Academic literature on the topic 'Investigation into Information Requirements of the Social Sciences'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Investigation into Information Requirements of the Social Sciences.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Investigation into Information Requirements of the Social Sciences"

1

Baldauf, Juliana P., Carlos T. Formoso, Patricia Tzortzopoulos, Luciana I. G. Miron, and Joao Soliman-Junior. "Using Building Information Modelling to Manage Client Requirements in Social Housing Projects." Sustainability 12, no. 7 (April 2, 2020): 2804. http://dx.doi.org/10.3390/su12072804.

Full text
Abstract:
This paper proposes a set of guidelines for using Building Information Modelling (BIM) to manage client requirements in the context of social housing projects. A process model representing main activities involved in requirements management has been devised, as well as nine constructs that can be used for assessing the effectiveness of using BIM for client requirements management. The process of managing and modelling clients’ requirements is important to improve value generation, considering the limited resources usually available for social housing projects, as well as the need to deal with the diversity of user profiles. The use of BIM-based tools to support this process can potentially improve the performance of those projects in terms of environmental and social sustainability. Design Science Research was the methodological approach adopted in this investigation. The main outcome of this study, the set of guidelines, emerged from an empirical study carried out in a social housing project from Brazil. This study explores the managerial perspective of client requirements modelling, proposing practical contributions, such as understanding the challenges of managing requirements in social housing projects, and theoretical contributions, such as descriptions of the activities involved in client requirements management and their interactions, and constructs for assessing BIM-based solutions for that problem.
APA, Harvard, Vancouver, ISO, and other styles
2

Cohen, Robin, Karyn Moffatt, Amira Ghenai, Andy Yang, Margaret Corwin, Gary Lin, Raymond Zhao, et al. "Addressing Misinformation in Online Social Networks: Diverse Platforms and the Potential of Multiagent Trust Modeling." Information 11, no. 11 (November 23, 2020): 539. http://dx.doi.org/10.3390/info11110539.

Full text
Abstract:
In this paper, we explore how various social networking platforms currently support the spread of misinformation. We then examine the potential of a few specific multiagent trust modeling algorithms from artificial intelligence, towards detecting that misinformation. Our investigation reveals that specific requirements of each environment may require distinct solutions for the processing. This then leads to a higher-level proposal for the actions to be taken in order to judge trustworthiness. Our final reflection concerns what information should be provided to users, once there are suspected misleading posts. Our aim is to enlighten both the organizations that host social networking and the users of those platforms, and to promote steps forward for more pro-social behaviour in these environments. As a look to the future and the growing need to address this vital topic, we reflect as well on two related topics of possible interest: the case of older adult users and the potential to track misinformation through dedicated data science studies, of particular use for healthcare.
APA, Harvard, Vancouver, ISO, and other styles
3

Hunsucker, R. Laval. "More Appropriate Information Systems and Services for the Social Scientist: Time to Put Our Findings to Work." Evidence Based Library and Information Practice 2, no. 4 (December 7, 2007): 95. http://dx.doi.org/10.18438/b8j59v.

Full text
Abstract:
A review of: Line, Maurice B. “The Information Uses and Needs of Social Scientists: An Overview of INFROSS.” Aslib Proceedings 23.8 (1971): 412-34. Rpt. in Lines of Thought: Selected Papers. Ed. L.J. Anthony. London: Bingley, 1988. 45-66. Objective – The study reported in this article was conceived in order to answer a question of very large scope: What are the information systems and services requirements of social scientists? Inherent in this question was the correlative question: How do social scientists tend to use such systems and services, and what resources and information access approaches do they by choice employ? The choice for such an approach was well-considered, given that 1) there were at the time almost no research results available in this area; 2) the investigators feared that approaches developed earlier for the natural sciences and technology would be uncritically adopted for the social sciences as well; and 3) “the social science information system was developing anyway, and if it was to develop in appropriate ways, some guidance had to be provided quickly” (412). The Investigation into Information Requirements of the Social Sciences (INFROSS) project team believed that there was “no point” (412) in embarking first on a series of more narrowly focused studies. The express intention was to derive findings that would be usable “for the improvement of information systems, or for the design of new ones” (414). For more on the project's conceptual underpinnings, see Line’s “Information Requirements.” Design – Exploratory study employing both quantitative and qualitative approaches over a period of three and a half years, beginning in the autumn of 1967. Setting – The whole of the United Kingdom. The project was funded by that country’s Office for Scientific and Technical Information (OSTI), which had been established in 1965. Subjects – Almost 1,100 randomly selected academic social science researchers, plus a substantial number of government social science researchers and social science “practitioners” (“college of education lecturers, schoolteachers, and individuals in social work and welfare” [413]). For the purposes of the study, the social sciences included anthropology, economics, education, geography, political science, psychology and sociology, but numerous historians and statisticians ultimately participated. Methods – Three methods were employed: surveys, interviews, and direct observation. A “very long” (413) questionnaire was sent to 2,602 of the identified ca. 9,100 social science researchers in the United Kingdom, with 1,089 (41.8%) completed questionnaires returned. Two pilots were conducted with the questionnaire before a definitive version was finalized for the study. Seventy-five interviews were conducted (individually or in groups) with researchers, some of whom had received but not responded to the questionnaire, and some of whom were not included in the questionnaire sample. The interviews with non-responding persons in the sample were for purposes of determining “whether they were non-typical” (413). Fifty additional interviews were conducted (individually or in groups) with practitioners. Day-to-day observation of a small number of social scientists was undertaken in the context of a two and a half year-long experimental information service at Bath University – the first time any UK university had employed information officers for the social sciences. Main results – The results showed a pronounced perception among social scientists that informal “methods of locating references to relevant published information” (416-8, 426-7, 431) are more useful than formal methods (such as consulting the library catalogue, searching library shelves, or searching in indexing and abstracting publications), and an even more pronounced inclination to actually use such informal methods – something of a revelation at the time. Less than one sixth of all sociologists, for example, made use of Sociological Abstracts. On both counts, “consulting librarian” (418) scored worse than all the other ten options. Forty-eight percent of respondents never did it, and only 8% perceived it as a “very useful” (418) method. Nonetheless, 88% of respondents were in principle prepared to delegate at least some of their literature searching, and approximately 45% all of it, “to a hypothetical information officer” (425). More than 75% of the experimental service clients also responded affirmatively to the question: “Should a social science information officer be a high priority,” given limited available resources? (Line, Cunningham, and Evans 73-5). Most subjects found, in any case, that their major “information problems” (427-8) lay not in discovering what relevant documents might exist, but rather in actually getting their hands on them. In only around 20% of the cases were they ultimately successful in doing so. The younger the researcher, the greater the dissatisfaction with her/his own institution’s collection. This study also revealed that academic social scientists drew little distinction between information needs for their research and those for their teaching. There was one social science discipline which clearly stood out from the rest: psychology. Psychologists were the heaviest users of abstracting and indexing (A&I) publications, as well as of the journal literature, published conference proceedings, and research reports. They were also the least tolerant of time lags in the A&I services’ coverage of new publications. Further significant findings were: • A librarian’s way of categorizing research materials was not very meaningful to the researchers themselves. • A&I services were generally used more often for ‘keeping up’ than for retrospective searching. • Consultation with librarians was more common in the less scholarly and more intimate college environment than at research institutions. • A large percentage found library cataloguing insufficiently detailed. The same was true for book indexes. • There was considerable enthusiasm for the idea of a citation index for the social sciences. (N.B.: the SSCI began publication two years after the appearance of this article.) • Among informal methods of scholarly communication and information transfer, conferences (to the investigators’ surprise) rated remarkably low. • Researchers with large personal collections made more use of the library and its services than those with small collections. • Social scientists had little interest in non-English-language materials. Line speaks of “a serious foreign language problem” (424). The INFROSS study produced an enormous amount of data. Only 384 of the computer tables produced were made available in 4 separate reports to OSTI. Only 3 tables, 2 of which were abbreviated, appeared in this article. The further raw data were available on request. Conclusion – Line himself was exceedingly cautious in drawing explicit positive conclusions from the INFROSS results. He even stated that, “No major patterns were detected which could be of use for information system design purposes” (430). He was freer with his negative and provisional assessments. Two years earlier he had written: “It still remains to be established that there is an information problem in the social sciences, or that, if there is, it is of any magnitude” (“Information Requirements” 3). However, it was now clear to Line that information services and systems for the social scientist were indeed quite inadequate, and that (potential) users were not satisfied. He was, furthermore, prepared to go out on a limb with the following assertions and inferences: 1) It was a great strength of INFROSS that it had – in marked contrast to previous science user studies – generated “a mass of comparable [his italics] data within a very broad field, so that every finding can be related to other findings” (430). 2) There are discernable – and exploitable – differences in the information needs and use patterns among the different social science disciplines (which he often also refers to as the different “subjects”). 3) INFROSS had likewise made more evident the nature of similarities across disciplines. 4) There is indeed, from an information/library perspective, a continuum from the ‘harder’ to the ‘softer’ social sciences. 5) Social scientists showed too little awareness, made too little use, and even displayed “insufficient motivation” (431) to make use of available information systems/services. He elsewhere (“Secondary Services” 269, 272) characterizes them as “remarkably complacent,” “even apathetic.” 6) There is good reason to doubt the wisdom of libraries’ investing in user education, since it is bound to have little effect (for further discussion of this matter, one can consult his “The Case for” 385-6 and “Ignoring the User” 86). 7) User-friendly systems amount inevitably to underdeveloped and ineffective systems – and therefore “personal intermediaries,” in sufficient numbers, will remain essential if we wish to offer social scientists really good information services (426, 431). Line believed that INFROSS was only a beginning, and he had already, even before writing this article, begun follow-up research aimed at attaining results really of use for information system design purposes (e.g., the DISISS project). He complained many years later, however, that all this research “indicated means of improvement, but led to no action” (“Social Science Information” 131). In any case, “Bath” (the common shorthand subsequently used to refer to all this research) became, and has remained, the starting point for all subsequent discussions of social science information problems. Several years ago, there was a well-argued international call for “a new and updated version of the INFROSS study” – with an eye to finally using the findings for practical purposes, and aiming “to extend and follow up the research agenda set by the original study” (Janes “Time to Take”).
APA, Harvard, Vancouver, ISO, and other styles
4

