Search results

21 – 30 of over 14000
Executive summary
Publication date: 16 December 2022

JAPAN: Tokyo launches major upgrade of defence forces

Details

DOI: 10.1108/OXAN-ES274748

ISSN: 2633-304X

Keywords

Geographic
Topical
Expert briefing
Publication date: 11 May 2020

Space as a domain of warfare.

Abstract

Details

Drones and the Law
Type: Book
ISBN: 978-1-80043-249-9

Article
Publication date: 5 October 2022

Amy Wong and Yu-Chen Hung

This paper aims to examine the antecedents of brand passion and brand community commitment, namely, self-congruity and athlete attraction, as well as their effects on online brand…

1618

Abstract

Purpose

This paper aims to examine the antecedents of brand passion and brand community commitment, namely, self-congruity and athlete attraction, as well as their effects on online brand advocacy in online brand communities.

Design/methodology/approach

The sample comprises members of a Facebook football fan club brand community. An online survey measuring athlete-level factors, team-level factors and online brand advocacy provides data to test the conceptual framework using structural equation modeling with partial least squares (PLS-SEM).

Findings

The findings of this paper support the positive spillover effect from athlete subbrand to team brand advocacy, as self-congruity exerted positive effects on brand passion and brand community commitment, while athlete attraction influenced brand community commitment, leading to online brand advocacy.

Research limitations/implications

The findings validate the dimensions of online brand advocacy and advance research on sports brand hierarchy in brand architecture by establishing the transference effect from athlete to the team brand.

Practical implications

To effectively manage their brands online, brand managers need to pay attention to the powerful and multifaceted tool of online brand advocacy. Brand managers can capitalize on their active advocates by working closely with them to co-create uplifting and authentic brand stories that are worthwhile for sharing, especially in times of crisis.

Originality/value

Building on the developmental trajectory of brand love and vicarious brand experience, the findings verify the directionality of the spillover effect and offer insights into the development of brand advocacy across different brand levels.

Details

Journal of Product & Brand Management, vol. 32 no. 2
Type: Research Article
ISSN: 1061-0421

Keywords

Article
Publication date: 7 March 2016

Zvika Afik, Yaron Lahav and Lior Mandelzweig

This paper aims to study and document the effect of counter-terrorism on stock returns. The authors select a sample of pro-active defense operations, performed by the Israeli…

Abstract

Purpose

This paper aims to study and document the effect of counter-terrorism on stock returns. The authors select a sample of pro-active defense operations, performed by the Israeli military and government agencies, with significant media coverage, including leading international channels.

Design/methodology/approach

The authors use the event study methodology to assess the effect of each operation on the Israeli equity market. The theoretical background of this work is the recent behavioral literature on anomalies in the formation of asset pricing and in investors’ decision-making.

Findings

The authors find generally a statistically significant positive equity market reaction, on average, to prominent successful operations. The initial market response is usually negative and then changes according to the type of event, its specific circumstances and expected ramifications.

Originality/value

Unlike the vast prior literature on terror effects, the authors believe that this is the first paper to study the market reaction to prominent counter-terrorism operations.

Details

Studies in Economics and Finance, vol. 33 no. 1
Type: Research Article
ISSN: 1086-7376

Keywords

Book part
Publication date: 25 March 2011

Johan M.G. van der Dennen

In this chapter, I use the term “biopolitics” to mean evolutionarily informed political science. Politics has been characterized as “Who gets what, when, and how” (Lasswell, 1936

Abstract

In this chapter, I use the term “biopolitics” to mean evolutionarily informed political science. Politics has been characterized as “Who gets what, when, and how” (Lasswell, 1936), but rather than about material possessions, politics is understood to be about power, more specifically about collective power, especially differential group power competition, hierarchy and stratification in power distribution, and the universal struggle to enhance power, and to maintain or challenge/destroy this status quo. Politics “should be found in any system of nature in which conflicts of interest exist among cooperating organic units” (Johnson, 1995, p. 279). My main focus will be competitive intergroup relations in monkeys and apes, or as I (van der Dennen, 1995) called it “intergroup agonistic behavior” (IAB). I also briefly treat interindividual and intercoalitionary agonistic behavior when relevant.

Details

Biology and Politics
Type: Book
ISBN: 978-0-85724-580-9

Article
Publication date: 16 August 2023

Jialiang Xie, Shanli Zhang, Honghui Wang and Mingzhi Chen

With the rapid development of Internet technology, cybersecurity threats such as security loopholes, data leaks, network fraud, and ransomware have become increasingly prominent…

Abstract

Purpose

With the rapid development of Internet technology, cybersecurity threats such as security loopholes, data leaks, network fraud, and ransomware have become increasingly prominent, and organized and purposeful cyberattacks have increased, posing more challenges to cybersecurity protection. Therefore, reliable network risk assessment methods and effective network security protection schemes are urgently needed.

