11 resultados para ambiguous zeroes

em Digital Commons at Florida International University


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Credible endorsers are often used in advertisements. However, there is conflicting evidence on the role source credibility plays in persuasion. Early research found that source credibility affects persuasion when subjects pay attention to the communication. Other research indicates that a credible source enhances persuasion when people do not scrutinize the message claims carefully and thoroughly. This effect is opposite to what was indicated by early research. More recent research indicates that source credibility may affect persuasion when people scrutinize the message claims, but limits this effect to advertisements with certain type of claims (i.e., ambiguous or extreme claims). This dissertation proposes that source credibility might play a broader role during persuasion than suggested by the empirical literature. Source credibility may affect persuasion, at low levels of involvement, by serving as a peripheral cue. It may also affect persuasion, at high involvement, by serving as an argument or biasing elaboration. ^ Each of these possibilities was explored in an experiment using a 3 (source credibility) x 2 (type of claim) x 2 (levels of involvement) full factorial design. The sample consisted of 180 undergraduate students from a major southeastern University. ^ Results indicated that, at high levels of involvement, the credibility of the source affected persuasion. This effect was due to source credibility acting as an argument within the advertisement. This study did not find that source credibility affected persuasion by biasing elaboration, at high involvement, or by serving as a peripheral cue, at low involvement. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily cause millions of dollar in damage to an organization. Detecting these attacks is an important issue of computer security. There are many types of attacks and they fall into four main categories, Denial of Service (DoS) attacks, Probe, User to Root (U2R) attacks, and Remote to Local (R2L) attacks. Within these categories, DoS and Probe attacks continuously show up with greater frequency in a short period of time when they attack systems. They are different from the normal traffic data and can be easily separated from normal activities. On the contrary, U2R and R2L attacks are embedded in the data portions of the packets and normally involve only a single connection. It becomes difficult to achieve satisfactory detection accuracy for detecting these two attacks. Therefore, we focus on studying the ambiguity problem between normal activities and U2R/R2L attacks. The goal is to build a detection system that can accurately and quickly detect these two attacks. In this dissertation, we design a two-phase intrusion detection approach. In the first phase, a correlation-based feature selection algorithm is proposed to advance the speed of detection. Features with poor prediction ability for the signatures of attacks and features inter-correlated with one or more other features are considered redundant. Such features are removed and only indispensable information about the original feature space remains. In the second phase, we develop an ensemble intrusion detection system to achieve accurate detection performance. The proposed method includes multiple feature selecting intrusion detectors and a data mining intrusion detector. The former ones consist of a set of detectors, and each of them uses a fuzzy clustering technique and belief theory to solve the ambiguity problem. The latter one applies data mining technique to automatically extract computer users’ normal behavior from training network traffic data. The final decision is a combination of the outputs of feature selecting and data mining detectors. The experimental results indicate that our ensemble approach not only significantly reduces the detection time but also effectively detect U2R and R2L attacks that contain degrees of ambiguous information.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Entrepreneurial opportunity recognition is an increasingly prevalent phenomenon. Of particular interest is the ability of promising technology based ventures to recognize and exploit opportunities. Recent research drawing on the Austrian economic theory emphasizes the importance of knowledge, particularly market knowledge, behind opportunity recognition. While insightful, this research has tended to overlook those interrelationships that exist between different types of knowledge (technology and market knowledge) as well as between a firm’s knowledge base and its entrepreneurial orientation. Additional shortfalls of prior research include the ambiguous definitions provided for entrepreneurial opportunities, oversight of opportunity exploitation with an extensive focus on opportunity recognition only, and the lack of quantitative, empirical evidence on entrepreneurial opportunity recognition. ^ In this dissertation, these research gaps are addressed by integrating Schumpeterian opportunity development view with a Kirznerian opportunity discovery theory as well as insights from literature on entrepreneurial orientation. A sample of 85 new biotechnology ventures from the United States, Finland, and Sweden was analyzed. While leaders in all 85 companies were interviewed for the research in 2003-2004, 42 firms provided data in 2007. Data was analyzed using regression analysis. ^ The results show the value and importance of early market knowledge and technology knowledge as well as an entrepreneurial company posture for subsequent opportunity recognition. The highest numbers of new opportunities are recognized in firms where high levels of market knowledge are combined with high levels of technology knowledge (measured with a number of patents). A firm’s entrepreneurial orientation also enhances its opportunity recognition. Furthermore, the results show that new ventures with more market knowledge are able to gather more equity investments, license out more technologies, and achieve higher sales than new ventures with lower levels of market knowledge. Overall, the findings of this dissertation help further our understanding of the sources of entrepreneurial opportunities, and should encourage further research in this area. