首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
During the coronavirus pandemic, policy makers need to interpret available public health data to make decisions affecting public health. However, the United States’ coronavirus response faced data gaps, inadequate and inconsistent definitions of data across different governmental jurisdictions, ambiguous timing in reporting, problems in accessing data, and changing interpretations from scientific institutions. These present numerous problems for the decision makers relying on this information. This paper documents some of the data pitfalls in coronavirus public health data reporting, as identified by the authors in the course of supporting data management for New England’s coronavirus response. We provide recommendations for individuals to collect data more effectively during emergency situations such as a COVID-19 surge, as well as recommendations for institutions to provide more meaningful data for various users to access. Through this, we hope to motivate action to avoid data pitfalls during public health responses in the future.  相似文献   

2.
As part of the urgent need to respond to the COVID-19 pandemic, governments, healthcare providers, and businesses have looked to applications of Artificial Intelligence (AI) to compensate for the unavailability of human workers. This interest has renewed the debate regarding the use of AI for the automation of work, which has been described as Intelligent Automation (IA). A new dimension to this debate is whether COVID-19 will be the catalyst for higher IA adoption levels. This article reviews arguments in favour of COVID-19 increasing the level of IA adoption and possible counter-arguments. Key arguments in favour of increased IA adoption include consumer preferences changing to favour IA, increasing familiarity of IA technologies, and increased business confidence in IA. Counter-arguments include big data availability and reliability limitations, many tasks still favouring human skills over IA, the narrow capabilities of IA technologies, and a high availability of human workers. The article also discusses the implications of this debate for information management research and practice.  相似文献   

3.
4.
There is an increasing recognition that various stakeholder groups for e-government have a significant role to play in ensuring the long-term success of the e-government enterprise. This article seeks to contribute to the understanding of the stakeholders’ multiple perspectives by proposing typologies of stakeholder roles, and stakeholder benefits, respectively, and embedding these in a stakeholder benefits analysis tool. A literature review is used to surface the diverse existing categorizations of e-government stakeholders and their interests and the benefits sought. This review informs a proposal for a typology of stakeholder roles, and for a typology of stakeholder benefits, which together are used to construct an initial proposal for a stakeholder benefits analysis tool (SBAT), which can be used to map stakeholder roles to stakeholder benefits. This tool has been tested by an expert group, and revised. This exploratory study is an important first step towards the development of tools and approaches for understanding the benefits sought by a wide range of different stakeholder groups in e-government. Progress in the development of such tools is important for the development of knowledge and practice, policy, and evaluation with respect to stakeholder engagement with, and participation in, e-government.  相似文献   

5.
It is commonly accepted that the use of personal information in business and government puts individual privacy at risk. However, little is known about these risks-for instance, whether and how they can be measured, and how they vary across social groups and the sectors in which personal data are used. Unless we can gain a purchase on such issues, our knowledge of the societal effects of information technology and systems will remain deficient, and the ability to make and implement better policies for privacy protection, and perhaps for a more equitable distribution of risk and protection, will remain impaired. The article explores this topic, examining conventional paradigms in data protection, including the one-dimensional view of the 'data subject,' that inhibit better conceptualizations and practices. It looks at some comparative survey evidence that casts light on the question of the distribution of privacy risks and concerns. It examines theoretical issues in the literature on risk, raising questions about the objectivity and perception of the risk of privacy invasion.  相似文献   

6.
Children of today have been surrounded by digital technology since their birth. However, children of today are not equally equipped for their technology rich future: various kinds of digital divides still prevail in the society and affect the young generation and their digital futures. Schools and education of children should undergo an extensive digital transformation to be able to meet the needs of the young generation and their digitalized future. The COVID-19 pandemic has suddenly and abruptly forced schools and education indeed to engage in such a transformation. In this study we examine the digital transformation initiated by the COVID-19 pandemic in the basic education of the young generation, the variety of digital divides emerging and reinforced, and the possible barriers reported along the way. We argue that information management research should better acknowledge children, their digitalized everyday life and their basic education as significant areas of concern. We should understand them as well as allow them to shape the education we offer in the context of higher education, but we should also aim at influencing the basic education of the young generation – for the purpose of equipping them with important skills and competencies for their digital futures but also for the purpose of arousing their interest in this important field, maybe even as a career option.  相似文献   

7.
《Research Policy》1999,28(2-3):195-213
Literature on technological activity in the multinational corporation has recently emphasized the overall advantages from establishing internationally dispersed technological capabilities. This paper builds a taxonomy of innovation networks in the multinational corporation, differentiating between international duplication and international diversification of advanced technological capabilities. Cluster analysis of major Swedish multinationals suggests significant differences in the geographical dispersion of technological capabilities, implying different approaches to the upgrading of competitive advantage and unequal pre-conditions for becoming engaged in internationally integrated research efforts.  相似文献   

