2,995 research outputs found

    Exploring (anti-) counterfeiting management: Conceptual foundations and empirical examination

    Get PDF
    Die Forschungsfragen wurden in neun einzelnen Beiträgen untersucht. Der Forschungsfrage 1 („Marken- und Produktpiraterie“) wurde in zwei Beiträgen nachgegangen. Beitrag 1 stellt die relevanten Dimensionen der Betrachtung von Fälschungen dar. In Beitrag 2 erfolgt eine umfassende Auseinandersetzung mit den definitorischen Grundlagen, den Gründen für die Zunahme der Fälschungen sowie den daraus entstehenden Schäden zur Abgrenzung, Systematisierung und Bewertung der Thematik. Die Forschungsfragen 2 („Schutzmanagement“, ACM) und 3 („Fälschungsmanagement“, CM) werden sowohl mit konzeptionellen als auch qualitativ und quantitativ empirischen Beiträgen bearbeitet. Zur Beantwortung der Forschungsfrage 2 enthält die kumulative Dissertation vier Beiträge. In Beitrag 3 werden Grundlagen und Inhalte eines unternehmerischen Schutzsystems erarbeitet. Beitrag 4 komplettiert dieses Thema durch eine umfangreiche Analyse relevanter Schutzinstrumente. Die Erklärungsinhalte des ressourcen- bzw. kompetenzbasierten Ansatzes zur Ableitung einer prozessorientierten Sichtweise auf ACM beinhaltet Beitrag 5. Mittels einer qualitativen Inhaltsanalyse wird das Wissen aus Experteninterviews analysiert und ein Konstrukt zur Ableitung der unternehmerischen Schutzkompetenz vorgestellt. In Beitrag 6 erfolgen die Verfeinerung des Modells und die finale Untersuchung von ACM auf Basis eines konfigurationsorientierten Mixed-Methods Ansatzes zur inhalts- sowie cluster- und varianzanalytischen Bestimmung von Schützerklassen und -konfigurationen. Wichtige Elemente sind Kompetenzen, die verfolgten Strategien bzw. eingesetzten Instrumenten sowie die Evaluierung des Erfolgs auf Grundlage von Fragebogendaten. Zur Behandlung von Forschungsfrage 3 sind drei Beiträge er¬stellt worden. Beitrag 7 beschäftigt sich mit dem bisher stark vernachlässigten Bereich CM. In diesem wird zur Annäherung an die Thematik der aktuelle Stand der Forschung zu Fälschertypen, relevanten Strategien sowie taktischen Maßnahmen aufgearbeitet und mit Expertenwissen angereichert. In Beitrag 8 erfolgen eine managementorientierte Aufbereitung der Fälscherthematik und eine qualitative Inhaltsanalyse zur Identifikation von Strategien und Instrumenten. Darüber hinaus wird eine kompetenzbasierte Methodik zur Bewertung von Fälschern erarbeitet. Beitrag 9 schließt die Untersuchung der Fälscherseite analog zu Beitrag 6 ab

    Examining the threat of piracy and armed robbery against ships in the Sibutu Passage and surrounding sea areas

    Get PDF

    INTEROPERABILITY FOR MODELING AND SIMULATION IN MARITIME EXTENDED FRAMEWORK

    Get PDF
    This thesis reports on the most relevant researches performed during the years of the Ph.D. at the Genova University and within the Simulation Team. The researches have been performed according to M&S well known recognized standards. The studies performed on interoperable simulation cover all the environments of the Extended Maritime Framework, namely Sea Surface, Underwater, Air, Coast & Land, Space and Cyber Space. The applications cover both the civil and defence domain. The aim is to demonstrate the potential of M&S applications for the Extended Maritime Framework, applied to innovative unmanned vehicles as well as to traditional assets, human personnel included. A variety of techniques and methodology have been fruitfully applied in the researches, ranging from interoperable simulation, discrete event simulation, stochastic simulation, artificial intelligence, decision support system and even human behaviour modelling

    An Algorithm for Exchanging Target Asset Pairs using the Kidney Exchange Model

    Get PDF
    Since chemical, biological, radiological, nuclear, and high yield explosive (CBRNE) attacks can cause catastrophic damage, it is important to detect and eliminate the means of attack at the origin. In surveillance operations, efficient allocation of friendly intelligence assets and enemy targets is critical for continuous and reliablemonitoring. In this research, we investigate a mathematical model for exchanging target–asset pairs when there are sudden changes in various operational environments. For this task, we refer to the kidney exchange model as a benchmark. In particular, the methods for constructing and solving the target–asset exchange problem in near realtime are presented. Additionally, we introduce the methodology and results for obtaining a feasible solution of the weapon target assignment problem using the exchange model. Our method can facilitate decisions in reconnaissance operations, especially when countless targets and assets are intricately intertwined in future battlefield scenarios

