18,524 research outputs found

    A Classification of Decision Automation and Delegation in Digital Investment Management Systems

    Get PDF
    Digital investment management systems, commonly known as robo-advisors, provide new alternatives to traditional human services, offering competitive investment returns at lower cost and customer effort. However, users must give up control over their investments and rely on automated decision-making. Because humans display aversion to high levels of automation and delegation, it is important to understand the interplay of these two aspects. This study proposes a taxonomy of digital investment management systems based on their levels of decision automation and delegation along the investment management process. We find that the degree of automation depends on the frequency and urgency of decisions as well as the accuracy of algorithms. Notably, most providers only invest in a subset of funds pre-selected by humans, potentially limiting efficiency gains. Based on our taxonomy, we identify archetypical system designs, which facilitate further research on perception and adoption of digital investment management systems

    Detecting and Refactoring Operational Smells within the Domain Name System

    Full text link
    The Domain Name System (DNS) is one of the most important components of the Internet infrastructure. DNS relies on a delegation-based architecture, where resolution of names to their IP addresses requires resolving the names of the servers responsible for those names. The recursive structures of the inter dependencies that exist between name servers associated with each zone are called dependency graphs. System administrators' operational decisions have far reaching effects on the DNSs qualities. They need to be soundly made to create a balance between the availability, security and resilience of the system. We utilize dependency graphs to identify, detect and catalogue operational bad smells. Our method deals with smells on a high-level of abstraction using a consistent taxonomy and reusable vocabulary, defined by a DNS Operational Model. The method will be used to build a diagnostic advisory tool that will detect configuration changes that might decrease the robustness or security posture of domain names before they become into production.Comment: In Proceedings GaM 2015, arXiv:1504.0244

    A theory of social license when regulatory pressure is jointly produced by an EPA and an NGO

    Get PDF
    We develop a model in which social pressure on a firm to behave well is jointly produced by a state regulator (EPA) and an NGO. The EPA and NGO differ in how they trade-off business versus environmental interests and also have access to different instruments in pursuit of their objectives. EPA and NGO efforts may be strategic complements or substitutes, depending upon circumstances. We present a taxonomy of outcomes in the game between EPA and NGO in the spirit of Fudenberg and Tirole's (1984) classic taxonomy of business strategies. We also consider strategic delegation from NGO supporters to an NGO that has tastes over environmental and business interests different to their own

    The effectiveness of refactoring, based on a compatibility testing taxonomy and a dependency graph

    Get PDF
    In this paper, we describe and then appraise a testing taxonomy proposed by van Deursen and Moonen (VD&M) based on the post-refactoring repeatability of tests. Four categories of refactoring are identified by VD&M ranging from semantic-preserving to incompatible, where, for the former, no new tests are required and for the latter, a completely new test set has to be developed. In our appraisal of the taxonomy, we heavily stress the need for the inter-dependence of the refactoring categories to be considered when making refactoring decisions and we base that need on a refactoring dependency graph developed as part of the research. We demonstrate that while incompatible refactorings may be harmful and time-consuming from a testing perspective, semantic-preserving refactorings can have equally unpleasant hidden ramifications despite their advantages. In fact, refactorings which fall into neither category have the most interesting properties. We support our results with empirical refactoring data drawn from seven Java open-source systems (OSS) and from the same analysis form a tentative categorization of code smells

    A Survey of Distributed Enterprise Network and Systems Management Paradigms

    Get PDF
    Since the mid 1990s, network and systems management has steadily evolved from centralized paradigms, where the management application runs on a single management station, to distributed paradigms, where it is distributed over many nodes. In this survey, our goal is to classify all these paradigms, especially the new ones, in order to help network and systems administrators design a management application, and choose between mobile code, distributed objects, intelligent agents, etc. Step by step, we build an enhanced taxonomy based on four criteria: the delegation granularity, the semantic richness of the information model, the degree of specification of a task, and the degree of automation of management

    Apoplectic About Hyperlexis

    Get PDF

    Jan Czekanowski Anthropologist and Statistician

    Get PDF
    Zadanie pt. „Digitalizacja i udostępnienie w Cyfrowym Repozytorium Uniwersytetu Łódzkiego kolekcji czasopism naukowych wydawanych przez Uniwersytet Łódzki” nr 885/P-DUN/2014 dofinansowane zostało ze środków MNiSW w ramach działalności upowszechniającej naukę

    A meta-analysis approach to refactoring and XP

    Get PDF
    The mechanics of seventy-two different Java refactorings are described fully in Fowler's text. In the same text, Fowler describes seven categories of refactoring, into which each of the seventy-two refactorings can be placed. A current research problem in the refactoring and XP community is assessing the likely time and testing effort for each refactoring, since any single refactoring may use any number of other refactorings as part of its mechanics and, in turn, can be used by many other refactorings. In this paper, we draw on a dependency analysis carried out as part of our research in which we identify the 'Use' and 'Used By' relationships of refactorings in all seven categories. We offer reasons why refactorings in the 'Dealing with Generalisation' category seem to embrace two distinct refactoring sub-categories and how refactorings in the 'Moving Features between Objects' category also exhibit specific characteristics. In a wider sense, our meta-analysis provides a developer with concrete guidelines on which refactorings, due to their explicit dependencies, will prove problematic from an effort and testing perspective
    corecore