Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 84

Full-Text Articles in Business

Benchmarking And Evaluating The Comparative Efficiency Of Urban Paratransit Systems In The United States: A Data Envelopment Analysis Approach, Hokey Min, Thomas E. Lambert Oct 2010

Benchmarking And Evaluating The Comparative Efficiency Of Urban Paratransit Systems In The United States: A Data Envelopment Analysis Approach, Hokey Min, Thomas E. Lambert

Journal of Transportation Management

Passenger rail service is perceived to provide important benefits to Michigan communities. However, the extent of these benefits has never been quantified in a systematic way. The study reported on here involved the performance of a broad based assessment of the community level benefits of passenger rail serv ice. The main objective of the research project was to estimate the full range of these benefits at the community level, as opposed to at the state level. Benefits were estimated for individual travelers, Amtrak expenditures, and local businesses. This research indicates local communities currently realize $62.0 million annually in benefits. Additional …


The Relationship Between Measures Of Operations Efficiency And Financial Success Of Truckload Motor Carriers: An Empirical Analysis, Ahren Johnston Oct 2010

The Relationship Between Measures Of Operations Efficiency And Financial Success Of Truckload Motor Carriers: An Empirical Analysis, Ahren Johnston

Journal of Transportation Management

This research paper examines the statistical relationship between clay to day performance and effi­ ciency measures and financial performance in the motor carrier industry. Key findings are that carriers with more miles per tractor per year, a larger average length of haul, more revenue per mile, and more revenue per tractor per week tend to perform better financially as measured in three separate models by operating ratio, return on assets, or return on equity. Unexpectedly, for the eight publicly traded carriers included in the analysis, there was a negative relationship between empty mile percentage and financial performance, indicating that carriers …


Analytical Techniques And The Air Force Logistics Readiness Officer, Bryan D. Main, William A. Cunningham Iii, Daniel D. Mattioda, Joseph B. Skipper Oct 2010

Analytical Techniques And The Air Force Logistics Readiness Officer, Bryan D. Main, William A. Cunningham Iii, Daniel D. Mattioda, Joseph B. Skipper

Journal of Transportation Management

The accelerated globalization of logistics activities over the last several decades has spurred a rapid expansion of port facilities all cross the world. However, the recent slowdown of international trade, coupled with a global financial crisis, has created an on-going glut of international port facilities throughout the world. Although the abundance of port facilities provides more transshipment options for carriers and shippers, it makes the port selection decision more complex and difficult. To cope with this new set of challenges, this paper proposes a hybrid data envelopment analysis (DEA)/ analytic hierarchy process (AHP) model that is designed to identify factors …


Using Artificial Neural Networks For Transport Decisions: Managerial Guidelines, Robert L. Cook, Lawrence O. Jenicke, Brian Gibson Oct 2010

Using Artificial Neural Networks For Transport Decisions: Managerial Guidelines, Robert L. Cook, Lawrence O. Jenicke, Brian Gibson

Journal of Transportation Management

One information technology that may be considered by transportation managers, and which is included in the portfolio of technologies that encompass TMS. is artificial neural networks (ANNs). These artificially intelligent computer decision support software provide solutions by finding and recognizing complex patterns in data. ANNs have been used successfully by transportation managers to forecast transportation demand, estimate future transport costs, schedule vehicles and shipments, route vehicles and classify earners for selection. Artificial neural networks excel in transportation decision environments that are dynamic, complex and unstructured. This article introduces ANNs to transport managers by describing ANN technological capabilities, reporting the current …


Trip Patterns In Akure, Nigeria: A Land-Use Analytical Approach, A.O. Owolabi Oct 2010

Trip Patterns In Akure, Nigeria: A Land-Use Analytical Approach, A.O. Owolabi

Journal of Transportation Management

For transportation planners, the use of Origin-Destination (OD) matrix adjustment, is receiving considerable attention. However, there are concerns about the validity of results, primarily related to the number and location of traffic count posts. This leads to the question “What would be the best set of traffic count posts to use in OD matrix adjustment modules?” It has been proved that solving this problem is cumbersome. There have been several attempts (either exact or heuristic approaches) to address this problem. But due to the inherent complexities, there is no efficient and easy-to-use methodology able to address situations on the scale …


