Aim/Purpose: This project aims to prototype the functionality of a user-generated geospatial meteorology map. This includes the design and implementation of a database driven website with a public and a password protected admin component, in addition to database, web server and hardware components. Background: Previous research described and assessed the feasibility of a system in which end-users generate environmental data and examined the quality of the data provided. We sought to distill the minimum essential use-cases to achieve the required functionality, based on preexisting and original theorization, and then implement them in a functional prototype. Contribution: The possible value of this potential information system, both as a dataset for metrology, climatology, ecology, as well as other fields of research, and also as an end-user web service for highly accurate weather reports, has been noted by previous researchers. The specific contribution of this project is to, by the implementation of a functional prototype, establish that a smart device can remotely generate geopositioned weather reports, which can be accepted by a central server and displayed on a public world map. Findings: Through the implementation of the project, we were able to assess the quality of the use-cases outlined. We found the project was a functional information system, with each public server-side and hardware competent interfacing cor-rectly, most limitations resulting from the scope of the project. Impact on Society: This would unlock the possibility of the next step towards the full realization of the theoretical information system: a limited real world rollout. Future Research: As this project outlines and implements the minimum use-cases required to this system, future research would ideally involve the limited real-world rollout of the system and asses the quality of the data provided. Further research could also be conducted on data quality assurance strategies, both at the point end-user device sensors and broad-scale error correction.
{"title":"User-Generated Geospatial Meteorology Map Prototype","authors":"William J Miranda-Hill, J. Goetz","doi":"10.28945/4257","DOIUrl":"https://doi.org/10.28945/4257","url":null,"abstract":"Aim/Purpose: This project aims to prototype the functionality of a user-generated geospatial meteorology map. This includes the design and implementation of a database driven website with a public and a password protected admin component, in addition to database, web server and hardware components.\u0000\u0000Background: Previous research described and assessed the feasibility of a system in which end-users generate environmental data and examined the quality of the data provided. We sought to distill the minimum essential use-cases to achieve the required functionality, based on preexisting and original theorization, and then implement them in a functional prototype. \u0000\u0000Contribution: The possible value of this potential information system, both as a dataset for metrology, climatology, ecology, as well as other fields of research, and also as an end-user web service for highly accurate weather reports, has been noted by previous researchers. The specific contribution of this project is to, by the implementation of a functional prototype, establish that a smart device can remotely generate geopositioned weather reports, which can be accepted by a central server and displayed on a public world map.\u0000\u0000Findings: Through the implementation of the project, we were able to assess the quality of the use-cases outlined. We found the project was a functional information system, with each public server-side and hardware competent interfacing cor-rectly, most limitations resulting from the scope of the project. \u0000\u0000Impact on Society: This would unlock the possibility of the next step towards the full realization of the theoretical information system: a limited real world rollout. \u0000\u0000Future Research: As this project outlines and implements the minimum use-cases required to this system, future research would ideally involve the limited real-world rollout of the system and asses the quality of the data provided. Further research could also be conducted on data quality assurance strategies, both at the point end-user device sensors and broad-scale error correction.","PeriodicalId":249265,"journal":{"name":"Proceedings of the 2019 InSITE Conference","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131412952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aim/Purpose: Project Management (PM) capability is one of the skill sets that employers across a broad range of industries are seeking with a projected current talent deficit of 1.5 million jobs. Background A course syllabus is both a tool and a resource used by the learners, the faculty, and the school to articulate what to learn, how to learn, and how and when to access and evaluate the learning outcomes. A learner-centred course syllabus can enhance the teaching, the learning, and the assessment and evaluation processes. A learner-centred pedagogy seeks to create a community of learners by sharing power between the teachers and the students, providing multiple assessments, evaluations, and feedback mechanisms. Methodology: This study seeks to find out if the PM course syllabi reflect the attributes of a learner-centred pedagogy through a content analysis of 76 PM course syllabi gathered in 2018 from instructors affiliated with the Association to Advance Collegiate Schools of Business (AACSB) in the USA. Contribution: On the issue of PM content, only seven percent (7%) of the syllabi articulate that students would be involved in “real world” experiential projects or be exposed to the Project Management Body of Knowledge (PMBOK) areas and process groups. Findings: The results reveal that PM instructors fall short in creating a community of learners by not disclosing their teaching philosophy, beliefs, or assumptions about learning and tend not to share power, and do not encourage teacher-student interactions. Recommendations for Practitioners: Schools should try to align their programs both to the local and the national job markets by engaging PM practitioners as advisors. When engaged as ad-visors, PM practitioners provide balance and direction on curriculum design or redesign, emerging industry innovations, as well as avenues for internships and job opportunities. Recommendation for Researchers: PM has various elements associated with entrepreneurship and management and is also heavily weighted towards the use of projects and technology, making it a good candidate for learner-centred pedagogy. However, researchers should explore this assertion further by comparing the attainment of learning outcomes and students’ overall performance in a learner-centred and a non-learner-centred PM course. Impact on Society: To minimize this talent deficit individuals as well as the academy should invest in PM education and one approach that may increase the enthusiasm in the PM coursework is having a learner-centred pedagogy. Future Research: Researchers should explore this line of research further by gathering syllabi from other regions such as the European Union, Asia, Africa, Australia, etc. as well as conduct a comparative study between these various regions in order to find if there are similarities or differences in how PM is taught.
