuances of informal milk sharing. Implications for practice include providing families with information on health history and laboratory screening as well as safe milk-handling practices.

  11. Exploring a social network for sharing information about pain.

    Science.gov (United States)

    Alvarez, Ana Graziela; Dal Sasso, Grace T Marcon

    2012-01-01

    The purpose of study was to evaluate the opinion of users about the experience of sharing information about pain in a social network. An electronic survey study was conducted from September to November/2009. Nine participants assessed the social network through of an electronic questionnaire. positive aspects (easy access, organized information, interactivity, encourages the sharing of information, learning opportunity). The sharing of information contributes to the development of a collective intelligence based on exchanging experiences and knowledge sharing.

  12. 2012 International Conference on Human-centric Computing

    CERN Document Server

    Jin, Qun; Yeo, Martin; Hu, Bin; Human Centric Technology and Service in Smart Space, HumanCom 2012

    2012-01-01

    The theme of HumanCom is focused on the various aspects of human-centric computing for advances in computer science and its applications and provides an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of human-centric computing. In addition, the conference will publish high quality papers which are closely related to the various theories and practical applications in human-centric computing. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject.

  13. User-centric Query Refinement and Processing Using Granularity Based Strategies

    NARCIS (Netherlands)

    Zeng, Y.; Zhong, N.; Wang, Y.; Qin, Y.; Huang, Z.; Zhou, H; Yao, Y; van Harmelen, F.A.H.

    2011-01-01

    Under the context of large-scale scientific literatures, this paper provides a user-centric approach for refining and processing incomplete or vague query based on cognitive- and granularity-based strategies. From the viewpoints of user interests retention and granular information processing, we

  14. Enabling information sharing in a port

    DEFF Research Database (Denmark)

    Olesen, Peter Bjerg; Hvolby, Hans-Henrik; Dukovska-Popovska, Iskra

    2012-01-01

    Ports are integral parts of many supply chains and are as such a contributing factor to the overall efficiency of the supply chain. Ports are also dynamic entities where things changes continuously. The dynamic nature of ports is also a problem when trying to optimise the utilisation of resources...... and ensure a low lead-time. Information sharing is a very important tool to reduce the effect of dynamism. This paper attempts to explain how information sharing is enabled in such an environment, and which considerations are relevant, both in regards to the information and required technology. The paper...

  15. The Value of Sharing Information: A Neural Account of Information Transmission.

    Science.gov (United States)

    Baek, Elisa C; Scholz, Christin; O'Donnell, Matthew Brook; Falk, Emily B

    2017-07-01

    Humans routinely share information with one another. What drives this behavior? We used neuroimaging to test an account of information selection and sharing that emphasizes inherent reward in self-reflection and connecting with other people. Participants underwent functional MRI while they considered personally reading and sharing New York Times articles. Activity in neural regions involved in positive valuation, self-related processing, and taking the perspective of others was significantly associated with decisions to select and share articles, and scaled with preferences to do so. Activity in all three sets of regions was greater when participants considered sharing articles with other people rather than selecting articles to read themselves. The findings suggest that people may consider value not only to themselves but also to others even when selecting news articles to consume personally. Further, sharing heightens activity in these pathways, in line with our proposal that humans derive value from self-reflection and connecting to others via sharing.

  16. Affording to exchange: social capital and online information sharing.

    Science.gov (United States)

    Maksl, Adam; Young, Rachel

    2013-08-01

    The potential harm and benefit associated with sharing personal information online is a topic of debate and discussion. Using survey methods (n=872), we explore whether attainment of social capital online relates to greater comfort with sharing personal information. We found that perceptions of bridging and bonding social capital earned from using Facebook are significant predictors of overall comfort levels with sharing personal information. This research raises timely questions about how the perceived benefits of social networking sites influence how personal information is shared online.

  17. Characteristic features of net information measures for constrained Coulomb potentials

    International Nuclear Information System (INIS)

    Patil, S H; Sen, K D; Watson, N A; Jr, H E Montgomery

    2007-01-01

    The dimensional analyses of the position and momentum variance based quantum mechanical Heisenberg uncertainty measure and the other useful net entropic information measures for the bound states of two constrained Coulomb potentials are reported for the first time. The potentials describe an electron moving in the central field due to a nucleus of charge Z with radius R defining the constraints as (a) the truncated potential given by -Z/(r n +R n ) 1/n , and (b) the radius of the impenetrable spherical wall. The net information measures for the two potentials are explicitly shown to be independent of the scaling of the set [Z, R] at a fixed value of ZR. Analytic proof is presented, for the first time, showing the presence of a characteristic extremum in the variation of the net information entropy as a function of the radius R with its location scaling as Z -1 . Numerical results are presented which support the validity of the scaling properties

  18. Online Information Sharing About Risks: The Case of Organic Food.

    Science.gov (United States)

    Hilverda, Femke; Kuttschreuter, Margôt

    2018-03-23

    Individuals have to make sense of an abundance of information to decide whether or not to purchase certain food products. One of the means to sense-making is information sharing. This article reports on a quantitative study examining online information sharing behavior regarding the risks of organic food products. An online survey among 535 respondents was conducted in the Netherlands to examine the determinants of information sharing behavior, and their relationships. Structural equation modeling was applied to test both the measurement model and the structural model. Results showed that the intention to share information online about the risks of organic food was low. Conversations and email were the preferred channels to share information; of the social media Facebook stood out. The developed model was found to provide an adequate description of the data. It explained 41% of the variance in information sharing. Injunctive norms and outcome expectancies were most important in predicting online information sharing, followed by information-related determinants. Risk-perception-related determinants showed a significant, but weak, positive relationship with online information sharing. Implications for authorities communicating on risks associated with food are addressed. © 2018 The Authors Risk Analysis published by Wiley Periodicals, Inc. on behalf of Society for Risk Analysis.

  19. A method of demand-driven and data-centric Web service configuration for flexible business process implementation

    Science.gov (United States)

    Xu, Boyi; Xu, Li Da; Fei, Xiang; Jiang, Lihong; Cai, Hongming; Wang, Shuai

    2017-08-01

    Facing the rapidly changing business environments, implementation of flexible business process is crucial, but difficult especially in data-intensive application areas. This study aims to provide scalable and easily accessible information resources to leverage business process management. In this article, with a resource-oriented approach, enterprise data resources are represented as data-centric Web services, grouped on-demand of business requirement and configured dynamically to adapt to changing business processes. First, a configurable architecture CIRPA involving information resource pool is proposed to act as a scalable and dynamic platform to virtualise enterprise information resources as data-centric Web services. By exposing data-centric resources as REST services in larger granularities, tenant-isolated information resources could be accessed in business process execution. Second, dynamic information resource pool is designed to fulfil configurable and on-demand data accessing in business process execution. CIRPA also isolates transaction data from business process while supporting diverse business processes composition. Finally, a case study of using our method in logistics application shows that CIRPA provides an enhanced performance both in static service encapsulation and dynamic service execution in cloud computing environment.

  20. Device-Centric Monitoring for Mobile Device Management

    Directory of Open Access Journals (Sweden)

    Luke Chircop

    2016-03-01

    Full Text Available The ubiquity of computing devices has led to an increased need to ensure not only that the applications deployed on them are correct with respect to their specifications, but also that the devices are used in an appropriate manner, especially in situations where the device is provided by a party other than the actual user. Much work which has been done on runtime verification for mobile devices and operating systems is mostly application-centric, resulting in global, device-centric properties (e.g. the user may not send more than 100 messages per day across all applications being difficult or impossible to verify. In this paper we present a device-centric approach to runtime verify the device behaviour against a device policy with the different applications acting as independent components contributing to the overall behaviour of the device. We also present an implementation for Android devices, and evaluate it on a number of device-centric policies, reporting the empirical results obtained.

  1. Sharing health information online in South Korea: motives, topics, and antecedents.

    Science.gov (United States)

    Kye, S Y; Shim, M; Kim, Y C; Park, K

    2017-10-11

    This study aimed to examine the motives, topics and antecedents for sharing health information online among Korean Internet users. Eight hundred adults completed a web-based survey exploring the motives; topics; physical, cognitive, affective and environmental factors; and experiences relating to sharing health information online. The motives for not sharing information included information absence and inappropriateness. The most preferred topic was disease. Good subjective health was significantly associated with frequent information sharing while individuals with a history of disease involving themselves or family members were more likely to share health information than were those without such a history. Further, a higher level of depressed mood was related to a higher level of sharing. Internet-related self-efficacy and trust in information delivery channels were positively related to sharing. Future research could extend the factors related to information sharing to include the evaluation of shared information. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  2. Manage customer-centric innovation--systematically.

    Science.gov (United States)

    Selden, Larry; MacMillan, Ian C

    2006-04-01

    No matter how hard companies try, their approaches to innovation often don't grow the top line in the sustained, profitable way investors expect. For many companies, there's a huge difference between what's in their business plans and the market's expectations for growth (as reflected in firms' share prices, market capitalizations, and P/E ratios). This growth gap springs from the fact that companies are pouring money into their insular R&D labs instead of working to understand what the customer wants and using that understanding to drive innovation. As a result, even companies that spend the most on R&D remain starved for both customer innovation and market-capitalization growth. In this article, the authors spell out a systematic approach to innovation that continuously fuels sustained, profitable growth. They call this approach customer-centric innovation, or CCI. At the heart of CCI is a rigorous customer R&D process that helps companies to continually improve their understanding of who their customers are and what they need. By so doing, they consistently create or improve their customer value proposition. Customer R&D also focuses on better ways of communicating value propositions and delivering the complete experience to real customers. Since so much of the learning about customers and so much of the experimentation with different segmentations, value propositions, and delivery mechanisms involve the people who regularly deal with customers, it is absolutely essential for frontline employees to be at the center of the CCI process. Simply put, customer R&D propels the innovation effort away from headquarters and the traditional R&D lab out to those closest to the customer. Using the example of the luggage manufacturer Tumi, the authors provide a step-by-step approach for achieving true customer-centric innovation.

  3. Defining Patient Centric Pharmaceutical Drug Product Design.

    Science.gov (United States)

    Stegemann, Sven; Ternik, Robert L; Onder, Graziano; Khan, Mansoor A; van Riet-Nales, Diana A

    2016-09-01

    The term "patient centered," "patient centric," or "patient centricity" is increasingly used in the scientific literature in a wide variety of contexts. Generally, patient centric medicines are recognized as an essential contributor to healthy aging and the overall patient's quality of life and life expectancy. Besides the selection of the appropriate type of drug substance and strength for a particular indication in a particular patient, due attention must be paid that the pharmaceutical drug product design is also adequately addressing the particular patient's needs, i.e., assuring adequate patient adherence and the anticipate drug safety and effectiveness. Relevant pharmaceutical design aspects may e.g., involve the selection of the route of administration, the tablet size and shape, the ease of opening the package, the ability to read the user instruction, or the ability to follow the recommended (in-use) storage conditions. Currently, a harmonized definition on patient centric drug development/design has not yet been established. To stimulate scientific research and discussions and the consistent interpretation of test results, it is essential that such a definition is established. We have developed a first draft definition through various rounds of discussions within an interdisciplinary AAPS focus group of experts. This publication summarizes the outcomes and is intended to stimulate further discussions with all stakeholders towards a common definition of patient centric pharmaceutical drug product design that is useable across all disciplines involved.

  4. Sensor Exposure, Exploitation, and Experimentation Environment (SE4)

    Science.gov (United States)

    Buell, D.; Duff, F.; Goding, J.; Bankston, M.; McLaughlin, T.; Six, S.; Taylor, S.; Wootton, S.

    2011-09-01

    As the resident space object population increases from new launches and events such as the COSMOS/IRIDIUM collision, the maintenance of high-level Space Situational Awareness (SSA) has become increasingly difficult. To maintain situational awareness of the changing environment, new systems and methods must be developed. The Sensor Exposure, Exploitation and Experimentation Environment (SE4) provides a platform to illustrate “The Art of the Possible” that shows the potential benefit of enriched sensor data collections and real-time data sharing. Through modeling and simulation, and a net-centric architecture, SE4 shows the added value of sharing data in real-time and exposing new types of sensor data. The objective of SE4 is to develop an experimentation and innovation environment for sensor data exposure, composable sensor capabilities, reuse, and exploitation that accelerates the delivery of needed Command and Control, Intelligence, Surveillance, and Reconnaissance capabilities to the warfighter. Through modeling, simulation and rapid prototyping, the art of the possible for a fully-connected, net-centric space Command and Control (C2) and sensor enterprise can be demonstrated. This paper provides results that demonstrate the potential for faster cataloging of breakup events and additional event monitoring that are possible with data available today in the Space Surveillance Network (SSN). Demonstrating the art of the possible for the enterprise will guide net-centric requirements definition and facilitate discussions with stakeholder organizations on the Concept of Operations (CONOPS), policy, and Tactics, Techniques, and Procedures (TTP) evolution necessary to take full advantage of net-centric operations. SE4 aligns with direction from Secretary Gates and the Chairman Joint Chief of Staff that emphasizes the need to get the most out of our existing systems. Continuing to utilize SE4 will enable the enterprise by demonstrating the benefits of applying

  5. Count Your Calories and Share Them: Health Benefits of Sharing mHealth Information on Social Networking Sites.

    Science.gov (United States)

    Oeldorf-Hirsch, Anne; High, Andrew C; Christensen, John L

    2018-04-23

    This study investigates the relationship between sharing tracked mobile health (mHealth) information online, supportive communication, feedback, and health behavior. Based on the Integrated Theory of mHealth, our model asserts that sharing tracked health information on social networking sites benefits users' perceptions of their health because of the supportive communication they gain from members of their online social networks and that the amount of feedback people receive moderates these associations. Users of mHealth apps (N = 511) completed an online survey, and results revealed that both sharing tracked health information and receiving feedback from an online social network were positively associated with supportive communication. Network support both corresponded with improved health behavior and mediated the association between sharing health information and users' health behavior. As users received greater amounts of feedback from their online social networks, however, the association between sharing tracked health information and health behavior decreased. Theoretical implications for sharing tracked health information and practical implications for using mHealth apps are discussed.

  6. I-centric Communications

    CERN Document Server

    Arbanowski, S; Steglich, S; Popescu-Zeletin, R

    2001-01-01

    During the last years, a variety of concepts for service integration and corresponding systems have gained momentum. On the one hand, they aim for the interworking and integration of classical telecommunications and data communications services. On the other hand, they are focusing on universal service access from a variety of end user systems. Looking at humans' communication behavior and communication space, it is obvious that human beings interact frequently in a set of contexts in their environment (communication space). Following this view, we want to build communication systems on the analysis of the individual communication spaces. The results are communication systems adapted to the specific demands of each individual. The authors introduce I-centric Communication Systems, an approach to design communication systems which adapt to the individual communication space and individual environment and situation. In this context "I" means I, or individual, "Centric" means adaptable to I requirements and a ce...

  7. NeuroLOG: sharing neuroimaging data using an ontology-based federated approach.

    Science.gov (United States)

    Gibaud, Bernard; Kassel, Gilles; Dojat, Michel; Batrancourt, Bénédicte; Michel, Franck; Gaignard, Alban; Montagnat, Johan

    2011-01-01

    This paper describes the design of the NeuroLOG middleware data management layer, which provides a platform to share heterogeneous and distributed neuroimaging data using a federated approach. The semantics of shared information is captured through a multi-layer application ontology and a derived Federated Schema used to align the heterogeneous database schemata from different legacy repositories. The system also provides a facility to translate the relational data into a semantic representation that can be queried using a semantic search engine thus enabling the exploitation of knowledge embedded in the ontology. This work shows the relevance of the distributed approach for neurosciences data management. Although more complex than a centralized approach, it is also more realistic when considering the federation of large data sets, and open strong perspectives to implement multi-centric neurosciences studies.

  8. A Petri Net-Based Software Process Model for Developing Process-Oriented Information Systems

    Science.gov (United States)

    Li, Yu; Oberweis, Andreas

    Aiming at increasing flexibility, efficiency, effectiveness, and transparency of information processing and resource deployment in organizations to ensure customer satisfaction and high quality of products and services, process-oriented information systems (POIS) represent a promising realization form of computerized business information systems. Due to the complexity of POIS, explicit and specialized software process models are required to guide POIS development. In this chapter we characterize POIS with an architecture framework and present a Petri net-based software process model tailored for POIS development with consideration of organizational roles. As integrated parts of the software process model, we also introduce XML nets, a variant of high-level Petri nets as basic methodology for business processes modeling, and an XML net-based software toolset providing comprehensive functionalities for POIS development.

  9. Research on Information Sharing Mechanism of Network Organization Based on Evolutionary Game

    Science.gov (United States)

    Wang, Lin; Liu, Gaozhi

    2018-02-01

    This article first elaborates the concept and effect of network organization, and the ability to share information is analyzed, secondly introduces the evolutionary game theory, network organization for information sharing all kinds of limitations, establishes the evolutionary game model, analyzes the dynamic evolution of network organization of information sharing, through reasoning and evolution. The network information sharing by the initial state and two sides of the game payoff matrix of excess profits and information is the information sharing of cost and risk sharing are the influence of network organization node information sharing decision.

  10. Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device

    Directory of Open Access Journals (Sweden)

    Hyun-Woo Kim

    2014-01-01

    Full Text Available Among the various smart multimedia devices, multimedia smartphones have become the most widespread due to their convenient portability and real-time information sharing, as well as various other built-in features. Accordingly, since personal and business activities can be carried out using multimedia smartphones without restrictions based on time and location, people have more leisure time and convenience than ever. However, problems such as loss, theft, and information leakage because of convenient portability have also increased proportionally. As a result, most multimedia smartphones are equipped with various built-in locking features. Pattern lock, personal identification numbers, and passwords are the most used locking features on current smartphones, but these are vulnerable to shoulder surfing and smudge attacks, allowing malicious users to bypass the security feature easily. In particular, the smudge attack technique is a convenient way to unlock multimedia smartphones after they have been stolen. In this paper, we propose the secure locking screen using time pattern (SLSTP focusing on improved security and convenience for users to support human-centric multimedia device completely. The SLSTP can provide a simple interface to users and reduce the risk factors pertaining to security leakage to malicious third parties.

  11. Time pattern locking scheme for secure multimedia contents in human-centric device.

    Science.gov (United States)

    Kim, Hyun-Woo; Kim, Jun-Ho; Park, Jong Hyuk; Jeong, Young-Sik

    2014-01-01

    Among the various smart multimedia devices, multimedia smartphones have become the most widespread due to their convenient portability and real-time information sharing, as well as various other built-in features. Accordingly, since personal and business activities can be carried out using multimedia smartphones without restrictions based on time and location, people have more leisure time and convenience than ever. However, problems such as loss, theft, and information leakage because of convenient portability have also increased proportionally. As a result, most multimedia smartphones are equipped with various built-in locking features. Pattern lock, personal identification numbers, and passwords are the most used locking features on current smartphones, but these are vulnerable to shoulder surfing and smudge attacks, allowing malicious users to bypass the security feature easily. In particular, the smudge attack technique is a convenient way to unlock multimedia smartphones after they have been stolen. In this paper, we propose the secure locking screen using time pattern (SLSTP) focusing on improved security and convenience for users to support human-centric multimedia device completely. The SLSTP can provide a simple interface to users and reduce the risk factors pertaining to security leakage to malicious third parties.

  12. An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing

    Directory of Open Access Journals (Sweden)

    Young-Sik Jeong

    2014-01-01

    Full Text Available Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks represents a security threat. Currently, wireless intrusion prevention systems (IPSs are used to prevent wireless security threats. However, these are not an ideal security measure for businesses that utilize mobile devices because they do not take account of temporal-spatial and role information factors. Therefore, in this paper, an efficient and secure mobile-IPS (m-IPS is proposed for businesses utilizing mobile devices in mobile environments for human-centric computing. The m-IPS system incorporates temporal-spatial awareness in human-centric computing with various mobile devices and checks users’ temporal spatial information, profiles, and role information to provide precise access control. And it also can extend application of m-IPS to the Internet of things (IoT, which is one of the important advanced technologies for supporting human-centric computing environment completely, for real ubiquitous field with mobile devices.

  13. Internet-centric collaborative design in a distributed environment

    International Nuclear Information System (INIS)

    Kim, Hyun; Kim, Hyoung Sun; Do, Nam Chul; Lee, Jae Yeol; Lee, Joo Haeng; Myong, Jae Hyong

    2001-01-01

    Recently, advanced information technologies including internet-related technology and distributed object technology have opened new possibilities for collaborative designs. In this paper, we discuss computer supports for collaborative design in a distributed environment. The proposed system is the internet-centric system composed of an engineering framework, collaborative virtual workspace and engineering service. It allows the distributed designers to more efficiently and collaboratively work their engineering tasks throughout the design process

  14. Effect of information sharing on research and teaching activities of ...

    African Journals Online (AJOL)

    This study was designed to determine the effect of Information sharing on research and teaching activities of Academic Scientists in Federal Universities in the North- East Nigeria. Investigation was done on the activities of information sharing and the effect of information sharing on teaching and research activities. Survey ...

  15. Hidden profiles and concealed information: strategic information sharing and use in group decision making.

    Science.gov (United States)

    Toma, Claudia; Butera, Fabrizio

    2009-06-01

    Two experiments investigated the differential impact of cooperation and competition on strategic information sharing and use in a three-person group decision-making task. Information was distributed in order to create a hidden profile so that disconfirmation of group members' initial preferences was required to solve the task. Experiment 1 revealed that competition, compared to cooperation, led group members to withhold unshared information, a difference that was not significant for shared information. In competition, compared to cooperation, group members were also more reluctant to disconfirm their initial preferences. Decision quality was lower in competition than in cooperation, this effect being mediated by disconfirmation use and not by information sharing. Experiment 2 replicated these findings and revealed the role of mistrust in predicting strategic information sharing and use in competition. These results support a motivated information processing approach of group decision making.

  16. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 3. Network Centric Warfare Insights

    Science.gov (United States)

    2003-01-01

    OPSEC), military deception, psychological operations (PSYOPS), special information operations (IO), information assurance, physical security...nonlethal effects, such as operational 8 Network Centric Warfare Case Study security (OPSEC), military deception, psychological operations (PSYOP...Support Operations Group ASR Alternate Supply Route; or, Ammunition Supply Rate ATACMS Army Tactical Missile System ATARS Advanced

  17. Variability of centric relation position in TMD patients.

    NARCIS (Netherlands)

    Zonnenberg, A.J.J.; Mulder, J.

    2006-01-01

    Reproducibility of the centric relation position for patients with temporomandibular disorders (TMD) is not documented in the current literature. It was the objective of this study to assess clinical variability of the centric relation position for TMD patients with a muscle-determined technique by

  18. Evaluating mobile centric readiness of students: A case of computer science students in open-distance learning

    CSIR Research Space (South Africa)

    Chipangura, B

    2015-07-01

    Full Text Available and Education]: Distance learning Keywords Mobile centric services, mobile information access, mobile readiness 1. INTRODUCTION As the mobile phone market matures in terms of penetration rate, subscription rate, handsets functionality and mobile centric..., this reflects a ratio of one mobile phone per person. High mobile phone penetration has made it possible for digitally alienated communities in developing countries to have improved access to business, health, education and social services. Indeed, this has...

  19. Security Investment, Hacking, and Information Sharing between Firms and between Hackers

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2017-05-01

    Full Text Available A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers’ attacks and the firms’ defenses are inverse U-shaped in each other. A hacker shifts from attack to information sharing when attack is costly or the firm’s defense is cheap. The two hackers share information, but a second more disadvantaged hacker receives less information, and mixed motives may exist between information sharing and own reputation gain. The second hacker’s attack is deterred by the first hacker’s reputation gain. Increasing information sharing effectiveness causes firms to substitute from defense to information sharing, which also increases in the firms’ unit defense cost, decreases in each firm’s unit cost of own information leakage, and increases in the unit benefit of joint leakage. Increasing interdependence between firms causes more information sharing between hackers caused by larger aggregate attacks, which firms should be conscious about. We consider three corner solutions. First and second, the firms deter disadvantaged hackers. When the second hacker is deterred, the first hacker does not share information. Third, the first hacker shares a maximum amount of information when certain conditions are met. Policy and managerial implications are provided for how firms should defend against hackers with various characteristics.

  20. Sharing is caring, but not error free: transparency of granular controls for sharing personal health information in social networks.

    Science.gov (United States)

    Hartzler, Andrea; Skeels, Meredith M; Mukai, Marlee; Powell, Christopher; Klasnja, Predrag; Pratt, Wanda

    2011-01-01

    When patients share personal health information with family and friends, their social networks become better equipped to help them through serious health situations. Thus, patients need tools that enable granular control over what personal health information is shared and with whom within social networks. Yet, we know little about how well such tools support patients' complex sharing needs. We report on a lab study in which we examined the transparency of sharing interfaces that display an overview and details of information sharing with network connections in an internet-based personal health information management tool called HealthWeaver. Although participants found the interfaces easy to use and were highly confident in their interpretation of the sharing controls, several participants made errors in determining what information was shared with whom. Our findings point to the critical importance of future work that examines design of usable interfaces that offer transparent granularity in support of patients' complex information sharing practices.

  1. The Reality Of The Homeland Security Enterprise Information Sharing Environment

    Science.gov (United States)

    2017-12-01

    Related Information to Protect the Homeland (GAO 15- 290) (Washington, DC: U.S. Government Accountability Office, 2015), http://www.gao.gov/ assets...Government Accountability Office [GAO], Information Sharing Environment Better Road Map Needed to Guide Implementation and Investments (GAO-11-455...and its ISE PM would have clearer accountability for information sharing lapses and a faster ability to reform or develop domestic information -sharing

  2. Experiences with a researcher-centric ELN.

    Science.gov (United States)

    Badiola, Katrina A; Bird, Colin; Brocklesby, William S; Casson, John; Chapman, Richard T; Coles, Simon J; Cronshaw, James R; Fisher, Adam; Frey, Jeremy G; Gloria, Danmar; Grossel, Martin C; Hibbert, D Brynn; Knight, Nicola; Mapp, Lucy K; Marazzi, Luke; Matthews, Brian; Milsted, Andy; Minns, Russell S; Mueller, Karl T; Murphy, Kelly; Parkinson, Tim; Quinnell, Rosanne; Robinson, John S; Robertson, Murray N; Robins, Michael; Springate, Emma; Tizzard, Graham; Todd, Matthew H; Williamson, Alice E; Willoughby, Cerys; Yang, Erica; Ylioja, Paul M

    2015-03-01

    Electronic Laboratory Notebooks (ELNs) are progressively replacing traditional paper books in both commercial research establishments and academic institutions. University researchers require specific features from ELNs, given the need to promote cross-institutional collaborative working, to enable the sharing of procedures and results, and to facilitate publication. The LabTrove ELN, which we use as our exemplar, was designed to be researcher-centric ( i.e. , not only aimed at the individual researcher's basic needs rather than to a specific institutional or subject or disciplinary agenda, but also able to be tailored because it is open source). LabTrove is being used in a heterogeneous set of academic laboratories, for a range of purposes, including analytical chemistry, X-ray studies, drug discovery and a biomaterials project. Researchers use the ELN for recording experiments, preserving data collected, and for project coordination. This perspective article describes the experiences of those researchers from several viewpoints, demonstrating how a web-based open source electronic notebook can meet the diverse needs of academic researchers.

  3. Ontology for customer centric digital services and analytics

    Science.gov (United States)

    Keat, Ng Wai; Shahrir, Mohammad Shazri

    2017-11-01

    In computer science research, ontologies are commonly utilised to create a unified abstract across many rich and different fields. In this paper, we apply the concept to the customer centric domain of digital services analytics and present an analytics solution ontology. The essence is based from traditional Entity Relationship Diagram (ERD), which then was abstracted out to cover wider areas on customer centric digital services. The ontology we developed covers both static aspects (customer identifiers) and dynamic aspects (customer's temporal interactions). The structure of the customer scape is modeled with classes that represent different types of customer touch points, ranging from digital and digital-stamps which represent physical analogies. The dynamic aspects of customer centric digital service are modeled with a set of classes, with the importance is represented in different associations involving establishment and termination of the target interaction. The realized ontology can be used in development of frameworks for customer centric applications, and for specification of common data format used by cooperating digital service applications.

  4. Suggestion on Information Sharing for AP implementation

    Energy Technology Data Exchange (ETDEWEB)

    Shim, Hye Won; Kim, Min Su; Koh, Byung Marn [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2013-10-15

    Under the Additional Protocol, States should provide the IAEA with expanded declarations of activities related to the nuclear fuel cycle and other nuclear activities, and with expanded access to the relevant information and sites to allow the IAEA to verify the completeness of these declarations. The AP to the Safeguards Agreement (the Additional Protocol) was signed on June 21{sup st}, 1999 and entered into force on February 19{sup th}, 2004. ROK submitted initial declarations in August 2004. Since then, ROK has been submitting annual updated reports of initial declaration on every May 15{sup th}. To achieve successful implementation, it is necessary to collect the information for each individual article in Article 2 of the AP and verify the declared information provided by facility operators. Therefore, the cooperation among the ministries and offices concerned is a prerequisite for successful implementation of AP. Unfortunately, the formal procedure for inter-organizational information sharing and cooperation is not established. This paper will briefly outline the AP declarations and suggest the information sharing among the ministries, offices and organizations for effective and efficient implementation of AP. The State authority has responsibility for AP implementation and it should verify correctness and completeness of the information declared by facility operators before submitting the declarations. The close cooperation and information sharing among the ministries, offices and organizations are indispensable to effective and efficient implementation of AP.

  5. Communications and Information Sharing (CIS) Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — TheCommunications and Information Sharing (CIS) Laboratory is a Public Safety interoperable communications technology laboratory with analog and digital radios, and...

  6. 75 FR 39621 - Proposed Information Collection (Income-Net Worth and Employment Statement) Activity: Comment...

    Science.gov (United States)

    2010-07-09

    ... DEPARTMENT OF VETERANS AFFAIRS [OMB Control No. 2900-0002] Proposed Information Collection (Income-Net Worth and Employment Statement) Activity: Comment Request AGENCY: Veterans Benefits Administration... techniques or the use of other forms of information technology. Title: Income-Net Worth and Employment...

  7. 77 FR 20888 - Proposed Information Collection (Income, Net Worth, and Employment Statement) Activity: Comment...

    Science.gov (United States)

    2012-04-06

    ... DEPARTMENT OF VETERANS AFFAIRS [OMB Control No. 2900-0002] Proposed Information Collection (Income, Net Worth, and Employment Statement) Activity: Comment Request AGENCY: Veterans Benefits... techniques or the use of other forms of information technology. Title: Income, Net Worth, and Employment...

  8. Socially Shared Health Information

    DEFF Research Database (Denmark)

    Hansen, Kjeld S.

    2018-01-01

    In this PhD project, I'm investigating how health organizations are sharing health information on social media. My PhD project is divided into two parts, but in this paper, I will only focus on the first part: To understand current practices of how health organizations engage with health...... information and users on social media (empirical studies 1,2,3) and to develop a theoretical model for how it is done efficiently and effectively. I have currently conducted and published on two empirical studies (1,2). I am in the process of collecting data for a revised version of empirical study (2...

  9. Information Sharing and International Taxation

    NARCIS (Netherlands)

    Keen, M.; Ligthart, J.E.

    2004-01-01

    The sharing between national tax authorities of taxpayer-specific information has emerged over the last few years as a-probably "the"-central issue in the formation of international tax policy.Yet this refocusing of the debate on international taxation-away from parametric tax coordination and

  10. Aligning Learner Preferences for Information Seeking, Information Sharing and Mobile Technologies

    Science.gov (United States)

    Mills, Leila A.; Knezek, Gerald; Khaddage, Ferial

    2012-01-01

    This paper reports on the development of a new information communications technology (ICT) learning preference survey, its cross-validation with attitudes towards mobile learning, and new perspectives on information seeking, information sharing, and mobile access derived from the relationships uncovered. The Information and Communications…

  11. Enhancing Group Decision Making: An Exercise to Reduce Shared Information Bias

    Science.gov (United States)

    Baker, Diane F.

    2010-01-01

    Research on shared information bias has shown that group members involved in a decision-making task tend to undervalue information that a single member shares with the group, especially when that information conflicts with their prior conclusions. The group activity in this article is intended to heighten awareness of this shared information bias…

  12. Content-centric networks an overview, applications and research challenges

    CERN Document Server

    Ahmed, Syed Hassan; Kim, Dongkyun

    2016-01-01

    This book introduces Content-Centric Networking (CCN), a networking paradigm that provides a simple and effective solution to the challenging demands of future wired and wireless communications. It provides an overview of the recent developments in the area of future internet technologies, bringing together the advancements that have been made in Information-Centric Networking (ICN) in general, with a focus on CCN. It begins with an introduction to the basics of CCN is followed by an overview of the current internet paradigm and its challenges. Next, an application perspective has been included, where the authors encompass the selected applications for CCN with recent refereed research and developments. These applications include Internet of Things (IoT), Smart Grid, Vehicular Ad hoc Networks (VANETs), and Wireless Sensor Networks (WSNs). The book is a useful reference source for practising researchers, and can be used as supporting material for undergraduate and graduate level courses in computer science and...

  13. Groups like the support sharing channel of information and knowledge

    Directory of Open Access Journals (Sweden)

    Armando Sergio de Aguiar Filho

    2016-12-01

    Full Text Available Introduction: The role of sharing information and knowledge which tends to lead to a new understanding of distribution channels, allowing the maturation of sharing concept and its relationship to the process of information management. This interaction arises range of alternatives par as organizations relate internally with employees and externally with your audience. Objects: The goal is to survey and presentation of studies related to information sharing and knowledge channels, trying to identify its correlates in the area of administration. Methodology: The work was developed from a literature search. For both sought to initially align the concepts and terminology of information science area and a second time to identify a differentiated approach to sharing that would contribute to validate the interdisciplinary character of the information area and the contribution that other areas can make to the studies of information management and knowledge. Results: The analysis of the survey indicated considerations relevant to the understanding of the various approaches used in relation to the sharing of channels, as well as the common and different characteristics of these media and the impact on their dynamics. Conclusions: The Support Group terminology is one of several approaches used in the sharing of information and knowledge, and, like the other approaches presented to assess and promote better information services to meet the specific demands.

  14. Multiparty secret sharing of quantum information based on entanglement swapping

    International Nuclear Information System (INIS)

    Li Yongmin; Zhang Kuanshou; Peng Kunchi

    2004-01-01

    A protocol of multiparty secret sharing of quantum information based on entanglement swapping is analyzed. In this protocol, Bell states are needed in order to realize the quantum information secret sharing and it is convenient to realize the quantum secret sharing among the members of any subset of users

  15. Information Sharing Modalities for Mobile Ad-Hoc Networks

    Science.gov (United States)

    de Spindler, Alexandre; Grossniklaus, Michael; Lins, Christoph; Norrie, Moira C.

    Current mobile phone technologies have fostered the emergence of a new generation of mobile applications. Such applications allow users to interact and share information opportunistically when their mobile devices are in physical proximity or close to fixed installations. It has been shown how mobile applications such as collaborative filtering and location-based services can take advantage of ad-hoc connectivity to use physical proximity as a filter mechanism inherent to the application logic. We discuss the different modes of information sharing that arise in such settings based on the models of persistence and synchronisation. We present a platform that supports the development of applications that can exploit these modes of ad-hoc information sharing and, by means of an example, show how such an application can be realised based on the supported event model.

  16. Library information sharing. Best practices and trends. Challenges and prospects

    Directory of Open Access Journals (Sweden)

    Posner Beth

    2017-12-01

    Full Text Available Libraries share information with each other, through interlibrary loan services, so that their library users can access more of the world of information than is available in any one library. When supported with enough budget, staff and authority to do so, library resource sharing specialists can facilitate information access in a variety of traditional and innovative ways, including and beyond lending and borrowing print and digital information. Best practices, trends and new solutions for library resource sharing are reviewed. International cooperation is also highlighted.

  17. Implications of Network Centric Warfare

    National Research Council Canada - National Science Library

    Bailey, Alvin

    2004-01-01

    .... These areas of dependence also provide numerous vulnerabilities. This paper will focus specifically on Network Centric Warfare's vulnerabilities in terms of sensors cyberterrorism/ Electro-Magnetic Pulse (EMP...

  18. Labelling : Security in Information Management and Sharing

    NARCIS (Netherlands)

    Schotanus, H.A.; Hartog, T.; Hut, D.H.; Boonstra, D.

    2011-01-01

    Military communication infrastructures are often deployed as stand-alone information systems operating at the System High mode. Network-Enabled Capabilities (NEC) and combined military operations lead to new requirements for information management and sharing which current communication

  19. User observations on information sharing (corporate knowledge and lessons learned)

    Science.gov (United States)

    Montague, Ronald A.; Gregg, Lawrence A.; Martin, Shirley A.; Underwood, Leroy H.; Mcgee, John M.

    1993-01-01

    The sharing of 'corporate knowledge' and lessons learned in the NASA aerospace community has been identified by Johnson Space Center survey participants as a desirable tool. The concept of the program is based on creating a user friendly information system that will allow engineers, scientists, and managers at all working levels to share their information and experiences with other users irrespective of location or organization. The survey addresses potential end uses for such a system and offers some guidance on the development of subsequent processes to ensure the integrity of the information shared. This system concept will promote sharing of information between NASA centers, between NASA and its contractors, between NASA and other government agencies, and perhaps between NASA and institutions of higher learning.

  20. Distribution-centric 3-parameter thermodynamic models of partition gas chromatography.

    Science.gov (United States)

    Blumberg, Leonid M

    2017-03-31

    If both parameters (the entropy, ΔS, and the enthalpy, ΔH) of the classic van't Hoff model of dependence of distribution coefficients (K) of analytes on temperature (T) are treated as the temperature-independent constants then the accuracy of the model is known to be insufficient for the needed accuracy of retention time prediction. A more accurate 3-parameter Clarke-Glew model offers a way to treat ΔS and ΔH as functions, ΔS(T) and ΔH(T), of T. A known T-centric construction of these functions is based on relating them to the reference values (ΔS ref and ΔH ref ) corresponding to a predetermined reference temperature (T ref ). Choosing a single T ref for all analytes in a complex sample or in a large database might lead to practically irrelevant values of ΔS ref and ΔH ref for those analytes that have too small or too large retention factors at T ref . Breaking all analytes in several subsets each with its own T ref leads to discontinuities in the analyte parameters. These problems are avoided in the K-centric modeling where ΔS(T) and ΔS(T) and other analyte parameters are described in relation to their values corresponding to a predetermined reference distribution coefficient (K Ref ) - the same for all analytes. In this report, the mathematics of the K-centric modeling are described and the properties of several types of K-centric parameters are discussed. It has been shown that the earlier introduced characteristic parameters of the analyte-column interaction (the characteristic temperature, T char , and the characteristic thermal constant, θ char ) are a special chromatographically convenient case of the K-centric parameters. Transformations of T-centric parameters into K-centric ones and vice-versa as well as the transformations of one set of K-centric parameters into another set and vice-versa are described. Copyright © 2017 Elsevier B.V. All rights reserved.

  1. Online Information Sharing About Risks : The Case of Organic Food

    NARCIS (Netherlands)

    Hilverda, Femke; Kuttschreuter, Margôt

    2018-01-01

    Individuals have to make sense of an abundance of information to decide whether or not to purchase certain food products. One of the means to sense-making is information sharing. This article reports on a quantitative study examining online information sharing behavior regarding the risks of organic

  2. The Influence of Local Ethnic Diversity on Group-Centric Crime Attitudes

    DEFF Research Database (Denmark)

    Hjorth, Frederik

    2017-01-01

    Several studies provide evidence of group-centric policy attitudes, that is, citizens evaluating policies based on linkages with visible social groups. The existing literature generally points to the role of media imagery, rhetoric and prominent political sponsors in driving group-centric attitudes......-down’ influence on group-centric attitudes by elite actors is complemented by ‘bottom-up’ local processes of experiential learning about group–policy linkages....

  3. NETWORK-CENTRIC WARFARE AND NETWORK ENABLED CAPABILITY IMPLICATIONS OVER THE C4ISR TYPE INFORMATION NETWORKS IN THE ROMANIAN ARMED FORCES

    Directory of Open Access Journals (Sweden)

    Cristea DUMITRU

    2015-06-01

    Full Text Available The last two decades mark out the humankind evolution toward the Information Age, a new stage of societal development where the modern society is affected, among other factors, by the explosive technological changes. Within the context, technology represents the main changing driver. To be more specific, small innovations appeared in the information technology and communications are considered to be responsible global transformations in the economy, politics or culture structure. This assertion also extends its validity over the military phenomenon, which is just another human behavior. The use on large scale of the information technology and communications led to a cybernetic battlefield and the change of the waging war philosophy, with the arising of new concepts that better describe the new reality: Network Centric Warfare, and Network Enabled Capabilities.

