3,309 research outputs found

    A Mechanism of Transferring Manufacturing Competences to Increase Market Performance

    Get PDF
    This study uses competence transferring theory to establish a mechanism for transferring competence from the outside of an organization. Data were collected in the US from over 300 manufacturing companies. The mechanism of competence transferring is empirically supported. Also, the transferred competences increase manufacturing process competences including process automation, process integration, and process modularity. Furthermore, the process competences lead to higher market performance of firms

    Implementation of noise reduction optimization process of language lab recording based on RNN model

    Get PDF
    Speech signal noise reduction involves speech signal processing technology, which is one of the core technologies in the field of information application. Speech signal optimization analysis and processing is also a popular direction in the field of artificial intelligence. In this paper, a speech signal optimization processing method based on the recurrent neural network RNN model is proposed for the language laboratory recording signal as the research object. The key technologies in the fi eld of deep learning are introduced for audio noise reduction processing. By using experimental simulation, the signal-to-noise ratio of the recording signal is improved, so as to obtain a more ideal language laboratory recording audio fi le

    The Impact of Competitive Threats from the Product Market on Data Breaches

    Get PDF
    In this digital era, the concern about data breaches is rapidly increasing among consumers and firms. When the firm is facing competitive threats from the product market, would it perform well in data protection? Does the presence of a CIO/CTO help prevent a data breach? Would the impact of competitive threats on data breach vary by the severity of the data breach? In this study, by examining a sample of data breaches from 2005 to 2018, we find that competitive threats from the product market are positively associated with the likelihood of data breaches. And the presence of a CIO/CTO will also increase the likelihood of a data breach. It’s somewhat different from prior studies. We plan to further explore the competitive threats’ impact on different types of data breaches as well as their latent mechanism. Our study contributes a lot to IS cybersecurity and management literature
    • …
    corecore