diff

Amorim 'not naive' over 'difficult' Man Utd task

Ruben Amorim says he is ready to face the challenge of the "difficult" job ahead at Manchester United.




diff

...And Now For Something Completely Different

This is not about sex, and not about The Sex Myth. This is about the old blog, and the growing scandal in News International's paper the rules they played by. And as Prince Humperdinck so eloquently put it, I always think everything could be a trap.

Very early on in blogging as Belle de Jour, I had an email address associated with the blog. It was with one of those free email providers and not very secure. Later, I wised up a touch and moved to doing everything through Hushmail. But for some reason I kept the old email up and running, and checked it occasionally.

So on the day of the book's release in the UK, I logged on to a public library computer in Clearwater, Florida, and had a look at that old account. There was a new message from someone I didn't recognise. I opened it.

The message was from a journo at the Sunday Times. It was short, which struck me as unusual: Come on Belle, not even a little hint? There was an attachment. The attachment started downloading automatically (then if I remember correctly, came up with a "failed to download" message).

My heart sank - my suspicion was that there had been a program attached to the message, some sort of trojan, presumably trying to get information from my computer.

Now, I understood the papers regarded all of this as a game. There were accusations that the anonymity thing was a ruse to pump sales. It wasn't. I was really afraid of losing my job and my career if found out. But I knew the rules they played by. And as Prince Humperdinck so eloquently put it, I always think everything could be a trap.

I did several things:

1. Alerted library staff that I thought there had been a virus downloaded on to the computer, so they could deal with it.

2. Phoned a friend who knew my secret. I explained what happened. He agreed to log in to that email account from where he lived, halfway around the world, open the email and send a reply, so they would have competing IP address information.

3. Alerted the man who owned the .co.uk address pointing to my blog, someone called Ian (who to my knowledge I have never met). He confirmed he had been contacted by the Times and asked if I was indeed in Florida. He told them he didn't know (which was true).

Point 3 is the part that makes me think my suspicions were correct. I hadn't replied to the message from the computer in Florida, so why would they have a Florida IP address? They did get a reply from "my" account, but it would have had an IP address from Australia.

(It's been suggested on Twitter that this could also have been because of a read receipt or embedded images. However, if my memory serves - and it usually does - the service I used did not send read receipts and I had images/HTML off as a matter of habit. There could of course be other explanations for what happened, but it is certainly true that the Times were trying hard to find me. Thanks for the comments, I hope this answers any concerns.)




diff

An OCR Free Method for Word Spotting in Printed Documents: the Evaluation of Different Feature Sets

An OCR free word spotting method is developed and evaluated under a strong experimental protocol. Different feature sets are evaluated under the same experimental conditions. In addition, a tuning process in the document segmentation step is proposed which provides a significant reduction in terms of processing time. For this purpose, a complete OCR-free method for word spotting in printed documents was implemented, and a document database containing document images and their corresponding ground truth text files was created. A strong experimental protocol based on 800 document images allows us to compare the results of the three feature sets used to represent the word image.




diff

Descriptional Complexity of Ambiguity in Symmetric Difference NFAs

We investigate ambiguity for symmetric difference nondeterministic finite automata. We show the existence of unambiguous, finitely ambiguous, polynomially ambiguous and exponentially ambiguous symmetric difference nondeterministic finite automata. We show that, for each of these classes, there is a family of n-state nondeterministic finite automata such that the smallest equivalent deterministic finite automata have O(2n) states.




