J.C. Penney Co., Inc., New York, NY.
Insights into Consumer Issues is one of a group of educational publications and teaching units that J.C. Penney provides for consumer educators as a public service. This folder illustrates that although computerized processing of personal information has brought considerable convenience, the potential risk to personal privacy is of increasing…
Aslan, Hadiye; Easley, David; Hvidkjær, Søren
This paper investigates the linkage of microstructure, accounting, and asset pricing. We determine the relationship between firm characteristics as captured by accounting and market data and a firm's probability of private information-based trade (PIN) as estimated from trade data. This allows us...
Smith, Janet Kiholm
Commonly used trade credit terms implicitly define a high interest rate that operates as an efficient screening device where information about buyer default risk is asymmetrically held. By offering trade credit, a seller can identify prospective defaults more quickl y than if financial institutions were the sole providers of short-ter m financing. The information is valuable in cases where a seller has made nonsalvageable investments in buyers since it enables the seller to take actions to pr...
This paper suggests that the interactions of security trades and quote revisions be modeled as a vector autoregressive system. Within this framework, a trade's information effect may be meaningfully measured as the ultimate price impact of the trade innovation. Estimates for a sample of NYSE issues suggest a trade's full price impact arrives only with a protracted lag; the impact is a positive and concave function of the trade size; large trades cause the spread to widen; trades occurring in ...
Harlan, C.; Harrington, M.W.
Environmental Technologies for Remedial Actions Data Exchange (EnviroTRADE) is a graphical/textual information management system being developed for the cleanup program of the U.S. Department of Energy's (DOE) Weapons Complex. Its principal purpose is to provide a single, powerful, interactive database that addresses environmental restoration and waste management (ER/WM) problems and the technologies currently under development or already available to resolve them. Because the volume and complexity of the information is so large, a sophisticated Relational Database Management System (RDBMS) is employed in EnviroTRADE. EnviroTRADE will be a multi-purpose, multi-user system capable of addressing a broad range of environmental assessment and cleanup issues. An early focus for the Beta version of EnviroTRADE has been to find matches between specific environmental problems at particular sites (e.g., in terms of waste composition and form) and available and new technologies suited to solve problems. The current prototype EnviroTRADE database includes both U.S. and foreign problems and technologies. A Beta version was developed and demonstrated during FY92 and was expanded in FY93. This system was delivered to EM-523 as a stand-alone resident system for demonstration and feedback purposes. The resident system demonstrates the feasibility of this kind of multi-purpose system and also provides a test bed for refining the system architecture. As the architecture and database grow, an increasing range of possible applications is envisioned. The ability to import very large quantities of graphical, textual, and numerical information into the database is of particular importance. Since a great deal of appropriate data already exists in various electronic formats, a rapid expansion into EnviroTRADE-accessible data is possible without relying on manual entry methods
Background. The role of personal information collections is a well known feature of personal information management. The World Wide Web has introduced to such collections ideas such as filing Web pages or noting their existence in 'Bookmarks' and 'Favourites'. Argument. It is suggested that personal information collections are created in anticipation of some future need for that information-personal, anticipated information need, which also underlies the design of formal information systems. ...
Full Text Available Background. The role of personal information collections is a well known feature of personal information management. The World Wide Web has introduced to such collections ideas such as filing Web pages or noting their existence in 'Bookmarks' and 'Favourites'. Argument. It is suggested that personal information collections are created in anticipation of some future need for that information-personal, anticipated information need, which also underlies the design of formal information systems. Elaboration. Examination of the literature of information needs and information seeking behaviour leads to the formulation of five propositions that elaborate the concept of personal, anticipated information need. These propositions draw upon concepts such as uncertainty, predictability, sensitivity and the valuation of information sources. Conclusion. An individual's understanding of personal, anticipated information need and how this understanding guides the acquisition and management of personal information will determine the effectiveness of that collection.
Background: The role of personal information collections is a well known feature of personal information management. The World Wide Web has introduced to such collections ideas such as filing Web pages or noting their existence in "Bookmarks" and "Favourites". Argument: It is suggested that personal information collections are…
This paper (1) proposes new variables to detect informed high-frequency trading (HFT), (2) shows that HFT can help to predict takeover targets, and (3) shows that HFT in uences target announcement announcement returns. Prior literature suggests that informed trade may occur before takeovers, but has
Margarida Abreu; Victor Mendes
We investigate how the strength of the positive association between frequency of trading and information acquisition is dependent on investors’ self‐confidence and on the sources of information used by investors. Our results confirm that the more frequently individual investors invest in information, the more they trade in financial products. Our results also confirm previous findings that overconfident investors, who show a better than average bias, trade more frequently. In this paper, we a...
Full Text Available The presence of different risk factors in international trade gives evidence of the necessity of support in gaps that may affect exporters’ activity. To maximize the trade volumes and in the same time to minimize the exporters’ risks the stakeholders use trade credit insurance. The paper provides analysis of conceptual background of the trade credit insurance in the world. We analyzed briefly the problems, arising in insurance markets due to asymmetric information, such as adverse selection and moral hazard. Also we discuss the main stages of development of trade credit insurance in countries worldwide. Using comparative and graphical analysis we provide a brief evaluation of the dynamics of claims and recoveries for different forms of trade credit insurance. We found that the claims related to the commercial risk for medium and long trade credits in recent years exceed the recoveries, while with the political risk the reverse trend holds. And we originally consider these findings in terms of information asymmetry in the trade credit insurance differentiated by type of risk.
networks can be applied to better understand informal trade in developing countries, with a particular focus on Africa. The paper starts by discussing some of the fundamental concepts developed by social network analysis. Through a number of case studies, we show how social network analysis can...... illuminate the relevant causes of social patterns, the impact of social ties on economic performance, the diffusion of resources and information, and the exercise of power. The paper then examines some of the methodological challenges of social network analysis and how it can be combined with other...... approaches. The paper finally highlights some of the applications of social network analysis and their implications for trade policies....
Kegel, Roeland Hendrik,Pieter
The human element is often found to be the weakest link in the information security chain. The Personal Information Security Assistant project aims to address this by improving the privacy and security awareness of end-users and by aligning the user's personal IT environment to the user's security
The paper extends previous accounts of informational privacy as a contextual notion. Where previous accounts have focused on interpretations of the privacy context itself as being contextual and open for negotiation and interpretation, this paper extends those analyses and shows that personal...... information itself is in fact best understood as contextual and situational—and as such open for interpretation. The paper reviews the notion of information as it has been applied in informational privacy and philosophy of information, and suggests that personal information ought to be regarded...... as communicative acts. The paper suggests a reconceptualization of informational privacy from having its focus on controlling, limiting, and restricting access to material carriers of information to a focus on a regulation of the use, analysis, and interpretation of personal information....
PC Forms Inc. 834-4048
To apply for information under the Privacy Act, complete this form or a written request mentioning the Act. Describe the information being sought and provide any relevant details necessary to help the. International Development Research Centre. (IDRC) find it. If you require assistance, refer to. Info Source (Sources of ...
Sanchez Hidalgo, M.; Galan Montenegro, P.; Bodineau Gil, C.; Hernandez Rodriguez, R.; Jimenez Nartin, A.; Cano Sanchez, J. J.
One question often raised by the hospital personnel dosimetry is the high incidence in the no monthly turnover of dosimeters, which is currently a high number of administrative dose assignments. The high number of workers with personal dosimetry and in many cases, the dispersion of workplaces makes it impossible to personalized management. To make a more direct and personal, and transmit information quickly and with guaranteed reception, has developed and implemented a system of personalized dosimetric information through messaging Short Message Service (SMS) and access to the history of dosimetric dosimetric and management through web space Service Hospital Radio physics.
Since the fall of 1977, NUS Corporation has been quietly bringing together nuclear power plant operations and maintenance personnel through a program called NOMIS - the Nuclear Operations and Maintenance Information Service. As the nae indicates, the program is a source of information on the day-to-day operating, maintenance, and technical problems that occur at the plant level. Typical questions that circulate through NOMIS involve problems with specific components or systems, spare-part usage experience, differences in procedures or methods of operation or maintenance, plant staffing structure, data to justify management decisions, responses to inspection and enforcement bulletins or circulars, scheduling recommendations, and person-hour forecasting for specific work
Cantens, Thomas; Ireland, Robert; Raballand, Gael
Trading goods is an original human activity that precedes borders (Renfrew, 1969). With the rise of nation-states with demarcated political boundaries, trade that crosses borders became regulated by government institutions such as Customs, with tariffs, quotas, or outright prohibitions. While borders are perhaps not quite “the dead, the fixed, the undialectical, the immobile” (Foucault, 1970, p. 70), they are a formal structure that places less flexibility on trade activities. Focusing on inf...
...: Free trade agreements are established to reduce and eliminate barriers, strengthen and develop economic... information collection: Chile, Singapore, Australia, Morocco, Bahrain, Jordan, Oman, and Peru. These...
Malinova, Katya; Park, Andreas
In a dynamic model of financial market trading multiple heterogeneously informed traders choose when to place orders. Better informed traders trade immediately, worse informed delay - even though they expect the market to move against them. This behavior generates intraday patterns with decreasing...
Full Text Available Building a global Network Relations with the internet has made huge changes in personal information system and even comments left on a webpage of SNS(Social Network Services are appreciated as important elements that would provide valuable information for someone. Social Network is a relation between individuals or groups, represented in a graph model, which converts the concept of psychological and social relations into a logical structure by using node and link. But, most of the current personalized systems on the basis of Social Network are built and constructed mainly in the PC environment, and the systems are neither designed nor implemented in mobile environment. Hence, the objective of this study is to propose methods of providing Personalized Mobile Information Retrieval System using NFC (Near Field Communication Smartphone, which will be then used for Smartphone users. Besides, this study aims to verify its efficiency through a comparative analysis of existing studies.
Li, Yao; Fan, Jin; Zhao, Dingtao; Wu, Yanrui; Li, Jun
This paper proffers a tiered gasoline pricing method from a personal carbon trading perspective. An optimization model of personal carbon trading is proposed, and then, an equilibrium carbon price is derived according to the market clearing condition. Based on the derived equilibrium carbon price, this paper proposes a calculation method of tiered gasoline pricing. Then, sensitivity analyses and consumers' surplus analyses are conducted. It can be shown that a rise in gasoline price or a more generous allowance allocation would incur a decrease in the equilibrium carbon price, making the first tiered price higher, but the second tiered price lower. It is further verified that the proposed tiered pricing method is progressive because it would relieve the pressure of the low-income groups who consume less gasoline while imposing a greater burden on the high-income groups who consume more gasoline. Based on these results, implications, limitations and suggestions for future studies are provided. - Highlights: • Tiered gasoline pricing is calculated from the perspective of PCT. • Consumers would be burdened with different actual gasoline costs. • A specific example is provided to illustrate the calculation of TGP. • The tiered pricing mechanism is a progressive system.
Rossi, Stefano; Tinn, Katrin
18/09/13 MEB, Working paper, not yet pub. Systematic trading contingent on observed prices by agents uninformed about fundamentals has long been considered at odds with efficient markets populated by rational agents. In this paper we show that price-contingent trading is the equilibrium strategy of rational agents in efficient markets in which there is uncertainty about whether a large trader is informed. In this environment, knowing his own type and past trades (or lack of them) will be e...
Damodaran, Aswath; Liu, Crocker H
There is substantial evidence that insider trading is present around corporate announcements and that this insider trading is motivated by private information. Using real estate investment trusts that choose to reappraise themselves as our sample, we establish that the appraisals contain information, but find no market response to the public announcement of this information in these appraisals. We consider two possible explanations for this inconsistency: the first that the appraisal informat...
... DEPARTMENT OF COMMERCE Foreign-Trade Zones Board [Order No. 1671] Approval for Processing Authority, Foreign-Trade Zone 196, ATC Logistics & Electronics (Personal Navigation Devices), Fort Worth... & Electronics, an operator of Foreign-Trade Zone 196, has requested processing authority within FTZ 196 in Fort...
In 2008, the UK government undertook a review of personal carbon trading (PCT) and declared that it was 'an idea currently ahead of its time'. PCT is a radical policy proposal which would entail all adults receiving an equal, tradable carbon allowance to cover emissions from household energy and/or personal travel. The allowance would reduce over time, in line with national emissions reduction goals. The government's key concerns about PCT were its social unacceptability and high cost. This paper reviews the literature and identifies knowledge gaps, and then discusses whether these concerns are justified. Contrary to the government's conclusions, most research shows PCT to be at least as socially acceptable as an alternative taxation policy. People think it could be both fair and effective. Set-up and running costs for PCT will undoubtedly be higher than for alternative taxation policies. However, PCT could deliver benefits from individual and social change motivated by non-economic aspects of the policy. These potential benefits are outlined here. The conclusion is that PCT is a promising and timely policy idea.
Daniel W.S. Challender
Full Text Available International trade in wildlife is a key threat to biodiversity conservation. CITES, the Convention on International Trade in Endangered Species of Wild Fauna and Flora, seeks to ensure international wildlife trade is sustainable, relying on trade bans and controls. However, there has been little comprehensive review of its effectiveness and here we review approaches taken to regulate wildlife trade in CITES. Although assessing its effectiveness is problematic, we assert that CITES boasts few measurable conservation successes. We attribute this to: non-compliance, an over reliance on regulation, lack of knowledge and monitoring of listed species, ignorance of market forces, and influence among CITES actors. To more effectively manage trade we argue that interventions should go beyond regulation and should be multi-faceted, reflecting the complexity of wildlife trade. To inform these interventions we assert an intensive research effort is needed around six key areas: (1 factors undermining wildlife trade governance at the national level, (2 determining sustainable harvest rates for, and adaptive management of CITES species, (3 gaining the buy-in of local communities in implementing CITES, (4 supply and demand based market interventions, (5 means of quantifying illicit trade, and (6 political processes and influence within CITES.
... Request; Report of Requests for Restrictive Trade Practice or Boycott AGENCY: Bureau of Industry and... foreign boycotts against countries friendly to the U.S. which are received by U.S. persons. The information is also used to identify trends in such boycott activity and to assist in carrying out U.S. policy...
...; Smuggling, Interdiction, and Trade Compliance Program; Smuggling Form AGENCY: Animal and Plant Health... intention to initiate an information collection to support our smuggling, interdiction, and trade compliance... coming. FOR FURTHER INFORMATION CONTACT: For information on the smuggling, interdiction, and trade...
...; Information Collection; Trade Agreements Certificate AGENCY: Department of Defense (DOD), General Services... approved information collection requirement concerning trade agreements certificate. Public comments are...-mail [email protected] . SUPPLEMENTARY INFORMATION: A. Purpose Under the Trade Agreements Act of...
Full Text Available The purpose of this paper is to investigate the trading activity in options market based on information about expected future volatility in spot market. We employ Common Implied Volatility as a measure of expected volatility and options volume and changes in Open Interests as measures of options trading activity. We first test for simultaneous information flow in the two markets using multiple regression technique. Next, we test for information based or hedge based use of options using Trivariate Vector-auto Regression framework. We further consider the classes of options moneyness and the market trends in our analysis to examine if the trader’s preference of options changes with change in description of options intrinsic value and market environment. We use daily closing data of S&P CNX Nifty Index options traded on National Stock Exchange, India. We, for the most part, find negative and significant relationship in contemporaneous regression suggesting active trading by arbitrageurs. A feedback relationship is observed in vector auto regression analysis suggesting that options are traded in India for both information based trading and hedging purposes. We also observe the relationship to be varying when market trends and classes of options moneyness are considered. This indicates that traders are not indifferent in their choice of trading venue when market conditions and factors change. The results of this study are helpful for traders in managing the risk and return of their portfolio based on volatility forecast. This study is distinctive as it examines the scarcely researched area of volatility informed trading in an emerging market set up.
Beldad, Ardion Daroca; de Jong, Menno D.T.; Steehouder, M.F.
Although there is near consensus on the need for privacy, the reality is that people's attitude toward their personal information privacy is complex. For instance, even when people claim that they value their information privacy, they often trade their personal information for tangible or intangible
Potoski, Matthew; Prakash, Aseem
Spatial, cultural, and linguistic barriers create information asymmetries between buyers and sellers that impede international trade. The International Organization for Standardization's ISO 9000 program is designed to reduce these information asymmetries by providing assurance about the product quality of firms that receive its certification.…
Alhayyan, Khalid N.
There are four main components for influencing traders' behaviors in an information market context: trader characteristics, organizational characteristics, market design, and external information. This dissertation focuses on investigating the impact of individual trader characteristics on trading behaviors. Two newly-developed constructs,…
Henningsson, Stefan; Gal, Uri; Bjørn-Andersen, Niels
that are in control of their business. Trusted traders are entitled to trade facilitations, faster border crossing, and fewer physical inspections. To enable the use of trusted traders, changes are required to the information infrastructure (II) of international trade. This article complements existing works on e......-Government interoperability by a theoretically driven approach with theoretical development of the II concept and how II can be modified as additional focus. Following the principles of IS design research, this paper presents a design proposition for the II of international trade. Using theories of II development and change......Regulators and actors in international trade are facing a difficult challenge of increasing control and security while at the same time lowering the administrative burden for traders. As a tentative response, the European Commission has introduced the concept of “trusted traders”: certified traders...
...; Information Collection; Buy American Act--Free Trade Agreements--Israeli Trade Act Certificate AGENCIES... approved information collection requirement concerning the Buy American Act--Free Trade Agreements--Israeli..., Buy American Act--Free Trade Agreements--Israeli Trade Act Certificate, by any of the following...
... personal sport-hunted trophies? 23.74 Section 23.74 Wildlife and Fisheries UNITED STATES FISH AND WILDLIFE... trade internationally in personal sport-hunted trophies? (a) U.S. and foreign general provisions. Except as provided for personal and household effects in § 23.15, the import, export, or re-export of sport...
The document is an appendix to the final report on a proposed methanol plant ship off of the coast of Trinidad. The document incorporates the results of the redetermination of capital required to implement the project. It also presents a revised cost analysis, with better accuracy, for the project. The projected operating revenues and revised expenses are also given. As a continuation of the information presented in the final report, the methanol market and proposed products are discussed in the report
Nijssen, E.J.; Douglas, S.P.; Calis, G.
Examines the nature of the search process used by international firms in identifying trading partners in emerging markets, and to what extent systematic information collection on potential partners is likely to enhance the choice of satisfactory partners. The results, based on 46 Dutch companies,
Bø, Solvår; Pedersen, Stian; Nyre, Åsmund Ahlmann; Bernsmed, Karin
Smartphones with third-party applications have become very popular. Recently, they have received attention for quietly monitoring and transferring personal information without the users’ knowledge. The objective of this work is to help users to protect their privacy by increasing their consciousness on how personal information is collected and distributed. We propose a design that provides a higher degree of control by allowing users to set preferences that determine what personal information...
Asymmetric information models predict comovements among trade characteristics such as returns, bid-ask spread, and trade volume on one hand and the trading intensity on the other hand.In this paper we investigate empirically the two-sided causality between trade characteristics and trading
Carl Bonham; Byron Gangnes; Ari Van Assche
This paper studies the growth and determinants of information technology (IT) trade in the Asia-Pacific region. We argue that the rise of IT trade must be understood within the context o increasing vertical fragmentation of production processes that has occurred over the past two decades. To evaluate this empirically, we estimate a set of pooled bilateral IT export equations for eight Asian countries, the U.S. and the E.U., where FDI inflows are introduced as a proxy for fragmentation. We app...
Seveso, Luigi; Paris, Matteo G. A.
We address the trade-off between information and disturbance in qubit thermometry from the perspective of quantum estimation theory. Given a quantum measurement, we quantify information via the Fisher information of the measurement and disturbance via four different figures of merit, which capture different aspects (statistical, thermodynamical, geometrical) of the trade-off. For each disturbance measure, the efficient measurements, i.e., the measurements that introduce a disturbance not greater than any other measurement extracting the same amount of information, are determined explicitly. The family of efficient measurements varies with the choice of the disturbance measure. On the other hand, commutativity between the elements of the probability operator-valued measure (POVM) and the equilibrium state of the thermometer is a necessary condition for efficiency with respect to any figure of disturbance.
Full Text Available Taking arbitrage opportunities into consideration in an incomplete market, dealers will pricebonds based on asymmetric information. The dealer with the best offering price wins the bid. The riskpremium in dealer’s offering price is primarily determined by the dealer’s add-on rate of change tothe term structure. To optimize the trading strategy, a new equilibrium trading model is introduced.Optimal sequential estimation scheme for detecting the risk premium due to private inforamtion isproposed based on historical prices, and the best bond pricing formula is given with the accordingoptimal trading strategy. Numerical examples are provided to illustrate the economic insights underthe certain stochastic term structure interest rate models.
Full Text Available It is known that within trade relations providers often credit customers for the value of goods or services which are the subject of conducted commercial transactions, this aspect being materialized in the issuance and acceptance of a trade effect. From the time of acceptance until maturity / settlement, trade effects should be reflected separately in the accounts and, to the extent that were not settled until the end of exercise, their value must be presented in the financial statements. Based on analysis of the Romanian accounting regulations, also taking into consideration the opinions expressed in specific literature concerning accounting reflection of trade effects, in this article we try to point out some aspects which, in our opinion, require clarification. We also want to point out some contradictions / inconsistencies regarding the reporting of information on the trade effects, specifically between the text of accounting regulations concerning the definition of accounting structures „cash and bank accounts” and “short term investments” and their contents when presented as positions in the balance sheet structure. In relation to the issues raised we try to prove the effects on the indicators concerning financial position and to make some suggestions that would have effects on Romanian accounting regulations, namely the improvement of financial reporting performed by the economic operators.
... of personal securities trading transactions? 551.150 Section 551.150 Banks and Banking OFFICE OF... TRANSACTIONS Securities Trading Policies and Procedures § 551.150 How do my officers and employees file reports of personal securities trading transactions? An officer or employee described in § 551.140(d) must...
Rasoul Zavaraqi; Michael Safaie
The aim of this paper was to present detailed texts about necessities of personal information management (PIM) and has been written by literature survey. Historical investigation of this new born research area showed PIM is an extension to primary personal information management in offices and other bureaucratic centers. PIM is the result of new ICT developments and its followings as information overload and pollution, which is combination of information retrieval, database management systems...
Wang, Huiwei; Huang, Tingwen; Liao, Xiaofeng; Abu-Rub, Haitham; Chen, Guo
This paper considers the problem of designing adaptive learning algorithms to seek the Nash equilibrium (NE) of the constrained energy trading game among individually strategic players with incomplete information. In this game, each player uses the learning automaton scheme to generate the action probability distribution based on his/her private information for maximizing his own averaged utility. It is shown that if one of admissible mixed-strategies converges to the NE with probability one, then the averaged utility and trading quantity almost surely converge to their expected ones, respectively. For the given discontinuous pricing function, the utility function has already been proved to be upper semicontinuous and payoff secure which guarantee the existence of the mixed-strategy NE. By the strict diagonal concavity of the regularized Lagrange function, the uniqueness of NE is also guaranteed. Finally, an adaptive learning algorithm is provided to generate the strategy probability distribution for seeking the mixed-strategy NE.
CECILIA IRINA RABONTU
Full Text Available The trade in Romania has seen an increased dynamism in many areas. When it comes to food or non food products, or services are bringing into question we can say that the period of consumerism in which we are living hallmarks the commercial activities. Trade in information products and services had lately a remarkable richness, being the categories that arouses greatest interest from certain consumers becoming more and more numerous and demanding in terms of technology. In this paper we proposed to analyze how much the sales of information products and services respond to the many needs expressed by Romanian customers and to capture the dynamics in which this type of commerce evolved.
Schot, P.; El Gebaly, A.; Tarvainen, M.
The increasing awareness of activities of transnational procurement networks to covertly acquire sensitive nuclear related dual use equipment prompted an evolution of safeguards methodologies. One of the responses to this challenge by the Department of Safeguards in the IAEA was to establish the Trade and Technology Unit (TTA) in November 2004 to analyse and report on these covert nuclear related trade activities. To obtain information relevant to this analysis, TTA is engaging States that might be willing to provide this information to the Secretariat on a voluntary basis. This paper will give an overview of current activities, sum up the results achieved and discuss suggestions to further improve this programme made by Member States. (author)
The new trend on the Web has totally changed today's information access environment. The traditional information overload problem has evolved into the qualitative level beyond the quantitative growth. The mode of producing and consuming information is changing and we need a new paradigm for accessing information. Personalized search is one of…
Beltran, Héléna; Grammig, Joachim; Menkveld, Albert J.
Electronic limit order books are ubiquitous in markets today. However, theoretical models for limit order markets fail to explain the real world data well. Sandas (2001) tests the classic Glosten (1994) model for order book equilibrium and rejects it. We reconfirm this result for one of the largest European stock markets. We then relax one of the model's assumptions and allow the informational content of trades to change over time. Adapting Hasbrouck's (1991a,b) methodology to estimate time v...
Hanousek, Jan; Kopřiva, František
Roč. 61, č. 3 (2011), s. 204-229 ISSN 0015-1920 R&D Projects: GA ČR(CZ) GAP403/11/0020; GA MŠk LC542 Institutional research plan: CEZ:MSM0021620846 Keywords : dealers’ market * emerging markets * informed trading Subject RIV: AH - Economics Impact factor: 0.346, year: 2011 http://journal.fsv.cuni.cz/storage/1212_hanousek.pdf
to persist in gathering Olympic Games information. In other words, does the relationship between demographics and knowledge about the Beijing 2008 Olympic Games differ according to the use of mobile phones among migrant workers? Results indicate that television became the primary source of Olympic Games news...... of people to enjoy the Olympic Games, and popularizing knowledge....
to persist in gathering Olympic Games information. In other words, does the relationship between demographics and knowledge about the Beijing 2008 Olympic Games differ according to the use of mobile phones among migrant workers? Results indicate that television became the primary source of Olympic Games news...... of people to enjoy the Olympic Games, and popularizing knowledge....
A public traded company which wishes to comply with IAS standards and stock exchange requirements for full public disclosure of relevant information faces a major communication task. The Investor Relation policy of such a company has to satisfy a demand for financial information which seems...... line focus to the disclosure of cash flow surrogates like EBITA and EBITDA. Overall, the findings suggest a communication strategy intended to satisfy the demand from the professional analysts. However, the shear number of different key figures and financial ratios identified in the study suggest...
Bloembergen, Daan; Hennes, Daniel; McBurney, Peter; Tuyls, Karl
We analyse the value of information in a stock market where information can be noisy and costly, using techniques from empirical game theory. Previous work has shown that the value of information follows a J-curve, where averagely informed traders perform below market average, and only insiders prevail. Here we show that both noise and cost can change this picture, in several cases leading to opposite results where insiders perform below market average, and averagely informed traders prevail. Moreover, we investigate the effect of random explorative actions on the market dynamics, showing how these lead to a mix of traders being sustained in equilibrium. These results provide insight into the complexity of real marketplaces, and show under which conditions a broad mix of different trading strategies might be sustainable.
Schreiber, Trine; Harbo, Karen
The aim of the paper is to discuss a new subject called personal knowledge management and to compare it with the better-known concept information literacy. Firstly, the paper describes and discusses the course called personal knowledge management. People from three institutions, the Library...... the participants partly how to manage information in such a way that it supports a learning process, and partly how to negotiate with the colleagues about the information needs, locate the information, and mediate it in such a way that the colleagues will use it. At the end of the course the participants construct...... a ´knowledge map´, which constitutes the mediation of the information to the workplace. The course has got a very positively reception. Secondly, the paper compares the course of personal knowledge management with the concept of information literacy. There exist a number of different definitions of the last...
Today's mobile devices, especially mobile phones, are comparable in computing capability and storage to the desktop computers of a few years ago. The volume and diversity of the information kept on mobile devices has continually increased and users have taken advantage of this. Since information is being stored on multiple devices, searching for and retrieving the desired information has become an important function. This thesis focuses on search with regard to Personal Information Manag...
Gallant, David T.
Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.
Østerdal, Lars Peter Raahave
-adjusted life years (DALYs). This paper discusses the theoretical support for the use of person trade-offs in QALY-type measurement of (changes in) population health. It argues that measures of this type based on such quality-adjustment factors almost always violate the Pareto principle, and so lack normative...
... Activities: Customs-Trade Partnership Against Terrorism (C-TPAT) AGENCY: U.S. Customs and Border Protection... information collection requirement concerning the Customs-Trade Partnership Against Terrorism (C-TPAT). This... information collection: Title: Customs-Trade Partnership Against Terrorism (C-TPAT). OMB Number: 1651-0077...
... 42 Public Health 2 2010-10-01 2010-10-01 false Confidential commercial and trade secret information. 405.215 Section 405.215 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF... trade secret information. To the extent that CMS relies on confidential commercial or trade secret...
Hodgson, A.; van Praag, B.
In this paper, we test whether directors’ (corporate insiders) trading in Australia, based on accounting accruals, provides incremental information in forecasting a firm's economic performance. We determine that directors’ trading on negative accruals in larger firms has greater forecasting content
Fraser, B.; Wilhelmson, M.
Because of cutbacks and downsizing within the petroleum industry, it has become one of the largest users of contract personnel to provide services that were previously provided by senior levels of management. This paper explored the application of common law fiduciary duties and the duty of confidence to the independent workforce. It examined to what extent fiduciary duties apply to independent consultants and the best way for the employer to protect itself from the potential misuse of confidential information. Part 1 of the paper described fiduciary duties. A fiduciary relationship was described as one that possesses the following three characteristics: (1) the fiduciary has scope for the exercise of some discretion of power, (2) the fiduciary can unilaterally exercise that power to affect the beneficiary's practical interests, and (3) the beneficiary is peculiarly vulnerable to the fiduciary holding the discretion of power. Three examples of how the courts treated some arguments regarding fiduciaries were presented. Part 2 of this paper discussed how trade secrets and confidential information should be handled. It was explained, that regardless of fiduciary duties, the unauthorized use of confidential information by an independent contractor can give rise to liability and an award of damages by the courts. Some examples where the Supreme Court of Canada found breach of confidence by a party were presented. Information communicated from an employer to an employee can be divided into the following three categories: (1) publicly accessible and not confidential, (2) confidential and must be treated as such while an employee is employed, but if learned becomes part of the employees skill and knowledge, and (3) specific confidential trade secrets that cannot lawfully be used for anyone's benefit but the employer's. Issues regarding defining rights and obligations by contract were also discussed
Full Text Available The aim of this paper was to present detailed texts about necessities of personal information management (PIM and has been written by literature survey. Historical investigation of this new born research area showed PIM is an extension to primary personal information management in offices and other bureaucratic centers. PIM is the result of new ICT developments and its followings as information overload and pollution, which is combination of information retrieval, database management systems (DBMS, information science, human-computer interaction, cognitive psychology, and artificial intelligence. The research area tries to address to old challenges by new mechanisms. The paper introduced the new born research area and discussed about its appearance, definitions, history, benefits, performance and researches which has been done about it.
Cyril Nhlanhla Ngiba
Full Text Available The informal sector in South Africa is a significant, but not well understood phenomenon. One important question relates to the nature of the relationship between the formal and informal sector. This article uses Porter’s five forces model to interrogate the linkages between informal fruit and vegetable traders in the Natalspruit Market (Ekurhuleni and their formal suppliers, primarily the Johannesburg Fresh Produce Market. While the threat of new products is low, the street traders’ position is weakened by the threat of new entrants, consumer bargaining power and lack of cooperation among street traders. In relation to supplier power, we conclude that while this varies according to a number of factors, the formal sector is dominant over informal fruit and vegetable sellers in this market. This finding rests primarily on the observation that, because of their fragmentation, the informal traders’ collective buying power is not being used in the same way as large formal retailers of fruit and vegetables to obtain better terms of trade with the formal economy supplier.
A.A.J. (Jos) van Helvoort
The research described in this paper provides insights into tools and methods which are used by professional information workers to keep and to manage their personal information. A literature study was carried out on 23 scholar papers and articles, retrieved from the ACM Digital Library and Library
Ifenthaler, Dirk; Schumacher, Clara
The purpose of this study was to investigate if students are prepared to release any personal data in order to inform learning analytics systems. Besides the well-documented benefits of learning analytics, serious concerns and challenges are associated with the application of these data driven systems. Most notably, empirical evidence regarding…
... secret or confidential? 370.64 Section 370.64 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... secret or confidential? (a) Trade secrets. You may be able to withhold the name of a specific chemical... trade secret. The requirements for withholding trade secret information are set forth in EPCRA section...
Knol, A.J.; Tan, Y.
The development of information infrastructures for international trade to improve supply chain visibility and security has gained momentum due to technological advances. An information infrastructure is a shared, open, and evolving assemblage of interlinked information systems providing distinct
Full Text Available Financial and accounting information systems, today, no longer are the traditional ones, they are subject to the normalisation and harmonisation, in the idea of globalization, and as a natural consequence of this situation, the users of accounting information require more and more diverse information from these systems. The economic entities in general, and those in the trade, in particular, performance management, management of the current situation, with multiple phenomena of crisis, require substantiation of decisions on the basis of a system of real information, pertinent, relevant and provided in a timely manner (Radu, 2011 . Apart from users and goals of information provided by entities of the accounting information system of trade entities, they must have certain qualitative characteristics that facilitate the process of interpretation and use of accounting information. At the same time they are needed because their accounting information through its better goal, to represent the support base for the elaboration of certain decisions by those interested. In this article I propose to introduce qualitative characteristics of accounting information provided by IASB (International Accounting Standards Board, which, incidentally, have been taken up initially by the Romanian accounting regulations, with their subsequent amendments and additions, so far, because, in the end, as a conclusion, I consider that I should be noted that these qualities cannot be effective unlessin turn, the users themselves have the quality to have the knowledge required to understand the information that is intended for them.
Mukherjee, Sumitava; Manjaly, Jaison A; Nargundkar, Maithilee
With continuous growth in information aggregation and dissemination, studies on privacy preferences are important to understand what makes people reveal information about them. Previous studies have demonstrated that short-term gains and possible monetary rewards make people risk disclosing information. Given the malleability of privacy preferences and the ubiquitous monetary cues in daily lives, we measured the contextual effect of reminding people about money on their privacy disclosure preferences. In experiment 1, we found that priming money increased willingness to disclose their personal information that could be shared with an online shopping website. Beyond stated willingness, experiment 2 tested whether priming money increases propensity for actually giving out personal information. Across both experiments, we found that priming money increases both the reported willingness and the actual disclosure of personal information. Our results imply that not only do short-term rewards make people trade-off personal security and privacy, but also mere exposure to money increases self-disclosure.
D. Veenman (David)
textabstractUsing accounting-based (residual income) valuations, this study examines the extent to which abnormal returns after insider share trades are explained by private information versus mispricing of public information. For a sample of insider trades in the Netherlands (1999- 2008), I find
Using accounting-based (residual income) valuations, this study examines the extent to which abnormal returns after insider share trades are explained by private information versus mispricing of public information. For a sample of insider trades in the Netherlands (1999–2008), I find that managers'
Simms, Leonard J; Zelazny, Kerry; Yam, Wern How; Gros, Daniel F
Little attention typically is paid to the way self-report measures are translated for use in self-informant agreement studies. We studied two possible methods for creating informant measures: (a) the traditional method in which self-report items were translated from the first- to the third-person and (b) an alternative meta-perceptual method in which informants were directed to rate their perception of the targets' self-perception. We hypothesized that the latter method would yield stronger self-informant agreement for evaluative personality dimensions measured by indirect item markers. We studied these methods in a sample of 303 undergraduate friendship dyads. Results revealed mean-level differences between methods, similar self-informant agreement across methods, stronger agreement for Big Five dimensions than for evaluative dimensions, and incremental validity for meta-perceptual informant rating methods. Limited power reduced the interpretability of several sparse acquaintanceship effects. We conclude that traditional informant methods are appropriate for most personality traits, but meta-perceptual methods may be more appropriate when personality questionnaire items reflect indirect indicators of the trait being measured, which is particularly likely for evaluative traits.
Kharrazi, Ali; Fath, Brian D.
Oil trade is one of the most vital networks in the global economy. In this paper, we analyze the 1998–2012 oil trade networks using the point-wise mutual information (PMI) method and determine the pairwise trade preferences and dependencies. Using examples of the USA's trade partners, this research demonstrates the usefulness of the PMI method as an additional methodological tool to evaluate the outcomes from countries' decisions to engage in preferred trading partners. A positive PMI value indicates trade preference where trade is larger than would be expected. For example, in 2012 the USA imported 2,548.7 kbpd despite an expected 358.5 kbpd of oil from Canada. Conversely, a negative PMI value indicates trade dis-preference where the amount of trade is smaller than what would be expected. For example, the 15-year average of annual PMI between Saudi Arabia and the U.S.A. is −0.130 and between Russia and the USA −1.596. We reflect the three primary reasons of discrepancies between actual and neutral model trade can be related to position, price, and politics. The PMI can quantify the political success or failure of trade preferences and can more accurately account temporal variation of interdependencies. - Highlights: • We analyzed global oil trade networks using the point-wise mutual information method. • We identified position, price, & politics as drivers of oil trade preference. • The PMI method is useful in research on complex trade networks and dependency theory. • A time-series analysis of PMI can track dependencies & evaluate policy decisions.
Careless handling of patient information in daily medical practice can result in Health Professions Council of South Africa sanction, breach of privacy lawsuits and, in extreme cases, serious monetary penalty or even imprisonment. This review will focus on the Protection of Personal Information (POPI) Act (No. 4 of 2013) and the implications thereof for healthcare professionals in daily practice. Recommendations regarding the safeguarding of information are made.
ZHANG Qingsheng; QI Yong; ZHAO Jizhong; HOU Di; NIU Yujie
A context-aware privacy protection framework was designed for context-aware services and privacy control methods about access personal information in pervasive environment. In the process of user's privacy decision, it can produce fuzzy privacy decision as the change of personal information sensitivity and personal information receiver trust. The uncertain privacy decision model was proposed about personal information disclosure based on the change of personal information receiver trust and personal information sensitivity. A fuzzy privacy decision information system was designed according to this model. Personal privacy control policies can be extracted from this information system by using rough set theory. It also solves the problem about learning privacy control policies of personal information disclosure.
addresses, personal and/or work email addresses, personal and/or work or cell telephone numbers); and. • language testing and language assessment results. How Do We Use Your Personal Information? We use the personal information you provide exclusively for the purposes of processing, screening, assessing ...
While earlier migration studies focused on male migrants and tended to characterise migration as a male gender issue, cross-border trade presents a completely different picture, as women tend to dominate in this area. Women are a significant but a footloose group in search of markets and livelihoods not just for survival ...
Engelen, Peter-Jan; Kabir, Mohammed Rezaul
This paper examines the effect of temporarily suspending the trading of exchange-listed individual stocks. We evaluate whether regulatory authorities can successfully use the mechanism of trading suspension in forcing companies to disclose new and material information to the capital market. Previous
-, č. 365 (2008), s. 1-39 ISSN 1211-3298 R&D Projects: GA MŠk LC542 Institutional research plan: CEZ:AV0Z70850503 Keywords : trading systems * informed trading * emerging markets Subject RIV: AH - Economics http://www.cerge-ei.cz/pdf/wp/Wp365.pdf
-, č. 365 (2008), s. 1-39 ISSN 1211-3298 R&D Projects: GA ČR(CZ) GA402/08/1376; GA MŠk LC542 Institutional research plan: CEZ:MSM0021620846 Keywords : trading systems * informed trading * emerging markets Subject RIV: AH - Economics http://www.cerge-ei.cz/pdf/wp/Wp365.pdf
From Fear to Flow explores how personality traits may influence attitude, behaviour and reaction to information. Consideration is made for individual differences in information behaviour and reasons behind individual search differences. The book reviews personality and information behaviour and discusses how personality may influence the attitude towards information. Reaction to information is examined in contexts such as everyday life, decision-making, work, studies and human-computer interaction.Introduces a little researched area which is current and needed in our Informatio
Christensen, Peter Ove; Qin, Zhenjiang
In an incomplete market setting with heterogeneous prior beliefs, we show that public information can have a substantial impact on the ex ante cost of capital, trading volume, and investor welfare. In a model with exponential utility investors and an asset with a normally distributed dividend...... information system. In an effectively complete market setting, in which investors do not need to trade dynamically in order to take full advantage of their differences in beliefs, the ex ante cost of capital and the investor welfare are both higher than in the incomplete market setting......, the Pareto efficient public information system is the system which enjoys the maximum ex ante cost of capital, and the maximum expected abnormal trading volume. The public information system facilitates improved dynamic trading opportunities based on heterogeneously updated posterior beliefs in order to take...
