360 resultados para MAGNETIC EXCHANGE INTERACTIONS
Resumo:
The firm is faced with a decision concerning the nature of intra-organizational exchange relationships with internal human resources and the nature or inter-organizational exchange relationships with market firms. In both situations, the firm can develop an exchange that ranges from a discrete exchange to a relational exchange. Transaction Cost Economics (TCE) and the Resource Dependency View (RDV) represent alternative efficiency-based explanations fo the nature of the exchange relationship. The aim of the paper is to test these two theories in respect of air conditioning maintenance in retail centres. Multiple sources of information are genereated from case studies of Australian retail centres to test these theories in respoect of internalized operations management (concerning strategic aspects of air conditioning maintenance) and externalized planned routine air conditioning maintenance. The analysis of the data centres on pattern matching. It is concluded that the data supports TCE - on the basis of a development in TCE's contractual schema. Further research is suggested towards taking a pluralistic stance and developing a combined efficiency and power hypothesis - upon which Williamson has speculated. For practice, the conclusions also offer a timely cautionary note concerning the adoption of one approach in all exchange relationships.
Resumo:
We treat the security of group key exchange (GKE) in the universal composability (UC) framework. Analyzing GKE protocols in the UC framework naturally addresses attacks by malicious insiders. We define an ideal functionality for GKE that captures contributiveness in addition to other desired security goals. We show that an efficient two-round protocol securely realizes the proposed functionality in the random oracle model. As a result, we obtain the most efficient UC-secure contributory GKE protocol known.
Resumo:
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks on these protocols demonstrate the necessity of considering KCI resilience for GKE protocols. Finally, we give a new proof of security for an existing GKE protocol under the revised model assuming random oracles.
Resumo:
Despite its importance in the development of competitive advantage, attempts to unify diverse classifications of business-to-business relational exchange have been largely unsuccessful. We used 18 semi-structured, in-depth interviews with managers from a wide range of industries to explain the business-to-business relational exchange construct. Analysis of the data revealed that business-to-business relational exchange comprises five key dimensions. These are communication, compatibility, commitment, trust and power symmetry. The research highlights the importance of personal interaction in business relationships and provided additional insights into the importance of affective commitment. In addition we reveal a number of negative consequences of affective commitment, which have been previously unexplored. A new conceptual model of business-to-business relational exchange is presented, which synthesises these findings and directs future research.
Resumo:
Purpose: An extended Theory of Planned Behavior (TPB) model tests how customer loyalty intentions may relate to subjective and descriptive norms. The study further determines whether consumption characteristics – product enjoyment and importance – moderate norms-loyalty relationships.----- Methodology: Using a two-study approach focusing on youth, an Australian study (n = 244) first augmented TPB with descriptive norm. A Singapore study (n = 415) followed up with how consumption characteristics might moderate norms-loyalty relationships. With both studies, linear regressions tested the relationships among the variables.----- Findings: Extending TPB with descriptive norm improved TPB’s predictive ability across studies. Further, product enjoyment and importance moderated the norms-loyalty relationships differently. Subjective norm related to loyalty intentions significantly with high enjoyment, whereas descriptive norm was significant with low enjoyment. Only subjective norm was significant with low importance.----- Research limitations: Single-item variables, self-reported questionnaires on intended rather than actual behavior, and not controlling for cultural differences between the two samples limit generalizablity.----- Practical implications: The significance of both norms suggests that mobile firms should reach youth through their peers. With youth, social pressure may be influential particularly with hedonic products. However, the different moderations of product enjoyment and importance imply that a blanket marketing strategy targeting youth may not work.----- Originality/Value: This study extends academic knowledge on the relationships between norms and customer loyalty, particularly with consumption characteristics as moderators. The findings highlight the importance of considering different norms with consumer behavior. The study should help mobile firms understand how social influences impact customer loyalty.
Resumo:
Synchronous fluorescence spectroscopy (SFS) was applied for the investigation of interactions of the antibiotic, tetracycline (TC), with DNA in the presence of aluminium ions (Al3+). The study was facilitated by the use of the Methylene Blue (MB) dye probe, and the interpretation of the spectral data with the aid of the chemometrics method, parallel factor analysis (PARAFAC). Three-way synchronous fluorescence analysis extracted the important optimum constant wavelength differences, Δλ, and showed that for the TC–Al3+–DNA, TC–Al3+ and MB dye systems, the associated Δλ values were different (Δλ = 80, 75 and 30 nm, respectively). Subsequent PARAFAC analysis demonstrated the extraction of the equilibrium concentration profiles for the TC–Al3+, TC–Al3+–DNA and MB probe systems. This information is unobtainable by conventional means of data interpretation. The results indicated that the MB dye interacted with the TC–Al3+–DNA surface complex, presumably via a reaction intermediate, TC–Al3+–DNA–MB, leading to the displacement of the TC–Al3+ by the incoming MB dye probe.
Resumo:
Interactions between small molecules with biopolymers e.g. the bovine serum albumin (BSA protein), are important, and significant information is recorded in the UV–vis and fluorescence spectra of their reaction mixtures. The extraction of this information is difficult conventionally and principally because there is significant overlapping of the spectra of the three analytes in the mixture. The interaction of berberine chloride (BC) and the BSA protein provides an interesting example of such complex systems. UV–vis and fluorescence spectra of BC and BSA mixtures were investigated in pH 7.4 Tris–HCl buffer at 37 °C. Two sample series were measured by each technique: (1) [BSA] was kept constant and the [BC] was varied and (2) [BC] was kept constant and the [BSA] was varied. This produced four spectral data matrices, which were combined into one expanded spectral matrix. This was processed by the multivariate curve resolution–alternating least squares method (MCR–ALS). The results produced: (1) the extracted pure BC, BSA and the BC–BSA complex spectra from the measured heavily overlapping composite responses, (2) the concentration profiles of BC, BSA and the BC–BSA complex, which are difficult to obtain by conventional means, and (3) estimates of the number of binding sites of BC.
