1,560 research outputs found

    Subscriber churn in the Australian ISP market

    Get PDF
    Rapid growth in Internet use, combined with easy market entry by Internet service providers (ISPs), has resulted in a highly competitive supply of Internet services. Australian ISPs range in size from a few large national operators to niche ISPs focused on specialised service. With many ISPs currently not profitable, subscriber retention is an important aspect of survival. This study develops a model which relates the probability of subscriber churn to various service attributes and subscriber characteristics. Estimation results show that churn probability is positively associated with monthly ISP expenditure, but inversely related to household income. Pricing also matters with subscribers preferring ISPs which offer flat-rate pricing arrangements.

    Subscriber churn in the Australian ISP market

    Get PDF
    Rapid growth in Internet use, combined with easy market entry by Internet service providers (ISPs), has resulted in a highly competitive supply of Internet services. Australian ISPs range in size from a few large national operators to niche ISPs focused on specialised service. With many ISPs currently not profitable, subscriber retention is an important aspect of survival. This study develops a model which relates the probability of subscriber churn to various service attributes and subscriber characteristics. Estimation results show that churn probability is positively associated with monthly ISP expenditure, but inversely related to household income. Pricing also matters with subscribers preferring ISPs which offer flat-rate pricing arrangements.Internet; customer churn; pricing

    Advanced communications policy and adoption in rural Western Australia

    Get PDF
    Recent moves toward contestable universal service markets for rural areas raises issues of measuring the net cost of service provision. Measurement of net cost requires estimates of latent demand for advanced communications. This paper seeks for the first time to provide quantitative estimates of the magnitude of latent income pools available to carriers in rural WA. Estimates of latent expenditure on broadband services in rural WA are obtained using a combination of stated-preference and survey data. These expenditures increase with computer ownership, community isolation and information need. Further, the statistical model supports the commonly held belief that more distant populations have stronger information demands and are willing to pay for services. This finding suggests that carrier aversion to providing services to rural regions may not be justified on commercial grounds.Advanced communications; broadband service; internet rural access; universal service obligations

    Behavioral integrity for safety, priority of safety, psychological safety, and patient safety: a team-level study

    Get PDF
    This article clarifies how leader behavioral integrity for safety helps solve follower's double bind between adhering to safety protocols and speaking up about mistakes against protocols. Path modeling of survey data in 54 nursing teams showed that head nurse behavioral integrity for safety positively relates to both team priority of safety and psychological safety. In turn, team priority of safety and team psychological safety were, respectively, negatively and positively related with the number of treatment errors that were reported to head nurses. We further demonstrated an interaction effect between team priority of safety and psychological safety on reported errors such that the relationship between team priority of safety and the number of errors was stronger for higher levels of team psychological safety. Finally, we showed that both team priority of safety and team psychological safety mediated the relationship between leader behavioral integrity for safety and reported treatment errors. These results suggest that although adhering to safety protocols and admitting mistakes against those protocols show opposite relations to reported treatment errors, both are important to improving patient safety and both are fostered by leaders who walk their safety talk

    Seismic Response to Injection Well Stimulation in a High-Temperature, High-Permeability Reservoir

    Get PDF
    Fluid injection into the Earth's crust can induce seismic events that cause damage to local infrastructure but also offer valuable insight into seismogenesis. The factors that influence the magnitude, location, and number of induced events remain poorly understood but include injection flow rate and pressure as well as reservoir temperature and permeability. The relationship between injection parameters and injection-induced seismicity in high-temperature, high-permeability reservoirs has not been extensively studied. Here we focus on the Ngatamariki geothermal field in the central Taupō Volcanic Zone, New Zealand, where three stimulation/injection tests have occurred since 2012. We present a catalog of seismicity from 2012 to 2015 created using a matched-filter detection technique. We analyze the stress state in the reservoir during the injection tests from first motion-derived focal mechanisms, yielding an average direction of maximum horizontal compressive stress (SHmax) consistent with the regional NE-SW trend. However, there is significant variation in the direction of maximum compressive stress (σ1), which may reflect geological differences between wells. We use the ratio of injection flow rate to overpressure, referred to as injectivity index, as a proxy for near-well permeability and compare changes in injectivity index to spatiotemporal characteristics of seismicity accompanying each test. Observed increases in injectivity index are generally poorly correlated with seismicity, suggesting that the locations of microearthquakes are not coincident with the zone of stimulation (i.e., increased permeability). Our findings augment a growing body of work suggesting that aseismic opening or slip, rather than seismic shear, is the active process driving well stimulation in many environments

