scispace - formally typeset
Search or ask a question
Author

Debasish Banerjee

Bio: Debasish Banerjee is an academic researcher from University of Calcutta. The author has contributed to research in topics: Neutron & Nuclear drip line. The author has an hindex of 13, co-authored 46 publications receiving 1000 citations. Previous affiliations of Debasish Banerjee include Western Carolina University & University of Arkansas.

Papers
More filters
Journal ArticleDOI
TL;DR: The study identifies acteristics that are associated with and may influence the ethical behavior intention of information systems employees when faced with ethical dilemmas and shows that individual and situational characteristics do influenceethical behavior intention.
Abstract: Misuse of computer information systems has caused significant losses to business and society, even though computing has benefited both businesses and professionals. To this end, several measures have been suggested that both prevent and deter losses. One deterrent measure is to identify individual and situational characteristics of people who act ethically/ unethically. This study identifies specific charIlzak Benbasat was the accepting senior editor for this paper. acteristics that are associated with and may influence the ethical behavior intention of information systems employees when faced with ethical dilemmas. The results of the study show that individual and situational characteristics do influence ethical behavior intention.

323 citations

Journal ArticleDOI
TL;DR: In this paper, a model of potential determinants of softlifting behavior is developed and tested, and the analysis provides some support for the hypothesized model, specifically situational variables, such as delayed acquisition times, and personal gain variables such as the challenge of copying.
Abstract: Softlifting (software piracy by individuals) is an unethical behavior that pervades today's computer dependent society. Since a better understanding of underlying considerations of the behavior may provide a basis for remedy, a model of potential determinants of softlifting behavior is developed and tested. The analysis provides some support for the hypothesized model, specifically situational variables, such as delayed acquisition times, and personal gain variables, such as the challenge of copying, affect softlifting behavior. Most importantly, the analysis indicated that ethical perception of softlifting has no significant affect on softlifting behavior. These findings suggest major implications for both software manufacturers and academicians attempting to reduce piracy behavior through ethics instruction.

184 citations

Journal ArticleDOI
TL;DR: In this paper, a quantum simulator for U(N) and SU (N) lattice gauge theories with fermionic matter based on quantum link models is presented. But the simulator does not suffer from sign problems and can address the corresponding chiral dynamics in real time.
Abstract: Using ultracold alkaline-earth atoms in optical lattices, we construct a quantum simulator for U(N) and SU(N) lattice gauge theories with fermionic matter based on quantum link models. These systems share qualitative features with QCD, including chiral symmetry breaking and restoration at nonzero temperature or baryon density. Unlike classical simulations, a quantum simulator does not suffer from sign problems and can address the corresponding chiral dynamics in real time.

175 citations

Journal ArticleDOI
TL;DR: In this paper, the authors measured the positron annihilation lifetime in the superconductor and observed a reduction of lifetime components in the high-T$ c$ region, where the number density of low momentum electrons at the annihilation sites at the nuclear sites was measured.
Abstract: The present measurement of positron annihilation lifetimes for the high-${T}_{c}$ superconductor $({\mathrm{Bi}}_{0.92}{\mathrm{Pb}}_{0.17}{)}_{2}{\mathrm{Sr}}_{1.91}{\mathrm{Ca}}_{2.03}{\mathrm{Cu}}_{3.06}{\mathrm{O}}_{10+\ensuremath{\delta}}$ or (Bi,Pb)-2223, as a function of temperature, has been inspired by our recent DBPARL (Doppler-broadened positron annihilation radiation line shape) finding of a step and minima in the region around ${T}_{c}(R=0)=104$ K, in the variation with temperature, of the fraction of low momentum electrons at the annihilation sites. The positron annihilation lifetime in the superconductor probes the number density of electrons at the annihilation sites. The present work observes a reduction of lifetime components in the ${T}_{c}$ region. Significant changes in the lifetime components in other temperature regions have also been observed and discussed.

67 citations

Journal ArticleDOI
TL;DR: In this paper, the parent mullite is doped with transition metal ions and the changes in the electronic properties of these doped materials have been studied by positron annihilation lifetime spectroscopy as well as Doppler broadened line shape analysis.
Abstract: Mullite, an extremely useful ceramic material, is doped with transition metal ions. The changes in the electronic properties of these doped materials have been studied by positron annihilation lifetime spectroscopy as well as Doppler broadened line shape analysis. The results on the positron annihilation parameters are characteristic of ionic size, oxidation state and the “d”-electron configuration of the respective transition metals doped in the parent lattice of the mullite. These results, along with the resistivity measurements are suggestive of transition of the parent mullite from an insulator to a semimetal in the modified structure.