diff

Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS

Recently, IEEE 802.16 Worldwide Interoperability for Microwave Access (WiMAX for short) has provided us with low-cost, high efficiency and high bandwidth network services. However, as with the WiFi, the radio wave transmission also makes the WiMAX face the wireless transmission security problem. To solve this problem, the IEEE802.16Std during its development stage defines the Privacy Key Management (PKM for short) authentication process which offers a one-way authentication. However, using a one-way authentication, an SS may connect to a fake BS. Mutual authentication, like that developed for PKMv2, can avoid this problem. Therefore, in this paper, we propose an authentication key management approach, called Diffie-Hellman-PKDS-based authentication method (DiHam for short), which employs a secret door asymmetric one-way function, Public Key Distribution System (PKDS for short), to improve current security level of facility authentication between WiMAX's BS and SS. We further integrate the PKMv1 and the DiHam into a system, called PKM-DiHam (P-DiHam for short), in which the PKMv1 acts as the authentication process, and the DiHam is responsible for key management and delivery. By transmitting securely protected and well-defined parameters for SS and BS, the two stations can mutually authenticate each other. Messages including those conveying user data and authentication parameters can be then more securely delivered.




diff

A Comparison of Different Retrieval Strategies Working on Medical Free Texts

Patient information in health care systems mostly consists of textual data, and free text in particular makes up a significant amount of it. Information retrieval systems that concentrate on these text types have to deal with the different challenges these medical free texts pose to achieve an acceptable performance. This paper describes the evaluation of four different types of information retrieval strategies: keyword search, search performed by a medical domain expert, a semantic based information retrieval tool, and a purely statistical information retrieval method. The different methods are evaluated and compared with respect to its appliance in medical health care systems.




diff

Ascendancy of SNS information and age difference on intention to buy eco-friendly offerings: meaningful insights for e-tailers

Through the unparalleled espousal of theory of planned behaviour, this study intends to significantly add to the current knowledge on social networking sites (SNS) in <i>eWOM</i> information and its role in defining intentions to buy green products. In specie, this study seeks to first investigate the part played by <i>attitude towards SNS information</i> in influencing the <i>acceptance of SNS information</i> and then by <i>acceptance of SNS information</i> in effecting the <i>green purchase intention</i>. Besides this, it also aims to analyse the influence exerted by first <i>credibility of SNS information</i> on <i>acceptance of SNS information</i> and then by <i>acceptance of SNS information</i> on <i>green purchase intention</i>. In doing so, it also examines how well the age of the SNS users moderates all these four associations.




diff

An effective differential privacy protection method of location data based on perturbation loss constraint

Differential privacy is usually applied to location privacy protection scenarios, which confuses real data by adding interference noise to location points to achieve the purpose of protecting privacy. However, this method can result in a significant amount of redundant noisy data and impact the accuracy of the location. Considering the security and practicability of location data, an effective differential privacy protection method of location data based on perturbation loss constraint is proposed. After applying the Laplace mechanism under the condition of differential privacy to perturb the location data, the Savitzky-Golay filtering technology is used to correct the data with noise, and the data with large deviation and low availability is optimised. The introduction of Savitzky-Golay filtering mechanism in differential privacy can reduce the error caused by noise data while protecting user privacy. The experiments results indicate that the scheme improves the practicability of location data and is feasible.




diff

Educational countermeasures of different learners in virtual learning community based on artificial intelligence

In order to reduce the challenges encountered by learners and educators in engaging in educational activities, this paper classifies learners' roles in virtual learning communities, and explores the role of behaviour characteristics and their positions in collaborative knowledge construction networks in promoting the process of knowledge construction. This study begins with an analysis of the relationship structure among learners in the virtual learning community and then applies the FCM algorithm to arrange learners into various dimensional combinations and create distinct learning communities. The test results demonstrate that the FCM method performs consistently during the clustering process, with less performance oscillations, and good node aggregation, the ARI value of the model is up to 0.90. It is found that they play an important role in the social interaction of learners' virtual learning community, which plays a certain role in promoting the development of artificial intelligence.




diff

Girls, Boys, and Bots: Gender Differences in Young Children’s Performance on Robotics and Programming Tasks

