- Cybercrime and Law Enforcement Studies
- Information and Cyber Security
- Outsourcing and Supply Chain Management
- Network Security and Intrusion Detection
- Spam and Phishing Detection
- Magnesium Alloys: Properties and Applications
- Aluminum Alloys Composites Properties
- Innovation and Knowledge Management
- Flood Risk Assessment and Management
- Energy, Environment, Economic Growth
- Music and Audio Processing
- Corporate Social Responsibility Reporting
- Gender Diversity and Inequality
- Corporate Finance and Governance
- Environmental Sustainability in Business
- Blockchain Technology Applications and Security
- Private Equity and Venture Capital
- Multi-Criteria Decision Making
- Web visibility and informetrics
- Catalytic Alkyne Reactions
- Legal principles and applications
- Regional Economic and Spatial Analysis
- Underwater Acoustics Research
- Precipitation Measurement and Analysis
- Force Microscopy Techniques and Applications
Fujian Normal University
2008-2024
Donghua University
2020-2024
Hefei University of Technology
2008-2024
Xi'an Jiaotong University
2008-2022
Northwest University
2022
City University of Hong Kong
2015-2017
Tianjin University
2001-2012
Information resources have been shared to promote the business operations of firms. However, connection information sharing interfaces between firms has increased attack surface and created opportunities for hacker. We examine benefits risks who exert security efforts against a strategic hacker that launches attacks subjectively. show two kinds efforts, investment knowledge sharing, act as substitutes when business-sharing degree is low complements otherwise. Besides, not always aggressive,...
To efficiently manage information security, firms typically outsource part of their security functions to a managed service provider (MSSP) under variety contractual arrangements. Based on this practice, we study business setting in which the management outsourcing depends efforts both MSSP and its clients, taking into account that allocation can change during contract horizon. Since are private each other, double moral hazard (DMH) problem arise with use bilateral refund contracts, have...
Purpose The purpose of this paper is to describe the building a theoretical model explore how team pay disparity and resource slack moderate effects top management (TMT) diversity on strategic change if moderating differ in firms with low or high level disparity. Design/methodology/approach Nine hypotheses are proposed tested sample from 391 listed Chinese firms. Archival data collected annual reports form sample. hypothesized relationships through regression analysis. Findings findings show...
Based on the DBSCAN analysis, kernel density analysis and word cloud this paper analyzed composition types spatio-temporal evolution characteristics of catering points clusters form macro, meso micro dimensions within 5th ring road in Beijing with caterings POI data 2012, 2014 2016. The conclusions are as follows: first: (1) number total increased by about 6 times, center whole shows a tendency to move from west southeast. There is little change quantity clusters. distribution relatively...
Nowadays, firms tend to outsource security operations professional managed service providers (MSSPs) as a result of the sophistication strategic hackers. Thus, how an MSSP makes decisions according hacker’s action is worth researching. Constructing contract theory model, this paper examines interaction between and hacker based on both parties’ characteristics. We find that will give up less valuable information assets, thus not all assets are protecting for MSSP. For parties, their optimal...
The calibration of the performance an SFM (scanning force microscope) cantilever has gained more and interest in past years, particularly due to increasing applications SFMs for determination mechanical properties materials, such as biological structures organic molecules. In this paper, a MEMS-based nano-force actuator with resolution up nN (10−9 N) is presented quantitatively determine stiffness cantilever. principle, structure design realization are detailed. Preliminary experiments...
Abstract DMAP‐catalyzed [3+3] annulation of cyclopropenones with α‐bromoketones is described, which provides a simple and convenient synthesis 2‐pyrones in good yields broad scope. The reaction features advantages transition metal‐free conditions, readily available starting materials, excellent regioselectivity. Experimental investigation DFT calculations suggest mechanism encompassing pyridium ylide‐initiated ring opening cyclopropenones, elimination DMAP catalyst, final 6π‐electrocyclization.
In queueing systems where queues are invisible, it is critical for companies to make decisions about the timing of announcing anticipated delay customers. this paper, a simulation model built simulate an invisible system, and several scenarios considered, including different system congestion company goals, explore impact announcement timings. modeling customer behavior, we argue that difficult announce perfectly accurate rarely have customers fully trust announcement, so quantal-response...
This study distinguishes enterprises into high- and low-type categories based on enterprise value cost efficiency, examining their strategic behaviors in three investment timing games: move simultaneously, the high-type moves first, first. By comparing games, we find that both types of would always exert more effort sequential game than simultaneous game, later-move advantage makes prefer to become follower game. We also enhanced efficiency or gap possessed by widen between two enterprises,...
Rainfall data have a profound significance for meteorology, climatology, hydrology, and environmental sciences. However, existing rainfall observation methods (including ground-based rain gauges radar-/satellite-based remote sensing) are not efficient in terms of spatiotemporal resolution cannot meet the needs high-resolution application scenarios (urban waterlogging, emergency rescue, etc.). Widespread surveillance cameras been regarded as alternative studies. Surveillance audio, through...
Purpose Since the implementation of regulatory inquiry system, research on its impact information disclosure in capital market has been increasing. This article focuses a specific area study using Chinese annual report letters as basis. From text mining perspective, we explore whether textual contained these can help predict financial restatement behavior inquired companies. Design/methodology/approach Python was used to process data, nonparametric tests were conducted for hypothesis testing...