{"title":"A Review of Project Management Course Syllabi to Determine if They Reflect the Learner-centred Course Pedagogy [Abstract]","authors":"E. Karanja, Donna M. Grant","doi":"10.28945/4323","DOIUrl":"https://doi.org/10.28945/4323","url":null,"abstract":"Aim/Purpose: Project Management (PM) capability is one of the skill sets that employers across a broad range of industries are seeking with a projected current talent deficit of 1.5 million jobs. \u0000Background A course syllabus is both a tool and a resource used by the learners, the faculty, and the school to articulate what to learn, how to learn, and how and when to access and evaluate the learning outcomes. A learner-centred course syllabus can enhance the teaching, the learning, and the assessment and evaluation processes. A learner-centred pedagogy seeks to create a community of learners by sharing power between the teachers and the students, providing multiple assessments, evaluations, and feedback mechanisms.\u0000\u0000Methodology: This study seeks to find out if the PM course syllabi reflect the attributes of a learner-centred pedagogy through a content analysis of 76 PM course syllabi gathered in 2018 from instructors affiliated with the Association to Advance Collegiate Schools of Business (AACSB) in the USA.\u0000\u0000Contribution: On the issue of PM content, only seven percent (7%) of the syllabi articulate that students would be involved in “real world” experiential projects or be exposed to the Project Management Body of Knowledge (PMBOK) areas and process groups.\u0000\u0000Findings: The results reveal that PM instructors fall short in creating a community of learners by not disclosing their teaching philosophy, beliefs, or assumptions about learning and tend not to share power, and do not encourage teacher-student interactions.\u0000\u0000Recommendations for Practitioners: Schools should try to align their programs both to the local and the national job markets by engaging PM practitioners as advisors. When engaged as ad-visors, PM practitioners provide balance and direction on curriculum design or redesign, emerging industry innovations, as well as avenues for internships and job opportunities.\u0000\u0000Recommendation for Researchers: PM has various elements associated with entrepreneurship and management and is also heavily weighted towards the use of projects and technology, making it a good candidate for learner-centred pedagogy. However, researchers should explore this assertion further by comparing the attainment of learning outcomes and students’ overall performance in a learner-centred and a non-learner-centred PM course.\u0000\u0000Impact on Society: To minimize this talent deficit individuals as well as the academy should invest in PM education and one approach that may increase the enthusiasm in the PM coursework is having a learner-centred pedagogy.\u0000\u0000Future Research: Researchers should explore this line of research further by gathering syllabi from other regions such as the European Union, Asia, Africa, Australia, etc. as well as conduct a comparative study between these various regions in order to find if there are similarities or differences in how PM is taught.","PeriodicalId":249265,"journal":{"name":"Proceedings of the 2019 InSITE Conference","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116564348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aim/Purpose: To understand the current state of the body of literature in blockchain technology and propose dimensions for acceptance. Background: Blockchain technology has large promise to replace centralized and even distributed database systems. Its premise focuses on issues such as transparency, immutability, and privacy of transactions. Created for bitcoin, researchers and practitioners have begun to see its potential in different areas and industries. Its acceptance is still debatable as there are a number of issues still to be resolved. Methodology: We conducted a literature review to assess the size and scope of the body of research in the are of blockchain applications and carried a conceptual analysis for blockchain acceptance. Contribution: We provide an assessment of the body of literature in the are of blockchain and cluster the number of articles according to application groupings. We show that research in blockchain cannot be considered that it even started due to its diverse, scattered and weak related studies. At the same time, blockchain is still faced with a lot of resistance yet no one is studying its acceptance. We therefore propose dimension for its acceptance, as adapted from the very rich area of ecommerce research. Findings: Body of research is at its infancy. Research is scattered and weak. Most research is related to bitcoin and cryptocurrency. There is a great need to study the application of blockchain outside its current focus on cryptocurrency. Areas of study of blockchain applications include internet of things, energy and finance – other areas are identified. Dimensions for blockchain acceptance are proposed and include: reputation, risk, usefulness, and intentions. Recommendations for Practitioners: Blockchain has great potential to be applied in areas such as medicine, aviation and disaster relief. In terms of blockchain characteristics, practitioners have a lot of room to innovate in various approaches such as the blockchain hashing algorithm, smart contracts and peer validation. These do not need to be fixed but can vary based on the business characteristics. Recommendations for Researchers: Research in the application of blockchain can be considered as not even started. The application of blockchain is an open playground which today few have stepped in to enjoy. Research opportunities include but are not limited to energy consumption of blockchain transactions, dimensions to blockchain adoption and acceptance, adaptability of blockchain to various industries, and innovation in blockchain characteristics such as new approaches to peer validation of transactions.