Christensen, Peter Ove; Qin, Zhenjiang
information system. In an effectively complete market setting, in which investors do not need to trade dynamically in order to take full advantage of their differences in beliefs, the ex ante cost of capital and the investor welfare are both higher than in the incomplete market setting......In an incomplete market setting with heterogeneous prior beliefs, we show that public information can have a substantial impact on the ex ante cost of capital, trading volume, and investor welfare. In a model with exponential utility investors and an asset with a normally distributed dividend......, the Pareto efficient public information system is the system which enjoys the maximum ex ante cost of capital, and the maximum expected abnormal trading volume. The public information system facilitates improved dynamic trading opportunities based on heterogeneously updated posterior beliefs in order to take...
Kim, Jiin; Nam, Changi; Kim, Seongcheol
Personal information is essential in an information-oriented society for societal development and as a valuable business resource. However, because of poor management and a lack of proper protection, leakage of personal information can take place over time, and the standard for compensation is not well established. In order to establish appropriate policies for its protection, we need to know the economic value of personal information. Using conjoint analysis, we analyze the potential value o...
... personal data, a Privacy Act Statement will be added. ...) PRIVACY PROGRAM DEFENSE COMMISSARY AGENCY PRIVACY ACT PROGRAM § 327.6 Collecting personal information (a... third party sources for security or employment suitability determinations; (2) Seeking third party...
The main purpose of the POPI act is to protect the processing of personal information ... a smartphone, iPad or personal computer), digital storage devices. (iCloud, Dropbox ... (vi) Reasonable security regarding the safeguarding, integrity and.
... 213.6 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE TRADE REMEDY ASSISTANCE § 213.6 Information concerning assistance. Any person may.... International Trade Commission, 500 E Street SW., Washington, DC 20436. ...
Charlton, Bruce G
The modern world is characterized by progressive specialization of function and ever-larger-scale coordination of these ever-more-specialized functions. More and more of science is done by increasing-sized teams of specialists, and the ability to engage in 'teamwork' is regarded as an almost essential attribute for most scientists. But teamwork does not suit all personality types. Some 'maverick' individuals would rather have personal credit for a relatively modest scientific contribution which they achieved (mostly) by themselves, than a share of credit in a much larger scientific contribution generated by a large team. The present system of medical science is organized to discourage mavericks and, on the whole, this is probably justifiable on the basis that scientists are not natural team players. Extra inducements are necessary to get people to adopt the relatively self-effacing behaviours necessary for building the large organizations of complementary specialists that are necessary for tackling many of the most intractable modern scientific problems. However, an ethos of teamwork does carry substantial disadvantages. Although most scientists are dispensable, and do not make a significant personal contribution, the very best scientists do make a difference to the rate of progress of science. And top notch scientists are wasted as team players. The very best scientists can function only as mavericks because they are doing science for vocational reasons. The highest intensity of personal commitment requires individual rewards from distinctive contributions. In conclusion, the current incentive system that encourages teamwork involves a trade-off. The majority of modestly talented scientists can probably achieve more when working as members of a team. But the very best scientists probably need to work as mavericks.
...: Directorate of Defense Trade Controls Information Collection: Export Declaration of Defense Technical Data or... . SUPPLEMENTARY INFORMATION: Title of Information Collection: Export Declaration of Defense Technical Data or... collection: Actual export of defense technical data and defense services must be reported directly to the...
Market mechanisms are entering into new fields of economy, in which some constraints of physical world, e.g. Kirchoffs Law in power grid, must be taken into account during trading. On such markets, some of commodities, like telecommunication bandwidth or electrical energy, appear to be non-storable, and must be exchanged in real-time. On the other hand, the markets tend to react at shortest possible time, so an idea to delegate some competency to autonomous software agents is very attractive. Multi-commodity mechanism addresses the aforementioned requirements. Modeling the relationships between the commodities allows to formulate new, more sophisticated models and mechanisms, which reflect decision situations in a better manner. Application of multi-commodity approach requires solving several issues related to data modeling, communication, semantics aspects of communication, reliability, etc. This book answers some of the questions and points out promising paths for implementation and development. Presented s...
Blair, Mary E; Le, Minh D; Thạch, Hoàng M; Panariello, Anna; Vũ, Ngọc B; Birchette, Mark G; Sethi, Gautam; Sterling, Eleanor J
Wildlife trade presents a major threat to primate populations, which are in demand from local to international scales for a variety of uses from food and traditional medicine to the exotic pet trade. We argue that an interdisciplinary framework to facilitate integration of socioeconomic, anthropological, and biological data across multiple spatial and temporal scales is essential to guide the study of wildlife trade dynamics and its impacts on primate populations. Here, we present a new way to design research on wildlife trade in primates using a systems thinking framework. We discuss how we constructed our framework, which follows a social-ecological system framework, to design an ongoing study of local, regional, and international slow loris (Nycticebus spp.) trade in Vietnam. We outline the process of iterative variable exploration and selection via this framework to inform study design. Our framework, guided by systems thinking, enables recognition of complexity in study design, from which the results can inform more holistic, site-appropriate, and effective trade management practices. We place our framework in the context of other approaches to studying wildlife trade and discuss options to address foreseeable challenges to implementing this new framework. © 2017 Wiley Periodicals, Inc.
Sohn, Hosik; Ro, Yong Man; Plataniotis, Kostantinos N.
User generated contents (UGC) are shared in an open space like social media where users can upload and consume contents freely. Since the access of contents is not restricted, the contents could be delivered to unwanted users or misused sometimes. In this paper, we propose a method for sharing UGCs securely based on the personal information of users. With the proposed method, virtual secure space is created for contents delivery. The virtual secure space allows UGC creator to deliver contents to users who have similar personal information and they can consume the contents without any leakage of personal information. In order to verify the usefulness of the proposed method, the experiment was performed where the content was encrypted with personal information of creator, and users with similar personal information have decrypted and consumed the contents. The results showed that UGCs were securely shared among users who have similar personal information.
Marjanova Jovanov, Tamara
“Economic espionage and trade secret theft threaten our nation’s national security and economic well being.” Since the 1970s brought the explosion of the Information Revolution and the rise of personal computers, we’ve become even more interested in the brain and how it works. We shouldn’t be aware of Artificial Intelligence and the smart machines of the 21st Century, but of the people in our surroundings and their ability to be corrupted from our competitors. How can we know who is rea...
Serrano, Melisa R.; Xhafa, Edlira
This paper aims at contributing to the discussions on the challenge of transitioning from precarious informal employment to more protected employment. This paper looks into a rather under-researched area - the role of trade unions in facilitating this process of 'transitioning' as well as in containing the spread of this type of employment. We refer to this process, along with its outcomes, as the 'positive transitioning effect' of trade unions. Through 10 case studies from nine countries (Br...
Cyril Nhlanhla Ngiba; David Dickinson; Louise Whittaker; Claire Beswick
The informal sector in South Africa is a significant, but not well understood phenomenon. One important question relates to the nature of the relationship between the formal and informal sector. This article uses Porter’s five forces model to interrogate the linkages between informal fruit and vegetable traders in the Natalspruit Market (Ekurhuleni) and their formal suppliers, primarily the Johannesburg Fresh Produce Market. While the threat of new products is low, the street traders’ positio...
Full Text Available This study analyzed college students’ reactions toward the issues of personal information. Students’ needs and seeking behaviors for personal information were assessed. Relevant literature was reviewed for framing the research questions and designing the questionnaire items for survey. Survey subjects were students from an university at northern Taiwan. A set of questionnaire items were used to collect research data. Statistical analysis from 252 valid data reveals some items were highly rated: Students reflected highly for their need of knowledge under the security threat of personal information (M = 4.29. They reacted strongly on acquiring knowledge and resources through the Internet (M = 4.24. They preferred the use of resources clear and easy to be understood (M = 4.04. However, most students had low level faith toward either government or non-governmental organizations in securing their personal information (M < 3.0 for most items. More effort among education and government should be emphasized in the future to improve personal use and reduce uncertainty in the use of personal information.
Robson, W.M.; Harrington, M.W.; Harlan, C.P.
EnviroTRADE (or Environmental Technologies for Remedial Actions Data Exchange) is a domestic and international information system that matches environmental problems with potential technologies solutions by combining state of the art information management techniques, graphical interfaces and a Geographic Information System (GIS). Its search and match algorithms locate technologies relevant to specific environmental problems and identify sites where technology may be applicable. EnviroTRADE also provides many other kinds of database searches and reports. EnviroTRADE is a graphical/textural information management system being developed for the cleanup program of US Department of energy's nuclear weapons complex. Its principal purpose is to provide a single, powerful, interactive data source on the many environmental restoration and waste management (ER/WM) problems and on the technologies currently under development and available to resolve them. Because the volume and complexity of the information is so large, a sophisticated Relational database Management System (RDBMS) is employed for EnviroTRADE which accommodates graphical images, technical data, structured textural descriptions, and a variety of advanced multi-media data types. EnviroTRADE is a multi-purpose, multi-user system capable of addressing a broad range of environmental assessment and cleanup issues
Robson, W.M. [Lawrence Livermore National Lab., CA (United States); Harrington, M.W.; Harlan, C.P. [Sandia National Labs., Livermore, CA (United States)
EnviroTRADE (or Environmental Technologies for Remedial Actions Data Exchange) is a domestic and international information system that matches environmental problems with potential technologies solutions by combining state of the art information management techniques, graphical interfaces and a Geographic Information System (GIS). Its search and match algorithms locate technologies relevant to specific environmental problems and identify sites where technology may be applicable. EnviroTRADE also provides many other kinds of database searches and reports. EnviroTRADE is a graphical/textural information management system being developed for the cleanup program of US Department of energy`s nuclear weapons complex. Its principal purpose is to provide a single, powerful, interactive data source on the many environmental restoration and waste management (ER/WM) problems and on the technologies currently under development and available to resolve them. Because the volume and complexity of the information is so large, a sophisticated Relational database Management System (RDBMS) is employed for EnviroTRADE which accommodates graphical images, technical data, structured textural descriptions, and a variety of advanced multi-media data types. EnviroTRADE is a multi-purpose, multi-user system capable of addressing a broad range of environmental assessment and cleanup issues.
Willey, Lorrie; Ford, Janet C.; White, Barbara Jo; Clapper, Danial L.
The impact of intellectual property (IP) law on information systems (IS) professionals in business cannot be overstated. The IS 2010 model curriculum guidelines for undergraduate IS programs stress the importance of information security and knowledge about IP. While copyright and patents are the most well-known types of IP, another, trade secrets,…
Lisa S. Parker
Full Text Available Rapidly decreasing costs of genetic technologies—especially next-generation sequencing—and intensifying need for a clinical workforce trained in genomic medicine have increased interest in having students use personal genomic information to motivate and enhance genomics education. Numerous ethical issues attend classroom/pedagogical use of students’ personal genomic information, including their informed decision to participate, pressures to participate, privacy concerns, and psychosocial sequelae of learning genomic information. This paper addresses these issues, advocates explicit discussion of these issues to cultivate students’ ethical reasoning skills, suggests ways to mitigate potential harms, and recommends collection of ethically relevant data regarding pedagogical use of personal genomic information.
Organ transplantation is widely practised worldwide. The expansion of organ transplantation has led to a critical shortage of organs and the development of the organ trade. Many patients travel to areas where organs are obtainable through commercial transactions. Although the international organ trade is regarded as an important health policy issue, its current state remains obscure because of scarce data and the lack of efforts to synthesize available data. This paper is an attempt to integrate information about the current international organ trade and create a tentative global picture based on a systematic review of 309 media reports, journal articles and other documents. The international organ trade is described in terms of its forms, the organ-exporting countries, the organ-importing countries and its outcomes and consequences.
... respondents or record keepers from the collection of information (a total capital/startup costs and operations...: 116,100. Estimated time per Response: 12 minutes. Estimated Total Annual Burden Hours: 23,220. Dated...
profits from the manufacturer to the wholesaler. Therefore, in R&D-intensive industries, such as pharmaceuticals, policy makers should anticipate the likely consequences of PT under asymmetric information on the long-run incentives to innovate.
Itay Goldstein; Assaf Razin
The paper develops a model of foreign direct investments (FDI) and foreign portfolio investments (FPI).The model describes an information-based trade off between direct investments and portfolio investments. Direct investors are more informed about the fundamentals of their projects. This information enables them to manage their projects more efficiently. However, it also creates an asymmetric-information problem in case they need to sell their projects prematurely, and reduces the price they...
Kostagiolas, Petros; Lavranos, Charilaos; Martzoukou, Konstantina; Papadatos, Joseph
Introduction: This paper explores the relationship between musicians' information seeking behaviour and their personality traits within the context of musical creativity. Although previous research has addressed different socio-technological and behavioral aspects of music information seeking, the role of personality characteristics around…
Huvila, Isto; Eriksen, Jon; Häusner, Eva-Maria; Jansson, Ina-Maria
Introduction: Recent personal information management literature has underlined the significance of the contextuality of personal information and its use. The present article discusses the applicability of the records continuum model and its generalisation, continuum thinking, as a theoretical framework for explicating the overlap and evolution of…
... ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PUBLIC INFORMATION Exemptions § 20.61 Trade..., preparing, compounding, or processing of trade commodities and that can be said to be the end product of either innovation or substantial effort. There must be a direct relationship between the trade secret and...
Johnson, S.W.; Harlan, C.P.; Harrington, M.W.; Bergeron, K.D.; Rehorn, A.S.
The US Department of Energy (DOE) has collected, and will continue to collect, large amounts of information on its environmental waste sites and associated technology development efforts. This information is being gathered in a variety of formats for various purposes. Integration and delivery of this information WW benefit decision makers, waste site managers, technology developers, regulators, and the private sector. No computer system currently exists that acts as an easy-to-use computer umbrella over all of the DOE's environmental information. The EnviroTRADE Information System, currently under development for the DOE's Environmental Restoration and Waste Management's (EM's) Office of Technology Development, provides access to a wide variety of information within a single architecture. Ongoing system development is expected to result in an extensive, networked interface to EM's diverse data benefiting a variety of users. This paper discusses the present status of the EnviroTRADE Information System as well as current and future development activities
The Industry Sector Analyses (I.S.A.) for oil field equipment contains statistical and narrative information on projected market demand, end-users, receptivity of Romanian consumers to U.S. products, the competitive situation - Romanian production, total import market, U.S. market position, foreign competition, and competitive factors, and market access - Romanian tariffs, non-tariff barriers, standards, taxes and distribution channels. The I.S.A. provides the United States industry with meaningful information regarding the Romanian market for oil field equipment
In order to establish an environment in which local public organizations and local business entities intending introduction of new energies can obtain easily the information about the technologies thereof and introduction examples, a 'list of names of persons well informed on new energies' was prepared. At the same time, a system was set up, with which these well-informed people can be introduced on NEDO home pages. The list of the names has collected data of the well-informed people granted with patents related to the fields defined in the new energy law as their specialty fields. The criterion for extracting the persons calls for persons who have experience of writing theses on new energies, and who have give lectures on the subject. Other new energy related experts acting in local areas, who were not able of having been extracted by using the above method, were extracted through hearings by key persons in each area. Questionnaire surveys were performed on the extracted specialists, whereas 495 effective answers permitting disclosure were obtained, and detailed items of information were collected on these specialists individually. The specialty fields include 23 new energy fields. The names of persons were arranged in the order of bureaus listed in the Ministry of International Trade and Industry. The names in the bureaus were arranged in the Japanese alphabetical order. (NEDO)
Mesch, Gustavo S.; Beker, Guy
This study investigated whether norms of self-disclosure of one's online and offline identity are linked to online disclosure of personal and intimate information. We expected online disclosure of personal and intimate information to be associated with norms of online disclosure. Secondary analysis of the 2006 Pew and American Life Survey of…
Cojazzi, G.G.M.; Versino, C.; Wolfart, E.; Renda, G.; Janssens, W.A.M.; )
The new state level approach being proposed by IAEA envisions an objective based and information driven safeguards approach utilizing all relevant information to improve the effectiveness and efficiency of safeguards. To this goal the IAEA makes also use of open source information, here broadly defined as any information that is neither classified nor proprietary. It includes, but is not limited to: media sources, government and non-governmental reports and analyzes, commercial data, and scientific/technical literature, including trade data. Within the EC support programme to IAEA, JRC has surveyed and catalogued open sources on import-export customs trade data and developed tools for supporting the use of the related databases in safeguards. The JRC software The Big Table, (TBT), supports i.a.: a) the search through a collection of reference documents relevant to trade analysis (legal/regulatory documents, technical handbooks); b) the selection of items of interests to specific verifications and c) the mapping of these items to customs commodities searchable in trade databases. In the field of open source monitoring, JRC is developing and operating a ''Nuclear Security Media Monitor'' (NSMM), which is a web-based multilingual news aggregation system that automatically collects news articles from pre-defined web sites. NSMM is a domain specific version of the general JRC-Europe Media Monitor (EMM). NSMM has been established within the EC support programme with the aim, i.e., to streamline IAEA's process of open source information monitoring. In the first part, the paper will recall the trade data sources relevant for non-proliferation and will then illustrate the main features of TBT, recently coupled with the IAEA Physical Model, and new visualization techniques applied to trade data. In the second part it will present the main aspects of the NSMM also by illustrating some of uses done at JRC. (author)
Full Text Available When voters cast their ballot, are they choosing a candidate or a party? Electoral systems have a significant impact on how this question is answered in each country. As previous literature has shown, some electoral rules foster a more personal representation, while others strengthen the intermediary role of parties. In this paper I maintain that there exists a trade-off between these two types of representation. To empirically verify its existence and how it works, I have chosen local and regional elections in Spain as a case study. Given that they take place simultaneously under similar electoral systems, they can be considered a natural experiment for the study of this trade-off, which allows me to overcome the potential problems of endogeneity present in previous studies. By measuring the significance of ideological closeness and candidate evaluations in voters? decisions at each level, it is shown that the importance of personal representation increases in local elections at the expense of a less frequent use of ideological proximity as an informational shortcut, thus confirming the existence of the trade-off.
Ahsan, Mahmud; Seldon, H Lee; Sayeed, Shohel
Ubiquitous personal health records, which can accompany a person everywhere, are a necessary requirement for ubiquitous healthcare. Contextual information related to health events is important for the diagnosis and treatment of disease and for the maintenance of good health, yet it is seldom recorded in a health record. We describe a dual cellphone-and-Web-based personal health record system which can include 'external' contextual information. Much contextual information is available on the Internet and we can use ontologies to help identify relevant sites and information. But a search engine is required to retrieve information from the Web and developing a customized search engine is beyond our scope, so we can use Google Custom Search API Web service to get contextual data. In this paper we describe a framework which combines a health-and-environment 'knowledge base' or ontology with the Google Custom Search API to retrieve relevant contextual information related to entries in a ubiquitous personal health record.
Tuomainen, Mika; Mykkänen, Juha
Personal information management has been proposed as an important enabler for individual empowerment concerning citizens' wellbeing and health information. In the MyWellbeing project in Finland, a strictly citizen-driven concept of "Coper" and related architectural and functional guidelines have been specified. We present a reference architecture and a set of identified application services to support personal wellbeing information management. In addition, the related standards and developments are discussed.
Full Text Available Modern Web-based Information Systems (WIS are becoming increasingly necessary to provide support for users who are in different places with different types of information, by facilitating their access to the information, decision making, workgroups, and so forth. Design of these systems requires the use of standardized methods and techniques that enable a common vocabulary to be defined to represent the underlying knowledge. Thus, mediation elements such as traders enrich the interoperability of web components in open distributed systems. These traders must operate with other third-party traders and/or agents in the system, which must also use a common vocabulary for communication between them. This paper presents the OntoTrader architecture, an Ontological Web Trading agent based on the OMG ODP trading standard. It also presents the ontology needed by some system agents to communicate with the trading agent and the behavioral framework for the SOLERES OntoTrader agent, an Environmental Management Information System (EMIS. This framework implements a “Query-Searching/Recovering-Response” information retrieval model using a trading service, SPARQL notation, and the JADE platform. The paper also presents reflection, delegation and, federation mediation models and describes formalization, an experimental testing environment in three scenarios, and a tool which allows our proposal to be evaluated and validated.
Full Text Available With continuous growth in information aggregation and dissemination, studies on privacy preferences are important to understand what makes people reveal information about them. Previous studies have demonstrated that short-term gains and possible monetary rewards make people risk disclosing information. Given the malleability of privacy preferences and the ubiquitous monetary cues in daily lives, we measured the contextual effect of reminding people about money on their privacy disclosure preferences. In experiment 1, we found that priming money increased willingness to disclose their personal information that could be shared with an online shopping website. Beyond stated willingness, experiment 2 tested whether priming money increases propensity for actually giving out personal information. Across both experiments, we found that priming money increases both the reported willingness and the actual disclosure of personal information. Our results imply that not only do short-term rewards make people trade-off personal security and privacy, but also mere exposure to money increases self-disclosure.
Nelson Remolina Angarita
Full Text Available This text analyses the legal requirements for information to be considered a trade secret based on Colombian regulations and rulings issued by the Superintendencia de Industria y Comercio. A contractual clause, by itself, does not have the power to define the information that can be considered a trade secret because freedom of choice cannot disregard the legal nature of the information.
Directory of Book Trade and Related Organizations. Books Trade Associations, United States and Canada; International and Foreign Book Trade Associations; National Information Standards Organization (NISO) Standards; Calendar, 2003-2012; Acronyms; Index of Organizations; Subject Index.
Bowker Annual Library and Book Trade Almanac, 2003
Includes two lists: one of book trade associations in the United States and Canada, and one of international and foreign book trade associations. Concludes with National Information Standards Organization (NISO) standards; calendar, 2003-2012; acronyms; index of organizations; and subject index. (LRW)
Leising, Daniel; Erbs, Julia; Fritz, Ulrike
In most studies using informant reports of personality, the informants are recruited by the targets. Such informants may tend to like the targets and thus portray them in specific ways (e.g., too positively). Study 1 (N = 403) demonstrated the necessity to distinguish between "liking" and "knowing" in studying the relationships between informants and targets. Informants who liked their targets better described them more positively (i.e., as being more extraverted, agreeable, open, conscientious, and less neurotic). The association between personality ratings and liking was moderated by item evaluativeness. Liked targets were also described as being more similar to each other (range restriction), which would lower correlations of informant ratings of personality with external variables. Study 2 (N = 90) used a within-subjects design to disentangle actual personality differences between targets (substance) from the informants' specific views on the targets (style). Ninety informants were asked to nominate targets they did not like. These targets then nominated informants of their own choice. Target-nominated informants liked the targets very much and described the targets' personalities very positively and in ways that were highly redundant with the average target's self-rating. There was evidence that lower liking may be associated with better accuracy. Higher subjective levels of knowing were not associated with better interrater agreement but with a greater willingness to describe targets negatively. Implications for the field of recruiting are discussed. Where possible, the choice of informants and referees should be made independent of the targets' preferences.
Ruotsalainen, Pekka; Nykänen, Pirkko; Seppälä, Antto; Blobel, Bernd
Modern eHealth, ubiquitous health and personal wellness systems take place in an unsecure and ubiquitous information space where no predefined trust occurs. This paper presents novel information model and an architecture for trust based privacy management of personal health and wellness information in ubiquitous environment. The architecture enables a person to calculate a dynamic and context-aware trust value for each service provider, and using it to design personal privacy policies for trustworthy use of health and wellness services. For trust calculation a novel set of measurable context-aware and health information-sensitive attributes is developed. The architecture enables a person to manage his or her privacy in ubiquitous environment by formulating context-aware and service provider specific policies. Focus groups and information modelling was used for developing a wellness information model. System analysis method based on sequential steps that enable to combine results of analysis of privacy and trust concerns and the selection of trust and privacy services was used for development of the information system architecture. Its services (e.g. trust calculation, decision support, policy management and policy binding services) and developed attributes enable a person to define situation-aware policies that regulate the way his or her wellness and health information is processed.
Hanousek, Jan; Podpiera, R.
Roč. 31, č. 2 (2003), s. 275-296 ISSN 0147-5967 R&D Projects: GA MŠk ME 595 Institutional research plan: CEZ:AV0Z7085904 Keywords : market microstructure * bid-ask spread * informed trading Subject RIV: AH - Economics Impact factor: 0.746, year: 2003
...] Agency Information Collection Activities; Proposed Collection; Comment Request; Channels of Trade Policy...)--Extension The Food Quality Protection Act of 1996 (FQPA), which amended the Federal Insecticide, Fungicide... Burden \\1\\ Annual Activity No. of frequency per Total annual Hours per Total hours respondents response...
Jones, Gareth J.F.; Gurrin, Cathal; Kelly, Liadh; Byrne, Daragh; Chen, Yi
Emerging personal lifelog (PL) collections contain permanent digital records of information associated with individuals’ daily lives. This can include materials such as emails received and sent, web content and other documents with which they have interacted, photographs, videos and music experienced passively or created, logs of phone calls and text messages, and also personal and contextual data such as location (e.g. via GPS sensors), persons and objects present (e.g. via Bluetooth) and ph...
Heisz, Jennifer J; Vakorin, Vasily; Ross, Bernhard; Levine, Brian; McIntosh, Anthony R
Episodic memory and semantic memory produce very different subjective experiences yet rely on overlapping networks of brain regions for processing. Traditional approaches for characterizing functional brain networks emphasize static states of function and thus are blind to the dynamic information processing within and across brain regions. This study used information theoretic measures of entropy to quantify changes in the complexity of the brain's response as measured by magnetoencephalography while participants listened to audio recordings describing past personal episodic and general semantic events. Personal episodic recordings evoked richer subjective mnemonic experiences and more complex brain responses than general semantic recordings. Critically, we observed a trade-off between the relative contribution of local versus distributed entropy, such that personal episodic recordings produced relatively more local entropy whereas general semantic recordings produced relatively more distributed entropy. Changes in the relative contributions of local and distributed entropy to the total complexity of the system provides a potential mechanism that allows the same network of brain regions to represent cognitive information as either specific episodes or more general semantic knowledge.
Kesselheim, Aaron S; Sinha, Michael S; Joffe, Steven
Although insider trading is illegal, recent high-profile cases have involved physicians and scientists who are part of corporate governance or who have access to information about clinical trials of investigational products. Insider trading occurs when a person in possession of information that might affect the share price of a company's stock uses that information to buy or sell securities--or supplies that information to others who buy or sell--when the person is expected to keep such information confidential. The input that physicians and scientists provide to business leaders can serve legitimate social functions, but insider trading threatens to undermine any positive outcomes of these relationships. We review insider-trading rules and consider approaches to securities fraud in the health care field. Given the magnitude of the potential financial rewards, the ease of concealing illegal conduct, and the absence of identifiable victims, the temptation for physicians and scientists to engage in insider trading will always be present. Minimizing the occurrence of insider trading will require robust education, strictly enforced contractual provisions, and selective prohibitions against high-risk conduct, such as participation in expert consulting networks and online physician forums, by those individuals with access to valuable inside information.
Emma Emanuilova Yandybaeva
Full Text Available The methods of information subjects and objects interaction rules formalization in the electronic trading platform system has been developed. They are based on mathematical model of mandatory role-based access control. As a result of the work we have defined set of user roles and constructed roles hierarchy. For the roles hierarchy restrictions have been imposed to ensure the safety of the information system.
followed during a project assignment. The long version of the commonly-used NEO-PI-R test instrument was employed to describe and compare each group member's personality traits at a more detailed level. Data were also collected through a process survey, a diary and an interview. Analysis. The calculation....... Information behaviour associated with personality traits was identified, but the presence of personality effects tended to vary with the perceived presence of the social context. Conclusions. Some matches were identified between group members' personality traits and their actual information behaviour...... but there were also deviations, which were found that seemed to be related to the group-work context. The importance of studying personality traits in context has further been confirmed....
... or sale is not “on the basis of” material nonpublic information if the person making the purchase or... nonpublic information if the person demonstrates that: (i) The individual making the investment decision on... person's business, to ensure that individuals making investment decisions would not violate the laws...
Ionascu, D.; Žigić, Krešimir
Roč. 19, č. 3 (2005), s. 417-446 ISSN 1016-8737 Institutional research plan: CEZ:AV0Z70850503 Keywords : strategic trade policy * free trade * government´s commitment Subject RIV: AH - Economics http://dx.doi.org/10.1080/10168730500199640
Okun, Andrea H; Watkins, Janice P; Schulte, Paul A
There has not been a systematic study of the nature and extent to which business and professional trade associations and labor organizations obtain and communicate workplace safety and health information to their members. These organizations can serve as important intermediaries and play a central role in transferring this information to their members. A sample of 2294 business and professional trade associations and labor organizations in eight industrial sectors identified by the National Occupational Research Agenda was surveyed via telephone. A small percent of these organizations (40.9% of labor organizations, 15.6% of business associations, and 9.6% of professional associations) were shown to distribute workplace safety and health information to their members. Large differences were also observed between industrial sectors with construction having the highest total percent of organizations disseminating workplace safety and health information. There appears to be significant potential to utilize trade and labor organizations as intermediaries for transferring workplace safety and health information to their members. Government agencies have a unique opportunity to partner with these organizations and to utilize their existing communication channels to address high risk workplace safety and health concerns. Published 2017. This article is a U.S. Government work and is in the public domain in the USA.
Gostin, L O
Kearns, Lorna R.; Frey, Barbara A.; Tomer, Christinger; Alman, Susan
The literature suggests that personal information management is a serious challenge for many computer users. Online faculty are especially challenged because of the large number of electronic files necessitated by teaching online. Those who have experience in this environment may offer valuable insights regarding information management challenges…
Bergman, Ofer; Beyth-Marom, Ruth; Nachmias, Rafi
Explains personal information management (PIM) systems and suggests a user-subjective approach to PIM system design. Advocates that PIM systems relate to the subjective value-added attributes that the user gives the stored data so that the user can find information again, recall it when needed, and use it effectively in the next interaction.…
Full Text Available All academic information on the web or elsewhere has its creator, that is, a subject who has created the information. The subject can be an individual, a group, or an institution, and can be a nation depending on the nature of the relevant information. Most information is composed of a title, an author, and contents. An essay which is under the academic information category has metadata including a title, an author, keyword, abstract, data about publication, place of publication, ISSN, and the like. A patent has metadata including the title, an applicant, an inventor, an attorney, IPC, number of application, and claims of the invention. Most web-based academic information services enable users to search the information by processing the meta-information. An important element is to search information by using the author field which corresponds to a personal name. This study suggests a method of efficient indexing and using the adjacent operation result ranking algorithm to which phrase search-based boosting elements are applied, and thus improving the accuracy of the search results of personal names. It also describes a method for providing the results of searching co-authors and related researchers in searching personal names. This method can be effectively applied to providing accurate and additional search results in the academic information services.
This study, conducted by the California Energy Commission, was funded by the U.S. Trade and Development Agency. Progress Report No. 4 is divided into the following contents: April 6, 1994 Training Mission Delegation Itinerary; April 6, 1994 Training Mission Workshop Information Package; Letter to Chairman of Tenaga Nasional Berhad Requesting Demonstration Project Funding; Design/Build Construction Bid Proposal for Energy Efficient Electric Technology Demontration Project; Final Draft of Demand-Side Management Plan for Tenaga Nasional Berhad; Attachments.
... concentrated orange juice. Provided, however, that any person entering into such transactions solely for the..., or agent (or any person occupying a similar status or performing similar functions) that: (i...
Kamei, Koji; Funakoshi, Kaname; Akahani, Jun-Ichi; Satoh, Tetsuji
In this paper, we propose an inter-personal information sharing model among individuals based on personalized recommendations. In the proposed model, we define an information resource as shared between people when both of them consider it important --- not merely when they both possess it. In other words, the model defines the importance of information resources based on personalized recommendations from identifiable acquaintances. The proposed method is based on a collaborative filtering system that focuses on evaluations from identifiable acquaintances. It utilizes both user evaluations for documents and their contents. In other words, each user profile is represented as a matrix of credibility to the other users' evaluations on each domain of interests. We extended the content-based collaborative filtering method to distinguish other users to whom the documents should be recommended. We also applied a concept-based vector space model to represent the domain of interests instead of the previous method which represented them by a term-based vector space model. We introduce a personalized concept-base compiled from each user's information repository to improve the information retrieval in the user's environment. Furthermore, the concept-spaces change from user to user since they reflect the personalities of the users. Because of different concept-spaces, the similarity between a document and a user's interest varies for each user. As a result, a user receives recommendations from other users who have different view points, achieving inter-personal information sharing based on personalized recommendations. This paper also describes an experimental simulation of our information sharing model. In our laboratory, five participants accumulated a personal repository of e-mails and web pages from which they built their own concept-base. Then we estimated the user profiles according to personalized concept-bases and sets of documents which others evaluated. We simulated
... required of self-regulatory organizations operating pilot trading systems pursuant to Â§ 240.19b-5 of this... Associations § 249.821 Form PILOT, information required of self-regulatory organizations operating pilot trading systems pursuant to § 240.19b-5 of this chapter. This form shall be used by all self-regulatory...
Full Text Available personal information. Like many other countries, South Africa, in 2013 officially approved and enacted the Protection of Personal Information Act, which gives guidelines that should be followed when processing personal information. The Act regards biometric...
Murray, Nicholas D.
The Global Change Technology Initiative (GCTI) was established to develop technology which will enable use of satellite systems of Earth observations on a global scale, enable use of the observations to predictively model Earth's changes, and provide scientists, government, business, and industry with quick access to the resulting information. At LaRC, a GCTI Architecture Trade Study was undertaken to develop and evaluate the architectural implications to meet the requirements of the global change studies and the eventual implementation of a global change system. The output of the trade study are recommended technologies for the GCTI. That portion of the study concerned with the information data system is documented. The information data system for an earth global change modeling system can be very extensive and beyond affordability in terms of today's costs. Therefore, an incremental approach to gaining a system is most likely. An options approach to levels of capability versus needed technologies was developed. The primary drivers of the requirements for the information data system evaluation were the needed science products, the science measurements, the spacecraft orbits, the instruments configurations, and the spacecraft configurations and their attendant architectures. The science products requirements were not studied here; however, some consideration of the product needs were included in the evaluation results. The information data system technology items were identified from the viewpoint of the desirable overall information system characteristics.
Liu, Yi-Fang; Zhang, Wei; Xu, Chao; Vitting Andersen, Jørgen; Xu, Hai-Chuan
This paper studies the switching of trading strategies and its effect on the market volatility in a continuous double auction market. We describe the behavior when some uninformed agents, who we call switchers, decide whether or not to pay for information before they trade. By paying for the information they behave as informed traders. First we verify that our model is able to reproduce some of the stylized facts in real financial markets. Next we consider the relationship between switching and the market volatility under different structures of investors. We find that there exists a positive relationship between the market volatility and the percentage of switchers. We therefore conclude that the switchers are a destabilizing factor in the market. However, for a given fixed percentage of switchers, the proportion of switchers that decide to buy information at a given moment of time is negatively related to the current market volatility. In other words, if more agents pay for information to know the fundamental value at some time, the market volatility will be lower. This is because the market price is closer to the fundamental value due to information diffusion between switchers.
The policy arguments for and against prohibiting insider trading within the petroleum industry are discussed. Legal definitions of all relevant terms (e.g. 'special relationship' 'tippees', 'material facts', material changes' 'generally disclosed' information', 'necessary course of business') are provided. Enforcement of insider trading/tipping prohibitions are also defined. The recommended practice is: do not trade; do not tell or advise; encourage timely disclosure; do not speculate; implement a corporate disclosure and trading policy
Thijs van Overveld
Full Text Available One aspect of animal personality that has been well described in captivity, but received only little attention in studies in the wild, is that personality types may vary in their behavioural flexibility towards environmental changes. A fundamental factor underlying such differences is believed to be the degree to which individual behavior is guided by environmental stimuli. We tested this hypothesis in the wild using free-ranging great tits. Personality variation was quantified using exploratory behaviour in a novel environment, which has previously been shown to be repeatable and correlated with other behaviours in this and other populations of the same species. By temporarily removing food at feeding stations we examined whether birds with different personality differed in returning to visit empty feeders as this may provide information on how birds continue to sample their environment after a sudden change in conditions. In two summer experiments, we found that fast-exploring juveniles visited empty feeders less often compared to slow-exploring juveniles. In winter, sampling behaviour was sex dependent but not related to personality. In both seasons, we found that birds who sampled empty feeders more often were more likely to rediscover food after we again re-baited the feeding stations, but there was no effect of personality. Our results show that personality types may indeed differ in ways of collecting environmental information, which is consistent with the view of personalities as different styles of coping with environmental changes. The adaptive value of these alternative behavioural tactics, however, needs to be further explored.
Indratmo, J; Vassileva, Julita
Personal information management (PIM) covers a large area of research fragmented into separate sub-areas such as file management, web bookmark organization, and email management. Consequently, it is hard to obtain a unified view of the various approaches to PIM developed in these different sub-areas. In this article, we synthesize and classify existing research on PIM based on the approach used to organize information items. We classify the organizational structures into five categories: hier...
.... (a) General responsibilities. DoD Components shall establish appropriate administrative, technical..., the sensitivity of the personal information stored, the storage medium used and, to a degree, the... automated environment (see appendix A). (5) Tailor safeguards specifically to the vulnerabilities of the...
Bhardwaj, S.; Sain, M.; Lee, H.-J.; Chung, W.Y.; Slezak, D.; et al., xx
Due to recent development in Ubiquitous Healthcare now it’s time to build such application which can work independently and with less interference of Physician. In this paper we are try to build the whole architecture of personal Healthcare information system for ubiquitous healthcare which also
Full Text Available Identity theft has become one of the fastest growing white collar crimes in the world. It occurs when an individual's personal information such as inter alia his or her name, date of birth or credit card details is used by another individual to commit identity fraud. Identity theft can be committed via physical means or online. The increased use of the Internet for business and financial transactions, social networking and the storage of personal information has facilitated the work of identity thieves. Identity theft has an impact on the personal finances and emotional well-being of victims, and on the financial institutions and economies of countries. It presents challenges for law enforcement agencies and governments worldwide. This article examines how identity thieves use the personal information of individuals to commit identity fraud and theft, and looks at legislative solutions introduced in South Africa, the United States of America, the United Kingdom and India to combat identity theft crimes. The article examines measures introduced by the respective governments in these countries to counteract such crimes. Finally, the article will propose a way forward to counteract such crimes in the future. The study reveals that identity theft is a growing and evolving problem that requires a multi-faceted and multi-disciplinary approach by law enforcement agencies, businesses, individuals and collaboration between countries. It is advocated that businesses and institutions should take measures to protect personal information better and that individuals should be educated about their rights, and be vigilant and protect their personal information offline and in cyberspace.
Laís Forti Thomaz
Full Text Available The purpose of this article is to analyze the U.S. international agricultural trade policy by focusing on instruments and institutional arrangements. Policy decision-making is analyzed by means of three variables: 1 how interests are mobilized; 2 how information is disseminated; and 3 how spaces are occupied in deliberation arenas. The study refers to the corn sector and observes how the National Corn Growers Association operated to ensure subsidies and incentives for this supply chain along the elaboration of the 2002 and 2008 Farm Bills, as well as from other laws pertaining to agricultural and energy incentives. This paper provides evidences in favor of four arguments: first, empirical studies on the formulation and implementation of foreign trade policy, especially when it comes to agricultural issues, would greatly benefit with a greater attention on understanding the role domestic actors play in the decision-making processes; second, interest groups play a key role in this decision-making process; third, they provide the rationale for the formulation and implementation of the U.S. international agricultural trade policy; and, fourth, when the economic sector coordinates complex and relevant supply chains in the U.S. economy, it is hardly possible to revert the U.S. protectionist position in the Legislative branch.
Dhar, Rajib Lochan
This research aimed to understand the information technology (IT) employees' perception and approach towards union formation in the Indian IT Industry. Fifty IT professionals from three different organizations participated in this study who were dispersed throughout the organizational hierarchy and were selected via randomized quota sampling to reflect a mix of age, experience, gender and position they held with the organization. Qualitative methods were used in order to collect the data, through phenomenological principles. Discussion with the participants led to the emergence of four themes which influence the employees' perception of trade union formation the Indian IT industry. These were: (a) feeling of a blue collar, (b) collective to individual bargaining, (c) changing role of HR and (d) other reasons. This study provided a tentative starting point towards the greater understanding of the employee's perceived notion of organizational life that influences employee's outlook towards trade unionism. Based on the study findings, there is an imperative that the human resource department, organizational forerunners and trade union philosophers continue to use research findings to understand employees' views about union formation in the IT industry.
