Hype Cycles: Dynamic Information Design with Two Audiences

2021 ◽  
Author(s):  
Xuelin Li ◽  
Martin Szydlowski ◽  
Fangyuan Yu
2021 ◽  
Author(s):  
Ganesh Iyer ◽  
Zemin (Zachary) Zhong

We study the dynamic information design problem of a firm seeking to influence consumer checking behavior by designing push notifications.


Author(s):  
Farzaneh Farhadi ◽  
Demosthenis Teneketzis

AbstractWe study a dynamic information design problem in a finite-horizon setting consisting of two strategic and long-term optimizing agents, namely a principal (he) and a detector (she). The principal observes the evolution of a Markov chain that has two states, one “good” and one “bad” absorbing state, and has to decide how to sequentially disclose information to the detector. The detector’s only information consists of the messages she receives from the principal. The detector’s objective is to detect as accurately as possible the time of the jump from the good to the bad state. The principal’s objective is to delay the detector as much as possible from detecting the jump to the bad state. For this setting, we determine the optimal strategies of the principal and the detector. The detector’s optimal strategy is described by time-varying thresholds on her posterior belief of the good state. We prove that it is optimal for the principal to give no information to the detector before a time threshold, run a mixed strategy to confuse the detector at the threshold time, and reveal the true state afterward. We present an algorithm that determines both the optimal time threshold and the optimal mixed strategy that could be employed by the principal. We show, through numerical experiments, that this optimal sequential mechanism outperforms any other information disclosure strategy presented in the literature. We also show that our results can be extended to the infinite-horizon problem, to the problem where the matrix of transition probabilities of the Markov chain is time-varying, and to the case where the Markov chain has more than two states and one of the states is absorbing.


1992 ◽  
Vol 35 (4) ◽  
pp. 892-902 ◽  
Author(s):  
Robert Allen Fox ◽  
Lida G. Wall ◽  
Jeanne Gokcen

This study examined age-related differences in the use of dynamic acoustic information (in the form of formant transitions) to identify vowel quality in CVCs. Two versions of 61 naturally produced, commonly occurring, monosyllabic English words were created: a control version (the unmodified whole word) and a silent-center version (in which approximately 62% of the medial vowel was replaced by silence). A group of normal-hearing young adults (19–25 years old) and older adults (61–75 years old) identified these tokens. The older subjects were found to be significantly worse than the younger subjects at identifying the medial vowel and the initial and final consonants in the silent-center condition. These results support the hypothesis of an age-related decrement in the ability to process dynamic perceptual cues in the perception of vowel quality.


1997 ◽  
Author(s):  
James J. Jenkins ◽  
Winifred Strange ◽  
Sonja A. Trent
Keyword(s):  

2006 ◽  
Author(s):  
Mary L Rice-Lively ◽  
Hsin-Liang Chen
Keyword(s):  

2013 ◽  
Vol 61 (3) ◽  
pp. 569-579 ◽  
Author(s):  
A. Poniszewska-Marańda

Abstract Nowadays, the growth and complexity of functionalities of current information systems, especially dynamic, distributed and heterogeneous information systems, makes the design and creation of such systems a difficult task and at the same time, strategic for businesses. A very important stage of data protection in an information system is the creation of a high level model, independent of the software, satisfying the needs of system protection and security. The process of role engineering, i.e. the identification of roles and setting up in an organization is a complex task. The paper presents the modeling and design stages in the process of role engineering in the aspect of security schema development for information systems, in particular for dynamic, distributed information systems, based on the role concept and the usage concept. Such a schema is created first of all during the design phase of a system. Two actors should cooperate with each other in this creation process, the application developer and the security administrator, to determine the minimal set of user’s roles in agreement with the security constraints that guarantee the global security coherence of the system.


Sign in / Sign up

Export Citation Format

Share Document