{"title":"Review of Blockchain Literature – Its Application and Acceptance","authors":"R. Saadé, J. A. Jaoude, M. C. Sharma","doi":"10.28945/4347","DOIUrl":"https://doi.org/10.28945/4347","url":null,"abstract":"Aim/Purpose: To understand the current state of the body of literature in blockchain technology and propose dimensions for acceptance.\u0000\u0000Background: Blockchain technology has large promise to replace centralized and even distributed database systems. Its premise focuses on issues such as transparency, immutability, and privacy of transactions. Created for bitcoin, researchers and practitioners have begun to see its potential in different areas and industries. Its acceptance is still debatable as there are a number of issues still to be resolved.\u0000\u0000Methodology: We conducted a literature review to assess the size and scope of the body of research in the are of blockchain applications and carried a conceptual analysis for blockchain acceptance. \u0000\u0000Contribution: We provide an assessment of the body of literature in the are of blockchain and cluster the number of articles according to application groupings. We show that research in blockchain cannot be considered that it even started due to its diverse, scattered and weak related studies. At the same time, blockchain is still faced with a lot of resistance yet no one is studying its acceptance. We therefore propose dimension for its acceptance, as adapted from the very rich area of ecommerce research.\u0000\u0000Findings: Body of research is at its infancy. Research is scattered and weak. Most research is related to bitcoin and cryptocurrency. There is a great need to study the application of blockchain outside its current focus on cryptocurrency. Areas of study of blockchain applications include internet of things, energy and finance – other areas are identified. Dimensions for blockchain acceptance are proposed and include: reputation, risk, usefulness, and intentions.\u0000\u0000Recommendations for Practitioners: Blockchain has great potential to be applied in areas such as medicine, aviation and disaster relief. In terms of blockchain characteristics, practitioners have a lot of room to innovate in various approaches such as the blockchain hashing algorithm, smart contracts and peer validation. These do not need to be fixed but can vary based on the business characteristics. \u0000\u0000Recommendations for Researchers: Research in the application of blockchain can be considered as not even started. The application of blockchain is an open playground which today few have stepped in to enjoy. Research opportunities include but are not limited to energy consumption of blockchain transactions, dimensions to blockchain adoption and acceptance, adaptability of blockchain to various industries, and innovation in blockchain characteristics such as new approaches to peer validation of transactions.","PeriodicalId":249265,"journal":{"name":"Proceedings of the 2019 InSITE Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130810760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aim/Purpose: Improving or changing business processes is one of the most important roles for Information technologies functions. Yet, most organizations struggle with planned process change and even more with unplanned change. There is little support from research as the dynamics of planned process change is understudied and unplanned process change is seldom researched. Background: This paper describes the impact of unplanned business process change from a systems perspective. The #feesmustfall student protest movement, which began in 2015, and affected Universities throughout South Africa provides the context. Methodology: An interpretive abductive case study at a South African university used Steven Alter’s Work System framework to describe the unplanned business process change that occurred due to the #feesmustfall student protest movement. Contribution: Theoretically, this paper demonstrates the practical use of Alter’s work system framework to analyze unplanned business process change. Practically, it de-scribes and explains the impacts of the change which may be useful to executives or administrators responsible for operational systems within organizations. Findings: During unplanned business process change, change management, staff training, customizable technology and strategic fluidity and focus were found to be important. Unplanned business process change results in all elements of the work systems and its environment changing, even resulting in changed products and customer behavior. Impact on Society: If organizations are more aware of the impacts of unplanned process change they will be better equipped to control them. Future Research: Future action research studies on unplanned business process change could suggest actions for manager’s dealing with them.