Prior work demonstrates the importance of introducing young children to programming and engineering content before gender stereotypes are fully developed and ingrained in later years. However, very little research on gender and early childhood technology interventions exist. This pilot study looks at N=45 children in kindergarten through second grade who completed an eight-week robotics and programming curriculum using the KIWI robotics kit. KIWI is a developmentally appropriate robotics construction set specifically designed for use with children ages 4 to 7 years old. Qualitative pre-interviews were administered to determine whether participating children had any gender-biased attitudes toward robotics and other engineering tools prior to using KIWI in their classrooms. Post-tests were administered upon completion of the curriculum to determine if any gender differences in achievement were present. Results showed that young children were beginning to form opinions about which technologies and tools would be better suited for boys and girls. While there were no significant differences between boys and girls on the robotics and simple programming tasks, boys performed significantly better than girls on the advanced programming tasks such as, using repeat loops with sensor parameters. Implications for the design of new technological tools and curriculum that are appealing to boys and girls are discussed.




diff

An MCDM approach to compare different concepts of SMED to reduce the setup time in concrete products manufacturing: a case study

In the construction sector, moulding machines are crucial in producing concrete products, yet changing their mould can pose challenges for some businesses. This paper presents a case study aimed at reducing the setup time of HESS RH 600 moulding machine. Four alternatives are proposed and evaluated to achieve this goal. The first alternative involves converting internal to external activities, while the subsequent alternatives aim to improve the basic solution. These include building a canopy near the machine (alternative 2), installing an air reservoir (alternative 3), and a comprehensive approach involving building the canopy, installing the air reservoir, and adding a new forklift to facilitate the machine setup process (alternative 4). The analytic hierarchy process (AHP) heuristic method is used to select the best alternative solution based on prespecified criteria. It is found that the application of the single-minute exchange of die (SMED) solution without any further improvement is the most favourable.




diff

Online allocation of teaching resources for ideological and political courses in colleges and universities based on differential search algorithm

In order to improve the classification accuracy and online allocation accuracy of teaching resources and shorten the allocation time, this paper proposes a new online allocation method of college ideological and political curriculum teaching resources based on differential search algorithm. Firstly, the feedback parameter model of teaching resources cleaning is constructed to complete the cleaning of teaching resources. Secondly, according to the results of anti-interference consideration, the linear feature extraction of ideological and political curriculum teaching resources is carried out. Finally, the online allocation objective function of teaching resources for ideological and political courses is constructed, and the differential search algorithm is used to optimise the objective function to complete the online allocation of resources. The experimental results show that this method can accurately classify the teaching resources of ideological and political courses, and can shorten the allocation time, with the highest allocation accuracy of 97%.




diff

ICT Experiences in Two Different Middle Eastern Universities




diff

Finger Length, Digit Ratio and Gender Differences in Sensation Seeking and Internet Self-Efficacy




diff

Analysing Socio-Demographic Differences in Access and Use of ICTs in Nigeria Using the Capability Approach




diff

The Adoption of Automatic Teller Machines in Nigeria: An Application of the Theory of Diffusion of Innovation




diff

So Different Though So Similar? – Or Vice Versa? Exploration of the Logic Programming and the Object-Oriented Programming Paradigms




diff

A Guide to Educating Different Generations in South Africa




diff

Understanding Online Learning Based on Different Age Categories

Aim/Purpose: To understand readiness of students for learning in online environments across different age groups. Background: Online learners today are diverse in age due to increasing adult/mature students who continue their higher education while they are working. Understanding the influence of the learners’ age on their online learning experience is limited. Methodology: A survey methodology approach was followed. A sample of one thousand nine hundred and twenty surveys were used. Correlation analysis was performed. Contribution: The study contributes by adding to the limited body of knowledge in this area and adds to the dimensions of the Online Learning Readiness Survey additional dimensions such as usefulness, tendency, anxiety, and attitudes. Findings: Older students have more confidence than younger ones in computer proficiency and learning skills. They are more motivated, show better attitudes and are less anxious. Recommendations for Practitioners: Practitioners should consider preferences that allow students to configure the learning approach to their age. These preferences should be tied to the dimensions of the online learning readiness survey (OLRS). Recommendations for Researchers: More empirical research is required using OLRS for online learning environments. OLRS factors are strong and can predict student readiness and performance. These are opportunities for artificial intelligence in the support of technology-mediated tools for learning.




