首页 > 最新文献

Proceedings of the 38th Annual Hawaii International Conference on System Sciences最新文献

英文 中文
Merchant Transmission Expansion Based on Financial Transmission Rights 基于金融传输权的商业传输扩张
T. Kristiansen
Long-term financial transmission rights (FTRs) could be used to create incentives for transmission investments. However, these new investments may cause negative externalities on pre-existing FTRs. Therefore the system operator needs a protocol for awarding incremental FTRs for new transmission capacity that maximize investors' preferences while simultaneously taking into account that the pre-existing network capacity may not be fully allocated by pre-existing FTRs. To preserve revenue adequacy, a minimum amount of currently unassigned FTRs (or proxy FTRs) that satisfies the power flow constraints in the pre-existing network is calculated by the system operator. The challenge is to define the proxy awards. Hogan proposes to define proxy awards as the best use of the current network along the same direction as the incremental FTR awards. This includes allowing positive or negative incremental FTR awards. In this paper we develop a bi-level programming model including a methodology for realizing Hogan's proposal for allocation of long-term FTRs and apply it to a three-node network. Our results show that the simultaneous feasibility of the transmission investment depends on factors such as investor and preset proxy preferences, pre-existing FTRs, and transmission capacity in the expanded and pre-existing network.
长期金融输电权(ftr)可用于激励输电投资。然而,这些新的投资可能会对原有的对外汇率造成负面的外部性影响。因此,系统运营商需要一个协议来为新的传输容量授予增量ftr,以最大限度地提高投资者的偏好,同时考虑到现有的网络容量可能不会被现有的ftr完全分配。为了保证收益的充足性,系统运营商需要计算满足现有网络中潮流约束的当前未分配ftr(或代理ftr)的最小数量。挑战在于如何界定代理权。Hogan建议将代理奖励定义为与增量FTR奖励相同方向上对当前网络的最佳利用。这包括允许正增量或负增量FTR奖励。在本文中,我们开发了一个双层规划模型,包括实现Hogan的长期ftr分配建议的方法,并将其应用于三节点网络。研究结果表明,输电投资的同时可行性取决于投资者和预先设定的代理偏好、预先存在的ftr、扩展后和预先存在的网络中的输电容量等因素。
{"title":"Merchant Transmission Expansion Based on Financial Transmission Rights","authors":"T. Kristiansen","doi":"10.1109/HICSS.2005.408","DOIUrl":"https://doi.org/10.1109/HICSS.2005.408","url":null,"abstract":"Long-term financial transmission rights (FTRs) could be used to create incentives for transmission investments. However, these new investments may cause negative externalities on pre-existing FTRs. Therefore the system operator needs a protocol for awarding incremental FTRs for new transmission capacity that maximize investors' preferences while simultaneously taking into account that the pre-existing network capacity may not be fully allocated by pre-existing FTRs. To preserve revenue adequacy, a minimum amount of currently unassigned FTRs (or proxy FTRs) that satisfies the power flow constraints in the pre-existing network is calculated by the system operator. The challenge is to define the proxy awards. Hogan proposes to define proxy awards as the best use of the current network along the same direction as the incremental FTR awards. This includes allowing positive or negative incremental FTR awards. In this paper we develop a bi-level programming model including a methodology for realizing Hogan's proposal for allocation of long-term FTRs and apply it to a three-node network. Our results show that the simultaneous feasibility of the transmission investment depends on factors such as investor and preset proxy preferences, pre-existing FTRs, and transmission capacity in the expanded and pre-existing network.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124594586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
The Role of Dissonance in Knowledge Exchange: A Case Study of a Knowledge Management System Implementation 不协调在知识交换中的作用:一个知识管理系统实施的个案研究
D. T. Pumareja, K. Sikkel
This study examines the non-adoption of a knowledge management system for knowledge exchange among a distributed group of non-life insurance experts. The users participated with enthusiasm in the design process where they provided functional and data specifications for the system. However, a few months after introduction, the system was hardly being used at all. The analysis of the case suggests that non-use of a system can be understood in terms of dissonance, a dominant theme observed in the social dynamics of the implementation. Dissonance was observed through disparate mental models of a system's intention and use, disparate mental models of knowledge and knowledge ownership, and relational power dissonance where the spirit of knowledge sharing imbued in the mission of the system challenges the relational power position between the affected stakeholder groups. Understanding the implications of these issues can be used to inform a requirements engineering process for these kinds of software applications.