    Non-1/m_b^n Power Suppressed Contributions to Inclusive b->s l+ l- Decays

    Full text link
    We compute non-perturbative contributions to b->s l+ l- that are not explicitly suppressed by powers of the b-quark mass. They are proportional to lambda_2 and arise from an interference between the free-quark amplitude and higher order terms in the matrix element of a four-quark operator. This correction is found to be small over most of the dalitz plot except near the charm threshold. Unfortunately, the perturbative computation we have performed is invalid near charm threshold and we do not except to see the structure found at lowest order reproduced in the data. We conclude that these non-perturbative contributions do not significantly modify the previous analysis of b->s l+ l-.Comment: 8 pages, 3 figures, late

    Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy

    Full text link
    The critical role played by email has led to a range of extension protocols (e.g., SPF, DKIM, DMARC) designed to protect against the spoofing of email sender domains. These protocols are complex as is, but are further complicated by automated email forwarding -- used by individual users to manage multiple accounts and by mailing lists to redistribute messages. In this paper, we explore how such email forwarding and its implementations can break the implicit assumptions in widely deployed anti-spoofing protocols. Using large-scale empirical measurements of 20 email forwarding services (16 leading email providers and four popular mailing list services), we identify a range of security issues rooted in forwarding behavior and show how they can be combined to reliably evade existing anti-spoofing controls. We show how this allows attackers to not only deliver spoofed email messages to prominent email providers (e.g., Gmail, Microsoft Outlook, and Zoho), but also reliably spoof email on behalf of tens of thousands of popular domains including sensitive domains used by organizations in government (e.g., state.gov), finance (e.g., transunion.com), law (e.g., perkinscoie.com) and news (e.g., washingtonpost.com) among others

    Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy

    Get PDF
    The critical role played by email has led to a range of extension protocols (e.g., SPF, DKIM, DMARC) designed to protect against the spoofing of email sender domains. These protocols are complex as is, but are further complicated by automated email forwarding — used by individual users to manage multiple accounts and by mailing lists to redistribute messages. In this paper, we explore how such email forwarding and its implementations can break the implicit assumptions in widely deployed anti-spoofing protocols. Using large-scale empirical measurements of 20 email forwarding services (16 leading email providers and four popular mailing list services), we identify a range of security issues rooted in forwarding behavior and show how they can be combined to reliably evade existing anti-spoofing controls. We further show how these issues allow attackers to not only deliver spoofed email messages to prominent email providers (e.g., Gmail, Microsoft Outlook, and Zoho), but also reliably spoof email on behalf of tens of thousands of popular domains including sensitive domains used by organizations in government (e.g., state.gov), finance (e.g., transunion.com), law (e.g., perkinscoie.com)and news (e.g., washingtonpost.com) among others

    R/BHC: fast Bayesian hierarchical clustering for microarray data

    Get PDF
    BACKGROUND: Although the use of clustering methods has rapidly become one of the standard computational approaches in the literature of microarray gene expression data analysis, little attention has been paid to uncertainty in the results obtained. RESULTS: We present an R/Bioconductor port of a fast novel algorithm for Bayesian agglomerative hierarchical clustering and demonstrate its use in clustering gene expression microarray data. The method performs bottom-up hierarchical clustering, using a Dirichlet Process (infinite mixture) to model uncertainty in the data and Bayesian model selection to decide at each step which clusters to merge. CONCLUSION: Biologically plausible results are presented from a well studied data set: expression profiles of A. thaliana subjected to a variety of biotic and abiotic stresses. Our method avoids several limitations of traditional methods, for example how many clusters there should be and how to choose a principled distance metric

    Subscriber churn in the Australian ISP market

    Get PDF
    Rapid growth in Internet use, combined with easy market entry by Internet service providers (ISPs), has resulted in a highly competitive supply of Internet services. Australian ISPs range in size from a few large national operators to niche ISPs focused on specialised service. With many ISPs currently not profitable, subscriber retention is an important aspect of survival. This study develops a model which relates the probability of subscriber churn to various service attributes and subscriber characteristics. Estimation results show that churn probability is positively associated with monthly ISP expenditure, but inversely related to household income. Pricing also matters with subscribers preferring ISPs which offer flat-rate pricing arrangements
    corecore