diff

How Different Are Johnson and Wang? Documenting Discrepancies in the Records of Ethnic Scholars in Scopus

Aim/Purpose. This study captures and describes the discrepancies in the performance matrices of comparable Chinese and American scholars as recorded by Scopus. Background. The contributions of Chinese scholars to the global knowledge enterprise are increasing, whereas indexing bibliometric databases (e.g., Scopus) are not optimally designed to track their names and record their work precisely. Methodology. Coarsened exact matching was employed to construct two samples of comparable Chinese and American scholars in terms of gender, fields of work, educational backgrounds, experience, and workplace. Under 200 scholars, around a third being Chinese and the rest American scholars, were selected through this data construction method. Statistical tests, including logit regressions, Poisson regression, and fractional response models, were applied to both samples to measure and verify the discrepancies stored within their Scopus accounts. Contribution. This study complicates the theory of academic identity development, especially on the intellectual strand, as it shows ethnic scholars may face more errors in how their track records are stored and presented. This study also provides inputs for the discussion of algorithmic discrimination from the academic context and to the scientific community. Findings. This paper finds that Chinese scholars are more prone to imprecise records in Scopus (i.e., more duplicate accounts, a higher gap between the best-statistic accounts, and the total numbers of publications and citations) than their American counterparts. These findings are consistent across two samples and with different statistical tests. Recommendations for Practitioners. This paper suggests practitioners and administrators at research institutions treat scholars’ metrics presented in Scopus or other bibliometric databases with caution while evaluating ethnic scholars’ contributions. Recommendations for Researchers. Scholars and researchers are suggested to dedicate efforts to monitoring their accounts on indexing bibliometric platforms. Impact on Society. This paper raises awareness of the barriers that ethnic scholars face in participating in the scientific community and being recognized for their contributions. Future Research. Future research can be built on this paper by expanding the size of the analytical samples and extending similar analyses on comparable data harvested from other bibliometric platforms.




diff

Gender Differences among IT Professionals in Dealing with Change and Skill Set Maintenance




diff

Do Project Management Tools and Outcomes Differ in Organizations of Varying Size and Sector?




diff

Employees’ Involuntary Non-Use of ICT Influenced by Power Differences: A Case Study with the Grounded Theory Approach

Power differences affect implementation of information and communication technology (ICT) in a way that creates differences in ICT use. Involuntary non-use of new ICT at work occurs when employees want to use the new technology, but are unable to due to factors beyond their control. Findings from an in-depth qualitative study show how involuntary non-use of new ICT can be attributed to power differences between occupational groups in the same organization. The findings suggest that experience is a moderating variable and that closeness to formal power holders as well as closeness to the new technology increases the probability for expert control of the ICT-organization processes. These power differences favor ICT experts over ICT novices and result in a high-quality learning environment for the ICT experts characterized by autonomy, inclusion, and adequate work processes and technological solutions. The ICT novices try to navigate in a learning-hostile work environment characterized by marginalization through expert control, isolation, and inadequate work processes and technological solutions. This led to involuntary non-use by the ICT novices, while the experts became more proficient in ICT use. These findings give managers facing a technological organizational change tools to understand important mechanisms for implementing the change in their own organization, and help them take the right actions to integrate new technology and new organization of work.




diff

Navigating the Future: Exploring AI Adoption in Chinese Higher Education Through the Lens of Diffusion Theory

