首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
While the high prevalence of mental illness in workplaces is more readily documented in the literature than it was ten or so years ago, it continues to remain largely within the medical and health sciences fields. This may account for the lack of information about mental illness in workplaces (Dewa et al. Healthcare Papers 5:12–25, 2004) by operational managers and human resource departments even though such illnesses effect on average 17 % to 20 % of employees in any 12-month period (MHCC 2012; SAMHSA 2010; ABS 2007). As symptoms of mental illness have the capacity to impact negatively on employee work performance and/or attendance, the ramifications on employee performance management systems can be significant, particularly when employees choose to deliberately conceal their illness, such that any work concerns appear to derive from issues other than illness (Dewa et al. Healthcare Papers 5:12–25, 2004; De Lorenzo 2003). When employee non-disclosure of a mental illness impacts negatively in the workplace, it presents a very challenging issue in relation to performance management for both operational managers and human resource staff. Without documented medical evidence to show that impaired work performance and/or attendance is attributable to a mental illness, the issue of performance management arises. Currently, when there is no documented medical illness, performance management policies are often brought into place to improve employee performance and/or attendance by establishing achievable employee targets. Yet, given that in any twelve-month period at least a fifth of the workforce sustains a mental illness (MHCC 2012; SAMHSA 2010; ABS 2007), and that non-disclosure is significant (Barney et al. BMC Public Health 9:1–11, 2009; Munir et al. Social Science & Medicine 60:1397–1407, 2005) such targets may be unachievable for employees with a hidden mental illness. It is for these reasons that this paper reviews the incidence of mental illness in western economies, its costs, and the reasons why it is often concealed and proposes the adoption of what are termed ‘Buffer Stage’ policies as an added tool that organisations may wish to utilise in the management of hidden medical illnesses such as mental illness.  相似文献   

2.
In this paper, we discuss in a general framework the design-based estimation of population parameters when sensitive data are collected by randomized response techniques. We show in close detail the procedure for estimating the distribution function of a sensitive quantitative variable and how to estimate simultaneously the population prevalence of individuals bearing a stigmatizing attribute and the distribution function for the members belonging to the hidden group. The randomized response devices by Greenberg et al. (J Am Stat Assoc 66:243–250, 1971), Franklin (Commun Stat Theory Methods 18:489–505, 1989), and Singh et al. (Aust NZ J Stat 40:291–297 1998) are here considered as data-gathering tools.  相似文献   

3.
Hitchcock (Synthese 97:335–364, 1993) argues that the ternary probabilistic theory of causality meets two problems due to the problem of disjunctive factors, while arguing that the unanimity probabilistic theory of causality, which is founded on the binary contrast, does not meet them. Hitchcock also argues that only the ternary theory conveys the information about complex relations of causal relevance. In this paper, I show that Eells’ solution (Probabilistic causality, Cambridge University Press, Cambridge, 1991), which is founded on the unanimity theory, meet the two problems. I also show that the unanimity theory too reveals complex relations of causal relevance. I conclude that the two probabilistic theories of causality carve up the same causal structure in two formally different and conceptually consistent ways. Hitchcock’s ternary theory inspires several major philosophers (Maslen, Causation and counterfactuals, pp. 341–357. MIT Press, Cambridge, 2004; Schaffer, Philos Rev 114, 297–328, 2005; Northcott, Phil Stud 139, 111–123, 2007; Hausman, The place of probability in science: In honor of Eelleys Eells (1953–2006), pp. 47–64, Springer, Dordrecht, 2010) who have recently developed the ternary theory or the quaternary theory. This paper leads them to reconsider the relation between the ternary theory and the binary theory.  相似文献   

4.
Despite the pervasiveness of Six Sigma programs, there is rising concern regarding the failure of many Six Sigma programs. One explanation for many Six Sigma failures could be escalation of commitment. Escalation of commitment refers to the propensity of decision-makers to continue investing in a failing course of action. Many researchers have applied escalation of commitment to explain the behavior of individuals, groups, companies, and nations. Using the escalation of commitment model (Staw and Ross 1987a; Ross and Staw Acad. Manag. J. 36:701–732 1993) as a basis, this research describes a Six Sigma failure in an electrical components company. In documenting this failure, this research contributes in two ways, both in the practice and in the theory of Six Sigma. First, while examining the Six Sigma failure, this research uncovers important factors for successful implementation, which should improve the practice of Six Sigma. Second, academic research (e.g., Schroeder et al. J. Oper. Manag, 26:536–554 2008; Zu et al. J. Oper. Manag, 26:630–650 2008) is engaged in uncovering the definition of Six Sigma, and its differences from other improvement programs. This research provides a new direction to academic research and has the potential to impact the theory of Six Sigma.  相似文献   

