首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
The research objective of this paper is to develop a storytelling‐based knowledge‐sharing application that enables users to co‐create their own stories for both individuals and groups. To address this, a design science research methodology was applied for elucidating users' requirements. As empirical evidence, a case study was conducted on the children's book industry to synthesize a knowledge‐sharing design application named “StoryWeb”. Usability tests were conducted to reconfigure users' feedback and suggestions after two StoryWeb prototypes were developed. This study makes three main contributions. First, it empirically tests individual's or group's creativity and co‐creation by a view of knowledge sharing. Second, it methodologically applies a design thinking approach into a knowledge‐sharing study. Third, it also practically suggests feasible guidelines for the creativity and innovation research community on which features of storytelling‐based applications can be configured.  相似文献   

3.
This paper elaborates the concept of citizens' crisis‐coping strategies, using data from a qualitative study of people who have experienced a real crisis plus discussions of simulated warning messages. The analysis results suggest that, to emotionally cope with a crisis, citizens may need more than institutionally framed warnings. They may either seek information from informal information networks or simply take their own response action. The paper concludes that the use of alternative sources and channels of warning messages would help people to cope, emotionally and cognitively, with crises. These alternatives would increase the efficacy of institutional crisis communication plans and consequently the public's response to crisis messages.  相似文献   

4.
With social media at the forefront of today's media context, citizens may perceive they don't need to actively seek news because they will be exposed to news and remain well‐informed through their peers and social networks. We label this the “news‐finds‐me perception,” and test its implications for news seeking and political knowledge: “news‐finds‐me effects.” U.S. panel‐survey data show that individuals who perceive news will find them are less likely to use traditional news sources and are less knowledgeable about politics over time. Although the news‐finds‐me perception is positively associated with news exposure on social media, this behavior doesn't facilitate political learning. These results suggest news continues to enhance political knowledge best when actively sought.  相似文献   

5.
Signal words are commonly used in warnings to quickly communicate potential hazards. Current standards and guidelines define the terms DANGER, WARNING, CAUTION, and NOTICE as denoting decreasing hazard levels, respectively. This study examined whether definitions assigned to these words coincide with people's understanding of them. Seventy-two participants attempted to match published definitions to the terms. Additionally, they rated the terms on various dimensions (e.g., hazardousness, understandability). The results showed that people differentiate DANGER and NOTICE but less clearly discriminate between WARNING and CAUTION. The term DEADLY, a proposed higher level signal word, was perceived as connoting the greatest hazard. Implications for warning design are discussed. © 1998 John Wiley & Sons, Inc.  相似文献   

6.
European self‐regulation to ensure children's safety on social networking sites requires that providers ensure children are old enough to use the sites, aware of safety messages, empowered by privacy settings, discouraged from disclosing personal information, and supported by easy to use reporting mechanisms. This article assesses the regulatory framework with findings from a survey of over 25000 9‐ to 16‐year‐olds from 25 European countries. These reveal many underage children users, and many who lack the digital skills to use social networking sites safely. Despite concerns that children defy parental mediation, many comply with parental rules regarding social networking. The implications of the findings are related to policy decisions on lower age limits and self‐regulation of social networking sites.  相似文献   

7.
《Ergonomics》2012,55(11):2188-2206
Signal words, such as DANGER, WARNING and CAUTION, are commonly used in sign and product label warnings for the purpose of conveying different levels of hazard. Previous research has focused on whether people's perceptions of connoted hazard are consistent with the levels suggested by design standards and guidelines. Most investigations have used college students to evaluate the terms; other populations who may be at greater risk have not been adequately studied. One purpose of the present research was to determine whether young children, the elderly, and non-native English speakers perceive similar connoted hazard levels from the terms as undergraduates and published guidelines. A second purpose was to assess the terms' comprehensibility using various metrics such as missing values (i.e. ratings left blank) and understandability ratings. A third purpose was to develop a list of potential signal words that probably would be understandable to members of special populations. In the first experiment, 298 fourth- to eighth-grade students and 70 undergraduates rated 43 potential signal words on how careful they would be after seeing each term. The undergraduates also rated the terms on strength and understandability. In the second experiment, 98 elders and 135 non-native English speakers rated the same set of terms. The rank ordering of the words was found to be consistent across the participant groups. In general, the younger students gave higher carefulness ratings than the undergraduates. The words that the younger children and the non-native English speakers frequently left blank were given lower understandibility ratings. Finally, a short list of terms was derived that 95% or 99% of the youngest students (fourth- and fifth-graders) and 80% of the non-native English speakers understood. Implications of hazard communication are discussed.  相似文献   

