Journal articles on the topic 'Tactics'

To see the other types of publications on this topic, follow the link: Tactics.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Tactics.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Hallonsten, Simon. "A Tactical Ecumenism of Shared Eucharistic Fasting?" Ecclesial Practices 7, no. 2 (December 16, 2020): 226–40. http://dx.doi.org/10.1163/22144471-bja10020.

Full text
Abstract:
Abstract Inspired by autoethnography, the article discusses experiences of joint worship between Lutherans and Catholics. Engaging the work of Michel de Certeau, I argue that both ecumenical strategies and ecumenical tactics are ways towards greater unity. Seeing the importance of ecumenical tactics in navigating the liturgy, I suggest that Durheim and Turnboolm’s concept of tactical ecumenism should be expanded to include a critical discussion of ecumenical tactics. Through a short personal narrative, I explore three ecumenical tactics that create spaces of unity. The article concludes with a discussion of possible tactical responses to the question of joint worship and Eucharistic sharing. I especially look at the ecumenical tactic of Eucharistic fasting and a possible sharing of the Eucharistic fast. Through these tactics Catholics and Lutherans can jointly acknowledge the existing division in hope of greater visible unity to come.
APA, Harvard, Vancouver, ISO, and other styles
2

Yang, Huahua, and Xia Li. "Application of Data Mining in Offensive Tactical Research of Tennis Match." Mobile Information Systems 2022 (August 22, 2022): 1–11. http://dx.doi.org/10.1155/2022/5435027.

Full text
Abstract:
With the continuous development and growth of information technology and data scale, data mining technology has gradually matured and applied in various fields. With the continuous improvement in sports information level, the sports data are also increasing. It is the general trend to use data mining technology in the field of sports data analysis. In this article, data mining technology is used in the research of offensive tactical data of tennis, which aims to provide scientific data support for tactical decision-making in tennis training and competition and improve the winning rate of tennis competition. Firstly, based on the requirement analysis, the goal and structure framework of the tennis tactical analysis system are determined. The main functions of the system include tactical data collection, tactical statistics, and tactical comprehensive analysis. Then, the data collection ability, speed, and tactical statistic function of the tennis tactical analysis system are tested. The accuracy rate of data collection for five common offensive tactics in 10 matches of the tennis tactical analysis system is 94.4%, 97.1%, 100%, 97.4%, and 96.3%, respectively. This shows that the tennis tactical analysis system developed in this article can accurately record the tactical data in the game in real time. After the test, the system is used to analyze the tactics used by a tennis player in 2015 and analyze the characteristics of various tactics of the serve round and receive round. The results show that W-C-C is the main tactic of the serve round in the singles match, with the utilization rate of 100% and the scoring rate of W-C-C-Q tactics of 100%; the most important landing area is the inner corner of the right area, with the distribution rate of 30% and the scoring rate of 73.33%. The tactics of receiving round are mainly C-C-C-C tactics, with the utilization rate of 66.67% and the scoring rates of C-C-C-C tactics and C-Q-C-C tactics are 100%; the most important landing area is the middle road, with the distribution rate of 41.67% and the scoring rate of 46.67%. To sum up, the application of data mining in the research of offensive tactics in tennis matches has high analysis efficiency and accuracy, which is worthy of promotion.
APA, Harvard, Vancouver, ISO, and other styles
3

Grenier, Jonathan, Bradley Pomeroy, and Andrew Reffett. "Speak Up or Shut Up? The Moderating Role of Credibility on Auditor Remedial Defense Tactics." AUDITING: A Journal of Practice & Theory 31, no. 4 (June 1, 2012): 65–83. http://dx.doi.org/10.2308/ajpt-50217.