5.
Sangun Park 《Metrika》2014,77(5):609-616
The representation of the entropy in terms of the hazard function and its extensions have been studied by many authors including Teitler et al. (IEEE Trans Reliab 35:391–395, 1986). In this paper, we consider a representation of the Kullback–Leibler information of the first \(r\) order statistics in terms of the relative risk (Park and Shin in Statistics, 2012), the ratio of hazard functions, and extend it to the progressively Type II censored data. Then we study the change in Kullback–Leibler information of the first \(r\) order statistics according to \(r\) and discuss its relation with Fisher information in order statistics.  相似文献   

6.
The aim of the present study is to define quality entropy as well as to illustrate some of its properties. The simulation of the mathematical model for quality entropy shall be performed by means of specialized software for mathematical problem simulation, such as Microsoft Excel that we have employed for this particular study. Our aim is to prove that quality entropy may be expanded to the notions of Markov source of quality and Bernoulli source of quality, by analogy with the Markov and Bernoulli sources employed in information theory. Likewise, the present study delineates some aspects regarding tolerance to quality entropy. The subject of entropy and its application of the management of quality has been approached by other authors as well (Dinu and Vod?, Revista Calitatea-acces la succes, anul 8(4): 60–61, 2007; Dinu, Revista Calitatea-acces la succes, anul 8(5): 62–63, 2007; Georgescu-Roegen, Legea Entropiei ?i Procesul Economic, 1979; Stamatiu, Proceedings of the 7th International Conference on Quality, Reability and Maintainabilty, 2000; Stamatiu, Proceeding of the 18th International Conference on Quality, Reliability and Maintainability, 2002). Through our transdisciplinary approach, we would like to contribute to the development of this subject.  相似文献   

7.
Motivated by the effect hierarchy principle, Zhang et al. (Stat Sinica 18:1689–1705, 2008) introduced an aliased effect number pattern (AENP) for regular fractional factorial designs and based on the new pattern proposed a general minimum lower-order confounding (GMC) criterion for choosing optimal $2^{n-m}$ designs. Zhang et al. (Stat Sinica 18:1689–1705, 2008) proved that most existing criteria can be obtained by functions of the AENP. In this paper we propose a simple method for the calculation of AENP. The method is much easier than before since the calculation only makes use of the design matrix. All 128-run GMC designs with the number of factors ranging from 8 to 32 are provided for practical use.  相似文献   

8.
Bing Guo  Qi Zhou  Runchu Zhang 《Metrika》2014,77(6):721-732
Zhang et al. (Stat Sinica 18:1689–1705, 2008) introduced an aliased effect-number pattern for two-level regular designs and proposed a general minimum lower-order confounding (GMC) criterion for choosing optimal designs. All the GMC \(2^{n-m}\) designs with \(N/4+1\le n\le N-1\) were constructed by Li et al. (Stat Sinica 21:1571–1589, 2011), Zhang and Cheng (J Stat Plan Inference 140:1719–1730, 2010) and Cheng and Zhang (J Stat Plan Inference 140:2384–2394, 2010), where \(N=2^{n-m}\) is run number and \(n\) is factor number. In this paper, we first study some further properties of GMC design, then we construct all the GMC \(2^{n-m}\) designs respectively with the three parameter cases of \(n\le N-1\) : (i) \(m\le 4\) , (ii) \(m\ge 5\) and \(n=(2^m-1)u+r\) for \(u>0\) and \(r=0,1,2\) , and (iii) \(m\ge 5\) and \(n=(2^m-1)u+r\) for \(u\ge 0\) and \(r=2^m-3,2^m-2\) .  相似文献   

9.
This paper investigates the relationship between secure implementability (Saijo et al. in Theor Econ 2:203–229, 2007) and full implementability in truthful strategies (Nicolò in Rev Econ Des 8:373–382, 2004). Although secure implementability is in general stronger than full implementability in truthful strategies, this paper shows that both properties are equivalent under the social choice function that satisfies non-wastefulness (Li and Xue in Econ Theory, doi:10.1007/s00199-012-0724-0) in pure exchange economies with Leontief utility functions.  相似文献   

10.
We study a keyword auction model where bidders have constrained budgets. In the absence of budget constraints, Edelman et al. (Am Econ Rev 97(1):242–259, 2007) and Varian (Int J Ind Organ 25(6):1163–1178, 2007) analyze “locally envy-free equilibrium” or “symmetric Nash equilibrium” bidding strategies in generalized second-price auctions. However, bidders often have to set their daily budgets when they participate in an auction; once a bidder’s payment reaches his budget, he drops out of the auction. This raises an important strategic issue that has been overlooked in the previous literature: Bidders may change their bids to inflict higher prices on their competitors because under generalized second-price, the per-click price paid by a bidder is the next highest bid. We provide budget thresholds under which equilibria analyzed in Edelman et al. (Am Econ Rev 97(1):242–259, 2007) and Varian (Int J Ind Organ 25(6):1163–1178, 2007) are sustained as “equilibria with budget constraints” in our setting. We then consider a simple environment with one position and two bidders and show that a search engine’s revenue with budget constraints may be larger than its revenue without budget constraints.  相似文献   