Aim/Purpose: This paper aims to investigate and understand the intentions of management undergraduate students in Hangzhou, China, regarding the adoption of Artificial Intelligence (AI) technologies in their education. It addresses the need to explore the factors influencing AI adoption in the educational context and contribute to the ongoing discourse on technology integration in higher education. Background: The paper addresses the problem by conducting a comprehensive investigation into the perceptions of management undergraduate students in Hangzhou, China, regarding the adoption of AI in education. The study explores various factors, including Perceived Relative Advantage and Trialability, to shed light on the nuanced dynamics influencing AI technology adoption in the context of higher education. Methodology: The study employs a quantitative research approach, utilizing the Confirmatory Tetrad Analysis (CTA) and Partial Least Squares Structural Equation Modeling (PLS-SEM) methodologies. The research sample consists of management undergraduate students in Hangzhou, China, and the methods include data screening, principal component analysis, confirmatory tetrad analysis, and evaluation of the measurement and structural models. We used a random sampling method to distribute 420 online, self-administered questionnaires among management students aged 18 to 21 at universities in Hangzhou. Contribution: This paper explores how management students in Hangzhou, China, perceive the adoption of AI in education. It identifies factors that influence AI adoption intention. Furthermore, the study emphasizes the complex nature of technology adoption in the changing educational technology landscape. It offers a thorough comprehension of this process while challenging and expanding the existing literature by revealing the insignificant impacts of certain factors. This highlights the need for an approach to AI integration in education that is context-specific and culturally sensitive. Findings: The study highlights students’ positive attitudes toward integrating AI in educational settings. Perceived relative advantage and trialability were found to impact AI adoption intention significantly. AI adoption is influenced by social and cultural contexts rather than factors like compatibility, complexity, and observability. Peer influence, instructor guidance, and the university environment were identified as pivotal in shaping students’ attitudes toward AI technologies. Recommendations for Practitioners: To promote the use of AI among management students in Hangzhou, practitioners should highlight the benefits and the ease of testing these technologies. It is essential to create communication strategies tailored to the student’s needs, consider cultural differences, and utilize the influence of peers and instructors. Establishing a supportive environment within the university that encourages innovation through policies and regulations is vital. Additionally, it is recommended that students’ attitudes towards AI be monitored constantly, and strategies adjusted accordingly to keep up with the changing technological landscape. Recommendation for Researchers: Researchers should conduct cross-disciplinary and cross-cultural studies with qualitative and longitudinal research designs to understand factors affecting AI adoption in education. It is essential to investigate compatibility, complexity, observability, individual attitudes, prior experience, and the evolving role of peers and instructors. Impact on Society: The study’s insights into the positive attitudes of management students in Hangzhou, China, toward AI adoption in education have broader societal implications. It reflects a readiness for transformative educational experiences in a region known for technological advancements. However, the study also underscores the importance of cautious integration, considering associated risks like data privacy and biases to ensure equitable benefits and uphold educational values. Future Research: Future research should delve into AI adoption in various academic disciplines and regions, employing longitudinal designs and qualitative methods to understand cultural influences and the roles of peers and instructors. Investigating moderating factors influencing specific factors’ relationship with AI adoption intention is essential for a comprehensive understanding.




diff

Drills, Games or Tests? Evaluating Students' Motivation in Different Online Learning Activities, Using Log File Analysis




diff

Analyzing Associations between the Different Ratings Dimensions of the MERLOT Repository




diff

An Exploratory Study of Online Equity: Differential Levels of Technological Access and Technological Efficacy Among Underserved and Underrepresented Student Populations in Higher Education

