Offensive and Defensive Marketing in Spatial Competition

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Phish Phactors: Offensive and Defensive Strategies

Phishing attacks attempt to fraudulently solicit sensitive information from a user by masquerading as a known trustworthy agent. They commonly use spoofed emails in association with fake websites in order to coerce a user into revealing personal financial data. Phishing is now a serious problem with criminals adopting the well-developed and well-known techniques to exploit Internet users with s...

متن کامل

A Combined Offensive/Defensive Network Model

Most literature on network modeling takes a functional perspective. That is, it models the network based on the needs the network must serve. As information assurance has risen as a functional need, the network models have added the need for a protective stance. In almost all instances, such a stance has been defined in terms of firewalls. As cyberspace becomes the next sphere of warfare, we mu...

متن کامل

Modeling the Offensive-Defensive Interaction and Resulting Outcomes in Basketball

PURPOSE We analyzed the interaction between offensive (i.e. space creation dynamics--SCDs) and defensive (i.e. space protection dynamics--SPDs) actions in six play outcomes (free shot, contested shot, new SCD, reset, foul, and turnover) in Spanish professional basketball games. METHOD Data consisted of 1548 SCD-SPD-outcome triples obtained from six play-off games. We used Bayesian methods to ...

متن کامل

Offensive and defensive adaptation in distributed multimedia systems

Adaptation in multimedia systems is usually restricted to defensive, reactive media adaptation (often called stream-level adaptation). We argue that offensive, proactive, system-level adaptation deserves not less attention. If a distributed multimedia system cares for overall, end-to-end quality of service then it should provide a meaningful combination of both. We introduce an adaptive multime...

متن کامل

Data Fusion in Offensive and Defensive Information Operations

The conduct of offensive and defensive Information Operations (IO) require coordinated targeting and protection, respectively, across physical, information and even cognitive domains. Even the specific IO activities of Computer Network Defense (CND) and Computer Network Attack (CNA) require the close coordination of activities across all three domains to encompass physical processing assets, in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Service Research

سال: 2018

ISSN: 1094-6705,1552-7379

DOI: 10.1177/1094670518819853