Search results

1 – 10 of over 10000
Book part
Publication date: 10 April 2007

Christiane Wilke

In a series of mid-20th century cases, the U.S. Supreme Court has modified and diversified the status of the enemy in U.S. law. We see a shift away from the statist egalitarian…

Abstract

In a series of mid-20th century cases, the U.S. Supreme Court has modified and diversified the status of the enemy in U.S. law. We see a shift away from the statist egalitarian model toward a transnationalized model of enemies. U.S. Supreme Court decisions in three clusters of cases (German enemy aliens, the internment of the West Coast Japanese Americans, and Communist) from the 1940s and 1950s prefigure the radicalized post-9/11 “enemy combatant” status. The choice for such enemy conceptions is both a result of and a contribution to the changes in contemporary practices of violence.

Details

Studies in Law, Politics and Society
Type: Book
ISBN: 978-0-7623-1324-2

Abstract

Details

Organizational Behavior Management
Type: Book
ISBN: 978-1-78769-678-5

Article
Publication date: 1 February 2000

D. Keith Denton

The shooting at Columbine high school in Colorado and the Oklahoma City bombing have at least one thing in common: Perceived enemies were a powerful motivator for these horrible…

Abstract

The shooting at Columbine high school in Colorado and the Oklahoma City bombing have at least one thing in common: Perceived enemies were a powerful motivator for these horrible acts. Enemies can be and are powerful motivators. They give us a sense of community. Top executives at Unisys Corporation, General Electric, Coca‐Cola and Springfield Remanufacturing Corporation know about these powerful motivators—that if people do not have a natural enemy, they will create their own. These executives know how to create external ones so that their employees do not create internal ones. They focus their people on looking outward, on finding positive goals.

Details

Competitiveness Review: An International Business Journal, vol. 10 no. 2
Type: Research Article
ISSN: 1059-5422

Article
Publication date: 6 October 2020

Yao-Yuan Yeh and Charles K.S. Wu

In this paper, the authors investigate the factors that explain US public support for military operation for the enemy's enemy, and argue that US public support for military…

Abstract

Purpose

In this paper, the authors investigate the factors that explain US public support for military operation for the enemy's enemy, and argue that US public support for military defense could be attributed to three factors – whether such support aligns with US national interests, whether the public perceives the US enemy to be a threat and whether interventions and military assistance to the enemy's enemy garner moral grounds.

Design/methodology/approach

To find evidence of our claims, the authors conducted two survey experiments in 2018 and 2019 on Amazon.com's Mechanical Turk (MTurk) to see whether the ongoing trade war between the US and China (enemy) would alter the public's willingness to provide military assistance to Taiwan (enemy's enemy).

Findings

The authors first find that US national interests only matter when the public considers China's military to be not a threat when the US–China rivalry intensifies. In both waves, respondents were most likely to support for Taiwan's defense if they perceived China's military to be a major threat, followed by a minor threat and not a threat, respectively. Contrary to our theoretical expectation, the study does not find empirical support for moral factors.

Originality/value

Our research applies the survey experiments among the US public to gauge public support for the enemy's enemy (Taiwan), which generates unique and vital findings to foreign policymakers and international observers.

Details

Asian Education and Development Studies, vol. 11 no. 2
Type: Research Article
ISSN: 2046-3162

Keywords

Content available
Article
Publication date: 7 March 2019

Joshua R. Muckensturm and Dave C. Longhorn

This paper introduces a new heuristic algorithm that aims to solve the military route vulnerability problem, which involves assessing the vulnerability of military cargo flowing…

1150

Abstract

Purpose

This paper introduces a new heuristic algorithm that aims to solve the military route vulnerability problem, which involves assessing the vulnerability of military cargo flowing over roads and railways subject to enemy interdiction.

Design/methodology/approach

Graph theory, a heuristic and a binary integer program are used in this paper.

Findings

This work allows transportation analysts at the United States Transportation Command to identify a relatively small number of roads or railways that, if interdicted by an enemy, could disrupt the flow of military cargo within any theater of operation.

Research limitations/implications

This research does not capture aspects of time, such as the reality that cargo requirements and enemy threats may fluctuate each day of the contingency.

Practical implications

This work provides military logistics planners and decision-makers with a vulnerability assessment of theater distribution routes, including insights into which specific roads and railways may require protection to ensure the successful delivery of cargo from ports of debarkation to final destinations.

Originality/value

This work merges network connectivity and flow characteristics with enemy threat assessments to identify militarily-useful roads and railways most vulnerable to enemy interdictions. A geographic combatant command recently used this specific research approach to support their request for rapid rail repair capability.