Aim/Purpose: This study aims to explore levels of Technological Access (ownership, access to, and usage of computer devices as well as access to Internet services) and levels of Technological Efficacy (technology related skills) as they pertain to underserved (UNS) and underrepresented (UNR) students. Background: There exists a positive correlation between technology related access, technology related competence, and academic outcomes. An increasing emphasis on expanding online education at the author’s institution, consistent with nationwide trends, means that it is unlikely that just an increase in online offerings alone will result in an improvement in the educational attainment of students, especially if such students lack access to technology and the technology related skills needed to take advantage of online learning. Most studies on levels of Technological Access and Technological Efficacy have dealt with either K-12 or minority populations with limited research on UNS and UNR populations who form the majority of students at the author’s institution. Methodology: This study used a cross-sectional survey research design to investigate the research questions. A web survey was sent to all students at the university except first semester new and first semester transfer students from various disciplines (n = 535). Descriptive and inferential statistics were used to analyze the survey data. Contribution: This research provides insight on a population (UNS and UNR) that is expanding in higher education. However, there is limited information related to levels of Technological Access and Technological Efficacy for this group. This paper is timely and relevant as adequate access to technology and technological competence is critical for success in the expanding field of online learning, and the research findings can be used to guide and inform subsequent actions vital to bridging any educational equity gap that might exist. Findings: A critical subset of the sample who were first generation, low income, and non-White (FGLINW) had significantly lower levels of Technological Access. In addition, nearly half of the survey sample used smartphones to access online courses. Technological Efficacy scores were significantly lower for students who dropped out of or never enrolled in an online course. Transfer students had significantly higher Technological Efficacy scores while independent students (determined by tax status for federal financial aid purposes) reflected higher Technological Efficacy, but at a marginally lower level of significance. Recommendations for Practitioners: Higher education administrators and educators should take into consideration the gaps in technology related access and skills to devise institutional interventions as well as formulate pedagogical approaches that account for such gaps in educational equity. This will help ensure pathways to sustained student success given the rapidly growing landscape of online education. Recommendation for Researchers: Similar studies need to be conducted in other institutions serving UNS and UNR students in order to bolster findings and increase awareness. Impact on Society: The digital divide with respect to Technological Access and Technological Efficacy that impacts UNS and UNR student populations must be addressed to better prepare such groups for both academic and subsequent professional success. Addressing such gaps will not only help disadvantaged students maximize their educational opportunities but will also prepare them to navigate the challenges of an increasingly technology driven society. Future Research: Given that it is more challenging to write papers and complete projects using a smartphone, is there a homework gap for UNS and UNR students that may impact their academic success? What is the impact of differing levels of Technological Efficacy on specific academic outcomes of UNS and UNR students?




diff

Differences in Stage of Integration between Business Planning and Information Systems Planning according to Value Configurations




diff

On the Difference or Equality of Information, Misinformation, and Disinformation: A Critical Research Perspective




diff

Gifts, Contexts, Means, and Ends Differing: Informing Task Scenarios to Serve Knowledge Workers’ Needs in Dynamic Complex Settings

Aim/Purpose: As traditional Knowledge Management (KM) struggles to support the personal needs of knowledge workers in a new era of accelerating information abundance, we examine the shortcomings and put forward alternative scenarios and architectures for developing a novel Personal KM System (PKMS). Background: While prior publications focused on the complementing features compared to conventional dynamic KM models, our emphasis shifts to instantiating a flourishing PKMS community supported by a Digital Platform Ecosystem. Methodology: Design science research focusing on conceptual analysis and prototyping. Contribution: The PKMS concept advances the understanding of how digital platform communities may serve members with highly diverse skills and ambitions better to gainfully utilize the platform’s resources and generative potential in their personal and local settings. Findings: We demonstrate how the needs to tackle attention-consuming rising entropy and to benefit from generative innovation potentials can be addressed. Future Research: As this article has iteratively co-evolved with the preparing of a PKMS implementation, business, and roll-out plan, the prototype’s testing, completion, and subsequent migration to a viable system is of primary concern.




diff

Why People Perceive Messages Differently: The Theory of Cognitive Mapping

Aim/Purpose: The paper introduces new concepts including cognitive mapping, cognitive message processing, and message resonance. Background: This paper draws upon philosophy, psychology, physiology, communications, and introspection to develop the theory of cognitive mapping. Methodology: Theory development Contribution: The theory offers new ways to conceptualize the informing process. Findings: Cognitive mapping has a far-reaching explanatory power on message resonance. Recommendation for Researchers: The theory of cognitive mapping offers a new conceptualization for those exploring the informing process that is ripe for exploration and theory testing. Future Research: This paper forms a building block toward the development of a fuller model of the informing process.




diff

If Different Acupressure Points have the same Effect on the Pain Severity of Active Phase of Delivery among Primiparous Women Referred to the Selected Hospitals of Shiraz University of Medical Sciences, 2010

