Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (400)
- Physical Sciences and Mathematics (359)
- Computer Sciences (351)
- Business (293)
- International and Area Studies (159)
-
- Asian Studies (154)
- Databases and Information Systems (135)
- Economics (110)
- Software Engineering (105)
- Law (95)
- Engineering (55)
- Accounting (49)
- Numerical Analysis and Scientific Computing (46)
- Finance and Financial Management (45)
- Psychology (44)
- Communication (43)
- Education (41)
- Econometrics (39)
- Public Affairs, Public Policy and Public Administration (39)
- Corporate Finance (37)
- Artificial Intelligence and Robotics (36)
- Organizational Behavior and Theory (36)
- Sociology (36)
- Arts and Humanities (35)
- Information Security (35)
- Strategic Management Policy (34)
- Political Science (33)
- Higher Education (31)
- Computer Engineering (28)
- Social Media (28)
- Keyword
-
- Singapore (42)
- Singapore Management University (18)
- Online learning (11)
- China (10)
- Data mining (10)
-
- Culture (9)
- Machine learning (9)
- Social media (9)
- Twitter (9)
- Crowdsourcing (8)
- Development (7)
- Higher education (7)
- Networks (7)
- Collaboration (6)
- Education (6)
- Performance (6)
- Algorithms (5)
- Asia (5)
- Business (5)
- Content-based image retrieval (5)
- Coordination (5)
- Indonesia (5)
- Industry (5)
- Social networks (5)
- Visualization (5)
- Academic libraries (4)
- Android (4)
- Bug Localization (4)
- Classification (4)
- Clustering (4)
- Publication
-
- Research Collection School Of Computing and Information Systems (344)
- Research Collection Lee Kong Chian School Of Business (140)
- Research Collection School of Social Sciences (103)
- Research Collection Yong Pung How School Of Law (89)
- Research Collection School Of Economics (82)
-
- Perspectives@SMU (63)
- Research Collection School Of Accountancy (52)
- Asian Management Insights (18)
- Dissertations and Theses Collection (Open Access) (18)
- Research Collection Library (13)
- Research Collection Office of Corporate Communications and Marketing (9)
- Research Collection College of Integrative Studies (7)
- SMU Press Releases (6)
- Institute of Societal Leadership Research Collection (4)
- Research Collection Institute of Service Excellence (4)
- Social Space (4)
- Digital Narratives of Asia (3)
- Library Events (2)
- Lien Centre for Social Innovation: Research (2)
- Oral History Collection (2)
- Research Collection Lee Kong Chian School of Business (2)
- 2010 Herbert Smith Freehills-SMU Arbitration Lecture Series (1)
- 2013 Jones Day Professorship of Commercial Law Lecture (1)
- Report to Stakeholders (1)
- Research Collection BNP Paribas Hedge Fund Centre (1)
- Research Collection Centre for English Communication (1)
- SMU Corporate Reports (1)
- Publication Type
Articles 1 - 30 of 973
Full-Text Articles in Entire DC Network
Ko Ko Gyi [Myanmar, Activist], Ko Ko Gyi
Ko Ko Gyi [Myanmar, Activist], Ko Ko Gyi
Digital Narratives of Asia
Myanmar democracy activist Ko Ko Gyi spent a total of 17 years in prison for his political beliefs. First detained for his involvement in student protests in 1989, he was eventually released in 2012, along with 600 others, when the military-led government began implementing reforms. Mr Ko Ko Gyi now champions democracy and human rights issues as General Secretary of the 88 Generation Peace and Open Society. He was also a member of the government's Rakhine Investigation Commission to investigate the sectarian violence in Rakhine state. He speaks to DNA about the darkest days of his time in the infamous …
Online Learning On Incremental Distance Metric For Person Re-Identification, Yuke Sun, Hong Liu, Qianru Sun
Online Learning On Incremental Distance Metric For Person Re-Identification, Yuke Sun, Hong Liu, Qianru Sun
Research Collection School Of Computing and Information Systems
Person re-identification is to match persons appearing across non-overlapping cameras. The matching is challenging due to visual ambiguities and disparities of human bodies. Most previous distance metrics are learned by off-line and supervised approaches. However, they are not practical in real-world applications in which online data comes in without any label. In this paper, a novel online learning approach on incremental distance metric, OL-IDM, is proposed. The approach firstly modifies Self-Organizing Incremental Neural Network (SOINN) using Mahalanobis distance metric to cluster incoming data into neural nodes. Such metric maximizes the likelihood of a true image pair matches with a smaller …
Effects Of Training Datasets On Both The Extreme Learning Machine And Support Vector Machine For Target Audience Identification On Twitter, Siaw Ling Lo, David Cornforth, Raymond Chiong