{"title":"A Work Systems View of Unplanned Business Process Change: The Case of #FEESMUSTFALL at a South African University","authors":"Trevor D Joubert, Lisa F. Seymour","doi":"10.28945/4186","DOIUrl":"https://doi.org/10.28945/4186","url":null,"abstract":"Aim/Purpose: Improving or changing business processes is one of the most important roles for Information technologies functions. Yet, most organizations struggle with planned process change and even more with unplanned change. There is little support from research as the dynamics of planned process change is understudied and unplanned process change is seldom researched.\u0000\u0000Background: This paper describes the impact of unplanned business process change from a systems perspective. The #feesmustfall student protest movement, which began in 2015, and affected Universities throughout South Africa provides the context.\u0000\u0000Methodology: An interpretive abductive case study at a South African university used Steven Alter’s Work System framework to describe the unplanned business process change that occurred due to the #feesmustfall student protest movement.\u0000\u0000Contribution: Theoretically, this paper demonstrates the practical use of Alter’s work system framework to analyze unplanned business process change. Practically, it de-scribes and explains the impacts of the change which may be useful to executives or administrators responsible for operational systems within organizations.\u0000\u0000Findings: During unplanned business process change, change management, staff training, customizable technology and strategic fluidity and focus were found to be important. Unplanned business process change results in all elements of the work systems and its environment changing, even resulting in changed products and customer behavior.\u0000\u0000Impact on Society: If organizations are more aware of the impacts of unplanned process change they will be better equipped to control them.\u0000\u0000Future Research: Future action research studies on unplanned business process change could suggest actions for manager’s dealing with them.","PeriodicalId":249265,"journal":{"name":"Proceedings of the 2019 InSITE Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132851890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aim/Purpose: This paper describes foundational principles of universal instructional design (UID), which is also known as universal design for learning, that support accessibility and inclusivity for a diverse population of students and discusses how these design principles and instructional strategies are being implemented in courses we instruct. Background: The goal of any instructor should be to ensure all students have their learning needs met. Unfortunately, this is complex. Each student is unique and can have individual learning needs and preferences. Consequently, it would likely be impossible to create instructional materials that address the specific learning needs and preferences of every individual. Principles of UID help to minimize this challenge. UID strategies should support deaf and hard of hearing individuals, students with a vision loss, learners who have difficulties staying focussed, weak readers, academically-weak students, students with low confidence, learners with high anxiety, individual learning preferences, and cultural minorities. UID principles should also lead to the creation of instructional materials that support cognitively-gifted students. The principles applied in our classroom, based on the principles of UID, helped to address these challenges that students have and foster a classroom environment that was conducive to supporting the diversity in our student population. Methodology: This is not applicable because this is a practical paper, not a research paper. Contribution This paper provides practical instructional strategies and techniques that can presumably help students with disabilities learn more effectively while also fostering a culture of inclusivity. Findings: There are no formal findings for this paper. Recommendations for Practitioners: Readers should consider applying the discussed instructional strategies and techniques to support their own students that have disabilities. Recommendations for Researchers: Researchers should create instructional interventions for students with specific disabilities and assess whether those interventions help students with that disability learn more effectively. Impact on Society: Although not proven by research on populations of individuals with disabilities, the presented instructional strategies and techniques are presumed to help students with a disability learn more effectively. The aim is for other instructors to create instructional materials with similar instructional strategies and techniques to enable accessibility and promote inclusivity for their diverse population of students. Future Research From a practical perspective, instructors should apply the presented instructional strategies and techniques in their classrooms for their diverse population of students. In-class research could be done afterwards.