Full Text Available This paper highlights the first attempt by researchers at Stellenbosch University to model freight flows between and for 17 countries in sub-Saharan Africa (SSA. The model will be informed by and linked to the South African surface Freight Demand Model (FDM given these dimensions. By analysing and collating available datasets and developing a freight flow model, a better understanding of freight movements between countries can be obtained and then used for long-term planning efforts. A simple methodology is envisaged that will entail a high-level corridor classification that links a major district in the country with a similar district in another country. Existing trade data will be used to corroborate new base-year economic demand and supply volumetric data that will be generated from social accounting matrices for each country. The trade data will also provide initial flow dynamics between countries that will be refined according to the new volumes. The model can then generate commodity-level corridor flows between SSA countries, and between SSA countries and the rest of the world, as well as intra-country rural and metropolitan flows, using a gravity-based modelling approach. This article outlines efforts to harmonise trade data between the 17 countries identified, as well as between these countries and the rest of the world as a first step towards developing a freight demand model for sub-Saharan Africa.
Healthcare technologies are evolving from a practitioner-centric model to a patient-centric model due to the increasing need for technology that directly serves healthcare consumers, including healthy people and patients. Personal health information management (PHIM) technology is one of the technologies designed to enhance an individual's ability…
Genoni, Marco G; Paris, Matteo G A [Dipartimento di Fisica, Universita degli studi di Milano (Italy)
We address the trade-off between information gain and state disturbance in measurement performed on qudit systems and devise a class of optimal measurement schemes that saturate the ultimate bound imposed by quantum mechanics to estimation and transmission fidelities. The schemes are minimal, i.e. they involve a single additional probe qudit, and optimal, i.e. they provide the maximum amount of information compatible with a given level of disturbance. The performances of optimal single-user schemes in extracting information by sequential measurements in a N-user transmission line are also investigated, and the optimality is analyzed by explicit evaluation of fidelities. We found that the estimation fidelity does not depend on the number of users, neither for single-measure inference nor for collective one, whereas the transmission fidelity decreases with N. The resulting trade-off is no longer optimal and degrades with increasing N. We found that optimality can be restored by an effective preparation of the probe states and present explicitly calculations for the 2-user case.
Huang, Song; Tian, Na; Wang, Yan; Ji, Zhicheng
Convergence stagnation is the chief difficulty to solve hard optimization problems for most particle swarm optimization variants. To address this issue, a novel particle swarm optimization using multi-information characteristics of all personal-best information is developed in our research. In the modified algorithm, two positions are defined by personal-best positions and an improved cognition term with three positions of all personal-best information is used in velocity update equation to enhance the search capability. This strategy could make particles fly to a better direction by discovering useful information from all the personal-best positions. The validity of the proposed algorithm is assessed on twenty benchmark problems including unimodal, multimodal, rotated and shifted functions, and the results are compared with that obtained by some published variants of particle swarm optimization in the literature. Computational results demonstrate that the proposed algorithm finds several global optimum and high-quality solutions in most case with a fast convergence speed.
Jelena Anđelković Labrović
Full Text Available Personal learning environments are a widely spared ways of learning, especially for the informal learning process. The aim of this research is to identify the elements of studens’ personal learning environment and to identify the extent to which students use modern technology for learning as part of their non-formal learning. A mapping system was used for gathering data and an analysis of percentages and frequency counts was used for data analysis in the SPSS. The results show that students’ personal learning environment includes the following elements: Wikipedia, Google, YouTube and Facebook in 75% of all cases, and an interesting fact is that all of them belong to a group of Web 2.0 tools and applications.
Franke, Günter; Hess, Dieter
This paper compares the attractiveness of floor trading and anonymous electronic trading systems. It is argued that in times of low information intensity the insight into the order book of the electronic trading system provides more valuable information than floor trading, but in times of high information intensity the reverse is true. Thus, the electronic system's market share in trading activity should decline in times of high information intensity. This hypothesis is tested by data on BUND...
Azizan H. M.; Razlina H. J.
In reality, workplace incivility has its fair share of attention in organizational research dealing with its causes and effect relationships. In Islam, incivility equates the negative character (akhlak) of ridiculing others. Consequently, the purpose of this study is to investigate relationship between the experience of workplace incivility and job attitudes as well as the moderating effect of Muslim religiosity personality, which is measured by Muslim Religiosity-Personality Inventory ...
N. C. Bresler
Full Text Available Purpose: The purpose of this article is to describe what attracts visitors to an industrial trade show, and to profile them. This will enable the show organisers to attract the right mix of exhibitors and fulfil their dual role of satisfying the needs of both attendees and exhibitors and improve the role of exhibitions in the latter's marketing mix. Problem investigated: The research seeks to elicit the attendance objectives of participants in order to ascertain their information seeking and procurement needs. This can be used to improve the marketing communication of both the organisers and exhibitors. Research methodology: The research design is a multi method, descriptive study. A non probability, judgemental sample was drawn; 1020 interviews were conducted per Electra Mining Africa expo in 2004 and 2006. Both open ended and fixed response questions were posed and due to the similarity of responses, 300 per show were analysed. The researcher fulfilled a participant observer role to enhance the validity and reliability of the findings. Findings/implications: The prime reason for visitation was to see what is new, discover, and gather information, and attendees were not disappointed in that. The trade shows attracted an informed, niche audience. Exhibitors gained access to key decision makers with buying influence. Attendees represented all roles in the buying process and intended to buy some capital items exhibited within the following year. Business contacts were made. The attraction and contact efficiency of the exhibition's were high and may result in conversion efficiency. In terms of market and geographical coverage it is a vertical international show. Originality: This paper contributes to limited research conducted on trade shows, especially in South Africa. It is unique in that it describes the effectiveness of an industrial trade show from a demand perspective in order to improve the facilitating role of exhibition organisers. It
Azizan H. M.
Full Text Available In reality, workplace incivility has its fair share of attention in organizational research dealing with its causes and effect relationships. In Islam, incivility equates the negative character (akhlak of ridiculing others. Consequently, the purpose of this study is to investigate relationship between the experience of workplace incivility and job attitudes as well as the moderating effect of Muslim religiosity personality, which is measured by Muslim Religiosity-Personality Inventory (MRPI, on the relationships. In other words, this study plans to analyze whether Muslim employees, who possess religiosity personality would be able to endure workplace incivility experiences. Basically, literature by Al-Ghazali, Al-Attas and Al-Raiya on Islamic personality serve as the main foundation of the study. In addition, the works of Baron and Neuman (1998, Andersson & Pearson (1999 and Schilpzand, et. al (2014 were reviewed and a research framework was developed. The quantitative survey consisted of five sections used to measure the experience of workplace incivility, job attitudes, religiosity personality and demographics. A sample of 163 Malaysian Muslim bank workers completed the survey. Four main variables have been analyzed and their descriptive analyses are as the following. Scores for Workplace Incivility variable (M=3.34, SD=.27; Job Satisfaction variable (M=1.79, SD=.65; Organizational Commitment variable (M=2.74, SD=.34 and Muslim Religiosity Personality (M=3.60, SD=.42. As for the Pearson’s Correlation test, the result indicates that Workplace Incivility variable has inverse correlations with both job attitude variables (Job Satisfaction, R=-.611, p=.01; Organizational Commitment, R=.731,p=.01. Meanwhile, the overall model was significant, R2 = .401, F(3, 159 = 24.06, p= .01. Tests to see if the data met the assumption of collinearity indicate that multicollinearity was not a concern (Job Satisfaction, Tolerance = .96, VIF = 1
Icek Ajzen; Thomas C. Brown; Lori H. Rosenthal
A laboratory experiment examined the potential for information bias in contingent valuation (CV). Consistent with the view that information about a public or private good can function as a persuasive communication, willingness to pay (WTP) was found to increase with the quality of arguments used to describe the good, especially under conditions of high personal...
Potini, Vishnu C; Weerasuriya, Dilani N; Lowery-North, Douglas W; Kellermann, Arthur L
Describe commercially available products and services designed to convey personal health information in emergencies. The search engine Google®, supplemented by print ads, was used to identify companies and organizations that offer relevant products and services to the general market. Disease-specific, health system, and health plan-specific offerings were excluded. Vendor web sites were the primary sources of information, supplemented by telephone and e-mail queries to sales representatives. Perfect inter-rater agreement was achieved. Thirty-nine unique vendors were identified. Eight sell engraved jewelry. Three offer an embossed card or pamphlet. Twelve supply USB drives with various features. Eleven support password-protected web sites. Five maintain national call centers. Available media differed markedly with respect to capacity and accessibility. Quoted prices ranged from a one-time expenditure of $3.50 to an annual fee of $200. Associated features and annual fees varied widely. A wide range of products and services exist to help patients convey personal health information. Health care providers should be familiar with their features, so they can access the information in a disaster or emergency.
... companies by introducing them to key international trade fairs where they can achieve their export... trade fair, and to ensure that the fair is a good marketing opportunity for U.S. companies. II. Method...
...-01] Announcing Approval of Federal Information Processing Standard (FIPS) Publication 201-2, Personal... Commerce's approval of Federal Information Processing Standard (FIPS) Publication 201-2, Personal Identity... Information Processing Standards (FIPS). Homeland Security Presidential Directive (HSPD) 12, entitled ``Policy...
Full Text Available Personal learning environments (PLEs and critical information literacies (CILs are two concepts that have been presented as responses to the challenges of the rich and complex information landscape. While both approaches support learners’ critical engagement with new information environments, each was developed within a different field. This paper connects and contrasts PLEs and CILs in order to explore the design of pedagogical responses to the information environment. Through a careful examination of PLE and CIL literature, the paper demonstrates that information literacy education intersects with the concepts and goals of PLEs. As such, the authors suggest that PLE scholarship informed by CIL scholarship, and vice versa, will yield a deeper understanding of modern learning contexts as well as a more holistic and responsive learner framework. The example of the research assignment will be used to demonstrate the viability of this approach. With these propositions, the authors invite educators, librarians and information technologists to engage in a dialogue about these concepts and the potential for pedagogical change.
Buchauer, A; Werner, R; Haux, R
Health-care professionals have a broad range of needs for information and cooperation while working at different points of care (e.g., outpatient departments, wards, and functional units such as operating theaters). Patient-related data and medical knowledge have to be widely available to support high-quality patient care. Furthermore, due to the increased specialization of health-care professionals, efficient collaboration is required. Personal mobile information tools have a considerable potential to realize almost ubiquitous information and collaborative support. They enable to unite the functionality of conventional tools such as paper forms, dictating machines, and pagers into one tool. Moreover, they can extend the support already provided by clinical workstations. An approach is described for the integration of mobile information tools with heterogeneous hospital information systems. This approach includes identification of functions which should be provided on mobile tools. Major functions are the presentation of medical records and reports, electronic mailing to support interpersonal communication, and the provision of editors for structured clinical documentation. To realize those functions on mobile tools, we propose a document-based client-server architecture that enables mobile information tools to interoperate with existing computer-based application systems. Open application systems and powerful, partially wireless, hospital-wide networks are the prerequisites for the introduction of mobile information tools.
Brennan, Allison A; Watson, Marcus R; Kingstone, Alan; Enns, James T
Does person perception--the impressions we form from watching others--hold clues to the mental states of people engaged in cognitive tasks? We investigated this with a two-phase method: In Phase 1, participants searched on a computer screen (Experiment 1) or in an office (Experiment 2); in Phase 2, other participants rated the searchers' video-recorded behavior. The results showed that blind raters are sensitive to individual differences in search proficiency and search strategy, as well as to environmental factors affecting search difficulty. Also, different behaviors were linked to search success in each setting: Eye movement frequency predicted successful search on a computer screen; head movement frequency predicted search success in an office. In both settings, an active search strategy and positive emotional expressions were linked to search success. These data indicate that person perception informs cognition beyond the scope of performance measures, offering the potential for new measurements of cognition that are both rich and unobtrusive.
. This broadened approach will take our thinking beyond current preoccupation with whether or not individuals’ consent was secured for data collection to privacy issues arising from the development of new information on individuals' likely behavior through analysis of already collected data—this new information......In the age of big data we need to think differently about privacy. We need to shift our thinking from definitions of privacy (characteristics of privacy) to models of privacy (how privacy works). Moreover, in addition to the existing models of privacy—the surveillance model and capture model......—we need to also consider a new model: the datafication model presented in this article, wherein new personal information is deduced by employing predictive analytics on already-gathered data. These three models of privacy supplement each other; they are not competing understandings of privacy...
... Activities; Customs-Trade Partnership Against Terrorism (C-TPAT) AGENCY: U.S. Customs and Border Protection... accordance with the Paperwork Reduction Act: Customs-Trade Partnership Against Terrorism (C-TPAT). This is a...: Customs-Trade Partnership Against Terrorism (C-TPAT). OMB Number: 1651-0077. Form Number: None. Abstract...
... Activities; Proposed Collection; Comment Request; Trade Secret Claims for Emergency Planning and Community... Planning and Community Right-to- Know Act (EPCRA). Title: Trade Secret Claims for Emergency Planning and...). Estimated total number of potential respondents: 481. Frequency of response: Trade secret claims are...
..., Attn: Tracey Denning, Regulations and Rulings, Office of International Trade, 90 K Street NE., 10th... and Rulings, Office of International Trade, 90 K Street NE., 10th Floor, Washington, DC 20229-1177, at... trade benefits to countries in the Caribbean Basin. For preferential duty treatment under CBTPA...
... Activities: North American Free Trade Agreement Duty Deferral AGENCY: U.S. Customs and Border Protection (CBP... collection requirement concerning the North American Free Trade Agreement (NAFTA) Duty Deferral. This request...: 1651-0071. Abstract: The provisions of North American Free Trade Agreement (NAFTA) were adopted by the...
Liu, Cong; Ang, Rebecca P; Lwin, May O
The current study aims to understand the factors that influence adolescents' disclosure of personally identifiable information (PII) on social networking sites (SNSs). A survey was conducted among 780 adolescent participants (between 13 and 18) who were Facebook users. Structural equation modeling was used for analyzing the data and obtaining an overarching model that include cognitive, personality, and social factors that influence adolescents' PII disclosure. Results showed privacy concern as the cognitive factor reduces adolescents' PII disclosure and it serves as a potential mediator for personality and social factors. Amongst personality factors, narcissism was found to directly increase PII disclosure, and social anxiety indirectly decreases PII disclosure by increasing privacy concern. Amongst social factors, active parental mediation decreases PII disclosure directly and indirectly by increasing privacy concern. Restrictive parental mediation decreases PII disclosure only indirectly by increasing privacy concern. Implications of the findings to parents, educators, and policy makers were discussed. Copyright © 2013 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.
... change). Affected Public: Businesses, Individuals. Estimated Number of Respondents: 6,500. Estimated Time... previously approved. CBP is proposing that this information collection be extended with no change to the... other technological techniques or other forms of information. Title: Customs-Trade Partnership Against...
Obesity and climate change are two problems currently challenging humanity. Although apparently unrelated, an epidemiological approach to both shows a similar environmental aetiology, based in modern human lifestyles and their driving economic forces. One way of analysing this is through inflammation (defined as '. . . a disturbance of function following insult or injury') of both the internal (biological) and external (ecological) environments. Chronic, low-grade, systemic inflammation has recently been shown to accompany obesity, as well as a range of biological pathologies associated with obesity (diabetes, heart disease, some cancers, etc.). This is influenced by the body's inability to soak up excess glucose as a result of insulin resistance. In a broader sense, inflammation is a metaphor for ecological 'pathologies', manifest particularly in unnatural disturbances like climate change, ocean acidity, rising temperatures and species extinction, associated with the inability of the world's environmental 'sinks' to soak up carbon dioxide ('carbon resistance'?). The use of such a metaphorical analysis opens the possibilities for dealing with two interdisciplinary problems simultaneously. Strategies for managing climate change, including personal carbon trading, could provide a 'stealth intervention' for reducing population levels of obesity by increasing personal energy expenditure and decreasing energy-dense food intake, as well as reducing the carbon emissions causing climate change.
Leonardo Souza Siqueira
Full Text Available ABSTRACT This study sought to analyze information asymmetry in the Brazilian stock market and its relation with the returns required from portfolios through the metrics volume-synchronized probability of informed trading. To do this, the study used actual data from the transactions of 142 stocks on the Brazilian Securities, Commodities and Futures Exchange (BM&FBOVESPA, within the period from May 1, 2014, to May 31, 2016. The results point out a high flow toxicity level in the orders of these stocks. In segment analyses of the stock market listing, data suggest there is no clue that stocks from the theoretically more overt segments have a lower toxicity level of order flows. The justification for this finding lies on the negative correlation observed between the market value of stocks and the toxicity level of orders. To test the effect of asymmetric information risk on stock returns, a factor related to the toxicity level of orders was added to the three-, four-, and five-factor models. Through the GRS test, we observed that the combination of factors that optimize the explanation of returns of the portfolios created was the one taking advantage of the factors market, size, profitability, investment, and information risk. To test the robustness of these results, the Average F-test was used in data simulated by the bootstrap method, and similar estimates were obtained. It was observed that the factor related to the book-to-market index becomes redundant in the national scenario for the models tested. Also, it was found that the factor related to information risk works as a complement to the factor size and that its inclusion leads to an improved performance of the models, indicating a possible explanatory power of information risk on portfolio returns. Therefore, data suggest that information risk is priced in the Brazilian stock market.
Registered nurses with a diploma or an associate's degree are encouraged to return to school to earn a Bachelor of Science in Nursing degree. Until they return to school, many RNs have little need to regularly write, store, and retrieve work-related papers, but they are expected to complete the majority of assignments using a computer when in the student role. Personal information management (PIM) is a system of organizing and managing electronic information that will reduce computer clutter, while enhancing time use, task management, and productivity. This article introduces three PIM strategies for managing school work. Nesting is the creation of a system of folders to form a hierarchy for storing and retrieving electronic documents. Each folder, subfolder, and document must be given a meaningful unique name. Numbering is used to create different versions of the same paper, while preserving the original document. Copyright 2015, SLACK Incorporated.
Full Text Available In contemplating the extent to which rights-based litigation is conducive to positive social change, attention ought to be paid to the bureaucratic impact of court judgments that vindicate rights against the State. As a case study of such impact, this article considers the effects of human rights litigation on the regulation of informal trade in the City of Johannesburg, where a 2013 attempt by local government to clamp down on informal trade in the central business district (CBD led to high-profile court action. After describing and problematising the City's general approach to managing informal trade, the article focuses on "Operation Clean Sweep", which aimed to rid much of the CBD of informal traders and became the focal point of rights-based resistance. It then briefly describes the constitutional and jurisprudential framework within which the legal challenge to "Operation Clean Sweep" was to be decided, before critically discussing the judgment of the Constitutional Court in South African Informal Traders Forum v City of Johannesburg 2014 4 SA 371 (CC, which effectively halted "Operation Clean Sweep" by interdicting the City from removing traders from their places of business. The article then proceeds to consider the aftermath of the judgment, and assesses its impact on the City's informal trade policy and urban management practices, as well as on the broader regulatory and political environment around street trade in South African cities. The article shows that the bureaucratic impact of the judgment has, at best, been mixed, and that the judgment has not been entirely successful in disrupting the legal and bureaucratic mindsets, frameworks and processes that simultaneously create, exacerbate and unsuccessfully attempt to address the "unmanageability" of street trade in Johannesburg.
Ana Serrano Tellería
Full Text Available Data collected from the profiles and the digital identities has become a valuable currency for the mobile ecosystem, especially between users and providers. Services that required them are also described as the ground floor in direct linked with the infrastructures and as intermediate layers between networks, platforms and applications. The frontier debate between innovation and protection of privacy is shown off undefined and unstable. Therefore, a comparative analysis between ‘Privacy Terms and Conditions’ as well as the interrelation between operative systems (Apple iOS, Android, Blackberry and Windows Phone, social media platforms (Facebook, LinkedIn, Twitter and Google + and applications (Instagram, WhatsApp, Line and Vine have been carried out focusing on Privacy issues. Two main tendencies were appreciated in relation with the two principal operative systems: Apple iOS closed environment and Google Android open source. They reconfigure the functional structure and design of platforms and applications in different ways. The liquid spheres observed varied from the first approach that tried to control every action and personal information from the binomial operative system-device and the second one that allowed the user actions and information to be more susceptible to interact with any kind of applications and platforms while the system is linked to information aggregation services to collect the data. Prominent aspects were the various stages of synchronization between the different levels of personal information (contacts, profile, digital identity and localization. Focusing on the case of Portugal, other complementary conclusions obtained from focus group and surveys showed a strong circumstantial pattern behaviour and a concern about privacy issues taking care of some actions while admitted checking if they had the terms and conditions involved - which are too ambiguous - but not reading them. Described also by other international
Kim, Sujin; Sinn, Donghee; Syn, Sue Yeon
With abundant personal health information at hand, individuals are faced with a critical challenge in evaluating the informational value of health care records to keep useful information and discard that which is determined useless. Young, healthy college students who were previously dependents of adult parents or caregivers are less likely to be concerned with disease management. Personal health information management (PHIM) is a special case of personal information management (PIM) that is associated with multiple interactions among varying stakeholders and systems. However, there has been limited evidence to understand informational or behavioral underpinning of the college students' PHIM activities, which can influence their health in general throughout their lifetime. This study aimed to investigate demographic and academic profiles of college students with relevance to PHIM activities. Next, we sought to construct major PHIM-related activity components and perceptions among college students. Finally, we sought to discover major factors predicting core PHIM activities among college students we sampled. A Web survey was administered to collect responses about PHIM behaviors and perceptions among college students from the University of Kentucky from January through March 2017. A total of 1408 college students were included in the analysis. PHIM perceptions, demographics, and academic variations were used as independent variables to predict diverse PHIM activities using a principal component analysis (PCA) and hierarchical regression analyses (SPSS v.24, IBM Corp, Armonk, NY, USA). Majority of the participants were female (956/1408, 67.90%), and the age distribution of this population included an adequate representation of college students of all ages. The most preferred health information resources were family (612/1408, 43.47%), health care professionals (366/1408, 26.00%), friends (27/1408, 1.91%), and the internet (157/1408, 11.15%). Organizational or
Song, Jung Heon; Wu, Kesheng; Simon, Horst D.
VPIN (Volume synchronized Probability of Informed trading) is a leading indicator of liquidity-induced volatility. It is best known for having produced a signal more than hours before the Flash Crash of 2010. On that day, the market saw the biggest one-day point decline in the Dow Jones Industrial Average, which culminated to the market value of $1 trillion disappearing, but only to recover those losses twenty minutes later (Lauricella 2010). The computation of VPIN requires the user to set up a handful of free parameters. The values of these parameters significantly affect the effectiveness of VPIN as measured by the false positive rate (FPR). An earlier publication reported that a brute-force search of simple parameter combinations yielded a number of parameter combinations with FPR of 7%. This work is a systematic attempt to find an optimal parameter set using an optimization package, NOMAD (Nonlinear Optimization by Mesh Adaptive Direct Search) by Audet, le digabel, and tribes (2009) and le digabel (2011). We have implemented a number of techniques to reduce the computation time with NOMAD. Tests show that we can reduce the FPR to only 2%. To better understand the parameter choices, we have conducted a series of sensitivity analysis via uncertainty quantification on the parameter spaces using UQTK (Uncertainty Quantification Toolkit). Results have shown dominance of 2 parameters in the computation of FPR. Using the outputs from NOMAD optimization and sensitivity analysis, We recommend A range of values for each of the free parameters that perform well on a large set of futures trading records.
Mohammed Amine Alimam
Full Text Available The use of modern educational technology methods has become an important area of research in order to support learning as well as collaboration. This is especially evident with the rise of internet and web 2.0 platforms that have transformed users’ role from mere content consumers to fully content consumers-producers. Furthermore, people engaged in collaborative learning capitalize on one another’s resources and skills, unlike individual learning. This paper proceeds with a categorization of the main tools and functions that characterize the personalization learning aspect, in order to discuss their trade-offs with collaborative learning systems. It proposes a framework of a personalized information research (IR within a collaborative learning system, incorporating the characterization of the research type carried by the query, as well as modeling and constructing semantic users’ profiles. We use the context of the user query into a prediction mechanism of the search type, based on a previous identification of users’ levels and interests. The paper is concluded by presenting experiment results, revealing that the use of the subject ontology extension approach satisfyingly contributes to improvement in the accuracy of system recommendations.
National Oceanic and Atmospheric Administration, Department of Commerce — The Foreign Trade database has monthly volume and value information for US imports, exports, and re-exports of fishery or fishery derived products. Data is...
Chung, Wan-Young; Fong, Ee May
Noncontact ECG measurement has gained popularity these days due to its noninvasive and conveniences to be applied on daily life. This approach does not require any direct contact between patient's skin and sensor for physiological signal measurement. The noncontact ECG measurement is integrated with mobile healthcare system for health status monitoring. Mobile phone acts as the personal health information system displaying health status and body mass index (BMI) tracking. Besides that, it plays an important role being the medical guidance providing medical knowledge database including symptom checker and health fitness guidance. At the same time, the system also features some unique medical functions that cater to the living demand of the patients or users, including regular medication reminders, alert alarm, medical guidance, appointment scheduling. Lastly, we demonstrate mobile healthcare system with web application for extended uses, thus health data are clouded into web server system and web database storage. This allows remote health status monitoring easily and so forth it promotes a cost effective personal healthcare system.
Neame, Roderick L B
The protection of personal information privacy has become one of the most pressing security concerns for record keepers: this will become more onerous with the introduction of the European General Data Protection Regulation (GDPR) in mid-2014. Many institutions, both large and small, have yet to implement the essential infrastructure for data privacy protection and patient consent and control when accessing and sharing data; even more have failed to instil a privacy and security awareness mindset and culture amongst their staff. Increased regulation, together with better compliance monitoring, has led to the imposition of increasingly significant monetary penalties for failure to protect privacy: these too are set to become more onerous under the GDPR, increasing to a maximum of 2% of annual turnover. There is growing pressure in clinical environments to deliver shared patient care and to support this with integrated information. This demands that more information passes between institutions and care providers without breaching patient privacy or autonomy. This can be achieved with relatively minor enhancements of existing infrastructures and does not require extensive investment in inter-operating electronic records: indeed such investments to date have been shown not to materially improve data sharing. REQUIREMENTS FOR PRIVACY: There is an ethical duty as well as a legal obligation on the part of care providers (and record keepers) to keep patient information confidential and to share it only with the authorisation of the patient. To achieve this information storage and retrieval, communication systems must be appropriately configured. There are many components of this, which are discussed in this paper. Patients may consult clinicians anywhere and at any time: therefore, their data must be available for recipient-driven retrieval (i.e. like the World Wide Web) under patient control and kept private: a method for delivering this is outlined.
Roderick L B Neame
Full Text Available Background The protection of personal information privacy has become one of the most pressing security concerns for record keepers. Many institutions have yet to implement the essential infrastructure for data privacy protection and patient control when accessing and sharing data; even more have failed to instil a privacy and security awareness mindset and culture amongst their staff. Increased regulation, together with better compliance monitoring has led to the imposition of increasingly significant monetary penalties for failures to protect privacy. Objective There is growing pressure in clinical environments to deliver shared patient care and to support this with integrated information. This demands that more information passes between institutions and care providers without breaching patient privacy or autonomy. This can be achieved with relatively minor enhancements of existing infrastructures and does not require extensive investment in inter-operating electronic records: indeed such investments to date have been shown not to materially improve data sharing.Requirements for Privacy There is an ethical duty as well as a legal obligation on the part of care providers (and record keepers to keep patient information confidential and to share it only with the authorisation of the patient. To achieve this information storage and retrieval, and communication systems must be appropriately configured. Patients may consult clinicians anywhere and at any time: therefore their data must be available for recipient-driven retrieval under patient control and kept private.
Kuo, Su-E; Lai, Hui-San; Hsu, Jen-Ming; Yu, Yao-Chang; Zheng, Dong-Zhe; Hou, Ting-Wei
Traditional nutrition evaluations not only require the use of numerous tables and lists to provide sufficient recommendations for patients' diets but are also very time-consuming due to cross-referencing and calculations. To personalize patient assessments, this study implemented a Clinical Nutritional Information System (CNIS) to help hospital dietitians perform their daily work more effectively in terms of time management and paper work. The CNIS mainly targets in-patients who require cancer-nutrition counselling. The development of the CNIS occurred in three phases. Phase 1 included system design and implementation based on the Nutrition Care Process and Model (NCPM) and the Patient Nutrition Care Process. Phase 2 involved a survey to characterize the efficiency, quality and accuracy of the CNIS. In Phase 3, a second survey was conducted to determine how well dietitians had adapted to the system and the extent of improvement in efficiency after the CNIS had been available online for three years. The work time requirements decreased by approximately 58% with the assistance of the CNIS. Of the dietitians who used the CNIS, 95% reported satisfaction, with 91.66% indicating that the CNIS was really helpful in their work. However, some shortcomings were also evident according to the results. Dietitians favoured the standardization of nutritional intervention and monitoring. The CNIS meets the needs of dietitians by increasing the quality of nutritional interventions by providing accurate calculations and cross-referencing for information regarding patients' conditions, with the benefit of decreasing the processing time, such as handwritten documentation. In addition, the CNIS also helps dietitians statistically analyse each patient's personal nutritional needs to achieve nutritional improvement. Copyright © 2017 Elsevier B.V. All rights reserved.
... for OMB Review; Comment Request; Trade Adjustment Assistance Community College and Career Training...) proposal entitled ``Trade Adjustment Assistance Community College and Career Training Grant Program Reporting Requirements'' to the Office of Management and Budget (OMB) for review and approval for use in...
... Activities: Customs and Trade Partnership Against Terrorism (C-TPAT) AGENCY: U.S. Customs and Border... Terrorism (C-TPAT). This request for comment is being made pursuant to the Paperwork Reduction Act of 1995... Against Terrorism (C-TPAT). OMB Number: 1651-0077. Form Number: None. Abstract: The Customs and Trade...
Hessels, Christel; van den Hanenberg, Danique; de Castro, Bram Orobio; van Aken, Marcel A G
This study seeks to integrate two research traditions that lie at the base of the understanding of personality pathology in adolescents. The first research tradition refers to normal personality according to the Five Factor Model (FFM). The second tradition specifies the key feature of personality disorder as the capacity to mentalize, which can be reflected in Social Information Processing (SIP). In a clinical sample of 96 adolescents, the authors investigated response generation, coping strategy, and memories of past frustrating experiences as part of SIP, as mediator in the relationship between personality and personality pathology, and a possible moderating role of personality on the relationship between SIP and personality pathology. The hypothesized mediation, by which the effects of personality dimensions on personality pathology was expected to be mediated by SIP variables, was found only for the effect of Neuroticism, most specifically on BPD, which appeared to be mediated by memories the patients had about past frustrating conflict situations with peers. Some moderating effects of personality on the relationship between SIP variables and personality pathology were found, suggesting that high Agreeableness and sometimes low Neuroticism can buffer this relationship. These results suggest that personality dimensions and social cognitions both independently and together play a role in adolescents' personality pathology.
Gharibi, Wajeb; Gharibi, Gharib
In this paper, we discuss a new contact way for exchanging personal information using mobile phones. The idea of this invention depends on allocating a special code called Gharibi Code (GC) for each personal mobile and creating a personal information file called Gharibi Face Card (GFC), which has all specified personal data of the mobile phone user. When you request someone's GC code, the other party's phone will send you the GFC of that person. We think that this approach will facilitate the...
Lafky, Deborah Beranek; Horan, Thomas A
Personal health record (PHR) systems are a subject of intense interest in the move to improve healthcare accessibility and quality. Although a number of vendors continue to put forward PHR systems, user-centered design research has lagged, and it has not been clear what features are important to prospective PHR users. Here, we report on a user-centered design study that combines qualitative and quantitative approaches to investigate several dimensions relevant to PHR design, and to look at the effect of health status on user needs. The results indicate that health status, especially disability and chronic illness, is relevant to PHR design. Further, the results provide empirical evidence about the role of privacy and security in users' attitudes toward PHR use. The exact nature of these attitudes differs from widely held perceptions about consumer values in healthcare information management. © The Author(s) 2011.
Yoshida, Hiroshi; Shimetani, Naoto
The Japanese Society of Laboratory Medicine has been running its own Medical Safety Committee, and holding a symposium on medical safety during the annual meeting. The medical world is filled with a considerable amount of personal information, including genetic information, the ultimate personal information. We, as medical staff, have to manage such personal information not only in times of peace but also during disasters or emergency situations. In Japan, the Act on the Protection of Personal Information is currently being implemented, but a number of problems remain. Human beings have entered the information technology era, including electrical medical record systems, which is useful for research and education besides medical practice. This is why personal information must be more effectively protected from leakage, misconception, and abuse. We should create a sound system to manage personal information, with the spirit of protecting patient information that originated from the Oath of Hippocrates.
Baillie, Lesley; Thomas, Nicola
Person-centred care is internationally recognised as best practice for the care of people with dementia. Personal information documents for people with dementia are proposed as a way to support person-centred care in healthcare settings. However, there is little research about how they are used in practice. The aim of this study was to analyse healthcare staff 's perceptions and experiences of using personal information documents, mainly Alzheimer's Society's 'This is me', for people with dementia in healthcare settings. The method comprised a secondary thematic analysis of data from a qualitative study, of how a dementia awareness initiative affected care for people with dementia in one healthcare organisation. The data were collected through 12 focus groups (n = 58 participants) and 1 individual interview, conducted with a range of healthcare staff, both clinical and non-clinical. There are four themes presented: understanding the rationale for personal information documents; completing personal information documents; location for personal information documents and transfer between settings; impact of personal information documents in practice. The findings illuminated how healthcare staff use personal information documents in practice in ways that support person-centred care. Practical issues about the use of personal information documents were revealed and these may affect the optimal use of the documents in practice. The study indicated the need to complete personal information documents at an early stage following diagnosis of dementia, and the importance of embedding their use across care settings, to support communication and integrated care.
Discussion of personalized information environments (PIEs) focuses on library personalized interfaces. Describes academic library PIEs and commercial sites, such as Amazon.com that use personalization; explores the Public Library of Charlotte and Mecklenburg's personalized interface; and discusses opportunities and challenges PIEs offer public…
Sun Qiong; Min Liu; Shiming Pang
With the promotion of Internet sales, the security of personal information to network users have become increasingly demanding. The existing network of sales channels has personal information security risks, vulnerable to hacker attacking. Taking full advantage of cloud security management strategy, cloud computing security management model is introduced to the network sale of personal information security applications, which is to solve the problem of information leakage. Then we proposed me...
Full Text Available The paper introduces a novel Personal Knowledge Management (PKM concept and prototype system. The system’s objective is to aid life-long-learning, resourcefulness, creativity, and teamwork of individuals throughout their academic and professional life and as contributors and beneficiaries of organizational and societal performance. Such a scope offers appealing and viable opportunities for stakeholders in the educational, professional, and developmental context. To further validate the underlying PKM application design, the systems thinking techniques of the transdiscipline of Informing Science (IS are employed. By applying Cohen’s IS-Framework, Leavitt’s Diamond Model, the IS-Meta Approach, and Gill’s and Murphy’s Three Dimensions of Design Task Complexity, the more specific KM models and methodologies central to the PKMS concept are aligned, introduced, and visualized. The extent of this introduction offers an essential overview, which can be deepened and broadened by using the cited URL and DOI links pointing to the available resources of the author’s prior publications. The paper emphasizes the differences of the proposed meme-based PKM System compared to its traditional organizational document-centric counterparts as well as its inherent complementing synergies. As a result, it shows how the system is closing in on Vannevar Bush’s still unfulfilled vison of the ‘Memex’, an as-close-as-it-gets imaginary ancestor celebrating its 70th anniversary as an inspiring idea never realized. It also addresses the scenario recently put forward by Levy which foresees a decentralizing revolution of knowledge management that gives more power and autonomy to individuals and self-organized groups. Accordingly, it also touches on the PKM potential in terms of Kuhn’s Scientific Revolutions and Disruptive Innovations.
Chirico, Peter G.; Malpeli, Katherine C.
The relationship between natural resources and armed conflict gained public and political attention in the 1990s, when it became evident that the mining and trading of diamonds were connected with brutal rebellions in several African nations. Easily extracted resources such as alluvial diamonds and gold have been and continue to be exploited by rebel groups to fund their activities. Artisanal and small-scale miners operating under a quasi-legal status often mine these mineral deposits. While many African countries have legalized artisanal mining and established flow chains through which production is intended to travel, informal trading networks frequently emerge in which miners seek to evade taxes and fees by selling to unauthorized buyers. These networks have the potential to become international in scope, with actors operating in multiple countries. The lack of government control over the artisanal mining sector and the prominence of informal trade networks can have severe social, political, and economic consequences. In the past, mineral extraction fuelled violent civil wars in Sierra Leone, Liberia, and Angola, and it continues to do so today in several other countries. The significant influence of the informal network that surrounds artisanal mining is therefore an important security concern that can extend across borders and have far-reaching impacts.
... information over electronic mail. (a) Exercise caution before transmitting personal information over e-mail to... 32 National Defense 6 2010-07-01 2010-07-01 false Sending personal information over electronic mail. 806b.29 Section 806b.29 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR...
... Management and Budget (OMB) approval. All comments will become a matter of public record. In this document..., Andean Trade Promotion and Drug Eradication Act (ATPDEA) Certificate of Origin. This form can be used... 17. Type of Review: Extension (without change). Affected Public: Businesses. ATPA Certificate of...
Purpose: Trade unions, like many other membership-based social movement organisations, are confronted by the challenge of growth and revitalisation. Declining membership numbers, an increasingly restrictive legislative framework, and dramatic changes in modes of employment have combined to challenge many unions to rethink the way they work. In…
The policy of FDOT is to use the Florida Advance Traveler Information System as the primary method to disseminate timely and important travel information to the public so that the public can make informed decisions regarding their travel plans....
El Emam, Khaled; Jabbouri, Sam; Sams, Scott; Drouet, Youenn; Power, Michael
With the growing adoption of electronic medical records, there are increasing demands for the use of this electronic clinical data in observational research. A frequent ethics board requirement for such secondary use of personal health information in observational research is that the data be de-identified. De-identification heuristics are provided in the Health Insurance Portability and Accountability Act Privacy Rule, funding agency and professional association privacy guidelines, and common practice. The aim of the study was to evaluate whether the re-identification risks due to record linkage are sufficiently low when following common de-identification heuristics and whether the risk is stable across sample sizes and data sets. Two methods were followed to construct identification data sets. Re-identification attacks were simulated on these. For each data set we varied the sample size down to 30 individuals, and for each sample size evaluated the risk of re-identification for all combinations of quasi-identifiers. The combinations of quasi-identifiers that were low risk more than 50% of the time were considered stable. The identification data sets we were able to construct were the list of all physicians and the list of all lawyers registered in Ontario, using 1% sampling fractions. The quasi-identifiers of region, gender, and year of birth were found to be low risk more than 50% of the time across both data sets. The combination of gender and region was also found to be low risk more than 50% of the time. We were not able to create an identification data set for the whole population. Existing Canadian federal and provincial privacy laws help explain why it is difficult to create an identification data set for the whole population. That such examples of high re-identification risk exist for mainstream professions makes a strong case for not disclosing the high-risk variables and their combinations identified here. For professional subpopulations with published
Bourke, Siobhan M; Plumpton, Catrin O; Hughes, Dyfrig A
It is unclear whether UK National Health Service (NHS) policies for orphan drugs, which permit funding of non-cost-effective treatments, reflect societal preferences. We conducted person trade-off (PTO) and discrete choice experiment (DCE) among 3950 adults selected to be representative of the UK general population. Experimental design was informed by surveys of patients affected by rare diseases, their caregivers, health care staff, and policymakers. Societal preferences were estimated in relation to treating a common disease, increases in waiting lists, or filling of vacant NHS posts. Results of the DCE were applied to recently licensed orphan drugs. On the basis of equal cost, the majority of respondents to the PTO (54%; 95% confidence interval [CI] 50-59) chose to allocate funds equally between patients treated for rare diseases and those treated for common diseases, with 32% (95% CI 28-36) favoring treating rare diseases over treating common diseases (14%; 95% CI 11-17), which this reduced to 23% (95% CI 20-27) when rare disease treatments were 10 times more expensive. When framed differently, more respondents prioritized not increasing waiting list size (43%; 95% CI 39-48) than to treat rare disease patients (34%; 95% CI 30-38). The DCE indicated a greater preference for treating a common disease over a rare disease. Respondents agreed with five of 12 positive appraisal recommendations for orphan drugs, even if their list price was higher, but preferred the NHS not to fund the remainder. The general public does not value rarity as a sufficient reason to justify special consideration for additional NHS funding of orphan drugs. This has implications regarding the appropriateness of operating higher thresholds of cost-effectiveness. Copyright © 2018 International Society for Pharmacoeconomics and Outcomes Research (ISPOR). Published by Elsevier Inc. All rights reserved.
