Threshold model of diffusion: An agent based simulation and a social network approach

Size: px
Start display at page:

Download "Threshold model of diffusion: An agent based simulation and a social network approach"

Transcription

1 Threshold model of diffusion: An agent based simulation and a social network approach Suk-ho Kang, Wonchang Hur. Jeehong Kim, and Daeyoung Kim Abstract Innovation diffusion is a social process in which an innovation is adopted by the members of a social system. But, why some diffusion processes do precipitate bandwagon dynamics and others fail to do? In addressing this question, we considered a threshold model of diffusion. We particularly focus on the patterns of threshold arrangement: how individuals are arrayed over a given network topology. Employing a multi-agent simulation based on a threshold model of diffusion, we found that the model always results in the one of the two following states irrespective of the randomly varying diffusion networks; almost all the adopters will participate in adoption or only the small part of them will do so. In addition, we proposed 10 measures capturing the patterns in which individual threshold levels are associated with its topological features in the given network. From the regression analysis, it turns out that the nodes located closer to the innovators play a critical role in promoting diffusion. Keywords Agent based simulation, diffusion, social network, threshold model, centrality I I. INTRODUCTION NNOVATION diffusion is a social process in which an innovation is adopted by the members of a social system. Diffusion studies have provided many substantive examples showing that most successful innovations have an S-shaped rate of adoption [1]. The increasing rate of diffusion in the early period and the subsequent decreasing rate in the later period are characterized as snowball effect or chain reaction [2]. The chain reaction indicates the effect of interpersonal communication on the process of diffusion, the nature of which is a positive feedback loop: increases in the number of adopters create stronger pressures, and stronger pressures, in turn, cause increases in the number of adopters [3]. An interesting concept regarding this chain reaction of diffusion process is the critical mass. The notion of critical mass originated in physics, where it was defined as the amount Suk-ho Kang is with the Department of Industrial Engineering, Seoul National University, 599 Gwanak-ro, Gwanak-gu, Seoul , Republic of Korea (corresponding author. phone: ; fax: ; shkang@snu.ac.kr). Wonchang Hur is with College of Business Administration, Inha University 253 Yonghyun-dong, Nam-gu, Incheon , Republic of Korea ( wchur@inha.ac.kr). Jeehong Kim is with the Department of Industrial Engineering, Seoul National University, 599 Gwanak-ro, Gwanak-gu, Seoul , Republic of Korea ( jivong97@snu.ac.kr). Daeyoung Kim is with the Department of Industrial Engineering, Seoul National University, 599 Gwanak-ro, Gwanak-gu, Seoul , Republic of Korea ( kdy555@snu.ac.kr). of radioactive material necessary to produce a nuclear reaction [4], [5]. In the context of diffusion studies, the critical mass occurs at the point at which enough individuals in a system have adopted an innovation so that the innovation s further rate of adoption becomes self-sustaining [1]. Due to the chain reaction, there is, after the small number of system members adopts an innovation, relatively rapid adoption by the remaining members and then a period in which the holdouts finally adopt [2]. This paper raises the following questions on these features of diffusion dynamics; what are the key factors to instigate the positive feedback loop that makes diffusion self-sustaining? And how they are related to the other part of the system? Although these questions are fundamental to understanding why some diffusion processes do precipitate bandwagon dynamics and others fail to do, they are not largely explored in the diffusion literature. This paper employs a multi-agent simulation based on a threshold model of diffusion. Threshold models are important in diffusion studies because it can easily describe a complex interdependency of individual decisions over time. Based on the threshold hypothesis, we consider a large number of networks generated random rewiring of individuals of different characteristic. We particularly focus on the patterns of threshold arrangement: how individuals are arrayed over a given network topology. This is different from the topologies of network, which is only related to the shape of a network. Then we investigated under what conditions diffusion processes are able to reach the critical mass, that is, becomes self-sustaining. Our study reveals that the intricate combination of threshold heterogeneity and interdependency is a crucial factor affecting the bandwagon dynamics. The results carry interesting implications on the way different peoples are connected with each other and its effect on diffusion dynamics. II. THE RELATED LITERATURE An important diffusion model that can easily describe a diffusion mechanic like chain reaction is a threshold model. Threshold models assume that individuals take account of how many others are behaving in a particular way in making their own decisions about participating in the behavior. The crucial part of this assumption is that they have different thresholds that is, some individuals will adopt after only a small proportion of their alters has adopted, while others will not adopt until a large proportion of their alters has adopted [6]. As a result, the

2 distribution of thresholds in a population becomes a key factor closely linked to the mechanic of diffusion process and comes to affect significantly the final extent of the diffusion process. In fact, Reference [7] demonstrated mathematically that a slight perturbation of the threshold distribution sometimes generates entirely different level of participation. In this way, threshold models provide an important explanatory mechanism on why diffusion causes a chain reaction to start and various proportions of a collectivity s members to adopt. The threshold concept has been adapted, extended, and incorporated frequently into many later diffusion models as an important theoretical background for them. For example, [4] points out the problem of identifying individual thresholds which requires detailed knowledge of the individual expected rate of return on investments in public goods. In order to address this problem, the authors introduce a stochastic learning model in which individual thresholds are not deterministic. In the model, the structural configuration of thresholds is treated in two stylized cases, strong ties and weak ties, and their simulation results support the strength-of-weak-ties hypothesis. Reference [8] tries to relax the assumption of non-reciprocal communication of classic threshold models, and points out that a person learns about his/her neighbors preferences, their willingness to participate, and does not directly respond to their actions. The author argues that people with low thresholds, who are highly predisposed toward participation, are affected much more by social position than people with high thresholds. The author also shows that how strong links can be better for participation when thresholds are low and weak links can be better when thresholds are high. The model is well aligned with our intuition that whether a low-threshold person participates or not depends greatly on whether that person happens to have some sympathetic friends, while a high-threshold person participates only if a great mass of people participate. Reference [3], by employing a core-periphery network, highlights the role of boundary agents. The study introduces the two important concepts, boundary pressure point (agents with high threshold and high connectivity) and boundary weakness (agents with low threshold and low connectivity), and proposes that they have relatively greater effect on diffusion extent, particularly in lower-density networks. Most of these models relax the original model s assumption that an actor s decision to join a social movement has the same effect on all other actors in the social system. This relaxation of the restrictive assumption allows them to analyze the structural effect, the effect of preexisting social networks linking the actors in which the flow of influence is restricted and channeled. The difference between the models largely reflects differences in the theoretical understanding of how the structural arrangement of social ties into a network affects social influence. One recent work by [9] advances this issue further into the more sophisticated level. In contrast to previous work on the structural configuration of networks, the author focuses on how thresholds are arrayed across a network and shows that it can profoundly affect diffusion dynamics. The author, from abstract computational experiments, finds that a balance of similar and dissimilar thresholds is important in maximizing participation. That is, the optimal distribution of thresholds across networks would be a pattern where agents associate with a certain proportion of others with similar threshold values while keeping a certain level of friendship with others of discrepant thresholds. Our work starts from the same motivation of his work, but differs significantly from it in several points. First, we assume a normal distribution of threshold distributions rather than the quasi-uniform distribution adopted by many previous models. Although there has been little evidence on the exact distribution of threshold, it is generally accepted that thresholds are positively associated with the time-of-adoption which is found to be follow a bell-shaped distribution. Second, we consider scale-free network, which has more empirical supports as a stylized model for many real world social networks, but has not been treated much in the network threshold models. Most important, our work takes a more exhaustive approach than the previous works. We consider all the possible threshold arrangements over given network topologies rather than generate networks with intended arrangement patterns. We undertake statistical analysis for these exhaustive enumerations of arrangement patterns and seek to find any patterns that may be related with the diffusion dynamics. III. THE MODEL Consider a process in which a certain product diffuses across a social network of potential adopters. Each adopter in the network makes a decision of whether to adopt the product based on a simple condition; whether the proportion of adopters among his (or her) network peers at time t is above his or her threshold. Previous diffusion research has conceptualized the proportion of adopters among network peers as exposure, which represents a level of peer pressure imposed on a potential adopter. Thus the adoption condition implies that adoption occurs when peer pressure on an adopter exceeds threshold. The decision rule is described in Table 1. In the table, n i is the number of neighbors in the network, θ i the threshold of agent i, and n i_a_a (t) the number of adjacent adopters that have adopted the product A at time t. Unlike the original model, we assume that influence flow among agents is restricted by the structure of a preexisting social network. That is, each agent adopts the product when the proportion of agents who have already adopted among network peers is above his/her threshold. The agents threshold values are assumed to be determined from a normal distribution. We assume that the distribution parameters, μ and σ, are not independent. This is intended to have the fixed proportion of TABLE I DECISION RULE Adoption criteria Adoption result n i_a_a(t) n i_* θ i Adopt A n i_a_a(t) n i_* θ i Don t adopt