G Lebow, David. "A Social Machine for Transdisciplinary Research." Informing Science: The International Journal of an Emerging Transdiscipline 21 (2018): 201–17. http://dx.doi.org/10.28945/4025.

Full text
Abstract:
Aim/Purpose: This paper introduces a Social Machine for collaborative sensemaking that the developers have configured to the requirements and challenges of transdisciplinary literature reviews. Background: Social Machines represent a promising model for unifying machines and social processes for a wide range of purposes. A development team led by the author is creating a Social Machine for activities that require users to combine pieces of information from multiple online sources and file types for various purposes. Methodology: The development team has applied emergent design processes, usability testing, and formative evaluation in the execution of the product road map. Contribution: A major challenge of the digital information age is how to tap into large volumes of online information and the collective intelligence of diverse groups to generate new knowledge, solve difficult problems, and drive innovation. A Transdisciplinary Social Machine (TDSM) enables new forms of interactions between humans, machines, and online content that have the potential to (a) improve outcomes of sensemaking activities that involve large collections of online documents and diverse groups and (b) make machines more capable of assisting humans in their sensemaking efforts. Findings: Preliminary findings suggest that TDSM promotes learning and the generation of new knowledge. Recommendations for Practitioners: TDSM has the potential to improve outcomes of literature reviews and similar activities that require distilling information from diverse online sources. Recommendation for Researchers: TDSM is an instrument for investigating sensemaking, an environment for studying various forms of human and machine interactions, and a subject for further evaluation. Impact on Society: In complex areas such as sustainability and healthcare research, TDSM has the potential to make decision-making more transparent and evidence-based, facilitate the production of new knowledge, and promote innovation. In education, TDSM has the potential to prepare students for the 21st century information economy. Future Research: Research is required to measure the effects of TDSM on cross-disciplinary communication, human and machine learning, and the outcomes of transdisciplinary research projects. The developers are planning a multiple case study using design-based research methodology to investigate these topics.
APA, Harvard, Vancouver, ISO, and other styles
5

Shannon, Heather, and Tricia Scott. "Patients’ Perceptions of Informed Consent for Surgical Procedures in Northern Ireland: A Retrospective Survey." British Journal of Anaesthetic and Recovery Nursing 9, no. 3 (August 2008): 55–65. http://dx.doi.org/10.1017/s1742645608000193.

Full text
Abstract:
AbstractConsent for surgical procedures is in the public domain following the Bristol and Liverpool enquiries [Department of Health, 2001a; House of Commons, 2001]. A legal and ethical principle exists whereby consent must be obtained before commencing a physical examination, starting treatment or physical investigation, or providing care. Non-compliance with this requirement is treated most seriously and professionals who choose to do otherwise risk investigation by the relevant regulatory body and/or legal proceedings. Guidance for health and social care professionals, including students, relates specifically to physical interventions on living individuals. The following research investigated patient satisfaction with the process of declaring informed consent prior to surgery. In 2006, a retrospective descriptive survey of a random sample of 200 patients two months following surgery was conducted in a local hospital in Northern Ireland. Data analysis generated frequencies and percentages using the Statistical Package for the Social Sciences (SPSS). Results suggested that the majority of respondents expressed satisfaction with the amount of information they had received, and most preferred to receive information from a mixture of doctors and nurses. The majority wanted the same amount of information, though there was a significant number who wanted more information. The importance of ensuring the patient receives adequate information prior to surgery/procedure is imperative if the health service is to offer transparency in surgical service provision in line with government guidelines.
APA, Harvard, Vancouver, ISO, and other styles
6

Hoştut, Sibel, and Seçil Deren van het Hof. "Greenhouse gas emissions disclosure: comparing headquarters and local subsidiaries." Social Responsibility Journal 16, no. 6 (April 29, 2020): 899–915. http://dx.doi.org/10.1108/srj-11-2019-0377.

Full text
Abstract:
Purpose This paper aims to highlight the greenhouse gas emissions disclosures in sustainability reports of the automotive industry both from headquarters and Turkish subsidiaries. Further, it aims to understand to what extent these corporations disclose greenhouse gas (GHG) emissions. Design/methodology/approach The sample of the research consists of the global brands Ford, Honda, Hyundai, Daimler and Fiat. Global and national sustainability reports from headquarters and local subsidiaries are examined. To determine the disclosure for emissions content analysis is conducted. The GRI 305: Emissions standard, which sets out the reporting requirements on the issue emissions is used to identify the disclosures both from headquarters and subsidiaries. Findings The sector-specific findings show that all sustainability reports from headquarters disclose much more specific information on greenhouse gas emissions than the reports from subsidiaries. Corporations that offer the most comprehensive sustainability reports disclose the least pages in environmental information. However, presenting the least information does not mean that these reports are rare in quality. Especially, two corporations who offer the least pages on environmental issues fully disclosed the classification of GRI 305: Emissions standard. It can be stated that these corporations emphasize the quality and not the quantity of disclosure. Although, local subsidiaries are not reporting to the extent as headquarters do good applications together with specific information are applied. Originality/value The investigation contributes to the research on corporate social responsibility (CSR) by exploring the GHG emissions disclosures across borders by analyzing sustainability reports of both the headquarters of the automotive industry and their local subsidiaries as the actual production units in Turkey.
APA, Harvard, Vancouver, ISO, and other styles
7

Nkuruziza, Gideon, Francis Kasekende, Samson Omuudu Otengei, Shafic Mujabi, and Joseph Mpeera Ntayi. "An investigation of key predictors of performance of agricultural projects in Sub-Saharan Africa." International Journal of Social Economics 43, no. 7 (July 11, 2016): 676–91. http://dx.doi.org/10.1108/ijse-09-2014-0181.

