80,703 research outputs found

    Security Seeking in a Regulatory Focus Whodunit: The Case of the Relative Orientation in Behavioral Economics

    Get PDF
    [Excerpt] As a complement to other chapters in this handbook, this chapter’s initial focus is about understanding security concerns in interdependent economic decision-making, that is, contexts wherein individuals are asked with distributing resources between two or more parties, typically themselves and another. The economics component of economic decision-making concerns the manufacturing, distribution, and exchange of resources, whether money or ornament-shaped chocolates. The decision-making component involves applying psychological principles, such as motivation, to understanding how individuals choose among alternatives. For these reasons, it is a topic that falls under the study of behavioral economics (Camerer & Loewenstein, 2004; De Cremer, Zeelenberg, & Murnighan, 2006). It is the interdependent component of economic decision-making, however, that helps us investigate individuals\u27 intentions to cooperate or compete, to explore self-interest and its manifestation in individuals\u27 treatment (or lack thereof) of other parties. This intersection of topics allows us to answer the types of questions raised by examples like the one described above, such as, Why might someone sacrifice her own absolute gains simply to avoid receiving less than someone else? Understanding the answers to these kinds of questions about how resources are manufactured, distributed, and exchanged is a topic with great ramifications for, among other things, domestic and international politics (e.g., Lancaster, 2007; Waltz, 1979), the funding of research disciplines or functional areas within organizations, deal-making and dispute resolution, and basic survival functions, through the sharing of food, shelter, and other basic resources (e.g., Boyd & Silk, 2012; Hill, 2002)

    Meeting the Challenge of Interdependent Critical Networks under Threat : The Paris Initiative

    Get PDF
    NARisques à grande échelle;Gestion des crises internationale;Interdépendances;Infrastructures critiques;Anthrax;Initiative collective;Stratégie;Préparation des Etats-majors

    Do Regional Organizations Travel? - European Integration, Diffusion and the Case of ASEAN

    Get PDF
    Why do regional organizations share a number of key institutions and policies? Why do regional organizations like the Economic Community of West African States (ECOWAS) or the Carribean Community (CARICOM) look like the European Union? And why do we find the norms of the Helsinki Final Act in treaties of the Association of Southeast Asian Nations (ASEAN)? The simple answer is that policy solutions developed in the context of regional integration diffuse. The paper contends that regional integration efforts in Europe have had a decisive but often unacknowledged influence on regional cooperation outside of Europe. The influence of European integration on regional organizations beyond Europe will be illustrated with a case that is unsuspicious of having emulated the European integration experience: The Association of Southeast Asian Nations (ASEAN). Since 1957, Southeast Asian states have selectively taken over policies and institutions from the European context. The most recent adoption, it will be argued, is the ASEAN Charter, in effect since November 2008. In accounting for this adoption, the paper argues that ASEAN members’ decision is only partially driven by genuine regional or functional demands. Members borrowed from abroad expecting the Charter to provide a policy solution to the cooperation problems members faced. Thus, the paper makes an original general contribution to the existing literature on regional integration: It argues that a full account of regional integration processes needs to take diffusion processes into consideration.Europeanization; Europeanization

    Trading on Preconceptions: Why World War I Was Not a Failure of Economic Interdependence

    Get PDF
    World War I is generally viewed by both advocates and critics of commercial liberal theory as the quintessential example of a failure of economic integration to maintain peace. Yet this consensus relies on both methodologically flawed inference and an incomplete accounting of the antecedents to the war. Crucially, World War I began in a weakly integrated portion of Europe with which highly integrated powers were entangled through the alliance system. Crises among the highly interdependent European powers in the decades leading up to the war were generally resolved without bloodshed. Among the less interdependent powers in Eastern Europe, however, crises regularly escalated to militarized violence. Moreover, the crises leading to the war created increased incentives for the integrated powers to strengthen commitments to their less interdependent partners. In attempting to make these alliances more credible, Western powers shifted foreign policy discretion to the very states that lacked strong economic disincentives to fight. Had globalization pervaded Eastern Europe, or if the rest of Europe had been less locked into events in the east, Europe might have avoided a “Great War.” </jats:p

    Toward a Strategic Human Resource Management Model of High Reliability Organization Performance

    Get PDF
    In this article, we extend strategic human resource management (SHRM) thinking to theory and research on high reliability organizations (HROs) using a behavioral approach. After considering the viability of reliability as an organizational performance indicator, we identify a set of eight reliability-oriented employee behaviors (ROEBs) likely to foster organizational reliability and suggest that they are especially valuable to reliability seeking organizations that operate under “trying conditions”. We then develop a reliability-enhancing human resource strategy (REHRS) likely to facilitate the manifestation of these ROEBs. We conclude that the behavioral approach offers SHRM scholars an opportunity to explain how people contribute to specific organizational goals in specific contexts and, in turn, to identify human resource strategies that extend the general high performance human resource strategy (HPHRS) in new and important ways

