Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 66

Full-Text Articles in Business

Ict Usage In Microfinance Institutions In Uganda, Joseph Kaumba Ssewanyana Dec 2009

Ict Usage In Microfinance Institutions In Uganda, Joseph Kaumba Ssewanyana

The African Journal of Information Systems

Microfinance institutions (MFIs) are always often faced with high operating costs to provide financial services to the poor people and Small and Medium Enterprises. Information and Communication Technologies (ICTs) has been found to promote the dual objective of microfinance - sustainability and outreach to the poor people. Using a quantitative survey and descriptive research approach, this paper has established the extent to which ICT has been used in the microfinance institutions in Uganda. Despite the barriers, ICT usage in MFIs has been on the rise; and different applications and technologies have been adopted by some MFIs to control costs, create …


Reviving The United States' Commitment To Pakistan And Afghanistan, Steve A. Young, Imdad Hussain Sahito Nov 2009

Reviving The United States' Commitment To Pakistan And Afghanistan, Steve A. Young, Imdad Hussain Sahito

Journal of Strategic Security

As President Obama is in the midst of deciding whether additional U.S.combat forces are needed in Afghanistan in addition to the 21,000 troops recently committed, he must realize that additional armed forces are only a stopgap measure in Afghanistan's downward spiral into an 'undergoverned' failed state. Similarly, as Pakistan's fragile and fractured civilian government continues to appease the Tehrik-i-Taliban Pakistan (TTP), an umbrella organization of Pakistani Pashtun tribesmen with Taliban cultural values led by Baitullah Mehsud and others, it comes closer to the concept of a "misgoverned" failed state, possessing a small arsenal of nuclear arms. The problem for the …


The Tangled Web Of Taliban And Associated Movements, Greg Smith Nov 2009

The Tangled Web Of Taliban And Associated Movements, Greg Smith

Journal of Strategic Security

Following the devastating terrorist attacks of September 11, 2001,worldwide attention became focused on the Taliban and al-Qaida forcesin Afghanistan. Prior to the attacks, many people had never heard of the Taliban or their shar'ia-law style of government. Since 2001, manysplinter groups have formed in response to the continual United Statespresence in the region. Today, the term Taliban has been used to envelop several groups such as the Tehrik-i-Taliban Pakistan (TTP), the Haqqani Network (HQN) and the Tehrik-eNifaz-e-Shariat-e-Mohammadi(TNSM). These groups make up the majority of fighters along the Afghanistan-Pakistan border. Many of these groups have been historicrivals for control of the …


Extinguishing The Torch Of Terror: The Threat Of Terrorism And The 2010 Olympics, Serge E. Vidalis Nov 2009

Extinguishing The Torch Of Terror: The Threat Of Terrorism And The 2010 Olympics, Serge E. Vidalis

Journal of Strategic Security

With the change in seasons comes the expected change of insurgency operations in Afghanistan as Taliban and al-Qaida fighters mount their spring and summer offensives against both NATO forces and Afghanis sympathetic to foreign troops. As insurgents curtail their seasonal operations with the arrival of fall and winter, is it likely that a threat may arise from Afghanistan to affect the 2010 Olympics in Vancouver, British Columbia? As will be illustrated herein, the threat to the games will not be borne directly from the insurgency in Afghanistan but rather by the universal jihadist ideology of al-Qaida rather than the nationalist …


Revisiting Downs' Issue-Attention Cycle: International Terrorism And U.S. Public Opinion, Karen K. Petersen Nov 2009

Revisiting Downs' Issue-Attention Cycle: International Terrorism And U.S. Public Opinion, Karen K. Petersen

Journal of Strategic Security

Lamenting the lack of public awareness of international events and U.S. foreign policy is not a particularly novel exercise; yet, explaining the process by which issues enter and exit the public realm remains a challenging endeavor. Despite contributions from researchers working in international relations and mass communication, explaining public inattentiveness continues to vex scholars. However, in his article, "Up and Down with Ecology: The 'Issue-Attention Cycle,'" Anthony Downs provides a parsimonious and tractable model of public opinion that can be applied to foreign policy issues.1 While Downs concerns himself exclusively with domestic issues, particularly environmental issues, his model has thepotential …