Labitzke , Sebastian
Part 4: Privacy and Transparency in the Age of Cloud Computing; International audience; The risk involved when users publish information, which becomes available to an unintentional broad audience via online social networks is evident. It is especially difficult for users of social networks to determine who will get the information before it is shared. Moreover, it is impossible to monitor data flows or to control the access to personal data after sharing the information. In contrast to enter...
...-02] Announcing Draft Federal Information Processing Standard (FIPS) 201-2, Personal Identity..., ``Personal Identity Verification of Federal Employees and Contractors Standard.'' Draft FIPS 201-2 amends... Issuing Personal Identity Verification Cards under HSPD-12.'' The purpose of this change is to update the...
Morocco and United States. The overall logic of such measures was that liberalization and privatization would stimulate trade, support the requested modernization of the production systems and infrastructures, and enhance public administrations and services as well. Positive impacts on income, employments...... and privatization processes were implemented at the international level by the WTO's, at regional level by the establishment of free trade agreements between individual states on the southern and eastern Mediterranean rim and the EU [under the Barcelona Process] and by bilateral agreements as the one signed between...... to focus on the impacts of restructuring in the formal textile and clothing sectors (TC) which is the major employer in three Maghrib countries: Algeria, Morocco and Tunisia. The textile and clothing sectors have been particularly exposed to increased competition in foreign and/or domestic markets...
It is often argued that the internet influences investor behavior. Furthermore, the recent 'bubble' in internet stocks is sometimes ascribed, at least in part, to online trading. However, little is known about how online investors actually behave. This paper contributes to fill this gap. A sample of approximately 3,000 online broker investors is studied over a 51 month period ending in April 2001. The main goal of this paper is to present various descriptive statistics on demographic informat...
Huang, Pei-wen; Lamm, Alexa J.
Extension educators have diligently educated the general public about water conservation. Incorporating audiences' personal experience into educational programming is recommended as an approach to effectively enhance audiences' adoption of water conservation practices. To ensure the impact on the audiences and environment, understanding the…
Bates, Timothy C.; Rock, Andrew
Raven's matrices and inspection time (IT) were recorded from 56 subjects under five arousal levels. Raven's and IT correlated strongly (r = -0.7) as predicted by processing-speed theories of "g." In line with Eysenck's [Eysenck, H. J. (1967). "The biological basis of personality". Springfield, IL: Thomas] arousal theory of extraversion, there was…
Tran, Kim; Morra, Dante; Lo, Vivian; Quan, Sherman D; Abrams, Howard; Wu, Robert C
Smartphones are becoming ubiquitous in health care settings. The increased adoption of mobile technology such as smartphones may be attributed to their use as a point-of-care information source and to perceived improvements in clinical communication and efficiency. However, little is known about medical students' use of personal smartphones for clinical work. The intent of the study was to examine final-year medical students' experience with and attitudes toward using personal mobile technology in the clinical environment, with respect to the perceived impact on patient confidentiality and provider professionalism. Cross-sectional surveys were completed by final-year medical students at the University of Toronto. Respondents were asked about the type of personal mobile phone they use, security features on their personal phone, experiences using their personal phone during clinical rotations, and attitudes about using their personal phone for clinical work purposes. The overall response rate was 45.4% (99/218). Smartphone ownership was prevalent (98%, 97/99) with the majority (86%, 85/99) of participants using their personal phones for patient-related communication during clinical rotations. A total of 26% (26/99) of participants reported not having any type of security feature on their personal phone, 94% (90/96) of participants agreed that using their personal phone for clinical work makes them more efficient, and 86% (82/95) agreed that their personal phone allows them to provide better patient care. Although 68% (65/95) of participants believe that the use of personal phones for patient-related communication with colleagues poses a risk to the privacy and confidentiality of patient health information, 22% (21/96) of participants still use their personal phone to text or email identifiable patient data to colleagues. Our findings suggest that the use of personal smartphones for clinical work by medical students is prevalent. There is a need to more fully address
Moslonka-Lefebvre, Mathieu; Gilligan, Christopher A; Monod, Hervé; Belloc, Catherine; Ezanno, Pauline; Filipe, João A N; Vergu, Elisabeta
Conventional epidemiological studies of infections spreading through trade networks, e.g., via livestock movements, generally show that central large-size holdings (hubs) should be preferentially surveyed and controlled in order to reduce epidemic spread. However, epidemiological strategies alone may not be economically optimal when costs of control are factored in together with risks of market disruption from targeting core holdings in a supply chain. Using extensive data on animal movements in supply chains for cattle and swine in France, we introduce a method to identify effective strategies for preventing outbreaks with limited budgets while minimizing the risk of market disruptions. Our method involves the categorization of holdings based on position along the supply chain and degree of market share. Our analyses suggest that trade has a higher risk of propagating epidemics through cattle networks, which are dominated by exchanges involving wholesalers, than for swine. We assess the effectiveness of contrasting interventions from the perspectives of regulators and the market, using percolation analysis. We show that preferentially targeting minor, non-central agents can outperform targeting of hubs when the costs to stakeholders and the risks of market disturbance are considered. Our study highlights the importance of assessing joint economic-epidemiological risks in networks underlying pathogen propagation and trade. © 2016 The Authors.
Gilligan, Christopher A.; Belloc, Catherine; Filipe, João A. N.; Vergu, Elisabeta
Conventional epidemiological studies of infections spreading through trade networks, e.g. via livestock movements, generally show that central large-size holdings (hubs) should be preferentially surveyed and controlled in order to reduce epidemic spread. However, epidemiological strategies alone may not be economically optimal when costs of control are factored in together with risks of market disruption from targeting core holdings in a supply chain. Using extensive data on animal movements in supply chains for cattle and swine in France, we introduce a method to identify effective strategies for preventing outbreaks with limited budgets while minimizing the risk of market disruptions. Our method involves the categorization of holdings based on position along the supply chain and degree of market share. Our analyses suggest that trade has a higher risk of propagating epidemics through cattle networks, which are dominated by exchanges involving wholesalers, than for swine. We assess the effectiveness of contrasting interventions from the perspectives of regulators and the market, using percolation analysis. We show that preferentially targeting minor, non-central agents can outperform targeting of hubs when the costs to stakeholders and the risks of market disturbance are considered. Our study highlights the importance of assessing joint economic–epidemiological risks in networks underlying pathogen propagation and trade. PMID:26984191
Garde - Perik, van de E.M.
Current developments towards Ambient Intelligence and related technological visions of the future are founded on continuous collection of information about individuals and their activities. This collection of information, its potentially persistent storage, dissemination and use raise privacy
A.A.J. (Jos) van Helvoort
Although most authors on Information Literacy do not really differ in their definitions of the information literacy concept, phenomenographic research makes clear that in the context of education at least two different conceptions can be distinguished: an “Information Problem Solving” conception and
The overwhelming amount of information available today makes it difficult for users to find useful information and as the solution to this information glut problem, recommendation technologies emerged. Among the several streams of related research, one important evolution in technology is to generate recommendations based on users' own social…
E. I. Goncharov
Full Text Available When personal data exchange between informational systems takes place, one must guarantee the systems are not integrating but just interacting. This task can not be accomplished by using traditional tools such as firewalls, cryptography and so on. To solve the problem we suggest deploying of informational gateway in personal data exchange process.
... personal information? 105-64.108 Section 105-64.108 Public Contracts and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION Regional Offices-General... GSA safeguard personal information? (a) System managers will establish administrative, technical, and...
Criado, Javier; Padilla, Nicolás; Iribarne, Luis; Asensio, Jose-Andrés
Due to the globalization of the information and knowledge society on the Internet, modern Web-based Information Systems (WIS) must be flexible and prepared to be easily accessible and manageable in real-time. In recent times it has received a special interest the globalization of information through a common vocabulary (i.e., ontologies), and the standardized way in which information is retrieved on the Web (i.e., powerful search engines, and intelligent software agents). These same principles of globalization and standardization should also be valid for the user interfaces of the WIS, but they are built on traditional development paradigms. In this paper we present an approach to reduce the gap of globalization/standardization in the generation of WIS user interfaces by using a real-time "bottom-up" composition perspective with COTS-interface components (type interface widgets) and trading services.
Papadimos Alexa T
Full Text Available Abstract Rising tuition costs have forced university students to become creative in finding ways to fund their education. Some female university students have decided that ova donation may be an acceptable alternative in which to pay for their tuition. This alternative presents itself because of the insufficient number of ova available for assisted reproduction and emerging stem cell technologies. Young female university students are encouraged by Internet sources and respectable electronic and print media to donate their ova in the cause of assisted reproduction for monetary compensation. While university students generally exhibit autonomy, the constraining influence of their financial predicament compromises the elements of informed consent (voluntariness, competence, capacity, understanding, and disclosure as to their making an autonomous decision in regard to egg donation. Thus, any moral possibility of giving informed consent is negated. Informed consent can only occur through autonomy. A female university student in need of financial resources to pay for her education cannot make an autonomous choice to trade her genes for tuition. Donated ova are not only needed for assisted reproduction, but for stem cell technologies. While the long-term health of women who donate their ova is of concern (a potential risk of cancer after long term use of ovulation induction, of equal concern is the possibility of a growth in the trade of ova targeting third world and Eastern European women where the precedence for autonomy and informed consent is not well established.
W. Ketter (Wolfgang); H.W.G.M. van Heck (Eric); R.A. Zuidwijk (Rob)
textabstractIn this case the Dutch Flower Auctions (DFA) are discussed. The DFA are part of the supply network in which flowers are produced, stocked, and then sold through either mediation or auctioning. This case focuses on the buyers’ and auctioneers’ positions when flowers are traded through
Ferro, T; Klein, D N
The present study examined the concordance of the Family History Interview for Personality Disorders (FHIPD) with diagnoses based on direct interviews and between pairs of informants. Subjects were 224 probands participating in a series of studies of the familial transmission of mood and personality disorders and their first-degree relatives. Proband informants and relatives provided information about themselves on the Structured Clinical Interview for DSM-III-R (SCID), Personality Disorder Examination (PDE), and Eysenck Personality Questionnaire (EPQ). Information from informants about relatives was collected with the FHIPD. All assessments were made blindly and independently. Using Kappa, concordance between proband informants' family histories and relative direct reports on specific personality disorders was low, ranging from -.01 to .28, with a median of .10. Kappa for a diagnosis of any personality disorder was .16. When two independent informant reports were compared, Kappas for specific Axis II disorders ranged from .10 to .72, with a median of .28. Kappa for a diagnosis of any personality disorder was .36. These data suggest that subjects and informants provide different perspectives on Axis II psychopathology, and support the use of both sources of information whenever possible.
The study, conducted by General Physics Corporation, was funded by the U.S. Trade and Development Agency. The report recommends strategies and specific actions for Tenaga Nasional Berhad`s training and technology transfer needs. The study covers the assessments made by teams of generation, transmission, distribution, management engineers and training specialists over a 4-month period. The Inception Report is divided into the following sections: (1) Project Objectives; (2) General Physics Background; (3) Project Description; (4) Project Organization; (5) Detailed Scope of Work; (6) Project Schedule; (Appendix A) Personnel Resumes; (Appendix B) General Physics Brochures.
The study, conducted by The M. W. Kellog Company, was funded by the U.S. Trade and Development Agency on behalf of the National Gas Company of Trinidad and Tobago. It shows the results of Project Definition Phase which was implemented as a follow-up to two previous feasibility studies which were conducted for a LNG plant in Trinidad. The objective of this report is to develop a project design basis and implementation plan plus a cost estimate. The study is divided into the following sections: (1) Introduction; (2) Project Design Basis; (3) Seismic Hazard Assessment; (4) Geotechnical; and (5) Environmental Assessment.
..., confidential statistical data, amount or source of any income, profits, losses, or expenditures of any person... States Code which provides: Whoever, being an officer or employee of the United States or of any...
Information Impact: Journal of Information and Knowledge Management. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 7, No 1 (2016) >. Log in or Register to get access to full text downloads.
... other information of a private and personal nature. (b) Information having a commercial or financial... individuals who have access to such information, (3) the type and degree of risk of financial injury to be... use of nondiscloseable records or information from such records for authorized program purposes...
Animals need to make constant decisions throughout their lives and to make optimal decisions individuals rely on information. Information can be obtained in two distinct ways: personal or social information. The current paradigm in the information theory use in animal ecology assumes that the
Fire, heat, cold, electro-magnetic and ionising radiation, electricity, chemicals, impacts, cuts, abrasion, etc. are the common hazards for arms and hands at work. The gloves chosen for protection of the arm and hand should cover those parts adequately and the material of the gloves should be capable of offering protection against the specific hazard involved. Criteria for choosing arm and hand protection equipment will be based on their shape and part of the arm and hand protected. Guide lines for choosing such personal protection equipment for nuclear facilities are given. (M.K.V.). 3 annexures, 1 appendix
Public relations in any information centre are of vital importance. Information professionals require establishing good rapport with the public. Such a rapport with the inhouse clientele as well as other potential information-seeker community...
Y. G. Gorshkov
Full Text Available The requirements imposed on transfer by the personal biometric information in systems and communication networks according to Federal Law № 152 “Personal data” are defined. Lacks of used decisions protection of such biometric data, as the test speech information, including parameters of a speech path, and also acoustic signals of tones and noise of heart of the person on an example of telemedicine systems construction with the using of a network telephone channels general using and wireless networks Wi-Fi are considered. Directions of works are formulated on safety of the personal biometric data transferred in telecommunication systems.
Botha, Johannes G
Full Text Available , which occurred in 2012 already, revealed more than 68m user’s credentials (IdentityForce 2016). The Municipal Transportation Agency of San Francisco was infected with malware in November 2016. This attack caused the systems to lock down, allowing... potentially lead to identity theft and other related crimes. PII can include an individual’s government issued identification; contact information; birth date and place; online account information; medical, employment or financial records; biometric...
Crawford, Jarret T; Jussim, Lee; Madon, Stephanie; Cain, Thomas R; Stevens, Sean T
This article introduces the political person perception model, which identifies conditions under which perceivers rely on stereotypes (party membership), individuating information (issue position), or both in political person perception. Three studies supported the model's predictions. Study 1 showed that perceivers gave primacy to target information that was narrowly relevant to a judgment, whether that information was stereotypic or individuating. Study 2 found that perceivers relied exclusively on individuating information when it was narrowly relevant to the judgment and relied on both stereotype and individuating information when individuating information was not narrowly relevant to the judgment but did imply a political ideology. Study 3 replicated these findings in a more ecologically valid context and showed that people relied on party information in the absence of narrowly relevant policy positions and when individuating information did not imply a political ideology. Implications for political person perception and theories of stereotyping are discussed.
In all work places where hazards of various kinds are present and the same cannot be totally controlled by engineering methods, suitable personal protective equipment (PPE) shall be used. There are several types of eye and face protection devices available in the market and it is important that employees use the proper type for the particular job. The main classes of eye and face protection devices required for the industrial operations are as follows: (a) eye protection devices which includes: (i) safety goggles (ii) safety spectacles (iii) safety clipons and eye and face protection devices which are (i) eye shield, (ii) face shield, (iii) wire mesh screen guard. Guide lines for selecting appropriate ear and face protection equipment for nuclear installations are given. (M.K.V.). 4 annexures, 1 appendix
This document reports the hearing during which the results of an investigation on European Union Emission Trading Scheme (ETS) have been commented. The author of this investigation briefly describes the scheme, how it has been implemented. He outlines some of its weaknesses and discusses how it could be improved, notably by extending it to different sectors, for example the air transport sector. He also outlines how this European Union scheme could be an example for the rest of the world. The author and the Commission members then discuss several aspects: the origins of CO 2 emissions and how to take them into account, the international negotiations and the positions of China or India, the taxing possibilities, and the fact that the nuclear energy does not award credits
This study, conducted by Black and Veatch, was funded by the U.S. Trade and Development Agency. The report presents a technical and commercial analysis for the development of three nearly identical electricity generating facilities (biomass steam power plants) in the towns of Chachoengsao, Suphan Buri, and Pichit in Thailand. The Main Report is divided into the following sections: (1.0) Executive Study; (2.0) Project Objectives; (3.0) Review of Combustion Technology for Biomass Fueled Steam Generator Units; (4.0) Conceptual Design; (5.0) Plant Descriptions; (6.0) Plant Operations Staffing; (7.0) Project Schedule; (8.0) Project Cost Estimate; (9.0) Financial Analysis; Appendix - Financial Analysis
... Section 701.115 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES... information (PPI). (a) Access/disclosure. Access to and disclosure of PPI such as SSN, date of birth, home... notice and understand PA rules. DON activities shall ensure that PPI (e.g., home address, date of birth...
The studies in task-based approaches in second language acquisition claim that controlled and goal convergent tasks such as information gap tasks surpass open-ended conversations such as personal information exchange tasks for the development of the learner's interlanguage, in that the formers promote more repair negotiation. And yet, few studies…
White, David J; Davies, Hayden B; Agyapong, Samuel; Seegmiller, Nora
Brood parasites face considerable cognitive challenges in locating and selecting host nests for their young. Here, we test whether female brown-headed cowbirds, Molothrus ater , could use information acquired from observing the nest prospecting patterns of conspecifics to influence their own patterns of nest selection. In laboratory-based experiments, we created a disparity in the amount of personal information females had about the quality of nests. Females with less personal information about the quality of two nests spent more time investigating the nest that more knowledgeable females investigated. Furthermore, there was a strong negative relationship between individual's ability to track nest quality using personal information and their tendency to copy others. These two contrasting strategies for selecting nests are equally effective, but lead to different patterns of parasitism. © 2017 The Author(s).
De Clercq, Barbara; De Fruyt, Filip; Koot, Hans M; Benoit, Yves
To describe quality of life (QoL) of children surviving cancer in relation to their personality, using self- and maternal reports and examining differences with healthy referents. Sixty-seven children who survived childhood cancer were compared with eighty-one healthy children on QoL and personality characteristics. Children who survived cancer reported higher QoL than healthy children, whereas there were no differences for personality. Two main effects emerged for informant with children rating themselves as less neurotic and more conscientious than their mothers. The correspondence between mothers and children was substantially higher for survivors for QoL and personality ratings. QoL and trait measures share substantial variance, and personality traits significantly predict QoL. Parental personality ratings explained child QoL beyond children's personality ratings. Personality traits contribute to quality of life, indicating that personality significantly influences child's quality of life beyond the experience of a negative life event such as surviving cancer and its treatment. From a diagnostic perspective, parental trait ratings are informative in addition to children's ratings of personality to understand children's QoL.
... unemployment compensation payments. 1.6050B-1 Section 1.6050B-1 Internal Revenue INTERNAL REVENUE SERVICE... Information returns by person making unemployment compensation payments. For taxable years beginning after December 31, 1978, every person who makes payments of unemployment compensation (as defined in section 85...
Fearon, Colm; Nachmias, Stefanos; McLaughlin, Heather; Jackson, Stephen
This study investigates the role of personal values as motivational antecedents for understanding higher education (HE) student career decidedness among university business school (UBS) students. We propose a new "protean"-informed HE student career decidedness model for theorizing how both personal values and social capital mediators…
... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT [Docket No. FR-5607-N-14] Notice of Proposed Information Collection: Comment Request; Personal Financial and Credit Statement AGENCY: Office of the... Proposal: Personal Financial and Credit Statement. OMB Control Number, if applicable: 2502-0001...
Kaltoft, Mette Kjer; Nielsen, Jesper Bo; Salkeld, Glenn
implicitly segues into the patient having made a 'good decision'. In person-centred health care, whether, in what form, and with what weight, 'information' is included as a criterion of decision quality is a matter for the person involved, to decide in the light of their own values, preferences, and time...
Yeo, Hwan-Ik; Lee, Yekyung Lisa
This study explores the use of blogs for personal information management (PIM) as a learning tool that could bring increased efficiency and academic self-efficacy for carrying out learning tasks. In order to identify the uses and effects of using blogs for PIM by children, a control group that used personal spaces within the class website and an…
... DEPARTMENT OF VETERANS AFFAIRS (CONTINUED) VETERANS SMALL BUSINESS REGULATIONS Records Management § 74.25 What types of personally identifiable information will VA collect? In order to establish owner... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false What types of personally...
In this study, the Big Five factor model of personality traits theory was tested for its ability to predict or explain Employee Information Security Behavior (EISB), when Generational Cohort (GCOHORT) moderated the relationship between the five factors of personality and EISB. The independent variables (IVs) Extraversion, Agreeableness,…
Chapman, Benjamin P.; Hampson, Sarah; Clarkin, John
We describe 2 frameworks in which personality dimensions relevant to health, such as Conscientiousness, can be used to inform interventions designed to promote health aging. First, contemporary data and theory do not suggest that personality is "immutable," but instead focus on questions of who changes, in what way, why, when, and how.…
Full Text Available The problem of experimentation involving subjects whose mental condition prevents them from understanding information and providing proper informed consent has been addressed in various codes, declarations, conventions, treaties and regulations adopted by national, international and supranational institutions and authorities. This article summarizes the basic ethical criteria these documents provide and stresses the historical development from the nearly total exclusion of incapacitated subjects, established in the mid-twentieth century, to their contemporary inclusion in clinical trials on certain ethical conditions. The problem of proxy consent by legal representatives for participation in clinical trials is addressed particularly in reference to current Italian regulations. Exceptions to human experimentation requirements in emergency situations are also briefly discussed.
... Identifiable Information Protected Under the E-Government Act of 2002, Title V and the Privacy Act of 1974...) and Title V, subtitle A of the E-Government Act of 2002 (CIPSEA) (U.S.C. 3501 note). HUD wishes to... Information Collection, License for the Use of Personally Identifiable Information Protected Under the E...
... information; prohibition on dissemination. 4.37 Section 4.37 Banks and Banking COMPTROLLER OF THE CURRENCY... § 4.37 Persons and entities with access to OCC information; prohibition on dissemination. (a) Current... agreement to abide by, the prohibition on the dissemination of non-public OCC information contained in...
With the blooming of information in digital format, dissemination of information is becoming a big challenge for developing countries. It is not only due to the limited provision of personal computers--in addition, the technological infrastructure and the ability to access information are also becoming major concerns in developing countries. This…
This study investigated personal information behavior and information needs that 21 adults managing life with Type 2 diabetes identify explicitly and implicitly during discussions of item acquisition and use of health information items that are kept in their homes. Research drew upon a naturalistic lens, in that semi-structured interviews were…
Geressu, Robel T.; Harou, Julien J.
Multi-reservoir system planners should consider how new dams impact downstream reservoirs and the potential contribution of each component to coordinated management. We propose an optimized multi-criteria screening approach to identify best performing designs, i.e., the selection, size and operating rules of new reservoirs within multi-reservoir systems. Reservoir release operating rules and storage sizes are optimized concurrently for each separate infrastructure design under consideration. Outputs reveal system trade-offs using multi-dimensional scatter plots where each point represents an approximately Pareto-optimal design. The method is applied to proposed Blue Nile River reservoirs in Ethiopia, where trade-offs between total and firm energy output, aggregate storage and downstream irrigation and energy provision for the best performing designs are evaluated. This proof-of concept study shows that recommended Blue Nile system designs would depend on whether monthly firm energy or annual energy is prioritized. 39 TWh/yr of energy potential is available from the proposed Blue Nile reservoirs. The results show that depending on the amount of energy deemed sufficient, the current maximum capacities of the planned reservoirs could be larger than they need to be. The method can also be used to inform which of the proposed reservoir type and their storage sizes would allow for the highest downstream benefits to Sudan in different objectives of upstream operating objectives (i.e., operated to maximize either average annual energy or firm energy). The proposed approach identifies the most promising system designs, reveals how they imply different trade-offs between metrics of system performance, and helps system planners asses the sensitivity of overall performance to the design parameters of component reservoirs.
Suzuki, Lalita K; Beale, Ivan L
The content of personal Web home pages created by adolescents with cancer is a new source of information about this population of potential benefit to oncology nurses and psychologists. Individual Internet elements found on 21 home pages created by youths with cancer (14-22 years old) were rated for cancer-related self-presentation, information dissemination, and interpersonal connection. Examples of adolescents' online narratives were also recorded. Adolescents with cancer used various Internet elements on their home pages for cancer-related self-presentation (eg, welcome messages, essays, personal history and diary pages, news articles, and poetry), information dissemination (e.g., through personal interest pages, multimedia presentations, lists, charts, and hyperlinks), and interpersonal connection (eg, guestbook entries). Results suggest that various elements found on personal home pages are being used by a limited number of young patients with cancer for self-expression, information access, and contact with peers.
Kaurin, Aleksandra; Sauerberger, Kyle S; Funder, David C
Diagnoses of personality disorders (PD) must rely on judgments of observers-either clinicians or acquaintances-because personality disorders are primarily defined in terms of maladaptive interpersonal behavior. Little is known, however, about how closely acquaintances' judgments of PD traits relate to self-reports of theoretically relevant Big Five traits or directly observed behavioral outcomes in interpersonal situations. The present study examines associations between judgments of the 10 PD traits provided by close acquaintances, self-reports of PD-relevant Big Five personality traits, and observed interpersonal behaviors across three different three-person laboratory interactions (i.e., unstructured chat, cooperative task, competitive game). The sample consisted of 256 undergraduate students (130 females; M age = 19.83, SD = 1.25). Four unacquainted observers independently rated participants' behaviors from video recordings. In line with previous work, informant reports of PD traits demonstrate strong convergent validity with relevant self-reported Big Five traits (as identified by Lynam & Widiger, 2001). Directly observed behavior is meaningfully associated with acquaintances' judgments and self-reports of PD-relevant traits, and the associations between these judgments and behavior are strongest for traits associated with histrionic and schizoid PD. Vector correlations between behavioral profiles associated with informant and self-reports show that both assessments have similar behavioral correlates. Associations between PD trait ratings and behavior appeared to differ as a function of gender, with males showing more and stronger correlations. Informants' ratings of PD traits are impressively accurate, converging both with self-reports of relevant traits and directly observed interpersonal behavior. Therefore, a comprehensive understanding of PDs and associated traits can be augmented by information from multiple acquaintances who have the
Tran, Kim; Morra, Dante; Lo, Vivian; Quan, Sherman D; Abrams, Howard; Wu, Robert C
Background Smartphones are becoming ubiquitous in health care settings. The increased adoption of mobile technology such as smartphones may be attributed to their use as a point-of-care information source and to perceived improvements in clinical communication and efficiency. However, little is known about medical students’ use of personal smartphones for clinical work. Objective The intent of the study was to examine final-year medical students’ experience with and attitudes toward using per...
Full Text Available It’s fair to say that all human life is based on communication; passive and active, verbal and nonverbal. No matter which media type you consider, the importance of the so-called first impression cannot be overstated. Currently, as the world becomes more open and accessible, the individual character of the way we create our look takes a different form, but still remains an important messenger. In my thesis, I would like to present the outfit as a carrier of vital information about people. In parallel, I will analyze the clothing itself, researching both historic and contemporary sources. Finally, I attempt to decipher the language of fashion.
Tonheim, Aleksander Nygård; Babic, Ankica
This paper presents a prototype of a mobile application for patient self-management within the field of Multiple Sclerosis (MS). Five study subjects provided information needs by suggesting functionalities and evaluating three existing MS applications. Prominent functionalities were to collect data about symptoms, physical activities, mood and goals in a form of a mobile diary. Collected data would be visually presented in a graph to support self-management and motivation. A low-fidelity prototype relies in first hand on four selected modules, two Diary modules, one Visualisation module and a Physical activity module. A high-fidelity prototype is being implemented and will be further evaluated by the experts.
Consumer concerns over the safety of their personal information and the violation of their privacy rights are described as being the single overwhelming barrier to rapid growth of e- commerce. This paper explores the problems for e-commerce users when there is collection, use, and disclosure of personal information that are based on implied consent in e- commerce transactions. It questions the assumption that consent is sufficient to waive privacy interests in relation to e-commerce transacti...
Dhotre, Prashant Shantaram; Olesen, Henning
providers and websites collects and make an extensive use of personal information. Using different Big Data methods and techniques the knowledge and patterns are generated or extracted from the data. This will lead to a serious problem to privacy breach. Hence, there is a need of embedding privacy...... in the design phase will be the basic principle on which the data security can be provided, and the privacy will be protected. This will give more control and power to user over personal information....
Khodambashi, Soudabeh; Haugland, Dagrun; Ellingsberg, Anette; Kottum, Hanne; Sund, Janne Kutschera; Nytrø, Øystein
Providing patients with specific information about their own drugs can reduce unintentional misuse and improve compliance. Searching for information is time-consuming when information is not personalized and is written using medical vocabulary that is difficult for patients to understand. In this study we explored patient information needs regarding visualizing of drug information and interrelationships by conducting a total of four co-design workshops with patients, other users and pharmacists. We developed a prototype and drug ontology to support reasoning about drug interactions. We evaluated individual performance in finding information, understanding the drug interactions, and learning from the provided information in the prototype compared to using patient information leaflets (PILs). We concluded that interactive visualization of drug information helps individuals find information about drugs, their side effects and interactions more quickly and correctly compared to using PILs. Our study is limited to co-morbid patients with transient ischaemic attack with several chronic diseases.
Full Text Available An artificial stock market with agent-based model is built to investigate effects of different information characteristics of common factors on the dynamics stock returns. Investors with limited information capacity update their beliefs based on the information they have obtained and processed and optimize portfolios based on beliefs. We find that with changing of concerned information characteristics the uncertainty of stock price returns rises and is higher than the uncertainty of intrinsic value returns. However, this increase is constrained by the limited information capacity of investors. At the same time, we also find that dependence between returns of stock prices also increased with the changing information environment. The uncertainty and dependency pertaining to prices show a positive relationship. However, the positive relationship is weakened when taking into account the features of intrinsic values, based on which prices are generated.
..., 2013. ADDRESSES: Direct all written comments to Jennifer Jessup, Departmental Paperwork Clearance... Hall, BIS ICB Liaison, (202) 482-4895, Lawrence[email protected] . SUPPLEMENTARY INFORMATION: I...
Lemire, Marc; Paré, Guy; Sicotte, Claude; Harvey, Charmian
To understand the personal, social and cultural factors likely to explain recourse to the Internet as a preferred source of personal health information. A cross-sectional survey was conducted among a population of 2923 Internet users visiting a firmly established website that offers information on personal health. Multiple regression analysis was performed to identify the determinants of site use. The analysis template comprised four classes of determinants likely to explain Internet use: beliefs, intentions, user satisfaction and socio-demographic characteristics. Seven-point Likert scales were used. An analysis of the psychometric qualities of the variables provided compelling evidence of the construct's validity and reliability. A confirmatory factor analysis confirmed the correspondence with the factors predicted by the theoretical model. The regression analysis explained 35% of the variance in Internet use. Use was directly associated with five factors: perceived usefulness, importance given to written media in searches for health information, concern for personal health, importance given to the opinions of physicians and other health professionals, and the trust placed in the information available on the site itself. This study confirms the importance of the credibility of information on the frequency of Internet use as a preferred source of information on personal health. It also shows the potentially influential role of the Internet in the development of personal knowledge of health issues.
Domeisen, Daniela; Slavov, Georgi
Weather information on seasonal timescales is crucial to various end users, from the level of subsistence farming to the government level. Also the financial industry is ever more aware of and interested in the benefits that early and correctly interpreted forecast information provides. Straight forward and often cited applications include the estimation of rainfall and temperature anomalies for drought - prone agricultural areas producing traded commodities, as well as some of the rather direct impacts of weather on energy production. Governments, weather services, as well as both academia and private companies are working on tailoring climate and weather information to a growing number of customers. However, also other large markets, such as coal, iron ore, and gas, are crucially dependent on seasonal weather information and forecasts, while the needs are again very dependent on the direction of the predicted signal. So far, relatively few providers in climate services address these industries. All of these commodities show a strong seasonal and weather dependence, and an unusual winter or summer can crucially impact their demand and supply. To name a few impacts, gas is crucially driven by heating demand, iron ore excavation is dependent on the available water resources, and coal mining is dependent on winter temperatures and rainfall. This contribution will illustrate and provide an inside view of the type of climate and weather information needed for the various large commodity industries.
Full Text Available This article explores the factors that contribute to the children living in Zama Zama informal settlement�s spiritual development. Postfoundational practical theology and the narrative approach function as paradigm and methodology. Themes and/or discourses like power, poverty, nutrition, health and school enrolment were identified. The faith development theory is discussed, as well as a reflection on children�s spirituality. The research shows that the faith community, cr�che and other partners play a crucial role in the spiritual development of the children.Intradisciplinary and/or interdisciplinary implications: This study was performed in the field of practical theology. The article is interdisciplinary, covering the fields of religion, psychology, social work, sociology and health studies.
...: Extension (without change). Affected Public: Businesses. ATPA Certificate of Origin: Estimated Number of... will be submitting the following information collection request to the Office of Management and Budget... Office of Information and Regulatory Affairs, Office of Management and Budget. Comments should be...
...: Businesses. ATPA Certificate of Origin: Estimated Number of Respondents: 2,133. Estimated Number of Annual... submitted the following information collection request to the Office of Management and Budget (OMB) for... collection to the Office of Information and Regulatory Affairs, Office of Management and Budget. Comments...
... can be said to be the end product of either innovation or substantial effort. There must be a direct... commercial or financial information. 5.65 Section 5.65 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES... attorney-client privilege or the work product privilege. Information may be privileged for this purpose...
Perotti, E.C.; von Thadden, E.-L.
Dominant investors can influence the publicly available information about firms by affecting the cost of information collection. Under strategic competition, transparency results in higher variability of profits and output. Thus lenders prefer less transparency, since this protects firms when in a
In an otherwise insightful and thoughtful article, Sebastian Pfotenhauer (Trade Policy Is Science Policy,” Issues, Fall 2013) might better have entitled his contribution “Trade Policy Needs to Be Reconciled with Science Policy.” The North American Free Trade Agreement (NAFTA) and the agreements administered by the World Trade Organization, particularly the General Agreement on Tariffs and Trade (GATT) and the Technical Barriers to Trade (TBT), were adopted to promote international trade and i...
Iyer, Maithili; Kempton, Willett; Payne, Christopher
A program called ``Innovative Billing?? has been developed to provide individualized energy information for a mass audience?the entireresidential customer base of an electric or gas utility. Customers receive a graph on the bill that compares that customer?s consumption with othersimilar customers for the same month. The program aims to stimulate customers to make ef?ciency improvements. To group as many as severalmillion customers into small ``comparison groups??, an automated method must be developed drawing solely from the data available to the utility.This paper develops and applies methods to compare the quality of resulting comparison groups.A data base of 114,000 customers from a utility billing system was used to evaluate Innovative Billing comparison groups, comparing fouralternative criteria: house characteristics (?oor area, housing type, and heating fuel); street; meter read route; billing cycle. Also, customers wereinterviewed to see what forms of comparison graphs made most sense and led to fewest errors of interpretation. We ?nd that good qualitycomparison groups result from using street name, meter book, or multiple house characteristics. Other criteria we tested, such as entire cycle, entiremeter book, or single house characteristics such as ?oor area, resulted in poor quality comparison groups. This analysis provides a basis forchoosing comparison groups based on extensive user testing and statistical analysis. The result is a practical set of guidelines that can be used toimplement realistic, inexpensive innovative billing for the entire customer base of an electric or gas utility.
.... This document contains articles on consumer goods and domestic trade issues within the USSR. Topics include: production, distribution, economics, housing and personal services, policies, personal income and savings.
B. Lynne Milgram
Full Text Available With growing urbanization, Southern governments often privilege large-scale developments that frustrate urbanites’ livelihood needs. In Baguio, Philippines public marketers counter such top-down disenfranchisement by operationalizing formal “advocacy” and informal “everyday” politics. That authorities negotiate agreements to accept payments for marketers’ infractions, I argue, materializes complex and complicit intersections of formal/informal and legal/illegal practices.
Hartzler, A L; Osterhage, K; Demiris, G; Phelan, E A; Thielke, S M; Turner, A M
Older adults apply various strategies to pursue healthy aging, but we know little about their views and use of personal health information to accomplish those ends. As a first step in formulating the role of personal health information management (PHIM) in healthy aging, we explored the perspectives of older adults on health and health information used in their everyday lives through four focus groups with 25 community-dwelling adults aged 60 and over. We found that the concept of wellness-the holistic and multidimensional nature of health and wellbeing-plays prominently in how older adults think about health and health information. Participants expressed wellness from a position of personal strength, rather than health-related deficits, by focusing on wellness activities for staying healthy through: (1) personal health practices, (2) social network support, and (3) residential community engagement. Although these themes involve personal health information, existing PHIM systems that focus on disease management are generally not designed to support wellness activities. Substantial opportunity exists to fill this wellness support gap with innovative health information technology designed for older adults. Findings carry implications for the design of PHIM tools that support healthy aging and methods for engaging older adults as co-producers of this critical support.
Wood, J.S.; Miller, R.W.
The Industry Sector Analyses (I.S.A.) for electric power production and distribution equipment contains statistical and narrative information on projected market demand, end-users, receptivity of Mexican consumers to U.S. products, the competitive situation - Mexican production, total import market, U.S. market position, foreign competition, and competitive factors, and market access - Mexican tariffs, non-tariff barriers, standards, taxes and distribution channels. The I.S.A. provides the United States industry with meaningful information regarding the Mexican market for electric power production and distribution equipment
The Industry Sector Analyses (I.S.A.) for oil and gas field machinery and equipment contains statistical and narrative information on projected market demand, end-users, receptivity of Mexican consumers to U.S. products, the competitive situation - Mexican production, total import market, U.S. market position, foreign competition, and competitive factors, and market access - Mexican tariffs, non-tariff barriers, standards, taxes and distribution channels. The I.S.A. provides the United States industry with meaningful information regarding the Mexican market for oil and gas field machinery and equipment
Krtalic, Maja; Marcetic, Hana; Micunovic, Milijana
Introduction: As both academic citizens and active participants in information society who use information, students produce huge amounts of personal digital data and documents. It is therefore important to raise questions about their awareness, responsibility, tendencies and activities they undertake to preserve their collective digital heritage.…
Choi, Woojae; Jacobs, Ronald L.
While workplace learning includes formal and informal learning, the relationship between the two has been overlooked, because they have been viewed as separate entities. This study investigated the effects of formal learning, personal learning orientation, and supportive learning environment on informal learning among 203 middle managers in Korean…
...] Proposed Information Collection; United States Park Police Personal History Statement AGENCY: National Park... about this IC, contact Major Scott Fear, United States Park Police, 1100 Ohio Drive SW., Washington, DC... INFORMATION: I. Abstract The United States Park Police (USPP) is a unit of the National Park Service...
...: Privacy of Consumer Financial Information and Safeguarding Personal Information Limits on Disclosures... customer opens an on-line account with you and agrees to receive the notices required in paragraph (a)(1) of this section electronically, and you allow the customer to opt out by any reasonable means within...
Zimmerman, Melisa S.
The growth of the Internet, and specifically social networking sites (SNSs) like Facebook, create opportunities for individuals to share private and identifiable information with a closed or open community. Internet crime has been on the rise and research has shown that criminals are using individuals' personal information pulled from social…
Koenig, Kelly N.; Steiner, Victoria; Pierce, Linda L.
This study compared information needs of caregivers of persons with dementia with caregivers of those who received rehabilitation treatment. Caregivers were provided a 48-item survey and asked to choose their top ten information needs. Dementia caregivers' (n = 33) top needs were dealing with forgetfulness/confusion (91%) and repeating…
Moran, Maria; Seidenberg, Michael; Sabsevitz, Dave; Swanson, Sara; Hermann, Bruce
Thirty unilateral anterior temporal lobectomy (ATL) subjects (15 right and 15 left) and 15 controls were presented a multitrial learning task in which unfamiliar faces were paired with biographical information (occupation, city location, and a person's name). Face recognition hits were similar between groups, but the right ATL group committed more false-positive errors to face foils. Both left and right ATL groups were impaired relative to controls in acquiring biographical information, but the deficit was more pronounced for the left ATL group. Recall levels also varied for the different types of biographical information; occupation was most commonly recalled followed by city name and person name. In addition, city and person name recall was more likely when occupation was also recalled. Overall, recall of biographical information was positively correlated with clinical measures of anterograde episodic memory. Findings are discussed in terms of the role of the temporal lobe and associative learning ability in the successful acquisition of new face semantic (biographical) representations.