    New Challenges in Critical Infrastructures : A US Perspective

    Get PDF
    L'Ă©mergence d'un plus large spectre de vulnĂ©rabilitĂ©s (terrorisme, sabotage, conflits locaux et catastrophes naturelles) et l'interdĂ©pendance croissante de l'activitĂ© Ă©conomique rendent particuliĂšrement vulnĂ©rables les grands rĂ©seaux vitaux des pays industrialisĂ©s. Pour y faire face, des actions importantes doivent ĂȘtre menĂ©es Ă  une Ă©chelle nationale, en particulier par le dĂ©veloppement de partenariats Ă©troits entre le secteur public et la sphĂšre privĂ©e.Cet article analyse l'initiative prĂ©sidentielle lancĂ©e dĂšs 1996 aux Etats-Unis -premier pays au monde Ă  inscrire ces questions Ă  l'agenda du plus haut niveau dĂ©cisionnel- ainsi que la structure nationale de partenariats mis en place depuis lors. Une telle dĂ©marche pourrait constituer un point de dĂ©part pour d'autres pays dĂ©sireux d'Ă©laborer leur propre analyse de vulnĂ©rabilitĂ©s et leur stratĂ©gie d'amĂ©lioration.Les Ă©vĂ©nements du 11 septembre 2001, comme les attaques Ă  l'anthrax, ont nĂ©anmoins montrĂ© que les avancĂ©es amĂ©ricaines ne constituaient qu'une premiĂšre Ă©tape d'un processus plus global de prĂ©paration nationale; les infrastructures critiques des Etats-Unis demeurent hautement vulnĂ©rables. Enfin, plusieurs idĂ©es fausses, par trop souvent rĂ©currentes, doivent ĂȘtre dĂ©passĂ©es pour traiter beaucoup plus efficacement ces risques Ă  grande Ă©chelle sur un plan international.Partenariats public-privĂ©;Risques Ă  grande Ă©chelle;Infrastructures critiques;Nouvelles vulnĂ©rabilites;SĂ©curitĂ© nationale;PrĂ©paration collective

    Values-Based Network Leadership in an Interconnected World

    Get PDF
    This paper describes values-based network leadership conceptually aligned to systems science, principles of networks, moral and ethical development, and connectivism. Values-based network leadership places importance on a leader\u27s repertoire of skills for stewarding a culture of purpose and calling among distributed teams in a globally interconnected world. Values-based network leadership is applicable for any leader needing to align interdependent effort by networks of teams operating across virtual and physical environments to achieve a collective purpose. An open-learning ecosystem is also described to help leaders address the development of strengths associated with building trust and relationships across networks of teams, aligned under a higher purpose and calling, possessing moral fiber, resilient in the face of complexity, reflectively competent to adapt as interconnected efforts evolve and change within multicultural environments, and able to figure out new ways to do something never done before

    Research Agenda in Intelligent Infrastructure to Enhance Disaster Management, Community Resilience and Public Safety

    Full text link
    Modern societies can be understood as the intersection of four interdependent systems: (1) the natural environment of geography, climate and weather; (2) the built environment of cities, engineered systems, and physical infrastructure; (3) the social environment of human populations, communities and socio-economic activities; and (4) an information ecosystem that overlays the other three domains and provides the means for understanding, interacting with, and managing the relationships between the natural, built, and human environments. As the nation and its communities become more connected, networked and technologically sophisticated, new challenges and opportunities arise that demand a rethinking of current approaches to public safety and emergency management. Addressing the current and future challenges requires an equally sophisticated program of research, technology development, and strategic planning. The design and integration of intelligent infrastructure-including embedded sensors, the Internet of Things (IoT), advanced wireless information technologies, real-time data capture and analysis, and machine-learning-based decision support-holds the potential to greatly enhance public safety, emergency management, disaster recovery, and overall community resilience, while addressing new and emerging threats to public safety and security. Ultimately, the objective of this program of research and development is to save lives, reduce risk and disaster impacts, permit efficient use of material and social resources, and protect quality of life and economic stability across entire regions.Comment: A Computing Community Consortium (CCC) white paper, 4 page

    "If You Can't Beat them, Join them": A Usability Approach to Interdependent Privacy in Cloud Apps

    Get PDF
    Cloud storage services, like Dropbox and Google Drive, have growing ecosystems of 3rd party apps that are designed to work with users' cloud files. Such apps often request full access to users' files, including files shared with collaborators. Hence, whenever a user grants access to a new vendor, she is inflicting a privacy loss on herself and on her collaborators too. Based on analyzing a real dataset of 183 Google Drive users and 131 third party apps, we discover that collaborators inflict a privacy loss which is at least 39% higher than what users themselves cause. We take a step toward minimizing this loss by introducing the concept of History-based decisions. Simply put, users are informed at decision time about the vendors which have been previously granted access to their data. Thus, they can reduce their privacy loss by not installing apps from new vendors whenever possible. Next, we realize this concept by introducing a new privacy indicator, which can be integrated within the cloud apps' authorization interface. Via a web experiment with 141 participants recruited from CrowdFlower, we show that our privacy indicator can significantly increase the user's likelihood of choosing the app that minimizes her privacy loss. Finally, we explore the network effect of History-based decisions via a simulation on top of large collaboration networks. We demonstrate that adopting such a decision-making process is capable of reducing the growth of users' privacy loss by 70% in a Google Drive-based network and by 40% in an author collaboration network. This is despite the fact that we neither assume that users cooperate nor that they exhibit altruistic behavior. To our knowledge, our work is the first to provide quantifiable evidence of the privacy risk that collaborators pose in cloud apps. We are also the first to mitigate this problem via a usable privacy approach.Comment: Authors' extended version of the paper published at CODASPY 201
    • 

    corecore