Opening the Black Box : How Data
نویسنده
چکیده
Opening the Black Box: How Data Mining Works with examples for Social Scientists in Higher Education Research Terrence Willett © 200
منابع مشابه
Opening the Black Box of Electronic Health: Collecting, Analyzing, and Interpreting Log Data
In electronic health (eHealth) research, limited insight has been obtained on process outcomes or how the use of technology has contributed to the users' ability to have a healthier life, improved well-being, or activate new attitudes in their daily tasks. As a result, eHealth is often perceived as a black box. To open this black box of eHealth, methodologies must extend beyond the classic effe...
متن کاملOn the round complexity of black-box constructions of commitments secure against selective opening attacks
Selective opening attacks against commitment schemes occur when the commitment scheme is repeated in parallel and an adversary can choose depending on the commit-phase transcript to see the values and openings to some subset of the committed bits. Commitments are secure under such attacks if one can prove that the remaining, unopened commitments stay secret. We prove the following black-box con...
متن کاملExplaining Employee Engagement with Strategic Change Implementation: A Meaning-Making Approach
Using a framework of meaning-making derived from social psychological research on how individuals manage adverse life events and research on sensemaking, we develop and test theory about how frontline employees overcome the challenges of implementing strategic change. We find certain types of meaning-making (strategy worldview and benefits finding) can create the requisite psychological resourc...
متن کاملErrata to (Nearly) Round-Optimal Black-Box Constructions of Commitments Secure against Selective Opening Attacks
Selective opening attacks against commitment schemes occur when the commitment scheme is repeated in parallel (or concurrently) and an adversary can choose depending on the commit-phase transcript to see the values and openings to some subset of the committed bits. Commitments are secure under such attacks if one can prove that the remaining, unopened commitments stay secret. We prove the follo...
متن کامل