1,987 research outputs found

    Time Perception after Emotional Induction

    Get PDF
    Current literature establishes trends where valent stimuli can create a subjective experience of retrospective or prospective time. The purpose of this study is to examine the consequences of estimating time that has passed as a result of valence mood induction. Time seems to pass more slowly when we are not in a pleasant state. What if a self-induced mood could change our perception of time that has passed? To answer this question, our study required participants to write about specific memories about incidents of joy or sadness, or about the classroom around them for a control condition. There was no significant change in mood for the positive emotion group and a marginal change in mood for the negative emotion group. There were no significant interactions between time and group. Using recall of an episodic memory was not an effective emotional induction technique

    Understanding Responses to Ethical Leadership

    Get PDF

    The relationships among social intelligence, emotional intelligence and cultural intelligence

    Get PDF
    This article examines three forms of intelligence: social intelligence (SI), emotional intelligence (EI) and cultural intelligence (CQ). The aim is to establish the relationship that exists between EI and CQ, and to clearly show how they is distinct, but related constructs, as well as subsets of SI. A series of models is developed to support the various propositions presented and to show the evolution of ideas which build to the final integrated model. This new model will impact future research and managerial use of these constructs, which is critical in order to advance the field. A discussion of limitations of this study and future research is also provided

    What Is An Invention? A Review Of The Literature On Patentable Subject Matter

    Get PDF
    This work is a critical review of the literature on patentable subject matter. It examines the central feature of modern patent law—the “invention”—at an international and comparative level. As with most codified terms intended to have wide-ranging, prospective applicability, it is usually left undefined, or if defined, is usually drafted broadly and permissively. Despite the hallmarks of patentability (namely, novelty, inventiveness, and industrial applicability), some courts1 and academic commentators have questioned whether there still needs to be an invention in the first place, before one even considers its patentability

    Canada\u27s Inadequate Legal Protection Against Industrial Espionage

    Get PDF
    Canadian law provides little protection for individuals and corporations against industrial espionage. Akin to the United States\u27 Economic Espionage Act of 1996-with its broad definition of trade secret and accompanying protections and remedies-we propose that Canada enact legislation at the federal level to remedy many of the deficiencies that arise in bringing a claim under the usual breach of confidence action

    Oil and Gas Law: From \u3cem\u3eHabendum\u3c/em\u3e to Patent Law

    Full text link
    This article outlines and addresses the specific patent issues affecting the oil and gas industry. In so doing, it argues that the business realities of the industry, coupled with its fast-paced environment, make it a perfect example of why the current patent prohibition against professional skills and business methods must be reformed

    Privacy & Terrorism Review Where Have We Come in 10 Years?

    Full text link
    As a result of terrorist attacks in the United States on September 11 and subsequent attacks on other influential western countries, new laws have been put in place to supposedly be an effective tool to prevent terrorist attacks and conjointly fight the war on drugs. These laws and presidential executive orders have not been without controversy. The Patriot Act will be used as the primary source of legislation in illustrating how in times of fear governments introduce laws, which normally would not be accepted by the general population as a clear invasion of their privacy. In addition, Canada and the United Kingdom’s anti-terrorist legislations will be compared with the United States. Money laundering, terrorist anti-terrorist finance, government investigative surveillance, and data mining will be the areas this paper will focus on to illustrate the emerging invasion on privacy for the sake of security. Despite the fact that we are losing our privacy to our fears of danger, a light will be shed as to the effectiveness of these new laws. Case law will be used to illustrate that the courts have been reluctant in invalidating laws that infringe our constitutionally given rights of privacy. Possible alternative measures will be given to deal with acts of terrorism. This paper will argue that privacy rights have seen a shift from its traditional understanding since the recent terrorist attacks on the western governments and that security has taken a primary role; privacy rights have been traded as a commodity in the market by the U.S and to a lesser extent the Canadian government

    Modeling Socially Desirable Responding and Its Effects

    Get PDF
    The impact of socially desirable responding or faking on noncognitive assessments remains an issue of strong debate. One of the main reasons for the controversy is the lack of a statistical method to model such response sets. This article introduces a new way to model faking based on the assumption that faking occurs due to an interaction between person and situation. The technique combines a control group design with structural equation modeling and allows a separation of trait and faking variance. The model is introduced and tested in an example. The results confirm a causal nfluence of faking on means and covariance structure of a Big 5 questionnaire. Both effects can be reversed by the proposed model. Finally, a real-life criterion was implemented and predicted by both variance sources. In this example, it was the trait but not the faking variance that was predictive. Implications for research and practice are discussed

    Canada\u27s Inadequate Legal Protection Against Industrial Espionage

    Get PDF
    Canadian law provides little protection for individuals and corporations against industrial espionage. Akin to the United States\u27 Economic Espionage Act of 1996-with its broad definition of trade secret and accompanying protections and remedies-we propose that Canada enact legislation at the federal level to remedy many of the deficiencies that arise in bringing a claim under the usual breach of confidence action

    Easy computation of the Bayes Factor to fully quantify Occam's razor

    Get PDF
    20 pages plus 5 pages of Supplementary MaterialThe Bayes factor is the gold-standard figure of merit for comparing fits of models to data, for hypothesis selection and parameter estimation. However it is little used because it is computationally very intensive. Here it is shown how Bayes factors can be calculated accurately and easily, so that any least-squares or maximum-likelihood fits may be routinely followed by the calculation of Bayes factors to guide the best choice of model and hence the best estimations of parameters. Approximations to the Bayes factor, such as the Bayesian Information Criterion (BIC), are increasingly used. Occam's razor expresses a primary intuition, that parameters should not be multiplied unnecessarily, and that is quantified by the BIC. The Bayes factor quantifies two further intuitions. Models with physically-meaningful parameters are preferable to models with physically-meaningless parameters. Models that could fail to fit the data, yet which do fit, are preferable to models which span the data space and are therefore guaranteed to fit the data. The outcomes of using Bayes factors are often very different from traditional statistics tests and from the BIC. Three examples are given. In two of these examples, the easy calculation of the Bayes factor is exact. The third example illustrates the rare conditions under which it has some error and shows how to diagnose and correct the error
    corecore