1,196 research outputs found
Delineating Intra-Urban Spatial Connectivity Patterns by Travel-Activities: A Case Study of Beijing, China
Travel activities have been widely applied to quantify spatial interactions
between places, regions and nations. In this paper, we model the spatial
connectivities between 652 Traffic Analysis Zones (TAZs) in Beijing by a taxi
OD dataset. First, we unveil the gravitational structure of intra-urban spatial
connectivities of Beijing. On overall, the inter-TAZ interactions are well
governed by the Gravity Model , where
, are degrees of TAZ , and the distance between
them, with a goodness-of-fit around 0.8. Second, the network based analysis
well reveals the polycentric form of Beijing. Last, we detect the semantics of
inter-TAZ connectivities based on their spatiotemporal patterns. We further
find that inter-TAZ connections deviating from the Gravity Model can be well
explained by link semantics.Comment: 6 pages, 4 figure
A case of complication after a degloving operation of melanoma of the penis—repairing urethrocutaneous fistula with a pedicled gracilis flap
published_or_final_versionSpringer Open Choice, 21 Feb 201
Maximising the credibility of realistic job preview messages: The effect of jobseekers’ decision-making style on recruitment information credibility
Recruiting the right talent is crucial, particularly in sectors, such as the retail industry, with a high turnover and low commitment levels. In today’s job marketplace, jobseekers receive recruitment messages from various sources. Recruiters are increasingly concerned about the effectiveness of their job recruitment messages. Previous research has indicated that recruitment information credibility is critical to mediating a jobseeker’s willingness to join an organisation. However, research on how to maximise the credibility of job recruitment messages has not led to conclusive results. Taking an individual differences perspective, this research presents two scenario-based experiments to explore how retail-trade jobseekers respond differently to experience-based information that is provided by a company-controlled source depending on their decision-making style. Study 1 (746 participants) shows that when the message is presented in the employee’s tone (staff word-of-mouth, SWOM-formed) and contains employee descriptions and opinions, satisficers perceive the message to be more credible. Maximisers, on the other hand, are less likely to be affected by how the message is formed. Study 2 (351 participants) reveals that the joint effect of job-type and the provider’s background information moderated satisficer-style but not maximiser-style jobseekers’ perceptions of credibility. While satisficers are more likely to perceive an employee’s tone (SWOM-formed) message as credible when the message presents a match between the background of the employee and the job type under consideration, maximisers are not affected by this joint effect. The study has theoretical implications that explain the divergent results in the existing recruitment-message studies and has practical implications for recruiters who are seeking to maximise their candidate pool and increase the credibility of their recruitment messages
Organizational Architecture, Resilience, and Cyberattacks
This study develops a unique model of organizational resilience architecture with an emphasis on the ways in which organizations respond to cyber-attacks. The model elucidates the dynamics and approaches through which organizations mobilize and utilize expertise and resources to combat the effects of cyber-attackson normal business operations. Drawing on recent cases of cyber-attacks against organizations, the study identifies a host of strategic and tactical responses victims usedto aid recoveryand return to daily activities. The responses are grouped into three stages to demonstrate the steps that organizations can take to enhance their resilience: Stage 1 focuses on proactive environmental scanning and locating potential threatsand attacks, Stage 2 emphasizes neutralizing threats and attacks,and Stage 3 focuses on re-designing, upgrading and updating human, technological and financial resources. On this basis, the study sheds light on levels of organizational resilience and strategies for organizational design in withstanding cyber-attacks and security breaches. The theoretical and practical implications of these findings are discussed
Existence and stability of multiple solutions to the gap equation
We argue by way of examples that, as a nonlinear integral equation, the gap
equation can and does possess many physically distinct solutions for the
dressed-quark propagator. The examples are drawn from a class that is
successful in describing a broad range of hadron physics observables. We apply
the homotopy continuation method to each of our four exemplars and thereby find
all solutions that exist within the interesting domains of light current-quark
masses and interaction strengths; and simultaneously provide an explanation of
the nature and number of the solutions, many of which may be associated with
dynamical chiral symmetry breaking. Introducing a stability criterion based on
the scalar and pseudoscalar susceptibilities we demonstrate, however, that for
any nonzero current-quark mass only the regular Nambu solution of the gap
equation is stable against perturbations. This guarantees that the existence of
multiple solutions to the gap equation cannot complicate the description of
phenomena in hadron physics.Comment: 14 pages, 15 figure
Clinical and genetic profile of catecholaminergic polymorphic ventricular tachycardia in Hong Kong Chinese children
published_or_final_versio
- …