Full text
Abstract:
Purpose – The purpose of this paper is to examine the ways of improving performance of agricultural projects through stakeholder engagement and knowledge management in a Sub-Saharan context. Design/methodology/approach – Data were collected using a self-administered questionnaire from 342 agricultural projects in Mukono and Wakiso districts in Uganda. Descriptive statistics and inferential statistics were used in the analysis. Findings – The results reveal that stakeholder engagement and knowledge management are valuable intangible resources that significantly influence performance of agricultural projects. The findings, managerial and policy implications are fully discussed in this paper. Originality/value – The authors empirically show that a model that synchronizes stakeholder engagement, knowledge management and performance of agricultural projects is a requirement for promoting sustainable agricultural performance outcomes. This study makes a contribution by providing information that is relevant for filling the practical gap that exists in agricultural projects of Sub-Saharan Africa as well as contributing to the theoretical development of project management discipline.
APA, Harvard, Vancouver, ISO, and other styles
8

Meyer, Ruth, and Huw Vasey. "Immigration, Social Networks, and the Emergence of Ethnic Segmentation in a Low-Skill Labor Market." Social Science Computer Review 38, no. 4 (December 18, 2018): 387–404. http://dx.doi.org/10.1177/0894439318815636.

Full text
Abstract:
Postwar migration to “western” countries has gone hand in hand with the development of ethnically segmented labor markets, particularly in low-skill roles where entry requirements are minimal. While numerous theories have been forwarded as to why such situations occur, it has remained difficult to empirically test the relative impact of the many interacting processes that produce segmentation in the labor market. In this article, we investigate the processes of ethnic segmentation in low-skilled labor markets, where referral hiring is the norm, with particular reference to the role of ethnically homogeneous social networks and forms of discrimination. We employ an agent-based modeling approach, adapting key elements from Waldinger and Lichter’s widely cited networked explanation of ethnic labor market segmentation. This approach allows us to provide a different lens on theories of ethnic labor market segmentation, investigating the relative impacts of different causal processes that are difficult to investigate in this way using other social science approaches. The overall results from our model indicate that ethnically homogeneous social networks have the effect of increasing the level of ethnic segmentation within a referral-based labor market, but that these networks also help immigrant populations grow and protect them from the negative impacts of employer discrimination. Furthermore, these networks have a greater impact on labor market segmentation than discrimination alone. In conclusion, this sociologically informed agent-based model provides important insights into the manner and extent in which changes in social conditions may affect population-level phenomena.
APA, Harvard, Vancouver, ISO, and other styles
9

Svärd, Proscovia. "The woes of Swedish private archival institutions." Records Management Journal 27, no. 3 (November 20, 2017): 275–85. http://dx.doi.org/10.1108/rmj-01-2016-0003.

Full text
Abstract:
Purpose The purpose of this paper is to highlight the long-term preservation challenges that the Swedish private archives are faced with. In as much as they offer a complement to the public archives and hence offer a nuanced national narrative, they lack both financial and human resources to effectively deal with the digital information management environment. Design/methodology/approach Participatory Action Research (PAR) was used to identify the challenges of long-term preservation together with the six private archives institutions that were involved in the collaboration. The collaboration was financially facilitated by the Södertörn University. PAR is defined as a systematic investigation, with the collaboration of those affected by the issue being studied, for the purposes of education and taking action or effecting social change. What is distinctive of PAR is the active involvement of people whose lives are affected by the phenomenon under study. Findings The private archival institutions face long-term preservation challenges such as lack of a digital repository that would facilitate the capture, organization and management of digital records that are of different formats and in a dispersed environment. There are no stringent legal requirements to facilitate the creation and management of the records in a standardized way and the institutions fear that imposing such requirements might deter their clients from depositing archival materials with them. The institutions will also need to espouse the business-oriented archival descriptions where private organizations are concerned to identify relevant archival materials and to promote participatory archival descriptions that would allow the creators to tag their records with metadata. Digital information requires a proactive approach, that is, planning for the long-term preservation of the information before it is created. Private archives need to invest in education packages that will facilitate their clientele’s understanding of the challenges of digital long-term preservation. Research limitations/implications The findings cannot be generalized to all private archival institutions, as it was only six institutions that participated, but the issues discussed are relevant to most archival institutions. Practical implications A lot of research has been carried out in the area of long-term preservation, but researchers have not paid enough attention to the woes of the private archives. To sustain a nuanced national narrative, the private archives need all the support to be able to live up to their mission of preserving archives of the private sector that are not captured by the public archival institutions. This is important in a pluralistic society such as Sweden. Highlighting the challenges might enable the institutions to work towards finding common challenges. Social implications The private archives are part of Sweden’s national heritage. Their preservation matters to the society as a whole and to enhancing the voices of the underrepresented. Originality/value The literature review revealed that not much research has paid attention to the challenges being faced by the private archives. This paper, therefore, contributes to this knowledge gap.
APA, Harvard, Vancouver, ISO, and other styles
10

Aspinal, Fiona, Martin Stevens, Jill Manthorpe, John Woolham, Kritika Samsi, Kate Baxter, Shereen Hussein, and Mohamed Ismail. "Safeguarding and personal budgets: the experiences of adults at risk." Journal of Adult Protection 21, no. 3 (May 30, 2019): 157–68. http://dx.doi.org/10.1108/jap-12-2018-0030.

Full text
Abstract:
Purpose The purpose of this paper is to present findings from one element of a study exploring the relationship between personalisation, in the form of personal budgets (PBs) for publicly funded social care and safeguarding. Design/methodology/approach Semi-structured interviews were conducted with 12 people receiving PBs who had recently been the focus of a safeguarding investigation. Participants were recruited from two English local authority areas and data were subject to thematic analysis. Findings The analysis identified three main themes: levels of information and awareness; safeguarding concerns and processes; and choice and control. Many of the participants in this small study described having experienced multiple forms of abuse or neglect concurrently or repeatedly over time. Research limitations/implications This was a small scale, qualitative study, taking place in two local authorities. The small number of participants may have had strong opinions which may or may not have been typical. However, the study provides some rich data on people’s experiences. Practical implications The findings suggest that adults receiving PBs may need information on an ongoing and repeated basis together with advice on how to identify and address poor quality care that they are arranging for themselves. Practitioners need to be aware of the influence of the level of information received and the interaction of organisational or legal requirements when responding to safeguarding concerns when care being supplied tries to reflect the benefits of choice and control. Originality/value This paper reports original research asking adults with care and support needs about the interaction between two key policies of safeguarding and personalisation.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Investigation into Information Requirements of the Social Sciences"

1

Davidson, Elizabeth J. "Framing information systems requirements : an investigation of social cognitive processes in informatin system delivery." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/11178.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Holland, Jeremy David Hasse. "The requirements analysis & design for a clinical information system : a formal approach." Thesis, City University London, 1995. http://openaccess.city.ac.uk/7705/.

Full text
Abstract:
Following a number of recent far-reaching reforms to the UK NHS, St Thomas' Hospital (where this work was based) introduced a management structure based on the 'Clinical Directorate'. In order to lessen the increased workload commensurate with this measure, it was decided at St Thomas' that a new type of information system - the Directorate Information System or DIS - would introduced. This system was to 'support the business of the clinical directorate'. As part of the DIS project, a small study was set up toinvestigate the problems associated with the introduction of such an information system, and to suggest a design. This thesis reports on the study. The design of information systems in general, and clinical information systems in particular, seems to be an extremely difficult endeavour: many systems development projects end in failure. It is widely considered that the problems lie in inadequate requirements analysis and specification: consequently it was here that the project concentrated most of its efforts. It was recognised that when in use, the terms, quantities, and entities stored and displayed by an information system are interpreted by its users as terms, quantities, and entities in the organisation that is being supported (also called the domain in the thesis). This is perhaps the fundamental requirement of an information system: that it represents the organisation and processes it is to support. To assess the degree to which a design satisfies this requirement entails the development and use of three descriptions, or theories. The first is the theory of the domain; the second is a theory, or specification, of the proposed information system; the third is a theory of the way in which the information system is interpreted into the domain - this is called the interaction theory and is a composition of the first two theories. By inspecting the interaction theory inadequacies in the representation of the domain by the information system can be identified and, if necessary, rectified. There are four ways in which we are encouraged to modify information system designs so that they more accurately reflect the behaviour of the domain. These are called the four developmental motives. Through the use of a well constructed interaction theory, and guided by the desire for system simplicity on one hand and the four developmental motives on the other, an improved information system design can be engineered. For an interaction theory to be constructed and provide useful insight, both the domain theory and the information system specification must be semantically rich. Conventional analysis notations are inadequate for the task: mathematics (in this case set theory) is needed to represent and explore the domain, the information system, and the interpretation of the latter into the former. The construction of a good domain theory is the hardest part of the process. Representing the organisation as it is perceived by workers (in this case clinicians) as a set theoretic construction is fraught with difficulties. However, the judicious use of an adaptation of the scientific method means that we can have increased confidence that the resulting description of the organisation is a reasonable one and is not merely a statement of the analyst's preconceptions and prejudices. The thesis describes in more detail the background to the project, the use of the scientific method to derive a domain theory, the construction of interaction theories, and the engineering of information systems through the use of the four developmental motives. This is done through the use of a large case study which presents, documents, and discusses the theories used in the Directorate Information System project, and describes their evolution.
APA, Harvard, Vancouver, ISO, and other styles
3

