Modular Policy Evaluation System: A Policy Evaluation Framework Based on Text Mining

Author(s):  
Yang Gao ◽  
Yang yang Li ◽  
Yaojun Wang
2021 ◽  
Vol 13 (10) ◽  
pp. 5415
Author(s):  
Rongjiang Cai ◽  
Tao Lv ◽  
Xu Deng

Environmental information disclosure (EID) of listed companies is a significant and essential reference for assessing their environmental protection commitment. However, the content and form of EID are complex, and previous assessment studies involved manual scoring mainly by the experts in this field. It is subjective and has low timeliness. Therefore, this paper proposes an automatic evaluation framework of EID quality based on text mining (TM), including the EID index system’s construction, automatic scoring of environmental information disclosure quality, and EID index calculation. Furthermore, based on the EID of 801 listed companies in China’s heavy pollution industry from 2013 to 2017, case studies are conducted. The case study results show that the overall quality of the EID of listed companies in China’s heavily polluting industries is low, and there is a gap differentiation between the 16 industries. Compared with the subjective manual scoring method, TM evaluation can evaluate the quality of EID more effectively and accurately. It has great potential and can become an essential tool for the sustainable development of society and listed companies.


2018 ◽  
Vol 10 (04) ◽  
pp. 211-229 ◽  
Author(s):  
Agbotiname L. Imoize ◽  
Taiwo Oyedare ◽  
Michael E. Otuokere ◽  
Sachin Shetty

Author(s):  
Timothy R. Brock

Medical education programs must deliver valued results that stakeholders expect in return for their funding investments. In the past, healthcare organizations accepted reports about test results and participant perceptions of the program as adequate evidence of course outcomes. Today, program funders expect evaluations that provide evidence that medical education programs improve organizational excellence measures to justify ongoing funding. This chapter will explain four of the five elements required of a proven, comprehensive evaluation system. This five-element system is necessary to provide the desired organizational excellence evidence that medical educators can adopt to address the needs of stakeholders at different levels of an organization. Specifically, this chapter will overview an evaluation framework, a process model, and guiding principles that are crucial elements of this methodology. The chapter ends with a case study that shows how a medical education team used this measurement and evaluation methodology to plan how they would design and evaluate a medical education program requested by executives to solve an ICU central line infection problem.


2018 ◽  
pp. 131-136
Author(s):  
Keith Lehrer

The book contains a theory of knowledge, self-trust, autonomy, and consciousness. It takes an explanatory system, a theory, to solve philosophical problems, whatever the risk of error. The theory is a coherence theory of knowledge, a defensibility theory of knowledge. The defensibility is an internal capacity supplied by an evaluation system to defend the target claim. Defense or justification that is sustained by truth in the background system is defensible knowledge. Exemplar representation of conscious experience, exemplarization, connects the system with truth by making experience self-representational. The truth-maker and the representation of it are one. The exemplarized experiences also become exhibits of what it is like to experience external entities radiating to represent them. In this way, the accepted premises of our experience, our exemplar representations, become part of the justification and defense of target knowledge claims within our evaluation system.


2019 ◽  
Vol 61 (1) ◽  
pp. 15-28
Author(s):  
Florian Bache ◽  
Christina Plump ◽  
Jonas Wloka ◽  
Tim Güneysu ◽  
Rolf Drechsler

Abstract Side-channel attacks enable powerful adversarial strategies against cryptographic devices and encounter an ever-growing attack surface in today’s world of digitalization and the internet of things. While the employment of provably secure side-channel countermeasures like masking have become increasingly popular in recent years, great care must be taken when implementing these in actual devices. The reasons for this are two-fold: The models on which these countermeasures rely do not fully capture the physical reality and compliance with the requirements of the countermeasures is non-trivial in complex implementations. Therefore, it is imperative to validate the SCA-security of concrete instantiations of cryptographic devices using measurements on the actual device. In this article we propose a side-channel evaluation framework that combines an efficient data acquisition process with state-of-the-art confidence interval based leakage assessment. Our approach allows a sound assessment of the potential susceptibility of cryptographic implementations to side-channel attacks and is robust against noise in the evaluation system. We illustrate the steps in the evaluation process by applying them to a protected implementation of AES.


Sign in / Sign up

Export Citation Format

Share Document