1,270 research outputs found

    Evaluation of two NASA biological isolation garments

    Get PDF
    Biological isolation garments for spacemen returning from lunar flights to prevent contamination from potential lunar microorganisms - evaluation test

    The influence of consumers' goals on selective attention to product features.

    Get PDF
    Although attention is a key construct in models of marketing communications and consumer choice, its selective nature has rarely been examined in the time-pressured conditions that consumers face everyday. We investigate how consumers' goals influence selective attention to product features under such conditions. Specifically, we focus on the role of goal salience, that is, the readiness with which particular goals (e.g., personalized customer service) are brought to mind by consumers in relation to a given product category (e.g., banks). Study1 demonstrated that when product feature information was presented rapidly, individuals for whom the goal of personalized customer service had high chronic or habitual salience displayed selective attention in terms of their elevated recall of a target feature (a bank's 'friendly employees'). Also, as expected, individual differences in chronic goal salience affected judgments of the target product. Study2 showed that when subjects were additionally informed about a specific product usage situation (e.g., being new in town or experiencing difficulty in balancing a checkbook), selective attention was no longer affected by individuals' chronic tendencies. Instead, both feature recall and judgments were influenced by the relevance of the target feature to the goals made salient by the situational context. Discussion emphasizes the theoretical and managerial implications of the findings regarding the role of goal salience in selective attention to product features.Product;

    Benefit salience and consumers' selective attention to product features.

    Get PDF
    Although attention is a key construct in models of marketing communication and consumer choice, its selective nature has rarely been examined in common time-pressured conditions. We focus on the role of benefit salience, that is, the readiness with which particular benefits are brought to mind by consumers in relation to a given product category. Study I demonstrated that when product feature information was presented rapidly, individuals for whom the benefit of personalised customer service had high habitual salience displayed selective attention as evidenced by elevated recall and recognition of a target feature (a bank's ''friendly employees''). Also, as expected, individual differences in habitual benefit salience affected judgements of the target product. Study 2 showed that when subjects were additionally informed about a specific product usage situation, selective attention was primarily influenced by the relevance of the target feature to benefits made salient by the usage situation; individual differences played a less important role. Discussion emphasises theoretical aspects of the findings as well as managerial implications with respect to person-situation approaches to benefit segmentation. (C) 1997 Elsevier Science B.V.attention; benefit segmentation; individual construct accessibility; usage context; involvement; segmentation; substitution; experiences; memory; recall; choice; link;

    Minority and Women Entrepreneurs Contracting with thw Federal Government

    Get PDF
     This article uses learning network theory as a foundation upon which the assistance and barriers minority and women entrepreneurs face when attempting to contract with the federal government may be studied. The public policy programs analyzed for this study were the SBA's 8(a) program and the Department of Defense's Procurement Technical Assistance Program (PTAC). The methodology utilized was an in-depth analysis of government contracting experiences in two states, Missouri and Kansas, in the greater Kansas City area via formalized interviews and government data. Research results revealed strong responses to the 8(a) program and its overall effectiveness. Racial issues were of a particular concern, as well as the perceived lack of strength behind 8(a) contracting incentives. The PTAC program was revealed to be reaching a significantly increasing percentage of woman owned businesses, and to a lesser extent, minority-owned businesses while providing a more effective learning strategy for gaining government contracts.

    Cybersecurity: mapping the ethical terrain

    Get PDF
    This edited collection examines the ethical trade-offs involved in cybersecurity: between security and privacy; individual rights and the good of a society; and between the types of burdens placed on particular groups in order to protect others. Foreword Governments and society are increasingly reliant on cyber systems. Yet the more reliant we are upon cyber systems, the more vulnerable we are to serious harm should these systems be attacked or used in an attack. This problem of reliance and vulnerability is driving a concern with securing cyberspace. For example, a ‘cybersecurity’ team now forms part of the US Secret Service. Its job is to respond to cyber-attacks in specific environments such as elevators in a building that hosts politically vulnerable individuals, for example, state representatives. Cybersecurity aims to protect cyberinfrastructure from cyber-attacks; the concerning aspect of the threat from cyber-attack is the potential for serious harm that damage to cyber-infrastructure presents to resources and people. These types of threats to cybersecurity might simply target information and communication systems: a distributed denial of service (DDoS) attack on a government website does not harm a website in any direct way, but prevents its normal use by stifling the ability of users to connect to the site. Alternatively, cyber-attacks might disrupt physical devices or resources, such as the Stuxnet virus, which caused the malfunction and destruction of Iranian nuclear centrifuges. Cyber-attacks might also enhance activities that are enabled through cyberspace, such as the use of online media by extremists to recruit members and promote radicalisation. Cyber-attacks are diverse: as a result, cybersecurity requires a comparable diversity of approaches. Cyber-attacks can have powerful impacts on people’s lives, and so—in liberal democratic societies at least—governments have a duty to ensure cybersecurity in order to protect the inhabitants within their own jurisdiction and, arguably, the people of other nations. But, as recent events following the revelations of Edward Snowden have demonstrated, there is a risk that the governmental pursuit of cybersecurity might overstep the mark and subvert fundamental privacy rights. Popular comment on these episodes advocates transparency of government processes, yet given that cybersecurity risks represent major challenges to national security, it is unlikely that simple transparency will suffice. Managing the risks of cybersecurity involves trade-offs: between security and privacy; individual rights and the good of a society; and types of burdens placed on particular groups in order to protect others. These trade-offs are often ethical trade-offs, involving questions of how we act, what values we should aim to promote, and what means of anticipating and responding to the risks are reasonably—and publicly—justifiable. This Occasional Paper (prepared for the National Security College) provides a brief conceptual analysis of cybersecurity, demonstrates the relevance of ethics to cybersecurity and outlines various ways in which to approach ethical decision-making when responding to cyber-attacks

    Observation of the B + → Jψη′K + decay

    Get PDF
    The B + → Jψη′K + decay is observed for the first time using proton-proton collision data collected by the LHCb experiment at centre-of-mass energies of 7, 8, and 13 TeV, corresponding to a total integrated luminosity of 9 fb −1. The branching fraction of this decay is measured relative to the known branching fraction of the B + → ψ(2S)K + decay and found to be B(B+→Jψη′K+)B(B+→ψ(2S)K+)=(4.91±0.47±0.29±0.07)×10−2, where the first uncertainty is statistical, the second is systematic and the third is related to external branching fractions. A first look at the J/ψη′ mass distribution is performed and no signal of intermediate resonances is observed

    Observation of the B + → Jψη′K + decay

    Get PDF
    The B + → Jψη′K + decay is observed for the first time using proton-proton collision data collected by the LHCb experiment at centre-of-mass energies of 7, 8, and 13 TeV, corresponding to a total integrated luminosity of 9 fb −1. The branching fraction of this decay is measured relative to the known branching fraction of the B + → ψ(2S)K + decay and found to be B(B+→Jψη′K+)B(B+→ψ(2S)K+)=(4.91±0.47±0.29±0.07)×10−2, where the first uncertainty is statistical, the second is systematic and the third is related to external branching fractions. A first look at the J/ψη′ mass distribution is performed and no signal of intermediate resonances is observed
    • …
    corecore