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This dissertation explores the similarities and differences which characterize the depiction of people of color in certain representative nineteenth century Cuban and Brazilian slavery novels as a function of the authorial approach of each territory's literary tradition toward the issues of slavery, racial prejudice, and people of color. The selected texts, derived from the peak periods in slavery literature of each territory, include Francisco , by Anselmo Snárez y Romero; Sab, by Gertrudis Gómez de Avellaneda; Cecilia Valdés , by Cirilo Villaverde; A escrava Isaura, by Bernardo Guimarães; O mulato, by Aluísio Azevedo; and Bom-Crioulo, by Adolfo Caminha. While the present study explores the enslavement, abuse, and discrimination of people of color as a consequence of a deep-seated discourse of power, privilege and racial superiority, it focuses more extensively on the representation of people of color, particularly in their capacity to constructively appropriate the cultural values of the white dominant group and recognize their identity as ambiguous. ^ Said's theories of Orientalist discourse and geography and formation as well as Dube's perspective on subaltern-oriented studies provide a theoretical framework for exploring the response of slavery writers whose common exposure to slavery but dissimilar socio-political contexts generate some startling findings. Crafted within a period of political repression, fear of black revolt, factional in-fighting as well as strong socioeconomic ties to the slaveholding class, the Cuban texts generally fashioned an approach to slavery as one marked by moderation, reform, and cultural counter discourse and consequently depict people of color with a more passive but culturally authentic outlook. On the other hand, the Brazilian response to the issue of slavery, steeped in an ideological amalgam of liberalism, positivism, republicanism, and abolitionism, is characterized by overt opposition to slavery and a representation of people of color that is less concerned with cross-cultural input but reclaims their humanity as highly educable and socially mobile persons in search of greater freedoms. Ultimately, there is a shared message of higher significance couched in the worthwhile mission of raising slaves to the level of men. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The relationship between trade policy and productivity growth is regarded as ambiguous in the literature. This dissertation examines under what condition the relationship would be positive (or negative). Through the use of static and dynamic analysis, we find two conflicting effects (the pro-protection effect and the pro-competitive effect) that cause the relationship to be ambiguous. If there exists a productivity gap between the import-competing and foreign industries, and if the level of protection is low (high), the relationship is positive (negative). We also show that the import-competing firm responds to a change in the protection level by choosing a level of investment in innovation which yields a different rate of productivity growth. The policy implication, therefore, is that a trade-policy maker should set the trade protection at a level which induces the firm to choose the highest rate of productivity growth, and, as a result, leading the firm to close the initial productivity gap in the most efficient way. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This dissertation aims to recover the lives and careers of those Amerindians and Europeans who voluntarily or involuntarily took on the role of intercultural interpreters in the contact, conquest, and early colonial period in the Americas between 1492 and 1675. It intends to prove that these so-called “marginal” figures assumed roles that went far beyond those of linguistic and cultural translators, and often had a decisive impact on early Indian-colonial relations. ^ In the course of my research, I consulted hundreds of published sixteenth- and seventeenth-century chronicles, narratives, and memoirs in my search for references to interpreters. I augmented these accounts with information derived from unpublished archival documents, drawn primarily from the Archivo General de Indias, in Seville, Spain. ^ I organized my findings in theme-driven chapters that begin with a consideration of the historiography of that subject. Each chapter is further subdivided into chronologically-arranged historical vignettes that focus on the interpreters who mediated between the Spanish, Portuguese, French, English and Dutch and the various Native American polities and cultures. ^ I found that colonial authorities and Amerindian communities alike