3,814 results on '"SABOTAGE"'
Search Results
52. Influence of Dysfunctional Customer Behavior on Depersonalization and Service Sabotage in the Service Industry.
- Author
-
Lee, Kangcheol and Gong, Taeshik
- Subjects
DEPERSONALIZATION ,SABOTAGE ,CONSUMERS ,SERVICE industries - Abstract
This empirical study examines the mediating role of depersonalization on the relationship between dysfunctional customer behavior and service sabotage. This study further identifies the mediation model is moderated by a caring climate. Participants comprised 81 service managers and 622 employees. Results showed that dysfunctional customer behavior increases depersonalization, which in turn leads to service sabotage, and a highly caring climate decreases the effect of dysfunctional customer behavior on service sabotage through depersonalization. Therefore, service organizations should establish a caring climate to mitigate the impact of dysfunctional customer behavior on service sabotage. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
53. Identity of the Suspect in Cyber Sabotage.
- Author
-
Peleshchak, Oleh, Blahuta, Roman, Brych, Larysa, Lashchuk, Nataliya, and Miskiv, Dmytro
- Subjects
SABOTAGE ,CYBERSPACE ,INFORMATION resources - Abstract
[Purpose] The purpose of the study is to identify means and measures to counteract and prevent cyber sabotage. [Methodology] The research is based on a systematic approach and logical tools (description, analysis, synthesis, induction, deduction, etc.). Special scientific, general scientific, and philosophical methods are applied. [Findings] The study analyses the possible motives of the suspect in cyber sabotage and unifies classification approaches. Attention is focused on information support for the interrogation of a suspect in cyber sabotage by an investigator to learn the identity of the suspect. Certain features of the sources of obtaining information about a person suspected of committing cyber sabotage are noted. The general characteristics and features of the identity of a cyber sabotage suspect cannot be considered outside the context of other socially dangerous attacks in cyberspace. The development of mechanisms for countering cybercrime in Ukraine continues. [Value] The practical significance of the study is determined in the list of measures and means proposed by the authors to reduce the risk of cyber sabotages and eliminate their harmful consequences. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
54. Node injection for class-specific network poisoning.
- Author
-
Sharma, Ansh Kumar, Kukreja, Rahul, Kharbanda, Mayank, and Chakraborty, Tanmoy
- Subjects
- *
POISONING , *POISONS , *TOPOLOGICAL property , *TASK performance , *PUBLIC key cryptography , *SABOTAGE - Abstract
Graph Neural Networks (GNNs) are powerful in learning rich network representations that aid the performance of downstream tasks. However, recent studies showed that GNNs are vulnerable to adversarial attacks involving node injection and network perturbation. Among these, node injection attacks are more practical as they do not require manipulation in the existing network and can be performed more realistically. In this paper, we propose a novel problem statement — a class-specific poison attack on graphs in which the attacker aims to misclassify specific nodes in the target class into a different class using node injection. Additionally, nodes are injected in such a way that they camouflage as benign nodes. We propose NICKI, a novel attacking strategy that utilizes an optimization-based approach to sabotage the performance of GNN-based node classifiers. NICKI works in two phases — it first learns the node representation and then generates the features and edges of the injected nodes. Extensive experiments and ablation studies on four benchmark networks show that NICKI is consistently better than four baseline attacking strategies for misclassifying nodes in the target class. We also show that the injected nodes are properly camouflaged as benign, thus making the poisoned graph indistinguishable from its clean version w.r.t various topological properties. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
55. Ebb and Flow of Wartime Intelligence: Nigel West:Secret War: The Story of SOE Britain's Wartime Sabotage Organization Frontline Books, Barnsley, 2019, 362 p., $29.95 (hardcover).
- Author
-
Wege, Carl Anthony
- Subjects
WAR stories ,SABOTAGE ,RADIO operators ,SHIP resistance ,INTELLIGENCE officers - Published
- 2023
- Full Text
- View/download PDF
56. Reducing service sabotage: the influence of supervisor social undermining, job stress, turnover intention and ethical conflict.
- Author
-
Schwepker Jr., Charles H. and Dimitriou, Christina K.
- Subjects
JOB stress ,SOCIAL influence ,SABOTAGE ,SOCIAL services ,INTENTION ,CALL centers - Abstract
The purpose of this research is to better understand the relationship between supervisor social undermining and service sabotage through related mediating and moderating variables among customer-contact service employees. Based on a sample of 316 hotel/motel employees, findings show that supervisor social undermining leads to greater service sabotage. Unethical behavior in the form of supervisor social undermining is positively related to job stress and this stress is exacerbated when ethical conflict exists. Moreover, besides being an outcome from unethical behavior, job stress can subsequently influence additional unethical behavior in the form of service sabotage via its impact on turnover intention. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
57. Hybrid sabotage modal logic.
- Author
-
Benthem, Johan van, Li, Lei, Shi, Chenwei, and Yin, Haoxuan
- Subjects
MODAL logic ,SABOTAGE - Abstract
We introduce a new hybrid modal logic HSML for reasoning about sabotage-style graph games with edge deletions and provide a complete Hilbert-style axiomatization. We extend the completeness analysis to protocol models with restrictions on available edge deletions and clarify the connections between HSML-style logics of edge deletions and recent modal logics for stepwise point deletion from graphs. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
