917 resultados para ambiguous zeroes
Resumo:
This research study investigates the identities of a group of adolescent Turkish Cypriot (TC) students in their final year of secondary education in northern Cyprus, which it is argued, lies on the periphery of Europe. The main aim is to explore the linguistic construction of TC youth identities within school contexts but primarily the classroom in a political context in which the uniquely ambiguous status of Turkish Cypriots within the European Union (EU) continues, and where Turkish Cypriots are considered to be Europeans as individuals but not as a separate political entity. A secondary focus is upon the students’ investment in learning the English language. Identity is defined as a lifelong process of 'the social positioning of self and the other' (Bucholtz and Hall, 2005:586) which is endlessly re-created (Tabouret-Keller, 1997) and the distinction between the terms 'identity' and 'identities' is discussed. The study explores the social construction of TC students' identities using an ethnomethodological case study. By using Conversation Analysis of selected extracts from the data collected through observations of classroom interactions, focus group discussions and interviews, the thesis shows that TC students perceive and enact 'in-betweener identities' in terms of their ethnicity, societal values, age, religion, languages and Europeanness. Being on the periphery of the EU, it is argued that the Turkish Cypriots of northern Cyprus are the ‘peripheral members of the EU, remaining present yet absent. They are personally EU citizens but not as a society and cannot be represented within EU institutions. But will they ever acquire full membership, as any peripheral member would aspire to have or will they remain in between occident and orient? The possible answers to this question and the resulting ideological associations will shape how and to what extent these TC students perceive and enact their identities.
Resumo:
Social software is increasingly being used in higher and further education to support teaching and learning processes. These applications provide students with social and cognitive stimulation and also add to the interaction between students and educators. However, in addition to the benefits the introduction of social software into a course environment can also have adverse implications on students, educators and the education institution as a whole, a phenomenon which has received much less attention in the literature. In this study we explore the various implications of introducing social software into a course environment in order to identify the associated benefits, but also the potential drawbacks. We draw on data from 20 social software initiatives in UK based higher and further education institutions to identify the diverse experiences and concerns of students and educators. The findings are presented in form of a SWOT analysis, which allows us to better understand the otherwise ambiguous implications of social software in terms of its strengths, weaknesses, opportunities and threats. From the analysis we have derived concrete recommendations for the use of social software as a teaching and learning tool.
Resumo:
This thesis addressed the problem of risk analysis in mental healthcare, with respect to the GRiST project at Aston University. That project provides a risk-screening tool based on the knowledge of 46 experts, captured as mind maps that describe relationships between risks and patterns of behavioural cues. Mind mapping, though, fails to impose control over content, and is not considered to formally represent knowledge. In contrast, this thesis treated GRiSTs mind maps as a rich knowledge base in need of refinement; that process drew on existing techniques for designing databases and knowledge bases. Identifying well-defined mind map concepts, though, was hindered by spelling mistakes, and by ambiguity and lack of coverage in the tools used for researching words. A novel use of the Edit Distance overcame those problems, by assessing similarities between mind map texts, and between spelling mistakes and suggested corrections. That algorithm further identified stems, the shortest text string found in related word-forms. As opposed to existing approaches’ reliance on built-in linguistic knowledge, this thesis devised a novel, more flexible text-based technique. An additional tool, Correspondence Analysis, found patterns in word usage that allowed machines to determine likely intended meanings for ambiguous words. Correspondence Analysis further produced clusters of related concepts, which in turn drove the automatic generation of novel mind maps. Such maps underpinned adjuncts to the mind mapping software used by GRiST; one such new facility generated novel mind maps, to reflect the collected expert knowledge on any specified concept. Mind maps from GRiST are stored as XML, which suggested storing them in an XML database. In fact, the entire approach here is ”XML-centric”, in that all stages rely on XML as far as possible. A XML-based query language allows user to retrieve information from the mind map knowledge base. The approach, it was concluded, will prove valuable to mind mapping in general, and to detecting patterns in any type of digital information.
