scholarly journals A novel approach to calculate individuals’ carbon footprints using financial transaction data – App development and design

2020 ◽  
Vol 256 ◽  
pp. 120396 ◽  
Author(s):  
David Andersson
2021 ◽  
Author(s):  
Scott Baker ◽  
Lorenz Kueng

2020 ◽  
Vol 123 (12) ◽  
pp. 1406-1414
Author(s):  
M. A. Morris ◽  
E. L. Wilkins ◽  
M. Galazoula ◽  
S. D. Clark ◽  
M. Birkin

AbstractStarting university is an important time with respect to dietary changes. This study reports a novel approach to assessing student diet by utilising student-level food transaction data to explore dietary patterns. First-year students living in catered accommodation at the University of Leeds (UK) received pre-credited food cards for use in university catering facilities. Food card transaction data were obtained for semester 1, 2016 and linked with student age and sex. k-Means cluster analysis was applied to the transaction data to identify clusters of food purchasing behaviours. Differences in demographic and behavioural characteristics across clusters were examined using χ2 tests. The semester was divided into three time periods to explore longitudinal changes in purchasing patterns. Seven dietary clusters were identified: ‘Vegetarian’, ‘Omnivores’, ‘Dieters’, ‘Dish of the Day’, ‘Grab-and-Go’, ‘Carb Lovers’ and ‘Snackers’. There were statistically significant differences in sex (P < 0·001), with women dominating the Vegetarian and Dieters, age (P = 0·003), with over 20s representing a high proportion of the Omnivores and time of day of transactions (P < 0·001), with Dieters and Snackers purchasing least at breakfast. Many students (n 474, 60·4 %) changed dietary cluster across the semester. This study demonstrates that transactional data present a feasible method for dietary assessment, collecting detailed dietary information over time and at scale, while eliminating participant burden and possible bias from self-selection, observation and attrition. It revealed that student diets are complex and that simplistic measures of diet, focusing on narrow food groups in isolation, are unlikely to adequately capture dietary behaviours.


2014 ◽  
Vol 104 (1) ◽  
pp. 224-251 ◽  
Author(s):  
Marco Cipriani ◽  
Antonio Guarino

We develop a new methodology to estimate herd behavior in financial markets. We build a model of informational herding that can be estimated with financial transaction data. In the model, rational herding arises because of information-event uncertainty. We estimate the model using data on a NYSE stock (Ashland Inc.) during 1995. Herding occurs often and is particularly pervasive on some days. On average, the proportion of herd buyers is 2 percent; that of herd sellers is 4 percent. Herding also causes important informational inefficiencies in the market, amounting, on average, to 4 percent of the asset's expected value. (JEL C58, D82, D83, G12, G14)


2018 ◽  
Vol 9 (1) ◽  
pp. 1-26 ◽  
Author(s):  
Suppawong Tuarob ◽  
Ray Strong ◽  
Anca Chandra ◽  
Conrad S. Tucker

Information ◽  
2021 ◽  
Vol 12 (5) ◽  
pp. 177
Author(s):  
Cheng Yang ◽  
Lingang Wu ◽  
Chunyang Yu ◽  
Yuliang Zhou

Mobile application (app) reviews are feedback about experiences, requirements, and issues raised after users have used the app. The iteration of an app is driven by bug reports and user requirements analyzed and extracted from app reviews, which is a problem that app designers and developers are committed to solving. However, a great number of app reviews vary in quality and reliability. It is a difficult and time-consuming challenge to analyze app reviews using manual methods. To address this, a novel approach is proposed as an automated method to predict high priority user requests with fourteen extracted features. A semi-automated approach is applied to annotate requirements with high or low priority with the help of app changelogs. Reviews from six apps were retrieved from the Apple App Store to evaluate the feasibility of the approach and interpret the principles. The performance comparison results of the approach greatly exceed the IDEA method, with an average precision of 75.4% and recall of 70.4%. Our approach can be applied to specific app development to assist app developers in quickly locating user requirements and implement app maintenance and evolution.


Author(s):  
Heather Barry Kappes ◽  
Joe J Gladstone ◽  
Hal E Hershfield

Abstract Spending is influenced by many factors. One that has received little attention is the meaning that people give to the act of spending. Spending money might imply that someone is relatively wealthy—since they have money to spend—or relatively poor—since spending can deplete assets. We show that people differ in the extent to which they believe that spending implies wealth (SIW beliefs). We develop a scale to measure these beliefs and find that people who more strongly believe that SIW spend their own money relatively lavishly and are, on average, more financially vulnerable. We find correlational evidence for these relationships using objective financial-transaction data, including over 2 million transaction records from the bank accounts of over 2,000 users of a money management app, as well as self-reported financial well-being. We also find experimental evidence by manipulating SIW beliefs and observing causal effects on spending intentions. These results show how underlying beliefs about the link between spending and wealth play a role in consumption decisions, and point to beliefs about the meaning of spending as a fruitful direction for further research.


2019 ◽  
Vol 107 (4) ◽  
pp. 1687-1708 ◽  
Author(s):  
Mamta Pandey ◽  
Ratnesh Litoriya ◽  
Prateek Pandey

2017 ◽  
Vol 1 (1) ◽  
pp. 71
Author(s):  
Budi Saiful Haris

Corruption is commonly committed by leaving no official trace. In disclosing big corruption cases, investigators are often challenged by defendant who always seeks to make an alibi on the charges of the investigators such as by creating fake or underlying business. The application of the principle of shifting burden of proof by the defendant could actually be detrimental to the prosecution process if the public prosecutor fail to prove to the contrary on the argument or evidence submitted by the defendant who is trying to deny the charge of public prosecutor. Such condition may occur due to the possibility that the defendant could convey some evidence of business transactions and sources of information that might not be successfully acquired by the public prosecutor, law enforcers and other relevant government agencies prior to the prosecution process. In this case, there is a big possibility that the perpetrators have manipulated financial transaction information assisted by the gatekeepers. The following entries parse the root of the problem for the matter and provide recommendations for the integration of business transparency approach to prevent and eradicate corruption by making breakthroughs that could prevent from the usage of fake financial transaction information as the evidence that could obscure the crime of corruption.


Sign in / Sign up

Export Citation Format

Share Document