3 Fig. 1. Two same networks with different threshold arrangement 0-threhold agents in the population regardless of the threshold distribution. We consider 2.5% of the population as the initial adopters. This percentage is borrowed from the adopter categorization by [1], in which he reportedly says that the category that adopts at the earliest time makes up about 2.5% of the population. That is, diffusion starts from the 2.5% of the population (initiators, hereafter) and stops when there are no additional adopters. The model output, the diffusion extent, is thus the number of adopter when diffusion stops. The diffusion extent is determined from 3 variables; threshold distribution, network topology, and threshold arrangement. Threshold arrangement refers to a way in which agents are arrayed over a given network. It is important to understand that even when threshold distribution and network topology is fixed, the arrangement patterns can be varied substantially and the model produces a completely different outcome depending on the pattern. The following example demonstrates the effect of the arrangement pattern. In Fig. 1, there are two different networks of 4 agents; their thresholds are 0%, 30%, 30%, and 60%, respectively. Although the two networks are of the exactly same topological type, we can see that their diffusion outcomes are completely different diffusion extent of the left is 1, but the right is 4. Notice that although threshold re-arrangement (hereafter rewiring) does not change the network-level topological features, it does changes the micro-structure of how individuals interact with each other. That is, although rewiring does not change degree distribution, network centralization, clustering coefficients, or many other network-level features, it does change individual neighbors profile in terms of their threshold values. That is, the difference in diffusion extent will be caused by the difference in the relative position of adopters in the given network. This means that the factors affecting diffusion should be able to capture the characteristics in how adopters are distributed and positioned in a given network topology and the patterns that individual thresholds are correlated with the topological features. In order to examine the characteristics of the diffusion process, an agent-based model that simulates the specified adoption behavior has been built. For simulation, we first create a population of 1,000 potential adopters and their threshold values were assigned from a normal distribution. We vary threshold distribution by varying its μ from 0.25 to 0.4. For network topology, we considered 3 random networks and 3 scale-free networks with varying average degrees. For each network topology, simulation was conducted on 1,000 different threshold arrangements generated by rewiring the adopters randomly under a given network topological type. Note that only one outcome is obtained from one network setting since the adoption process is deterministic. Fig. 2 shows the effect of threshold distributions on the diffusion extent. The y axis denotes the average diffusion extents obtained from the different arrangement. Expectedly, as μ increases, the average of diffusion extents tends to decrease. When μ is large enough (e.g. μ > 0.4 in case of random networks), the diffusion extents become always 0%. Similarly, when μ is small enough, diffusion reaches 100% regardless of the thresholds arrangement. That is, there is a range of μ in which the diffusion extents can vary depending on how thresholds are arrayed over the networks. Then, we examine how the diffusion extent varies depending on the threshold arrangements when μ is given in the range. Fig. 3 shows the distribution of the diffusion extents resulted from simulation on 1,000 diffusion networks when μ is 0.35 and σ is From the previous graphs, we see that when population thresholds follow a normal distribution with μ=0.35 and σ=0.18, the average extents are about 20% ~ 40% depending on the network types. But Fig. 3 shows that its distribution is clearly bifurcated. That is, even though the population threshold has a fixed distribution, diffusion will result in one of the two extreme cases depending on how threshold are arranged over the given network; almost all the adopters (more than 95%) will participate in adoption or only the small part of them (less than 30%) will do so. It is surprising that there are no such cases that 50% ~ 60% of individuals adopt the behavior at the end of simulation although diffusion networks were rewired randomly. Fig. 2. Diffusion extent according to threshold distributions

4 Fig. 3. Distribution of diffusion extents (θ ~ N (0.35, 0.18)) The finding raises two significant questions. First, why does the diffusion extent always fall into one of the two extreme ranges, that is, above 95% or below 30%? It is certain from the result that once a small portion of adopters (about 20~30% in this setting) participates in the behavior, then all the remaining members will eventually follow them. This finding is consistent with the well-known theory of the critical mass from the literature on social dynamics. The theory postulates that collective actions characterized by population heterogeneity and interdependence, which are well captured in our behavior model, are often activated by the small portion of early movers. From the perspective of the critical mass theory, we can consider the 10~20% early adopters as the critical mass of participants that has to be crossed in order for perfect adoption to occur. Our simulation proves that the small part of the population does lead to the unanimous action, and shows how such behavioral dynamics can be derived from the simple behavior rules. The second question, which this paper lays more focus on, is what factors contribute to perfect diffusion? Regarding this question, it is important to understand that a network s initial topology remains unchanged during the rewiring process. That is, 1,000 diffusion networks, although their diffusion outcomes are completely bifurcated, are almost identical in terms of their topological features. For instance, when a network is given, we can create another network by simply relocating nodes in the given network. Notice that the new network generated this way is isomorphic to the original one, meaning that these two networks are exactly same in every topological feature. However diffusion outcomes on these two networks can be significantly different because the way nodes interact with each other is different in each network despite their topological isomorphism. IV. FACTORS CONTRIBUTING TO PERFECT DIFFUSION So far we have described the diffusion model and investigated its behavior. Although the proposed model is based on a quite simple behavior rule, it generates the results that cannot be easily explained. Why does the diffusion extents are bifurcated depending on the pattern of threshold arrangement? This result suggests that there are a certain proportion of agents that should be crossed over in order for diffusion to reach the whole population. In other words, once diffusion reaches the proportion, it then continues like a self-sustaining chain reaction process leading to the almost perfect adoption regardless of how the remaining agents are arranged. Therefore we need to explain when diffusion can establish the necessary initial contributors. The simulation results suggest that there are particular ways of arranging agents according to their thresholds, which are advantages for establishing the initial adopters sufficiently for precipitating the self-sustaining chain-reaction. There are some important facts that must be related with the role of threshold arrangement in diffusion. First, diffusion starts from the 2.5% initiators so the initial adopters should be located around them. Second, low-threshold nodes are likely to adopt earlier than others so it is advantageous for them to be placed near the initiators. Third, some nodes are topologically critical in promoting diffusion. From these facts, it is supposed that following factors are likely to be associated with promoting diffusion. A. Position of the starting nodes The simulation result shows how initial contributions can precipitate a chain reaction that may ultimately spread to every member of the group [4]. Since diffusion starts from the initiators, where and how they are located in a network should have a significant effect on the diffusion outcome. We assume that it would enhance diffusion if initiators are evenly dispersed over a network to cover a wider area in a cooperative way B. Threshold values of nodes located close to the starting nodes Since diffusion proceeds along the path from initiators, nodes closer to them are considered as candidates for prospective adopters earlier than others. Since exposure must be low in the early time, if they have high thresholds it is unlikely that they become adopters. This should blockade the path from initiators to other nodes in a network and then the overall diffusion process is likely to be deterred. In this respect, we can hypothesize that it would be advantageous that agents with low threshold are located near the initiators, and, similarly, agents with higher thresholds are located farther from them. If a diffusion network is structured in that way, then adopters thresholds becomes monotonically increasing from the nearest initiators to other nodes.

