3,020 research outputs found

    Exact Bosonic and Supersymmetric String Black Hole Solutions

    Full text link
    We show that Witten's two-dimensional string black hole metric is exactly conformally invariant in the supersymmetric case. We also demonstrate that this metric, together with a recently proposed exact metric for the bosonic case, are respectively consistent with the supersymmetric and bosonic σ\sigma-model conformal invariance conditions up to four-loop order.Comment: 14

    Current oscillations in Vanadium Dioxide: evidence for electrically triggered percolation avalanches

    Full text link
    In this work, we experimentally and theoretically explore voltage controlled oscillations occurring in micro-beams of vanadium dioxide. These oscillations are a result of the reversible insulator to metal phase transition in vanadium dioxide. Examining the structure of the observed oscillations in detail, we propose a modified percolative-avalanche model which allows for voltage-triggering. This model captures the periodicity and waveshape of the oscillations as well as several other key features. Importantly, our modeling shows that while temperature plays a critical role in the vanadium dioxide phase transition, electrically induced heating cannot act as the primary instigator of the oscillations in this configuration. This realization leads us to identify electric field as the most likely candidate for driving the phase transition

    It Takes a Village: Understanding the Collective Security Efficacy of Employee Groups

    Get PDF
    An organization’s ability to successfully manage information security incidents is determined by the actions of its employees, as well as the actions of various groups of employees within its organizational boundaries. To date, information security research has primarily focused on individual-level phenomena and has not yet explored group-level phenomena such as how employee groups recognize and respond to security incidents in a way that is consistent with the organization’s security goals and objectives. The current study addresses this gap, thereby answering the research call for group-level security research perspectives. The present study explores how employee groups formulate their collective security efficacy, which influences how group members recognize and respond to information security incidents. Using a case study of a large healthcare research organization (HRO), we analyze two security incidents, a malware attack, and a physical security breach, to identify a unique set of ecological and social properties of employee groups that are salient to their collective security efficacy

    Scheme invariants in φ^4 theory in four dimensions

    Get PDF
    We provide an analysis of the structure of renormalization scheme invariants for the case of ϕ4 theory, relevant in four dimensions. We give a complete discussion of the invariants, up to four loops, and include some partial results at five loops, showing that there are considerably more invariants than one might naively have expected. We also show that one-vertex reducible contributions may consistently be omitted in a well-defined class of schemes, which of course includes ¯¯¯¯¯¯MS

    A COMPARISON OF PERSONAL SOCIAL MEDIA RISK PERCEPTIONS BETWEEN UNDERGRADUATE STUDENTS AND HUMAN RESOURCE PROFESSIONALS

    Get PDF
    This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant\u27s social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks

    Social Media Risk Perceptions of Human Resource Professionals: Issues Undergraduate Students Should Consider

    Get PDF
    This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant\u27s social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks

    Ultraviolet properties of noncommutative non-linear sigma-models in two dimensions

    Get PDF
    We discuss the ultra-violet properties of bosonic and supersymmetric noncommutative non-linear sigma-models in two dimensions, both with and without a Wess-Zumino-Witten term.Comment: 10 pages, including 1 figure. Plain TeX. Uses Harvmac and epsf. Minor revisions and additional reference. Version to be published in Phys. Lett.
    corecore