887 resultados para Problem Behavior Theory
Resumo:
The Analytic Hierarchy Process (AHP) is one of the most popular methods used in Multi-Attribute Decision Making. The Eigenvector Method (EM) and some distance minimizing methods such as the Least Squares Method (LSM) are of the possible tools for computing the priorities of the alternatives. A method for generating all the solutions of the LSM problem for 3 × 3 and 4 × 4 matrices is discussed in the paper. Our algorithms are based on the theory of resultants.
Resumo:
The present article assesses agency theory related problems contributing to the fall of shopping centers. The negative effects of the financial and economic downturn started in 2008 were accentuated in emerging markets like Romania. Several shopping centers were closed or sold through bankruptcy proceedings or forced execution. These failed shopping centers, 10 in number, were selected in order to assess agency theory problems contributing to the failure of shopping centers; as research method qualitative multiple cases-studies is used. Results suggest, that in all of the cases the risk adverse behavior of the External Investor- Principal, lead to risk sharing problems and subsequently to the fall of the shopping centers. In some of the cases Moral Hazard (lack of Developer-Agent’s know-how and experience) as well as Adverse Selection problems could be identified. The novelty of the topic for the shopping center industry and the empirical evidences confer a significant academic and practical value to the present article.
Resumo:
A nemzetközi, elsősorban európai szervezettudományban mára meghatározóvá vált a kritikai megközelítés, a hazai szakirodalomban mégis elvétve találni rá utalásokat. A szerzők írásukban tárgyalják, hogy a kritikai menedzsmentelméletek (KME) szemszögéből miként bírálható a mindenkori szervezeti gyakorlat, és miért bírálandók a főáramú menedzsmentelméletek. A tanulmány fő részében elméleti megkülönböztetéseket tesznek: egyrészt elhatárolják a kritikai megközelítést a főáramú szervezetelméletektől, másrészt több szempontból is különbséget tesznek a különféle – de egyaránt a KME alá tartozó – kritikai megközelítések között. De a kritikai szemlélethez hűen nem csak a puszta elméletismertetés volt a céljuk: e bevezetés és problémafelvető tanulmány – s a későbbiekben tervezett cikksorozat – szándékuk szerint vitaindítóként is szolgál. Abban bíznak, hogy a felvetett kérdésekről valódi, lényegi párbeszédet generálhatnak a hazai menedzsmenttudományban (kutatók, oktatók és elméletalkalmazók körében), mely kihathat a szervezeti gyakorlatra is. _____ Critical Management Studies (CMS) as a field of organization studies (OS) has become central internationally, and especially in Europe. Yet, its appearance is still very rare in the Hungarian OS literature. In this study first the authors discuss how the nowadays dominant organizational practices along with the mainstream management and organization theories are to be criticized from a Critical Management perspective. In the main section, so as to define CMS, they make important theoretical distinctions, first between CMS and mainstream organization theories (in general), and then among the different critical approaches that nevertheless all fall under the broad CMS umbrella. But, in line with a truly critical attitude, they not only go into theoretical discussions but, at least to their intention, the purpose of this introductory paper is also to addresses important problems both in the theory and the practice of organization and management. Therefore, it could serve as an opening of an important debate or dialogue in the Hungarian academic community (researchers, educators and other professionals), a theoretical discussion that could have real influence on organizational practice too.
