163 research outputs found

    Risk factors for social networking site scam victimisation amongst Malaysian students

    Get PDF
    Prior evidence suggests that board independence may enhance financial performance, but this relationship has been tested almost exclusively for Anglo-American countries. To explore the boundary conditions of this prominent governance mechanism, we examine the impact of the formal and information institutions of 18 national business systems (Whitley, 1999) on the board independence-financial performance relationship. Our results show that while the direct effect of independence is weak, national-level institutions significantly moderate the independence-performance relationship. Our findings suggest that the efficacy of board structures is likely to be contingent on the specific national context, but the type of legal system is insignificant

    Economic complexity and employment expansion in Africa

    Get PDF
    This policy brief provides a synthesis of four country case studies: Ghana, Kenya, Senegal and South Africa. Economic complexity refers to the amount of “productive knowledge” or “technical know-how” within a country. The paper provides a table summarizing product-specific constraints by country. Country constraints include product certification, which is performed by state agencies. When such agencies lack regulatory capacity, products do not get certified and as result, cannot be exported – inhibiting the growth of firms. Constraints also exist where there is inadequate electricity supply; firms need to invest in expensive diesel-operated generators in order to function

    Economic complexity and employment expansion : the case of South Africa

    Get PDF
    For a pattern of structural transformation and inclusive growth to assert itself, two key inter-linked ingredients are required: the move from a low productivity agricultural sector to a high productivity, high growth and export-oriented agricultural sector, and the development of a dynamic manufacturing sector which is both employment- and export -intensive. This brief explores the development of a more nuanced model of growth and development for South Africa. It suggests a number of general and sector-specific policy recommendations aimed at growing the manufacturing sector in order generate employment opportunities, especially for women and youth

    Vector Coloring the Categorical Product of Graphs

    Full text link
    A vector tt-coloring of a graph is an assignment of real vectors p1,,pnp_1, \ldots, p_n to its vertices such that piTpi=t1p_i^Tp_i = t-1 for all i=1,,ni=1, \ldots, n and piTpj1p_i^Tp_j \le -1 whenever ii and jj are adjacent. The vector chromatic number of GG is the smallest real number t1t \ge 1 for which a vector tt-coloring of GG exists. For a graph HH and a vector tt-coloring p1,,pnp_1,\ldots,p_n of a graph GG, the assignment (i,)pi(i,\ell) \mapsto p_i is a vector tt-coloring of the categorical product G×HG \times H. It follows that the vector chromatic number of G×HG \times H is at most the minimum of the vector chromatic numbers of the factors. We prove that equality always holds, constituting a vector coloring analog of the famous Hedetniemi Conjecture from graph coloring. Furthermore, we prove a necessary and sufficient condition for when all of the optimal vector colorings of the product can be expressed in terms of the optimal vector colorings of the factors. The vector chromatic number is closely related to the well-known Lov\'{a}sz theta function, and both of these parameters admit formulations as semidefinite programs. This connection to semidefinite programming is crucial to our work and the tools and techniques we develop could likely be of interest to others in this field.Comment: 38 page

    Risk Factors for Social Networking Site Scam Victimization Among Malaysian Students

    Get PDF
    Social networking sites (SNSs) can provide cybercriminals with various opportunities, including gathering of user data and login credentials to enable fraud, and directing of users toward online locations that may install malware onto their devices. The techniques employed by such cybercriminals can include clickbait (text or video), advertisement of nonexistent but potentially desirable products, and hoax competitions/giveaways. This study aimed to identify risk factors associated with falling victim to these malicious techniques. An online survey was completed by 295 Malaysian undergraduate students, finding that more than one-third had fallen victim to SNS scams. Logistic regression analysis identified several victimization risk factors including having higher scores in impulsivity (specifically cognitive complexity), using fewer devices for SNSs, and having been on an SNS for a longer duration. No reliable model was found for vulnerability to hoax valuable gift giveaways and “friend view application” advertising specifically, but vulnerability to video clickbait was predicted by lower extraversion scores, higher levels of openness to experience, using fewer devices, and being on an SNS for a longer duration. Other personality traits were not associated with either overall victimization susceptibility or increased risk of falling victim to the specific techniques. However, age approached significance within both the video clickbait and overall victimization models. These findings suggest that routine activity theory may be particularly beneficial in understanding and preventing SNSs scam victimization

    Understanding 3D mid-air hand gestures with interactive surfaces and displays: a systematic literature review

    Get PDF
    3D gesture based systems are becoming ubiquitous and there are many mid-air hand gestures that exist for interacting with digital surfaces and displays. There is no well defined gesture set for 3D mid-air hand gestures which makes it difficult to develop applications that have consistent gestures. To understand what gestures exist we conducted the first comprehensive systematic literature review on mid-air hand gestures following existing research methods. The results of the review identified 65 papers where the mid-air hand gestures supported tasks for selection, navigation, and manipulation. We also classified the gestures according to a gesture classification scheme and identified how these gestures have been empirically evaluated. The results of the review provide a richer understanding of what mid-air hand gestures have been designed, implemented, and evaluated in the literature which can help developers design better user experiences for digital interactive surfaces and displays
    corecore