  4. EVALUATING A CUSTOMER-CENTRIC APPROACH

    Directory of Open Access Journals (Sweden)

    Luigi-Nicolae DUMITRESCU

    2007-01-01

    Full Text Available Customer focus is, at best, only one element of the relationship between a company and its customers. At worst it is a board-room buzzworld, witch makes every board member feel a little more secure. Not unlike the phrase “working towards equal opportunities”, it is showing an awareness of a need but is not addressing the issues. Customer focus must lead to something meaningful, will probably require sacrifices and is just one of the steps necessary to become truly customer-centric. A customer focus puts your customers high on your list of priorities. When you put your customers into the heart of your business, make customers part of the culture, then you to become customer-centric.

  5. Sharing information: Mixed-methods investigation of brief experiential interprofessional

    Science.gov (United States)

    Cocksedge, Simon; Barr, Nicky; Deakin, Corinne

    In UK health policy ‘sharing good information is pivotal to improving care quality, safety, and effectiveness. Nevertheless, educators often neglect this vital communication skill. The consequences of brief communication education interventions for healthcare workers are not yet established. This study investigated a three-hour interprofessional experiential workshop (group work, theoretical input, rehearsal) training healthcare staff in sharing information using a clear structure (PARSLEY). Staff in one UK hospital participated. Questionnaires were completed before, immediately after, and eight weeks after training, with semistructured interviews seven weeks after training. Participants (n=76) were from assorted healthcare occupations (26% non-clinical). Knowledge significantly increased immediately after training. Self-efficacy, outcome expectancy, and motivation to use the structure taught were significantly increased immediately following training and at eight weeks. Respondents at eight weeks (n=35) reported their practice in sharing information had changed within seven days of training. Seven weeks after training, most interviewees (n=13) reported confidently using the PARSLEY structure regularly in varied settings. All had re-evaluated their communication practice. Brief training altered self-reported communication behaviour of healthcare staff, with sustained changes in everyday work. As sharing information is central to communication curricula, health policy, and shared decision-making, the effectiveness of brief teaching interventions has economic and educational implications.

  6. Threshold policy for global games with noisy information sharing

    KAUST Repository

    Mahdavifar, Hessam

    2015-12-15

    It is known that global games with noisy sharing of information do not admit a certain type of threshold policies [1]. Motivated by this result, we investigate the existence of threshold-type policies on global games with noisy sharing of information and show that such equilibrium strategies exist and are unique if the sharing of information happens over a sufficiently noisy environment. To show this result, we establish that if a threshold function is an equilibrium strategy, then it will be a solution to a fixed point equation. Then, we show that for a sufficiently noisy environment, the functional fixed point equation leads to a contraction mapping, and hence, its iterations converge to a unique continuous threshold policy.

  7. The risk management of perishable supply chain based on coloured Petri Net modeling

    Directory of Open Access Journals (Sweden)

    Lu Liu

    2018-03-01

    Full Text Available The supply chain of perishable products is a combination of information organization, sharing and integration. The information modeling of supply chain is constructed to abstract key quality information including environment information, processing procedures and product quality assessments based on principle of quality safety factors and property of decay rate. The coloured Petri Net is applied for integrated description of independent information classification, aiming at risk identification and risk management framework. Well, according to the quality deterioration tendency, risk grades management and decision-making system are established. Practically, the circulation system of aquatic products is studied in this paper for full processing description. The simulation experiments are manipulated on environmental information, processing information and product quality information by the coloured Petri Net. Eventually, the conclusion turns out precisely as such that the coloured Petri Net conclusive for information classification and information transmission while integrated information management is available of efficient risk identification and decision-making system in supply chain of perishable products. Meanwhile, the validity of evaluating management and shelf-life estimation of perishable products are technically feasible.

  8. Novel Scientific Visualization Interfaces for Interactive Information Visualization and Sharing

    Science.gov (United States)

    Demir, I.; Krajewski, W. F.

    2012-12-01

    As geoscientists are confronted with increasingly massive datasets from environmental observations to simulations, one of the biggest challenges is having the right tools to gain scientific insight from the data and communicate the understanding to stakeholders. Recent developments in web technologies make it easy to manage, visualize and share large data sets with general public. Novel visualization techniques and dynamic user interfaces allow users to interact with data, and modify the parameters to create custom views of the data to gain insight from simulations and environmental observations. This requires developing new data models and intelligent knowledge discovery techniques to explore and extract information from complex computational simulations or large data repositories. Scientific visualization will be an increasingly important component to build comprehensive environmental information platforms. This presentation provides an overview of the trends and challenges in the field of scientific visualization, and demonstrates information visualization and communication tools in the Iowa Flood Information System (IFIS), developed within the light of these challenges. The IFIS is a web-based platform developed by the Iowa Flood Center (IFC) to provide access to and visualization of flood inundation maps, real-time flood conditions, flood forecasts both short-term and seasonal, and other flood-related data for communities in Iowa. The key element of the system's architecture is the notion of community. Locations of the communities, those near streams and rivers, define basin boundaries. The IFIS provides community-centric watershed and river characteristics, weather (rainfall) conditions, and streamflow data and visualization tools. Interactive interfaces allow access to inundation maps for different stage and return period values, and flooding scenarios with contributions from multiple rivers. Real-time and historical data of water levels, gauge heights, and

  9. Anonymity versus privacy: Selective information sharing in online cancer communities

    OpenAIRE

    Frost, J.H.; Vermeulen, I.E.; Beekers, N.

    2014-01-01

    Background Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients ap...

  10. Enhancing ASR by MT using Semantic Information from HindiWordNet

    DEFF Research Database (Denmark)

    Tammewar, Aniruddha; Singla, Karan; Bangalore, Srinivas

    translation. We report several experiments to improve the performance of an automatic speech recognition system, taking advantage of machine translation output and information fromWordNet. Overall we outperform a baseline system which has no semantic information by an increased 1.6% word accuracy...

  11. Model of health information sharing behavior among patients in cervical cancer

    Directory of Open Access Journals (Sweden)

    Ragil Tri atmi

    2018-01-01

    Full Text Available Cervical cancer is the second highest cause of death for women in Indonesia, despite a deadly illness, patients with cervical cancer are not desperate to survive. Instead, they are motivated to undertake positive actions, one of which is to do health informtion sharing or share information on environmental health tersekatnya. This study aims to look at how the patterns of behavior of sharing health information on cervical cancer patients, as well as the motive behind their actions the health information sharing. This study uses the method of qualitative research grounded approach. Location of the study conducted in Surabaya, while the search for informants researchers used snowball sampling. The results from this study is there are different behavior patterns of health information sharing among cervical cancer patients who have been diagnosed with advanced cervical cancer with cervical cancer at an early stage level.

  12. Security investment, hacking, and information sharing between firms and between hackers

    OpenAIRE

    Hausken, Kjell

    2017-01-01

    A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers' attacks and the firms' defenses are inverse U-shaped in each other. A hacker shifts from attack to information sharing when attack is costly or the firm's defense is cheap. The two hackers share information, but a second more disadvantaged hacker...

  13. Pregnant Women Sharing Pregnancy-Related Information on Facebook: Web-Based Survey Study

    Science.gov (United States)

    2018-01-01

    Background Research indicates expectant and new mothers use the Internet, specifically social media, to gain information and support during the transition to parenthood. Although parents regularly share information about and photos of their child or children on Facebook, researchers have neither explored the use of Facebook to share pregnancy-related information nor investigated factors that influence such sharing. Objective The aim of this study was to address a gap in the literature by exploring the use of Facebook by pregnant women. Specifically, the study examined the use of Facebook to share pregnancy-related information, as well as any association between prenatal attachment and the aforementioned aspects of sharing pregnancy-related information on Facebook. Methods Pregnant women who were at least 18 years of age were recruited for participation in the study through posts and paid advertisements on Facebook and posts to professional organization listservs. Individuals interested in participating were directed to a secure Web-based survey system where they completed the consent form and the survey that focused on their current pregnancy. Participants completed the Maternal Antenatal Attachment Scale and answered questions that assessed how often they shared pregnancy-related information on Facebook, who they shared it with, why they shared it, and what they shared. Results A total of 117 pregnant women completed the survey. Descriptive statistics indicated that the pregnancy announcement was most commonly shared (75/108, 69.4%), with most women sharing pregnancy-related information on Facebook less than monthly (52/117, 44.4%) with only family and friends (90/116, 77.6% and 91/116, 78.4%, respectively) and for the purpose of involving others or sharing the experience (62/107, 57.9%). Correlation and regression analyses showed that prenatal attachment, in general, was positively and significantly related to all aspects of sharing pregnancy-related information

  14. Evaluating mobile-centric readiness of higher education institutions: the case of institutional policies and information systems students

    CSIR Research Space (South Africa)

    Chipangura, B

    2015-12-01

    Full Text Available . To investigate this question from a policy perspective, nine policies from the open and distance learning (ODL) university in South Africa were analysed for providing institutional mobile-centric support. Policy document analysis was used to evaluate five...

  15. Data Centric Development Methodology

    Science.gov (United States)

    Khoury, Fadi E.

    2012-01-01

    Data centric applications, an important effort of software development in large organizations, have been mostly adopting a software methodology, such as a waterfall or Rational Unified Process, as the framework for its development. These methodologies could work on structural, procedural, or object oriented based applications, but fails to capture…

  16. Information Sharing and Collaboration Business Plan

    Science.gov (United States)

    2006-03-30

    for information sharing The proposed environment will need a common definition of terms and dictionaries of competing terms where common definitions...a lexicon, a monolingual on-line handbook, and a thesaurus and ontology of abbreviations, acronyms, and terminology. (ISCO 2005, 18

  17. Pregnant Women Sharing Pregnancy-Related Information on Facebook: Web-Based Survey Study.

    Science.gov (United States)

    Harpel, Tammy

    2018-03-22

    Research indicates expectant and new mothers use the Internet, specifically social media, to gain information and support during the transition to parenthood. Although parents regularly share information about and photos of their child or children on Facebook, researchers have neither explored the use of Facebook to share pregnancy-related information nor investigated factors that influence such sharing. The aim of this study was to address a gap in the literature by exploring the use of Facebook by pregnant women. Specifically, the study examined the use of Facebook to share pregnancy-related information, as well as any association between prenatal attachment and the aforementioned aspects of sharing pregnancy-related information on Facebook. Pregnant women who were at least 18 years of age were recruited for participation in the study through posts and paid advertisements on Facebook and posts to professional organization listservs. Individuals interested in participating were directed to a secure Web-based survey system where they completed the consent form and the survey that focused on their current pregnancy. Participants completed the Maternal Antenatal Attachment Scale and answered questions that assessed how often they shared pregnancy-related information on Facebook, who they shared it with, why they shared it, and what they shared. A total of 117 pregnant women completed the survey. Descriptive statistics indicated that the pregnancy announcement was most commonly shared (75/108, 69.4%), with most women sharing pregnancy-related information on Facebook less than monthly (52/117, 44.4%) with only family and friends (90/116, 77.6% and 91/116, 78.4%, respectively) and for the purpose of involving others or sharing the experience (62/107, 57.9%). Correlation and regression analyses showed that prenatal attachment, in general, was positively and significantly related to all aspects of sharing pregnancy-related information at the PFacebook for a variety of

  18. Security Investment, Hacking, and Information Sharing between Firms and between Hackers

    OpenAIRE

    Kjell Hausken

    2017-01-01

    A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers’ attacks and the firms’ defenses are inverse U-shaped in each other. A hacker shifts from attack to information sharing when attack is costly or the firm’s defense is cheap. The two hackers share information, but a second more disadvantaged hacker...

  19. Security Investment, Hacking, and Information Sharing Between Firms and Between Hackers

    OpenAIRE

    Hausken, Kjell

    2017-01-01

    A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers’ attacks and the firms’ defenses are inverse U-shaped in each other. A hacker shifts from attack to information sharing when attack is costly or the firm’s defense is cheap. The two hackers share information, but a second more disadvantaged hacker...

  20. Introducing the religio-centric positional advantage to Indonesian small businesses

    Directory of Open Access Journals (Sweden)

    Hendar Hendar

    2017-03-01

    Full Text Available With a focus on small religion-based businesses in Indonesia, this research examines whether marketing innovativeness, customers responsiveness and competitors′ responsiveness can improve marketing performance. A conceptual model on the correlation of these three variables with religio-centric positional advantage and marketing performance is examined by using structural equation model. For this purpose 335 small businesses of Islamic Fashion had been studied using purposive sampling from 11 regencies/cities in Central Java (Indonesia. The results showed that (1 small companies in these market segments based on religion is likely to have better marketing performance when they have the Religio-centric positional advantage, (2 The increase in marketing innovativeness, CuR and CoR is required to improve and maintain religio-centric positional advantage, and (3 religio-centric positional advantage is definitely a mediator in the correlation of marketing innovativeness, customer responsiveness and competitors responsiveness with marketing performance.

  1. Patterns of Knowledge Sharing and Knowledge Creation in New Information Environments

    DEFF Research Database (Denmark)

    Nielsen, Jørgen Lerche; Meyer, Kirsten

    2006-01-01

    and creation processes. The aim is to obtain a deeper comprehension of which factors determine whether the use of information technology becomes a success or a failure in relation to knowledge sharing and creation. The paper is based on three previous studies investigating the use of information technology......Do the knowledge sharing and creation processes in collaborating groups benefit from the use of new information environments or are the environments rather inhibitive to the development of these processes? A number of different studies have shown quite varied results when it comes to appraising...... the importance and value of using new information technology in knowledge sharing and creation processes. In this paper we will try to unveil the patterns appearing in the use of new information environment and the users' understanding of the significance of using information technology in knowledge sharing...

  2. Cooperative Games arising from Information Sharing Situations

    NARCIS (Netherlands)

    Brânzei, R.; Tijs, S.H.; Timmer, J.B.

    2000-01-01

    Relations are established between information sharing (IS) situations and IS-games on one hand and information collecting (IC) situations and IC-games on the other hand. It is shown that IC-games can be obtained as convex combinations of so-called local games. Properties are described which IC-games

  3. What's 'Awe' The Hype? Motivations to Share Video Game Information

    OpenAIRE

    Blankenbeckler, Logan Bryan

    2017-01-01

    Over the past few decades, video games have become a popular avenue for dissemination of information and publicity about video games is word-of-mouth sharing. Thus, it is imperative for researchers to examine the social, and individual processes that guide this behavior. Focusing on prerelease sharing behavior specifically, this pair of studies aimed to identify predictors and dimensions of video game information sharing, and explore the impact content characteristics have on individuals' ...

  4. The virtues of gossip: reputational information sharing as prosocial behavior.

    Science.gov (United States)

    Feinberg, Matthew; Willer, Robb; Stellar, Jennifer; Keltner, Dacher

    2012-05-01

    Reputation systems promote cooperation and deter antisocial behavior in groups. Little is known, however, about how and why people share reputational information. Here, we seek to establish the existence and dynamics of prosocial gossip, the sharing of negative evaluative information about a target in a way that protects others from antisocial or exploitative behavior. We present a model of prosocial gossip and the results of 4 studies testing the model's claims. Results of Studies 1 through 3 demonstrate that (a) individuals who observe an antisocial act experience negative affect and are compelled to share information about the antisocial actor with a potentially vulnerable person, (b) sharing such information reduces negative affect created by observing the antisocial behavior, and (c) individuals possessing more prosocial orientations are the most motivated to engage in such gossip, even at a personal cost, and exhibit the greatest reduction in negative affect as a result. Study 4 demonstrates that prosocial gossip can effectively deter selfishness and promote cooperation. Taken together these results highlight the roles of prosocial motivations and negative affective reactions to injustice in maintaining reputational information sharing in groups. We conclude by discussing implications for reputational theories of the maintenance of cooperation in human groups.

  5. Ordinary Share Price Behaviour Around 'C' Share Issues by Investment Trusts

    OpenAIRE

    Adams, Andrew T; Szakacs, M

    1995-01-01

    This paper examines the "C" share issue, a method of issuing shares which is peculiar to the UK investment trust industry. In particular, we analyse abnormal returns and discount/premium to net asset value behaviour of the ordinary shares both before and after the announcement of "C" share issues. The research was conducted using event study methodology and an innovative approach to the analysis of discount/premium movements. The results suggest a tendency for the ordinary shares to outperfor...

  6. KariaNet: Insights on knowledge sharing | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-06-03

    Jun 3, 2016 ... KariaNet drew practitioners and farmers together in 10 countries in the region, equipping participants with new techniques to improve agricultural practices. ... IDRC-funded researchers propose local urban agriculture as a ...

  7. 77 FR 39343 - Agency Information Collection (Income-Net Worth and Employment Statement) Activity Under OMB Review

    Science.gov (United States)

    2012-07-02

    ... DEPARTMENT OF VETERANS AFFAIRS [OMB Control No. 2900-0002] Agency Information Collection (Income-Net Worth and Employment Statement) Activity Under OMB Review AGENCY: Veterans Benefits Administration... . Please refer to ``OMB Control No. 2900-0002.'' SUPPLEMENTARY INFORMATION: Title: Income-Net Worth and...

  8. 75 FR 56662 - Agency Information Collection (Income-Net Worth and Employment Statement) Activity Under OMB Review

    Science.gov (United States)

    2010-09-16

    ... DEPARTMENT OF VETERANS AFFAIRS [OMB Control No. 2900-0002] Agency Information Collection (Income-Net Worth and Employment Statement) Activity Under OMB Review AGENCY: Veterans Benefits Administration... . Please refer to ``OMB Control No. 2900-0002.'' SUPPLEMENTARY INFORMATION: Title: Income-Net Worth and...

  9. Process-centric IT in Practice

    DEFF Research Database (Denmark)

    Siurdyban, Artur; Nielsen, Peter Axel

    2012-01-01

    , they should find governance structures which ensure that there is a fruitful collaboration between the corporate IT department and the local business units. This collaboration should also include different competences with both IT and process management and competences differing because they are centralized......This case illustrates and discusses the issues and challenges at Kerrtec Corporation in their effort to establish process-centric IT management. The case describes how a local business unit in Kerrtec managed their business processes and how that created a necessity for IT to be managed to match...... the business processes. It also describes how the central IT department at corporate headquarters responded to requests rooted in business processes. In discussing the challenges for Kerrtec, it is clear that they will have to map out the needed competences for process-centric IT management. In particular...

  10. Sharing sensitive health information through social media in the Arab world.

    Science.gov (United States)

    Asiri, Eman; Khalifa, Mohamed; Shabir, Syed-Abdul; Hossain, Md Nassif; Iqbal, Usman; Househ, Mowafa

    2017-02-01

    Sharing daily activities on social media has become a part of our lifestyle, but little is known about sharing sensitive health information in the Arab world. The objective of this study is to explore how social media users in the Arab world share sensitive health information through Facebook. A retrospective qualitative analysis was used in the study. A total of 110 Facebook groups, related to HIV, sickle cell and depression were screened between 5 June and 1 December 2014. Forty four Facebook groups met the inclusion criteria. 28 471 posts were extracted, of which 649 met inclusion criteria. Forty two percent of health information exchanged were related to HIV, 34% to depression and 24% to sickle cell diseases. The majority of postings were from Egypt 21.1%, Saudi Arabia 20%, Algeria 10% and Libya 9.2%. Male posts were 54.2% while 45.8% were posted by females. Individuals utilized Facebook groups to share personal experiences of their disease 31%, in addition to being used for seeking queries 13.6%, offering explicit advice 8.3%, reporting signs and symptoms of the disease 7.3% and posting their communication with the health-care provider 6.6%. Users in the Arab world use social media to exchange sensitive health information, which could have serious implications regarding the privacy of the information shared with other members of the group. On the other hand, sharing health information could have positive effects for patients, such as sharing disease experiences and peer support. However, more work is needed to ensure that Facebook users in the Arab world are aware of the potential consequences of sharing sensitive health information through social media. © The Author 2016. Published by Oxford University Press in association with the International Society for Quality in Health Care. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com

  11. A Petri Nets Model for Blockchain Analysis

    OpenAIRE

    Pinna, Andrea; Tonelli, Roberto; Orrú, Matteo; Marchesi, Michele

    2017-01-01

    A Blockchain is a global shared infrastructure where cryptocurrency transactions among addresses are recorded, validated and made publicly available in a peer- to-peer network. To date the best known and important cryptocurrency is the bitcoin. In this paper we focus on this cryptocurrency and in particular on the modeling of the Bitcoin Blockchain by using the Petri Nets formalism. The proposed model allows us to quickly collect information about identities owning Bitcoin addresses and to re...

  12. Advanced Technologies, Embedded and Multimedia for Human-Centric Computing

    CERN Document Server

    Chao, Han-Chieh; Deng, Der-Jiunn; Park, James; HumanCom and EMC 2013

    2014-01-01

    The theme of HumanCom and EMC are focused on the various aspects of human-centric computing for advances in computer science and its applications, embedded and multimedia computing and provides an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of human-centric computing. And the theme of EMC (Advanced in Embedded and Multimedia Computing) is focused on the various aspects of embedded system, smart grid, cloud and multimedia computing, and it provides an opportunity for academic, industry professionals to discuss the latest issues and progress in the area of embedded and multimedia computing. Therefore this book will be include the various theories and practical applications in human-centric computing and embedded and multimedia computing.

  13. eHealth: Towards a Healthcare Service-Oriented Boundary-Less Infrastructure

    Directory of Open Access Journals (Sweden)

    Cristian LELUTIU

    2010-09-01

    Full Text Available The current paper presents several interoperability features applied to a local distributed information system, CardioNET, meant to improve quality of healthcare services, through the use of the latest medical and IT&C technologies. Modern healthcare systems require a patient-centric vision, where patients must receive medical attention or treatment anytime, regardless of their physical location. The eHealth distributed system we present – CardioNET is based on a SOA producer-consumer model taking a patient centric approach where every hardware, software and medical activities become “services”. The system offers tools for remote interactions between patients, doctors, medical entities (e.g. hospitals, labs and authorities. Based on international standards (IDC10, LOINC, HL7, the system assures interoperability and data exchange in widely accepted XML formats. A logical domain bus, called Pervasive Health Service Bus-pHSB, exchanges HL7 compliant data messages between the integrated elements of the platform, through high level protocols (SOAP/HL7. The paper addresses interoperability problems between medical informational platforms proposing an eHealth architecture composed of: - production systems (nodes: General Practitioner, Analysis Laboratories, Clinics, Hospitals, Home Health Care Units (H-HCU;- portal with specialized web services, registries and shared data repositories – distributed, boundary-less environment for decision support, research and educational activities.

  14. Information Sharing in a Closed-Loop Supply Chain with Asymmetric Demand Forecasts

    Directory of Open Access Journals (Sweden)

    Pan Zhang

    2017-01-01

    Full Text Available This paper studies the problem of sharing demand forecast information in a closed-loop supply chain with the manufacturer collecting and remanufacturing. We investigate two scenarios: the “make-to-order” scenario, in which the manufacturer schedules production based on the realized demand, and the “make-to-stock” scenario, in which the manufacturer schedules production before the demand is known. For each scenario, we find that it is possible for the retailer to share his forecast without incentives when the collection efficiency of the manufacturer is high. When the efficiency is moderate, information sharing can be realized by a bargaining mechanism, and when the efficiency is low, non-information sharing is a unique equilibrium. Moreover, the possibility of information sharing in the make-to-stock scenario is higher than that in the make-to-order scenario. In addition, we analyze the impact of demand forecasts’ characteristics on the value of information sharing in both scenarios.

  15. Content Sharing Based on Personal Information in Virtually Secured Space

    Science.gov (United States)

    Sohn, Hosik; Ro, Yong Man; Plataniotis, Kostantinos N.

    User generated contents (UGC) are shared in an open space like social media where users can upload and consume contents freely. Since the access of contents is not restricted, the contents could be delivered to unwanted users or misused sometimes. In this paper, we propose a method for sharing UGCs securely based on the personal information of users. With the proposed method, virtual secure space is created for contents delivery. The virtual secure space allows UGC creator to deliver contents to users who have similar personal information and they can consume the contents without any leakage of personal information. In order to verify the usefulness of the proposed method, the experiment was performed where the content was encrypted with personal information of creator, and users with similar personal information have decrypted and consumed the contents. The results showed that UGCs were securely shared among users who have similar personal information.

  16. CULTURAL FEATURES SHARED BY INFORMATION SYSTEMS USERS

    Directory of Open Access Journals (Sweden)

    Marilena Maldonado

    2006-11-01

    Full Text Available Problems may arise when organizational culture is not considered in the development of information systems, such as difficulties in system implementation, since users do not accept changes in their work cultures. However, current methodology designs do not contemplate cultural factors. The objective of this investigation was to identify the main cultural features shared by the users of information systems in an Argentinean university. As result of this work it was possible to identify the memes shared by the members of the community selected, and to categorize such memes according to their incidence grade. This work seeks to be an initial step towards the construction of systems that evolve along with the organizational culture they are an integral part of.

  17. Graduating to Postdoc: Information-Sharing in Support of Organizational Structures and Needs

    Science.gov (United States)

    Keller, Richard M.; Lucas, Paul J.; Compton, Michael M.; Stewart, Helen J.; Baya, Vinod; DelAlto, Martha

    1999-01-01

    The deployment of information-sharing systems in large organizations can significantly impact existing policies and procedures with regard to authority and control over information. Unless information-sharing systems explicitly support organizational structures and needs, these systems will be rejected summarily. The Postdoc system is a deployed Web-based information-sharing system created specifically to address organizational needs. Postdoc contains various organizational support features including a shared, globally navigable document space, as well as specialized access control, distributed administration, and mailing list features built around the key notion of hierarchical group structures. We review successes and difficulties in supporting organizational needs with Postdoc

  18. Net-Zero Building Technologies Create Substantial Energy Savings -

    Science.gov (United States)

    only an estimated 1% of commercial buildings are built to net-zero energy criteria. One reason for this Continuum Magazine | NREL Net-Zero Building Technologies Create Substantial Energy Savings Net -Zero Building Technologies Create Substantial Energy Savings Researchers work to package and share step

  19. Value-informed space systems design and acquisition

    Science.gov (United States)

    Brathwaite, Joy

    Investments in space systems are substantial, indivisible, and irreversible, characteristics that make them high-risk, especially when coupled with an uncertain demand environment. Traditional approaches to system design and acquisition, derived from a performance- or cost-centric mindset, incorporate little information about the spacecraft in relation to its environment and its value to its stakeholders. These traditional approaches, while appropriate in stable environments, are ill-suited for the current, distinctly uncertain, and rapidly changing technical and economic conditions; as such, they have to be revisited and adapted to the present context. This thesis proposes that in uncertain environments, decision-making with respect to space system design and acquisition should be value-based, or at a minimum value-informed. This research advances the value-centric paradigm by providing the theoretical basis, foundational frameworks, and supporting analytical tools for value assessment of priced and unpriced space systems. For priced systems, stochastic models of the market environment and financial models of stakeholder preferences are developed and integrated with a spacecraft-sizing tool to assess the system's net present value. The analytical framework is applied to a case study of a communications satellite, with market, financial, and technical data obtained from the satellite operator, Intelsat. The case study investigates the implications of the value-centric versus the cost-centric design and acquisition choices. Results identify the ways in which value-optimal spacecraft design choices are contingent on both technical and market conditions, and that larger spacecraft for example, which reap economies of scale benefits, as reflected by their decreasing cost-per-transponder, are not always the best (most valuable) choices. Market conditions and technical constraints for which convergence occurs between design choices under a cost-centric and a value-centric

  20. Secure medical information sharing in cloud computing.

    Science.gov (United States)

    Shao, Zhiyi; Yang, Bo; Zhang, Wenzheng; Zhao, Yi; Wu, Zhenqiang; Miao, Meixia

    2015-01-01

    Medical information sharing is one of the most attractive applications of cloud computing, where searchable encryption is a fascinating solution for securely and conveniently sharing medical data among different medical organizers. However, almost all previous works are designed in symmetric key encryption environment. The only works in public key encryption do not support keyword trapdoor security, have long ciphertext related to the number of receivers, do not support receiver revocation without re-encrypting, and do not preserve the membership of receivers. In this paper, we propose a searchable encryption supporting multiple receivers for medical information sharing based on bilinear maps in public key encryption environment. In the proposed protocol, data owner stores only one copy of his encrypted file and its corresponding encrypted keywords on cloud for multiple designated receivers. The keyword ciphertext is significantly shorter and its length is constant without relation to the number of designated receivers, i.e., for n receivers the ciphertext length is only twice the element length in the group. Only the owner knows that with whom his data is shared, and the access to his data is still under control after having been put on the cloud. We formally prove the security of keyword ciphertext based on the intractability of Bilinear Diffie-Hellman problem and the keyword trapdoor based on Decisional Diffie-Hellman problem.

  1. Library Learning: Undergraduate Students’ Informal, Self-directed, and Information Sharing Strategies

    Directory of Open Access Journals (Sweden)

    Jo Ann Murphy

    2014-04-01

    Full Text Available A focus group study of fourteen University of Saskatchewan second to fourth year humanities and social science undergraduate students was conducted in the fall of 2011. The purpose of the research was to determine how students learn about library resources and services. Findings indicate that the participants often use a variety of informal, self-directed and information sharing strategies. Seeking help from professors, peers, friends, and family members is a common practice. Convenience, familiarity, and perceived knowledge are key factors that determine who and how these students learn about the library. Formal instruction and seeking assistance from librarians did not resonate for participants as a typical approach for learning about the library. The author suggests that undergraduate students engage in informal learning and information sharing as many ‘adult learners’ do, similar to an employment setting. The library, within the formal educational structure, lends itself to a more informal learning context. The study concludes that libraries must continue to develop resources, services, and innovative programs that support students’ informal learning styles, while also providing formal instruction as part of the undergraduate curriculum ensuring students are exposed early on to core foundational skills that contribute to their success as informal and self-directed learners.

  2. A User-Centric Knowledge Creation Model in a Web of Object-Enabled Internet of Things Environment

    Science.gov (United States)

    Kibria, Muhammad Golam; Fattah, Sheik Mohammad Mostakim; Jeong, Kwanghyeon; Chong, Ilyoung; Jeong, Youn-Kwae

    2015-01-01

    User-centric service features in a Web of Object-enabled Internet of Things environment can be provided by using a semantic ontology that classifies and integrates objects on the World Wide Web as well as shares and merges context-aware information and accumulated knowledge. The semantic ontology is applied on a Web of Object platform to virtualize the real world physical devices and information to form virtual objects that represent the features and capabilities of devices in the virtual world. Detailed information and functionalities of multiple virtual objects are combined with service rules to form composite virtual objects that offer context-aware knowledge-based services, where context awareness plays an important role in enabling automatic modification of the system to reconfigure the services based on the context. Converting the raw data into meaningful information and connecting the information to form the knowledge and storing and reusing the objects in the knowledge base can both be expressed by semantic ontology. In this paper, a knowledge creation model that synchronizes a service logistic model and a virtual world knowledge model on a Web of Object platform has been proposed. To realize the context-aware knowledge-based service creation and execution, a conceptual semantic ontology model has been developed and a prototype has been implemented for a use case scenario of emergency service. PMID:26393609

  3. A User-Centric Knowledge Creation Model in a Web of Object-Enabled Internet of Things Environment

    Directory of Open Access Journals (Sweden)

    Muhammad Golam Kibria

    2015-09-01

    Full Text Available User-centric service features in a Web of Object-enabled Internet of Things environment can be provided by using a semantic ontology that classifies and integrates objects on the World Wide Web as well as shares and merges context-aware information and accumulated knowledge. The semantic ontology is applied on a Web of Object platform to virtualize the real world physical devices and information to form virtual objects that represent the features and capabilities of devices in the virtual world. Detailed information and functionalities of multiple virtual objects are combined with service rules to form composite virtual objects that offer context-aware knowledge-based services, where context awareness plays an important role in enabling automatic modification of the system to reconfigure the services based on the context. Converting the raw data into meaningful information and connecting the information to form the knowledge and storing and reusing the objects in the knowledge base can both be expressed by semantic ontology. In this paper, a knowledge creation model that synchronizes a service logistic model and a virtual world knowledge model on a Web of Object platform has been proposed. To realize the context-aware knowledge-based service creation and execution, a conceptual semantic ontology model has been developed and a prototype has been implemented for a use case scenario of emergency service.

  4. A User-Centric Knowledge Creation Model in a Web of Object-Enabled Internet of Things Environment.

    Science.gov (United States)

    Kibria, Muhammad Golam; Fattah, Sheik Mohammad Mostakim; Jeong, Kwanghyeon; Chong, Ilyoung; Jeong, Youn-Kwae

    2015-09-18

    User-centric service features in a Web of Object-enabled Internet of Things environment can be provided by using a semantic ontology that classifies and integrates objects on the World Wide Web as well as shares and merges context-aware information and accumulated knowledge. The semantic ontology is applied on a Web of Object platform to virtualize the real world physical devices and information to form virtual objects that represent the features and capabilities of devices in the virtual world. Detailed information and functionalities of multiple virtual objects are combined with service rules to form composite virtual objects that offer context-aware knowledge-based services, where context awareness plays an important role in enabling automatic modification of the system to reconfigure the services based on the context. Converting the raw data into meaningful information and connecting the information to form the knowledge and storing and reusing the objects in the knowledge base can both be expressed by semantic ontology. In this paper, a knowledge creation model that synchronizes a service logistic model and a virtual world knowledge model on a Web of Object platform has been proposed. To realize the context-aware knowledge-based service creation and execution, a conceptual semantic ontology model has been developed and a prototype has been implemented for a use case scenario of emergency service.

  5. Annotating Coloured Petri Nets

    DEFF Research Database (Denmark)

    Lindstrøm, Bo; Wells, Lisa Marie

    2002-01-01

    Coloured Petri nets (CP-nets) can be used for several fundamentally different purposes like functional analysis, performance analysis, and visualisation. To be able to use the corresponding tool extensions and libraries it is sometimes necessary to include extra auxiliary information in the CP......-net. An example of such auxiliary information is a counter which is associated with a token to be able to do performance analysis. Modifying colour sets and arc inscriptions in a CP-net to support a specific use may lead to creation of several slightly different CP-nets – only to support the different uses...... of the same basic CP-net. One solution to this problem is that the auxiliary information is not integrated into colour sets and arc inscriptions of a CP-net, but is kept separately. This makes it easy to disable this auxiliary information if a CP-net is to be used for another purpose. This paper proposes...

  6. Space Sharing Between Formal and Informal Sectors In Kemang Area

    Science.gov (United States)

    Sihombing, Antony; Dewanti, Hafizka Chandra

    2018-01-01

    Sharing is a form of human activity as a social being, over resources or spaces. Humans generally define their space according to their psychological and biological needs. However, what if space sharing takes place in an urban scope? The phenomenon of space sharing happens in Kemang area done by two distinct sectors, formal and informal which both are engaged in commercial activities independently. In the study of territory and the behavior settings, the quality of environment can affect the formation of human activities in a space, occurs a phenomenon of space sharing. The researcher will discuss and present a form of the space sharing by the formal and informal sectors in a commercial area through different environmental qualities. In some circumstance, a form of space sharing can increase the value of space and obtain to a shared space, where both sectors mutually take benefits. Otherwise, it leads to an adverse impact in some others. It is clear that differences in the physical environment and social environment have an impact on the formation of space sharing and the value of space in an urban region.

  7. Can or can not? Electronic information sharing influence the participation behavior of the employees

    International Nuclear Information System (INIS)

    Mohammed, M. A.; Eman, Y.; Huda, I.; Thamer, A.

    2015-01-01

    Information sharing refers to information being shared between employees inside or outside an agency, or by providing accessibility of their information and data to other agencies so as to allow effective decision making. Electronic information sharing is a key to effective government. This study is conducted to investigate the factors of electronic information sharing that influence the participation behavior so as to augment it amongst the employees in public organizations. Eleven domains of factors that are considered in this study are benefits, risk, social network, Information stewardship, information quality, trust, privacy, reciprocity. The paper proposes electronic information sharing factors in public sector to increase the participation

  8. Can or can not? Electronic information sharing influence the participation behavior of the employees

    Energy Technology Data Exchange (ETDEWEB)

    Mohammed, M. A., E-mail: mhmdaldbag@yahoo.com; Eman, Y., E-mail: emaroof94@yahoo.com; Huda, I., E-mail: huda753@uum.edu.my; Thamer, A. [University Utara Malaysia, UUM Sintok (Malaysia)

    2015-12-11

    Information sharing refers to information being shared between employees inside or outside an agency, or by providing accessibility of their information and data to other agencies so as to allow effective decision making. Electronic information sharing is a key to effective government. This study is conducted to investigate the factors of electronic information sharing that influence the participation behavior so as to augment it amongst the employees in public organizations. Eleven domains of factors that are considered in this study are benefits, risk, social network, Information stewardship, information quality, trust, privacy, reciprocity. The paper proposes electronic information sharing factors in public sector to increase the participation.

  9. Using WordNet to Complement Training Information in Text Categorization

    OpenAIRE

    Rodriguez, Manuel de Buenaga; Hidalgo, Jose Maria Gomez; Agudo, Belen Diaz

    1997-01-01

    Automatic Text Categorization (TC) is a complex and useful task for many natural language applications, and is usually performed through the use of a set of manually classified documents, a training collection. We suggest the utilization of additional resources like lexical databases to increase the amount of information that TC systems make use of, and thus, to improve their performance. Our approach integrates WordNet information with two training approaches through the Vector Space Model. ...

  10. Defense Science Board 2006 Summer Study on Information Management for Net-Centric Operations. Volume 1: Main Report

    National Research Council Canada - National Science Library

    Schneider, Jr, William

    2007-01-01

    The task force addressed combat operations, information management, information assurance, and architecture requirements, as well as the architecture framework currently being pursued by the department...

  11. Cooperative Human-Centric Sensing Cooperation

    DEFF Research Database (Denmark)

    Mihovska, Albena

    Human-Centric Sensing (HCS) is a new concept relevant to Internet of Things (IoT). HCS connectivity, referred to as “smart connectivity” enables applications that are highly personalized and often time-critical. In a typical HCS scenario, there may be many hundreds of sensor streams connections...

  12. The public production and sharing of medical information. An Australian perspective

    Directory of Open Access Journals (Sweden)

    Henry C.H. Ko

    2010-03-01

    Full Text Available There is a wealth of medical information now available to the public through various sources that are not necessarily controlled by medical or healthcare professionals. In Australia there has been a strong movement in the health consumer arena of consumer-led sharing and production of medical information and in healthcare decision-making. This has led to empowerment of the public as well as increased knowledge-sharing. There are some successful initiatives and strategies on consumer- and public-led sharing of medical information, including the formation of specialised consumer groups, independent medical information organisations, consumer peer tutoring, and email lists and consumer networking events. With well-organised public initiatives and networks, there tends to be fairly balanced information being shared. However, there needs to be caution about the use of publicly available scientific information to further the agenda of special-interest groups and lobbying groups to advance often biased and unproven opinions or for scaremongering. With the adoption of more accountability of medical research, and the increased public scrutiny of private and public research, the validity and quality of medical information reaching the public is achieving higher standards.

  13. Letting Your Personal Health Information Be Used and Shared for Research

    Science.gov (United States)

    ... research study as my okay to share my information for marketing? No. The Privacy Rule does not allow a ... use your authorization to use or share your information for research as an authorization for marketing. What can I do if I think someone ...