{"title":"Classroom Implementation of Instructional Strategies and Techniques that are Based on Universal Instructional Design Principles and Support Diversity","authors":"Mark Overgaard, Peter Fenrich","doi":"10.28945/4197","DOIUrl":"https://doi.org/10.28945/4197","url":null,"abstract":"Aim/Purpose: This paper describes foundational principles of universal instructional design (UID), which is also known as universal design for learning, that support accessibility and inclusivity for a diverse population of students and discusses how these design principles and instructional strategies are being implemented in courses we instruct.\u0000\u0000Background: The goal of any instructor should be to ensure all students have their learning needs met. Unfortunately, this is complex. Each student is unique and can have individual learning needs and preferences. Consequently, it would likely be impossible to create instructional materials that address the specific learning needs and preferences of every individual. Principles of UID help to minimize this challenge. UID strategies should support deaf and hard of hearing individuals, students with a vision loss, learners who have difficulties staying focussed, weak readers, academically-weak students, students with low confidence, learners with high anxiety, individual learning preferences, and cultural minorities. UID principles should also lead to the creation of instructional materials that support cognitively-gifted students. The principles applied in our classroom, based on the principles of UID, helped to address these challenges that students have and foster a classroom environment that was conducive to supporting the diversity in our student population.\u0000\u0000Methodology: This is not applicable because this is a practical paper, not a research paper.\u0000Contribution This paper provides practical instructional strategies and techniques that can presumably help students with disabilities learn more effectively while also fostering a culture of inclusivity.\u0000\u0000Findings: There are no formal findings for this paper.\u0000\u0000Recommendations for Practitioners: Readers should consider applying the discussed instructional strategies and techniques to support their own students that have disabilities. \u0000\u0000Recommendations for Researchers: Researchers should create instructional interventions for students with specific disabilities and assess whether those interventions help students with that disability learn more effectively.\u0000\u0000Impact on Society: Although not proven by research on populations of individuals with disabilities, the presented instructional strategies and techniques are presumed to help students with a disability learn more effectively. The aim is for other instructors to create instructional materials with similar instructional strategies and techniques to enable accessibility and promote inclusivity for their diverse population of students.\u0000\u0000Future Research From a practical perspective, instructors should apply the presented instructional strategies and techniques in their classrooms for their diverse population of students. In-class research could be done afterwards.","PeriodicalId":249265,"journal":{"name":"Proceedings of the 2019 InSITE Conference","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123222651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Talia Yeshua, Sarah Rebibo, Keren Jacobson, O. Safran, M. Liebergall, I. Leichter
Aim/Purpose: The aim of the study was to analyze the structure of the bone tissue by using texture analysis of the bone trabeculae, as visualized in a routine radiograph of the proximal femur . This could provide objective information regarding both the mineral content and the spatial structure of bone tissue. Therefore, machine-learning tools were applied to explore the use of texture analysis for obtaining information on the bone strength. Background: One in three women in the world develops osteoporosis, which weakens the bones, causes atraumatic fractures and lowers the quality of life. The damage to the bones can be minimized by early diagnosis of the disease and preventive treatment, including appropriate nutrition, bone-building exercise and medications. Osteoporosis is currently diagnosed primarily by DEXA (Dual Energy X-ray Absorptiometry), which measures the bone mineral density alone. However, bone strength is determined not only by its mineral density but also by the spatial structure of bone trabeculae. In order to obtain valuable information regarding the bone strength, the mineral content and the spatial structure of the bone tissue should be objectively assessed. Methodology: The study includes 17 radiographs of in-vitro femurs without soft tissue and 44 routine proximal femur radiographs (15 subjects with osteoporotic fractures and 29 without a fracture). The critical force required to fracture the in-vitro femurs was measured and the bones were divided into two groups: 11 solid bones with critical fracture force higher than 4.9kN and 6 fragile bones with critical fracture force lower than 4.9kN. All the radiographs included an aluminum step-wedge for calibrating the gray-levels values (See Figure 3). An algorithm was developed to automatically adjust the gray levels in order to yield equal brightness and contrast. Findings: The algorithm characterized the in-vitro bones with as fragile or solid with an accuracy of 88%. For the radiographs of the patients, the algorithm characterized the bones as osteoporotic or non-osteoporotic with an accuracy of 86%. The most prominent features for estimating the bone strength were the mean gray-level, which is related to bone density, and the smoothness, uniformity and entropy, which are related to the spatial distribution of the bone trabeculae. Impact on Society: Analysis of bone tissue structure, using machine-learning tools will provide a significant information on the bone strength, for the early diagnosis of osteoporosis. The structure analysis can be performed on routine radiographs of the proximal femur, with high accuracy. Future Research: The algorithm for automatic structure analysis of bone tissue as visualized on a routine femoral radiograph should be further trained on a larger dataset of routine radiographs in order to improve the accuracy of assessing the bone strength.
