The objective of this study is to investigate perceived security threats of Computerized Accounting Information Systems (CAIS) that face Jordanian domestic banks. An…
The objective of this study is to investigate perceived security threats of Computerized Accounting Information Systems (CAIS) that face Jordanian domestic banks. An empirical survey using self‐administrated questionnaire has been carried out to achieve the above‐mentioned objective. The study results reveal that accidental entry of “bad” data by employees, accidental destruction of data by employees; intentional entry of “bad” data by employees and employees’ sharing passwords are the top four security threats that face domestic banks. The paper concludes that most security threats that face domestic banks are internally generated and unintentional.
The purpose of this paper is to investigate how the effectiveness of systems for ensuring cooperation in online transactions is impacted by a positivity bias in the…
The purpose of this paper is to investigate how the effectiveness of systems for ensuring cooperation in online transactions is impacted by a positivity bias in the evaluation of the work that is produced. The presence of this bias can reduce the informativeness of the reputation system and negatively impact its ability to ensure quality.
This research combines survey and experimental methods, collecting data from 1,875 Mechanical Turk (MTurk) workers in five studies designed to investigate the informativeness of the MTurk reputation system.
The findings demonstrate the presence of a positivity bias in evaluations of workers on MTurk, which leaves them undifferentiated, except at the extremity of the reputation system and by status markers.
Because MTurk workers self-select tasks, the findings are limited in that they may only be generalizable to those who are interested in research-related work. Further, the tasks used in this research are largely subjective in nature, which may decrease their sensitivity to differences in quality.
For researchers, the results suggest that requiring 99 per cent approval rates (rather than the previously advised 95 per cent) should be used to identify high-quality workers on MTurk.
The research provides insights into the design and use of reputation systems and demonstrates how design decisions can exacerbate the effect of naturally occurring biases in evaluations to reduce the utility of these systems.
In order to manage library or information functions you must be able to persuasively communicate with your management. To accomplish this, you must communicate in the…
In order to manage library or information functions you must be able to persuasively communicate with your management. To accomplish this, you must communicate in the language of your management, marshalling trendy and persuasive points on your own behalf With that as a given, there has been a very heartening development over the last few years for library and information managers—a burgeoning management attention to information.
Social networking sites (SNS) increasingly serve as a source of political content for Americans. The purpose of this paper is to clarify the relationships between types of…
Social networking sites (SNS) increasingly serve as a source of political content for Americans. The purpose of this paper is to clarify the relationships between types of political content exposure, especially congruent vs incongruent content, and its effects on political expression and participation. This study pays special attention to whether these relationships differ depending on whether an individual affiliates with the Republican or Democratic party.
This study uses a representative national sample to examine the relationships among exposure to congruent vs incongruent political content via SNS, political expression, and political participation. This study also tests whether these relationships are consistent for Democrats vs Republicans.
The results suggest the effects of political content exposure on political expression on SNS depend on how many friends post about politics, as well as whether that content is congruent or incongruent with one’s political beliefs. Moreover, the relationship between exposure to congruent vs incongruent content, political expression, and political participation differs for Republicans and Democrats.
This study highlights the need for researchers to take more care in distinguishing the type of and the audience for political content exposure via social media websites. Further, if the relationships between seeing political content via social media and acting upon such content – either through posting behaviors or participatory activities – differs by political group, it raises the potential for disparities in democratic engagement.
Describes the activities, processes and outcomes involved in the development of a searchable Web‐based directory of toolkits to support the evaluation of information…
Describes the activities, processes and outcomes involved in the development of a searchable Web‐based directory of toolkits to support the evaluation of information communication technologies in the higher education/further education sector. Explains the definitions and terminology used to define the notion of toolkits, evaluation and the tools listed within the directory. Briefly considers those tools and toolkits included in the database relating to performance measures and quality assessment. Concludes that the main outcome of this project has been the realisation that the notion and form of a toolkit and the tools held within has yet to be clearly established
This study aims to focus on asset management of large‐scale information systems supporting infrastructures and especially seeks to address a methodology of their…
This study aims to focus on asset management of large‐scale information systems supporting infrastructures and especially seeks to address a methodology of their statistical deterioration prediction based on their historical inspection data. Information systems are composed of many devices. Deterioration process i.e. wear‐out failure generation process of those devices is formulated by a Weibull hazard model. Furthermore, in order to consider the heterogeneity of the hazard rate of each device, the random proportional Weibull hazard model, which expresses the heterogeneity of the hazard rate as random variables, is to be proposed.
Large‐scale information systems comprise many components, and different types of components might have different hazard rates. Therefore, when analyzing faults of information systems that comprise various types of devices and components, it is important to consider the heterogeneity of the hazard rates that exist between the different types of components. In this study, with this in consideration, the random proportional Weibull hazard model, whose heterogeneity of hazard rates is subject to a gamma distribution, is formulated and a methodology is proposed which estimates the failure rate of various components comprising an information system.
Through a case study using a traffic control system for expressways, the validity of the proposed model is empirically verified. Concretely, as for HDD, the service life at which the survival probability is 50 percent is estimated as 158 months. However, even for the same HDD, use environment differs according to usage. Actually, among the three different usages (PC, server, others), failures happen earliest in the case of PCs, which have the highest heterogeneity parameter and a survival probability of 50 percent after 135 months of usage. On the other hand, as for others, its survival probability is 50 percent at 303 months.
To operationally express the heterogeneity of failure rates, the Weibull hazard model is employed as a base, and a random proportional Weibull hazard model expressing the proportional heterogeneity of hazard rates with a standard gamma distribution is formulated. By estimating the parameter of the standard proportional Weibull hazard function and the parameter of the probability distribution that expresses the heterogeneity of the proportionality constant between the types, the random proportional Weibull hazard model can easily express the heterogeneity of the hazard rates between types and components.
This chapter aims to contextualize smart rural development in Slovenia. It does so by presenting the current state of the art, addressing new interdisciplinary approaches…
This chapter aims to contextualize smart rural development in Slovenia. It does so by presenting the current state of the art, addressing new interdisciplinary approaches in understanding the problems of rural areas, applying new approaches to smart rural development, and introducing a new concept.
We start our chapter by addressing the main problems of Slovenian rural areas and their inhabitants. We have made a review of initiatives and practices elsewhere and therefore here they are only summarized briefly to emphasize the most important achievements/improvements. Further, the chapter describes the state of the art in Slovenia in connection with smart and sustainable rural development, and analyzes the results contextually. It looks at the solutions and practices that local communities found to answer the existing challenges. Three promising examples are presented, related to different sectors: tourism, mobility, and innovation. The last part of the chapter contextualizes our findings and further explains our approach to smart rural development. Finally, the chapter introduces a new concept – that is, Smart Fab Village. The concept of Fab Village is built upon the concept designed for urban areas and then carefully adapted to the needs and specific requirements of rural areas.