  14. Health information sharing on Facebook: An exploratory study on diabetes mellitus

    Directory of Open Access Journals (Sweden)

    Zainab A. AlQarni

    2016-11-01

    Full Text Available Summary: Background: Increasingly, people are using Facebook (FB to share health information. However, little is known about the type of information sharing and its potential health consequences in the Arabic speaking world. This study attempts to fill this knowledge gap for diabetes mellitus (DM. Method: We conducted a retrospective qualitative FB content analysis using predefined eligibility criteria. The analysis was restricted to diabetes related groups in the Arabic speaking world. The data were collected between June 2010 and December 2015. A total of 55 groups were screened of which seven met the eligibility criteria. Results: We found 6107 posts in Arabic related to DM of which 1551 posts were included for further analysis. There were 458 (30% FB posts from Egypt with no posts from Somalia, Yemen, Comoros, and Djibouti. The majority of the posts, 863 (56%, were from females. The focus of the posts was on sharing personal experiences (n = 423, 27%, raising awareness (n = 210, 3.5%, providing spiritual support (n = 162, 10.4%, sharing latest research (n = 147, 9.5%, and providing education (n = 110, 7.1% on DM. A large number of the posts by people in 40–60 year age group were around finding out diagnosis related information due to limited access to care in their home countries. Conclusion: Patients with DM are increasingly sharing their health information with other FB users. This study will help inform future research with regard to health information sharing and designing appropriate interventions to harness the power of social media in improving public health. Keywords: Health information, Facebook, Diabetes mellitus, Arab world

  15. The influence of locative media on social information sharing: a review

    NARCIS (Netherlands)

    Keijl, Edwin; Klaassen, Randy; op den Akker, Hendrikus J.A.

    2013-01-01

    Mobile phones and social media enable people to share information with others whenever they want, wherever they want. More recent developments allow people to augment their sharing experience by geo-tagging their information through GPS enabled phones. These 'locative media' can be used to

  16. Overview of Human-Centric Space Situational Awareness (SSA) Science and Technology (S&T)

    Science.gov (United States)

    Ianni, J.; Aleva, D.; Ellis, S.

    2012-09-01

    A number of organizations, within the government, industry, and academia, are researching ways to help humans understand and react to events in space. The problem is both helped and complicated by the fact that there are numerous data sources that need to be planned (i.e., tasked), collected, processed, analyzed, and disseminated. A large part of the research is in support of the Joint Space Operational Center (JSpOC), National Air and Space Intelligence Center (NASIC), and similar organizations. Much recent research has been specifically targeting the JSpOC Mission System (JMS) which has provided a unifying software architecture. This paper will first outline areas of science and technology (S&T) related to human-centric space situational awareness (SSA) and space command and control (C2) including: 1. Object visualization - especially data fused from disparate sources. Also satellite catalog visualizations that convey the physical relationships between space objects. 2. Data visualization - improve data trend analysis as in visual analytics and interactive visualization; e.g., satellite anomaly trends over time, space weather visualization, dynamic visualizations 3. Workflow support - human-computer interfaces that encapsulate multiple computer services (i.e., algorithms, programs, applications) into a 4. Command and control - e.g., tools that support course of action (COA) development and selection, tasking for satellites and sensors, etc. 5. Collaboration - improve individuals or teams ability to work with others; e.g., video teleconferencing, shared virtual spaces, file sharing, virtual white-boards, chat, and knowledge search. 6. Hardware/facilities - e.g., optimal layouts for operations centers, ergonomic workstations, immersive displays, interaction technologies, and mobile computing. Secondly we will provide a survey of organizations working these areas and suggest where more attention may be needed. Although no detailed master plan exists for human-centric

  17. A Brief Introduction to Coloured Petri Nets

    DEFF Research Database (Denmark)

    Jensen, Kurt

    1997-01-01

    Coloured Petri Nets (CP-nets or CPN) is a graphical oriented language for design, specification, simulation and verification of systems. It is in particular well- suited for systems in which communication, synchronisation and resource sharing are important. Typical examples of application areas a...

  18. Encouraging information sharing to boost the name-your-own-price auction

    Science.gov (United States)

    Chen, Yahong; Li, Jinlin; Huang, He; Ran, Lun; Hu, Yusheng

    2017-08-01

    During a name-your-own-price (NYOP) auction, buyers can learn a lot of knowledge from their socially connected peers. Such social learning process makes them become more active to attend the auction and also helps them make decisions on what price to submit. Combining an information diffusion model and a belief decision model, we explore three effects of bidders' information sharing on the buyers' behaviors and the seller profit. The results indicate that information sharing significantly increases the NYOP popularity and the seller profit. When enlarging the quality or quantity of information sharing, or increasing the spreading efficiency of the network topology, the number of attenders and the seller profit are increased significantly. However, the spread of information may make bidders be more likely to bid higher and consequently lose surplus. In addition, the different but interdependent influence of the successful information and failure information are discussed in this work.

  19. Online GIS services for mapping and sharing disease information

    DEFF Research Database (Denmark)

    Gao, Sheng; Mioc, Darka; Anton, François

    2008-01-01

    Background Disease data sharing is important for the collaborative preparation, response, and recovery stages of disease control. Disease phenomena are strongly associated with spatial and temporal factors. Web-based Geographical Information Systems provide a real-time and dynamic way to represent...... and responding to disease outbreaks. To overcome these challenges in disease data mapping and sharing, the senior authors have designed an interoperable service oriented architecture based on Open Geospatial Consortium specifications to share the spatio-temporal disease information. Results A case study...... of infectious disease mapping across New Brunswick (Canada) and Maine (USA) was carried out to evaluate the proposed architecture, which uses standard Web Map Service, Styled Layer Descriptor and Web Map Context specifications. The case study shows the effectiveness of an infectious disease surveillance system...

  20. Preface for the book: Antennas And Propagation for Body-Centric Wireless Communications

    DEFF Research Database (Denmark)

    Frederiksen, Flemming Bjerge; Prasad, Ramjee

    2006-01-01

    The book address the following subjects: Body Centric Wireless Communications possibilities, Electromagnetic properties of the body, On-body Communication Channels at high and low frequency bands, Body Centric UWB Communications, Wearable Antennas for cellular and WLAN communications, Body...

  1. Using Information-Sharing Exchange Techniques from the Private Sector to Enhance Information Sharing Between Domestic Intelligence Organizations

    Science.gov (United States)

    2013-12-01

    Travel Alliance —Fast Res System Flow (From Open Travel, 2009a...Intelligence Center THN Tourism Harmonisation Network VCC Virtual Command Center xiii ACKNOWLEDGMENTS I would like to open with thanking my wife...HSIN) The HSIN brand is divided into two parts, HSIN and HSIN-Intel. The larger HSIN is devoted to information sharing amongst the public safety

  2. Comprehensive Study on Wastages of Supply Chain Information Sharing in Automotive Industries

    Science.gov (United States)

    Sendhil Kumar, R.; Pugazhendhi, S.; Muralidharan, C.; Murali, S.

    2017-03-01

    A supply chain is a very extensive concept, which encompasses many problems and features when it comes to controlling. Now a day’s lean concept is a very common method to several areas, such as service sectors and manufacturing. Applying the lean concept to supply chain management is a very popular study part, it has attracted many industrial practices and researchers with different applications. Information sharing and technology remain one of the key factors of integrating the supply chain members. Current scenario the competition is no longer between the competing companies, but it happens between the supply chains. So the efficiency of the supply chain is very important. And the effective sharing of information can enhance the supply chain efficiency through minimizing the inventories and Information sharing can increase supply chain efficiency by reducing inventories and stabilizing the production. This paper describes and discusses about the seven deadly wastes of supply chain information with the comparative principle of Toyota production system (TPS) principle approach. How the TPS can be applied to supply chain information sharing And lean tool of 5S concept possibility improve the information sharing.

  3. Library Information System Time-Sharing (LISTS) Project. Final Report.

    Science.gov (United States)

    Black, Donald V.

    The Library Information System Time-Sharing (LISTS) experiment was based on three innovations in data processing technology: (1) the advent of computer time-sharing on third-generation machines, (2) the development of general-purpose file-management software and (3) the introduction of large, library-oriented data bases. The main body of the…

  4. Health information sharing on Facebook: An exploratory study on diabetes mellitus.

    Science.gov (United States)

    AlQarni, Zainab A; Yunus, Faisel; Househ, Mowafa S

    Increasingly, people are using Facebook (FB) to share health information. However, little is known about the type of information sharing and its potential health consequences in the Arabic speaking world. This study attempts to fill this knowledge gap for diabetes mellitus (DM). We conducted a retrospective qualitative FB content analysis using predefined eligibility criteria. The analysis was restricted to diabetes related groups in the Arabic speaking world. The data were collected between June 2010 and December 2015. A total of 55 groups were screened of which seven met the eligibility criteria. We found 6107 posts in Arabic related to DM of which 1551 posts were included for further analysis. There were 458 (30%) FB posts from Egypt with no posts from Somalia, Yemen, Comoros, and Djibouti. The majority of the posts, 863 (56%), were from females. The focus of the posts was on sharing personal experiences (n=423, 27%), raising awareness (n=210, 3.5%), providing spiritual support (n=162, 10.4%), sharing latest research (n=147, 9.5%), and providing education (n=110, 7.1%) on DM. A large number of the posts by people in 40-60 year age group were around finding out diagnosis related information due to limited access to care in their home countries. Patients with DM are increasingly sharing their health information with other FB users. This study will help inform future research with regard to health information sharing and designing appropriate interventions to harness the power of social media in improving public health. Copyright © 2016 King Saud Bin Abdulaziz University for Health Sciences. Published by Elsevier Ltd. All rights reserved.

  5. The Mediating Role of Knowledge Sharing on Information Technology and Innovation

    Directory of Open Access Journals (Sweden)

    Onwika Kaewchur

    2013-12-01

    Full Text Available This study aims to investigate the relationship between information technology, knowledge sharing, and a firm’s innovation. Knowledge sharing as a mediating effect is also simultaneously investigated with regard to the relationship between information technology and a firm’s innovation. In this research, the quantitative method was mainly employed. The data was collected with a survey. A total of 224 respondents from herbal manufacturing companies were included in the research. The results presented in this paper demonstrate that knowledge sharing and information technology can critically influence the organization’s innovation and can play a vital role as a significant success factor in this process.

  6. Knowledge sharing and innovation in relationships interorganizational type of information technology outsourcing

    Directory of Open Access Journals (Sweden)

    Roberta Rodrigues Faoro

    2017-04-01

    Full Text Available Introduction: this paper presents an analysis of the sharing of knowledge and innovation in the inter-relationships of the type outsourcing of Information Technology. Objective: analyze the existence of relationship between knowledge sharing and innovation in the inter-relationships of the type of outsourcing information technology (IT. Methodology: research is exploratory, qualitative and using as a strategy the multiple case study, which analyzed 12 companies in IT outsourcing environments, 4 suppliers of IT and IT 8 client companies. Data were collected through semi structured interviews, documentary and direct observation. Results: it can be noted that the sharing of knowledge showed contribute to the existence of innovation in IT outsourcing environment. The suppliers prioritize the codification of shared knowledge, while customers prefer the sharing of knowledge through informal conversations. It was identified that the motives for outsourcing IT may be related to the sharing of knowledge and innovation. Conclusions: this research contributes to the advancement of knowledge about the knowledge and innovation sharing phenomena in outsourcing of IT environments.

  7. Anonymity versus privacy: Selective information sharing in online cancer communities

    NARCIS (Netherlands)

    Frost, J.H.; Vermeulen, I.E.; Beekers, N.

    2014-01-01

    Background: Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient

  8. Sharing Information to Promote a Culture of Safety

    Science.gov (United States)

    Goodrum, Sarah; Woodward, William; Thompson, Andrew J.

    2017-01-01

    Much of the research on school shootings emphasizes the need for peers, not school officials, to share information about students of concern. This qualitative case study examined the information school officials had prior to a school shooting, which left two students dead. The data came from school officials' deposition testimony and school…

  9. Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision-Theoretic Approach.

    Science.gov (United States)

    He, Meilin; Devine, Laura; Zhuang, Jun

    2018-02-01

    The government, private sectors, and others users of the Internet are increasingly faced with the risk of cyber incidents. Damage to computer systems and theft of sensitive data caused by cyber attacks have the potential to result in lasting harm to entities under attack, or to society as a whole. The effects of cyber attacks are not always obvious, and detecting them is not a simple proposition. As the U.S. federal government believes that information sharing on cybersecurity issues among organizations is essential to safety, security, and resilience, the importance of trusted information exchange has been emphasized to support public and private decision making by encouraging the creation of the Information Sharing and Analysis Center (ISAC). Through a decision-theoretic approach, this article provides new perspectives on ISAC, and the advent of the new Information Sharing and Analysis Organizations (ISAOs), which are intended to provide similar benefits to organizations that cannot fit easily into the ISAC structure. To help understand the processes of information sharing against cyber threats, this article illustrates 15 representative information sharing structures between ISAC, government, and other participating entities, and provide discussions on the strategic interactions between different stakeholders. This article also identifies the costs of information sharing and information security borne by different parties in this public-private partnership both before and after cyber attacks, as well as the two main benefits. This article provides perspectives on the mechanism of information sharing and some detailed cost-benefit analysis. © 2017 Society for Risk Analysis.

  10. SocialCloudShare: a Facebook Application for a Relationship-based Information Sharing in the Cloud

    Directory of Open Access Journals (Sweden)

    Davide Albertini

    2014-10-01

    Full Text Available In last few years, Online Social Networks (OSNs have become one of the most used platforms for sharing data (e.g., pictures, short texts on the Internet. Nowadays Facebook and Twitter are the most popular OSN providers, though they implement different social models. However, independently from the social model they implement, OSN platforms have become a widespread repository of personal information. All these data (e.g., profile information, shared elements, users’ likes are stored in a centralized repository that can be exploited for data mining and marketing analysis. With this data collection process, lots of sensitive information are gathered by OSN providers that, in time, have become more and more targeted by malicious attackers. To overcome this problem, in this paper we present an architectural framework that, by means of a Social Application registered in Facebook, allows users to move their data (e.g., relationships, resources outside the OSN realm and to store them in the public Cloud. Given that the public Cloud is not a secure and private environment, our proposal provides users security and privacy guarantees over their data by encrypting the resources and by anonymizing their social graphs. The presented framework enforces Relationship-Based Access Control (ReBAC rules over the anonymized social graph, providing OSN users the possibility to selectively share information and resources as they are used to do in Facebook.

  11. Fuzzy-rule-based Adaptive Resource Control for Information Sharing in P2P Networks

    Science.gov (United States)

    Wu, Zhengping; Wu, Hao

    With more and more peer-to-peer (P2P) technologies available for online collaboration and information sharing, people can launch more and more collaborative work in online social networks with friends, colleagues, and even strangers. Without face-to-face interactions, the question of who can be trusted and then share information with becomes a big concern of a user in these online social networks. This paper introduces an adaptive control service using fuzzy logic in preference definition for P2P information sharing control, and designs a novel decision-making mechanism using formal fuzzy rules and reasoning mechanisms adjusting P2P information sharing status following individual users' preferences. Applications of this adaptive control service into different information sharing environments show that this service can provide a convenient and accurate P2P information sharing control for individual users in P2P networks.

  12. LanguageNet: A Novel Framework for Processing Unstructured Text Information

    DEFF Research Database (Denmark)

    Qureshi, Pir Abdul Rasool; Memon, Nasrullah; Wiil, Uffe Kock

    2011-01-01

    In this paper we present LanguageNet—a novel framework for processing unstructured text information from human generated content. The state of the art information processing frameworks have some shortcomings: modeled in generalized form, trained on fixed (limited) data sets, and leaving...... the specialization necessary for information consolidation to the end users. The proposed framework is the first major attempt to address these shortcomings. LanguageNet provides extended support of graphical methods contributing added value to the capabilities of information processing. We discuss the benefits...... of the framework and compare it with the available state of the art. We also describe how the framework improves the information gathering process and contribute towards building systems with better performance in the domain of Open Source Intelligence....

  13. Behavioral, Attitudinal, and Cultural Factors Influencing Interagency Information Sharing

    Science.gov (United States)

    2011-05-01

    Conflict ( Prosocial Behavior ) Cognitive Processes - Shared Team Mental Models, Transactive Memory Action Processes - Team Coordination...information sharing behaviors after the experiment unfolded. To explore this further, an independent sample t -test was conducted, where the difference in...U.S. Army Research Institute for the Behavioral and Social Sciences Research Report 1944 Behavioral , Attitudinal, and Cultural Factors

  14. Implication of information sharing on Bullwhip effects in a toy supply chain

    DEFF Research Database (Denmark)

    Wong, Chee Yew; El-Beheiry, Mohamed; Johansen, John

    2004-01-01

    Coordination of toy supply chains is challenged by volatile and seasonal demand with high forecast errors and bullwhip effects. This paper compares Bullwhip effects in a three-level divergent a toy supply chain between retailers who shared downstream demand information (consumer sales...... using early order commitment has decreased the Bullwhip effect for all supply chain members even if it is applied locally.......) and retailers who did not share. Bullwhip effect is reduced when the shared volume of retailers who shared downstream demand information increased; however, fill rate performance is not improved. Key causes of Bullwhip effect are identified - forecast updating, timeliness of demand signal, limited use of shared...

  15. Patient Portals as a Means of Information and Communication Technology Support to Patient- Centric Care Coordination - the Missing Evidence and the Challenges of Evaluation. A joint contribution of IMIA WG EVAL and EFMI WG EVAL.

    Science.gov (United States)

    Rigby, M; Georgiou, A; Hyppönen, H; Ammenwerth, E; de Keizer, N; Magrabi, F; Scott, P

    2015-08-13

    To review the potential contribution of Information and Communication Technology (ICT) to enable patient-centric and coordinated care, and in particular to explore the role of patient portals as a developing ICT tool, to assess the available evidence, and to describe the evaluation challenges. Reviews of IMIA, EFMI, and other initiatives, together with literature reviews. We present the progression from care coordination to care integration, and from patient-centric to person-centric approaches. We describe the different roles of ICT as an enabler of the effective presentation of information as and when needed. We focus on the patient's role as a co-producer of health as well as the focus and purpose of care. We discuss the need for changing organisational processes as well as the current mixed evidence regarding patient portals as a logical tool, and the reasons for this dichotomy, together with the evaluation principles supported by theoretical frameworks so as to yield robust evidence. There is expressed commitment to coordinated care and to putting the patient in the centre. However to achieve this, new interactive patient portals will be needed to enable peer communication by all stakeholders including patients and professionals. Few portals capable of this exist to date. The evaluation of these portals as enablers of system change, rather than as simple windows into electronic records, is at an early stage and novel evaluation approaches are needed.

  16. Exploring the concepts of privacy and the sharing of sensitive health information.

    Science.gov (United States)

    Asiri, Eman; Asiri, Hanan; Househ, Mowafa

    2014-01-01

    People are increasingly sharing their personal information on social networks such as Facebook. Patients, in particular, join online support groups for specific conditions to get support and share their experience with other members of a social media group. Throughout this process, sensitive health information could be shared by group members as a part of this information exchange and privacy concerns can arise as a result. The purpose of this study is to explore various aspects relating to privacy and the sharing of sensitive health information through social media platforms. Our review found that social media such as Facebook already plays a large role in patients' lives as it helps patients to understand their health conditions and gain support from other people who suffer from the same condition. However, there are major concerns for those patients as their privacy and confidentiality can be harmed by improper use of their posted sensitive health information by governments, hospitals or individuals. More importantly, there is an increased need for laws and legislations that protect and empower patients. We recommend that healthcare organizations collaborate with social media software companies and create educational and awareness campaigns on the impacts of sharing sensitive health information through social media.

  17. The Mason Water Data Information System (MWDIS): Enabling data sharing and discovery at George Mason University

    Science.gov (United States)

    Ferreira, C.; Da Silva, A. L.; Nunes, A.; Haddad, J.; Lawler, S.

    2014-12-01

    Enabling effective data use and re-use in scientific investigations relies heavily not only on data availability but also on efficient data sharing discovery. The CUAHSI led Hydrological Information Systems (HIS) and supporting products have paved the way to efficient data sharing and discovery in the hydrological sciences. Based on the CUAHSI-HIS framework concepts for hydrologic data sharing we developed a unique system devoted to the George Mason University scientific community to support university wide data sharing and discovery as well as real time data access for extreme events situational awareness. The internet-based system will provide an interface where the researchers will input data collected from the measurement stations and present them to the public in form of charts, tables, maps, and documents. Moreover, the system is developed in ASP.NET MVC 4 using as Database Management System, Microsoft SQL Server 2008 R2, and hosted by Amazon Web Services. Currently the system is supporting the Mason Watershed Project providing historical hydrological, atmospheric and water quality data for the campus watershed and real time flood conditions in the campus. The system is also a gateway for unprecedented data collection of hurricane storm surge hydrodynamics in coastal wetlands in the Chesapeake Bay providing not only access to historical data but recent storms such as Hurricane Arthur. Future research includes coupling the system to a real-time flood alert system on campus, and besides providing data on the World Wide Web, to foment and provide a venue for interdisciplinary collaboration within the water scientists in the region.

  18. Data Centric Sensor Stream Reduction for Real-Time Applications in Wireless Sensor Networks

    Science.gov (United States)

    Aquino, Andre Luiz Lins; Nakamura, Eduardo Freire

    2009-01-01

    This work presents a data-centric strategy to meet deadlines in soft real-time applications in wireless sensor networks. This strategy considers three main aspects: (i) The design of real-time application to obtain the minimum deadlines; (ii) An analytic model to estimate the ideal sample size used by data-reduction algorithms; and (iii) Two data-centric stream-based sampling algorithms to perform data reduction whenever necessary. Simulation results show that our data-centric strategies meet deadlines without loosing data representativeness. PMID:22303145

  19. The Influence of Information Behaviour on Information Sharing across Cultural Boundaries in Development Contexts

    Science.gov (United States)

    Meyer, Hester W. J.

    2009-01-01

    Introduction: Sharing of information across cultural boundaries does not always live up to expectations. Information behaviour is an underlying factor, which can contribute to poor use or non-use of the information or information services at the disposal of indigenous people in a development context. Method: A literature study of information…

  20. Privacy Protection in Personal Health Information and Shared Care Records

    Directory of Open Access Journals (Sweden)

    Roderick L B Neame

    2014-03-01

    Full Text Available Background The protection of personal information privacy has become one of the most pressing security concerns for record keepers. Many institutions have yet to implement the essential infrastructure for data privacy protection and patient control when accessing and sharing data; even more have failed to instil a privacy and security awareness mindset and culture amongst their staff. Increased regulation, together with better compliance monitoring has led to the imposition of increasingly significant monetary penalties for failures to protect privacy. Objective  There is growing pressure in clinical environments to deliver shared patient care and to support this with integrated information.  This demands that more information passes between institutions and care providers without breaching patient privacy or autonomy.  This can be achieved with relatively minor enhancements of existing infrastructures and does not require extensive investment in inter-operating electronic records: indeed such investments to date have been shown not to materially improve data sharing.Requirements for Privacy  There is an ethical duty as well as a legal obligation on the part of care providers (and record keepers to keep patient information confidential and to share it only with the authorisation of the patient.  To achieve this information storage and retrieval, and communication systems must be appropriately configured. Patients may consult clinicians anywhere and at any time: therefore their data must be available for recipient-driven retrieval under patient control and kept private. 

  1. 47 CFR 25.263 - Information sharing requirements for SDARS terrestrial repeater operators.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Information sharing requirements for SDARS terrestrial repeater operators. 25.263 Section 25.263 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES SATELLITE COMMUNICATIONS Technical Standards § 25.263 Information sharing...

  2. Information sharing and relationships on social networking sites.

    Science.gov (United States)

    Steijn, Wouter M P; Schouten, Alexander P

    2013-08-01

    This article investigates the relationship between sharing personal information and relationship development in the context of social networking sites (SNSs). Information disclosed on these sites could affect relationships in a different manner compared to more traditional interactions, such as instant messaging or face-to-face interaction. Respondents in the age range of 12 to 83 were surveyed about experiences of relationship development as a consequence of contact through Facebook or Hyves-the most popular Dutch SNSs. Results showed a primarily positive effect of information sharing on SNSs on our relationships. Furthermore, relationship development mainly occurs among acquaintances and friends, and public posts are most strongly related to relationship development. These findings suggest that SNSs might affect relationships in a distinct fashion as acquaintances and friends gain access to public self-disclosures that might normally only be reserved for close friends and family. Overall, this study provides an insight into some of the positive aspects of the public nature of SNSs in contrast with the general negative associations.

  3. The implications of information sharing on bullwhip effects in a toy supply chain

    DEFF Research Database (Denmark)

    Wong, Chee Yew; El-Beheiry, Mohamed Mostafa; Johansen, John

    2007-01-01

    This paper compares actual bullwhip effects provided by retailers who shared downstream demand information and retailers who did not share in a three-level (divergent) toy supply chain. The toy supply chain faces high forecast errors and bullwhip effects due to unpredictable and seasonal demand...... demand information. To reduce the bullwhip effect, two solutions using the shared information are tested. They are a proposed premature replenishment rule and a simple forecast updating mechanism. Both solutions are proven capable in reducing bullwhip effects of the toy supply chain even without...... patterns. The results indicate a reduction of the bullwhip effect and an improvement of the fill rate due to the increase of retailers who shared downstream demand information. This paper also addresses two main causes of the bullwhip effect, which are the supply variability and limited use of the shared...

  4. A Commander in Chief's Network-Centric Odyssey

    National Research Council Canada - National Science Library

    Copley, E

    2002-01-01

    .... Each Armed Service has begun training and equipping its force using the tenets of Network-Centric Operations, but those forces come together for the first time under the combatant Commander-in-Chief...

  5. Information Sharing, Cooperative Behaviour and Hotel Performance: A Survey of the Kenyan Hospitality Industry

    Directory of Open Access Journals (Sweden)

    Sammy Odari Namusonge

    2015-10-01

    Full Text Available Information sharing is the life blood of supply chain collaboration. Its role in achieving operational performance of supply chains has been widely acclaimed. However whether information sharing would result in improved performance in the context of the hospitality industry has not been empirically determined. This study sought to find out the role of information sharing on hotel performance when the relationship was mediated by cooperative behaviour. A survey design was employed where proportionate stratified sampling was used to select 50 out of 57 town hotels. Data was collected through the use of questionnaires as well interview guides to the procurement\\supply chain departments of these hotels. Logarithmic transformations were used in conjunction with multiple regression analysis to determine the relationship between information sharing, cooperative behaviour and hotel performance. The study concludes that information sharing in the Kenyan hospitality industry does not directly relate to hotel performance. Its relationship is mediated by cooperative behaviour (trust and attitude with supply chain partners. This suggests that information sharing is essential but insufficient by itself to bring significant performance improvements in hotels in the Kenyan hospitality industry. A possible reason for this is that this collaborative practice is highly dependent on information sharing capability, structure of the information as well as culture. Through quadrant analysis the study identifies and recommends the sharing of information about long term strategic plans and events such as entering new markets and acquiring a new customer base as an area of primary priority for improvement.

  6. Note Taking and Note Sharing While Browsing Campaign Information

    DEFF Research Database (Denmark)

    Robertson, Scott P.; Vatrapu, Ravi; Abraham, George

    2009-01-01

    Participants were observed while searching and browsing the internet for campaign information in a mock-voting situation in three online note-taking conditions: No Notes, Private Notes, and Shared Notes. Note taking significantly influenced the manner in which participants browsed for information...

  7. Threshold policy for global games with noisy information sharing

    KAUST Repository

    Mahdavifar, Hessam; Beirami, Ahmad; Touri, Behrouz; Shamma, Jeff S.

    2015-01-01

    of information and show that such equilibrium strategies exist and are unique if the sharing of information happens over a sufficiently noisy environment. To show this result, we establish that if a threshold function is an equilibrium strategy, then it will be a

  8. 78 FR 15680 - Information Sharing With Agency Stakeholders: Public Meeting

    Science.gov (United States)

    2013-03-12

    ...] Information Sharing With Agency Stakeholders: Public Meeting AGENCY: Animal and Plant Health Inspection... stakeholders regarding cross-Agency strategic priorities. We are also announcing that APHIS is hosting a public... opportunity for stakeholders to ask questions and share their perspective. DATES: The meeting will be held on...

  9. Free and open source enabling technologies for patient-centric, guideline-based clinical decision support: a survey.

    Science.gov (United States)

    Leong, T Y; Kaiser, K; Miksch, S

    2007-01-01

    Guideline-based clinical decision support is an emerging paradigm to help reduce error, lower cost, and improve quality in evidence-based medicine. The free and open source (FOS) approach is a promising alternative for delivering cost-effective information technology (IT) solutions in health care. In this paper, we survey the current FOS enabling technologies for patient-centric, guideline-based care, and discuss the current trends and future directions of their role in clinical decision support. We searched PubMed, major biomedical informatics websites, and the web in general for papers and links related to FOS health care IT systems. We also relied on our background and knowledge for specific subtopics. We focused on the functionalities of guideline modeling tools, and briefly examined the supporting technologies for terminology, data exchange and electronic health record (EHR) standards. To effectively support patient-centric, guideline-based care, the computerized guidelines and protocols need to be integrated with existing clinical information systems or EHRs. Technologies that enable such integration should be accessible, interoperable, and scalable. A plethora of FOS tools and techniques for supporting different knowledge management and quality assurance tasks involved are available. Many challenges, however, remain in their implementation. There are active and growing trends of deploying FOS enabling technologies for integrating clinical guidelines, protocols, and pathways into the main care processes. The continuing development and maturation of such technologies are likely to make increasingly significant contributions to patient-centric, guideline-based clinical decision support.

  10. [Design and implementation of medical instrument standard information retrieval system based on APS.NET].

    Science.gov (United States)

    Yu, Kaijun

    2010-07-01

    This paper Analys the design goals of Medical Instrumentation standard information retrieval system. Based on the B /S structure,we established a medical instrumentation standard retrieval system with ASP.NET C # programming language, IIS f Web server, SQL Server 2000 database, in the. NET environment. The paper also Introduces the system structure, retrieval system modules, system development environment and detailed design of the system.

  11. Report of the Project Research on Disaster Reduction using Disaster Mitigating Information Sharing Technology

    Science.gov (United States)

    Suzuki, Takeyasu

    For the purpose of reducing disaster damage by applying information sharing technologies, "the research on disaster reduction using crisis-adaptive information sharing technologies" was carried out from July, 2004 through March 2007, as a three year joint project composed of a government office and agency, national research institutes, universities, lifeline corporations, a NPO and a private company. In this project, the disaster mitigating information sharing platform which is effective to disaster response activities mainly for local governments was developed, as a framework which enables information sharing in disasters. A prototype of the platform was built by integrating an individual system and tool. Then, it was applied to actual local governments and proved to be effective to disaster responses. This paper summarizes the research project. It defines the platform as a framework of both information contents and information systems first and describes information sharing technologies developed for utilization of the platform. It also introduces fields tests in which a prototype of the platform was applied to local governments.

  12. Dependencies in event trees analyzed by Petri nets

    International Nuclear Information System (INIS)

    Nývlt, Ondřej; Rausand, Marvin

    2012-01-01

    This paper discusses how non-marked Petri nets can be used to model and analyze event trees where the pivotal (branching) events are dependent and modeled by fault trees. The dependencies may, for example, be caused by shared utilities, shared components, or general common cause failures that are modeled by beta-factor models. These dependencies are cumbersome to take into account when using standard event-/fault tree modeling techniques, and may lead to significant errors in the calculated end-state probabilities of the event tree if they are not properly analyzed. A new approach is proposed in this paper, where the whole event tree is modeled by a non-marked Petri net and where P-invariants, representing the structural properties of the Petri net, are used to obtain the frequency of each end-state of the event tree with dependencies. The new approach is applied to a real example of an event tree analysis of the Strahov highway tunnel in Prague, Czech Republic, including two types of dependencies (shared Programmable Logic Controllers and Common Cause Failures). - Highlights: ► In this paper, we model and analyze event trees (ET) using Petri nets. ► The pivotal events of the modeled event trees are dependent (e.g., shared PLCs, CCF). ► A new method based on P-invariants to obtain probabilities of end states is proposed. ► Method is shown in the case study of the Stahov tunnel in the Czech Republic.

  13. Healthcare information technology infrastructures in Turkey.

    Science.gov (United States)

    Dogac, A; Yuksel, M; Ertürkmen, G L; Kabak, Y; Namli, T; Yıldız, M H; Ay, Y; Ceyhan, B; Hülür, U; Oztürk, H; Atbakan, E

    2014-05-22

    The objective of this paper is to describe some of the major healthcare information technology (IT) infrastructures in Turkey, namely, Sağlık-Net (Turkish for "Health-Net"), the Centralized Hospital Appointment System, the Basic Health Statistics Module, the Core Resources Management System, and the e-prescription system of the Social Security Institution. International collaboration projects that are integrated with Sağlık-Net are also briefly summarized. The authors provide a survey of the some of the major healthcare IT infrastructures in Turkey. Sağlık-Net has two main components: the National Health Information System (NHIS) and the Family Medicine Information System (FMIS). The NHIS is a nation-wide infrastructure for sharing patients' Electronic Health Records (EHRs). So far, EHRs of 78.9 million people have been created in the NHIS. Similarly, family medicine is operational in the whole country via FMIS. Centralized Hospital Appointment System enables the citizens to easily make appointments in healthcare providers. Basic Health Statistics Module is used for collecting information about the health status, risks and indicators across the country. Core Resources Management System speeds up the flow of information between the headquarters and Provincial Health Directorates. The e-prescription system is linked with Sağlık-Net and seamlessly integrated with the healthcare provider information systems. Finally, Turkey is involved in several international projects for experience sharing and disseminating national developments. With the introduction of the "Health Transformation Program" in 2003, a number of successful healthcare IT infrastructures have been developed in Turkey. Currently, work is going on to enhance and further improve their functionality.

  14. Techniques for cost-effective electric information sharing; Cost balance wo koryoshita denshi joho kyoyuka gijutsu

    Energy Technology Data Exchange (ETDEWEB)

    Shinohara, Y. [Central Research Institute of Electric Power Industry, Tokyo (Japan)

    1997-04-01

    The key technology that can effectively support the sharing of each information such as documents, data, and know-how was rearranged to clarify how to utilize it for constructing an electronic information sharing system. The key technology that supports the sharing of electronic information was rearranged from the viewpoint of information gathering, information rearrangement, and information utilization. The reduction in cost for information gathering and rearrangement is indispensable to the promotion of much information sharing. However, each automation method presently causes the deterioration in quality of the rearranged information and the increase in cost for information utilization. To realize a practical electronic information sharing system, it is important to combine the key technologies properly so that the total cost balance of information gathering and information utilization is improved. Therefore, the combination of character recognition by OCR and unpreciseness retrieval, and the complementary combination of automatic document sorting, based on multiple incomplete rearrangement systems, and multiple sorting menus were proposed. 23 refs., 5 figs., 2 tabs.

  15. Information And Data-Sharing Plan of IPY China Activity

    Science.gov (United States)

    Zhang, X.; Cheng, W.

    2007-12-01

    Polar Data-Sharing is an effective resolution to global system and polar science problems and to interdisciplinary and sustainable study, as well as an important means to deal with IPY scientific heritages and realize IPY goals. Corresponding to IPY Data-Sharing policies, Information and Data-Sharing Plan was listed in five sub-plans of IPY Chinese Programme launched in March, 2007,they are Scientific research program of the Prydz Bay, Amery Ice Shelf and Dome A transects(short title:'PANDA'), the Arctic Scientific Research Expedition Plan, International Cooperation Plan, Information and Data-Sharing Plan, Education and Outreach. China, since the foundation of Antarctic Zhongshan Station in 1989, has carried out systematic scientific expeditions and researches in Larsemann Hills, Prydz Bay and the neighbouring sea areas, organized 14 Prydz Bay oceanographic investigations, 3 Amery Ice Shelf expeditions, 4 Grove Mountains expeditions and 5 inland ice cap scientific expeditions. 2 comprehensive oceanographic investigations in the Arctic Ocean were conducted in 1999 and 2003, acquired a large amount of data and samples in PANDA section and fan areas of Pacific Ocean in the Arctic Ocean. A mechanism of basic data submitting ,sharing and archiving has been gradually set up since 2000. Presently, Polar Science Database and Polar Sample Resource Sharing Platform of China with the aim of sharing polar data and samples has been initially established and began to provide sharing service to domestic and oversea users. According to IPY Chinese Activity, 2 scientific expeditions in the Arctic Ocean, 3 in the South Ocean, 2 at Amery Ice Shelf, 1 on Grove Mountains and 2 inland ice cap expeditions on Dome A will be carried out during IPY period. According to the experiences accumulated in the past and the jobs in the future, the Information and Data- Sharing Plan, during 2007-2010, will save, archive, and provide exchange and sharing services upon the data obtained by scientific

  16. Accounting for between-study variation in incremental net benefit in value of information methodology.

    Science.gov (United States)

    Willan, Andrew R; Eckermann, Simon

    2012-10-01

    Previous applications of value of information methods for determining optimal sample size in randomized clinical trials have assumed no between-study variation in mean incremental net benefit. By adopting a hierarchical model, we provide a solution for determining optimal sample size with this assumption relaxed. The solution is illustrated with two examples from the literature. Expected net gain increases with increasing between-study variation, reflecting the increased uncertainty in incremental net benefit and reduced extent to which data are borrowed from previous evidence. Hence, a trial can become optimal where current evidence is sufficient assuming no between-study variation. However, despite the expected net gain increasing, the optimal sample size in the illustrated examples is relatively insensitive to the amount of between-study variation. Further percentage losses in expected net gain were small even when choosing sample sizes that reflected widely different between-study variation. Copyright © 2011 John Wiley & Sons, Ltd.

  17. Design of a Business-to-Government Information Sharing Architecture Using Business Rules

    NARCIS (Netherlands)

    Van Engelenburg, S.H.; Janssen, M.F.W.H.A.; Klievink, A.J.

    2016-01-01

    Information sharing between businesses and government agencies is of vital importance, yet business are often reluctant to share information, e.g. as it might be misused. Taking this into account is however often overlooked in the design of software architectures. In this research we apply a design

  18. Integrated Personal Health Records: Transformative Tools for Consumer-Centric Care

    Directory of Open Access Journals (Sweden)

    Raymond Brian

    2008-10-01

    Full Text Available Abstract Background Integrated personal health records (PHRs offer significant potential to stimulate transformational changes in health care delivery and self-care by patients. In 2006, an invitational roundtable sponsored by Kaiser Permanente Institute, the American Medical Informatics Association, and the Agency for Healthcare Research and Quality was held to identify the transformative potential of PHRs, as well as barriers to realizing this potential and a framework for action to move them closer to the health care mainstream. This paper highlights and builds on the insights shared during the roundtable. Discussion While there is a spectrum of dominant PHR models, (standalone, tethered, integrated, the authors state that only the integrated model has true transformative potential to strengthen consumers' ability to manage their own health care. Integrated PHRs improve the quality, completeness, depth, and accessibility of health information provided by patients; enable facile communication between patients and providers; provide access to health knowledge for patients; ensure portability of medical records and other personal health information; and incorporate auto-population of content. Numerous factors impede widespread adoption of integrated PHRs: obstacles in the health care system/culture; issues of consumer confidence and trust; lack of technical standards for interoperability; lack of HIT infrastructure; the digital divide; uncertain value realization/ROI; and uncertain market demand. Recent efforts have led to progress on standards for integrated PHRs, and government agencies and private companies are offering different models to consumers, but substantial obstacles remain to be addressed. Immediate steps to advance integrated PHRs should include sharing existing knowledge and expanding knowledge about them, building on existing efforts, and continuing dialogue among public and private sector stakeholders. Summary Integrated PHRs

  19. Cost-volume-profit and net present value analysis of health information systems.

    Science.gov (United States)

    McLean, R A

    1998-08-01

    The adoption of any information system should be justified by an economic analysis demonstrating that its projected benefits outweigh its projected costs. Analysis differ, however, on which methods to employ for such a justification. Accountants prefer cost-volume-profit analysis, and economists prefer net present value analysis. The article explains the strengths and weaknesses of each method and shows how they can be used together so that well-informed investments in information systems can be made.

  20. CMS Dashboard Task Monitoring: A user-centric monitoring view

    International Nuclear Information System (INIS)

    Karavakis, Edward; Khan, Akram; Andreeva, Julia; Maier, Gerhild; Gaidioz, Benjamin

    2010-01-01

    We are now in a phase change of the CMS experiment where people are turning more intensely to physics analysis and away from construction. This brings a lot of challenging issues with respect to monitoring of the user analysis. The physicists must be able to monitor the execution status, application and grid-level messages of their tasks that may run at any site within the CMS Virtual Organisation. The CMS Dashboard Task Monitoring project provides this information towards individual analysis users by collecting and exposing a user-centric set of information regarding submitted tasks including reason of failure, distribution by site and over time, consumed time and efficiency. The development was user-driven with physicists invited to test the prototype in order to assemble further requirements and identify weaknesses with the application.

