Search results for "evaluation"
showing 10 items of 1974 documents
What Can You Achieve in Eight Years? : A Case Study on Participation, Effectiveness, and Overall Impact of a Comprehensive Workplace Health Promotion…
2019
Objective: To investigate participation and effectiveness of a multiyear comprehensive workplace health promotion (WHP) program. Methods: Participation and effectiveness data came from employer and vendor systems. Health data came from health risk assessments (HRA) and biometric screenings. Participation and effectiveness were analyzed using descriptive analyses, T-tests and Mann-Whitney U tests where appropriate. Overall impact was assessed using the PIPE Impact Metric. Results: 86% of employees completed the HRA and 80% the biometrical screenings. Annual participation rate was 24%, and total reach was 58%. The portion of successful participants was 23% in 2010–2013 and 18% in 2014–2017. P…
A Framework to Assess Social Capital Development in Public Policies
2015
From “Strategic Fit” to Synergy Evaluation in M&A Deals
2012
The aim of this paper is to grasp the processes underlying the genesis and assessment of synergies in M&A deals. We proceed to an in-depth scrutiny of the foundations of synergies using Porter’s model of the value chain. A discernment of the nature of synergies and the mode of their emergence is helpful to clarify to what extent and under which boundary conditions it is appropriate to apply the DCF or the real option techniques for evaluating each type of synergy. Combining both financial tools, the methodology suggested for evaluating the synergies is able to: evaluate projects of M&As, orient the selection of target firms and the definition of the premium of acquisition, and drive…
Employees’ adherence to information security policies: An exploratory field study
2014
The key threat to information security comes from employees who do not comply with information security policies. We developed a new multi-theory based model that explained employees' adherence to security policies. The paradigm combines elements from the Protection Motivation Theory, the Theory of Reasoned Action, and the Cognitive Evaluation Theory. We validated the model by using a sample of 669 responses from four corporations in Finland. The SEM-based results showed that perceived severity of potential information security threats, employees' belief as to whether they can apply and adhere to information security policies, perceived vulnerability to potential security threats, employees…
Design time, run time, and artificial intelligence techniques for mobility of user interface
2011
Abstract Advancement in technology provides opportunities to user as well as challenges for application development organization. User interfaces which were design for specific device tend to be developed for various devices. Users are busy people, when they move among different context would like to move application with them. The current trend of users demanding mobile graphic user interface to support their daily life and work has led to a new generation of techniques. Design time technique provides better usability as compare to run time technique. On the other hand artificial intelligence technique like agent provides better flexibility and usability as compare to others. In this paper…
On the Students' QoS-Awareness of Video Lectures
2016
Video lectures bring flexibility and enable distance learning in education. With the help of videos, educational organizations are able to serve a wider and more heterogeneous group of students. As streaming videos have become essential part of teaching in higher education, quality of service (QoS) issues should be taken more into consideration. However, systematic quality monitoring of video lecture delivery, to our knowledge, is rarely used in a way that would provide also the student with quality information. This paper describes our ongoing research on developing a streaming video quality evaluation tool integrated in a learning environment that our master’s students use. The tool serve…
Multi-hop D2D Communications with Network Coding : From A Performance Perspective
2019
Multi-hop device-to-device (D2D) communications play an important role in expanding D2D coverage. In this paper, we study a relay-based and network-coding-assisted (in particular, XOR coding) multi-hop D2D communication system. In the system, toward jointly considering the impact of interference and network traffic conditions on the quality of D2D communications, various channel fading models and traffic models are investigated, and the packet loss probability of D2D links is meticulously computed using these models. With the packet loss probability of D2D links, the general closed-form expressions of end-to-end packet loss probability (E2EPLP) of the system with the presence (or absence) o…
Strengthening Institutional Isomorphism in Development NGOs? Program Mechanisms in an Organizational Intervention
2017
Nongovernmental organizations (NGOs) in international development struggle between being actors in the mainstream or representatives of alternatives to it. However, many NGOs all over the world align with the mainstream and are increasingly similar to each other. This homogenization results from institutional isomorphism, which is affected by their aspirations to be legitimate vis-á-vis the international field. Consultancies are among the main practices to promote normative isomorphism, but little is known about their micro-level dynamics. Drawing on the notion of program mechanisms in realistic evaluation, we scrutinize how external facilitators in organizational development processes enab…
Sensory changes with age and impact on appetite and food intake
2017
International audience
Sensory evaluation: How to measure olfactory and taste sensations?
2015
National audience