1,165 research outputs found

    The Determinants of Regional Price Discrimination in the Telecommunication Industry: An Empirical Study of 31 Provinces and Municipalities in China

    Get PDF
    Telecommunication prices are vastly different across regions in China. This paper aims to identify the determinants that affect regional pricing behavior of China telecom operators. Using regional telecommunication data of 31 provinces and autonomous regions in China (excluding Hong Kong and Macao) during 2002–2011, we identified several factors which affect the regional price differences. The findings provide insights on the working of China telecommunication industry and have implications for firms’ marketing strategies and government policies

    Investors’ Risk Preference Characteristics and Conditional Skewness

    Get PDF
    Perspective on behavioral finance, we take a new look at the characteristics of investors’ risk preference, building the D-GARCH-M model, DR-GARCH-M model, and GARCHC-M model to investigate their changes with states of gain and loss and values of return together with other time-varying characteristics of investors’ risk preference. Based on a full description of risk preference characteristic, we develop a GARCHCS-M model to study its effect on the return skewness. The top ten market value stock composite indexes from Global Stock Exchange in 2012 are adopted to make the empirical analysis. The results show that investors are risk aversion when they gain and risk seeking when they lose, which effectively explains the inconsistent risk-return relationship. Moreover, the degree of risk aversion rises with the increasing gain and that of risk seeking improves with the increasing losses. Meanwhile, we find that investors’ inherent risk preference in most countries displays risk seeking, and their current risk preference is influenced by last period’s risk preference and disturbances. At last, investors’ risk preferences affect the conditional skewness; specifically, their risk aversion makes return skewness reduce, while risk seeking makes the skewness increase

    Supporting Case-based Learning in Information Security with Web-based Technology

    Get PDF
    Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security management. A process model of integrating a case library and Web 2.0 technologies to facilitate case-based learning is also presented in this paper. Insights and recommendations for implementing the process model are offered as well

    Promoting Diversity in Teaching Cybersecurity Through GICL

    Get PDF
    In summary, it is necessary to develop a diverse group of K-12 students’ interest and skills in cybersecurity as cyber threats continue to grow. Evidence shows that educating the next generation of cyber workers is a crucial job that should begin in elementary school. To ensure the effectiveness of cybersecurity education and equity at the K-12 level, teachers must create thoughtful plans for considering communities’ interests and needs, and to continually reconsider what’s working and how to adjust our strategies, approaches, design, and research plan to meet their specific needs, challenges, and strengths, particularly with students from under-served and underrepresented populations in the cybersecurity fields. By building a series of guided inquiry collaborative learning activities in the cybersecurity area, we hope that our approach could build a diverse group of students which creates a more holistic view of the problem and delivers a range of valuable problem-solving hard and soft skills. Professional development must be provided to teachers to get them prepared for adopting guided inquiry collaborative learning activities in classrooms

    Teaching Buffer Overflow via a Guided Inquiry Collaborative Learning Activity

    Get PDF
    We have developed a guided inquiry collaborative learning activity to teach buffer overflow. The key research results including the comparison of pre- and post-evaluation of student learning in groups will be presented in the conference

    Detection of Porcine Circovirus Type 2 (PCV2) in Mosquitoes from Pig Farms by PCR

    Get PDF
    To investigate, whether mosquitoes could be potential vectors that maintain or transmit PCV2, 59 mosquito samples were collected from suspicious PCV2-infected pig farms in Hubei and Anhui province, China. Total DNA from these mosquitoes was extracted and then tested for presence of PCV2 nucleic acid by PCR. Four (6.78%) samples showed the positive result. Subsequently, the positive PCR product was cloned into pEASY-T1 vector and sequenced. Sequence analysis displayed that homology between the PCR products and PCV2 strains were more than 94%. These results demonstrate that PCV2 nucleic acid exists in these mosquitoes, which suggests that mosquitoes could serve as mechanical transmission vectors of PCV2

    (E)-2′-[(3,5-Di-tert-butyl-2-hy­droxy­benzyl­idene)amino]-1,1′-binaphthalen-2-ol methanol monosolvate

    Get PDF
    The title compound, C35H35NO2·CH4O, was obtained by the reaction of rac-2-amino-2-hy­droxy-1,1-binaphthyl and 3,5-di-tert-butyl-2-hy­droxy­benzaldehyde in absolute methanol. In the Schiff base mol­ecule, the two naphthyl bicycles are twisted by 71.15 (5)°. One hy­droxy group is involved in intra­molecular O—H⋯N hydrogen bond, while the methanol solvent mol­ecule is linked to another hy­droxy group via an inter­molecular O—H⋯O hydrogen bond
    • …
    corecore