Resumo:
This dissertation examines one category of international capital flows, private portfolio investments (private refers to the source of capital). There is an overall lack of a coherent and consistent definition of foreign portfolio investment. We clarify these definitional issues.^ Two main questions that pertain to private foreign portfolio investments (FPI) are explored. The first problem is the phenomenon of home preference, often referred to as home bias. Related to this are the observed cross-investment flows between countries that seem to contradict the textbook rendition of private FPI. A description of the theories purporting to resolve the home preference puzzle (and the cross-investment one) are summarized and evaluated. Most of this literature considers investors from major developed countries. I consider--as well--whether investors in less developed countries have home preference.^ The dissertation shows that home preference is indeed pervasive and profound across countries, in both developed and emerging markets. For the U.S., I examine home bias in both equity and bond holdings as well. I find that home bias is greater when we look at equity and bond holdings than equity holdings solely.^ In this dissertation a model is developed to explain home bias. This model is original and fills a gap in the literature as there have been no satisfactory models that handle at the same time both home preference and cross-border holdings in the context of information asymmetries. This model reflects what we see in the data and permits us to reach certain results by the use of comparative statics methods. The model suggests, counter-intuitively, that as the rate of return in a country relative to the world rate of return increases, home preference decreases. In the context of our relatively simple model we ascribe this result to the higher variance of the now higher return for home assets. We also find, this time as intended, that as risk aversion increases, investors diversify further so that home preference decreases.^ The second question that the dissertation deals with is the volatility of private foreign portfolio investment. Countries that are recipients of these flows have been wary of such flows because of their perceived volatility. Often the contrast is made with the perceived absence of volatility in foreign direct investment flows. I analyze the validity of these concerns using first net flow data and then gross flow data. The results show that FPI is not, in relative terms, more volatile than other flows in our sample of eight countries (half were developed countries and the rest were emerging markets).^ The implication therefore is that restricting FPI flows may be harmful in the sense that private capital may not be allocated efficiently worldwide to the detriment of capital poor economies. More to the point, any such restrictions would in fact be misguided. ^
Resumo:
The long term goal of the work described is to contribute to the emerging literature of prevention science in general, and to school-based psychoeducational interventions in particular. The psychoeducational intervention reported in this study used a main effects prevention intervention model. The current study focused on promoting optimal cognitive and affective functioning. The goal of this intervention was to increase potential protective factors such as critical cognitive and communicative competencies (e.g., critical problem solving and decision making) and affective competencies (e.g., personal control and responsibility) in middle adolescents who have been identified by the school system as being at-risk for problem behaviors. The current psychoeducational intervention draws on an ongoing program of theory and research (Berman, Berman, Cass Lorente, Ferrer Wreder, Arrufat, & Kurtines 1996; Ferrer Wreder, 1996; Kurtines, Berman, Ittel, & Williamson, 1995) and extends it to include Freire's (1970) concept of transformative pedagogy in developing school-based psychoeducational programs that target troubled adolescents. The results of the quantitative and qualitative analyses indicated trends that were generally encouraging with respect to the effects of the intervention on increasing critical cognitive and affective competencies. ^
Resumo:
With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily cause millions of dollar in damage to an organization. Detecting these attacks is an important issue of computer security. There are many types of attacks and they fall into four main categories, Denial of Service (DoS) attacks, Probe, User to Root (U2R) attacks, and Remote to Local (R2L) attacks. Within these categories, DoS and Probe attacks continuously show up with greater frequency in a short period of time when they attack systems. They are different from the normal traffic data and can be easily separated from normal activities. On the contrary, U2R and R2L attacks are embedded in the data portions of the packets and normally involve only a single connection. It becomes difficult to achieve satisfactory detection accuracy for detecting these two attacks. Therefore, we focus on studying the ambiguity problem between normal activities and U2R/R2L attacks. The goal is to build a detection system that can accurately and quickly detect these two attacks. In this dissertation, we design a two-phase intrusion detection approach. In the first phase, a correlation-based feature selection algorithm is proposed to advance the speed of detection. Features with poor prediction ability for the signatures of attacks and features inter-correlated with one or more other features are considered redundant. Such features are removed and only indispensable information about the original feature space remains. In the second phase, we develop an ensemble intrusion detection system to achieve accurate detection performance. The proposed method includes multiple feature selecting intrusion detectors and a data mining intrusion detector. The former ones consist of a set of detectors, and each of them uses a fuzzy clustering technique and belief theory to solve the ambiguity problem. The latter one applies data mining technique to automatically extract computer users’ normal behavior from training network traffic data. The final decision is a combination of the outputs of feature selecting and data mining detectors. The experimental results indicate that our ensemble approach not only significantly reduces the detection time but also effectively detect U2R and R2L attacks that contain degrees of ambiguous information.
