ترغب بنشر مسار تعليمي؟ اضغط هنا

Government as Network Catalyst: Accelerating Self-Organization in a Strategic Industry

92   0   0.0 ( 0 )
 نشر من قبل Travis Whetsell
 تاريخ النشر 2019
والبحث باللغة English




اسأل ChatGPT حول البحث

Governments have long standing interests in preventing market failures and enhancing innovation in strategic industries. Public policy regarding domestic technology is critical to both national security and economic prosperity. Governments often seek to enhance their global competitiveness by promoting private sector cooperative activity at the inter-organizational level. Research on network governance has illuminated the structure of boundary-spanning collaboration mainly for programs with immediate public or non-profit objectives. Far less research has examined how governments might accelerate private sector cooperation to prevent market failures or to enhance innovation. The theoretical contribution of this research is to suggest that government programs might catalyze cooperative activity by accelerating the preferential attachment mechanism inherent in social networks. We analyze the long-term effects of a government program on the strategic alliance network of 451 organizations in the high-tech semiconductor industry between 1987 and 1999, using stochastic network analysis methods for longitudinal social networks.



قيم البحث

اقرأ أيضاً

Groups of firms often achieve a competitive advantage through the formation of geo-industrial clusters. Although many exemplary clusters, such as Hollywood or Silicon Valley, have been frequently studied, systematic approaches to identify and analyze the hierarchical structure of the geo-industrial clusters at the global scale are rare. In this work, we use LinkedIns employment histories of more than 500 million users over 25 years to construct a labor flow network of over 4 million firms across the world and apply a recursive network community detection algorithm to reveal the hierarchical structure of geo-industrial clusters. We show that the resulting geo-industrial clusters exhibit a stronger association between the influx of educated-workers and financial performance, compared to existing aggregation units. Furthermore, our additional analysis of the skill sets of educated-workers supplements the relationship between the labor flow of educated-workers and productivity growth. We argue that geo-industrial clusters defined by labor flow provide better insights into the growth and the decline of the economy than other common economic units.
Self-regulation of living tissue as an example of self-organization phenomena in hierarchical systems of biological, ecological, and social nature is under consideration. The characteristic feature of these systems is the absence of any governing cen ter and, thereby, their self-regulation is based on a cooperative interaction of all the elements. The work develops a mathematical theory of a vascular network response to local effects on scales of individual units of peripheral circulation.
We study social networks and focus on covert (also known as hidden) networks, such as terrorist or criminal networks. Their structures, memberships and activities are illegal. Thus, data about covert networks is often incomplete and partially incorre ct, making interpreting structures and activities of such networks challenging. For legal reasons, real data about active covert networks is inaccessible to researchers. To address these challenges, we introduce here a network generator for synthetic networks that are statistically similar to a real network but void of personal information about its members. The generator uses statistical data about a real or imagined covert organization network. It generates randomized instances of the Stochastic Block model of the network groups but preserves this network organizational structure. The direct use of such anonymized networks is for training on them the research and analytical tools for finding structure and dynamics of covert networks. Since these synthetic networks differ in their sets of edges and communities, they can be used as a new source for network analytics. First, they provide alternative interpretations of the data about the original network. The distribution of probabilities for these alternative interpretations enables new network analytics. The analysts can find community structures which are frequent, therefore stable under perturbations. They may also analyze how the stability changes with the strength of perturbation. For covert networks, the analysts can quantify statistically expected outcomes of interdiction. This kind of analytics applies to all complex network in which the data are incomplete or partially incorrect.
A digital security breach, by which confidential information is leaked, does not only affect the agent whose system is infiltrated, but is also detrimental to other agents socially connected to the infiltrated system. Although it has been argued that these externalities create incentives to under-invest in security, this presumption is challenged by the possibility of strategic adversaries that attack the least protected agents. In this paper we study a new model of security games in which agents share tokens of sensitive information in a network of contacts. The agents have the opportunity to invest in security to protect against an attack that can be either strategically or randomly targeted. We show that, in the presence of random attack, under-investments always prevail at the Nash equilibrium in comparison with the social optimum. Instead, when the attack is strategic, either under-investments or over-investments are possible, depending on the network topology and on the characteristics of the process of the spreading of information. Actually, agents invest more in security than socially optimal when dependencies among agents are low (which can happen because the information network is sparsely connected or because the probability that information tokens are shared is small). These over-investments pass on to under-investments when information sharing is more likely (and therefore, when the risk brought by the attack is higher).
294 - M. Ebert , W. Paul 2009
Financial markets display scale-free behavior in many different aspects. The power-law behavior of part of the distribution of individual wealth has been recognized by Pareto as early as the nineteenth century. Heavy-tailed and scale-free behavior of the distribution of returns of different financial assets have been confirmed in a series of works. The existence of a Pareto-like distribution of the wealth of market participants has been connected with the scale-free distribution of trading volumes and price-returns. The origin of the Pareto-like wealth distribution, however, remained obscure. Here we show that it is the process of trading itself that under two mild assumptions spontaneously leads to a self-organization of the market with a Pareto-like wealth distribution for the market participants and at the same time to a scale-free behavior of return fluctuations. These assumptions are (i) everybody trades proportional to his current capacity and (ii) supply and demand determine the relative value of the goods.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا