Offensive and Defensive Marketing in Spatial Competition
نویسندگان
چکیده
منابع مشابه
Phish Phactors: Offensive and Defensive Strategies
Phishing attacks attempt to fraudulently solicit sensitive information from a user by masquerading as a known trustworthy agent. They commonly use spoofed emails in association with fake websites in order to coerce a user into revealing personal financial data. Phishing is now a serious problem with criminals adopting the well-developed and well-known techniques to exploit Internet users with s...
متن کاملA Combined Offensive/Defensive Network Model
Most literature on network modeling takes a functional perspective. That is, it models the network based on the needs the network must serve. As information assurance has risen as a functional need, the network models have added the need for a protective stance. In almost all instances, such a stance has been defined in terms of firewalls. As cyberspace becomes the next sphere of warfare, we mu...
متن کاملModeling the Offensive-Defensive Interaction and Resulting Outcomes in Basketball
PURPOSE We analyzed the interaction between offensive (i.e. space creation dynamics--SCDs) and defensive (i.e. space protection dynamics--SPDs) actions in six play outcomes (free shot, contested shot, new SCD, reset, foul, and turnover) in Spanish professional basketball games. METHOD Data consisted of 1548 SCD-SPD-outcome triples obtained from six play-off games. We used Bayesian methods to ...
متن کاملOffensive and defensive adaptation in distributed multimedia systems
Adaptation in multimedia systems is usually restricted to defensive, reactive media adaptation (often called stream-level adaptation). We argue that offensive, proactive, system-level adaptation deserves not less attention. If a distributed multimedia system cares for overall, end-to-end quality of service then it should provide a meaningful combination of both. We introduce an adaptive multime...
متن کاملData Fusion in Offensive and Defensive Information Operations
The conduct of offensive and defensive Information Operations (IO) require coordinated targeting and protection, respectively, across physical, information and even cognitive domains. Even the specific IO activities of Computer Network Defense (CND) and Computer Network Attack (CNA) require the close coordination of activities across all three domains to encompass physical processing assets, in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Service Research
سال: 2018
ISSN: 1094-6705,1552-7379
DOI: 10.1177/1094670518819853