67,165 research outputs found

    Domestic Violence in the National Football League

    Get PDF
    This study was conducted to examine the relationship that existed between domestic violence incidents involving National Football League (NFL) players and the popularity of the league. With more media coverage on players’ off the field exploits there was potential that players committing crimes as heinous as domestic violence was having an impact on how fans consumed the NFL’s products. This was initially sparked by the widely publicized incident featuring former Baltimore Ravens running back, Ray Rice. As the league struggled to figure out on how to best handle player discipline for domestic violence the public opinion of the NFL diminished. Fan behavior was the measurable component for NFL popularity and was examined by looking at metrics such as television viewership and game attendance. Domestic violence incidents were totaled from an NFL player arrest database. The incidents were examined for physical violence and any resulting player releases. By compiling secondary data describing fan behavior and comparing it to total domestic violence incidents among NFL players it could be seen that fan behavior was generally unchanged by NFL players committing domestic violence. The study provided a look into the impact of players off field behavior on the business of the NFL. What was found was there was not conclusive evidence that a relationship between domestic violence in the NFL and the league’s popularity exists. Despite predictions that fan behavior display a noticeable change in relation to domestic violence incidents in the NFL, the data did not reflect such a finding, and statistical tests did not reflect a significant relationship. For the NFL, it may reveal that behavior of their fans, such as attending games or consuming NFL products from home, may not be hampered by the off the field follies of the league’s players. However, having already weathered a storm of criticism regarding the league’s policies and demeanor towards domestic violence, understanding how people respond to such incidents could prove critical for the NFL long term

    Systematic Representation of Relationship Quality in Conflict and Dispute: for Construction Projects

    Get PDF
    The construction industry needs to move towards more relational procurement procedures to reduce extensive losses of value and avoid conflicts and disputes. Despite this, the actual conceptualization and assessment of relationships during conflict and dispute incidents seem to be neglected. Via a review of literature, relationship quality is suggested as a systematic framework for construction projects. General system theory is applied and a framework consistent of four layers respectively labelled as triggering, antecedent, moderation and outcome is suggested. Two different case studies are undertaken to represent the systematic framework; which verifies that changes in contracting circumstances and built environment culture can affect the identified layers.Through system reliability theories a fault tree is derived to represent a systematic framework of relationship quality. The combinations of components, causes, and events for two case studies are mapped out through fault tree. By analysing the fault tree the combination of events that lead to relationship deterioration may be identified. Consequently the progression of simple events into failure is formulized and probabilities allocated. Accordingly the importance and the contribution of these events to failure become accessible. The ability to have such indications about relationship quality may help increase performance as well as sustainable procurement. Paper Type: Research articl

    Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy

    Get PDF
    Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked in the debate on cyber security. A UKreport on the cost of cyber crime illustrates this approach. Its authors chose to exclude from their analysis the costs in anticipation of cyber crime, such as insurance costs and the costs of purchasing anti-virus software on the basis that "these are likely to be factored into normal day-to-day expenditures for the Government, businesses, and individuals. This article contends if these costs had been quantified and integrated into the cost of cyber crime, then the analysis would have revealed that what matters is not so much cyber crime, but the fertile terrain of vulnerabilities that unleash a range of possibilities to whomever wishes to exploit them. By downplaying the vulnerabilities, the threats represented by cyber war, cyber terrorism, and cyber crime are conversely inflated. Therefore, reassessing risk as a strategy for security in cyberspace must include acknowledgment of understated vulnerabilities, as well as a better distributed knowledge about the nature and character of the overhyped threats of cyber crime, cyber terrorism, and cyber war

    Supply chain risks: an automotive case study

    Get PDF
    The supply chain is a complex system exchanging information, goods, material and money within enterprises, as well as between enterprises within the value chain. An effective supply chain management contributes to large corporate profits and it is therefore a valid path to reinforce the enterprises' competitiveness. However, supply chain is exposed to influences from undesirable factors both from the outside environment and the entities in the chain. Moreover, industrial trends towards lean production, increasing outsourcing, globalisation and reliance on supply networks capabilities and innovations, increase the complexity of the supply chain . Therefore, managers need to identify, and manage risks, as well as opportunities, from a more diverse range of sources and contexts. This paper contributes to identify and categorise supply chain risks based on a literature study and an automotive manufacturer’s viewpoint. The empirical results indicate suppliers and raw material prices as the major internal and external potential risks

    Risks of identity theft: Can the market protect the payment system?

    Get PDF
    Identity theft has been a feature of financial markets for as long as alternatives have existed to cash transactions. But identity theft has recently occurred on a much larger scale. Data breaches often involve the apparent loss or acknowledged theft of the personal identifying information of thousands--or millions--of people. ; Identity theft poses risks, not only to individuals, but to the integrity and efficiency of the payment system--the policies, procedures, and technology that transfer information for authenticating and settling payments among participants. Identity theft can cause a loss of confidence in the security of certain payment methods and an unwillingness to use them. Markets can cease operating or switch to less efficient payment methods. Either represents a loss of efficiency for the economy. ; Schreft looks at the nature of identity theft today and the factors underlying its mounting risks. She also explores whether markets are able to limit the risks identity theft poses to the payment system.Identity theft ; Payment systems

    Gun Safety & Public Health: Policy Recommendations for a More Secure America

    Get PDF
    This reportr describes the public health approach to reducing gun violence, including policy recommendations

    Preparing for new competitive challenges: special issue on the 24th annual IPSERA conference

    Get PDF
    The 24st IPSERA conference in Amsterdam addressed the various new competitive challenges organizations face now that business environments are changing. While we can observe an increased role of - but also an increased concentration in - logistic services and IT services acting as a bonding agent of the various business processes, we also see an increased specialisation among suppliers, resulting in roles like capacity supplier, co-maker and broker. In terms of Systems Thinking: the subsystem of ‘Suppliers’ is breaking up into three sub-systems with distinctive different characteristics, and the traditional sub-system ‘Purchasing’ has transformed into an aspect-system connecting or involving all other sub-systems, while similarly, ‘Logistics’ and ‘IT’ have developed into intertwined aspect-systems, being part of each and every sub-system. These transformations have increased managerial complexity, greatly influencing the purchasing and supply chain functions within firms. The seven papers selected from the conference examine seven aspects of those changes in detail and elaborate on the role of the PSM field in this process: PSM answers to challenges by providing answers on how to move forward in practice
    corecore