  1. Citizen-Centric Urban Planning through Extracting Emotion Information from Twitter in an Interdisciplinary Space-Time-Linguistics Algorithm

    Directory of Open Access Journals (Sweden)

    Bernd Resch

    2016-07-01

    Full Text Available Traditional urban planning processes typically happen in offices and behind desks. Modern types of civic participation can enhance those processes by acquiring citizens’ ideas and feedback in participatory sensing approaches like “People as Sensors”. As such, citizen-centric planning can be achieved by analysing Volunteered Geographic Information (VGI data such as Twitter tweets and posts from other social media channels. These user-generated data comprise several information dimensions, such as spatial and temporal information, and textual content. However, in previous research, these dimensions were generally examined separately in single-disciplinary approaches, which does not allow for holistic conclusions in urban planning. This paper introduces TwEmLab, an interdisciplinary approach towards extracting citizens’ emotions in different locations within a city. More concretely, we analyse tweets in three dimensions (space, time, and linguistics, based on similarities between each pair of tweets as defined by a specific set of functional relationships in each dimension. We use a graph-based semi-supervised learning algorithm to classify the data into discrete emotions (happiness, sadness, fear, anger/disgust, none. Our proposed solution allows tweets to be classified into emotion classes in a multi-parametric approach. Additionally, we created a manually annotated gold standard that can be used to evaluate TwEmLab’s performance. Our experimental results show that we are able to identify tweets carrying emotions and that our approach bears extensive potential to reveal new insights into citizens’ perceptions of the city.

  2. Sleeping arrangements and mosquito net use among under-fives: results from the Uganda Demographic and Health Survey

    Directory of Open Access Journals (Sweden)

    Arinaitwe Jacqueline

    2003-11-01

    Full Text Available Abstract Background The Roll Back Malaria Initiative has identified the under-fives as one of the high risk groups for malaria, and one of the strategies to fight malaria in this group is increasing mosquito net use. This implies that there must be selective targeting at the household level such that the children are protected. However, the Roll Back Malaria preferences must be reconciled with those at the household level to take into account household level preferences. Methods This paper is based on the 2000–2001 Uganda Demographic and Health Survey data in which information on mosquito net ownership and use was collected. The patterns of household mosquito net ownership and use for children under five years of age were examined using both bi-variate and multivariate analysis. Results The preferences at the household level seem to be different; children use mosquito nets primarily because they happen to share a bed with their parents. A child who shares a bed with the mother is 21 times more likely to use a mosquito net than his/her counterpart. Conclusion Increasing mosquito net coverage such that 60% (the target for the RBM of households have at least one mosquito net will not necessarily protect the under-fives. Either the coverage will have to be expanded or appropriate targeting strategies designed.

  3. 16 CFR 313.12 - Limits on sharing account number information for marketing purposes.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Limits on sharing account number information... REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Limits on Disclosures § 313.12 Limits on sharing account number information for marketing purposes. (a) General prohibition on...

  4. 12 CFR 40.12 - Limits on sharing account number information for marketing purposes.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Limits on sharing account number information... OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Limits on Disclosures § 40.12 Limits on sharing account number information for marketing purposes. (a) General prohibition on disclosure of...

  5. THE ROLE OF INFORMATION SHARING IN SUPPLY CHAIN MANAGEMENT: THE SECURESCM APPROACH

    OpenAIRE

    ERNESTO DAMIANI; FULVIO FRATI; ROMARIC TCHOKPON

    2011-01-01

    Information sharing plays a role of paramount importance in modern supply chain environments. In fact, the elements that compose the chain need to share information about sensitive aspects of their business in order to build more accurate and profitable supply plans. In this paper, we describe how the increasing of information released increases the overall economic results of the whole chain, and how this information can be protected, exploiting secure computation techniques, to reduce the r...

  6. 12 CFR 216.12 - Limits on sharing account number information for marketing purposes.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Limits on sharing account number information... GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Limits on Disclosures § 216.12 Limits on sharing account number information for marketing purposes. (a) General...

  7. 12 CFR 573.12 - Limits on sharing account number information for marketing purposes.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Limits on sharing account number information..., DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Limits on Disclosures § 573.12 Limits on sharing account number information for marketing purposes. (a) General prohibition on disclosure of...

  8. 12 CFR 332.12 - Limits on sharing account number information for marketing purposes.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Limits on sharing account number information... REGULATIONS AND STATEMENTS OF GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION Limits on Disclosures § 332.12 Limits on sharing account number information for marketing purposes. (a) General prohibition on...

  9. Assessing health consumerism on the Web: a demographic profile of information-seeking behaviors.

    Science.gov (United States)

    Lorence, Daniel P; Park, Heeyoung; Fox, Susannah

    2006-08-01

    The growing diversity of the online health information community is increasingly cited as a limiting factor related to the potential of the Internet as an effective health communication channel and information resource. Public-access Internet portals and decreasing costs of personal computers have created a consensus that unequal access to information, or a "Digital Divide," presents a like problem specific to health care consumers. Access to information, however, is an essential part of the consumer-centric framework outlined in the recently proposed U.S. National Health Information Infrastructure (NHII) and Health Architecture initiatives. To date little research has been done to differentiate the types of health information sought on the Web by different subgroups, linking user characteristics and health-seeking behaviors. Data from a study of consumer Web search activity in a post-intervention era serves as a natural experiment, and can identify whether a "digitally underserved group" persists in the United States. Such an environment would serve to exclude traditionally underserved groups from the benefits of the planned national heath information infrastructure. This exploratory technology assessment study seeks to differentiate and delineate specific behaviors, or lack of desired behaviors, across targeted health care subgroups. Doing so allows the design of more effective strategies to promote the use of the Web as a health education and health promotion tool, under the envisioned shared decision-making, consumer-centric health information model.

  10. Information Sharing: Practices That Can Benefit Critical Infrastructure Protection

    National Research Council Canada - National Science Library

    2001-01-01

    .... Information sharing and coordination are key elements in developing comprehensive and practical approaches to defending against computer-based, or cyber, attacks, which could threaten the national welfare...

  11. Survivorship Care Plan Information Needs: Perspectives of Safety-Net Breast Cancer Patients.

    Science.gov (United States)

    Burke, Nancy J; Napoles, Tessa M; Banks, Priscilla J; Orenstein, Fern S; Luce, Judith A; Joseph, Galen

    2016-01-01

    Despite the Institute of Medicine's (IOM) 2005 recommendation, few care organizations have instituted standard survivorship care plans (SCPs). Low health literacy and low English proficiency are important factors to consider in SCP development. Our study aimed to identify information needs and survivorship care plan preferences of low literacy, multi-lingual patients to support the transition from oncology to primary care and ongoing learning in survivorship. We conducted focus groups in five languages with African American, Latina, Russian, Filipina, White, and Chinese medically underserved breast cancer patients. Topics explored included the transition to primary care, access to information, knowledge of treatment history, and perspectives on SCPs. Analysis of focus group data identified three themes: 1) the need for information and education on the transition between "active treatment" and "survivorship"; 2) information needed (and often not obtained) from providers; and 3) perspectives on SCP content and delivery. Our data point to the need to develop a process as well as written information for medically underserved breast cancer patients. An SCP document will not replace direct communication with providers about treatment, symptom management and transition, a communication that is missing in participating safety-net patients' experiences of cancer care. Women turned to peer support and community-based organizations in the absence of information from providers. "Clear and effective" communication of survivorship care for safety-net patients requires dedicated staff trained to address wide-ranging information needs and uncertainties.

  12. Multi-Device to Multi-Device (MD2MD Content-Centric Networking Based on Multi-RAT Device

    Directory of Open Access Journals (Sweden)

    Cheolhoon Kim

    2017-11-01

    Full Text Available This paper proposes a method whereby a device can transmit and receive information using a beacon, and also describes application scenarios for the proposed method. In a multi-device to multi-device (MD2MD content-centric networking (CCN environment, the main issue involves searching for and connecting to nearby devices. However, if a device can’t find another device that satisfies its requirements, the connection is delayed due to the repetition of processes. It is possible to rapidly connect to a device without repetition through the selection of the optimal device using the proposed method. Consequently, the proposed method and scenarios are advantageous in that they enable efficient content identification and delivery in a content-centric Internet of Things (IoT environment, in which multiple mobile devices coexist.

  13. Additive manufacturing for consumer-centric business models

    DEFF Research Database (Denmark)

    Bogers, Marcel; Hadar, Ronen; Bilberg, Arne

    2016-01-01

    Digital fabrication—including additive manufacturing (AM), rapid prototyping and 3D printing—has the potential to revolutionize the way in which products are produced and delivered to the customer. Therefore, it challenges companies to reinvent their business model—describing the logic of creating...... and capturing value. In this paper, we explore the implications that AM technologies have for manufacturing systems in the new business models that they enable. In particular, we consider how a consumer goods manufacturer can organize the operations of a more open business model when moving from a manufacturer......-centric to a consumer-centric value logic. A major shift includes a move from centralized to decentralized supply chains, where consumer goods manufacturers can implement a “hybrid” approach with a focus on localization and accessibility or develop a fully personalized model where the consumer effectively takes over...

  14. Peering Strategic Game Models for Interdependent ISPs in Content Centric Internet

    Directory of Open Access Journals (Sweden)

    Jia Zhao

    2013-01-01

    Full Text Available Emergent content-oriented networks prompt Internet service providers (ISPs to evolve and take major responsibility for content delivery. Numerous content items and varying content popularities motivate interdependence between peering ISPs to elaborate their content caching and sharing strategies. In this paper, we propose the concept of peering for content exchange between interdependent ISPs in content centric Internet to minimize content delivery cost by a proper peering strategy. We model four peering strategic games to formulate four types of peering relationships between ISPs who are characterized by varying degrees of cooperative willingness from egoism to altruism and interconnected as profit-individuals or profit-coalition. Simulation results show the price of anarchy (PoA and communication cost in the four games to validate that ISPs should decide their peering strategies by balancing intradomain content demand and interdomain peering relations for an optimal cost of content delivery.

  15. Peering Strategic Game Models for Interdependent ISPs in Content Centric Internet

    Science.gov (United States)

    Guan, Jianfeng; Xu, Changqiao; Su, Wei; Zhang, Hongke

    2013-01-01

    Emergent content-oriented networks prompt Internet service providers (ISPs) to evolve and take major responsibility for content delivery. Numerous content items and varying content popularities motivate interdependence between peering ISPs to elaborate their content caching and sharing strategies. In this paper, we propose the concept of peering for content exchange between interdependent ISPs in content centric Internet to minimize content delivery cost by a proper peering strategy. We model four peering strategic games to formulate four types of peering relationships between ISPs who are characterized by varying degrees of cooperative willingness from egoism to altruism and interconnected as profit-individuals or profit-coalition. Simulation results show the price of anarchy (PoA) and communication cost in the four games to validate that ISPs should decide their peering strategies by balancing intradomain content demand and interdomain peering relations for an optimal cost of content delivery. PMID:24381517

  16. An Expanded Study of Net Generation Perceptions on Privacy and Security on Social Networking Sites (SNS)

    Science.gov (United States)

    Lawler, James P.; Molluzzo, John C.; Doshi, Vijal

    2012-01-01

    Social networking on the Internet continues to be a frequent avenue of communication, especially among Net Generation consumers, giving benefits both personal and professional. The benefits may be eventually hindered by issues in information gathering and sharing on social networking sites. This study evaluates the perceptions of students taking a…

  17. 75 FR 72871 - Survey of Information Sharing Practices With Affiliates

    Science.gov (United States)

    2010-11-26

    ... minimize the burden of the information collection on respondents, including through the use of information... completed by financial institutions and other persons that are creditors or users of consumer reports. The Agencies will use the Survey responses to prepare a report to Congress on the information sharing practices...

  18. [Medical information systems in the internet : current data about the dermatologic web site www.dermis.net].

    Science.gov (United States)

    Diepgen, T L; Tanko, Z; Weisshaar, E; Matvijets, A; Simon, M

    2009-12-01

    www.dermis.net was established in 1994 as a dermatological information system with now more than 4,000 pages and over 7,500 dermatological images in an atlas. 1,200 dermatological diagnoses and medical information with 1,100 synonyms can be searched by body location and in alphabetical order. Additionally, there are seven information modules about skin cancer, atopic dermatitis, rosacea, skin care, eczema, fungal diseases and hemorrhoids with links to other medical pages like Cochrane Library. Pediatric skin diseases are covered in PeDOIA. www.dermis.net is meanwhile available in German, English, Spanish, Portuguese, French and Turkish language. Current contents of this information system and user behavior are presented in this paper.

  19. An Inter-Personal Information Sharing Model Based on Personalized Recommendations

    Science.gov (United States)

    Kamei, Koji; Funakoshi, Kaname; Akahani, Jun-Ichi; Satoh, Tetsuji

    In this paper, we propose an inter-personal information sharing model among individuals based on personalized recommendations. In the proposed model, we define an information resource as shared between people when both of them consider it important --- not merely when they both possess it. In other words, the model defines the importance of information resources based on personalized recommendations from identifiable acquaintances. The proposed method is based on a collaborative filtering system that focuses on evaluations from identifiable acquaintances. It utilizes both user evaluations for documents and their contents. In other words, each user profile is represented as a matrix of credibility to the other users' evaluations on each domain of interests. We extended the content-based collaborative filtering method to distinguish other users to whom the documents should be recommended. We also applied a concept-based vector space model to represent the domain of interests instead of the previous method which represented them by a term-based vector space model. We introduce a personalized concept-base compiled from each user's information repository to improve the information retrieval in the user's environment. Furthermore, the concept-spaces change from user to user since they reflect the personalities of the users. Because of different concept-spaces, the similarity between a document and a user's interest varies for each user. As a result, a user receives recommendations from other users who have different view points, achieving inter-personal information sharing based on personalized recommendations. This paper also describes an experimental simulation of our information sharing model. In our laboratory, five participants accumulated a personal repository of e-mails and web pages from which they built their own concept-base. Then we estimated the user profiles according to personalized concept-bases and sets of documents which others evaluated. We simulated

  20. Securing Gateways within Clustered Power Centric Network of Nodes

    Directory of Open Access Journals (Sweden)

    Qaisar Javaid

    2016-01-01

    Full Text Available Knowledge Networks are gaining momentum within cyber world. Knowledge leads to innovation and for this reason organizations focus on research and information gathering in order to gain and improve existing knowledge. This of information era, which is primarily based on world wide web technologies, enables significantly expanded networks of people to communicate and collaborate 'virtually' across teams, across entire organizations and across the world, anytime and anywhere. Innovations in computing and telecommunications have transformed the corporations from structured and manageable types to interwoven network of blurred boundaries such as; ad hoc networks and mobile wireless networks, etc. This study explores knowledge networks in Information Technology and security leaks that are found, as well as measures that are taken to counter this menace which is coming up with optimal Secure Clustered Power Centric node network. The paper concludes these measures, evaluating and integrating them to come up with a secured network design.

  1. Sharing Health Information and Influencing Behavioral Intentions: The Role of Health Literacy, Information Overload, and the Internet in the Diffusion of Healthy Heart Information.

    Science.gov (United States)

    Crook, Brittani; Stephens, Keri K; Pastorek, Angie E; Mackert, Michael; Donovan, Erin E

    2016-01-01

    Low health literacy remains an extremely common and problematic issue, given that individuals with lower health literacy are more likely to experience health challenges and negative health outcomes. In this study, we use the first three stages of the innovation-decision process found in the theory of diffusion of innovations (Rogers, 2003). We incorporate health literacy into a model explaining how perceived health knowledge, information sharing, attitudes, and behavior are related. Results show that health information sharing explains 33% of the variance in behavioral intentions, indicating that the communicative practice of sharing information can positively impact health outcomes. Further, individuals with high health literacy tend to share less information about heart health than those with lower health literacy. Findings also reveal that perceived heart-health knowledge operates differently than health literacy to predict health outcomes.

  2. Ownership as an Issue in Data and Information Sharing: a philosophically based review

    Directory of Open Access Journals (Sweden)

    Dennis Hart

    2002-11-01

    Full Text Available It has long been an aim of information management and information systems development to enable more effective and efficient data and information sharing within organisations. A commonplace assertion has been that data and information belong, or should belong, to the organisation as a whole as opposed to any individual or stakeholder within it. Nevertheless, despite the potential benefits of data and information sharing within organisations, efforts to achieve it have typically run into more difficulty than expected and have frequently been less successful than the technological capabilities would, at least prima facie, allow. This paper is based on the proposition that perceptions of ownership can have an important influence on data and information sharing behaviour, and explores philosophical theories of ownership and property with the aim of better understanding the origins of such behaviour. It is further proposed that what are here called “implicit” theories of information ownership on the part of different individuals or parties within an organisation can lead to varying perceptions as to who is the legitimate owner of particular data or information, and that this view is illuminating of the difficulties that have often been experienced in trying to achieve effective organisational data and information sharing.

  3. Being or Becoming: Toward an Open-System, Process-Centric Model of Personality.

    Science.gov (United States)

    Giordano, Peter J

    2015-12-01

    Mainstream personality psychology in the West neglects the investigation of intra-individual process and variation, because it favors a Being over a Becoming ontology. A Being ontology privileges a structural (e.g., traits or selves) conception of personality. Structure-centric models in turn suggest nomothetic research strategies and the investigation of individual and group differences. This article argues for an open-system, process-centric understanding of personality anchored in an ontology of Becoming. A classical Confucian model of personality is offered as an example of a process-centric approach for investigating and appreciating within-person personality process and variation. Both quantitative and qualitative idiographic strategies can be used as methods of scientific inquiry, particularly the exploration of the Confucian exemplar of psychological health and well-being.

  4. Petri net modeling of encrypted information flow in federated cloud

    Science.gov (United States)

    Khushk, Abdul Rauf; Li, Xiaozhong

    2017-08-01

    Solutions proposed and developed for the cost-effective cloud systems suffer from a combination of secure private clouds and less secure public clouds. Need to locate applications within different clouds poses a security risk to the information flow of the entire system. This study addresses this by assigning security levels of a given lattice to the entities of a federated cloud system. A dynamic flow sensitive security model featuring Bell-LaPadula procedures is explored that tracks and authenticates the secure information flow in federated clouds. Additionally, a Petri net model is considered as a case study to represent the proposed system and further validate the performance of the said system.

  5. Public Trust in Health Information Sharing: A Measure of System Trust.

    Science.gov (United States)

    Platt, Jodyn E; Jacobson, Peter D; Kardia, Sharon L R

    2018-04-01

    To measure public trust in a health information sharing in a broadly defined health system (system trust), inclusive of health care, public health, and research; to identify individual characteristics that predict system trust; and to consider these findings in the context of national health initiatives (e.g., learning health systems and precision medicine) that will expand the scope of data sharing. Survey data (n = 1,011) were collected in February 2014. We constructed a composite index of four dimensions of system trust-competency, fidelity, integrity, and trustworthiness. The index was used in linear regression evaluating demographic and psychosocial predictors of system trust. Data were collected by GfK Custom using a nationally representative sample and analyzed in Stata 13.0. Our findings suggest the public's trust may not meet the needs of health systems as they enter an era of expanded data sharing. We found that a majority of the U.S. public does not trust the organizations that have health information and share it (i.e., the health system) in one or more dimensions. Together, demographic and psychosocial factors accounted for ~18 percent of the observed variability in system trust. Future research should consider additional predictors of system trust such as knowledge, attitudes, and beliefs to inform policies and practices for health data sharing. © Health Research and Educational Trust.

  6. Sustaining Innovative Success: A Case Study on Consumer-Centric Innovation in the ICT Industry

    Directory of Open Access Journals (Sweden)

    Minkyung Choy

    2016-09-01

    Full Text Available The phenomenon of innovation growing rapidly and having a shorter lifespan is a structural change due to the development of ICT (Information and Communications Technology, diverse investment methods, and reduced pattern of innovation adoption. For ICT companies to survive and maintain their success in this ever-changing environment, they need to succeed in fulfilling both productivity and accuracy of innovation. To sustain their innovative success, ICT companies should consistently maintain the direction of innovation towards consumers. The present study analyzes various cases of ICT companies which succeeded or failed to maintain their prior innovative success, and suggests consumer-centric innovation as a solution. To create consumer-centric innovations, companies have to (1 predict the dynamically evolving demand of consumers and continuously transform; (2 proactively employ observation method and big data analysis to discover hidden demands; and (3 identify hassles such as wastes, inconveniences, and anxieties, and put effort in solving these hassles.

  7. Sustainable Regulation of Information Sharing with Electronic Data Interchange by a Trust-Embedded Contract

    Directory of Open Access Journals (Sweden)

    Guanghua Han

    2017-06-01

    Full Text Available This paper studies the risks in demand information sharing applications by electronic soft-orders using electronic data interchange (EDI systems in e-commerce and aims to suggest a sustainable regulation mechanism with a trust-embedded contract. In a supply chain with one retailer and one supplier, the retailer solicits private forecasted demand and places soft-orders via EDI to the supplier. To ensure abundant supply, the retailer has an incentive to inflate her soft-orders, which potentially harms the credible information sharing and sustainability of business cooperation. Normally, the degree to which the supplier relies on the retailer’s order information is specified by trust, which is evaluated according to the retailer’s reputation and supplier’s intuition in this study. Based on standard game theory, we find that both the retailer’s order and the quantity of supplier prepared materials are independent of the retailer’s forecast. Therefore, EDI based information sharing in e-commerce without a regulation mechanism leads to inefficient demand information sharing. Since both the supplier and retailer are proved to faces huge of potential profit losses due to the failure of information sharing, the commerce by EDI based information sharing is full of risk and unsustainable. Therefore, a regulation mechanism that leaded by the retailer is proposed to establish ‘win-win’ sustainable cooperation. Numerical experiments highlight the value of trust, the impact of reputation and intuition in decisions, and the effectiveness of the regulation mechanism by a cost-sharing contract.

  8. Privacy protection for personal health information and shared care records.

    Science.gov (United States)

    Neame, Roderick L B

    2014-01-01

    The protection of personal information privacy has become one of the most pressing security concerns for record keepers: this will become more onerous with the introduction of the European General Data Protection Regulation (GDPR) in mid-2014. Many institutions, both large and small, have yet to implement the essential infrastructure for data privacy protection and patient consent and control when accessing and sharing data; even more have failed to instil a privacy and security awareness mindset and culture amongst their staff. Increased regulation, together with better compliance monitoring, has led to the imposition of increasingly significant monetary penalties for failure to protect privacy: these too are set to become more onerous under the GDPR, increasing to a maximum of 2% of annual turnover. There is growing pressure in clinical environments to deliver shared patient care and to support this with integrated information. This demands that more information passes between institutions and care providers without breaching patient privacy or autonomy. This can be achieved with relatively minor enhancements of existing infrastructures and does not require extensive investment in inter-operating electronic records: indeed such investments to date have been shown not to materially improve data sharing. REQUIREMENTS FOR PRIVACY: There is an ethical duty as well as a legal obligation on the part of care providers (and record keepers) to keep patient information confidential and to share it only with the authorisation of the patient. To achieve this information storage and retrieval, communication systems must be appropriately configured. There are many components of this, which are discussed in this paper. Patients may consult clinicians anywhere and at any time: therefore, their data must be available for recipient-driven retrieval (i.e. like the World Wide Web) under patient control and kept private: a method for delivering this is outlined.

  9. Towards a service centric contextualized vehicular cloud

    NARCIS (Netherlands)

    Hu, Xiping; Wang, Lei; Sheng, Zhengguo; TalebiFard, Peyman; Zhou, Li; Liu, Jia; Leung, Victor C.M.

    2014-01-01

    This paper proposes a service-centric contextualized vehicular (SCCV) cloud platform to facilitate the deployment and delivery of cloud-based mobile applications over vehicular networks. SCCV cloud employs a multi-tier architecture that consists of the network, mobile device, and cloud tiers. Based

  10. 17 CFR 160.12 - Limits on sharing account number information for marketing purposes.

    Science.gov (United States)

    2010-04-01

    ....12 Limits on sharing account number information for marketing purposes. (a) General prohibition on... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Limits on sharing account number information for marketing purposes. 160.12 Section 160.12 Commodity and Securities Exchanges...

  11. 76 FR 79114 - Privacy Act of 1974: Implementation of Exemptions; DOT/ALL 23-Information Sharing Environment...

    Science.gov (United States)

    2011-12-21

    ...] Privacy Act of 1974: Implementation of Exemptions; DOT/ALL 23-- Information Sharing Environment (ISE... titled, ``DOT/ALL 23--Information Sharing Environment (ISE) Suspicious Activity Reporting (SAR... exempts portions of the ``DOT/ALL 23--Information Sharing Environment (ISE) Suspicious Activity Reporting...

  12. A comparative evaluation of static and functional methods for recording centric relation and condylar guidance: a clinical study.

    Science.gov (United States)

    Thakur, Mridul; Jain, Veena; Parkash, Hari; Kumar, Pravesh

    2012-09-01

    To evaluate and compare the centric relation and horizontal condylar guidance using interocclusal wax and extra oral Gothic arch methods and subjective evaluation of dentures thus fabricated. Centric relation and horizontal condylar guidance was recorded by using interocclusal wax and gothic arch tracing in 28 completely edentulous patients. These records were transferred to the articulator and difference in both values was recorded. After that patients were divided in two groups according to the centric relation and horizontal condylar guidance recording method used to achieve balanced occlusion. Response of the dentures was subjectively evaluated using "Woelfel subjective evaluation criteria". Centric relation recorded by both the methods did coincide in 7.14 % of patients. Centric relation recorded by interocclusal wax was posterior to Gothic centric relation in 21.43 % of patients, and anterior to Gothic centric relation in 71.42 % patients. Gothic arch tracings gave higher mean guidance values on both the sides as compared to protrusive wax record in all the subjects, although the difference was statistically insignificant (P > 0.05). Subjective evaluation showed statistical insignificance for all the parameters in both groups. Gothic arch method records the centric relation at a more posterior position than the Static method, but it does not make any difference in clinical performance of the complete denture. Horizontal condylar guidance angle was approximately similar by both the methods.

  13. 78 FR 64145 - 30-Day Notice of Proposed Information Collection: Housing Finance Agency Risk-Sharing Program

    Science.gov (United States)

    2013-10-25

    ... Information Collection: Housing Finance Agency Risk-Sharing Program AGENCY: Office of the Chief Information... Title of Information Collection: Housing Finance Agency Risk- Sharing Program. OMB Approval Number: 2502... sharing with State and local housing finance agencies (HFAs). Under this program, HUD provides full...

  14. Information Sharing in the Field of Design Research

    Science.gov (United States)

    Pilerot, Ola

    2015-01-01

    Introduction: This paper reports on an extensive research project which aimed at exploring information sharing activities in a scholarly context. The paper presents and synthesises findings from a literature review and three qualitative case studies. The empirical setting is a geographically distributed Nordic network of design scholars. Method:…

  15. Geographic Information Systems-Transportation ISTEA management systems server-net prototype pooled fund study: Phase B summary

    Energy Technology Data Exchange (ETDEWEB)

    Espinoza, J. Jr.; Dean, C.D.; Armstrong, H.M. [and others

    1997-06-01

    The Geographic Information System-Transportation (GIS-T) ISTEA Management Systems Server Net Prototype Pooled Fund Study represents the first national cooperative effort in the transportation industry to address the management and monitoring systems as well as the statewide and metropolitan transportation planning requirements of the Intermodal Surface Transportation Efficiency Act of 1991 (ISTEA). The Study was initiated in November 1993 through the Alliance for Transportation Research and under the leadership of the New Mexico State Highway and Transportation Department. Sandia National Laboratories, an Alliance partner, and Geographic Paradigm Computing. Inc. provided technical leadership for the project. In 1992, the Alliance for Transportation Research, the New Mexico State Highway and Transportation Department, Sandia National Laboratories, and Geographic Paradigm Computing, Inc., proposed a comprehensive research agenda for GIS-T. That program outlined a national effort to synthesize new transportation policy initiatives (e.g., management systems and Intelligent Transportation Systems) with the GIS-T server net ideas contained in the NCHRP project {open_quotes}Adaptation of GIS to Transportation{close_quotes}. After much consultation with state, federal, and private interests, a project proposal based on this agenda was prepared and resulted in this Study. The general objective of the Study was to develop GIS-T server net prototypes supporting the ISTEA requirements for transportation planning and management and monitoring systems. This objective can be further qualified to: (1) Create integrated information system architectures and design requirements encompassing transportation planning activities and data. (2) Encourage the development of functional GIS-T server net prototypes. (3) Demonstrate multiple information systems implemented in a server net environment.

  16. Sharing Law Enforcement and Intelligence Information: The Congressional Role

    National Research Council Canada - National Science Library

    Best Jr., Richard A

    2007-01-01

    Almost all assessments of the attacks of September 11, 2001, have concluded that U.S. intelligence and law enforcement agencies had failed to share information that might have provided advance warning of the plot...

  17. Use of Internet audience measurement data to gauge market share for online health information services.

    Science.gov (United States)

    Wood, Fred B; Benson, Dennis; LaCroix, Eve-Marie; Siegel, Elliot R; Fariss, Susan

    2005-07-01

    The transition to a largely Internet and Web-based environment for dissemination of health information has changed the health information landscape and the framework for evaluation of such activities. A multidimensional evaluative approach is needed. This paper discusses one important dimension of Web evaluation-usage data. In particular, we discuss the collection and analysis of external data on website usage in order to develop a better understanding of the health information (and related US government information) market space, and to estimate the market share or relative levels of usage for National Library of Medicine (NLM) and National Institutes of Health (NIH) websites compared to other health information providers. The primary method presented is Internet audience measurement based on Web usage by external panels of users and assembled by private vendors-in this case, comScore. A secondary method discussed is Web usage based on Web log software data. The principle metrics for both methods are unique visitors and total pages downloaded per month. NLM websites (primarily MedlinePlus and PubMed) account for 55% to 80% of total NIH website usage depending on the metric used. In turn, NIH.gov top-level domain usage (inclusive of NLM) ranks second only behind WebMD in the US domestic home health information market and ranks first on a global basis. NIH.gov consistently ranks among the top three or four US government top-level domains based on global Web usage. On a site-specific basis, the top health information websites in terms of global usage appear to be WebMD, MSN Health, PubMed, Yahoo! Health, AOL Health, and MedlinePlus. Based on MedlinePlus Web log data and external Internet audience measurement data, the three most heavily used cancer-centric websites appear to be www.cancer.gov (National Cancer Institute), www.cancer.org (American Cancer Society), and www.breastcancer.org (non-profit organization). Internet audience measurement has proven useful to NLM

  18. Knowledge-Sharing Intention among Information Professionals in Nigeria: A Statistical Analysis

    Science.gov (United States)

    Tella, Adeyinka

    2016-01-01

    In this study, the researcher administered a survey and developed and tested a statistical model to examine the factors that determine the intention of information professionals in Nigeria to share knowledge with their colleagues. The result revealed correlations between the overall score for intending to share knowledge and other…

  19. From school centric to ‘material centric’ education

    DEFF Research Database (Denmark)

    Christensen, Suna Møller

    2015-01-01

    as craftsman. A pilot-project in spring 2014 revealed that designing talent education pushed teachers (who all have a personal background in vocational jobs) to challenge a theory based and in this sense school centric curriculum objectifying materials as pre-existing elements or resources in an assignment...... ([1934]2005) in ‘Art as Experience’ draws between art as an object and art as experience, this presentation examines the way in which education for particularly skilled students at vocational education schools in Denmark re-focus teachers attention to materials and student-material relations. Technically......, and re-consider relations with materials as dimensions facilitating the professional development of vocational ‘talent’. The broader topic of school centric versus ‘material centric’ education ties this research into vocational skills and craftsmanship with inquiries into framing and structuring...

  20. Information-sharing tendency on Twitter and time evolution of tweeting

    Science.gov (United States)

    Kwon, H. W.; Kim, H. S.; Lee, K.; Choi, M. Y.

    2013-03-01

    While topics on Twitter may be categorized according to their predictability and sustainability, some topics have characteristics depending on the time scale. Here we propose a good measure for the transition of sustainability, which we call the information-sharing tendency, and find that the unpredictability on Twitter is provoked by the exposure of Twitter users to external environments, e.g., mass media and other social network services. In addition, it is demonstrated that the numbers of articles and comments on on-line newspapers serve as plausible measures of exposure. From such measures of exposure, the time evolution of tweeting can be described, when the information-sharing tendency is known.

  1. Thermodynamical quantum information sharing

    International Nuclear Information System (INIS)

    Wiesniak, M.; Vedral, V.; Brukner, C.

    2005-01-01

    Full text: Thermodynamical properties fully originate from classical physics and can be easily measured for macroscopic systems. On the other hand, entanglement is a widely spoken feature of quantum physics, which allows to perform certain task with efficiency unavailable with any classical resource. Therefore an interesting question is whether we can witness entanglement in a state of a macroscopic sample. We show, that some macroscopic properties, in particular magnetic susceptibility, can serve as an entanglement witnesses. We also study a mutual relation between magnetic susceptibility and magnetisation. Such a complementarity exhibits quantum information sharing between these two thermodynamical quantities. Magnetization expresses properties of individual spins, while susceptibility might reveal non-classical correlations as a witness. Therefore, a rapid change of one of these two quantities may mean a phase transition also in terms of entanglement. The complementarity relation is demonstrated by an analytical solution of an exemplary model. (author)

  2. Initial CAD investigations for NET

    International Nuclear Information System (INIS)

    Katz, F.; Leinemann, K.; Ludwig, A.; Marek, U.; Olbrich, W.; Schlechtendahl, E.G.

    1985-11-01

    This report summarizes the work done under contract no. 164/84-7/FU-D-/NET between the Commission of the European Communities and KfK during the period from June 1, 1984, through May 31, 1985. The following topics are covered in this report: Initial modelling of NET version NET2A, CAD system extension for remote handling studies, analysis of the CAD information structure, work related to the transfer of CAD information between KfK and the NET team. (orig.) [de

  3. 12 CFR 716.12 - Limits on sharing of account number information for marketing purposes.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Limits on sharing of account number information... REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Limits on Disclosures § 716.12 Limits on sharing of account number information for marketing purposes. (a) General prohibition on...

  4. Pro-Nets versus No-Nets: Differences in Urban Older Adults' Predilections for Internet Use

    Science.gov (United States)

    Cresci, M. Kay; Yarandi, Hossein N.; Morrell, Roger W.

    2010-01-01

    Enthusiasm for information technology (IT) is growing among older adults. Many older adults enjoy IT and the Internet (Pro-Nets), but others have no desire to use it (No-Nets). This study found that Pro-Nets and No-Nets were different on a number of variables that might predict IT use. No-Nets were older, had less education and income, were…

  5. 30 CFR 280.73 - Will MMS share data and information with coastal States?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Will MMS share data and information with coastal States? 280.73 Section 280.73 Mineral Resources MINERALS MANAGEMENT SERVICE, DEPARTMENT OF THE... Data Requirements Protections § 280.73 Will MMS share data and information with coastal States? (a) We...

  6. Towards Blockchain-based Auditable Storage and Sharing of IoT Data

    OpenAIRE

    Shafagh , Hossein; Hithnawi , Anwar; Duquennoy , Simon

    2017-01-01

    International audience; Today the cloud plays a central role in storing, processing , and distributing data. Despite contributing to the rapid development of various applications, including the IoT, the current centralized storage architecture has led into a myriad of isolated data silos and is preventing the full potential of holistic data-driven analytics for IoT data. In this abstract, we advocate a data-centric design for IoT with focus on resilience, sharing, and auditable protection of ...

  7. EarthCollab, building geoscience-centric implementations of the VIVO semantic software suite

    Science.gov (United States)

    Rowan, L. R.; Gross, M. B.; Mayernik, M. S.; Daniels, M. D.; Krafft, D. B.; Kahn, H. J.; Allison, J.; Snyder, C. B.; Johns, E. M.; Stott, D.

    2017-12-01

    EarthCollab, an EarthCube Building Block project, is extending an existing open-source semantic web application, VIVO, to enable the exchange of information about scientific researchers and resources across institutions. EarthCollab is a collaboration between UNAVCO, a geodetic facility and consortium that supports diverse research projects informed by geodesy, The Bering Sea Project, an interdisciplinary field program whose data archive is hosted by NCAR's Earth Observing Laboratory, and Cornell University. VIVO has been implemented by more than 100 universities and research institutions to highlight research and institutional achievements. This presentation will discuss benefits and drawbacks of working with and extending open source software. Some extensions include plotting georeferenced objects on a map, a mobile-friendly theme, integration of faceting via Elasticsearch, extending the VIVO ontology to capture geoscience-centric objects and relationships, and the ability to cross-link between VIVO instances. Most implementations of VIVO gather information about a single organization. The EarthCollab project created VIVO extensions to enable cross-linking of VIVO instances to reduce the amount of duplicate information about the same people and scientific resources and to enable dynamic linking of related information across VIVO installations. As the list of customizations grows, so does the effort required to maintain compatibility between the EarthCollab forks and the main VIVO code. For example, dozens of libraries and dependencies were updated prior to the VIVO v1.10 release, which introduced conflicts in the EarthCollab cross-linking code. The cross-linking code has been developed to enable sharing of data across different versions of VIVO, however, using a JSON output schema standardized across versions. We will outline lessons learned in working with VIVO and its open source dependencies, which include Jena, Solr, Freemarker, and jQuery and discuss future

  8. Knowledge sharing and innovation in relationships interorganizational type of information technology outsourcing

    OpenAIRE

    Roberta Rodrigues Faoro; Mírian Oliveira; Marcelo Faoro de Abreu

    2017-01-01

    Introduction: this paper presents an analysis of the sharing of knowledge and innovation in the inter-relationships of the type outsourcing of Information Technology. Objective: analyze the existence of relationship between knowledge sharing and innovation in the inter-relationships of the type of outsourcing information technology (IT). Methodology: research is exploratory, qualitative and using as a strategy the multiple case study, which analyzed 12 companies in IT outsourci...

  9. Making Sense of Information Sharing in E-Government Inter-Organizational Collaborations: A Malaysian Perspective

    Science.gov (United States)

    Harold, Dolly Amy

    2011-01-01

    Information sharing is a fundamental goal of information systems (IS). Yet information sharing, although critical and much acclaimed, is complex in terms of its concepts and implementation. How to leverage this phenomenon while implementing an IS is discussed at length in the literature. Both academics and practitioners in IS are striving to…

  10. Future consumer mobile phone security: A case study using the data-centric security model

    NARCIS (Netherlands)

    van Cleeff, A.

    Consumer mobile phone security requires more attention, now that their data storage capacity is increasing. At the same time, much effort is spent on data-centric security for large enterprises. In this article we try to apply data-centric security to consumer mobile phones. We show a maturity model

  11. Research on Cost Information Sharing and Channel Choice in a Dual-Channel Supply Chain

    Directory of Open Access Journals (Sweden)

    Huihui Liu

    2016-01-01

    Full Text Available Many studies examine information sharing in an uncertain demand environment in a supply chain. However there is little literature on cost information sharing in a dual-channel structure consisting of a retail channel and a direct sales channel. Assuming that the retail sale cost and direct sale cost are random variables with a general distribution, the paper investigates the retailer’s choice on cost information sharing in a Bertrand competition model. Based on the equilibrium outcome of information sharing, the manufacturer’s channel choice is discussed in detail. Our paper provides several interesting conclusions. In both single- and dual-channel structures, the retailer has little motivation to share its private cost information which is verified to be valuable for the manufacturer. When the cost correlation between the two channels increases, our analyses show that the manufacturer’s profit improves. However, when channel choice is involved, the value of information could play a different role. The paper finds that a dual-channel structure can benefit the manufacturer only when the cost correlation is sufficiently low. In addition, if the cost correlation is weak, the cost fluctuation will bring out the advantage of a dual-channel structure and adding a new direct channel will help in risk pooling.

  12. Information sharing with rural family caregivers during care transitions of hip fracture patients

    Directory of Open Access Journals (Sweden)

    Jacobi Elliott

    2014-06-01

    Full Text Available Introduction: Following hip fracture surgery, patients often experience multiple transitions through different care settings, with resultant challenges to the quality and continuity of patient care. Family caregivers can play a key role in these transitions, but are often poorly engaged in the process. We aimed to: (1 examine the characteristics of the family caregivers’ experience of communication and information sharing and (2 identify facilitators and barriers of effective information sharing among patients, family caregivers and health care providers.Methods: Using an ethnographic approach, we followed 11 post-surgical hip fracture patients through subsequent care transitions in rural Ontario; in-depth interviews were conducted with patients, family caregivers (n = 8 and health care providers (n = 24.Results: Priority areas for improved information sharing relate to trust and respect, involvement, and information needs and expectations; facilitators and barriers included prior health care experience, trusting relationships and the rural setting.Conclusion: As with knowledge translation, effective strategies to improve information sharing and care continuity for older patients with chronic illness may be those that involve active facilitation of an on-going partnership that respects the knowledge of all those involved.