5 TABLE 2 MEASURES FOR A DIFFUSION NETWORK Factors Measures Meaning Thresholds according to a node s distance to the starting node Position of the initiators Thresholds according to a node s centrality M1. Average thresholds of nodes adjacent to the initiators M2. Average thresholds of nodes at 2-edges apart from the initiators M3. Average thresholds of nodes at 3-edges apart from the initiators M4. Average degrees of the initiators M5. Average closeness of the initiators M6. Average betweenness of the initiators M7. Average distances between the initiators M8. Correlation between degree and threshold M9. Correlation between closeness and threshold M10. Correlation between betweenness and threshold Whether early adopters are located close to the initiators? The coverage and distribution of the starting nodes Whether central positions play an expected role of promoting diffusion? C. Threshold values of nodes with high centrality In addition to nodes closer to initiators, central nodes must be also important for promoting diffusion. Central nodes are those that are extensively involved in relationship with others. These nodes have high level of access to others and play an important role of brokering information from one part of a network to the other. Hence, it is important that highly central nodes have low thresholds so that they adopt early and help adoption expand to a wider area. Based on the discussion so far, we consider the following measures for the abovementioned factors. Table 2 provides a brief description of those measures with the equations to calculate them. V. RESULTS Employing factors as independent variables, we performed a Probit regression to examine their effects on diffusion. As a dependent variable, we employ a binary variable P indicating whether the diffusion extent was over 90% or not. Table 3 shows the regression results, which clearly indicate that when the neighbors of initiators (M1) and these agents neighbors (M2) have low thresholds, the extent of diffusion can be significantly enhanced. The tables show that only M1 and M2 were consistently significant regardless of k and μ. This implies that the most significant factor affecting diffusion extents is the average threshold of the agents who are incident to or located closer to the initiators. Clustering of low-threshold agents around the initiators facilitates the formation of groups of early adopters, who spread their influence across the network. This implication pertains to both random networks and scale-free networks. Other variables, by contrast, turned out to be mostly insignificant. Two exceptions are M4 and M8 in some scale-free networks. It is known that in scale-free networks, the degree distribution follows a power law, which means that the vast majority of nodes are those with small degrees, with only a few having relatively high degrees. The highest-degree nodes are often called "hubs", and are thought to serve specific purposes in diffusion. Our results imply that whether hubs have low thresholds or not is a significant factor affecting diffusion extension. VI. CONCLUSION In this paper we considered a generic threshold model of diffusion and explored how it behaviors under the various diffusion networks by using agent-based simulation. Despite its simplicity, the model has some interesting characteristics worth exploring. First, adopters are heterogeneous in that they have their own varying threshold levels. As a result, each adopter behaves differently even under the same level of exposure. Second, more importantly, adopters behave based on local information that comes only from their network partners; the adoption behavior of their network partners in a population. This implies that diffusion will be largely affected by the network structure of who is connected to whom in the given population.

6 TABLE 3 PROBIT ANALYSIS OF DIFFUSION NETWORK Random Network Degree μ Variable Estimate Standard Error Estimate Standard Error Estimate Standard Error Intercept M *** *** *** 5.86 M *** *** *** 9.90 M *** *** M *** 0.07 M ** 0.64 M M *** M ** M M Avg. extent R square Scale-free network Degree μ Variable Estimate Standard Error Estimate Standard Error Estimate Standard Error Intercept M *** *** *** 6.50 M *** *** *** M *** *** 6.70 M M *** 0.19 M M M *** ** M M Avg. extent R square Notes: ***Significant at p<0.01; **Significant at p<0.05; *Significant at p<0.10 These features of individual behavior, heterogeneity and locality, are generally believed to contribute to the unexpectedness of collective behavior considerably. Consistent with this expectation, the simulation results showed that the model always results in the one of the two following states irrespective of the randomly varying diffusion networks; almost all the adopters (more than 95%) will participate in adoption or only the small part of them (less than 30%) will do so. This result suggests the model s behaviors are consistent with the well-known hypotheses from the theory of the critical mass. In addition, we proposed 10 measures capturing the patterns in which individual threshold levels are associated with its topological features in the given network. From the regression analysis, it turns out that the nodes located closer to the innovators play a critical role in promoting diffusion. ACKNOWLEDGMENT This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(mest) (No ) REFERENCES [1] E. M. Rogers, Diffusion of Innovations, 5th edition, New York: Free Press, [2] A Nypan, Diffusion of innovation and community leadership in east Africa, Acta Sociologica, Vol. 13, No. 4, pp , [3] E. Abrahamson and L. Rosenkopf, Social network effects on the extent of innovation diffusion: A computer simulation, Organization Science, Vol. 8, No. 3, pp , May [4] M. W. Macy, Chains of Cooperation: Threshold Effects in Collective Action, American Sociological Review, Vol. 56, No. 6, pp , Dec [5] P. Oliver, G. Marwell and R. Teixeira, A Theory of the Critical Mass. I. Interdependence, Group Heterogeneity, and the Production of Collective Action, American Journal of Sociology, Vol. 91, No. 3, pp , Nov [6] D. Krackhardt, Organizational viscosity and the diffusion of controversial innovations, Journal of Mathematical Sociology, Vol. 22, No. 2, pp , 1997.

