3,220 research outputs found

    A study of the effect of computer/Internet usage on slot/video machine players\u27 gambling behaviors

    Full text link
    The Age of Information has changed the way we live since personal computers outsold TV sets, and the number of emails exceeded the number of regular stamped letters. For the last decade, the Las Vegas gaming market has changed toward not only the lavish gambling field that houses computerized slot/video machines and high speed Internet ready hotel rooms, but also a family entertainment resort and a major convention destination. These facts raised the question of how many computer/Internet literate gamblers are in Las Vegas, and whether it would influence on their slot/video machine gambling behaviors. This study found that 70% of slot/video machine players in Las Vegas use computer/Internet. Non-computer/Internet users, however, visited Las Vegas more often, played slot/video machines longer with larger budgets than other tested groups. They were more likely loyal to their chosen casinos and less likely to desire exceptional customer service

    On Melonic Supertensor Models

    Full text link
    We investigate a class of supersymmetric quantum mechanical theories (with two supercharges) having tensor-valued degrees of freedom which are dominated by melon diagrams in the large NN limit. One motivation was to examine the interplay between supersymmetry and melonic dominance and potential implications for building toy models of holography. We find a definite tension between supersymmetry (with dynamical bosons) and melonic dominance in this class of systems. More specifically, our theories attain a low energy non-supersymmetric conformal fixed point. The origin of supersymmetry breaking lies in the need to regularize bosonic and fermionic degrees of freedom independently. We investigate various aspects of the low energy spectrum and also comment on related examples with different numbers of supercharges. Along the way we also derive some technical results for SL(2,R)SL(2,{\mathbb R}) wavefunctions for fermionic excitations.Comment: 37+19 pages; v2: references added. v3: typos fixed. published versio

    Information Security Policy: A Management Practice Perspective

    Get PDF
    Considerable research effort has been devoted to the study of Policy in the domain of Information Security Management (ISM). However, our review of ISM literature identified four key deficiencies that reduce the utility of the guidance to organisations implementing policy management practices. This paper provides a comprehensive overview of the management practices of information security policy and develops a practice-based model. The model provides comprehensive guidance to practitioners on the activities security managers must undertake for security policy development and allows practitioners to benchmark their current practice with the models suggested best practice. The model contributes to theory by mapping existing information security policy research in terms of the defined management practices

    An Exploratory Study of Current Information Security Training and Awareness Practices in Organizations

    Get PDF
    Effective information security training and awareness (ISTA) is essential to protect organizational information resources. Our review of industry best-practice guidelines on ISTA exposed two key deficiencies. First, they are presented at a conceptual-level without any empirical evidence of their validity. Second, the guidelines are generic (one size fits all) without consideration of the diversity in organizational contexts where they will be applied. Given these deficiencies in ISTA guidance, this paper reports on the findings of an exploratory study into how ISTA is implemented in different organizational contexts in six organizations. The paper identifies three challenges: the lack of motivational aspects in current ISTA program, the competition for employees’ attention and the difficulty in measuring the effectiveness of ISTA program. Several recommendations and suggestions were outlined to overcome these challenges

    Exploring the Relationship between Organizational Culture and Information Security Culture

    Get PDF
    Managing Information Security is becoming more challenging in today’s business because people are both a cause of information security incidents as well as a key part of the protection from them. As the impact of organizational culture (OC) on employees is significant, many researchers have called for the creation of information security culture (ISC) in organizations to influence the actions and behaviour of employees towards better organizational information security. Although researchers have called for the creation of ISC to be embedded in organizations, nonetheless, literature suggests that little past research examining the relationship between the nature of OC and ISC. This paper seeks to explore the relationship between the nature of OC and ISC and argues that organizations that have a medium to high security risk profile need to embed the ISC to influence employee actions and behaviours in relation to information security practices. In addition, this paper also introduces a framework to assist organizations in determining the extent to which the desired ISC is embedded into OC

    Embedding Information Security Culture Emerging Concerns and Challenges

    Get PDF
    The behaviour of employees has been identified as a key factor in the protection of organizational information. As such, many researchers have called for information security culture (ISC) to be embedded into organizations to positively influence employee behaviour towards protecting organizational information. Despite claims that ISC may influence employee behaviours to protect organizational information, there is little empirical work that examines the embedding of ISC into organizations. This paper argues that embedding ISC should not only focus on employee behaviour, but rather in a holistic manner, involve everyone in the organization. The argument is developed through case studies in two organizations based on semi structured interviews of respondents, observations, and documents analysis from each organization. The results show that the challenges of embedding ISC are not as simple as changing employee behaviour and technical aspects of security. Rather, the more challenging problem is how to embed ISC in a holistic manner that includes senior management support and involvement to instil awareness through mandatory training with a clear assignment of responsibility and constant enforcement of security policies and procedures. We believe that the findings will provide researchers in ISC with a broader view of how ISC can be embedded in organizations

    Do Large Language Models know what humans know?

    Full text link
    Humans can attribute beliefs to others. However, it is unknown to what extent this ability results from an innate biological endowment or from experience accrued through child development, particularly exposure to language describing others' mental states. We test the viability of the language exposure hypothesis by assessing whether models exposed to large quantities of human language display sensitivity to the implied knowledge states of characters in written passages. In pre-registered analyses, we present a linguistic version of the False Belief Task to both human participants and a Large Language Model, GPT-3. Both are sensitive to others' beliefs, but while the language model significantly exceeds chance behavior, it does not perform as well as the humans, nor does it explain the full extent of their behavior -- despite being exposed to more language than a human would in a lifetime. This suggests that while statistical learning from language exposure may in part explain how humans develop the ability to reason about the mental states of others, other mechanisms are also responsible
    corecore