8.
Drawing on Michel Foucault's theories of subjectivity, this paper conceptualizes early blogging and online diary writing as “technologies of the self,” that is, procedures through which practitioners enacted certain identities as Internet users. This study combines archival research, close analysis of websites, and interviews with their creators. It analyzes how the most defining practices associated with the emergence of these websites in the second half of the 1990s enabled the performance of specific modes of identification for their users, expressed by concepts such as the “online diarist” and the “blogger.” The study broadens our understanding of technologies of the self by considering the role of websites as artifacts in processes of self‐formation on the Internet.  相似文献   

9.
Evidence of a managerial influence on occupational risk prevention is largely lacking. The incidence of major accidents in high‐hazard sectors of industry does not show a downward trend. Also, the decline of fatal occupational accidents in industrialized Western countries may well be attributed to the growing employment in the relatively safe service sectors and to a phenomenon known as export of hazards. Looking more closely at accidents and disasters, we now believe they are not only caused by direct physical events, nor by human errors alone. They have their roots in organizational settings and in the sociotechnical system companies are active in. Whatever their cause, we know that (major) accidents almost always take us by surprise. Despite all our efforts and systems, we seem unable to foresee or predict these events. It seems our management systems are looking at the wrong items. Critics from small‐ and medium‐sized enterprises also point in that direction; management systems are too bureaucratic and lack a focus on hazard and risk identification. Apparently, we fail to incorporate the main ingredients of accident causation in our management systems. This article will discuss current models and presentations. In reference to the title of this article, the possibility to integrate these presentations into management systems will be discussed. This article is based on the presentation given at the 4th International Conference on Occupational Risk Prevention, Sevilla, Spain, May 10–12, 2006. © 2008 Wiley Periodicals, Inc.  相似文献   

10.
Without realizing it, many organizations offer their employees the same old computer training programs that no longer provide the knowledge today's computer users need to make the most efficient use of their systems. This column suggests one simple change to current training programs—namely sending the teachers (specialists) out of the computer classroom and to the students (users)—which can increase the users' confidence in the system and make them more productive.  相似文献   

11.
The threat of cyber attacks motivates the need to monitor Internet traffic data for potentially abnormal behavior. Due to the enormous volumes of such data, statistical process monitoring tools, such as those traditionally used on data in the product manufacturing arena, are inadequate. “Exotic” data may indicate a potential attack; detecting such data requires a characterization of “typical” data. We devise some new graphical displays, including a “skyline plot,” that permit ready visual identification of unusual Internet traffic patterns in “streaming” data, and use appropriate statistical measures to help identify potential cyberattacks. These methods are illustrated on a moderate-sized data set (135,605 records) collected at George Mason University.  相似文献   

12.
Hideya Iwasaki 《Software》2002,32(14):1345-1363
TEX allows users to define a macro that abstracts a sequence of typesetting commands. However, defining macros is not easy for most users, because the mechanism of macro expansion in TEX is complicated. As a remedy for this situation, a new system that enables users to define macros for TEX documents as Lisp programs has been developed. The system acts as a preprocessor for TEX; given a document that contains Lisp programs as S‐expressions, the system expands each S‐expression on the basis of Lisp's evaluation rules, thus generating an ordinary TEX document. The system is very flexible and easy‐to‐use, thanks to the underlying language's general‐purpose data structure, i.e. the S‐expression, applicative order evaluation, and rich set of predefined functions. This paper also demonstrates that the proposed system is really effective for practical use by giving some concrete examples of Lisp macros, some of which are difficult to define in terms of TEX commands. The system is currently implemented on the Emacs Lisp, and a user‐friendly environment is thus available in the Emacs text editor. Copyright © 2002 John Wiley & Sons, Ltd.  相似文献   

