Purpose – This study demonstrates that serious episodes of presidential ill health can have positive impacts on role performance.…
Purpose – This study demonstrates that serious episodes of presidential ill health can have positive impacts on role performance.
Design/methodology – The author utilizes both primary source materials (personal interviews with White House physicians and several other physicians who treated Reagan at the hospital, and the writings of key Reagan aides and family members) and secondary source materials (writings of political scientists, historians, and journalists).
Findings – Reagan was at first in critical condition. It was then that his Secretary of State appeared to make a bold grab for power, an act that contributed materially to the end of his political career. Additionally, the administration’s failure to invoke the presidential disability amendment allowed the official chain of command to be in doubt. Finally, the significant increase in Reagan’s popularity that flowed from his light-hearted demeanor after he was shot is examined here in terms of the President’s subsequent legislative successes.
Originality/value – This study suggests strongly that Reagan’s impressive legislative achievements in mid-1981 were due significantly to his heroic response to having been shot.
This paper aims to give an overview on a number of selected applications in comparison to a previous evaluation conducted two years ago, as well as performing an analysis…
This paper aims to give an overview on a number of selected applications in comparison to a previous evaluation conducted two years ago, as well as performing an analysis on several new applications. Mobile messaging and VoIP applications for smartphones have seen a massive surge in popularity, which has also sparked the interest in research related to their security and privacy protection, leading to in-depth analyses of specific applications or vulnerabilities.
The evaluation methods mostly focus on known vulnerabilities in connection with authentication and validation mechanisms but also describe some newly identified attack vectors.
The results show a positive trend for new applications, which are mostly being developed with security and privacy features, whereas some of the older applications have shown little progress or have even introduced new vulnerabilities. In addition, this paper shows privacy implications of smartphone messaging that are not even solved by today’s most sophisticated “secure” smartphone messaging applications, as well as discusses methods for protecting user privacy during the creation of the user network.
Currently, there is no perfect solution available; thus, further research on this topic needs to be conducted.
In addition to conducting a security evaluation of existing applications together with newly designed messengers that were designed with a security background in mind, several methods for protecting user privacy were discussed. Furthermore, some new attack vectors were discussed.
The phenomenon of superconductivity has been studied for 90 years, with the latest surge in popularity occurring in the late 1980s, when high‐temperature superconductors were first created. In this time much progress has been made to create commercially viable applications of the technology and understand the theory behind the phenomenon. Furthermore, at a time when national science policy was undergoing close scrutiny, the high‐temperature superconductor boom served as a high‐profile case study of the role of government in spurring the acceptance of new technologies. This bibliography provides resources that chronicle the technological and scientific developments in the field since its discovery and the policy decisions and issues that governments and society made when faced with a possible scientific revolution.
The theoretical basis for this case is a focus on strategic positioning as related to Porter’s generic strategies. The case describes GameStop’s previous differentiation…
The theoretical basis for this case is a focus on strategic positioning as related to Porter’s generic strategies. The case describes GameStop’s previous differentiation approach, executed through physical stores and knowledgeable staff. With technological shifts and the introduction of digital downloads, this strategy is less effective. The case requires students to consider how GameStop might revise its generic strategy based on the new competitive landscape in which it operates.
In writing this case, the research team conducted thorough analysis through primary data collection in stores as well as secondary data collection through the use of market research tools, such as IBIS World, MergentOnline, S&P Net Advantage, and academic journals, trade magazines, and websites.
With high uncertainty shown by stakeholders about the future of GameStop coupled with falling share prices, the company must find a way to stay in play given the rapidly growing digital gaming market. As it planned to close at least 150 of its 7,500 stores, the company was starting to take measures to reduce operational costs and restructure to sectors that best fit consumer interests. GameStop’s core competencies were no longer aligned with market conditions, and its executives were now questioning where it could expand the organization’s operations as they focused on finding untapped areas of the market that have an opportunity for a new competitive advantage. Given its unique market share in gaming memorabilia and trade-in values, students are tasked with finding GameStop’s existing competitive advantages or identifying potential new ones that can be leveraged in a technology-driven industry.
Complexity academic level
This case could be taught at either the graduate or undergraduate level strategy course. At the undergraduate level, it would be best taught when discussing industry life cycle or competitive dynamics. At the graduate level, MBAs could discuss competitive dynamics facing GameStop and how it might find areas for future strategic growth.
The rapid fashion swings in popular management theory puzzle and alarm many observers and users of management theory. New concepts arrive, experience a sudden popularity…
The rapid fashion swings in popular management theory puzzle and alarm many observers and users of management theory. New concepts arrive, experience a sudden popularity, then flatten out and are soon forgotten or appear old‐fashioned. This article presents a model of such short time management theory fashion swings: The garbage can life cycle model. The model is based on James March’s garbage can model of decision making combined with a life cycle model. The model describes how actors, problems and methods typically are different at four stages in the life cycle of a concept. The model is illustrated with data from quality management. The model does not pass judgement on the inherent qualities of quality management or the need for quality in the economy but seeks to explain what typically happens over time. The article concludes with a short discussion from the perspective of the model of the strategies that the quality movement may use at the present stage: A, retracting into full specialization; B, widening and attaching new fashionable themes to quality management; and C, focusing on its competitive advantages. Strategy C is recommended.
Explores what the domination of commercial interests online means for the visibility of non‐profit content on the Web. Makes specific recommendations to site owners on…
Explores what the domination of commercial interests online means for the visibility of non‐profit content on the Web. Makes specific recommendations to site owners on ways of achieving greater popularity. Concludes with an old phrase by online media experts – If content is king, then distribution is King Kong!
This chapter attempts to clarify and describe the legal and regulatory framework for cryptocurrency with special focus on Malaysia and the threats that it poses from the…
This chapter attempts to clarify and describe the legal and regulatory framework for cryptocurrency with special focus on Malaysia and the threats that it poses from the anti-money laundering perspective. Currently, very few countries have legislations that regulate cryptocurrency. Nonetheless, the crazy surge in prices (to more than 20-folds at some point) has sent both legitimate investors and criminals flocking to cryptocurrencies. This chapter analyses and compares the official reports from various governments, writings of government officials, experts and scholars in journals and newspapers, interviews and draws conclusions on the legal framework of cryptocurrency, and money laundering challenges. The study notes that the decision of the US regulators in allowing Bitcoin futures to trade on major exchanges to be one of the reasons behind the sudden surge. The study also finds that the South Korean regulators’ approach in banning its financial institutions from dealing with virtual currency is a positive one. The chapter stresses that it is not adequate for regulators to warn the public to act with extreme caution and increase their understanding on the risks they take on if they choose to invest in cryptocurrencies. Instead, it is necessary to have comprehensive international and national laws and regulations for the control and management of cryptocurrencies. In addition, the anti-money laundering legal framework must be improved to cater to the new threats posed by cryptocurrency.