Book Reviews, Christine E. Williamson, Ed Urie, Michael Savasta, Robin L. Thompson, D.M., Edward M. Roche Nov 2009

Book Reviews, Christine E. Williamson, Ed Urie, Michael Savasta, Robin L. Thompson, D.M., Edward M. Roche

Journal of Strategic Security

Critical Thinking and Intelligence Analysis. By David T.Moore.

At The Center Of The Storm: The CIA During America's Time of Crisis. By George Tenet with Bill Harlow.

Female Suicide Bombers. By Rosemarie Skaine.

Information Operations: Doctrine and Practice. By Christopher Paul.

The Secret Sentry: The Untold History of the National Security Agency. By Matthew M. Aid.

The Blood of Lambs: A Former Terrorist's Memoir of Death and Redemption. By Kamal Saleem with Lynn Vincent.

Attaché Extraordinaire: Vernon A. Walters in Brazil. By Frank Márcio De Oliveira.


Guerilla Warfare & Law Enforcement: Combating The 21st Century Terrorist Cell Within The U.S., Richard J. Hughbank Nov 2009

Guerilla Warfare & Law Enforcement: Combating The 21st Century Terrorist Cell Within The U.S., Richard J. Hughbank

Journal of Strategic Security

Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by …


Islamist Distortions: Hizb Ut- Tahrir A Breeding Ground For Al- Qaida Recruitment, Krishna Mungur Nov 2009

Islamist Distortions: Hizb Ut- Tahrir A Breeding Ground For Al- Qaida Recruitment, Krishna Mungur

Journal of Strategic Security

In 1953, a radical splinter organization from the Muslim Brotherhood,Hizb ut-Tahrir (HuT), was founded by the Al-Azhar University (Cairo,Egypt) educated jurist Sheikh Taqiuddin an-Nabhani who criticized theMuslim Brotherhood for collaborating with Egyptian secularists, such as Gamal Abdel Nasser. A sizable portion of the more radical members of the Muslim Brotherhood broke away, to join Nabhani's budding movement. Today, HuT is known to operate in more than forty countries, calling for the restoration of the Islamic Caliphate, with a history of violence and links to violent terrorist organizations. Given increasing tensions in the region over the presence of coalition troops, Predator …


Cover & Front Matter Nov 2009

Cover & Front Matter

Journal of Strategic Security

No abstract provided.


Private Warehouse Investment Strategies In Small Versus Large Manufacturing Firms, John E. Spillan, Michael A. Mcginnis, Jonathan W. Kohn Oct 2009

Private Warehouse Investment Strategies In Small Versus Large Manufacturing Firms, John E. Spillan, Michael A. Mcginnis, Jonathan W. Kohn

Journal of Transportation Management

The research reported in this manuscript empirically compares the private warehouse investment strategies of small and large manufacturing firms. Mail surveys were administered to independent samples of small and large United States manufacturing firms. This research is based on a series of identically worded questions administered to both samples. Data was factor analyzed and cluster analyzed to identify three private warehouse investment strategies for small and large firms and two strategies for large firms. Analyses of three independent variables further evaluated differences in private warehouse investment strategies. Finally, the warehouse mix of small and of large firms was compared. This …


Roles And Capabilities Of The Retail Supply Chain Organization, C. Clifford Defee, Wesley S. Randall, Brian J. Gibson Oct 2009

Roles And Capabilities Of The Retail Supply Chain Organization, C. Clifford Defee, Wesley S. Randall, Brian J. Gibson

