The purpose of this manuscript is to present research findings based on the reported cases of medical information breaches due to Social Media (SM) usage, in selected medical institutions in Uganda. The study employed...The purpose of this manuscript is to present research findings based on the reported cases of medical information breaches due to Social Media (SM) usage, in selected medical institutions in Uganda. The study employed online survey techniques. Altogether, 710 questionnaires (Google forms) were developed, and operationalized. The main respondents included 566 medical students, and 143 medical staff from Mbarara University of Science and Technology (MUST), and Kampala International University (KIU), accordingly. Using SPSS, the main statistical analysis tools employed include frequency distribution summary, and Chi-square (x<sup>2</sup>) test. According to the frequency distribution summary, 27% to 42% of the respondents within categorical divides acknowledged occurrence of medical information breaches due to SM usage. Notably, higher levels of the breaches were reported among male students (64%), age-group 18 to 35 years (68%), and WhatsApp users (63%). On the other hand, Chi-square results showed significant levels (p p > 0.05) between medical institutions and medical information breaches. Overall, the vulnerable areas of the breaches identified would serve as important reference points in the process of rationalizing SM usage in medical institutions. Nevertheless, further studies could focus on identification of the key SM usage factors associated with medical information breaches in medical institutions in Uganda.展开更多
新型数据的涌现一直是推动信息计量学前行的重要动力,Web of Science(Wo S)给出的学术文献用量级数据Usage可望在影响力维度、学科差异、行为动机三个理论方面为引文分析提供补充视角。本研究以2013年物理学、计算机、经济学和图书情报...新型数据的涌现一直是推动信息计量学前行的重要动力,Web of Science(Wo S)给出的学术文献用量级数据Usage可望在影响力维度、学科差异、行为动机三个理论方面为引文分析提供补充视角。本研究以2013年物理学、计算机、经济学和图书情报学被SCI和SSCI收录的166 767篇论文为研究样本,探索性地研究了该Usage数据的测度特征。结果显示,相较于引文数据,Usage更具测评区分度与敏感性;其在高频局部呈现出近似正偏态分布,于累积整体涌现出近似幂律分布;Usage的测评结果具有独立性,且与引文结果没有本质对立。虽然Wo S平台的Usage仍有笼统性、可伪性和封闭性之局限,但仍不失为配合引文数据、提供丰富影响力测评视域的可能选择之一。图4。表6。参考文献23。展开更多
The goal of this manuscript is to present a research finding, based on a study conducted to identify, examine, and validate Social Media (SM) socio-technical information security factors, in line with usable-security ...The goal of this manuscript is to present a research finding, based on a study conducted to identify, examine, and validate Social Media (SM) socio-technical information security factors, in line with usable-security principles. The study followed literature search techniques, as well as theoretical and empirical methods of factor validation. The strategy used in literature search includes Boolean keywords search, and citation guides, using mainly web of science databases. As guided by study objectives, 9 SM socio-technical factors were identified, verified and validated. Both theoretical and empirical validation processes were followed. Thus, a theoretical validity test was conducted on 45 Likert scale items, involving 10 subject experts. From the score ratings of the experts, Content Validity Index (CVI) was calculated to determine the degree to which the identified factors exhibit appropriate items for the construct being measured, and 7 factors attained an adequate level of validity index. However, for reliability test, 32 respondents and 45 Likert scale items were used. Whereby, Cronbach’s alpha coefficient (α-values) were generated using SPSS. Subsequently, 8 factors attained an adequate level of reliability. Overall, the validated factors include;1) usability—visibility, learnability, and satisfaction;2) education and training—help and documentation;3) SM technology development—error handling, and revocability;4) information security —security, privacy, and expressiveness. In this case, the confirmed factors would add knowledge by providing a theoretical basis for rationalizing information security requirements on SM usage.展开更多
Purpose: Our study proposes a bootstrapping-based method to automatically extract data- usage statements from academic texts. Design/methodology/approach: The method for data-usage statements extraction starts with ...Purpose: Our study proposes a bootstrapping-based method to automatically extract data- usage statements from academic texts. Design/methodology/approach: The method for data-usage statements extraction starts with seed entities and iteratively learns patterns and data-usage statements from unlabeled text. In each iteration, new patterns are constructed and added to the pattern list based on their calculated score. Three seed-selection strategies are also proposed in this paper. Findings: The performance of the method is verified by means of experiments on real data collected from computer science journals. The results show that the method can achieve satisfactory performance regarding precision of extraction and extensibility of obtained patterns. Research limitations: While the triple representation of sentences is effective and efficient for extracting data-usage statements, it is unable to handle complex sentences. Additional features that can address complex sentences should thus be explored in the future. Practical implications: Data-usage statements extraction is beneficial for data-repository construction and facilitates research on data-usage tracking, dataset-based scholar search, and dataset evaluation. Originality/value: To the best of our knowledge, this paper is among the first to address the important task of automatically extracting data-usage statements from real data.展开更多
Software is essential to scientific research.However,its academic value has always been underestimated or even neglected,and the contribution of its developers has not been widely recognized.
