Subject(s)
Human resources management/organizational behavior
Keyword(s)
Error management, inquiry, leadership, crew resource management
There have been multiple aircraft accidents in the aviation industry resulting from a lack of error communication. Even though cultural differences have been cited as contributing factors, many accidents have happened due to the hierarchical status of the first and second officers and the reluctance of the latter to speak up during critical situations.
This is why, three decades ago, Crew Resource Management (CRM) was developed in the aviation industry. Its goal was to reduce the hierarchy gradient on the flight deck and achieve open, factual error communication to ensure the safe operation of flights. This meant creating an environment in which lower-ranking crew members would feel comfortable speaking up when observing an error made by their superiors. Today, CRM is a mandatory element of flight crew training in civilian and military flight operations worldwide. Since its introduction, accident rates have declined tremendously.
However, even after three decades, the human factor continues to be the main cause of accidents. When talking to flight crews, we observe that lower-ranking crew members are still hesitant to speak up. We therefore suggest that – on top of training people to speak up more – we should start focusing on the leadership behavior involved. This requires leaders to include subordinates through active inquiry when making decisions in critical situations, thereby creating a flat hierarchy that allows them to speak freely.
This is why, three decades ago, Crew Resource Management (CRM) was developed in the aviation industry. Its goal was to reduce the hierarchy gradient on the flight deck and achieve open, factual error communication to ensure the safe operation of flights. This meant creating an environment in which lower-ranking crew members would feel comfortable speaking up when observing an error made by their superiors. Today, CRM is a mandatory element of flight crew training in civilian and military flight operations worldwide. Since its introduction, accident rates have declined tremendously.
However, even after three decades, the human factor continues to be the main cause of accidents. When talking to flight crews, we observe that lower-ranking crew members are still hesitant to speak up. We therefore suggest that – on top of training people to speak up more – we should start focusing on the leadership behavior involved. This requires leaders to include subordinates through active inquiry when making decisions in critical situations, thereby creating a flat hierarchy that allows them to speak freely.
Secondary Title
Mistakes, errors and failures across cultures: Navigating potentials
Pages
587–604
ISBN
978-3-030-35573-9
ISBN (Online)
978-3-030-35574-6
Subject(s)
Information technology and systems
Keyword(s)
international law, cybersecurity, evidence, attribution, self-defence, countermeasures, necessity, hybrid warfare, cyber operations, hack backs
ISBN
9781108479868
Subject(s)
Human resources management/organizational behavior
Keyword(s)
Negotiation, first offer, framing, satisfaction, power, reservation price
In distributive negotiations, people often feel that they have to choose between maximizing their economic outcomes (claiming more value) or improving their relational outcomes (having a satisfied opponent). The present research proposes a conversational strategy that can help negotiators achieve both. Specifically, we show that using an offer framing strategy that shifts offer recipients' attention to their reservation price (e.g., “How does my offer compare to your minimum price?”) leads to both (a) an assimilation effect whereby recipients make more favorable counteroffers (economic benefit) as well as (b) a contrast effect whereby recipients feel more satisfied with the negotiation (relational benefit). We find evidence for the effectiveness of this conversational strategy across four experiments (N = 1522) involving different negotiation contexts (real estate, restaurant sale) and participant samples (MBAs, sales agents, online participants), and also document negotiator power as an important boundary condition. Overall, our research suggests that economic and relational benefits do not have to be mutually exclusive in distributive negotiations, that the perceived extremity of an offer is subjective and can be strategically influenced, and that assimilation and contrast effects can operate simultaneously when they relate to separate outcomes.
With permission of Elsevier
Volume
87
Journal Pages
103943
Subject(s)
Marketing
Keyword(s)
Creation of the extraordinary, perspectives on luxury, luxury, branding, brand management, marketing, luxury brand management, luxury marketing, luxury brand strategy, marketing strategy, symbolic consumption, advertising, status consumption, creative industries
Luxury is as old as humankind and has sparked multiple debates throughout of history. In today’s consumer society, luxury brands have become aspirational symbols. Yet, to date, a comprehensive overview of the different perspectives that have shaped the discourses about luxury is missing. Hannes Gurzki provides a broad overview of luxury research, highlights and details important perspectives on luxury, and derives practical guidelines for managers based on research. Thereby the author combines insights from different disciplines, such as philosophy, sociology, psychology, anthropology, cultural studies, economics or management, to broaden and deepen our understanding of luxury and its creation principles.
Copyright Information: Springer Fachmedien Wiesbaden GmbH, part of Springer Nature 2020
ISBN
978-3-658-29537-0
ISBN (Online)
978-3-658-29538-7
Subject(s)
Ethics and social responsibility; Health and environment; Strategy and general management; Technology, R&D management
Keyword(s)
Sustainability and wellbeing, climate change, innovation, emerging ideas, social impact, strategy and management, strategic spotlight
New regulations and opportunities in the decentralized energy market can be good for the planet and business.