58. Sabotaging meaningful student involvement
- Author
-
Fletcher, Adam
- Published
- 2020
59. Stop Sabotaging Your Ability to Innovate.
- Author
-
Bouquet, Cyril, Barsoux, Jean-Louis, and Wade, Michael
- Subjects
SUCCESS ,SABOTAGE ,CREATIVE ability ,INNOVATIONS in business ,FAILURE (Psychology) - Abstract
Innovators can be their own worst enemies, derailed by personal traits, such as confidence and optimism, that are essential to creativity but can be toxic when taken to an extreme, and by emotions such as fear, doubt, regret, and frustration, which are typical when trying something new but can too easily stall or destroy entrepreneurial efforts. And although practical advice abounds on how to innovate, in-depth guidance on conquering these mental challenges is harder to find. The authors draw on published interviews, videos, and speeches to describe the obstacles encountered by some high-profile entrepreneurs and illuminate the paths by which they moved forward. They explore practical tactics for overcoming the fear of getting started, the frustration of setbacks, an excess of creativity, and a tendency to go into hyperdrive. Innovators must become mindful of their habitual ways of thinking and behaving, the authors argue. Thus armed, they can reach out for feedback or mentoring—for help in becoming a more skillful version of themselves. [ABSTRACT FROM AUTHOR]
- Published
- 2021
60. The heroes of hotel Saratoga
- Author
-
Elizalde, Rosa Miriam
- Published
- 2022
61. Zatopione w Morzu Bałtyckim bojowe środki trujące – analiza możliwości wykorzystania ich przez Federację Rosyjską w działaniach terrorystycznych
- Author
-
Krzysztof Kaczmarek
- Subjects
poison warfare agents ,Russia ,the Baltic Sea ,terrorism ,sabotage ,Political science (General) ,JA1-92 ,Social Sciences - Abstract
The aim of the article was to attempt to analyze the possibility of the use by the Russian Federation of toxic warfare agents dumped in the Baltic Sea to carry out terrorist acts and sabotage activities. For this purpose, the following research methods were used: historical in order to show the reasons for dumping chemical weapons in the Baltic Sea. However, the main method was the polemological approach. Due to the difficulties with access to information (or its confidentiality), some of the considerations were hypotheses. However, procedures (or rather the lack thereof) provided for in the event of a mass release of poisonous warfare agents into the Baltic Sea were examined. The main conclusion of the article is that none of the countries with access to the Baltic Sea is prepared for the possible use by Russia of chemical weapons deposited there. Usually, this state of affairs is explained by the low probability of such events. However, after taking into account the activity of Russian units, technological progress, and miniaturisation of devices (including military ones that allow remote military operations), it can be concluded that such actions are possible.
- Published
- 2023
- Full Text
- View/download PDF
62. THE MISSING INGREDIENT: HOW MISOGYNY AND THE PATRIARCHY SABOTAGE OUR CLINICAL PRACTICE AND RESEARCH.
- Author
-
Forner, Christine
- Subjects
- *
MISOGYNY , *PATRIARCHY , *MEDICAL research , *SABOTAGE , *HUMAN beings - Abstract
Discussing massive, unrelenting trauma, especially during a global pandemic, when the threat is not only personally affecting you, but also everyone else, is not an easy thing to do. We can see the consequences of two years of being locked inside. People's trauma responses literally came flooding out. It seems that the pandemic tipped us over an abyss that is hard to comprehend. In so many countries there are protests, laws rolling back basic human rights, the threat of fascism, and actual war. There seems to be widespread governmental corruption that cannot stop the favouritism of those who have wealth, and perpetually admonish those who do not. Our world seems very unstable. Change is deeply desired. Yet, this instability is predictable. It is predictable because the systems that created the structures that "run and rule" us are fundamentally destructive and violent. In never-ending ways, the only way that change happens is by utilizing violence as the only way to achieve change. This is the legacy of patriarchy. A system that not only is ruled by one group of people but also tends to be controlled by a very specific type of person. It is a system that cultivates human cruelty, selfishness, and violence. It is a system that is managed by those who do the "best" in violence. Most of us do not work this way but are forced to live this way because of the belief that humans are innately violent, selfish, and self-serving; a myth based on the traumatic reaction of fight. It is a dissociated, relational injury that is a direct result of not having our mothers and fathers able to be mothers and fathers. It is formed in misogyny. There are ways to heal, if one can comprehend what misogyny does to human beings, and what we would be like in its absence. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
63. The Role of Honeypots and Sabotage in State-Based Operations Against Online Jihadism, 2001-2020.
- Author
-
Torres-Soriano, Manuel R.
- Subjects
SABOTAGE ,TERRORIST organizations ,CYBERTERRORISM ,TRUST ,TERRORISTS ,INTERNET ,INTELLIGENCE service - Abstract
This article offers a descriptive analysis of intelligence operations carried out by the United States and its allies against the presence of jihadist groups on the Internet during the period 2001–2020. In contrast to actions aimed at eliminating the virtual spaces in which terrorists operate, the intelligence operations analysed here are designed to erode terrorists' trust in such spaces without compromising intelligence sources. The article argues that the combination of cyberattacks and psychological operations in the form of honeypots and sabotage have achieved considerable success in terms of reducing terrorist activities on the Internet and undermining the effectiveness of propaganda initiatives undertaken by terrorist groups. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
64. Fighting for a Mare Clausum and Secret Science: France, England and Spain in the Strategies of Ambassador Dantas (1557-1568).