{"title":"An Informative Machine-Learning Tool for Diagnosis of Osteoporosis using Routine Femoral Neck Radiographs","authors":"Talia Yeshua, Sarah Rebibo, Keren Jacobson, O. Safran, M. Liebergall, I. Leichter","doi":"10.28945/4350","DOIUrl":"https://doi.org/10.28945/4350","url":null,"abstract":"Aim/Purpose: The aim of the study was to analyze the structure of the bone tissue by using texture analysis of the bone trabeculae, as visualized in a routine radiograph of the proximal femur . This could provide objective information regarding both the mineral content and the spatial structure of bone tissue. Therefore, machine-learning tools were applied to explore the use of texture analysis for obtaining information on the bone strength.\u0000\u0000Background: One in three women in the world develops osteoporosis, which weakens the bones, causes atraumatic fractures and lowers the quality of life. The damage to the bones can be minimized by early diagnosis of the disease and preventive treatment, including appropriate nutrition, bone-building exercise and medications. Osteoporosis is currently diagnosed primarily by DEXA (Dual Energy X-ray Absorptiometry), which measures the bone mineral density alone. However, bone strength is determined not only by its mineral density but also by the spatial structure of bone trabeculae. In order to obtain valuable information regarding the bone strength, the mineral content and the spatial structure of the bone tissue should be objectively assessed.\u0000\u0000 Methodology: The study includes 17 radiographs of in-vitro femurs without soft tissue and 44 routine proximal femur radiographs (15 subjects with osteoporotic fractures and 29 without a fracture). The critical force required to fracture the in-vitro femurs was measured and the bones were divided into two groups: 11 solid bones with critical fracture force higher than 4.9kN and 6 fragile bones with critical fracture force lower than 4.9kN. All the radiographs included an aluminum step-wedge for calibrating the gray-levels values (See Figure 3). An algorithm was developed to automatically adjust the gray levels in order to yield equal brightness and contrast.\u0000\u0000Findings: The algorithm characterized the in-vitro bones with as fragile or solid with an accuracy of 88%. For the radiographs of the patients, the algorithm characterized the bones as osteoporotic or non-osteoporotic with an accuracy of 86%. The most prominent features for estimating the bone strength were the mean gray-level, which is related to bone density, and the smoothness, uniformity and entropy, which are related to the spatial distribution of the bone trabeculae.\u0000\u0000Impact on Society: Analysis of bone tissue structure, using machine-learning tools will provide a significant information on the bone strength, for the early diagnosis of osteoporosis. The structure analysis can be performed on routine radiographs of the proximal femur, with high accuracy.\u0000\u0000Future Research: The algorithm for automatic structure analysis of bone tissue as visualized on a routine femoral radiograph should be further trained on a larger dataset of routine radiographs in order to improve the accuracy of assessing the bone strength.","PeriodicalId":249265,"journal":{"name":"Proceedings of the 2019 InSITE Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132784398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aim/Purpose: Build a program that teaches prospect managers the skills that are relevant for leading data science activity. Background: Data science becomes ubiquitous in organizations. It is imperative to train students in management departments in the skills that are relevant to this field. Most courses in data science focus on technical knowledge like model building methods, and neglect organizational knowledge such as team roles, ethical considerations and project stages. This work suggests a complementary program that supplies the students with the required knowledge. The authors believe that this program is most suitable for management-students, and that it can also be adapted to software engineering students, in order to provide them with a wider scope. Contribution: We present the MaDaScA (Managing Data Science Activity) program. The program defines a list of topics that are required for managers’ education in order to lead data science activity. This work suggests the content and take-away messages of each topic. The paper surveys several existing courses that teach data-science to managers. Findings: All existing courses supply a part of the suggested topics, either focusing on technical aspects of data-science or on organizational aspects. In particular, only a small minority of the courses discuss ethical aspects of data science. Recommendations for Practitioners: We recommend adopting MaDaScA in management departments in order to prepare managers for the challenges in data-science. Recommendations for Researchers: We recommend adapting the MaDaScA model to the curriculum of the faculty of engineering, especially for the department of industrial engineering. Impact on Society: Educating prospect managers on the capabilities of data science and responsibilities that come with it is key for making sure organizations become much more data driven, efficient and ethical. Future Research: It is possible to make this program more effective by adding practical experience
{"title":"MaDaScA: Instruction of Data Science to Managers","authors":"Shahar Golan, D. Bouhnik","doi":"10.28945/4271","DOIUrl":"https://doi.org/10.28945/4271","url":null,"abstract":"Aim/Purpose: Build a program that teaches prospect managers the skills that are relevant for leading data science activity.\u0000\u0000Background: Data science becomes ubiquitous in organizations. It is imperative to train students in management departments in the skills that are relevant to this field. Most courses in data science focus on technical knowledge like model building methods, and neglect organizational knowledge such as team roles, ethical considerations and project stages. This work suggests a complementary program that supplies the students with the required knowledge. The authors believe that this program is most suitable for management-students, and that it can also be adapted to software engineering students, in order to provide them with a wider scope.\u0000\u0000Contribution: We present the MaDaScA (Managing Data Science Activity) program. The program defines a list of topics that are required for managers’ education in order to lead data science activity. This work suggests the content and take-away messages of each topic. The paper surveys several existing courses that teach data-science to managers. \u0000\u0000Findings: All existing courses supply a part of the suggested topics, either focusing on technical aspects of data-science or on organizational aspects. In particular, only a small minority of the courses discuss ethical aspects of data science. \u0000\u0000Recommendations for Practitioners: We recommend adopting MaDaScA in management departments in order to prepare managers for the challenges in data-science.\u0000\u0000Recommendations for Researchers: We recommend adapting the MaDaScA model to the curriculum of the faculty of engineering, especially for the department of industrial engineering. \u0000\u0000Impact on Society: Educating prospect managers on the capabilities of data science and responsibilities that come with it is key for making sure organizations become much more data driven, efficient and ethical. \u0000\u0000Future Research: It is possible to make this program more effective by adding practical experience","PeriodicalId":249265,"journal":{"name":"Proceedings of the 2019 InSITE Conference","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124604656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aim/Purpose: This is a discussion of research in progress. The study will attempt to address the research question, what is the impact of the “No fear Act “on the current definition of diversity by the various CFO Act agencies and how does it influence the recruitment of CFOs and their deputies within the federal CFO agencies?
