scholarly journals The company you keep: How network disciplinary diversity enhances the productivity of researchers

2021 ◽  
Author(s):  
Tsahi Hayat ◽  
Dimitrina Dimitrova ◽  
Barry Wellman

The Covid-19 pandemic has affected most organizations' working environment and productivity. Organizations have had to make provision for staff to operate remotely following the implementation of lockdown regulations around the world, because the pandemic has led to restrictions on movement and the temporary closure of workplace premises. The purpose of this paper is to gain a deeper understanding of the effect of this transition on the productivity of work during the pandemic, by studying a distributed network of research who collaborate remotely. We examine how the productivity of researchers is affected by the distributed collaborative networks in which they are embedded. Our goal is to understand the effects of brokerage and closure on the researchers’ publication rate, which is interpreted as an indicator of their productivity. We analyze researchers’ communication networks, focusing on structural holes and diversity, and we take into account the personal qualities of the focal researcher such as seniority. We find that disciplinary diversity among researchers' peers' increases the researchers’ productivity, lending support to the brokerage argument. In addition, we find support for two statistical interaction effects. First, structural holes moderate diversity so that researchers with diverse networks are more productive when their networks also have a less redundant structure. Diversity and structural holes, when combined, further researchers’ productivity. Second, seniority moderates diversity; so that senior researchers are more productive than junior researchers in less diverse networks. In more diverse networks, junior researchers perform as well as senior researchers. Social capital and human capital are complementary. We conclude that the benefits of diversity on researchers’ productivity are contingent on the personal qualities of the researchers and on network structure. The brokerage / closure debate needs a more nuanced understanding of causal relationships.

Author(s):  
Sylvia A. Ogola ◽  
Japhet Otike

Marketing of library services varies from one environment to another. This chapter discusses the kind of strategies that a librarian manning a university library in Africa needs to come up with to realize a successful marketing programme. The limited resources and an adverse working environment characteristic of the African situation are highlighted. It is observed that a successful marketer is one who has the right personal qualities, sensitive to the needs of the users, knowledgeable about the product, and promoting it with passion. The chapter also looks at issues that affect the marketing capabilities of academic libraries in Africa. It concludes that academic libraries in Africa have very tight budgets, and most cannot afford to earmark any funds towards marketing their services. The chapter is significant in that not much literature is available for marketing of academic libraries in an African setting, and it provides some solutions that can be applied without extra funding. Students in Africa rely on mobile phones and social networking sites to communicate, and it is recommended that the use of social media for marketing can be very effective in Africa today


Author(s):  
Amy L L Middleton ◽  
Antal A Járai ◽  
Jonathan H P Dawes ◽  
Keith Briggs

Abstract The ability of small-cell wireless networks to self-organize is crucial for improving capacity and performance in modern communication networks. This paper considers one of the most basic questions: what is the expected distance to a cell’s nearest neighbour in a spatially distributed network? We analyse a model problem in the asymptotic limit of large total received signal and compare the accuracy of different heuristics. We also analytically consider the effects of fading. Our analysis shows that the most naive heuristic systematically underestimates the distance to the nearest node; this is substantially corrected in cases of interest by inclusion of the next-order asymptotic term. We illustrate our theoretical results explicitly or several combinations of signal and path loss parameters and show that our theory is well supported by numerical simulations.


2021 ◽  
Vol 11 (13) ◽  
pp. 5841
Author(s):  
Erwin Kristen ◽  
Reinhard Kloibhofer ◽  
Vicente Hernández Díaz ◽  
Pedro Castillejo

Cybersecurity is an important field in our digital world. It protects computer systems and communication networks against theft or sabotage of information to guarantee trouble-free operation in a trustworthy working environment. This article gives an overview of a cybersecurity assessment process and an appropriate Cybersecurity Management (CSM) implementation for future digital agriculture applications. The cybersecurity assessment follows the IEC 62443 cybersecurity standard for Industrial Automation Control Systems (IACS), adapted to Agriculture Automation Control Systems (AACS). However, the research results showed application differences; thus, an expansion of the standard is necessary to fill the existing open security gaps in agriculture. Agriculture differs from industrial control systems because of the outdoor located field area, which requires other forms of security. An appropriate cybersecurity standard for the agriculture domain is not currently available. However, such a standard will be necessary to define generally applicable procedures to protect agricultural assets against cyberattacks. The cybersecurity standards and regulations existing today (2021) are not sufficient for securing the agriculture domain against new and domain-specific cyberattacks. This article describes some of the cyber vulnerabilities identified and provides initial recommendations for addressing them.


1989 ◽  
Vol 111 (2) ◽  
pp. 109-115 ◽  
Author(s):  
A. Ray ◽  
S. Phoha

This paper identifies and discusses pertinent research problems in the design and development of communication networks for Computer-Integrated Manufacturing (CIM). The conclusions and recommendations presented here are largely the outcome of the workshop on Computer Networking for Manufacturing Systems [1]. The workshop was conducted in November 1987 under the sponsorship of the division of Design, Manufacturing and Computer Engineering of National Science Foundation. Both basic and applied research in computer networking for integration of all manufacturing-related functions is recommended in three general areas of efficient networking architectures, accommodation of equipment and environmental heterogeneity, and distributed network management and control.


