799 research outputs found

    Web-Based Virtual Classroom Discussions and Remote Collaboration

    Get PDF

    Integrating Cognition with an Affective Lens to Better Understand Information Security Policy Compliance

    Get PDF
    Information systems security behavioral research has primarily focused on individual cognitive processes and their impact on information security policy noncompliance. However, affective processes (operationalized by affective absorption and affective flow) may also significantly contribute to misuse or information security policy noncompliance. Our research study evaluated the impact of affective absorption (i.e., the trait or disposition to allow one’s emotions to drive decision-making) and affective flow (i.e., a state of immersion with one’s emotions) on cognitive processes in the context of attitude toward and compliance with information security policies. Our conceptual model was evaluated using a laboratory research design. We found that individuals who were frustrated by work-related tasks experienced negative affective flow and violated information security policies. Furthermore, perceptions of organizational injustice increased negative affective flow. Our findings underscore the need for understanding affective processes as well as cognitive processes which may lead to a more holistic understanding regarding information security policy compliance

    Ranking Factors by Importance in Factorial Survey Analysis

    Get PDF
    Factorial survey analysis is a statistical technique with a long history of use in decision-oriented organizational and information systems (IS) research. The technique produces a collection of standardized regression coefficients that help one to rank survey factors by importance. However, such rankings may be invalid because a researcher might not account for two related issues: unequal factor (i.e., dimension) manipulation effect sizes and the inherent multilevel structure of factorial survey data. We address these concomitant issues by demonstrating the ranking problem in simulated datasets, explaining the ranking problem’s underlying statistical causes, and justifying the use of remediating statistical methods. In particular, we focus on coding proportional to effect, a technique in which one consolidates corresponding dimension-level dummy (0, 1) variables into a single re-calibrated independent variable that is regressed on the dependent variable. One then uses the resulting standardized coefficients to rank the factors. We assess the advantages, disadvantages, and limitations of remediation techniques and offer suggestions for future information systems research

    Scaling of polymers in aligned rods

    Full text link
    We study the behavior of self avoiding polymers in a background of vertically aligned rods that are either frozen into random positions or free to move horizontally. We find that in both cases the polymer chains are highly elongated, with vertical and horizontal size exponents that differ by a factor of 3. Though these results are different than previous predictions, our results are confirmed by detailed computer simulations.Comment: 4 pages, 4 figure

    Understanding Unstable Information Systems Phenomena: A Punctuated Equilibrium Perspective

    Get PDF
    The information systems (IS) literature includes different perspectives, epistemologies, and research philosophies to explore phenomena at the intersection of technologies, information, people, organizations, and processes. As studies are replicated and knowledge accumulates, researchers can develop a more in-depth understanding of how their constructs of interest interact and affect each other. IS researchers have reported mixed findings in prior research as the phenomena change. In this paper, we discuss unstable phenomena in IS and argue that conflicting findings in a variety of domains might be the result of this instability. Using examples from IS security and word processing research streams, we examine the issues surrounding unstable phenomena using a punctuated equilibrium lens and suggest research strategies and a research framework to help researchers conduct studies in this challenging environmen

    Early post-operative thrombosis of the prosthetic mitral valve in patient with heparin-induced thrombocytopenia

    Get PDF
    Heparin-induced thrombocytopenia (HIT) is one of the most common immune-mediated adverse drug reactions, with frequencies as high as 2-3% for certain groups of post-cardiac surgery patients. We report on an 50-year-old woman with early post-operative thrombosis of the prosthetic mitral valve due to heparin-induced thrombocytopenia. Non-invasive imaging (two-dimensional transesophageal echocardiography; 2D-TEE) allowed the exact localisation of thrombotic masses and revealed the increase of the mean diastolic mitral gradient. The HIT diagnosis was proved by the clinical scoring system, and with the identification of heparin platelet factor 4-induced antibodies. After the withdrawal of LMWH therapy and the start of intravenous lepirudin treatment, the patient's medical condition improved continuously. Follow-up echocardiography showed a step-wise decrease in the severity of the mean diastolic mitral valve gradient and a complete resolution of thrombus formations. Perhaps we may remind ourselves that, whilst HIT is one of the most common immune-mediated adverse drug reactions for certain groups of post-cardiac surgery patients, it can be managed successfully. We would also stress the importance of serial 2D-TEE examinations in the early post-operative period

    Crystal structure of a ring-cleaving cyclohexane-1,2-dione hydrolase, a novel member of the thiamine diphosphate enzyme family

    Get PDF
    The thiamine diphosphate (ThDP) dependent flavoenzyme cyclohexane-1,2-dione hydrolase (CDH) (EC 3.7.1.11) catalyses a key step of a novel anaerobic degradation pathway for alicyclic alcohols by converting cyclohexane-1,2-dione (CDO) to 6-oxohexanoate and further to adipate using NAD(+) as electron acceptor. To gain insights into the molecular basis of these reactions CDH from denitrifying anaerobe Azoarcus sp. strain 22Lin was structurally characterized at 1.26 Å resolution. Notably, the active site funnel is rearranged in an unprecedented manner providing the structural basis for the specific binding and cleavage of an alicyclic compound. Crucial features include a decreased and displaced funnel entrance, a semi-circularly shaped loop segment preceding the C-terminal arm and the attachment of the C-terminal arm to other subunits of the CDH tetramer. Its structural scaffold and the ThDP activation is related to that observed for other members of the ThDP enzyme family. The selective binding of the competitive inhibitor 2-methyl-2,4-pentane-diol (MPD) to the open funnel of CDH reveals an asymmetry of the two active sites found also in the dimer of several other ThDP dependent enzymes. The substrate binding site is characterized by polar and non-polar moieties reflected in the structures of MPD and CDO and by three prominent histidine residues (His28, His31 and His76) that most probably play a crucial role in substrate activation. The NAD(+) dependent oxidation of 6-oxohexanoate remains enigmatic as the redox-active cofactor FAD seems not to participate in catalysis, and no obvious NAD(+) binding site is found. Based on the structural data both reactions are discussed

    First Record of Mink Frog, Rana septentrionalis, from Insular Newfoundland

    Get PDF
    Two populations of the Mink Frog (Rana septentrionalis) were identified near Corner Brook Newfoundland during wider surveys for anurans on the west coast of the island. This brings to six the number of anuran species which are known to have been introduced to insular Newfoundland, with four known to be currently extant
    corecore