Mander, Clare. "An investigation of the accessible information process for adults with learning disabilities." Thesis, University of Portsmouth, 2013. https://researchportal.port.ac.uk/portal/en/theses/an-investigation-of-the-accessible-information-process-for-adults-with-learning-disabilities(3db7a044-0d10-41e9-b578-190fd1b5ca14).html.

Full text
Abstract:
Background: The importance of accessible information within modern learning disability services and the wider society cannot be underestimated. This research aimed to explore both the production and implementation of accessible information for adults with learning disabilities. A novel approach to the accessible information ‘process’ was adopted; resulting in a movement away from specific resource focused research to a process focused approach. The research was conducted in three stages: a comprehensive review of the literature; a qualitative scoping exercise which investigated the firsthand experience of producing and implementing accessible information; and a qualitative investigation of the dynamic behaviours involved in the implementation of health related accessible information at a clinical level. Methodology: The purpose of the first stage was to comprehensively review and critically appraise the literature relating to accessible information, learning disabilities and symbolic development. This was achieved through a detailed search of electronic databases and hand-searches of the grey literature. For the scoping exercise, eighteen participants were recruited from four distinct sampling groups: adults with learning disabilities; staff from a specialist learning disability service; mainstream NHS and local authority staff; and speech and language therapists. Each participant took part in either a semi- structured focus group or interview. Eight participants (four community learning disability nurses and four of their learning disabled clients) took part in a non- participatory observational study. Conversational analysis was used to explore the sequence of both the vocal and non-vocal behaviours. Findings: The literature review revealed that there was a dearth of high quality primary research that has investigated accessible information within the field of learning disabilities. Of the seven relevant primary research studies, two quantitative studies measured the effectiveness of specific accessible resources through pre and post comprehension scores. Three mixed method studies, which were generally poorly reported, described a qualitative process of developing and/or appraising a specific accessible resource or guidelines as well as a quantitative element to investigate its effectiveness. Two qualitative studies attempted to answer broader questions relating to the human dimensions and experiences of accessible information. One explored the use of accessible information with a wider population and the other explored issues relating to the implementation of a specific accessible resource. These findings highlighted the largely resource-focused research and failed to report on accessible information as a process which involves the implementation of such resources. A Framework approach to thematic analysis was used to analyse the data collected from the scoping exercise which led to three main classifications: the ideology of accessible information, accessible information practice and the outcomes of accessible information. Firsthand experience varied across the stakeholders, highlighting differences in the operationalisation of national policies and legislation. The notion of accessible information being relevant to more than just people with learning disabilities was introduced. The data supported the approach of accessible information as a process, although the practice of implementing accessible resources appeared less advanced. Three main clusters of episodes were identified through the conversational analysis of the non-participatory observations. Cluster one related to providing the accessible health information; cluster two to topic development; and cluster three to consent. The findings revealed numerous intricacies in the vocal and non-vocal exchange. The use of an accessible resource appeared to promote joint attention; communicative style appeared influenced by the primary and secondary reported outcomes of the resource; practical considerations of the topic development were evident; and contradictory goals in the decision making process were highlighted. The notion of the implementation of accessible information as a dynamic process was confirmed. Conclusions: The combination of the chosen methodology and subsequent findings generated a novel approach to accessible information within the field of learning disability. In conceptualising accessible information as a process, with a particular focus on the implementation phase, the findings illustrated that it was the implementation phase that allowed for personalisation in providing and developing the information, which was dependent on the intersubjectivity of the communication partner and the person with learning disabilities. This in turn supported the accessibility of the information. These findings would not have been apparent without the movement away from specific resource focused research to a process focused approach.
APA, Harvard, Vancouver, ISO, and other styles
4

Gorham, James Harold. "An Investigation into the Impact of Social Networking on Knowledge Sharing." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1071.

Full text
Abstract:
Today we are experiencing a rapidly increasing trend to use social networking in ways that dramatically affect both our personal and our public lives. This is a global phenomenon being experienced around the world. Exactly how this technology is being used and by whom is of great interest. The problem is that not a lot of research has been conducted to investigate the role social networking sites play to influence a person’s attitude toward sharing knowledge at work. In light of the marked increase in the use of social networking sites and how it is changing the way we live, both at work and during leisure activities, this research examines the factors that influence our attitudes towards knowledge sharing. This study presents the results of a quantitative research to understand the nature and impact of these motivating factors and analyzes how they influence our attitudes regarding the use of social networking sites as a venue in which to share knowledge. This study was conducted by means of an Internet survey. A self-administered questionnaire provided data and assisted in determining the degree to which the use of social networking sites is being used to share knowledge in the workplace. This non-experimental, cross-sectional, correlational study was conducted by means of quantitative research procedures to investigate the impact and influence social networking has on the knowledge transfer process. This research showed how social networking has redefined the collaborative environment that encourages knowledge holders to share their valuable knowledge. The results show that some factors, such as organizational climate, the subjective norm, and knowledge sharing attitudes, have a dominant impact on our behavior regarding the use of social networking sites and our intention to share knowledge with others. Another set of factors influenced our behavior and attitudes, but to a lesser degree, while one factor, anticipation of extrinsic rewards, actually exerted a negative influence on an individual’s knowledge sharing attitudes. The results of this dissertation increased and contributed to our understanding of the relationship between social networking sites and intention to share knowledge and set the stage for follow-on research.
APA, Harvard, Vancouver, ISO, and other styles
5

Sparlin, Linda Rae. "The use of a color code system to promote compliance to diet information." Scholarly Commons, 1988. https://scholarlycommons.pacific.edu/uop_etds/2165.

Full text
Abstract:
The use of color coded prompts to influence students' food selections in choosing a balanced meal was investigated. Yellow, green, blue, and orange dots, representing the four major food groups, grains, fruit and vegetables, dairy, and meat respectively were displayed at the point-of-selection on food entree cards along the serving line of a college dining hall. Two grain servings, two fruit/vegetable servings, one dairy serving, and one meat serving, were suggested as the optimal combination for a balanced meal. The results indicated that the prompts, although noticed and understood by the majority of the students, did not significantly influence their food selections. These findings are inconsistent with earlier studies substantiating the effectiveness of color coded prompts at the point-of-selection in influencing food choices. Implications are discussed.
APA, Harvard, Vancouver, ISO, and other styles
6

Arndorfer, Andrea. "Increasing the Elicitation of Truthful Information from Young Suspects: An Empirical Investigation of the Effects of Temporal Discounting." FIU Digital Commons, 2016. http://digitalcommons.fiu.edu/etd/2989.