Resumo:
The binding interaction of the pesticide Isoprocarb and its degradation product, sodium 2-isopropylphenate, with bovine serum albumin (BSA) was studied by spectrofluorimetry under simulated physiological conditions. Both Isoprocarb and sodium 2-isopropylphenate quenched the intrinsic fluorescence of BSA. This quenching proceeded via a static mechanism. The thermodynamic parameters (ΔH°, ΔS° and ΔG°) obtained from the fluorescence data measured at two different temperatures showed that the binding of Isoprocarb to BSA involved hydrogen bonds and that of sodium 2-isopropylphenate to BSA involved hydrophobic and electrostatic interactions. Synchronous fluorescence spectroscopy of the interaction of BSA with either Isoprocarb or sodium 2-isopropylphenate showed that the molecular structure of the BSA was changed significantly, which is consistent with the known toxicity of the pesticide, i.e., the protein is denatured. The sodium 2-isopropylphenate, was estimated to be about 4–5 times more toxic than its parent, Isoprocarb. Synchronous fluorescence spectroscopy and the resolution of the three-way excitation–emission fluorescence spectra by the PARAFAC method extracted the relative concentration profiles of BSA, Isoprocab and sodium 2-isopropylphenate as a function of the added sodium 2-isopropylphenate. These profiles showed that the degradation product, sodium 2-isopropylphenate, displaced the pesticide in a competitive reaction with the BSA protein.
Resumo:
Introduction: 3.0 Tesla MRI offers the potential to quantify the volume fraction and structural texture of cancellous bone, along with quantification of marrow composition, in a single non-invasive examination. This study describes our preliminary investigations to identify parameters which describe cancellous bone structure including the relationships between texture and volume fraction.
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
Resumo:
Any cycle of production and exchange – be it economic, cultural or aesthetic – involves an element of risk. It involves uncertainty, unpredictability, and a potential for new insight and innovation (the boom) as well as blockages, crises and breakdown (the bust). In performance, the risks are plentiful – economic, political, social, physical and psychological. The risks people are willing to take depend on their position in the exchange (performer, producer, venue manager or spectator), and their aesthetic preferences. This paper considers the often uncertain, confronting or ‘risky’ moment of exchange between performer, spectator and culture in Live Art practices. Encompassing body art, autobiographical art, site-specific art and other sorts of performative intervention in the public sphere, Live Art eschews the artifice of theatre, breaking down barriers between art and life, artist and spectator, to speak back to the public sphere, and challenge assumptions about bodies, identities, memories, relationships and histories. In the process, Live Art frequently privileges an uncertain, confrontational or ‘risky’ mode of exchange between performer, spectator and culture, as a way of challenging power structures. This paper examines the moment of exchange in terms of risk, vulnerability, responsibility and ethics. Why the romance with ‘risky’ behaviours and exchanges? Who is really taking a risk? What risk? With whose permission (or lack thereof)? What potential does a ‘risky’ exchange hold to destabilise aesthetic, social or political norms? Where lies the fine line between subversive intervention in the public sphere and sheer self-indulgence? What are the social and ethical implications of a moment of exchange that puts bodies, beliefs or social boundaries at ‘risk’? In this paper, these questions are addressed with reference to historical and contemporary practices under the broadly defined banner of Live Art, from the early work of Abrovamic and Burden, through to contemporary Australian practitioners like Fiona McGregor.
Resumo:
The interactions of phenyldithioesters with gold nanoparticles (AuNPs) have been studied by monitoring changes in the surface plasmon resonance (SPR), depolarised light scattering, and surface enhanced Raman spectroscopy (SERS). Changes in the SPR indicated that an AuNP-phenyldithioester charge transfer complex forms in equilibrium with free AuNPs and phenyldithioester. Analysis of the Langmuir binding isotherms indicated that the equilibrium adsorption constant, Kads, was 2.3 ± 0.1 × 106 M−1, which corresponded to a free energy of adsorption of 36 ± 1 kJ mol−1. These values are comparable to those reported for interactions of aryl thiols with gold and are of a similar order of magnitude to moderate hydrogen bonding interactions. This has significant implications in the application of phenyldithioesters for the functionalization of AuNPs. The SERS results indicated that the phenyldithioesters interact with AuNPs through the C═S bond, and the molecules do not disassociate upon adsorption to the AuNPs. The SERS spectra are dominated by the portions of the molecule that dominate the charge transfer complex with the AuNPs. The significance of this in relation to the use of phenyldithioesters for molecular barcoding of nanoparticle assemblies is discussed.
Resumo:
Network Jamming systems provide real-time collaborative performance experiences for novice or inexperienced users. In this paper we will outline the interaction design considerations that have emerged during through evolutionary development cycles of the jam2jam Network Jamming software that employs generative techniques that require particular attention to the human computer relationship. In particular we describe the co-evolution of features and uses, explore the role of agile development methods in supporting this evolution, and show how the provision of a clear core capability can be matched with options for enhanced features support multi-levelled user experience and skill develop.