- Author
-
Vila-Santa, Nuno
- Subjects
- *
AMBASSADORS , *MARES , *ESPIONAGE , *SABOTAGE , *DIPLOMACY - Abstract
The Portuguese ambassador to France and England during the 1560s, João Pereira Dantas, played a decisive role in Portuguese attempts to sabotage French and English expeditions to the Portuguese Mare Clausum. Studying Dantas' correspondence, and comparing it with Spanish, French and English sources and studies, this article proposes that tied to traditional policies of Mare Clausum, there was also an attempt at "secret science", intended to prevent Portuguese nautical experts from serving England and France. The study of Dantas' maritime espionage shows that Portuguese cosmographical knowledge played a key role in Elizabethan England's and Valois France's maritime expeditions in the 1560s. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
65. Maritime Security in the Baltic and Japanese Straits From the Perspective of EEZ Corridors.
- Author
-
Lott, Alexander
- Subjects
- *
TERRITORIAL waters , *STRAITS , *INFRASTRUCTURE (Economics) , *OCEAN waves , *SOVEREIGNTY - Abstract
This study focuses on the practice of the Baltic Sea coastal states and Japan in voluntarily limiting the outer extent of their territorial sea in straits. The reasons for the establishment of narrow exclusive economic zone (EEZ) corridors in straits are mostly related to security considerations. This article examines the consequences of such state practice for navigational regimes and for the protection of critical offshore infrastructure. It is argued that the abolition of an EEZ corridor results in the nominal increase of a coastal state's sovereign territory, whereas it implies a decrease in the substantive scope of sovereignty over the relevant maritime area. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
66. A Qualitative Inquiry of the Causes of Economic Abuse Among Women in Intimate Relationships in Ghana.
- Author
-
Boateng, Jessica D. and Tenkorang, Eric Y.
- Subjects
WOMEN ,INTERVIEWING ,INTIMATE partner violence ,EXPERIENCE ,QUALITATIVE research ,SOCIOECONOMIC factors ,EMPLOYMENT discrimination - Abstract
Purpose: Domestic violence, including economic abuse, is a global problem with far-reaching implications for women. Economic abuse occurs when an intimate partner deprives or threatens to deny their partner access to, and control of, financial and economic resources. Emerging evidence indicates that women in sub-Saharan Africa, including Ghana, experience high levels of economic abuse, and that it takes many forms. Notwithstanding, academic research on this topic remains scant, and very few studies document women's lived experiences with economic abuse. Method: This study used in-depth interviews to explore the causes of economic abuse among 16 women in the Greater Accra, Ashanti, and the Upper East regions of Ghana. Results: Results indicate that economic abuse is a common experience for Ghanaian women. Women narrated experiences of economic exploitation, deprivation, and sabotage. While some women had had their employment sabotaged by their male partners, others had experienced financial extortion by their partners. Husbands' extramarital affairs, lack of interest in the family or apathy, alcohol use, jealousy, and some socio-cultural factors were major causes of these types of abuse. Conclusion: Policymakers need to implement programmes that educate women on the causes of economic abuse and empower them to be economically and financially self-sufficient. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
67. RAMIFICATIONS OF INDIA'S NAVAL BUILD-UP IN NUCLEAR REALMS.
- Author
-
Bibi, Gulshan and Tseen Fu Lee, Brice
- Subjects
BUILDING additions ,NUCLEAR accidents ,OCEAN ,ARMS race ,SABOTAGE - Abstract
The naval build-up of India in contemporary times reflects its major power ambitions. Owing to its development of advanced naval capabilities coupled with its long-standing desire to develop a blue-water navy is a major driver of this build up. These blue water ambitions stir instability in Indian Ocean Region (IOR) affecting Pakistan's threat perceptions. The most important development in the region's stability and security architecture is the addition of second-strike capacity to the sea, which carries serious consequences. Hence, it is pertinent to address the question of strategic stability regarding the development of India's sea based nuclear capabilities. This paper explores Indian naval nuclear developments and their repercussions for the security environment of South Asia. It establishes that nuclearization of Indian Ocean is leading to aggressive arms build-up in South Asia and subsequent risk of nuclear accidents, sabotage and command and control vulnerabilities. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
68. ROMANIAN MILITARY INTELLIGENCE ACTIVITIES IN THE TERRITORY OF MODERN UKRAINE DURING WORLD WAR II.
- Author
-
SEHEDA, Serhii, VIEDIENIEIEV, Dmytro, and LEVCHENKO, Serhii
- Subjects
MILITARY intelligence ,WAR ,WORLD War II ,RADIO operators ,INTELLIGENCE service - Abstract
Copyright of Codrul Cosminului is the property of Codrul Cosminului and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
69. Engendered Perceptions: Reconsidering Wartime Female Tewu (Special Agent) Activities and Narratives of "Honey Traps" in the Early People's Republic of China, 1949–1959.
- Author
-
Zhang, Amanda
- Subjects
HONEY ,INTELLIGENCE service ,FEMALES ,REPORTERS & reporting ,COMMUNIST parties ,SPY stories - Abstract
This article considers how Chinese Communist Party (CCP) officials understood, perceived, and experienced enemy female tewu (special agent) activities and "honey traps" during the early People's Republic of China. Drawing upon internally circulated party reports and newsletters, speeches of officials, newspapers, films, literature, and dramas, it finds that officials saw enemy female tewu as real threats that had tangible impact on both civilians and men affiliated with the party through honey traps and gendered manipulations. It further argues that narratives of female tewu in official instructions, newspaper reports, and popular cultural works played a larger role in the CCP's broader efforts to combat and resist enemy espionage than previously understood. This article contextualises existing arguments about CCP counterespionage propaganda. It counterbalances perspectives that suggest the utilisation of these narratives was largely based on irrational wartime sentiments, with the primary aim of increasing the party's societal control. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
70. DIASPORADA SURIYE ŞIIRI.
- Author
-
TURKEY, Mohamad and KARATAŞ, Yusuf
- Subjects
- *
FORCED migration , *WAR , *DIASPORA , *DISASTERS , *SABOTAGE - Abstract
Syrian poets portray the Syrian war and its aftermath of calamities in our days, and express their rejection of bloodshed, sabotage and forced displacement. They experience the major historical transformations related to this war, and strive to present their poetic testimonies on their era and their own experiences related to this fatefill period that storms the lives of their compatriots. This study aims to shed light on some of the texts produced during the Syrian war Between 2011-2018, and deals with the most important names that critics gave to Syrian poetry hat was said during this period inside and outside Syria, and seeks to clarify the common features that unite the poets of the diaspora, and show the artistic characteristics of their poetry. This research relied on the social approach that seeks to clarify the connection between the text and the society in which it arose. It is thus the most capable of the approaches to respond to the objectives of the research and serving its purposes. The structural approach was used in analyzing the studied poetic texts, highlighting their intemal systems, and understanding their relationships and aesthetic fimetions. The study reached results, including: the importance of Syrian poetry in the diaspora for its role in portraying the reality that people live in and outside their homeland, and its distance from any compelling political pressures, and its incomplete image due to the circumstances in which it was said. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