8.
This study addresses two critical research gaps in human-robot interaction (HRI): the limited systematic research on the role of trust in customers’ acceptance of artificially intelligent (AI) robots; and the lack of understanding of robot acceptance under different cultural backgrounds. Drawing on the AIDUA framework, this study examines the impacts of trust and moderating effects of both national (the U.S. and China) and individual culture on customers’ intentions to use AI robots in hospitality services by developing a theoretical model. The model is tested on data collected using online data collection platforms from 491 U.S. and 495 Chinese respondents. PLS-SEM and the bootstrapping method were used to test the hypothesized relationships and analyze the moderating effects of culture, respectively. The findings suggest that trust in interaction with AI robots is a significant higher-order construct that influences the intention of use. Furthermore, uncertainty avoidance, long-term orientation, and power distance have been found to exhibit significant moderation effects. The results of this study extend the theoretical frameworks in HRI and provide detailed guidance to promote AI robot applications across different cultures.  相似文献   

9.
There is a common problem in artificial intelligence (AI) and information security. In AI, an expert system needs to be able to justify and explain a decision to the user. In information security, experts need to be able to explain to the public why a system is secure. In both cases, an important goal of explanation is to acquire or maintain the users’ trust. In this paper, I investigate the relation between explanation and trust in the context of computing science. This analysis draws on literature study and concept analysis, using elements from system theory as well as actor-network theory. I apply the conceptual framework to both AI and information security, and show the benefit of the framework for both fields by means of examples. The main focus is on expert systems (AI) and electronic voting systems (security). Finally, I discuss consequences of the analysis for ethics in terms of (un)informed consent and dissent, and the associated division of responsibilities.  相似文献   

10.
This paper reports on a survey of 221 web sites chosen at random from a subset of the .co.uk area of the Internet. A breakdown of the types of business represented shows that whilst computing companies continue to have a sizeable presence on the web, certain other types of business now also have a relatively large number of sites. The survey found many media-related businesses and professional-based companies and practices, reflecting the increasing use of Information Technology in these areas but also the increasing knowledge about the Internet that is needed or helpful in many types of job. The results are consistent with general business use of the web in the UK still being in an experimental phase of web site creation by those who can rather than by those who should.  相似文献   

11.
Internet companies place a high priority on the safety of their services and on their corporate social responsibility towards protection of all users, especially younger ones. However, such efforts are undermined by the large numbers of children who circumvent age restrictions and lie about their age to gain access to such platforms. This paper deals with the ethical issues that arise in this not-so-hypothetical situation. Who, for instance, bears responsibility for children’s welfare in this context? Are parents/carers ethically culpable in failing to be sufficiently vigilant or even facilitating their children’s social media use? Do industry providers do enough to enforce their own regulations and remove those users they know to be underage? How far does a duty of care extend? Regulation of age restrictions has, it is argued, created unintended consequences that heighten online dangers for young people. While children are inevitably drawn to new online spaces for entertainment and fun, should their rights to participate in the social world around them be curtailed to ensure their best interests and those of the wider community? Such questions now pose significant practical and ethical dilemmas for policy makers and other stakeholders involved in internet governance. It especially highlights the question of responsibility for protection of minors online and calls into question whether the current model of shared responsibility is working.  相似文献   

12.
《Research Policy》2021,50(10):104347
We compare individuals presently employed either at a university, or at a firm from an R&D-intensive sector, and analyze which of their personal-specific and employer-specific characteristics are related to their choice to leave their present employer for an own startup. Our data set combines the population of Danish employees with their present employers. We focus on persons who at least hold a Bachelor's degree in engineering, sciences and health and track them over 2001-2012. We show that (i) there are overall few differences between the characteristics of university and corporate startup entrepreneurs, (ii) common factors associated with startup activity of both university and corporate employees are education, top management team membership, previous job mobility and being male, (iii) it is primarily human capital-related characteristics that are related to startup choice of university employees while (iv) the characteristics of the present workplace are the foremost factors of entrepreneurial activity by corporate employees.  相似文献   

13.
Knowledge of the natural and the social are irreducibly different yet have much in common. The differences lie at the levels of complexity they engage, modes of explanation they adopt, investigation aims they allow and whether they assert a ‘double hermeneutic’ effect to the behaviour of the studied objects. Knowledge are in common in that they are all construed out of available resources, justified based on the consequences of acting upon them, settled until better alternatives emerge, and serving as walking sticks for beating unknown paths in human life. Because of this, there can be no hierarchy of knowledge or unity of methodology, and dialogical encounters guided by situational ethics, not professional deafness driven by ontological/instrumental fallacies, are a viable strategy for morally and practically wise actions, including knowledge management projects.  相似文献   