... respondents or record keepers from the collection of information (total capital/startup costs and operations... of Annual Responses per Respondent: 25. Estimated Total Annual Responses: 168,725. Estimated Time per... Respondent: 10. Estimated Total Annual Responses: 25,000. Estimated Time per Response: 10 minutes. Estimated...
... application of U.S. antitrust laws to export activities--especially joint export activities involving domestic... provides the certificate holder and its members with limited antitrust preclearance for specified export... information is necessary for both the Departments of Commerce and Justice to conduct an antitrust analysis, in...
Boersma, F.K.; Wagenaar, F.P.; Wolbers, J.J.
Our main concern in this article is whether nation-wide information technology (IT) infrastructures or systems in emergency response and disaster management are the solution to the communication problems the safety sector suffers from. It has been argued that implementing nation-wide IT systems will
... individuals that receive services and find employment through these grants. The accuracy, reliability, and... of a standard set of data elements, definitions, and specifications at all levels of the workforce... proposed collection of information, including the validity of the methodology and assumptions used; Enhance...
... first classification is asked to provide sales, e-commerce, inventories, method of inventory valuation... asked to provide sales, e-commerce, inventories, method of inventory valuation, inventories held outside... DEPARTMENT OF COMMERCE Census Bureau Proposed Information Collection; Comment Request; Annual...
... e- commerce sales, year-end inventories held inside and outside the United States, total operating... of sales by class of customer, and percent of e-commerce sales to customers located outside the... DEPARTMENT OF COMMERCE U.S. Census Bureau Proposed Information Collection; Comment Request; Annual...
As part of its training and information programme on radiation protection, the Directorate-General for Employment and Social Affairs (Health and Safety Directorate) organized for the third and fourth time (in October 1977 and 1978) seminars on radiation protection on behalf of trade union representatives from the nine Member States; the seminars served in particular as a forum for the exchange of ideas and experiences. The present volume reproduces the papers read on those occasions, covering the following topics: the independence of radiaton protection units; training and information in radiation protection; analysis of the main innovations in radiological protection concepts emerging from ICRP Publication No 26; the protection of occasionally exposed workers; the work of the United Nations Scientific Committee on the Effects of Atomic Radiation; the concept of optimization; future developments in dosimetry. Although the publication is destined mainly for the participants in the two meetings, the information it contains may also be of use to anyone interested in the problems of radiation protection and the spreading of knowledge in this field
Full Text Available Background: Personal information about individuals is stored by organisations including government agencies. The information is intended to be kept confidential and strictly used for its primary and legitimate purposes. However, that has not always been the case in many South African government agencies and departments. In recent years, personal information about individuals and groups has been illegally leaked for other motives, in which some were detrimental. Even though there exists a legislation, Protection of Personal Information (POPI Act, which prohibits such malpractices, illegally leaked information has however, not stopped or reduced. In addition to the adoption of the POPI Act, a more stringent approach is therefore needed in order to improve sanity in the use and management of personal information. Otherwise, the detriment that such malpractices cause too many citizens can only be on the increase. Objectives: The objectives of this study were in twofold: (1 to examine and understand the activities that happen with personal information leaks, which includes why and how information is leaked; and (2 to develop a conceptual framework, which includes identification of the factors that influence information leaks and breaches in an environment. Method: Qualitative research methods were followed in achieving the objectives of the study. Within the qualitative methods, documents including existing literature were gathered. The activity theory was employed as lens to guide the analysis. Result: From the analysis, four critical factors were found to be of influence in information leaks and breaches in organisations. The factors include: (1 information and its value, (2 the roles of society and its compliance to information protection, (3 government and its laws relating to information protection and (4 the need for standardisation of information usage and management within a community. Based on the factors, a conceptual framework was
Heisig, Sarah R; Shedden-Mora, Meike C; Hidalgo, Pablo; Nestoriuc, Yvonne
Informing patients about medical treatments and their possible side effects is ethically and legally obligatory but may trigger negative expectations and nocebo-related side effects. This pilot study aims to investigate the effect of different informed consent procedures on treatment expectations for adjuvant breast cancer treatments (Study 1: endocrine therapy; Study 2: chemotherapy). Using an experimental 2-factorial design, healthy women were informed about endocrine therapy (n = 60) or chemotherapy (n = 64) within a hypothetical scenario. Information was framed with or without treatment benefit information and delivered in a personalized or standardized interaction. Primary outcomes were necessity-concern beliefs about the treatment and side-effect expectations, secondary outcomes were decisional conflicts. In Study 1, side-effect expectations (η²p= .08) and decisional conflicts (η²p = .07) were lower when framed treatment information was given. Providing personalized information resulted in more functional necessity-concern beliefs (η²p = .06) and lower decisional conflicts (η²p = .07). Personalizing and framing of information resulted in more functional necessity-concern beliefs (η²p = .10) and lower decisional conflicts. In Study 2, necessity-concern beliefs were more functional with framing (η²p = .06). Participants in the personalized groups reported lower decisional conflicts (η²p = .06). No differences in side-effect expectations were revealed. This is the first study to provide evidence for optimized treatment expectations through altered informed consent strategies. The results emphasize that framing and personalizing informed consent can positively influence treatment expectations and reduce decisional conflicts. However, generalizations are impaired by the study's pilot character. The potential to prevent nocebo responses in clinical practice should be analyzed. (PsycINFO Database Record (c) 2015 APA, all rights reserved).
relevant data and view- ing tailored output graphs following the MC exercise. RTRAM uses VBA code and ActiveX controls, which allow it to be accessible to...Excel, this code can be accessed by clicking the Visual Basic button of the Developer tab. For information about using VBA in Excel, search for...Command TRL technology readiness level UI user interface VBA Visual Basic for Applications WBS work breakdown structure 1 CHAPTER ONE Introduction
..., Colombia, Korea, Morocco, and Singapore AGENCY: Office of the United States Trade Representative (``USTR...-Singapore Free Trade Agreement (``USSFTA''). USTR is inviting interested persons to apply to be on one or...-9483 to arrange for an alternative method of transmission. FOR FURTHER INFORMATION CONTACT: For...
... specific data and information on cross-border trade in professional services (education, health, and legal... the Commission may also be obtained by accessing its Internet server ( http://www.usitc.gov ). Persons... cross-border trade in professional services (education, health, and legal services). Under Commission...
Turvey, Carolyn L; Zulman, Donna M; Nazi, Kim M; Wakefield, Bonnie J; Woods, Susan S; Hogan, Timothy P; Weaver, Frances M; McInnes, Keith
Personal health records provide patients with ownership of their health information and allow them to share information with multiple healthcare providers. However, the usefulness of these records relies on patients understanding and using their records appropriately. My HealtheVet is a Web-based patient portal containing a personal health record administered by the Veterans Health Administration. The goal of this study was to explore veterans' interest and use of My HealtheVet to transfer and share information as well as to identify opportunities to increase veteran use of the My HealtheVet functions. Two waves of data were collected in 2010 through an American Customer Satisfaction Index Web-based survey. A random sample of veterans using My HealtheVet was invited to participate in the survey conducted on the My HealtheVet portal through a Web-based pop-up browser window. Wave One results (n=25,898) found that 41% of veterans reported printing information, 21% reported saving information electronically, and only 4% ever sent information from My HealtheVet to another person. In Wave Two (n=18,471), 30% reported self-entering medication information, with 18% sharing this information with their Veterans Affairs (VA) provider and 9.6% sharing with their non-VA provider. Although veterans are transferring important medical information from their personal health records, increased education and awareness are needed to increase use. Personal health records have the potential to improve continuity of care. However, more research is needed on both the barriers to adoption as well as the actual impact on patient health outcomes and well-being.
Full Text Available This paper examines whether the USD/KRW spot market is efficient in processing new information by employing both the Runs Test and the foreigners' securities trading rule profitability approach. Excluding the period of 2008 financial crisis, the USD/KRW spot market is efficient in terms of close rates, but not efficient in terms of open rates. The foreigners' securities trading rule can also produce statistically significant profits if the trades are based on open prices, though not high. This implies that traders can predict future exchange rates, to some degree, with the information on foreign net purchases of securities in the Korean stock/ bond markets. If we consider the related interest differentials and transaction costs, however, the profits fade out to marginal level or below. This result implies that traders can expect the existence of predictability in the USD/KRW spot market, but not profitability.
Schneider, Barbara; Maurer, Konrad; Sargk, Dieter; Heiskel, Harald; Weber, Bernhard; Frölich, Lutz; Georgi, Klaus; Fritze, Jürgen; Seidler, Andreas
The validity and reliability of using psychological autopsies to diagnose a psychiatric disorder is a critical issue. Therefore, interrater and test-retest reliability of the Structured Clinical Interview for DSM-IV Axis I and Personality Disorders and the usefulness of these instruments for the psychological autopsy method were investigated. Diagnoses by informant's interview were compared with diagnoses generated by a personal interview of 35 persons. Interrater reliability and test-retest reliability were assessed in 33 and 29 persons, respectively. Chi-square analysis, kappa and intraclass correlation coefficients, and Kendall's tau were used to determine agreement of diagnoses. Kappa coefficients were above 0.84 for substance-related disorders, mood disorders, and anxiety and adjustment disorders, and above 0.65 for Axis II disorders for interrater and test-retest reliability. Agreement by personal and relative's interview generated kappa coefficients above 0.79 for most Axis I and above 0.65 for most personality disorder diagnoses; Kendall's tau for dimensional individual personality disorder scores ranged from 0.22 to 0.72. Despite of a small number of psychiatric disorders in the selected population, the present results provide support for the validity of most diagnoses obtained through the best-estimate method using the Structured Clinical Interview for DSM-IV Axis I and Personality Disorders. This instrument can be recommended as a tool for the psychological autopsy procedure in post-mortem research. Copyright 2004 Elsevier Ireland Ltd.
Wang, Dawei; Hao, Leilei; Maguire, Phil; Hu, Yixin
This study investigated the effects of cognitive style and emotional trade-off difficulty (ETOD) on information processing in decision-making. Eighty undergraduates (73.75% female, M = 21.90), grouped according to their cognitive style (field-dependent or field-independent), conducted an Information Display Board (IDB) task, through which search time, search depth and search pattern were measured. Participants' emotional states were assessed both before and after the IDB task. The results showed that participants experienced significantly more negative emotion under high ETOD compared to those under low ETOD. While both cognitive style and ETOD had significant effects on search time and search depth, only ETOD significantly influenced search pattern; individuals in both cognitive style groups tended to use attribute-based processing under high ETOD and to use alternative-based processing under low ETOD. There was also a significant interaction between cognitive style and ETOD for search time and search depth. We propose that these results are best accounted for by the coping behaviour framework under high ETOD, and by the negative emotion hypothesis under low ETOD. © 2016 International Union of Psychological Science.
Boom, Jan-Tjeerd; R. Dijstra, Bouwe
This paper compares emissions trading based on a cap on total emissions (permit trading) and on relative standards per unit of output (credit trading). Two types of market structure are considered: perfect competition and Cournot oligopoly. We find that output, abatement costs and the number...... of firms are higher under credit trading. Allowing trade between permit-trading and credit-trading sectors may increase in welfare. With perfect competition, permit trading always leads to higher welfare than credit trading. With imperfect competition, credit trading may outperform permit trading....... Environmental policy can lead to exit, but also to entry of firms. Entry and exit have a profound impact on the performance of the schemes, especially under imperfect competition. We find that it may be impossible to implement certain levels of total industry emissions. Under credit trading several levels...
Chatelus, R.; Schot, P.M.
In order to verify compliance with safeguards and draw conclusions on the absence of undeclared nuclear material and activities, the International Atomic Energy Agency (IAEA) collects and analyses trade information that it receives from open sources as well as from Member States. Although the IAEA does not intervene in national export controls, it has to monitor the trade of dual use items. Trade analysis helps the IAEA to evaluate global proliferation threats, to understand States' ability to report exports according to additional protocols but also to compare against State declarations. Consequently, the IAEA has explored sources of trade-related information and has developed analysis methodologies beyond its traditional safeguards approaches. (author)
Full Text Available The increasing complexity of the business environment, growing knowledge requirements, development of information technologies, and competitiveness implies the need of implementation of information management systems. Moreover, welter of information about online customers, their individual behavior, and their expectations force entrepreneurs to manage information in a personalized way. Monitoring Internet users behavior, creating their profiles (based on data about age, sex, lifestyle, interests, family, work, etc., and controlling current traffic on the Web site give wide range of possibilities in creating a real model of potential customers preference and using it in online communication. This study concentrates on possibilities of using personalized communication in the information management by online stores in 4C model.
Full Text Available The article examines the legal requirements relating to the informed consent of mentally ill persons to participation in clinical research in South Africa. First, the juridical basis of informed consent in South African law is outlined; and second, the requirements for lawful consent developed in South African common law and case law are presented. Finally, the article deliberates upon the requirements for the participation of mentally ill persons in research as laid down by the Mental Health Care Act and its regulations, the National Health Act and its (draft regulations, and the South African Constitution.
Downing, Gregory J; Boyle, Scott N; Brinner, Kristin M; Osheroff, Jerome A
Advances in technology and the scientific understanding of disease processes are presenting new opportunities to improve health through individualized approaches to patient management referred to as personalized medicine. Future health care strategies that deploy genomic technologies and molecular therapies will bring opportunities to prevent, predict, and pre-empt disease processes but will be dependent on knowledge management capabilities for health care providers that are not currently available. A key cornerstone to the potential application of this knowledge will be effective use of electronic health records. In particular, appropriate clinical use of genomic test results and molecularly-targeted therapies present important challenges in patient management that can be effectively addressed using electronic clinical decision support technologies. Approaches to shaping future health information needs for personalized medicine were undertaken by a work group of the American Health Information Community. A needs assessment for clinical decision support in electronic health record systems to support personalized medical practices was conducted to guide health future development activities. Further, a suggested action plan was developed for government, researchers and research institutions, developers of electronic information tools (including clinical guidelines, and quality measures), and standards development organizations to meet the needs for personalized approaches to medical practice. In this article, we focus these activities on stakeholder organizations as an operational framework to help identify and coordinate needs and opportunities for clinical decision support tools to enable personalized medicine. This perspective addresses conceptual approaches that can be undertaken to develop and apply clinical decision support in electronic health record systems to achieve personalized medical care. In addition, to represent meaningful benefits to personalized
Brinner Kristin M
Full Text Available Abstract Background Advances in technology and the scientific understanding of disease processes are presenting new opportunities to improve health through individualized approaches to patient management referred to as personalized medicine. Future health care strategies that deploy genomic technologies and molecular therapies will bring opportunities to prevent, predict, and pre-empt disease processes but will be dependent on knowledge management capabilities for health care providers that are not currently available. A key cornerstone to the potential application of this knowledge will be effective use of electronic health records. In particular, appropriate clinical use of genomic test results and molecularly-targeted therapies present important challenges in patient management that can be effectively addressed using electronic clinical decision support technologies. Discussion Approaches to shaping future health information needs for personalized medicine were undertaken by a work group of the American Health Information Community. A needs assessment for clinical decision support in electronic health record systems to support personalized medical practices was conducted to guide health future development activities. Further, a suggested action plan was developed for government, researchers and research institutions, developers of electronic information tools (including clinical guidelines, and quality measures, and standards development organizations to meet the needs for personalized approaches to medical practice. In this article, we focus these activities on stakeholder organizations as an operational framework to help identify and coordinate needs and opportunities for clinical decision support tools to enable personalized medicine. Summary This perspective addresses conceptual approaches that can be undertaken to develop and apply clinical decision support in electronic health record systems to achieve personalized medical care. In
Full Text Available As Radu said (2009, pag. 91  logical approach developed by accounting, presentation of an exact image of the heritage, the financial situation and financial results, based on a rational thought, a gradual knowledge domain investigated, concepts, tools and processes that allow a better understanding of the essence of economic phenomena and processes. Theoretical framework brings together a number of concepts that are considered fundamental to regulatory or accounting systems applied at the level of the entity to have clearly specified the coordinates of the base and are able to achieve cohesion between the objective of financial statements as true and fair view, financial information and policy characteristics and estimation techniques as a form of expression towards the recognition and presentation of economic reality. The author considers, in the context of the defined system applied within the accounting entities in general, that principles, presents not only a crucial premise, as well as needed necessity in order to show an exact image of the performance and financial position of the entity.
Schrans, Diego; Avonts, Dirk; Christiaens, Thierry; Willems, Sara; de Smet, Kaat; van Boven, Kees; Boeckxstaens, Pauline; Kühlein, Thomas
General practice is person-focused. Contextual information influences the clinical decision-making process in primary care. Currently, person-related information (PeRI) is neither recorded in a systematic way nor coded in the electronic medical record (EMR), and therefore not usable for scientific use. To search for classes of PeRI influencing the process of care. GPs, from nine countries worldwide, were asked to write down narrative case histories where personal factors played a role in decision-making. In an inductive process, the case histories were consecutively coded according to classes of PeRI. The classes found were deductively applied to the following cases and refined, until saturation was reached. Then, the classes were grouped into code-families and further clustered into domains. The inductive analysis of 32 case histories resulted in 33 defined PeRI codes, classifying all personal-related information in the cases. The 33 codes were grouped in the following seven mutually exclusive code-families: 'aspects between patient and formal care provider', 'social environment and family', 'functioning/behaviour', 'life history/non-medical experiences', 'personal medical information', 'socio-demographics' and 'work-/employment-related information'. The code-families were clustered into four domains: 'social environment and extended family', 'medicine', 'individual' and 'work and employment'. As PeRI is used in the process of decision-making, it should be part of the EMR. The PeRI classes we identified might form the basis of a new contextual classification mainly for research purposes. This might help to create evidence of the person-centredness of general practice. © The Author 2016. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: email@example.com.
Brown, Michael F; Saxon, Marie E; Bisbing, Teagan; Evans, Jessica; Ruff, Jennifer; Stokesbury, Andrew
To examine whether the outcome of a rat's own choices ("personal information") and the choice behavior of another rat ("social information") can jointly control spatial choices, rats were tested in an open field task in which they searched for food. For the rats of primary interest (Subject Rats), the baited locations were all on one side of the arena, but the specific locations baited and the side on which they occurred varied over trials. The Subject Rats were sometimes tested together with an informed "Model" rat that had learned to find food in the same five locations (all on the same side of the arena) on every trial. Unintended perceptual cues apparently controlled spatial choices at first, but when perceptual cues to food location were not available, choices were controlled by both personal information (allowing the baited side of the arena to be determined) and social information (allowing baited locations to be determined more precisely). This shows that control by personal and social information are not mutually exclusive and supports the view that these two kinds of information can be used flexibly and adaptively to guide spatial choices. This article is part of a Special Issue entitled: tribute to Tom Zentall. Copyright © 2015 Elsevier B.V. All rights reserved.
In this thesis an information solution was developed that enables the implementation of different trading strategies and backtesting over cryptocurrency Bitcoin trading data. Supported exchanges are Bitstamp, BTC-e and MtGox. In the field of technical analysis there already exist various solutions for Bitcoin that help traders to trade and advise them on basis of technical indicators and patterns. However, each has its own drawbacks, which we are aiming to fix. A web application was developed...
In this thesis an information solution was developed that enables the implementation of different trading strategies and backtesting over cryptocurrency Bitcoin trading data. Supported exchanges are Bitstamp, BTC-e and MtGox. In the field of technical analysis there already exist various solutions for Bitcoin that help traders to trade and advise them on basis of technical indicators and patterns. However, each has its own drawbacks, which we are aiming to fix. A web application was developed...
Matalucci, R.V.; Harrington, M.W.; Harlan, C.P.; Kuperberg, J.M.; Biczo, I.L.
During a NATO Advanced Research Workshop (ARW) held in Visegrad, Hungary, June 21-23, 1994, portions of contamination data from the Former Soviet Union (FSU) site at Komarom, Hungary were used to demonstrate the international EnviroTRADE Information System as a tool to assist with the identification of alternative cleanup measures for contaminated sites. The NATO ARW was organized and conducted by the joint Florida State University and the Technical University of Budapest, Center for Hungarian-American Environmental Research, Studies, and Exchanges (CHAERSE). The purpose of the workshop was to develop a strategy for the identification and selection of appropriate low-cost and innovative site remediation technologies and approaches for a typical abandoned FSU site. The EnviroTRADE information system is a graphical, photographical, and textual environmental management tool under development by the U.S. Department of Energy (USDOE) at Sandia National Laboratories (SNL) as a part of the cleanup program of the nuclear weapons complex. EnviroTRADE provides a single, powerful, multi-purpose, multi-user, multi-media, and interactive computer information system for worldwide environmental restoration and waste management (ER/WM). Graphical, photographic, and textual data from the Komarom FSU site were entered into EnviroTRADE. These data were used to make comparative evaluations of site characterization and remediation technologies that might be used to clean up primarily hydrocarbon contamination in the groundwater and soil. Available Hydrogeological and geological features, contaminated soil profiles, and topographical maps were included in the information profiles. Although EnviroTRADE is currently only partially populated (approximately 350 technologies for cleanup are included in the database), the utility of the information system to evaluate possible options for cleanup of the Komarom site has been demonstrated
Julino Assunção Rodrigues Soares Neto
Full Text Available The present study aimed to assess the quality and risks involved in the consumption of psychoactive herbal products (PHs that are available through informal commerce in the city of Diadema, SP, Brazil. Methods of ethnography were used to conduct the fieldwork during which four dealers were selected to record the collection, handling, packaging, types of PHs marketed, and their therapeutic purposes. In addition, lots of the PHs selected were purchased from the dealers and analyzed using microbiology and pharmacognosy techniques. 217 PHs were recorded and categorized into two main groups: stimulants (67% and depressants (27% of the central nervous system; sixteen of them were selected, and their 52 lots were acquired. The deficiencies observed in handling and packaging these lots by dealers were confirmed by microbiological analysis; 80.8% of them presented risk according to the indicators defined by the Brazilian Pharmacopoeia. The pharmacognostic analysis confirmed the authenticity of only 9 to 16 PHs analyzed. In addition, descriptions of contraindications, adverse reactions, and drug interactions were found in the literature for the PHs. The results of this study allow the observation of the priorities for the sanitary adequacy of the popular trade of herbs.
Bum Soo Chon
Full Text Available This study aimed to examine predictors of the intention to protect personal information on Facebook. We conducted an online survey of 679 Facebook users in the Republic of Korea. The findings of this study showed that usefulness and ease of use had significant effects on attitudes toward protection behavior. The results also revealed that risk factors (privacy risk severity and vulnerability had significant effects on protective behaviors. Based on our findings, we discussed the information protection of privacy on Facebook.
.... SUMMARY: The Department of Labor (DOL) is submitting the Occupational Safety and Health Administration (OSHA) sponsored information collection request (ICR) titled, ``Personal Protective Equipment for... use in accordance with the Paperwork Reduction Act (PRA) of 1995 (44 U.S.C. 3501 et seq.). DATES...
Al-Qirim, Nabeel; Rouibah, Kamel; Tarhini, Ali; Serhani, Mohamed Adel; Yammahi, Aishah Rashid; Yammahi, Maraim Ahmed
This research investigates the personality characteristics of Information Technology students (CIT) in UAE University (UAEU) and how such features impact their IT learning. To achieve this objective, this research attempts to explain the impact of the Big-5 factors on learning using survey research. Results from 179 respondents suggested that…
Adjei, Joseph K.; Olesen, Henning
Although personal identity information must primarily be used for protecting and promoting the physical needs of individuals, it has also become central to the business models of the digital age due to its use for other secondary purposes, resulting in various innovative identity management (Id...
... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Confidentiality, security, and integrity of... COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.8 Confidentiality, security, and integrity of personal information collected from children. The operator must...
Dolog, Peter; Stuckenschmidt, Heiner; Wache, Holger
and user preferences. We describe a framework for information access that combines query refinement and relaxation in order to provide robust, personalized access to heterogeneous RDF data as well as an implementation in terms of rewriting rules and explain its application in the context of e-learning...
Cseh, Maria; Manikoth, Nisha N.
As the authors of the preceding article (Choi and Jacobs, 2011) have noted, the workplace learning literature shows evidence of the complementary and integrated nature of formal and informal learning in the development of employee competencies. The importance of supportive learning environments in the workplace and of employees' personal learning…
The chapter discusses the potential of personal learning environments (PLE) based on Web 2.0 applications for language courses in higher education (HE). This novel approach to the use of information and communication technologies (ICT) in education involves learners in the design of learning environments, tools and processes. The chapter begins…
Full Text Available breaches but does not provide a clear indication of the level of personal information available on the internet since only reported incidents are taken into account. The possibility of pro-active automated breach detection has previously been discussed as a...
... through appropriate modes of communication of the confidentiality of personal information and the... individual's native language or through the appropriate mode of communication; and (v) These policies and... the record of services, consistent with § 361.47(a)(12). (d) Release for audit, evaluation, and...
Chicoli, Amanda; Paley, Derek A.
Individuals in a group may obtain information from other group members about the environment, including the location of a food source or the presence of a predator. Here, we model how information spreads in a group using a susceptible-infected-removed epidemic model. We apply this model to a simulated shoal of fish using the motion dynamics of a coupled oscillator model, in order to test the biological hypothesis that polarized or aligned shoaling leads to faster and more accurate escape responses. The contributions of this study are the (i) application of a probabilistic model of epidemics to the study of collective animal behavior; (ii) testing the biological hypothesis that group cohesion improves predator escape; (iii) quantification of the effect of social cues on startle propagation; and (iv) investigation of the variation in response based on network connectivity. We find that when perfectly aligned individuals in a group are startled, there is a rapid escape by individuals that directly detect the threat, as well as by individuals responding to their neighbors. However, individuals that are not startled do not head away from the threat. In startled groups that are randomly oriented, there is a rapid, accurate response by individuals that directly detect the threat, followed by less accurate responses by individuals responding to neighbor cues. Over the simulation duration, however, even unstartled individuals head away from the threat. This study illustrates a potential speed-accuracy trade-off in the startle response of animal groups, in agreement with several previous experimental studies. Additionally, the model can be applied to a variety of group decision-making processes, including those involving higher-dimensional motion.
Vaala, Sarah E; Lee, Joyce M; Hood, Korey K; Mulvaney, Shelagh A
Sharing personal information about type 1 diabetes (T1D) can help adolescents obtain social support, enhance social learning, and improve self-care. Diabetes technologies, online communities, and health interventions increasingly feature data-sharing components. This study examines factors underlying adolescents' willingness to share personal T1D information with peers. Participants were 134 adolescents (12-17 years of age; 56% female) who completed an online survey regarding experiences helping others with T1D, perceived social resources, beliefs about the value of sharing information and helping others, and willingness to share T1D information. Hemoglobin A1c values were obtained from medical records. Adolescents were more willing to share how they accomplished T1D tasks than how often they completed them, and least willing to share glucose control status. In multivariate analyses, sharing/helping beliefs (β = 0.26, P value; β = -0.26, P personal health information. Glucose control moderated relationships such that adolescents with worse A1c values had stronger relationships between sharing/helping beliefs and willingness to share (β = 0.18, P personal health information, particularly if they have better diabetes health status and a stronger belief in the benefits of sharing. Social learning and social media components may improve intervention participation, engagement, and outcomes by boosting adolescents' beliefs about the benefits of sharing information and helping others. © The Author 2017. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: firstname.lastname@example.org
... manager tell me when soliciting personal information? 105-64.104 Section 105-64.104 Public Contracts and... Responsibilities § 105-64.104 What must the system manager tell me when soliciting personal information? When soliciting information from you or a third party for a system of records, system managers must: Cite the...
Roč. 13, č. 1 (2012), s. 83-98 ISSN 1488-3473 R&D Projects: GA MŠk LC542 Institutional research plan: CEZ:AV0Z70850503 Keywords : migration * trade * informal trade barriers Subject RIV: AH - Economics
-, č. 387 (2009), s. 1-29 ISSN 1211-3298 R&D Projects: GA MŠk LC542 Grant - others:GA UK(CZ) 118909 Institutional research plan: CEZ:MSM0021620846 Keywords : international trade * migration * informal trade barriers Subject RIV: AH - Economics http://www.cerge-ei.cz/pdf/wp/Wp387.pdf
Thorogood, Rose; Davies, Nicholas B.
Individuals often vary defences in response to local predation or parasitism risk. But how should they assess threat levels when it pays their enemies to hide? For common cuckoo hosts, assessing parasitism risk is challenging: cuckoo eggs are mimetic and adult cuckoos are secretive and resemble hawks. Here, we show that egg rejection by reed warblers depends on combining personal and social information of local risk. We presented model cuckoos or controls at a pair’s own nest (personal information of an intruder) and/or on a neighbouring territory, to which they were attracted by broadcasts of alarm calls (social information). Rejection of an experimental egg was stimulated only when hosts were alerted by both social and personal information of cuckoos. However, pairs that rejected eggs were not more likely to mob a cuckoo. Therefore, while hosts can assess risk from the sight of a cuckoo, a cuckoo cannot gauge if her egg will be accepted from host mobbing. Our results reveal how hosts respond rapidly to local variation in parasitism, and why it pays cuckoos to be secretive, both to avoid alerting their targets and to limit the spread of social information in the local host neighbourhood. PMID:26794435
Peter J. Veazie
Full Text Available Typical models of the decision to seek care consider information as a single conceptual object. This paper presents an alternative that allows multiple objects. For older persons seeking care, results support this alternative. Older decision-makers that segregate information into multiple conceptual objects assessed separately are characterized by socio-demographic (younger age, racial category, non-Hispanic, higher education, higher income, and not married, health status (better general health for men and worse general health for women, fewer known illnesses, and neuropsychological (less memory loss for men, trouble concentrating and trouble making decisions for men factors. Results of this study support the conclusion that older persons are more likely to integrate information, and individuals with identifiable characteristics are more likely to do so than others. The theory tested in this study implies a potential explanation for misutilization of care (either over or under-utilization.
Shaer, Orit; Nov, Oded; Okerlund, Johanna; Balestra, Martina; Stowell, Elizabeth; Ascher, Laura; Bi, Joanna; Schlenker, Claire; Ball, Madeleine
In recent years, people who sought direct-to-consumer genetic testing services have been increasingly confronted with an unprecedented amount of personal genomic information, which influences their decisions, emotional state, and well-being. However, these users of direct-to-consumer genetic services, who vary in their education and interests, frequently have little relevant experience or tools for understanding, reasoning about, and interacting with their personal genomic data. Online interactive techniques can play a central role in making personal genomic data useful for these users. We sought to (1) identify the needs of diverse users as they make sense of their personal genomic data, (2) consequently develop effective interactive visualizations of genomic trait data to address these users' needs, and (3) evaluate the effectiveness of the developed visualizations in facilitating comprehension. The first two user studies, conducted with 63 volunteers in the Personal Genome Project and with 36 personal genomic users who participated in a design workshop, respectively, employed surveys and interviews to identify the needs and expectations of diverse users. Building on the two initial studies, the third study was conducted with 730 Amazon Mechanical Turk users and employed a controlled experimental design to examine the effectiveness of different design interventions on user comprehension. The first two studies identified searching, comparing, sharing, and organizing data as fundamental to users' understanding of personal genomic data. The third study demonstrated that interactive and visual design interventions could improve the understandability of personal genomic reports for consumers. In particular, results showed that a new interactive bubble chart visualization designed for the study resulted in the highest comprehension scores, as well as the highest perceived comprehension scores. These scores were significantly higher than scores received using the
Full Text Available A truebounded publication list of a scientific author consists of exactly all publications that meet two criteria: (1 they are formally published (e.g., journal article or proceeding paper; (2 they have scientific, scholarly, or academic content. A publication list is overbounded if it includes documents which do not meet the two criteria (such as novels; a publication list is underbounded if it is incomplete. Are authors’ personal publication lists, found on their personal sites on the Internet or in institutional repositories, truebounded, overbounded, or underbounded? And are the respective publication lists generated through bibliographic information services truebounded, overbounded, or underbounded? As case studies, publications of nine International Society of Scientometrics and Informetrics (ISSI Committee members (published between 2007 and 2016 were collected to create preferably complete personal publication lists according to the two criteria. We connect the “relative visibility of an author” with the concepts of truebounded, overbounded, and underbounded publication lists. The authors’ relative visibility values were determined for the information services Web of Science (WoS, Scopus, and Google Scholar and compared to the relative visibility of the authors’ personal publication lists. All results of the bibliographic information services are underbounded. Relative visibility is highest in Google Scholar, followed by Scopus and WoS.
Harrington, M.W.; Harlan, C.P.
In support of the US Department of Energy's commitment to the remediation of waste sites throughout its complex, the DOE has recognized that it can accelerate its technology development efforts and leverage the expenditure of available funds through an international cooperation among government entities, private industry, and educational institutions. To support the technology transfer of environmental information, the DOE has sponsored the development of EnviroTRADE - an international information system that will facilitate the exchange of environmental restoration and waste management technologies worldwide. The system will contain profiles on both environmental restoration / waste management needs and foreign / domestic technologies. Users will be able to identify matches between worldwide needs and available or emerging technologies. Where matches between needs and existing technologies are not found, the system will identify the potential for development of new and innovative technologies to address environmental problems. EnviroTRADE will also provide general information on international environmental restoration and waste management organizations, sites, activities, and contacts
Fernández-Tobías, Ignacio; Braunhofer, Matthias; Elahi, Mehdi; Ricci, Francesco; Cantador, Iván
The final publication is available at Springer via http://dx.doi.org/10.1007/s11257-016-9172-z The new user problem in recommender systems is still challenging, and there is not yet a unique solution that can be applied in any domain or situation. In this paper we analyze viable solutions to the new user problem in collaborative filtering (CF) that are based on the exploitation of user personality information: (a) personality-based CF, which directly improves the recommendation prediction ...
Schnall, Rebecca; Cimino, James J; Currie, Leanne M; Bakken, Suzanne
The goals of this study were to explore the information needs of case managers who provide services to persons living with HIV (PLWH) and to assess the applicability of the Information Needs Event Taxonomy in a new population. The study design was observational with data collection via an online survey. Responses to open-ended survey questions about the information needs of case managers (n=94) related to PLWH of three levels of care complexity were categorized using the Information Needs Event Taxonomy. The most frequently identified needs were related to patient education resources (33%), patient data (23%), and referral resources (22%) accounting for 79% of all (N=282) information needs. Study limitations include selection bias, recall bias, and a relatively narrow focus of the study on case-manager information needs in the context of caring for PLWH. The study findings contribute to the evidence base regarding information needs in the context of patient interactions by: (1) supporting the applicability of the Information Needs Event Taxonomy and extending it through addition of a new generic question; (2) providing a foundation for the addition of context-specific links to external information resources within information systems; (3) applying a new approach for elicitation of information needs; and (4) expanding the literature regarding addressing information needs in community-based settings for HIV services.
LeRouge, Cynthia M; Tao, Donghua; Ohs, Jennifer; Lach, Helen W; Jupka, Keri; Wray, Ricardo
"Baby Boomers" (adults born between the years of 1946 and 1964) make up the largest segment of the population in many countries, including the United States (about 78 million Americans) . As Baby Boomers reach retirement age and beyond, many will have increasing medical needs and thus demand more health care resources that will challenge the healthcare system. Baby Boomers will likely accelerate the movement toward patient self-management and prevention efforts. Consumer Health Information Technologies (CHIT) hold promise for empowering health consumers to take an active role in health maintenance and disease management, and thus, have the potential to address Baby Boomers' health needs. Such innovations require changes in health care practice and processes that take into account Baby Boomers' personal health needs, preferences, health culture, and abilities to use these technologies. Without foundational knowledge of barriers and opportunities, Baby Boomers may not realize the potential of these innovations for improving self-management of health and health outcomes. However, research to date has not adequately explored the degree to which Baby Boomers are ready to embrace consumer health information technology and how their unique subcultures affect adoption and diffusion. This position paper describes an ecological conceptual framework for understanding and studying CHIT aimed at satisfying the personal health needs of Baby Boomers. We explore existing literature to provide a detailed depiction of our proposed conceptual framework, which focuses characteristics influencing Baby Boomers and their Personal Health Information Management (PHIM) and potential information problems. Using our ecological framework as a backdrop, we provide insight and implications for future research based on literature and underlying theories represented in our model.
Full Text Available Information materials can only become usable to persons with visual impairment when they are transcribed into alternative formats. Over time, the transcription and provision of alternative formats in Nigeria by libraries has not been based on users’ reading interest and information needs. This study delves into the reading interests and information needs of persons with visual impairment in Nigeria. Survey research design was adopted and the study purposively focused on southwestern Nigeria. Using stratified proportionate random sampling techniques, data was gathered by questionnaires namely the Visually Impaired Adult Questionnaire VIAQ (= 0.75 and Visually Impaired Student Questionnaire VISQ (= 0.78 from fourteen selected libraries stratified into non-governmental, public, tertiary institutions and secondary schools. Of the 563 copies of the questionnaire that were administered, 401 (71.3% were successfully completed and used for the study. The study found that adults with visual impairment had high reading interests in religious, business, and entertainment materials, among others. Secondary school respondents had high reading interest in art subjects, reference materials, manuals and animal story materials. Both respondents showed high information needs in expected and relevant areas. Braille materials (58.3% are the most preferred source of information generally. Adult respondents preferred Braille (72.4%, while the secondary school respondents preferred Talking books/audio recordings (55%. Transcription and provision of information materials for the visually impaired through libraries should be based on knowledge of their reading interest and information needs.
Crawford William CR
Full Text Available Abstract Background Personally controlled health records (PCHRs, a subset of personal health records (PHRs, enable a patient to assemble, maintain and manage a secure copy of his or her medical data. Indivo (formerly PING is an open source, open standards PCHR with an open application programming interface (API. Results We describe how the PCHR platform can provide standard building blocks for networked PHR applications. Indivo allows the ready integration of diverse sources of medical data under a patient's control through the use of standards-based communication protocols and APIs for connecting PCHRs to existing and future health information systems. Conclusion The strict and transparent personal control model is designed to encourage widespread participation by patients, healthcare providers and institutions, thus creating the ecosystem for development of innovative, consumer-focused healthcare applications.
Schreier, Virginia A.
Although scholars have long advocated the use of informational texts in the primary grades, gaps and inconsistencies in research have produced conflicting reports on how teachers used these texts in the primary curriculum, and how primary students dealt with them during instruction and on their own (e.g., Saul & Dieckman, 2005). Thus, to add to research on informational texts in the primary grades, the purpose of this study was to examine: (a) a first-grade teacher's use of science informational trade books (SITBs) in her classroom, (b) the ways students responded to her instruction, and (c) how students interacted with these texts. My study was guided by a sociocultural perspective (e.g., Bakhtin, 1981; Vygotsky, 1978), providing me a lens to examine participants during naturally occurring social practices in the classroom, mediated by language and other symbolic tools. Data were collected by means of 28 observations, 6 semi-structured interviews, 21 unstructured interviews, and 26 documents over the course of 10 weeks. Three themes generated from the data to provide insight into the teacher's and students' practices and interactions with SITBs. First, the first-grade teacher used SITBs as teaching tools during guided conversations around the text to scaffold students' understanding of specialized vocabulary, science concepts, and text features. Her instruction with SITBs included shared reading lessons, interactive read-alouds and learning activities during two literacy/science units. However, there was limited use of SITBs during the rest of her reading program, in which she demonstrated a preference for narrative. Second, students responded to instruction by participating in guided conversations around the text, in which they used prior knowledge, shared ideas, and visual representations (e.g., illustrations, diagrams, labels, and captions) to actively make meaning of the text. Third, students interacted with SITBs on their own to make sense of science, in
Sin, Sei-Ching Joanna
Introduction: This paper discusses the person-in-environment framework, which proposes the inclusion of environmental factors, alongside personal factors, as the explanatory factors of individual-level information behaviour and outcome. Method: The paper first introduces the principles and schematic formulas of the person-in-environment framework.…
Valchev, V.H.; van de Vijver, F.J.R.; Nel, J.A.; Rothmann, S.R.; Meiring, D.
The present study investigates the differences between 3 ethnocultural groups in South Africa in the use of traits and contextual information for personality descriptions and the interaction of these differences with social distance from the target person and with personality domains. Semistructured
Tranberg, Charlotte Bagger
The Data Protection Directive prohibits processing of sensitive data (racial or ethnic origin, political, religious or philosophical convictions, trade union membership and information on health and sex life). All other personal data may be processed, provided processing is deemed necessary in re...