Resumo:
Numerical optimization is a technique where a computer is used to explore design parameter combinations to find extremes in performance factors. In multi-objective optimization several performance factors can be optimized simultaneously. The solution to multi-objective optimization problems is not a single design, but a family of optimized designs referred to as the Pareto frontier. The Pareto frontier is a trade-off curve in the objective function space composed of solutions where performance in one objective function is traded for performance in others. A Multi-Objective Hybridized Optimizer (MOHO) was created for the purpose of solving multi-objective optimization problems by utilizing a set of constituent optimization algorithms. MOHO tracks the progress of the Pareto frontier approximation development and automatically switches amongst those constituent evolutionary optimization algorithms to speed the formation of an accurate Pareto frontier approximation. Aerodynamic shape optimization is one of the oldest applications of numerical optimization. MOHO was used to perform shape optimization on a 0.5-inch ballistic penetrator traveling at Mach number 2.5. Two objectives were simultaneously optimized: minimize aerodynamic drag and maximize penetrator volume. This problem was solved twice. The first time the problem was solved by using Modified Newton Impact Theory (MNIT) to determine the pressure drag on the penetrator. In the second solution, a Parabolized Navier-Stokes (PNS) solver that includes viscosity was used to evaluate the drag on the penetrator. The studies show the difference in the optimized penetrator shapes when viscosity is absent and present in the optimization. In modern optimization problems, objective function evaluations may require many hours on a computer cluster to perform these types of analysis. One solution is to create a response surface that models the behavior of the objective function. Once enough data about the behavior of the objective function has been collected, a response surface can be used to represent the actual objective function in the optimization process. The Hybrid Self-Organizing Response Surface Method (HYBSORSM) algorithm was developed and used to make response surfaces of objective functions. HYBSORSM was evaluated using a suite of 295 non-linear functions. These functions involve from 2 to 100 variables demonstrating robustness and accuracy of HYBSORSM.
Resumo:
Multi-problem youth undergoing treatment for substance use problems are at high behavioral risk for exposure to sexually transmitted infections (STIs), including human immunodeficiency virus (HIV). Specific risk factors include childhood adversities such as maltreatment experiences and subsequent forms of psychopathology. The current study used a person-centered analytical approach to examine how childhood maltreatment experiences were related to patterns of psychiatric symptoms and HIV/STI risk behaviors in a sample of adolescents (N = 408) receiving treatment services. Data were collected in face-to-face interviews at two community-based facilities. Descriptive statistics and Latent Profile Analysis (LPA) were used to (a) classify adolescents into groups based on past year psychiatric symptoms, and (b) examine relations between class membership and forms of childhood maltreatment experiences, as well as past year sexual risk behavior (SRB). ^ LPA results indicated significant heterogeneity in psychiatric symptoms among the participants. The three classes generated via the optimal LPA solution included: (a) a low psychiatric symptoms class, (b) a high alcohol symptoms class and (c) a high internalizing symptoms class. Class membership was associated significantly with adolescents’ self-reported scores for childhood sexual abuse and emotional neglect. ANOVAs documented significant differences in mean scores for multiple indices of SRB indices by class membership, demonstrating differential risk for HIV/STI exposure across classes. The two classes characterized by elevated psychiatric symptom profiles and more severe maltreatment histories were at increased behavioral risk for HIV/STI exposure, compared to the low psychiatric symptoms class. The high internalizing symptoms class reported the highest scores for most of the indices of SRB assessed. The heterogeneity of psychiatric symptom patterns documented in the current study has important implications for HIV/STI prevention programs implemented with multi-problem youth. The results highlight complex relations between childhood maltreatment experiences, psychopathology and multiple forms of health risk behavior among adolescents. The results underscore the importance of further integration between substance abuse treatment and HIV/STI risk reduction efforts to improve morbidity and mortality among vulnerable youth. ^
Resumo:
Research has identified a number of putative risk factors that places adolescents at incrementally higher risk for involvement in alcohol and other drug (AOD) use and sexual risk behaviors (SRBs). Such factors include personality characteristics such as sensation-seeking, cognitive factors such as positive expectancies and inhibition conflict as well as peer norm processes. The current study was guided by a conceptual perspective that support the notion that an integrative framework that includes multi-level factors has significant explanatory value for understanding processes associated with the co-occurrence of AOD use and sexual risk behavior outcomes. This study evaluated simultaneously the mediating role of AOD-sex related expectancies and inhibition conflict on antecedents of AOD use and SRBs including sexual sensation-seeking and peer norms for condom use.^ The sample was drawn from the Enhancing My Personal Options While Evaluating Risk (EMPOWER: Jonathan Tubman, PI), data set (N = 396; aged 12-18 years). Measures used in the study included Sexual Sensation-Seeking Scale, Inhibition Conflict for Condom Use, Risky Sex Scale. All relevant measures had well-documented psychometric properties. A global assessment of alcohol, drug use and sexual risk behaviors was used.^ Results demonstrated that AOD-sex related expectancies mediated the influence of sexual sensation-seeking on the co-occurrence of alcohol and other drug use and sexual risk behaviors. The evaluation of the integrative model also revealed that sexual sensation-seeking was positively associated with peer norms for condom use. Also, peer norms predicted inhibition conflict among this sample of multi-problem youth. ^ This dissertation research identified mechanisms of risk and protection associated with the co-occurrence of AOD use and SRBs among a multi-problem sample of adolescents receiving treatment for alcohol or drug use and related problems. This study is informative for adolescent-serving programs that address those individual and contextual characteristics that enhance treatment efficacy and effectiveness among adolescents receiving substance use and related problems services.^
Sales tax enforcement: An empirical analysis of compliance enforcement methodologies and pathologies
Resumo:
Most research on tax evasion has focused on the income tax. Sales tax evasion has been largely ignored and dismissed as immaterial. This paper explored the differences between income tax and sales tax evasion and demonstrated that sales tax enforcement is deserving of and requires the use of different tools to achieve compliance. Specifically, the major enforcement problem with sales tax is not evasion: it is theft perpetrated by companies that act as collection agents for the state. Companies engage in a principal-agent relationship with the state and many retain funds collected as an agent of the state for private use. As such, the act of sales tax theft bears more resemblance to embezzlement than to income tax evasion. It has long been assumed that the sales tax is nearly evasion free, and state revenue departments report voluntary compliance in a manner that perpetuates this myth. Current sales tax compliance enforcement methodologies are similar in form to income tax compliance enforcement methodologies and are based largely on trust. The primary focus is on delinquent filers with a very small percentage of businesses subject to audit. As a result, there is a very large group of noncompliant businesses who file on time and fly below the radar while stealing millions of taxpayer dollars. ^ The author utilized a variety of statistical methods with actual field data derived from operations of the Southern Region Criminal Investigations Unit of the Florida Department of Revenue to evaluate current and proposed sales tax compliance enforcement methodologies in a quasi-experimental, time series research design and to set forth a typology of sales tax evaders. This study showed that current estimates of voluntary compliance in sales tax systems are seriously and significantly overstated and that current enforcement methodologies are inadequate to identify the majority of violators and enforce compliance. Sales tax evasion is modeled using the theory of planned behavior and Cressey’s fraud triangle and it is demonstrated that proactive enforcement activities, characterized by substantial contact with non-delinquent taxpayers, results in superior ability to identify noncompliance and provides a structure through which noncompliant businesses can be rehabilitated.^
Resumo:
The field of chemical kinetics is an exciting and active field. The prevailing theories make a number of simplifying assumptions that do not always hold in actual cases. Another current problem concerns a development of efficient numerical algorithms for solving the master equations that arise in the description of complex reactions. The objective of the present work is to furnish a completely general and exact theory of reaction rates, in a form reminiscent of transition state theory, valid for all fluid phases and also to develop a computer program that can solve complex reactions by finding the concentrations of all participating substances as a function of time. To do so, the full quantum scattering theory is used for deriving the exact rate law, and then the resulting cumulative reaction probability is put into several equivalent forms that take into account all relativistic effects if applicable, including one that is strongly reminiscent of transition state theory, but includes corrections from scattering theory. Then two programs, one for solving complex reactions, the other for solving first order linear kinetic master equations to solve them, have been developed and tested for simple applications.