本研究考察了非寿险专家在知识交流中不采用知识管理系统的情况。用户热情地参与了设计过程,为系统提供了功能和数据规范。然而,在推出几个月后,该系统几乎没有被使用。对该案例的分析表明,系统的不使用可以从不和谐的角度来理解,这是在实施的社会动态中观察到的一个主要主题。通过系统意图和使用的不同心理模型,知识和知识所有权的不同心理模型,以及系统使命中灌输的知识共享精神挑战受影响的利益相关者群体之间的关系权力地位的关系权力不协调,可以观察到不协调。理解这些问题的含义可以用来为这些类型的软件应用程序的需求工程过程提供信息。
{"title":"The Role of Dissonance in Knowledge Exchange: A Case Study of a Knowledge Management System Implementation","authors":"D. T. Pumareja, K. Sikkel","doi":"10.1109/HICSS.2005.613","DOIUrl":"https://doi.org/10.1109/HICSS.2005.613","url":null,"abstract":"This study examines the non-adoption of a knowledge management system for knowledge exchange among a distributed group of non-life insurance experts. The users participated with enthusiasm in the design process where they provided functional and data specifications for the system. However, a few months after introduction, the system was hardly being used at all. The analysis of the case suggests that non-use of a system can be understood in terms of dissonance, a dominant theme observed in the social dynamics of the implementation. Dissonance was observed through disparate mental models of a system's intention and use, disparate mental models of knowledge and knowledge ownership, and relational power dissonance where the spirit of knowledge sharing imbued in the mission of the system challenges the relational power position between the affected stakeholder groups. Understanding the implications of these issues can be used to inform a requirements engineering process for these kinds of software applications.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124650159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A quantitative Learning Model for Software Test Process 软件测试过程的定量学习模型
Ghaffari Abu, João W. Cangussu, J. Turi
Learning through experience shows improvement in productivity. Many models and approaches related to learning or experience curve have been established and successfully applied to the traditional industries. This paper investigates the learning process and extends the idea of improvement through learning to software test processes. A novel quantitative learning model for software life cycle is proposed and compared with the existing learning models. An existing formal software test process model is modified to include effects of learning based on the developed learning model. Finally, the extended quantitative software test process model is applied to several industrial software test projects to validate the improved prediction capabilities of the model.
从经验中学习可以提高工作效率。许多与学习或经验曲线相关的模型和方法已经建立并成功地应用于传统行业。本文研究了学习过程,并将学习改进的思想扩展到软件测试过程。提出了一种新的软件生命周期定量学习模型,并与现有的学习模型进行了比较。在开发的学习模型的基础上,对现有的正式软件测试过程模型进行了修改,使其包含了学习的效果。最后,将扩展后的定量软件测试过程模型应用于多个工业软件测试项目,验证了模型预测能力的提高。
{"title":"A quantitative Learning Model for Software Test Process","authors":"Ghaffari Abu, João W. Cangussu, J. Turi","doi":"10.1109/HICSS.2005.41","DOIUrl":"https://doi.org/10.1109/HICSS.2005.41","url":null,"abstract":"Learning through experience shows improvement in productivity. Many models and approaches related to learning or experience curve have been established and successfully applied to the traditional industries. This paper investigates the learning process and extends the idea of improvement through learning to software test processes. A novel quantitative learning model for software life cycle is proposed and compared with the existing learning models. An existing formal software test process model is modified to include effects of learning based on the developed learning model. Finally, the extended quantitative software test process model is applied to several industrial software test projects to validate the improved prediction capabilities of the model.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124682135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Expressive and Efficient Peer-to-Peer Queries 表达和高效点对点查询
D. Heimbigner
It is demonstrated how to provide a peer-to-peer system that supports an expressive query language while maintaining efficient distribution over a wide-area network. The key is to base message routing on the contents of the query messages and to use advertisements from resource providers to make that routing efficient. Advertisements are special queries that describe the data sets available at each site. Queries are encoded as messages that are efficiently distributed to sites providing advertisements Distribution is determined by using a limited form of symbolic execution to intersect queries and advertisements. Performance measurements indicate that cost of symbolic intersection is low.