7 [7] M. Granovetter, Threshold models of collective behavior, The American Journal of Sociology, Vol. 83, No. 6, pp , May [8] M. S-Y. Chwe, Structure and Strategy in Collective Action, American Journal of Sociology, Vol. 105, No. 1. Jul [9] Y-S. Chiang,, Birds of moderately different feathers: Bandwagon dynamics and the threshold heterogeneity of network neighbors, Journal of Mathematical Sociology, Vol. 31, No. 1, pp , 2007

Targeting Individuals to Catalyze Collective Action in Social Networks

Targeting Individuals to Catalyze Collective Action in Social Networks Targeting Individuals to Catalyze Collective Action in Social Networks Marco A. Janssen 1 1 Center for the Study of Institutional Diversity School of Human Evolution and Social Change Arizona State University

More information

Introduction Social Network Analysis Presented by Kimberly A. Fredericks, Ph.D

Introduction Social Network Analysis Presented by Kimberly A. Fredericks, Ph.D Introduction Social Network Analysis Presented by Kimberly A. Fredericks, Ph.D What is Social Network Analysis? Network analysis is: > the study of social relations among a set of actors > a theoretical

More information

Influence of First Steps in a Community on Ego-Network: Growth, Diversity, and Engagement

Influence of First Steps in a Community on Ego-Network: Growth, Diversity, and Engagement Influence of First Steps in a Community on Ego-Network: Growth, Diversity, and Engagement Atef Chaudhury University of Waterloo Waterloo, ON N2L 3G1, Canada a29chaud@uwaterloo.ca Myunghwan Kim LinkedIn

More information

UTILIZING THE POSITIVE IMPACTS OF SOFTWARE PIRACY IN MONOPOLY INDUSTRIES

UTILIZING THE POSITIVE IMPACTS OF SOFTWARE PIRACY IN MONOPOLY INDUSTRIES UTILIZING THE POSITIVE IMPACTS OF SOFTWARE PIRACY IN MONOPOLY INDUSTRIES Jue Wang Department of Information Technology George Mason University 4400 University Drive Fairfax, VA, USA jwangi@masonlive.gmu.edu

More information

STATISTICAL TECHNIQUES. Data Analysis and Modelling

STATISTICAL TECHNIQUES. Data Analysis and Modelling STATISTICAL TECHNIQUES Data Analysis and Modelling DATA ANALYSIS & MODELLING Data collection and presentation Many of us probably some of the methods involved in collecting raw data. Once the data has

More information

NANOFIBER NANOCOMPOSITE FOR STRENGTHENING NOBLE LIGHTWEIGHT SPACE STRUCTURES

NANOFIBER NANOCOMPOSITE FOR STRENGTHENING NOBLE LIGHTWEIGHT SPACE STRUCTURES NANOFIBER NANOCOMPOSITE FOR STRENGTHENING NOBLE LIGHTWEIGHT SPACE STRUCTURES N.M. Awlad Hossain Assistant Professor Department of Engineering and Design EASTERN WASHINGTON UNIVERSITY Cheney, WA 99004 Email:

More information

Bargaining and Power in Networks

Bargaining and Power in Networks Chapter 12 Bargaining and Power in Networks In our analysis of economic transactions on networks, particularly the model in Chapter 11, we considered how a node s position in a network affects its power

More information

Modeling of competition in revenue management Petr Fiala 1

Modeling of competition in revenue management Petr Fiala 1 Modeling of competition in revenue management Petr Fiala 1 Abstract. Revenue management (RM) is the art and science of predicting consumer behavior and optimizing price and product availability to maximize

More information

TIMETABLING EXPERIMENTS USING GENETIC ALGORITHMS. Liviu Lalescu, Costin Badica

TIMETABLING EXPERIMENTS USING GENETIC ALGORITHMS. Liviu Lalescu, Costin Badica TIMETABLING EXPERIMENTS USING GENETIC ALGORITHMS Liviu Lalescu, Costin Badica University of Craiova, Faculty of Control, Computers and Electronics Software Engineering Department, str.tehnicii, 5, Craiova,

More information

Process Condition Optimization for Plastic Membrane Welding by a Ultrasonic Welding

Process Condition Optimization for Plastic Membrane Welding by a Ultrasonic Welding Process Condition Optimization for Plastic Membrane Welding by a Ultrasonic Welding Nam Hoon Jo BS. Scholar, Department of Mechanical Engineering, Graduate School Kongju National University (KNU), South

More information

Discussion of. Financial Reporting Frequency, Information Asymmetry, and the Cost of Equity. Rodrigo S. Verdi*

Discussion of. Financial Reporting Frequency, Information Asymmetry, and the Cost of Equity. Rodrigo S. Verdi* Discussion of Financial Reporting Frequency, Information Asymmetry, and the Cost of Equity Rodrigo S. Verdi* rverdi@mit.edu Fu, Kraft and Zhang (2012) use a hand-collected sample of firms with different

More information

Diffusion of Innovations:

Diffusion of Innovations: southwestlearning.org greateryellowstonescience.org Intermountain Region Diffusion of Innovations: A Theoretical Framework for Understanding how Scientific Knowledge and Technology are Adopted by Managers.

More information

CARBON NANOTUBE GRAFTED CARBON FIBERS: OPTIMUM PROCESS

CARBON NANOTUBE GRAFTED CARBON FIBERS: OPTIMUM PROCESS CARBON NANOTUBE GRAFTED CARBON FIBERS: OPTIMUM PROCESS Kyoung Ju Kim 1, Jeong Min Lee 1, Ji Ho Youk 2, Woong-Ryeol Yu 1 * 1 Department of Materials Science and Engineering, Seoul National University, 599

More information

Price competition in a differentiated products duopoly under network effects

Price competition in a differentiated products duopoly under network effects Price competition in a differentiated products duopoly under network effects Krina Griva Nikolaos Vettas February 005 Abstract We examine price competition under product-specific network effects, in a

More information

Organizational Behavior and Organizational Change Groups & Teams. Roger N. Nagel Senior Fellow & Wagner Professor.

Organizational Behavior and Organizational Change Groups & Teams. Roger N. Nagel Senior Fellow & Wagner Professor. Organizational Behavior and Organizational Change Groups & Teams Roger N. Nagel Senior Fellow & Wagner Professor 1 Topics in this Presentation Why people join groups The Five-Stage Model of Group Development

More information

VALUE OF SHARING DATA

VALUE OF SHARING DATA VALUE OF SHARING DATA PATRICK HUMMEL* FEBRUARY 12, 2018 Abstract. This paper analyzes whether advertisers would be better off using data that would enable them to target users more accurately if the only

More information

Three essays on social networks and the diffusion of innovation models

Three essays on social networks and the diffusion of innovation models University of Iowa Iowa Research Online Theses and Dissertations Summer 2014 Three essays on social networks and the diffusion of innovation models Tae-Hyung Pyo University of Iowa Copyright 2014 Tae-Hyung

More information

Can Firms Perform Without Good HR Practices and Inspiring Leaders?

Can Firms Perform Without Good HR Practices and Inspiring Leaders? Cornell University ILR School DigitalCommons@ILR Center for Advanced Human Resource Studies () 8-2013 Can Firms Perform Without Good HR Practices and Inspiring Leaders? Christopher J. Collins Cornell University,

More information

But, there is a difference in the diffusion of Innovations/Information Infections People

But, there is a difference in the diffusion of Innovations/Information Infections People Diffusion of Innovations Diffusion is the process by which an Innovation is Communicated through certain Channels over Time among the members of a Social System. Source: The Diffusion of Innovations Model

More information

Price Discrimination through Corporate Social Responsibility

Price Discrimination through Corporate Social Responsibility Price Discrimination through Corporate Social Responsibility Suman Ghosh Kameshwari Shankar Abstract A common form of Corporate Social Responsibility (CSR) by firmsistoagreetodonatea fixed portion of private

More information

The Management of Marketing Profit: An Investment Perspective

The Management of Marketing Profit: An Investment Perspective The Management of Marketing Profit: An Investment Perspective Draft of Chapter 1: A Philosophy of Competition and An Investment in Customer Value Ted Mitchell, May 1 2015 Learning Objectives for Chapter

More information

What STIRPAT tells about effects of population and affluence on environmental impact?