Details

Journal of Defense Analytics and Logistics, vol. 3 no. 1
Type: Research Article
ISSN: 2399-6439

Keywords

Book part
Publication date: 6 September 2021

Christian Fuchs

This chapter asks: How do Internet users react to COVID-19 conspiracy theories spread on social media? It presents the findings of a content analysis and critical discourse…

Abstract

This chapter asks: How do Internet users react to COVID-19 conspiracy theories spread on social media? It presents the findings of a content analysis and critical discourse analysis of user comments collected from social media postings that advance COVID-19 conspiracy theories. A total of 2,847 comments made to seven social media postings whose authors support COVID-19 conspiracy theories were collected, coded and analysed.

The analysis shows the contested character of the communication of COVID-19 conspiracy theories and the role of the friend/enemy scheme, verbal attacks, violent threats, satire and humour in such communication processes.

Article
Publication date: 1 April 1998

Low Sui Pheng

The Thirty‐six Chinese Classical Strategies of War is a renowned ancient book of warfare circulated among Chinese army commanders for a long period of time. Apart from its focus…

4111

Abstract

The Thirty‐six Chinese Classical Strategies of War is a renowned ancient book of warfare circulated among Chinese army commanders for a long period of time. Apart from its focus on warfare, this ancient treatise also holds valuable lessons for the world of competitive business. This paper presents the general principles espoused in the Thirty‐six Chinese Classical Strategies of War and how these principles can be applied for strategic planning and marketing in the retail sector. It provides a refreshing view of strategic planning and intelligence gathering for retail marketing.

Details

Marketing Intelligence & Planning, vol. 16 no. 2
Type: Research Article
ISSN: 0263-4503

Keywords

Article
Publication date: 1 January 1979

LLOYD J. DUMAS

The quest for national security through the expansion of military force has been a dominant feature of international relations for the past three decades. Since the Second World…

Abstract

The quest for national security through the expansion of military force has been a dominant feature of international relations for the past three decades. Since the Second World War this quest has given rise to an arms race which has seen the development, production and deployment of weapons of mass destruction in numbers great enough to threaten the termination of human society. It is thus only reasonable to try to understand the forces which have propelled this process forward and to ask whether the process has, in fact, resulted in the achievement of its alleged primary objective — the improvement, or at least the maintenance of the military security of the participants.

Details

Journal of Economic Studies, vol. 6 no. 1
Type: Research Article
ISSN: 0144-3585

Article
Publication date: 1 February 1993

Robert M. Cleary

Rap music subordinates music to language. It is this emphasis on language that can make rap a vehicle for many ideas, if that is the rapper's intention. Playthell Benjamin, former…

Abstract

Rap music subordinates music to language. It is this emphasis on language that can make rap a vehicle for many ideas, if that is the rapper's intention. Playthell Benjamin, former academic and freelance writer for such magazines as the Village Voice and Emerge, believes that rappers can be divided into distinct groups, based on the message or non‐message conveyed. He groups rappers as “Narcissists, didactics, party‐time rappers, or gangsters” based on the content of their rapping. Any rapper who falls into one of these groups can have political significance for blacks, whites, women, liberals, conservatives, Jews, Muslims, and Christians. Narcissists frequently refer to women as mere sex objects, the worst example being the group 2 Live Crew, and less offensive examples being L.L. Cool J. and Big Daddy Kane. Didactics are the chief proponents of Afrocentric thinking and revisionist history. Representatives of this style would be Public Enemy, KRS‐One, and X‐Clan. Party‐time rappers, such as Heavy D and the Boyz or Biz Markie, are rarely serious, but sexism and homophobia can be elements in their raps. Gangster rappers N.W.A., Ice‐T, and Ice Cube are currently receiving a lot of attention from the press, and violent behavior characterizes their lyrics.

Details

Reference Services Review, vol. 21 no. 2
Type: Research Article
ISSN: 0090-7324

Article
Publication date: 1 March 1999

Allan Metz

President Bill Clinton has had many opponents and enemies, most of whom come from the political right wing. Clinton supporters contend that these opponents, throughout the Clinton…

Abstract

President Bill Clinton has had many opponents and enemies, most of whom come from the political right wing. Clinton supporters contend that these opponents, throughout the Clinton presidency, systematically have sought to undermine this president with the goal of bringing down his presidency and running him out of office; and that they have sought non‐electoral means to remove him from office, including Travelgate, the death of Deputy White House Counsel Vincent Foster, the Filegate controversy, and the Monica Lewinsky matter. This bibliography identifies these and other means by presenting citations about these individuals and organizations that have opposed Clinton. The bibliography is divided into five sections: General; “The conspiracy stream of conspiracy commerce”, a White House‐produced “report” presenting its view of a right‐wing conspiracy against the Clinton presidency; Funding; Conservative organizations; and Publishing/media. Many of the annotations note the links among these key players.

Details

Reference Services Review, vol. 27 no. 1
Type: Research Article
ISSN: 0090-7324

Keywords

1 – 10 of over 10000