89 research outputs found

    CONSUMER BEHAVIOR AND ENTERPRISE AGILITY – A MODEL OF THE SURVEYED INDICATORS

    Get PDF
    Enhancing the agility of the response to market demands is one of the most desirable qualities for the management of today’s enterprise, which is facing an unstable environment, with abrupt, frequent and unpredictable changes. The paper proposes a model oAgile enterprise, customer value, marketing research, brand image, customer preferences, buyer risk, customer attitude, buying intentions, post-purchase satisfaction

    Limitations and pitfalls of the brain that prevent us from thinking

    Get PDF
    When we think or make decisions, we must not forget that there are several internal "pitfalls" that cause our brain to make decisions incorrectly. Many authors have written on various pitfalls that may affect us. In this paper, five of them are identified and they are: The use of patterns when thinking, the relativity of things, the anchor effect, loss aversion, value attribution and diagnosis bias

    Maturing International Cooperation to Address the Cyberspace Attack Attribution Problem

    Get PDF
    One of the most significant challenges to deterring attacks in cyberspace is the difficulty of identifying and attributing attacks to specific state or non-state actors. The lack of technical detection capability moves the problem into the legal realm; however, the lack of domestic and international cyberspace legislation makes the problem one of international cooperation. Past assessments have led to collective paralysis pending improved technical and legal advancements. This paper demonstrates, however, that any plausible path to meaningful defense in cyberspace must include a significant element of international cooperation and regime formation. The analytical approach diverges from past utilitarian-based assessments to understand the emerging regime, or implicit and explicit principles, norms, rules, and decision-making procedures, around which actor expectations are beginning to converge in the area of cyberspace attack attribution. The analysis applies a social-practice perspective of regime formation to identify meaningful normative and political recommendations. Various hypotheses of regime formation further tailor the recommendations to the current maturity level of international cooperation in this issue area. Examining international cooperation in cyberspace and methods for maturing international cooperation to establish attribution in other domains inform political mitigations to the problem of cyberspace attack attribution. Potential solutions are analyzed with respect to four recent cyberspace attacks to illustrate how improved international cooperation might address the problem. Finally, a counterfactual analysis, or thought experiment, of how these recommendations might have been applied in the case of rampant Chinese cyber espionage inform specific current and future opportunities for implementation. Although timing is difficult to predict, the growing frequency and scope of cyber attacks indicate the window of opportunity to address the problem before some form of cataclysmic event is closing

    Book Review: \u3cem\u3ePredictably Irrational: The Hidden Forces that Shape Our Decisions\u3c/em\u3e by Dan Ariely

    Get PDF
    Book Review: Predictably Irrational: The Hidden Forces that Shape Our Decisions by Dan Ariel

    al-Qaeda: Study of Decentralized Organization

    Get PDF
    Abstract Despite efforts by the

    Terrorism as Disruptive Targeting

    Get PDF
    This short terrorism futures essay will focus upon differing forms of targeting and their effects, that is, destructive versus disruptive, and the interrelationship between these and the scale of effect of weaponry in engagements, highlighting the differences between legitimate state use of coercion and the illegitimate use of disruptive targeting—and the subsequent magnification of the scale of effect of weaponry in engagements—when employed by terrorists. It will conclude with a discussion of the counter-threat implications of acknowledging terrorism as a form of disruptive targeting and the need for states to focus on new counter-threat protocols that go beyond physical consequence management and instead also include the protection of societal bonds

    Leading New Lawyers: Leadership and Legal Education

    Get PDF
    Lawyers may become leaders, but leaders also may become lawyers. The path to leadership can begin in law school. This short essay describes a leadership development course developed and implemented at a law school over the last four years

    Stadia: Church Planting in the Twenty-first Century

    Get PDF

    Defeating Violent Nonstate Actors

    Get PDF
    • …
    corecore