Conceptualizing Terrorist Violence And Suicide Bombing, Murad Ismayilov Oct 2010

Conceptualizing Terrorist Violence And Suicide Bombing, Murad Ismayilov

Journal of Strategic Security

This article presents an analysis of different approaches to terrorist violence, with a particular focus on suicide terrorism, using the above mentioned levels of analysis as a conceptual framework to organize this study. In doing so, the article focuses primarily on four selected studies: Khashan's theory of collective Palestinian frustration operating at individual and structural levels; Pape's strategic theory of suicide terrorism, Devji's notion of global jihad, and Hammes' conceptualization of suicide terrorism as one of the strategies of Fourth Generation Warfare, all studied at a strategic level. Drawing on these analyses, as well as on Tilly, this article attempts …


Political Terrorism: An Historical Case Study Of The Italian Red Brigades, Major Victor H. Sundquist Oct 2010

Political Terrorism: An Historical Case Study Of The Italian Red Brigades, Major Victor H. Sundquist

Journal of Strategic Security

As the world's governments become increasingly engulfed in economic and political strife, international leaders should step back and understand what historical realities enabled political extremism to surface in particular regions of the world. More important, these leaders need to recognize what past governments did to counter these movements. Global communities are currently witnessing a dynamic trend of populous uprisings that in some cases, like Greece and the United States, have the potential to severely disrupt the activities of local governments. Consequently, it behooves leaders to reflect upon historical precedence in order to avoid repeating the same mistakes of our forefathers. …


Cover & Front Matter Oct 2010

Cover & Front Matter

Journal of Strategic Security

No abstract provided.


Book Reviews, Edward M. Roche, John Coale, Keely M. Fahoum, Leland Erickson, Mark J. Roberts, Millard E. Moon, Ed.D., Colonel (Ret.) Oct 2010

Book Reviews, Edward M. Roche, John Coale, Keely M. Fahoum, Leland Erickson, Mark J. Roberts, Millard E. Moon, Ed.D., Colonel (Ret.)

Journal of Strategic Security

No abstract provided.


Understanding The Appeal Of The Taliban In Pakistan, Syed Manzar Abbas Zaidi Oct 2010

Understanding The Appeal Of The Taliban In Pakistan, Syed Manzar Abbas Zaidi

Journal of Strategic Security

This article briefly explores the economics of the "Talibanization" of Pakistan within descriptive and contextual paradigms, while attempting to find a best solution to counter rising militancy in the context of realities facing the population on the ground. One such solution is the National Pakistani Counter Terrorism and Extremism Strategy (NACTES), designed to curb Taliban financing in Pakistan. The strategy is being drafted by National Counter Terrorism Authority (NACTA), the nascent homeland security coordination body set up by the state as the primary public organ entrusted with counterterrorism, counter-extremism, and de-radicalization efforts of the state.


Social Cohesion And Islamic Radicalization: Implications From The Uighur Insurgency, Tong Zhao Oct 2010

Social Cohesion And Islamic Radicalization: Implications From The Uighur Insurgency, Tong Zhao

Journal of Strategic Security

This article starts with a critical review of the current literature on the Islamic radicalization and Uighur insurgency in Xinjiang, pointing out that existing literature focuses too narrowly on certain aspects of the Uighur insurgency, and is insufficient to explain the causal mechanism of the insurgency and Islamic radicalization. Built upon historical evidence, this article uses sociological analysis to explore the structural changes in the Uighur community over the past decades, and demonstrates the importance and effectiveness of social cohesion theory in identifying the key causal variables which underlie and determine the course of Uighur insurgency and Islamic radicalization. The …


Eriksonian Identity Theory In Counterterrorism, Cally O'Brien Oct 2010

Eriksonian Identity Theory In Counterterrorism, Cally O'Brien

Journal of Strategic Security

Certain terrorists come from unexpected backgrounds. They give up comfortable lives and opportunities in order to wage jihad. Their existence has puzzled various theorists since they came to light. This article will explain how a theory of psychosocial identity formation created by Erik Erikson and his student James Marcia may explain this phenomenon. It will also explain how Erikson's theoretical legacy has contributed to current attempts at increasing moderation in the Middle East through education. Many of those attempts reflect ideas that are drawn from Eriksonian theory, although they are not typically described in Eriksonian terms. Meanwhile, while some theorists …


Dirty Laundry: A Philosophical Primer For Politicians On Scandal, Ibpp Editor Aug 2010

Dirty Laundry: A Philosophical Primer For Politicians On Scandal, Ibpp Editor

International Bulletin of Political Psychology

This article discusses the management of post-sex scandals by politicians from a variety of theoretical and/or philosophical perspectives.


