433 research outputs found

    Gender Quotas for Corporate Boards: A Holistic Analysis

    Get PDF
    Gender quotas for corporate boards have risen in popularity ever since Norway implemented the first quota in 2003. Proponents point to economic arguments (i.e. enhanced return on assets and return on equity) as well as social good rationales (i.e. bolstered corporate social responsibility and reduced fraud) to validate their enactment. Advocates further gloss over a moral justification rooted in a broad notion of equality, although more heavily relying on empirical claims. This article demonstrates how empirical rationales in support of gender quotas are unconvincing. Economic evidence is ultimately inconclusive, and the social good justifications alone do not serve as compelling policy objectives. With respect to equality, the article distinguishes between equality of outcome and equality of opportunity, explaining how gender quotas provide equal outcome but do not satisfy equal opportunity. Finally, the article points to two more robust objectives for all gender workplace advancement policies, namely, equal opportunity and autonomy

    A Multi-Dimensional Framework for Digital Content Commerce

    Get PDF

    A FRAMEWORK FOR DEDUCTIVE DATABASE DESIGN IM DECISION SUPPORT SYSTEMS

    Get PDF
    A three-level framework for design and implementation of deductive database management systems is described. The three levels consist of the abstraction, for abstracting the real world semantics, the language, for man-machine communication, and the environment, for specifying the hardware/software environment. This framework is applied to some representative systems. Based on the results, an architecture for a deductive database management system is proposed

    Metabotrophic effects of aerobic training in male patients with metabolic syndrome

    Get PDF
    We investigated the integrated effects of an aerobic training program on circulatory levels of the metabotrophic factors (metabotrophins) nerve growth factor (NGF), brain derived neurotrophic factor (BDNF) and insulin like growth factor-1 (IGF-1), and anabolic state (testosterone/cortisol ratio) in middle aged males with metabolic syndrome (MetS). Thirty subjects (age: 58.23 ± 5.25 years, weight: 95.00 ± 8.26 kg, height: 173 ± 7.03 cm, VO2peak: 19.96 ± 4.18 ml kg.min-1) were randomized into exercise (n=16) and control, non-exercised (n=14) group. The exercise group participated in eight weeks of aerobic training program (3 sessions/week at 50%-60% of VO2 peak). Fasting blood samples were taken at baseline and after training and VO2 peak, insulin sensitivity and an overall metabolic syndrome Z score (Z MetS) were calculated. Aerobic training significantly increased insulin sensitivity, Vo2 peak, plasma HDL and serum levels of NFG, BDNF, IGF-1 and testosterone (P<0.05) as compared to control patients. Additionally, there were significant decreases in body weight, mean atrial pressure, waist circumference, plasma glucose and triglyceride and also serum cortisol levels (P<0.05) in training patients. Body weight, waist circumference, and NGF levels were recognized as the most important predictors for the 80% of variability in serum testosterone/cortisol ratio (P<0.05). An integrated metabotrophic and anabolic effect of aerobic training in patients with MetS was established. Early measurement of these variables may have prognostic benefits for at risk population who progress to the generalized stage of cardiometabolic abnormalities.Adipobiology 2015, 7: 21-29Key words: exercise, metabolic syndrome, cardiometabolic risk, metabotrophic factors, NGF, BDNF, IGF-1, testosteron

    Design Reusability and Learning in CABSYDD (Case-Based System for Database Design)

    Get PDF
    A database is a collection of related data that represents some relevant reality. The database design process consists of four steps: Requirements Collection and Analysis, Conceptual Database Design, Logical Database Design, and Physical Database Design.Recently, knowledge-based computer-aided design tools have been introduced. A list of them can be found in Lo (1994). None is empowered with machine learning to improve its permanent knowledge base or inference abilities. This research applies case-based reasoning to Conceptual Database Design. Section 2 reviews related theories. Section 3 discusses design and implementation of the application. Lastly, section 4 is the conclusion

    Some Throughput Metrics for (SOA) Application Development

    Get PDF
    Given the growing concerns about unethical usage of Information Technology (IT) becoming a major security concern, this research-in-progress paper conceptually models IS practitioner (professional) attitude toward unethical IT use. Based on the ethical notions of universalism and particularism, it argues for a two-dimensional analysis to judge development of attitude toward using IT unethically: understand the IS professional as a human being subscribing to universal principles and understand the IS professional as rooted to an organizational community of practice. Through its articulation of two powerful lenses of universalism and particularism, this paper contributes by understanding how philosophical perspectives of ethics can inform our understanding of IS security. Finally, the paper discusses future research and practice implications arising out of this conceptual treatment

    The formation of gas hydrates and the effect of inhibitiors on their formation process

    Get PDF
    Natural gas hydrate is a solid crystalline compound produced by combining water and gas and it is considered as the clathrates. Guest gas molecules are stuck insider the pores of water networks produced by hydrogen bonds between molecules of water. There are different ways to analyze the hydrate formation operating conditions (temperature and pressure) including drawing the logarithm of pressure changes curve in terms of gas temperature which is one of the most common methods. In this case, the curve is straight line that is easy to analyze. The structure of hydrates in water-gas area is kept by molecules of the solution in aqueous phase area. As a result, H2S and CO2 accelerate the formation hydrates at high temperatures because they are more soluble in water than most hydrocarbons. The pressure leads to the formation of the network. In the case of pentane and larger molecules, pressure breaks the network and prevents the formation of stable hydrates.Keywords: hydrates, hydrogen bonding, free water, methane, carbon dioxid

    Life history traits and gonad histology of an endemic cyprinid fish, Mond spotted barb, Capoeta mandica from Southern Iran

    Get PDF
    The life history traits and gonad development of an endemic cyprinid fish, the spotted barb, Capoeta mandica (Bianco & Banarescu 1982), from southern Iran was investigated by regular monthly collections from February 2006 through January 2007 and on the basis of microscopic and macroscopic analyses. No information on the spawning characteristics of the fish are available to date. A total of 335 specimens were captured using electrofishing including 253 males and 102 females, resulting in 2.5:1 (male: female) sex ratio, which is significantly different from the expected ratio. The commonly known five standard maturation stages were determined based on the size, shape and weight of the gonads, degree of occupation of the body cavity, presence or absence of ripe oocytes, or milt, diameter of the oocytes in the ovary, and histological observations. These stages were correlated to the reproductive indices. The ovum diameters ranged from 0.04 to 1.31 mm, with the highest mean value in May. The condition factor of male and female specimens was the highest in April. The female GSI increased from March to May, peaking in the middle of spring and decreased significantly in June. Based on the gonad maturation stages, gonadosomatic index (GSI), modified GSI, mean egg diameter, condition factor (K) and Dobriyal index (DI), it was concluded that the spotted barb spawns during May and June. The provided data, contribute baseline data towards management ecology and conservation of this endemic fish species

    Security Management Life Cycle (SMLC): A Comparative Study

    Get PDF
    We introduce an integrated conceptualization of enterprise information technology security management in the form of a life cycle that accounts for the people, processes, infrastructure, and applications within an enterprise. Our life cycle view provides a lens through which one can view the security management activities at the strategic, tactical, and operational levels with regard to their strategic alignment with organizational goals. We compare and contrast three widely adopted frameworks (COSO, COBIT and ITIL) for enterprise risk and IT management with respect to our life cycle. We conclude that although the definitions of each stage of the life cycle are similar in these frameworks, their approach, philosophy, and method of execution is primarily determined by their unique focus. By developing a life cycle abstraction which encapsulates all of these frameworks, security management can better understand how their responsibilities and activities support organizational objectives
    corecore