针对传统异常用电检测在面临高维数据中的维数诅咒,以及不相关特征对异常检测的影响,造成检测精度低等问题,提出了一种基于无监督密度子空间选择的孤立森林检测算法。首先,提出了一种有效的基于密度的紧凑数据表示方法,提高了子空间选...针对传统异常用电检测在面临高维数据中的维数诅咒,以及不相关特征对异常检测的影响,造成检测精度低等问题,提出了一种基于无监督密度子空间选择的孤立森林检测算法。首先,提出了一种有效的基于密度的紧凑数据表示方法,提高了子空间选择策略的效率。然后,应用最小冗余-最大相关-密度准则(min-redundancy-maximum-relevance-to-density,mRMRD),用于选择基于互信息的相关子空间。最后,在相关子空间中构建隔离树并集成孤立森林,实现对异常用电数据的检测。通过实验分析,与传统检测算法相比,所提方法在准确率、ROC曲线下面积(area under curve,AUC)、F 1指标上均有提升,提高了异常用电检测的效果。同时,灵敏性分析也验证了无监督密度子空间孤立森林检测算法的有效性。展开更多
Zimbabwe has witnessed the evolution of Information Communication Technology (ICT). The vehicle population soared to above 1.2 million hence rendering the Transport and Insurance domains complex. Therefore, there is a...Zimbabwe has witnessed the evolution of Information Communication Technology (ICT). The vehicle population soared to above 1.2 million hence rendering the Transport and Insurance domains complex. Therefore, there is a need to look at ways that can augment conventional Vehicular Management Information Systems (VMIS) in transforming business processes through Telematics. This paper aims to contextualise the role that telematics can play in transforming the Insurance Ecosystem in Zimbabwe. The main objective was to investigate the integration of Usage-Based Insurance (UBI) with vehicle tracking solutions provided by technology companies like Econet Wireless in Zimbabwe, aiming to align customer billing with individual risk profiles and enhance the synergy between technology and insurance service providers in the motor insurance ecosystem. A triangulation through structured interviews, questionnaires, and literature review, supported by Information Systems Analysis and Design techniques was conducted. The study adopted a case study approach, qualitatively analyzing the complexities of the Telematics insurance ecosystem in Zimbabwe, informed by the TOGAF framework. A case-study approach was applied to derive themes whilst applying within and cross-case analysis. Data was collected using questionnaires, and interviews. The findings of the research clearly show the importance of Telematics in modern-day insurance and the positive relationship between technology and insurance business performance. The study, therefore revealed how UBI can incentivize positive driver behavior, potentially reducing insurance premiums for safe drivers and lowering the incidence of claims against insurance companies. Future work can be done on studying the role of Telematics in combating highway crime and corruption.展开更多
文摘The purpose of this manuscript is to present research findings based on the reported cases of medical information breaches due to Social Media (SM) usage, in selected medical institutions in Uganda. The study employed online survey techniques. Altogether, 710 questionnaires (Google forms) were developed, and operationalized. The main respondents included 566 medical students, and 143 medical staff from Mbarara University of Science and Technology (MUST), and Kampala International University (KIU), accordingly. Using SPSS, the main statistical analysis tools employed include frequency distribution summary, and Chi-square (x<sup>2</sup>) test. According to the frequency distribution summary, 27% to 42% of the respondents within categorical divides acknowledged occurrence of medical information breaches due to SM usage. Notably, higher levels of the breaches were reported among male students (64%), age-group 18 to 35 years (68%), and WhatsApp users (63%). On the other hand, Chi-square results showed significant levels (p p > 0.05) between medical institutions and medical information breaches. Overall, the vulnerable areas of the breaches identified would serve as important reference points in the process of rationalizing SM usage in medical institutions. Nevertheless, further studies could focus on identification of the key SM usage factors associated with medical information breaches in medical institutions in Uganda.
