Three Threats

Three Threats

Author: Theodore Moran

Publisher: Columbia University Press

Published: 2009-05-15

Total Pages: 81

ISBN-13: 0881325201

DOWNLOAD EBOOK

Under what conditions might a foreign acquisition of a US company constitute a genuine national security threat to the United States? What kinds of risks and threats should analysts and strategists on the Committee on Foreign Investment in the United States (CFIUS), as well as their congressional overseers, be prepared to identify and deal with? This study looks at three types of foreign acquisitions of US companies that may pose a legitimate national security threat. The first is a proposed acquisition that would make the United States dependent on a foreign-controlled supplier of goods or services that are crucial to the functioning of the US economy and that this supplier might delay, deny, or place conditions on the provision of those goods or services. The second is a proposed acquisition that would allow the transfer to a foreign-controlled entity of technology or other expertise that might be deployed in a manner harmful to US national interests. The third potential threat is a proposed acquisition that would provide the capability to infiltrate, conduct surveillance on, or sabotage the provision of goods or services that are crucial to the functioning of the US economy. This study analyzes these threats in detail and considers what criteria are needed for a proposed foreign acquisition to be considered threatening. Ultimately, the vast majority of foreign acquisitions pose no credible threat to national security on these grounds.


Three Threats

Three Threats

Author: Theodore H. Moran

Publisher: Peterson Institute

Published: 2009

Total Pages: 81

ISBN-13: 0881324299

DOWNLOAD EBOOK

What kinds of risks and threats should CFIUS (Committee on Foreign Investment in the United States) analysts, strategists, and congressional overseers be prepared to identify and deal with? This book presents an examination of analytical tools that might aid CFIUS deliberations, namely, the Herfindahl-Hirschman concentration index.


The Power of Crisis

The Power of Crisis

Author: Ian Bremmer

Publisher: Simon & Schuster

Published: 2022-05-17

Total Pages: 272

ISBN-13: 9781982167509

DOWNLOAD EBOOK

Renowned political scientist Ian Bremmer draws lessons from global challenges of the past 100 years—including the pandemic—to show how we can respond to three great crises unfolding over the next decade. In this revelatory, unnerving, and ultimately hopeful book, Bremmer details how domestic and international conflicts leave us unprepared for a trio of looming crises—global health emergencies, transformative climate change, and the AI revolution. Today, Americans cannot reach consensus on any significant political issue, and US and Chinese leaders behave as if they’re locked in a new Cold War. We are squandering opportunities to meet the challenges that will soon confront us all. In coming years, humanity will face viruses deadlier and more infectious than Covid. Intensifying climate change will put tens of millions of refugees in flight and require us to reimagine how we live our daily lives. Most dangerous of all, new technologies will reshape the geopolitical order, disrupting our livelihoods and destabilizing our societies faster than we can grasp and address their implications. The good news? Some farsighted political leaders, business decision-makers, and individual citizens are already collaborating to tackle all these crises. The question that should keep us awake is whether they will work well and quickly enough to limit the fallout—and, most importantly, whether we can use these crises to innovate our way toward a better world. Drawing on strategies both time-honored and cutting-edge, from the Marshall Plan to the Green New Deal, The Power of Crisis provides a roadmap for surviving—even thriving in—the 21st century. Bremmer shows governments, corporations, and every concerned citizen how we can use these coming crises to create the worldwide prosperity and opportunity that 20th-century globalism promised but failed to deliver.


Four Threats

Four Threats

Author: Suzanne Mettler

Publisher: St. Martin's Press

Published: 2020-08-11

Total Pages: 304

ISBN-13: 9781250244420

DOWNLOAD EBOOK

An urgent, historically-grounded take on the four major factors that undermine American democracy, and what we can do to address them. While many Americans despair of the current state of U.S. politics, most assume that our system of government and democracy itself are invulnerable to decay. Yet when we examine the past, we find that to the contrary, the United States has undergone repeated crises of democracy, from the earliest days of the republic to the present. In The Four Threats, Robert C. Lieberman and Suzanne Mettler explore five historical episodes when democracy in the United States was under siege: the 1790s, the Civil War, the Gilded Age, the Depression, and Watergate. These episodes risked profound, even fatal, damage to the American democratic experiment, and on occasion antidemocratic forces have prevailed. From this history, four distinct characteristics of democratic disruption emerge. Political polarization, racism and nativism, economic inequality, and excessive executive power – alone or in combination – have threatened the survival of the republic, but it has survived, so far. What is unique, and alarming, about the present moment is that all four conditions are present in American politics today. This formidable convergence marks the contemporary era as an especially grave moment for democracy in the United States. But history provides a valuable repository from which contemporary Americans can draw lessons about how democracy was eventually strengthened — or in some cases weakened — in the past. By revisiting how earlier generations of Americans faced threats to the principles enshrined in the Constitution, we can see the promise and the peril that have led us to the present and chart a path toward repairing our civic fabric and renewing democracy.