Effects Of Training Datasets On Both The Extreme Learning Machine And Support Vector Machine For Target Audience Identification On Twitter, Siaw Ling Lo, David Cornforth, Raymond Chiong
Research Collection School Of Computing and Information Systems
The ability to identify or predict a target audience from the increasingly crowded social space will provide a company some competitive advantage over other companies. In this paper, we analyze various training datasets, which include Twitter contents of an account owner and its list of followers, using features generated in different ways for two machine learning approaches - the Extreme Learning Machine (ELM) and Support Vector Machine (SVM). Various configurations of the ELM and SVM have been evaluated. The results indicate that training datasets using features generated from the owner tweets achieve the best performance, relative to other feature sets. …
Human Action Classification Based On Sequential Bag-Of-Words Model, Hong Liu, Qiaoduo Zhang, Qianru Sun
Human Action Classification Based On Sequential Bag-Of-Words Model, Hong Liu, Qiaoduo Zhang, Qianru Sun
Research Collection School Of Computing and Information Systems
Recently, approaches utilizing spatial-temporal features have achieved great success in human action classification. However, they typically rely on bag-of-words (BoWs) model, and ignore the spatial and temporal structure information of visual words, bringing ambiguities among similar actions. In this paper, we present a novel approach called sequential BoWs for efficient human action classification. It captures temporal sequential structure by segmenting the entire action into sub-actions. Each sub-action has a tiny movement within a narrow range of action. Then the sequential BoWs are created, in which each sub-action is assigned with a certain weight and salience to highlight the distinguishing sections. …
Mapping The Umbrella Movement: Uncovering Grounded Theologies In Hong Kong, Justin Kh Tse
Mapping The Umbrella Movement: Uncovering Grounded Theologies In Hong Kong, Justin Kh Tse
Research Collection School of Social Sciences
As this Syndicate forum on the Umbrella Movement and theology winds to a close, the physical occupations in Hong Kong seem to be nearing their end stage. With court injunctions, police clearances, statements of support from the People’s Republic of China (PRC) for the Hong Kong government, the attempted voluntary surrender of Occupy Central leaders to the police, and a student hunger strike after over seventy days of street occupations, it might seem late in the game to call for the mapping of “grounded theologies,” “performative practices of placemaking informed by understandings of the transcendent,” woven into the political constitution …
Visionaries, Architects And Pioneers: Conceptualising Smu, Pin Pin Yeo, Patricia Meyer
Visionaries, Architects And Pioneers: Conceptualising Smu, Pin Pin Yeo, Patricia Meyer
Research Collection Library
The Singapore Management University (SMU) Library was tasked with documenting the early history of SMU by the chairman of its board of trustees. An oral history project to interview the pioneers involved in the formation of the university began in 2011. The project team included the Library, the Information Technology department, and a researcher/interviewer who was familiar with SMU. It was a steep learning curve for the team. As they conducted and processed the interviews, they learned about and made decisions on interviewing, recording, transcribing, storage, website design, discoverability, usability, and sustainability. The resulting oral history website presents the interviews …
The Vientiane Report: National Landscape, Current Challenges And Opportunities For Growt, Institute For Societal Leadership, Lai Cheng Lim
The Vientiane Report: National Landscape, Current Challenges And Opportunities For Growt, Institute For Societal Leadership, Lai Cheng Lim
Institute of Societal Leadership Research Collection
Laos is a small, landlocked, mountainous country in Southeast Asia. As a country, it shares borders with Myanmar and the People’s Republic of China to the Northwest, Vietnam to the East, Cambodia to the South and Thailand to the West.
The Dili Report: National Landscape, Current Challenges And Opportunities For Growth, Institute For Societal Leadership, Lai Cheng Lim
The Dili Report: National Landscape, Current Challenges And Opportunities For Growth, Institute For Societal Leadership, Lai Cheng Lim
Institute of Societal Leadership Research Collection
Timor-Leste, Asia’s newest nation, is located in Southeast Asia, on the southernmost edge of the Indonesian archipelago. The country was colonised by the Portuguese for over 450 years, occupied by the Indonesians for 24 years and administered by the United Nations for two and a half years. As a nation, Timor-Leste has had a very traumatic birth.
