The Matthew effect in empirical data

M Perc - Journal of The Royal Society Interface, 2014 - royalsocietypublishing.org
The Matthew effect describes the phenomenon that in societies, the rich tend to get richer
and the potent even more powerful. It is closely related to the concept of preferential …

Zipf's law in passwords

D Wang, H Cheng, P Wang, X Huang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Despite three decades of intensive research efforts, it remains an open question as to what
is the underlying distribution of user-generated passwords. In this paper, we make a …

Individualist and collectivist perspectives on knowledge in organizations: Implications for information systems research

G von Krogh - The Journal of Strategic Information Systems, 2009 - Elsevier
Organization scholars differ in their understanding and application of the construct of
“knowledge” in theorizing and empirical research. Over the past years, two perspectives …

[HTML][HTML] Impact of the global financial crisis on the crude oil market

K Joo, JH Suh, D Lee, K Ahn - Energy Strategy Reviews, 2020 - Elsevier
This study examines the effect of the 2008 global financial crisis on the crude oil market. We
use the Hurst exponent, Shannon entropy, and the scaling exponent to characterize the …

[图书][B] Theory of Zipf's law and beyond

AI Saichev, Y Malevergne, D Sornette - 2009 - books.google.com
Zipf's law is one of the few quantitative reproducible regularities found in e-nomics. It states
that, for most countries, the size distributions of cities and of rms (with additional examples …

[HTML][HTML] Dynamics of ranking

G Iñiguez, C Pineda, C Gershenson… - Nature …, 2022 - nature.com
Virtually anything can be and is ranked; people, institutions, countries, words, genes.
Rankings reduce complex systems to ordered lists, reflecting the ability of their elements to …

Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs

T Maillart, M Zhao, J Grossklags… - Journal of …, 2017 - academic.oup.com
Bug bounty programs offer a modern way for organizations to crowdsource their software
security, and for security researchers to be fairly rewarded for the vulnerabilities they find …

The attraction of contributors in free and open source software projects

C Santos, G Kuk, F Kon, J Pearson - The Journal of Strategic Information …, 2013 - Elsevier
As firms increasingly sanction an open sourcing strategy, the question of which open source
project to undertake remains tentative. The lack of established metrics makes it difficult to …

Cumulative advantage: Conductors and insulators of heavy‐tailed productivity distributions and productivity stars

H Aguinis, E O'Boyle Jr, E Gonzalez‐Mulé… - Personnel …, 2016 - Wiley Online Library
We use the metatheoretical principle of cumulative advantage as a framework to understand
the presence of heavy‐tailed productivity distributions and productivity stars. We relied on …

Classification of cryptocurrency coins and tokens by the dynamics of their market capitalizations

K Wu, S Wheatley, D Sornette - Royal Society open …, 2018 - royalsocietypublishing.org
We empirically verify that the market capitalizations of coins and tokens in the cryptocurrency
universe follow power-law distributions with significantly different values for the tail exponent …