Academic articles
Practitioner articles
Working papers
Books
Book chapters
Case studies
Other publications
Subject(s)
Marketing
Keyword(s)
Creation of the extraordinary, perspectives on luxury, luxury, branding, brand management, marketing, luxury brand management, luxury marketing, luxury brand strategy, marketing strategy, symbolic consumption, advertising, status consumption, creative industries
Luxury is as old as humankind and has sparked multiple debates throughout of history. In today’s consumer society, luxury brands have become aspirational symbols. Yet, to date, a comprehensive overview of the different perspectives that have shaped the discourses about luxury is missing. Hannes Gurzki provides a broad overview of luxury research, highlights and details important perspectives on luxury, and derives practical guidelines for managers based on research. Thereby the author combines insights from different disciplines, such as philosophy, sociology, psychology, anthropology, cultural studies, economics or management, to broaden and deepen our understanding of luxury and its creation principles.
Copyright Information: Springer Fachmedien Wiesbaden GmbH, part of Springer Nature 2020
ISBN
978-3-658-29537-0
ISBN (Online)
978-3-658-29538-7
Subject(s)
Ethics and social responsibility; Health and environment; Strategy and general management; Technology, R&D management
Keyword(s)
Sustainability and wellbeing, climate change, innovation, emerging ideas, social impact, strategy and management, strategic spotlight
New regulations and opportunities in the decentralized energy market can be good for the planet and business.
Subject(s)
Information technology and systems
Keyword(s)
Cybersecurity, sovereignty, open source, verification,
supply chain risks
supply chain risks
Increasing dependence on information technology calls for strengthening the requirements on their safety and security. Vulnerabilities that result from flaws in hardware and software are a core problem which market mechanisms have failed to eliminate. A strategy for resolving this issue should consider the following options: (1) private- and public-sector
funding for open and secure production, (2) strengthening the sovereign control over the production of critical IT components within an
economic zone, and (3) improving and enforcing regulation. This paper
analyses the strengths and weaknesses of these options and proposes
a globally distributed, secure supply chain based on open and mathematically proved components. The approach supports the integration
of legacy and new proprietary components.
funding for open and secure production, (2) strengthening the sovereign control over the production of critical IT components within an
economic zone, and (3) improving and enforcing regulation. This paper
analyses the strengths and weaknesses of these options and proposes
a globally distributed, secure supply chain based on open and mathematically proved components. The approach supports the integration
of legacy and new proprietary components.
Volume
29
Journal Pages
30–36
ISSN (Online)
2199-9201
ISSN (Print)
1619-7623
Subject(s)
Economics, politics and business environment; Strategy and general management; Technology, R&D management
Keyword(s)
Market entry, pre-entry experience, demand-side perspective, information & communication technologies
JEL Code(s)
C51, L10, O33
We offer theory and evidence about how the fit between firm experience (supply side) and consumer preferences (demand side) affects postentry performance into a new technology. Specifically, we explore different types of preentry experience (technological and market experience) and use different aspects of postentry performance to draw inferences about consumer heterogeneity. Preentry technological experience (same product and different consumers) helps firms attract a larger share of intensive users (aligning with early adopters) but only if they enter the market early when these adopters make decisions. Preentry market experience (different product and same consumers) helps firms attract a larger share of lighter users, consistent with characterizations of mass market users. Exploiting different components of firm performance in the global second-generation mobile telecommunications industry (average usage intensity and market penetration) allows us to articulate and identify the paths and mechanisms that allow preentry experience to affect postentry performance. The theory as well as important theoretical boundary conditions have implications for research on preentry experience, demand-side heterogeneity, and industry evolution.
© 2019, INFORMS
Volume
31
Journal Pages
245–265
Subject(s)
Finance, accounting and corporate governance
Keyword(s)
Stock price synchronicity, price informativeness, illiquidity, zero returns, corporate transparency, sell-side analysts, control variables, fixed effects, nonlinearity
JEL Code(s)
G12, G14, G15, M40, N20
Volume
37
Journal Pages
419–456
ISSN (Online)
1911-3846
ISSN (Print)
0823-9150
Subject(s)
Unspecified
Keyword(s)
multinational military operations, peace enforcement, peacekeeping, laws of armed conflict, United Nations, coalition warfare, international human rights, status-of-forces agreements, state responsibility
Secondary Title
The 'Legal Pluriverse' surrounding multinational military operations
ISBN
9780198842965
Subject(s)
Information technology and systems
Keyword(s)
Applications, Physically Unclonable Function, machine learning, modelling attack
Physical Unclonable Functions (PUFs) and, in particular, XOR Arbiter PUFs have gained much research interest as an authentication mechanism for embedded systems. One of the biggest problems of (strong) PUFs is their vulnerability to so called machine learning attacks. In this paper we take a closer look at one aspect of machine learning attacks that has not yet gained the needed attention: the generation of the sub-challenges in XOR Arbiter PUFs fed to the individual Arbiter PUFs. Specifically, we look at one of the most popular ways to generate sub-challenges based on a combination of permutations and XORs as it has been described for the "Lightweight Secure PUF". Previous research suggested that using such a sub-challenge generation increases the machine learning resistance significantly.