71. Sabotaging Teammates and Rent Dissipation in a Rent-Seeking Contest.
- Author
-
Ryusuke Shinohara
- Subjects
RENT seeking ,SABOTAGE ,CONTESTS ,RENT ,TEAMS - Abstract
This study examines a rent-seeking contest among teams in which members can sabotage their teammates. We demonstrate how rent dissipation differs, with and without intra-team sabotage options. We find that an increased number of teams always increases rent dissipation, with and without sabotage options. In contrast, rent dissipation nonmonotonically changes with the number of team members. These changes in rent dissipation may contribute to alleviating efficiency losses in real-world contests. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
72. The Anatomy of Three Scandals: Conspiracies, Beauty Contests, and Sabotage in OTC Markets.
- Author
-
Stenfors, Alexis and Muchimba, Lilian
- Subjects
OVER-the-counter markets ,BEAUTY contests ,INTEREST rates ,SABOTAGE ,CONSPIRACIES ,CONSPIRACY theories - Abstract
Until the Great Recession, the largely unregulated over-the-counter (OTC) markets had received little attention from compliance officers, regulators, and lawmakers. Perhaps more important than the lack of regulatory framework as such, the markets were widely perceived to be sufficiently large, liquid, efficient and competitive to withstand manipulative and collusive attempts by traders and banks. However, the status quo was radically altered in 2012, when it was revealed that major international banks had systematically manipulated the world's most widely used interest rate benchmark. The "LIBOR scandal" was quickly followed by a "Forex scandal" and the discovery of grave misconduct in a range of other OTC benchmarks and markets. At the time of writing, government bonds traded on electronic trading platforms are under particular scrutiny. This paper draws on the concepts of conspiracies, beauty contests, and sabotage to reflect on why it took so long for the scandals to be discovered. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
73. تهديدات الامن الصحي في محافظة نينوى بعد احتلال داعش (2014 -2020) دراسة في الجغرافية السياسية.
- Author
-
مجيد حميد شهاب and مرتضى باقر هنين
- Subjects
NINEVEH (Extinct city) ,ANCIENT cities & towns ,POLITICAL geography ,TERRORISM ,SABOTAGE ,TERRORIST organizations ,ANTIQUITIES ,DISEASE exacerbation - Abstract
Copyright of Adab Al-Kufa is the property of Republic of Iraq Ministry of Higher Education & Scientific Research (MOHESR) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
74. SERVICE SABOTAGE: AN EXAMINATION OF SELECTED ANTECEDENT AND OUTCOME VARIABLES IN HIGH-CONTACT ORGANIZATIONS.
- Author
-
BEDNARSKA, Marlena A. and ŁUKA, Paweł
- Subjects
EMPLOYEE competitive behavior ,FOOD service employees ,SABOTAGE ,MULTIPLE regression analysis ,SAMPLING (Process) - Abstract
Purpose: The purpose of the paper is to explore selected antecedent and outcome variables of employee dysfunctional behavior directed at customers in a high-contact service environment. The linkages among customer mistreatment, service sabotage, and competitive performance of an employing organization were examined. Design/methodology/approach: A quantitative approach was adopted, based on a selfadministered online survey. Data were collected from 144 food service employees in Poland. Hierarchical multiple regression analyses were performed to test the proposed research model. Findings: The results demonstrate that both work-related and person-related mistreatment by customers contribute to service sabotage. Service sabotage in turn leads to deterioration of competitive performance of a food service establishment. Research limitations/implications: The study adopted a cross-sectional design, which makes the direction of causality open to debate. Also, the data collection was based on the non-random sampling technique and the sample size was relatively small, which limits generalization of the findings beyond the specific context of this research. Practical implications: From a managerial perspective, the confirmed relationships stress the importance of preventive measures to be taken to reduce the adverse effects of dysfunctional customer behavior on employee behavior and competitive performance of an employing organization. Originality/value: The present research furthers the understandings of antecedents of service sabotage and its effects on service organization’s performance. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
75. The Law and Economics of Nonexclusionary Price Floors
- Author
-
Weisman, Dennis L.
- Published
- 2022
- Full Text
- View/download PDF
76. Hide a Dagger Behind a Smile: A Review of How Collectivistic Cultures Compete More Than Individualistic Cultures
- Author
-
Wu, Kaidi, Talhelm, Thomas, Garcia, Stephen M., book editor, Tor, Avishalom, book editor, and Elliot, Andrew J., book editor
