Results 191 to 200 of about 52,731 (268)
When Form Leads to Function: Network Closure and Social Identity Threat Among Women Entrepreneurs
ABSTRACT We contend that the degree of closure in women entrepreneurs’ social networks affects how concerned they feel about being judged through the lens of negative gender stereotypes (i.e., their experience of social identity threat). Using data from a survey of entrepreneurs in Study 1, we observe that women (but not men) entrepreneurs who report ...
Raina A. Brands +4 more
wiley +1 more source
SparkDWM: a scalable design of a Data Washing Machine using Apache Spark. [PDF]
Hagan NKA, Talburt JR.
europepmc +1 more source
ABSTRACT Workplace venting (i.e., expressing frustrations or negative emotions regarding workplace problems) is common and can lead to negative short‐term consequences for ventors or listeners. However, existing research has overlooked the dyadic nature of venting and focused on short‐term reactions, thereby missing potential relational benefits of ...
X. Susan Zhu +3 more
wiley +1 more source
On Flipping Edge Sets in Unique Sink Orientations. [PDF]
Borzechowski M, Weber S.
europepmc +1 more source
Imagined and Overlooked Ties: Why the Ties in Our Mind Influence Who We Trust
ABSTRACT Trust theory explains how social network ties influence trust, but well‐publicized examples suggest that even imagined connections can affect trust. As extant theory does not explain this phenomenon, we introduce a perceptual network mechanism that elucidates why the ties in our mind influence trustworthiness judgments.
Priti Pradhan Shah +2 more
wiley +1 more source
Minimizing Cost Travel in Multimodal Transport Using Advanced Relation Transitive Closure [PDF]
Rachid Oucheikh +2 more
openalex +1 more source
Leadership Influence in Times of Change: A Social Network Perspective
ABSTRACT Successful organizational change often depends on network leaders—organizational members who act as informal change agents by exerting influence through their social networks. Integrating a social identity model with a social network perspective, we identify two distinct network leadership roles: Domain Experts and Boundary Spanners.
Francesca Pallotti +2 more
wiley +1 more source
Reverse network diffusion to remove indirect noise for better inference of gene regulatory networks. [PDF]
Yu J, Leng J, Yuan F, Sun D, Wu LY.
europepmc +1 more source
A general framework on conditions for constraint‐based causal learning
Abstract Most constraint‐based causal learning algorithms provably return the correct causal graph under certain correctness conditions, such as faithfulness. By representing any constraint‐based causal learning algorithm using the notion of a property, we provide a general framework to obtain and study correctness conditions for these algorithms. From
Kai Z. Teh, Kayvan Sadeghi, Terry Soo
wiley +1 more source