Resumo:
A tanulmány a marketing-erőforrások és a vállalatok versenyképessége közötti összefüggéseket elemzi és hasonlítja össze az öt évvel korábbi felmérés eredményeivel. A háromszáz hazai vállalatra kiterjedő kutatás során a szerzők azt állapították meg, hogy a vizsgált marketing-erőforrások mindegyike hatással van a vállalati teljesítményre. Ez annyiban jelent változást az öt évvel korábbi eredményekhez képest, hogy akkor a marketingképességek szerepe még nem volt egyértelmű. Az elemzés során kimutatták, hogy a vállalatok által birtokolt marketing-erőforrások hasonló struktúrát mutatnak, mint korábban. Ezek közül kiemelkedik a marketingfunkcióhoz leginkább köthető piacszervezési dimenzió, amely a legszorosabb összefüggést mutatja a versenyképességgel. A vizsgált vállalatok egy kis csoportjának (12%) sikerült a versenyképes termékkínálat és árak fenntartása mellett e képesség kifejlesztésében és birtoklásában előre lépniük. Körükben a sikeres vállalatok aránya kiemelkedő. / === / The study aimed to analyse the association between marketing resources and corporate competitiveness and it compared the results to the ones of a similar research conducted five years before. Based on the survey of 300 domestic organisations the authors found that all the marketing resources investigated have a significant effect on marketing performance. These results differ from the previous ones only in terms of marketing capabilities, as their role was ambiguous at that time. They revealed the same structure of marketing resources owned by the companies as last time. Among them the most marketing related resource-dimension called market management excels regarding the strength of the association with competitiveness. A small group of the companies investigated (12%) managed to advance in development and possession of this dimension of marketing resources whilst maintaining competitive product supply and price. The proportion of successful companies among them is highly significant
Resumo:
Corporate governance has become increasingly important in developed and developing countries just after a series of corporate scandals and failures in a number of countries. Corporate governance structure is often viewed as a means of corporate success despite prior studies reveal mixed, somewhere conflicting and ambiguous, and somewhere no relationship between governance structure and performance. This study empirically investigates the relationship between corporate governance mechanisms and financial performance of listed banking companies in Bangladesh by using two multiple regression models. The study reveals that a good number of companies do not comply with the regulatory requirements indicating remarkable shortfall in corporate governance practice. The companies are run by the professional managers having no duality and no ownership interest for which they are compensated by high remuneration to curb agency conflict. Apart from some inconsistent relationship between some corporate variables, the corporate governance mechanisms do not appear to have significant relationship with financial performances. The findings reveal an insignificant negative impact or somewhere no impact of independent directors and non-independent non-executive directors on the level of performance that strongly support the concept that the managers are essentially worthy of trust and earn returns for the owners as claimed by stewardship theory. The study provides support for the view that while much emphasis on corporate governance mechanisms is necessary to safeguard the interest of stakeholders; corporate governance on its own, as a set of codes or standards for corporate conformance, cannot make a company successful. Companies need to balance corporate governance mechanisms with performance by adopting strategic decision and risk management with the efficient utilization of the organization’s resources.
Resumo:
The article analyses patterns and country-specific determinants of the Baltic Countries agri-food trade with the European Union. Literature focusing on the country-specific determinants of vertical and horizontal intra-industry trade is rather limited and those analysing agricultural (or agri-food) trade are extremely rare. Therefore, the paper seeks to contribute to the literature by covering latest theory and data available on the topic to provide up to date results and suggestions. Moreover, it seeks to identify the determinants of horizontal and vertical intra-industry trade of the Baltic Countries after EU accession. Results suggest that agri-food trade of these countries is mainly inter-industry in nature but intra-industry trade is dominated by vertical elements. Results verify that determinants of horizontal and vertical IIT differ and suggest that economic size is positively, while factor endowments and distance are negatively related to both sides of IIT. However, the relationship between IIT and FDI is ambiguous.