演示了如何提供一个支持表达性查询语言的点对点系统,同时在广域网上保持有效的分发。关键是基于查询消息的内容进行消息路由,并使用来自资源提供程序的公告来提高路由效率。广告是描述每个站点可用数据集的特殊查询。查询被编码为消息,有效地分发到提供广告的站点。分发是通过使用有限形式的符号执行来交叉查询和广告来确定的。性能测试表明,符号交叉口的成本较低。
{"title":"Expressive and Efficient Peer-to-Peer Queries","authors":"D. Heimbigner","doi":"10.1109/HICSS.2005.267","DOIUrl":"https://doi.org/10.1109/HICSS.2005.267","url":null,"abstract":"It is demonstrated how to provide a peer-to-peer system that supports an expressive query language while maintaining efficient distribution over a wide-area network. The key is to base message routing on the contents of the query messages and to use advertisements from resource providers to make that routing efficient. Advertisements are special queries that describe the data sets available at each site. Queries are encoded as messages that are efficiently distributed to sites providing advertisements Distribution is determined by using a limited form of symbolic execution to intersect queries and advertisements. Performance measurements indicate that cost of symbolic intersection is low.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129897332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Information Sharing Needs for National Security 国家安全需要信息共享
G. White, David J. DiCenso
The speed of today's networks has significantly increased in the last decade as has the speed intruders and malicious code can affect these networks. Society has become increasingly connected and dependent on the Internet. At the same time, effectively addressing attacks on the Internet and the critical infrastructures is becoming increasingly complex. Sharing security-related information has been a hot topic since the events of September 11, 2001. Much has been said about the need to transform the attitudes of the intelligence and security communities to foster information sharing. The mechanisms to accomplish this, however, have not been fully developed especially in the cyber arena. To deal with cyber attacks conducted on high-speed networks requires an organized approach from local cyber first-responders to national-level federal agencies. This paper examines the need for high-speed mechanisms to share information between industry and various levels of the government to address national security issues.
在过去十年中,当今网络的速度有了显著提高,入侵者和恶意代码可以影响这些网络的速度也有了显著提高。社会与互联网的联系越来越紧密,越来越依赖互联网。同时,有效应对针对互联网和关键基础设施的攻击变得越来越复杂。自2001年9月11日以来,共享与安全相关的信息一直是一个热门话题。关于有必要改变情报和安全部门的态度,以促进信息共享,人们已经说了很多。然而,实现这一目标的机制尚未得到充分发展,特别是在网络领域。处理高速网络上的网络攻击需要从地方网络第一响应者到国家级联邦机构的有组织的方法。本文探讨了在工业和各级政府之间建立高速信息共享机制以解决国家安全问题的必要性。
{"title":"Information Sharing Needs for National Security","authors":"G. White, David J. DiCenso","doi":"10.1109/HICSS.2005.320","DOIUrl":"https://doi.org/10.1109/HICSS.2005.320","url":null,"abstract":"The speed of today's networks has significantly increased in the last decade as has the speed intruders and malicious code can affect these networks. Society has become increasingly connected and dependent on the Internet. At the same time, effectively addressing attacks on the Internet and the critical infrastructures is becoming increasingly complex. Sharing security-related information has been a hot topic since the events of September 11, 2001. Much has been said about the need to transform the attitudes of the intelligence and security communities to foster information sharing. The mechanisms to accomplish this, however, have not been fully developed especially in the cyber arena. To deal with cyber attacks conducted on high-speed networks requires an organized approach from local cyber first-responders to national-level federal agencies. This paper examines the need for high-speed mechanisms to share information between industry and various levels of the government to address national security issues.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128605906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
On the Usability Evaluation of E-Learning Applications 电子学习应用的可用性评价研究
M. Costabile, M. De Marsico, R. Lanzilotti, V. L. Plantamura, T. Roselli
Despite the advances of the electronic technologies in e-learning, a consolidated evaluation methodology for e-learning applications does not yet exist. The goal of e-learning is to offer the users the possibility to become skillful and acquire knowledge on a new domain. The evaluation of educational software must consider its pedagogic effectiveness as well as its usability. The design of its interface should take into account the way students learn and also provide good usability so that student's interactions with the software are as natural and intuitive as possible. In this paper, we present the results obtained from a first phase of observation and analysis of the interactions of people with e-learning applications. The aim is to provide a methodology for evaluating such applications.