11.
Social scientists often consider multiple empirical models of the same process. When these models are parametric and non-nested, the null hypothesis that two models fit the data equally well is commonly tested using methods introduced by Vuong (Econometrica 57(2):307–333, 1989) and Clarke (Am J Political Sci 45(3):724–744, 2001; J Confl Resolut 47(1):72–93, 2003; Political Anal 15(3):347–363, 2007). The objective of each is to compare the Kullback–Leibler Divergence (KLD) of the two models from the true model that generated the data. Here we show that both of these tests are based upon a biased estimator of the KLD, the individual log-likelihood contributions, and that the Clarke test is not proven to be consistent for the difference in KLDs. As a solution, we derive a test based upon cross-validated log-likelihood contributions, which represent an unbiased KLD estimate. We demonstrate the CVDM test’s superior performance via simulation, then apply it to two empirical examples from political science. We find that the test’s selection can diverge from those of the Vuong and Clarke tests and that this can ultimately lead to differences in substantive conclusions.  相似文献   

12.
Qiqing Yu  Yuting Hsu  Kai Yu 《Metrika》2014,77(8):995-1011
The non-parametric likelihood L(F) for censored data, including univariate or multivariate right-censored, doubly-censored, interval-censored, or masked competing risks data, is proposed by Peto (Appl Stat 22:86–91, 1973). It does not involve censoring distributions. In the literature, several noninformative conditions are proposed to justify L(F) so that the GMLE can be consistent (see, for examples, Self and Grossman in Biometrics 42:521–530 1986, or Oller et al. in Can J Stat 32:315–326, 2004). We present the necessary and sufficient (N&S) condition so that \(L(F)\) is equivalent to the full likelihood under the non-parametric set-up. The statement is false under the parametric set-up. Our condition is slightly different from the noninformative conditions in the literature. We present two applications to our cancer research data that satisfy the N&S condition but has dependent censoring.  相似文献   

13.
Qingming Zou  Zhongyi Zhu 《Metrika》2014,77(2):225-246
The single-index model is an important tool in multivariate nonparametric regression. This paper deals with M-estimators for the single-index model. Unlike the existing M-estimator for the single-index model, the unknown link function is approximated by B-spline and M-estimators for the parameter and the nonparametric component are obtained in one step. The proposed M-estimator of unknown function is shown to attain the convergence rate as that of the optimal global rate of convergence of estimators for nonparametric regression according to Stone (Ann Stat 8:1348–1360, 1980; Ann Stat 10:1040–1053, 1982), and the M-estimator of parameter is $\sqrt{n}$ -consistent and asymptotically normal. A small sample simulation study showed that the M-estimators proposed in this paper are robust. An application to real data illustrates the estimator’s usefulness.  相似文献   

14.
The recombining binomial tree approach, which has been initiated by Cox et?al. (J Financ Econ 7: 229?C263, 1979) and extended to arbitrary diffusion models by Nelson and Ramaswamy (Rev Financ Stud 3(3): 393?C430, 1990) and Hull and White (J Financ Quant Anal 25: 87?C100, 1990a), is applied to the simultaneous evaluation of price and Greeks for the amortized fixed and variable rate mortgage prepayment option. We consider the simplified binomial tree approximation to arbitrary diffusion processes by Costabile and Massabo (J Deriv 17(3): 65?C85, 2010) and analyze its numerical applicability to the mortgage valuation problem for some Vasicek and CIR-like interest rate models. For fixed rates and binomial trees with about thousand steps, we obtain very good results. For the Vasicek model, we also compare the closed-form analytical approximation of the callable fixed rate mortgage price by Xie (IAENG Int J Appl Math 39(1): 9, 2009) with its binomial tree counterpart. With respect to the binomial tree values one observes a systematic underestimation (overestimation) of the callable mortgage price (prepayment option price) analytical approximation. This numerical discrepancy increases at longer maturities and becomes impractical for a valuable estimation of the prepayment option price.  相似文献   

15.
This paper proposes a new two-step stochastic frontier approach to estimate technical efficiency (TE) scores for firms in different groups adopting distinct technologies. Analogous to Battese et al. (J Prod Anal 21:91–103, 2004), the metafrontier production function allows for calculating comparable TE measures, which can be decomposed into group specific TE measures and technology gap ratios. The proposed approach differs from Battese et al. (J Prod Anal 21:91–103, 2004) and O’Donnell et al. (Empir Econ 34:231–255, 2008) mainly in the second step, where a stochastic frontier analysis model is formulated and applied to obtain the estimates of the metafrontier, instead of relying on programming techniques. The so-derived estimators have the desirable statistical properties and enable the statistical inferences to be drawn. While the within-group variation in firms’ technical efficiencies is frequently assumed to be associated with firm-specific exogenous variables, the between-group variation in technology gaps can be specified as a function of some exogenous variables to take account of group-specific environmental differences. Two empirical applications are illustrated and the results appear to support the use of our model.  相似文献   