{"title":"The Potential Impact of the “No Fear Act” on Equity and Diversity among Federal CFO Act Agencies: What is the Trend of Occupational Segregation [Research-in-Progress]","authors":"D. Acheampong","doi":"10.28945/4262","DOIUrl":"https://doi.org/10.28945/4262","url":null,"abstract":"Aim/Purpose: This is a discussion of research in progress. The study will attempt to address the research question, what is the impact of the “No fear Act “on the current definition of diversity by the various CFO Act agencies and how does it influence the recruitment of CFOs and their deputies within the federal CFO agencies?","PeriodicalId":249265,"journal":{"name":"Proceedings of the 2019 InSITE Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131075443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aim/Purpose: Today more and more transactions and acquisitions are controlled directly from mobile devices, especially smartphones applications. Previous studies have examined the adoption of financial applications based on a single theory as a theoretical basis. In order to examine the phenomenon in a wider way, we used in this study two theories as a theoretical basis. Background: It is important to define the main technological and psychological factors that affect the choice of potential customers to adopt or prefer financial applications. By combining two theories in the study, we expanded the examination of the phenomenon of adopting financial technology. Methodology: The study questionnaire was based on two questionnaires from previous studies. The questionnaire was tested on a focus group and certain adjustments were made based on the feedback. Thereupon, the questionnaire was sent online via social media. A total of 497 questionnaires were received, 402 were filled correctly and found suitable for statistical analysis. The statistical analysis included Alpha Cronbach Test, Pearson correlation test, and linear regression. Contribution: By combining DIT theory (Diffusion of Innovative Technology) suggested by Rogers, and TAM model (Technology Acceptance Model) presented by Davis, we expanding our understanding of the technological and psychological factors affecting financial application validation. Finding the influencing factors can help develop and implement future financial applications. Banks will be able to develop applications that truly meet the needs, desires and concerns of their target customers, thus able to save costs and improve their services to their customers. Findings: Six factors were tested in this study: relative advantage, complexity, compatibility, observability, experiencing, and perceived risk. The main findings showed significant negative correlation between age and relative advantage, so that as the age of the user increased the relative advantage decreased. In addition, a significant positive correlation was found between age and observability, so that as the age of the user increased the observability decreased. Also was found a significant negative correlation between age and the variable adoption of a financial application, so that as the age of the subject increases the financial application adoption decreases. No significant correlation was found between age and compatibility, complexity, relative risk. In addition, a significant positive correlation was found between the numbers of months of experience that the bank offers to the customers to the positive decision to adopt a financial application. No significant correlation was found between the demographic variables, education and wages, and financial application adoption. The regression analysis led to a significant result, so that the variables together explain 69.3% adoption of financial application. According to the research hypothesis, the rel
{"title":"Influence Factors on the Adoption of a Financial Application [Abstract]","authors":"Golan Carmi, Nethanel Jay Drezner","doi":"10.28945/4273","DOIUrl":"https://doi.org/10.28945/4273","url":null,"abstract":"Aim/Purpose: Today more and more transactions and acquisitions are controlled directly from mobile devices, especially smartphones applications. Previous studies have examined the adoption of financial applications based on a single theory as a theoretical basis. In order to examine the phenomenon in a wider way, we used in this study two theories as a theoretical basis. \u0000\u0000Background: It is important to define the main technological and psychological factors that affect the choice of potential customers to adopt or prefer financial applications. By combining two theories in the study, we expanded the examination of the phenomenon of adopting financial technology. \u0000\u0000Methodology: The study questionnaire was based on two questionnaires from previous studies. The questionnaire was tested on a focus group and certain adjustments were made based on the feedback. Thereupon, the questionnaire was sent online via social media. A total of 497 questionnaires were received, 402 were filled correctly and found suitable for statistical analysis. The statistical analysis included Alpha Cronbach Test, Pearson correlation test, and linear regression. \u0000\u0000Contribution: By combining DIT theory (Diffusion of Innovative Technology) suggested by Rogers, and TAM model (Technology Acceptance Model) presented by Davis, we expanding our understanding of the technological and psychological factors affecting financial application validation. Finding the influencing factors can help develop and implement future financial applications. Banks will be able to develop applications that truly meet the needs, desires and concerns of their target customers, thus able to save costs and improve their services to their customers.