共查询到20条相似文献,搜索用时 0 毫秒
1.
Dimitrios K. Vassilakis Vasilis Vassalos 《Peer-to-Peer Networking and Applications》2009,2(2):109-127
We develop a new model of the interaction of rational peers in a Peer-to-Peer (P2P) network that has at its heart altruism, an intrinsic parameter reflecting peers’ inherent willingness to contribute. Two different approaches for modelling altruistic
behavior and its attendant benefit are introduced. With either approach, we use Game Theoretic analysis to calculate Nash
equilibria and predict peer behavior in terms of individual contribution. We consider the cases of P2P networks of peers that
(i) have homogeneous altruism levels or (ii) have heterogeneous altruism levels, but with known probability distributions.
We find that, under the effects of altruism, a substantial fraction of peers will contribute when altruism levels are within
certain intervals, even though no incentive mechanism is used. Our results corroborate empirical evidence of large P2P networks
surviving or even flourishing without or with barely functioning incentive mechanisms. We also enhance the model with a simple
but powerful incentive scheme to limit free-riding and increase contribution to the network, and show that the particular
incentive scheme on networks with altruistic peers achieves its goal.
Dimitrios K. Vassilakis 2005–today: PhD candidate in the Informatics Department of the Athens University of Economics and Business (AUEB). Research areas: Operations Research (OR), Game Theory, economic models and applications of Game Theory on the internet (anti-spam, P2P networks), applications of OR on electricity scheduling. Vasilis Vassalos 2003–today: Assistant Professor in the Informatics Department of the Athens University of Economics and Business (AUEB). 1999–2003: assistant professor in the Information Systems Group of Information, Operations and Management Sciences (IOMS) Department in the Stern School of Business at New York University. Research areas: databases, Web-based information systems and middleware development, generation of user interfaces and Web services for semistructured data sources, integration of mobile data sources, XML query processing, digital libraries. 相似文献
Vasilis VassalosEmail: URL: http://wim.aueb.gr/vassalos |
Dimitrios K. Vassilakis 2005–today: PhD candidate in the Informatics Department of the Athens University of Economics and Business (AUEB). Research areas: Operations Research (OR), Game Theory, economic models and applications of Game Theory on the internet (anti-spam, P2P networks), applications of OR on electricity scheduling. Vasilis Vassalos 2003–today: Assistant Professor in the Informatics Department of the Athens University of Economics and Business (AUEB). 1999–2003: assistant professor in the Information Systems Group of Information, Operations and Management Sciences (IOMS) Department in the Stern School of Business at New York University. Research areas: databases, Web-based information systems and middleware development, generation of user interfaces and Web services for semistructured data sources, integration of mobile data sources, XML query processing, digital libraries. 相似文献
2.
《Ergonomics》2012,55(3):393-403
The volitional nature of procedural violations in work systems creates a challenge for human factors research andpractice. In order to understand how violations are caused and what can be done to mitigate them, there is a need to determine the influence of workers' beliefs about rules and guidelines. This study demonstrates the use of a social psychological approach to investigate the beliefs of anaesthetists about clinical practice guidelines. A survey was completed by 629 consultant anaesthetists, who rated their beliefs about deviation from three guidelines (performing pre-operative visits; checking anaesthetic equipment; handling intravenous fluid bags). Regression analysis indicated that the belief ratings predicted self-rated intention to deviate from the guidelines. Implications for understanding anaesthetists' adherence to guidelines are discussed. Statement of Relevance: This study builds upon previous work by the authors, presenting a more detailed insight into potential causes of procedural violations in healthcare. The study also demonstrates the use of a social psychological method to the investigation of violations. Hence, it is of interest to researchers and practitioners interested in human reliability, especially in healthcare. 相似文献
3.
Shu-Sheng Liaw 《Journal of Computer Assisted Learning》2004,20(4):283-291
Abstract Search engines have been developed for helping learners to seek online information. Based on theory of planned behaviour approach, this research intends to investigate the behaviour of using search engines as a learning tool. After factor analysis, the results suggest that perceived satisfaction of search engine, search engines as an information retrieval tool, and sharing search experience and information are three significant factors to affect individual behavioural intention to use search engines as a learning tool. In addition, the research elaborates that individual Internet and search engine experiences will affect these three factors. Moreover, the result also offers evidence that today's computers are popular for the application of communication and information retrieval. 相似文献
4.
In recent years, the amount of information has been growing quickly within organisations. Thus, several organisations have implemented analytics and business intelligence (BI) for Big Data solutions. To effectively foster the acceptance and usage of BI, this study examines how the motivational factors of both expectancy theory and social exchange theory (SET) affect managers' willingness to utilise BI. A survey of 271 managers supports the proposed model. The results show that intangible rewards of expectancy theory significantly influence the intention to read information (IRI) through the desire to make good decisions. Benefit factors (organisational rewards, reputation, and reciprocity) of SET are significantly associated with the desire to exchange reports (DER). The IRI significantly directly and indirectly influences the intention to create reports through the DER. Given the empirical findings, this study provides theoretical and managerial insights for organisations. 相似文献
5.
《Behaviour & Information Technology》2012,31(12):1242-1256
Biometrics has become an important alternative in user authentication to a system. The Brunei Government has embarked on various e-government projects. Some of these projects embed biometric mechanism for authentication. The acceptance of biometric security services appears to be affected by several factors, some of which may be the personal attitude of the users, influences of normality and context in which it is used. The study focuses on 155 executives from the 10 ministries of Brunei Darussalam to explore the behavioural intent of the executives towards biometrics through their attitudes. The theory of planned behaviour (TPB) was used as a reference framework, to understand the intention of using biometrics. The data analyses through Smart-PLS suggest that government officers’ attitudes towards biometrics is a predictor of behavioural intention, whereas, subjective norms is a predictor of attitude, perceived behavioural control, behavioural intention and behaviour, i.e. the use of the biometric technology. The implications of these findings are discussed and some conclusions are drawn. 相似文献
6.
《Behaviour & Information Technology》2012,31(11):1097-1115
Research and practice on knowledge management (KM) have shown that information technology alone cannot guarantee that employees will volunteer and share knowledge. While previous studies have linked motivational factors to knowledge sharing (KS), we took a further step to thoroughly examine this theoretically and empirically. We developed a unified model that is comprehensive and yet parsimonious, based on the decomposed theory of planned behaviour (DTPB) with three sets of critical antecedents: psychological, organisational and technological that are theorised to influence KS behaviours. Results of a field survey of knowledge workers support the majority of hypothesised relationships, and explained 41.3% of the variance in the actual KS behaviours and 60.8% of the variance in the intention to share knowledge. These results far exceed the predictive powers achieved by previous studies. Among our significant findings include a strong positive influence of perceived enjoyment in helping others (PEH) and a strong negative influence of perceived loss of knowledge power (PLK). Based on the findings, we discussed the study's implications for research and practice. 相似文献
7.
《Behaviour & Information Technology》2012,31(6):565-576
Digital piracy intention research has yielded different sets of piracy intention determinants based on various theoretical models. In this study, we reviewed the digital piracy literature and empirically compared two theoretical models, which are the models most often used: the theory of planned behaviour (TPB) and the Hunt–Vitell ethical decision model. Data were obtained from university students in South Korea, and structural equation modelling (SEM) was employed to examine and compare the two competing theoretical models in terms of explanatory power, overall model fit and paths' significance. The findings of this study revealed that the TPB is a more appropriate model for predicting digital piracy than the Hunt–Vitell ethical decision model. 相似文献
8.
Jung Lee 《Behaviour & Information Technology》2015,34(1):57-68
This study challenges the conventional assumption that online customers with high purchase intention routinely move to the purchase stage. To this end, the process of how online customers form purchase intention and behaviour is examined. On the basis of product value distribution (PVD), we propose that the hypothetically expected product value (i.e. PVD average) determines purchase intention, whereas the actual probability of attaining the expected product value (i.e. PVD variance) moderates purchase behaviour. This proposal indicates that the expected product value has significance only when repeated purchase is assumed given that most consumers do not repeatedly purchase the same product in reality. Thus, the actual probability of attaining the expected product value more critically affects customer behaviour than does its expected value. The effectiveness of the research model is verified by conducting a survey on 300 online mall shoppers in Korea. The results confirm model effectiveness. 相似文献
9.
Reuse of software assets in application development has held promise but faced challenges. In addressing these challenges, research has focused on organizational- and project-level factors while neglecting grass-root level adoption of reusable assets. Our research investigated factors associated with individual software developers’ intention to reuse software assets and integrated them in TAM. Towards that end, 13 project managers were interviewed and 207 software developers were surveyed in India. Results revealed that the technological-level (infrastructure), and individual-level factors (reuse-related experience and self-efficacy) were major determinants. Implications are discussed. 相似文献
10.
People expect Web technology to facilitate learning, particularly in higher education. A key issue involves the factors motivating the adoption of the Web for learning. Drawing upon social cognitive theory (SCT) and the theory of planned behavior (TPB), this study adopts a cognition-motivation-control view to assess learner adoption intentions for Web-based learning. The proposed model is validated by surveying 319 undergraduate students who had enrolled in Web-based courses and attended a 12-hour training program on using a Web-based system for academic learning. The empirical findings identified that efficacy control and efficacy expectations can be used to guide learner adaptation learning behaviors on the Web. The limitations of this study are discussed and future research directions suggested. 相似文献
11.