Cover & Front Matter Jul 2010

Cover & Front Matter

Journal of Strategic Security

No abstract provided.


Basic Education And Education For All In Nigeria: The Role Of Multinational Corporations, Mary Plangnan Haggai Jun 2010

Basic Education And Education For All In Nigeria: The Role Of Multinational Corporations, Mary Plangnan Haggai

Journal of Global Initiatives: Policy, Pedagogy, Perspective

In spite of the concerted efforts made by the Nigerian government at funding the Universal Basic Education (UBE) in the country, 11 million children of school age are still out of school. To augment the funding, the paper proposes the involvement of multinational corporations. Participation in UBE is seen as a tangible Corporate Social Responsibility (CSR) project that will have direct impact on the host communities in such a way that will eliminate the hostilities of the host communities towards multinational corporations.


Ballistic Missile Defense: New Plans, Old Challenges, Elizabeth Zolotukhina May 2010

Ballistic Missile Defense: New Plans, Old Challenges, Elizabeth Zolotukhina

Journal of Strategic Security

On September 17, 2009—the 70th anniversary of the Soviet invasion of Poland in 1939 that marked the beginning of World War II—the Obama Administration announced its intention to shelve plans for the U.S. Ballistic Missile Defense (BMD) that had been developed under former President George W. Bush. Pointing to a new intelligence assessment, President Obama argued that his predecessor's plan to deploy an X-band radar station outside of Prague, Czech Republic, and 10 two-stage interceptor missiles in Poland would not adequately protect America and its European allies from the Iranian threat and reiterated his opposition to utilizing unproven technology in …


The Multiple Faces Of Effective Grand Strategy, Bryan N. Groves May 2010

The Multiple Faces Of Effective Grand Strategy, Bryan N. Groves

Journal of Strategic Security

Effective national leaders throughout history have deliberately developed grand strategies and successfully implemented them to attain their political goals, while also integrating and accomplishing economic, social, defense, and sometimes religious objectives. Not all leaders have been successful, however, as this process is immensely complex and can be adversely affected by the actions of other leaders around their region and the world. It bears examination, then, to determine what factors contribute to successful grand strategies and why many leaders fail to reach their stated ends. This article utilizes a historic case study approach and explores three key areas of grand strategy: …


Indian Involvement In Afghanistan In The Context Of The South Asian Security System, Melanie Hanif May 2010

Indian Involvement In Afghanistan In The Context Of The South Asian Security System, Melanie Hanif

Journal of Strategic Security

This article focuses on the regional requirements for a pacification of Afghanistan. For this purpose, Afghanistan is analytically "reframed" as part of South Asia. The hypothesis is that India is the only regional actor that might possess both the incentives and the capabilities to deal with the negative security externalities emanating from Afghanistan.In South Asia, material characteristics such as the delineation of the region and its power polarity are unclear. India's role within the region is even more controversial. By examining India's role within its security environment, this paper will suggest how this lack of clarity could be remedied. In …


The Weakest Link: The Risks Associated With Social Networking Websites, Yosef Lehrman May 2010

The Weakest Link: The Risks Associated With Social Networking Websites, Yosef Lehrman

Journal of Strategic Security

The relatively rapid rise in popularity of social networking services is now well known. MySpace, Twitter, and Facebook have become well known sites and terms. According to the Web traffic tracking site Alexa.com, as of December 2009, Facebook had 350 million registered users, MySpace just under 475 million, and Twitter 44.5 million. Many people think very little of posting prodigious amounts of personal information on social networking sites, not realizing that this information puts them at risk. Specifically, those in the law enforcement and military communities may not realize that information posted on these sites can compromise operational security and …