文摘The goal of this manuscript is to present a research finding, based on a study conducted to identify, examine, and validate Social Media (SM) socio-technical information security factors, in line with usable-security principles. The study followed literature search techniques, as well as theoretical and empirical methods of factor validation. The strategy used in literature search includes Boolean keywords search, and citation guides, using mainly web of science databases. As guided by study objectives, 9 SM socio-technical factors were identified, verified and validated. Both theoretical and empirical validation processes were followed. Thus, a theoretical validity test was conducted on 45 Likert scale items, involving 10 subject experts. From the score ratings of the experts, Content Validity Index (CVI) was calculated to determine the degree to which the identified factors exhibit appropriate items for the construct being measured, and 7 factors attained an adequate level of validity index. However, for reliability test, 32 respondents and 45 Likert scale items were used. Whereby, Cronbach’s alpha coefficient (α-values) were generated using SPSS. Subsequently, 8 factors attained an adequate level of reliability. Overall, the validated factors include;1) usability—visibility, learnability, and satisfaction;2) education and training—help and documentation;3) SM technology development—error handling, and revocability;4) information security —security, privacy, and expressiveness. In this case, the confirmed factors would add knowledge by providing a theoretical basis for rationalizing information security requirements on SM usage.
基金supported by the National Natural Science Foundation of China (Grant No.:71473183)
文摘Purpose: Our study proposes a bootstrapping-based method to automatically extract data- usage statements from academic texts. Design/methodology/approach: The method for data-usage statements extraction starts with seed entities and iteratively learns patterns and data-usage statements from unlabeled text. In each iteration, new patterns are constructed and added to the pattern list based on their calculated score. Three seed-selection strategies are also proposed in this paper. Findings: The performance of the method is verified by means of experiments on real data collected from computer science journals. The results show that the method can achieve satisfactory performance regarding precision of extraction and extensibility of obtained patterns. Research limitations: While the triple representation of sentences is effective and efficient for extracting data-usage statements, it is unable to handle complex sentences. Additional features that can address complex sentences should thus be explored in the future. Practical implications: Data-usage statements extraction is beneficial for data-repository construction and facilitates research on data-usage tracking, dataset-based scholar search, and dataset evaluation. Originality/value: To the best of our knowledge, this paper is among the first to address the important task of automatically extracting data-usage statements from real data.
文摘Software is essential to scientific research.However,its academic value has always been underestimated or even neglected,and the contribution of its developers has not been widely recognized.
文摘针对传统异常用电检测在面临高维数据中的维数诅咒,以及不相关特征对异常检测的影响,造成检测精度低等问题,提出了一种基于无监督密度子空间选择的孤立森林检测算法。首先,提出了一种有效的基于密度的紧凑数据表示方法,提高了子空间选择策略的效率。然后,应用最小冗余-最大相关-密度准则(min-redundancy-maximum-relevance-to-density,mRMRD),用于选择基于互信息的相关子空间。最后,在相关子空间中构建隔离树并集成孤立森林,实现对异常用电数据的检测。通过实验分析,与传统检测算法相比,所提方法在准确率、ROC曲线下面积(area under curve,AUC)、F 1指标上均有提升,提高了异常用电检测的效果。同时,灵敏性分析也验证了无监督密度子空间孤立森林检测算法的有效性。
文摘Zimbabwe has witnessed the evolution of Information Communication Technology (ICT). The vehicle population soared to above 1.2 million hence rendering the Transport and Insurance domains complex. Therefore, there is a need to look at ways that can augment conventional Vehicular Management Information Systems (VMIS) in transforming business processes through Telematics. This paper aims to contextualise the role that telematics can play in transforming the Insurance Ecosystem in Zimbabwe. The main objective was to investigate the integration of Usage-Based Insurance (UBI) with vehicle tracking solutions provided by technology companies like Econet Wireless in Zimbabwe, aiming to align customer billing with individual risk profiles and enhance the synergy between technology and insurance service providers in the motor insurance ecosystem. A triangulation through structured interviews, questionnaires, and literature review, supported by Information Systems Analysis and Design techniques was conducted. The study adopted a case study approach, qualitatively analyzing the complexities of the Telematics insurance ecosystem in Zimbabwe, informed by the TOGAF framework. A case-study approach was applied to derive themes whilst applying within and cross-case analysis. Data was collected using questionnaires, and interviews. The findings of the research clearly show the importance of Telematics in modern-day insurance and the positive relationship between technology and insurance business performance. The study, therefore revealed how UBI can incentivize positive driver behavior, potentially reducing insurance premiums for safe drivers and lowering the incidence of claims against insurance companies. Future work can be done on studying the role of Telematics in combating highway crime and corruption.