recognized the absolute necessity of recruiting competent and loyal interpreters and go-betweens, and that both sides tried to secure their loyal service by means both fair and foul. Although pressured, pushed, and pulled in contrary directions, most interpreters recognized the pivotal position they held in cross-cultural negotiations and rarely remained passive pawns in the contests between the forces of domination and defense. ^ All across the Americas, interpreters used their linguistic and diplomatic skills, and their intimate knowledge of the “other” not simply to facilitate conquest or spearhead the opposition, but to transform themselves from “culture brokers” into “power brokers.” Many of the decisive events that shaped colonial-Indian relations turned on the actions of these culturally-ambiguous individuals, a fact bemoaned and begrudgingly acknowledged by most of the contemporary conquistadors, chroniclers, and colonial founders, and recognized by this author. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Given the significant amount of attention placed upon race within our society, racial identity long has been nominated as a meaningful influence upon human development (Cross, 1971; Sellers et al., 1998). Scholars investigating aspects of racial identity have largely pursued one of two lines of research: (a) describing factors and processes that contribute to the development of racial identities, or (b) empirically documenting associations between particular racial identities and key adjustment outcomes. However, few studies have integrated these two approaches to simultaneously evaluate developmental and related adjustment aspects of racial identity among minority youth. Consequently, relations between early racial identity developmental processes and correlated adjustment outcomes remain ambiguous. Even less is known regarding the direction and function of these relationships during adolescence. To address this gap, the present study examined key multivariate associations between (a) distinct profiles of racial identity salience and (b) adjustment outcomes within a community sample of African-American youth. Specifically, a person-centered analytic approach (i.e., cluster analysis) was employed to conduct a secondary analysis of two archived databases containing longitudinal data measuring levels of racial identity salience and indices of psychosocial adjustment among youth at four different measurement occasions.^ Four separate groups of analyses were conducted to investigate (a) the existence of within-group differences in levels of racial identity salience, (b) shifts among distinct racial identity types between contiguous times of measurement, (c) adjustment correlates of racial identity types at each time of measurement, and (d) predictive relations between racial identity clusters and adjustment outcomes, respectively. Results indicated significant heterogeneity in patterns of racial identity salience among these African-American youth as well as significant discontinuity in the patterns of shifts among identity profiles between contiguous measurement occasions. In addition, within developmental stages, levels of racial identity salience were associated with several adjustment outcomes, suggesting the protective value of high levels of endorsement or internalization of racial identity among the sampled youth. Collectively, these results illustrated the significance of racial identity salience as a meaningful developmental construct in the lives of African-American adolescents, the implications of which are discussed for racial identity and practice-related research literatures. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Entrepreneurial opportunity recognition is an increasingly prevalent phenomenon. Of particular interest is the ability of promising technology based ventures to recognize and exploit opportunities. Recent research drawing on the Austrian economic theory emphasizes the importance of knowledge, particularly market knowledge, behind opportunity recognition. While insightful, this research has tended to overlook those interrelationships that exist between different types of knowledge (technology and market knowledge) as well as between a firm’s knowledge base and its entrepreneurial orientation. Additional shortfalls of prior research include the ambiguous definitions provided for entrepreneurial opportunities, oversight of opportunity exploitation with an extensive focus on opportunity recognition only, and the lack of quantitative, empirical evidence on entrepreneurial opportunity recognition. In this dissertation, these research gaps are addressed by integrating Schumpeterian opportunity development view with a Kirznerian opportunity discovery theory as well as insights from literature on entrepreneurial orientation. A sample of 85 new biotechnology ventures from the United States, Finland, and Sweden was analyzed. While leaders in all 85 companies were interviewed for the research in 2003-2004, 42 firms provided data in 2007. Data was analyzed using regression analysis. The results show the value and importance of early market knowledge and technology knowledge as well as an entrepreneurial company posture for subsequent opportunity recognition. The highest numbers of new opportunities are recognized in firms where high levels of market knowledge are combined with high levels of technology knowledge (measured with a number of patents). A firm’s entrepreneurial orientation also enhances its opportunity recognition. Furthermore, the results show that new ventures with more market knowledge are able to gather more equity investments, license out more technologies, and achieve higher sales than new ventures with lower levels of market knowledge. Overall, the findings of this dissertation help further our understanding of the sources of entrepreneurial opportunities, and should encourage further research in this area.