Evaluation of Dashboard Interactivity for a Local Foodbank

Author(s):  
Yogeeta Desai ◽  
Steven Jiang ◽  
Lauren Davis

Food insecurity is a serious problem and non-profit humanitarian relief agencies such as foodbanks play a significant role in fighting hunger. Each foodbank collects a lot of data every day. However, the complexity of the data collected from the relief operations provide a challenge for the foodbank managers to make informed decisions. Working with a local foodbank, we have developed dashboards that provide visualized information and allow users to interact with the tool. The effectiveness of the dashboard interactivity was evaluated in an empirical study. Results revealed that different types of interactivity had an impact on user performance. Findings from this research can help designers improve their dashboard design.

2019 ◽  
Vol 17 (4) ◽  
pp. 753-779
Author(s):  
Dapo Akande ◽  
Emanuela-Chiara Gillard

Abstract This article examines the rules of international humanitarian law (IHL) relevant to avoiding or minimizing conflict-induced food insecurity. It is important to consider these rules in order to appreciate the range of protections to which civilians are entitled. Understanding these rules is also essential for interpreting the relevant provisions of international criminal law, including, most notably, the war crime of starvation of the civilian population. After providing a brief outline of the general rules of IHL respect of which can reduce the risk of food insecurity, the article focuses on two sets of rules of direct relevance to food insecurity: the prohibition of starvation of civilians as a method of warfare and the rules regulating humanitarian relief operation. With regard to the former, the article considers whether, under IHL, the prohibition requires that the party that has engaged in the conduct must act with the purpose of causing starvation. It is argued that while the general prohibition of starvation in IHL requires such purpose, there are other, more specific, rules of IHL directed at reducing food insecurity which do not require such purpose. Consideration is also given to the application of the principle of proportionality to measures which have the effect of causing starvation. While most of this article focuses on IHL, it also provides some reflections on the interplay between the rules of IHL relating to humanitarian relief operations and the war crime of starvation in the International Criminal Court’s Statute. Moving briefly away from IHL, the article also highlights a normative tension that can impede humanitarian action and therefore exacerbate food insecurity.


2021 ◽  
Vol 13 (6) ◽  
pp. 3024
Author(s):  
Alessandra Cozzolino

As disasters become progressively more frequent and complex, better collaboration through partnerships with private business becomes more important. This research aimed to understand how platforms support the engagement of the private sector—especially logistics businesses—in humanitarian relief operations. The study was based on a literature review and on an investigation of an emblematic case of the cross-sector platform, recognized at a global level in logistics and supply chain management, between the United Nations World Food Programme and the Logistics Emergency Teams (WFP/LET), composed of four global leading logistics providers. The insights resulting from this paper may be of particular interest to both academics and professionals regarding the two sectors, profit and non-profit. This is because the implementation of the platform reflects the concrete benefit for people in need reached by the humanitarian relief operations. It may also constitute a useful tool for building an agile supply chain capable of being resilient in responding to sudden and unexpected changes in the context, both in humanitarian and commercial supply chains.


2015 ◽  
Author(s):  
Sheung-Chi Chow ◽  
Tai-Yuen Hon ◽  
Wing-Keung Wong ◽  
Kai Yin Woo

Author(s):  
Steven Bernstein

This commentary discusses three challenges for the promising and ambitious research agenda outlined in the volume. First, it interrogates the volume’s attempts to differentiate political communities of legitimation, which may vary widely in composition, power, and relevance across institutions and geographies, with important implications not only for who matters, but also for what gets legitimated, and with what consequences. Second, it examines avenues to overcome possible trade-offs from gains in empirical tractability achieved through the volume’s focus on actor beliefs and strategies. One such trade-off is less attention to evolving norms and cultural factors that may underpin actors’ expectations about what legitimacy requires. Third, it addresses the challenge of theory building that can link legitimacy sources, (de)legitimation practices, audiences, and consequences of legitimacy across different types of institutions.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Jiaqi Wang ◽  
Yan Chen ◽  
Qinyao Xu ◽  
Miaomiao Cai ◽  
Qian Shi ◽  
...  