Small To Mid-Size Sporting Events: Are We Prepared To Recover From An Attack?, Brian M. Harrell, Konrad Crockford, Pierre Boisrond, Sarah Tharp-Hernandez, Suzanne Parker May 2010

Small To Mid-Size Sporting Events: Are We Prepared To Recover From An Attack?, Brian M. Harrell, Konrad Crockford, Pierre Boisrond, Sarah Tharp-Hernandez, Suzanne Parker

Journal of Strategic Security

This article describes a fictional deadly attack by a lone-wolf terrorist during a high school football event in a small town, here in the United States. The authors begin by describing an attack and then focus on the response from the medical community, city, county, state, and federal government officials. Next, the authors make several recommendations on what actions are needed to develop an effective plan to combat terrorist activities during a small- to mid-size sports event. Among the actions needed, the authors focus on the following: response planning, emergency action plan, incident command, policies and procedures, and security staff …


Book Reviews, Edward J. Hagerty, Daniel Masters, Mark J. Roberts, Leland Ericson May 2010

Book Reviews, Edward J. Hagerty, Daniel Masters, Mark J. Roberts, Leland Ericson

Journal of Strategic Security

No abstract provided.


U.S. Response To Terrorism: A Strategic Analysis Of The Afghanistan Campaign, Valentina Taddeo May 2010

U.S. Response To Terrorism: A Strategic Analysis Of The Afghanistan Campaign, Valentina Taddeo

Journal of Strategic Security

This article examines the U.S. response to global terrorism and its campaign in Afghanistan from 2001 to today. The aim of this article is first to understand the fallacies, missteps, and misunderstandings of the U.S. approach in Afghanistan. Second, the analysis evaluates the lessons learnt and some possible strategies for achieving long-term stability and security in Afghanistan. In particular, the analysis focuses on the different strategies adopted by the United States and their achievements. Despite a first victory over the Taliban regime, the initial approach was focused on the enemy only and it lacked long-term planning, paving the way to …


North Korea And Support To Terrorism: An Evolving History, Bruce E. Bechtol, Jr. May 2010

North Korea And Support To Terrorism: An Evolving History, Bruce E. Bechtol, Jr.

Journal of Strategic Security

The DPRK's (Democratic People's Republic of Korea or North Korea) support for terrorism began as an ideologically-based policy financed by the Soviet Union that eventually led to a policy designed to put money into the coffers of the elite in Pyongyang—in short, a "proliferation for hire" policy. This article articulates a brief history of the North Korean regime, the rise to power of Kim Il-sung and his son, Kim Jong-il, and North Korea's persistent support to terrorist groups around the globe.


Developing Reverse Logistics Programs: A Resource Based View, Stephen E. Genchev, Timothy D. Landry, Patrica J. Daugherty, Anthony S. Roath Apr 2010

Developing Reverse Logistics Programs: A Resource Based View, Stephen E. Genchev, Timothy D. Landry, Patrica J. Daugherty, Anthony S. Roath

Journal of Transportation Management

Previous research proposes a six-process model for reverse logistics (RL) program design and execution. This manuscript advances RL related knowledge by incorporating the previous model into a broader theoretical framework, namely, the Resource Based View (RBV) of the firm. The current research employs exploratory techniques to investigate the applicability of RBV and its main tenants within the RL context. Based on in-depth interviews with 16 executives from seven different companies, the relationships among resources. RL capabilities, and RL competencies are explored.


Forward Positioning And Consolidation Of Strategic Inventories, Joseph B. Skipper, John E. Bell, William A. Cunningham Iii, Daniel D. Mattioda Apr 2010

Forward Positioning And Consolidation Of Strategic Inventories, Joseph B. Skipper, John E. Bell, William A. Cunningham Iii, Daniel D. Mattioda

Journal of Transportation Management

The forward positioning of strategic inventory in the supply chain has an impact on transportation times and is important for sensitive demand profiles. Consolidation of stocks creates pooling effects and minimizes costs. This study analyzes a current military case where forward consolidation of equipment is considered using optimization, and payback periods are calculated for the cost of consolidating inventory at one of six locations. Results indicate that forward positioning and consolidation reduces time and cost, and also creates savings in reverse logistics flows. The study has implications for geographically diverse supply chains such as humanitarian aid and emergency response operations.


