Modeling Information Access in Construct

نویسندگان

  • Brian R. Hirshman
  • Michael K. Martin
  • Kathleen M. Carley
چکیده

Literacy and other interaction mechanisms have been shown to be important factors in determining whether and how individuals interact with printed and other forms of media. This lack of access to – or in cases, misinformation from – such types of media has an important social component for Construct modeling. This technical report describes the information access features in Construct, both from an algorithmic and input perspective. It describes the literacy model implemented in Construct, as well as the internet access and newspaper readership modifications to past interventions. This document is intended primarily as a reference guide for literacy and access modeling in Construct, and assumes at least some familiarity with the Construct modeling environment. A short example experiment using the literacy mechanism is described towards the end of this report. This work was supported in part by the IRS project in Computational Modeling and the NSF IGERT in CASOS (DGE 997276). In addition support for Construct was provided in part by Office of Naval Research (N00014-06-1-0104), the National Science Foundation (SES-0452487), and the AirForce Office of Sponsored Research (MURI: Cultural Modeling of the Adversary, 600322) for research in the area of dynamic network analysis. Additional support was provided by CASOS the center for Computational Analysis of Social and Organizational Systems at Carnegie Mellon University. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Office of Naval Research, the National Science Foundation, the Army Research Lab or the U.S. government.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A model for specification, composition and verification of access control policies and its application to web services

Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...

متن کامل

Designing a Model to Measure the Effective Factors of Information Systems in the Marketing of Sporting Goods

 The aim of the present study was to analyze the effect of information systems on sporting goods marketing based on the mix model. 440 students who had sport insurance were selected as the sample. A researcher-made questionnaire with 27 items was used; eventually, 23 items (mixed price 6 items, product 6 items, advertising 4 items, and distribution 7 items) were selected after its construct rel...

متن کامل

Access and Mobility Policy Control at the Network Edge

The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...

متن کامل

Application of NCEPCFSR Climatic Database Information in the Absence of Observational Information of Dez Dam Watershed

Rainfall-Runoff simulation is one of the main subject of hydrology and environmental management. Therefore, researchers are constantly interested in finding new ways to solve this problem and modify existing models or modeling methods. However, the lack of statistics and information from the poor development of hydrological networks has always been a major problem in countries that facing finan...

متن کامل

Revisiting Technology Acceptance Model with Social Influence Factors

Despite many numbers of studies in Technology Acceptance Model (TAM), the social influence construct has not been recognized, nor handled clearly. This study includes the social influence construct in TAM and tests the robustness of the model for different information systems contexts: office automation (spreadsheet) and Internet usage. Study findings include that 1) social influence has a dire...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008