697 resultados para Black-Scholes model
em Queensland University of Technology - ePrints Archive
Resumo:
This paper takes its root in a trivial observation: management approaches are unable to provide relevant guidelines to cope with uncertainty, and trust of our modern worlds. Thus, managers are looking for reducing uncertainty through information’s supported decision-making, sustained by ex-ante rationalization. They strive to achieve best possible solution, stability, predictability, and control of “future”. Hence, they turn to a plethora of “prescriptive panaceas”, and “management fads” to bring simple solutions through best practices. However, these solutions are ineffective. They address only one part of a system (e.g. an organization) instead of the whole. They miss the interactions and interdependencies with other parts leading to “suboptimization”. Further classical cause-effects investigations and researches are not very helpful to this regard. Where do we go from there? In this conversation, we want to challenge the assumptions supporting the traditional management approaches and shed some lights on the problem of management discourse fad using the concept of maturity and maturity models in the context of temporary organizations as support for reflexion. Global economy is characterized by use and development of standards and compliance to standards as a practice is said to enable better decision-making by managers in uncertainty, control complexity, and higher performance. Amongst the plethora of standards, organizational maturity and maturity models hold a specific place due to general belief in organizational performance as dependent variable of (business) processes continuous improvement, grounded on a kind of evolutionary metaphor. Our intention is neither to offer a new “evidence based management fad” for practitioners, nor to suggest research gap to scholars. Rather, we want to open an assumption-challenging conversation with regards to main stream approaches (neo-classical economics and organization theory), turning “our eyes away from the blinding light of eternal certitude towards the refracted world of turbid finitude” (Long, 2002, p. 44) generating what Bernstein has named “Cartesian Anxiety” (Bernstein, 1983, p. 18), and revisit the conceptualization of maturity and maturity models. We rely on conventions theory and a systemic-discursive perspective. These two lenses have both information & communication and self-producing systems as common threads. Furthermore the narrative approach is well suited to explore complex way of thinking about organizational phenomena as complex systems. This approach is relevant with our object of curiosity, i.e. the concept of maturity and maturity models, as maturity models (as standards) are discourses and systems of regulations. The main contribution of this conversation is that we suggest moving from a neo-classical “theory of the game” aiming at making the complex world simpler in playing the game, to a “theory of the rules of the game”, aiming at influencing and challenging the rules of the game constitutive of maturity models – conventions, governing systems – making compatible individual calculation and social context, and possible the coordination of relationships and cooperation between agents with or potentially divergent interests and values. A second contribution is the reconceptualization of maturity as structural coupling between conventions, rather than as an independent variable leading to organizational performance.
Resumo:
The black rat (Rattus rattus) has been shown to be the primary species responsible for causing significant crop losses within the Australian macadamia industry. This species success within macadamia orchards is directly related to the flexibility expressed in its foraging behaviour. In this paper a conceptual foraging model is presented which proposes that the utilisation of resources by rodents within various components of the system is related not only to their relative abundance, but also to predator avoidance behaviour. Nut removal from high predation risk habitats during periods of low resource abundance in low risk compartments of the system is considered an essential behaviour that allows high rodent densities to be maintained throughout the year.
Resumo:
Contends that South African universities must find admissions criteria, other than high school grades, that are both fair and valid for Black applicants severely disadvantaged by an inferior school education. The use of traditional intellectual assessments and aptitude tests for disadvantaged and minority students remains controversial as a fair assessment; they do not take account of potential for change. In this study, therefore, a measure of students' cognitive modifiability, assessed by means of an interactive assessment model, was added as a moderator of traditional intellectual assessment in predicting 1st-yr university success. Cognitive modifiability significantly moderated the predictive validity of the traditional intellectual assessment for 52 disadvantaged Black students. The higher the level of cognitive modifiability, the less effective were traditional methods for predicting academic success and vice versa.