13.
An important factor for determining the success of any natural language program is the variability in the users' questions that must be handled by the system. Thus, it is important to find methods of measuring and handling this variability. In this article we examine the tendency for subjects to use the topics and terms introduced in the computer's answers in forming their questions. It is shown that the last and next‐to‐last answers have a strong effect on the questions users ask. It is also shown that although users often do ask questions that are related to their previous questions, the most frequent case is for users to introduce new questions related to the computer's answers. Thus, the effect of the computer's answers is stronger than the effect of users' own questions when forming new questions. Finally, it is shown that the accuracy of the computer's responses in answering the questions has important effects on the tendency to use previous questions and answers. These results suggest that natural language systems that take advantage of these features of human‐computer interaction may be successful.  相似文献   

14.
Recommendation systems are a clear example of an e‐service that helps the users to find the most suitable products they are looking for, according to their preferences, among a vast quantity of information. These preferences are usually related to human perceptions because the customers express their needs, taste, and so forth to find a suitable product. The perceptions are better modeled by means of linguistic information due to the uncertainty involved in this type of information. In this article, we propose a content‐based recommendation model that will offer a more flexible context to improve the final recommendations where the preferences provided by the sources will be modeled by means of linguistic variables assessed in different linguistic term sets. The proposal consists of offering a multigranular linguistic context for expressing the preferences instead of forcing users to use a unique scale. Then the content‐based recommendation model will look for the most suitable product(s), comparing them with the customer(s) information according to its resemblance. © 2007 Wiley Periodicals, Inc. Int J Int Syst 22: 419–434, 2007.  相似文献   

15.
Empirical studies of online debate almost universally observe a “dominant” minority of posters. Informed by theories of deliberative democracy, these are typically framed negatively—yet research into their impact on debate is scant. To address this, a typology of what we call super‐participation (super‐posters, agenda‐setters and facilitators) is developed and applied to the http://www.moneysavingexpert.com/ forum. Focusing on the first of these, we found 2,052 superposters (0.4%) contributing 47% of 25m+ posts. While superposters were quantitatively dominant, qualitative content analysis of the discursive practices of 25 superposters (n=40,044) found that most did not attempt to stop other users from posting (curbing) or attack them (flaming). In fact, in contradiction to the received wisdom, super‐posters discursively performed a range of positive roles.  相似文献   

16.
Chee Shin Yeo  Rajkumar Buyya 《Software》2006,36(13):1381-1419
In utility‐driven cluster computing, cluster Resource Management Systems (RMSs) need to know the specific needs of different users in order to allocate resources according to their needs. This in turn is vital to achieve service‐oriented Grid computing that harnesses resources distributed worldwide based on users' objectives. Recently, numerous market‐based RMSs have been proposed to make use of real‐world market concepts and behavior to assign resources to users for various computing platforms. The aim of this paper is to develop a taxonomy that characterizes and classifies how market‐based RMSs can support utility‐driven cluster computing in practice. The taxonomy is then mapped to existing market‐based RMSs designed for both cluster and other computing platforms to survey current research developments and identify outstanding issues. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

17.
On‐demand education enables individual learners to choose their learning pathways according to their own learning needs. They must use self‐directed learning (SDL) skills involving self‐assessment and task selection to determine appropriate pathways for learning. Learners who lack these skills must develop them because SDL skills are prerequisite to developing domain‐specific skills. This article describes the design of an on‐demand learning environment developed to enable novices to simultaneously develop their SDL and domain‐specific skills. Learners received advice on their self‐assessments and their selections of subsequent learning tasks. In the domain of system dynamics – a way to model a dynamic system and draw graphs depicting the system's behaviour over time – advice on self‐assessment is provided in a scoring rubric containing relevant performance standards. Advice on task selection indicates all relevant task aspects to be taken into account, including recommendations for suitable learning tasks which meet the individual learner's needs. This article discusses the design of the environment and the learners' perceptions of its usefulness. Most of the times, the learners found the advice appropriate and they followed it in 78% of their task selections.  相似文献   