Full text
Abstract:
SUMMARY In cases of alleged audit failure, auditors can make general statements regarding the quality of their work, or other statements intended to decrease juror assessments of auditor negligence. In this study, we examine how the perceived credibility of these remedial defense tactics moderates their effect on juror assessments of auditor negligence in cases of undetected fraud. We predict and find experimental evidence that remedial tactics result in lower negligence assessments when such tactics are perceived to be credible, but “backfire” (i.e., result in higher negligence assessments) when perceived as not credible. We also predict and find that credibility is compromised either when client importance is high, or when a remedial tactic is implemented by an audit firm's local (as opposed to national) office. As such, we find that remedial tactics result in lower negligence assessments when client importance is low and the tactics are implemented by a firm's national office, but result in higher negligence assessments when client importance is high, irrespective of the tactic's source (local versus national). Data Availability: Available upon request.
APA, Harvard, Vancouver, ISO, and other styles
4

Evsyukova, Tatyana Vsevolodovna, Olga Vladimirovna Glukhova, and Susanna Rubenovna Agababyan. "The Manipulative Strategy of Discrediting in US Political Interview." European Journal of Social & Behavioural Sciences 31, no. 2 (April 30, 2022): 137–50. http://dx.doi.org/10.15405/ejsbs.317.

Full text
Abstract:
The research aims at the speech discrediting strategy investigation in the light of the manipulative influence on the addressee. The American politicians’ interviews serve as a material for the case investigation. The paper considers, the concept of a political interview and the implementation of a discrediting strategy into a political text, highlights the main tactics and techniques of the discrediting strategy like the tactic of “unsupported derogation of authority”, comparative tactics, the “quoting the object of discredit” tactic, accusation tactics, bullying tactics, the tactics of insult, polarizing tactics, tactics of a precedent text “hooking”, the tactics of “aggressive opponent”. The study provides the speech analyses of discrediting strategy implementation. The paper applies the methods of contextual and content analyses of political interview texts regarding the means of discrediting strategy realization via political discourse analysis. The paper results in describing discrediting strategy tactics and the language means that realize each tactic correspondingly.
APA, Harvard, Vancouver, ISO, and other styles
5

Fallon, Kathleen M., and Julie Moreau. "Revisiting Repertoire Transition: Women's Nakedness as Potent Protests in Nigeria and Kenya*." Mobilization: An International Quarterly 21, no. 3 (September 1, 2016): 323–40. http://dx.doi.org/10.17813/1086-671x-20-3-323.

Full text
Abstract:
The influential work of Tilly and Tarrow on social movement repertoire transitions—moving from older, local, and episodic tactics to newer, national, and sustained tactics—has contributed significantly to the development of social movements theory. This article expands Tilly and Tarrow's theoretical framework by drawing on examples from Nigeria and Kenya. First, we examine the causal factors contributing to repertoire transitions in these postcolonial African countries, highlighting the importance of colonial state formation and social networks in changing repertoires. Second, we consider how the gravity and effectiveness of women's nakedness, used by mothers as a collective action tactic to shame those targeted, persisted and maintained its significance across tactical repertoire transitions, despite colonial repression. We argue that the continuance of tactics across repertoire transitions lies in their ability to maintain symbolic resonance, which simultaneously restricts the transmission of tactics to other locations.
APA, Harvard, Vancouver, ISO, and other styles
6

Shepitko, V. "SUBJECT OF CRIMINALISTICS’ TACTIC: FORMATION HISTORY, CONTENTS AND TRENDS." Theory and Practice of Forensic Science and Criminalistics 19, no. 1 (June 2, 2019): 8–20. http://dx.doi.org/10.32353/khrife.1.2019.01.

Full text
Abstract:
The history of the emergence of tactical beginnings in the investigation of the criminal for forensic purposes is considered and the further formation of the system of scientific knowledge in countering crime is tracked. A historical excursion to the emergence and development of criminal tactics and its role for other branches of forensic tactics has been undertaken. The formation of criminal tactics is conditioned using psychological knowledge in in the context of crime counteraction. In the genesis of criminalistics tactics, the data of psychological science are traditionally attributed to its sources. Attention is paid to changing the subject of forensic tactics in modern conditions and the causes of such changes are determined. The content and structure of forensic tactics are conditioned by the need to provide the tactical means of various subjects (investigator, detective, prosecutor, investigative judge, parties to criminal proceedings, court, etc.). The activity approach to criminalistics tactics is proposed and the necessity of isolation of its branches (advocacy, judicial, investigative, searching) is substantiated. Forensic data should be used not only by the prosecution but also by the defense. Arguments are given regarding the need to develop the scientific provisions of advocacy tactics (defense tactics or tactics of professional defense in criminal cases) and to consider it as a separate branch of forensic tactics. The expediency of separating the responding counter-investigation tactics as a structural part of criminalistics tactics was also emphasized. The substantive side of criminalistics tactics is considered with the help of its structural elements (tactical techniques, tactical systems, tactical combinations, tactical operations, etc.). Changes in the legal field, the model of criminal proceedings, the “revision” of traditional criminal law institutions and the process have a significant impact on the content of criminalistics tactics.
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Bo, Fu Xian Liu, Rui Qi Zhao, and Yong Ge Chen. "Tactics System of Air-Raid Target-Stream Based on Air-Confront-Ground." Applied Mechanics and Materials 198-199 (September 2012): 978–82. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.978.