Executive Overreach By Minority Governments, Madhav S. Aney, Shubhankar Dam
Executive Overreach By Minority Governments, Madhav S. Aney, Shubhankar Dam
Research Collection School Of Economics
A provision in the Indian constitution allows the executive to make laws in the event oneof the two houses of parliament is not in session. This provision was intended to allow theexecutive to act in case there’s an immediate legislative necessity and the parliament cannotbe convened. Using a bargaining model with asymmetric information we show how partieswithin the parliament may reach an agreement on legislations when the ruling party does notcommand a majority (minority government). The model makes predictions about lawmakingpatterns by the legislature when the parliament is in session, and ordinances by the executivewhen the parliament is not in …
Cross-Listings And Corporate Cash Savings: International Evidence, Yuanto Kusnadi
Cross-Listings And Corporate Cash Savings: International Evidence, Yuanto Kusnadi
Research Collection School Of Accountancy
This paper examines foreign firms that are cross-listed on the U.S. stock exchanges and finds that they exhibit higher cash savings sensitivity to stock price than their non-cross-listed counterparts. This finding is robust even after controlling for alternative regression specifications and samples, country-level institutional infrastructures, different listing types, and the endogeneity of the cross-listing decision. Further cross-sectional tests reveal that the increase in cash savings sensitivity to stock price is more pronounced for cross-listed firms with stock prices that are more informative, which is consistent with the influence of the managerial learning channel. The empirical evidence sheds more light on …
Measuring Student Performance And Providing Feedback Using Competency Framework, Joelle Elmaleh, Venky Shankararaman
Measuring Student Performance And Providing Feedback Using Competency Framework, Joelle Elmaleh, Venky Shankararaman
Research Collection School Of Computing and Information Systems
A number of Computer Science and Information Systems programs have effectively defined learning outcomes, course level competencies, and conducted assessments at the program level to determine areas for continuous improvement. However, many of these programs do not fully leverage the course competencies during the actual delivery and assessment of the course. This paper presents how course competencies can be used to effectively deliver and assess the course content, and give valuable timely feedback to the students. Using a large first year core course of the BSc (Information Systems Management) program (called Object Oriented Application Development course-OOAD) as an example, this …
Proceedings Report: The 4th Asia Pacific Journal Of Private International Law Colloquium, Man Yip
Proceedings Report: The 4th Asia Pacific Journal Of Private International Law Colloquium, Man Yip
Research Collection Yong Pung How School Of Law
The 4th Asia Pacific Journal of Private International Law Colloquium, a biennial event, was held at the Singapore Management University on 28 November 2014 and convened by Associate Professor Adeline Chong. The one-day proceedings boasted a strong programme and facilitated discussions between private international law specialists from both civilian and common law jurisdictions.
A Metrics Suite Of Cloud Computing Adoption Readiness, Robert J. Kauffman, Dan Ma, Martin Yu
A Metrics Suite Of Cloud Computing Adoption Readiness, Robert J. Kauffman, Dan Ma, Martin Yu
Research Collection School Of Computing and Information Systems
Recent research on cloud computing adoption indicates that there has been a lack of deep understanding of its benefits by managers and organizations. This has been an obstacle for adoption. We report on an initial design for a firm-level cloud computing readiness metrics suite. We propose categories and measures to form a set of metrics to measure adoption readiness and assess the required adjustments in strategy and management, technology and operations, and business policies. We reviewed the relevant interdisciplinary literature and interviewed industry professionals to ground our metrics based on theory and practice knowledge. We identified four relevant categories for …
Probabilistic Latent Document Network Embedding, Tuan M. V. Le, Hady W. Lauw
Probabilistic Latent Document Network Embedding, Tuan M. V. Le, Hady W. Lauw
Research Collection School Of Computing and Information Systems
A document network refers to a data type that can be represented as a graph of vertices, where each vertex is associated with a text document. Examples of such a data type include hyperlinked Web pages, academic publications with citations, and user profiles in social networks. Such data have very high-dimensional representations, in terms of text as well as network connectivity. In this paper, we study the problem of embedding, or finding a low-dimensional representation of a document network that "preserves" the data as much as possible. These embedded representations are useful for various applications driven by dimensionality reduction, such …
Detecting Camouflaged Applications On Mobile Application Markets, Mon Kywe Su, Yingjiu Li, Huijie Robert Deng, Jason Hong
Detecting Camouflaged Applications On Mobile Application Markets, Mon Kywe Su, Yingjiu Li, Huijie Robert Deng, Jason Hong
Research Collection School Of Computing and Information Systems