Resumo:
This chapter discusses an action research project into the lived experience of the workplace mobbing phenomenon. The action research methodology is based on the exemplarian model (Coenen & Khonraad, 2003) from the Netherlands Group. This model requires positive outcomes for those immersed in the problem to reduce the adversity of their circumstances. The findings challenge the psychological perspective of the existing bullying literature that tends to focus on individual behaviour. This research, undertaken over a three year period with 212 participants, identified the dysfunctional nature of public sector bureaucracies and the power gained through gossip and rumour as some of the key emergent themes to explain the workplace mobbing problem. In addition, resistance, conscientisation, and agency were identified as the key to transformation for those targeted. The discussion focuses on the crystallisation phase of the exemplarian model where the participants identified themselves as the Black Sheep and adopted the motto that “a black sheep is a biting beast” (Bastard, 1565 or 6-1618, p. 90), reflecting a sense of empowerment, individual agency, and a sense of humour in dealing with the serious yet seemingly absurd reality of their situations. The identity of the Black Sheep was consolidated when the group organised a 2 day conference with over 200 attendees to discuss how best to prevent workplace mobbing. This self-affirming action was a proactive step towards metaphorically “biting back” at the problem. A number of positive outcomes were achieved including the conference with over 200 attending leading to national media coverage across Australia and additional interviews with magazines, newspapers, and radio.
Resumo:
Power system restoration after a large area outage involves many factors, and the procedure is usually very complicated. A decision-making support system could then be developed so as to find the optimal black-start strategy. In order to evaluate candidate black-start strategies, some indices, usually both qualitative and quantitative, are employed. However, it may not be possible to directly synthesize these indices, and different extents of interactions may exist among these indices. In the existing black-start decision-making methods, qualitative and quantitative indices cannot be well synthesized, and the interactions among different indices are not taken into account. The vague set, an extended version of the well-developed fuzzy set, could be employed to deal with decision-making problems with interacting attributes. Given this background, the vague set is first employed in this work to represent the indices for facilitating the comparisons among them. Then, a concept of the vague-valued fuzzy measure is presented, and on that basis a mathematical model for black-start decision-making developed. Compared with the existing methods, the proposed method could deal with the interactions among indices and more reasonably represent the fuzzy information. Finally, an actual power system is served for demonstrating the basic features of the developed model and method.
Resumo:
Circulating 25-hydroxyvitamin D (25(OH)D), a marker for vitamin D status, is associated with bone health and possibly cancers and other diseases; yet, the determinants of 25(OH)D status, particularly ultraviolet radiation (UVR) exposure, are poorly understood. Determinants of 25(OH)D were analyzed in a subcohort of 1,500 participants of the US Radiologic Technologists (USRT) Study that included whites (n 842), blacks (n 646), and people of other races/ethnicities (n 12). Participants were recruited monthly (20082009) across age, sex, race, and ambient UVR level groups. Questionnaires addressing UVR and other exposures were generally completed within 9 days of blood collection. The relation between potential determinants and 25(OH)D levels was examined through regression analysis in a random two-thirds sample and validated in the remaining one third. In the regression model for the full study population, age, race, body mass index, some seasons, hours outdoors being physically active, and vitamin D supplement use were associated with 25(OH)D levels. In whites, generally, the same factors were explanatory. In blacks, only age and vitamin D supplement use predicted 25(OH)D concentrations. In the full population, determinants accounted for 25 of circulating 25(OH)D variability, with similar correlations for subgroups. Despite detailed data on UVR and other factors near the time of blood collection, the ability to explain 25(OH)D was modest.
Resumo:
Most previous work on unconditionally secure multiparty computation has focused on computing over a finite field (or ring). Multiparty computation over other algebraic structures has not received much attention, but is an interesting topic whose study may provide new and improved tools for certain applications. At CRYPTO 2007, Desmedt et al introduced a construction for a passive-secure multiparty multiplication protocol for black-box groups, reducing it to a certain graph coloring problem, leaving as an open problem to achieve security against active attacks. We present the first n-party protocol for unconditionally secure multiparty computation over a black-box group which is secure under an active attack model, tolerating any adversary structure Δ satisfying the Q 3 property (in which no union of three subsets from Δ covers the whole player set), which is known to be necessary for achieving security in the active setting. Our protocol uses Maurer’s Verifiable Secret Sharing (VSS) but preserves the essential simplicity of the graph-based approach of Desmedt et al, which avoids each shareholder having to rerun the full VSS protocol after each local computation. A corollary of our result is a new active-secure protocol for general multiparty computation of an arbitrary Boolean circuit.
