233 research outputs found

    Complying with BYOD Security Policies: A Moderation Model Based on Protection Motivation Theory

    Get PDF
    As security concerns have become critical to organizations’ Bring Your Own Device (BYOD) strategy, it is important for employees to comply with organization’s security measures and policies. Based on the protection motivation theory, this study develops a theoretical model to identify the key factors that affect an employee’s intention to comply with organization’s BYOD security policies. This model also enriches general Protection Motivation Theory (PMT) by investigating how unique BYOD features may play moderating roles on the relationships between employee’s security perceptions and compliance intention. A survey of organization employees who were using their own devices in their workplace was conducted. The research model was tested using the partial least squares (PLS) approach. The results suggest that employees’ threat appraisal and coping appraisal affect their intention to comply with BYOD security policies. Further, mixed usage of device and company surveillance visibility are verified moderators. This study contributes to both academics and management practice

    Comparison of raw and processed Radix Polygoni Multiflori (Heshouwu) by high performance liquid chromatography and mass spectrometry

    Get PDF
    <p>Abstract</p> <p>Background</p> <p><it>Radix Polygoni Multiflori </it>is the dried root tuber of <it>Polygonum multiflorum </it>Thunb. (Fam. Polygonaceae). According to Chinese medicine theory, raw (R-RPM) and processed (P-RPM) <it>Radix Polygoni Multiflori </it>possess different properties. The present study investigates the differences in chemistry between raw and processed <it>Radix Polygoni Multiflori</it>.</p> <p>Methods</p> <p>Five pairs of R-RPM and P-RPM as well as 15 commercial decoction pieces were analyzed with high performance liquid chromatography (HPLC) and mass spectrometry (MS).</p> <p>Results</p> <p>Two anthraquinones, namely emodin-8-<it>O</it>-(6'-<it>O</it>-malonyl)-glucoside and physcion-8-<it>O</it>-(6'-<it>O</it>-malonyl)-glucoside disappeared or decreased significantly and 2,3,5,4'-tetrahydroxystilbene-2-<it>O</it>-<it>β</it>-<it>D</it>-glucopyranoside, emodin-8-<it>O</it>-<it>β</it>-<it>D</it>-glucopyranoside and physcion-8-<it>O</it>-<it>β</it>-<it>D</it>-glucopyranoside decreased after the R-RPM samples being processed. On the other hand, the contents of emodin and physcion generally increased after processing.</p> <p>Conclusion</p> <p>The present study indicates that processing <it>Radix Polygoni Multiflori </it>may change the contents and types of chemicals in it. These changes are probably responsible for the various pharmacological effects of R-RPM and P-RPM as well as hepatotoxicity.</p

    A Review of Information Systems Security Management: An Integrated Framework

    Get PDF
    As information has been a basic commodity and strategic asset, information systems (IS) security has become increasingly important to organizations. This paper conducts a review on the prior literature that has studied non-technical factors of IS security issues from organizational perspective rather than individual level. Five key concepts are studied: IS security management, organizational factors, human factors, strategic planning, and IS security policies. By integrating the main concepts that are reflected in the literature, this paper proposes an integrated framework which provides a comprehensive look at effective IS security management. Four propositions are developed. This framework is intended to provide guidance for organizations and security practitioners that need to implement their IS security management effectively

    Complying with BYOD Security Policies: A Moderation Model

    Get PDF
    Based on the protection motivation theory, this study develops a theoretical model to identify the key factors that affect employee’s intention to comply with organization’s BYOD security policies. This model also enriches general PMT by investigating how unique BYOD features may play moderating roles on the relationships between employee’s security perceptions and compliance intention. A survey on organization employees who were applying BYOD in their workplace was conducted. The research model was tested using the partial least squares (PLS) approach. The results suggest that employees’ threat appraisal and coping appraisal affect their intention to comply with BYOD security policies. Further, mixed usage of device and company’s surveillance visibility are verified moderators. This study contributes to both academics and management practice

    Is Artificial Intelligence Attractive? An Empirical Study on User’s Intention to Use AI-Enabled Applications

    Get PDF
    Artificial Intelligence (AI) technologies such as machine learning (ML), natural language processing (NLP), and image recognition, are being incorporated into a wide variety of applications. These AI-enabled applications (AIapps) promise to reshape people's lives. However, despite the proliferation of AI-related research, very little research has focused on how AIapps' unique characteristics affect an individual's adoption behavior. This study examines factors influencing an individual's intention to use AIapps with a proposed research model based on the Task-Technology Fit (TTF) as the underlying theoretical framework. The research model is empirically evaluated using the survey data and SEM method. Theoretically, this study focuses on how the unique characteristics of AIapps influence the task-technology fit and drive the intention of use. The findings are expected to help AIapp developers to evaluate the relative importance of AIapp features which can provide insights into the technology characteristics and identify priorities for further research and development