What STIRPAT tells about effects of population and affluence on environmental impact? What STIRPAT tells about effects of population and affluence on environmental impact? Taoyuan Wei 1 July 21, 2010 Abstract In the literature of STIRPAT application to environmental impacts of population

More information

Deterministic Crowding, Recombination And Self-Similarity

Deterministic Crowding, Recombination And Self-Similarity Deterministic Crowding, Recombination And Self-Similarity Bo Yuan School of Information Technology and Electrical Engineering The University of Queensland Brisbane, Queensland 4072 Australia E-mail: s4002283@student.uq.edu.au

More information

A Continuous Strategy Game for Power Transactions Analysis in Competitive Electricity Markets

A Continuous Strategy Game for Power Transactions Analysis in Competitive Electricity Markets IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 16, NO. 4, NOVEMBER 2001 847 A Continuous Strategy Game for Power Transactions Analysis in Competitive Electricity Markets Jong-Bae Park, Balho H. Kim, Jin-Ho Kim,

More information

The Construction of the Green Supply System based on Game Theory

The Construction of the Green Supply System based on Game Theory 211 International Conference on Social Science and Humanity IPEDR vol.5 (211) (211) IACSIT Press, Singapore The Construction of the Green Supply System based on Game Theory Jia Liu, Nan Liu, Yao Li School

More information

Chapter 8: Exchange. 8.1: Introduction. 8.2: Exchange. 8.3: Individual A s Preferences and Endowments

Chapter 8: Exchange. 8.1: Introduction. 8.2: Exchange. 8.3: Individual A s Preferences and Endowments Chapter 8: Exchange 8.1: Introduction In many ways this chapter is the most important in the book. If you have time to study just one, this is the one that you should study (even though it might be a bit

More information

The role of social capital in the job-related regional mobility decisions of unemployed individuals

The role of social capital in the job-related regional mobility decisions of unemployed individuals The role of social capital in the job-related regional mobility decisions of unemployed individuals Tagung Soziale Beziehungen und soziales Kapital in kritischen Lebensphasen Sebastian Bähr Martin Abraham

More information

Use of AHP Method in Efficiency Analysis of Existing Water Treatment Plants

Use of AHP Method in Efficiency Analysis of Existing Water Treatment Plants International Journal of Engineering Research and Development ISSN: 78-067X, Volume 1, Issue 7 (June 01), PP.4-51 Use of AHP Method in Efficiency Analysis of Existing Treatment Plants Madhu M. Tomar 1,

More information

Why do Employees (Not) Make Referrals?

Why do Employees (Not) Make Referrals? Why do Employees (Not) Make Referrals? Guido Friebel (Frankfurt, CEPR, IZA) Matthias Heinz (Cologne, CEPR) Mitchell Hoffman (Toronto, NBER) Nick Zubanov (Konstanz, IZA) Empirical Management Conference

More information

COORDINATING DEMAND FORECASTING AND OPERATIONAL DECISION-MAKING WITH ASYMMETRIC COSTS: THE TREND CASE

COORDINATING DEMAND FORECASTING AND OPERATIONAL DECISION-MAKING WITH ASYMMETRIC COSTS: THE TREND CASE COORDINATING DEMAND FORECASTING AND OPERATIONAL DECISION-MAKING WITH ASYMMETRIC COSTS: THE TREND CASE ABSTRACT Robert M. Saltzman, San Francisco State University This article presents two methods for coordinating

More information

GENETIC ALGORITHMS. Narra Priyanka. K.Naga Sowjanya. Vasavi College of Engineering. Ibrahimbahg,Hyderabad.

GENETIC ALGORITHMS. Narra Priyanka. K.Naga Sowjanya. Vasavi College of Engineering. Ibrahimbahg,Hyderabad. GENETIC ALGORITHMS Narra Priyanka K.Naga Sowjanya Vasavi College of Engineering. Ibrahimbahg,Hyderabad mynameissowji@yahoo.com priyankanarra@yahoo.com Abstract Genetic algorithms are a part of evolutionary

More information

CHAPTER 8 T Tests. A number of t tests are available, including: The One-Sample T Test The Paired-Samples Test The Independent-Samples T Test

CHAPTER 8 T Tests. A number of t tests are available, including: The One-Sample T Test The Paired-Samples Test The Independent-Samples T Test CHAPTER 8 T Tests A number of t tests are available, including: The One-Sample T Test The Paired-Samples Test The Independent-Samples T Test 8.1. One-Sample T Test The One-Sample T Test procedure: Tests

More information

The Performance Effects of Entrepreneurial Orientation: Evidence from South Korean Start-ups

The Performance Effects of Entrepreneurial Orientation: Evidence from South Korean Start-ups The Performance Effects of Entrepreneurial Orientation: Evidence from South Korean Start-ups Hyunjoong Yoon, Ph. D. Visiting Researcher, Institutes of Labor Relations, College of Business Administration,

More information

Econ 792. Labor Economics. Lecture 6

Econ 792. Labor Economics. Lecture 6 Econ 792 Labor Economics Lecture 6 1 "Although it is obvious that people acquire useful skills and knowledge, it is not obvious that these skills and knowledge are a form of capital, that this capital

More information

Taiwan Internet Diffusion: An Empirical Study of Internet Interactive Effects

Taiwan Internet Diffusion: An Empirical Study of Internet Interactive Effects Taiwan Internet Diffusion: An Empirical Study of Internet Interactive Effects Hsiang-Chi Huang FIND-ECRC Institute for Information Industry Taipei, Taiwan illusion@iii.org.tw Abstract The primary objects

More information

Financial Market - A Network Perspective

Financial Market - A Network Perspective Financial Market - A Network Perspective Jukka-Pekka Onnela 1, Jari Saramäki 1, Kimmo Kaski 1, and János Kertész 2 1 Laboratory Computational Engineering, Helsinki University of Technology, P.O.Box 9203,

More information

Classroom Probability Simulations Using R: Margin of Error in a Public Opinion Poll

Classroom Probability Simulations Using R: Margin of Error in a Public Opinion Poll Classroom Probability Simulations Using R: Margin of Error in a Public Opinion Poll Outstanding Professor Address, Part 2 Fall Faculty Convocation (9/21/04) Bruce E. Trumbo Department of Statistics, CSU

More information

Limits of Software Reuse

Limits of Software Reuse Technical Note Issued: 07/2006 Limits of Software Reuse L. Holenderski Philips Research Eindhoven c Koninklijke Philips Electronics N.V. 2006 Authors address: L. Holenderski WDC3-044; leszek.holenderski@philips.com

More information

Signaling and Screening: Theory and Evidence Ec 423. Labour Economics Lent Term 2009

Signaling and Screening: Theory and Evidence Ec 423. Labour Economics Lent Term 2009 Papers: Stigliz Spence Lang and Kropp Signaling and Screening: Theory and Evidence Ec 423. Labour Economics Lent Term 2009 Spence, QJE 1973 Job Market Signaling The big point: If there is a heterogeneity

More information

Marketing Accountability

Marketing Accountability Marketing Accountability Critical success factors for greater marketing effectiveness and efficiency Marketing is increasingly under pressure to make the most of its brands, its investments, and its organization.