Predicting consumer intentions to shop online: An empirical test of competing theories 总被引:1,自引:0,他引:1
The proliferation of commercial Web sites providing consumers with a new medium to purchase products and services has increased the importance of understanding the determinants of consumer intentions to shop online. This study compared the technology acceptance model and two variations of the theory of planned behavior to examine which model best helps to predict consumer intentions to shop online. Data were gathered from 297 Taiwanese customers of online bookstores, and structural equation modeling was used to compare the three models in terms of overall model fit, explanatory power and path significance. Decomposing the belief structures in the theory of planned behavior moderately increased explanatory power for behavioral intention. The results also indicate that the decomposed theory of planned behavior provides an improved method of predicting consumer intentions to shop online. Finally, the implications of this study are discussed. 相似文献
12.
13.
This study investigated the factors associated with online environmental community members’ intention to participate in environmental activities in the Chinese context, employing the framework of the theory of planned behavior (TPB). Using data from a survey of community members (N = 211), structural equation modeling analyses confirmed the roles of subjective norm and self-efficacy in affecting intention to participate in environmental activities. Unlike other TPB studies, however, the study discovered that attitude was not significantly associated with intention. In addition, other relevant factors, including ego involvement, group identification, perceived salience of environmental problems, perceived popularity of environmental activities, and perceived interactivity of the community websites, were found to be associated with the intention of participation, either directly or indirectly. The theoretical and practical implications were discussed. 相似文献
14.
The effects that media can have on task performance have been greatly debated over the years. Whilst agreement has begun to emerge on the effects media have on cognitive performance, little is understood about the relationship between such media effects and individual differences such as individuals who have dyslexia. This paper presents findings from a study that investigated the effects computer-based media can have on the learning outcomes of individuals who have dyslexia. The purpose of the study was to obtain data that informed the development and design of e-learning and distance learning materials for universal use. The research process was based on Dual Coding Theory and refined by current theories on dyslexia. Findings from the research are intended to help academics and providers of e-learning materials to improve the design and delivery of their learning contents. 相似文献
15.
对等网络中资源搜索算法的研究是近十几年的一个研究热点.当前无结构对等网中的搜索算法很多是基于泛洪算法的改进,这些算法在网络中查全率和查准率都比较高,但由于在搜索过程中产生大量的冗余信息导致对等网的扩展性很差,不能满足大范围组网的要求.本文提出一种对等网中基于稳定性和相似性的改进破圈路由搜索算法,在此算法中,如果节点在路由中发现与另外几个节点形成一个圈,则节点根据与圈中邻居节点之间的稳定性和内容相似性等因素选择其中的一个邻居节点转发信息.在这种破圈法构造的拓扑结构中采用泛洪协议去搜索资源,转发信息数将从指数级增长有效地减少到常数值,并且资源搜索成功率始终在一个稳定的范围.仿真实验表明所提算法在保证一定搜索成功率的前提下大大减少了搜索中产生的冗余信息. 相似文献
16.
V. V. Skopetskii S. I. Lyashko S. A. Voytsekhovskii 《Cybernetics and Systems Analysis》1999,35(6):847-852
A combination of the net method and method of fictitious domains is used for solving the problem of optimal control over elliptic systems in domains of arbitrary form. As is shown, the proposed difference scheme has the order of accuracy O(h1/2) in the net norm W1/2 (ω). Translated from Kibernetika i Sistemnyi Analiz, No. 6, pp. 3–8, November–December, 1999. 相似文献
17.
The categorical approach is proposed to the formalization of fuzzy graph grammars obtained as a result of generalization of
sequential graph grammars. This approach takes into consideration the basic types of fuzziness that arise in constructing
categories of fuzzy objects and describing transformations of fuzzy graphs generated by fuzzy sets. All the problems of undecidability
that are well known for Chomsky grammars are proved to hold true for fuzzy graph grammars.
__________
Translated from Kibernetika i Sistemnyi Analiz, No. 4, pp. 130–144, July–August 2006. 相似文献
18.
Based on the mean-field approach, epidemic spreading has been well studied. However, the mean-field approach cannot show the
detailed contagion process, which is important in the control of epidemic. To fill this gap, we present a novel approach to
study how the topological structure of complex network influences the concrete process of epidemic spreading. After transforming
the network structure into hierarchical layers, we introduce a set of new parameters, i.e., the average fractions of degree
for outgoing, ingoing, and remaining in the same layer, to describe the infection process. We find that this set of parameters
are closely related to the degree distribution and the clustering coefficient but are more convenient than them in describing
the process of epidemic spreading. Moreover, we find that the networks with exponential distribution have slower spreading
speed than the networks with power-law degree distribution. Numerical simulations have confirmed the theoretical predictions. 相似文献
19.
Intentional employee misuse of IS is a global problem. Research suggests that security countermeasures can deter misuse by increasing the perceived certainty and severity of punishment for such behavior. However, the value of generalizing this work beyond Western cultures is open to question. In our study, we examined whether national culture influenced the deterrent capabilities of security policies, security education, training, and awareness programs and computer monitoring. Using U.S. and Korean samples, we found evidence that the deterrent effect of certain security countermeasures varied between the two countries, as did the influence of age and gender. The results have implications for information security management practices in global businesses. 相似文献