Search results
21 – 30 of over 14000
JAPAN: Tokyo launches major upgrade of defence forces
Details
DOI: 10.1108/OXAN-ES274748
ISSN: 2633-304X
Keywords
Geographic
Topical
Space as a domain of warfare.
Details
DOI: 10.1108/OXAN-DB252511
ISSN: 2633-304X
Keywords
Geographic
Topical
Amy Wong and Yu-Chen Hung
This paper aims to examine the antecedents of brand passion and brand community commitment, namely, self-congruity and athlete attraction, as well as their effects on online brand…
Abstract
Purpose
This paper aims to examine the antecedents of brand passion and brand community commitment, namely, self-congruity and athlete attraction, as well as their effects on online brand advocacy in online brand communities.
Design/methodology/approach
The sample comprises members of a Facebook football fan club brand community. An online survey measuring athlete-level factors, team-level factors and online brand advocacy provides data to test the conceptual framework using structural equation modeling with partial least squares (PLS-SEM).
Findings
The findings of this paper support the positive spillover effect from athlete subbrand to team brand advocacy, as self-congruity exerted positive effects on brand passion and brand community commitment, while athlete attraction influenced brand community commitment, leading to online brand advocacy.
Research limitations/implications
The findings validate the dimensions of online brand advocacy and advance research on sports brand hierarchy in brand architecture by establishing the transference effect from athlete to the team brand.
Practical implications
To effectively manage their brands online, brand managers need to pay attention to the powerful and multifaceted tool of online brand advocacy. Brand managers can capitalize on their active advocates by working closely with them to co-create uplifting and authentic brand stories that are worthwhile for sharing, especially in times of crisis.
Originality/value
Building on the developmental trajectory of brand love and vicarious brand experience, the findings verify the directionality of the spillover effect and offer insights into the development of brand advocacy across different brand levels.
Details
Keywords
Zvika Afik, Yaron Lahav and Lior Mandelzweig
This paper aims to study and document the effect of counter-terrorism on stock returns. The authors select a sample of pro-active defense operations, performed by the Israeli…
Abstract
Purpose
This paper aims to study and document the effect of counter-terrorism on stock returns. The authors select a sample of pro-active defense operations, performed by the Israeli military and government agencies, with significant media coverage, including leading international channels.
Design/methodology/approach
The authors use the event study methodology to assess the effect of each operation on the Israeli equity market. The theoretical background of this work is the recent behavioral literature on anomalies in the formation of asset pricing and in investors’ decision-making.
Findings
The authors find generally a statistically significant positive equity market reaction, on average, to prominent successful operations. The initial market response is usually negative and then changes according to the type of event, its specific circumstances and expected ramifications.
Originality/value
Unlike the vast prior literature on terror effects, the authors believe that this is the first paper to study the market reaction to prominent counter-terrorism operations.
Details
Keywords
In this chapter, I use the term “biopolitics” to mean evolutionarily informed political science. Politics has been characterized as “Who gets what, when, and how” (Lasswell, 1936…
Abstract
In this chapter, I use the term “biopolitics” to mean evolutionarily informed political science. Politics has been characterized as “Who gets what, when, and how” (Lasswell, 1936), but rather than about material possessions, politics is understood to be about power, more specifically about collective power, especially differential group power competition, hierarchy and stratification in power distribution, and the universal struggle to enhance power, and to maintain or challenge/destroy this status quo. Politics “should be found in any system of nature in which conflicts of interest exist among cooperating organic units” (Johnson, 1995, p. 279). My main focus will be competitive intergroup relations in monkeys and apes, or as I (van der Dennen, 1995) called it “intergroup agonistic behavior” (IAB). I also briefly treat interindividual and intercoalitionary agonistic behavior when relevant.
Jialiang Xie, Shanli Zhang, Honghui Wang and Mingzhi Chen
With the rapid development of Internet technology, cybersecurity threats such as security loopholes, data leaks, network fraud, and ransomware have become increasingly prominent…
Abstract
Purpose
With the rapid development of Internet technology, cybersecurity threats such as security loopholes, data leaks, network fraud, and ransomware have become increasingly prominent, and organized and purposeful cyberattacks have increased, posing more challenges to cybersecurity protection. Therefore, reliable network risk assessment methods and effective network security protection schemes are urgently needed.