Resumo:
The validity of fatigue protocols involving multi-joint movements, such as stepping, has yet to be clearly defined. Although surface electromyography can monitor the fatigue state of individual muscles, the effects of joint angle and velocity variation on signal parameters are well established. Therefore, the aims of this study were to i) describe sagittal hip and knee kinematics during repetitive stepping ii) identify periods of high inter-trial variability and iii) determine within-test reliability of hip and knee kinematic profiles. A group of healthy men (N = 15) ascended and descended from a knee-high platform wearing a weighted vest (10%BW) for 50 consecutive trials. The hip and knee underwent rapid flexion and extension during step ascent and descent. Variability of hip and knee velocity peaked between 20-40% of the ascent phase and 80-100% of the descent. Significant (p<0.05) reductions in joint range of motion and peak velocity during step ascent were observed, while peak flexion velocity increased during descent. Healthy individuals use complex hip and knee motion to negotiate a knee-high step with kinematic patterns varying across multiple repetitions. These findings have important implications for future studies intending to use repetitive stepping as a fatigue model for the knee extensors and flexors.
Resumo:
Purpose Ethnographic studies of cyber attacks typically aim to explain a particular profile of attackers in qualitative terms. The purpose of this paper is to formalise some of the approaches to build a Cyber Attacker Model Profile (CAMP) that can be used to characterise and predict cyber attacks. Design/methodology/approach The paper builds a model using social and economic independent or predictive variables from several eastern European countries and benchmarks indicators of cybercrime within the Australian financial services system. Findings The paper found a very strong link between perceived corruption and GDP in two distinct groups of countries – corruption in Russia was closely linked to the GDP of Belarus, Moldova and Russia, while corruption in Lithuania was linked to GDP in Estonia, Latvia, Lithuania and Ukraine. At the same time corruption in Russia and Ukraine were also closely linked. These results support previous research that indicates a strong link between been legitimate economy and the black economy in many countries of Eastern Europe and the Baltic states. The results of the regression analysis suggest that a highly skilled workforce which is mobile and working in an environment of high perceived corruption in the target countries is related to increases in cybercrime even within Australia. It is important to note that the data used for the dependent and independent variables were gathered over a seven year time period, which included large economic shocks such as the global financial crisis. Originality/value This is the first paper to use a modelling approach to directly show the relationship between various social, economic and demographic factors in the Baltic states and Eastern Europe, and the level of card skimming and card not present fraud in Australia.
Resumo:
We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function f G (x 1,...,x n ) = x 1 ·x 2 ⋯ x n in an arbitrary finite group (G,·), where the input of party P i is x i ∈ G for i = 1,...,n. For flexibility, we are interested in protocols for f G which require only black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our results are as follows. First, on the negative side, we show that if (G,·) is non-abelian and n ≥ 4, then no ⌈n/2⌉-private protocol for computing f G exists. Second, on the positive side, we initiate an approach for construction of black-box protocols for f G based on k-of-k threshold secret sharing schemes, which are efficiently implementable over any black-box group G. We reduce the problem of constructing such protocols to a combinatorial colouring problem in planar graphs. We then give two constructions for such graph colourings. Our first colouring construction gives a protocol with optimal collusion resistance t < n/2, but has exponential communication complexity O(n*2t+1^2/t) group elements (this construction easily extends to general adversary structures). Our second probabilistic colouring construction gives a protocol with (close to optimal) collusion resistance t < n/μ for a graph-related constant μ ≤ 2.948, and has efficient communication complexity O(n*t^2) group elements. Furthermore, we believe that our results can be improved by further study of the associated combinatorial problems.
