1,543 research outputs found

    LESSONS FROM APPROACHES TO INCREASE WOMEN'S PARTICIPATION IN DEVELOPMENT: WORKSHOP SUMMARY

    Get PDF
    Community/Rural/Urban Development, Labor and Human Capital,

    Modeling human response errors in synthetic flight simulator domain

    Get PDF
    This paper presents a control theoretic approach to modeling human response errors (HRE) in the flight simulation domain. The human pilot is modeled as a supervisor of a highly automated system. The synthesis uses the theory of optimal control pilot modeling for integrating the pilot's observation error and the error due to the simulation model (experimental error). Methods for solving the HRE problem are suggested. Experimental verification of the models will be tested in a flight quality handling simulation

    Modeling the performance of the human (pilot) interaction in a synthetic flight domain: Information theoretic approach

    Get PDF
    Current advances in computing technology are devoid of formal methods that describe the theories of how information is shared between humans and machines. Specifically, in the domain of human-machine interaction, a common mathematical foundation is lacking. The aim of this paper is to propose a formal method of human-machine (H-M) interaction paradigm from the information view point. The methods presented are interpretation- and context-free and can be used both in experimental analysis as well as in modeling problems

    University Invention, Entrepreneurship, and Start-Ups

    Get PDF
    This paper develops a game-theoretic model that predicts when a university invention is commercialized in a start-up firm rather than an established firm. The model predicts that university inventions are more likely to occur in start-ups when the technology transfer officers (TTOs) search cost is high, the cost of development or commercialization is lower for a start-up, or the inventor's effort cost in development is lower in a start-up. We test the theory using data from the Association of University Technology Managers, the National Research Council, and the National Venture Capital Association. Licensing is more likely in general, and especially so in start-ups, by universities with higher quality engineering faculty and older TTOs. Start-ups are more likely by universities in states with larger levels of venture capital. TTO size has no effect on start-ups, but does increase licenses. Conversely, universities that earn greater licensing royalties have fewer start-ups but more licenses. The number of start-ups is decreasing in the interest rate, increasing in the S&P 500, and unaffected by levels of industrial research funding and the presence of a medical school. All of these results are consistent with the predictions of our theory.

    Scalable and interpretable product recommendations via overlapping co-clustering

    Full text link
    We consider the problem of generating interpretable recommendations by identifying overlapping co-clusters of clients and products, based only on positive or implicit feedback. Our approach is applicable on very large datasets because it exhibits almost linear complexity in the input examples and the number of co-clusters. We show, both on real industrial data and on publicly available datasets, that the recommendation accuracy of our algorithm is competitive to that of state-of-art matrix factorization techniques. In addition, our technique has the advantage of offering recommendations that are textually and visually interpretable. Finally, we examine how to implement our technique efficiently on Graphical Processing Units (GPUs).Comment: In IEEE International Conference on Data Engineering (ICDE) 201

    Composition I

    Get PDF

    An Empirical Examination of the Impact of Organizational Injustice and Negative Affect on Attitude and Non-Compliance with Information Security Policy

    Get PDF
    Employees’ non-compliance with Information Security (IS) policies is an important socio-organizational issue that represents a serious threat to the effective management of information security programs in organizations. Prior studies have demonstrated that information security policy (ISP) violation in the workplace is a common significant problem in organizations. Some of these studies have earmarked the importance of this problem by drawing upon cognitive processes to explain compliance with information security policies, while others have focused solely on factors related to non-compliance behavior, one of which is affect. Despite the findings from these studies, there is a dearth of extant literature that integrates both affective and cognitive theories that shed light on a more holistic understanding of information security non-compliance behaviors. This research developed a theoretical model of the relationship between negative affect and cognitive processes and their influence on employees’ ISP non-compliance at the workplace. Cognitive processes provide a significant foundation in understanding why employees show non-compliance behavior with ISPs and rules at the workplace. However, they do not completely explain the motivations behind the deviant employee’s non-compliance behavior. This research examined how the relationships between organizational injustice frameworks and negative affect influence attitude, which, in turn, influences behaviors that can be used to understand ISP non-compliance. Extant literature has explored theories like neutralization, deterrence, theory of planned behavior, rational choice theory, affective events theory, and work-related events as an outcome of neutralization, and organizational injustice, to explain cognitive reactions. The research model was empirically tested using the data collected from 115 participants who participated in a scenario-based survey. The results showed that negative affect has a significantly positive impact on employees’ attitude and ISP non-compliance behavior. Distributive, informational and interpersonal injustices were also found to influence ISP non-compliance in a significant but negative direction. The study contributes to both theory for IS research and practice for organizational management of security policies
    corecore