18.
This paper examines how and why student teachers made use of information and communication technology (ICT) during a 1‐year initial teacher education programme from 2008 to 2009. This is a mixed methods study involving a survey (N = 340) of the entire cohort and a series of semi‐structured interviews with a sample of student teachers within the cohort (N = 21). The study explored several themes, including the nature of student teachers' use of ICT; variation in the use of ICT; support for, and constraints on, using ICT; attitudes to ICT and to teaching and learning more generally. It was found that nearly all teachers were receptive to using ICT – more so than their in‐service counterparts – and made frequent use of it during their placement (internship) experience. The Interactive Whiteboard (IWB) was central to nearly all student teachers' use of ICT, in good part, because it was already used by their mentors and was widely accessible. Student teachers' use of ICT was categorized in three levels. Routine users focused mostly on the use of the IWB for whole class teaching; extended users gave greater opportunities for pupils to use ICT for themselves; innovative student teachers used ICT in a greater range of contexts and made more effort to overcome barriers such as access. ICT use was seen as emerging from a mix of factors: chiefly student teachers' access to ICT; their feeling of ‘self‐efficacy’ when using ICT; and their belief that ICT had a positive impact on learning – in particular, the impact on pupils' behavioural and affective engagement. Factors which influenced ICT use included mentoring, training and support. Limitations on student teachers' use of ICT are explored and it is suggested that new teachers need to be supported in developing a more discerning use as they begin their teaching careers.  相似文献   

19.
This study investigates the viewpoints of relocated citizens regarding the effects of relocation, perceptions of the potential hazards of indoor application of a toxic agricultural pesticide – methyl parathion – and the efficacy of the risk information emphasizing the adverse health effects of this inappropriate use of the pesticide. The surveyed citizens were those relocated because the levels of the pesticide contaminant in their homes were high. Despite the extensive information – through the mass media and face‐to‐face warnings and activities such as assessment of contamination levels, decontamination of homes and relocation – the respondents, regardless of race, consistently perceived relatively low levels of risks from the indoor application of methyl parathion. The disruption of family life, loss of peace of mind and the loss of contaminated property were the most mentioned problems caused by the relocation. In contrast to past research, the disruption of social ties or networks was hardly mentioned. The results of this study suggest that the perceived personal benefits of home‐use of methyl parathion, and the voluntariness and controllability of exposure may have been the overriding factors of the respondents' risk perception, more than the clarity, content, consistency, and credibility of the risk information. The fact that the relocation was temporary must have contributed to the low level of importance attached by the respondents to the disruption of social ties as one of the adverse effects of the relocation.  相似文献   

20.
The information overload on the World Wide Web results in the underuse of some existing e‐government services within the business domain. Small‐to‐medium businesses (SMBs), in particular, are seeking “one‐to‐one'' e‐services from government in current highly competitive markets, and there is an imperative need to develop Web personalization techniques to provide business users with information and services specific to their needs, rather than an undifferentiated mass of information. This paper focuses on how e‐governments can support businesses on the problem of selecting a trustworthy business partner to perform reliable business transactions. In the business partner selection process, trust or reputation information is crucial and has significant influence on a business user's decision regarding whether or not to do business with other business entities. For this purpose, an intelligent trust‐enhanced recommendation approach to provide personalized government‐to‐business (G2B) e‐services, and in particular, business partner recommendation e‐services for SMBs is proposed. Accordingly, in this paper, we develop (1) an implicit trust filtering recommendation approach and (2) an enhanced user‐based collaborative filtering (CF) recommendation approach. To further exploit the advantages of the two proposed approaches, we develop (3) a hybrid trust‐enhanced CF recommendation approach (TeCF) that integrates both the proposed implicit trust filtering and the enhanced user‐based CF recommendation approaches. Empirical results demonstrate the effectiveness of the proposed approaches, especially the hybrid TeCF recommendation approach in terms of improving accuracy, as well as in dealing with very sparse data sets and cold‐start users. © 2011 Wiley Periodicals, Inc.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号