Subject(s)
Information technology and systems
Keyword(s)
Cybersecurity, sovereignty, open source, verification,
supply chain risks
supply chain risks
Increasing dependence on information technology calls for strengthening the requirements on their safety and security. Vulnerabilities that result from flaws in hardware and software are a core problem which market mechanisms have failed to eliminate. A strategy for resolving this issue should consider the following options: (1) private- and public-sector
funding for open and secure production, (2) strengthening the sovereign control over the production of critical IT components within an
economic zone, and (3) improving and enforcing regulation. This paper
analyses the strengths and weaknesses of these options and proposes
a globally distributed, secure supply chain based on open and mathematically proved components. The approach supports the integration
of legacy and new proprietary components.
funding for open and secure production, (2) strengthening the sovereign control over the production of critical IT components within an
economic zone, and (3) improving and enforcing regulation. This paper
analyses the strengths and weaknesses of these options and proposes
a globally distributed, secure supply chain based on open and mathematically proved components. The approach supports the integration
of legacy and new proprietary components.
Volume
29
Journal Pages
30–36
ISSN (Online)
2199-9201
ISSN (Print)
1619-7623
Subject(s)
Economics, politics and business environment; Strategy and general management; Technology, R&D management
Keyword(s)
Market entry, pre-entry experience, demand-side perspective, information & communication technologies
JEL Code(s)
C51, L10, O33
We offer theory and evidence about how the fit between firm experience (supply side) and consumer preferences (demand side) affects postentry performance into a new technology. Specifically, we explore different types of preentry experience (technological and market experience) and use different aspects of postentry performance to draw inferences about consumer heterogeneity. Preentry technological experience (same product and different consumers) helps firms attract a larger share of intensive users (aligning with early adopters) but only if they enter the market early when these adopters make decisions. Preentry market experience (different product and same consumers) helps firms attract a larger share of lighter users, consistent with characterizations of mass market users. Exploiting different components of firm performance in the global second-generation mobile telecommunications industry (average usage intensity and market penetration) allows us to articulate and identify the paths and mechanisms that allow preentry experience to affect postentry performance. The theory as well as important theoretical boundary conditions have implications for research on preentry experience, demand-side heterogeneity, and industry evolution.
© 2019, INFORMS
Volume
31
Journal Pages
245–265
Subject(s)
Finance, accounting and corporate governance
Keyword(s)
Stock price synchronicity, price informativeness, illiquidity, zero returns, corporate transparency, sell-side analysts, control variables, fixed effects, nonlinearity
JEL Code(s)
G12, G14, G15, M40, N20
Volume
37
Journal Pages
419–456
ISSN (Online)
1911-3846
ISSN (Print)
0823-9150
Subject(s)
Unspecified
Keyword(s)
multinational military operations, peace enforcement, peacekeeping, laws of armed conflict, United Nations, coalition warfare, international human rights, status-of-forces agreements, state responsibility
Secondary Title
The 'Legal Pluriverse' surrounding multinational military operations
ISBN
9780198842965
Subject(s)
Information technology and systems
Keyword(s)
Applications, Physically Unclonable Function, machine learning, modelling attack
Physical Unclonable Functions (PUFs) and, in particular, XOR Arbiter PUFs have gained much research interest as an authentication mechanism for embedded systems. One of the biggest problems of (strong) PUFs is their vulnerability to so called machine learning attacks. In this paper we take a closer look at one aspect of machine learning attacks that has not yet gained the needed attention: the generation of the sub-challenges in XOR Arbiter PUFs fed to the individual Arbiter PUFs. Specifically, we look at one of the most popular ways to generate sub-challenges based on a combination of permutations and XORs as it has been described for the "Lightweight Secure PUF". Previous research suggested that using such a sub-challenge generation increases the machine learning resistance significantly.
Our contribution in the field of sub-challenge generation is three-fold: First, drastically improving attack results by Rührmair et al., we describe a novel attack that can break the Lightweight Secure PUF in time roughly equivalent to an XOR Arbiter PUF without transformation of the challenge input. Second, we give a mathematical model that gives insight into the weakness of the Lightweight Secure PUF and provides a way to study generation of sub-challenges in general. Third, we propose a new, efficient, and cost-effective way for sub-challenge generation that mitigates the attack strategy we used and outperforms the Lightweight Secure PUF in both machine learning resistance and resource overhead.
Our contribution in the field of sub-challenge generation is three-fold: First, drastically improving attack results by Rührmair et al., we describe a novel attack that can break the Lightweight Secure PUF in time roughly equivalent to an XOR Arbiter PUF without transformation of the challenge input. Second, we give a mathematical model that gives insight into the weakness of the Lightweight Secure PUF and provides a way to study generation of sub-challenges in general. Third, we propose a new, efficient, and cost-effective way for sub-challenge generation that mitigates the attack strategy we used and outperforms the Lightweight Secure PUF in both machine learning resistance and resource overhead.
Volume
11833
ISBN
978-3-030-42068-0
Journal Pages
40–54