1. Only showing results from link.springer.com

    Clear filter to show all search results

  2. link.springer.com

    The concept of marketing campaign management is understood as managing elements of the marketing mix. As a part of it, management of promotion and its components, including advertising, is distinguished (Rossiter et al. 2018).The concept of advertising management itself was influenced by the dynamic development of management and marketing science, the increase in competition, the importance of ...
    Author:Anna BorawskaPublished:2021
  3. link.springer.com

    Military-led nation building campaigns can face many challenges as advances in certain aspects such as the economy and infrastructure may well be accompanied by setbacks in other areas such as security, making it difficult to judge overall progress. In this context, campaign assessments provide vital decision support for adapting strategy and deploying resources to best effect. The value of ...
    Author:Mathew Zuparic, Mark Jobst, Iain MacleodPublished:2017
  4. link.springer.com

    The strategic air offensive is arguably the most controversial type of air campaign. The ability to strike directly at the enemy's vital centres has been recognized since the advent of flying machines as a unique capability of air power; it has also been for many — and for some still is — the raison d'être of independent air forces. Indeed, the belief that strategic bombing could ...
    Author:Andrew G. B. VallancePublished:1996
  5. link.springer.com

    Research on negative campaigning has grown rapidly in the past decades. This article reviews the literature dealing with this campaign strategy. It discusses its definition and measurement and stresses the mismatch between the academic literature and general perceptions. It then reviews why parties and candidates choose to 'go negative' with a particular focus on the rationales for ...
    Author:Martin HaselmayerPublished:2019
  6. link.springer.com

    Sep 14, 2023In network defence, intrusion detection is crucial to identify malicious activities such as attacks, intrusions, and malware. Intrusion Detection Systems (IDSs) are mandatory for protecting critical networks against intrusive activities. Despite advancements in IDS research, a significant challenge is finding comprehensive and valid datasets to evaluate proposed techniques. To address this ...
  7. link.springer.com

    Why do politicians use violence as an electoral tactic, and how does it affect voting behavior? Theories of election-related violence focus on the electoral benefits such violence is said to provide, relying on the assumption that when parties and candidates employ violence, they do so based on an accurate assessment of its relative costs and benefits. Far less attention has been paid to the ...
  8. link.springer.com

    tional structure and processes used for producing assessment documents, even if it is difficult to understand the linkages between such changes and output quality. Using 2 years' worth of Australian Defence Force quarterly campaign assessments, we study the effect of adoption of a new analysis framework in their production. Using the
  9. link.springer.com

    Aken et al. [] consider two datasets to evaluate their proposed algorithm: one of the datasets they pick from Kaggle's second challenge on toxic comment classification which contains comments on Wikipedia talk pages presented by Google Jigsaw and other datasets they consider are based on Twitter by Davidson et al. [].Class distribution of both datasets is shown in Tables 2 and 3. 24,783 ...
  10. link.springer.com

    The majority of the studies mentioned above focus on whether speech is offensive or not. It is easier to club/arrange a list of offensive words and classify the rest as non-offensive as shown in Table 3. The only exception in the above experiments is which measures the severity of the offense a statement will invoke. The degree of offense is ...
  11. link.springer.com

    Feb 15, 2024As Artificial Intelligence (AI) rapidly advances and integrates into various domains, cybersecurity emerges as a critical field grappling with both the benefits and pitfalls of AI technologies. This paper explores the multifaceted dimensions of AI-driven cyberattacks, offering insights into their implications, mitigation strategies, underlying motivations, and profound societal impacts. The ...
  12. Can’t find what you’re looking for?

    Help us improve DuckDuckGo searches with your feedback

Custom date rangeX