Application plagiarism or application cloning is an emerging threat in mobile application markets. It reduces profits of original developers and sometimes even harms the security and privacy of users. In this paper, we introduce a new concept, called camouflaged applications, where external features of mobile applications, such as icons, screenshots, application names or descriptions, are copied. We then propose a scalable detection framework, which can find these suspiciously similar camouflaged applications. To accomplish this, we apply text-based retrieval methods and content-based image retrieval methods in our framework. Our framework is implemented and tested with 30,625 Android applications from the official …
A Rare Case Of Conspiracy By Lawful Means, Pey Woan Lee
A Rare Case Of Conspiracy By Lawful Means, Pey Woan Lee
Research Collection Yong Pung How School Of Law
Conspiracy by lawful means is a well-known anomaly in the law of torts. The anomaly lies in the fact that the tort imposes liability on two or more persons acting in concert to pursue a course of conduct that is otherwise lawful when committed by a sole actor. Of course, it is a critical element of the tort that the conspirators must have acted with the predominant intention to cause harm to the victim, but it is well settled that malicious intent is not, by itself, a sufficient basis for founding liability. It would thus seem that it is the …
Detecting Flow Anomalies In Distributed Systems, Freddy Chong-Tat Chua, Ee Peng Lim, Bernardo Huberman
Detecting Flow Anomalies In Distributed Systems, Freddy Chong-Tat Chua, Ee Peng Lim, Bernardo Huberman
Research Collection School Of Computing and Information Systems
Deep within the networks of distributed systems, one often finds anomalies that affect their efficiency and performance. These anomalies are difficult to detect because the distributed systems may not have sufficient sensors to monitor the flow of traffic within the interconnected nodes of the networks. Without early detection and making corrections, these anomalies may aggravate over time and could possibly cause disastrous outcomes in the system in the unforeseeable future. Using only coarse-grained information from the two end points of network flows, we propose a network transmission model and a localization algorithm, to detect the location of anomalies and rank …
High-Dimensional Data Stream Classification Via Sparse Online Learning, Dayong Wang, Pengcheng Wu, Peilin Zhao, Yue Wu, Chunyan Miao, Steven C. H. Hoi
High-Dimensional Data Stream Classification Via Sparse Online Learning, Dayong Wang, Pengcheng Wu, Peilin Zhao, Yue Wu, Chunyan Miao, Steven C. H. Hoi
Research Collection School Of Computing and Information Systems
The amount of data in our society has been exploding in the era of big data today. In this paper, we address several open challenges of big data stream classification, including high volume, high velocity, high dimensionality, and high sparsity. Many existing studies in data mining literature solve data stream classification tasks in a batch learning setting, which suffers from poor efficiency and scalability when dealing with big data. To overcome the limitations, this paper investigates an online learning framework for big data stream classification tasks. Unlike some existing online data stream classification techniques that are often based on first-order …
Second Order-Response Surface Model For The Automated Parameter Tuning Problem, Aldy Gunawan, Hoong Chuin Lau
Second Order-Response Surface Model For The Automated Parameter Tuning Problem, Aldy Gunawan, Hoong Chuin Lau
Research Collection School Of Computing and Information Systems
Several automated parameter tuning procedures/configurators have been proposed in order to find the best parameter setting for a target algorithm. These configurators can generally be classified into model-free and model-based approaches. We introduce a recent approach which is based on the hybridization of both approaches. It combines the Design of Experiments (DOE) and Response Surface Methodology (RSM) with prevailing model-free techniques. DOE is mainly used for determining the importance of parameters. A First Order-RSM is initially employed to define the promising region for the important parameters. A Second Order-RSM is then built to approximate the center point as well as …
Midas: Empowering 802.11ac With Multiple-Input Distributed Antenna Systems, Jie Xiong, Karthikeyan Sundaresan, Kyle Jamieson, Mohammad A. Khojastepour, Sampath Rangarajan
Midas: Empowering 802.11ac With Multiple-Input Distributed Antenna Systems, Jie Xiong, Karthikeyan Sundaresan, Kyle Jamieson, Mohammad A. Khojastepour, Sampath Rangarajan
Research Collection School Of Computing and Information Systems
Next generation WLANs (802.11ac) are undergoing a major shift in their communication paradigm with the introduction of multi-user MIMO (MU-MIMO), transitioning from single-user to multi-user communications. We argue that the conventional AP deployment model of co-located antennas as well as their PHY and MAC mechanisms are not designed to realize the complete potential of MUMIMO. We propose to leverage distributed antenna systems (DAS) to empower next generation 802.11ac networks. We highlight the multitude of benefits that DAS brings to MU-MIMO and 802.11ac in general. However, several challenges arise in the process of realizing these benefits in practice, where avoiding client …
Using Consumer Informedness As An Information Strategy, Ting Li, Robert John Kauffman, Eric Van Heck, Peter Vervest, Benedict Dellaert
Using Consumer Informedness As An Information Strategy, Ting Li, Robert John Kauffman, Eric Van Heck, Peter Vervest, Benedict Dellaert
Research Collection School Of Computing and Information Systems
Consumer informedness describes the degree to which consumers are aware of the specific attributes of products or services offered in the marketplace. Understanding how this level of informedness can amplify consumer behaviour provides firms with the opportunity to develop information-based strategies that can encourage their target segment make purchases.