Full text
Abstract:
This paper ascertains the battleplane’s tactics applied in Air-Confront-Ground simulation, constructs the battleplane Agent’s tactics system, and illuminates the main module of the system. Then taking the Attack-elevate tactic for example, the math model of the tactic is founded primarily, and the process of tactics’ choice and evaluation is analyzed, at last the executing algorithm of Attack-elevate tactic is generated.
APA, Harvard, Vancouver, ISO, and other styles
8

Petrova, Marina. "The Tactics of Verbal Countermanipulation in Russian Political Video Blogs." Theoretical and Practical Issues of Journalism 8, no. 3 (July 16, 2019): 625–39. http://dx.doi.org/10.17150/2308-6203.2019.8(3).625-639.

Full text
Abstract:
The author of the article states that in spite of the fact that manipulation has been broadly studied in various areas of science, such as psychology, sociology, politology, linguistics, etc., countermanipulation (the response action to manipulation) has been analysed mainly by psychologists. This phenomenon has not been studied in linguistics yet. The author of the article gives a linguotypological description of the verbal countermanipulation tactics as exemplified in political video blogs reviewing the events with the participation of A. Navalny. A special two-stage algorithm which included a communicative pragmatic analysis was used for revealing countermanipulative intention in political video blogs. The first stage included attentive viewing of the videos and their analysis to determine manipulation upon certain criteria (a hidden aim, use of non-cooperative strategies and tactics and special verbal manipulative techniques). The second stage consisted of analysing the response utterances to define countermanipulative intention (neutralising manipulation), identification of countermanipulative tactics, their definition and classification. As a result of the conducted research, the author of the article has distinguished two groups of countermanipulative tactics: overt opposition tactics and covert opposition tactics. The group of overt opposition tactics includes the tactic of manipulative intention revealing, the tactic of making a question about manipulator’s intentions, the tactic of manipulation technique revealing, the tactic of counterargumentation and the tactic of refusing to change one’s behaviour towards manipulator’s intentions. The covert opposition tactics are the tactic of clarification questions and the tactic of repeating the manipulator’s words. The author points out the importance of further study of verbal countermanipulation from the perspective of solving the problems of the personal and social information security.
APA, Harvard, Vancouver, ISO, and other styles
9

MOUNIR, A. "EXPLORING CROSS-CULTURAL COMMUNICATION TACTICS: A STUDY OF ADVERTISING TEXTS ON THE EXAMPLE OF RUSSIAN, ENGLISH, AND ARABIC LANGUAGES." Herald of Polotsk State University. Series A. Humanity sciences, no. 2 (February 28, 2024): 72–76. http://dx.doi.org/10.52928/2070-1608-2024-70-2-72-76.

Full text
Abstract:
The study aims to acknowledge the communication tactics in the advertising texts used to implement strategies in the light of Russian, English, and Arabic examples. The paper considers the concept of advertising texts and the implementation of communication strategies into advertising texts, as well as highlights the main tactics, like "minus" tactics, positive presentation tactics, slander tactics, provocation tactics, warning tactics, deflecting or rejecting criticism tactics, cooperation tactics, motivation tactics and promise tactics. The study applies the methods of contextual and content analyses of advertising texts with reference to the methods of implementing communication strategies through text analysis as well as the advertising text. Results in describing the communication tactics and the language means that realise each tactic correspondingly.
APA, Harvard, Vancouver, ISO, and other styles
10

Sutton, Mark Q. "Strategy and Tactic in the Analysis of Archaeological Hunter-Gatherer Systems." North American Archaeologist 21, no. 3 (July 2000): 217–31. http://dx.doi.org/10.2190/9ngu-qhjl-bb9l-aafr.