Full text
Abstract:
The criminal justice system relies heavily on eliciting truthful information from suspects to solve crimes. A paramount problem with this approach involves the questioning of young suspects. Numerous studies support the conclusion that youth is a risk factor for providing false information during police questioning. The present study examined the influence of temporal discounting (the tendency for individual’s behavior to be influenced more strongly by proximal than distal factors; Berns, Laibson, & Loewenstein, 2007; Critchfield & Kollins, 2001) and other developmental factors (i.e., impulse control, future orientation, and sensation seeking) thought to underlie youths’ increased interrogative vulnerability. In line with previous research examining developmental differences in confession decisions, it was predicted that youth would be more likely than adults to provide false admissions to escape the immediate consequences of the situation. Furthermore, it was predicted that youth demonstrating lower impulse control, deficits in future orientation, and increased sensation seeking would be most likely to engage in this tendency. Using a randomized experimental design 205 adult and youth participants were questioned about their engagement in 20 criminal and unethical behaviors. Participants were told responding “yes” or “no” to these questions would have either immediate consequences (i.e., answering a series of repetitive questions) or future consequences (i.e., meeting with a police officer in a few weeks). Analyses revealed evidence of temporal discounting: Participants provided more admissions when denials, rather than admissions, were punished with immediate consequences. Contrary to hypotheses, age, impulse control, future orientation and sensation seeking did not moderate this relationship. Similarly, hypotheses regarding the relationship between age group, impulse control, and future orientation were unsupported. Compared to adults, adolescents did not exhibit less impulse control or future orientation. The current study was the first to experimentally examine factors thought to underlie youths’ increased proclivity to provide false information in interrogation. Justice system involved youth may differ from youth in the current study in key ways that help explain the lack of support for study hypotheses. Because of these differences, it is imperative that future research focuses on youth who are most at risk of encountering the justice system as suspects.
APA, Harvard, Vancouver, ISO, and other styles
7

Peng, Yong. "Modelling and designing IT-enabled service systems driven by requirements and collaboration." Phd thesis, INSA de Lyon, 2012. http://tel.archives-ouvertes.fr/tel-00737773.

Full text
Abstract:
Compared to traditional business services, IT-enabled services provide more value to customers and providers by enabling traditional business services with Information and Communication Technologies (ICT) and delivering them via e-channels (i.e., Internet, Mobile networks). Although IT-enabled service systems help in co-creating value through collaboration with customers during service design and delivery, they raise challenges when we attempt to understand, design and produce innovative and intelligent IT-enabled services from a multi-disciplinary perspective by including businesses, technology and people for value addition and increasing benefits. Due to their social-technical nature and characteristics (i.e., Intangibility, Inseparability, Perishability, Simultaneity), IT-enabled services also lack common methods to systemize services driven by customer requirements and their satisfactions and co-produce them through ad-hoc collaboration. In this thesis, we propose a middle-out methodology to model, design and systemize advanced IT-enabled service driven by customer requirements and collaboration among all actors to jointly co-create service systems. From a multi-disciplinary perspective, the methodology relies on a multi-view models including a service system reference model, a requirement model and a collaboration model to ensure system flexibility and adaptability to requirement changes and take into account joint efforts and collaboration of all service actors. The reference model aims at a multi-disciplinary description of services (ontological, systematical and characteristic-based descriptions), and formalizing business knowledge related to different domains. As for the requirement model, customer needs are specified in common expressiveness language understandable by all service actors and made possible its top-down propagation throughout service lifecycle and among actors. The collaboration model advocates a data-driven approach, which increases busi-ness, technical and semantic interoperability and exhibits stability in comparison to business processes centric approaches. Finally, the collaboration hinges on de-livery channels expressed as data flows and encapsulating business artifacts as per which business rules are generated to invoke underlying software components.
APA, Harvard, Vancouver, ISO, and other styles
8

White, Nathan. "An Empirical Investigation into the Role that Boredom, Relationships, Anxiety, and Gratification (BRAG) Play in a Driver’s Decision to Text." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/71.

Full text
Abstract:
Texting while driving is a growing problem that has serious, and sometimes fatal, consequences. Despite laws enacted to curb this behavior, the problem continues to grow. Discovering factors that can reduce such risky behavior can significantly contribute to research, as well as save lives and reduce property damage. This study developed a model to explore the motivations that cause a driver to send messages. The model evaluates the effects that boredom, social relationships, social anxiety, and social gratification (BRAG) have upon a driver’s frequency of typing text messages. In addition, the perceived severity of the consequences and the presence of a passenger were also be evaluated for any moderating effects on a driver’s texting. Furthermore, a set of hypotheses based on the BRAG model were presented. To investigate these hypotheses, a survey instrument was developed and data was collected from 297 respondents at a mid-sized regional university in the Pacific North west of the United States. Prior to the distribution of the survey, an expert panel and a pilot study were used to ensure the reliability of the instrument. Partial least squares structured equation modeling (PLS-SEM) was used to evaluate the predictive validity of the BRAG model. This evaluation included an assessment of the reflective measures, as well as a detailed analysis of the structural model. Additionally, knowledge visualization techniques were used to emphasize the significance of the findings. The results of this analysis showed that the social gratification one receives from maintaining their social relationships is a significant predictor of texting while driving. Additionally, the results showed that drivers continued to text, regardless of the consequences. However, boredom and social anxiety were not significant predictors of texting while driving. This study makes important contributions to the information systems body of knowledge and has implications for state and local lawmakers, in addition to public health officials. Prior research has shown that bored or anxious individuals use texting to relieve those feelings of discomfort. However, this study did not extend those findings to drivers. As this study found that laws banning texting while driving do not deter this behavior, public health officials and lawmakers should investigate other means of deterring texting while driving, given the significant impact it has on the increase of fatal car accidents in recent years.
APA, Harvard, Vancouver, ISO, and other styles
9

Wint, Noel Jr. "An Investigation of Socio-technical Components of Knowledge Management System (KMS) Usage." NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/961.

Full text
Abstract:
Existing literature indicates that although both academics and practitioners recognize knowledge management (KM) as a source of competitive advantage, users are not always willing to use a knowledge management system (KMS). Because of the social nature of knowledge transfer, a KMS can be considered a socio-technical system. Many explanations have been presented for this failure to utilize the KMS. These explanations include a number of the socio-technical factors relating to people, processes, and technologies. While these factors may have significant explanatory power when examined independently, existing studies have not sufficiently addressed the interactions among all three socio-technical factors or their impacts on KMS usage. The goal of this study was to develop a comprehensive understanding of socio-technical factors that impact KMS usage within decision support systems (DSS). A comprehensive framework was presented that will be helpful in developing and improving KMS initiatives and thus improving KM across the organization. This study identified factors of people (self-efficacy, social ties, and ease of use), processes (leadership, culture/climate, and governance), and technologies (system & information quality, and technology fit) and their influence on KMS system usage. Analysis for this problem required a causal, non-contrived field study employing structural equation modeling. Founded on socio-technical systems theory, nine hypotheses were proposed. Data was collected using a 36 item survey distributed to KMS users from a variety of industries in the United States. Confirmatory factor analysis and an eight-stage structural equation modeling procedure were used to analyze 97 usable responses. The results confirmed that technology-oriented factors predicted knowledge seeking and contributing in DSS. Furthermore, significant positive relationships were confirmed between certain sociotechnical factors including: (1) people and process, (2) people and technology, (3) processes and technology, (4) processes and people, (5) technology and people, and (6) technology and processes. These findings extend the relevance and statistical power of existing studies on KMS usage. This study indicated that the most important concerns for increasing KMS usage were system quality, information quality, and technology fit. Results also confirmed that in the context of this study, people-oriented factors (self-efficacy, social ties, and ease of use/usefulness) and organizational process factors (leadership, organizational culture/climate, and governance) were not critical factors directly responsible for increasing KMS usage. However, the relationships among socio-technical factors all had positive significant relationships. Therefore, investments in people and process-oriented factors will create a more favorable perspective on technology-oriented factors, which in turn can increase KMS usage. On a practical front, this study provided indicators to managers regarding a number of desirable and undesirable conditions that should be taken into consideration when developing or implementing knowledge management initiatives and the systems to support them. This study offered an original contribution to the existing bodies of knowledge on socio-technical factors and KMS usage behavior. The constructs presented in this study highlighted the significance of social and technical relationships in understanding knowledge seeking and contribution in a decision-driven organization.
APA, Harvard, Vancouver, ISO, and other styles
10

Lol, Wilford Gibson. "An investigation of the impact of routing protocols on MANETs using simulation modelling a dissertation submitted to Auckland University of Technology in partial fufilment of the requirements for the degree of Master of Computer and Information Sciences, 2008 /." Click here to access this resource online, 2008. http://hdl.handle.net/10292/718.