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily cause millions of dollar in damage to an organization. Detecting these attacks is an important issue of computer security. There are many types of attacks and they fall into four main categories, Denial of Service (DoS) attacks, Probe, User to Root (U2R) attacks, and Remote to Local (R2L) attacks. Within these categories, DoS and Probe attacks continuously show up with greater frequency in a short period of time when they attack systems. They are different from the normal traffic data and can be easily separated from normal activities. On the contrary, U2R and R2L attacks are embedded in the data portions of the packets and normally involve only a single connection. It becomes difficult to achieve satisfactory detection accuracy for detecting these two attacks. Therefore, we focus on studying the ambiguity problem between normal activities and U2R/R2L attacks. The goal is to build a detection system that can accurately and quickly detect these two attacks. In this dissertation, we design a two-phase intrusion detection approach. In the first phase, a correlation-based feature selection algorithm is proposed to advance the speed of detection. Features with poor prediction ability for the signatures of attacks and features inter-correlated with one or more other features are considered redundant. Such features are removed and only indispensable information about the original feature space remains. In the second phase, we develop an ensemble intrusion detection system to achieve accurate detection performance. The proposed method includes multiple feature selecting intrusion detectors and a data mining intrusion detector. The former ones consist of a set of detectors, and each of them uses a fuzzy clustering technique and belief theory to solve the ambiguity problem. The latter one applies data mining technique to automatically extract computer users’ normal behavior from training network traffic data. The final decision is a combination of the outputs of feature selecting and data mining detectors. The experimental results indicate that our ensemble approach not only significantly reduces the detection time but also effectively detect U2R and R2L attacks that contain degrees of ambiguous information.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Republic of Haiti struggles to sustainably manage its water resources. Public health is compromised by low levels of water supply, sanitation, and hygiene, and water resources are often contaminated and unsustainably allocated. While poor governance is often blamed for these shortcomings, the laws and institutions regulating water resources in Haiti are poorly understood, especially by the international community. This study brings together and analyzes Haitian water laws, assesses institutional capacities, and provides a case study of water management in northern Haiti in order to provide a more complete picture of the sector. Funded by the Inter-American Development Bank as part of the Water Availability, Quality and Integrated Water Resources Management in Northern Haiti (HA-T1179) Project, this study took place from January-July 2015, with the help of local experts and participating stakeholders. The results indicate that Haiti’s water law framework is highly fragmented, with overlapping mandates and little coordination between ministries at the national level, and ambiguous but unrealistic roles for subnational governments. A capacity assessment of institutions in northern Haiti illustrates that while local stakeholders are engaged, human and financial resources are insufficient to carry out statutory responsibilities. The findings suggest that water resources management planning should engage local governments and community fixtures while supplementing capacities with national or international support.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It has been found in research that children and adults with anxiety have a bias toward interpreting ambiguous situations as threatening. This bias is thought to consequently maintain many symptoms of anxiety. An emergent computer treatment system called Attention Bias Modification Training (ABMT) has been used to try to reduce this bias. It is essential to understand whether this bias can be reduced with ABMT because of its feasibility and cost effective nature of treatment. In the current study, interpretation bias is measured using the Children's Opinions of Everyday Life Events (COELE). The ABMT treatment is given to children once a week for an hour and their answers to the COELE are recorded before and after treatment. The recorded procedures are transcribed by undergraduate students working at the Child Anxiety and Phobia lab, and then scored. Each of the situations of the COELE are rated 0 being neutral or 1 threatening interpretation of the situation. The hypothesis is that ABMT will reduce the negative interpretation bias in children over the course of 4 weeks of treatment. The study is still in the collection and transcription of data phase, and will expect to have analytical conclusions in the start of spring 2015.