Abstract—In this paper, we present the design and development of a pervasive health system enabling self-management of chronic patients during their everyday activities. The proposed system integrates patient health monitoring, status logging for capturing various problems or symptoms met, and social sharing of the recorded information within the patient’s community, aiming to facilitate di…
Does the bureaucracy represent the interests of the public or react to the partisan and ideological demands of political principals? This study uses data from the federal workforce reports and the U.S. Office of Personnel Management’s Central Personnel Data File to demonstrate that partisanship and ideology influence the demographic composition of the federal senior executives. The analysis i…
Over the past 40 years, the research on workforce diversity has increased significantly. Despite this increased research, little attention has been given to the application Of diversity and integration indices to departments with small workforces. Even less attention has been given to inferences that are made based on the diversity or integration scores that are obtained from the application of…
We have a proliferation of tools to evaluate federal agencies’ performance and effectiveness. This article explores how effectiveness and performance values are distributed across government agencies based on three well-known assessment instruments used during the Bush administration: the Office of Management and Budget (OMB) Management Scorecard, the Performance Assessment Rating Tool (PART)…
Almost 6 months after winning their U.S. Supreme Court case, a group of New Haven, Connecticut, firefighters celebrated their victory in grand style. The decision in Ricci v. DeStefano proved that the City of New Haven erred when it denied promotions to White firefighters who fared better on promotional examinations than did minority applicants. This article (a) examines the thrust of the Ricci…
Employers have a duty to perform workplace investigations in situations involving a workplace incident that violates an employer’s rules, regulations, policies, or procedures. Workplace investigations occur for many different reasons including reports of sexual harassment, employee altercations, safety issues, security breaches, customer complaints, and other issues. The primary goal of a wor…
The buoyant research interest in the constructs emotional intelligence (EI) and transformational leadership (TFL) is a testament to the crucial role of emotional skills at work. EI is often described as an antecedent of TFL, and several empirical studies report a positive relationship between these variables. On closer inspection, however, there may be methodological factors, such as common met…
With a more holistic view of the interrelationships between individuals, markets and the larger economy, leaders can make more informed decisions. Understanding past trends in light of today's particular challenges, a wider knowledge of economics also allows business leaders to create more persuasive arguments when attempting to affect positive change within an organization. Since the turn of t…
Quality control has an emerging importance in every field of life. Quality control is a process that is used to guarantee a certain level of quality in a product or service. It might include whatever actions a business deems necessary to provide for the control and verification of certain characteristics of a product or service. With the improvement of technology everyday we meet new and compli…
Abstract Recent studies have shown that the energy consumption of wireless access networks is a threat to the sustainability of mobile cloud services. Consequently, energy efficient solutions are becoming crucial for both local and wireless access networks. In this paper, we propose a flow-based management framework to achieve energy efficiency in campus networks. We address the problem from …
Abstract As the need for more pervasive and more complex access controls grows, the challenge of ensuring the performance of access control systems is becoming apparent. Researchers have proposed several solutions to mitigate performance problems, including: adjusting the policy set; re-engineering the policy decision point (PDP); and decomposing the policies and distributing their evaluation…
Abstract Fault resolution in communication networks and distributed systems is a challenge that demands the expertise of system administrators and the support of multiple systems, such as monitoring and event correlation systems. Trouble ticket systems are frequently used to organize the workflow of the fault resolution process. In this context, we introduce DisCaRia, a distributed case-based …
Our study summarizes the state of knowledge on the topic of multimarket competition. We classify the current research into four broad themes: (1) the antecedents of multimarket contact (MMC), (2) the outcomes of MMC, (3) the contingencies that moderate the mutual forbearance hypothesis, and (4) extensions beyond traditional multimarket competition research. We also highlight several areas a…
This article explores the moderating influence of Hofstede’s cultural dimensions (individualism/ collectivism, masculinity/femininity, uncertainty avoidance, and power distance) on the relationship between justice perceptions and both supervisor- and employer-related outcomes. The integration of justice theories with Hofstede’s national culture typology implies multiple, and potentially…
This article offers a review, integration, and extension of the literature relevant to ostracism in organizations. We first seek to add conceptual clarity to ostracism, by reviewing existing definitions and developing a cohesive one, identifying the key features of workplace ostracism, and distinguishing it from existing organizational constructs. Next, we develop a broad model of ostracism…
The authors conducted a theoretical review of the change readiness literature and identified two major limitations with this work. First, while there is substantial agreement about the key cognitions that underlie change readiness, researchers have not examined the affective element of this attitude. Second, researchers have not adopted a multilevel perspective when considering change readi…
Exporting is a critically important strategy for firms to grow, yet research in this area has tended to ignore how firms can leverage resource-based capabilities to improve export performance. Building on the resource-based view and institutional theory, the authors develop a novel perspective to explain how a firm can improve export performance by aligning its export channel with its level…
The authors content analyzed self-reported limitations and directions for future research in 1,276 articles published between 1982 and 2007 in the Academy of Management Journal, Administrative Science Quarterly, the Journal of Applied Psychology, the Journal of Management, and the Strategic Management Journal. In order of frequency, the majority of self-reported limitations, as well as dire…
The delivery of bad news is at the center of many organizational processes. Despite the variety of organizational processes involving the delivery of bad news, there is no integrative framework that guides its study. Based on a literature review of professionals who deliver bad news as part of their occupations, this article presents a framework that conceptualizes the delivery of bad news …
Board composition is a critical element in the ability of the board to impact firm outcomes. While much of this research has focused on size and independence, there is growing literature that investigates the composition of directors’ demography, human capital, and social capital. The purpose of this article is to synthesize this diverse literature. The authors first review the literature…
Where there is uncertainty, there is bound to be failure. It is not surprising, therefore, that many new ventures fail. What happens to entrepreneurs when their business fails? People hear of highly successful entrepreneurs extolling the virtues of failure as a valuable teacher. Yet the aftermath of failure is often fraught with psychological, social, and financial turmoil. The purpose of t…
This Operations and Maintenance (O&M) Best Practices Guide was developed under the direction of the U.S. Department of Energy’s Federal Energy Management Program (FEMP). The mission of FEMP is to reduce the cost and environmental impact of the federal government by advancing energy efficiency and water conservation, promoting the use of distributed and renewable energy, and improving util…
There has been a renewed interest in the science of investment management in the years since the global financial crisis. The volatility of world markets and the shock to its financial institutions has caused a profound reexamination of risk, research into the methods of effective diversification, and exploration of the fundamental expected returns from financial assets. Rather than causi…
Please note that Managing the New Frontiers is not meant to be prescriptive or seminal nor is it an academic tome. Although it’s often ignored, the material within these pages may be familiar to those who keep abreast of management topics and current events. Simply put, I have no desire to re-label the fundamentals of management or the work of others and pretend that something new has been d…
Abstract With the motivation of seamlessly extending wireless sensor networks to the external environment, service-oriented architecture comes up as a promising solution. However, as sensor nodes are failure prone, this consequently renders the whole wireless sensor network to seriously faulty. When a particular node is faulty, the service on it should be migrated into those substitute sen…
Abstract Recent work on Information Centric Networking enables the exploitation of the caching resources of the new generation of routers [Content Routers (CR)]. So far, only a basic Least Recently Used strategy implemented on every CR has been proposed. In this paper, we introduce a cooperative caching strategy in the context of a Content-Centric-Network (CCN). This strategy has been designe…
Abstract Large-scale collaborative e-science requires fast and reliable data transfer with guaranteed performance, which is made possible by reserving bandwidth as needed in advance in high-performance networks. In scientific applications, users typically know the data size, the data available time, and the deadline to finish the data transfer, and they always wish to achieve the earliest pos…
Abstract Traffic classification is an important aspect in network operation and management, but challenging from a research perspective. During the last decade, several works have proposed different methods for traffic classification. Although most proposed methods achieve high accuracy, they present several practical limitations that hinder their actual deployment in production networks. …