- Published
- 2024
- Full Text
- View/download PDF
77. Are spies sabotaging encryption?
- Author
-
Sparkes, Matthew
- Subjects
- *
SPIES , *SABOTAGE , *ENCRYPTION protocols , *QUANTUM cryptography , *ESPIONAGE , *IMAGE encryption - Abstract
Bernstein, who coined the term post-quantum cryptography in 2003 to refer to these kinds of algorithms, says the NSA is actively engaged in putting secret weaknesses into new encryption standards that will allow them to be more easily cracked with the right knowledge. Daniel Bernstein at the University of Illinois Chicago says that the US National Institute of Standards and Technology (NIST) is deliberately obscuring the level of involvement the US National Security Agency (NSA) has in developing new encryption standards for "post-quantum cryptography" (PQC). News Technology A PROMINENT cryptography expert has told New Scientist that a US spy agency could be weakening a new generation of algorithms designed to protect against hackers equipped with quantum computers. [Extracted from the article]
- Published
- 2023
78. Implications for Organizations
- Author
-
Garrick, Jacqueline, Buck, Martina, Garrick, Jacqueline, and Buck, Martina
- Published
- 2022
- Full Text
- View/download PDF
79. Dramaturgical and Ethical Approaches to the Dark Side: An Introduction
- Author
-
Oravec, Jo Ann, Richardson, Kathleen, Series Editor, Heffernan, Teresa, Series Editor, and Oravec, Jo Ann
- Published
- 2022
- Full Text
- View/download PDF
80. Robo-Rage Against the Machine: Abuse, Sabotage, and Bullying of Robots and Autonomous Vehicles
- Author
-
Oravec, Jo Ann, Richardson, Kathleen, Series Editor, Heffernan, Teresa, Series Editor, and Oravec, Jo Ann
- Published
- 2022
- Full Text
- View/download PDF
81. Engineering Ethics
- Author
-
Blum, Michelle and Blum, Michelle
- Published
- 2022
- Full Text
- View/download PDF
82. The Dark Triad and Insider Threats in Cyber Security.
- Author
-
MAASBERG, MICHELE, VAN SLYKE, CRAIG, ELLIS, SELWYN, and BEEBE, NICOLE
- Subjects
- *
SABOTAGE , *MACHIAVELLIANISM (Psychology) , *EMPLOYEE psychology , *BUSINESS enterprises , *PATHOLOGICAL psychology , *INTERNAL security - Abstract
The article discusses the costs and threats posed to corporate and other enterprises by employees who are known as malicious insiders that exhibit Machiavellian psychopathic, narcissistic, and malevolent traits, referred to as the dark triad, and engage in sabotage and breaches of cybersecurity.
- Published
- 2020
- Full Text
- View/download PDF
83. Criminal law protection of critical infrastructure objects against subversive encroachments
- Author
-
О. V. Shamsutdinov and D. S. Melnyk
- Subjects
diversion ,sabotage ,damage ,subversive activity ,object of critical infrastructure ,subject of criminal offense ,composition of the crime. ,Law in general. Comparative and uniform law. Jurisprudence ,K1-7720 - Abstract
The norms of domestic and foreign legislation, which establish a criminal law prohibition of encroachments on objects of critical importance for the economy, defense and life support of the population for subversive purposes, have been studied. With the help of the historical and legal method, an analysis of the criminalization of such socially dangerous acts as diversion, sabotage, and vandalism in Ukraine during the last century has been carried out. Moreover, using the comparativist method, the criminal law norms of France, Germany and the USA on responsibility for sabotage have been examined. At the same time, the main attention paid to the subject and forms of committing the corresponding socially dangerous acts, as well as the moment from which the crime is considered finished. It has been established that the current legislation of Ukraine has a number of shortcomings and gaps in the criminal law protection of critical infrastructure objects from subversive encroachments. In particular, criminal liability is established for attempts to damage objects important to the state, and not for their actual damage, that is, real socially dangerous consequences (sabotage itself) require additional qualifications. The criminal law norm provided for in Art. 113 of the Criminal Code of Ukraine, is formulated with violation of the principle of proportionality of the social danger of the act and the severity of the punishment provided for its commission. The dispositively defined subject of diversion contains the term “national economy”, which has lost its legal basis, as well as a synecdoche (the use of the plural instead of the singular). On the objective side, the composition of sabotage, defined in Art. 113 of the Criminal Code of Ukraine, does not criminalize illegal inaction, as well as actions aimed at disorganization, slowing down or making impossible the operation of such facilities important to the state. On this basis, it has been proposed to formulate the second form of sabotage (Article 113 of the Criminal Code of Ukraine) in the following wording: “Destruction or damage to a critical infrastructure object by arson, explosion or other means with the aim of weakening the state”, as well as to supplement the Criminal Code of Ukraine with an amendment on sabotage, which is understood as “actions aimed at weakening the state, actions or decision-making aimed at destabilizing or making impossible the intended functioning of a critical infrastructure object, in the absence of signs of diversion”.
- Published
- 2022
- Full Text
- View/download PDF
84. Cepa 21, el despido que precedóo a la venganza.
- Author
-
Díaz-Pintado, Pablo
- Subjects
WINE industry ,DISMISSAL of employees ,ECONOMIC impact ,WINERIES ,SABOTAGE - Abstract
The article reports on the resolution of a sabotage case involving the intentional spillage of high-quality red wine from the Cepa 21 winery in Ribera del Duero, Spain. It mentions that the incident, which occurred on February 18, 2024, led to the arrest of a former employee suspected of the deliberate act following her recent dismissal. It details the ongoing investigation, legal implications, and the severe economic impact on the winery.
- Published
- 2024
85. Our Falling IQ Shows in the Polls: Excessive sensory stimulation is making us less intelligent.
- Author
-
HAAKE, SABRINA
- Subjects
POOR people ,TAX cuts ,SELF ,SABOTAGE ,RETIREES ,PONZI schemes - Abstract
This document explores various topics related to current events and politics in the United States. It discusses the declining IQ levels in the country and suggests that excessive sensory stimulation may be a contributing factor. The article also addresses the impact of personal electronics and social media on cognitive abilities, with educators taking steps to limit cellphone use in classrooms and Congress considering studying the effects of cellphone use on mental health and academic performance. Another article included in the document critiques Donald Trump's political career, highlighting his divisive tactics and lack of concern for the country's well-being. It also discusses the scrutiny and racist attacks faced by Vice President Kamala Harris, focusing on the historical significance of Black women seeking the presidency and the challenges and prejudices Harris faces as a Black and biracial woman. The author emphasizes the importance of recognizing the progress made by Black women in politics. [Extracted from the article]
