Search results

1 – 10 of over 20000
Article
Publication date: 1 April 1994

David Bell and Francis McErlean

The clustering of objects in a layered object storage system is by common consent an exceedingly difficult problem. Studies the performance of three heuristic placement…

101

Abstract

The clustering of objects in a layered object storage system is by common consent an exceedingly difficult problem. Studies the performance of three heuristic placement algorithms. A series of eight reasonably realistic case studies were used as a benchmark battery, and several hundred experiments were carried out to evaluate results of using the algorithms. Presents the results and the insights gained from the study.

Details

Kybernetes, vol. 23 no. 3
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 1 July 1997

F. McErlean, D.A. Bell, A. Barr and G. Mulvenna

The management of uncertainty has received much attention recently in the fields of database and artificial intelligence. Several methods of evidential reasoning have been…

Abstract

The management of uncertainty has received much attention recently in the fields of database and artificial intelligence. Several methods of evidential reasoning have been proposed for real‐world problems with which uncertainty is associated. Considers one of these problems, that of classification, which is encountered in many domains including medicine. Focuses on a classification technique for knowledge discovery (KD). Reasoning about classifications is a primary interest in KD. Deals with obtaining evidence to confirm or refute classes. Searches for any data dependencies which exist between a classifier attribute and any of the property attributes. To illustrate the method compares a neural network classification with one based on Tanimoto’s method. It is important to note that the aim is to demonstrate this approach rather than to compare these two methods of classification. After extracting the data dependency information, employs a non‐numeric evidential reasoning method to see how well this evidence supports each of the two respective classifications.

Details

Kybernetes, vol. 26 no. 5
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 1 November 1997

F. McErlean and D.A. Bell

The management of uncertainty has received much attention recently in the fields of database and artificial intelligence. Several methods of evidential reasoning have been…

Abstract

The management of uncertainty has received much attention recently in the fields of database and artificial intelligence. Several methods of evidential reasoning have been proposed for real‐world problems with which uncertainty is associated. One of these problems is that of classification and it is encountered in many domains including medicine, which is considered here. Focuses on a classification technique for knowledge discovery (KD). Reasoning about classifications is a primary interest in KD. Obtains evidence to confirm or refute classes by searching for any data dependencies which exist between a classifier attribute and any of the property attributes. To illustrate the method, compares a neural network classification with one based on Tanimoto’s method. The aim was to demonstrate the approach rather than to compare the two methods of classification. After extracting the data dependency information, employs a non‐numeric evidential reasoning method to see how well this evidence supports each of the two respective classifications.

Details

Kybernetes, vol. 26 no. 8
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 1 August 1904

LIBRARIANS in charge of small municipal collections are sometimes apt to forget, when enviously regarding some of the larger libraries, that, in many ways, a small library has…

Abstract

LIBRARIANS in charge of small municipal collections are sometimes apt to forget, when enviously regarding some of the larger libraries, that, in many ways, a small library has advantages over its larger rivals, and may even carry out ideas and suggestions which are too laborious to be carried out on a very great scale. As an illustration, I wish to cite the experience of my own library at Bingley, and show how, by working out these suggestions, the membership has been raised from 700 to 1,600, and the annual issues from 24,000 to 54,000 volumes.

Details

New Library World, vol. 7 no. 2
Type: Research Article
ISSN: 0307-4803

Article
Publication date: 1 February 1987

D.A. BELL and H. JENKINS

Recent methods of data organisation have sought to preserve the original sequence of keys in the address space yet this often also results in the wastage of valuable storage space…

Abstract

Recent methods of data organisation have sought to preserve the original sequence of keys in the address space yet this often also results in the wastage of valuable storage space as a consequence of the simultaneous preservation of gaps in the sequence. The method of key space compression using forbidden zones seeks to minimize such wastage by removing those gaps in the sequence corresponding with keys which the designer knows beforehand cannot occur.

Details

Kybernetes, vol. 16 no. 2
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 1 July 1998

D.A. Bell, J.W. Guan and C.M. Shapcott

The Dempster‐Shafer theory of evidence gives a solid basis for reasoning about situations characterized by uncertainty. A key feature of the theory is that propositions are…

Abstract

The Dempster‐Shafer theory of evidence gives a solid basis for reasoning about situations characterized by uncertainty. A key feature of the theory is that propositions are represented as subsets of a set which is called a hypothesis space. This power set along with the set operations is a Boolean algebra. The theory has previously been shown to cover other Boolean algebras including collections of objects such as propositions. The practical advantages of this generalization are that increased flexibility of representation is allowed and that the performance of evidence accumulation can be enhanced. The objects of interest here are geometric forms, and we can encode rectangular and other shaped forms using hexadecimal numbers according to shapes and positions. Boolean algebra of such shapes can then be used directly in evidential reasoning exercised. Discusses how medical and other fields can gain from this approach.

Details

Kybernetes, vol. 27 no. 5
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 1 February 1998

John A. Parnell

The need to assess the perceptions of tomorrow's managers remains critical to forecasting social changes in the management environment. This study examines the views of upper…

Abstract

The need to assess the perceptions of tomorrow's managers remains critical to forecasting social changes in the management environment. This study examines the views of upper division business students at three diverse American institutions. Findings suggest that: (1) women and men both advocate more participation in decision making, (2) women and men both recognize the seriousness of sexual harassment in the workplace, (3) minority students demonstrate the greatest interest in entrepreneurial careers, and (4) support for drug testing is relatively strong except for suspicions about those doing the testing.