A Study Of Logistics Strategies In Small Versus Large U.S. Manufacturing Firms, John E. Spillan, Jonathan W. Kohn, Michael A. Mcginnis Apr 2010

A Study Of Logistics Strategies In Small Versus Large U.S. Manufacturing Firms, John E. Spillan, Jonathan W. Kohn, Michael A. Mcginnis

Journal of Transportation Management

The research reported in this manuscript empirically compares the similarities and differences of logistics strategies for small and large manufacturing firms. The hypotheses focus on whether there are significant differences between logistics strategies of small and large manufacturing firms and whether logistics strategy outcomes differ. The findings indicate that there are many similarities but differences do exist. The results identify dimensions of logistics strategy and assess their impact on logistics coordination effectiveness, customer service commitment, and company/division competitive responsiveness.


Adapting Baumol’S Inventory Theoretic To Landed Cost Decisions, Stephan P. Brady, Peter F. Swan, Richard R. Young Apr 2010

Adapting Baumol’S Inventory Theoretic To Landed Cost Decisions, Stephan P. Brady, Peter F. Swan, Richard R. Young

Journal of Transportation Management

Major U.S. corporations have been importers for over 200 years. A significant impetus for “offshoring” has been reducing costs—usually labor costs. Often, other costs were overlooked. There has been a growing disenchantment with sourcing goods overseas, especially when there may be domestic alternatives as other costs begin to dominate. Baumol and Vinod’s Inventory Theoretic model was useful in adding transportation considerations. However, Baumol leaves out several important costs that unless considered in offshoring decisions can lead to suboptimal solutions. This paper extends that model, providing a prescriptive model that could be operationalized by firms to evaluate offshore sourcing decisions.


Fuel Costs And Supply Chain Decisions, Cliff Welborn Apr 2010

Fuel Costs And Supply Chain Decisions, Cliff Welborn

Journal of Transportation Management

The affect of rising fuel costs on the individual consumer is well documented in current media. Consumers are paying more for their basic necessities. Fuel surcharge, transportation cost, and logistics have become house hold words. The rising cost of crude oil creates an increase in fuel cost, and this creates an increase in the cost to transport products from one location to another. Managers, who are responsible for acquiring products and delivering them to customers, are also feeling the impact of higher fuel prices. This article will outline three significant areas where fuel prices are affecting U.S. supply chain decisions. …


Geographic Trajectories Of Al-Qaida And Taliban Terrorist Groups In Pakistan, Syed Manzar Abbas Zaidi Mar 2010

Geographic Trajectories Of Al-Qaida And Taliban Terrorist Groups In Pakistan, Syed Manzar Abbas Zaidi

Journal of Strategic Security

Though Western analysts tend to mention al-Qaida and Taliban in Pakistan in the same context, the dynamics of their relationship are far more complex than a cursory examination would reveal. The context of this relationship is best understood within the overarching paradigm of militant activities of post 9/11 Taliban and al-Qaida remnants in Pakistan's tribal areas, where these groups flourish. The military struggle in Afghanistan has significantly influenced the formation of a loosely structured alQaida/Taliban "nexus" that was forged in Pakistan's Federally Administered Tribal Areas (FATA), particularly Waziristan. In order to survive the ongoing North Atlantic Treaty Organization (NATO) military …


Strategic Asymmetric Deception And Its Role In The Current Threat Environment, Seth A. Gulsby Mar 2010

Strategic Asymmetric Deception And Its Role In The Current Threat Environment, Seth A. Gulsby

Journal of Strategic Security

President Bill Clinton's Secretary of Defense, William Cohen, once stated that the post-Cold War world of the 1990s was a "paradox [where] American military superiority actually increase[d] the threat of... attack against [the U.S.] by creating incentives for adversaries to challenge us asymmetrically." He was alluding to the fact that the Cold War's closure was supposed to bring about a situation that encouraged peace, nation-building, and unilateral comfort for the United States. The reality that America has come to know is quite different, and some might even argue that, given the option, many people would return to a security situation …