- Published
- 2024
86. Intimate but not intimate: The perils of workplace romance in fostering knowledge sabotage.
- Author
-
Qiu, Jun, Sultana, Fatima, Iqbal, Shahid, and Ayub, Arslan
- Subjects
- *
WORKPLACE romance , *SOCIAL exchange , *SABOTAGE , *SERVICE industries , *EMPLOYEE services - Abstract
Extant research on workplace ostracism has investigated a victimization perspective to understand ostracism at the cost of examining the perpetrator-centric view of ostracism. The current study draws on the self-categorization theory and the social exchange theory to investigate the harmful effects of workplace romance in cultivating workplace ostracism from the perpetrator's perspective to combat concerns for victim blaming. The study further proposes that workplace ostracism triggered by workplace romance provokes knowledge sabotage. Besides, the study investigates the moderating role of parochial altruism in the underlying linkages. The study utilizes a multisource, time-lagged research design to collect data from employees working in service sector organizations in Pakistan. The study analyzes 343 responses using SmartPLS (v 4.0). The findings of this study reveal that workplace romance elicits workplace ostracism, which, in turn, fosters knowledge sabotage. In addition, the study finds that parochial altruism strengthens the associations between (a) workplace romance and workplace ostracism and (b) workplace romance and knowledge sabotage, mediated by workplace ostracism such that the associations are more potent at higher levels of parochial altruism and vice versa. This is the first study that examines workplace romance as the perpetrator-centric antecedent of workplace ostracism, and parochial altruism exaggerates outgroup ostracism and knowledge sabotage. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
87. Romantic partner undermining of weight loss: Links between overweight individuals' weight management efforts and perceptions of their partner's undermining motivations and behaviors.
- Author
-
Dailey, René M, Lloyd, Rachel, Burdick, Suzanne, Zhang, Zhengyu, and Kurlak, Rebecca
- Subjects
- *
REDUCING diets , *REGULATION of body weight , *SOCIAL support , *MOTIVATION (Psychology) , *MATHEMATICAL models , *SELF-perception , *CRITICISM , *FAMILIES , *FEAR , *PSYCHOSOCIAL factors , *WEIGHT loss , *INTERPERSONAL relations , *HEALTH attitudes , *THEORY , *COMMUNICATION , *DESCRIPTIVE statistics , *SEXUAL partners , *BODY mass index - Abstract
This study investigated romantic partners' undermining of weight management (i.e. hindrance of weight loss efforts) and how perceived motivations behind undermining were associated with weight loss progress. Data from 241 overweight individuals currently cohabiting with a romantic partner and trying to lose weight revealed two overarching undermining factors (i.e. verbal criticism/complaint, behavioral interference) and six perceived motivations (e.g. partner believed weight loss was unnecessary, partner relational fears, weight loss was an imposition on partner). Path modeling showed both undermining behaviors were negatively associated with weight management. Yet, only certain motivations (e.g. imposition on partner, weight loss was unnecessary) were linked to weight management, either directly or indirectly, through undermining. Specifically, whereas criticism/complaint mediated the associations between these motivations and weight management, interference only mediated the association between imposition and weight management. Findings are discussed in terms of the theoretical and practical value of distinguishing undermining behaviors and their underlying motivations. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
88. Antecedents and consequences of knowledge sabotage in the Turkish telecommunication and retail sectors.
- Author
-
Serenko, Alexander and Abubakar, A. Mohammed
- Subjects
CORPORATE culture ,SABOTAGE ,WORKPLACE incivility ,ORGANIZATIONAL behavior ,STRUCTURAL equation modeling ,JOB satisfaction - Abstract
Purpose: This study aims to propose and test a model explicating the antecedents and consequences of knowledge sabotage. Design/methodology/approach: Data obtained from 330 employees working in the Turkish retail and telecommunication sectors were analyzed by means of the Partial Least Squares Structural Equation Modeling technique. Findings: Co-worker knowledge sabotage is the key factor driving knowledge sabotage behavior of individual employees, followed by co-worker incivility. Interactional justice suppresses individual knowledge sabotage, while supervisor incivility does not affect it. Co-worker knowledge sabotage reduces job satisfaction of other employees, which, in turn, triggers their voluntary turnover intention. Contrary to a popular belief that perpetrators generally benefit from their organizational misbehavior, the findings indicate that knowledge saboteurs suffer from the consequences of their action because they find it mentally difficult to stay in their current organization. Employees understate their own knowledge sabotage engagement and/or overstate that of others. Practical implications: Managers should realize that interactional justice is an important mechanism that can thwart knowledge sabotage behavior, promote a civil organizational culture, develop proactive approaches to reduce co-worker incivility and strive towards a zero rate of knowledge sabotage incidents in their organizations. Co-worker incivility and co-worker knowledge sabotage in the workplace are possible inhibitors of intraorganizational knowledge flows and are starting points for job dissatisfaction, which may increase workers' turnover intention. Originality/value: This study is among the first to further our knowledge on the cognitive mechanisms linking interactional justice and uncivil organizational behavior with knowledge sabotage and employee outcomes. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
89. Zatopione w Morzu Bałtyckim bojowe środki trujące - analiza możliwości wykorzystania ich przez Federację Rosyjską w działaniach terrorystycznych.
