9 resultados para latent class analysis
em Digital Peer Publishing
Resumo:
Integrated choice and latent variable (ICLV) models represent a promising new class of models which merge classic choice models with the structural equation approach (SEM) for latent variables. Despite their conceptual appeal, applications of ICLV models in marketing remain rare. We extend previous ICLV applications by first estimating a multinomial choice model and, second, by estimating hierarchical relations between latent variables. An empirical study on travel mode choice clearly demonstrates the value of ICLV models to enhance the understanding of choice processes. In addition to the usually studied directly observable variables such as travel time, we show how abstract motivations such as power and hedonism as well as attitudes such as a desire for flexibility impact on travel mode choice. Furthermore, we show that it is possible to estimate such a complex ICLV model with the widely available structural equation modeling package Mplus. This finding is likely to encourage more widespread application of this appealing model class in the marketing field.
Resumo:
This contribution addresses the substantial tax privilege for businesses introduced by the German Inheritance Tax Act 2009. Advocates of the vast or even entire tax exemption for businesses stress the potential damage of the inheritance tax on businesses, as those often lack liquidity to meet tax liability. This submission tackles this issue empirically based on data of the German Inheritance Tax Statistics and the SOEP. The results indicate that former German inheritance tax law has not endangered transferred businesses. Hence, there is no need for the tremendous tax privilege for businesses in current German inheritance tax law. An alternative flat inheritance tax without tax privileges, which meets revenue neutrality per tax class according to current tax law, provokes in some cases relative high tax loads which might trouble businesses.
Resumo:
This paper examines the adaptations of the writing system in Internet language in mainland China from a sociolinguistic perspective. A comparison is also made of the adaptations in mainland China with those that Su (2003) found in Taiwan. In Computer-Mediated Communication (CMC), writing systems are often adapted to compensate for their inherent inadequacies (such as difficulty in input). Su (2003) investigates the creative uses of the writing system on the electronic bulletin boards (BBS) of two college student organizations in Taipei, Taiwan, and identifies four popular and creative uses of the Chinese writing system: stylized English, stylized Taiwanese-accented Mandarin, stylized Taiwanese, and the recycling of a transliteration alphabet used in elementary education. According to Coupland (2001; cited in Su 2003), stylization is “the knowing deployment of culturally familiar styles and identities that are marked as deviating from those predictably associated with the current speaking context”. Within this framework and drawing on the data in previous publications on Internet language and online sources, this study identifies five types of adaptations in mainland China’s Internet language: stylized Mandarin (e.g., 漂漂 piāopiāo for 漂亮 ‘beautiful’), stylized dialect-accented Mandarin (e.g., 灰常 huīcháng for 非常 ‘very much’), stylized English (e.g., 伊妹儿 yīmèier for ‘email’), stylized initials (e.g., bt 变态 biàntài for ‘abnormal’; pk, short form for ‘player kill’), and stylized numbers (e.g., 9494 jiùshi jiùshi 就是就是 ‘that is it’). The Internet community is composed of highly mobile individuals and thus forms a weak-tie social network. According to Milroy and Milroy (1992), a social network with weak ties is often where language innovation takes place. Adaptations of the Chinese writing system in Internet language provide interesting evidence for the innovations within a weak-tie social network. Our comparison of adaptations in mainland China and Taiwan shows that, in maximizing the effectiveness and functionality of their communication, participants of Internet communication are confronted with different language resources and situations, including differences in Romanization systems, English proficiency level, and attitudes towards English usage. As argued by Milroy and Milroy (1992), a weak-tie social network model can bridge the social class and social network. In the Internet community, the degree of diversity of the stylized linguistic varieties indexes the virtual and/or social status of its participants: the more diversified one’s Internet language is, the higher is his/her virtual and/or social status.
Resumo:
Although an increasing number of studies of technological, institutional and organizational change refer to the concepts of path dependence and path creation, few attempts have been made to consider these concepts explicitly in their methodological accounts. This paper addresses this gap and contributes to the literature by developing a comprehensive methodology that originates from the concepts of path dependence and path creation – path constitution analysis (PCA) – and allows for the integration of multi-actor constellations on multiple levels of analysis within a process perspective. Based upon a longitudinal case study in the field of semiconductors, we illustrate PCA ‘in action’ as a template for other researchers and critically examine its adequacy. We conclude with implications for further path-oriented inquiries.
Resumo:
With a steady increase of regulatory requirements for business processes, automation support of compliance management is a field garnering increasing attention in Information Systems research. Several approaches have been developed to support compliance checking of process models. One major challenge for such approaches is their ability to handle different modeling techniques and compliance rules in order to enable widespread adoption and application. Applying a structured literature search strategy, we reflect and discuss compliance-checking approaches in order to provide an insight into their generalizability and evaluation. The results imply that current approaches mainly focus on special modeling techniques and/or a restricted set of types of compliance rules. Most approaches abstain from real-world evaluation which raises the question of their practical applicability. Referring to the search results, we propose a roadmap for further research in model-based business process compliance checking.
Resumo:
This article provides a legal and economic analysis of private copying levies in the EU, against the background of the Copyright Directive (2001/29), a number of recent rulings by the European Court of Justice and the recommendations presented by mediator Vitorino earlier this year. It concludes that notwithstanding these rulings and recommendations, there remains a lack of concordance on the relevance of contractual stipulations and digital rights management technologies (DRM) for setting levies, and the concept of harm. While Mr Vitorino and AG Sharpston (in the Opinion preceding VG Wort v. Kyocera) use different lines of reasoning to argue that levies raised on authorised copies would lead to double payment, the Court of Justice’s decision in VG Wort v. Kyocera seems to conclude that such copies should nonetheless be levied. If levies are to provide fair compensation for harm resulting from acts of private copying, economic analysis suggests one should distinguish between various kinds of private copies and take account of the extent to which the value said copies have for consumers can be priced into the purchase. Given the availability of DRM (including technical protection measures), the possibility of such indirect appropriation leads to the conclusion that the harm from most kinds of private copies is de minimis and gives no cause for levies. The user value of copies from unauthorised sources (e.g. from torrent networks or cyber lockers), on the other hand, cannot be appropriated indirectly by rightholders. It is, however, an open question in references for preliminary rulings pending at the Court of Justice whether these copies are included in the scope of the private copying exception or limitation and can thus be levied for. If they are not, as currently happens in several EU Member States, legal and economic analysis leads to the conclusion that the scope of private copying acts giving rise to harm susceptible of justifying levies is gradually diminishing.