Resumo:
We report sensitive high mass resolution ion microprobe, stable isotopes (SHRIMP SI) multiple sulfur isotope analyses (32S, 33S, 34S) to constrain the sources of sulfur in three Archean VMS deposits—Teutonic Bore, Bentley, and Jaguar—from the Teutonic Bore volcanic complex of the Yilgarn Craton, Western Australia, together with sedimentary pyrites from associated black shales and interpillow pyrites. The pyrites from VMS mineralization are dominated by mantle sulfur but include a small amount of slightly negative mass-independent fractionation (MIF) anomalies, whereas sulfur from the pyrites in the sedimentary rocks has pronounced positive MIF, with ∆33S values that lie between 0.19 and 6.20‰ (with one outlier at −1.62‰). The wall rocks to the mineralization include sedimentary rocks that have contributed no detectable positive MIF sulfur to the VMS deposits, which is difficult to reconcile with the leaching model for the formation of these deposits. The sulfur isotope data are best explained by mixing between sulfur derived from a magmatic-hydrothermal fluid and seawater sulfur as represented by the interpillow pyrites. The massive sulfide lens pyrites have a weighted mean ∆33S value of −0.27 ± 0.05‰ (MSWD = 1.6) nearly identical with −0.31 ± 0.08‰ (MSWD = 2.4) for pyrites from the stringer zone, which requires mixing to have occurred below the sea floor. We employed a two-component mixing model to estimate the contribution of seawater sulfur to the total sulfur budget of the two Teutonic Bore volcanic complex VMS deposits. The results are 15 to 18% for both Teutonic Bore and Bentley, much higher than the 3% obtained by Jamieson et al. (2013) for the giant Kidd Creek deposit. Similar calculations, carried out for other Neoarchean VMS deposits give value between 2% and 30%, which are similar to modern hydrothermal VMS deposits. We suggest that multiple sulfur isotope analyses may be used to predict the size of Archean VMS deposits and to provide a vector to ore deposit but further studies are needed to test these suggestions.
Resumo:
Issue addressed The paper examines the meanings of food safety among food businesses deemed non-compliant and considers the need for an ‘insider perspective’ to inform a more nuanced health promotion practice. Methods In-depth interviews were conducted with 29 food business operators who had been recently deemed ‘non-compliant’ through Council inspection. Result Paradoxically, these ‘non-compliers’ revealed a strong belief in the importance of food safety as well as a desire to comply with the regulations as communicated to them by Environmental Health Officers (EHOs). Conclusions The evidence base of food safety is largely informed by the science of food hazards, yet there is a very important need to illuminate the ‘insider’ experience of food businesses doing food safety on a daily basis. This requires a more socially nuanced appreciation of food businesses beyond the simple dichotomy of compliant/ non-compliant. So what? Armed with a deeper understanding of the social context surrounding food safety practice, it is anticipated that a more balanced, collaborative mode of food safety health promotion could develop which could add to the current signature model of regulation.
Resumo:
The Korean black scraper, Thamnaconus modestus, is one of the most economically important maricultural fish species in Korea. However, the annual catch of this fish has been continuously declining over the past several decades. In this study, the genetic diversity and relationships among four wild populations and two hatchery stocks of Korean black scraper were assessed based on 16 microsatellite (MS) markers. A total of 319 different alleles were detected over all loci with an average of 19.94 alleles per locus. The hatchery stocks [mean number of alleles (N A) = 12, allelic richness (A R) = 12, expected heterozygosity (He) = 0.834] showed a slight reduction (P > 0.05) in genetic variability in comparison with wild populations (mean N A = 13.86, A R = 12.35, He = 0.844), suggesting a sufficient level of genetic variation in the hatchery populations. Similarly low levels of inbreeding and significant Hardy–Weinberg equilibrium deviations were detected in both wild and hatchery populations. The genetic subdivision among all six populations was low but significant (overall F ST = 0.008, P < 0.01). Pairwise F ST, a phylogenetic tree, and multidimensional scaling analysis suggested the existence of three geographically structured populations based on different sea basin origins, although the isolation-by-distance model was rejected. This result was corroborated by an analysis of molecular variance. This genetic differentiation may result from the co-effects of various factors, such as historical dispersal, local environment and ocean currents. These three geographical groups can be considered as independent management units. Our results show that MS markers may be suitable not only for the genetic monitoring of hatchery stocks but also for revealing the population structure of Korean black scraper populations. These results will provide critical information for breeding programs, the management of cultured stocks and the conservation of this species.