  13. Information sharing with rural family caregivers during care transitions of hip fracture patients

    Directory of Open Access Journals (Sweden)

    Jacobi Elliott

    2014-06-01

    Full Text Available Introduction: Following hip fracture surgery, patients often experience multiple transitions through different care settings, with resultant challenges to the quality and continuity of patient care. Family caregivers can play a key role in these transitions, but are often poorly engaged in the process. We aimed to: (1 examine the characteristics of the family caregivers’ experience of communication and information sharing and (2 identify facilitators and barriers of effective information sharing among patients, family caregivers and health care providers. Methods: Using an ethnographic approach, we followed 11 post-surgical hip fracture patients through subsequent care transitions in rural Ontario; in-depth interviews were conducted with patients, family caregivers (n = 8 and health care providers (n = 24. Results: Priority areas for improved information sharing relate to trust and respect, involvement, and information needs and expectations; facilitators and barriers included prior health care experience, trusting relationships and the rural setting. Conclusion: As with knowledge translation, effective strategies to improve information sharing and care continuity for older patients with chronic illness may be those that involve active facilitation of an on-going partnership that respects the knowledge of all those involved.

  14. performance evaluation of a pilot paraplegic centricity mobility aid

    African Journals Online (AJOL)

    eobe

    PERFORMANCE EVALUATION OF A PILOT PARAPLEGIC CENTRICITY. MOBILITY AID. MOBILITY ... The result of the test showed a remarkable improvement in. Wilcoxin's signed rank test. .... RESEARCH METHOD. RESEARCH METHOD.

  15. 76 FR 4750 - Survey of Information Sharing Practices With Affiliates

    Science.gov (United States)

    2011-01-26

    ... information by means of a Survey to be completed by financial institutions and other persons that are creditors or users of consumer reports. The OTS will use the Survey responses to prepare a report to Congress on the information sharing practices by financial institutions, creditors, or users of consumer...

  16. 75 FR 75725 - Survey of Information Sharing Practices With Affiliates

    Science.gov (United States)

    2010-12-06

    ... to minimize the burden of the information collection on respondents, including through the use of... by financial institutions and other persons that are creditors or users of consumer reports. The OTS will use the Survey responses to prepare a report to Congress on the information sharing practices by...

  17. Connecting Social Science and Information Technology through an Interface-Centric Framework of Analysis

    Directory of Open Access Journals (Sweden)

    Mikael Sundström

    2008-06-01

    Full Text Available The gathering pace of IT innovation has, or ought to have had notable methodological repercussions for the social-science community (and beyond. Where yesterday the researcher could unhurriedly unlock the social-scientific significance of a chosen medium, secure in the knowledge that his or her work would have bearing for many years, by now there is every reason to confront a fear that the prodded IT implementation may in fact be gone or at least heavily altered by the time such comprehensive research is concluded. This paper will propose a complementing systematic "interface-centric" research model capable of interconnecting a non-finite variety of IT implementations and social science studies in a coherent way. The paper also outlines how users "downstream", whether political actors or technology operators can use the proposed framework to more easily approach and weight academic input when evaluating complex IT effects.

  18. Sharing for Health: A Study of Chinese Adolescents' Experiences and Perspectives on Using Social Network Sites to Share Health Information.

    Science.gov (United States)

    Zhang, Ni; Teti, Michele; Stanfield, Kellie; Campo, Shelly

    2017-07-01

    This exploratory qualitative study examines Chinese adolescents' health information sharing habits on social network sites. Ten focus group meetings with 76 adolescents, ages 12 to 17 years, were conducted at community-based organizations in Chicago's Chinatown. The research team transcribed the recording and analyzed the transcripts using ATLAS.ti. Chinese adolescents are using different social network sites for various topics of health information including food, physical activity, and so on. Adolescents would share useful and/or interesting health information. Many adolescents raised credibility concerns regarding health information and suggested evaluating the information based on self-experience or intuition, word-of-mouth, or information online. The findings shed lights on future intervention using social network sites to promote health among Chinese adolescents in the United States. Future interventions should provide adolescents with interesting and culturally sensitive health information and educate them to critically evaluate health information on social network sites.

  19. An OAI repository centric peer-review model

    CERN Multimedia

    CERN. Geneva

    2005-01-01

    Pre-print repositories have seen a significant increase in use over the past fifteen years across multiple research domains. Researchers are beginning to develop applications capable of using these repositories to assist the scientific community above and beyond the pure dissemination of information. The contributions set forth by this paper emphasize a deconstructed publication model where in which the peer-review certification phase of a pre-print is mediated by an OAI-compliant peer-review service. This peer-review service uses a social-network algorithm for determining potential reviewers for a submitted manuscript and for weighting the influence of each participating reviewer’s evaluations. The paper also provides a set of peer-review specific metadata tags that can accompany a pre-prints existing metadata record. The combinations of these contributions provide a unique repository-centric peer-review model within the framework of the current OAI standards existing today.

  20. The Concept of Information Sharing Behaviors in Complex Organizations: Research in Latvian Enterprises

    Directory of Open Access Journals (Sweden)

    Andrejs Cekuls

    2016-12-01

    Full Text Available The purpose of this paper is to explore the factors influencing behaviors of information sharing in complex organizations. Evaluation of the previous studies on provision of information turnover process and the role of organizational culture in competitive intelligence of business environment in Latvia indicated the trends that employees of Latvian enterprises lack incentive to share information. Tasks of the study were to research the basis of the review of scientific sources and study aspects influencing habits of information sharing in complex organizations. For this particular study, the focus group is selected as the most appropriate data collection method for high-quality research. To find out individuals' opinions and attitudes two focus group discussions were carried out. Members from various industries and with different employment period were included in discussion groups. In aggregate, opinions of the employees from 41 different companies were summarized regarding the aspects affecting the process of information sharing in organizations. Results of researches show that that influence the sharing of information are closely related to the values: interpersonal trust, organizational trust, and organizational identification, support, fairness etc. Results of discussions showed that it is important for a manager to be aware of the factors affecting the performance of the organization. To identify the need for changes, a manager should follow events in the environment and analyze the extent, to which they affect the performance of the organization. Complexity science suggests that maturity to changes emerges when the system is far from balance, but the tension makes to accept changes.

  1. A Preliminary Investigation into the Information Sharing Behavior of Social Media Users after a Natural Disaster

    Science.gov (United States)

    Maruyama, Yukiko

    2016-01-01

    The paper provides the results of a preliminary investigation into the information sharing behavior of social media users after a natural disaster. The results indicate that users shared information that they thought victims would find useful. On the other hand, they reported that they usually do not or never share information considered useful to…

  2. Optimal SSN Tasking to Enhance Real-time Space Situational Awareness

    Science.gov (United States)

    Ferreira, J., III; Hussein, I.; Gerber, J.; Sivilli, R.

    2016-09-01

    Space Situational Awareness (SSA) is currently constrained by an overwhelming number of resident space objects (RSOs) that need to be tracked and the amount of data these observations produce. The Joint Centralized Autonomous Tasking System (JCATS) is an autonomous, net-centric tool that approaches these SSA concerns from an agile, information-based stance. Finite set statistics and stochastic optimization are used to maintain an RSO catalog and develop sensor tasking schedules based on operator configured, state information-gain metrics to determine observation priorities. This improves the efficiency of sensors to target objects as awareness changes and new information is needed, not at predefined frequencies solely. A net-centric, service-oriented architecture (SOA) allows for JCATS integration into existing SSA systems. Testing has shown operationally-relevant performance improvements and scalability across multiple types of scenarios and against current sensor tasking tools.

  3. Game-centric pedagogy and curriculums in higher education

    DEFF Research Database (Denmark)

    Nørgård, Rikke Toft; Murray, John; Morgan, James

    2017-01-01

    This paper examines some recent trends in game-centric education for STEAM (science, technology,engineering, art and mathematics) fields, especially those that explore and promote collaborationamong multiple disciplines. We discuss various multimodal design research activities that draw uponthe a...

  4. Federal R and D Reductions, Market Share, and Aerospace Information Usage

    Science.gov (United States)

    Rocker, JoAnne; Roncaglia, George

    2000-01-01

    Reductions in federally funded research have a rippling effect over the entire aerospace industry. The decline in federal R&D spending in aerospace in recent years coincides with declines in U.S. aerospace market share, One of the lesser-understood factors in the declining U.S. market share may be the differing ways and intensity with which the U.S. and its competitors approach another trend, the increasing availability of large amounts of aerospace research information on the World Wide Web. The U.S. has been a pioneer in making research information available in electronic form, and the international community has long been a heavy consumer of that information. In essence, the U.S. contributes to the research efforts of its competitors, thus contributing to foreign aerospace consortiums efforts to gain market share in the aerospace industry, This may be a cautionary note to the U.S. aerospace industry to consider the use of R&D output in its own development and strategy because the foreign competition is using the U.S. scientific and technical literature.

  5. Climate change on Twitter: Content, media ecology and information sharing behaviour.

    Science.gov (United States)

    Veltri, Giuseppe A; Atanasova, Dimitrinka

    2017-08-01

    This article presents a study of the content, use of sources and information sharing about climate change analysing over 60,000 tweets collected using a random week sample. We discuss the potential for studying Twitter as a communicative space that is rich in different types of information and presents both new challenges and opportunities. Our analysis combines automatic thematic analysis, semantic network analysis and text classification according to psychological process categories. We also consider the media ecology of tweets and the external web links that users shared. In terms of content, the network of topics uncovered presents a multidimensional discourse that accounts for complex causal links between climate change and its consequences. The media ecology analysis revealed a narrow set of sources with a major role played by traditional media and that emotionally arousing text was more likely to be shared.

  6. Share and share alike? Social information and interaction style in coordination of shared use

    NARCIS (Netherlands)

    Niemantsverdriet, Karin; van de Werff, T.C.F.; van Essen, H.A.; Eggen, J.H.

    2018-01-01

    Interfaces are commonly designed from the perspective of individual users, even though most of the systems we use in everyday life are in fact shared. We argue that more attention is needed for system sharing, especially because interfaces are known to influence coordination of shared use. In this

  7. Achieving informed decision-making for net zero energy buildings design using building performance simulation tools

    NARCIS (Netherlands)

    Attia, S.G.; Gratia, E.; De Herde, A.; Hensen, J.L.M.

    2013-01-01

    Building performance simulation (BPS) is the basis for informed decision-making of Net Zero Energy Buildings (NZEBs) design. This paper aims to investigate the use of building performance simulation tools as a method of informing the design decision of NZEBs. The aim of this study is to evaluate the

  8. The Mission Partner Environment: Challenges To Multinational Information Sharing

    Science.gov (United States)

    2016-02-15

    four regional commands (Africa Command, Central Command, European Command, and Pacific Command). On behalf of their powerful 4-star combatant...nations, and the U.S. DoD’s Assistant Secretary of Defense ( ASD ) for Networks and Information Integration (NII).12 While this arrangement attempted to...leadership to seek a more coherent and enduring approach to information sharing. As ISAF expanded operations throughout the country, it added more

  9. Discourse-Centric Learning Analytics: Mapping the Terrain

    Science.gov (United States)

    Knight, Simon; Littleton, Karen

    2015-01-01

    There is an increasing interest in developing learning analytic techniques for the analysis, and support of, high-quality learning discourse. This paper maps the terrain of discourse-centric learning analytics (DCLA), outlining the distinctive contribution of DCLA and outlining a definition for the field moving forwards. It is our claim that DCLA…

  10. PANDA: pathway and annotation explorer for visualizing and interpreting gene-centric data.

    Science.gov (United States)

    Hart, Steven N; Moore, Raymond M; Zimmermann, Michael T; Oliver, Gavin R; Egan, Jan B; Bryce, Alan H; Kocher, Jean-Pierre A

    2015-01-01

    Objective. Bringing together genomics, transcriptomics, proteomics, and other -omics technologies is an important step towards developing highly personalized medicine. However, instrumentation has advances far beyond expectations and now we are able to generate data faster than it can be interpreted. Materials and Methods. We have developed PANDA (Pathway AND Annotation) Explorer, a visualization tool that integrates gene-level annotation in the context of biological pathways to help interpret complex data from disparate sources. PANDA is a web-based application that displays data in the context of well-studied pathways like KEGG, BioCarta, and PharmGKB. PANDA represents data/annotations as icons in the graph while maintaining the other data elements (i.e., other columns for the table of annotations). Custom pathways from underrepresented diseases can be imported when existing data sources are inadequate. PANDA also allows sharing annotations among collaborators. Results. In our first use case, we show how easy it is to view supplemental data from a manuscript in the context of a user's own data. Another use-case is provided describing how PANDA was leveraged to design a treatment strategy from the somatic variants found in the tumor of a patient with metastatic sarcomatoid renal cell carcinoma. Conclusion. PANDA facilitates the interpretation of gene-centric annotations by visually integrating this information with context of biological pathways. The application can be downloaded or used directly from our website: http://bioinformaticstools.mayo.edu/research/panda-viewer/.

  11. 'How Much is a Pound of C4ISR Worth?' An Assessment methodology to Evolve Network Centric Measures and Metrics for Application to FORCEnet

    National Research Council Canada - National Science Library

    Poirier, John A; Bates, Edgar; Tempestilli, Mark

    2003-01-01

    ... centric outcomes including work being done in support of the Office of Force Transformation and the office of the Assistant Secretary of Defense for Networks, and Information Integration (ASD (NI2...

  12. Incentives for knowledge sharing: impact of organisational culture and information technology

    Science.gov (United States)

    Lyu, Hongbo; Zhang, Zuopeng Justin

    2017-10-01

    This research presents and examines an analytical model of knowledge management in which organisational culture dynamically improves with knowledge-sharing and learning activities within organisations. We investigate the effects of organisational incentives and the level of information technology on the motivation of knowledge sharing. We derive a linear incentive reward structure for knowledge sharing under both homogeneous and heterogeneous conditions. In addition, we show how the organisational culture and the optimum linear sharing reward change with several crucial factors, and summarise three sets of methods (strong IT support, congruent organisational culture, and effective employee assessment) to complement the best linear incentive. Our research provides valuable insights for practitioners in terms of implementing knowledge-management initiatives.

  13. Integrated secure solution for electronic healthcare records sharing

    Science.gov (United States)

    Yao, Yehong; Zhang, Chenghao; Sun, Jianyong; Jin, Jin; Zhang, Jianguo

    2007-03-01

    The EHR is a secure, real-time, point-of-care, patient-centric information resource for healthcare providers. Many countries and regional districts have set long-term goals to build EHRs, and most of EHRs are usually built based on the integration of different information systems with different information models and platforms. A number of hospitals in Shanghai are also piloting the development of an EHR solution based on IHE XDS/XDS-I profiles with a service-oriented architecture (SOA). The first phase of the project targets the Diagnostic Imaging domain and allows seamless sharing of images and reports across the multiple hospitals. To develop EHRs for regional coordinated healthcare, some factors should be considered in designing architecture, one of which is security issue. In this paper, we present some approaches and policies to improve and strengthen the security among the different hospitals' nodes, which are compliant with the security requirements defined by IHE IT Infrastructure (ITI) Technical Framework. Our security solution includes four components: Time Sync System (TSS), Digital Signature Manage System (DSMS), Data Exchange Control Component (DECC) and Single Sign-On (SSO) System. We give a design method and implementation strategy of these security components, and then evaluate the performance and overheads of the security services or features by integrating the security components into an image-based EHR system.

  14. Avoiding the Achilles heel of network-centric enterprises

    Science.gov (United States)

    McVey, Michelle; Dryer, Jay E.; Randall, Lance

    2003-08-01

    Corporate, government and military bodies focus significant resources to develop sophisticated and capable information-based systems. The concept of people and resources connected by a robust network capable of extremely high rates of information exchange is very attractive because it allows smaller groups to coordinate together and focus effects from geographically diverse locations. However, there is also a hidden danger that comes with such advanced technology. For example, in the case of the U.S. Military, clearly United States holds a technological advantage over our adversaries and that this advantage is still expanding. This technology gap has resulted in the emergence of potent asymmetrical warfare. All too often in science fiction movies, we see a small group of humans defeat a technologically superior alien race by striking at a hidden weakness that renders all of their advanced weapons as useless, as a result of pervasive connectivity and interdependence. The analogy holds for any large network-centric enterprise, corporate or governmental. This paper focuses on specific technologies and methods that preempt this Achilles Heal scenario.

  15. Incentive Mechanism Model Design for Sharing of Information Resources in Rural Areas

    OpenAIRE

    Gao, Xirong; Shan, Lingling

    2013-01-01

    In order to solve the issues concerning the cross-unit sharing of information resources in rural areas, we analyze the incentive problem of the sharing of information resources in rural areas using the incentive theory method; establish corresponding incentive mechanism model (It is divided into positive incentive model and negative incentive model, and only when the two models guarantee each other and are used at the same time can they be effective). Based on this, we put forward the institu...

  16. A qualitative analysis of information sharing for children with medical complexity within and across health care organizations.

    Science.gov (United States)

    Quigley, Laura; Lacombe-Duncan, Ashley; Adams, Sherri; Hepburn, Charlotte Moore; Cohen, Eyal

    2014-06-30

    Children with medical complexity (CMC) are characterized by substantial family-identified service needs, chronic and severe conditions, functional limitations, and high health care use. Information exchange is critically important in high quality care of complex patients at high risk for poor care coordination. Written care plans for CMC are an excellent test case for how well information sharing is currently occurring. The purpose of this study was to identify the barriers to and facilitators of information sharing for CMC across providers, care settings, and families. A qualitative study design with data analysis informed by a grounded theory approach was utilized. Two independent coders conducted secondary analysis of interviews with parents of CMC and health care professionals involved in the care of CMC, collected from two studies of healthcare service delivery for this population. Additional interviews were conducted with privacy officers of associated organizations to supplement these data. Emerging themes related to barriers and facilitators to information sharing were identified by the two coders and the research team, and a theory of facilitators and barriers to information exchange evolved. Barriers to information sharing were related to one of three major themes; 1) the lack of an integrated, accessible, secure platform on which summative health care information is stored, 2) fragmentation of the current health system, and 3) the lack of consistent policies, standards, and organizational priorities across organizations for information sharing. Facilitators of information sharing were related to improving accessibility to a common document, expanding the use of technology, and improving upon a structured communication plan. Findings informed a model of how various barriers to information sharing interact to prevent optimal information sharing both within and across organizations and how the use of technology to improve communication and access to

  17. Information Re-Sharing on Social Network Sites in the Age of Fake News

    Directory of Open Access Journals (Sweden)

    Mehrdad Koohikamali

    2017-10-01

    This study has important practical implications for SNS users and providers alike. Ensuring that information available on SNS is of high quality is critical to maintaining a healthy user base. Findings: Results indicate that attitude toward using SNSs and intention to re-share infor-mation on SNSs is influenced by perceived information quality (enjoyment, rele-vance, and reliability. Also, risk-taking propensity and enjoyment influence the intention to re-share information on SNSs in a positive direction. Future Research: In the dynamic context of SNSs, the role played by quality of information is changing. Understanding changes in quality of information by conducting longitudinal studies and experiments and including the role of habits is necessary.

  18. A framework for implementation of user-centric identity management systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2010-01-01

    Users increasingly become part of electronic transactions, which take place instantaneously without direct user involvement. This leads to the risk of data manipulation, identity theft and privacy violation, and it has become a major concern for individuals and businesses around the world. Gov......-ernments in many countries are implementing identity man-agement systems (IdMS) to curtail these incidences and to offer citizens the power to exercise informational self-determination. Using concepts from technology adoption and fit-viability theo-ries as well as the laws of identity, this paper analyzes...... the crite-ria for successful implementation and defines a framework for a citizen-centric national IdMS. Results from a survey con-ducted in Ghana are also included....

  19. Fair Shares and Sharing Fairly: A Survey of Public Views on Open Science, Informed Consent and Participatory Research in Biobanking.

    Directory of Open Access Journals (Sweden)

    Yann Joly

    Full Text Available Biobanks are important resources which enable large-scale genomic research with human samples and data, raising significant ethical concerns about how participants' information is managed and shared. Three previous studies of the Canadian public's opinion about these topics have been conducted. Building on those results, an online survey representing the first study of public perceptions about biobanking spanning all Canadian provinces was conducted. Specifically, this study examined qualitative views about biobank objectives, governance structure, control and ownership of samples and data, benefit sharing, consent practices and data sharing norms, as well as additional questions and ethical concerns expressed by the public.Over half the respondents preferred to give a one-time general consent for the future sharing of their samples among researchers. Most expressed willingness for their data to be shared with the international scientific community rather than used by one or more Canadian institutions. Whereas more respondents indicated a preference for one-time general consent than any other model of consent, they constituted less than half of the total responses, revealing a lack of consensus among survey respondents regarding this question. Respondents identified biobank objectives, governance structure and accountability as the most important information to provide participants. Respondents' concerns about biobanking generally centred around the control and ownership of biological samples and data, especially with respect to potential misuse by insurers, the government and other third parties. Although almost half the respondents suggested that these should be managed by the researchers' institutions, results indicate that the public is interested in being well-informed about these projects and suggest the importance of increased involvement from participants. In conclusion, the study discusses the viability of several proposed models for

  20. Fair Shares and Sharing Fairly: A Survey of Public Views on Open Science, Informed Consent and Participatory Research in Biobanking.

    Science.gov (United States)

    Joly, Yann; Dalpé, Gratien; So, Derek; Birko, Stanislav

    2015-01-01

    Biobanks are important resources which enable large-scale genomic research with human samples and data, raising significant ethical concerns about how participants' information is managed and shared. Three previous studies of the Canadian public's opinion about these topics have been conducted. Building on those results, an online survey representing the first study of public perceptions about biobanking spanning all Canadian provinces was conducted. Specifically, this study examined qualitative views about biobank objectives, governance structure, control and ownership of samples and data, benefit sharing, consent practices and data sharing norms, as well as additional questions and ethical concerns expressed by the public. Over half the respondents preferred to give a one-time general consent for the future sharing of their samples among researchers. Most expressed willingness for their data to be shared with the international scientific community rather than used by one or more Canadian institutions. Whereas more respondents indicated a preference for one-time general consent than any other model of consent, they constituted less than half of the total responses, revealing a lack of consensus among survey respondents regarding this question. Respondents identified biobank objectives, governance structure and accountability as the most important information to provide participants. Respondents' concerns about biobanking generally centred around the control and ownership of biological samples and data, especially with respect to potential misuse by insurers, the government and other third parties. Although almost half the respondents suggested that these should be managed by the researchers' institutions, results indicate that the public is interested in being well-informed about these projects and suggest the importance of increased involvement from participants. In conclusion, the study discusses the viability of several proposed models for informed consent

  1. Internet access and online cancer information seeking among Latino immigrants from safety net clinics.

    Science.gov (United States)

    Selsky, Claire; Luta, George; Noone, Anne-Michelle; Huerta, Elmer E; Mandelblatt, Jeanne S

    2013-01-01

    Internet use is widespread, but little is known about Internet use for cancer information among Latinos, especially those who rely on safety net clinics. The authors investigated access to and intended use of the Internet for cancer information among low income, immigrant Latinos predominately from Central and South America. A cross-sectional study of 1,273 Latinos 21 years and older attending safety net clinics or health fairs was conducted from June 2007 to November 2008. The authors used logistic regression models to evaluate associations of age, acculturation, psychosocial factors and other covariates with Internet access and intended use of the Internet for cancer information among those with access. Of the sample, 44% reported Internet access. Higher information self-efficacy and greater trust in the Internet were independently associated with Internet access (p = .05 and p Internet use for cancer information, considering covariates. In addition, those with high (vs. low) perceived risk of cancer (OR = 1.76; 95% CI [1.14, 2.73]; p = .01) and higher levels of trust in online health information (OR = 1.47 per one-point increase; 95% [CI 1.19, 1.82]; p = .0004) were more likely to intend to seek cancer information online. These findings that Internet access is fairly high in the immigrant Latino population and that the Internet is a trusted source of cancer information suggest that the Internet may be a channel for cancer control interventions.

  2. Study on the standardization of hospital information system for medical image information sharing

    International Nuclear Information System (INIS)

    Kim, Seon Chil; Kwon, Su Ja

    2001-01-01

    As the adoption of PACS and hospital information system among university hospitals and hospital level institutions grows bigger, the need of sharing and transferring medical information among medical institutions is rising. For the medical information, which is saved in the hospital medical system, to be transferred within the same hospital, domestic, or foreign medical institutions, a standard protocol is necessary. But realistically, most of the domestic hospitals do not abide by H7L which is the HIS standard and so, information transferring is not possible as of present. As such, the purpose of this research is to implement the information between HIS and PACS to an international standard by constructing HL7 messages through HL7 Interface, which will eventually make possible information transferring between different hospitals. Our research team has developed a method which will make the PACS equip hospitals that do not follow HL7 standard which will make possible to transfer information between HIS and PACS through HL7 Message. By constructing message files, which follow the form of HL7 Message in the HL7 Interface, they can be transferred to PACS through the ftp protocol. The realization of the HIS/OCS Interface through HL7 enables data transferring between domestic and foreign medical institutions possible by implementing the international standard in the PACS and HIS data transferring process. The HL7 that our research team has developed made patient data transfer between medical institutions possible. The Interface is for a specific system model and in order for the data transfer between different systems to be realized, interfaces that are fit for each system must be needed. If the Interface is improvised and implemented to each hospital's information system, the data sharing among medical institutions can be broadened

  3. On bridging relational and document-centric data stores

    NARCIS (Netherlands)

    Roijackers, J.; Fletcher, G.H.L.; Gottlob, G.; Grasso, G.; Olteanu, D.; Schallhart, C.

    2013-01-01

    Big Data scenarios often involve massive collections of nested data objects, typically referred to as "documents." The challenges of document management at web scale have stimulated a recent trend towards the development of document-centric "NoSQL" data stores. Many query tasks naturally involve

  4. Guided interaction exploration in artifact-centric process models

    NARCIS (Netherlands)

    van Eck, M.L.; Sidorova, N.; van der Aalst, W.M.P.

    2017-01-01

    Artifact-centric process models aim to describe complex processes as a collection of interacting artifacts. Recent development in process mining allow for the discovery of such models. However, the focus is often on the representation of the individual artifacts rather than their interactions. Based

  5. Information sought, information shared: exploring performance and image enhancing drug user-facilitated harm reduction information in online forums.

    Science.gov (United States)

    Tighe, Boden; Dunn, Matthew; McKay, Fiona H; Piatkowski, Timothy

    2017-07-21

    There is good evidence to suggest that performance and image enhancing drug (PIED) use is increasing in Australia and that there is an increase in those using PIEDs who have never used another illicit substance. Peers have always been an important source of information in this group, though the rise of the Internet, and the increased use of Internet forums amongst substance consumers to share harm reduction information, means that PIED users may have access to a large array of views and opinions. The aim of this study was to explore the type of information that PIED users seek and share on these forums. An online search was conducted to identify online forums that discussed PIED use. Three discussion forums were included in this study: aussiegymjunkies.com, bodybuildingforums.com.au, and brotherhoodofpain.com. The primary source of data for this study was the 'threads' from the online forums. Threads were thematically analysed for overall content, leading to the identification of themes. One hundred thirty-four threads and 1716 individual posts from 450 unique avatars were included in this analysis. Two themes were identified: (1) personal experiences and advice and (2) referral to services and referral to the scientific literature. Internet forums are an accessible way for members of the PIED community to seek and share information to reduce the harms associated with PIED use. Forum members show concern for both their own and others' use and, where they lack information, will recommend seeking information from medical professionals. Anecdotal evidence is given high credence though the findings from the scientific literature are used to support opinions. The engagement of health professionals within forums could prove a useful strategy for engaging with this population to provide harm reduction interventions, particularly as forum members are clearly seeking further reliable information, and peers may act as a conduit between users and the health and medical

  6. User-Centered Design, Experience, and Usability of an Electronic Consent User Interface to Facilitate Informed Decision-Making in an HIV Clinic.

    Science.gov (United States)

    Ramos, S Raquel

    2017-11-01

    Health information exchange is the electronic accessibility and transferability of patient medical records across various healthcare settings and providers. In some states, patients have to formally give consent to allow their medical records to be electronically shared. The purpose of this study was to apply a novel user-centered, multistep, multiframework approach to design and test an electronic consent user interface, so patients with HIV can make more informed decisions about electronically sharing their health information. This study consisted of two steps. Step 1 was a cross-sectional, descriptive, qualitative study that used user-centric design interviews to create the user interface. This informed Step 2. Step 2 consisted of a one group posttest to examine perceptions of usefulness, ease of use, preference, and comprehension of a health information exchange electronic consent user interface. More than half of the study population had college experience, but challenges remained with overall comprehension regarding consent. The user interface was not independently successful, suggesting that in addition to an electronic consent user interface, human interaction may also be necessary to address the complexities associated with consenting to electronically share health information. Comprehension is key factor in the ability to make informed decisions.

  7. Conditional net survival: Relevant prognostic information for colorectal cancer survivors. A French population-based study.

    Science.gov (United States)

    Drouillard, Antoine; Bouvier, Anne-Marie; Rollot, Fabien; Faivre, Jean; Jooste, Valérie; Lepage, Côme

    2015-07-01

    Traditionally, survival estimates have been reported as survival from the time of diagnosis. A patient's probability of survival changes according to time elapsed since the diagnosis and this is known as conditional survival. The aim was to estimate 5-year net conditional survival in patients with colorectal cancer in a well-defined French population at yearly intervals up to 5 years. Our study included 18,300 colorectal cancers diagnosed between 1976 and 2008 and registered in the population-based digestive cancer registry of Burgundy (France). We calculated conditional 5-year net survival, using the Pohar Perme estimator, for every additional year survived after diagnosis from 1 to 5 years. The initial 5-year net survival estimates varied between 89% for stage I and 9% for advanced stage cancer. The corresponding 5-year net survival for patients alive after 5 years was 95% and 75%. Stage II and III patients who survived 5 years had a similar probability of surviving 5 more years, respectively 87% and 84%. For survivors after the first year following diagnosis, five-year conditional net survival was similar regardless of age class and period of diagnosis. For colorectal cancer survivors, conditional net survival provides relevant and complementary prognostic information for patients and clinicians. Copyright © 2015 Editrice Gastroenterologica Italiana S.r.l. Published by Elsevier Ltd. All rights reserved.

  8. Patient centric approach for clinical trials: Current trend and new opportunities.

    Science.gov (United States)

    Sharma, Neha Shankar

    2015-01-01

    The clinical research industry today is undergoing a major facelift. Companies are continuously looking to adopt and implement effective and innovative ways to accelerate drug launches in the market. Companies today are more open and do not view patients as mere "subjects" who generate data, - but as informed collaborators whose participation is "core" to the overall success of trials leading to the emergence of the concept of "patient-centric trials." This paper is intended to highlight the current trends and new opportunities that can be seen in industry -indicative of crucial role patients today play in their own health care using technology, social media and self education.

  9. Patient centric approach for clinical trials: Current trend and new opportunities

    Directory of Open Access Journals (Sweden)

    Neha Shankar Sharma

    2015-01-01

    Full Text Available The clinical research industry today is undergoing a major facelift. Companies are continuously looking to adopt and implement effective and innovative ways to accelerate drug launches in the market. Companies today are more open and do not view patients as mere "subjects" who generate data, - but as informed collaborators whose participation is "core" to the overall success of trials leading to the emergence of the concept of "patient-centric trials." This paper is intended to highlight the current trends and new opportunities that can be seen in industry -indicative of crucial role patients today play in their own health care using technology, social media and self education.

  10. The Design of Individual Knowledge Sharing Platform Based on Blog for Online Information Literacy Education

    Science.gov (United States)

    Qun, Zeng; Xiaocheng, Zhong

    Knowledge sharing means that an individual, team and organization share the knowledge with other members of the organization in the course of activities through the various ways. This paper analyzes the obstacle factors in knowledge sharing based on the technical point, and chooses the Blog technology to build a platform for improving knowledge sharing between individuals. The construction of the platform is an important foundation for information literacy education, and it also can be used to achieve online information literacy education. Finally, it gives a detailed analysis of its functions, advantages and disadvantages.

  11. Sharing Hydrologic Data with the CUAHSI Hydrologic Information System (Invited)

    Science.gov (United States)

    Tarboton, D. G.; Maidment, D. R.; Zaslavsky, I.; Horsburgh, J. S.; Whiteaker, T.; Piasecki, M.; Goodall, J. L.; Valentine, D. W.; Whitenack, T.

    2009-12-01

    The CUAHSI Hydrologic Information System (HIS) is an internet based system to support the sharing of hydrologic data consisting of databases connected using the internet through web services as well as software for data discovery, access and publication. The HIS is founded upon an information model for observations at stationary points that supports its data services. A data model, the CUAHSI Observations Data Model (ODM), provides community defined semantics needed to allow sharing information from diverse data sources. A defined set of CUAHSI HIS web services allows for the development of data services, which scale from centralized data services which support access to National Datasets such as the USGS National Water Information System (NWIS) and EPA Storage and Retrieval System (STORET), in a standard way; to distributed data services which allow users to establish their own server and publish their data. User data services are registered to a central HIS website, and they become searchable and accessible through the centralized discovery and data access tools. HIS utilizes both an XML and relational database schema for transmission and storage of data respectively. WaterML is the XML schema used for data transmission that underlies the machine to machine communications, while the ODM is implemented as relational database model for persistent data storage. Web services support access to hydrologic data stored in ODM and communicate using WaterML directly from applications software such as Excel, MATLAB and ArcGIS that have Simple Object Access Protocol (SOAP) capability. A significant value of web services derives from the capability to use them from within a user’s preferred analysis environment, using community defined semantics, rather than requiring a user to learn new software. This allows a user to work with data from national and academic sources, almost as though it was on their local disk. Users wishing to share or publish their data through CUAHSI

  12. DOD Business Systems Modernization: Progress Continues to Be Made in Establishing Corporate Management Controls, but Further Steps are Needed

    Science.gov (United States)

    2007-05-01

    Officer BEA business enterprise architecture BEP business enterprise priority BTA Business Transformation Agency CIO chief information...Board IT information technology ITIM Information Technology Investment Management framework NCES Net-Centric Enterprise Services OMB...18GAO, Information Technology Investment Management: A Framework for Assessing and Improving Process Maturity, GAO-04-394G (Washington, D.C.: March 2004

  13. Sharing Family Life Information Through Video Calls and Other Information and Communication Technologies and the Association With Family Well-Being: Population-Based Survey

    OpenAIRE

    Shen, Chen; Wang, Man Ping; Chu, Joanna TW; Wan, Alice; Viswanath, Kasisomayajula; Chan, Sophia Siu Chee; Lam, Tai Hing

    2017-01-01

    Background The use of information and communication technologies (ICTs) for information sharing among family members is increasing dramatically. However, little is known about the associated factors and the influence on family well-being. Objective The authors investigated the pattern and social determinants of family life information sharing with family and the associations of different methods of sharing with perceived family health, happiness, and harmony (3Hs) in Hong Kong, where mobile p...

  14. 78 FR 65696 - 30-Day Notice of Proposed Information Collection: Housing Finance Agency Risk-Sharing Program

    Science.gov (United States)

    2013-11-01

    ... Information Collection: Housing Finance Agency Risk-Sharing Program AGENCY: Office of the Chief Information... Information Collection: Housing Finance Agency Risk- Sharing Program. OMB Approval Number: 2502-0500. Type of... housing finance agencies (HFAs). Under this program, HUD provides full mortgage insurance on multifamily...

  15. Shared Decision Making: The Need For Patient-Clinician Conversation, Not Just Information.

    Science.gov (United States)

    Hargraves, Ian; LeBlanc, Annie; Shah, Nilay D; Montori, Victor M

    2016-04-01

    The growth of shared decision making has been driven largely by the understanding that patients need information and choices regarding their health care. But while these are important elements for patients who make decisions in partnership with their clinicians, our experience suggests that they are not enough to address the larger issue: the need for the patient and clinician to jointly create a course of action that is best for the individual patient and his or her family. The larger need in evidence-informed shared decision making is for a patient-clinician interaction that offers conversation, not just information, and care, not just choice. Project HOPE—The People-to-People Health Foundation, Inc.

  16. Architecture design in global and model-centric software development

    NARCIS (Netherlands)

    Heijstek, Werner

    2012-01-01

    This doctoral dissertation describes a series of empirical investigations into representation, dissemination and coordination of software architecture design in the context of global software development. A particular focus is placed on model-centric and model-driven software development.

  17. SharePoint 2010 Development For Dummies

    CERN Document Server

    Withee, Ken

    2011-01-01

    A much-needed guide that shows you how to leverage SharePoint tools without writing a line of code!. The great news about SharePoint is…you don't need to be a seasoned .NET developer to develop custom functions for it. This book shows you how to use SharePoint Designer, Report Builder, Dashboard Designer, InfoPath, Excel, Word, Visio, and the SharePoint web-based UI to design and develop—without ever writing a line of code! Learn how to customize your site, build SharePoint apps, start social networking, or add Web parts.  This straightforward guide makes everything easier.: Introduces you to

  18. Product Bundling and Shared Information Goods: A Pricing Exercise

    Science.gov (United States)

    Morrison, William G.

    2016-01-01

    In this article, the author describes an exercise in which two pricing problems (product bundling and the sharing of digital information goods) can be understood using the same analytical approach. The exercise allows students to calculate the correct numerical answers with relative ease, while the teaching plan demonstrates the importance of the…

  19. A Net Centric Collaborative Support System Concept: A Preliminary Investigation

    National Research Council Canada - National Science Library

    Eggleston, Robert

    2004-01-01

    ... layer added to the information technology (IT) infrastructure. Design requirements for this layer of the collaborative interface are derived from principles of Cognitive Systems Engineering and characteristics of human expertise...

  20. Creating a data resource: what will it take to build a medical information commons?

    Science.gov (United States)

    Deverka, Patricia A; Majumder, Mary A; Villanueva, Angela G; Anderson, Margaret; Bakker, Annette C; Bardill, Jessica; Boerwinkle, Eric; Bubela, Tania; Evans, Barbara J; Garrison, Nanibaa' A; Gibbs, Richard A; Gentleman, Robert; Glazer, David; Goldstein, Melissa M; Greely, Hank; Harris, Crane; Knoppers, Bartha M; Koenig, Barbara A; Kohane, Isaac S; La Rosa, Salvatore; Mattison, John; O'Donnell, Christopher J; Rai, Arti K; Rehm, Heidi L; Rodriguez, Laura L; Shelton, Robert; Simoncelli, Tania; Terry, Sharon F; Watson, Michael S; Wilbanks, John; Cook-Deegan, Robert; McGuire, Amy L

    2017-09-22

    National and international public-private partnerships, consortia, and government initiatives are underway to collect and share genomic, personal, and healthcare data on a massive scale. Ideally, these efforts will contribute to the creation of a medical information commons (MIC), a comprehensive data resource that is widely available for both research and clinical uses. Stakeholder participation is essential in clarifying goals, deepening understanding of areas of complexity, and addressing long-standing policy concerns such as privacy and security and data ownership. This article describes eight core principles proposed by a diverse group of expert stakeholders to guide the formation of a successful, sustainable MIC. These principles promote formation of an ethically sound, inclusive, participant-centric MIC and provide a framework for advancing the policy response to data-sharing opportunities and challenges.

  1. Experiences with a researcher-centric ELN† †Electronic supplementary information (ESI) available. See DOI: 10.1039/c4sc02128b Click here for additional data file.

    Science.gov (United States)

    Badiola, Katrina A.; Bird, Colin; Brocklesby, William S.; Casson, John; Chapman, Richard T.; Coles, Simon J.; Cronshaw, James R.; Fisher, Adam; Gloria, Danmar; Grossel, Martin C.; Hibbert, D. Brynn; Knight, Nicola; Mapp, Lucy K.; Marazzi, Luke; Matthews, Brian; Milsted, Andy; Minns, Russell S.; Mueller, Karl T.; Murphy, Kelly; Parkinson, Tim; Quinnell, Rosanne; Robinson, John S.; Robertson, Murray N.; Robins, Michael; Springate, Emma; Tizzard, Graham; Todd, Matthew H.; Williamson, Alice E.; Willoughby, Cerys; Yang, Erica; Ylioja, Paul M.