AbstractSuperhydrophobic sponges have considerable potential for oil/water separation. Most of the methods used for superhydrophobic modification of sponges require toxic or harmful solvents, which have the drawbacks of hazardous to environment, expensive, and complex to utilize. Moreover, the hydrophobic layer on the surface of sponge is often easily destroyed. In this paper, a highly efficient superhydrophobic sponge with excellent reusability was developed by using a facile, simple and environmentally friendly dopamine biomimetic bonding method. Different types of sponges, such as melamine, polyethylene or polyurethane sponge wastes, were used as raw materials to prepare superhydrophobic sponges, which possess the advantages of inexpensive and abundant. The effects of different dopamine polymerization time and different hydrophobic agent dosage on the hydrophobicity and oil absorption capacity of melamine sponges were optimized. The study results showed that the water contact angle of the superhydrophobic sponge could reach 153° with excellent organic solvent absorption capacity of 165.9 g/g. Furthermore, the superhydrophobic sponge retained approximately 92.1% of its initial absorption capacity after 35 reutilization cycles. More importantly, the dopamine biomimetic bonding superhydrophobic modification method can be used for different types of sponges. Therefore, a universally applicable, facile, simple and environmentally friendly superhydrophobic modification method for sponges was developed.


2010 ◽  
Vol 41 (3) ◽  
pp. 325-344 ◽  
Author(s):  
Jacky Swan ◽  
Harry Scarbrough ◽  
Sue Newell

Many different types of organizations use projects to accomplish specific tasks, especially tasks that involve innovation and change. However, there are often problems associated with both learning within projects and learning transfer from projects to the wider organization. Previous research suggests that these problems vary according to the organizational context, in particular the extent to which the organization is centred on the delivery of projects. Also, the link between project-based learning and organizational learning may be far from seamless, and may require the deployment of a range of learning mechanisms to be effective. In this article we explore and explain these problems through an empirical study which examined project-based learning across different organizational contexts. This study highlights the limitations of learning mechanisms based on reflection and codification. It suggests that firms generally only learn from projects, if at all, via the accumulation of experience amongst groups and individuals. The study suggests, however, that the accumulation of experience is most pronounced in organizational contexts which are project centred and where project management capabilities are well developed. In contrast, in organizations where projects are more varied and occasional, the struggle to exploit the highly heterogeneous forms of learning created within projects is greater.


Author(s):  
Zheng Song ◽  
Thomas J. Howard ◽  
Sofiane Achiche ◽  
Ali G. Özkil

Capturing users’ needs is critical in web site design. However, a lot of attention has been paid to enhance the functionality and usability, whereas much less consideration has been given to satisfy the emotional needs of users, which is also important to a successful design. This paper explores a methodology based on Kansei Engineering, which was significant used in product and industrial design but not quite been adopted in the IT field, in order to discover implicit emotional needs of users toward web site and transform them into design details. Survey, interview techniques and statistical methods were performed in this paper. A prototype web site was developed based on the Kansei study results integrated with technical expertise and practical considerations. The results showed that the Kansei Engineering methodology, in this paper, played a significant role in web site design in terms of satisfying the emotional needs of users.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Haifa F. Fawaris