Journal of Transportation Management

Supply chain management (SCM) has become a critical strategic function in recent years. Research in the discipline has been focused toward the upstream side of the supply chain on functions such as warehousing, transportation, procurement and production. As power has shifted downstream toward retailers and their customers, SCM research has been slow to respond. This represents a significant gap, and a significant opportunity. Retailers face challenges that differ from those found in upstream suppliers and manufacturers. We present findings from a study of senior supply chain executives in the retail industry that focuses on the supply chain challenges of greatest …


Avoiding Shipper/Consignee Double Payment Liability, Roger F. Huff Oct 2009

Avoiding Shipper/Consignee Double Payment Liability, Roger F. Huff

Journal of Transportation Management

The purpose of this article is neither to engage in an overly technical legal analysis nor to disparage motor carriers who bring “double liability” claims against financially viable shippers/consignees; after all the trucking company has performed a valuable service and is simply trying to be paid “once” for that service - even though the financially viable shipper or consignee may have to pay twice with the bankrupt/insolvent third party absconding. The purpose of this article is generally to provide some “front-end” practical suggestions to shippers/ consignees in how to avoid being in court on one of these claims in the …


The Impact Of Hours-Of-Service Regulations On Transportation Productivity And Safety: A Summary Of Findings From The Literature, Hokey Min Oct 2009

The Impact Of Hours-Of-Service Regulations On Transportation Productivity And Safety: A Summary Of Findings From The Literature, Hokey Min

Journal of Transportation Management

Since driver fatigue has known to be the primary cause of serious truck crashes, the Federal Motor Carrier Safety Administration (FMCSA) has attempted to implement new hours-of-service (HOS) regulations that aimed to promote safer driving environments. The new HOS regulations effective on October T‘ of2005, however, may lead to substantial cost increases for the trucking industry which will in turn hurt shippers and ultimately customers. For instance, motor carriers may need to hire additional drivers to comply with new HOS regulations requiring that drivers be placed out of service until they accumulated enough off-duty time. In particular, off-duty breaks required …


A Longitudial Study Of Private Warehouse Investment Strategies, Jonathan W. Kohn, Michael A. Mcginnis, John E. Spillan Oct 2009

A Longitudial Study Of Private Warehouse Investment Strategies, Jonathan W. Kohn, Michael A. Mcginnis, John E. Spillan

Journal of Transportation Management

This article revisits private warehouse investment decision making, a topic previously examined in 1989 by McGinnis, Kohn, and Myers (1990). Since then there has been a substantial amount of discussion regarding the scope and nature of logistics /supply chain management. In particular the roles of private, contract, and public warehousing has been discussed, increased emphasis on financial performance and strategic decision making may have altered the criteria for investment decisions in private warehousing, increased coordination of supply chains may have altered the relative importance of private, contract, and private warehousing, and increasing emphasis on controlling inventory investment may have shifted …


A Triadic View Of Truck Driver Satisfaction, Stephen A. Lemay, Zachary Williams, Michael Carver Oct 2009

A Triadic View Of Truck Driver Satisfaction, Stephen A. Lemay, Zachary Williams, Michael Carver

Journal of Transportation Management

In this research, the authors surveyed three groups concerning job satisfaction: experienced drivers, new drivers, and managers. Statistical tests were conducted using a sample of 196 new drivers, 145 experienced drivers, and 59 managers from a large TL firm based in the U.S. The results suggest that many discrepancies exist on driver satisfaction among the three perspectives. In particular, new drivers provide managers with opportunities and challenges for satisfaction. Given the current state of the trucking industry, managers will likely benefit from approaching this segment of drivers differently to meet their expectations and keep them from leaving their firms.


