How Economically Valuable are Vulnerable Ecosystems?
نویسندگان
چکیده
منابع مشابه
Secular rise in economically valuable personality traits.
Although trends in many physical characteristics and cognitive capabilities of modern humans are well-documented, less is known about how personality traits have evolved over time. We analyze data from a standardized personality test administered to 79% of Finnish men born between 1962 and 1976 (n = 419,523) and find steady increases in personality traits that predict higher income in later lif...
متن کاملProperties of ecosystems that are vulnerable during eco-fusion
When two ecosystems with separate evolutionary histories come into contact (eco-fusion), reciprocal invasions occur during their fusion. Asymmetries in the migration direction or extinction rate then occur (e.g., during the Great American Biotic Interchange, GABI). Hypotheses have been proposed to describe this process, but the ecosystem properties have not been adequately discussed. To identif...
متن کاملListening to Strangers: Whose Responses Are Valuable, How Valuable Are They, and Why?
Vol. XLV (August 2008), 425–436 425 © 2008, American Marketing Association ISSN: 0022-2437 (print), 1547-7193 (electronic) *Allen M. Weiss is Professor of Marketing (e-mail: amweiss@marshall. usc.edu), and Deborah J. MacInnis is Charles L. and Ramona I. Hilliard Professor of Business Administration (e-mail: [email protected]), Marshall School of Business, University of Southern California. Nicho...
متن کاملHow Vulnerable Are Unprotected Machines on the Internet?
How vulnerable are unprotected machines on the Internet? Utilizing Amazon’s Elastic Compute Cloud (EC2) service and our own VMware ESXi server, we launched and monitored 18 Windows machines (Windows 2008, XP and 7) without anti-virus or firewall protection at two distinct locations on the Internet—in the cloud and on-premise. Some machines ran a wide-open configuration with all ports open and s...
متن کاملHow vulnerable are prosodic features to professional imitators?
Voice imitation is one of the potential threats to security systems that use automatic speaker recognition. Since prosodic features have been considered for state-of-the-art recognition systems in recent years, the question arises as to how vulnerable these features are to voice mimicking. In this study, two experiments are conducted for twelve individual features in order to determine how a pr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Bulletin of the Ecological Society of America
سال: 2012
ISSN: 0012-9623
DOI: 10.1890/0012-9623-93.2.163