scholarly journals Markov Stationary Equilibria in Stochastic Supermodular Games with Imperfect Private and Public Information

2012 ◽  
Author(s):  
Lukasz Balbus ◽  
Kevin L. Reffett ◽  
Lukasz Patryk Wozny
2013 ◽  
pp. 1072-1103
Author(s):  
Nathalie Bachour

With the constant evolution of technology and the world critical environmental status, all private and public Information Technology (IT) businesses are moving towards sustainability. Faced with influences from government regulations, market competition and constraints, as well as watchdogs, IT decision makers within organizations are forced to ride the green technology wave with a challenging and uncertain approach. This chapter defines methods to optimize Green IT projects for sustainable value creation within organizations. It only focuses on economic viability and environmental impact, but could be stretched out in the future to social aspects. The contributions of this chapter allow the project management community and decision makers to follow a framework for Green IT project success evaluation and performance follow-up throughout the project life cycle and the three levels of the organization: operational, tactical, and strategic. A macro-model is also developed to aid them in successfully selecting, prioritizing, managing, and aligning their Green IT projects with the corporate and environmental strategies.


Author(s):  
Nathalie Bachour

With the constant evolution of technology and the world critical environmental status, all private and public Information Technology (IT) businesses are moving towards sustainability. Faced with influences from government regulations, market competition and constraints, as well as watchdogs, IT decision makers within organizations are forced to ride the green technology wave with a challenging and uncertain approach. This chapter defines methods to optimize Green IT projects for sustainable value creation within organizations. It only focuses on economic viability and environmental impact, but could be stretched out in the future to social aspects. The contributions of this chapter allow the project management community and decision makers to follow a framework for Green IT project success evaluation and performance follow-up throughout the project life cycle and the three levels of the organization: operational, tactical, and strategic. A macro-model is also developed to aid them in successfully selecting, prioritizing, managing, and aligning their Green IT projects with the corporate and environmental strategies.


Author(s):  
Ann Dutton Ewbank ◽  
Adam G. Kay ◽  
Teresa S. Foulger ◽  
Heather L. Carter

This chapter reviews the capabilities of social networking tools and links those capabilities to recent legal and ethical controversies involving use of social networking tools such as Facebook and MySpace. A social cognitive moral framework is applied to explore and analyze the ethical issues present in these incidents. Three ethical vulnerabilities are identified in the use of social networking tools: 1) the medium provides a magnified forum for public humiliation or hazing, 2) a blurring of boundaries exists between private and public information on social networking sites, and 3) the medium merges individuals’ professional and non-professional identities. Prevalent legal and social responses to these kinds of incidents are considered and implications are suggested for encouraging responsible use. The chapter includes a description of the authors’ current research with preservice students involving an intervention whereby students read and think about real cases where educators use social networking. The intervention was created to improve students’ critical thinking about the ethical issues involved. Recommendations for applying institutional codes of conduct to ethical dilemmas involving online tools are discussed.


2012 ◽  
Vol 83 (5) ◽  
pp. 1243-1251 ◽  
Author(s):  
Irja I. Ratikainen ◽  
Liv Randi Henøen Sødal ◽  
Anahita J.N. Kazem ◽  
Jonathan Wright

2020 ◽  
Author(s):  
Michele Berardi

Abstract Can prices convey information about the fundamental value of an asset? This paper considers this problem in relation to the dynamic properties of the fundamental (whether it is constant or time-varying) and the structure of information available to agents. Risk-averse traders receive two potential signals each period: one exogenous and private and the other, prices, endogenous and public. Prices aggregate private information but include aggregate noise. Information can accumulate over time both through endogenous and exogenous signals. With a constant fundamental, the precision of both private and public cumulative information increases over time but agents put progressively more weight on the endogenous signals, asymptotically disregarding private ones. If the fundamental is time-varying, the use of past private signals complicates the role of prices as a source of information, since it introduces endogenous serial correlation in the price signal and cross-correlation between it and innovations in the fundamental. A modified version of the Kalman filter can still be used to extract information from prices and results show that the precision of the endogenous signals converges to a constant, with both private and public information used at all times.