Full text
Abstract:
Thesis (MCIS - Computer and Information Sciences) -- AUT University, 2008.
Includes bibliographical references. Also held in print ( xi, 105 leaves : ill. ; 30 cm.) in the Archive at the City Campus (T 621.382 LOL)
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Investigation into Information Requirements of the Social Sciences"

1

Ontario. Esquisse de cours 12e année: Sciences snc4m cours préuniversitaire. Vanier, Ont: CFORP, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ontario. Esquisse de cours 12e année: Sciences de l'activité physique pse4u cours préuniversitaire. Vanier, Ont: CFORP, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ontario. Esquisse de cours 12e année: Sciences de la Terre et de l'espace ses4u cours préuniversitaire. Vanier, Ont: CFORP, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ontario. Esquisse de cours 12e année: Le droit canadien et international cln4u cours préuniversitaire. Vanier, Ont: CFORP, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ontario. Esquisse de cours 12e année: Étude de l'alimentation et de la nutrition hfa4m cours préuniversitaire. Vanier, Ont: CFORP, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ontario. Esquisse de cours 12e année: Atelier d'écriture fae4o cours ouvert. Vanier, Ont: CFORP, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ontario. Esquisse de cours 12e année: Histoire de l'Occident et du monde chy4u. Vanier, Ont: CFORP, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ontario. Esquisse de cours 12e année: Géométrie et mathématiques discrètes mga4u cours préuniversitaire. Vanier, Ont: CFORP, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ontario. Esquisse de cours 12e année: Français des affaires faf4o. Vanier, Ont: CFORP, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ontario. Esquisse de cours 12e année: L'église et la culture hre4m. Vanier, Ont: CFORP, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Investigation into Information Requirements of the Social Sciences"

1

Nikolopoulos, Chris, Deitra Kuester, Mark Sheehan, and Sneha Dhanya. "Investigation on Requirements of Robotic Platforms to Teach Social Skills to Individuals with Autism." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 65–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19385-9_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Williams, John G. "Healthcare Information Systems – Requirements and Vision." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 203. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-11284-3_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Abdul Rahman, Noorihan, Shamsul Sahibuddin, Azlena Haron, and Syarifah Adilah Mohamed Yusoff. "A Preliminary Investigation on Managing Volatile Requirements in E-Learning Web Service." In Regional Conference on Science, Technology and Social Sciences (RCSTSS 2016), 205–15. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0074-5_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Slingerland, Geertje, Stephan Lukosch, Tina Comes, and Frances Brazier. "Exploring Requirements for Joint Information Sharing in Neighbourhoods: Local Playgrounds in The Hague." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 306–15. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-06134-0_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dulhare, Uma N., and Shaik Rasool. "Digital Evidence in Practice." In Digital Forensics and Forensic Investigations, 259–80. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-3025-2.ch018.

Full text
Abstract:
Advanced Evidence is any data of probative quality that is either put away or transmitted in a double frame. In today's universe of propelling advances, more data is being produced, put away and appropriated by electronic means. This requires numerous offices to build the utilization of advanced proof social affair as a regular or standard instrument in their fight against violations. Computerized proof can be helpful in an extensive variety of criminal examinations. Numerous computerized gadgets productively track client action; it is likewise conceivable to recoup erased records, both of which may influence a criminal examination. Data is similar to the backbone for associations of all sizes, sorts and industry areas. It should be overseen and secured, and when there is a break or wrongdoing conferred including spilled or stolen data, the culprits must be recognized and indicted. Expanded Internet entrance has given exponential ascent in refined assaults on Information Technology framework. Keeping in mind the end goal to make our IT framework versatile against the dangers, there is a requirement for Cyber Security. Digital criminology, likewise called PC legal sciences or advanced legal sciences, is the procedure of extricating data and information from PCs to serve as computerized proof - for common purposes or, by and large, to demonstrate and lawfully indict cybercrime. PC crime scene investigation has as of late increased noteworthy Popularity with numerous nearby law authorization organizations. It is at present utilized in extortion, robbery, drug authorization and each other implementation action. Law implementation organizations confront another test in managing digital wrongdoings. Criminal acts are being perpetrated and the confirmation of these exercises is recorded in electronic structure. Also, wrongdoings are being dedicated in the internet. Proof in these violations is quite often recorded in computerized design. It is critical that PC security experts know about a percentage of the necessities of the lawful framework and comprehends the creating field of PC legal sciences. It will clarify why Digital Evidence is a vital part of any crime scene investigation examination and why strict approaches and methodology must exist to manage the administration of confirmation. Digital examination conventions offer specialists some assistance with gathering computerized proof in a forensically substantial manner. Computerized proof is “information that is made, controlled, put away or conveyed by any gadget, PC or PC framework or transmitted over a correspondence framework that is significant to the procedure.” The section will give a brief of how Digital confirmation starts from a large number of sources including seized PC hard-drives and reinforcement media, ongoing email messages, talk room logs, ISP records, site pages, advanced system activity, nearby and virtual databases, computerized catalogs, remote gadgets, memory cards, and computerized cameras. The advanced confirmation is not virtual exist, but rather there are some different components to search for, the computerized proof can be duplicated with boundless contrasts, can be altered effortlessly, difficult to be distinguished the first asset, can be incorporated information check, and can't be seen straightforwardly without specialized procedure. The trust value of this computerized information is a basic question that advanced scientific analysts must consider. For this reason, part “advanced proof” partitioned into seven classifications. This part gives the learning important to handle advanced confirmation in its numerous structures, to utilize this proof to construct a case, to manage the difficulties connected with this kind of confirmation and ways to deal with taking care of computerized proof put away and transmitted utilizing systems as a part of a way that is well on the way to be acknowledged by law. The section presents the procedure of distinguishing, saving, examining and displaying computerized proof in a way that is legitimately satisfactory. It will clarify why Digital Evidence is an imperative part of any crime scene investigation examination and why strict arrangements and techniques must exist to manage the administration of proof. The section will give a brief of how Digital confirmation starts from a huge number of sources including seized PC hard-drives. Further the part will contain order of computerized confirmations where Digital proof can be grouped, looked at, and individualized in a few ways. One of those courses is by the substance of the confirmation. The later Section in the part will contain how the advanced proofs are gathered, what techniques and apparatuses can be utilized to safeguard the computerized confirmations.
APA, Harvard, Vancouver, ISO, and other styles
6

Teremko, Vasyl. "PRINT AS THE CONTEXTUAL FACTOR OF MODERN AGE." In Integration of traditional and innovation processes of development of modern science. Publishing House “Baltija Publishing”, 2020. http://dx.doi.org/10.30525/978-9934-26-021-6-10.

Full text
Abstract:
This article traces the transformations of individual, caused by informational interventions in his\her mental world, intensified by the development of print as a technological centre of the Industrial Era media system, followed the explosion of consumer psychology, replacing individuality by the “mass person” perplexed by “fashion epoch”. A humanistic ideal, self-sufficient, self-sustained individual appears in such worldview systems as a consumer. A set of individuals selected by specific criteria appears as the target audience, the mass consumer, chosen to buy everything from tastes and goods to ideologies, political doctrines, ways of life, fashion, government, friends, enemies and even war or peace. The production of such consumers started with the phenomena of scaling and unification, intensified by the books-bestsellers, mass media, tabloids, glossy and glamorous magazines, entertainment television, pop music, blockbusters and TV series. Based on the investigation of individual and mass subconscious psychological mechanisms and impact techniques, taste and critical thinking was consistently destroyed, which drove to imposing absolute consumerism as continuously stimulated insatiability of needs, leading to the consumption loop, where requirements are impossible to satisfy. Intellectually simplified, spiritually exhausted media signals, aimed at the instinctively emotional spheres of individuals, steadily lowered the horizon of personal expectations and the thresholds of information accessibility, weakened critical thinking, blurred ethical filters, levelled tastes and transformed the audience into a mass. Furthermore, despite the specific differences, this trend has penetrated all social and individual spheres. Under the pressure of aggressive reality and communication campaigns, a holistic, harmonious, self-aware, intentional personality lost its value for itself. The process, begun in the New Age, was a kind of denial of its foundations and prepared an individual for the transition to the information age.
APA, Harvard, Vancouver, ISO, and other styles
7

Pessa, Eliano. "Neural Network Models." In Relational Methodologies and Epistemology in Economics and Management Sciences, 100–127. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9770-6.ch003.