Details

International Journal of Commerce and Management, vol. 8 no. 2
Type: Research Article
ISSN: 1056-9219

Open Access
Article
Publication date: 7 May 2019

Sirpa Kärkkäinen, Anu Hartikainen-Ahia, Anna-Liisa Elorinne, Johanna Hokkanen and Katri Hämeen-Anttila

The purpose of this paper is to assess the socioscientific issue (SSI) method as a way of improving seventh graders’ nutrition know-how on dietary supplements (DS), and to…

1312

Abstract

Purpose

The purpose of this paper is to assess the socioscientific issue (SSI) method as a way of improving seventh graders’ nutrition know-how on dietary supplements (DS), and to describe how students experience learning nutritional issues through the SSI method.

Design/methodology/approach

Participants were seventh graders from three different classes (n=43). Health education intervention lasted 7 h and it embodied the three-staged model: the scenario, the inquiry and the decision-making stages. The study was qualitative in nature. The data were collected through a questionnaire before and after the intervention. The data were analyzed using summative content analysis.

Findings

Intervention tended to deepen students’ know-how on vitamins and rational use of DS. Students’ experiences of learning nutritional issues through the SSI method were generally positive. The scenario stage was considered current and authentic. The inquiry stage and decision-making stage helped in understanding the societal connections between the study task and the rational use of DS.

Practical implications

SSI method enhances students’ knowledge about the rational use of DS. E-learning environment gave students possibilities to work collaboratively. Especially, possibilities to discuss with peers and share own experiences supported learning.

Originality/value

To solve the need of dietary supplements (DS) is a complex nutritional issue for society and for individuals. Since consumption of special diets has increased among adolescents, the rational consumption of DS is relevant and interesting learning topic at secondary school.

Details

Health Education, vol. 119 no. 2
Type: Research Article
ISSN: 0965-4283

Keywords

Article
Publication date: 7 August 2019

Ehinome Ikhalia, Alan Serrano, David Bell and Panos Louvieris

Online social network (OSN) users have a high propensity to malware threats due to the trust and persuasive factors that underpin OSN models. The escalation of social engineering…

Abstract

Purpose

Online social network (OSN) users have a high propensity to malware threats due to the trust and persuasive factors that underpin OSN models. The escalation of social engineering malware encourages a growing demand for end-user security awareness measures. The purpose of this paper is to take the theoretical cybersecurity awareness model TTAT-MIP and test its feasibility via a Facebook app, namely social network criminal (SNC).

Design/methodology/approach

The research employs a mixed-methods approach to evaluate the SNC app. A system usability scale measures the usability of SNC. Paired samples t-tests were administered to 40 participants to measure security awareness – before and after the intervention. Finally, 20 semi-structured interviews were deployed to obtain qualitative data about the usefulness of the App itself.

Findings

Results validate the effectiveness of OSN apps utilising a TTAT-MIP model – specifically the mass interpersonal persuasion (MIP) attributes. Using TTAT-MIP as a guidance, practitioners can develop security awareness systems that better leverage the intra-relationship model of OSNs.

Research limitations/implications

The primary limitation of this study is the experimental settings. Although the results testing the TTAT-MIP Facebook app are promising, these were set under experimental conditions.

Practical implications

SNC enable persuasive security behaviour amongst employees and avoid potential malware threats. SNC support consistent security awareness practices by the regular identification of new threats which may inspire the creation of new security awareness videos.

Social implications

The structure of OSNs is making it easier for malicious users to carry out their activities without the possibility of detection. By building a security awareness programme using the TTAT-MIP model, organisations can proactively manage security awareness.

Originality/value

Many security systems are cumbersome, inconsistent and non-specific. The outcome of this research provides organisations and security practitioners with a framework for designing and developing proactive and tailored security awareness systems.

Details

Information Technology & People, vol. 32 no. 5
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 July 1992

Z. An, D.A. Bell and J.G. Hughes

Presents an investigation of some aspects of the axiomization of conditional independence of probability. Contributes to the understanding of Pearl's completeness conjecture and…

Abstract

Presents an investigation of some aspects of the axiomization of conditional independence of probability. Contributes to the understanding of Pearl's completeness conjecture and identifies a direction for revision which could remove some of the difficulties of Pearl's axiom set, but this alternative is not without its own difficulties. This approach largely simplifies the definition of conditional independence. Then shows the completeness conjecture to be incorrect by presenting counter examples; a new axiom based on the counter examples follows. Discusses the reason for the conjecture being incorrect. Notes that an alternative conjecture could be suggested, but this raises many new questions and increases complexity. Finally, shows that “the disjointness condition on variable sets” is in fact necessary. Concludes that while the axiomization of conditional independence has attractions, it is probably too complex to be pragmatic. Suggests an alternative way forward in inexact reasoning.

Details

Kybernetes, vol. 21 no. 7
Type: Research Article
ISSN: 0368-492X

Keywords

1 – 10 of over 20000