Technology ventures' engagement of external actors in the search for viable market applications: On the relevance of Technology Broadcasting and Systematic Validation

2021 ◽  
Vol 36 (6) ◽  
pp. 106145
Author(s):  
Petra Andries ◽  
Bart Clarysse ◽  
Sergio Costa
2007 ◽  
Vol 61 (1) ◽  
pp. 95-111
Author(s):  
Virginie Collombier

Beyond the relative opening of the political system that characterized 2005 in Egypt — with the President being elected directly for the first time and the increased competition allowed during legislative elections — the 2005 elections also constituted an opportunity to consider and evaluate the internal struggles for influence under way within the ruling National Democratic Party (NDP). In a context largely influenced by the perspective of President Husni Mubarak's succession and by calls for reform coming from both internal and external actors, changes currently occurring at the party level may have a decisive impact on the future of the Egyptian regime.


SAGE Open ◽  
2021 ◽  
Vol 11 (1) ◽  
pp. 215824402199065
Author(s):  
Matthew Canham ◽  
Clay Posey ◽  
Delainey Strickland ◽  
Michael Constantino

Organizational cybersecurity efforts depend largely on the employees who reside within organizational walls. These individuals are central to the effectiveness of organizational actions to protect sensitive assets, and research has shown that they can be detrimental (e.g., sabotage and computer abuse) as well as beneficial (e.g., protective motivated behaviors) to their organizations. One major context where employees affect their organizations is phishing via email systems, which is a common attack vector used by external actors to penetrate organizational networks, steal employee credentials, and create other forms of harm. In analyzing the behavior of more than 6,000 employees at a large university in the Southeast United States during 20 mock phishing campaigns over a 19-month period, this research effort makes several contributions. First, employees’ negative behaviors like clicking links and then entering data are evaluated alongside the positive behaviors of reporting the suspected phishing attempts to the proper organizational representatives. The analysis displays evidence of both repeat clicker and repeat reporter phenomena and their frequency and Pareto distributions across the study time frame. Second, we find that employees can be categorized according to one of the four unique clusters with respect to their behavioral responses to phishing attacks—“Gaffes,” “Beacons,” “Spectators,” and “Gushers.” While each of the clusters exhibits some level of phishing failures and reports, significant variation exists among the employee classifications. Our findings are helpful in driving a new and more holistic stream of research in the realm of all forms of employee responses to phishing attacks, and we provide avenues for such future research.


2020 ◽  
Vol 30 (Supplement_5) ◽  
Author(s):  
M Pereira ◽  
dos Santos ◽  
H Alves ◽  
Vieira Lima ◽  
S Carvalho Cerqueira ◽  
...  

Abstract Problem The Salvador Municipal Health Secretariat (MHS) utilizes health data to elaborate technical documents to manage and respond to instances requiring internal or external control. In answer to demands for the modernization and transparency of municipal management, the constitution of a Health Situation Room (HSR) was included in the political agenda of the Secretary, thereby guaranteeing political, technical and operational support for its implementation. Description of the Problem To describe the process of construction of the HSR in the Salvador MHS in 2020. The HSR is a physical, virtual and collective space for the analysis of information, which begins with a data search which allows to understand the information flow, identifying the solicitor and the constructor of the information, the data source and the informational object itself. Results 130 technicians and managers were interviewed, and their responses then categorized into 161 indicators across different themes. The results point out the need to define a spatial analysis unit to be adopted, and to communicate with external actors who demand information, as well as to develop a communication plan for the HSR. Lessons To develop an informational culture oriented by local and central protagonism, generating evidence for decision-making and information transparency for the whole of society. Key messages The Health Situation Room reduces the time between information-decision-action. The Health Situation Room prioritizes interdisciplinary collaboration and increases the efficiency of the health system.


2021 ◽  
pp. 014920632098661
Author(s):  
Llewellyn D. W. Thomas ◽  
Paavo Ritala

Ecosystems—communities of interdependent yet hierarchically independent heterogeneous participants who collectively generate an ecosystem value proposition—often emerge through collective action, where ecosystem participants interact with each other and the external environment. When such organizational forms are emerging, they require legitimacy to overcome the “liability of newness.” Adopting a collective action lens and taking a legitimacy-as-process approach, we propose a process model of ecosystem collective action, where an orchestrator, complementors, users, and external actors together drive ecosystem legitimacy. We identify three key legitimation processes—discursive legitimation, performative legitimation, and ecosystem identity construction—and demonstrate how these three processes together facilitate the emergence of ecosystem legitimacy and reduce the liability of newness of emerging ecosystems.


2008 ◽  
Vol 4 (2) ◽  
pp. 60-74 ◽  
Author(s):  
Charles T. Call

Agencies throughout the development, humanitarian, political and defence fields have recently endorsed the centrality of state institutions in post-war peacebuilding. But how can external actors go about peacebuilding in a way that reinforces effective and legitimate states without doing harm? Drawing on an International Peace Institute project, this article calls into question the assumption that peacebuilding can be boiled down to building state institutions. The article argues that the process of building states can actually undermine peace, postulating five tensions between peacebuilding and statebuilding even as it asserts that strong state institutions remain crucial for consolidating peace. Identifying three crucial state functions for peacebuilding, the article emphasises the complex interrelationships among legitimacy, state capacity and security in post-conflict societies.


Sign in / Sign up

Export Citation Format

Share Document