More information

A Markov Model of Referral Based Hiring and Workplace Segregation

A Markov Model of Referral Based Hiring and Workplace Segregation A Markov Model of Referral Based Hiring and Workplace Segregation Troy Tassier Department of Economics Fordham University and Center for the Study of Complex Systems University of Michigan e-mail: ttassier@umich.edu

More information

POINT ELASTICITY VERSUS ARC ELASTICITY: ON DIFFERENT APPROACHES TO TEACHING ELASTICITY IN PRINCIPLES COURSES

POINT ELASTICITY VERSUS ARC ELASTICITY: ON DIFFERENT APPROACHES TO TEACHING ELASTICITY IN PRINCIPLES COURSES POINT ELASTICITY VERSUS ARC ELASTICITY: ON DIFFERENT APPROACHES TO TEACHING ELASTICITY IN PRINCIPLES COURSES Dmitry Shishkin, Georgia Gwinnett College Andrei Olifer, Georgia Gwinnett College ABSTRACT While

More information

Analyzing Choice with Revealed Preference: Is Altruism Rational?

Analyzing Choice with Revealed Preference: Is Altruism Rational? Analyzing Choice with Revealed Preference: Is Altruism Rational? by James Andreoni Department of Economics University of Wisconsin Madison, Wisconsin 53706 and John H. Miller Department of Social and Decision

More information

Physical Appearance in Retail Service: Impact on Customer Loyalty and Experience

Physical Appearance in Retail Service: Impact on Customer Loyalty and Experience Johnson & Wales University ScholarsArchive@JWU MBA Student Scholarship Graduate Studies Summer 2017 Physical Appearance in Retail Service: Impact on Customer Loyalty and Experience Sin Jie Jiang Johnson

More information

Bargaining in technology markets: An empirical study of biotechnology alliances

Bargaining in technology markets: An empirical study of biotechnology alliances Bargaining in technology markets: An empirical study of biotechnology alliances Shinya Kinukawa Komazawa University Kazuyuki Motohashi University of Tokyo September 7, 2009 Abstract The division of innovative

More information

SUGARCANE IRRIGATION SCHEDULING IN PONGOLA USING PRE-DETERMINED CYCLES

SUGARCANE IRRIGATION SCHEDULING IN PONGOLA USING PRE-DETERMINED CYCLES SUGARCANE IRRIGATION SCHEDULING IN PONGOLA USING PRE-DETERMINED CYCLES N L LECLER 1 and R MOOTHILAL 2 1 South African Sugar Association Experiment Station, P/Bag X02, Mount Edgecombe, 4300, South Africa.

More information

An Empirical Study on the Effect of Work/Life Commitment to Work-Life Conflict

An Empirical Study on the Effect of Work/Life Commitment to Work-Life Conflict Available online at www.sciencedirect.com Physics Procedia 24 (2012) 1343 1349 2012 International Conference on Applied Physics and Industrial Engineering An Empirical Study on the Effect of Work/Life

More information

Copyright 2016 The William Averette Anderson Fund 501(c)(3)

Copyright 2016 The William Averette Anderson Fund 501(c)(3) Mentee Guide Table of Contents BAF Background... 2 BAF Mentoring Program... 2 Defining Mentoring... 3 Being an Effective Mentee... 4 Key Considerations for Prospective Mentees... 5 Next Steps... 8 The

More information

Designing an Effective Scheduling Scheme Considering Multi-level BOM in Hybrid Job Shop

Designing an Effective Scheduling Scheme Considering Multi-level BOM in Hybrid Job Shop Proceedings of the 2012 International Conference on Industrial Engineering and Operations Management Istanbul, Turkey, July 3 6, 2012 Designing an Effective Scheduling Scheme Considering Multi-level BOM

More information

Intelligently Choosing Testing Techniques

Intelligently Choosing Testing Techniques Intelligently Choosing Testing Techniques CS 390: Software Engineering Dr. Hwang By: Jonathan Bach October 28, 2008 1 The ability for a company to produce a complicated, high quality, problem free product

More information

Finding the Worst Case Location in Your Sterilization Load Just Got Easier

Finding the Worst Case Location in Your Sterilization Load Just Got Easier OLOGICAL INDICATOR SPECIALISTS TM Volume, Number 6 November 2008 Finding the Worst Case Location in Your Sterilization Load Just Got Easier John R. Gillis, Ph.D. President The last Spore News addressed

More information

Predicting user rating for Yelp businesses leveraging user similarity

Predicting user rating for Yelp businesses leveraging user similarity Predicting user rating for Yelp businesses leveraging user similarity Kritika Singh kritika@eng.ucsd.edu Abstract Users visit a Yelp business, such as a restaurant, based on its overall rating and often

More information

The Economic and Social Review, Vol. 33, No. 1, Spring, 2002, pp Portfolio Effects and Firm Size Distribution: Carbonated Soft Drinks*

The Economic and Social Review, Vol. 33, No. 1, Spring, 2002, pp Portfolio Effects and Firm Size Distribution: Carbonated Soft Drinks* 03. Walsh Whelan Article 25/6/02 3:04 pm Page 43 The Economic and Social Review, Vol. 33, No. 1, Spring, 2002, pp. 43-54 Portfolio Effects and Firm Size Distribution: Carbonated Soft Drinks* PATRICK PAUL

More information

Three Dimensional Interpretations of the Korean Housing Market: Structural Relationships among Sales, Chonsei, and Monthly Rent Markets

Three Dimensional Interpretations of the Korean Housing Market: Structural Relationships among Sales, Chonsei, and Monthly Rent Markets Three Dimensional Interpretations of the Korean Housing Market: Structural Relationships among Sales, Chonsei, and Monthly Rent Markets Lee, Chang-Moo Professor, Department of Urban Planning, Hanyang University

More information

Creating a Competency Model that Works

Creating a Competency Model that Works White Paper LEADERSHIP DEVELOPMENT Creating a Competency Model that Works The good, the bad, and the ugly A clear perspective on what can be done to make a competency model not only more memorable, but

More information

Generative Models for Networks and Applications to E-Commerce

Generative Models for Networks and Applications to E-Commerce Generative Models for Networks and Applications to E-Commerce Patrick J. Wolfe (with David C. Parkes and R. Kang-Xing Jin) Division of Engineering and Applied Sciences Department of Statistics Harvard

More information

Seminar Data & Web Mining. Christian Groß Timo Philipp

Seminar Data & Web Mining. Christian Groß Timo Philipp Seminar Data & Web Mining Christian Groß Timo Philipp Agenda Application types Introduction to Applications Evaluation 19.07.2007 Applications 2 Overview Crime enforcement Crime Link Explorer Money laundering

More information

Characteristics of the Transformation of China s Economic Growth Pattern and the Empirical Analysis of the Paths of the Transformation.

