42,216 research outputs found
Adoption of soil organic carbon-enhancing practices: A case of two watershed sites in Ethiopia.
This study aimed at identifying the factors that determine
the decision to adopt and the intensity of adoption of
soil organic carbon (SOC)-enhancing practices using two
watershed sites in Ethiopia: Yiser (Amhara region) and
Azugashube (Southern region). The study used survey
data collected from 379 sample households drawn from
four Kebele/village administrations at each watershed
site. Multivariate and ordinary least squares regressions
were used to identify the factors that determine the
decision to adopt the SOC-enhancing practices and the
factors that determine the extent of adoption of these
practices, respectively. The study classified these various
practices into three classes: soil and water conservation,
agronomic, and agroforestry SOC-enhancing practices.
We find that the decision to adopt soil and water
conservation practices is negatively related to both the
decision to adopt agronomic and to adopt agroforestry
SOC-enhancing practices. On the contrary, we find
that the decision to adopt agronomic and agroforestry
practices is complementary. The study also identified
diverse agroecological, farming system, institutional, and
household characteristics that determine the decision to
adopt and the intensity of adoption of the three SOCenhancing
practices. Among the different variables, the
study found location as a strong determinant of the type
and intensity of adoption of the SOC practices
Intrusion Detection Systems Using Adaptive Regression Splines
Past few years have witnessed a growing recognition of intelligent techniques
for the construction of efficient and reliable intrusion detection systems. Due
to increasing incidents of cyber attacks, building effective intrusion
detection systems (IDS) are essential for protecting information systems
security, and yet it remains an elusive goal and a great challenge. In this
paper, we report a performance analysis between Multivariate Adaptive
Regression Splines (MARS), neural networks and support vector machines. The
MARS procedure builds flexible regression models by fitting separate splines to
distinct intervals of the predictor variables. A brief comparison of different
neural network learning algorithms is also given
How can SMEs benefit from big data? Challenges and a path forward
Big data is big news, and large companies in all sectors are making significant advances in their customer relations, product selection and development and consequent profitability through using this valuable commodity. Small and medium enterprises (SMEs) have proved themselves to be slow adopters of the new technology of big data analytics and are in danger of being left behind. In Europe, SMEs are a vital part of the economy, and the challenges they encounter need to be addressed as a matter of urgency. This paper identifies barriers to SME uptake of big data analytics and recognises their complex challenge to all stakeholders, including national and international policy makers, IT, business management and data science communities.
The paper proposes a big data maturity model for SMEs as a first step towards an SME roadmap to data analytics. It considers the ‘state-of-the-art’ of IT with respect to usability and usefulness for SMEs and discusses how SMEs can overcome the barriers preventing them from adopting existing solutions. The paper then considers management perspectives and the role of maturity models in enhancing and structuring the adoption of data analytics in an organisation. The history of total quality management is reviewed to inform the core aspects of implanting a new paradigm. The paper concludes with recommendations to help SMEs develop their big data capability and enable them to continue as the engines of European industrial and business success. Copyright © 2016 John Wiley & Sons, Ltd.Peer ReviewedPostprint (author's final draft
Enhancing Employee Communication Behaviors for Sensemaking and Sensegiving in Crisis Situations: Strategic Management Approach for Effective Internal Crisis Communication
Purpose
The purpose of this paper is to explore the organizational effectiveness of internal crisis communication within the strategic management approach, whether it enhanced voluntary and positive employee communication behaviors (ECBs) for sensemaking and sensegiving. By doing so, this study provides meaningful insight into: new crisis communication theory development that takes a strategic management approach, emphasizing employees’ valuable assets from an organization, and effective crisis communication practice that reduces misalignment with employees and that enhances voluntary and positive ECBs for the organization during a crisis. Design/methodology/approach
This study conducted a nationwide survey in the USA among full-time employees (n=544). After dimensionality check through confirmatory factor analysis, this study tested hypothesis and research question by conducting ordinary least squares multiple regression analyses using STATA 13. Findings
This study found that strategic internal communication factors, including two-way symmetrical communication and transparent communication, were positive and strong antecedents of ECBs for sensemaking and sensegiving in crisis situations, when controlling for other effects. The post hoc analysis confirmed theses positive and strong associations across different industry areas. Originality/value
This study suggests that voluntary and valuable ECBs can be enhanced by listening and responding to employee concerns and interests; encouraging employee participation in crisis communication; and organizational accountability through words, actions and decisions during the crisis. As a theoretical implication, the results of this study indicate the need for crisis communication theories that emphasize employees as valuable assets to an organization
A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64
Simeck, a lightweight block cipher has been proposed to be one of the
encryption that can be employed in the Internet of Things (IoT) applications.
Therefore, this paper presents the security of the Simeck32/64 block cipher
against side-channel cube attack. We exhibit our attack against Simeck32/64
using the Hamming weight leakage assumption to extract linearly independent
equations in key bits. We have been able to find 32 linearly independent
equations in 32 key variables by only considering the second bit from the LSB
of the Hamming weight leakage of the internal state on the fourth round of the
cipher. This enables our attack to improve previous attacks on Simeck32/64
within side-channel attack model with better time and data complexity of 2^35
and 2^11.29 respectively.Comment: 12 pages, 6 figures, 4 tables, International Journal of Computer
Networks & Communication
- …