Design/methodology/approach
Based on the dynamic behavior patterns of attackers and defenders, a Bayesian network attack graph is constructed, and a multitarget risk dynamic assessment model is proposed based on network availability, network utilization impact and vulnerability attack possibility. Then, the self-organizing multiobjective evolutionary algorithm based on grey wolf optimization is proposed. And the authors use this algorithm to solve the multiobjective risk assessment model, and a variety of different attack strategies are obtained.
Findings
The experimental results demonstrate that the method yields 29 distinct attack strategies, and then attacker's preferences can be obtained according to these attack strategies. Furthermore, the method efficiently addresses the security assessment problem involving multiple decision variables, thereby providing constructive guidance for the construction of security network, security reinforcement and active defense.
Originality/value
A method for network risk assessment methods is given. And this study proposed a multiobjective risk dynamic assessment model based on network availability, network utilization impact and the possibility of vulnerability attacks. The example demonstrates the effectiveness of the method in addressing network security risks.
Details
Keywords
How does the interaction between two or more people affect their performance? Is there one strategy which is more effective than another in promoting positive interaction? Can one…
Abstract
How does the interaction between two or more people affect their performance? Is there one strategy which is more effective than another in promoting positive interaction? Can one be more effective as a manager through employing specific strategies and is there a lost potential from the use of ineffective interaction strategies?
Gro Holst Volden and Bjorn Andersen
The purpose of this paper is to study public project governance frameworks in various ministries and agencies in Norway, following the introduction of such a framework on the…
Abstract
Purpose
The purpose of this paper is to study public project governance frameworks in various ministries and agencies in Norway, following the introduction of such a framework on the topmost level (i.e. the cabinet) which applies to the very largest projects.
Design/methodology/approach
The study is methodologically designed as a qualitative assessment of project governance frameworks that apply to state-funded investment projects in selected sectors, based on data gathered through document reviews and interviews.
Findings
The study finds that all of the agencies have introduced their own project governance frameworks, which are basically consistent with the recommendations from the project management literature and with the cabinet’s overall requirements in Norway. By contrast, only one ministry has taken a formalized role as a project owner. Governance tasks thus seem to be extensively delegated to the subordinate agencies. This even includes strategic tasks such as project selection and portfolio management, and implies there is a risk that public project governance has a narrow and internal focus.
Originality/value
The paper is a first step toward a better understanding of public project governance as a hierarchical system and the relationship between project owners on three levels, the cabinet, the sectoral ministry, and the government agency.
Details
Keywords
The empirical record of cyberattacks features much computer crime, espionage and hacktivism, but none of the major damage feared in prevalent threat narratives. The purpose of…
Abstract
Purpose
The empirical record of cyberattacks features much computer crime, espionage and hacktivism, but none of the major damage feared in prevalent threat narratives. The purpose of this article is to explain the absence of serious adverse consequences to date and the durability of this trend.
Design/methodology/approach
This paper combines concepts from international relations theory and new institutional economics to understand cyberspace as a complex global institution with contracts embodied in both software code and human practice. Constitutive inefficiencies (market and regulatory failure) and incomplete contracts (generative features and unintended flaws) create the vulnerabilities that hackers exploit. Cyber conflict is a form of cheating within the rules, rather than an anarchic struggle, more like an intelligence-counterintelligence contest than traditional war.
Findings
Cyber conflict is restrained by the collective sociotechnical constitution of cyberspace, where actors must cooperate to compete. Maintenance of common protocols and open access is a condition for the possibility of attack, and successful deceptive exploitation of these connections becomes more difficult in politically sensitive situations as defense and deterrence become more feasible. The distribution of cyber conflict is, thus, bounded vertically in severity but unbounded horizontally in the potential for creative exploitation.
Originality/value
Cyber conflict can be understood with familiar political economic concepts applied in fresh ways. This application provides counterintuitive insights at odds with prevalent threat narratives about the likelihood and magnitude of cyber conflict. It also highlights the important advantages of strong states over the weaker non-state actors widely thought to be empowered by cyberspace.
Details