14.
The present analysis performs a Multinomial Probit Model in order to observe which mobile technology qualifies across individuals. The findings indicate that individuals in family businesses prefer to combine both tablets and smartphones in their purchases, rather than separately. Younger individuals report an adoption preference towards smartphones, while older individuals are inclined towards tablets. The theoretical contributions encompass both the technology acceptance model (TAM) and the social cognitive theory (SCT). Individuals working in a family business exhibit a curious behaviour and they are becoming early adopters. TAM helps explain this behaviour as they tend to try new novelties exploring the potential usefulness they might derive; these technological advancements allow them to connect with customers and partners. By contrast, SCT helps gain a better understanding on young and old individuals' behaviour. The younger generations seem to be easily influenced by their peers with a tendency to technologies which are fun and allow them to build connections. Older individuals are equally influenced by their peers, with the difference that their social circle being more mature (e.g., business owners, professionals). This combined with the complexity of the technology orients them into adopting tablets more easily than smartphones.  相似文献   

15.
16.
In this paper we reflect on a number of IT related challenges during the COVID19 pandemic, primarily from a CIO and IT professionals perspective. We consider three time periods, namely the period before the pandemic, the response to the pandemic and the period after it. For each period we discuss the key challenges that practitioners faced and outline important areas to consider for the future. Hopefully, the lessons learnt and the experiences gained will positively inform future academic research and practice.  相似文献   

17.
Do men and women academic faculty vary in their research collaboration patterns and strategies? This straightforward question does not lend itself to a straightforward answer. A great many sex-correlated variables could possibly mitigate the relationship of sex and collaboration. If one finds sex-correlated differences in the number of collaborators, can one infer that there is something intrinsic to men's and women's work strategies and preferences? Or would such differences owe instead to women's and men's different positions in work structures and hierarchies? The focus here is on two sets of research collaboration variables, numbers of collaborators and the collaboration strategies employed. The study uses questionnaire data from the U.S. National Survey of Academic Scientists (n = 1714) and tests several hypotheses about collaboration numbers and strategies. Regression results indicate, counter to the core hypotheses and almost all published literature, that in a properly specified model, one taking into account such factors as tenure, discipline, family status and doctoral cohort, women actually have somewhat more collaborators on average than do men. For both men and women, those with more industrial interactions and those affiliated with university research centers have more collaborators. Men and women differ in their collaborator choice strategies. Men are more likely to be oriented to “instrumental,” and “experience” strategies, while both men and women are motivated by “mentoring” strategies. Regression analyses show that for both men and women, having a coherent collaborator choice strategy predicts the number of collaborators.  相似文献   

18.
Open-source communities that focus on content rely squarely on the contributions of invisible strangers in cyberspace. How do such communities handle the problem of trusting that strangers have good intentions and adequate competence? This question is explored in relation to communities in which such trust is a vital issue: peer production of software (FreeBSD and Mozilla in particular) and encyclopaedia entries (Wikipedia in particular). In the context of open-source software, it is argued that trust was inferred from an underlying ‘hacker ethic’, which already existed. The Wikipedian project, by contrast, had to create an appropriate ethic along the way. In the interim, the assumption simply had to be that potential contributors were trustworthy; they were granted ‘substantial trust’. Subsequently, projects from both communities introduced rules and regulations which partly substituted for the need to perceive contributors as trustworthy. They faced a design choice in the continuum between a high-discretion design (granting a large amount of trust to contributors) and a low-discretion design (leaving only a small amount of trust to contributors). It is found that open-source designs for software and encyclopaedias are likely to converge in the future towards a mid-level of discretion. In such a design the anonymous user is no longer invested with unquestioning trust.  相似文献   

19.
20.
This study presents and empirically validates a model that strives to explain end-user adoption of cloud storage as a means of personal archiving. Drawing from prior research on IT adoption, trust, risk and cloud computing, we develop a technology acceptance model that incorporates users' perceptions of risk and trust as well as major antecedents of trust. The research model is empirically tested with survey data collected from 229 cloud storage users. Our results show that trust can be conceived of as a factor that mitigates uncertainty and reduces the perception of risk, which is a significant inhibitor of the intention to use cloud storage for archiving. We find evidence that trust can be increased through both the provider's reputation and user satisfaction. Based on the results, we highlight important practical implications that can be used to inform marketing efforts of cloud storage providers and further suggest some opportunities for future research.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号