Labor pain and its relieving methods is one of the anxieties of mothers having a great impact on the quality of care during delivery as well as the patients' satisfaction. The propensity of using non-medicinal pain relief methods is increasing. The present study aimed to compare the effect of Acupressure at two GB-21 and SP06 points on the severity of labor pain. In this quasi-experimental single blind study started on December 2010 and ended on June 2011 in which 150 primiparous women were divided into three groups of Acupressure at GB-21 point, Acupressure at SP-6 point and control group. The intervention was carried out for 20 min at 3-4 and 20 min at 7-8 cm dilatation of Cervix. The pain severity was measured by Visual Analog Scale before and immediately, 30 and 60 min after the intervention. Then, the data were statistically analyzed. No significant difference was found among the 3 groups regarding the pain severity before the intervention. However, the pain severity it was reduced at 3-4 and 7-8 cm dilatation immediately, 30 and 60 min after the intervention in the two intervention groups compared to the control group (p<0.001). Nonetheless, no statistically significant difference was observed between the two intervention groups (p = 0.93). The results of the study showed that application of Acupressure at two GB-21 and SP-6 points was effective in the reduction of the severity of labor pain. Therefore, further studies are recommended to be performed on the application of Acupressure together with non-medicinal methods.




diff

DIFFERENT VIEWS OF HIERARCHY AND WHY THEY MATTER: HIERARCHY AS INEQUALITY OR AS CASCADING INFLUENCE

Hierarchy is a reality of group life, for humans as well as for most other group-living species. And yet, there remains considerable debate about whether and when hierarchy can promote group performance and member satisfaction. We suggest that progress in this debate has been hampered by a lack of clarity about hierarchy and how to conceptualize it. Whereas prevailing conceptualizations of hierarchy in the group and organization literature focus on inequality in member power or status (i.e., centralization or steepness), we build on the ethological and social network traditions to advance a view of hierarchy as cascading relations of dyadic influence (i.e., acyclicity). We further suggest that hierarchy thus conceptualized is more likely to capture the functional benefits of hierarchy whereas hierarchy as inequality is more likely to be dysfunctional. In a study of 75 teams drawn from a wide range of industries, we show that whereas acyclicity in influence relations reduces conflict and thereby enhances both group performance and member satisfaction, centralization and steepness have negative effects on conflict, performance, and satisfaction, particularly in groups that perform complex tasks. The theory and results of this study can help to clarify and advance research on the functions and dysfunctions of hierarchy in task groups.





diff

What is the difference between saltwater and freshwater pearls?

Read The Answer




diff

Pirating “The Pirate Bay” TV Series is Ironically Difficult (Updated)

The Pirate Bay made its debut as a TV series on the Swedish streaming platform SVT Play earlier today. International viewers are left waiting until other services pick it up. In the meantime, some may be tempted to explore unofficial channels for pirated copies of the show. But finding a pirated copy is proving surprisingly difficult.

From: TF, for the latest news on copyright battles, piracy and more.




diff

Harris and Trump's dramatically different energy policies

In order to tackle inflation, Donald Trump's No. 1 policy goal, if reelected, would be to "Drill, baby, drill."




diff

FIFA and IOC hold different track records with Trump ahead of World Cup and Olympics in U.S.

The two biggest events in world sports are coming to America. And if President-elect Donald Trump is not thinking about them yet, organizers of the 2026 World Cup and 2028 Los Angeles Olympics certainly are.




diff

Postdoctoral position: Modelling of the land-sea nutrient transfer to the Mediterranean sea under different land management scenarios

Post-doctoral scientist position is open for the project "Towards an integrated prediction of Land & Sea Responses to global change in the Mediterranean Basin" (LaSeR-Med), which focusses on integrated socio-ecological modelling. The duration of the contract is initially one year, with a possible extension for a second year, depending on the initial results. The post-doc will be based within the Mediterranean Institute of marine and terrestrial Biodiversity and Ecology (IMBE) in Aix-en-Provence, France. The project is part of the Labex OT-Med (http://www.otmed.fr/).