    2015-01-01

    Electronic Laboratory Notebooks (ELNs) are progressively replacing traditional paper books in both commercial research establishments and academic institutions. University researchers require specific features from ELNs, given the need to promote cross-institutional collaborative working, to enable the sharing of procedures and results, and to facilitate publication. The LabTrove ELN, which we use as our exemplar, was designed to be researcher-centric (i.e., not only aimed at the individual researcher's basic needs rather than to a specific institutional or subject or disciplinary agenda, but also able to be tailored because it is open source). LabTrove is being used in a heterogeneous set of academic laboratories, for a range of purposes, including analytical chemistry, X-ray studies, drug discovery and a biomaterials project. Researchers use the ELN for recording experiments, preserving data collected, and for project coordination. This perspective article describes the experiences of those researchers from several viewpoints, demonstrating how a web-based open source electronic notebook can meet the diverse needs of academic researchers. PMID:29308130

  2. Human-centric decision-making models for social sciences

    CERN Document Server

    Pedrycz, Witold

    2014-01-01

    The volume delivers a wealth of effective methods to deal with various types of uncertainty inherently existing in human-centric decision problems. It elaborates on  comprehensive decision frameworks to handle different decision scenarios, which help use effectively the explicit and tacit knowledge and intuition, model perceptions and preferences in a more human-oriented style. The book presents original approaches and delivers new results on fundamentals and applications related to human-centered decision making approaches to business, economics and social systems. Individual chapters cover multi-criteria (multiattribute) decision making, decision making with prospect theory, decision making with incomplete probabilistic information, granular models of decision making and decision making realized with the use of non-additive measures. New emerging decision theories being presented as along with a wide spectrum of ongoing research make the book valuable to all interested in the field of advanced decision-mak...

  3. 7 CFR 1221.17 - Net market value.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Net market value. 1221.17 Section 1221.17 Agriculture... INFORMATION ORDER Sorghum Promotion, Research, and Information Order Definitions § 1221.17 Net market value. Net market value means: (a) Except as provided in paragraph (b)and (c) of this section, the value...

  4. Capturing information needs of care providers to support knowledge sharing and distributed decision making.

    Science.gov (United States)

    Rogers, M; Zach, L; An, Y; Dalrymple, P

    2012-01-01

    This paper reports on work carried out to elicit information needs at a trans-disciplinary, nurse-managed health care clinic that serves a medically disadvantaged urban population. The trans-disciplinary model provides a "one-stop shop" for patients who can receive a wide range of services beyond traditional primary care. However, this model of health care presents knowledge sharing challenges because little is known about how data collected from the non-traditional services can be integrated into the traditional electronic medical record (EMR) and shared with other care providers. There is also little known about how health information technology (HIT) can be used to support the workflow in such a practice. The objective of this case study was to identify the information needs of care providers in order to inform the design of HIT to support knowledge sharing and distributed decision making. A participatory design approach is presented as a successful technique to specify requirements for HIT applications that can support a trans-disciplinary model of care. Using this design approach, the researchers identified the information needs of care providers working at the clinic and suggested HIT improvements to integrate non-traditional information into the EMR. These modifications allow knowledge sharing among care providers and support better health decisions. We have identified information needs of care providers as they are relevant to the design of health information systems. As new technology is designed and integrated into various workflows it is clear that understanding information needs is crucial to acceptance of that technology.

  5. Interactive Model-Centric Systems Engineering (IMCSE) Phase 5

    Science.gov (United States)

    2018-02-28

    Interactive Model-Centric Systems Engineering (IMCSE) Phase 5 Technical Report SERC-2018-TR-104 Feb 28, 2018 Principal Investigator...Date February 28, 2018 Copyright © 2018 Stevens Institute of Technology, Systems Engineering ...Research Center The Systems Engineering Research Center (SERC) is a federally funded University Affiliated Research Center managed by Stevens

  6. WaterNet: The NASA water cycle solutions network - Danubian regional applications

    International Nuclear Information System (INIS)

    Matthews, Dave; Brilly, Mitja; Kobold, Mira; Zagar, Mark; Houser, Paul

    2008-01-01

    situ observed forcing data that drive a Land Surface Model to simulate surface hydrologic variables of value to water and emergency managers. It clearly shows the limitations of coarse resolution observations and models especially during flash flood events. Snow water equivalent and soil moisture estimates for water and drought management purposes appear to have some value at the coarser resolutions of 1/4 degree; however, higher resolution information at the 1 to 5 km scale is desirable. In conclusion, this paper invites interested water-cycle researchers and decision-makers to join our WaterNet Community of Practice to exchange information and share the latest emerging technologies of value to decision-makers.

  7. Three Essays on Law Enforcement and Emergency Response Information Sharing and Collaboration: An Insider Perspective

    Science.gov (United States)

    Treglia, Joseph V.

    2013-01-01

    This dissertation identifies what may be done to overcome barriers to information sharing among federal, tribal, state, and local law enforcement agencies and emergency responders. Social, technical, and policy factors related to information sharing and collaboration in the law enforcement and emergency response communities are examined. This…

  8. Revisiting the Robustness of PET-Based Textural Features in the Context of Multi-Centric Trials.

    Science.gov (United States)

    Bailly, Clément; Bodet-Milin, Caroline; Couespel, Solène; Necib, Hatem; Kraeber-Bodéré, Françoise; Ansquer, Catherine; Carlier, Thomas

    2016-01-01

    This study aimed to investigate the variability of textural features (TF) as a function of acquisition and reconstruction parameters within the context of multi-centric trials. The robustness of 15 selected TFs were studied as a function of the number of iterations, the post-filtering level, input data noise, the reconstruction algorithm and the matrix size. A combination of several reconstruction and acquisition settings was devised to mimic multi-centric conditions. We retrospectively studied data from 26 patients enrolled in a diagnostic study that aimed to evaluate the performance of PET/CT 68Ga-DOTANOC in gastro-entero-pancreatic neuroendocrine tumors. Forty-one tumors were extracted and served as the database. The coefficient of variation (COV) or the absolute deviation (for the noise study) was derived and compared statistically with SUVmax and SUVmean results. The majority of investigated TFs can be used in a multi-centric context when each parameter is considered individually. The impact of voxel size and noise in the input data were predominant as only 4 TFs presented a high/intermediate robustness against SUV-based metrics (Entropy, Homogeneity, RP and ZP). When combining several reconstruction settings to mimic multi-centric conditions, most of the investigated TFs were robust enough against SUVmax except Correlation, Contrast, LGRE, LGZE and LZLGE. Considering previously published results on either reproducibility or sensitivity against delineation approach and our findings, it is feasible to consider Homogeneity, Entropy, Dissimilarity, HGRE, HGZE and ZP as relevant for being used in multi-centric trials.

  9. NetSig

    DEFF Research Database (Denmark)

    Horn, Heiko; Lawrence, Michael S; Chouinard, Candace R

    2018-01-01

    Methods that integrate molecular network information and tumor genome data could complement gene-based statistical tests to identify likely new cancer genes; but such approaches are challenging to validate at scale, and their predictive value remains unclear. We developed a robust statistic (Net......Sig) that integrates protein interaction networks with data from 4,742 tumor exomes. NetSig can accurately classify known driver genes in 60% of tested tumor types and predicts 62 new driver candidates. Using a quantitative experimental framework to determine in vivo tumorigenic potential in mice, we found that Net......Sig candidates induce tumors at rates that are comparable to those of known oncogenes and are ten-fold higher than those of random genes. By reanalyzing nine tumor-inducing NetSig candidates in 242 patients with oncogene-negative lung adenocarcinomas, we find that two (AKT2 and TFDP2) are significantly amplified...

  10. Putting the Focus Back on the Patient: How Privacy Concerns Affect Personal Health Information Sharing Intentions.

    Science.gov (United States)

    Abdelhamid, Mohamed; Gaia, Joana; Sanders, G Lawrence

    2017-09-13

    Health care providers are driven by greater participation and systemic cost savings irrespective of benefits to individual patients derived from sharing Personal Health Information (PHI). Protecting PHI is a critical issue in the sharing of health care information systems; yet, there is very little literature examining the topic of sharing PHI electronically. A good overview of the regulatory, privacy, and societal barriers to sharing PHI can be found in the 2009 Health Information Technology for Economic and Clinical Health Act. This study investigated the factors that influence individuals' intentions to share their PHI electronically with health care providers, creating an understanding of how we can represent a patient's interests more accurately in sharing settings, instead of treating patients like predetermined subjects. Unlike privacy concern and trust, patient activation is a stable trait that is not subject to change in the short term and, thus, is a useful factor in predicting sharing behavior. We apply the extended privacy model in the health information sharing context and adapt this model to include patient activation and issue involvement to predict individuals' intentions. This was a survey-based study with 1600+ participants using the Health Information National Trends Survey (HINTS) data to validate a model through various statistical techniques. The research method included an assessment of both the measurement and structural models with post hoc analysis. We find that privacy concern has the most influence on individuals' intentions to share. Patient activation, issue involvement, and patient-physician relationship are significant predictors of sharing intention. We contribute to theory by introducing patient activation and issue involvement as proxies for personal interest factors in the health care context. Overall, this study found that although patients are open to sharing their PHI, they still have concerns over the privacy of their PHI

  11. Analysis of Information Sharing Mechanism in the Food Industry Green Supply Chain Management and Operation Process

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    In order to effectively address the issues of environmental pollution and food safety in food industry,the green supply chain management should be used in the food industry.However,information sharing is the basis of supply chain management.For this purpose,on the basis of describing the connotation of food industry green supply chain management,the paper introduces the contents and the effects of information sharing mode in detail.It focuses on the barriers of the implementation of information-sharing mechanisms in the food industry green supply chain management and operation process and analyzes the necessity of using information sharing mechanism among the members of the food industry green supply chain management mode by game theory,so as to strengthen the competitiveness of enterprises through supply chain management.

  12. General-purpose computer networks and resource sharing in ERDA. Volume 3. Remote resource-sharing experience and findings

    Energy Technology Data Exchange (ETDEWEB)

    1977-07-15

    The investigation focused on heterogeneous networks in which a variety of dissimilar computers and operating systems were interconnected nationwide. Homogeneous networks, such as MFE net and SACNET, were not considered since they could not be used for general purpose resource sharing. Issues of privacy and security are of concern in any network activity. However, consideration of privacy and security of sensitive data arise to a much lesser degree in unclassified scientific research than in areas involving personal or proprietary information. Therefore, the existing mechanisms at individual sites for protecting sensitive data were relied on, and no new protection mechanisms to prevent infringement of privacy and security were attempted. Further development of ERDA networking will need to incorporate additional mechanisms to prevent infringement of privacy. The investigation itself furnishes an excellent example of computational resource sharing through a heterogeneous network. More than twenty persons, representing seven ERDA computing sites, made extensive use of both ERDA and non-ERDA computers in coordinating, compiling, and formatting the data which constitute the bulk of this report. Volume 3 analyzes the benefits and barriers encountered in actual resource sharing experience, and provides case histories of typical applications.

  13. Determinants of quality of shared sanitation facilities in informal settlements: case study of Kisumu, Kenya

    Directory of Open Access Journals (Sweden)

    Sheillah Simiyu

    2017-01-01

    Full Text Available Abstract Background Shared facilities are not recognised as improved sanitation due to challenges of maintenance as they easily can be avenues for the spread of diseases. Thus there is need to evaluate the quality of shared facilities, especially in informal settlements, where they are commonly used. A shared facility can be equated to a common good whose management depends on the users. If users do not work collectively towards keeping the facility clean, it is likely that the quality may depreciate due to lack of maintenance. This study examined the quality of shared sanitation facilities and used the common pool resource (CPR management principles to examine the determinants of shared sanitation quality in the informal settlements of Kisumu, Kenya. Methods Using a multiple case study design, the study employed both quantitative and qualitative methods. In both phases, users of shared sanitation facilities were interviewed, while shared sanitation facilities were inspected. Shared sanitation quality was a score which was the dependent variable in a regression analysis. Interviews during the qualitative stage were aimed at understanding management practices of shared sanitation users. Qualitative data was analysed thematically by following the CPR principles. Results Shared facilities, most of which were dirty, were shared by an average of eight households, and their quality decreased with an increase in the number of households sharing. The effect of numbers on quality is explained by behaviour reflected in the CPR principles, as it was easier to define boundaries of shared facilities when there were fewer users who cooperated towards improving their shared sanitation facility. Other factors, such as defined management systems, cooperation, collective decision making, and social norms, also played a role in influencing the behaviour of users towards keeping shared facilities clean and functional. Conclusion Apart from hardware factors, quality

  14. Can I help you? Information sharing in online discussion forums by people living with a long-term condition

    Directory of Open Access Journals (Sweden)

    Carol S Bond

    2016-11-01

    Full Text Available Background Peer-to-peer health care is increasing, especially amongst people living with a long-term condition. How information is shared is, however, sometimes of concern to health care professionals. Objective This study explored what information is being shared on health-related discussion boards and identified the approaches people used to signpost their peers to information. Methods This study was conducted using a qualitative content analysis methodology to explore information shared on discussion boards for people living with diabetes. Whilst there is debate about the best ethical lens to view research carried out on data posted on online discussion boards, the researchers chose to adopt the stance of treating this type of information as “personal health text”, a specific type of research data in its own right. Results Qualitative content analysis and basic descriptive statistics were used to analyse the selected posts. Two major themes were identified: ‘Information Sharing from Experience’ and ‘Signposting Other Sources of Information’. Conclusions People were actively engaging in information sharing in online discussion forums, mainly through direct signposting. The quality of the information shared was important, with reasons for recommendations being given. Much of the information sharing was based on experience, which also brought in information from external sources such as health care professionals and other acknowledged experts in the field. With the rise in peer-to-peer support networks, the nature of health knowledge and expertise needs to be redefined. People online are combining external information with their own personal experiences and sharing that for others to take and develop as they wish.

  15. Transforming Systems Engineering through Model Centric Engineering

    Science.gov (United States)

    2017-08-08

    Contract No. HQ0034-13-D-0004 Report No. SERC-2017-TR-110 Date: August 8, 2017 Transforming Systems Engineering through Model-Centric... Engineering Technical Report SERC-2017-TR-110 Update: August 8, 2017 Principal Investigator: Mark Blackburn, Stevens Institute of Technology Co...Evangelista Sponsor: U.S. Army Armament Research, Development and Engineering Center (ARDEC), Office of the Deputy Assistant Secretary of Defense for

  16. An Experimental Study of the Effect of Shared Information on Pilot/Controller Re-Route Negotiation

    Science.gov (United States)

    Farley, Todd C.; Hansman, R. John

    1999-01-01

    Air-ground data link systems are being developed to enable pilots and air traffic controllers to share information more fully. The sharing of information is generally expected to enhance their shared situation awareness and foster more collaborative decision making. An exploratory, part-task simulator experiment is described which evaluates the extent to which shared information may lead pilots and controllers to cooperate or compete when negotiating route amendments. The results indicate an improvement in situation awareness for pilots and controllers and a willingness to work cooperatively. Independent of data link considerations, the experiment also demonstrates the value of providing controllers with a good-quality weather representation on their plan view displays. Observed improvements in situation awareness and separation assurance are discussed. It is argued that deployment of this relatively simple, low-risk addition to the plan view displays be accelerated.

  17. The K-NET - A year after

    International Nuclear Information System (INIS)

    Kinoshita, S.; Ohtani, K.; Katayama, T.

    2001-01-01

    We started to release the K-NET strong-motion data from June 1996 and about one year passed. In this article, we report the development of K-NET and some applications using the K-NET information released on the Internet. (author)

  18. The share of sales for secondary information in the sales for scientific and technical information in the Federal Republic of Germany

    International Nuclear Information System (INIS)

    Bernhardt, U.; Jungjohann, K.

    1978-07-01

    This final report of an empirical research about the expenditures and sales for Secondary Information (SI) as a share of Scientific and Technical Information (STI) in 1974 is furthermore concerned with: the quantity of SI and STI; the share of information free of charge; a specification for information products, individual information services and magnetic tape services; a differentiation for several areas in the market (institutions for information and documentation, libraries, publishers and privat users); the evaluation of the development for expenditures and sales till 1980. The methods of raising the relevant data comprised questionnaires and verbal interviews, case studies and the analysis of statistical literature. In the second phase of research questionnaires were sent to experts for a final evaluation of results. The important results are: The expenditures in the institutional sector and in libraries for SI in 1974 amount to 80 million DM and in the privat sector to about 117 million DM. The share of SI in STI amounts 8 percent. The sales for SI in the institutions for information and documentation reached 38 million DM. (orig.) [de

  19. A Heuristic Design Information Sharing Framework for Hard Discrete Optimization Problems

    National Research Council Canada - National Science Library

    Jacobson, Sheldon H

    2007-01-01

    .... This framework has been used to gain new insights into neighborhood structure designs that allow different neighborhood functions to share information when using the same heuristic applied to the same problem...

  20. Extending Current Theories of Cross-Boundary Information Sharing and Integration: A Case Study of Taiwan e-Government

    Science.gov (United States)

    Yang, Tung-Mou

    2011-01-01

    Information sharing and integration has long been considered an important approach for increasing organizational efficiency and performance. With advancements in information and communication technologies, sharing and integrating information across organizations becomes more attractive and practical to organizations. However, achieving…

  1. Geographic information systems - transportation ISTEA management systems server net prototype pooled fund study : phase B - summary

    Science.gov (United States)

    1997-06-01

    The Geographic Information System-Transportation (GIS-T) ISTEA Management Systems Server Net Prototype Pooled Fund Study represents the first national cooperative effort in the transportation industry to address the management and monitoring systems ...

  2. Human-Centric Interfaces for Ambient Intelligence

    CERN Document Server

    Aghajan, Hamid; Delgado, Ramon Lopez-Cozar

    2009-01-01

    To create truly effective human-centric ambient intelligence systems both engineering and computing methods are needed. This is the first book to bridge data processing and intelligent reasoning methods for the creation of human-centered ambient intelligence systems. Interdisciplinary in nature, the book covers topics such as multi-modal interfaces, human-computer interaction, smart environments and pervasive computing, addressing principles, paradigms, methods and applications. This book will be an ideal reference for university researchers, R&D engineers, computer engineers, and graduate s

  3. An integrated framework for rural electrification: Adopting a user-centric approach to business model development

    International Nuclear Information System (INIS)

    Schillebeeckx, Simon J.D.; Parikh, Priti; Bansal, Rahul; George, Gerard

    2012-01-01

    Rural electrification (RE) has gained prominence over the past two decades as an effective means for improving living conditions. This growth has largely been driven by socio-economic and political imperatives to improve rural livelihood and by technological innovation. Based on a content analysis of 232 scholarly articles, the literature is categorized into four focal lenses: technology, institutional, viability and user-centric. We find that the first two dominate the RE debate. The viability lens has been used less frequently, whilst the user-centric lens began to engage scholars as late as 2007. We provide an overview of the technological, institutional and viability lenses, and elaborate upon the user-centric lens in greater detail. For energy policy and practice, we combine the four lenses to develop a business model framework that policy makers, practitioners and investors could use to assess RE projects or to design future rural electrification strategies. - Highlights: ► Review of two decades of rural electrification research. ► Content analysis of 232 scholarly articles. ► Literature is categorized into four focal lenses: technology, institutional, viability and user-centric. ► We develop a business model framework for rural electrification strategies.

  4. Social Technologies and Informal Knowledge Sharing within and across Organizations

    Science.gov (United States)

    Jarrahi, Mohammad Hosein

    2013-01-01

    This doctoral dissertation is focused on both empirical and conceptual contributions relative to the roles social technologies play in informal knowledge sharing practices, both within and across organizations. Social technologies include (a) traditional social technologies (e.g., email, phone and instant messengers), (b) emerging social…

  5. Revisiting the Robustness of PET-Based Textural Features in the Context of Multi-Centric Trials.

    Directory of Open Access Journals (Sweden)

    Clément Bailly

    Full Text Available This study aimed to investigate the variability of textural features (TF as a function of acquisition and reconstruction parameters within the context of multi-centric trials.The robustness of 15 selected TFs were studied as a function of the number of iterations, the post-filtering level, input data noise, the reconstruction algorithm and the matrix size. A combination of several reconstruction and acquisition settings was devised to mimic multi-centric conditions. We retrospectively studied data from 26 patients enrolled in a diagnostic study that aimed to evaluate the performance of PET/CT 68Ga-DOTANOC in gastro-entero-pancreatic neuroendocrine tumors. Forty-one tumors were extracted and served as the database. The coefficient of variation (COV or the absolute deviation (for the noise study was derived and compared statistically with SUVmax and SUVmean results.The majority of investigated TFs can be used in a multi-centric context when each parameter is considered individually. The impact of voxel size and noise in the input data were predominant as only 4 TFs presented a high/intermediate robustness against SUV-based metrics (Entropy, Homogeneity, RP and ZP. When combining several reconstruction settings to mimic multi-centric conditions, most of the investigated TFs were robust enough against SUVmax except Correlation, Contrast, LGRE, LGZE and LZLGE.Considering previously published results on either reproducibility or sensitivity against delineation approach and our findings, it is feasible to consider Homogeneity, Entropy, Dissimilarity, HGRE, HGZE and ZP as relevant for being used in multi-centric trials.

  6. Sharing Family Life Information Through Video Calls and Other Information and Communication Technologies and the Association With Family Well-Being: Population-Based Survey.

    Science.gov (United States)

    Shen, Chen; Wang, Man Ping; Chu, Joanna Tw; Wan, Alice; Viswanath, Kasisomayajula; Chan, Sophia Siu Chee; Lam, Tai Hing

    2017-11-23

    The use of information and communication technologies (ICTs) for information sharing among family members is increasing dramatically. However, little is known about the associated factors and the influence on family well-being. The authors investigated the pattern and social determinants of family life information sharing with family and the associations of different methods of sharing with perceived family health, happiness, and harmony (3Hs) in Hong Kong, where mobile phone ownership and Internet access are among the most prevalent, easiest, and fastest in the world. A territory-wide population-based telephone survey was conducted from January to August 2016 on different methods of family life information (ie, information related to family communication, relationships with family members, emotion and stress management) sharing with family members, including face-to-face, phone, instant messaging (IM), social media sites, video calls, and email. Family well-being was assessed by three single items on perceived family health, happiness, and harmony, with higher scores indicating better family well-being. Adjusted prevalence ratios were used to assess the associations of sociodemographic factors with family life information sharing, and adjusted beta coefficients for family well-being. Of 2017 respondents, face-to-face was the most common method to share family life information (74.45%, 1502/2017), followed by IM (40.86%, 824/2017), phone (28.10%, 567/2017), social media sites (11.91%, 240/2017), video calls (5.89%, 119/2017), and email (5.48%, 111/2017). Younger age and higher education were associated with the use of any (at least one) method, face-to-face, IM, and social media sites for sharing family life information (all P for trend face-to-face, and IM (all P for trend face-to-face (beta=0.62, 95% CI 0.45-0.80) and video calls (beta=0.34, 95% CI 0.04-0.65). The combination of face-to-face and video calls was most strongly associated with a higher level of

  7. Misuse Case Driven Development of Secure Information Sharing for Coalition Environment

    National Research Council Canada - National Science Library

    Baek, Seung S

    2007-01-01

    .... This thesis uses misuse cases to identify such misuses of a sharing system. We show that an appropriate distributed role-based access control model imposed upon information brokers can prevent enumerate misuse cases...

  8. Transforming Systems Engineering through Model-Centric Engineering

    Science.gov (United States)

    2018-02-28

    Contract No. HQ0034-13-D-0004 Research Tasks: 48, 118, 141, 157, 170 Report No. SERC-2018-TR-103 Transforming Systems Engineering through...Model-Centric Engineering Technical Report SERC-2018-TR-103 February 28, 2018 Principal Investigator Dr. Mark Blackburn, Stevens Institute of...Systems Engineering Research Center This material is based upon work supported, in whole or in part, by the U.S. Department of Defense through the

  9. 31 CFR 103.110 - Voluntary information sharing among financial institutions.

    Science.gov (United States)

    2010-07-01

    ... Information Sharing Procedures To Deter Money Laundering and Terrorist Activity § 103.110 Voluntary.... 5312(a)(2) that is required under this part to establish and maintain an anti-money laundering program... suspects may involve possible terrorist activity or money laundering. (2) Notice requirement. A financial...

  10. MOBASE : a framework for managing shared, multi-disciplinary printer information

    NARCIS (Netherlands)

    Okwudire, C.G.U.

    2012-01-01

    The report is intended for anyone who is interested in model-based systems engineering, particularly in how to efficiently manage shared, multi-disciplinary information useful for synthesis of complex, mechatronics systems such as those developed by Océ. Of course, the capacity for reasoning at a

  11. Community Net Energy Metering: How Novel Policies Expand Benefits of Net Metering to Non-Generators

    Energy Technology Data Exchange (ETDEWEB)

    Rose, James; Varnado, Laurel

    2009-04-01

    As interest in community solutions to renewable energy grows, more states are beginning to develop policies that encourage properties with more than one meter to install shared renewable energy systems. State net metering policies are evolving to allow the aggregation of multiple meters on a customer’s property and to dissolve conventional geographical boundaries. This trend means net metering is expanding out of its traditional function as an enabling incentive to offset onsite customer load at a single facility. This paper analyzes community net energy metering (CNEM) as an emerging vehicle by which farmers, neighborhoods, and municipalities may more easily finance and reap the benefits of renewable energy. Specifically, it aims to compare and contrast the definition of geographical boundaries among different CNEM models and examine the benefits and limitations of each approach. As state policies begin to stretch the geographic boundaries of net metering, they allow inventive solutions to encourage renewable energy investment. This paper attempts to initiate the conversation on this emerging policy mechanism and offers recommendations for further development of these policies.

  12. Individual Syllabus for Personalized Learner-Centric E-Courses in E-Learning and M-Learning

    OpenAIRE

    Khaled Nasser ElSayed

    2014-01-01

    Most of e-learning and m-learning systems are course-centric. These systems provided services that concentrated on course material and pedagogical. They did not take into account varieties of student levels, skills, interests or preferences. This paper provides a design of an approach for personalized and self-adapted agent-based learning systems for enhancing e-learning and mobile learning (m-learning) services to be learner-centric. It presents a modeling of goals of different learners of a...

  13. Automatic summary generating technology of vegetable traceability for information sharing

    Science.gov (United States)

    Zhenxuan, Zhang; Minjing, Peng

    2017-06-01

    In order to solve problems of excessive data entries and consequent high costs for data collection in vegetable traceablility for farmers in traceability applications, the automatic summary generating technology of vegetable traceability for information sharing was proposed. The proposed technology is an effective way for farmers to share real-time vegetable planting information in social networking platforms to enhance their brands and obtain more customers. In this research, the influencing factors in the vegetable traceablility for customers were analyzed to establish the sub-indicators and target indicators and propose a computing model based on the collected parameter values of the planted vegetables and standard legal systems on food safety. The proposed standard parameter model involves five steps: accessing database, establishing target indicators, establishing sub-indicators, establishing standard reference model and computing scores of indicators. On the basis of establishing and optimizing the standards of food safety and traceability system, this proposed technology could be accepted by more and more farmers and customers.

  14. Information Propagation in Peer-to-Peer Networking : Modeling and Empirical Studies

    NARCIS (Netherlands)

    Tang, S.

    2010-01-01

    Although being a young technology, peer-to-peer (P2P) networking has spurred dramatic evolution on the Internet over the recent twenty years. Unlike traditional server-client mode, P2P networking applications are user-centric. Users (peers) generate their own content and share it with others across

  15. Framework for managing shared knowledge in an information systems outsourcing context

    CSIR Research Space (South Africa)

    Smuts, H

    2017-11-01

    Full Text Available Both information systems (IS) outsourcing and knowledge management are well-established business phenomena. The integration of shared knowledge in an IS outsourcing arrangement, represents the blending of organisational knowledge with external...

  16. DESIGNING A SUPPLY CHAIN MODEL WITH CONSIDERATION DEMAND FORECASTING AND INFORMATION SHARING

    OpenAIRE

    S.M.T. Fatemi Ghomi; N. Azad

    2012-01-01

    ENGLISH ABSTRACT: In traditional supply chain inventory management, orders are the only information firms exchange, but information technology now allows firms to share demand and inventory data quickly and inexpensively. To have an integrated plan, a manufacturer not only needs to know demand information from its customers but also supply information from its suppliers. In this paper, information flow is incorporated in a three-echelon supply chain model. Also to decrease the risk o...

  17. Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack.

    Science.gov (United States)

    Mallinder, Jason; Drabwell, Peter

    Cyber threats are growing and evolving at an unprecedented rate.Consequently, it is becoming vitally important that organisations share information internally and externally before, during and after incidents they encounter so that lessons can be learned, good practice identified and new cyber resilience capabilities developed. Many organisations are reluctant to share such information for fear of divulging sensitive information or because it may be vague or incomplete. This provides organisations with a complex dilemma: how to share information as openly as possibly about cyber incidents, while protecting their confidentiality and focusing on service recovery from such incidents. This paper explores the dilemma of information sharing versus sensitivity and provides a practical overview of considerations every business continuity plan should address to plan effectively for information sharing in the event of a cyber incident.

  18. MetaFluxNet: the management of metabolic reaction information and quantitative metabolic flux analysis.

    Science.gov (United States)

    Lee, Dong-Yup; Yun, Hongsoek; Park, Sunwon; Lee, Sang Yup

    2003-11-01

    MetaFluxNet is a program package for managing information on the metabolic reaction network and for quantitatively analyzing metabolic fluxes in an interactive and customized way. It allows users to interpret and examine metabolic behavior in response to genetic and/or environmental modifications. As a result, quantitative in silico simulations of metabolic pathways can be carried out to understand the metabolic status and to design the metabolic engineering strategies. The main features of the program include a well-developed model construction environment, user-friendly interface for metabolic flux analysis (MFA), comparative MFA of strains having different genotypes under various environmental conditions, and automated pathway layout creation. http://mbel.kaist.ac.kr/ A manual for MetaFluxNet is available as PDF file.

  19. Functional Assessment of the Stomatognathic System, after the Treatment of Edentulous Patients, with Different Methods of Establishing the Centric Relation.

    Science.gov (United States)

    Nitecka-Buchta, Aleksandra; Proba, Thomas; Proba, Paulina; Stefański, Kamil; Baron, Stefan

    2018-01-01

    The study compares subjective experiences of patients, wearing complete dentures. Two different methods of determining a centric relation were performed: the traditional method using wax occlusal rims and the Gerber method, based on gothic arch tracings. The success rate of establishing a centric relation in both methods was evaluated (rentgenodiagnostics). The influence of the method used to obtain the centric relation on patients' stomatognathic system (condyle centralization, pain) was also evaluated. Better results were achieved in gothic arch tracing method. Before every prosthetic treatment of edentulous patients, a functional analysis of the TMJ is necessary. The lack of centric relation, in a long term adaptation patients, does not lead to TMD symptoms. This trial is registered with NCT03343015.

  20. System towards the touristic information sharing amongst portuguese speaking countries

    Directory of Open Access Journals (Sweden)

    M. M. M. Moura

    2008-12-01

    Full Text Available Global and efficient communication has always been a goal to expanding touristic destinations in order to potentiate the growth of the sector and the sustainable development of the regions concerned. With the emergence of the new information technologies, the creation of networks for information sharing became a reality. This facilitated the implementation of benchmarking actions and programs between touristic destinations involved in cooperation projects. The Internet development, as an inexpensive infrastructure, allowed breaking many access barriers faced by many touristic destinations, due to the lack of investment funds in these areas. The inherent cost of design, installation and maintenance of networked computer systems are currently a fraction of the initial implementation cost of a traditional system, even allowing for the standardization of all the technology applied. The article exposes the problematical issues concerning the creation of networks for information sharing and proposes a model for the development of a distributed information system as the support infrastructure to such a network. Thus, the organized exploitation of a decentralized information flow allows the creation of synergies amongst the agents involved and, at the same time, the maximization of the development of the emerging touristic destinations. Such s network towards the sustainable development of the touristic destinations of Portuguese speaking countries of enables the development of processes of continuous enhancement of the global performance, processes that are oriented to the pursuit of competitivity, sustainability and quality of touristic products.

  1. STI for Development in Asia : a Platform for Information Sharing and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This project will make use of available information technology platforms and regional ... (especially Southeast Asia) to share experiences and learning on the subject of STI. ... Eleven world-class research teams set to improve livestock vaccine ...

  2. Mobile Student Information System

    Science.gov (United States)

    Asif, Muhammad; Krogstie, John

    2011-01-01

    Purpose: A mobile student information system (MSIS) based on mobile computing and context-aware application concepts can provide more user-centric information services to students. The purpose of this paper is to describe a system for providing relevant information to students on a mobile platform. Design/methodology/approach: The research…

  3. Groupwise information sharing promotes ingroup favoritism in indirect reciprocity.

    Science.gov (United States)

    Nakamura, Mitsuhiro; Masuda, Naoki

    2012-11-05

    Indirect reciprocity is a mechanism for cooperation in social dilemma situations. In indirect reciprocity, an individual is motivated to help another to acquire a good reputation and receive help from others afterwards. Another aspect of human cooperation is ingroup favoritism, whereby individuals help members in their own group more often than those in other groups. Ingroup favoritism is a puzzle for the theory of cooperation because it is not easily evolutionarily stable. In the context of indirect reciprocity, ingroup favoritism has been shown to be a consequence of employing a double standard when assigning reputations to ingroup and outgroup members. An example of such a double standard is the situation in which helping an ingroup member is regarded as good, whereas the same action toward an outgroup member is regarded as bad. We analyze a computational model of indirect reciprocity in which information sharing is conducted groupwise. In our model, individuals play social dilemma games within and across groups, and the information about their reputations is shared within each group. We show that evolutionarily stable ingroup favoritism emerges even if all the players use the same reputation assignment rule regardless of group (i.e., a single standard). Two reputation assignment rules called simple standing and stern judging yield ingroup favoritism; under these rules, cooperation with (defection against) good individuals is regarded as good (bad) and defection against bad individuals is regarded as good. Stern judging induces much stronger ingroup favoritism than does simple standing. Simple standing and stern judging are evolutionarily stable against each other when groups employing different assignment rules compete and the number of groups is sufficiently large. In addition, we analytically show as a limiting case that homogeneous populations of reciprocators that use reputations are unstable when individuals independently infer reputations of individuals

  4. Groupwise information sharing promotes ingroup favoritism in indirect reciprocity

    Directory of Open Access Journals (Sweden)

    Nakamura Mitsuhiro

    2012-11-01

    Full Text Available Abstract Background Indirect reciprocity is a mechanism for cooperation in social dilemma situations. In indirect reciprocity, an individual is motivated to help another to acquire a good reputation and receive help from others afterwards. Another aspect of human cooperation is ingroup favoritism, whereby individuals help members in their own group more often than those in other groups. Ingroup favoritism is a puzzle for the theory of cooperation because it is not easily evolutionarily stable. In the context of indirect reciprocity, ingroup favoritism has been shown to be a consequence of employing a double standard when assigning reputations to ingroup and outgroup members. An example of such a double standard is the situation in which helping an ingroup member is regarded as good, whereas the same action toward an outgroup member is regarded as bad. Results We analyze a computational model of indirect reciprocity in which information sharing is conducted groupwise. In our model, individuals play social dilemma games within and across groups, and the information about their reputations is shared within each group. We show that evolutionarily stable ingroup favoritism emerges even if all the players use the same reputation assignment rule regardless of group (i.e., a single standard. Two reputation assignment rules called simple standing and stern judging yield ingroup favoritism; under these rules, cooperation with (defection against good individuals is regarded as good (bad and defection against bad individuals is regarded as good. Stern judging induces much stronger ingroup favoritism than does simple standing. Simple standing and stern judging are evolutionarily stable against each other when groups employing different assignment rules compete and the number of groups is sufficiently large. In addition, we analytically show as a limiting case that homogeneous populations of reciprocators that use reputations are unstable when individuals

  5. The underlying reasons for very high levels of bed net use, and higher malaria infection prevalence among bed net users than non-users in the Tanzanian city of Dar es Salaam: a qualitative study.

    Science.gov (United States)

    Msellemu, Daniel; Shemdoe, Aloysia; Makungu, Christina; Mlacha, Yeromini; Kannady, Khadija; Dongus, Stefan; Killeen, Gerry F; Dillip, Angel

    2017-10-23

    Bed nets reduce malaria-related illness and deaths, by forming a protective barrier around people sleeping under them. When impregnated with long-lasting insecticide formulations they also repel or kill mosquitoes attempting to feed upon sleeping humans, and can even suppress entire populations of malaria vectors that feed predominantly upon humans. Nevertheless, an epidemiological study in 2012 demonstrated higher malaria prevalence among bed net users than non-users in urban Dar es Salaam, Tanzania. Focus group discussions were conducted with women from four selected wards of Dar es Salaam city, focusing on four major themes relating to bed net use behaviours: (1) reasons for bed net use, (2) reasons for not using bed nets, (3) stimuli or reminders for people to use a bed net (4) perceived reasons for catching malaria while using a bed net. An analytical method by framework grouping of relevant themes was used address key issues of relevance to the study objectives. Codes were reviewed and grouped into categories and themes. All groups said the main reason for bed net use was protection against malaria. Houses with well-screened windows, with doors that shut properly, and that use insecticidal sprays against mosquitoes, were said not to use bed nets, while frequent attacks from malaria was the main stimulus for people to use bed nets. Various reasons were mentioned as potential reasons that compromise bed net efficacy, the most common of which were: (1) bed net sharing by two or more people, especially if one occupant tends to come to bed late at night, and does not tuck in the net 71%; (2) one person shares the bed but does not use the net, moving it away from the side on which s/he sleeps 68%; (3) ineffective usage habits, called ulalavi, in which a sprawling sleeper either touches the net while sleeping up against it or leaves a limb hanging outside of it 68%. Less common reasons mentioned included: (1) Small bed nets which become un-tucked at night (31%); (2

  6. The good, the bad and the ugly thing to do when sharing information: Revealing, concealing and lying depend on social motivation, distribution and importance of information

    NARCIS (Netherlands)

    Steinel, W.; Utz, S.; Koning, L.

    2010-01-01

    Research on information sharing in group decision-making has widely assumed a cooperative context and focused on the exchange of shared or unshared information in the hidden profile paradigm (Stasser & Titus, 1985, 1987), neglecting the role of information importance. We argue that information

  7. Using big data for customer centric marketing

    OpenAIRE

    Camilleri, Mark Anthony; Evans, Chris

    2016-01-01

    This chapter deliberates on “big data” and provides a short overview of business intelligence and emerging analytics. It underlines the importance of data for customer-centricity in marketing. This contribution contends that businesses ought to engage in marketing automation tools and apply them to create relevant, targeted customer experiences. Today’s business increasingly rely on digital media and mobile technologies as on-demand, real-time marketing has become more personalised than ever....

  8. Information security knowledge sharing in organizations : Investigating the effect of behavioral information security governance and national culture

    OpenAIRE

    Rocha Flores, Waldo; Antonsen, Egil; Ekstedt, Mathias

    2014-01-01

    This paper presents an empirical investigation on what behavioral information security governance factors drives the establishment of information security knowledge sharing in organizations. Data was collected from organizations located in different geographic regions of the world, and the amount of data collected from two countries – namely, USA and Sweden – allowed us to investigate if the effect of behavioral information security governance factors on the establishment of security knowledg...

  9. Sharing data is a shared responsibility: Commentary on: "The essential nature of sharing in science".

    Science.gov (United States)

    Giffels, Joe

    2010-12-01

    Research data should be made readily available. A robust data-sharing plan, led by the principal investigator of the research project, requires considerable administrative and operational resources. Because external support for data sharing is minimal, principal investigators should consider engaging existing institutional information experts, such as librarians and information systems personnel, to participate in data-sharing efforts.