\u0000\u0000Findings: Six factors were tested in this study: relative advantage, complexity, compatibility, observability, experiencing, and perceived risk. The main findings showed significant negative correlation between age and relative advantage, so that as the age of the user increased the relative advantage decreased. In addition, a significant positive correlation was found between age and observability, so that as the age of the user increased the observability decreased. Also was found a significant negative correlation between age and the variable adoption of a financial application, so that as the age of the subject increases the financial application adoption decreases. No significant correlation was found between age and compatibility, complexity, relative risk. In addition, a significant positive correlation was found between the numbers of months of experience that the bank offers to the customers to the positive decision to adopt a financial application. No significant correlation was found between the demographic variables, education and wages, and financial application adoption. The regression analysis led to a significant result, so that the variables together explain 69.3% adoption of financial application. According to the research hypothesis, the rel","PeriodicalId":249265,"journal":{"name":"Proceedings of the 2019 InSITE Conference","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129181910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aim/Purpose: Educational stakeholders have little understanding of digital educational badg-ing. Background A current overview of the developing educational badging ecosystem, key terminology, advantages, challenges, and examples of badge utilization. Methodology: Illustrative case study Contribution: Creates a record of the developing digital badge industry providing insights to educational stakeholders. Findings: Highly dynamic industry, developing unique terminology, may improve access to higher education, reduce credential fraud, decrease concerns about vague transcripts, and support customized learning. The challenges include a crowded market with many providers, establishing standards, and determining the value proposition of the credential. Recommendations for Practitioners: Before engaging in a long-term badging strategy, understand the badging system as well as the advantages and challenges of this innovation. Recommendations for Researchers: Consider the profound shift offered by the badging system and the relationship that digital educational badges have on grounded theory related to credentials such as human capital development theory, signaling theory, and credentialism theory. Impact on Society: Digital badging marks a paradigm shift in how we think about formal human development; from one that is institution-centric and bounded to one that is learner-centric and unbounded. Future Research: As a new innovation, there is a wide range of needed research. Most current research involves motivational impacts on K-12 learners. Based on this investigation, research regarding impact on access, pedagogy, security, credential information granularity, case studies about choosing a badging platform, value proposition, and the development of standards is needed.
{"title":"An Overview of the Global Open Educational Badge Movement: Opportunities and Challenges [Abstract]","authors":"T. Mcgovern","doi":"10.28945/4242","DOIUrl":"https://doi.org/10.28945/4242","url":null,"abstract":"Aim/Purpose: Educational stakeholders have little understanding of digital educational badg-ing.\u0000Background A current overview of the developing educational badging ecosystem, key terminology, advantages, challenges, and examples of badge utilization. \u0000\u0000Methodology: Illustrative case study\u0000\u0000Contribution: Creates a record of the developing digital badge industry providing insights to educational stakeholders.\u0000\u0000Findings: Highly dynamic industry, developing unique terminology, may improve access to higher education, reduce credential fraud, decrease concerns about vague transcripts, and support customized learning. The challenges include a crowded market with many providers, establishing standards, and determining the value proposition of the credential. \u0000\u0000Recommendations for Practitioners: Before engaging in a long-term badging strategy, understand the badging system as well as the advantages and challenges of this innovation.\u0000\u0000Recommendations for Researchers: Consider the profound shift offered by the badging system and the relationship that digital educational badges have on grounded theory related to credentials such as human capital development theory, signaling theory, and credentialism theory.\u0000\u0000Impact on Society: Digital badging marks a paradigm shift in how we think about formal human development; from one that is institution-centric and bounded to one that is learner-centric and unbounded. \u0000\u0000Future Research: As a new innovation, there is a wide range of needed research. Most current research involves motivational impacts on K-12 learners. Based on this investigation, research regarding impact on access, pedagogy, security, credential information granularity, case studies about choosing a badging platform, value proposition, and the development of standards is needed.","PeriodicalId":249265,"journal":{"name":"Proceedings of the 2019 InSITE Conference","volume":"92 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124796195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}