Characteristics of the Transformation of China s Economic Growth Pattern and the Empirical Analysis of the Paths of the Transformation. ISSN 1749-3889 (print), 1749-3897 (online) International Journal of Nonlinear Science Vol.12(2011) No.1,pp.100-104 Characteristics of the Transformation of China s Economic Growth Pattern and the Empirical

More information

Ontology-Based Model of Law Retrieval System for R&D Projects

Ontology-Based Model of Law Retrieval System for R&D Projects Ontology-Based Model of Law Retrieval System for R&D Projects Wooju Kim Yonsei University 50 Yonsei-ro, Seodaemun-gu, Seoul, Republic of Korea +82-2-2123-5716 wkim@yonsei.ac.kr Minjae Won INNOPOLIS Foundation

More information

Unit 2 Economic Models: Trade-offs and Trade

Unit 2 Economic Models: Trade-offs and Trade Unit 2 Economic Models: Trade-offs and Trade Objectives Why models simplified representations of reality play a crucial role in economics Two simple but important models: the production possibility frontier

More information

Economic Analysis of Korea Green Building Certification System in the Capital Area Using House-Values Index

Economic Analysis of Korea Green Building Certification System in the Capital Area Using House-Values Index Economic Analysis of Korea Green Building Certification System in the Capital Area Using House-Values Index Kiyoung Son 1, Sungho Lee 2, Chaeyeon Lim 3 and Sun-Kuk Kim* 4 1 Assistant Professor, School

More information

Three Research Approaches to Aligning Hogan Scales With Competencies

Three Research Approaches to Aligning Hogan Scales With Competencies Three Research Approaches to Aligning Hogan Scales With Competencies 2014 Hogan Assessment Systems Inc Executive Summary Organizations often use competency models to provide a common framework for aligning

More information

Adopting to Agile Software Development

Adopting to Agile Software Development doi: 10.1515/acss-2014-0014 Adopting to Agile Software Development Gusts Linkevics, Riga Technical University, Latvia Abstract Agile software development can be made successful, but there is no well-defined

More information

Social and Knowledge Networks. Tina Wakolbinger

Social and Knowledge Networks. Tina Wakolbinger Social and Knowledge Networks Tina Wakolbinger 11-03-03 Agenda Social networks History of social network theory Basics of social network theory Applications Dynamic social networks Knowledge networks Definitions

More information

The FIRO-B tool provides information about three fundamental dimensions of interpersonal needs:

The FIRO-B tool provides information about three fundamental dimensions of interpersonal needs: FIRO-B Profile Prepared for July 21, 2007 The FIRO-B instrument identifies how you tend to behave toward others and how you want them to behave toward you. Your FIRO-B results can help you increase your

More information

Liang Wang University of Hawaii Manoa. Randall Wright University of Wisconsin Madison Federal Reserve Bank of Minneapolis

Liang Wang University of Hawaii Manoa. Randall Wright University of Wisconsin Madison Federal Reserve Bank of Minneapolis ECONOMIC POLICY PAPER 16-02 JANUARY 2016 EXECUTIVE SUMMARY Many economists believe that prices are sticky they adjust slowly. This stickiness, they suggest, means that changes in the money supply have

More information

+? Mean +? No change -? Mean -? No Change. *? Mean *? Std *? Transformations & Data Cleaning. Transformations

+? Mean +? No change -? Mean -? No Change. *? Mean *? Std *? Transformations & Data Cleaning. Transformations Transformations Transformations & Data Cleaning Linear & non-linear transformations 2-kinds of Z-scores Identifying Outliers & Influential Cases Univariate Outlier Analyses -- trimming vs. Winsorizing

More information

Probabilistic Safety Assessment Safety & Regulatory Framework

Probabilistic Safety Assessment Safety & Regulatory Framework Probabilistic Safety Assessment Safety & Regulatory Framework Presentation to the CNSC August 2017 Dr. V.G. Snell 1 Purpose To summarize work done under CNSC contract 87055-16-0251: Role of the Probabilistic

More information

A General Model of E-Government service Adoption: Empirical Exploration

A General Model of E-Government service Adoption: Empirical Exploration A General Model of E-Government service Adoption: Empirical Exploration Stuart Bretschneider Director Center for Technology and Information Policy 400 Eggers Hall The Maxwell School Syracuse University

More information

ADKAR Exercise Copyright Prosci

ADKAR Exercise Copyright Prosci Personal Change Worksheet (15 minutes) Overview ADKAR Exercise ADKAR is a goal-oriented change management model that allows change management teams to focus their activities on specific business results.

More information

Global position system technology to monitoring auto transport in Latvia

Global position system technology to monitoring auto transport in Latvia Peer-reviewed & Open access journal www.academicpublishingplatforms.com The primary version of the journal is the on-line version ATI - Applied Technologies & Innovations Volume 8 Issue 3 November 2012

More information

College of Business Administration

College of Business Administration Executive Master in Business Administration Program (EMBA) Master of Business Administration (MBA) 1. Introduction: The UOS EMBA program has been designed to deliver high quality management education to

More information

Academic MSO Competencies Behavioral Interviewing Guide. UC Davis Staff Development & Professional Services

Academic MSO Competencies Behavioral Interviewing Guide. UC Davis Staff Development & Professional Services Academic MSO Competencies Behavioral Interviewing Guide UC Davis Staff Development & Professional Services Revised January 2008 Academic MSO Competencies Behavioral Interviewing Guide Context This academic

More information

Shahzad Khan (Lecturer City University of Science & IT Peshawar, Pakistan)

Shahzad Khan (Lecturer City University of Science & IT Peshawar, Pakistan) Publisher: Asian Economic and Social Society ISSN: 2225-4226 Volume 2 Number 6, June (2012) Role of Transactional and Relational Contract in Employee Turnover Intention (A Study of Business Affiliated

More information

Running head: Literature Review 1

Running head: Literature Review 1 Running head: Literature Review 1 Literature Review: (Conflict in Corporate Workplaces: Includes Healthcare, Education, General Businesses) (Michael E. Markgraf) Liberty University 2 Abstract This paper

More information

Social Network Effects on Performance and Layoffs: Evidence From the Adoption of a Social. Networking Tool. Lynn Wu. Draft: September 15, 2010

Social Network Effects on Performance and Layoffs: Evidence From the Adoption of a Social. Networking Tool. Lynn Wu. Draft: September 15, 2010 Social Network Effects on Performance and Layoffs: Evidence From the Adoption of a Social Networking Tool Lynn Wu Draft: September 15, 2010 Please do not distribute or quote Abstract While a large body

More information

Bandwagon and Underdog Effects and the Possibility of Election Predictions

Bandwagon and Underdog Effects and the Possibility of Election Predictions Reprinted from Public Opinion Quarterly, Vol. 18, No. 3 Bandwagon and Underdog Effects and the Possibility of Election Predictions By HERBERT A. SIMON Social research has often been attacked on the grounds

More information

9. Verification, Validation, Testing

9. Verification, Validation, Testing 9. Verification, Validation, Testing (a) Basic Notions (b) Dynamic testing. (c) Static analysis. (d) Modelling. (e) Environmental Simulation. (f) Test Strategies. (g) Tool support. (h) Independent Verification

More information

An Empirical Study on Customers Satisfaction of Third-Party Logistics Services (3PLS)