Full text
Abstract:
Archaeologists studying past cultural systems commonly employ the concept of strategy to characterize both general and specific aspects of those systems. It is herein argued that a “strategy” is a plan; a general concept or blueprint conceived to achieve a goal. The fulfillment of a strategy requires that specific, lower-order, actions be taken. These actions are tactics—small-scale activities that generate a material record. It is the patterned remains of tactical behavior that form, and are recovered from, the archaeological record, with higher-order strategies being inferred from some understanding of tactics. In practice, however, many researchers interchange the concepts of strategy and tactic, equating plans with actions and vice versa. This tends to homogenize the reconstruction of strategies and masks the diversity, variability, and adaptive nature of the tactical inventory within the larger cultural system. Thus, the degree and scale of initial archaeological analysis should be at the level of tactic, rather than of strategy, an approach that would broaden the archaeological perspective in modeling and understanding past systems.
APA, Harvard, Vancouver, ISO, and other styles
11

Park, Julian Francis. "Abolish rent!" Radical Housing Journal 1, no. 2 (September 23, 2019): 179–84. http://dx.doi.org/10.54825/padd7071.

Full text
Abstract:
‘Homes for all’ is, rightly, the prevailing strategic slogan in the USA tenants’ movement. As a tactical slogan, however, it is time that ‘abolish rent’ replaces ‘decommodify housing’. While ‘decommodify housing’ importantly points to the social problems of rental housing’s status as commodity, full decommodification is a complex process requiring transformation not only of the selling and renting of housing for money but also the processes of housing production and management. This complexity makes decommodification as a tactic an obscure process and consequently an ineffective slogan for agitating tenants because of its distance from their everyday struggles. ‘Abolish rent’ instead points toward generalizing direct action tactics already essential in the struggles of housed and unhoused tenants, tactics like rent strikes and squatting. To generalize rent abolition necessarily includes fully decommodifying housing, but in connecting immediate tactics to long term strategy, I contend that ‘abolish rent’ is a more effective slogan.
APA, Harvard, Vancouver, ISO, and other styles
12

Gokova, Ekaterina I. "NATIONAL PECULIARITIES OF THE REALIZATION OF COMFORTING STRATEGY IN GERMAN LINGUACULTURE." Proceedings of Southern Federal University. Philology 26, no. 3 (September 28, 2022): 43–52. http://dx.doi.org/10.18522/1995-0640-2022-3-43-52.

Full text
Abstract:
The article is devoted to the study of comforting communicative strategy. The tactics and linguistic means realizing it differ from one lingua-culture to another. The relevance of the article is due to the need for further study of this strategy in German lingua-culture. The purpose of this work is to define the tactics and linguistic means that realize comforting strategy in German speech, as well as their national peculiarities. According to the analysis of empiric material, the following tactics can be distinguished: soothing tactics, distraction tactics, empathy tactics, optimism tactic, fatalism tactic, support tactics, generalization tactics, mobilization tactics, tactics of perspective change, of feelings explication, of reference to personal experience, of opponent’s criticism, of ways of coping suggestion. The author comes to the conclusion that the realization of comforting strategy in German speech reflects the following national peculiarities. The speakers appeal to the listener’s logic and give a detailed argumentation of their ideas. They criticize the lack of rationality in the other’s behavior. The idea of a norm is of great importance. The norm refers to the emotional stability, peace of mind and confidence. A comforting message aims to help the consoled get back to this norm. It is also connected with Ordnung, Sicherheit concepts A comforter can also appeal to the Pflicht concept. The study also shows that the speaker tries to alleviate the listener’s feeling of uncertainty and appeals to Zeit concept.
APA, Harvard, Vancouver, ISO, and other styles
13

Pintus, Eliana, Stefania Uccheddu, Knut H. Røed, Javier Pérez Gonzaléz, Juan Carranza, Mauri Nieminen, and Øystein Holand. "Flexible mating tactics and associated reproductive effort during the rutting season in male reindeer (Rangifer tarandus, L. 1758)." Current Zoology 61, no. 5 (October 1, 2015): 802–10. http://dx.doi.org/10.1093/czoolo/61.5.802.

Full text
Abstract:
Abstract Polygynous males can change their mating tactics across their lifetime, but information is scarce on the flexibility of this trait within a given season and the relative costs and benefits of using different tactics. