scholarly journals Towards the science of managing for innovation: the beginning

2019 ◽  
Vol 7 (2) ◽  
pp. 1-6
Author(s):  
Anne-Laure Mention ◽  
João José Pinto Ferreira ◽  
Marko Torkkeli

Some might argue that ever so nimble and responsive innovation paradigms can rarely be managed scientifically. We propose a more inclusive perspective. Science of managing for innovation has certain characteristics which we identify through the acronym “ROTRUS”- Real-world, Observable, Testable, Replicable, Uncertain and Social. Real-world refers to the notion that innovation happens in practical settings, be bound by resources and capabilities. This real-world is the context in which the observable events occur. To progress the understanding of formative predictors and their impact on innovation, the innovation events need to be observable. This may be challenging if we are to believe that much of the innovation is driven by heuristics (see e.g. Lopez-Vega, Tell and Vanhaverbeke, 2016; Nisch and Veer, 2018). Observable evidence in our perspective does not mean it needs to be capable of being observed but includes events or phenomenon that were observed. In this sense, managerial heuristics once actioned become observed evidence, such that observable evidence is any evidence that can be or has been experienced by one or many, regardless of whether this can be observed by a third party. (...)

2016 ◽  
Vol 2016 (1) ◽  
pp. 4-19 ◽  
Author(s):  
Andreas Kurtz ◽  
Hugo Gascon ◽  
Tobias Becker ◽  
Konrad Rieck ◽  
Felix Freiling

Abstract Recently, Apple removed access to various device hardware identifiers that were frequently misused by iOS third-party apps to track users. We are, therefore, now studying the extent to which users of smartphones can still be uniquely identified simply through their personalized device configurations. Using Apple’s iOS as an example, we show how a device fingerprint can be computed using 29 different configuration features. These features can be queried from arbitrary thirdparty apps via the official SDK. Experimental evaluations based on almost 13,000 fingerprints from approximately 8,000 different real-world devices show that (1) all fingerprints are unique and distinguishable; and (2) utilizing a supervised learning approach allows returning users or their devices to be recognized with a total accuracy of 97% over time


2020 ◽  
Author(s):  
Jaimie Krems ◽  
Keelah Williams ◽  
Douglas Kenrick ◽  
Athena Aktipis

Friendships can foster happiness, health, and reproductive fitness. But friendships end—even when we might not want them to. A primary reason for this is interference from third parties. Yet little work has explored how people meet the challenge of maintaining friendships in the face of real or perceived threats from third parties, as when our friends inevitably make new friends or form new romantic relationships. In contrast to earlier conceptualizations from developmental research, which viewed friendship jealousy as solely maladaptive, we propose that friendship jealousy is one overlooked tool of friendship maintenance. We derive and test—via a series of 11 studies (N = 2918) using hypothetical scenarios, recalled real-world events, and manipulation of on-line emotional experiences—whether friendship jealousy possesses the features of a tool well-designed to help us retain friends in the face of third-party threats. Consistent with our proposition, findings suggest that friendship jealousy is (1) uniquely evoked by third-party threats to friendships (but not the prospective loss of the friendship alone), (2) sensitive to the value of the threatened friendship, (3) strongly calibrated to cues that one is being replaced, even over more intuitive cues (e.g., the amount of time a friend and interloper spend together), and (4) ultimately motivates behavior aimed at countering third-party threats to friendship (“friend guarding”). Even as friendship jealousy may be negative to experience, it may include features designed for beneficial—and arguably prosocial—ends: to help maintain friendships.


Author(s):  
Sebastian Stein ◽  
Terry R. Payne ◽  
Nicholas R. Jennings

As grids become larger and more interconnected in nature, scientists can benefit from a growing number of distributed services that may be invoked on demand to complete complex computational workflows. However, it also means that these scientists become dependent on the cooperation of third-party service providers, whose behaviour may be uncertain, failure prone and highly heterogeneous. To address this, we have developed a novel decision-theoretic algorithm that automatically selects appropriate services for the tasks of an abstract workflow and deals with failures through redundancy and dynamic re-invocation of functionally equivalent services. In this paper, we summarize our approach, describe in detail how it can be applied to a real-world bioinformatics workflow and show that it offers a significant improvement over current service selection techniques.


