Unpacking dynamic capability deployment: U.S. defense systems integrators’ response to 9/11
نویسندگان
چکیده
منابع مشابه
analysis on response of dynamic systems to pulse sequences excitation
near-fault ground motions with long-period pulses can place severe demands on structures near an active fault. these pulse-type ground motions can be represented by pulse sequences with simple shapes. half-sinusoidal pulse sequences are used to approximate recorded ground motions and dynamic responses of sdof system under the excitation of these pulse sequences are studied. four cases are consi...
متن کاملUnpacking the Unfolded Protein Response
This year, the Albert Lasker Basic Medical Research Award will be shared by Peter Walter and Kazutoshi Mori for discoveries revealing the molecular mechanism of the unfolded protein response, an intracellular quality control system that detects harmful misfolded proteins in the endoplasmic reticulum and then signals the nucleus to carry out corrective measures.
متن کاملHospitals Capability in Response to Disasters Considering Surge Capacity Approach
Background: The man-made and natural disasters have adverse effects with sound, apparent, and unknown consequences. Among various components of disaster management in health sector, the most important role is performed by health-treatment systems, especially hospitals. Therefore, the present study aimed to evaluate the surge capacity of hospitals of Kerman Province in disaster i...
متن کاملEnhancing 911 Systems A Usability Test Plan
This study is the development of a usability test plan for implementation of an Enhanced 911 Computer Aided Dispatch (CAD) system by emergency response dispatch centers. Enhanced 911 system technologies will allow emergency response personnel to locate cellular 911 callers in distress by pinpointing the latitude and longitude of their location, and mapping it through the use of a Geographic Inf...
متن کاملT - dominance : Prioritized Defense Deployment for BYOD
Bring Your Own Device (BYOD) is an enterprise information technology (IT) policy that encourages employees to use their own devices to access sensitive corporate data at work through the enterprise IT infrastructure. Many current BYOD security practices are costly to implement and intrusive to employees, which, to some degree, negate BYOD’s perceived benefits. To address such tension, we propos...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Academy of Management Proceedings
سال: 2012
ISSN: 0065-0668,2151-6561
DOI: 10.5465/ambpp.2012.17180abstract