2019 ◽  
Vol 31 (5) ◽  
pp. 1609-1614
Author(s):  
Svetlana Radeva

Like any process, training is movement, change, development. The examination of training as a focused, organized, conscious, guided, managed and cognitive process complements its intrinsic characteristic. It is a multifaceted process: the learner moves from ignorance to knowledge, from incomplete and inaccurate knowledge to more complete and accurate knowledge, in which profound qualitative changes occur in his personali. Since the objectives of the training determine the desired end result leading from the pre-specified requirement to the educational preparation of learners, they serve to formulate the components of professional competence as a complex of knowledge, skills, relationships and personal qualities that each learner needs to acquire and absorb to the end of their studies. On-the-job training as a form of continuing development of medical workers is an important factor in improving the quality of healthcare and the medical care offered. The training continues during the professional realization and facilitates the adaptation and growth of the profession.


Author(s):  
Igor Scaliante Wiese ◽  
Rodrigo Takashi Kuroda ◽  
Douglas Nassif Roma Junior ◽  
Reginaldo Ré ◽  
Gustavo Ansaldi Oliva ◽  
...  

2020 ◽  
Vol 6 (1) ◽  
Author(s):  
Krzysztof Cabaj ◽  
Piotr Żórawski ◽  
Piotr Nowakowski ◽  
Maciej Purski ◽  
Wojciech Mazurczyk

Abstract Each day more and more Internet of Things (IoT) devices are being connected to the Internet. In general, their applications are diverse but from the security perspective, it is evident that they are increasingly targeted by cybercriminals and used for nefarious purposes. Network covert channels form a subgroup of the information-hiding research area where secrets are sent over communication networks embedded within the network traffic. Such techniques can be used, among others, by malware developers to enable confidential data exfiltration or stealth communications. Recently, distributed network covert channels have raised the attention of security professionals as they allow the cloaking of secret transmission by spreading the covert bits among many different types of data-hiding techniques. However, although there are many works dealing with IoT security, little effort so far has been devoted in determining how effective the covert channels threat can be in the IoT henvironments. That is why, in this article, we present an extensive analysis on how distributed network covert channels that utilize network traffic from IoT devices can be used to perform efficient secret communication. More importantly, we do not focus on developing novel data-hiding techniques but, instead, considering the nature of IoT traffic, we investigate how to combine existing covert channels so the resulting data transfer is less visible. Moreover, as another contribution of our work, we prepare and share with the community the network traffic dataset that can be used to develop effective countermeasures against such threats.


E-Marketing ◽  
2012 ◽  
pp. 609-617
Author(s):  
Sylvia A. Ogola ◽  
Japhet Otike

Marketing of library services varies from one environment to another. This chapter discusses the kind of strategies that a librarian manning a university library in Africa needs to come up with to realize a successful marketing programme. The limited resources and an adverse working environment characteristic of the African situation are highlighted. It is observed that a successful marketer is one who has the right personal qualities, sensitive to the needs of the users, knowledgeable about the product, and promoting it with passion. The chapter also looks at issues that affect the marketing capabilities of academic libraries in Africa. It concludes that academic libraries in Africa have very tight budgets, and most cannot afford to earmark any funds towards marketing their services. The chapter is significant in that not much literature is available for marketing of academic libraries in an African setting, and it provides some solutions that can be applied without extra funding. Students in Africa rely on mobile phones and social networking sites to communicate, and it is recommended that the use of social media for marketing can be very effective in Africa today


Author(s):  
Klaus-Tycho Foerster ◽  
Janne H. Korhonen ◽  
Ami Paz ◽  
Joel Rybicki ◽  
Stefan Schmid

Consider a distributed task where the communication network is fixed but the local inputs given to the nodes of the distributed system may change over time. In this work, we explore the following question: if some of the local inputs change, can an existing solution be updated efficiently, in a dynamic and distributed manner? To address this question, we define the batch dynamic \congest model in which we are given a bandwidth-limited communication network and a dynamic edge labelling defines the problem input. The task is to maintain a solution to a graph problem on the labeled graph under batch changes. We investigate, when a batch of α edge label changes arrive, \beginitemize \item how much time as a function of α we need to update an existing solution, and \item how much information the nodes have to keep in local memory between batches in order to update the solution quickly. \enditemize Our work lays the foundations for the theory of input-dynamic distributed network algorithms. We give a general picture of the complexity landscape in this model, design both universal algorithms and algorithms for concrete problems, and present a general framework for lower bounds. In particular, we derive non-trivial upper bounds for two selected, contrasting problems: maintaining a minimum spanning tree and detecting cliques.


2021 ◽  
Vol 120 (4) ◽  
pp. 823-838
Author(s):  
Daniel Arubayi

Ride-hailing platforms such as Uber, an integral component in the global platform economy, are not only facilitating fluidity and so-called autonomy of labor; they are also creating an unfair working environment for workers. This phenomenon indicates the strength of a highly temporal and mobile capital, pitted against workers not just in Lagos but around the world. This article adopts James Scott’s notion of everyday resistance in exposing some of the hidden practices of platform drivers in Lagos. It finds that sabotaging and falsely complying through manipulating algorithms and gaming spaces for rewards are facilitated by social media and communication networks, are deliberate, hidden practices to subvert algorithmic control. While Lagos is a unique case in the global South, examples from global North cities highlight some peculiarity. A robust qualitative methodology was conducted comprising semistructured interviews, focus group discussions, and participant observations from forty Uber and Bolt trips. Other primary data sources include driver forums, attending driver training sessions and listening to transport radio programs. This article identifies temporal and spatial dynamics in recognizing everyday hidden practices as not always hidden, but dispersed and inconsistent because of the mutual learning capabilities between platform drivers and algorithmic managers. The hidden transcripts of platform drivers delve into public realms and back following, enabling platform drivers to develop new hidden practices, typifying a continuous power struggle in Lagos.


Sign in / Sign up

Export Citation Format

Share Document