Full text
Abstract:
The Artificial Neural Network (ANN) models gained a wide popularity owing to a number of claimed advantages such as biological plausibility, tolerance with respect to errors or noise in the input data, learning ability allowing an adaptability to environmental constraints. Notwithstanding the fact that most of these advantages are not typical only of ANNs, engineers, psychologists and neuroscientists made an extended use of ANN models in a large number of scientific investigations. In most cases, however, these models have been introduced in order to provide optimization tools more useful than the ones commonly used by traditional Optimization Theory. Unfortunately, just the successful performance of ANN models in optimization tasks produced a widespread neglect of the true – and important – objectives pursued by the first promoters of these models. These objectives can be shortly summarized by the manifesto of connectionist psychology, stating that mental processes are nothing but macroscopic phenomena, emergent from the cooperative interaction of a large number of microscopic knowledge units. This statement – wholly in line with the goal of statistical mechanics – can be readily extended to other processes, beyond the mental ones, including social, economic, and, in general, organizational ones. Therefore this chapter has been designed in order to answer a number of related questions, such as: are the ANN models able to grant for the occurrence of this sort of emergence? How can the occurrence of this emergence be empirically detected? How can the emergence produced by ANN models be controlled? In which sense the ANN emergence could offer a new paradigm for the explanation of macroscopic phenomena? Answering these questions induces to focus the chapter on less popular ANNs, such as the recurrent ones, while neglecting more popular models, such as perceptrons, and on less used units, such as spiking neurons, rather than on McCulloch-Pitts neurons. Moreover, the chapter must mention a number of strategies of emergence detection, useful for researchers performing computer simulations of ANN behaviours. Among these strategies it is possible to quote the reduction of ANN models to continuous models, such as the neural field models or the neural mass models, the recourse to the methods of Network Theory and the employment of techniques borrowed by Statistical Physics, like the one based on the Renormalization Group. Of course, owing to space (and mathematical expertise) requirements, most mathematical details of the proposed arguments are neglected, and, to gain more information, the reader is deferred to the quoted literature.
APA, Harvard, Vancouver, ISO, and other styles
8

Dulhare, Uma N., and Shaik Rasool. "Digital Evidence in Practice." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 119–39. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0193-0.ch008.

Full text
Abstract:
Advanced Evidence is any data of probative quality that is either put away or transmitted in a double frame. In today's universe of propelling advances, more data is being produced, put away and appropriated by electronic means. This requires numerous offices to build the utilization of advanced proof social affair as a regular or standard instrument in their fight against violations. Computerized proof can be helpful in an extensive variety of criminal examinations. Numerous computerized gadgets productively track client action; it is likewise conceivable to recoup erased records, both of which may influence a criminal examination. Data is similar to the backbone for associations of all sizes, sorts and industry areas. It should be overseen and secured, and when there is a break or wrongdoing conferred including spilled or stolen data, the culprits must be recognized and indicted. Expanded Internet entrance has given exponential ascent in refined assaults on Information Technology framework. Keeping in mind the end goal to make our IT framework versatile against the dangers, there is a requirement for Cyber Security. Digital criminology, likewise called PC legal sciences or advanced legal sciences, is the procedure of extricating data and information from PCs to serve as computerized proof - for common purposes or, by and large, to demonstrate and lawfully indict cybercrime. PC crime scene investigation has as of late increased noteworthy Popularity with numerous nearby law authorization organizations. It is at present utilized in extortion, robbery, drug authorization and each other implementation action. Law implementation organizations confront another test in managing digital wrongdoings. Criminal acts are being perpetrated and the confirmation of these exercises is recorded in electronic structure. Also, wrongdoings are being dedicated in the internet. Proof in these violations is quite often recorded in computerized design. It is critical that PC security experts know about a percentage of the necessities of the lawful framework and comprehends the creating field of PC legal sciences. It will clarify why Digital Evidence is a vital part of any crime scene investigation examination and why strict approaches and methodology must exist to manage the administration of confirmation. Digital examination conventions offer specialists some assistance with gathering computerized proof in a forensically substantial manner. Computerized proof is “information that is made, controlled, put away or conveyed by any gadget, PC or PC framework or transmitted over a correspondence framework that is significant to the procedure.” The section will give a brief of how Digital confirmation starts from a large number of sources including seized PC hard-drives and reinforcement media, ongoing email messages, talk room logs, ISP records, site pages, advanced system activity, nearby and virtual databases, computerized catalogs, remote gadgets, memory cards, and computerized cameras. The advanced confirmation is not virtual exist, but rather there are some different components to search for, the computerized proof can be duplicated with boundless contrasts, can be altered effortlessly, difficult to be distinguished the first asset, can be incorporated information check, and can't be seen straightforwardly without specialized procedure. The trust value of this computerized information is a basic question that advanced scientific analysts must consider. For this reason, part “advanced proof” partitioned into seven classifications. This part gives the learning important to handle advanced confirmation in its numerous structures, to utilize this proof to construct a case, to manage the difficulties connected with this kind of confirmation and ways to deal with taking care of computerized proof put away and transmitted utilizing systems as a part of a way that is well on the way to be acknowledged by law. The section presents the procedure of distinguishing, saving, examining and displaying computerized proof in a way that is legitimately satisfactory. It will clarify why Digital Evidence is an imperative part of any crime scene investigation examination and why strict arrangements and techniques must exist to manage the administration of proof. The section will give a brief of how Digital confirmation starts from a huge number of sources including seized PC hard-drives. Further the part will contain order of computerized confirmations where Digital proof can be grouped, looked at, and individualized in a few ways. One of those courses is by the substance of the confirmation. The later Section in the part will contain how the advanced proofs are gathered, what techniques and apparatuses can be utilized to safeguard the computerized confirmations.
APA, Harvard, Vancouver, ISO, and other styles
9

Dulhare, Uma N., and Shaik Rasool. "Digital Evidence in Practice." In Cyber Warfare and Terrorism, 1–22. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch001.

Full text
Abstract:
Advanced Evidence is any data of probative quality that is either put away or transmitted in a double frame. In today's universe of propelling advances, more data is being produced, put away and appropriated by electronic means. This requires numerous offices to build the utilization of advanced proof social affair as a regular or standard instrument in their fight against violations. Computerized proof can be helpful in an extensive variety of criminal examinations. Numerous computerized gadgets productively track client action; it is likewise conceivable to recoup erased records, both of which may influence a criminal examination. Data is similar to the backbone for associations of all sizes, sorts and industry areas. It should be overseen and secured, and when there is a break or wrongdoing conferred including spilled or stolen data, the culprits must be recognized and indicted. Expanded Internet entrance has given exponential ascent in refined assaults on Information Technology framework. Keeping in mind the end goal to make our IT framework versatile against the dangers, there is a requirement for Cyber Security. Digital criminology, likewise called PC legal sciences or advanced legal sciences, is the procedure of extricating data and information from PCs to serve as computerized proof - for common purposes or, by and large, to demonstrate and lawfully indict cybercrime. PC crime scene investigation has as of late increased noteworthy Popularity with numerous nearby law authorization organizations. It is at present utilized in extortion, robbery, drug authorization and each other implementation action. Law implementation organizations confront another test in managing digital wrongdoings. Criminal acts are being perpetrated and the confirmation of these exercises is recorded in electronic structure. Also, wrongdoings are being dedicated in the internet. Proof in these violations is quite often recorded in computerized design. It is critical that PC security experts know about a percentage of the necessities of the lawful framework and comprehends the creating field of PC legal sciences. It will clarify why Digital Evidence is a vital part of any crime scene investigation examination and why strict approaches and methodology must exist to manage the administration of confirmation. Digital examination conventions offer specialists some assistance with gathering computerized proof in a forensically substantial manner. Computerized proof is “information that is made, controlled, put away or conveyed by any gadget, PC or PC framework or transmitted over a correspondence framework that is significant to the procedure.” The section will give a brief of how Digital confirmation starts from a large number of sources including seized PC hard-drives and reinforcement media, ongoing email messages, talk room logs, ISP records, site pages, advanced system activity, nearby and virtual databases, computerized catalogs, remote gadgets, memory cards, and computerized cameras. The advanced confirmation is not virtual exist, but rather there are some different components to search for, the computerized proof can be duplicated with boundless contrasts, can be altered effortlessly, difficult to be distinguished the first asset, can be incorporated information check, and can't be seen straightforwardly without specialized procedure. The trust value of this computerized information is a basic question that advanced scientific analysts must consider. For this reason, part “advanced proof” partitioned into seven classifications. This part gives the learning important to handle advanced confirmation in its numerous structures, to utilize this proof to construct a case, to manage the difficulties connected with this kind of confirmation and ways to deal with taking care of computerized proof put away and transmitted utilizing systems as a part of a way that is well on the way to be acknowledged by law. The section presents the procedure of distinguishing, saving, examining and displaying computerized proof in a way that is legitimately satisfactory. It will clarify why Digital Evidence is an imperative part of any crime scene investigation examination and why strict arrangements and techniques must exist to manage the administration of proof. The section will give a brief of how Digital confirmation starts from a huge number of sources including seized PC hard-drives. Further the part will contain order of computerized confirmations where Digital proof can be grouped, looked at, and individualized in a few ways. One of those courses is by the substance of the confirmation. The later Section in the part will contain how the advanced proofs are gathered, what techniques and apparatuses can be utilized to safeguard the computerized confirmations.
APA, Harvard, Vancouver, ISO, and other styles
10