- Author
-
KACZMAREK, KRZYSZTOF
- Abstract
Copyright of Acta Politica Polonica is the property of Wydawnictwo Naukowe Uniwersytetu Szczecinskiego / University of Szczecin Press and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
90. Platform sabotage.
- Author
-
Shapiro, Aaron
- Subjects
SABOTAGE ,SCHOLARLY method ,BUSINESS enterprises ,RIDESHARING services ,VIGNETTES - Abstract
Why are unprofitable gig work platforms so highly valued? Recent scholarship argues that gig platforms configure their data and computational infrastructure as financial assets, and that this speculative valuation offsets monetary losses on ride-hailing and food-delivery services. At the root of this valuation, however, is a narrative of efficiency and optimization that has little bearing on platforms' on-the-ground operations. In practice, gig work platforms are remarkably inefficient. I build on Veblen's work on the business enterprise to argue that platforms' financial exceptionalism owes to their unique capacity to strategically insert inefficiencies within and beyond the market encounters they broker, a pattern that I call 'platform sabotage.' The paper offers five vignettes of platform sabotage at work, illustrating how platforms target their strategic inefficiencies across various constituencies of market actors. The paper concludes with discussion of sabotage as a modality of platformization. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
91. Sabotage in dynamic tournaments with heterogeneous contestants: Evidence from European football.
- Author
-
Zhao, Yangqing and Zhang, Hui
- Subjects
SOCCER ,SABOTAGE ,TOURNAMENTS ,SPORTING rules - Abstract
This paper analyses how sabotage, measured as the number of fouls and yellow and red cards, is affected by the relative performance of and asymmetries between teams, determined based on score margin and the odds gap between one team and its opponent. By applying detailed controls for within-match dynamics and differences in team quality, we first observe that badly losing favourites are more willing than losing underdogs to increase their unsporting behaviour in heterogeneous contests. There are more yellow cards and fouls as the game progresses. We further find that most sabotage (yellow cards) can be observed when the (absolute) goal difference is equal to 1. Teams decrease their level of sabotage (fouls) by increasing the number of goals of lead or trail. In addition, weaker teams have an incentive to engage in more unfair and destructive strategies, such as committing more fouls, including those penalized with yellow cards. However, the incidence of red cards is not influenced by the score margin or strength gap. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
92. The Janus Face of Grandiose Narcissism in the Service Industry: Self-Enhancement and Self-Protection.
- Author
-
Li, Ran, Yang, Fan, and Zhu, Xiji
- Subjects
NARCISSISM ,CALL centers ,CONSUMERS ,CUSTOMER relations ,SABOTAGE ,SELF-protective behavior ,PROSOCIAL behavior ,ORGANIZATIONAL citizenship behavior ,PSYCHOLOGICAL burnout - Abstract
Narcissism is considered a generally undesirable trait in the workplace, but is this the whole story? In grandiose narcissism, two dimensions (narcissistic rivalry and narcissistic admiration) are recognized corresponding to self-protecting and self-enhancing regulatory processes separately. Applying the self-regulation theory and the conservation of resources theory, we investigated the distinct outcomes and influencing mechanisms of the two dimensions in an organizational context using multilevel structural equation modeling. Whereas previous literature has found narcissism to be mainly related to negative outcomes in the workplace, our dimensional framework indicates that grandiose narcissism may have a Janus face—i.e., a dark side of unethical behaviors and a light side of prosocial behaviors. From a sample of 646 frontline employees in a Chinese call center, we found that while employee narcissistic rivalry was positively related to customer-directed sabotage through the mediation of emotional exhaustion, narcissistic admiration was positively related to organizational citizenship behavior toward customers (OCB-C) through the mediation of self-perceived status. In addition to the internal self-regulation of these two narcissism dimensions, political skill provides an external self-regulation that moderates the mediating effect of self-perceived status at the first stage—that is, the positive relationship between narcissistic admiration and self-perceived status is stronger when political skill is high rather than low. Our post hoc analyses further reveal that narcissistic rivalry is negatively related to OCB-C through the mediation of self-perceived status. Theoretical contributions and practical implications are discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
93. Burn to harvest, burn to sabotage: Between fire and water on a sugar plantation in Madagascar.
- Author
-
Zhang, Mingyuan
- Subjects
- *
SUGAR plantations , *SABOTAGE , *INDUSTRIAL relations , *CHINESE corporations , *WILDFIRES , *VILLAGES ,FRENCH colonies - Abstract
Since 2009, the Chinese state‐owned corporation SINLANX has been managing the Anjava Sugar Plantation, previously managed by French, Malagasy, and Mauritian companies, in northern Madagascar. Built upon the infrastructure constructed by the French colonial regime and operating based on a collaboration agreement between SINLANX and the Malagasy state‐owned sugar company, Anjava presents a telling story of spatialized acts of survival and racialized conflicts over land and water in the interstitial spaces between capitalist production and subsistence economy. Malagasy villagers' access to resources is often squeezed by multiple enclosures: a water‐delivery system and a land‐distribution system that prioritize sugar production and a bureaucratic system that punishes those who transgress the enclosures. Although Anjava villagers take advantage of the rhythm of sugar harvests and the nature of fire to sabotage sugar production or to make water claims for their livelihood, the agrarian and infrastructural arrangements at Anjava have perpetuated conditions of chronic precarity and profound marginalization of a landless population. The struggles at Anjava must be contextualized in the complex and ambiguous spaces between capital and labor, livelihood and resistance, dominance and adaptation, and ethnic collaboration and hostility. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
94. 'Capital as power': an alternative reading of India's post-2011 economic slowdown.
- Author
-
Kothakapa, Gouthami and Sirohi, Rahul A.
- Subjects
- *
RECESSIONS , *FINANCIAL crises , *SABOTAGE , *CORPORATE giving - Abstract
A study of the post-2011 economic slowdown in India that challenges liberal and Keynesian interpretations by drawing on Nitzan and Bichler's argument of 2009 that modern-day capitalist activity is shaped primarily by differential rather than absolute accumulation and the accumulation of power so as to squeeze and lock out competitors, monopolize resources, sabotage production and acquire unused capacity. In an exploration of the deep-rooted entanglements of power, crisis and accumulation, firm-level data from India are examined to show that a growth slowdown, economic crisis and destruction of the livelihoods of millions of people have provided an opportunity for top corporate houses to entrench their power and wealth. Crisis, in other words, has been good for business. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
95. Neo-racism, Neo-nationalism, and the Costs for Scientific Competitiveness: The China Initiative in the United States.