Menkes, David B; Hill, Charlotte J; Horsfall, Melissa; Jaye, Chrystal
This study used group interviews to explore Māori and European New Zealander (Pakeha) perspectives on access to personal health information. Two predominant themes emerged: the tension between the individual and society, and differences inherent in the use of formal and informal moral codes. Māori and Pakeha differed in their concept of autonomy and relied on distinct moral codes when considering questions of access; Western values and moral codes were notably less relevant to Māori who described distinct, collectivist means of ensuring social care of the sick and dying. Pakeha but not Māori participants often used hypothetical situations to reach an abstract determination of 'who should know'; the latter instead used personal experience to decide case-by-case. Generational differences were also evident, particularly in the Māori groups. In conclusion, culture should be considered in access to personal health information in New Zealand. Similar cultural variation is likely to be found in other countries; recognition of such differences will help ensure that access to sensitive information is appropriate, inclusive, and ethical.
Walther, Anna Lena; Falk, Johannes; Deck, Ruth
Aim In order to acquire target group-specific information on rehabilitation for members of the German pension insurance, they were asked about their ideas about medical rehabilitation and desired information regarding subjects and kind of information transfer. Method The core of the project was a written survey of members of the German pension insurance. N=600 insured people were invited to participate in the study. The questionnaire was developed in a qualitative pre-study. Results N=196 questionnaires were evaluated. Recovery of working ability was mentioned by most persons as the aim of medical rehabilitation. The most common idea regarding indication for rehabilitation was a specific operation. Physiotherapy was most often considered as therapy during medical rehabilitation. Information about formal steps, realistic aims and rehabilitation clinics were important. A conversation with their physician, written information material and a website were the preferred information pathways. Two-thirds of participants thought that information about medical rehabilitation was important even though they had no rehabilitation indication at the time of survey. Conclusion The identified target-related information needs can be considered in a need-oriented development of information material. These can contribute to an informed decision for members of the German pension insurance for or against medical rehabilitation or an application for rehabilitation. Moreover, patient-oriented information can contribute to more successful rehabilitation participation, higher satisfaction with and a better rating of medical rehabilitation. © Georg Thieme Verlag KG Stuttgart · New York.
Full Text Available A person whose privacy has been infringed upon through the unlawful, culpable processing of his or her personal information can sue the infringer's employer based on vicarious liability or institute action based on the Protection of Personal Information Act 4 of 2013 (POPI. Section 99(1 of POPI provides a person (a "data subject" whose privacy has been infringed upon with the right to institute a civil action against the responsible party. POPI defines the responsible party as the person who determines the purpose of and means for the processing of the personal information of data subjects. Although POPI does not equate a responsible party to an employer, the term "responsible party" is undoubtedly a synonym for "employer" in this context. By holding an employer accountable for its employees' unlawful processing of a data subject's personal information, POPI creates a form of statutory vicarious liability. Since the defences available to an employer at common law and developed by case law differ from the statutory defences available to an employer in terms of POPI, it is necessary to compare the impact this new statute has on employers. From a risk perspective, employers must be aware of the serious implications of POPI. The question that arises is whether the Act perhaps takes matters too far. This article takes a critical look at the statutory defences available to an employer in vindication of a vicarious liability action brought by a data subject in terms of section 99(1 of POPI. It compares the defences found in section 99(2 of POPI and the common-law defences available to an employer fending off a delictual claim founded on the doctrine of vicarious liability. To support the argument that the statutory vicarious liability created by POPI is too harsh, the defences contained in section 99(2 of POPI are further analogised with those available to an employer in terms of section 60(4 of the Employment Equity Act 55 of 1998 (EEA and other
Detmer Don E
Full Text Available Abstract Background Improving health in our nation requires strengthening four major domains of the health care system: personal health management, health care delivery, public health, and health-related research. Many avoidable shortcomings in the health sector that result in poor quality are due to inaccessible data, information, and knowledge. A national health information infrastructure (NHII offers the connectivity and knowledge management essential to correct these shortcomings. Better health and a better health system are within our reach. Discussion A national health information infrastructure for the United States should address the needs of personal health management, health care delivery, public health, and research. It should also address relevant global dimensions (e.g., standards for sharing data and knowledge across national boundaries. The public and private sectors will need to collaborate to build a robust national health information infrastructure, essentially a 'paperless' health care system, for the United States. The federal government should assume leadership for assuring a national health information infrastructure as recommended by the National Committee on Vital and Health Statistics and the President's Information Technology Advisory Committee. Progress is needed in the areas of funding, incentives, standards, and continued refinement of a privacy (i.e., confidentiality and security framework to facilitate personal identification for health purposes. Particular attention should be paid to NHII leadership and change management challenges. Summary A national health information infrastructure is a necessary step for improved health in the U.S. It will require a concerted, collaborative effort by both public and private sectors. If you cannot measure it, you cannot improve it. Lord Kelvin
Stavri, P Zoë; Freeman, Donna J; Burroughs, Catherine M
This paper focuses on one dimension of personal health information seeking: perception of quality and trustworthiness of information sources. Intensive interviews were conducted using a conversational, unstructured, exploratory interview style. Interviews were conducted at 3 publicly accessible library sites in Arizona, Hawaii and Nevada. Thirty-eight non-experts were interviewed. Three separate and distinct methods used to identify credible health information resources were identified. Consumers may have strong opinions about what they mistrust; use fairly rigorous evaluation protocols; or filter information based on intuition or common sense, eye appeal or an authoritative sounding sponsor or title. Many people use a mix of rational and/or intuitive criteria to assess the health information they use.
Hoyle, Rick H
This article introduces the special issue of Journal of Personality on personality and self-regulation. The goal of the issue is to illustrate and inspire research that integrates personality and process-oriented accounts of self-regulation. The article begins by discussing the trait perspective on self-regulation--distinguishing between temperament and personality accounts--and the information-processing perspective. Three approaches to integrating these perspectives are then presented. These range from methodological approaches, in which constructs representing the two perspectives are examined in integrated statistical models, to conceptual approaches, in which the two perspectives are unified in a holistic theoretical model of self-regulation. The article concludes with an overview of the special issue contributions, which are organized in four sections: broad, integrative models of personality and self-regulation; models that examine the developmental origins of self-regulation and self-regulatory styles; focused programs of research that concern specific aspects or applications of self-regulation; and strategies for increasing the efficiency and effectiveness of self-regulation.
Glachant, J.M.; Kimman, R.; Schweickardt, H.E.
This document brings together 18 testimonies of experts about energy trading: 1 - the energy trading experience on European deregulated markets: structure of deregulated energy markets in Europe, case study: a two years experience of a power exchange in western Europe, case study: European energy exchanges (experience of spot and future trading), case study: risk management on energy deregulated markets; 2 - the trading activity environment and realities in France: the French electrical law and the purchase for resale, experience feedback: status after 3 months of trading in France (the first experience of a French producer), the access to the power transportation network, which legal constraints for trading in France, the access of eligible clients to the French power market, conditions of implementation of a power exchange market in France, which real trading possibilities in France for producers and self-producers in the legal frame, case study: the role of trading in the company (main part or link to process), convergence of gas and electricity markets, gas-electricity trading: which pricing models; 3 - risk management and use of new technologies potentiality, the results outside the French borders: case study: what differences between the European and US markets, prices volatility and commodity risk management: towards the on-line trading, role and developments of E-business in energy trading, how to simplify trade in a liberalized market. (J.S.)
Cooper, Luke D; Balsis, Steve; Oltmanns, Thomas F
Because narcissistic individuals tend to have an inflated view of themselves and their abilities, the reliance on self-reported information in the assessment and diagnosis of narcissistic personality disorder (NPD) is problematic. Hence, the use of informants in the assessment of NPD may be necessary. In the current study we examined self- and informant-reported features of NPD using agreement, frequency, and discrepancy analyses. The results indicated that informants tended to report more NPD features than selves, and that there were either low or nonsignificant levels of self-informant agreement among the 9 NPD diagnostic criteria and its categorical diagnosis. Informants were increasingly more likely to report higher raw scores relative to selves, indicating that the discrepancy between self- and informant reports increases with the NPD scale. Informants also reported NPD features that selves often did not, suggesting that current prevalence estimates of NPD, which use only self-reported information, are most likely underestimates. These results highlight the importance of gathering informant-reported data in addition to self-reported data when assessing NPD. (PsycINFO Database Record (c) 2013 APA, all rights reserved).
Petric (Iancu Ioana Ancuta
Full Text Available In terms of marketing, online trading is a new distribution channel and trading platforms are products of Investment and Financial Services Companies. Internet shortens the connection between the investor and the products they wish to purchase (shares, futures, CFDs, government securities, bonds, etc., and in some cases it no longer needs a security broker. Increasing use of the Internet and increasing competitiveness between Investment and Financial Services Companies do the latter, to seek new distribution channels to specific products. The purpose of this paper is to examine to what extent the investor education level affects the decision to move from traditional trading to online trading and the benefits and disadvantages of these types of transactions. To whom should the Investment and Financial Services Companies guide their marketing campaign to attract more investors for online platforms? The work presented is part of a larger project that will be part of author thesis, studying other factors that influence the decision to move from traditional to online trading: cost factor, time factor, psychological and social attributes of investors, yield portfolios and technological capacities of Investment and Financial Services Companies. Starting from the idea that with the increase of experience in stock investments the investors will want to make their own decisions, Investment and Financial Services Companies should provide new products. Compared to competitors, an Investment and Financial Services Company must innovate, and information technology currently offers the tools for innovation facilities. At the same time, the existence and development of the Internet has made the transaction without assistance or with minimal human intervention possible (Voss, 2000. The difference is in the knowledge about stock market, the speed the transaction orders arrive in the stock market, direct access to multiple markets, transaction costs and the level
Asri, S. A.; Sunaya, I. G. A. M.; Rudiastari, E.; Setiawan, W.
Job training is one of the subjects in university or polytechnic that involves many users and reporting activities. Time and distance became problems for users to reporting and to do obligations tasks during job training due to the location where the job training took place. This research tried to develop a web based information system of job training to overcome the problems. This system was developed using Personal Extreme Programming (PXP). PXP is one of the agile methods is combination of Extreme Programming (XP) and Personal Software Process (PSP). The information system that has developed and tested which are 24% of users are strongly agree, 74% are agree, 1% disagree and 0% strongly disagree about system functionality.
Lieberman, Lynne; Liu, Huiting; Huggins, Ashley A; Katz, Andrea C; Zvolensky, Michael J; Shankman, Stewart A
Personality traits relate to risk for psychopathology and can inform predictions about treatment outcome. In an effort to obtain a comprehensive index of personality, informant reports of personality are sometimes obtained in addition to self-reports of personality. However, there is limited research comparing the validity of self- and informant reports of personality, particularly among those with internalizing psychopathology. This is important given that informants may provide an additional (and perhaps different) perspective on individuals' personality. The present study therefore compared how both reports of positive affectivity (PA) and negative affectivity (NA) relate to psychophysiological and subjective measures of emotional responding to positive and negative stimuli. Given that our sample (n = 117) included individuals with no history of psychopathology, as well as individuals with major depressive disorder (MDD) and/or panic disorder (PD), we were also able to explore whether these internalizing diagnoses moderated the association between personality reports and measures of emotional responding. Informant-reported PA predicted physiological responses to positive stimuli (but not negative). Informant-reported NA predicted physiological responses to negative stimuli (but not positive). Self-reported personality did not predict physiological responding, but did predict subjectively measured emotional responding (NA for negative responding, PA for positive responding). Diagnoses of internalizing psychopathology (PD or MDD) did not moderate these associations. Results suggest self- and informant reports of personality may each provide valid indices of an individual's emotional response tendencies, but predict different aspects of those tendencies. © 2016 Society for Psychophysiological Research.
Lieberman, Lynne; Liu, Huiting; Huggins, Ashley A.; Katz, Andrea C.; Zvolensky, Michael J.; Shankman, Stewart A.
Personality traits relate to risk for psychopathology and can inform predictions about treatment outcome. In an effort to obtain a comprehensive index of personality, informant-reports of personality are sometimes obtained in addition to self-reports of personality. However, there is limited research comparing the validity of self- and informant-reports of personality, particularly among those with internalizing psychopathology. This is important given that informants may provide an additional (and perhaps different) perspective on individuals’ personality. The present study therefore compared how both reports of positive affectivity (PA) and negative affectivity (NA) relate to psychophysiological and subjective measures of emotional responding to positive and negative stimuli. Given that our sample (n = 117) included individuals with no history of psychopathology, as well as individuals with major depressive disorder (MDD) and/or panic disorder (PD), we were also able to explore whether these internalizing diagnoses moderated the association between personality reports and measures of emotional responding. Informant-reported PA predicted physiological responses to positive stimuli (but not negative). Informant reported NA predicted physiological responses to negative stimuli (but not positive). Self-reported personality did not predict physiological responding, but did predict subjectively measured emotional responding (NA for negative responding; PA for positive responding). Diagnoses of internalizing psychopathology (PD or MDD) did not moderate these associations. Results suggest self- and informant-reports of personality may each provide valid indices of an individual’s emotional response tendencies, but predict different aspects of those tendencies. PMID:27273802
Brown, Sherry-Ann; Jouni, Hayan; Marroush, Tariq S; Kullo, Iftikhar J
Incorporating genetic risk information in electronic health records (EHRs) will facilitate implementation of genomic medicine in clinical practice. However, little is known about patients' attitudes toward incorporation of genetic risk information as a component of personal health information in EHRs. This study investigated whether disclosure of a genetic risk score (GRS) for coronary heart disease influences attitudes toward incorporation of personal health information including genetic risk in EHRs. Participants aged 45-65 years with intermediate 10-year coronary heart disease risk were randomized to receive a conventional risk score (CRS) alone or with a GRS from a genetic counselor, followed by shared decision making with a physician using the same standard presentation and information templates for all study participants. The CRS and GRS were then incorporated into the EHR and made accessible to both patients and physicians. Baseline and post-disclosure surveys were completed to assess whether attitudes differed by GRS disclosure. Data were collected from 2013 to 2015 and analyzed in 2015-2016. GRS and CRS participants reported similar positive attitudes toward incorporation of genetic risk information in the EHR. Compared with CRS participants, participants with high GRS were more concerned about the confidentiality of genetic risk information (OR=3.67, 95% CI=1.29, 12.32, p=0.01). Post-disclosure, frequency of patient portal access was associated with positive attitudes. Participants in this study of coronary heart disease risk disclosure overall had positive attitudes toward incorporation of genetic risk information in EHRs, although those who received genetic risk information had concerns about confidentiality. Copyright © 2016 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.
Bunnik, Eline M; Janssens, A Cecile J W; Schermer, Maartje H N
Broad genome-wide testing is increasingly finding its way to the public through the online direct-to-consumer marketing of so-called personal genome tests. Personal genome tests estimate genetic susceptibilities to multiple diseases and other phenotypic traits simultaneously. Providers commonly make use of Terms of Service agreements rather than informed consent procedures. However, to protect consumers from the potential physical, psychological and social harms associated with personal genome testing and to promote autonomous decision-making with regard to the testing offer, we argue that current practices of information provision are insufficient and that there is a place--and a need--for informed consent in personal genome testing, also when it is offered commercially. The increasing quantity, complexity and diversity of most testing offers, however, pose challenges for information provision and informed consent. Both specific and generic models for informed consent fail to meet its moral aims when applied to personal genome testing. Consumers should be enabled to know the limitations, risks and implications of personal genome testing and should be given control over the genetic information they do or do not wish to obtain. We present the outline of a new model for informed consent which can meet both the norm of providing sufficient information and the norm of providing understandable information. The model can be used for personal genome testing, but will also be applicable to other, future forms of broad genetic testing or screening in commercial and clinical settings. © 2012 John Wiley & Sons Ltd.
Deng, Shengli; Lin, Yanqing; Liu, Yong; Chen, Xiaoyu; Li, Hongxiu
Introduction: Personality and trust have been found to be important precursors of information-sharing behaviour, but little is known about how these factors interact with each other in shaping information-sharing behaviour. By integrating both trust and user personality into a unified research framework, this study examines how trust mediates the…
Imparting bad news had always been an unpleasant task for the physician, as shown from ancient years to our days. In the healthcare sector and as far as the cancer patient is concerned, the imparting of bad news is performed by the patient's doctor within a therapeutic relationship of course. The fundamental question is how a therapist could tailor the information to any patient and if "Is it possible to determine who should be told what, when and how ?". The aim of this paper was to describe the suspicious character or type of personality thoroughly so that any physician can make a diagnosis and tailor the information strategy to the patient's needs. As method of research was used the qualitative method through groups with doctors and nurses, while research within groups lasted for 5 years. The degree of informing of the suspicious personality in the range "minimal - small - medium - large - very large" is : the degree of denial varies between large and very large. The degree of informing varies between medium and small and sometimes minimal. Informing the Family: The hardest family to deal with. Pay attention to litigious mania. Avoid confrontation or be drawn into agreeing with the family views.
Nelson, Maria J; Deiorio, Nicole M; Schmidt, Terri A; Zive, Dana M; Griffiths, Denise; Newgard, Craig D
We sought to characterize persons who requested to opt out of an exception from informed consent (EFIC) cardiac arrest trial and their reasons for opting out. At one site of a multi-site, out-of-hospital, cardiac arrest EFIC trial (September 2007 - June 2009), persons who did not want to participate in the study could request an opt-out "NO STUDY" bracelet to prevent trial enrollment. We surveyed all persons who requested a bracelet by phone interview, web or mail. Opt-out bracelets were advertised in all public communication about the study, including community consultation and public disclosure efforts. Survey questions included demographics, Likert scale items about attitudes toward the trial and research in general, plus open-ended questions. We used descriptive statistics for standardized questions and qualitative analysis to identify common themes from open-ended questions. Sixty bracelets were requested by 50 individuals. Surveys were completed by 46 persons (92% response rate). Seventy percent of respondents agreed emergency research is important, but 87% objected to any research without consent. In the qualitative analysis, 5 overlapping themes emerged: questioning the ethics of EFIC research; concerns about how the study would impact end-of-life preferences; subjective emotions including sarcasm, anger, and allusions to past unethical research; negative reference to unrelated public health controversies; and objections to the study protocol based on misinformation. A primary reason for opting out from this EFIC trial was opposition to all research without informed consent, despite stated support for emergency research. Understanding the demographics and beliefs of persons opting out may aid researchers planning EFIC studies and help provide clarity in future EFIC-related community education efforts. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
This article addresses the ethical requirements to be considered when conducting clinical trials involving human subjects whose mental condition limits their ability to understand the information and to express fully autonomous and informed consent. It does not address other categories of vulnerable persons, such as children, or advanced directives concerning end-of-life care. There are many ethical issues entailed in clinical trials involving subjects with mental disabilities: how to obtain informed consent, balancing risks and benefits, balancing individual benefits with collective scientific and social interests, legal representation and many more. This article focuses on the issues surrounding the concept of minimal risk and the relationship between informed consent and risk. These issues are addressed with particular emphasis on the regulations adopted by the European Union and the federal government of the United States of America. The conclusion proposes a list of working criteria.
Wang, Fenghua; Han, Jiuqiang
Information fusion in biometrics has received considerable attention. This paper focuses on the application of information fusion techniques in iris recognition. To improve the reliability and accuracy of personal identification based on the iris pattern, this paper proposes the schemes of multialgorithmic fusion and multiinstance fusion. Multialgorithmic fusion integrates the improved phase algorithm and the DCT-based algorithm, and multiinstance fusion combines information from the left iris and the right iris of an individual. Both multialgorithmic fusion and multiinstance fusion are carried out at the matching score level and the support vector machine (SVM)-based fusion rule is utilized to generate fused scores for final decision. The experimental results on the noisy iris database UBIRIS demonstrate that the proposed fusion schemes can perform better than the single recognition systems, and further prove that information fusion techniques are feasible and effective to improve the accuracy and robustness of iris recognition especially under noisy conditions
Full Text Available This article addresses the ethical requirements to be considered when conducting clinical trials involving human subjects whose mental condition limits their ability to understand the information and to express fully autonomous and informed consent. It does not address other categories of vulnerable persons, such as children, or advanced directives concerning end-of-life care. There are many ethical issues entailed in clinical trials involving subjects with mental disabilities: how to obtain informed consent, balancing risks and benefits, balancing individual benefits with collective scientific and social interests, legal representation and many more. This article focuses on the issues surrounding the concept of minimal risk and the relationship between informed consent and risk. These issues are addressed with particular emphasis on the regulations adopted by the European Union and the federal government of the United States of America. The conclusion proposes a list of working criteria.
Cochran, Gary L; Lander, Lina; Morien, Marsha; Lomelin, Daniel E; Brittin, Jeri; Reker, Celeste; Klepser, Donald G
Consumer satisfaction is a crucial component of health information technology (HIT) utilization, as high satisfaction is expected to increase HIT utilization among providers and to allow consumers to become full participants in their own healthcare management. The primary objective of this pilot study was to identify consumer perspectives on health information technologies including health information exchange (HIE), e-prescribing (e-Rx), and personal health records (PHRs). Eight focus groups were conducted in seven towns and cities across Nebraska in 2013. Each group consisted of 10-12 participants. Discussions were organized topically in the following categories: HIE, e-Rx, and PHR. The qualitative analysis consisted of immersion and crystallization to develop a coding scheme that included both preconceived and emergent themes. Common themes across focus groups were identified and compiled for each discussion category. The study had 67 participants, of which 18 (27 percent) were male. Focus group findings revealed both perceived barriers and benefits to the adoption of HIT. Common HIT concerns expressed across focus groups included privacy and security of medical information, decreases in quality of care, inconsistent provider participation, and the potential cost of implementation. Positive expectations regarding HIT included better accuracy and completeness of information, and improved communication and coordination between healthcare providers. Improvements in patient care were expected as a result of easy physician access to consolidated information across providers as well as the speed of sharing and availability of information in an emergency. In addition, participants were optimistic about patient empowerment and convenient access to and control of personal health data. Consumer concerns focused on privacy and security of the health information, as well as the cost of implementing the technologies and the possibility of an unintended negative impact on the
Apprenticeship plays a key role in the preparation of skilled trades people and as a pathway into labour markets. In the face of scarcity of resources, effectiveness and efficiency of apprenticeship become important. Attrition and retention in apprenticeship constitute important indicators of efficiency and effectiveness of the training system and…
This study, conducted by Black and Veatch, was funded by the U.S. Trade and Development Agency. The report presents a technical and commercial analysis for the development of three nearly identical electricity generating facilities (biomass steam power plants) in the towns of Chachgoengsao, Suphan Buri, and Pichit in Thailand. Volume 2 of the study contains the following appendix: Detailed Financial Analysis Results
Khabbazan, Mohammad Mohammadi; Roshan, Elnaz; Held, Hermann
In principle solar radiation management (SRM) offers an option to ameliorate anthropogenic temperature rise. However we cannot expect it to simultaneously compensate for anthropogenic changes in further climate variables in a perfect manner. Here, we ask to what extent a proponent of the 2°C-temperature target would apply SRM in conjunction with mitigation in view of global or regional disparities in precipitation changes. We apply cost-risk analysis (CRA), which is a decision analytic framework that makes a trade-off between the expected welfare-loss from climate policy costs and the climate risks from transgressing a climate target. Here, in both global-scale and 'Giorgi'-regional-scale analyses, we evaluate the optimal mixture of SRM and mitigation under probabilistic information about climate sensitivity. To do so, we generalize CRA for the sake of including not only temperature risk, but also globally aggregated and regionally disaggregated precipitation risks. Social welfare is maximized for the following three valuation scenarios: temperature-risk-only, precipitation-risk-only, and equally weighted both-risks. For now, the Giorgi regions are treated by equal weight. We find that for regionally differentiated precipitation targets, the usage of SRM will be comparably more restricted. In the course of time, a cooling of up to 1.3°C can be attributed to SRM for the latter scenario and for a median climate sensitivity of 3°C (for a global target only, this number reduces by 0.5°C). Our results indicate that although SRM would almost completely substitute for mitigation in the globally aggregated analysis, it only saves 70% to 75% of the welfare-loss compared to a purely mitigation-based analysis (from economic costs and climate risks, approximately 4% in terms of BGE) when considering regional precipitation risks in precipitation-risk-only and both-risks scenarios. It remains to be shown how the inclusion of further risks or different regional weights would
... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... Environmental Technologies Trade Advisory Committee (ETTAC). SUMMARY: This notice sets forth a request for... serve on the Environmental Technologies Trade Advisory Committee (ETTAC). One person will be appointed...
Full Text Available The purpose of the article is to analysis of employee system incentive hotel there be source of information for personal controlling. New incentive system fitted look to suggest for notes entered by employee. It pay attention in article, that there is sole form of motivating of forceful employee proprietary form financial motivator. Proper system of motivation effects boost of efficiency of staff aiming at achievement in firm purposes indicated appointee. Besides, it shows revolt of working group about miscellaneous features, requirements, engagement, skilful management leads achievement of fairest effect of work which. We understand control result of taken personal decision through definition personal controlling, structures of employment, system of remuneration, motivation systems, utilization of active time of employee and cost of work. Among others, counteraction belongs to tasks in sphere of management in taking up of erroneous decision human resources controlling, high cost of employment have, helping with fitting human resources for real requirements of firms and through suitable utilization of potential work stimulation. There is in firm personal wanted controlling in order to it were of limited activity of professional employee for forward taking reward only.
Preparing enterprises in Baden-Wuerttemberg for emission trading: determining their need for information, consulting services and training.; Vorbereitung baden-wuerttembergischer Unternehmen auf den Emissionsrechtehandel: Ermittlung von Informations-, Beratungs- und Schulungsbedarf
Schleich, J.; Betz, R.; Kaeser, S.
In order to achieve the climate-related objectives of the Kyoto Protocol in the most profitable way, the EU Parliament and the Ministers' Council have decided on a regulation which obligates the operators of certain CO2-intensive systems to participate in the emission trading (Published in the Union's official gazette of 25 October 2003: Regulation 2003/87/EG OF THE EUROPEAN PARLIAMENT AND THE COUNCIL dt. 13 October 2003 on a system for the trade with greenhouse emission certificates in the Union and for the amendment of the regulation 96/61/EG of the Council). Starting in 2005, this includes the operators of certain systems like larger power and heat generation plants, refineries and coking plants, production plants of the iron and steel industry, cement, glass and ceramics industries and the cellulose and paper industry. To the German environmental politics, the European system of emission trading means a change in the paradigms, bringing new strategical and organisatory challenges for the enterprises involved. In order to complete lacking information regarding the approaching trading with emission rights, the first thing to do is to identify Baden-Wuerttemberg's enterprises' needs for information, consulting services and training. This should be the basis for the development of a draft concept for the need for information, consulting services and training.
Alvarez-Bermejo, J A; Hernández-Capel, D M; Belmonte-Ureña, L J; Roca-Piera, J
Ensuring the quality of services provided in centres where dependent persons are seen by specialist services, by improving and enhancing how information -salary, control of tasks, patients' records, etc.- is shared between staff and carers. A web information system has been developed and experimentally deployed to accomplish this. The accuracy of the system was evaluated by assessing how confident the employees were with it rather than relying on statistical data. It was experimentally deployed since January 2009 in Asociación de Personas con Discapacidad "El Saliente" that manages several day centres in Almeria, for dependent persons over 65 years old, particularly those affected by Alzheimer' disease. Incidence data was collected during the experimental period. A total of 84% of the employees thought that the system helped to manage documents, administrative duties, etc., and 92.4% said they could attend to really important tasks because the system was responsible for alerting them of every task, such as medication timetables, checking all patients were present (to prevent an Alzheimer affected person leaving the centre) etc. During this period the incidences reported were reduced by about a 30%, although data is still partially representative. As the life expectancy of the population gets longer, these centres will increase. Providing systems such as the one presented here would be of great help for administrative duties (sensitive data protection...) as well as ensuring high quality care and attention.
Full Text Available The Internet is the perfect tool that can assure the market’s transparency for any user who wants to trade on the stock market. The investor can have access to the market news, financial calendar or the press releases of the issuers. A good online trading platform also provides real-time intraday quotes, trading history and technical analysis giving the investor a clearer view of the supply and demand in the market. All this information provides the investor a good image of the market and encourages him to trade. This paper wishes to draft the pieces of an online trading platform and to analyze the impact of developing and implementing one in a brokerage firm.
Silva, Maria Celina Soares de Mello E; Trancoso, Márcia Cristina Duarte
This article addresses the study of document typology in the personal archives of scientists and its importance in the history of science studies and for the archivist's work. A brief history is presented of diplomatic to typological information, emphasizing that identifying document production activity as essential for its classification. The article illustrates personal archive characteristics as regards the diversity of documental types and, in particular, those belonging to physicists. Furthermore, it presents five examples of documental types found in the archives of physicists as examples of research in progress. It also highlights the elaboration of a glossary of different documental kinds and types found in the private archives of Museum of Astronomy and Related Sciences in Rio de Janeiro.
Full Text Available Although research demonstrates that emotional experiences can influence cognitive processing, little is known about individual differences in this association, particularly in youth. The present study examined how the emotional backdrop of the caregiving environment, as reflected in exposure to maternal depression and anxiety, was linked to biases in youths’ cognitive processing of mother-referent information. Further, we investigated whether this association differed according to variation in youths’ emotional reactivity to stress. Youth (50 boys, 46 girls; M age = 12.36, SD = 1.05 completed a behavioral task assessing cognitive bias. Semi-structured interviews were administered to assess (a youths’ emotional reactivity to naturally occurring stressors, and (b maternal depression and anxiety. Hierarchical multiple regression analyses revealed that emotional reactivity to interpersonal stressors moderated the linkage between maternal depression and cognitive bias such that maternal depression predicted a greater negative bias in youth exhibiting high and average, but not low, levels of emotional reactivity. At low levels of maternal depression, youth with heightened interpersonal emotional reactivity showed a greater positive cognitive bias. This pattern of effects was specific to interpersonal (but not noninterpersonal emotional reactivity and to maternal depression (but not anxiety. These findings illuminate one personal characteristic of youth that moderates emotion-cognition linkages, and reveal that emotional reactivity both enhances and impairs youths’ cognitive processing as a function of socialization context.
Sinn, Chi-Ling Joanna; Jones, Aaron; McMullan, Janet Legge; Ackerman, Nancy; Curtin-Telegdi, Nancy; Eckel, Leslie; Hirdes, John P
Personal support services enable many individuals to stay in their homes, but there are no standard ways to classify need for functional support in home and community care settings. The goal of this project was to develop an evidence-based clinical tool to inform service planning while allowing for flexibility in care coordinator judgment in response to patient and family circumstances. The sample included 128,169 Ontario home care patients assessed in 2013 and 25,800 Ontario community support clients assessed between 2014 and 2016. Independent variables were drawn from the Resident Assessment Instrument-Home Care and interRAI Community Health Assessment that are standardised, comprehensive, and fully compatible clinical assessments. Clinical expertise and regression analyses identified candidate variables that were entered into decision tree models. The primary dependent variable was the weekly hours of personal support calculated based on the record of billed services. The Personal Support Algorithm classified need for personal support into six groups with a 32-fold difference in average billed hours of personal support services between the highest and lowest group. The algorithm explained 30.8% of the variability in billed personal support services. Care coordinators and managers reported that the guidelines based on the algorithm classification were consistent with their clinical judgment and current practice. The Personal Support Algorithm provides a structured yet flexible decision-support framework that may facilitate a more transparent and equitable approach to the allocation of personal support services.
Chi-Ling Joanna Sinn
Full Text Available Abstract Background Personal support services enable many individuals to stay in their homes, but there are no standard ways to classify need for functional support in home and community care settings. The goal of this project was to develop an evidence-based clinical tool to inform service planning while allowing for flexibility in care coordinator judgment in response to patient and family circumstances. Methods The sample included 128,169 Ontario home care patients assessed in 2013 and 25,800 Ontario community support clients assessed between 2014 and 2016. Independent variables were drawn from the Resident Assessment Instrument-Home Care and interRAI Community Health Assessment that are standardised, comprehensive, and fully compatible clinical assessments. Clinical expertise and regression analyses identified candidate variables that were entered into decision tree models. The primary dependent variable was the weekly hours of personal support calculated based on the record of billed services. Results The Personal Support Algorithm classified need for personal support into six groups with a 32-fold difference in average billed hours of personal support services between the highest and lowest group. The algorithm explained 30.8% of the variability in billed personal support services. Care coordinators and managers reported that the guidelines based on the algorithm classification were consistent with their clinical judgment and current practice. Conclusions The Personal Support Algorithm provides a structured yet flexible decision-support framework that may facilitate a more transparent and equitable approach to the allocation of personal support services.
Beckmann, K.; Schroeter, S.
Two brief articles and two interviews deal with the subject of energy trading. Power and gas exchanges in Europe multiply, but, experts say, we are nowhere near a mature, integrated European energy market as yet. Trading regulations need to be improved and harmonised and interconnections expanded. European Energy Review assesses the state of energy trading in Europe and interviews the ceo's of NordPool (the Nordic power exchange) and APX (Amsterdam Power Exchange)
Automated trading in electronic markets is one of the most common and consequential applications of autonomous software agents. Design of effective trading strategies requires thorough understanding of how market mechanisms operate, and appreciation of strategic issues that commonly manifest in trading scenarios. Drawing on research in auction theory and artificial intelligence, this book presents core principles of strategic reasoning that apply to market situations. The author illustrates trading strategy choices through examples of concrete market environments, such as eBay, as well as abst
Under rather general conditions Black - Scholes implied volatilities from at-the-money options appropriately quantify, in each period, the market expectations of the average volatility of the return of the underlying asset until contract expiration. The efficiency of these expectation estimates is investigated here, for options on two major short term interest rate futures contracts traded at the LIFFE, using a long memory framework. Over the 1993 – 1997 time interval the performance of im...
Duggan, Conor; Mason, Lauren; Banerjee, Penny; Milton, John
Assessing those with personality disorder for treatment in secure settings is known to be unsatisfactory. To examine the utility of a standardised assessment of offenders with personality disorder referred for treatment in secure care in a naturalistic study. A consecutive series of 89 men were assessed with a battery of four recommended instruments measuring personality and risk. Decisions on whether or not to admit were based on a multidisciplinary discussion informed by these assessments. Of the 89 comprehensively assessed referrals, 60 (67%) were offered admission. High scores on the Psychopathy Checklist-Revised (especially on Factor 1) was the only measure that was associated with rejection. Of 44 patients discharged, 29 (66%) failed to complete treatment; none of the pre-admission assessments distinguished ;completers' from ;non-completers'. Although skills were acquired on the unit, follow-up of 24 men in the community showed that this had only a marginal effect on re-offending rate (58%). Current recommended assessment methods appear unsatisfactory in identifying those who either (a) complete treatment or (b) benefit from treatment. Our results throw doubt on their value.
Fearon, C.; Nachmias, S.; McLaughlin, H.; Jackson, S.
This study investigates the role of personal values as motivational antecedents for understanding HE student career decidedness among university business school (UBS) students. We propose a new ‘protean’ informed HE student career decidedness model for theorizing how both personal values and social capital mediators (student social capital; personal, social and enterprise skills; access to resources) help in the student-centric and self-directed processes of career decision-making. A mixed me...
This manual provides basic information on all aspects of oil trading. Topics reviewed in Part 1 include physical characteristics and refining and oil pricing arrangements. Part 2 on instruments and markets contains chapters on crude oil markets, product markets, forward and futures contracts, forward paper markets, oil future exchanges, options, swaps and long term oil markets. Part 3 deals with administration and has chapters on operations and logistics, credit control, accounting, taxation of oil trading, contracts and legal and regulatory issues. (UK)
This chapter reports on the concepts of information privacy and trust in government among citizens in Japan and New Zealand in a transnational, crosscultural study. Data from both countries are presented, and cultural and other factors are sought that might explain differences in attitudes shown. In both countries, citizens display a range of views, not related to age or gender. New Zealand citizens express concern about information privacy in relation to information held by government, but show a higher level of trust in government overall, and most attribute breaches of privacy to incompetence, rather than deliberate malfeasance. Japanese citizens interviewed also indicated that they had major concerns about information privacy, and had considerably less trust in government than New Zealand respondents showed. They were more inclined to attribute breaches of privacy to lax behavior in individuals than government systems. In both countries citizens showed an awareness of the tradeoffs necessary between personal privacy and the needs of the state to hold information for the benefit of all citizens, but knew little about the protection offered by privacy legislation, and expressed overall concern about privacy practices in the modern state. The study also provides evidence of cultural differences that can be related to Hofstede's dimensions of culture.
Aeba, Yoichi; Ishikawa, Michio; Enomoto, Toshiaki; Oomori, Katsuyoshi
Falsifications of self-inspection records in the shrouds and of leakage rates for containment vessels at TEPCO nuclear power plants destroyed public trust in nuclear safety. The Nuclear Reactor Regulation Law and Electric Utility Law were amended to enhance the nuclear safety regulation system. The major improvements are that operators are legally required to conduct inspection (periodical operator inspection) and recording and keeping inspection results. The operator performs 'periodical operator inspection' regularly, and Nuclear and Industrial Safety Agency (NISA) performs periodical inspection' about particularly important facilities/function in safety. Sixteen opinions of well-informed persons about the nuclear reactor facility periodical inspection were presented in this special number. Interval of periodical inspection less than thirteen months was disputed. Maintenance activities should be more rationalized based on risk information. (T. Tanaka)
Woerdman, Edwin; Backhaus, Juergen
Emissions trading is a market-based instrument to achieve environmental targets in a cost-effective way by allowing legal entities to buy and sell emission rights. The current international dissemination and intended linking of emissions trading schemes underlines the growing relevance of this
J.A.E. Ambagtsheer (Frederike)
markdownabstractOrgan trade constitutes the sale and purchase of organs for financial or material gain. Although prohibited since the 1980s, an increasing number of reports indicate its proliferation across the globe. Yet, many knowledge gaps exist on organ trade, in particular on the demand -and
Drachsler, Hendrik; Pecceu, Dries; Arts, Tanja; Hutten, Edwin; Rutledge, Lloyd; Van Rosmalen, Peter; Hummel, Hans; Koper, Rob
Drachsler, H., Peccau, D., Arts, T., Hutten, E., Rutledge, L., Van Rosmalen, P., Hummel, H. G. K., & Koper, R. (2009). ReMashed – Recommendation Approaches for Mash-Up Personal Learning Environments in Formal and Informal Learning Settings. Presentation at the 2nd Workshop Mash-Up Personal Learning
De Pauw, Sarah S. W.; Mervielde, Ivan; De Clercq, Barbara J.; De Fruyt, Filip; Tremmery, Sabine; Deboutte, Dirk
Research on adulthood posits personality and self-esteem as important predictors of psychopathology. In childhood, however, the study of these relationships is complicated by the lack of consensus on how to combine data from multiple informants of child behavior. This study evaluates the relationships among personality symptoms, self-esteem and…
Full Text Available To log in to a mobile social network service (SNS server, users must enter their ID and password to get through the authentication process. At that time, if the user sets up the automatic login option on the app, a sort of security token is created on the server based on the user’s ID and password. This security token is called a credential. Because such credentials are convenient for users, they are utilized by most mobile SNS apps. However, the current state of credential management for the majority of Android SNS apps is very weak. This paper demonstrates the possibility of a credential cloning attack. Such attacks occur when an attacker extracts the credential from the victim’s smart device and inserts it into their own smart device. Then, without knowing the victim’s ID and password, the attacker can access the victim’s account. This type of attack gives access to various pieces of personal information without authorization. Thus, in this paper, we analyze the vulnerabilities of the main Android-based SNS apps to credential cloning attacks, and examine the potential leakage of personal information that may result. We then introduce effective countermeasures to resolve these problems.
Although much as been written about information technologies and politics, less is known about how information is handled in congressional personal offices. What happens when a constituent sends an email to their Congressman? How does a Senator get information about the pros and cons of a proposed bill? A study was conducted to understand the…
Kroes, Gert; Veerman, Jan W.; De Bruyn, Eric E.J.
The present study compared ratings of a standardized sample of child behavior problems across informants and examined the effects of informant personality traits on child behavior ratings by mothers, teachers, and group-care workers. Participants were 55 clinic-referred children, aged 6-12 years. All informants watched and rated the same 17-min…
Håkanson, Lars; Dow, Douglas
is associated with a shift in the composition of trade towards goods requiring more extensive information exchange and personal interaction between buyers and sellers. An alternative explanation—‘the market view’—contends that improved availability of information and increasing transparency of markets have...... facilitated the matching of geographically more proximate buyers and sellers, and that the observed decline in average transportation distances is a reflection of increasingly efficient markets. This paper examines empirically the merits of these two arguments based on a longitudinal analysis of bilateral...... in support of the ‘market-view’, showing that the sensitivity of trade to psychic distance has declined dramatically for all categories of goods. The impact of geographic distance has increased markedly for homogenous goods, whereas for more differentiated goods it has decreased mildly....