Our contribution in the field of sub-challenge generation is three-fold: First, drastically improving attack results by Rührmair et al., we describe a novel attack that can break the Lightweight Secure PUF in time roughly equivalent to an XOR Arbiter PUF without transformation of the challenge input. Second, we give a mathematical model that gives insight into the weakness of the Lightweight Secure PUF and provides a way to study generation of sub-challenges in general. Third, we propose a new, efficient, and cost-effective way for sub-challenge generation that mitigates the attack strategy we used and outperforms the Lightweight Secure PUF in both machine learning resistance and resource overhead.
Our contribution in the field of sub-challenge generation is three-fold: First, drastically improving attack results by Rührmair et al., we describe a novel attack that can break the Lightweight Secure PUF in time roughly equivalent to an XOR Arbiter PUF without transformation of the challenge input. Second, we give a mathematical model that gives insight into the weakness of the Lightweight Secure PUF and provides a way to study generation of sub-challenges in general. Third, we propose a new, efficient, and cost-effective way for sub-challenge generation that mitigates the attack strategy we used and outperforms the Lightweight Secure PUF in both machine learning resistance and resource overhead.
Volume
11833
ISBN
978-3-030-42068-0
Journal Pages
40–54
Subject(s)
Economics, politics and business environment
Keyword(s)
Price competition, price dispersion, unique equilibrium
JEL Code(s)
D43, L11
We study a canonical model of simultaneous price competition between firms that sell a homogeneous good to consumers who are characterized by the number of prices they are exogenously aware of. Our setting subsumes many employed in the literature over the last several decades. We show there is a unique equilibrium if and only if there exist some consumers who are aware of exactly two prices. The equilibrium we derive is in symmetric mixed strategies. Furthermore, when there are no consumers aware of exactly two prices, we show there is an uncountable-infinity of asymmetric equilibria in addition to the symmetric equilibrium. Our results show the paradigm generically produces a unique equilibrium. We also show that the commonly-sought symmetric equilibrium (which also nests the textbookBertrand pure strategy equilibrium as a special case) is robust to perturbations in consumer behaviour, while the asymmetric equilibria are not.
Pages
17
Subject(s)
Strategy and general management; Technology, R&D management
Keyword(s)
Learning-by-hiring, inter-firm mobility, innovation, patents
ISSN (Print)
0015-6914
Subject(s)
Entrepreneurship; Human resources management/organizational behavior; Technology, R&D management
Keyword(s)
Science and engineering, human capital, graduate education, immigration policy, entrepreneurship, high-tech ventures
Prior research has shown that immigrants to the U.S. make important contributions to innovation and are more likely than natives to become startup founders. These differences may partly reflect labor market conditions and constraints related to visa regulations, as well as individual attributes such as ability or preferences for risk. Although progress has been made in understanding immigrant entrepreneurs, little attention has been paid to another important part of the entrepreneurial workforce–startup employees who “join” founders in their entrepreneurial efforts. In this paper, we draw on unique longitudinal data from over 5,600 foreign and native STEM PhD students at U.S. research universities to examine entrepreneurial characteristics and career preferences prior to graduation, as well as founding and employment outcomes after graduation. First, we find that foreign PhD students differ from native PhD students with respect to individual characteristics typically associated with entrepreneurship such as risk tolerance, a preference for autonomy, and interest in commercialization. Second, foreign PhD students are more likely to express intentions to become a founder or a startup employee prior to graduation. Third, despite their entrepreneurial career interests, foreign PhDs are less likely to become founders or startup employees in their first industry job after graduation. More nuanced analyses reveal that these patterns hold primarily for foreign PhDs from China and India, while foreign PhDs from Western countries are similar to native PhDs with respect to both career interests and employment outcomes. These empirical patterns call for future research on the drivers of entrepreneurial career preferences among different parts of the foreign doctorate workforce, but also on the facilitators or constraints foreign STEM workers face in realizing their entrepreneurial career aspirations.
Secondary Title
The roles of immigrants and foreign students in U.S. science, innovation, and entrepreneurship
ISBN
978-0226695624