尽管电子学习中的电子技术取得了进步,但目前还没有一个统一的电子学习应用评估方法。电子学习的目标是为用户提供在新领域变得熟练和获取知识的可能性。教育软件的评价必须考虑其教学有效性和可用性。其界面设计应考虑到学生的学习方式,并提供良好的可用性,使学生与软件的交互尽可能自然和直观。在本文中,我们展示了从第一阶段的观察和分析人们与电子学习应用程序的互动中获得的结果。目的是提供一种评价这种应用的方法。
{"title":"On the Usability Evaluation of E-Learning Applications","authors":"M. Costabile, M. De Marsico, R. Lanzilotti, V. L. Plantamura, T. Roselli","doi":"10.1109/HICSS.2005.468","DOIUrl":"https://doi.org/10.1109/HICSS.2005.468","url":null,"abstract":"Despite the advances of the electronic technologies in e-learning, a consolidated evaluation methodology for e-learning applications does not yet exist. The goal of e-learning is to offer the users the possibility to become skillful and acquire knowledge on a new domain. The evaluation of educational software must consider its pedagogic effectiveness as well as its usability. The design of its interface should take into account the way students learn and also provide good usability so that student's interactions with the software are as natural and intuitive as possible. In this paper, we present the results obtained from a first phase of observation and analysis of the interactions of people with e-learning applications. The aim is to provide a methodology for evaluating such applications.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129581755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 148
Moving Beyond Tacit and Explicit: Four Dimensions of Knowledge 超越隐性与显性:知识的四个维度
R. Casselman, D. Samson
Knowledge is a complex concept, yet the dominant view of knowledge in the management literature is a dichotomy between tacit and explicit. Even the knowledge management literature tends to view knowledge on a limited number of dimensions, whether this is in discussions of knowledge as a commodity or the process of knowing. A review of knowledge from first principles shows that knowledge has different degrees of validity, is highly heterogeneous and has complicated temporal and social aspects. A model of knowledge based on these aspects is presented. Comparing the four dimensions of knowledge with knowledge as a process opens up a more holistic view of knowledge management and helps articulate some of the key differences within streams of research in the field. This holistic perspective is also compatible with Polanyi's original complex conception of tacit knowledge, which drew heavily on Gestalt theory, a theory that examines the perception of "wholes". The dual perspectives of a multi-dimensional conception of knowledge as a commodity and a holistic perspective on knowledge management expands the avenues of potential research and improves our ability to put knowledge in action within organizations.
知识是一个复杂的概念,然而,在管理文献中,知识的主要观点是隐性和显性的二分法。即使是知识管理文献也倾向于在有限的维度上看待知识,无论是在讨论知识作为商品还是知识的过程时。对第一性原理知识的回顾表明,知识具有不同程度的有效性,高度异质性,具有复杂的时间和社会方面。提出了一个基于这些方面的知识模型。将知识的四个维度与作为一个过程的知识进行比较,可以打开一个更全面的知识管理视图,并有助于阐明该领域研究流中的一些关键差异。这种整体视角也与波兰尼最初的默会知识的复杂概念相一致,后者大量借鉴了格式塔理论,一种研究“整体”感知的理论。知识作为商品的多维概念和知识管理的整体视角的双重视角扩展了潜在研究的途径,并提高了我们在组织内将知识付诸行动的能力。
{"title":"Moving Beyond Tacit and Explicit: Four Dimensions of Knowledge","authors":"R. Casselman, D. Samson","doi":"10.1109/HICSS.2005.446","DOIUrl":"https://doi.org/10.1109/HICSS.2005.446","url":null,"abstract":"Knowledge is a complex concept, yet the dominant view of knowledge in the management literature is a dichotomy between tacit and explicit. Even the knowledge management literature tends to view knowledge on a limited number of dimensions, whether this is in discussions of knowledge as a commodity or the process of knowing. A review of knowledge from first principles shows that knowledge has different degrees of validity, is highly heterogeneous and has complicated temporal and social aspects. A model of knowledge based on these aspects is presented. Comparing the four dimensions of knowledge with knowledge as a process opens up a more holistic view of knowledge management and helps articulate some of the key differences within streams of research in the field. This holistic perspective is also compatible with Polanyi's original complex conception of tacit knowledge, which drew heavily on Gestalt theory, a theory that examines the perception of \"wholes\". The dual perspectives of a multi-dimensional conception of knowledge as a commodity and a holistic perspective on knowledge management expands the avenues of potential research and improves our ability to put knowledge in action within organizations.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129619795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Selecting Structural Patterns for Classification 选择分类的结构模式