Applicants should hold a doctoral degree in physics, chemistry, microbiology, geosciences, environmental sciences or a related field of science. They should be familiar with modelling biogeochemical interactions between ecosystems and capable to further develop existing numerical ecosystem models. Programming skills (C) and modelling experience are therefore mandatory. Knowledge of R and of Unix/Linux environment will be an advantage. The candidate should have good written and oral communication skills. For work, good skills in the English language will be essential.

The project:

Terrestrial and marine ecosystems are connected through groundwater, river discharge and nutrient outflows (especially N and P). River catchments in the Mediterranean are N-intensive regions, mostly due to intensive agriculture in the North and to crop N2 fixation or food & feed import in the South. The fraction of nutrient reaching the sea constitutes significant anthropogenic forcing of many marine biological processes. For simulating the dynamics of the first levels of the marine food web (from nutrients to jellyfishes), the ocean biogeochemical model, Eco3M-MED, used and developed by the Mediterranean Institute of Oceanography (MIO) within OT-Med, currently uses N and P measurements at river mouths, e.g. for the Rhône.

In order to estimate the impacts of global change on the functioning of marine ecosystems, the project aims at modeling the dependency of N and P outflows to the Mediterreanean sea toward land management. Land management is modelled as part of the agro-ecosystem model LPJmL (Bondeau et al., 2007), that has been especially adapted to the Mediterranean cropping systems (Fader et al., 2015). Among others, LPJmL simulates the daily carbon and water cycles, and the river discharges to the sea. Following existing approaches in the scientific literature, the post-doc will implement the nutrient N and P transfer in LPJmL, covering the net nutrient inputs to the river catchments by accounting for the processes occurring at the agro-ecosystem level (N2 biological fixation, fertilization, atmospheric deposition) and the net food and feed imports. Since only a minor fraction of the net nutrient inputs from Mediterranean basins reaches the sea, the retention along the nutrient cascade will have to be added to the LPJmL river routing scheme, similarly to the method used by the Riverstrahler model. Once the nutrient transfers have been introduced into LPJmL, simulations will be validated using current climate and land use forcing for comparisons with the existing observations from river outlets. Finally, future conditions will be assessed by using the model with scenarios of changing regional climate and land use / land management.

Your application:

Applications should contain a suitable motivation letter describing your anticipated role in the project, a CV, a list of scientific publications and the names of at least two scientists that can be contacted for references. They must be sent to Ms. Gabriela Boéri (gabriela.boeri@imbe.fr). Please prepare your application as a single file in pdf-format.

Questions about the project or the position can be directed to Dr. Alberte Bondeau (alberte.bondeau@imbe.fr). The position will be filled as soon as a suitable candidate has been found – work should start soon after that date. The salary and contract conditions will be determined according to standards set by Aix-Marseille University – questions in this regard can be directed to Sophie Pekar (pekar@otmed.fr).





diff

Training Workshop for ENM studies (Cardiff University, UK)

Introduction to using BioVeL workflows for taxonomic refinement, biogeographic analysis, and species distribution modelling

The training workshop will teach the attendees in using the informatic tools and services developed by the BioVeL project to address research topics such as historical analyses, invasive species distribution modelling, endangered species distribution modelling, and dynamic modelling of ecologically related species. In particular, there will be  introductions to the BioVeL e-infrastructure, Taxonomic data cleaning, Taxonomic name resolution and synonym expansion, Ecological niche modelling, model testing, statistical analysis of GIS data, invasive and endangered species distribution modelling, historical comparison biodiversity from museum collections. more ...







diff

Estimating the cost of different strategies for measuring farmland biodiversity: Evidence from a Europe-wide field evaluation




diff

Towards a different attitude to uncertainty




diff

Assessing relative variable importance across different spatial scales: a two-dimensional wavelet analysis







diff

Gypsum Board Uses in Different Applications

Improvements are constantly made to gypsum board and innovation still is at the forefront of the industry’s mind.




diff

RSPCA chief describes ‘difficult tightrope’ of engaging in polarising debates

Chris Sherwood says the charity’s public profile can make it feel like a ‘goldfish bowl’