Purpose This study aims to clarify the role of Muslim women in managing their families during the corona pandemic crisis. To achieve this aim, the researcher applied the descriptive and analytical approach. Design/methodology/approach The Muslim women have had a prominent position consistent with the physical, psychological and mental characteristics that Allah has created them. This status is shown by: affirming their rights in all areas of life; affirming everything that preserved the dignity of women before Islam; and correcting all the conditions that detracted their dignity before the advent of Islam and making them responsible in public Islamic life on the level of: preserving Islam, spreading the Islamic call and achieving the civilization advancement of the Muslim nation. Findings The study resulted in many significant results. The most important one of the study results was that, in the context of woman rights and responsibilities she had assumed in Islam, the Muslim woman had a prominent position in Islam. In addition, the mother in the Muslim family had a significant role as a leader, who is capable of managing the family in corona crisis and supporting family members in all aspects such as faith, intellectual endeavors, psychological, social and health, so that they are real leaders. Originality/value The study recommends carrying out educational studies that identify and show the role of institutions other than the family in managing emergency crises.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ramaraj Palanisamy ◽  
Yang Wu

Purpose This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for various business applications including ES to increase the flexibility and to gain sustainable competitive advantage. At the same time, end-users are exposed to security issues when using mobile technologies. The ES have seen breaches and malicious intrusions thereby more sophisticated recreational and commercial cybercrimes have been witnessed. ES have seen data breaches and malicious intrusions leading to more sophisticated cybercrimes. Considering the significance of security in ES mobility, the research questions in this study are: What are the security issues of ES mobility? What are the influences of users’ attitude towards those security issues? What is the impact of users’ attitude towards security issues on perceived security of ES mobility? Design/methodology/approach These questions are addressed by empirically testing a security model of mobile ES by collecting data from users of ES mobile systems. Hypotheses were evolved and tested by data collected through a survey questionnaire. The questionnaire survey was administered to 331 users from Chinese small and medium-sized enterprises (SME). The data was statistically analysed by tools such as correlation, factor analysis, regression and the study built a structural equation model (SEM) to examine the interactions between the variables. Findings The study results have identified the following security issues: users’ attitude towards mobile device security issues; users’ attitude towards wireless network security issues; users’ attitude towards cloud computing security issues; users’ attitude towards application-level security issues; users’ attitude towards data (access) level security issues; and users’ attitude towards enterprise-level security issues. Research limitations/implications The study results are based on a sample of users from Chinese SMEs. The findings may lack generalizability. Therefore, researchers are encouraged to examine the model in a different context. The issues requiring further investigation are the role of gender and type of device on perceived security of ES mobile systems. Practical implications The results show that the key security issues are related to a mobile device, wireless network, cloud computing, applications, data and enterprise. By understanding these issues and the best practices, organizations can maintain a high level of security of their mobile ES. Social implications Apart from understanding the best practices and the key issues, the authors suggest management and end-users to work collaboratively to achieve a high level of security of the mobile ES. Originality/value This is an empirical study conducted from the users’ perspective for validating the set of research hypotheses related to key security issues on the perceived security of mobile ES.


1992 ◽  
Vol 15 (3) ◽  
pp. 223-228 ◽  
Author(s):  
Sharon Vaughn ◽  
Jeanne Shay Schumm ◽  
Jane Gordon

This research evaluated the efficacy of handwriting, letter tiles, and computer-based instruction on the early spelling acquisition of normal achieving (NLD) and learning disabled (LD) elementary students. The study replicated and extended the Cunningham and Stanovich (1990) study. Forty-eight primary-grade students (24 non-learning disabled; 24 learning disabled) received spelling training under three experimental conditions that involved different types of instructional activity: writing, sorting letter tiles, or typing on the computer. Results indicated no significant differences between the LD and NLD groups on words spelled correctly for any of the three conditions. Since the number of spelling words learned was low across conditions and groups, the number of correctly learned bigrams was examined. No within-group differences emerged for condition (writing, tile, computer); however, significant differences between the groups were found on number of bigrams learned for writing, tile, and computer, with the NLD group outperforming the LD group on all three conditions. Statistically significant time effects for bigrams were also noted for all three conditions. Unlike the Cunningham and Stanovich (1990) study, results did not replicate the superiority of the handwriting condition for the NLD group, nor was the handwriting condition found to be significantly more effective for the LD group.


Sign in / Sign up

Export Citation Format

Share Document