Countering The Somali Pirates: Harmonizing The International Response, Richard Weitz Sep 2009

Countering The Somali Pirates: Harmonizing The International Response, Richard Weitz

Journal of Strategic Security

The growing threat to international shipping in the Gulf of Aden and neighboring regions from pirates operating off the shores of lawless Somalia has engendered an unparalleled global response. Over the past year, numerous international security organizations as well as national governments have organized many separate multilateral and single-country maritime security operations in the Horn of Africa region. Despite the unprecedented extent of this effort, this mishmash of ad hoc multinational and national initiatives has had only a limited effect. These various contingents typically have conflicting mandates and rules of engagement. They have also become fixated on responding to immediate …


Start: Overcoming Remaining Challenges, Elizabeth Zolotukhina Sep 2009

Start: Overcoming Remaining Challenges, Elizabeth Zolotukhina

Journal of Strategic Security

During the administrations of Presidents George W. Bush and VladimirPutin, the governments of Russia and the United States could not agreeon how to codify their balance of strategic offensive nuclear forces after the existing Strategic Arms Reductions Treaty (START) expired onDecember 5, 2009.1 The United States and Russia are currently engagedin negotiations to replace START with a new treaty before the end of this year.


Keeping Our Campuses And Communities Safe, Ronald Goodman Sep 2009

Keeping Our Campuses And Communities Safe, Ronald Goodman

Journal of Strategic Security

Since the events of September 11, 2001, the U.S. population has a heightened awareness that tragedies can and do strike ordinary people without warning. The same can be said for the unfortunate abundance of campus shootings, where the next "9/11" occurred in 2007 on the campus of Virginia Tech. And yet, subsequent investigations into these horrific events often reveal that clues existed that might have pointed to the eventual violent outcome. It is unquestionable that to dramatically improve the safety and security of our cities we must rely upon the millions of eyes of our fellow citizens to unearth these …


Book Reviews, J. Kelly Stewart, Mark J. Roberts, Jeffery Ahn, Lloyd H. Hoffman, Donald J. Goldstein Sep 2009

Book Reviews, J. Kelly Stewart, Mark J. Roberts, Jeffery Ahn, Lloyd H. Hoffman, Donald J. Goldstein

Journal of Strategic Security

The Accidental Guerilla: Fighting Small Wars in the Midst of a Big One. By David Kilcullen.

Aviation and Airport Security: Terrorism and Safety Concerns. By Kathleen M. Sweet.

Executive Measures, Terrorism and National Security: Have the Rules of the Game Changed? By David Bonner.

Spycraft: The Secret History of the CIA's Spy techs from Communism to Al-Qaeda. By Robert Wallace and H. Keith Melton, with Henry Robert Schlesinger.

Troublesome Young Men: The Rebels who brought Churchill to Power and Saved England. By Lynne Olson.


What Price Security?, Donald C. Masters Sep 2009

What Price Security?, Donald C. Masters

Journal of Strategic Security

This article presents a critique of the Copenhagen Consensus Center's(CCC) exhaustive study on transnational terrorism, published in 2008.The implications of this study are controversial, yet highly relevant in today's economic environment. The Obama administration must come toterms with fiscal realities that will challenge budget priorities and invigorate what will undoubtedly prove to be tough negotiations on Capitol Hill for homeland security dollars. It is proposed here that standard economic tools such as benefit cost analysis, cost effectiveness criteria, and simulation models can help identify areas where security can be either extended or improved using fewer resources. Greater movement towards competitive …


The Tipping Point: Biological Terrorism, Scott Cary Sep 2009

The Tipping Point: Biological Terrorism, Scott Cary

Journal of Strategic Security

This article presents a strategic, operational, and tactical analysis of information currently available on the state of bio-weapons development by non-state actors, primarily Islamist jihadists. It discusses the evidence supporting a practical assessment that non-state actors have begun to acquire, and in the near-term intend to employ, bio-weapons. A pathogen and method of attack specifically designed to achieve the strategic goals of jihadists are presented as functional examples of the problem of the emerging global bio-weapons threat.Is a terrorist attack utilizing biological weapons a real threat? If so, is there a way to predict the circumstances under which it might …


Decision Support For Countering Terrorist Threats Against Transportation Networks, Richard Adler, Jeff Fuller Sep 2009

Decision Support For Countering Terrorist Threats Against Transportation Networks, Richard Adler, Jeff Fuller

Journal of Strategic Security

This article presents a dynamic decision support methodology forcounter-terrorism decision support. The initial sections introduce basic objectives and challenges of terrorism risk analysis and risk management. The remainder of the paper describes TRANSEC, a decision support framework for defining, validating, and monitoring strategies focused on managing terrorism risks to international transportation networks. The methodology and software tools underlying TRANSEC are applicable to other homeland security problems, such as critical infrastructure and border protection.