I’Ve Heard You Have Problems: Cellular Signal Monitoring Through Ue Participatory Sensing, Huiguang Liang, Hyong Kim, Hwee-Pink Tan, Wai-Leong Yeow
I’Ve Heard You Have Problems: Cellular Signal Monitoring Through Ue Participatory Sensing, Huiguang Liang, Hyong Kim, Hwee-Pink Tan, Wai-Leong Yeow
Research Collection School Of Computing and Information Systems
The operating environment of cellular networks can be in a constant state of change. One Singaporean operator expressed difficulty with the coverage assertion (CA) problem of whether regulated minimum coverage is met, especially in urban areas. Currently, the operator manually appraises coverage through laborious and expensive walk/drive-tests. In this paper, we propose Tattle, a distributed, low-cost and comprehensive cellular network measurement collection and processing framework. We exemplify Tattle by leveraging on participating UEs to report on network coverage in real-time. Tattle exploits wireless local-area interfaces to exchange RSCP measurements amongst devices to preserve the co-locality of readings and conserve power. …
Unisense: A Unified And Sustainable Sensing And Transport Architecture For Large Scale And Heterogeneous Sensor Networks, Yunye Jin, Hwee-Pink Tan
Unisense: A Unified And Sustainable Sensing And Transport Architecture For Large Scale And Heterogeneous Sensor Networks, Yunye Jin, Hwee-Pink Tan
Research Collection School Of Computing and Information Systems
In this paper, we propose UNISENSE, a unified and sustainable sensing and transport architecture for large scale and heterogeneous sensor networks. The proposed architecture incorporates seven principal components, namely, application profiling, node architecture, intelligent network design, network management, deep sensing, generalized participatory sensing, and security. We describe the design and implementation for each component. We also present the deployment and performance of the UNISENSE architecture in four practical applications.
Rbc Properties Pte Ltd V Defu Furniture Pte Ltd [2014] Sgca 62: Restatement Of Law Relating To Misrepresentation In Singapore, Yihan Goh
Research Collection Yong Pung How School Of Law
The recent Court of Appeal decision of RBC Properties Pte Ltd v Defu Furniture Pte Ltd [2014] SGCA 62 (“RBC Properties”) contains an invaluable restatement of the law relating to misrepresentation in Singapore. This entry aims only to summarise that restatement of law. The interested reader may find the facts of the case succinctly discussed by the Court of Appeal in its judgment here and also in this blog entry on the High Court decision.
R1 International Pte Ltd V Lonstroff Ag [2014] Sgca 56: Lessons In Contractual Formation, Yihan Goh
R1 International Pte Ltd V Lonstroff Ag [2014] Sgca 56: Lessons In Contractual Formation, Yihan Goh
Research Collection Yong Pung How School Of Law
The rules relating to contractual formation are easy to state but difficult to apply in the varied circumstances of practice. It is therefore helpful that the recent Court of Appeal decision of R1 International Pte Ltd v Lonstroff AG [2014] SGCA 56 (“R1 International”) provides much guidance in this area of the law.