2020 ◽  
Vol 21 (1) ◽  
pp. 142-166
Author(s):  
Mirkhon Nurullaev ◽  
RAKHMATILLO DJURAEVICH ALOEV

The article provides a brief description of the cryptography service provider software developed by the authors of this article, which is designed to create encryption keys, create private and public keys of electronic digital signature, create and confirm authenticity of digital signatures, hashing, encrypting, and simulating data using the algorithms described in the State Standards of Uzbekistan. It can be used in telecommunications networks, public information systems, and government corporate information systems by embedding into applications that store, process, and transmit information that does not contain information related to state secrets, as well as in the exchange of information, and ensuring the legal significance of electronic documents. The cryptography service provider includes the following functional components: a dynamically loadable library that implements a biophysical random number sensor; a dynamic library that implements cryptographic algorithms in accordance with the State Standards of Uzbekistan; a module supporting work with external devices; an installation module that provides the installation of a cryptography service provider in the appropriate environment of operation (environment). ABSTRAK: Artikel ini memberikan penerangan ringkas tentang perisian penyedia perkhidmatan kriptografi yang dibangunkan oleh pengarang artikel ini, yang direka untuk membuat kunci penyulitan, kunci persendirian dan awam tandatangan digital elektronik, membuat dan mengesahkan kesahihan tandatangan digital, hashing, penyulitan dan simulasi data menggunakan algoritma yang dinyatakan dalam Standard Negeri Uzbekistan. Ia boleh digunakan dalam rangkaian telekomunikasi, sistem maklumat awam, sistem maklumat korporat kerajaan dengan memasukkan aplikasi aplikasi yang menyimpan, memproses dan menghantar maklumat yang tidak mengandungi maklumat yang berkaitan dengan rahsia negara, serta pertukaran maklumat dan memastikan undang-undang kepentingan dokumen elektronik. Penyedia perkhidmatan kriptografi termasuk komponen berfungsi sebagai berikut: perpustakaan dinamik yang boleh dimuatkan yang melaksanakan sensor nombor rawak biofisika; perpustakaan dinamik yang melaksanakan algoritma kriptografi mengikut Standard Negeri Uzbekistan; modul menyokong kerja dengan peranti luaran; modul pemasangan yang menyediakan pemasangan penyedia perkhidmatan kriptografi dalam persekitaran operasi yang sesuai (persekitaran).


2020 ◽  
Vol 186 ◽  
pp. 104988
Author(s):  
Piotr Denderski ◽  
Christian A. Stoltenberg

2010 ◽  
pp. 2096-2112 ◽  
Author(s):  
Ann Dutton Ewbank ◽  
Adam G. Kay ◽  
Teresa S. Foulger ◽  
Heather L. Carter

This chapter reviews the capabilities of social networking tools and links those capabilities to recent legal and ethical controversies involving use of social networking tools such as Facebook and MySpace. A social cognitive moral framework is applied to explore and analyze the ethical issues present in these incidents. Three ethical vulnerabilities are identified in the use of social networking tools: 1) the medium provides a magnified forum for public humiliation or hazing, 2) a blurring of boundaries exists between private and public information on social networking sites, and 3) the medium merges individuals’ professional and non-professional identities. Prevalent legal and social responses to these kinds of incidents are considered and implications are suggested for encouraging responsible use. The chapter includes a description of the authors’ current research with preservice students involving an intervention whereby students read and think about real cases where educators use social networking. The intervention was created to improve students’ critical thinking about the ethical issues involved. Recommendations for applying institutional codes of conduct to ethical dilemmas involving online tools are discussed.


Sign in / Sign up

Export Citation Format

Share Document