This study, conducted by the California Energy Commission, was funded by the U.S. Trade and Development Agency. The report focuses on energy efficiency and conservation measures at the Jabatan Kerja Raya (JKR) Complex in Malaysia for Tenaga Nasional Berhad (TNB). The study is divided into the following contents: Preface; (1.0) Executive Summary; (2.0) Facility Background and Site Information; (3.0) Site Energy Use; (4.0) Energy Using Systems; (5.0) On-Site Electricity and Energy Generation; (6.0) Technical Project Summary; Figures, Tables, and Appendices.
This study, conducted by the California Energy Commission, was funded by the U.S. Trade and Development Agency. The report focuses on energy efficiency and conservation measures at the Institut Teknologi Mara (ITM) Complex for Tenaga Nasional Berhad in Malaysia. The study is divided into the following sections: Preface; (1.0) Executive Summary; (2.0) Facility Background and Site Information; (3.0) Site Energy Use; (4.0) Energy Using Systems; (5.0) On-Site Electricity and Energy Generation; (6.0) Technical Project Summary; Figures, Tables, Appendices.
Hartzler, Andrea; Skeels, Meredith M; Mukai, Marlee; Powell, Christopher; Klasnja, Predrag; Pratt, Wanda
When patients share personal health information with family and friends, their social networks become better equipped to help them through serious health situations. Thus, patients need tools that enable granular control over what personal health information is shared and with whom within social networks. Yet, we know little about how well such tools support patients' complex sharing needs. We report on a lab study in which we examined the transparency of sharing interfaces that display an overview and details of information sharing with network connections in an internet-based personal health information management tool called HealthWeaver. Although participants found the interfaces easy to use and were highly confident in their interpretation of the sharing controls, several participants made errors in determining what information was shared with whom. Our findings point to the critical importance of future work that examines design of usable interfaces that offer transparent granularity in support of patients' complex information sharing practices.
Full Text Available Previous research has suggested that patients meeting criteria for borderline personality disorder (BPD display altered self-related information processing. However, experimental studies on dysfunctional self-referential information processing in BPD are rare. In this study, BPD patients (N = 30 and healthy control participants (N = 30 judged positive, neutral, and negative words in terms of emotional valence. Referential processing was manipulated by a preceding self-referential pronoun, an other-referential pronoun, or no referential context. Subsequently, patients and participants completed a free recall and recognition task. BPD patients judged positive and neutral words as more negative than healthy control participants when the words had self-reference or no reference. In BPD patients, these biases were significantly correlated with self-reported attributional style, particularly for negative events, but unrelated to measures of depressive mood. However, BPD patients did not differ from healthy control participants in a subsequent free recall task and a recognition task. Our findings point to a negative evaluation bias for positive, self-referential information in BPD. This bias did not affect the storage of information in memory, but may be related to self-attributions of negative events in everyday life in BPD.
Abdelhamid, Mohamed; Gaia, Joana; Sanders, G Lawrence
Health care providers are driven by greater participation and systemic cost savings irrespective of benefits to individual patients derived from sharing Personal Health Information (PHI). Protecting PHI is a critical issue in the sharing of health care information systems; yet, there is very little literature examining the topic of sharing PHI electronically. A good overview of the regulatory, privacy, and societal barriers to sharing PHI can be found in the 2009 Health Information Technology for Economic and Clinical Health Act. This study investigated the factors that influence individuals' intentions to share their PHI electronically with health care providers, creating an understanding of how we can represent a patient's interests more accurately in sharing settings, instead of treating patients like predetermined subjects. Unlike privacy concern and trust, patient activation is a stable trait that is not subject to change in the short term and, thus, is a useful factor in predicting sharing behavior. We apply the extended privacy model in the health information sharing context and adapt this model to include patient activation and issue involvement to predict individuals' intentions. This was a survey-based study with 1600+ participants using the Health Information National Trends Survey (HINTS) data to validate a model through various statistical techniques. The research method included an assessment of both the measurement and structural models with post hoc analysis. We find that privacy concern has the most influence on individuals' intentions to share. Patient activation, issue involvement, and patient-physician relationship are significant predictors of sharing intention. We contribute to theory by introducing patient activation and issue involvement as proxies for personal interest factors in the health care context. Overall, this study found that although patients are open to sharing their PHI, they still have concerns over the privacy of their PHI
... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Signature of persons unable to sign... POPULATION SCHEDULES § 80.4 Signature of persons unable to sign their name. A person requesting Census information who is unable to sign his or her name shall make an “X” mark where signature is required, and the...
Klein, O.; Maug, E.; Schneider, Christoph
We test two complementary theories of optimal trading strategies by analyzing the transaction patterns of corporate insiders. According to information-based theories, investors trade faster if they compete with others for exploiting the same information, while liquidity-based theories predict the
Grande, David; Mitra, Nandita; Shah, Anand; Wan, Fei; Asch, David A
Adoption of electronic health record systems has increased the availability of patient-level electronic health information. To examine public support for secondary uses of electronic health information under different consent arrangements. National experimental survey to examine perceptions of uses of electronic health information according to patient consent (obtained vs. not obtained), use (research vs. marketing), and framing of the findings (abstract description without results vs. specific results). Nationally representative survey. 3064 African American, Hispanic, and non-Hispanic white persons (response rate, 65%). Appropriateness of health information use described in vignettes on a scale of 1 (not at all appropriate) to 10 (very appropriate). Mean ratings ranged from a low of 3.81 for a marketing use when consent was not obtained and specific results were presented to a high of 7.06 for a research use when consent was obtained and specific results were presented. Participants rated scenarios in which consent was obtained as more appropriate than when consent was not obtained (difference, 1.01 [95% CI, 0.69 to 1.34]; Pmarketing as less appropriate than when the use was research (difference, -2.03 [CI, -2.27 to -1.78]; Pmarketing uses (5.65 vs. 4.52; difference, 1.13 [CI, 0.87 to 1.39]). Participants rated hypothetical scenarios. Results could be vulnerable to nonresponse bias despite the high response rate. Although approaches to health information sharing emphasize consent, public opinion also emphasizes purpose, which suggests a need to focus more attention on the social value of information use. National Human Genome Research Institute.
Full Text Available aims to highlight some of the major ethical and legal issues when pro-actively collecting personal information, through a South African case study, to assist in reducing the amounts of personal information being disclosed online....
De Merode, Emmanuel; Cowlishaw, Guy
Our understanding of the linkages between the bushmeat trade and the wider informal economy is limited. This lack of knowledge is particularly problematic for conservation under conditions of political instability, when the informal economy can be highly dynamic and impacts on wildlife populations can be severe. To explore these interlinked processes, we conducted a study of the bushmeat trade in Garamba National Park, Democratic Republic of Congo, through a combination of market surveys, semistructured interviews, and direct observation. We focused on the sale of protected and unprotected species in urban and rural markets, and the bushmeat commodity chains that supplied these markets, under conditions of political stability and armed conflict. During peacetime, protected species from the park (predominantly elephant and buffalo) rarely appeared in the rural markets, but they comprised more than half of all bushmeat sales in the urban markets. This pattern reflected differences in the rural and urban commodity chains. Automatic weapons were urban trade. The use of such weapons was discouraged by the traditional chiefs, who administered the village markets. During wartime, the sales of protected species in the urban markets increased fivefold because the military officers fled, leaving behind an open-access system that led to a massive increase in the exploitation of protected species. In contrast, the rural markets remained relatively stable because of the continued authority of the village chiefs. Our results indicate that sociopolitical factors can be an important determinant of species offtake and, therefore, that knowledge of the bushmeat commodity chain can be vital to controlling theprocesses that drive species extraction. In addition, our findings suggest that traditional authorities can be potentially valuable partners for bushmeat management.
Grady, Cheryl L; Grigg, Omer; Ng, Charisa
We recently found activity in default mode and reward-related regions during self-relevant tasks in young adults. Here we examine the effect of aging on engagement of the default network (DN) and reward network (RN) during these tasks. Previous studies have shown reduced engagement of the DN and reward areas in older adults, but the influence of age on these circuits during self-relevant tasks has not been examined. The tasks involved judging personality traits about one's self or a well known other person. There were no age differences in reaction time on the tasks but older adults had more positive Self and Other judgments, whereas younger adults had more negative judgments. Both groups had increased DN and RN activity during the self-relevant tasks, relative to non-self tasks, but this increase was reduced in older compared to young adults. Functional connectivity of both networks during the tasks was weaker in the older relative to younger adults. Intrinsic functional connectivity, measured at rest, also was weaker in the older adults in the DN, but not in the RN. These results suggest that, in younger adults, the processing of personally relevant information involves robust activation of and functional connectivity within these two networks, in line with current models that emphasize strong links between the self and reward. The finding that older adults had more positive judgments, but weaker engagement and less consistent functional connectivity in these networks, suggests potential brain mechanisms for the "positivity bias" with aging. Copyright © 2012 Elsevier Ltd. All rights reserved.
Full Text Available A study was conducted with 487 black adult residents of a South African informal settlement (151 men and 336 women to ascertain satisfaction with personal and environmental quality of life. It was hypothesised that: (1 health status and life satisfaction were the underlying dimensions of personal quality of life (PQOL; (2 health status and life satisfaction were more strongly associated with PQOL than environmental quality of life (EQOL; and (3 life satisfaction and satisfaction with EQOL were positively related. Seventy per cent of respondents rated their health as good or better. Age, schooling and employment status were significantly related to health, life satisfaction and PQOL. Reliability (internal consistency coefficients were 0.77 for the 5-item life satisfaction scale and 0.82 for the 12-item EQOL measure. Factor analysis showed that safety and security was the major unmet service need. Health status and life satisfaction explained 38% of the variance in PQOL; health status explained only 4% of the variance in EQOL. Life satisfaction was significantly related to EQOL (r = 0.16, p = 0.01. The results provided support for all three hypotheses. It was concluded that the life satisfaction and EQOL measures had good reliability; there was a definite need for a safety and security programme; and good health was a more important predictor of PQOL than EQOL.
Ye. M. Velykodna
Full Text Available The main purpose of the article is to outline the problems of health and human security in the mediainformation education space. Media education as a system of values formation under conditions of medial information educational environment focused on developing and providing protective functions in their close interdependence. Training is aimed at creating conditions for the development of spiritual subjects of education, promotion of positive changes in their personal development. Protective aimed at improving the social protection of business education in the destructive tendencies in society , to neutralize the impact of negative factors media. The most important part of media education in the context of ensuring the health of the individual is the formation of values education activity as the basis of spiritual health. It is shown that meaningful use sens formative influence of mediainformation space determines the priority position of media education as a factor in providing mental health of the individual. Formation of mental health is associated with the conscious assimilation of certain belief systems of the world. According media education focuses not on broadcast ready «moral absolutes «, and the simulation of specific situations in which the individual is necessary to selfdetermination regarding fundamental values and principles of implementing these values in life.
Lee, Victoria K; Harris, Lasana T
Social learning requires inferring social information about another person, as well as evaluating outcomes. Previous research shows that prior social information biases decision making and reduces reliance on striatal activity during learning (Delgado, Frank, & Phelps, Nature Neuroscience 8 (11): 1611-1618, 2005). A rich literature in social psychology on person perception demonstrates that people spontaneously infer social information when viewing another person (Fiske & Taylor, 2013) and engage a network of brain regions, including the medial prefrontal cortex, temporal parietal junction, superior temporal sulcus, and precuneus (Amodio & Frith, Nature Reviews Neuroscience, 7(4), 268-277, 2006; Haxby, Gobbini, & Montgomery, 2004; van Overwalle Human Brain Mapping, 30, 829-858, 2009). We investigate the role of these brain regions during social learning about well-established dimensions of person perception-trait warmth and trait competence. We test the hypothesis that activity in person perception brain regions interacts with learning structures during social learning. Participants play an investment game where they must choose an agent to invest on their behalf. This choice is guided by cues signaling trait warmth or trait competence based on framing of monetary returns. Trait warmth information impairs learning about human but not computer agents, while trait competence information produces similar learning rates for human and computer agents. We see increased activation to warmth information about human agents in person perception brain regions. Interestingly, activity in person perception brain regions during the decision phase negatively predicts activity in the striatum during feedback for trait competence inferences about humans. These results suggest that social learning may engage additional processing within person perception brain regions that hampers learning in economic contexts.
A definitional mission evaluated the prospects of the US Trade and Development Program (TDP) funding a market demonstration of a Demand Side Management (DSM) program being developed by the Tenaga Nasional Berhad (TNB) in Malaysia. TNB is the national electric utility of Malaysia with the responsibility to promote economically efficient supply of electricity needed for the economic development of Peninsular Malaysia. DSM is a utility-financed program to affect energy savings at the enduse level thereby reducing peak and base loads. Historically, TNB has taken the peak load and the load duration curves as given in planning and implementing the least-cost generation expansion strategy. It has refrained from influencing the pattern of energy use by the customer through any means other than tariff structures and levels. The experience of many utilities with DSM in the U.S. offers TNB an opportunity to develop a suitable DSM program for Malaysia.
In its first part, this report explains the choice of trading systems due to the impossibility to define taxes on carbon emissions and to the influence of international negotiations. It also describes the operation of the European system with its three allocation phases (an experimental framework between 2005 and 2007, an actually constraining framework between 2008 and 2012, and a sustainable frame from 2013), and outlines the realistic character of emission reduction objective by 2020. It identifies and discusses the weaknesses of the European system, notably due to an insufficiently regulated market and to a partial taking into account of emission. The second part identifies ways to improve the system by extending it (including new sectors, taking some particular emissions into account, and valuing carbon sequestration), by preserving the competitiveness of European industries, and by aiming at the construction of a de-carbonated Europe
Yoshida, Akiko; Dowa, Yuri; Murakami, Hiromi; Kosugi, Shinji
In studies publishing identifying personal information, obtaining consent is regarded as necessary, as it is impossible to ensure complete anonymity. However, current journal practices around specific points to consider when obtaining consent, the contents of consent forms and how consent forms are managed have not yet been fully examined. This study was conducted to identify potential issues surrounding consent to publish identifying personal information. Content analysis was carried out on instructions for authors and consent forms developed by academic journals in four fields (as classified by Journal Citation Reports): medicine general and internal, genetics and heredity, pediatrics, and psychiatry. An online questionnaire survey of editors working for journals that require the submission of consent forms was also conducted. Instructions for authors were reviewed for 491 academic journals (132 for medicine general and internal, 147 for genetics and heredity, 100 for pediatrics, and 112 for psychiatry). Approximately 40% (203: 74 for medicine general and internal, 31 for genetics and heredity, 58 for pediatrics, and 40 for psychiatry) stated that subject consent was necessary. The submission of consent forms was required by 30% (154) of the journals studied, and 10% (50) provided their own consent forms for authors to use. Two journals mentioned that the possible effects of publication on subjects should be considered. Many journal consent forms mentioned the difficulties in ensuring complete anonymity of subjects, but few addressed the study objective, the subjects' right to refuse consent and the withdrawal of consent. The main reason for requiring the submission of consent forms was to confirm that consent had been obtained. Approximately 40% of journals required subject consent to be obtained. However, differences were observed depending on the fields. Specific considerations were not always documented. There is a need to address issues around the study
Background In studies publishing identifying personal information, obtaining consent is regarded as necessary, as it is impossible to ensure complete anonymity. However, current journal practices around specific points to consider when obtaining consent, the contents of consent forms and how consent forms are managed have not yet been fully examined. This study was conducted to identify potential issues surrounding consent to publish identifying personal information. Methods Content analysis was carried out on instructions for authors and consent forms developed by academic journals in four fields (as classified by Journal Citation Reports): medicine general and internal, genetics and heredity, pediatrics, and psychiatry. An online questionnaire survey of editors working for journals that require the submission of consent forms was also conducted. Results Instructions for authors were reviewed for 491 academic journals (132 for medicine general and internal, 147 for genetics and heredity, 100 for pediatrics, and 112 for psychiatry). Approximately 40% (203: 74 for medicine general and internal, 31 for genetics and heredity, 58 for pediatrics, and 40 for psychiatry) stated that subject consent was necessary. The submission of consent forms was required by 30% (154) of the journals studied, and 10% (50) provided their own consent forms for authors to use. Two journals mentioned that the possible effects of publication on subjects should be considered. Many journal consent forms mentioned the difficulties in ensuring complete anonymity of subjects, but few addressed the study objective, the subjects’ right to refuse consent and the withdrawal of consent. The main reason for requiring the submission of consent forms was to confirm that consent had been obtained. Conclusion Approximately 40% of journals required subject consent to be obtained. However, differences were observed depending on the fields. Specific considerations were not always documented. There is a need
Full Text Available Rapid development of information technology in recent years has brought over also the problem of the protection of author's rights related to copyrighted works on electronic media. Information and law specialists were intensively working on this problem for several years and the result has been a new system of labelling copyrighted works on the Internet, called DOI (Digitial Object Identifier. The system was developed in the United States. At the time of the presenta tion of DOI at the Bookfair in Frankfurt, 250.000 author works were labelled with DOI. The system is universal and enables the inclusion of the present standard identifiers (ISBN, ISSN, SICI. The fact that DOI identifier stays "glued on" forever, makes the identification of the carrier of copyright possible at any moment. The DOI system presents the infrastructure system for trading in and use of copyrighted works over the Internet in the third millenium.
个人信息既具有人格利益又包含财产利益.个人信息人格利益理论强调确定个人信息自决权、通过法律全面保护个人信息人格利益;个人信息连带关系理论、社会主义信息法学思想可以阐释网络社会的个人信息互联关系;个人信息财产利益理论涉及功利主义、隐私经济学和个人信息商品化理论,注重个人信息所蕴含的经济价值、注重商业利用个人信息以发挥其最大效用.%Personal information has both personality and property interests.Personality interests theory empha-sizes of the self determination right of personal information and the comprehensive protection of personality in-terests;Personal information joint relation theory and the socialist information legal thoughts can interpret the interconnection of personal information in a network society;Personal information property interest theory in-volves utilitarianism,privacy economics theory,personal information commercialization theory,and pays atten-tion to the personal information economic value and the commercial use of personal information to maximize its impact.
Kroes, G.; Veerman, J.W.; Bruyn, E.E.J. De
The present study compared ratings of a standardized sample of child behavior problems across informants and examined the effects of informant personality traits on child behavior ratings by mothers, teachers, and group-care workers. Participants were 55 clinic-referred children, aged 6–12 years.
Fenske, Sabrina; Lis, Stefanie; Liebke, Lisa; Niedtfeld, Inga; Kirsch, Peter; Mier, Daniela
Borderline Personality Disorder (BPD) is characterized by severe deficits in social interactions, which might be linked to deficits in emotion recognition. Research on emotion recognition abilities in BPD revealed heterogeneous results, ranging from deficits to heightened sensitivity. The most stable findings point to an impairment in the evaluation of neutral facial expressions as neutral, as well as to a negative bias in emotion recognition; that is the tendency to attribute negative emotions to neutral expressions, or in a broader sense to report a more negative emotion category than depicted. However, it remains unclear which contextual factors influence the occurrence of this negative bias. Previous studies suggest that priming by preceding emotional information and also constrained processing time might augment the emotion recognition deficit in BPD. To test these assumptions, 32 female BPD patients and 31 healthy females, matched for age and education, participated in an emotion recognition study, in which every facial expression was preceded by either a positive, neutral or negative scene. Furthermore, time constraints for processing were varied by presenting the facial expressions with short (100 ms) or long duration (up to 3000 ms) in two separate blocks. BPD patients showed a significant deficit in emotion recognition for neutral and positive facial expression, associated with a significant negative bias. In BPD patients, this emotion recognition deficit was differentially affected by preceding emotional information and time constraints, with a greater influence of emotional information during long face presentations and a greater influence of neutral information during short face presentations. Our results are in line with previous findings supporting the existence of a negative bias in emotion recognition in BPD patients, and provide further insights into biased social perceptions in BPD patients.
Pai, H H; Lau, F; Barnett, J; Jones, S
There is interest in the use of health information technology in the form of personal health record (phr) systems to support patient needs for health information, care, and decision-making, particularly for patients with distressing, chronic diseases such as prostate cancer (pca). We sought feedback from pca patients who used a phr. For 6 months, 22 pca patients in various phases of care at the BC Cancer Agency (bcca) were given access to a secure Web-based phr called provider, which they could use to view their medical records and use a set of support tools. Feedback was obtained using an end-of-study survey on usability, satisfaction, and concerns with provider. Site activity was recorded to assess usage patterns. Of the 17 patients who completed the study, 29% encountered some minor difficulties using provider. No security breaches were known to have occurred. The two most commonly accessed medical records were laboratory test results and transcribed doctor's notes. Of survey respondents, 94% were satisfied with the access to their medical records, 65% said that provider helped to answer their questions, 77% felt that their privacy and confidentiality were preserved, 65% felt that using provider helped them to communicate better with their physicians, 83% found new and useful information that they would not have received by talking to their health care providers, and 88% said that they would continue to use provider. Our results support the notion that phrs can provide cancer patients with timely access to their medical records and health information, and can assist in communication with health care providers, in knowledge generation, and in patient empowerment.
Serdar, Muhittin A; Turan, Mustafa; Cihan, Murat
Laboratory specialists currently need to access scientific-based information at anytime and anywhere. A considerable period of time and too much effort are required to access this information through existing accumulated data. Personal digital assistants (PDA) are supposed to provide an effective solution with commercial software for this problem. In this study, 11 commercial software products (UpToDate, ePocrates, Inforetrive, Pepid, eMedicine, FIRST Consult, and 5 laboratory e-books released by Skyscape and/or Isilo) were selected and the benefits of their use were evaluated by seven laboratory specialists. The assessment of the software was performed based on the number of the tests included, the software content of detailed information for each test-like process, method, interpretation of results, reference ranges, critical values, interferences, equations, pathophysiology, supplementary technical details such as sample collection principles, and additional information such as linked references, evidence-based data, test cost, etc. In terms of technique, the following items are considered: the amount of memory required to run the software, the graphical user interface, which is a user-friendly instrument, and the frequency of new and/or up-date releases. There is still no perfect program, as we have anticipated. Interpretation of laboratory results may require software with an integrated program. However, methodological data are mostly not included in the software evaluated. It seems that these shortcomings will be fixed in the near future, and PDAs and relevant medical applications will also become indispensable for all physicians including laboratory specialists in the field of training/education and in patient care.
Castell, Nuria; Liu, Hai-Ying; Schneider, Philipp; Cole-Hunter, Tom; Lahoz, William; Bartonova, Alena
Most European cities exceed the air quality guidelines established by the WHO to protect human health. As such, citizens are exposed to potentially harmful pollutant levels. Some cities have services (e.g., web pages, mobile apps, etc.) which provide timely air quality information to the public. However, air quality data at individual level is currently scarce or non-existent. Making this information directly useful to individuals poses a challenge. For instance, if a user is informed that the air quality is "poor", what does that mean for him/her, and how can this information be acted upon? Despite individuals having a unique relationship with their environment, the information on the state of atmospheric components and related hazards is currently mostly generic, and seldom personally relevant. This undermines citizens' interest in their environment, and consequently limits their ability to recognize and change both their contribution and their exposure to air pollution. In Oslo, two EU founded projects, CITI-SENSE (Engelken-Jorge et al., 2014) and Citi-Sense-MOB (Castell et al., 2014), are trying to establish a dialogue with citizens by providing them with the possibility of getting personalized air quality information on their smartphones. The users are able to check the air quality in their immediate surroundings and track their individual exposure while moving through the urban environment (Castell et al., 2014). In this way, they may be able to reduce their exposure such as by changing transport modes or routes, for example by selecting less polluted streets to walk or cycle through. Using a smartphone application, citizens are engaged in collecting and sharing environmental data generated by low-cost air quality sensors, and in reporting their individual perception (turning citizens into sensors themselves). The highly spatially resolved data on air quality and perception is geo-located. This allows for simultaneous visualization of both kinds of the sensor
Full Text Available Mobile healthcare social networks (MHSNs have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE. Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.
Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin
Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs. PMID:26404300
Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin
Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients' full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.
Perik, E.M.; Ruyter, de B.E.R.; Markopoulos, P.; Eggen, J.H.
Personalized services can cause privacy concerns, due to the acquisition, storage and application of sensitive personal information. This paper describes empirical research into the factors influencing the trade-off between the perceived benefits of personalization and the privacy ‘costs’
Laura Lynne Armstrong
Full Text Available Mental illnesses are rapidly escalating on university and college campuses. It is well known that postsecondary institutions are not doing enough to address mental health concerns: this represents a significant gap in our attempts to meet the mental health needs of young people. Deficits in mental health knowledge are now proposed as a major contributing factor to both stigma and low service access, but little research as explored this issue. There is also little research to date concerning what young people want to know about mental health and how best to disseminate mental health knowledge. Without such information, knowledge may not be shared in a person-centred, meaningful manner that youth will use. We explored these issues in the present study. First year postsecondary students (N = 271; n = 183 females; n = 85 males; n = 3 other from Ottawa, Ontario, Canada participated in the online survey. Almost half of the postsecondary youth participants, particularly males, had difficulty recognizing common mental illnesses, such as anxiety, eating disorders, and psychosis. Youth held inaccurate beliefs and stigma, as well as attitudes not in favour of help-seeking. They primarily wanted to know about symptoms of mental illnesses as well as how to cope with stress. Post-secondary students wanted to learn about mental health issues through public presentations, the Internet, and media. The present research suggests the need for an awareness and acknowledgement among policy-makers of first year post-secondary students' knowledge gaps and youth appropriate knowledge sharing. Assessing mental health knowledge, what post-secondary students want to know about mental health, and knowledge transfer preferences could aid in the development of a framework to address the significant gap in the mental health needs of post-secondary students in a person centred manner.
Bilek, Edda; Stößel, Gabriela; Schäfer, Axel; Clement, Laura; Ruf, Matthias; Robnik, Lydia; Neukel, Corinne; Tost, Heike; Kirsch, Peter; Meyer-Lindenberg, Andreas
Although borderline personality disorder (BPD)-one of the most common, burdensome, and costly psychiatric conditions-is characterized by repeated interpersonal conflict and instable relationships, the neurobiological mechanism of social interactive deficits remains poorly understood. To apply recent advancements in the investigation of 2-person human social interaction to investigate interaction difficulties among people with BPD. Cross-brain information flow in BPD was examined from May 25, 2012, to December 4, 2015, in pairs of participants studied in 2 linked functional magnetic resonance imaging scanners in a university setting. Participants performed a joint attention task. Each pair included a healthy control individual (HC) and either a patient currently fulfilling DSM-IV criteria for BPD (cBPD) (n = 23), a patient in remission for 2 years or more (rBPD) (n = 17), or a second HC (n = 20). Groups were matched for age and educational level. A measure of cross-brain neural coupling was computed following previously published work to indicate synchronized flow between right temporoparietal junction networks (previously shown to host neural coupling abilities in health). This measure is derived from an independent component analysis contrasting the time courses of components between pairs of truly interacting participants compared with bootstrapped control pairs. In the sample including 23 women with cBPD (mean [SD] age, 26.8 [5.7] years), 17 women with rBPD (mean [SD] age, 28.5 [4.3] years), and 80 HCs (mean [SD] age, 24.0 [3.4] years]) investigated as dyads, neural coupling was found to be associated with disorder state (η2 = 0.17; P = .007): while HC-HC pairs showed synchronized neural responses, cBPD-HC pairs exhibited significantly lower neural coupling just above permutation-based data levels (η2 = 0.16; P = .009). No difference was found between neural coupling in rBPD-HC and HC-HC pairs. The neural coupling in patients was
Johnson, Summer; Kass, Nancy E; Natowicz, Marvin
Protecting the confidentiality of medical information has been an issue of great interest in the fields of bioethics, public policy, and law. Few empirical studies have addressed patient experiences and attitudes toward disclosure of private medical information in multiple contexts such as health insurance, employment, and the family. Furthermore, it is unclear whether differences exist in experiences and attitudes about privacy between those living with a serious medical condition versus those who have a child with a medical condition. The study sought to determine whether attitudes and experiences related to medical privacy and confidentiality differ between affected adults and parents of affected children. Interviews were conducted with 296 adults and parents of children with sickle cell disease (SCD), cystic fibrosis (CF), or diabetes mellitus (DM). This cross-sectional study collected data regarding their experiences, attitudes, and beliefs concerning medical privacy and confidentiality. Multinomial logistic regression analysis was conducted on quantitative data. Qualitative analysis was conducted on data from open-ended response items. Parents disclose their child's diagnosis to others more often than affected adults disclose their own disease status. Parents are less likely than affected adults to regret their disclosure, to hope others do not find out, to have been pressured to share information, and to be asked about their disease by employers. Affected adults express greater concern about disclosure, a greater prevalence and greater fear of discrimination, and experience greater pressure from family members to disclose. Clinicians and researchers working with these populations should consider these differences in privacy and disclosure. Further study is necessary to examine the implications of these differences in attitudes and experiences concerning insurance, employment, and social interactions among persons with these conditions.
Tavani, Herman T
This essay examines issues involving personal privacy and informed consent that arise at the intersection of information and communication technology (ICT) and population genomics research. I begin by briefly examining the ethical, legal, and social implications (ELSI) program requirements that were established to guide researchers working on the Human Genome Project (HGP). Next I consider a case illustration involving deCODE Genetics, a privately owned genetic company in Iceland, which raises some ethical concerns that are not clearly addressed in the current ELSI guidelines. The deCODE case also illustrates some ways in which an ICT technique known as data mining has both aided and posed special challenges for researchers working in the field of population genomics. On the one hand, data-mining tools have greatly assisted researchers in mapping the human genome and in identifying certain "disease genes" common in specific populations (which, in turn, has accelerated the process of finding cures for diseases tha affect those populations). On the other hand, this technology has significantly threatened the privacy of research subjects participating in population genomics studies, who may, unwittingly, contribute to the construction of new groups (based on arbitrary and non-obvious patterns and statistical correlations) that put those subjects at risk for discrimination and stigmatization. In the final section of this paper I examine some ways in which the use of data mining in the context of population genomics research poses a critical challenge for the principle of informed consent, which traditionally has played a central role in protecting the privacy interests of research subjects participating in epidemiological studies.
Rodríguez-González, Ana María; Rodríguez-Míguez, Eva; Duarte-Pérez, Ana; Díaz-Sanisidro, Eduardo; Barbosa-Álvarez, Ángel; Clavería, Ana
To describe the burden of informal carers of dependent people and to identify related variables. Descriptive observational cross-sectional study. Primary Health Care in the southern area of Pontevedra. 97 caregivers of dependent persons. We collected socioeconomic data and health conditions from caregivers and dependent persons, time spent on the daily care and caregiver burden (Zarit abbreviate) through a personal interview. Besides the description of the sample-including their burden level-, a contrast mean was used to identify characteristics that influenced in punctuation of Zarit scale. A logistic regression was used to analyse characteristics that increase the likelihood to experiment burden. 61.9% of caregivers are subject to intense burden. The item on the scale which contributes most to the caregiver burden is the lack of time for oneself, followed by the negative effects of interpersonal relationships. Contrast means shows that degree of relationship, number of care hours, caregiver health and aggressiveness of dependent persons produce significant differences in Zarit scale. Physic and psychological health of caregivers and aggressiveness of dependent persons is associated with the likelihood of developing caregiver burden. Informal caregivers of dependent persons show a high level of burden, both related to their characteristics and those of the dependent persons. Caregiver burden rethinks the need for public policies focused on dependence to adopt an integrative caregiver-dependent vision. Copyright © 2016 Elsevier España, S.L.U. All rights reserved.
Valchev, Velichko H; van de Vijver, Fons J R; Nel, J Alewyn; Rothmann, Sebastiaan; Meiring, Deon
The present study investigates the differences between 3 ethnocultural groups in South Africa in the use of traits and contextual information for personality descriptions and the interaction of these differences with social distance from the target person and with personality domains. Semistructured interviews asking for self- and other-descriptions were conducted with 1,027 Blacks, 84 Coloureds and Indians, and 105 Whites, representing the country's 11 official languages. In Part 1 we found similarities in the total set of categories used most often for personality description across the 3 groups-traits, behaviors, preferences, and perceptions (over 86%), which were context-free (over 66%)-as well as substantial differences between the groups in the relative use of these categories. In Part 2 we found that distance from the target person plays a role in cross-cultural differences in trait use and contextualization. In Part 3 we found significant interactions of culture with the use of traits and contextual information across agency-communion and 9 indigenous South African personality clusters similar to the Big Five. The responses of Blacks confirmed expectations for collectivistic groups (fewer traits and more contextualization) and of Whites for individualistic groups (more traits and less contextualization), and Coloureds and Indians had an intermediate pattern. The results are discussed in the framework of the trait and cultural psychology perspectives on personality. PsycINFO Database Record (c) 2013 APA, all rights reserved.
Rukanova, Boriana; Zinner Henriksen, Helle; Henningsson, Stefan
In global supply chains information about transactions resides in fragmented pockets within business and government systems. The introduction of digital trade infrastructures (DTI) that transcend organizational and systems domains is driven by the prospect of reducing this information fragmentation......, thereby enabling improved security and efficiency in trade process. To understand the problem at hand and build cumulative knowledge about its resolution a way to conceptualize the different digital trade infrastructure initiatives is needed. This paper develops the Digital Trade Infrastructure Framework...
This article describes how trade fairs act as a framing mechanism that enables participants to come together for the exchange of goods and services and to perceive themselves as acting in a social field. This way, trade fairs make markets possible. Based on ongoing participant observation at book....../material, social, situational, content/appreciative, and the use value of goods, values which are then equated with a commodity exchange value in the form of price. Trade fairs frame order, but they are also events where the respective field might be reconfigurated. The contingency of personal interaction...
Seal, Susan D.
With the opening of additional trade partnerships, the reduction of global transportation and communication costs, and the increase in demand for U.S. agricultural products and services, international trade is an area of great importance to more and more Extension clients and stakeholders. This article provides information about the primary…
Nelemans, Matthijs; Bainbridge, Stephen M.
This paper analyses the law and economics of insider trading in the context of takeover bids, focusing on the European regulatory framework. We distinguish between trading by the bidder, by the target and by classical insiders and first address the issue of precisely when information about potential
Full Text Available Purpose: to investigate the innovative forms of the informative providing of educational process in institutions of higher learning of physical culture and sport of countries: Ukraine, Republic of Belarus, Republic of Moldova, Republic of Kazakhstan, Republic of Uzbekistan, Russian Federation. Material & Methods: content-analysis of web sites and web pages of sporting institutions of higher learning of these countries. Results: the informative providing of institutions of higher learning of physical culture and sport of Ukraine, Belarus, Moldova, Kazakhstan, Uzbekistan and RF differs substantially, in spite of the fact that the specific of educating in these educational establishments is identical. Institutions of higher learning of physical culture and sport of Ukraine actively offer the innovative forms of the informative providing − give possibility to the students and teachers to take advantage of e-catalog, electronic repository, virtual bibliographic certificate, electronic delivery of document. Sporting institutions of higher learning of Belarus, Kazakhstan, Uzbekistan and Russian Federation carry out the informative providing by means of the electronic-library systems, in particular "Znanium.com" and "Rukont". The system "Rukont" is erected in the grade of the national inter-branch digital resource created on the base of state educational standard and contains the informative resource of different family: books, magazines, separate articles, and also audio, video data, multimedia. Collection of electronic versions of editions of electronic-library systems "Znanium.com" unites books, magazines, articles grouped on thematic and having a special purpose signs. The unique institute of higher of Republic of Moldova does not give electronic informative services, but uses the traditional forms of the informative providing by means of catalogues and card library indexes. Conclusions: higher educational establishments of physical culture and
Full Text Available The present study attempts to investigate the nature of information seeking behavior in the sample population of 158 graduate students and examine the role of personality factors in their information seeking behavior. Two questionnaires were used. Pearson correlation analysis and multi-valued regression analysis were employed in analyzing the data. Findings indicate that there is a positive significance between students’ extroversion and relevance judgment, positing of new ideas, time as a motivating factor, and effort to seek out information. A similar indication was observed between interpolation of experience and time slated for searching for information. Generally it could be deduced that there is a significant relationship between personality features and information seeking behavior of graduate students.
Torres, Carlos A.
This study investigated college students' attitudes toward and intentions to use personal health portals (PHPs) for managing their personal health information using a survey method. The study also aimed to examine the roles electronic Personal Health Information Management (PHIM) anxiety and apathy play in influencing students' attitudes toward…
Andorfer, Veronika A; Liebe, Ulf
We address ethical consumption using a natural field experiment on the actual purchase of Fair Trade (FT) coffee in three supermarkets in Germany. Based on a quasi-experimental before-and-after design the effects of three different treatments - information, 20% price reduction, and a moral appeal - are analyzed. Sales data cover actual ethical purchase behavior and avoid problems of social desirability. But they offer only limited insights into the motivations of individual consumers. We therefore complemented the field experiment with a customer survey that allows us to contrast observed (ethical) buying behavior with self-reported FT consumption. Results from the experiment suggest that only the price reduction had the expected positive and statistically significant effect on FT consumption. Copyright © 2015 Elsevier Inc. All rights reserved.
Kwasnik, Ted [National Renewable Energy Lab. (NREL), Golden, CO (United States); Carmichael, Scott P. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Arent, Douglas J [National Renewable Energy Lab. (NREL), Golden, CO (United States); Sperling, Joshua [National Renewable Energy Lab. (NREL), Golden, CO (United States); Isley, Steven [National Renewable Energy Lab. (NREL), Golden, CO (United States)
The New Concepts Incubator team at the National Renewable Energy Laboratory (NREL) developed a three-stage online platform for travel diary collection, personal travel plan optimization and travel itinerary visualization. In the first stage, users provide a travel diary for the previous day through an interactive map and calendar interface and survey for travel attitudes and behaviors. One or more days later, users are invited via email to engage in a second stage where they view a personal mobility dashboard displaying recommended travel itineraries generated from a novel framework that optimizes travel outcomes over a sequence of interrelated trips. A week or more after viewing these recommended travel itineraries on the dashboard, users are emailed again to engage in a third stage where they complete a final survey about travel attitudes and behaviors. A usability study of the platform conducted online showed that, in general, users found the system valuable for informing their travel decisions. A total of 274 individuals were recruited through Amazon Mechanical Turk, an online survey platform, to participate in a transportation study using this platform. On average, the platform distilled 65 feasible travel plans per individual into two recommended itineraries, each optimal according to one or more outcomes and dependent on the fixed times and locations from the travel diary. For 45 percent of users, the trip recommendation algorithm returned only a single, typically automobile-centric, itinerary because there were no other viable alternative transportation modes available. Platform users generally agreed that the dashboard was enjoyable and easy to use, and that it would be a helpful tool in adopting new travel behaviors. Users generally agreed most that the time, cost and user preferred recommendations 'made sense' to them, and were most willing to implement these itineraries. Platform users typically expressed low willingness to try the carbon and
McMillan, Laura; Booth, Joanne; Currie, Kay; Howe, Tracey
Hip fracture is a significant cause of morbidity and mortality in older people. Healthcare professionals have a role to identify and respond to challenges and concerns that older people face as they strive to manage risk of future falls and rebuild confidence and independence after discharge. This study aimed to explore the postdischarge concerns of older people after fall-induced hip fracture. Glaser's approach to the grounded theory method guided qualitative interviews conducted with 19 older people in their own homes up to 3 months post discharge, in two health authority areas. A theory of 'taking control' was generated. 'Balancing risk' emerged as a key strategy that older people employed to help them to take control after discharge home. Older people attempted to control or 'balance' their risk of future falls and dependence by implementing two further strategies: 'protective guarding' and 'following orders'. The instinctive strategy of protective guarding and the learned strategy of following orders were implemented simultaneously and were characterised by older people aiming to pace their progress and balance risk safely and appropriately. To apply these strategies, older people required information from healthcare professionals. In circumstances where older people did not receive or did not understand the information provided, they were left 'grasping to understand' and were more likely to miscalculate risk. This leads to damaged confidence and in some cases further falls. The concept of balancing risk aims to help healthcare professionals understand the older person's perspective of hip fracture and to recognise the efforts that people make to guard against further injury and dependence in the early postdischarge period. © 2013 Blackwell Publishing Ltd.