23 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This meta-analysis draws from over 30 years of research and multiple literatures to examine individual, moral issue, and organizational environment antecedents of unethical choice, providing empirical support for several foundational theories and painting a clearer picture of relationships characterized by mixed results.
Abstract: As corporate scandals proliferate, practitioners and researchers alike need a cumulative, quantitative understanding of the antecedents associated with unethical decisions in organizations. In this meta-analysis, the authors draw from over 30 years of research and multiple literatures to examine individual ("bad apple"), moral issue ("bad case"), and organizational environment ("bad barrel") antecedents of unethical choice. Findings provide empirical support for several foundational theories and paint a clearer picture of relationships characterized by mixed results. Structural equation modeling revealed the complexity (multidetermined nature) of unethical choice, as well as a need for research that simultaneously examines different sets of antecedents. Moderator analyses unexpectedly uncovered better prediction of unethical behavior than of intention for several variables. This suggests a need to more strongly consider a new "ethical impulse" perspective in addition to the traditional "ethical calculus" perspective. Results serve as a data-based foundation and guide for future theoretical and empirical development in the domain of behavioral ethics.

1,257 citations

Journal ArticleDOI
TL;DR: Results of comparative qualitative studies in two information services Fortune 500 firms identify an approach that can effectively deal with systems risk, and this theory-based security program includes use of a security risk planning model, education/training in security awareness, and Countermeasure Matrix analysis.
Abstract: The likelihood that the firm's information systems are insufficiently protected against certain kinds of damage or loss is known as "systems risk." Risk can be managed or reduced when managers are aware of the full range of controls available and implement the most effective controls. Unfortunately, they often lack this knowledge, and their subsequent actions to cope with systems risk are less effective than they might otherwise be. This is one viable explanation for why losses from computer abuse and computer disasters today are uncomfortably large and still so potentially devastating after many years of attempting to deal with the problem. Results of comparative qualitative studies in two information services Fortune 500 firms identify an approach that can effectively deal with the problem. This theory-based security program includes (1) use of a security risk planning model, (2) education/training in security awareness, and (3) Countermeasure Matrix analysis.

1,174 citations

Journal ArticleDOI
TL;DR: An extended deterrence theory model is presented that combines work from criminology, social psychology, and information systems and suggests that user awareness of security countermeasures directly influences the perceived certainty and severity of organizational sanctions associated with IS misuse, which leads to reduced IS misuse intention.
Abstract: Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significant threat to organizations. For example, industry statistics suggest that between 50%--75% of security incidents originate from within an organization. Because of the large number of misuse incidents, it has become important to understand how to reduce such behavior. General deterrence theory suggests that certain controls can serve as deterrent mechanisms by increasing the perceived threat of punishment for IS misuse. This paper presents an extended deterrence theory model that combines work from criminology, social psychology, and information systems. The model posits that user awareness of security countermeasures directly influences the perceived certainty and severity of organizational sanctions associated with IS misuse, which leads to reduced IS misuse intention. The model is then tested on 269 computer users from eight different companies. The results suggest that three practices deter IS misuse: user awareness of security policies; security education, training, and awareness (SETA) programs; and computer monitoring. The results also suggest that perceived severity of sanctions is more effective in reducing IS misuse than certainty of sanctions. Further, there is evidence that the impact of sanction perceptions vary based on one's level of morality. Implications for the research and practice of IS security are discussed.

1,070 citations

Journal ArticleDOI
TL;DR: Different realized and proposed techniques for creating gauge potentials-both Abelian and non-Abelian-in atomic systems and their implication in the context of quantum simulation are reviewed.
Abstract: Gauge fields are central in our modern understanding of physics at all scales. At the highest energy scales known, the microscopic universe is governed by particles interacting with each other through the exchange of gauge bosons. At the largest length scales, our Universe is ruled by gravity, whose gauge structure suggests the existence of a particle—the graviton—that mediates the gravitational force. At the mesoscopic scale, solid-state systems are subjected to gauge fields of different nature: materials can be immersed in external electromagnetic fields, but they can also feature emerging gauge fields in their low-energy description. In this review, we focus on another kind of gauge field: those engineered in systems of ultracold neutral atoms. In these setups, atoms are suitably coupled to laser fields that generate effective gauge potentials in their description. Neutral atoms ‘feeling’ laser-induced gauge potentials can potentially mimic the behavior of an electron gas subjected to a magnetic field, but also, the interaction of elementary particles with non-Abelian gauge fields. Here, we review different realized and proposed techniques for creating gauge potentials—both Abelian and non-Abelian—in atomic systems and discuss their implication in the context of quantum simulation. While most of these setups concern the realization of background and classical gauge potentials, we conclude with more exotic proposals where these synthetic fields might be made dynamical, in view of simulating interacting gauge theories with cold atoms.

960 citations