34 resultados para Zangerl, Rainer,
em Queensland University of Technology - ePrints Archive
Resumo:
What predicts a person's venture creation success over the course of the career, such as making progress in the venture creation process and multiple successful venture creations? Applying a life span approach of human development, this study examined the effect of early entrepreneurial competence in adolescence, which was gathered retrospectively by means of the Life History Calendar method. Human and social capitals during the founding process were investigated as mediators between adolescent competence and performance. Findings were derived from regression analyses on the basis of prospective and retrospective data from two independent samples (N = 88 nascent founders; N = 148 founders). We found that early entrepreneurial competence in adolescence had a positive effect on making progress in the venture creation process. Nascent founders' current human and social capital also had a direct effect, but it did not mediate the effect of early competences. Finally, the data revealed that early entrepreneurial competence in adolescence positively predicted habitual entrepreneurship (multiple successful venture creations) exhibited over a longer period of the individual career (specifically, 18 years). In line with the results from prospective longitudinal studies on early precursors of entrepreneurship, our findings underscore the long neglected importance of adolescent development in the explanation of entrepreneurial performance during the subsequent working life.
Resumo:
Adipose tissue engineering offers a promising alternative to the current surgical techniques for the treatment of soft tissue defects. It is a challenge to find the appropriate scaffold that not only represents a suitable environment for cells but also allows fabrication of customized tissue constructs, particularly in breast surgery. We investigated two different scaffolds for their potential use in adipose tissue regeneration. Sponge-like polyurethane scaffolds were prepared by mold casting with methylal as foaming agent, whereas polycaprolactone scaffolds with highly regular stacked-fiber architecture were fabricated with fused deposition modeling. Both scaffold types were seeded with human adipose tissuederived precursor cells, cultured and implanted in nude mice using a femoral arteriovenous flow-through vessel loop for angiogenesis. In vitro, cells attached to both scaffolds and differentiated into adipocytes. In vivo, angiogenesis and adipose tissue formation were observed throughout both constructs after 2 and 4 weeks, with angiogenesis being comparable in seeded and unseeded constructs. Fibrous tissue formation and adipogenesis were more pronounced on polyurethane foam scaffolds than on polycaprolactone prototyped scaffolds. In conclusion, both scaffold designs can be effectively used for adipose tissue engineering.
Resumo:
This paper describes a method for measuring the creative potential of computer games. The research approach applies a behavioral and verbal protocol to analyze the factors that influence the creative processes used by people as they play computer games from the puzzle genre. Creative potential is measured by examining task motivation and domain-relevant and creativity-relevant skills. This paper focuses on the reliability of the factors used for measurement, determining those factors that are more strongly related to creativity. The findings show that creative potential may be determined by examining the relationship between skills required and the effect of intrinsic motivation within game play activities.
Resumo:
The traditional model of visual arts practice is one that privileges highly individuated reflection and research on studio based, predominately material outcomes. This archetypal approach to thinking about cultural production tends to overlook all of the conceptual and contextual collaborations that take place, both informally and formally in the process of making artworks. The aim of this practice-led research project is to creatively and critically explore the potential for actively engaging in a collaborative process for making artworks. It will focus on this approach to research and making through performance and video based works made in conjunction with Kate Woodcroft. Through doing this it aims to explore the possibilities for thinking and working beyond singular, materially based practices and develop new understandings for this as a model for generating new and unexpected creative outcomes. Key departure points for this discussion include; tertiary performance, conceptual art, and humour.
Resumo:
NeSSi (network security simulator) is a novel network simulation tool which incorporates a variety of features relevant to network security distinguishing it from general-purpose network simulators. Its capabilities such as profile-based automated attack generation, traffic analysis and support for detection algorithm plug-ins allow it to be used for security research and evaluation purposes. NeSSi has been successfully used for testing intrusion detection algorithms, conducting network security analysis and developing overlay security frameworks. NeSSi is built upon the agent framework JIAC, resulting in a distributed and extensible architecture. In this paper, we provide an overview of the NeSSi architecture as well as its distinguishing features and briefly demonstrate its application to current security research projects.
Resumo:
Collaborative methods are promising tools for solving complex security tasks. In this context, the authors present the security overlay framework CIMD (Collaborative Intrusion and Malware Detection), enabling participants to state objectives and interests for joint intrusion detection and find groups for the exchange of security-related data such as monitoring or detection results accordingly; to these groups the authors refer as detection groups. First, the authors present and discuss a tree-oriented taxonomy for the representation of nodes within the collaboration model. Second, they introduce and evaluate an algorithm for the formation of detection groups. After conducting a vulnerability analysis of the system, the authors demonstrate the validity of CIMD by examining two different scenarios inspired sociology where the collaboration is advantageous compared to the non-collaborative approach. They evaluate the benefit of CIMD by simulation in a novel packet-level simulation environment called NeSSi (Network Security Simulator) and give a probabilistic analysis for the scenarios.
Resumo:
Threats against computer networks evolve very fast and require more and more complex measures. We argue that teams respectively groups with a common purpose for intrusion detection and prevention improve the measures against rapid propagating attacks similar to the concept of teams solving complex tasks known from field of work sociology. Collaboration in this sense is not easy task especially for heterarchical environments. We propose CIMD (collaborative intrusion and malware detection) as a security overlay framework to enable cooperative intrusion detection approaches. Objectives and associated interests are used to create detection groups for exchange of security-related data. In this work, we contribute a tree-oriented data model for device representation in the scope of security. We introduce an algorithm for the formation of detection groups, show realization strategies for the system and conduct vulnerability analysis. We evaluate the benefit of CIMD by simulation and probabilistic analysis.
Resumo:
Complex Internet attacks may come from multiple sources, and target multiple networks and technologies. Nevertheless, Collaborative Intrusion Detection Systems (CIDS) emerges as a promising solution by using information from multiple sources to gain a better understanding of objective and impact of complex Internet attacks. CIDS also help to cope with classical problems of Intrusion Detection Systems (IDS) such as zero-day attacks, high false alarm rates and architectural challenges, e. g., centralized designs exposing the Single-Point-of-Failure. Improved complexity on the other hand gives raise to new exploitation opportunities for adversaries. The contribution of this paper is twofold. We first investigate related research on CIDS to identify the common building blocks and to understand vulnerabilities of the Collaborative Intrusion Detection Framework (CIDF). Second, we focus on the problem of anonymity preservation in a decentralized intrusion detection related message exchange scheme. We use techniques from design theory to provide multi-path peer-to-peer communication scheme where the adversary can not perform better than guessing randomly the originator of an alert message.