    Koyaanisqatsi in Cyberspace

    Get PDF
    Koyaanisqatsi is a Hopi Indian word that translates into English as 'life out of balance,' 'crazy life,' 'life in turmoil,' 'life disintegrating,' all meanings consistent with indicating 'a way of life which calls for another way of living.” While not wishing to suggest either that the international regime of intellectual property rights protection scientific and technical data and information is “crazy” or that it is “in turmoil”, this paper argues that the persisting drift of institutional change towards towards a stronger, more extensive and globally harmonized system of intellectual property protections during the past two decades has dangerously altered the balance between private rights and the public domain in data and information. In this regard we have embarked upon “a way of life which calls for another way of living.” High access charges imposed by holders of monopoly rights in intellectual property have overall consequences for the conduct of science that are particularly damaging to programs of exploratory research which are recognized to be critical for the sustained growth of knowledge-driven economies. Lack of restraint in privatizing the public domain in data and information has effects similar to those of non- cooperative behaviors among researchers in regard to the sharing of access to raw data-steams and information, or the systematic under- provision the documentation and annotation required to create reliably accurate and up-to-date public database resources. Both can significantly degrade the effectiveness of the research system as a whole. The urgency of working towards a restoration of proper balance between private property rights and the public domain in data and information arises from considerations beyond the need to protect the public knowledge commons upon which the vitality of open science depends. Policy-makers who seek to configure the institutional infrastructure to better accommodate emerging commercial opportunities of the information-intensive “new economy” – in the developed and developing countries alike –therefore have a common interest in reducing the impediments to the future commercial exploitation of peer-to-peer networking technologies which are likely to be posed by ever-more stringent enforcement of intellectual property rights.

    Quantitative maritime security assessment: a 2020 vision

    Get PDF
    Maritime security assessment is moving towards a proactive risk-based regime. This opens the way for security analysts and managers to explore and exploit flexible and advanced risk modelling and decision-making approaches in maritime transport. In this article, following a review of maritime security risk assessment, a generic quantitative security assessment methodology is developed. Novel mathematical models for security risk analysis and management are outlined and integrated to demonstrate their use in the developed framework. Such approaches may be used to facilitate security risk modelling and decision making in situations where conventional quantitative risk analysis techniques cannot be appropriately applied. Finally, recommendations on further exploitation of advances in risk and uncertainty modelling technology are suggested with respect to maritime security risk quantification and management

    USING SYSTEM DYNAMICS TO ANALYZE THE SRI LANKA NAVY’S EFFORTS TO DISRUPT NARCOTERRORISM IN THE EEZ OF SRI LANKA AND INDIAN OCEAN REGION

    Get PDF
    The Indian Ocean Region (IOR) significantly influences the world’s economy and balance of power, and maintaining the IOR’s maritime security is foremost the responsibility of the islands and coastal nations in the region. Sri Lanka, as the second-largest island nation in the IOR, also has a large Exclusive Economic Zone (EEZ) threatened by drug trafficking, a problem also faced by other coastal and island nations in the region. The Sri Lanka Navy aims to counter maritime security challenges in the nation’s EEZ and to support such efforts throughout the IOR. Little research has been done to explain how small nations might benefit from maritime security and trade engagement with great power nations. This thesis analyzes case studies of Seychelles, Mexico, and Thailand to determine which variables (such as material and monetary resources, institutions, and regional partnerships) most contribute to maritime security capabilities. System dynamics modeling then demonstrates potential behavioral outcomes for Sri Lanka’s maritime security system to determine which approaches could effectively disrupt drug trafficking. This thesis documents that achieving enhanced maritime security by disrupting drug trafficking in Sri Lanka’s EEZ and IOR is difficult without expanded capabilities and resources such as additional platforms, intelligence sharing, technology, and regional and international agreements.Commander, Sri Lanka NavyApproved for public release. Distribution is unlimited

    Rising Powers and State Transformation: The Case of China

    Get PDF
    This article draws attention to the transformation of statehood under globalisation as a crucial dynamic shaping the emergence and conduct of ‘rising powers’. That states are becoming increasingly fragmented, decentralised and internationalised is noted by some international political economy and global governance scholars, but is neglected in International Relations treatments of rising powers. This article critiques this neglect, demonstrating the importance of state transformation in understanding emerging powers’ foreign and security policies, and their attempts to manage their increasingly transnational interests by promoting state transformation elsewhere, particularly in their near-abroad. It demonstrates the argument using the case of China, typically understood as a classical ‘Westphalian’ state. In reality, the Chinese state’s substantial disaggregation profoundly shapes its external conduct in overseas development assistance and conflict zones like the South China Sea, and in its promotion of extraterritorial governance arrangements in spaces like the Greater Mekong Subregion
    corecore