Sasikala R. and Sureshkumar N. "Research Investigation and Analysis on Behavioral Analytics, Neuro Imaging, and Pervasive Sensory Algorithms and Techniques for Autism Diagnosis." In Advances in Healthcare Information Systems and Administration, 206–19. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7071-4.ch009.

Full text
Abstract:
Interdisciplinary research on autism diagnosis and training for the autistic children are current requirements. Behavioral analytics are the techniques followed by pediatricians for identifying ASD in children. However, the techniques successfully accepted by the pediatricians worldwide would be useful for the parents and pediatricians only for the elementary school-aged children, and the system is not helping for early diagnose among children of age 2. Machine learning, image processing, and pervasive techniques are trending for early diagnosis of ASD. Hence, the chapter has done a research-based survey and detailed analysis on behavioral analytics algorithms, neuro imaging, and eye tracking techniques for early diagnosis. The behavioral analytics survey mainly focuses on social and meta-cognitive skills, and the input dataset has been taken from parents, trainers, teachers, and peer groups. The chapter also identifies that computing technologies with neuro-imaging and pervasive techniques are better than the behavioral skill analysis for early diagnosis.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Investigation into Information Requirements of the Social Sciences"

1

Chen, Yuting. "Investigation on Schema Theory Through Examining Information Processing." In 2021 6th International Conference on Social Sciences and Economic Development (ICSSED 2021). Paris, France: Atlantis Press, 2021. http://dx.doi.org/10.2991/assehr.k.210407.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Torres, Russell, Natalie Gerhart, and Arash Negahban. "Combating Fake News: An Investigation of Information Verification Behaviors on Social Networking Sites." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2018. http://dx.doi.org/10.24251/hicss.2018.499.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhao, Lili, Lishu Zhang, and Dake Wang. "Exploring the Requirements of Modern Information Service on Librarians." In Proceedings of the 2nd International Conference on Contemporary Education, Social Sciences and Ecological Studies (CESSES 2019). Paris, France: Atlantis Press, 2019. http://dx.doi.org/10.2991/cesses-19.2019.204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Jing. "An Investigation of Computer Science and Engineering Major Students' Social Cultural Competence." In 2011 International Conference on Computational and Information Sciences (ICCIS). IEEE, 2011. http://dx.doi.org/10.1109/iccis.2011.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Aurigemma, Salvatore, and Thomas Mattson. "The Role of Social Status and Controllability on Employee Intent to Follow Organizational Information Security Requirements." In 2015 48th Hawaii International Conference on System Sciences (HICSS). IEEE, 2015. http://dx.doi.org/10.1109/hicss.2015.424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bhattacharyya, Samadrita, and Indranil Bose. "Time-contingent Impact of Inconsistent Action-based Information Cues on Social Commerce Purchases: An Experimental Investigation." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2019. http://dx.doi.org/10.24251/hicss.2019.609.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Salehan, Mohammad, and Dan Kim. "An Investigation of Predictors of Information Diffusion in Social Media: Evidence from Sentiment Mining of Twitter Messages." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2020. http://dx.doi.org/10.24251/hicss.2020.098.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nursanti, Ida, and Muhammad Rifqi Ma’arif. "An Investigation of Health Information Dissemination on Social Media: Content Analysis of CegahStunting Campaign on Instagram." In International Conference on Health and Medical Sciences (AHMS 2020). Paris, France: Atlantis Press, 2021. http://dx.doi.org/10.2991/ahsr.k.210127.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cai, Wenjun, and Huiyu Guo. "Requirements of the Diversification of Media Forms for Library and Information Work in the New Era." In Proceedings of the 2nd International Conference on Contemporary Education, Social Sciences and Ecological Studies (CESSES 2019). Paris, France: Atlantis Press, 2019. http://dx.doi.org/10.2991/cesses-19.2019.214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Schneider, Clemens, Sebastian Braun, Torsten Klette, Steffen Härtelt, and Alexander Kratzsch. "Development of Integration Methods for Thermal Energy Storages Into Power Plant Processes." In ASME 2016 10th International Conference on Energy Sustainability collocated with the ASME 2016 Power Conference and the ASME 2016 14th International Conference on Fuel Cell Science, Engineering and Technology. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/es2016-59266.

Full text
Abstract:
Germany’s current energy policy is focused on the replacement of the conventional powered electrical energy supply system by renewable sources. This leads to increasing requirements on the flexibility for the conventional thermal power plants. Larger differences between energy supply from renewable energy sources and energy demand in the grid lead to high dynamic requirements with respect to the load change transients. Furthermore, a reduction of the required minimum load of existing thermal power plants is necessary. The existing power plants are indispensable for securing the network stability of the power grid. Accordingly, activities to improve the flexibility of existing power plants are required. By the use of thermal energy storage (TES) it is possible to increase the load change transient. Furthermore, it is possible to temporarily provide an increased generator power and reduce the minimum technical load of the unit. Currently, there is no closed methodical approach for the load profile-dependent and location-based dimensioning and integration of TES into thermal power plants. The aim is to generate contributions for the development of a universal design method. This requires the provision of characteristics for dimensioning and integration of TES into thermal processes. For this purpose, it is necessary to derive quantifiable information on the required capacity, performance and stationary and dynamic operating conditions. Starting from analyzing the anticipated, site-specific load profiles the derivation of concepts for technical implementation, feedback on the process and cost of the thermal storage unit takes place. In order to investigate the technical feasibility, the implementation of storage and the associated control concepts as well as to validate the developed design models, the test facility THERESA has been built at the University of Applied Sciences in Zittau (Germany). The acronym THERESA is the abbreviation for thermal energy storage facility. This test facility includes a reconstructed thermal water-steam process, similar to a power plant with integrated TES. The test facility is unique in Germany and enables the delivery of saturated steam up to 160 bars at 347 ° and superheated steam up to 60 bars at 350 °C with an overall thermal power of 640 kW. The design, planning and construction of the facility took 3 years and required an investment volume of 3 mill. Euro. The facility includes two preheater stages, steam generator, super heater, direct TES with mixing preheater and a heat sink. The TES with a volume of 600 L as well as the mixing preheater are prototypes which developed for the special requirements of the facility. Based on this facility, it is possible to investigate methods for the flexibilization of thermal power plants with TES under realistic parameters. Furthermore, the test facility allows the development of control and regulatory approaches as well as the validation of simulation models for process expansion of thermal power plants. Initial investigations show the impact of a simulated load reduction at the heat sink on the system behavior. Here, the load reduction takes place from the heat sink in the storage without changing the steam production. The development and construction of the test facility were funded by the Free State of Saxony and the European Union. The further work on the development of the integration methods are funded by the European Social Fund ESF.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography