335 research outputs found

    Unearthing the Moral Emotive Compass: Exploring the Paths to (Un)Ethical Leadership:Exploring the paths to (un)ethical leadership

    Get PDF
    Unethical and abusive supervision have been associated with substantial psychological and financial costs (e.g., Tepper, 2007). In contrast, ethical leadership is associated with favorable outcomes in the work place (e.g., Mayer, Kuenzi, Greenbaum, Bardes, & Salvador, 2009). However, our scientific understanding of drivers of leader (un)ethical behavior is constrained by an exclusive focus on more cognitive and rational determinants (e.g., moral reasoning). As people do not always act rationally and do not always seem to be guided by rational decision-making processes (e.g., Ariely, 2010), this dissertation aimed to shed light on the role of discrete emotions as predictors of (un)ethical leader behavior as well as employees’ supervisor-directed deviance. In a series of experimental and field studies, I found that authentically proud leaders show higher levels of ethical behavior than hubristically proud leaders, especially when their moral identity is salient. Second, I found that feelings of contempt diminish the negative link between moral identity and unethical leadership and that power increases the negative relationship between contempt and ethical leadership. Finally, I showed that faced with an abusive supervisor as compared with an ethical supervisor, employees experience less anticipated guilt about deviating against their supervisor, which, in turn, leads to higher levels of deviant behavior

    Preparing Students Experiencing Homelessness for College: Considerations for Counselors and Other Supportive Personnel

    Get PDF
    This article describes the unique college and career preparation challenges faced by students experiencing homelessness (SEH), framed using a Social Cognitive Career Theory (SCCT) lens. The experience of homelessness presents barriers for secondary students, which can impact their college self-efficacy, outcome expectations of attending and succeeding in college, and goal setting towards college. In this conceptual paper, background on homelessness and research related to the college planning process of SEH is provided, as well as implications for school and career counselors, as well as other educators

    Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol

    Get PDF
    A fully homomorphic encryption system hides data from unauthorized parties while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful server without revealing their inputs, a fully homomorphic cryptosystem can be used as a building block in the construction of a number of cryptographic functionalities. Designing such a scheme remained an open problem until 2009, decades after the idea was first conceived, and the past few years have seen the generalization of this functionality to the world of quantum machines. Quantum schemes prior to the one implemented here were able to replicate some features in particular use cases often associated with homomorphic encryption but lacked other crucial properties, for example, relying on continual interaction to perform a computation or leaking information about the encrypted data. We present the first experimental realization of a quantum fully homomorphic encryption scheme. To demonstrate the versatility of a a quantum fully homomorphic encryption scheme, we further present a toy two-party secure computation task enabled by our scheme

    Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol

    Get PDF
    A fully homomorphic encryption system hides data from unauthorized parties, while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful server without revealing their inputs, a fully homomorphic cryptosystem can be used as a building block in the construction of a number of cryptographic functionalities. Designing such a scheme remained an open problem until 2009, decades after the idea was first conceived, and the past few years have seen the generalization of this functionality to the world of quantum machines. Quantum schemes prior to the one implemented here were able to replicate some features in particular use-cases often associated with homomorphic encryption but lacked other crucial properties, for example, relying on continual interaction to perform a computation or leaking information about the encrypted data. We present the first experimental realisation of a quantum fully homomorphic encryption scheme. We further present a toy two-party secure computation task enabled by our scheme. Finally, as part of our implementation, we also demonstrate a post-selective two-qubit linear optical controlled-phase gate with a much higher post-selection success probability (1/2) when compared to alternate implementations, e.g. with post-selective controlled-ZZ or controlled-XX gates (1/9).Comment: 11 pages, 16 figures, 2 table

    Mid-J CO Emission From NGC 891: Microturbulent Molecular Shocks in Normal Star Forming Galaxies

    Full text link
    We have detected the CO(6-5), CO(7-6), and [CI] 370 micron lines from the nuclear region of NGC 891 with our submillimeter grating spectrometer ZEUS on the CSO. These lines provide constraints on photodissociation region (PDR) and shock models that have been invoked to explain the H_2 S(0), S(1), and S(2) lines observed with Spitzer. We analyze our data together with the H_2 lines, CO(3-2), and IR continuum from the literature using a combined PDR/shock model. We find that the mid-J CO originates almost entirely from shock-excited warm molecular gas; contributions from PDRs are negligible. Also, almost all the H_2 S(2) and half of the S(1) line is predicted to emerge from shocks. Shocks with a pre-shock density of 2x10^4 cm^-3 and velocities of 10 km/s and 20 km/s for C-shocks and J-shocks, respectively, provide the best fit. In contrast, the [CI] line emission arises exclusively from the PDR component, which is best parameterized by a density of 3.2x10^3 cm^-3 and a FUV field of G_o = 100 for both PDR/shock-type combinations. Our mid-J CO observations show that turbulence is a very important heating source in molecular clouds, even in normal quiescent galaxies. The most likely energy sources for the shocks are supernovae or outflows from YSOs. The energetics of these shock sources favor C-shock excitation of the lines.Comment: 18 pages, 2 figures, 6 tables, accepted by Ap

    Ionised carbon and galaxy activity

    Full text link
    We investigate the possibility that the decrease in the relative luminosity of the 158 micron [CII] line with the far-infrared luminosity in extragalactic sources stems from a stronger contribution from the heated dust emission in the more distant sources. Due to the flux limited nature of these surveys, the luminosity of the detected objects increases with distance. However, the [CII] luminosity does not climb as steeply as that of the far-infrared, giving the decline in the L_[CII]/L_FIR ratio with L_FIR. Investigating this further, we find that the [CII] luminosity exhibits similar drops as measured against the carbon monoxide and radio continuum luminosities. The former may indicate that at higher luminosities a larger fraction of the carbon is locked up in the form of molecules and/or that the CO line radiation also contributes to the cooling, done mainly by the [CII] line at low luminosities. The latter hints at increased activity in these galaxies at greater distances, so we suggest that, in addition to an underlying heating of the dust by a stellar population, there is also heating of the embedded dusty torus by the ultra-violet emission from the active nucleus, resulting in an excess in the far-infrared emission from the more luminous objects.Comment: 9 pages, accepted by A&

    Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol

    Get PDF
    A fully homomorphic encryption system hides data from unauthorized parties while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful server without revealing their inputs, a fully homomorphic cryptosystem can be used as a building block in the construction of a number of cryptographic functionalities. Designing such a scheme remained an open problem until 2009, decades after the idea was first conceived, and the past few years have seen the generalization of this functionality to the world of quantum machines. Quantum schemes prior to the one implemented here were able to replicate some features in particular use cases often associated with homomorphic encryption but lacked other crucial properties, for example, relying on continual interaction to perform a computation or leaking information about the encrypted data. We present the first experimental realization of a quantum fully homomorphic encryption scheme. To demonstrate the versatility of a a quantum fully homomorphic encryption scheme, we further present a toy two-party secure computation task enabled by our scheme

    Marine nutrient subsidies promote biogeochemical hotspots in undisturbed, highly humic estuaries

    Get PDF
    The land-ocean dissolved organic carbon (DOC) flux represents a significant term within the global carbon budget, with peatland-dominated regions representing the most intense sources of terrestrial DOC export. As the interface between freshwater and marine systems, estuaries have the potential to act as a filter of the land-ocean carbon flux, removing terrestrially derived DOC, which is present at low concentrations in the oceans, via a combination of physicochemical and biological processes. However, the fate of peat-derived DOC within estuaries remains poorly quantified, partly due to the complicating influences of heterogeneous soils, land-use, point sources, and upstream modification of organic matter. To minimize these modifying factors, we studied DOC and inorganic nutrients in four small, peat-dominated, minimally disturbed, and oligotrophic Falkland Island estuaries. Contrary to expectations, we found limited evidence of physicochemical estuarine DOC removal, and instead observed apparent "hot zones" of biogeochemical activity, where terrestrially-derived silicate mixed with inorganic nitrogen and phosphorus entering the estuaries from the nutrient-rich marine ecosystem. In two estuaries, this coincided with apparent in situ DOC production. We suggest that the observed phenomena of marine nutrient subsidy of estuarine productivity, and flexible utilization of multiple nutrients within the oligotrophic system, may once have been widespread in temperate estuaries. However, this function has been lost in many ecosystems due to catchment eutrophication by agricultural and urban development. We conclude that the estuaries of the Falkland Islands provide a valuable pre-disturbance analogue for natural biogeochemical functioning in temperate estuaries receiving high organic matter inputs

    Experimental demonstration of quantum fully homomorphic encryption with application in a two-party secure protocol

    Get PDF
    A fully homomorphic encryption system hides data from unauthorized parties, while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful server without revealing their inputs, a fully homomorphic cryptosystem can be used as a building block in the construction of a number of cryptographic functionalities. Designing such a scheme remained an open problem until 2009, decades after the idea was first conceived, and the past few years have seen the generalization of this functionality to the world of quantum machines. Quantum schemes prior to the one implemented here were able to replicate some features in particular use-cases often associated with homomorphic encryption but lacked other crucial properties, for example, relying on continual interaction to perform a computation or leaking information about the encrypted data. We present the first experimental realisation of a quantum fully homomorphic encryption scheme. We further present a toy two-party secure computation task enabled by our scheme. Finally, as part of our implementation, we also demonstrate a post-selective two-qubit linear optical controlled-phase gate with a much higher post-selection success probability (1/2) when compared to alternate implementations, e.g. with post-selective controlled-Z or controlled-X gates (1/9).</p

    Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol

    Get PDF
    A fully homomorphic encryption system hides data from unauthorized parties while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful server without revealing their inputs, a fully homomorphic cryptosystem can be used as a building block in the construction of a number of crypt
    • …
    corecore