Design/methodology/approach

Based on the dynamic behavior patterns of attackers and defenders, a Bayesian network attack graph is constructed, and a multitarget risk dynamic assessment model is proposed based on network availability, network utilization impact and vulnerability attack possibility. Then, the self-organizing multiobjective evolutionary algorithm based on grey wolf optimization is proposed. And the authors use this algorithm to solve the multiobjective risk assessment model, and a variety of different attack strategies are obtained.

Findings

The experimental results demonstrate that the method yields 29 distinct attack strategies, and then attacker's preferences can be obtained according to these attack strategies. Furthermore, the method efficiently addresses the security assessment problem involving multiple decision variables, thereby providing constructive guidance for the construction of security network, security reinforcement and active defense.

Originality/value

A method for network risk assessment methods is given. And this study proposed a multiobjective risk dynamic assessment model based on network availability, network utilization impact and the possibility of vulnerability attacks. The example demonstrates the effectiveness of the method in addressing network security risks.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 17 no. 1
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 1 June 1978

Irving Borwick

How does the interaction between two or more people affect their performance? Is there one strategy which is more effective than another in promoting positive interaction? Can one…

Abstract

How does the interaction between two or more people affect their performance? Is there one strategy which is more effective than another in promoting positive interaction? Can one be more effective as a manager through employing specific strategies and is there a lost potential from the use of ineffective interaction strategies?

Details

Management Decision, vol. 16 no. 6
Type: Research Article
ISSN: 0025-1747

Open Access
Article
Publication date: 5 March 2018

Gro Holst Volden and Bjorn Andersen

The purpose of this paper is to study public project governance frameworks in various ministries and agencies in Norway, following the introduction of such a framework on the…

7093

Abstract

Purpose

The purpose of this paper is to study public project governance frameworks in various ministries and agencies in Norway, following the introduction of such a framework on the topmost level (i.e. the cabinet) which applies to the very largest projects.

Design/methodology/approach

The study is methodologically designed as a qualitative assessment of project governance frameworks that apply to state-funded investment projects in selected sectors, based on data gathered through document reviews and interviews.

Findings

The study finds that all of the agencies have introduced their own project governance frameworks, which are basically consistent with the recommendations from the project management literature and with the cabinet’s overall requirements in Norway. By contrast, only one ministry has taken a formalized role as a project owner. Governance tasks thus seem to be extensively delegated to the subordinate agencies. This even includes strategic tasks such as project selection and portfolio management, and implies there is a risk that public project governance has a narrow and internal focus.

Originality/value

The paper is a first step toward a better understanding of public project governance as a hierarchical system and the relationship between project owners on three levels, the cabinet, the sectoral ministry, and the government agency.

Details

International Journal of Managing Projects in Business, vol. 11 no. 1
Type: Research Article
ISSN: 1753-8378

Keywords

Article
Publication date: 11 September 2017

Jon Randall Lindsay

The empirical record of cyberattacks features much computer crime, espionage and hacktivism, but none of the major damage feared in prevalent threat narratives. The purpose of…

1747

Abstract

Purpose

The empirical record of cyberattacks features much computer crime, espionage and hacktivism, but none of the major damage feared in prevalent threat narratives. The purpose of this article is to explain the absence of serious adverse consequences to date and the durability of this trend.

Design/methodology/approach

This paper combines concepts from international relations theory and new institutional economics to understand cyberspace as a complex global institution with contracts embodied in both software code and human practice. Constitutive inefficiencies (market and regulatory failure) and incomplete contracts (generative features and unintended flaws) create the vulnerabilities that hackers exploit. Cyber conflict is a form of cheating within the rules, rather than an anarchic struggle, more like an intelligence-counterintelligence contest than traditional war.

Findings

Cyber conflict is restrained by the collective sociotechnical constitution of cyberspace, where actors must cooperate to compete. Maintenance of common protocols and open access is a condition for the possibility of attack, and successful deceptive exploitation of these connections becomes more difficult in politically sensitive situations as defense and deterrence become more feasible. The distribution of cyber conflict is, thus, bounded vertically in severity but unbounded horizontally in the potential for creative exploitation.

Originality/value

Cyber conflict can be understood with familiar political economic concepts applied in fresh ways. This application provides counterintuitive insights at odds with prevalent threat narratives about the likelihood and magnitude of cyber conflict. It also highlights the important advantages of strong states over the weaker non-state actors widely thought to be empowered by cyberspace.

Details

Digital Policy, Regulation and Governance, vol. 19 no. 6
Type: Research Article
ISSN: 2398-5038

Keywords

21 – 30 of over 14000