From a motivational perspective of feedback-seeking behavior, we examined the mediating role of leaders' negative feedback-seeking from subordinates in the relationship between the quality of leader-member exchange (LMX) and subordinates' evaluation of leader effectiveness, along with the moderating role of subordinate expertise in the mediated relationship. Using 151 unique matched sets of leader and subordinate reports obtained from 5 large Korean companies, we found that the positive relationship between LMX and leader effectiveness was mediated by leaders' negative feedback-seeking. Additionally, the positive relationship between LMX and leader negative feedback-seeking was stronger when perceived subordinate expertise was lower. Lastly, the indirect effect of LMX on leader effectiveness through leader negative feedback-seeking was stronger when perceived subordinate expertise was lower. These findings were obtained after controlling for leaders' power distance and goal orientations that might influence their motives to seek or avoid feedback. Theoretical and practical implications are discussed. 相似文献
The presence of strategic attackers has become an important factor in the security and protection of systems, especially since the 9/11/2001 attacks, and considerable efforts have been dedicated to its study. When defending against the strategic attacker, many existing studies assume that the attacker would seek to minimize the defender's utility, which implies that the defender and attacker have symmetric utilities. However, the attacker's objective is determined by its own valuation of the system and target of the attack, which is not necessarily consistent with the defender's utility. If the attacker unexpectedly targets a different utility, then the defense strategy might no longer be optimal. In particular, the defense strategy could be inferior if the attacker's utility is not known to the defender. This study considers a situation where the defender's utility is the system survivability and the attacker's utility is the expected number of destroyed elements in the system. We investigate possible attack strategies under these two different utilities and compare (a) the conservative defense strategy when the attack utility is unknown to the defender with (b) the optimal defense strategy when the attack utility is known to the defender. We show that the conservative protection strategy is still optimal under asymmetric utilities when the contest intensity is smaller than one. 相似文献
China implemented the two-child policy in 2016, however, potential impacts of this new policy on its population reality have not been adequately understood. Using population census data and 1% population sampling data during the period of 1982–2015, this study develops a fertility simulation model to explore the effects of the two-child policy on women’s total fertility rate, and employs Cohort Component Method in population projections to examine China’s demographic future with different fertility regimes. The fertility simulation results reveal that the two-child policy will make significantly positive effects on China’s total fertility rate through increasing second births, leading to a sharp but temporary increase in the first 5 years after the implementation of the new policy. In addition, population projections using simulated total fertility rates show that the Chinese population would reach its peak value around the middle 2020s and be faced with the reduction of labor force supply and rapid aging process, featured with remarkable increases in both size and share of the elderly population. The findings suggest that the two-child policy would undoubtedly affect China’s fertility rates and demographic future; however, the effects are mild and temporary.