Cover & Front Matter Sep 2009

Cover & Front Matter

Journal of Strategic Security

No abstract provided.


Fragility: The Next Wave In Critical Infrastructure Protection, Allan Mcdougall May 2009

Fragility: The Next Wave In Critical Infrastructure Protection, Allan Mcdougall

Journal of Strategic Security

In North America today, we are about to embark on a significant effort to repair, or even upgrade, many aspects of our infrastructure. Many of these efforts are linked to economic recovery packages. Others are based on sheer need. The challenge for decision makers and planners involves ensuring that scarce economic resources are put to their best use. Understanding the concept of fragility plays a pivotal part in reaching that understanding.Fragility, like many other systems—particularly Information Technology (IT ) systems—works on the concept of subjects and objects. Subjects are those entities that seek to exploit the services (or capacity) offered …


The Importance Of Intelligence In Combating A Modern Insurgency, Kevin Reamer May 2009

The Importance Of Intelligence In Combating A Modern Insurgency, Kevin Reamer

Journal of Strategic Security

Throughout history the world has been plagued by insurgencies. While the underlying causes of each new insurgency have been different, they are all similar in certain areas. This similarity entails that the effective countering of an insurgency can be turned into a science with a set of guidelines to follow based on conditions on the ground. Guidelines are important because insurgencies are flexible and to defeat them the counterinsurgency must be equally flexible if not more flexible. Good intelligence is critical to the success of an insurgency. With their small, poorly equipped forces, the leaders of insurgencies need to know …


Book Reviews, Edward J. Hagerty, Ed Urie May 2009

Book Reviews, Edward J. Hagerty, Ed Urie

Journal of Strategic Security

Afghanistan: Transition Under Threat. By Geoffrey Hayes and Mark Sedra, editors.

Enemies of Intelligence: Knowledge & Power in American National Security. By Richard K. Betts.


Film Reviews, Bart Bechtel May 2009

Film Reviews, Bart Bechtel

Journal of Strategic Security

No abstract provided.


Al-Qaeda In The Lands Of The Islamic Maghreb, Gregory A. Smith May 2009

Al-Qaeda In The Lands Of The Islamic Maghreb, Gregory A. Smith

Journal of Strategic Security

This paper is organized into four chapters that focus on the terrorist group Al Qaeda in the Lands of the Islamic Maghreb (AQIM). The four chapters examine different facets of the collective environment that have allowed AQIM to succeed and even thrive at times. The first chapter begins with Algeria’s war of independence with the French. The second chapter focuses on the nomadic Tuareg people. It seeks to show how the Tuaregs were deprived by French occupiers and how European colonization cost the Tuaregs access to vital trade routes used for centuries. The third chapter will very briefly examine Algeria’s …


Cover & Front Matter May 2009

Cover & Front Matter

Journal of Strategic Security

No abstract provided.


Targeted Killing: Self-Defense, Preemption, And The War On Terrorism, Thomas Byron Hunter May 2009

Targeted Killing: Self-Defense, Preemption, And The War On Terrorism, Thomas Byron Hunter

Journal of Strategic Security

This paper assesses the parameters and utility of “targeted killing” in combating terrorism and its role within the norm of state self-defense in the international community. The author’s thesis is that, while targeted killing provides states with a method of combating terrorism, and while it is “effective” on a number of levels, it is inherently limited and not a panacea. The adoption and execution of such a program brings with it, among other potential pitfalls, political repercussions. Targeted killing is defined herein as the premeditated, preemptive, and intentional killing of an individual or individuals known or believed to represent a …