An Empirical Study on Customers Satisfaction of Third-Party Logistics Services (3PLS) International Conference on Education, Management and Computing Technology (ICEMCT 2015) An Empirical Study on Customers Satisfaction of Third-Party Logistics Services (3PLS) YU LIU International Business

More information

Operation and supply chain management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology Madras

Operation and supply chain management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology Madras Operation and supply chain management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology Madras Lecture - 37 Transportation and Distribution Models In this lecture, we

More information

Get Exactly What You Want from Your Next Contract

Get Exactly What You Want from Your Next Contract Payment Integrity Compass Get Exactly What You Want from Your Next Contract Your Payer Negotiations Toolkit In this toolkit, you will learn: Best practice internal communication strategies How to organize

More information

Psychology and Economics Field Exam August 2015

Psychology and Economics Field Exam August 2015 Psychology and Economics Field Exam August 2015 There are 3 questions on the exam. Please answer the 3 questions to the best of your ability. Do not spend too much time on any one part of any problem (especially

More information

Computational models of technology adoption at the workplace

Computational models of technology adoption at the workplace Soc. Netw. Anal. Min. (214) 4:199 DOI 1.17/s13278-14-199-z ORIGINAL ARTICLE Computational models of technology adoption at the workplace Charalampos Chelmis Ajitesh Srivastava Viktor K. Prasanna Received:

More information

Bilateral and Multilateral Exchanges for Peer-Assisted Content Distribution

Bilateral and Multilateral Exchanges for Peer-Assisted Content Distribution 1290 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 5, OCTOBER 2011 Bilateral and Multilateral Exchanges for Peer-Assisted Content Distribution Christina Aperjis, Ramesh Johari, Member, IEEE, and Michael

More information

Flow and Heat Transfer Characteristics in High Porosity Metal Foams

Flow and Heat Transfer Characteristics in High Porosity Metal Foams Proceedings of the World Congress on Mechanical, Chemical, and Material Engineering (MCM 2015) Barcelona, Spain July 20-21, 2015 Paper No. 333 Flow and Heat Transfer Characteristics in High Porosity Metal

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 You must have already been introduced to a study of basic microeconomics. This chapter begins by giving you a simplified account of how macroeconomics differs from the microeconomics that you

More information

Group Profile. Sample Group

Group Profile. Sample Group Group Profile Prepared For: Sample Group 3 April 2015 This report includes: 6 Participants 70 Raters Version 3.0 Center for Creative Leadership, CCL and Benchmarks are registered trademarks owned by the

More information

Numerical Modeling of Slab-On-Grade Foundations

Numerical Modeling of Slab-On-Grade Foundations Numerical Modeling of Slab-On-Grade Foundations M. D. Fredlund 1, J. R. Stianson 2, D. G. Fredlund 3, H. Vu 4, and R. C. Thode 5 1 SoilVision Systems Ltd., 2109 McKinnon Ave S., Saskatoon, SK S7J 1N3;

More information

Understanding the Current Situation of E-Government in Saudi Arabia: A Model for Implementation and Sustainability

Understanding the Current Situation of E-Government in Saudi Arabia: A Model for Implementation and Sustainability Understanding the Current Situation of E-Government in Saudi Arabia: A Model for Implementation and Sustainability Majed Alfayad and Edward Abbott-Halpin School of Computing, Creative Technology, and Engineering,

More information

CUSTOMER RESPONSIVENESS INDEX TM

CUSTOMER RESPONSIVENESS INDEX TM CUSTOMER RESPONSIVENESS INDEX TM Most companies don t measure the risks that count market alignment risks. Nor do they measure their drivers and financial impacts. Here is a business tool that does. HOW

More information

Lesson:-02 DIFFERENT APPROACHES AND SYSTEMS OF MANAGEMENT, SKILLS, ROLES AND MODERN CHALLENGES

Lesson:-02 DIFFERENT APPROACHES AND SYSTEMS OF MANAGEMENT, SKILLS, ROLES AND MODERN CHALLENGES Lesson:-02 DIFFERENT APPROACHES AND SYSTEMS OF MANAGEMENT, SKILLS, ROLES AND MODERN CHALLENGES Objectives of the lesson After studying this lesson, you should understand: 1. The various approaches to management

More information

The Impact of Generic Strategy and Firm Life Cycle on Operational Efficiency

The Impact of Generic Strategy and Firm Life Cycle on Operational Efficiency , pp.53-64 http://dx.doi.org/10.14257/ijunesst.2016.9.5.05 The Impact of Generic Strategy and Firm Life Cycle on Operational Efficiency Jayoun Won 1 and Sang-Lyul Ryu 2* 1 Research Institute for Global

More information

Chapter 2 Identifying Users and Their Tasks

Chapter 2 Identifying Users and Their Tasks Chapter 2 Identifying Users and Their Tasks 2.1 Defining the Scope and Objectives 2.1.1 Scope and Objectives The first step towards the introduction of a new social network is the definition of its scope

More information

Regression analysis of profit per 1 kg milk produced in selected dairy cattle farms

Regression analysis of profit per 1 kg milk produced in selected dairy cattle farms ISSN: 2319-7706 Volume 4 Number 2 (2015) pp. 713-719 http://www.ijcmas.com Original Research Article Regression analysis of profit per 1 kg milk produced in selected dairy cattle farms K. Stankov¹*, St.

More information

Equating and Scaling for Examination Programs

Equating and Scaling for Examination Programs Equating and Scaling for Examination Programs The process of scaling is used to report scores from equated examinations. When an examination is administered with multiple forms like the NBCOT OTC Examination,

More information

1. Introduction. What is implantation? Advantages

1. Introduction. What is implantation? Advantages Ion implantation Contents 1. Introduction 2. Ion range 3. implantation profiles 4. ion channeling 5. ion implantation-induced damage 6. annealing behavior of the damage 7. process consideration 8. comparison

More information

DISPATCHING TRANSPORT VEHICLES IN MARITIME CONTAINER TERMINALS

DISPATCHING TRANSPORT VEHICLES IN MARITIME CONTAINER TERMINALS DISPATCHING TRANSPORT VEHICLES IN MARITIME CONTAINER TERMINALS by Pyung-Hoi Koo Department of Systems Management and Engineering, Pukyong National University, Busan, Korea Yongsoro 45, Namgu, Busan, South

More information

Empirical study of the effects of open source adoption on software development economics

Empirical study of the effects of open source adoption on software development economics Empirical study of the effects of open source adoption on software development economics Journal of Systems and Software(2007) Samuel A. Ajila, Di Wu HyeonJeong Kim Contents Introduction Overall approach

More information

Scholars Bulletin. DOI: /sb

Scholars Bulletin. DOI: /sb DOI: 10.21276/sb Scholars Bulletin ISSN 2412-9771 (Print) (A Multidisciplinary Journal) ISSN 2412-897X (Online) An Official Publication of Scholars Middle East Publishers, Dubai, United Arab Emirates Website:

More information

Asymptotic Analysis of Real-Time Queues

Asymptotic Analysis of Real-Time Queues Asymptotic Analysis of John Lehoczky Department of Statistics Carnegie Mellon University Pittsburgh, PA 15213 Co-authors: Steve Shreve, Kavita Ramanan, Lukasz Kruk, Bogdan Doytchinov, Calvin Yeung, and

More information