- Author
-
Lee, Jenny J. and Li, Xiaojie
- Subjects
- *
RACISM , *GEOPOLITICS , *NATIONALISM , *SABOTAGE - Abstract
This study demonstrates ways that geopolitics may interfere with the pursuit of global science. In particular, the study sought to understand the impact of the U.S. Department of Justice's China Initiative on the U.S. scientific community, especially among those of Chinese and other Asian descent. Based on a survey of about 2,000 scientists in top U.S. research universities, findings show a consistent pattern of neo-racism, neo-nationalism, and the consequences for future international collaborations and maintaining highly skilled talent. The findings show how neo-racism and neo-nationalism may be sabotaging the efforts of the U.S. to be globally competitive. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
96. North Korean Hackers: Vigilance Against Better Than Underestimation Of.
- Author
-
Liang Tuang Nah
- Subjects
CYBERTERRORISM ,INFORMATION technology security ,INFORMATION technology industry ,INTELLIGENCE sharing ,SAFETY education ,FOREIGN banking industry - Abstract
Purpose--This article examines the current and likely cyber warfare capabilities of the DPRK, with the aim of highlighting a few probable and very damaging cyber-attack scenarios featuring espionage, sabotage, kidnapping, and/or assassination. Additionally, preventive measures and defenses against Pyongyang's online offensives are also recommended. Design/methodology/approach--Research was drawn from the Kim regime's previous online operations to establish a track record of malicious and destructive intent. Building upon this, a few of the most virulent and disruptive attack scenarios useful to Pyongyang, based on real world cyber operations utilizing available technology, are postulated. The precautionary defenses suggested are based on best practices across the IT industry. Findings--Due to North Korea's determination to establish offensive cyber abilities, coupled with previous successes involving online sabotage and even a heist against a foreign central bank, any potential cyber espionage, sabotage, or online infiltration facilitating real world violence must be treated with the utmost seriousness and not underestimated. Practical Implications--Vigilance and caution towards inevitable cyber-attacks are an inescapable reality if the DPRK's insidious online operations are to be reliably thwarted. Beyond diligent implementation of IT security protocols, population wide cyber safety education, physical security measures for important facilities and personnel, and international cooperation involving intelligence sharing is vital. The Kim regime's missiles and warheads are flashier, but their cyber campaigns are a more realizable threat. Originality, Value--Since this journal has not yet published an article covering North Korea's cyber warfare efforts, this commentary could serve as a primer for a longer work studying Pyongyang's offensive IT doctrine, strategy and/or developmental plans. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
97. األنومية التنظيمية وتأثريها يف حدوث االحنراف التنظيمي "دراسة استطالعية آلراء عينة من العاملني يف عدد من املديريات احلكومية يف مدينة زاخو".
- Author
-
هنداف حممد توفيق and و طرين مصطفى خالد
- Abstract
Copyright of Humanities Journal of University of Zakho (HJUOZ) is the property of Humanities Journal of University of Zakho and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
98. Report of the saboteur I.G. Starinov to the Supreme Commander
- Author
-
Oleg B. Mozokhin
- Subjects
the great patriotic war ,starinov ,stalin ,partisan movement ,sabotage ,tsspd ,History (General) ,D1-2009 - Abstract
Background. The relevance of the study is determined by the need for an objective study of the partisan movement during the Great Patriotic War. The publication purpose is to sanctify the activities of one of the organizers of this movement, I.G. Starinov. Materials and methods. The study was conducted on the basis of archival documents. Methodological potential includes philosophical principles of dialectics. Results. In the course of writing the article, the task of introducing new documents on the topic under study into scientific circulation was solved. Conclusions. In Soviet and post-Soviet periods, researchers have done a lot of work to study the activities of I.G. Starinov during the war. However, there is no mention of the documents published by us in the name of Stalin.
- Published
- 2023
- Full Text
- View/download PDF
99. An analysis of griefs and griefing factors
- Author
-
William George
- Subjects
sabotage ,griefing ,equilibria ,utility functions ,blockchain ,Information technology ,T58.5-58.64 - Abstract
We consider griefing factors, a system for measurement of the cost-effectiveness of sabotage, which have been used to analyze the attack resistance of blockchain systems. Attackers are said to “grief” if they accept economic harm to themselves in order to harm others; the griefing factor is the ratio of the harm done to the victim to the harm taken on by the attacker. In this work, we study the mathematical properties of this notion, particularly focusing on how the presence of players willing to engage in griefs at varying griefing factors impacts the equilibria present in games.
- Published
- 2023
- Full Text
- View/download PDF
100. Sabotaging the breaks: FSEN1 expands the toolbox of FSP1 inhibitors.
- Author
-
Xavier da Silva, Thamara Nishida and Friedmann Angeli, José Pedro
- Subjects
- *
CHEMICAL biology , *SABOTAGE , *CYTOLOGY , *CANCER cells , *PEROXIDATION - Abstract
The report of heightened lipid peroxidation has shone a spotlight on vulnerabilities within challenging cancers. In this context, FSP1 emerges as a pivotal regulator, actively countering the destructive effects of lipid peroxidation. In a groundbreaking development detailed in the latest issue of Cell Chemical Biology , Hendricks et al. unveil FSEN1, a potent inhibitor of FSP1. The discovery of FSEN1 holds tremendous promise as it synergizes with GPX4 inhibitors, in addition to several FDA-approved drugs, amplifying their capacity to induce ferroptosis in resistant cancer cells. This represents a significant stride towards ferroptosis-based strategies in preclinical settings. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.