Wan-Shiou Yang, San-Yih Hwang, J. Srivastava
Many techniques have recently been proposed for discovering structural patterns. Using the discovered structural patterns as features for classification has shown success in some application domains. However, the efficiency and effectiveness of such a classification algorithm is often impeded by the huge number of structural patterns discovered by the associated structural pattern mining algorithm. In this paper, we focus on the feature selection problem of structural patterns. The goal is to develop a scheme that effectively selects a subset of structural patterns as the features for the following induction algorithm. We show how to make use of the downward closure property inherent in the structural patterns to design a novel feature selection algorithm. We also evaluate our algorithm by applying the real-world health insurance data for building a classification model to detect health care fraud and abuse. The experimental results show that a great extent of redundant features can be eliminated by our feature selection algorithm, resulting in both accuracy improvement and computation cost reduction.
最近提出了许多发现结构模式的技术。将发现的结构模式用作分类特征在某些应用领域取得了成功。然而,这种分类算法的效率和有效性往往受到相关结构模式挖掘算法发现的大量结构模式的阻碍。本文主要研究结构模式的特征选择问题。目标是开发一种方案,该方案可以有效地选择结构模式子集作为以下归纳算法的特征。我们展示了如何利用结构模式固有的向下闭合特性来设计一种新的特征选择算法。我们还通过应用真实世界的健康保险数据来评估我们的算法,以建立一个分类模型来检测医疗欺诈和滥用。实验结果表明,本文提出的特征选择算法能够消除大量的冗余特征,既提高了准确率,又降低了计算成本。
{"title":"Selecting Structural Patterns for Classification","authors":"Wan-Shiou Yang, San-Yih Hwang, J. Srivastava","doi":"10.1109/HICSS.2005.535","DOIUrl":"https://doi.org/10.1109/HICSS.2005.535","url":null,"abstract":"Many techniques have recently been proposed for discovering structural patterns. Using the discovered structural patterns as features for classification has shown success in some application domains. However, the efficiency and effectiveness of such a classification algorithm is often impeded by the huge number of structural patterns discovered by the associated structural pattern mining algorithm. In this paper, we focus on the feature selection problem of structural patterns. The goal is to develop a scheme that effectively selects a subset of structural patterns as the features for the following induction algorithm. We show how to make use of the downward closure property inherent in the structural patterns to design a novel feature selection algorithm. We also evaluate our algorithm by applying the real-world health insurance data for building a classification model to detect health care fraud and abuse. The experimental results show that a great extent of redundant features can be eliminated by our feature selection algorithm, resulting in both accuracy improvement and computation cost reduction.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127430452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dependency in Value Networks: The Safeguarding Effects of Electronic Collaboration and Relational Investments 价值网络中的依赖性:电子协作和关系投资的保障效应
Pierre-Majorique Léger, P. Hadaya, L. Cassivi, Olivier Caya
In order to remain competitive, firms' business boundaries are now opening up to their partners. To build value networks, firms are investing in both upstream and downstream relationships and relying more and more on collaborative activities. The development and the safeguarding of firms' business relationship portfolios are becoming strategic activities. However, the power structure in a value network is ever-present as dependency on business partners changes the dynamic of the business relationships. Conducted with 159 firms in the wireless communication sector, the objective of this empirical study is to investigate how relational investments and electronic collaboration within a value network may be carried out differently in various network-dependent contexts. The results indicate that dependent firms are more likely to invest in both upstream and downstream relationships than other firms. However, the results also suggest that e-collaboration is not a safeguarding mechanism against opportunism, but rather a general attitude of business partners within a value network.