  10. Professional Business Connectivity Services in SharePoint 2010

    CERN Document Server

    Hillier, Scot

    2011-01-01

    Comprehensive coverage on Business Connectivity Services within SharePoint 2010 As Microsoft's new multipurpose portal technology, Business Connectivity Services (BCS) is a brand new way for SharePoint users to seamlessly access and integrate data from any application or databases within SharePoint 2010. With this in-depth guide, a team of SharePoint experts walks you through the features of the new BCS, including the ability for users to view and modify the data from SharePoint 2010 with BCS. You'll explore how to use BCS, deploy solutions, create external content types and lists, create .NET

  11. Anonysense: privacy-aware people-centric sensing

    DEFF Research Database (Denmark)

    Triandopoulos, Nikolaos; Cornelius, Cory; Kapadia, Apu

    2008-01-01

    applications. For example, users' mobile phones may contribute data to community-oriented information services, from city-wide pollution monitoring to enterprise-wide detection of unauthorized Wi-Fi access points. This people-centric mobile-sensing model introduces a new security challenge in the design...... of mobile systems: protecting the privacy of participants while allowing their devices to reliably contribute high-quality data to these large-scale applications. We describe AnonySense, a privacy-aware architecture for realizing pervasive applications based on collaborative, opportunistic sensing...... by personal mobile devices. AnonySense allows applications to submit sensing tasks that will be distributed across anonymous participating mobile devices, later receiving verified, yet anonymized, sensor data reports back from the field, thus providing the first secure implementation of this participatory...

  12. A Study on Intelligent User-Centric Logistics Service Model Using Ontology

    Directory of Open Access Journals (Sweden)

    Saraswathi Sivamani

    2014-01-01

    Full Text Available Much research has been undergone in the smart logistics environment for the prompt delivery of the product in the right place at the right time. Most of the services were based on time management, routing technique, and location based services. The services in the recent logistics environment aim for situation based logistics service centered around the user by utilizing various information technologies such as mobile devices, computer systems, and GPS. This paper proposes a smart logistics service model for providing user-centric intelligent logistics service by utilizing smartphones in a smart environment. We also develop an OWL based ontology model for the smart logistics for the better understanding among the context information. In addition to basic delivery information, the proposed service model makes use of the location and situation information of the delivery vehicle and user, to draw the route information according to the user’s requirement. With the increase of internet usage, the real-time situations are received which helps to create a more reliable relationship, owing to the Internet of Things. Through this service model, it is possible to engage in the development of various IT and logistics convergence services based on situation information between the deliverer and user which occurs in real time.

  13. How Do We Know What Information Sharing Is Really Worth? Exploring Methodologies to Measure the Value of Information Sharing and Fusion Efforts

    Science.gov (United States)

    2014-01-01

    Security’s fusion center program, but also systems used every day by police departments to share records and biometric data to apprehend criminal suspects...purged), the increase in arrests might actually decrease the rate of quality arrests. • Biometric and biographical information can help officers see...not have occurred at all without a system or initiative, but not unfairly “putting a finger on the scale” to give the system credit for successes that

  14. 7 CFR 766.202 - Determining the shared appreciation due.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Determining the shared appreciation due. 766.202 Section 766.202 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN SERVICING-SPECIAL Servicing Shared Appreciation Agreements and Net Recovery Buyout Agreements...

  15. High-level Petri Nets

    DEFF Research Database (Denmark)

    various journals and collections. As a result, much of this knowledge is not readily available to people who may be interested in using high-level nets. Within the Petri net community this problem has been discussed many times, and as an outcome this book has been compiled. The book contains reprints...... of some of the most important papers on the application and theory of high-level Petri nets. In this way it makes the relevant literature more available. It is our hope that the book will be a useful source of information and that, e.g., it can be used in the organization of Petri net courses. To make......High-level Petri nets are now widely used in both theoretical analysis and practical modelling of concurrent systems. The main reason for the success of this class of net models is that they make it possible to obtain much more succinct and manageable descriptions than can be obtained by means...

  16. 75 FR 60347 - Information Sharing Among Federal Home Loan Banks

    Science.gov (United States)

    2010-09-30

    ... business days between the hours of 10 a.m. and 3 p.m. at the Federal Housing Finance Agency, Fourth Floor... FEDERAL HOUSING FINANCE BOARD 12 CFR Part 914 FEDERAL HOUSING FINANCE AGENCY 12 CFR Part 1260 RIN 2590-AA35 Information Sharing Among Federal Home Loan Banks AGENCY: Federal Housing Finance Agency...

  17. Functional Assessment of the Stomatognathic System, after the Treatment of Edentulous Patients, with Different Methods of Establishing the Centric Relation

    Directory of Open Access Journals (Sweden)

    Aleksandra Nitecka-Buchta

    2018-01-01

    Full Text Available The study compares subjective experiences of patients, wearing complete dentures. Two different methods of determining a centric relation were performed: the traditional method using wax occlusal rims and the Gerber method, based on gothic arch tracings. The success rate of establishing a centric relation in both methods was evaluated (rentgenodiagnostics. The influence of the method used to obtain the centric relation on patients’ stomatognathic system (condyle centralization, pain was also evaluated. Better results were achieved in gothic arch tracing method. Before every prosthetic treatment of edentulous patients, a functional analysis of the TMJ is necessary. The lack of centric relation, in a long term adaptation patients, does not lead to TMD symptoms. This trial is registered with NCT03343015.

  18. 1. round table. Information and knowledge sharing

    International Nuclear Information System (INIS)

    2005-01-01

    The law from December 30, 1991, precisely defines 3 axes of researches for the management of high level and long-lived radioactive wastes: separation/transmutation, surface storage and underground disposal. A global evaluation report about these researches is to be supplied in 2006 by the French government to the Parliament. A first synthesis of the knowledge gained after 14 years of research has led the national commission of the public debate (CNDP) to organize a national debate about the general options of management of high-level and long-lived radioactive wastes before the 2006 date line. The debate comprises 4 public hearings (September 2005: Bar-le-Duc, Saint-Dizier, Pont-du-Gard, Cherbourg), 12 round-tables (October and November 2005: Paris, Joinville, Caen, Nancy, Marseille), a synthesis meeting (December 2005, Dunkerque) and a closing meeting (January 2006, Lyon). This document is the synthesis of the first round table debates about the information dissemination and the sharing of knowledge which took place at Caen. The main discussions of this session concerns the political decisions and the information of the public, and the transparency of this information as it should be in a western democracy. (J.S.)

  19. User needs on Nursing Net (The Kango Net) - analyzing the total consultation page - http://www.kango-net.jp/en/index.html.

    Science.gov (United States)

    Sakyo, Yumi; Nakayama, Kazuhiro; Komatsu, Hiroko; Setoyama, Yoko

    2009-01-01

    People are required to take in and comprehend a massive amount of health information and in turn make some serious decisions based on that information. We, at St. Luke's College of Nursing, provide a rich selection of high-quality health information, and have set up Nursing Net (The Kango Net:Kango is Nursing in Japanese). This website provides information for consumers as well as people interested in the nursing profession. In an attempt to identify the needs of users, this study conducted an analysis of the contents on the total consultation page. Many readers voted that responses to nursing techniques and symptoms questions proved instrumental in their queries. Based on the results of this study, we can conclude that this is an easy-to-access, convenient site for getting health information about physical symptoms and nursing techniques.

  20. Value-centric design architecture based on analysis of space system characteristics

    Science.gov (United States)

    Xu, Q.; Hollingsworth, P.; Smith, K.

    2018-03-01

    Emerging design concepts such as miniaturisation, modularity, and standardisation, have contributed to the rapid development of small and inexpensive platforms, particularly cubesats. This has been stimulating an upcoming revolution in space design and development, leading satellites into the era of "smaller, faster, and cheaper". However, the current requirement-centric design philosophy, focused on bespoke monolithic systems, along with the associated development and production process does not inherently fit with the innovative modular, standardised, and mass-produced technologies. This paper presents a new categorisation, characterisation, and value-centric design architecture to address this need for both traditional and novel system designs. Based on the categorisation of system configurations, a characterisation of space systems, comprised of duplication, fractionation, and derivation, is proposed to capture the overall system configuration characteristics and promote potential hybrid designs. Complying with the definitions of the system characterisation, mathematical mapping relations between the system characterisation and the system properties are described to establish the mathematical foundation of the proposed value-centric design methodology. To illustrate the methodology, subsystem reliability relationships are therefore analysed to explore potential system configurations in the design space. The results of the applications of system characteristic analysis clearly show that the effects of different configuration characteristics on the system properties can be effectively analysed and evaluated, enabling the optimization of system configurations.

  1. 7 CFR 1221.16 - Net market price.

    Science.gov (United States)

    2010-01-01

    ... AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF AGRICULTURE SORGHUM PROMOTION, RESEARCH, AND INFORMATION ORDER Sorghum Promotion, Research, and Information Order Definitions § 1221.16 Net market price. Net market price means the sales price, or other value, per volumetric unit, received by a producer...

  2. Using declarative workflow languages to develop process-centric web applications

    NARCIS (Netherlands)

    Bernardi, M.L.; Cimitile, M.; Di Lucca, G.A.; Maggi, F.M.

    2012-01-01

    Nowadays, process-centric Web Applications (WAs) are extensively used in contexts where multi-user, coordinated work is required. Recently, Model Driven Engineering (MDE) techniques have been investigated for the development of this kind of applications. However, there are still some open issues.

  3. 77 FR 54367 - Sharing Information Between the Department of Veterans Affairs and the Department of Defense

    Science.gov (United States)

    2012-09-05

    ... DEPARTMENT OF VETERANS AFFAIRS 38 CFR Part 1 RIN 2900-AN95 Sharing Information Between the...) regulatory restriction on the sharing of certain medical information with the Department of Defense (DoD... economy of $100 million or more or adversely affect in a material way the economy, a sector of the economy...

  4. Patient portal readiness among postpartum patients in a safety net setting.

    Science.gov (United States)

    Wieland, Daryl; Gibeau, Anne; Dewey, Caitlin; Roshto, Melanie; Frankel, Hilary

    2017-07-05

    Maternity patients interact with the healthcare system over an approximately ten-month interval, requiring multiple visits, acquiring pregnancy-specific education, and sharing health information among providers. Many features of a web-based patient portal could help pregnant women manage their interactions with the healthcare system; however, it is unclear whether pregnant women in safety-net settings have the resources, skills or interest required for portal adoption. In this study of postpartum patients in a safety net hospital, we aimed to: (1) determine if patients have the technical resources and skills to access a portal, (2) gain insight into their interest in health information, and (3) identify the perceived utility of portal features and potential barriers to adoption. We developed a structured questionnaire to collect demographics from postpartum patients and measure use of technology and the internet, self-reported literacy, interest in health information, awareness of portal functions, and perceived barriers to use. The questionnaire was administered in person to women in an inpatient setting. Of the 100 participants surveyed, 95% reported routine internet use and 56% used it to search for health information. Most participants had never heard of a patient portal, yet 92% believed that the portal functions were important. The two most appealing functions were to check results and manage appointments. Most participants in this study have the required resources such as a device and familiarity with the internet to access a patient portal including an interest in interacting with a healthcare institution via electronic means. Pregnancy is a critical episode of care where active engagement with the healthcare system can influence outcomes. Healthcare systems and portal developers should consider ways to tailor a portal to address the specific health needs of a maternity population including those in a safety net setting.

  5. Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking

    Directory of Open Access Journals (Sweden)

    Rong Ma

    2017-01-01

    Full Text Available Content Centric Networking (CCN is an effective communication paradigm that well matches the features of wireless environments. To be considered a viable candidate in the emerging wireless networks, despite the clear benefits of location-independent security, CCN must at least have parity with existing solutions for confidential and anonymous communication. This paper designs a new cryptographic scheme, called Asymmetric Index Encapsulation (AIE, that enables the router to test whether an encapsulated header matches the token without learning anything else about both of them. We suggest using the AIE as the core protocol of anonymous Content Centric Networking. A construction of AIE which strikes a balance between efficiency and security is given. The scheme is proved to be secure based on the DBDH assumption in the random oracle with tight reduction, while the encapsulated header and the token in our system consist of only three elements.

  6. Device-Centric Monitoring for Mobile Device Management

    OpenAIRE

    Chircop, Luke; Colombo, Christian; Pace, Gordon J.

    2016-01-01

    The ubiquity of computing devices has led to an increased need to ensure not only that the applications deployed on them are correct with respect to their specifications, but also that the devices are used in an appropriate manner, especially in situations where the device is provided by a party other than the actual user. Much work which has been done on runtime verification for mobile devices and operating systems is mostly application-centric, resulting in global, device-centri...

  7. Vertical Cost-Information Sharing in a Food Supply Chain with Multiple Unreliable Suppliers and Two Manufacturers

    Directory of Open Access Journals (Sweden)

    Junjian Wu

    2017-01-01

    Full Text Available This paper considers a food supply chain where multiple suppliers provide completely substitutable food products to two manufacturers. Meanwhile, the suppliers face yield uncertainty and the manufacturers face uncertain production costs that are private information. While the suppliers compete on price, the manufacturers compete on quantity. We build a stylized multistage game theoretic model to analyze the issue of vertical cost-information sharing (VCIS within the supply chain by considering key parameters, including the level of yield uncertainty, two manufacturers’ cost correlation, the correlated coefficient of suppliers’ yield processes, and the number of suppliers. We study the suppliers’ optimal wholesale price and the manufacturers’ optimal order quantities under different VCIS strategies. Finally, through numerical analyses, we examine how key parameters affect the value of VCIS to each supplier and each manufacturer, respectively. We found that the manufacturers are willing to share cost information with suppliers only when the two manufacturers’ cost correlation is less than a threshold. While a high correlated coefficient of suppliers’ yield processes and a large number of suppliers promote complete information sharing, a high level of yield uncertainty hinders complete information sharing. All these findings have important implications to industry practices.

  8. A lake-centric geospatial database to guide research and inform management decisions in an Arctic watershed in northern Alaska experiencing climate and land-use changes

    Science.gov (United States)

    Jones, Benjamin M.; Arp, Christopher D.; Whitman, Matthew S.; Nigro, Debora A.; Nitze, Ingmar; Beaver, John; Gadeke, Anne; Zuck, Callie; Liljedahl, Anna K.; Daanen, Ronald; Torvinen, Eric; Fritz, Stacey; Grosse, Guido

    2017-01-01

    Lakes are dominant and diverse landscape features in the Arctic, but conventional land cover classification schemes typically map them as a single uniform class. Here, we present a detailed lake-centric geospatial database for an Arctic watershed in northern Alaska. We developed a GIS dataset consisting of 4362 lakes that provides information on lake morphometry, hydrologic connectivity, surface area dynamics, surrounding terrestrial ecotypes, and other important conditions describing Arctic lakes. Analyzing the geospatial database relative to fish and bird survey data shows relations to lake depth and hydrologic connectivity, which are being used to guide research and aid in the management of aquatic resources in the National Petroleum Reserve in Alaska. Further development of similar geospatial databases is needed to better understand and plan for the impacts of ongoing climate and land-use changes occurring across lake-rich landscapes in the Arctic.

  9. 78 FR 52962 - 60-Day Notice of Proposed Information Collection: Housing Finance Agency Risk-Sharing Program

    Science.gov (United States)

    2013-08-27

    ... Information Collection: Housing Finance Agency Risk-Sharing Program AGENCY: Office of the Assistant Secretary... Finance Agency Risk- Sharing Program. OMB Approval Number: 2502-0500. Type of Request (i.e. new, revision... Secretary to implement risk sharing with State and local housing finance agencies (HFAs). Under this program...

  10. NET SALARY ADJUSTMENT

    CERN Multimedia

    Finance Division

    2001-01-01

    On 15 June 2001 the Council approved the correction of the discrepancy identified in the net salary adjustment implemented on 1st January 2001 by retroactively increasing the scale of basic salaries to achieve the 2.8% average net salary adjustment approved in December 2000. We should like to inform you that the corresponding adjustment will be made to your July salary. Full details of the retroactive adjustments will consequently be shown on your pay slip.

  11. DCOS, a Real-Time Light-weight Data Centric Operating System

    NARCIS (Netherlands)

    Hofmeijer, T.J.; Dulman, S.O.; Jansen, P.G.; Havinga, Paul J.M.; Sahni, S.

    2004-01-01

    DCOS is a Data Centric lightweight Operating System for embedded devices. Despite limited energy and hardware resources, it supports a data driven architecture with provisions for dynamic loadable Modules. It combines these with Real-Time provisions based on Earliest Deadline First with a simple but

  12. DCOS, a real-time light-weight Data Centric Operating System

    NARCIS (Netherlands)

    Hofmeijer, T.J.; Dulman, S.O.; Jansen, P.G.; Havinga, Paul J.M.

    2004-01-01

    DCOS is a Data Centric lightweight Operating System for embedded devices. Despite limited energy and hardware resources, it supports a data driven architecture with provisions for dynamic loadable Modules. It combines these with Real-Time provisions based on Earliest Deadline First with a simple but

  13. A distributed authentication and authorization scheme for in-network big data sharing

    Directory of Open Access Journals (Sweden)

    Ruidong Li

    2017-11-01

    Full Text Available Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN is an emerging approach to satisfy this demand, where big data is cached ubiquitously in the network and retrieved using data names. However, existing authentication and authorization schemes rely mostly on centralized servers to provide certification and mediation services for data retrieval. This causes considerable traffic overhead for the secure distributed sharing of data. To solve this problem, we employ identity-based cryptography (IBC to propose a Distributed Authentication and Authorization Scheme (DAAS, where an identity-based signature (IBS is used to achieve distributed verifications of the identities of publishers and users. Moreover, Ciphertext-Policy Attribute-based encryption (CP-ABE is used to enable the distributed and fine-grained authorization. DAAS consists of three phases: initialization, secure data publication, and secure data retrieval, which seamlessly integrate authentication and authorization with the interest/data communication paradigm in ICN. In particular, we propose trustworthy registration and Network Operator and Authority Manifest (NOAM dissemination to provide initial secure registration and enable efficient authentication for global data retrieval. Meanwhile, Attribute Manifest (AM distribution coupled with automatic attribute update is proposed to reduce the cost of attribute retrieval. We examine the performance of the proposed DAAS, which shows that it can achieve a lower bandwidth cost than existing schemes.

  14. Public Trust in Health Information Sharing: Implications for Biobanking and Electronic Health Record Systems

    Directory of Open Access Journals (Sweden)

    Jodyn Platt

    2015-02-01

    Full Text Available Biobanks are made all the more valuable when the biological samples they hold can be linked to health information collected in research, electronic health records, or public health practice. Public trust in such systems that share health information for research and health care practice is understudied. Our research examines characteristics of the general public that predict trust in a health system that includes researchers, health care providers, insurance companies and public health departments. We created a 119-item survey of predictors and attributes of system trust and fielded it using Amazon’s MTurk system (n = 447. We found that seeing one’s primary care provider, having a favorable view of data sharing and believing that data sharing will improve the quality of health care, as well as psychosocial factors (altruism and generalized trust were positively and significantly associated with system trust. As expected, privacy concern, but counterintuitively, knowledge about health information sharing were negatively associated with system trust. We conclude that, in order to assure the public’s trust, policy makers charged with setting best practices for governance of biobanks and access to electronic health records should leverage critical access points to engage a diverse public in joint decision making.

  15. Supporting the Maritime Information Dominance: Optimizing Tactical Network for Biometric Data Sharing in Maritime Interdiction Operations

    Science.gov (United States)

    2015-03-01

    biometric data collection. Capture role- player mock biometric data including finger prints, iris scans, and facial recognition photos. (MOC training...MARITIME INFORMATION DOMINANCE: OPTIMIZING TACTICAL NETWORK FOR BIOMETRIC DATA SHARING IN MARITIME INTERDICTION OPERATIONS by Adam R. Sinsel...MARITIME INFORMATION DOMINANCE: OPTIMIZING TACTICAL NETWORK FOR BIOMETRIC DATA SHARING IN MARITIME INTERDICTION OPERATIONS 6. AUTHOR(S) Adam R

  16. User-centric incentive design for participatory mobile phone sensing

    Science.gov (United States)

    Gao, Wei; Lu, Haoyang

    2014-05-01

    Mobile phone sensing is a critical underpinning of pervasive mobile computing, and is one of the key factors for improving people's quality of life in modern society via collective utilization of the on-board sensing capabilities of people's smartphones. The increasing demands for sensing services and ambient awareness in mobile environments highlight the necessity of active participation of individual mobile users in sensing tasks. User incentives for such participation have been continuously offered from an application-centric perspective, i.e., as payments from the sensing server, to compensate users' sensing costs. These payments, however, are manipulated to maximize the benefits of the sensing server, ignoring the runtime flexibility and benefits of participating users. This paper presents a novel framework of user-centric incentive design, and develops a universal sensing platform which translates heterogenous sensing tasks to a generic sensing plan specifying the task-independent requirements of sensing performance. We use this sensing plan as input to reduce three categories of sensing costs, which together cover the possible sources hindering users' participation in sensing.

  17. Quantum information theoretical analysis of various constructions for quantum secret sharing

    NARCIS (Netherlands)

    Rietjens, K.P.T.; Schoenmakers, B.; Tuyls, P.T.

    2005-01-01

    Recently, an information theoretical model for quantum secret sharing (QSS) schemes was introduced. By using this model, we prove that pure state quantum threshold schemes (QTS) can be constructed from quantum MDS codes and vice versa. In particular, we consider stabilizer codes and give a

  18. Knowledge sharing among workers: a study on their contribution through informal communication in Cyberjaya, Malaysia

    Directory of Open Access Journals (Sweden)

    Norizzati Azudin

    2009-06-01

    Full Text Available Malaysia, being a multi-racial society, faces the challenges of creating knowledge sharing capability in organisations, as cultural values are often reflected in the workplace by individual employees. For organisations, it is not clear whether this diversity has resulted in any form of competitive advantage. Studies have shown that various communities in Malaysia do not bring their respective cultures to work, and as such the company values prevail. This research is based on the demographic study of Informal Knowledge Sharing in Cyberjaya, Selangor, Malaysia. After twelve years, Cyberjaya is approximately 25% developed, gradually expanding with the establishment of multinational and international organizations. Several flagship applications have been developed in MSC Malaysia to accelerate its growth. However, the expertise and knowledge shared among the workers are doubtful, especially at its initial growth stage. As Knowledge Management (KM developed, Communities of Practice (Wenger, 1998 became popular, even dominant „KM‟ intervention. Soon it was supplemented with story-telling interventions encouraging knowledge workers to use stories to „sell‟ KM internally, share knowledge and facilitate collaboration. This study will focus on knowledge sharing among workers, particularly the approach used to share knowledge through informal communication outside their organizations.

  19. The use of information technologies for knowledge sharing by secondary healthcare organisations in New Zealand.

    Science.gov (United States)

    Ali, Nor'ashikin; Whiddett, Dick; Tretiakov, Alexei; Hunter, Inga

    2012-07-01

    To explore the extent of use of information technologies (ITs) for knowledge sharing by secondary healthcare organisations in New Zealand. We used a self-administered questionnaire to survey Chief Information Officers at all 21 of New Zealand's District Health Boards regarding the extent to which their organisations use knowledge sharing activities involving ITs. The list of activities to include in the questionnaire was compiled by reviewing the literature. We analysed the extent of use of the knowledge sharing activities using descriptive statistics, repeated measures ANOVA, and correlation analysis. The response rate was 76%. Although all the responding organisations reported using ITs to share knowledge, they used ITs to share documents significantly more than to support discussions or to connect employees to experts. Discussions via teleconferencing, videoconferencing, and email lists were significantly more common than discussions via social media technologies: electronic discussion forums, blogs, and on-line chatrooms. There were significant positive correlations between publishing and accessing documents, between using teleconferencing and using videoconferencing, and between publishing and finding contact details of experts. New Zealand's District Health Boards are using a range of ITs to share knowledge. Knowledge sharing activities emphasising the sharing of explicit knowledge (via exchanging documents in electronic form) are significantly more common than knowledge sharing activities emphasising the sharing of tacit knowledge (via technology-mediated discussions and via using technology to connect employees to experts). In view of the evidence in the literature that information technology may be highly effective in supporting tacit knowledge exchanges, our results suggest that health organisations should consider greater adoption of ITs for sharing tacit knowledge. The finding that several organisations are currently making extensive use of

  20. 17 CFR 248.12 - Limits on sharing account number information for marketing purposes.

    Science.gov (United States)

    2010-04-01

    ... account number information for marketing purposes. (a) General prohibition on disclosure of account... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Limits on sharing account number information for marketing purposes. 248.12 Section 248.12 Commodity and Securities Exchanges...

  1. A NEW PARADIGM FOR INDIAN SUPERMARKET RETAILERS BASED ON CUSTOMER-CENTRIC STRATEGIC APPROACH

    Directory of Open Access Journals (Sweden)

    Seema S. Shenoy

    2011-12-01

    Full Text Available Supermarket retailers in India admist fierce competition and the only way out is through the attainment of competitive advantage. Strategy is the route to attain competitive advantage that could facilitate firms attain superior performance. The objective of this paper is to develop a conceptual framework on customer-centric retail strategy, to facilitate supermarket retailers in India attain competitive advantage. The paper draws heavily from existing literature on retail strategies and competitive advantage in order to ascertain the most effective customer-centric strategies. Adding strength to the research is the result derived from interviews of supermarket managers and customers; and also the results of pilot study .The work involves identification of constructs and research hypothesis for the proposed framework. The framework contributes to literature by emphasizing on not just effective customer-centric strategies but also, on specific performance outcomes that supermarket retailers could be enjoying riding on these strategies. A new dimension to attainment of competitive advantage and superior performance has definitely been recognized by this research effort. Supermarket retailers in India can be certain of attaining competitive advantage by riding on the proposed strategies.

  2. Combining Vertex-centric Graph Processing with SPARQL for Large-scale RDF Data Analytics

    KAUST Repository

    Abdelaziz, Ibrahim

    2017-06-27

    Modern applications, such as drug repositioning, require sophisticated analytics on RDF graphs that combine structural queries with generic graph computations. Existing systems support either declarative SPARQL queries, or generic graph processing, but not both. We bridge the gap by introducing Spartex, a versatile framework for complex RDF analytics. Spartex extends SPARQL to support programs that combine seamlessly generic graph algorithms (e.g., PageRank, Shortest Paths, etc.) with SPARQL queries. Spartex builds on existing vertex-centric graph processing frameworks, such as Graphlab or Pregel. It implements a generic SPARQL operator as a vertex-centric program that interprets SPARQL queries and executes them efficiently using a built-in optimizer. In addition, any graph algorithm implemented in the underlying vertex-centric framework, can be executed in Spartex. We present various scenarios where our framework simplifies significantly the implementation of complex RDF data analytics programs. We demonstrate that Spartex scales to datasets with billions of edges, and show that our core SPARQL engine is at least as fast as the state-of-the-art specialized RDF engines. For complex analytical tasks that combine generic graph processing with SPARQL, Spartex is at least an order of magnitude faster than existing alternatives.

  3. The Impact of Corporate Reputation and Information Sharing on Value Creation for Organizational Customers

    Directory of Open Access Journals (Sweden)

    Žabkar Vesna

    2014-11-01

    Full Text Available The importance of corporate communication to build, protect and maintain corporate reputation has been advocated in numerous publications in recent years. The main goal of this paper is to provide an understanding of the impact of corporate reputation and information sharing on value creation. Both reputation and information sharing represent signals that customers observe in the process of value creation, which is seen as the end focus for corporate marketing. The paper draws on signaling theory and corporate marketing literature from the European and American schools of thought.

  4. Detection of unknown primary neuroendocrine tumours (CUP-NET) using 68Ga-DOTA-NOC receptor PET/CT

    International Nuclear Information System (INIS)

    Prasad, Vikas; Baum, Richard P.; Ambrosini, Valentina; Fanti, Stefano; Hommann, Merten; Hoersch, Dieter

    2010-01-01

    This bi-centric study aimed to determine the role of receptor PET/CT using 68 Ga-DOTA-NOC in the detection of undiagnosed primary sites of neuroendocrine tumours (NETs) and to understand the molecular behaviour of the primarily undiagnosed tumours. Overall 59 patients (33 men and 26 women, age: 65 ± 9 years) with documented NET and unknown primary were enrolled. PET/CT was performed after injection of approximately 100 MBq (46-260 MBq) of 68 Ga-DOTA-NOC. The maximum standardised uptake values (SUV max ) were calculated and compared with SUV max in known pancreatic NET (pNET) and ileum/jejunum/duodenum (SI-NET). The results of PET/CT were also correlated with CT alone. In 35 of 59 patients (59%), 68 Ga-DOTA-NOC PET/CT localised the site of the primary: ileum/jejunum (14), pancreas (16), rectum/colon (2), lungs (2) and paraganglioma (1). CT alone (on retrospective analyses) confirmed the findings in 12 of 59 patients (20%). The mean SUV max of identified previously unknown pNET and SI-NET were 18.6 ± 9.8 (range: 7.8-34.8) and 9.1 ± 6.0 (range: 4.2-27.8), respectively. SUV max in patients with previously known pNET and SI-NET were 26.1 ± 14.5 (range: 8.7-42.4) and 11.3 ± 3.7 (range: 5.6-17.9). The SUV max of the unknown pNET and SI-NET were significantly lower (p 68 Ga-DOTA-NOC receptor PET/CT, 6 of 59 patients were operated and the primary was removed (4 pancreatic, 1 ileal and 1 rectal tumour) resulting in a management change in approximately 10% of the patients. In the remaining 29 patients, because of the far advanced stage of the disease (due to distant metastases), the primary tumours were not operated. Additional histopathological sampling was available from one patient with bronchial carcinoid (through bronchoscopy). Our data indicate that 68 Ga-DOTA-NOC PET/CT is highly superior to 111 In-OctreoScan (39% detection rate for CUP according to the literature) and can play a major role in the management of patients with CUP-NET. (orig.)

  5. User Location Identification for Cooperative Human-Centric Sensing (HCS) Scenario

    DEFF Research Database (Denmark)

    Mihovska, Albena Dimitrova

    – Human-Centric Sensing (HCS) is a newly emerged concept in the context of the Internet of Things (IoT) and the active and assisted living (AAL) scenario. HCS connectivity, also referred to as “smart connectivity” enables applications that are highly personalized and often time...

  6. Enabling conformity to international standards within SeaDataNet

    Science.gov (United States)

    Schaap, Dick M. A.; Boldrini, Enrico; de Korte, Arjen; Santoro, Mattia; Manzella, Giuseppe; Nativi, Stefano

    2010-05-01

    SeaDataNet objective is to construct a standardized system for managing the large and diverse data sets collected by the oceanographic fleets and the new automatic observation systems. The aim is to network and enhance the currently existing infrastructures, which are the national oceanographic data centres and satellite data centres of 36 countries, active in data collection. The networking of these professional data centres, in a unique virtual data management system will provide integrated data sets of standardized quality on-line. The Common Data Index (CDI) is the middleware service adopted by SeaDataNet for discovery and access of the available data. In order to develop an interoperable and effective system, the use of international de facto and de jure standards is required. In particular the new goal object of this presentation is to introduce and discuss the solutions for making SeaDataNet compliant with the European Union (EU) INSPIRE directive and in particular with its Implementing Rules (IR). The European INSPIRE directive aims to rule the creation of an European Spatial Data Infrastructure (ESDI). This will enable the sharing of environmental spatial information among public sector organisations and better facilitate public access to spatial information across Europe. To ensure that the spatial data infrastructures of the European Member States are compatible and usable in a community and transboundary context, the directive requires that common IRs are adopted in a number of specific areas (Metadata, Data Specifications, Network Services, Data and Service Sharing and Monitoring and Reporting). Often the use of already approved digital geographic information standards is mandated, drawing from international organizations like the Open Geospatial Consortium (OGC) and the International Organization for Standardization (ISO), the latter by means of its Technical Committee 211 (ISO/TC 211). In the context of geographic data discovery a set of mandatory

  7. Applied data-centric social sciences concepts, data, computation, and theory

    CERN Document Server

    Sato, Aki-Hiro

    2014-01-01

    Applied data-centric social sciences aim to develop both methodology and practical applications of various fields of social sciences and businesses with rich data. Specifically, in the social sciences, a vast amount of data on human activities may be useful for understanding collective human nature. In this book, the author introduces several mathematical techniques for handling a huge volume of data and analysing collective human behaviour. The book is constructed from data-oriented investigation, with mathematical methods and expressions used for dealing with data for several specific problems. The fundamental philosophy underlying the book is that both mathematical and physical concepts are determined by the purposes of data analysis. This philosophy is shown throughout exemplar studies of several fields in socio-economic systems. From a data-centric point of view, the author proposes a concept that may change people’s minds and cause them to start thinking from the basis of data. Several goals underlie ...

  8. PoliNet and Information Utilities: Using Telecommunications in Political Science and Public Administration Education and Research.

    Science.gov (United States)

    Vasu, Michael L.; Garson, G. David

    General information utilities and specialized networks, such as PoliNet, provide educators and researchers in public administration and allied fields with a diversity of new tools which include: (1) bibliographic searching; (2) international teleconferencing; (3) electronic news clipping services; (4) electronic mail; and (5) free public domain…

  9. An Approach to Modelling the Effects of Network Centricity in Maritime Warfare

    National Research Council Canada - National Science Library

    Fewell, Matthew; Grivell, Ian

    2003-01-01

    Partial context: TTCP MAR AG-1 Quantitative modelling of NCW, Outline, TACSITS and hypotheses, Maritime interception a coastline of recent interest, Platform-Centric Case Interceptors have an area of responsibility...

  10. User Centric Job Monitoring – a redesign and novel approach in the STAR experiment

    International Nuclear Information System (INIS)

    Arkhipkin, D; Lauret, J; Zulkarneeva, Y

    2014-01-01

    User Centric Monitoring (or UCM) has been a long awaited feature in STAR, whereas programs, workflows and system 'events' could be logged, broadcast and later analyzed. UCM allows to collect and filter available job monitoring information from various resources and present it to users in a user-centric view rather than an administrative-centric point of view. The first attempt and implementation of 'a' UCM approach was made in STAR 2004 using a log4cxx plug-in back-end and then further evolved with an attempt to push toward a scalable database back-end (2006) and finally using a Web-Service approach (2010, CSW4DB SBIR). The latest showed to be incomplete and not addressing the evolving needs of the experiment where streamlined messages for online (data acquisition) purposes as well as the continuous support for the data mining needs and event analysis need to coexists and unified in a seamless approach. The code also revealed to be hardly maintainable. This paper presents the next evolutionary step of the UCM toolkit, a redesign and redirection of our latest attempt acknowledging and integrating recent technologies and a simpler, maintainable and yet scalable manner. The extended version of the job logging package is built upon three-tier approach based on Task, Job and Event, and features a Web-Service based logging API, a responsive AJAX-powered user interface, and a database back-end relying on MongoDB, which is uniquely suited for STAR needs. In addition, we present details of integration of this logging package with the STAR offline and online software frameworks. Leveraging on the reported experience and work from the ATLAS and CMS experience on using the ESPER engine, we discuss and show how such approach has been implemented in STAR for meta-data event triggering stream processing and filtering. An ESPER based solution seems to fit well into the online data acquisition system where many systems are monitored.

  11. “THE NET MONETARY STATEMENT” AND “THE NET NON-MONETARY STATEMENT” – ASSESSMENT INDICATORS FOR THE FINANCIAL POSITION OF THE ENTITY

    Directory of Open Access Journals (Sweden)

    SORIN-CONSTANTIN DEACONU

    2012-10-01

    Full Text Available This paper examines two indicators, namely the net monetary statement and the net non-monetary statement. To determine and analyze them, we started with the classification of assets (monetary and non-monetary and liabilities (monetary and nonmonetary. The actual values of these elements were established on the basis of information supplied by the balance sheet, followed by the calculus of the net monetary statement and of the net non-monetary statement. These indicators provide relevant and reliable information to the users of financial statements and, in the future, they should be taken into account because they bring additional information about the financial position of the entity.

  12. Information sharing and organizational knowledge production in two Finnish firms: an exploration using activity theory

    Directory of Open Access Journals (Sweden)

    Gunilla Widén-Wulff

    2007-01-01

    Full Text Available Introduction. In this paper, we discuss the link between information sharing and organizational knowledge production in two very different organizations - a company that handles insurance claims and a small entrepreneurial hi-tech company. We suggest that this link has not been adequately addressed by studies of information behaviour, though a number of recent papers (e.g. Wilson, 2005; Bartlett and Toms, 2005 have proposed that human information behaviour research should appropriate methods from workplace studies and CSCW to provide a richer account of organizational information and knowledge work. Method. Two case studies of sharing practices in Finnish firms were carried out. Analysis. The version of activity theory that has been developed by Engeström (1999 and other Finnish researchers (Kuutti, 1996 was used to analyse the data. This has provided highly specific accounts of information sharing as a constituent of the varied processes that contribute to the development of organizational knowledge. Results. The overall analysis has allowed us to explain how and why organizational information sharing happens in terms that go beyond the cognitive and descriptive accounts (e.g. Widen-Wulff and Ginman, 2004; Widen-Wulff and Davenport, 2005; ; Widen-Wulff, 2006 of our earlier studies. Conclusion. . Information behaviour is a repertoire of actions and operations and judgements about timing and ethics that are brought into play across work cycles and routines. From this perspective, the duality of organizational knowledge becomes clear: it is both individual and collective judgements about how to behave, and the incremental outcome of these judgements, embedded in decisions that support the objects of activity systems.

  13. Leveraging Service Oriented Architecture to Enhance Information Sharing for Surface Transportation Security

    National Research Council Canada - National Science Library

    Chatterjee, Ash

    2008-01-01

    .... These were analyzed to identify gaps in information sharing practices and technology. Requirements for the architecture were established to close the gaps, accounting for the variability in size, capability, risk and ownership characteristics of MTS...

  14. Look Who's Talking. Explaining Water-Related Information Sharing and Demand for Action Among Ugandan Villagers

    Science.gov (United States)

    Holvoet, Nathalie; Dewachter, Sara; Molenaers, Nadia

    2016-11-01

    Many national water policies propagate community-based participatory approaches to overcome weaknesses in supply-driven rural water provision, operation, and maintenance. Citizen involvement is thought to stimulate bottom-up accountability and broaden the information base, which may enrich design and implementation processes and foster improved water accessibility and sustainability. Practices on the ground, however, are embedded in socio-political realities which mediate possible beneficial effects of participatory approaches. This paper builds on full social network data collected in a Ugandan village to study the social and political reality of two distinct levels of participation, i.e. local information sharing among citizens and a more active appeal to fellow citizens to improve water services. We use Logistic Regression Quadratic Assignment Procedure to explore what type of actor and network traits influence information sharing and whether the same factors are in play in the demand for action to remedy water-related problems. Whereas social aspects (social support relations) and homophily (using the same water source, the same gender) play an important role in information sharing, it is the educational level, in particular, of the villager who is called upon that is important when villagers demand action. Our findings also demonstrate that those most in need of safe water do not mobilize their information sharing ties to demand for action. This indicates that building local water policies and practice exclusively on locally existing demand for action may fail to capture the needs of the most deprived citizens.

  15. Views on health information sharing and privacy from primary care practices using electronic medical records.

    Science.gov (United States)

    Perera, Gihan; Holbrook, Anne; Thabane, Lehana; Foster, Gary; Willison, Donald J

    2011-02-01

    To determine how patients and physicians balance the perceived benefits and harms of sharing electronic health data for patient care and for secondary purposes. Before-after survey of patients and providers in practices using electronic medical records (EMRs) enrolled in a clinical trial in Ontario, Canada. Outcomes were measured using the Health Information Privacy Questionnaire (HIPQ) at baseline and end of study. Thirteen questions in 4 general domains investigated attitudes towards the privacy of EMRs, outsider's use of patient's health information, the sharing of patient's information within the health care system, and the overall perception of benefits versus harms of computerization in health care. 511 patients (mean age 60.3 years, 49.6% female) and 46 physicians (mean age 47.2 years, 37.0% female) participated. Most (>90%) supported the computerized sharing of the patient's health records among their health care professionals and to provide clinical advice. Fewer agreed that the patient's de-identified information should be shared outside of the health care circle (records can be keep more private than paper records (38-50%). Overall, a majority (58% patients, 70% physicians) believed that the benefits of computerization were greater than the risks of confidentiality loss. This was especially true for patients who were frequent computer users. While these primary care physicians and their patients valued the clinical features of EMRs, a substantial minority have concerns about the secondary use of de-identified information. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  16. Facebook for Health Promotion: Female College Students' Perspectives on Sharing HPV Vaccine Information Through Facebook.

