3,220 research outputs found
A study of the effect of computer/Internet usage on slot/video machine players\u27 gambling behaviors
The Age of Information has changed the way we live since personal computers outsold TV sets, and the number of emails exceeded the number of regular stamped letters. For the last decade, the Las Vegas gaming market has changed toward not only the lavish gambling field that houses computerized slot/video machines and high speed Internet ready hotel rooms, but also a family entertainment resort and a major convention destination. These facts raised the question of how many computer/Internet literate gamblers are in Las Vegas, and whether it would influence on their slot/video machine gambling behaviors. This study found that 70% of slot/video machine players in Las Vegas use computer/Internet. Non-computer/Internet users, however, visited Las Vegas more often, played slot/video machines longer with larger budgets than other tested groups. They were more likely loyal to their chosen casinos and less likely to desire exceptional customer service
On Melonic Supertensor Models
We investigate a class of supersymmetric quantum mechanical theories (with
two supercharges) having tensor-valued degrees of freedom which are dominated
by melon diagrams in the large limit. One motivation was to examine the
interplay between supersymmetry and melonic dominance and potential
implications for building toy models of holography. We find a definite tension
between supersymmetry (with dynamical bosons) and melonic dominance in this
class of systems. More specifically, our theories attain a low energy
non-supersymmetric conformal fixed point. The origin of supersymmetry breaking
lies in the need to regularize bosonic and fermionic degrees of freedom
independently. We investigate various aspects of the low energy spectrum and
also comment on related examples with different numbers of supercharges. Along
the way we also derive some technical results for
wavefunctions for fermionic excitations.Comment: 37+19 pages; v2: references added. v3: typos fixed. published versio
Information Security Policy: A Management Practice Perspective
Considerable research effort has been devoted to the study of Policy in the domain of Information Security Management (ISM). However, our review of ISM literature identified four key deficiencies that reduce the utility of the guidance to organisations implementing policy management practices. This paper provides a comprehensive overview of the management practices of information security policy and develops a practice-based model. The model provides comprehensive guidance to practitioners on the activities security managers must undertake for security policy development and allows practitioners to benchmark their current practice with the models suggested best practice. The model contributes to theory by mapping existing information security policy research in terms of the defined management practices
An Exploratory Study of Current Information Security Training and Awareness Practices in Organizations
Effective information security training and awareness (ISTA) is essential to protect organizational information resources. Our review of industry best-practice guidelines on ISTA exposed two key deficiencies. First, they are presented at a conceptual-level without any empirical evidence of their validity. Second, the guidelines are generic (one size fits all) without consideration of the diversity in organizational contexts where they will be applied. Given these deficiencies in ISTA guidance, this paper reports on the findings of an exploratory study into how ISTA is implemented in different organizational contexts in six organizations. The paper identifies three challenges: the lack of motivational aspects in current ISTA program, the competition for employees’ attention and the difficulty in measuring the effectiveness of ISTA program. Several recommendations and suggestions were outlined to overcome these challenges
Exploring the Relationship between Organizational Culture and Information Security Culture
Managing Information Security is becoming more challenging in today’s business because people are both a cause of information security incidents as well as a key part of the protection from them. As the impact of organizational culture (OC) on employees is significant, many researchers have called for the creation of information security culture (ISC) in organizations to influence the actions and behaviour of employees towards better organizational information security. Although researchers have called for the creation of ISC to be embedded in organizations, nonetheless, literature suggests that little past research examining the relationship between the nature of OC and ISC. This paper seeks to explore the relationship between the nature of OC and ISC and argues that organizations that have a medium to high security risk profile need to embed the ISC to influence employee actions and behaviours in relation to information security practices. In addition, this paper also introduces a framework to assist organizations in determining the extent to which the desired ISC is embedded into OC
Embedding Information Security Culture Emerging Concerns and Challenges
The behaviour of employees has been identified as a key factor in the protection of organizational information. As such, many researchers have called for information security culture (ISC) to be embedded into organizations to positively influence employee behaviour towards protecting organizational information. Despite claims that ISC may influence employee behaviours to protect organizational information, there is little empirical work that examines the embedding of ISC into organizations. This paper argues that embedding ISC should not only focus on employee behaviour, but rather in a holistic manner, involve everyone in the organization. The argument is developed through case studies in two organizations based on semi structured interviews of respondents, observations, and documents analysis from each organization. The results show that the challenges of embedding ISC are not as simple as changing employee behaviour and technical aspects of security. Rather, the more challenging problem is how to embed ISC in a holistic manner that includes senior management support and involvement to instil awareness through mandatory training with a clear assignment of responsibility and constant enforcement of security policies and procedures. We believe that the findings will provide researchers in ISC with a broader view of how ISC can be embedded in organizations
Do Large Language Models know what humans know?
Humans can attribute beliefs to others. However, it is unknown to what extent
this ability results from an innate biological endowment or from experience
accrued through child development, particularly exposure to language describing
others' mental states. We test the viability of the language exposure
hypothesis by assessing whether models exposed to large quantities of human
language display sensitivity to the implied knowledge states of characters in
written passages. In pre-registered analyses, we present a linguistic version
of the False Belief Task to both human participants and a Large Language Model,
GPT-3. Both are sensitive to others' beliefs, but while the language model
significantly exceeds chance behavior, it does not perform as well as the
humans, nor does it explain the full extent of their behavior -- despite being
exposed to more language than a human would in a lifetime. This suggests that
while statistical learning from language exposure may in part explain how
humans develop the ability to reason about the mental states of others, other
mechanisms are also responsible
- …