Czaja, Sara J; Boot, Walter R; Charness, Neil; A Rogers, Wendy; Sharit, Joseph; Fisk, Arthur D; Lee, Chin Chin; Nair, Sankaran N
Technology holds promise in terms of providing support to older adults. To date, there have been limited robust systematic efforts to evaluate the psychosocial benefits of technology for older people and identify factors that influence both the usability and uptake of technology systems. In response to these issues, we developed the Personal Reminder Information and Social Management System (PRISM), a software application designed for older adults to support social connectivity, memory, knowledge about topics, leisure activities and access to resources. This trail is evaluating the impact of access to the PRISM system on outcomes such as social isolation, social support and connectivity. This paper reports on the approach used to design the PRISM system, study design, methodology and baseline data for the trial. The trial is multi-site randomized field trial. PRISM is being compared to a Binder condition where participants received a binder that contained content similar to that found on PRISM. The sample includes 300 older adults, aged 65-98 years, who lived alone and at risk for being isolated. The primary outcome measures for the trial include indices of social isolation and support and well-being. Secondary outcomes measures include indices of computer proficiency, technology uptake and attitudes towards technology. Follow-up assessments occurred at 6 and 12 months post-randomization. The results of this study will yield important information about the potential value of technology for older adults. The study also demonstrates how a user-centered iterative design approach can be incorporated into the design and evaluation of an intervention protocol. Copyright © 2014 Elsevier Inc. All rights reserved.
Maura Alicia Matesic
Full Text Available The appearance of Personal Response Systems (PRS or “clickers” in universityclassrooms has opened an avenue for new forms of communication betweeninstructors and students in large-enrolment classes. Because it allows instructorsto pose questions and receive tabulated responses from students in real-time,proponents of this technology herald it as an innovative means for encouraginghigher levels of participation, fostering student engagement, and streamlining theassessment process. Having already been experimentally deployed acrossdisciplines ranging from business to the arts and sciences, it is also beginning tobe used in the context of information literacy instruction. In this project weemployed the technology not to transfer actual skills, but to advertise theexistence of online library guides, promote the use of the library within thecontext of the course itself, and “provoke” students to adopt a more activeapproach to research as a recursive process. Our findings suggest that studentsadapt easily to the use of this technology and feel democratically empowered torespond to their instructors in a variety of ways that include anonymous clickerresponses as well as more traditional means such as the raising of hands andposing questions verbally. The particular value of this study was to show thatthese broader findings seem equally applicable to pedagogical settings in whichlearning objectives are built around and integrated with the principles ofinformation literacy.
Curnin, Charles; Gordon, Assaf; Erlich, Yaniv
Millions of individuals have access to raw genomic data using direct-to-consumer companies. The advent of large-scale sequencing projects, such as the Precision Medicine Initiative, will further increase the number of individuals with access to their own genomic information. However, querying genomic data requires a computer terminal and computational skill to analyze the data-an impediment for the general public. DNA Compass is a website designed to empower the public by enabling simple navigation of personal genomic data. Users can query the status of their genomic variants for over 1658 markers or tens of millions of documented single nucleotide polymorphisms (SNPs). DNA Compass presents the relevant genotypes of the user side-by-side with explanatory scientific resources. The genotype data never leaves the user's computer, a feature that provides improved security and performance. More than 12 000 unique users, mainly from the general genetic genealogy community, have already used DNA Compass, demonstrating its utility. DNA Compass is freely available on https://compass.dna.land . email@example.com. © The Author(s) 2017. Published by Oxford University Press.
Kern, R S; Green, M F; Fiske, A P; Kee, K S; Lee, J; Sergi, M J; Horan, W P; Subotnik, K L; Sugar, C A; Nuechterlein, K H
Interpersonal communication problems are common among persons with schizophrenia and may be linked, in part, to deficits in theory of mind (ToM), the ability to accurately perceive the attitudes, beliefs and intentions of others. Particular difficulties might be expected in the processing of counterfactual information such as sarcasm or lies. The present study included 50 schizophrenia or schizo-affective out-patients and 44 demographically comparable healthy adults who were administered Part III of The Awareness of Social Inference Test (TASIT; a measure assessing comprehension of sarcasm versus lies) as well as measures of positive and negative symptoms and community functioning. TASIT data were analyzed using a 2 (group: patients versus healthy adults) x 2 (condition: sarcasm versus lie) repeated-measures ANOVA. The results show significant effects for group, condition, and the group x condition interaction. Compared to controls, patients performed significantly worse on sarcasm but not lie scenes. Within-group contrasts showed that patients performed significantly worse on sarcasm versus lie scenes; controls performed comparably on both. In patients, performance on TASIT showed a significant correlation with positive, but not negative, symptoms. The group and interaction effects remained significant when rerun with a subset of patients with low-level positive symptoms. The findings for a relationship between TASIT performance and community functioning were essentially negative. The findings replicate a prior demonstration of difficulty in the comprehension of sarcasm using a different test, but are not consistent with previous studies showing global ToM deficits in schizophrenia.
Full Text Available Previous studies have explored the effects of familiarity on various kinds of visual face judgments, yet the role of familiarity in face processing is not fully understood. Across different face judgments and stimulus sets, the data is equivocal as to whether or not familiarity impacts recognition processes.Here, we examine the effect of real-world personal familiarity in three simple delayed-match-to-sample tasks in which subjects were required to match faces on the basis of orientation (upright v. inverted, gender and identity. We find that subjects had a significant speed advantage with familiar faces in all three tasks, with large effects for the gender and identity matching tasks.Our data indicates that real-world experience with a face exerts a powerful influence on face processing in tasks where identity information is irrelevant, even in tasks that could in principle be solved via low-level cues. These results underscore the importance of experience in shaping visual recognition processes.
Fa'alili-Fidow, Jacinta; McCool, Judith; Percival, Teuila
The purpose of this paper is to portray the views of key stakeholders on the potential impacts of Samoa's free trade negotiations and agreements, on health and wellbeing in Samoa. A series of key informant interviews were undertaken with identified stakeholders during June and July, 2011. Interviews were conducted using a semi-structured interview protocol. They were conducted in-person, in New Zealand and in Samoa. Despite potential health and wellbeing gains arising from trade activities (employment, increase in income, health innovations and empowerment of women), key stakeholders expressed a growing concern about the effect of trade on the population's health, nutrition and the rates of non-communicable diseases. Unease about compromising the national policies due to international regulations was also conveyed. Business and trade representatives however, believed that trade benefits outweighed any health and wellbeing risks to the population of Samoa. Further investigation, using new methodologies are required to determine both the opportunities and threats for trade as a mechanism to improve the health of Samoa's population.
Full Text Available The necessity of limitation of the entrepreneur as a natural person who organizes an economic company within which the economic activity is developed in an organized, permanent and systematic way, combining the financial resources, the attracted labor market, raw materials, logistic and informational means, on the entrepreneur’s risk from other categories of persons who realize trade activities like familial firm or trade companies was the starting point of this scientific research.According to Law 26 / 1990, republished and modified “the traders are the natural persons and the family associations which realize usually trade acts, the commercial companies, national companies and enterprises, the autonomous administrations, the groups with economic interest and trade character, the groups of trade character and the cooperative organizations” (art. 1 paragraph 2.Corroborating the provisions of OUG 44/2008, respectively the art. 2 letter h, according to which “the family enterprise is the economic enterprise, without legal personality, organized by a natural person entrepreneur with his family” with art. 4, according to which the natural persons can develop economic activities individually and independently, as natural authorized persons, or as owner holders of an individual enterprise, or as members of a family enterprise, we conclude that in the actual regulation, which abrogates the Law 300 / 2004, the notion of family association is replaced with the one of family enterprise. The present study wants to analyze the modifications brought to OUG 44/2008 in the field, observing on one side the differences from the previous regulation concerning the family associations, and on the other side, the elements which particularize the family enterprises in comparison with PFA (natural authorized person and with individual enterprises.
Tsukiura, Takashi; Suzuki, Chisato; Shigemune, Yayoi; Mochizuki-Kawai, Hiroko
Although previous studies have suggested the importance of the bilateral anterior temporal (ATL) and medial temporal lobes (MTL) in the retrieval of person identity information, there is little evidence concerning how these regions differentially contribute to the process. Here we investigated this question using functional magnetic resonance imaging (fMRI). Before scanning, subjects learned associations among faces (F), names (N), and job titles (as a form of person-related semantics, S). During retrieval with fMRI, subjects were presented with previously learned and new S stimuli, and judged whether the stimuli were old or new. Successful retrieval (H) trials were divided into three conditions: retrieval of S and associated F and N (HSFN); retrieval of S and associated F (HSF); and retrieval of S only (HS). The left ATL was significantly activated in HSFN, compared to HSF or HS, whereas the right ATL and MTL were significantly activated in HSFN and HSF relative to HS. In addition, activity in bilateral ATL was significantly correlated with reaction time for HSFN, whereas we found no significant correlation between activity in the right MTL and reaction time in any condition. The present findings suggest that the left ATL may mediate associations between names and person-related semantic information, whereas the right ATL mediates the association between faces and person-related semantic information in memory for person identity information. In addition, activation of the right MTL region implies that this area may contribute to a more general relational processing of associative components, including memory for person identity information. Copyright 2007 Wiley-Liss, Inc.
Augustine, Adam A; Vazire, Simine; Holtzman, Nicholas; Gaddis, Sam
Abstract Despite the enormous popularity of Online Social Networking sites (OSNs; e.g., Facebook and Myspace), little research in psychology has been done on them. Two studies examining how personality is reflected in OSNs revealed several connections between the Big Five personality traits and self-reported Facebook-related behaviors and observable profile information. For example, extraversion predicted not only frequency of Facebook usage (Study 1), but also engagement in the site, with extraverts (vs. introverts) showing traces of higher levels of Facebook activity (Study 2). As in offline contexts, extraverts seek out virtual social engagement, which leaves behind a behavioral residue in the form of friends lists and picture postings. Results suggest that, rather than escaping from or compensating for their offline personality, OSN users appear to extend their offline personalities into the domains of OSNs. PMID:21254929
Gosling, Samuel D; Augustine, Adam A; Vazire, Simine; Holtzman, Nicholas; Gaddis, Sam
Despite the enormous popularity of Online Social Networking sites (OSNs; e.g., Facebook and Myspace), little research in psychology has been done on them. Two studies examining how personality is reflected in OSNs revealed several connections between the Big Five personality traits and self-reported Facebook-related behaviors and observable profile information. For example, extraversion predicted not only frequency of Facebook usage (Study 1), but also engagement in the site, with extraverts (vs. introverts) showing traces of higher levels of Facebook activity (Study 2). As in offline contexts, extraverts seek out virtual social engagement, which leaves behind a behavioral residue in the form of friends lists and picture postings. Results suggest that, rather than escaping from or compensating for their offline personality, OSN users appear to extend their offline personalities into the domains of OSNs.
D'Acquisto, Giuseppe; Naldi, Maurizio; Italiano, Giuseppe F.
Every time the customer (individual or company) has to release personal information to its service provider (e.g., an online store or a cloud computing provider), it faces a trade-off between the benefits gained (enhanced or cheaper services) and the risks it incurs (identity theft and fraudulent uses). The amount of personal information released is the major decision variable in that trade-off problem, and has a proxy in the maximum loss the customer may incur. We find the conditions for a u...
... DEPARTMENT OF COMMERCE International Trade Administration North American Free-Trade Agreement.... SUPPLEMENTARY INFORMATION: Chapter 19 of the North American Free-Trade Agreement (``Agreement'') established a..., United States Section, International Trade Administration, Department of Commerce. ACTION: Notice of...
... DEPARTMENT OF COMMERCE International Trade Administration North American Free Trade Agreement..., (202) 482-5438. SUPPLEMENTARY INFORMATION: Chapter 19 of the North American Free Trade Agreement... Secretariat, United States Section, International Trade Administration, Department of Commerce. ACTION: On...
As a multifaceted construct, personality is like a mountain. It may take on different shapes when looking from different perspectives – far or near, high or low, outside or inside. Its view may be colored when looking through different lenses. The current personality literature is primarily built on
... 13572 of April 29, 2011, ``Blocking Property of Certain Persons With Respect to Human Rights Abuses in... 29, 2011, ``Blocking Property of Certain Persons with Respect to Human Rights Abuses in Syria... Emergency Economic Powers Act (50 U.S.C. 1701-06). In the Order, the President expanded the scope of the...
Anastopoulou, Stamatina; Sharples, Mike; Ainsworth, Shaaron; Crook, Charles; O'Malley, Claire; Wright, Michael
In this paper, a novel approach to engaging students in personal inquiry learning is described, whereby they carry out scientific investigations that are personally meaningful and relevant to their everyday lives. The learners are supported by software that guides the inquiry process, extending from the classroom into the school grounds, home, or…
With the continuous development of network technology, the development of network information age has promoted the orderly development of ideological and political education in colleges and universities. It can effectively improve students' political accomplishments and continuously broaden the ways of thinking and education in colleges and universities. Ideological and political work to provide more information platform and education. This article will elaborate on the cultivation of personality consciousness in college ideological and political work under the network age and put forward corresponding measures.
Ogunshola, Roseline Folashade; Adeniyi, Abiodun
The study investigated principals' personal variables and information and communication technology utilization in Federal Capital Territory (FCT) senior secondary schools, Abuja, Nigeria. The study adopted the correlational research design. The study used a sample of 94 senior secondary schools (including public and private) in FCT. Stratified…
Dabbagh, Nada; Kitsantas, Anastasia
A Personal Learning Environment or PLE is a potentially promising pedagogical approach for both integrating formal and informal learning using social media and supporting student self-regulated learning in higher education contexts. The purpose of this paper is to (a) review research that support this claim, (b) conceptualize the connection…
Drachsler, Hendrik; Pecceu, Dries; Arts, Tanja; Hutten, Edwin; Rutledge, Lloyd; Van Rosmalen, Peter; Hummel, Hans; Koper, Rob
Drachsler, H., Peccau, D., Arts, T., Hutten, E., Rutledge, L., Van Rosmalen, P., Hummel, H. G. K., & Koper, R. (2009). ReMashed – Recommendation Approaches for Mash-Up Personal Learning Environments in Formal and Informal Learning Settings. In F. Wild, M. Kalz, M. Palmér & D. Müller (Eds.),
... the Secretary of HUD determines is ``specifically designed and operated to assist elderly persons (as.... The information will be collected in the normal course of business in connection with the sale, rental... beyond what is done in the normal course of business. The estimated total annual burden hours are 5,500...
L. M. Petersen
Full Text Available Wild harvesting has taken place over millennia in Africa. However urbanization and cash economies have effectively altered harvesting from being cultural, traditional, and subsistence activities that are part of a rural norm, to being a subculture of commonly illicit activities located primarily within the urban, cash-based, informal economy. This paper focuses on Cape Town, South Africa where high levels of poverty and extensive population growth have led to a rapidly growing informal industry based on the cultural, subsistence, and entrepreneurial harvesting and consumption of products obtained from the local natural environment. Through a process of literature reviews, database analysis, and key informant interviews, a compendium of harvested species was developed, illustrating the breadth of illicit harvesting of products from nature reserves, public open space, and other commonage within the City. The compendium records 448 locally occurring species (198 animals and 250 plants that are extracted for medicinal, energy, ornamental, sustenance, nursery, and other uses. The sustainability of harvesting is questionable; nearly 70% of all harvested flora and 100% of all collected fauna are either killed or reproductively harmed through the harvesting processes. Furthermore, for the 183 indigenous flora species currently recorded on the International Union for Conservation of Nature (IUCN Red List, 28% (51 hold assessments ranging from Declining through to Critically Endangered. With respect to the more poorly assessed fauna (46 spp., approximately 24% (11 have Declining or Threatened status.
... of the Trusts that may utilize active management investment strategies and invest (i) in fixed income... which pricing information is not readily available. No affiliated persons of applicants will serve as..., which should ensure that the Shares will not trade at a material discount or premium in relation to...
Khan, I.; Khusro, S.; Ali, S.; Din, A.U.
The ubiquity of smartphones is evident from the fact that it is present in the pocket of almost every individual. Because of the increasing computing power and the integration of other abundant resources like storage and sensors, smartphones are proving as the most common Personal Information Management (PIM) platform. Smartphones can capture a broad range of users experiences as compared to a traditional desktop computer which is evident from the numerous smartphone apps available in app markets for the purpose. These applications capture context of a user by utilizing full resources of the smartphone, especially the sensors. However, limited battery power of smart phones has proven to be the most significant bottleneck. Currently, app-based power consumption is estimated which provide only an indication of per app power usage and is of no use to researchers. This research identifies users common daily life activities on smartphones and critically analyses their effects on battery power. Our approach looks into the problem through the eyes of researchers working in the domain of intelligent and context -aware systems. An Android -based application called Smartphone Task-based Energy Monitoring System (STEMS) is developed for estimating power consumption rates of different daily life activities. The system collects activities and the power consumption data from the participants smartphones operating on cellular network with GSM/GPRS and Wi-Fi capabilities. It was found that activities requiring internet connectivity are more energy hungry than others. The results so obtained may prove useful to the stakeholders, like app designers and developers, PIM managers , and the end users. (author)
Full Text Available Abstract Background Gene-environment studies demonstrate variability in nutrient requirements depending upon individual variations in genes affecting nutrient metabolism and transport. This study investigated whether the inclusion of genetic information to personalize a patient's diet (nutrigenetics could improve long term weight management. Methods Patients with a history of failures at weight loss were offered a nutrigenetic test screening 24 variants in 19 genes involved in metabolism. 50 patients were in the nutrigenetic group and 43 patients attending the same clinic were selected for comparison using algorithms to match the characteristics: age, sex, frequency of clinical visits and BMI at initial clinic visit. The second group of 43 patients did not receive a nutrigenetic test. BMI reduction at 100 and > 300 days and blood fasting glucose were measured. Results After 300 days of follow-up individuals in the nutrigenetic group were more likely to have maintained some weight loss (73% than those in the comparison group (32%, resulting in an age and gender adjusted OR of 5.74 (95% CI 1.74–22.52. Average BMI reduction in the nutrigenetic group was 1.93 kg/m2(5.6% loss vs. an average BMI gain of 0.51 kg/m2(2.2% gain (p 100 mg/dL, 57% (17/30 of the nutrigenetic group but only 25% (4/16 of the non-tested group had levels reduced to 90 days of weight management therapy (OR for lowering glucose to Conclusion Addition of nutrigenetically tailored diets resulted in better compliance, longer-term BMI reduction and improvements in blood glucose levels.
The objective of this work is identify and encompass those utility demand-side management (DSM) activities that influence customer electricity use to produce customer savings while favorably modifying the utility load. These activities can help utilities operate more efficiently and effectively in uncertain and competitive business environments. This work authorization will initiate the following: Provide descriptive information on the operating characteristics, applicability, specifications, costs, and benefits of DSM/end-use technologies; Characterize the marketing methods used to encourage customer acceptance of these technologies.
This book lays out the theoretical groundwork for personalized search and reputation management, both on the Web and in peer-to-peer and social networks. Representing much of the foundational research in this field, the book develops scalable algorithms that exploit the graphlike properties underlying personalized search and reputation management, and delves into realistic scenarios regarding Web-scale data. Sep Kamvar focuses on eigenvector-based techniques in Web search, introducing a personalized variant of Google's PageRank algorithm, and he outlines algorithms--such as the now-famous quad
Göthe, Katrin; Oberauer, Klaus
Dual process models postulate familiarity and recollection as the basis of the recognition process. We investigated the time-course of integration of the two information sources to one recognition judgment in a working memory task. We tested 24 subjects with a response signal variant of the modified Sternberg recognition task (Oberauer, 2001) to isolate the time course of three different probe types indicating different combinations of familiarity and source information. We compared two mathematical models implementing different ways of integrating familiarity and recollection. Within each model, we tested three assumptions about the nature of the familiarity signal, with familiarity having (a) only positive values, indicating similarity of the probe with the memory list, (b) only negative values, indicating novelty, or (c) both positive and negative values. Both models provided good fits to the data. A model combining the outputs of both processes additively (Integration Model) gave an overall better fit to the data than a model based on a continuous familiarity signal and a probabilistic all-or-none recollection process (Dominance Model).
Full Text Available This study examines the effects of China’s 2008 trading ban regulation on the insider trading of large shareholders in China’s A-share market. It finds no evidence of insider trading during the ban period (one month before the announcement of a financial report, due to high regulation risk. However, the ban only constrains the profitability of insider trades during the ban period, while trades outside it remain highly profitable. Informed insider trading before the ban period is 2.83 times more profitable than uninformed trading. The regulation has changed insider trading patterns, but has been ineffective in preventing insider trading by large shareholders due to rigid administrative supervision and a lack of civil litigation and flexible market monitoring. This study enhances understanding of large shareholders’ trading behavior and has important implications for regulators.
Rasmussen, Thomas; Zacho, Mette; Kourmaeva, Daria
Cardiovascular disease is the leading cause of death in the western countries. Conventional risk evaluation of asymptomatic individuals is unfortunately inaccurate. There is a need for better diagnostic tools to identify persons, who will benefit from intensified preventive treatment. Coronary...... artery calcium score (CACS) measured by multi-slice CT scan contributes significantly to risk stratification especially in persons with intermediate risk assessed by conventional risk analysis. A CACS-guided preventive intervention strategy seems appealing to reduce mortality due to cardiovascular...
Full Text Available The process through which an observer allocates his/her attention based on the attention of another person is known as joint attention. To be able to do this, the observer effectively has to compute where the other person is looking. It has been shown that observers integrate information from the head and the eyes to determine the gaze of another person. Most studies have documented that observers show a bias called the overshoot effect when eyes and head are misaligned. The present study addresses whether body information is also used as a cue to compute perceived gaze direction. In Experiment 1, we observed a similar overshoot effect in both behavioral and saccadic responses when manipulating body orientation. In Experiment 2, we explored whether the overshoot effect was due to observers assuming that the eyes are oriented further than the head when head and body orientation are misaligned. We removed horizontal eye information by presenting the stimulus from a side view. Head orientation was now manipulated in a vertical direction and the overshoot effect was replicated. In summary, this study shows that body orientation is indeed used as a cue to determine where another person is looking.
Suryani, Woro Dwi; Sumiyana, Sumiyana
This study raises the issue that information system success could be enhanced by complementingother factors. This study investigates the success of information systems by inducing2the task-technology fit (TTF) and person-job fit (PJF) into the DeLone and McLean model. Thisstudy aims to examine, among the two induced factors, which one is able to explain andimprove the success of the information systems implementation.The results of this study indicate that the TTF explains the models’ goodnes...
Heijden, van der H.
In this paper we develop a conceptual framework around the attitudes and intentions towards using online information service, and we theorise about thedifferences in relationships between regular information systems and online information services, Specifically we hypothesize (1) that affect
Nuno Miguel Barroso Rodrigues
Full Text Available This research investigates the possible existence of an association between the cultural values proposed by Gray (1988 and the qualitative characteristics of financial reporting found in the Review of the Conceptual Framework for Financial Reporting jointly developed by the Financial Accounting Standards Board (FASB and the International Accounting Standards Board (IASB. Data was collected from the annual reports and consolidated accounts for 2013 and 2014 disclosed by non-financial firms listed in the following stock indexes for financial markets of the European Union: PSI-20, IBEX-35, FTSE-100, DAX-30 and OMX-S30. After screening for determined selection criteria, the final population of this study was made up of 137 entities. Content analysis was carried out and, after applying the Mann-Whitney-U test, findings suggest that conservatism is negatively associated with the relevance of financial information. The assessment of the impact of culture on the process of international convergence, as well as the elements associated with this question, are among the scientific contributions of this study.
Full Text Available Abstract Background Key stakeholders regard generic utility instruments as suitable tools to inform health technology assessment decision-making regarding allocation of resources across competing interventions. These instruments require a 'descriptor', a 'valuation' and a 'perspective' of the economic evaluation. There are various approaches that can be taken for each of these, offering a potential lack of consistency between instruments (a basic requirement for comparisons across diseases. The 'reference method' has been proposed as a way to address the limitations of the Quality-Adjusted Life Year (QALY. However, the degree to which generic measures can assess patients' specific experiences with their disease would remain unresolved. This has been neglected in the discussions on methods development and its impact on the QALY values obtained and resulting cost per QALY estimate underestimated. This study explored the content of utility instruments relevant to type 2 diabetes and Alzheimer's disease (AD as examples, and the role of qualitative research in informing the trade-off between content coverage and consistency. Method A literature review was performed to identify qualitative and quantitative studies regarding patients' experiences with type 2 diabetes or AD, and associated treatments. Conceptual models for each indication were developed. Generic- and disease-specific instruments were mapped to the conceptual models. Results Findings showed that published descriptions of relevant concepts important to patients with type 2 diabetes or AD are available for consideration in deciding on the most comprehensive approach to utility assessment. While the 15-dimensional health related quality of life measure (15D seemed the most comprehensive measure for both diseases, the Health Utilities Index 3 (HUI 3 seemed to have the least coverage for type 2 diabetes and the EuroQol-5 Dimensions (EQ-5D for AD. Furthermore, some of the utility instruments
Grindsted, Thomas Skou
This paper investigates the geographies of high frequency trading. Today shares shift hands within micro seconds, giving rise to a form of financial geographies termed algorithmic capitalism. This notion refers to the different spatio-temporalities produced by high frequency trading, under...... the valuation of time. As high frequency trading accelerates financial markets, the paper examines the spatio-temporalities of automated trading by the ways in which the speed of knowledge exploitation in financial markets is not only of interest, but also the expansion between different temporalities....... The paper demonstrates how the intensification of time-space compression produces radical new dynamics in the financial market and develops information rent in HFT as convertible to a time rent and a spatio-temporal rent. The final section discusses whether high frequency trading only responds to crises...
Marcus Clements; Harminder Singh; Antonie Van Eekelen
In this study we examine both informed trading and contraire trading preceding takeover announcements on US target firms. Our findings suggest that both informed trading and contraire trading exists within the period preceding takeover announcements on both the stock and option markets as evident through abnormal returns and trading volumes. In regard to contraire trading, this study investigates possible explanations for its existence including liquidity clustering, falsely informed trading ...
Kim, Sujin; Huber, Jeffrey T
The study characterized three groups with different levels of familiarity with personal health information management (PHIM) in terms of their demographics, health knowledge, technological competency, and information sources and barriers. In addition, the authors examined differences among PHIM groups in subjective self-ratings and objective test scores for health literacy. A total of 202 survey participants were recruited using Amazon's Mechanical Turk (mTurk) service, a crowdsourcing Internet service. Using K-means clustering, three groups with differing levels of familiarity with PHIM were formed: Advanced, Intermediate, and Basic. The Advanced group was the youngest, and the Basic group contained the highest proportion of males, whereas the Intermediate group was the oldest and contained the fewest males. The Advanced group was significantly more likely to engage in provider- or hospital-initiated PHIM activities such as emailing with providers, viewing test results online, and receiving summaries of hospital visits via email or websites than the other groups. The Basic group had significantly lower information management skills and Internet use than the other groups. Advanced and Basic groups reported significant differences in several information barriers. While the Advanced group self-reported the highest general literacy, they scored lowest on an objective health literacy test. For effective personal health records management, it is critical to understand individual differences in PHIM using a comprehensive measure designed to assess personal health records-specific activities. Because they are trained to perform an array of information management activities, medical librarians or patient educators are well positioned to promote the effective use of personal health records by health consumers.
Steiner, Uli; Tuljapurkar, Shripad; Coulson, Tim
Interest in stage-and age structured models has recently increased because they can describe quantitative traits such as size that are left out of age-only demography. Available methods for the analysis of effects of vital rates on lifespan in stage-structured models have not been widely applied ...... examples. Much of our approach relies on trading of time and mortality risk in one stage for time and risk in others. Our approach contributes to the new framework of the study of age- and stage-structured biodemography....
.... This document contains articles on consumer goods and domestic trade within the USSR. Topics include: consumer goods production and distribution, housing and personal services, and consumer sector policy and economics.
Trading volume and the number of trades are both used as proxies for market activity, with disagreement as to which is the better proxy for market activity. This paper investigates this issue using high frequency data for Cisco and Intel in 1997. A number of econometric methods are used, including GARCH augmented with lagged trading volume and number of trades, tests based on moment restrictions, regression analysis of volatility on volume and trades, normality of returns when standardized by...
Winer, E. Samuel; Salem, Taban
Cognitive theories of depression and anxiety have traditionally emphasized the role of attentional biases in the processing of negative information. The dot-probe task has been widely used to study this phenomenon. Recent findings suggest that biased processing of positive information might also be an important aspect of developing psychopathological symptoms. However, despite some evidence suggesting persons with symptoms of depression and anxiety may avoid positive information, many dot-probe studies have produced null findings. The present review used conventional and novel meta-analytic methods to evaluate dot-probe attentional biases away from positive information and, for comparison, toward negative information, in depressed and anxious individuals. Results indicated that avoidance of positive information is a real effect exhibiting substantial evidential value among persons experiencing psychopathology, with individuals evidencing primary symptoms of depression clearly demonstrating this effect. Different theoretical explanations for these findings are evaluated, including those positing threat-processing structures, even-handedness, self-regulation, and reward devaluation, with the novel theory of reward devaluation emphasized and expanded. These novel findings and theory suggest that avoidance of prospective reward helps to explain the cause and sustainability of depressed states. Suggestions for future research and methodological advances are discussed. PMID:26619211
Hahn, U; Hechler, T; Witt, U; Krummenauer, F
A questionnaire was drafted to identify the needs of visually impaired persons and to optimize their access to non-medical support and services. Subjects had to rate a list of 15 everyday activities that are typically affected by visual impairment (for example, being able to orient themselves in the home environment), by indicating the degree to which they perceive each activity to be affected, using a four-stage scale. They had to evaluate these aspects by means of a relevance assessment. The needs profile derived from this is then correlated with individualized information for assistance and support. The questionnaire shall be made available for use by subjects through advisers in some ophthalmic practices and via the internet. The validity of the content of the proposed tool was evaluated on the basis of a survey of 59 experts in the fields of medical, optical and psychological care and of persons involved in training initiatives. The experts were asked to rate the activities by relevance and clarity of the wording and to propose methods to further develop and optimize the content. The validity of the content was quantified according to a process adopted in the literature, based on the parameters Interrater Agreement (IRA) and Content Validity Index (CVI). The results of all responses (n = 19) and the sub-group analysis suggest that the questionnaire adequately reflects the potential needs profile of visually impaired persons. Overall, there was at least 80% agreement among the 19 experts for 93% of the proposed parameterisation of the activities relating to the relevance and clarity of the wording. Individual proposals for optimization of the design of the questionnaire were adopted. Georg Thieme Verlag KG Stuttgart · New York.
Full Text Available Personal Health Records (PHRs) provide a convenient way for individuals to better manage their health. With the advancement in technology, they can be stored via Cloud Computing. These are pay-per-use applications offered as a service over...
... for OMB Review; Comment Request; Personal Protective Equipment Standard for General Industry ACTION... Standard for General Industry,'' to the Office of Management and Budget (OMB) for review and approval for... for eyes, face, head, and extremities; protective clothing; respiratory devices; and protective...
Full Text Available Abstract Background The role of consent for research use of health information is contentious. Most discussion has focused on when project-specific consent may be waived but, recently, a broader range of consent options has been entertained, including broad opt-in for multiple studies with restrictions and notification with opt-out. We sought to elicit public values in this matter and to work toward an agreement about a common approach to consent for use of personal information for health research through deliberative public dialogues. Methods We conducted seven day-long public dialogues, involving 98 participants across Canada. Immediately before and after each dialogue, participants completed a fixed-response questionnaire rating individuals' support for 3 approaches to consent in the abstract and their consent choices for 5 health research scenarios using personal information. They also rated how confident different safeguards made them feel that their information was being used responsibly. Results Broad opt-in consent for use of personal information garnered the greatest support in the abstract. When presented with specific research scenarios, no one approach to consent predominated. When profit was introduced into the scenarios, consent choices shifted toward greater control over use. Despite lively and constructive dialogues, and considerable shifting in opinion at the individual level, at the end of the day, there was no substantive aggregate movement in opinion. Personal controls were among the most commonly cited approaches to improving people's confidence in the responsible use of their information for research. Conclusion Because no one approach to consent satisfied even a simple majority of dialogue participants and the importance placed on personal controls, a mechanism should be developed for documenting consent choice for different types of research, including ways for individuals to check who has accessed their medical record
Willison, Donald J; Swinton, Marilyn; Schwartz, Lisa; Abelson, Julia; Charles, Cathy; Northrup, David; Cheng, Ji; Thabane, Lehana
The role of consent for research use of health information is contentious. Most discussion has focused on when project-specific consent may be waived but, recently, a broader range of consent options has been entertained, including broad opt-in for multiple studies with restrictions and notification with opt-out. We sought to elicit public values in this matter and to work toward an agreement about a common approach to consent for use of personal information for health research through deliberative public dialogues. We conducted seven day-long public dialogues, involving 98 participants across Canada. Immediately before and after each dialogue, participants completed a fixed-response questionnaire rating individuals' support for 3 approaches to consent in the abstract and their consent choices for 5 health research scenarios using personal information. They also rated how confident different safeguards made them feel that their information was being used responsibly. Broad opt-in consent for use of personal information garnered the greatest support in the abstract. When presented with specific research scenarios, no one approach to consent predominated. When profit was introduced into the scenarios, consent choices shifted toward greater control over use. Despite lively and constructive dialogues, and considerable shifting in opinion at the individual level, at the end of the day, there was no substantive aggregate movement in opinion. Personal controls were among the most commonly cited approaches to improving people's confidence in the responsible use of their information for research. Because no one approach to consent satisfied even a simple majority of dialogue participants and the importance placed on personal controls, a mechanism should be developed for documenting consent choice for different types of research, including ways for individuals to check who has accessed their medical record for purposes other than clinical care. This could be done, for
Namoğlu, Nihan; Ulgen, Yekta
Healthcare industry has become widely dependent on information technology and internet as it moves from paper to electronic records. Healthcare Information System has to provide a high quality service to patients and a productive knowledge share between healthcare staff by means of patient data. With the internet being commonly used across hospitals, healthcare industry got its own share from cyber threats like other industries in the world. The challenge is allowing knowledge transfer to hospital staff while still ensuring compliance with security mandates. Working in collaboration with a private hospital in Turkey; this study aims to reveal the essential elements of a 21st century business continuity plan for hospitals while presenting the security vulnerabilities in the current hospital information systems and personal privacy auditing standards proposed by regulations and laws. We will survey the accreditation criteria in Turkey and counterparts in US and EU. We will also interview with medical staff in the hospital to understand the needs for personal privacy and the technical staff to perceive the technical requirements in terms of network security configuration and deployment. As hospitals are adopting electronic transactions, it should be considered a must to protect these electronic health records in terms of personal privacy aspects.
... With Respect to Grave Human Rights Abuses by Governments of Iran and Syria via Information Technology... Human Rights Abuses by the Governments of Iran and Syria via Information Technology,'' whose property... Respect to Grave Human Rights Abuses by the Governments of Iran and Syria via Information Technology...
Sandefer, Ryan Heath
The use of health information and health information technology by consumers is a major factor in the current healthcare systems' effort to address issues related to quality, cost, and access. Patient engagement in the healthcare process through access to information related to diagnoses, procedures, and treatment has the potential to improve…
Nkiko, Christopher; Atinmo, Morayo I.; Michael-Onuoha, Happiness Chijioke; Ilogho, Julie E.; Fagbohun, Michael O.; Ifeakachuku, Osinulu; Adetomiwa, Basiru; Usman, Kazeem Omeiza
Studies have shown inadequate reading materials for the visually impaired in Nigeria. Information technology has greatly advanced the provision of information to the visually impaired in other industrialized climes. This study investigated the extent of application of information technology to the transcription of reading materials for the…
Huang, Yong-Ming; Liu, Chien-Hung; Lee, Chun-Yi; Huang, Yueh-Min
Museum learning has received a lot of attention in recent years. Museum learning refers to people's use of museums to acquire knowledge. However, a problem with information overload has caused in engaging in such learning. Information overload signifies that users encounter a mass of information and need to determine whether certain information…
Vonk, W.G.; Vonk, Warner; Nijenhuis, Guido; van Berkum, Eric C.; Bodmer, Milena; Hulleman, Robert; Hulleman, R.; Viegas, J.M.; Macario, R.
This paper describes the development of a market research method in order to establish the potential demand for a Personal Real Time Travel Information (PRTTI) concept applied to public transport (PT) in Rio de Janeiro, called InfoRio. In order to receive personal travel information on PT services
Trade shows is an increasingly important marketing activity to many companies, but current measures of trade show performance do not adequately capture dimensions important to exhibitors. Based on the marketing literature's outcome and behavior-based control system taxonomy, a model is built...... that captures a outcome-based sales dimension and four behavior-based dimensions (i.e. information-gathering, relationship building, image building, and motivation activities). A 16-item instrument is developed for assessing exhibitors perceptions of their trade show performance. The paper presents evidence...
Xie, Wen-Jie; Li, Ming-Xia; Xu, Hai-Chuan; Chen, Wei; Zhou, Wei-Xing; Stanley, H. Eugene
Traders in a stock market exchange stock shares and form a stock trading network. Trades at different positions of the stock trading network may contain different information. We construct stock trading networks based on the limit order book data and classify traders into k classes using the k-shell decomposition method. We investigate the influences of trading behaviors on the price impact by comparing a closed national market (A-shares) with an international market (B-shares), individuals and institutions, partially filled and filled trades, buyer-initiated and seller-initiated trades, and trades at different positions of a trading network. Institutional traders professionally use some trading strategies to reduce the price impact and individuals at the same positions in the trading network have a higher price impact than institutions. We also find that trades in the core have higher price impacts than those in the peripheral shell.
... court or international tribunal, or an arbitration, or the initiation, conduct, or disposition by the... withheld; (d) Disclose trade secrets and commercial or financial information obtained from a person and...
A first part of this report proposes an overview of trends and predictions. After a synthesis on the sector changes and trends, it indicates and comments the most recent predictions for the consumption of refined oil products and for the turnover of the fuel wholesale market, reports the main highlights concerning the sector's life, and gives a dashboard of the sector activity. The second part proposes the annual report on trends and competition. It presents the main operator profiles and fuel categories, the main determining factors of the activity, the evolution of the sector context between 2005 and 2015 (consumptions, prices, temperature evolution). It analyses the evolution of the sector activity and indicators (sales, turnovers, prices, imports). Financial performances of enterprises are presented. The economic structure of the sector is described (evolution of the economic fabric, structural characteristics, French foreign trade). Actors are then presented and ranked in terms of turnover, of added value, and of result
This paper exposits a model of parallel trading of corporate securities (shares, bonds) and derivatives in which a large trader can sometimes profitably acquire securities with their corporate control rights for the sole purpose of reducing the corporations value and gaining on a net short position created through off-setting derivatives. At other times, the large trader profitably takes a net long position. The large trader requires no private information beyond its own trades. The problem i...
Heynsbergh, Natalie; Botti, Mari; Heckel, Leila; Livingston, Patricia M
Informal carers experience a variety of information and support needs when providing care to someone with cancer. It is unclear when carers seek information and what resources they access to support themselves throughout the cancer trajectory. A sample of 45 carers and 15 oncology nurses were recruited to participate in either focus groups or phone interviews. Carers in the study were more likely to be women (60%), caring for a spouse or partner (64.4%), living with the patient (86.7%), and hold a university degree (46.7%). The majority of oncology nurses were females (66.6%). Findings showed that carers had limited access to adequate information as needs arose. Supports used to address information needs included information booklets, the Internet, and communication with healthcare professionals or with other carers. Barriers in communication between nurses and carers impacted on the adequacy of information received. Participants reported that technology, such as smartphone applications, might be appropriate for improving information and support needs. Caring for someone with cancer is multifaceted. Carers need access to timely information to help them effectively manage patients' needs. Future studies should assess the role of contemporary approaches, such as digital technology, as a solution to the delivery of information and support for carers of people with cancer. © 2018 The Authors. Psycho-Oncology Published by John Wiley & Sons Ltd.
Full Text Available In global supply chains, information about transactions resides in fragmented pockets within business and government systems. The lack of reliable, accurate and complete information makes it hard to detect risks (such as safety, security, compliance and commercial risks and at the same time makes international trade inefficient. The introduction of digital infrastructures that transcend organizational and system domains is driven by the prospect of reducing the fragmentation of information, thereby enabling improved security and efficiency in the trading process. This article develops a digital trade infrastructure framework through an empirically grounded analysis of four digital infrastructures in the trade domain, using the conceptual lens of digital infrastructure.