Abstract An intermediate node in an inter-flow network coding scheme needs to know exactly which are the previous hop and next hop of a packet before coding. It is difficult to incorporate inter-flow network coding into opportunistic routing (OR) because the next hop of a packet in OR can’t be determined in advance. Coding-aware opportunistic routing (CAR) is proposed in this paper to ad…
Abstract A shared risk link group (SRLG) is a set of links which share a common risk of failure. Routing protocols in Generalized MultiProtocol Label Switching, using distributed SRLG information, can calculate paths avoiding certain SRLGs. For single SRLG failure an end-to-end SRLG-disjoint path pair can be calculated, but to ensure connection in the event of multiple SRLG failures a set …
Abstract Time synchronization is a fundamental requirement for many services provided by distributed systems. For this purpose, several time synchronization protocols have been proposed. However, they either achieve high accuracy by adding further network traffic, even more than common protocols such as network time protocol and precision time protocol, or consume a lot of time in addition…
Abstract Detection of abnormal internet traffic has become a significant area of research in network security. Due to its importance, many predictive models are designed by utilizing machine learning algorithms. The models are well designed to show high performances in detecting abnormal internet traffic behaviors. However, they may not guarantee reliable detection performances for new inc…
Abstract New kinds of services and data flows, such as cloud computing, server virtualization, or quality of service (QoS)-aware Internet services, have led to higher demands on network resources. Thus, they have also led to increased bandwidth consumption and unexpected congestion, especially in backbones. In this article a novel proposal is studied, with the aim of improving the performa…
Abstract RFID technology is the popular technology in recent years and applies to many automatic identification applications such as supply chain management, thief-prevention and so on. Supply chain system with the help of RFID system reduces the cost in business operation. Different members in the supply chain connect to the same RFID tag for acquiring their own data. Members can protect …
Abstract Availability of good quality monitoring data is a vital need for management of today’s data centers. However, effective use of monitoring tools demands an understanding of the monitoring requirements that system administrators most often lack. Instead of a well-defined process of defining a monitoring strategy, system administrators adopt a manual and intuition-based approach. I…
Abstract Conventionally, network migration models study competition between emerging and incumbent technologies by considering the resulting increase in revenue and associated cost of migration. We propose to advance the science in the existing network migration models by considering additional critical factors, including (1) synergistic relationships across multiple technologies, (2) redu…
Abstract Rapid growth in mobile communication and the proliferation of smartphones have drawn significant attention to location-based services (LBSs). One of the most important factors in the vitalization of LBSs is the accurate position estimation of a mobile device. The traditional global positioning system method has a critical weakness in terms of its limited availability, e.g., in ind…
Abstract Information Retrieval (IR) systems aim to retrieve data that satisfies certain requirements and constitute an important service in many types of networks, including Delay/Disruption Tolerant Networks (DTNs). In current DTN based IR systems, the data that satisfies a query is assumed to be stored on a single node. Therefore, once a node receives a query in which it has the correspo…
Abstract The classification of encrypted network traffic represents an important issue for network management and security tasks including quality of service, firewall enforcement, and security. Traffic classification becomes more challenging since the traditional techniques, such as port numbers or Deep Packet Inspection, are ineffective against Peer-to-Peer Voice over Internet Protocol (Vo…
Abstract A network coding based peer-to-peer (P2P) file sharing system has been proposed in recent years. It uses the random combination of encoded pieces to make the file sharing more effective. Most of the conventional P2P file sharing systems adopt a random (or rarest piece first) transmission policy to avoid too many duplicated pieces and rare pieces occurring in the network. Network c…
Strategic human resource management (SHRM) is an approach to the development and implementation of HR strategies that are integrated with business strategies and enable the organization to achieve its goals. In essence, strategic HRM is conceptual; it is a general notion of how integration or ‘fit’ between HR and business strategies is achieved, the benefits of taking a longer-term view …
This study aims at evaluating the services that libraries offer to the students of library and information management, measuring the extent to which these services are used from the students’ point of view as well as evaluating the adequacy of the practical training for them. In the course of this study, two hypotheses were tested. The first one focused on the compatibility between the se…