Three Threats to Brand Relevance

Three Threats to Brand Relevance

Author: David A. Aaker

Publisher: John Wiley & Sons

Published: 2013-04-03

Total Pages: 38

ISBN-13: 1118658027

DOWNLOAD EBOOK

"Threats to brand relevance are always lurking around the corner. Your brand is virtually never immune from the risk of fading instead of being energized or being damaged instead of strengthened."—David Aaker From branding guru David Aaker comes Three Threats to Brand Relevance, a provocative new offering in the Jossey-Bass Short Format series. In Three Threats Aaker reveals that the key to an organization's sustained growth is to learn what it takes to bring "big" innovation to market and create barriers to competitors. Aaker also shows how well-established companies can avoid becoming irrelevant in the face of the continuing parade of marketing dynamics led by others. Building on his full-length book Brand Relevance, Aaker offers a guide for confronting the three threats if they emerge and shows how to put in place the strategies that will keep the threats at bay. Threat #1: A decline in category or subcategory relevance. Customers simply no longer want to buy what you are making, despite the fact you are offering a quality product and some customers love it. Threat #2: The loss of energy relevance. Without energy the brand simply does not come to mind as other more visible brands and a decline in energy can create a perception that it is locked in the past, suitable for an older generation. Threat #3: The emergence of a "reason-not-to-buy." The brand may have a perceived quality problem or be associated with a firm policy that is not acceptable. Whether your brand is just breaking into the marketplace or has a long held place in the hearts of its consumers, any forward-thinking company can implement Aaker's proven methods and strategies as part of their organization's ongoing review of brand strategy with the help of this succinct and to-the-point resource. About the Jossey-Bass Short Format Series Written by thought leaders and experts in their fields, pieces in the Jossey-Bass Short Format Series provide busy, on-the-go professionals, managers and leaders around the world with must-have, just-in-time information in a concise and actionable format.


Between Threats and War

Between Threats and War

Author: Micah Zenko

Publisher: Stanford University Press

Published: 2010-08-03

Total Pages: 241

ISBN-13: 0804771901

DOWNLOAD EBOOK

In Between Threats and War: U.S. Discrete Military Operations in the Post-Cold War World, author Micah Zenko presents a new concept to capture and illuminate the phenomenon: "Discrete Military Operations."


Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications

Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications

Author: Management Association, Information Resources

Publisher: IGI Global

Published: 2018-05-04

Total Pages: 1743

ISBN-13: 1522556354

DOWNLOAD EBOOK

Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.


Emerging Cyber Threats and Cognitive Vulnerabilities

Emerging Cyber Threats and Cognitive Vulnerabilities

Author: Vladlena Benson

Publisher: Academic Press

Published: 2019-09-20

Total Pages: 254

ISBN-13: 0128165944

DOWNLOAD EBOOK

Emerging Cyber Threats and Cognitive Vulnerabilities identifies the critical role human behavior plays in cybersecurity and provides insights into how human decision-making can help address rising volumes of cyberthreats. The book examines the role of psychology in cybersecurity by addressing each actor involved in the process: hackers, targets, cybersecurity practitioners and the wider social context in which these groups operate. It applies psychological factors such as motivations, group processes and decision-making heuristics that may lead individuals to underestimate risk. The goal of this understanding is to more quickly identify threat and create early education and prevention strategies. This book covers a variety of topics and addresses different challenges in response to changes in the ways in to study various areas of decision-making, behavior, artificial intelligence, and human interaction in relation to cybersecurity. - Explains psychological factors inherent in machine learning and artificial intelligence - Discusses the social psychology of online radicalism and terrorist recruitment - Examines the motivation and decision-making of hackers and "hacktivists" - Investigates the use of personality psychology to extract secure information from individuals


Threat Modeling

Threat Modeling

Author: Frank Swiderski

Publisher:

Published: 2004

Total Pages: 0

ISBN-13: 9780735619913

DOWNLOAD EBOOK

Delve into the threat modeling methodology used by Microsoft's] security experts to identify security risks, verify an application's security architecture, and develop countermeasures in the design, coding, and testing phases. (Computer Books)