为了保持竞争力,公司的业务边界正在向他们的合作伙伴开放。为了建立价值网络,企业正在投资于上游和下游关系,并越来越依赖于合作活动。企业业务关系组合的发展和维护正在成为战略活动。然而,价值网络中的权力结构是永远存在的,因为对业务伙伴的依赖改变了业务关系的动态。通过对无线通信领域159家公司的调查,本实证研究的目的是调查价值网络中的关系投资和电子协作如何在不同的网络依赖环境中不同地进行。结果表明,依赖企业比其他企业更有可能投资于上下游关系。然而,结果也表明,电子协作不是一种防止机会主义的保障机制,而是价值网络中业务伙伴的一种普遍态度。
{"title":"Dependency in Value Networks: The Safeguarding Effects of Electronic Collaboration and Relational Investments","authors":"Pierre-Majorique Léger, P. Hadaya, L. Cassivi, Olivier Caya","doi":"10.1109/HICSS.2005.189","DOIUrl":"https://doi.org/10.1109/HICSS.2005.189","url":null,"abstract":"In order to remain competitive, firms' business boundaries are now opening up to their partners. To build value networks, firms are investing in both upstream and downstream relationships and relying more and more on collaborative activities. The development and the safeguarding of firms' business relationship portfolios are becoming strategic activities. However, the power structure in a value network is ever-present as dependency on business partners changes the dynamic of the business relationships. Conducted with 159 firms in the wireless communication sector, the objective of this empirical study is to investigate how relational investments and electronic collaboration within a value network may be carried out differently in various network-dependent contexts. The results indicate that dependent firms are more likely to invest in both upstream and downstream relationships than other firms. However, the results also suggest that e-collaboration is not a safeguarding mechanism against opportunism, but rather a general attitude of business partners within a value network.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129970012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Developing Group Decision Support Systems for Deception Detection 开发欺骗检测的群体决策支持系统
A. Deokar, T. Madhusudan
Achieving information assurance and security is a complex and challenging task, which is crucial from national and personal security point of views. Research in detecting deceptive communication is geared towards understanding the deception process, proposing theories to model it, and developing tools to automate the detection of hostile intent and deception. However, in complex tasks such as deception detection, involvement of teams of human experts is critical in validating the automated tools and agents, improving them, and also in training other humans in detecting deception accurately. This article presents a Group decision support systems (GDSS) framework for deception detection based on collaborative process patterns, thinkLets. The focus of research is on designing group processes to aid deception detection from various information sources such as text transcripts, video clips, and audio clips. Architecture of a prototype under development based on the proposed framework is outlined.
实现信息安全保障是一项复杂而具有挑战性的任务,从国家和个人安全的角度来看,这是至关重要的。检测欺骗性通信的研究旨在理解欺骗过程,提出理论来模拟它,并开发工具来自动检测敌对意图和欺骗。然而,在诸如欺骗检测之类的复杂任务中,人类专家团队的参与对于验证自动化工具和代理,改进它们以及训练其他人准确检测欺骗至关重要。本文提出了一种基于协作过程模式的群体决策支持系统(GDSS)欺骗检测框架——thinkLets。研究的重点是设计群体过程,以帮助从各种信息源(如文本文本、视频剪辑和音频剪辑)中检测欺骗。基于所提出的框架,概述了正在开发的原型的体系结构。
{"title":"Developing Group Decision Support Systems for Deception Detection","authors":"A. Deokar, T. Madhusudan","doi":"10.1109/HICSS.2005.197","DOIUrl":"https://doi.org/10.1109/HICSS.2005.197","url":null,"abstract":"Achieving information assurance and security is a complex and challenging task, which is crucial from national and personal security point of views. Research in detecting deceptive communication is geared towards understanding the deception process, proposing theories to model it, and developing tools to automate the detection of hostile intent and deception. However, in complex tasks such as deception detection, involvement of teams of human experts is critical in validating the automated tools and agents, improving them, and also in training other humans in detecting deception accurately. This article presents a Group decision support systems (GDSS) framework for deception detection based on collaborative process patterns, thinkLets. The focus of research is on designing group processes to aid deception detection from various information sources such as text transcripts, video clips, and audio clips. Architecture of a prototype under development based on the proposed framework is outlined.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130104501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
Proceedings of the 38th Annual Hawaii International Conference on System Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1