5 resultados para Organizational behavior - Case studies

em DRUM (Digital Repository at the University of Maryland)


Relevância:

100.00% 100.00%

Publicador:

Resumo:

When performing in opera, a singer portrays a character. A libretto is used as the principal resource for the research. Music can also reveal insights into the composer’s ideas regarding characterization. This performance dissertation examines how musical devices such as genre, texture, meter, melody, instrumentation and form can be used to inform choices of characterization. Three roles from diverse operas were examined and performed. The first role, Estelle Oglethorpe in Later the Same Evening (2007) by John Musto (b 1954) was performed November 15, 16, 17, 18 2007. The second role, Dorabella in Così fan tutte (1789) by Wolfgang Amadeus Mozart (1756-1791) was performed April 20, 25, 27, 2008. The third role, Olga in Eugene Onegin (1878) by Pyotr Ilyich Tchaikovsky (1840-1893) was performed on April 19, 2009. All operas were presented by the University of Maryland Opera Studio at the Ina and Jack Kay Theater in the Clarice Smith Performing Arts Center, University of Maryland College Park. DVD recordings of all performances can be found in the University of Maryland library system.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This dissertation explores why some states consistently secure food imports at prices higher than the world market price, thereby exacerbating food insecurity domestically. I challenge the idea that free market economics alone can explain these trade behaviors, and instead argue that states take into account political considerations when engaging in food trade that results in inefficient trade. In particular, states that are dependent on imports of staple food products, like cereals, are wary of the potential strategic value of these goods to exporters. I argue that this consideration, combined with the importing state’s ability to mitigate that risk through its own forms of political or economic leverage, will shape the behavior of the importing state and contribute to its potential for food security. In addition to cross-national analyses, I use case studies of the Gulf Cooperation Council states and Jordan to demonstrate how the political tools available to these importers affect their food security. The results of my analyses suggest that when import dependent states have access to forms of political leverage, they are more likely to trade efficiently, thereby increasing their potential for food security.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

State responses to external threats and aggression are studied with focus on two different rationales: (1) to make credible deterrent threats to avoid being exploited, and (2) to minimize the risk of escalation to unwanted war. Given external aggression, the target state's responding behavior has three possibilities: concession (under-response), reciprocation, and escalation. This study focuses on the first two possibilities and investigates how the strategic nature of crisis interaction can explain the intentional choice of concession or avoidance of retaliation. I build a two-level bargaining model that accounts for the domestic bargaining situation between the leader and the challenger for each state. The model's equilibrium shows that the responding behavior is determined not only by inter-state level variables (e.g. balance of power between two states, or cost of war that each state is supposed to pay), but also the domestic variables of both states. Next, the strategic interaction is rationally explained by the model: as the responding state believes that the initiating state has strong domestic challenges and, hence, the aggression is believed to be initiated for domestic political purposes (a rally-around-the-flag effect), the response tends to decrease. The concession is also predicted if the target state leader has strong bargaining power against her domestic challengers \emph{and} she believes that the initiating leader suffers from weak domestic standing. To test the model's prediction, I conduct a lab experiment and case studies. The experimental result shows that under an incentivized bargaining situation, individual actors are observed to react to hostile action as the model predicts: if the opponent is believed to suffer from internally driven difficulties, the subject will not punish hostile behavior of the other player as severely as she would without such a belief. The experiment also provides supporting evidence for the choice of concession: when the player finds herself in a favorable situation while the other has disadvantages, the player is more likely to make concessions in the controlled dictator game. Two cases are examined to discuss how the model can explain the choice of either reciprocation or concession. From personal interviews and fieldwork in South Korea, I find that South Korea's reciprocating behavior during the 2010 Yeonpyeong Island incident is explained by a combination of `low domestic power of initiating leader (Kim Jong-il)' and `low domestic power of responding leader (Lee Myung-bak).' On the other hand, the case of EC-121 is understood as a non-response or concession outcome. Declassified documents show that Nixon and his key advisors interpreted the attack as a result of North Korea's domestic political instabilities (low domestic power of initiating leader) and that Nixon did not have difficulties at domestic politics during the first few months of his presidency (high domestic power of responding leader).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The ever-increasing number and severity of cybersecurity breaches makes it vital to understand the factors that make organizations vulnerable. Since humans are considered the weakest link in the cybersecurity chain of an organization, this study evaluates users’ individual differences (demographic factors, risk-taking preferences, decision-making styles and personality traits) to understand online security behavior. This thesis studies four different yet tightly related online security behaviors that influence organizational cybersecurity: device securement, password generation, proactive awareness and updating. A survey (N=369) of students, faculty and staff in a large mid-Atlantic U.S. public university identifies individual characteristics that relate to online security behavior and characterizes the higher-risk individuals that pose threats to the university’s cybersecurity. Based on these findings and insights from interviews with phishing victims, the study concludes with recommendations to help similat organizations increase end-user cybersecurity compliance and mitigate the risks caused by humans in the organizational cybersecurity chain.