    Comparison of the Immunoregulatory Function of Different Constituents in Radix Astragali and Radix Hedysari

    Get PDF
    Radix Astragali (RA), known as “Huangqi” in China, is one of the most popular herbal medicines known worldwide to reinforce “Qi”. RA is traditionally prepared from the dried roots of Astragalus membranaceus (MJHQ) and A. membranaceus var. mongholicus (MGHQ). Radix Hedysari is named “Hongqi” (HQ), which is similar to RA. We assessed and compared the chemical constituents and bioactivity of RA and HQ. Different constituents were extracted into five major parts and were analyzed using different methods. Comparison of the immunological effects of extracts was done by using two immunological models. Results showed that flavonoids and saponins present in RA and HQ were not only structurally significantly different but also different in their immunological effect. Amino acids extract (AE) in MGHQ shows immunological effect while AE in MJHQ and HQ did not. Polysaccharides comprised the major constituents in RA and HQ. All polysaccharides extract (PE) of the three herbs showed similar levels of immunological effect in both immunological assays

    AliCHI: A Large-scale Multi-modal Dataset and Automated Evaluation Tool for Human-like Dialogue Systems

    Full text link
    A well-designed interactive human-like dialogue system is expected to take actions (e.g. smiling) and respond in a pattern similar to humans. However, due to the limitation of single-modality (only speech) or small volume of currently public datasets, most dialogue systems can only respond in speech and cannot take human-like actions. In this work, we build a large-scale multi-modal dataset of human-to-human conversation in a face-to-face fashion, with fine-grained annotations. The raw data in video format contains 635 dialogue sessions, being collected from 200 participants on designed topics and lasting 52 hours in total. Moreover, we manually annotated the verbal and non-verbal behaviors in each dialogue session on their start/end timestamp. Furthermore, we developed a corresponding evaluation tool for human-like dialogue systems to automatically evaluates the accuracy of two basic tasks, turn-taking prediction, and backchannel prediction, on both time and content. We have opened the data, the tools will be released at the conference

    Fusion Zone Microstructure Evolution of Al-Alloyed TRIP Steel in Diode Laser Welding

    Get PDF
    TRansformation Induced Plasticity (TRIP) steels are promising materials to achieve a better combination of formability and strength than conventional steels due to their unique microstructural makeup. Though welding is a vital part of auto body manufacturing, the weldability of TRIP steels has some complex and poorly understood features, which has served to retard the growth of its applications in the automotive industry. In this study, autogeneous welds were carried out on Al-alloyed TRIP steel using a 4 kW diode laser. Both fusion zone solidification behavior and subsequent austenite transformation products were investigated with optical microscopy (OM), scanning electron microscopy (SEM) and transmission electron microscopy (TEM) techniques. In terms of solidification behavior, fusion zones solidified with high temperature -ferrite as the primary phase. Fusion zone microstructure at room temperature was composed of ferrite with a skeletal morphology characteristic of solidification, and austenite decomposition products almost all having a lath morphology. Skeletal ferrite covered about 30% fusion zone area. Upper bainite laths separated by retained austenite films comprised most of the transformed microstructure, about 65% of the fused area. Lower bainite with carbide particles dispersed in an aligned way, chunk shaped retained austenite, lath martensite and twinned martensite were also occasionally observed. The Al content was considered to be for a dominant influence on fusion zone microstructure evolution

    CellMix: A General Instance Relationship based Method for Data Augmentation Towards Pathology Image Classification

    Full text link
    In pathology image analysis, obtaining and maintaining high-quality annotated samples is an extremely labor-intensive task. To overcome this challenge, mixing-based methods have emerged as effective alternatives to traditional preprocessing data augmentation techniques. Nonetheless, these methods fail to fully consider the unique features of pathology images, such as local specificity, global distribution, and inner/outer-sample instance relationships. To better comprehend these characteristics and create valuable pseudo samples, we propose the CellMix framework, which employs a novel distribution-oriented in-place shuffle approach. By dividing images into patches based on the granularity of pathology instances and shuffling them within the same batch, the absolute relationships between instances can be effectively preserved when generating new samples. Moreover, we develop a curriculum learning-inspired, loss-driven strategy to handle perturbations and distribution-related noise during training, enabling the model to adaptively fit the augmented data. Our experiments in pathology image classification tasks demonstrate state-of-the-art (SOTA) performance on 7 distinct datasets. This innovative instance relationship-centered method has the potential to inform general data augmentation approaches for pathology image classification. The associated codes are available at https://github.com/sagizty/CellMix
    corecore