16.
This paper considers three ratio estimators of the population mean using known correlation coefficient between the study and auxiliary variables in simple random sample when some sample observations are missing. The suggested estimators are compared with the estimators of Singh and Horn (Metrika 51:267–276, 2000), Singh and Deo (Stat Pap 44:555–579, 2003) and Kadilar and Cingi (Commun Stat Theory Methods 37:2226–2236, 2008). They are compared with other imputation estimators based on the mean or a ratio. It is found that the suggested estimators are approximately unbiased for the population mean. Also, it turns out that the suggested estimators perform well when compared with the other estimators considered in this study.  相似文献   

17.
In response to a question raised by Knox Lovell, we develop a method for estimating directional output distance functions with endogenously determined direction vectors based on exogenous normalization constraints. This is reminiscent of the Russell measure proposed by Färe and Lovell (J Econ Theory 19:150–162, 1978). Moreover it is related to the slacks-based directional distance function introduced by Färe and Grosskopf (Eur J Oper Res 200:320–322, 2010a, Eur J Oper Res 206:702, 2010b). Here we show how to use the slacks-based function to estimate the optimal directions.  相似文献   

18.
Classical optimal strategies are notorious for producing remarkably volatile portfolio weights over time when applied with parameters estimated from data. This is predominantly explained by the difficulty to estimate expected returns accurately. In Lindberg (Bernoulli 15:464–474, 2009), a new parameterization of the drift rates was proposed with the aim to circumventing this difficulty, and a continuous time mean–variance optimal portfolio problem was solved. This approach was further developed in Alp and Korn (Decis Econ Finance 34:21–40, 2011a) to a jump-diffusion setting. In the present paper, we solve a different portfolio problem under the market parameterization in Lindberg (Bernoulli 15:464–474, 2009). Here, the admissible investment strategies are given as the amounts of money to be held in each stock and are allowed to be adapted stochastic processes. In the references above, the admissible strategies are the deterministic and bounded fractions of the total wealth. The optimal strategy we derive is not the same as in Lindberg (Bernoulli 15:464–474, 2009), but it can still be viewed as investing equally in each of the n Brownian motions in the model. As a consequence of the problem assumptions, the optimal final wealth can become non-negative. The present portfolio problem is solved also in Alp and Korn (Submitted, 2011b), using the L 2-projection approach of Schweizer (Ann Probab 22:1536–1575, 1995). However, our method of proof is direct and much easier accessible.  相似文献   

19.
This study follows the structure of Grifell-Tatjé and Lovell (Manag Sci 45:1177–1193, 1999) and uses the non-parametric approach to decompose the change in profit of Taiwanese banks into various drivers. However, risk was never considered in the papers based on profit decomposition. Without considering risk, the empirical results will be biased while decomposing the change in profit. In fact, risk is a joint but undesirable output which cannot be freely disposed of by various regulations. The non-performing loan (NPL) is employed as a risk indicator for decomposing the change in profit in this study. This study also performs a three-way comparison among (1) the original Grifell-Tatjé and Lovell (Manag Sci 45:1177–1193, 1999) analysis (OGLA) model that ignores NPL, (2) the extended Grifell-Tatjé and Lovell (Manag Sci 45:1177–1193, 1999) analysis (EGLA) model that is based on the OGLA model and incorporates NPL, and (3) the directional distance function (DDF) model that is based on Juo et al. (Omega 40:550–561, 2012) and incorporates NPLs to see if incorporating the undesirable output matters. The decomposition of the change in profit in the above three models is then illustrated using Taiwanese banks over the period 2006–2010.  相似文献   

20.
In this paper we explore properties of different orders of one-sided scale elasticities in multi-input multi-output production using the theoretical framework developed by Hadjicostas and Soteriou (Eur J Oper Res 168:425–449, 2006), Krivonozhko et al. (J Oper Res Soc 55:1049–1058, 2004), and others. That framework includes as a special case the well-known operations research method of data envelopment analysis (DEA). A special case of the theory in this paper is the Banker-Morey (Oper Res 34:513–521, 1986a) DEA model for data that include both discretionary and non-discretionary inputs and outputs. Several inequalities among different orders of one-sided scale elasticities are presented. An example is used to illustrate many of the results and ideas of the paper. Finally, we show how the theory and results of this paper can be used to shed some light on implicit Hicks input technical change.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号