Resumo:
Heterosexual adult men have been a neglected population that is at risk for HIV infection. In an era burdened by the devastation caused by HIV, it is alarming that risky sexual behavior continues to be a problem among heterosexuals. Heterosexual sexual behavior has contributed to a growing trend of HIV transmission in the Caribbean where the average prevalence in the adult population is 5%. Despite the availability of condoms and HIV prevention efforts of many Caribbean public health departments to reduce the spread of the disease, there appears to be barriers to safer sex practices. Guided by the theory of planned behavior, a descriptive correlational design was used with 185 Bahamian men ages 18 years and older to (a) examine the relationships among select demographics, masculine ideology, condom attitudes, self-efficacy for condom use, and safer sex behaviors; and (b) identify select predictors of condom use among Bahamian men. Data were collected using four standardized instruments and a demographic questionnaire. The results of this study suggest that masculine ideology, condom attitudes, and condom use self-efficacy are important in explaining 33% variance in safer sex behaviors among Bahamian men. Income (β = −.15, p < .01), masculine ideology (β = −.24, p < .01), condom attitudes, (β = .36, p < .01), and condom use self-efficacy (β = .1, p < .01) were significantly associated with safer sex behaviors. The empirical knowledge obtained from this study will be used to provide a rationale for nurses and policy makers to design and conduct culturally sensitive interventions with an aim of achieving an increase in safer sex behaviors among Bahamian men.^
Resumo:
The authors’ review of literature about Bandura’s (1977) social learning theory and self-efficacy leads to implications on how this theory can positively affect prison work release programs and inmate post-release outcomes. Additionally, several causes of deviant behavior have been explained by social learning theory concepts.
Predictors of adolescent sexual intentions and behavior: Attitudes, parenting, and neighborhood risk
Resumo:
The current study was a cross-sectional examination of data collected during an HIV risk reduction intervention in south Florida. The purpose of the study was to explore the relationships between neighborhood stress, parenting, attitudes, and adolescent sexual intentions and behavior. The Theory of Planned Behavior was used as a model to guide variable selection and propose an interaction pathway between predictors and outcomes. Potential predictor variables measured for adolescents ages 13–18 (n=196) included communication about sex, parent-family connectedness, parental presence, parent-adolescent activity participation, attitudes about sex and condom use, neighborhood disorder, and exposure to violence. Outcomes were behavioral intentions and sexual behavior for the previous eight months. Neighborhood data was supplemented with ZIP Code level data from regional sources and included median household income, percentage of minority and Hispanic residents, and number of foreclosures. Statistical tests included t-tests, Pearson's correlations, and hierarchical linear regressions. Results showed that males and older adolescents reported less positive behavioral intentions than females and adolescents younger than 16. Intentions were associated with condom attitudes, sexual attitudes, and parental presence; unprotected sexual behavior was associated with parental presence. The best fit model for intentions included gender, sexual attitudes, condom attitudes, parental presence, and neighborhood disorder. The unsafe sexual behavior model included whether the participant lived with both natural parents in the previous year, and the percent of Hispanic residents in the neighborhood. Study findings indicate that more research on adolescent sexual behavior is warranted, specifically examining the differentials between variables that affect intentions and those that affect behavior. A focus on gender and age differences during intervention development may allow for better targeting and more efficacious interventions. Adding peer and media influences to the framework of attitudes, parenting, and neighborhood may offer more insight into patterns of adolescent sexual behavior risk.
Resumo:
No hospitality organizations are immune from the negative effects of substance abuse in the workplace. Ownters and managers must confront the problem head on and, in order to accomplish this, they must be in possession of the facts regarding the problem, and regarding options for dealing with the problem in the most appropriate manner for their individual organizations. The authors include an assessment of this problem as well as a summary review of procedures for positive management of a potentially negative situation.