2019 ◽  
Author(s):  
Ruben C. Arslan ◽  
Martin Brümmer ◽  
Thomas Dohmen ◽  
Johanna Drewelies ◽  
Ralph Hertwig ◽  
...  

People differ in their willingness to take risks. Recent work found that revealed preference tasks (e.g., laboratory lotteries)—a dominant class of measures—are outperformed by survey-based stated preferences, which are more stable and predict real-world risk taking across different domains. How can stated preferences, often criticised as inconsequential “cheap talk,” be more valid and predictive than controlled, incentivized lotteries? In our multimethod study, over 3,000 respondents from population samples answered a single widely used and predictive risk-preference question. Respondents then explained the reasoning behind their answer. They tended to recount diagnostic behaviours and experiences, focusing on voluntary, consequential acts and experiences from which they seemed to infer their risk preference. We found that third-party readers of respondents’ brief memories and explanations reached similar inferences about respondents’ preferences, indicating the intersubjective validity of this information. Our results help unpack the self perception behind stated risk preferences that permits people to draw upon their own understanding of what constitutes diagnostic behaviours and experiences, as revealed in high-stakes situations in the real world.


2021 ◽  
Author(s):  
Jeffrey Martin Lees ◽  
Liane Young ◽  
Adam Waytz

We examine how actors think others perceive their immoral behavior (moral meta-perception) across a diverse set of real-world moral violations. Utilizing a novel methodology, we solicit written instances of actors’ immoral behavior (N_total=135), measure motives and meta-perceptions, then provide these accounts to separate samples of third-party observers (N_total=933), using US convenience and representative samples (N_actor-observer pairs=4,615). We find that immoral actors can accurately predict how they are perceived, how they are uniquely perceived relative to the average immoral actor, and how they are misperceived. Actors who are better at judging the motives of other immoral actors also have more accurate meta-perceptions. Yet accuracy is accompanied by two distinct biases: overestimating the positive perceptions others’ hold, and believing one’s motives are more clearly perceived than they are. These results contribute to a detailed account of the multiple components underlying both accuracy and bias in moral meta-perception.


2015 ◽  
Vol 105 (2) ◽  
pp. 747-783 ◽  
Author(s):  
Michael Kosfeld ◽  
Devesh Rustagi

We conduct a social dilemma experiment in which real-world leaders can punish group members as a third party. Despite facing an identical environment, leaders are found to take remarkably different punishment approaches. The different leader types revealed experimentally explain the relative success of groups in managing their forest commons. Leaders who emphasize equality and efficiency see positive forest outcomes. Antisocial leaders, who punish indiscriminately, see relatively negative forest outcomes. Our results highlight the importance of leaders in collective action, and more generally the idiosyncratic but powerful roles that leaders may play, leading to substantial variation in group cooperation outcomes. (JEL C93, D03, O13, Q23)


2015 ◽  
Vol 61 (10) ◽  
pp. 2074-2104 ◽  
Author(s):  
Vera Mironova ◽  
Sam Whitt

To what extent can international peacekeeping promote micro-foundations for positive peace after violence? Drawing on macro-level peacekeeping theory, our approach uses novel experimental methods to illustrate how monitoring and enforcement by a neutral third party could conceivably enhance prosocial behavior between rival groups in a tense, postconflict peacekeeping environment. Using a laboratory experiment in postwar Kosovo, we find that third-party enforcement is more effective at promoting norms of trust between ethnic Serbs and Albanians than monitoring alone or no intervention at all. We then consider real-world extensions for building positive peace across different intervention environments. Using a dictator experiment that exploits heterogeneity in NATO peacekeeping in different regions of Kosovo, our inferences about monitoring and enforcement appear robust to ecological conditions in the field.


Sign in / Sign up

Export Citation Format

Share Document