    Science.gov (United States)

    Zhang, Ni; Tsark, JoAnn; Campo, Shelly; Teti, Michelle

    2015-04-01

    Facebook, a social network site, has been widely used among young adults. However, its potential to be used as a health promotion medium has not been fully examined. This study explored Facebook's potential for sharing human papillomavirus (HPV) vaccine information among female college students in Hawai'i. Culturally tailored flyers and handouts were developed and distributed at one large university in Hawai'i to recruit female college students between the age of 18 and 26 having an active Facebook account. Three focus group meetings were conducted to gather student perspectives about how information about HPV vaccine may be best shared via Facebook. We found that students believed Facebook is a good awareness tool but they needed more knowledge about the HPV vaccine to feel comfortable sharing the information. Participants preferred forwarding information to chatting about HPV. Some participants expressed concern that their Facebook friends would think the HPV vaccine information they forwarded on Facebook is spam. Participants suggested prefacing the posted HPV vaccine information with a personal note in their own words to make the message more interesting and relevant to their Facebook friends. Future interventions using Facebook to promote HPV vaccine could provide students with HPV vaccine information from credible sources and ask students to attach personal testimonials or endorsements while forwarding the information on Facebook.

  17. The Human - Nature Relationship i n t he Context o f Theo - Centric Environmental Ethics

    Directory of Open Access Journals (Sweden)

    Gülşen YAYLI

    2015-07-01

    Full Text Available The environmental problems are one of the issues that intensively occupy the agenda of humankind. This fact mainly derives from the ambiguity of the s pan and the content of the issue. The concept of environmental problems can not be confined to th e soil, air and water pollution for the reason that it covers a scope wider than a classical pollution issues. Initially the form of the relations hip between h uman and nature has been relying on the “consumption at the level of content” which stands for a level that is enough to sustain the living. The perception of the nature used to be described with the metaphor of mother while natural environment was defined as the “mother earth”. However subsequent to natural environment definition of the Cartesian philosophy with its approach to the human nature relationship, the core metaphor to describe the natural environment has changed from the metaphor of “mother” to the “slave” which should serve by any means. The human - nature relationship within the context of ethics, both the parties an d their respective statues bear an importance. In terms of ethics of human - nature relationship, it is possible to mention three main approaches. First one is the anthropo - centric approach. Within the scope of historical process, human - nature relationship is addressed according to anthropo - centric ethics comprehension so human has remained at the center of discussion. Following the change of the perception regarding the issue of environment, new approaches have emerged that give emphasis not only on human beings but also others; on li ving and non - living beings with in the eco - system. In principle, this represents a departure from an anthropo - centric ethics to a new ethic approach which fall s into two categories, bio centric and eco - centric. The theo - centric ethics should also be included to these ethics approaches that are shaped within the sphere of positive sciences. The Abrahamic

  18. Weather-centric rangeland revegetation planning

    Science.gov (United States)

    Hardegree, Stuart P.; Abatzoglou, John T.; Brunson, Mark W.; Germino, Matthew; Hegewisch, Katherine C.; Moffet, Corey A.; Pilliod, David S.; Roundy, Bruce A.; Boehm, Alex R.; Meredith, Gwendwr R.

    2018-01-01

    Invasive annual weeds negatively impact ecosystem services and pose a major conservation threat on semiarid rangelands throughout the western United States. Rehabilitation of these rangelands is challenging due to interannual climate and subseasonal weather variability that impacts seed germination, seedling survival and establishment, annual weed dynamics, wildfire frequency, and soil stability. Rehabilitation and restoration outcomes could be improved by adopting a weather-centric approach that uses the full spectrum of available site-specific weather information from historical observations, seasonal climate forecasts, and climate-change projections. Climate data can be used retrospectively to interpret success or failure of past seedings by describing seasonal and longer-term patterns of environmental variability subsequent to planting. A more detailed evaluation of weather impacts on site conditions may yield more flexible adaptive-management strategies for rangeland restoration and rehabilitation, as well as provide estimates of transition probabilities between desirable and undesirable vegetation states. Skillful seasonal climate forecasts could greatly improve the cost efficiency of management treatments by limiting revegetation activities to time periods where forecasts suggest higher probabilities of successful seedling establishment. Climate-change projections are key to the application of current environmental models for development of mitigation and adaptation strategies and for management practices that require a multidecadal planning horizon. Adoption of new weather technology will require collaboration between land managers and revegetation specialists and modifications to the way we currently plan and conduct rangeland rehabilitation and restoration in the Intermountain West.

  19. Intelligence and Information-Sharing Elements of S.4 and H.R. 1

    National Research Council Canada - National Science Library

    Masse, Todd

    2007-01-01

    Title I of S.4 and Title VII of H.R. 1 include corresponding measures related to enhancing information and intelligence sharing, both horizontally within the Federal Government and vertically between the Federal Government and state...

  20. International Cyber Incident Repository System: Information Sharing on a Global Scale

    Energy Technology Data Exchange (ETDEWEB)

    Joyce, Amanda L.; Evans, PhD, Nathaniel; Tanzman, Edward A.; Israeli, Daniel

    2017-02-02

    According to the 2016 Internet Security Threat Report, the largest number of cyber attacks were recorded last year (2015), reaching a total of 430 million incidents throughout the world. As the number of cyber incidents increases, the need for information and intelligence sharing increases, as well. This fairly large increase in cyber incidents is driving the need for an international cyber incident data reporting system. The goal of the cyber incident reporting system is to make available shared and collected information about cyber events among participating international parties. In its 2014 report, Insurance Industry Working Session Readout Report-Insurance for CyberRelated Critical Infrastructure Loss: Key Issues, on the outcomes of a working session on cyber insurance, the U.S. Department of Homeland Security observed that “many participants cited the need for a secure method through which organizations could pool and share cyber incident information” and noted that one underwriter emphasized the importance of internationally harmonized data taxonomies. This cyber incident data reporting system could benefit all nations that take part in reporting incidents to provide a more common operating picture. In addition, this reporting system could allow for trending and anticipated attacks and could potentially benefit participating members by enabling them to get in front of potential attacks. The purpose of this paper is to identify options for consideration for such a system in fostering cooperative cyber defense.

  1. Information sharing systems and teamwork between sub-teams: a mathematical modeling perspective

    Science.gov (United States)

    Tohidi, Hamid; Namdari, Alireza; Keyser, Thomas K.; Drzymalski, Julie

    2017-12-01

    Teamwork contributes to a considerable improvement in quality and quantity of the ultimate outcome. Collaboration and alliance between team members bring a substantial progress for any business. However, it is imperative to acquire an appropriate team since many factors must be considered in this regard. Team size may represent the effectiveness of a team and it is of paramount importance to determine what the ideal team size exactly should be. In addition, information technology increasingly plays a differentiating role in productivity and adopting appropriate information sharing systems may contribute to improvement in efficiency especially in competitive markets when there are numerous producers that compete with each other. The significance of transmitting information to individuals is inevitable to assure an improvement in team performance. In this paper, a model of teamwork and its organizational structure are presented. Furthermore, a mathematical model is proposed in order to characterize a group of sub-teams according to two criteria: team size and information technology. The effect of information technology on performance of team and sub-teams as well as optimum size of those team and sub-teams from a productivity perspective are studied. Moreover, a quantitative sensitivity analysis is presented in order to analyze the interaction between these two factors through a sharing system.

  2. Preventing Network Centric Overload (End State Education for the Operational Commander/Staff)

    National Research Council Canada - National Science Library

    Beck, John

    2001-01-01

    .... An end state education system must be devised that prepares our senior leaders to operate a newly formed network centric task force with equipment, organizations and theory of use that most likely...

  3. Improving emergency management through shared information processing - considerations in Emergency Operations Center design

    International Nuclear Information System (INIS)

    DeBusk, R.E.; Walker, J.A.

    1987-01-01

    An Emergency Operations Center (EOC) is a shared information processing facility. Although seemingly obvious, many EOCs are designed and operated based on other criteria. The results, measured in terms of response effectiveness, are difficult to determine. A review of some recent disasters reveals a pattern of poor performance for the EOCs involved. These conclusions are tentative because so little research has been done on the design, operation, or evaluation of emergency operations centers. The EOC is not an onsite response command post but a facility removed from the response where tactical and strategic decisions are made based on information from the response site and elsewhere. The EOC is therefore the central focus of emergency information processing and higher-level decision making. Examining existing EOCs, several common functions emerge. These functions can be described in terms of shared information processing. However, many factors impact the design and operation of EOCs. Politics, budgets, and personal ambition are only a few such factors. Examining EOC design and operation in terms of shared information processing operationalized in the seven principal functions within the EOC provides a framework for establishing principles of EOC design and operation. In the response to emergencies such as Bhopal or Chernobyl the stakes are high. Applying new techniques and technologies of management systems can improve the probability of success. This research is a beginning step - to understand how EOCs function, to define the system. Predictive or prescriptive analysis must wait until sufficient empirical data is available to complete a descriptive model for EOC operations

  4. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 3. Network Centric Warfare Insights

    National Research Council Canada - National Science Library

    Tisserand, III, John B

    2003-01-01

    ...), which hypothesizes that a robustly networked force improves information sharing, collaboration, quality of information, and shared situational awareness resulting in significantly increased mission effectiveness...

  5. An Audience-Centric Approach for Museums Sustainability

    Directory of Open Access Journals (Sweden)

    Laura Di Pietro

    2014-08-01

    Full Text Available The main purpose of this study is to propose a visitor centric perspective that can support museums towards sustainability. The main premise of this study is due to a concept of economic and social sustainability of museums, defined as the possession of sufficient resources to maintain the existence of an organization, and achieve their goals in the future, ensuring a certain flow of visitors. A great number of museums are characterized by a low number of visits; therefore, in order to become sustainable, museums should pay attention to audience and its internal diversity. In this way, a cultural site can plan tailored strategies to increase the number of visits and re-visits and to achieve community support. For this reason it is necessary to understand the cultural needs of visitors, acquiring appropriate monitoring tools, such as qualitative and quantitative ones. Generally, quantitative analyses are more reliable and complete, even if they require a considerable number of observations for the reliability of the results. Moreover, qualitative analysis provides more in depth information, even if their data do not allow us to make generalizations. The qualitative and quantitative methods for the detection of satisfaction are usually used separately, but their integration may bring significant added value in terms of the wealth of information. This study follows the analysis of the potential of the integration of qualitative and quantitative analysis techniques customized with respect to different types of targets. The results of the experimentation performed on ethnographic museums shows a consistency of the results obtained by the two different tools that increase the capacity information of survey instruments.

  6. Integrating research, legal technical assistance, and advocacy to inform shared use legislation in Mississippi.

    Science.gov (United States)

    Spengler, John O; Frost, Natasha R; Bryant, Katherine K

    2014-01-01

    The purpose of this article was to describe the process by which research findings informed the successful passage of legislation designed to increase opportunities for physical activity in Mississippi, and discuss implications and lessons learned from this process. The article is descriptive and conceptual, and addresses the collaborative process by which research, legal technical assistance, and advocacy informed and shaped shared use legislation in Mississippi. Collaborators informing this article were an Active Living Research grantee, a staff attorney with the Public Health Law Center, the American Heart Association Mississippi Government Relations Director, and community partners. The American Heart Association and Public Health Law Center developed policy guidance in the form of sample language for legislation as a starting point for states in determining policy needed to eliminate or reduce barriers to the shared use of school recreational facilities. The policy guidance was informed by evidence from Active Living Research-funded research studies. The American Heart Association, supporting a bill shaped by the policy guidance, led the effort to advocate for successful shared use legislation in Mississippi. Research should be policy relevant and properly translated and disseminated. Legal technical assistance should involve collaboration with both researchers and advocates so that policymakers have the information to make evidence-based decisions. Government relations directors should collaborate with legal technical staff to obtain and understand policy guidance relevant to their advocacy efforts. Effective collaborations, with an evidence-based approach, can lead to informed, successful policy change.

  7. ExplaNet: A Collaborative Learning Tool and Hybrid Recommender System for Student-Authored Explanations

    Science.gov (United States)

    Masters, Jessica; Madhyastha, Tara; Shakouri, Ali

    2008-01-01

    ExplaNet is a web-based, anonymous, asynchronous explanation-sharing network. Instructors post questions to the network and students submit explanatory answers. Students then view and rank the explanations submitted by their peers before optionally resubmitting a final and revised answer. Three classroom evaluations of ExplaNet showed that by…

  8. ANALISIS VARIABEL YANG MEMPENGARUHI EARNINGS PER SHARE PADA INDUSTRI FOOD AND BAVERAGES YANG GO PUBLIC DI BURSA EFEK JAKARTA

    Directory of Open Access Journals (Sweden)

    SUTEJO - -

    2012-05-01

    a particular stock is profitable. Information resulted from earnings per share is fundamentally useful for the financial decision made by firms whose stock is listed in the stock exchange. This research aimed at identifying both the simultaneous and partial influence of such variables as: return on equity (X1, net sales (X2, current ratio (X3, debt to equity (X4, inventory turnover (X5, total assets turnover (X6, and net profit margin (X7, on earnings per share. To examine such influence, this research investigated the food and beverages industries listed at the Jakarta Stock Exchange. The sample investigated included: 9 firms of 1992, 15 firms of 1993, 19 firms of 1994, 20 firms for 1995 and 20 firms for 1996. The multiple regression model was then estimated based on the data collected from the firms. Results of this research indicate some important findings. First, such variables as: return on equity (X1, net sales (X2, current ratio (X3, debt to equity (X4, inventory turnover (X5, total assets turnover (X6, and net profit margin (X7, simultaneously influence the variability of earnings per share. Second, among these independent variables, it was only X5 which did not significantly influence the variability of earnings per share. This finding is highly related to the fact that the food and beverages industry in Indonesia, to ensure the supply and quality of raw material purchased, the firm must help the local suppliers with technical assistance and working capital. The industry is to prov ide capital or soft loan to maintain sound and beneficial cooperation. On the other hand, raw material for the food and beverages industry, in practice, is influenced by the successful and fail harvest of suppliers. Finally, as a consequence of the constraints faced by food and beverages industry, lack of raw material is evident in a one period and abundance of raw material is evident in another. Accordingly, high inventory turnover did not indicate the firm’s efficiency. Among

  9. INFORMATION SHARING ACROSS MULTIPLE BUYERS IN A SUPPLY CHAIN

    OpenAIRE

    JIANGHUA WU; ANANTH IYER; PAUL V. PRECKEL; XIN ZHAI

    2012-01-01

    We model the impact of information visibility in a two-level supply chain consisting of independent retailers who share upstream supply. The manufacturer supplies similar products to the two retailers and each retailer serves its independent end market. Retailers face one period of demand and satisfy the demand by ordering in the first period or back-ordering some of the demand and satisfying it in the second period. The wholesale price in the second period is decreasing in the total order si...

  10. System collaboration and Information Sharing through Internet of Things

    OpenAIRE

    Grubisic, Maja; Marsic, Tina

    2015-01-01

    The focus of this thesis is realization of system collaboration and information sharing between devices through Internet of Things. Internet of Things is a network of things, where a thing can be any device capable of acquiring an IP address. Internet of Things has been discussed in many domains. Companies are exploring the full potential of it, with the purpose of automating their services and optimizing their productivity. In this thesis we have conducted a systematic research review to inv...

  11. OptiCentric lathe centering machine

    Science.gov (United States)

    Buß, C.; Heinisch, J.

    2013-09-01

    High precision optics depend on precisely aligned lenses. The shift and tilt of individual lenses as well as the air gap between elements require accuracies in the single micron regime. These accuracies are hard to meet with traditional assembly methods. Instead, lathe centering can be used to machine the mount with respect to the optical axis. Using a diamond turning process, all relevant errors of single mounted lenses can be corrected in one post-machining step. Building on the OptiCentric® and OptiSurf® measurement systems, Trioptics has developed their first lathe centering machines. The machine and specific design elements of the setup will be shown. For example, the machine can be used to turn optics for i-line steppers with highest precision.

  12. Does Mobile Technology Matter? A Student Centric Perspective

    OpenAIRE

    Chen, Wenshin

    2010-01-01

    Based on a student-centric perspective, this study seeks to understand how mobile technology influences students’ learning experiences. Our research motivation is driven by the increasing attention paid to mobile technology in the research and business community. Set in a public university setting, our investigation seeks to shed light on how teaching and learning could be reshaped by mobile technology, most specifically, emerging tablet PCs. The findings, based on two MIS (Management Informa...

  13. Incentive mechanism based on cooperative advertising for cost information sharing in a supply chain with competing retailers

    Science.gov (United States)

    Setak, Mostafa; Kafshian Ahar, Hajar; Alaei, Saeed

    2017-09-01

    This paper proposes a new motivation for information sharing in a decentralized channel consisting of a single manufacturer and two competing retailers. The manufacturer provides a common product to the retailers at the same wholesale price. Both retailers add their own values to the product and distribute it to consumers. Factors such as retail prices, values added to the product, and local advertising of the retailers simultaneously have effect on market demand. Each retailer has full information about the own added value which is unknown to the manufacturer and other retailer. The manufacturer uses a cooperative advertising program for motivating the retailers to disclose their private information. A numerical study is presented to compare different scenarios of information sharing. Computational results show that there is a condition in which full information sharing is beneficial for all members of the supply chain through cooperative advertising program and, therefore, retailers have enough incentive to disclose their cost information to the manufacturer.

  14. Exploring Information Security and Shared Encrypted Spaces in Libraries

    Directory of Open Access Journals (Sweden)

    Keith Engwall

    2015-07-01

    Full Text Available Libraries are sensitive to the need to protect patron data, but may not take measures to protect the data of the library. However, in an increasingly collaborative online environment, the protection of data is a concern that merits attention. As a follow-up to a new patron privacy policy, the Oakland University William Beaumont Medical Library evaluated information security tools for use in day-to-day operations in an attempt to identify ways to protect private information in communication and shared storage, as well as a means to manage passwords in a collaborative team environment. This article provides an overview of encryption measures, outlines the Medical Library’s evaluation of encryption tools, and reflects on the benefits and challenges in their adoption and use.

  15. BioNet Digital Communications Framework

    Science.gov (United States)

    Gifford, Kevin; Kuzminsky, Sebastian; Williams, Shea

    2010-01-01

    BioNet v2 is a peer-to-peer middleware that enables digital communication devices to talk to each other. It provides a software development framework, standardized application, network-transparent device integration services, a flexible messaging model, and network communications for distributed applications. BioNet is an implementation of the Constellation Program Command, Control, Communications and Information (C3I) Interoperability specification, given in CxP 70022-01. The system architecture provides the necessary infrastructure for the integration of heterogeneous wired and wireless sensing and control devices into a unified data system with a standardized application interface, providing plug-and-play operation for hardware and software systems. BioNet v2 features a naming schema for mobility and coarse-grained localization information, data normalization within a network-transparent device driver framework, enabling of network communications to non-IP devices, and fine-grained application control of data subscription band width usage. BioNet directly integrates Disruption Tolerant Networking (DTN) as a communications technology, enabling networked communications with assets that are only intermittently connected including orbiting relay satellites and planetary rover vehicles.

  16. Current Status and Future Prospect of K-NET and KiK-net

    Science.gov (United States)

    Aoi, S.; Kunugi, T.; Suzuki, W.; Nakamura, H.; Fujiwara, H.

    2014-12-01

    During 18 years since the deployment of K-NET following the Kobe earthquake, our attention has mainly focused on rapidity of the data collection and an unfailing and reliable observation. In this presentation, we review three generations of the instruments employed by K-NET and KiK-net from these two points of view.At beginning of the 2000's, we newly developed the second generation instruments (K-NET02, K-NET02A, KiK-net06) to replace the first generation instruments (K-NET95, SMAC-MDK) employed when the networks were constructed in the 1990's. These instruments have an automatic dial-out function. It takes typically 2-5 s to establish communication and a few seconds to send the pre-trigger data. After that, data is available typically within a 1.5 s delay. Not only waveform data but also strong motion indexes such as real-time intensity, PGA, PGV, PGD, and response spectra are continuously sent once a second.After the 2011 Tohoku earthquake, we have developed the third generation instruments (K-NET11, KiK-net11) and have replaced almost half of the all stations country wide. Main improvement of this instrument is more unfailing and reliable observation. Because we have often experienced very large ground motions (e.g. 45 records exceeding gravity), the maximum measureable range was expanded from 2000 gal to 4000 gal for the second generation instrument, and to 8000 gal for the third. For the third generation instrument, in case of power failure, observation (including transmission of data) works for seven days thanks to the backup battery, while for the second generation instruments it works only for one day. By adding an oblique component to the three-component accelerometers, we could automatically distinguish shaking data from noise such as electric pulses which may cause a false alarm in EEW. Implementation to guarantee the continuity of observation under severe conditions such as during the Tohoku earthquake is very important, as well as a highly efficient

  17. Information Professionals’ Knowledge Sharing Practices in Social Media: A Study of Professionals in Developing Countries

    Directory of Open Access Journals (Sweden)

    Anwarul Islam

    2016-12-01

    Full Text Available The primary objective of this study was to investigate the perception of informational professionals’ knowledge sharing practices in social media platforms. The specific objectives of the study included learning professionals’ perceptions and awareness of knowledge sharing using social media, understanding their opinions and beliefs, and gaining familiarity with and reasons for using these tools. Open & close ended web-based questions were sent out by email to the international training program (ITP participants. Findings indicated that most of the respondents’ were aware of using social media and that they used social media for knowledge sharing. Speed and ease of use, managing personal knowledge, easier communication with users and colleagues and powerful communication tool are the areas that motivated them to use it. It also stated some barriers like lack of support, familiarity, trust, unfiltered information and fear of providing information. The study was limited to the perceptual aspect of the issue, specifically from the individuals’ opinions and sentiments.

  18. Factors associated with the practice of nursing staff sharing information about patients' nutritional status with their colleagues in hospitals.

    Science.gov (United States)

    Kawasaki, Y; Tamaura, Y; Akamatsu, R; Sakai, M; Fujiwara, K

    2018-01-01

    Nursing staff have an important role in patients' nutritional care. The aim of this study was to demonstrate how the practice of sharing a patient's nutritional status with colleagues was affected by the nursing staff's attitude, knowledge and their priority to provide nutritional care. The participants were 492 nursing staff. We obtained participants' demographic data, the practice of sharing patients' nutritional information and information about participants' knowledge, attitude and priority of providing nutritional care by the questionnaire. We performed partial correlation analyses and linear regression analyses to describe the relationship between the total scores of the practice of sharing patients' nutritional information based on their knowledge, attitude and priority to provide nutritional care. Among the 492 participants, 396 nursing staff (80.5%) completed the questionnaire and were included in analyses. Mean±s.d. of total score of the 396 participants was 8.4±3.1. Nursing staff shared information when they had a high nutritional knowledge (r=0.36, Pknowledge (β=0.33, Pnutritional care practice was not significantly associated with the practice of sharing information. Knowledge and attitude were independently associated with the practice of sharing patients' nutrition information with colleagues, regardless of their priority to provide nutritional care. An effective approach should be taken to improve the practice of providing nutritional care practice.

  19. Got risk? risk-centric perspective for spacecraft technology decision-making

    Science.gov (United States)

    Feather, Martin S.; Cornford, Steven L.; Moran, Kelly

    2004-01-01

    A risk-based decision-making methodology conceived and developed at JPL and NASA has been used to aid in decision making for spacecraft technology assessment, adoption, development and operation. It takes a risk-centric perspective, through which risks are used as a reasoning step to interpose between mission objectives and risk mitigation measures.

  20. You and me, how (in-)active are we? The potential of sharing physical activity information to increase motivation

    NARCIS (Netherlands)

    Van Wijngaarden, J.; Van Halteren, A.T.

    2009-01-01

    This report describes the theoretical background and development of an application to share physical activity information, as well as the results of a four-week field study in which people shared physical activity information as measured by the Philips Activity Monitor. The existing web-service

  1. SPARTex: A Vertex-Centric Framework for RDF Data Analytics

    KAUST Repository

    Abdelaziz, Ibrahim

    2015-08-31

    A growing number of applications require combining SPARQL queries with generic graph search on RDF data. However, the lack of procedural capabilities in SPARQL makes it inappropriate for graph analytics. Moreover, RDF engines focus on SPARQL query evaluation whereas graph management frameworks perform only generic graph computations. In this work, we bridge the gap by introducing SPARTex, an RDF analytics framework based on the vertex-centric computation model. In SPARTex, user-defined vertex centric programs can be invoked from SPARQL as stored procedures. SPARTex allows the execution of a pipeline of graph algorithms without the need for multiple reads/writes of input data and intermediate results. We use a cost-based optimizer for minimizing the communication cost. SPARTex evaluates queries that combine SPARQL and generic graph computations orders of magnitude faster than existing RDF engines. We demonstrate a real system prototype of SPARTex running on a local cluster using real and synthetic datasets. SPARTex has a real-time graphical user interface that allows the participants to write regular SPARQL queries, use our proposed SPARQL extension to declaratively invoke graph algorithms or combine/pipeline both SPARQL querying and generic graph analytics.

  2. Information-sharing to promote informed choice in prenatal screening in the spirit of the SOGC clinical practice guideline: a proposal for an alternative model.

    Science.gov (United States)

    Vanstone, Meredith; Kinsella, Elizabeth Anne; Nisker, Jeff

    2012-03-01

    The 2011 SOGC clinical practice guideline "Prenatal Screening for Fetal Aneuploidy in Singleton Pregnancies" recommends that clinicians offer prenatal screening to all pregnant women and provide counselling in a non-directive manner. Non-directive counselling is intended to facilitate autonomous decision-making and remove the clinician's views regarding a particular course of action. However, recent research in genetic counselling raises concerns that non-directive counselling is neither possible nor desirable, and that it may not be the best way to facilitate informed choice. We propose an alternative model of information-sharing specific to prenatal screening that combines attributes of the models of informative decision-making and shared decision-making. Our proposed model is intended to provide clinicians with a strategy to communicate information about prenatal screening in a way that facilitates a shared deliberative process and autonomous decision-making. Our proposed model may better prepare a pregnant woman to make an informed choice about participating in prenatal screening on the basis of her consideration of the medical information provided by her clinician and her particular circumstances and values.

  3. Facilitating the Practical Use of Coloured Petri Nets

    DEFF Research Database (Denmark)

    Lindstrøm, Bo

    This dissertation is to investigate and advance tools for practical use of CP-nets. This includes development of facilities for creating domain-specific graphical user interfaces, a proposal for facilities for including auxiliary information in a CP-net without modifying the CP-net itself...

  4. 7 CFR 766.205 - Shared Appreciation Payment Agreement rates and terms.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Shared Appreciation Payment Agreement rates and terms. 766.205 Section 766.205 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN SERVICING-SPECIAL Servicing Shared Appreciation Agreements and Net Recovery...

  5. The effect of a customer-centric approach towards doctors in a private hospital / Mario van der Westhuizen

    OpenAIRE

    Van der Westhuizen, Mario

    2014-01-01

    Globally, trade and industry has shifted its focus from the traditional service delivery approaches to various alternative practices to be more successful, cost efficient, customer orientated, flexible and innovative. This shift in focus has lead to organisations applying a customer centric approach in their business. In order to understand customer centricity, it is necessary to be familiar with the term customer service. Customer service is the offering of services to customers before, d...

  6. Using SharePoint to manage and disseminate fusion project information: An ITER case study

    International Nuclear Information System (INIS)

    Prescott, Barry; Downing, James; Di Maio, Marco; How, John

    2010-01-01

    The ITER Organization, in common with many other fusion laboratories, has an authenticated-access website devoted to the communication of information to all its staff and remote collaborators. In 2007 and 2008, the number of registered users of this site increased by more than a factor of ten, to over 3000 at present, and with approximately 900 unique users using the website per month. In parallel, the project management of the organisation has been put in place. A decision was taken to move the web platform from simple HTML to Microsoft SharePoint and to web-enable the many applications and databases used for ITER management. This decision has been well justified by the power and extensive flexibility provided by SharePoint, for example it permits different groups to publish their own information and to collaborate, and to consolidate disparate spreadsheet data in linked SharePoint lists to improve quality and maintainability. This paper examines the use of SharePoint at ITER: why it was selected and what benefits it brings to both the local and remote ITER community. Some active case studies are presented. The paper also looks ahead at what future benefits to ITER this platform offers, and reviews the type of information that the site can profitably publish. The paper also highlights some of the limitations of the platform, the problems of integration with other ITER systems, and discusses its potential for adaptability in other scientific organisations.

  7. Defence Adademies and Colleges 2009 International Conference. Network Centric Learning: Towards Authentic ePractices, 25 - 27 March 2009

    Science.gov (United States)

    2009-03-27

    Keywords/phrases: Network-Centric Learning; Network-Centric Warfare& Security; student ICT skills; student engagement ; first year experience; faculty...learning policies supportive of strategies that scaffold staff and student engagement in TELT is also critical in an already stressful new environment...Generation ‘Y’ stereotyping for deploying VLE is likely to be problematic in terms of effective student engagement and the targeting of staff development. The

  8. Technology and Research Requirements for Combating Human Trafficking: Enhancing Communication, Analysis, Reporting, and Information Sharing

    Energy Technology Data Exchange (ETDEWEB)

    Kreyling, Sean J.; West, Curtis L.; Olson, Jarrod

    2011-03-17

    DHS’ Science & Technology Directorate directed PNNL to conduct an exploratory study on the domain of human trafficking in the Pacific Northwest in order to examine and identify technology and research requirements for enhancing communication, analysis, reporting, and information sharing – activities that directly support efforts to track, identify, deter, and prosecute human trafficking – including identification of potential national threats from smuggling and trafficking networks. This effort was conducted under the Knowledge Management Technologies Portfolio as part of the Integrated Federal, State, and Local/Regional Information Sharing (RISC) and Collaboration Program.

  9. Request-Centric Wireless Bus Information Management System

    Directory of Open Access Journals (Sweden)

    Ying-Chih Chen

    2016-11-01

    Full Text Available This invention relates to a wireless bus information management system, which includes bus stop and vehicle management subsystems. The management signals are transmittable between bus stops and the vehicle. Based on vehicle management signals, the bus stop management subsystem can obtain information about the bus route identification, the number of unoccupied seats, the intention to stop or not, etc. Similarly, with the bus stop management signals, the vehicle management subsystem can make the decision of stopping. Accordingly, when a passenger wants to get off the vehicle or there are unoccupied seats, the vehicle management subsystem will inform the bus stop management subsystem such that the passengers waiting at the bus stop may flexibly schedule their travel plan. The proposed distributed wireless system is detailed by a prototype implementation and a simulation analysis, which is shown to be feasible and scalable.

  10. Exploring Healthcare Consumer Acceptance of Personal Health Information Management Technology through Personal Health Record Systems

    Science.gov (United States)

    Wu, Huijuan

    2013-01-01

    Healthcare technologies are evolving from a practitioner-centric model to a patient-centric model due to the increasing need for technology that directly serves healthcare consumers, including healthy people and patients. Personal health information management (PHIM) technology is one of the technologies designed to enhance an individual's ability…

  11. AREVA net income: 649 million euros

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-03-15

    This document presents the financial statements for 2006 of Areva group: net income: 649 million euros; backlog up by 24.6% to 25.6 billion euros; steady growth of sales revenue: + 7.3%1 to 10.863 billion euros; operating income of 407 million euros: excellent divisional performance and constitution of a significant provision for the OL3 project in Finland; dividend proposed to Annual General Meeting of Shareholders: 8.46 euros per share.

  12. AREVA net income: 649 million euros

    International Nuclear Information System (INIS)

    2007-03-01

    This document presents the financial statements for 2006 of Areva group: net income: 649 million euros; backlog up by 24.6% to 25.6 billion euros; steady growth of sales revenue: + 7.3%1 to 10.863 billion euros; operating income of 407 million euros: excellent divisional performance and constitution of a significant provision for the OL3 project in Finland; dividend proposed to Annual General Meeting of Shareholders: 8.46 euros per share

  13. Wanna know about vaping? Patterns of message exposure, seeking and sharing information about e-cigarettes across media platforms

    Science.gov (United States)

    Emery, Sherry L; Vera, Lisa; Huang, Jidong; Szczypka, Glen

    2014-01-01

    Background Awareness and use of electronic cigarettes has rapidly grown in the USA recently, in step with increased product marketing. Using responses to a population survey of US adults, we analysed demographic patterns of exposure to, searching for and sharing of e-cigarette-related information across media platforms. Methods An online survey of 17 522 US adults was conducted in 2013. The nationally representative sample was drawn from GfK Group's KnowledgePanel plus off-panel recruitment. Fixed effects logit models were applied to analyse relationships between exposure to, searching for and sharing of e-cigarette-related information and demographic characteristics, e-cigarette and tobacco use, and media behaviours. Results High levels of awareness about e-cigarettes were indicated (86% aware; 47% heard through media channels). Exposure to e-cigarette-related information was associated with tobacco use, age, gender, more education, social media use and time spent online. Although relatively small proportions of the sample had searched for (∼5%) or shared (∼2%) e-cigarette information, our analyses indicated demographic patterns to those behaviours. Gender, high income and using social media were associated with searching for e-cigarette information; lesbian, gay and bisexual and less education were associated with sharing. Current tobacco use, age, being Hispanic and time spent online were associated with both searching and sharing. Conclusions US adults are widely exposed to e-cigarette marketing through the media; such marketing may differentially target specific demographic groups. Further research should longitudinally examine how exposure to, searching for and sharing of e-cigarette information relate to subsequent use of e-cigarettes and/or combustible tobacco. PMID:24935893

  14. Rich internet application system for patient-centric healthcare data management using handheld devices.

    Science.gov (United States)

    Constantinescu, L; Pradana, R; Kim, J; Gong, P; Fulham, Michael; Feng, D

    2009-01-01

    Rich Internet Applications (RIAs) are an emerging software platform that blurs the line between web service and native application, and is a powerful tool for handheld device deployment. By democratizing health data management and widening its availability, this software platform has the potential to revolutionize telemedicine, clinical practice, medical education and information distribution, particularly in rural areas, and to make patient-centric medical computing a reality. In this paper, we propose a telemedicine application that leverages the ability of a mobile RIA platform to transcode, organise and present textual and multimedia data, which are sourced from medical database software. We adopted a web-based approach to communicate, in real-time, with an established hospital information system via a custom RIA. The proposed solution allows communication between handheld devices and a hospital information system for media streaming with support for real-time encryption, on any RIA enabled platform. We demonstrate our prototype's ability to securely and rapidly access, without installation requirements, medical data ranging from simple textual records to multi-slice PET-CT images and maximum intensity (MIP) projections.

  15. RCAS: an RNA centric annotation system for transcriptome-wide regions of interest.

    Science.gov (United States)

    Uyar, Bora; Yusuf, Dilmurat; Wurmus, Ricardo; Rajewsky, Nikolaus; Ohler, Uwe; Akalin, Altuna

    2017-06-02

    In the field of RNA, the technologies for studying the transcriptome have created a tremendous potential for deciphering the puzzles of the RNA biology. Along with the excitement, the unprecedented volume of RNA related omics data is creating great challenges in bioinformatics analyses. Here, we present the RNA Centric Annotation System (RCAS), an R package, which is designed to ease the process of creating gene-centric annotations and analysis for the genomic regions of interest obtained from various RNA-based omics technologies. The design of RCAS is modular, which enables flexible usage and convenient integration with other bioinformatics workflows. RCAS is an R/Bioconductor package but we also created graphical user interfaces including a Galaxy wrapper and a stand-alone web service. The application of RCAS on published datasets shows that RCAS is not only able to reproduce published findings but also helps generate novel knowledge and hypotheses. The meta-gene profiles, gene-centric annotation, motif analysis and gene-set analysis provided by RCAS provide contextual knowledge which is necessary for understanding the functional aspects of different biological events that involve RNAs. In addition, the array of different interfaces and deployment options adds the convenience of use for different levels of users. RCAS is available at http://bioconductor.org/packages/release/bioc/html/RCAS.html and http://rcas.mdc-berlin.de. © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.

  16. Hierarchical Brokering with Feedback Control Framework in Mobile Device-Centric Clouds

    Directory of Open Access Journals (Sweden)

    Chao-Lieh Chen

    2016-01-01

    Full Text Available We propose a hierarchical brokering architecture (HiBA and Mobile Multicloud Networking (MMCN feedback control framework for mobile device-centric cloud (MDC2 computing. Exploiting the MMCN framework and RESTful web-based interconnection, each tier broker probes resource state of its federation for control and management. Real-time and seamless services were developed. Case studies including intrafederation energy-aware balancing based on fuzzy feedback control and higher tier load balancing are further demonstrated to show how HiBA with MMCN relieves the embedding of algorithms when developing services. Theoretical performance model and real-world experiments both show that an MDC2 based on HiBA features better quality in terms of resource availability and network latency if it federates devices with enough resources distributed in lower tier hierarchy. The proposed HiBA realizes a development platform for MDC2 computing which is a feasible solution to User-Centric Networks (UCNs.

  17. Holistic and consumer-centric assessment of beer: A multi-measurement approach.

    Science.gov (United States)

    Jaeger, Sara R; Cardello, Armand V; Chheang, Sok L; Beresford, Michelle K; Hedderley, Duncan I; Pineau, Benedicte

    2017-09-01

    Despite occupying a cornerstone position in consumer research and innovation, product liking/disliking provides only partial insight into consumer behaviour. By adopting a consumer-centric perspective and drawing on additional factors that underpin food-related consumer behaviour, a more complete product understanding is gained. The present research showcases this approach in a study with New Zealand beer (incl. pilsner, lager and ale categories). Implementation of a multi-variate approach with 128 regular beer drinkers provided assessments pertaining to liking and sensory novelty/complexity, situational appropriateness of consumption, as well as attitudes/perceptions and emotional associations. The 9 samples grouped into two clusters, where 4 of the beers were similar in being perceived as having less complex flavours, being appropriate for many uses and evoking stronger emotional associations of "relaxed/calm." The 4 beers were perceived as "easy to drink", and were, on average, most liked. One of the samples in this cluster was lighter in alcohol (2.5% ABV), but not inferior to beers with 4-5% ABV. The 5 beers in the second cluster were, on average, less liked and were associated with more negative emotions, e.g. "unhappy, "jittery", and "tense". Additional insights were gained from segmentation which identified two groups of consumers, named 'Lager Lovers' and 'Ale Aficionados'. Beers 1-4 were positively perceived by 'Lager Lovers' but less so by 'Ale Aficionados', and vice versa. The study was conducted under central location test conditions compatible with testing protocols often used in product research. The study protocol can be amended to include few/many consumer-centric measures and extended to product testing where packaging, brand, and other extrinsic information is available to consumers. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. Exploring the Potentials of ICT Tools for Human-Centric Regenerative Design

    Directory of Open Access Journals (Sweden)

    Giulia Sonetti

    2018-04-01

    Full Text Available Aiming for sustainable buildings and cities is critical to achieving a future that is socially just, ecologically regenerative, culturally rich, and economically viable. However, our current concepts of sustainability often exclude the essential domains of data, information, and the knowledge relating to the relationship between buildings and people that inhabit them. Thus, the research questions at the core of this paper have been as follows: Can technologies and artificial intelligence (AI be used to create systems that enhance relationships between buildings and inhabitants? Can social networks and natural interactions support further research relating to human-centric design tools for the built environment? The Human Observation Meta-Environment (HOME project was developed to address this question. The ICT architecture has been tested to observe and collect human behaviour data within a sentient room at the Politecnico di Torino (IT, where the inhabitants were strategically aware of their behaviours. Methods of analysis included technologies related to the domain of AI (such as Natural Language Analysis, Computer Vision, Machine Learning and Deep Learning that have been used in social network analysis in connection with the word ‘comfort’, and definitions resonate strongly with the realm of regenerative design. Results were used to further research the role of users that could serve as leverages to design (both spaces and related smart systems according to actual user needs. People from very different disciplinary backgrounds interacted with the prototype in a workshop and provided stimuli for further considerations regarding the possible technological, psychological, cognitive, cultural, social, political, and aesthetical impacts of the use of these technologies inside sentient buildings. The paper enriches the discourse on how ICT data can be organised and read in a human-centric regenerative design process perspective.

  19. How Do Personality Traits Shape Information-Sharing Behaviour in Social Media? Exploring the Mediating Effect of Generalized Trust

    Science.gov (United States)

    Deng, Shengli; Lin, Yanqing; Liu, Yong; Chen, Xiaoyu; Li, Hongxiu

    2017-01-01

    Introduction: Personality and trust have been found to be important precursors of information-sharing behaviour, but little is known about how these factors interact with each other in shaping information-sharing behaviour. By integrating both trust and user personality into a unified research framework, this study examines how trust mediates the…

  20. Information Sharing and Credit Rationing : Evidence from the Introduction of a Public Credit Registry

    NARCIS (Netherlands)

    Cheng, X.; Degryse, H.A.

    2010-01-01

    We provide the first evidence on how the introduction of information sharing via a public credit registry affects banks’ lending decisions. We employ a unique dataset containing detailed information on credit card applications and decisions from one of the leading banks in China. While we do not