R1 International concerned whether a set of terms to arbitrate in Singapore, found in a detailed contract note sent by the appellant to the respondent shortly after their deal (“the deal”) was concluded, was incorporated as part of the contract between the parties. The answer …
Negotiating Deals From A Position Of Powerlessness, Michael Schaerer, Roderick I. Swaab
Negotiating Deals From A Position Of Powerlessness, Michael Schaerer, Roderick I. Swaab
Research Collection Lee Kong Chian School Of Business
When you are negotiating a deal it pays to have viable alternatives to fall back on – or at least that’s what most people think. New research suggests that being powerless can be liberating and help you achieve better deals.
Substitutes Or Complements? A Configurational Examination Of Corporate Governance Mechanisms, Vilmos Misangyi, Abhijith G. Acharya
Substitutes Or Complements? A Configurational Examination Of Corporate Governance Mechanisms, Vilmos Misangyi, Abhijith G. Acharya
Research Collection Lee Kong Chian School Of Business
We conduct an exploratory qualitative comparative case analysis of the S&P 1500 firms with the aim of elaborating theory on how corporate governance mechanisms work together effectively. To do so, we integrate extant theory and research to specify the bundle of mechanisms that operate to mitigate the agency problem among publicly traded corporations and review what previous research has said about how these mechanisms combine. We then use the fuzzy-set approach to qualitative comparitive analysis (QCA) to explore the combinations of governance mechanisms that exist among the S&P 1500 firms that achieve high (and not-high) profitability. Our findings suggest that …
A Network Bidder Behavior Model In Online Auctions: A Case Of Fine Art Auctions, Mayukh Dass, Srinivas K. Reddy, Dawn Iacobucci
A Network Bidder Behavior Model In Online Auctions: A Case Of Fine Art Auctions, Mayukh Dass, Srinivas K. Reddy, Dawn Iacobucci
Research Collection Lee Kong Chian School Of Business
The marketing literature provides a solid understanding of auctions regarding final sales prices and many aspects of the processes that unfold to result in those outcomes. This research complements those perspectives by first presenting a new bidder behavior model that shows the role of emergent network ties among bidders on the auction outcome. Dyadic ties are identified as the bid and counter-bid patterns of interactions between bidders that unfold throughout the duration of an auction. These structures are modeled using network analyses, which enables: (1) a richer understanding of detailed auction processes, both within auctions and across auctions of multiple …
Enhancing Training Motivation In The Public Sector In South Korea: The Value Of A Contingency Approach, Yong Hyun Kim, Ong, Madeline, Jang Hoon Chung
Enhancing Training Motivation In The Public Sector In South Korea: The Value Of A Contingency Approach, Yong Hyun Kim, Ong, Madeline, Jang Hoon Chung
Research Collection Lee Kong Chian School Of Business
Public sector organisations which invest in trainingprogrammes care about their employees’ successful application of learntknowledge and skills in the workplace. The present study finds that leadersupport positively influences public sector employees’ training motivation,specifically the motivation to transfer learnt knowledge and skills to theirjobs. However, this positive relationship is moderated by employees’ priorknowledge of training content. When employees have high levels of priorknowledge of training content, leader support is not a significant influence ontheir motivation to transfer learnt knowledge and skills to their jobs. Thesefindings are derived from a survey of 335 South Korean government officials whorecently participated in a training …
On The Limitations Of Using Situational Judgement Tests To Measure Interpersonal Skills: The Moderating Influence Of Employee Anger, Jerel E. Slaughter, Michael S. Christian, Nathan P. Podsakoff, Evan F. Sinar, Filip Lievens
On The Limitations Of Using Situational Judgement Tests To Measure Interpersonal Skills: The Moderating Influence Of Employee Anger, Jerel E. Slaughter, Michael S. Christian, Nathan P. Podsakoff, Evan F. Sinar, Filip Lievens
Research Collection Lee Kong Chian School Of Business
Many authors have suggested that situational judgment tests (SJTs) are useful tools for assessing applicants because SJT items can be written to assess a number of job-related knowledges, skills, abilities and other characteristics (KSAOs). However, SJTs may not be appropriate for measuring certain KSAOs for some applicants. We posit that using SJTs to measure interpersonal skills may lead to invalid inferences about applicants with higher levels of angry hostility (AH), and thus, AH should moderate the relation between interpersonally oriented SJTs and job performance. Three studies, using samples of healthcare workers (n = 225), police officers (n = 54), and …