Resumo:
Credible endorsers are often used in advertisements. However, there is conflicting evidence on the role source credibility plays in persuasion. Early research found that source credibility affects persuasion when subjects pay attention to the communication. Other research indicates that a credible source enhances persuasion when people do not scrutinize the message claims carefully and thoroughly. This effect is opposite to what was indicated by early research. More recent research indicates that source credibility may affect persuasion when people scrutinize the message claims, but limits this effect to advertisements with certain type of claims (i.e., ambiguous or extreme claims). This dissertation proposes that source credibility might play a broader role during persuasion than suggested by the empirical literature. Source credibility may affect persuasion, at low levels of involvement, by serving as a peripheral cue. It may also affect persuasion, at high involvement, by serving as an argument or biasing elaboration. ^ Each of these possibilities was explored in an experiment using a 3 (source credibility) x 2 (type of claim) x 2 (levels of involvement) full factorial design. The sample consisted of 180 undergraduate students from a major southeastern University. ^ Results indicated that, at high levels of involvement, the credibility of the source affected persuasion. This effect was due to source credibility acting as an argument within the advertisement. This study did not find that source credibility affected persuasion by biasing elaboration, at high involvement, or by serving as a peripheral cue, at low involvement. ^
Resumo:
With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily cause millions of dollar in damage to an organization. Detecting these attacks is an important issue of computer security. There are many types of attacks and they fall into four main categories, Denial of Service (DoS) attacks, Probe, User to Root (U2R) attacks, and Remote to Local (R2L) attacks. Within these categories, DoS and Probe attacks continuously show up with greater frequency in a short period of time when they attack systems. They are different from the normal traffic data and can be easily separated from normal activities. On the contrary, U2R and R2L attacks are embedded in the data portions of the packets and normally involve only a single connection. It becomes difficult to achieve satisfactory detection accuracy for detecting these two attacks. Therefore, we focus on studying the ambiguity problem between normal activities and U2R/R2L attacks. The goal is to build a detection system that can accurately and quickly detect these two attacks. In this dissertation, we design a two-phase intrusion detection approach. In the first phase, a correlation-based feature selection algorithm is proposed to advance the speed of detection. Features with poor prediction ability for the signatures of attacks and features inter-correlated with one or more other features are considered redundant. Such features are removed and only indispensable information about the original feature space remains. In the second phase, we develop an ensemble intrusion detection system to achieve accurate detection performance. The proposed method includes multiple feature selecting intrusion detectors and a data mining intrusion detector. The former ones consist of a set of detectors, and each of them uses a fuzzy clustering technique and belief theory to solve the ambiguity problem. The latter one applies data mining technique to automatically extract computer users’ normal behavior from training network traffic data. The final decision is a combination of the outputs of feature selecting and data mining detectors. The experimental results indicate that our ensemble approach not only significantly reduces the detection time but also effectively detect U2R and R2L attacks that contain degrees of ambiguous information.
Resumo:
Entrepreneurial opportunity recognition is an increasingly prevalent phenomenon. Of particular interest is the ability of promising technology based ventures to recognize and exploit opportunities. Recent research drawing on the Austrian economic theory emphasizes the importance of knowledge, particularly market knowledge, behind opportunity recognition. While insightful, this research has tended to overlook those interrelationships that exist between different types of knowledge (technology and market knowledge) as well as between a firm’s knowledge base and its entrepreneurial orientation. Additional shortfalls of prior research include the ambiguous definitions provided for entrepreneurial opportunities, oversight of opportunity exploitation with an extensive focus on opportunity recognition only, and the lack of quantitative, empirical evidence on entrepreneurial opportunity recognition. ^ In this dissertation, these research gaps are addressed by integrating Schumpeterian opportunity development view with a Kirznerian opportunity discovery theory as well as insights from literature on entrepreneurial orientation. A sample of 85 new biotechnology ventures from the United States, Finland, and Sweden was analyzed. While leaders in all 85 companies were interviewed for the research in 2003-2004, 42 firms provided data in 2007. Data was analyzed using regression analysis. ^ The results show the value and importance of early market knowledge and technology knowledge as well as an entrepreneurial company posture for subsequent opportunity recognition. The highest numbers of new opportunities are recognized in firms where high levels of market knowledge are combined with high levels of technology knowledge (measured with a number of patents). A firm’s entrepreneurial orientation also enhances its opportunity recognition. Furthermore, the results show that new ventures with more market knowledge are able to gather more equity investments, license out more technologies, and achieve higher sales than new ventures with lower levels of market knowledge. Overall, the findings of this dissertation help further our understanding of the sources of entrepreneurial opportunities, and should encourage further research in this area. ^
Resumo:
This dissertation explores the similarities and differences which characterize the depiction of people of color in certain representative nineteenth century Cuban and Brazilian slavery novels as a function of the authorial approach of each territory's literary tradition toward the issues of slavery, racial prejudice, and people of color. The selected texts, derived from the peak periods in slavery literature of each territory, include Francisco , by Anselmo Snárez y Romero; Sab, by Gertrudis Gómez de Avellaneda; Cecilia Valdés , by Cirilo Villaverde; A escrava Isaura, by Bernardo Guimarães; O mulato, by Aluísio Azevedo; and Bom-Crioulo, by Adolfo Caminha. While the present study explores the enslavement, abuse, and discrimination of people of color as a consequence of a deep-seated discourse of power, privilege and racial superiority, it focuses more extensively on the representation of people of color, particularly in their capacity to constructively appropriate the cultural values of the white dominant group and recognize their identity as ambiguous. ^ Said's theories of Orientalist discourse and geography and formation as well as Dube's perspective on subaltern-oriented studies provide a theoretical framework for exploring the response of slavery writers whose common exposure to slavery but dissimilar socio-political contexts generate some startling findings. Crafted within a period of political repression, fear of black revolt, factional in-fighting as well as strong socioeconomic ties to the slaveholding class, the Cuban texts generally fashioned an approach to slavery as one marked by moderation, reform, and cultural counter discourse and consequently depict people of color with a more passive but culturally authentic outlook. On the other hand, the Brazilian response to the issue of slavery, steeped in an ideological amalgam of liberalism, positivism, republicanism, and abolitionism, is characterized by overt opposition to slavery and a representation of people of color that is less concerned with cross-cultural input but reclaims their humanity as highly educable and socially mobile persons in search of greater freedoms. Ultimately, there is a shared message of higher significance couched in the worthwhile mission of raising slaves to the level of men. ^
Resumo:
The relationship between trade policy and productivity growth is regarded as ambiguous in the literature. This dissertation examines under what condition the relationship would be positive (or negative). Through the use of static and dynamic analysis, we find two conflicting effects (the pro-protection effect and the pro-competitive effect) that cause the relationship to be ambiguous. If there exists a productivity gap between the import-competing and foreign industries, and if the level of protection is low (high), the relationship is positive (negative). We also show that the import-competing firm responds to a change in the protection level by choosing a level of investment in innovation which yields a different rate of productivity growth. The policy implication, therefore, is that a trade-policy maker should set the trade protection at a level which induces the firm to choose the highest rate of productivity growth, and, as a result, leading the firm to close the initial productivity gap in the most efficient way. ^
Resumo:
This dissertation aims to recover the lives and careers of those Amerindians and Europeans who voluntarily or involuntarily took on the role of intercultural interpreters in the contact, conquest, and early colonial period in the Americas between 1492 and 1675. It intends to prove that these so-called “marginal” figures assumed roles that went far beyond those of linguistic and cultural translators, and often had a decisive impact on early Indian-colonial relations. ^ In the course of my research, I consulted hundreds of published sixteenth- and seventeenth-century chronicles, narratives, and memoirs in my search for references to interpreters. I augmented these accounts with information derived from unpublished archival documents, drawn primarily from the Archivo General de Indias, in Seville, Spain. ^ I organized my findings in theme-driven chapters that begin with a consideration of the historiography of that subject. Each chapter is further subdivided into chronologically-arranged historical vignettes that focus on the interpreters who mediated between the Spanish, Portuguese, French, English and Dutch and the various Native American polities and cultures. ^ I found that colonial authorities and Amerindian communities alike recognized the absolute necessity of recruiting competent and loyal interpreters and go-betweens, and that both sides tried to secure their loyal service by means both fair and foul. Although pressured, pushed, and pulled in contrary directions, most interpreters recognized the pivotal position they held in cross-cultural negotiations and rarely remained passive pawns in the contests between the forces of domination and defense. ^ All across the Americas, interpreters used their linguistic and diplomatic skills, and their intimate knowledge of the “other” not simply to facilitate conquest or spearhead the opposition, but to transform themselves from “culture brokers” into “power brokers.” Many of the decisive events that shaped colonial-Indian relations turned on the actions of these culturally-ambiguous individuals, a fact bemoaned and begrudgingly acknowledged by most of the contemporary conquistadors, chroniclers, and colonial founders, and recognized by this author. ^
Resumo:
Given the significant amount of attention placed upon race within our society, racial identity long has been nominated as a meaningful influence upon human development (Cross, 1971; Sellers et al., 1998). Scholars investigating aspects of racial identity have largely pursued one of two lines of research: (a) describing factors and processes that contribute to the development of racial identities, or (b) empirically documenting associations between particular racial identities and key adjustment outcomes. However, few studies have integrated these two approaches to simultaneously evaluate developmental and related adjustment aspects of racial identity among minority youth. Consequently, relations between early racial identity developmental processes and correlated adjustment outcomes remain ambiguous. Even less is known regarding the direction and function of these relationships during adolescence. To address this gap, the present study examined key multivariate associations between (a) distinct profiles of racial identity salience and (b) adjustment outcomes within a community sample of African-American youth. Specifically, a person-centered analytic approach (i.e., cluster analysis) was employed to conduct a secondary analysis of two archived databases containing longitudinal data measuring levels of racial identity salience and indices of psychosocial adjustment among youth at four different measurement occasions.^ Four separate groups of analyses were conducted to investigate (a) the existence of within-group differences in levels of racial identity salience, (b) shifts among distinct racial identity types between contiguous times of measurement, (c) adjustment correlates of racial identity types at each time of measurement, and (d) predictive relations between racial identity clusters and adjustment outcomes, respectively. Results indicated significant heterogeneity in patterns of racial identity salience among these African-American youth as well as significant discontinuity in the patterns of shifts among identity profiles between contiguous measurement occasions. In addition, within developmental stages, levels of racial identity salience were associated with several adjustment outcomes, suggesting the protective value of high levels of endorsement or internalization of racial identity among the sampled youth. Collectively, these results illustrated the significance of racial identity salience as a meaningful developmental construct in the lives of African-American adolescents, the implications of which are discussed for racial identity and practice-related research literatures. ^
Resumo:
Entrepreneurial opportunity recognition is an increasingly prevalent phenomenon. Of particular interest is the ability of promising technology based ventures to recognize and exploit opportunities. Recent research drawing on the Austrian economic theory emphasizes the importance of knowledge, particularly market knowledge, behind opportunity recognition. While insightful, this research has tended to overlook those interrelationships that exist between different types of knowledge (technology and market knowledge) as well as between a firm’s knowledge base and its entrepreneurial orientation. Additional shortfalls of prior research include the ambiguous definitions provided for entrepreneurial opportunities, oversight of opportunity exploitation with an extensive focus on opportunity recognition only, and the lack of quantitative, empirical evidence on entrepreneurial opportunity recognition. In this dissertation, these research gaps are addressed by integrating Schumpeterian opportunity development view with a Kirznerian opportunity discovery theory as well as insights from literature on entrepreneurial orientation. A sample of 85 new biotechnology ventures from the United States, Finland, and Sweden was analyzed. While leaders in all 85 companies were interviewed for the research in 2003-2004, 42 firms provided data in 2007. Data was analyzed using regression analysis. The results show the value and importance of early market knowledge and technology knowledge as well as an entrepreneurial company posture for subsequent opportunity recognition. The highest numbers of new opportunities are recognized in firms where high levels of market knowledge are combined with high levels of technology knowledge (measured with a number of patents). A firm’s entrepreneurial orientation also enhances its opportunity recognition. Furthermore, the results show that new ventures with more market knowledge are able to gather more equity investments, license out more technologies, and achieve higher sales than new ventures with lower levels of market knowledge. Overall, the findings of this dissertation help further our understanding of the sources of entrepreneurial opportunities, and should encourage further research in this area.
Resumo:
With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily cause millions of dollar in damage to an organization. Detecting these attacks is an important issue of computer security. There are many types of attacks and they fall into four main categories, Denial of Service (DoS) attacks, Probe, User to Root (U2R) attacks, and Remote to Local (R2L) attacks. Within these categories, DoS and Probe attacks continuously show up with greater frequency in a short period of time when they attack systems. They are different from the normal traffic data and can be easily separated from normal activities. On the contrary, U2R and R2L attacks are embedded in the data portions of the packets and normally involve only a single connection. It becomes difficult to achieve satisfactory detection accuracy for detecting these two attacks. Therefore, we focus on studying the ambiguity problem between normal activities and U2R/R2L attacks. The goal is to build a detection system that can accurately and quickly detect these two attacks. In this dissertation, we design a two-phase intrusion detection approach. In the first phase, a correlation-based feature selection algorithm is proposed to advance the speed of detection. Features with poor prediction ability for the signatures of attacks and features inter-correlated with one or more other features are considered redundant. Such features are removed and only indispensable information about the original feature space remains. In the second phase, we develop an ensemble intrusion detection system to achieve accurate detection performance. The proposed method includes multiple feature selecting intrusion detectors and a data mining intrusion detector. The former ones consist of a set of detectors, and each of them uses a fuzzy clustering technique and belief theory to solve the ambiguity problem. The latter one applies data mining technique to automatically extract computer users’ normal behavior from training network traffic data. The final decision is a combination of the outputs of feature selecting and data mining detectors. The experimental results indicate that our ensemble approach not only significantly reduces the detection time but also effectively detect U2R and R2L attacks that contain degrees of ambiguous information.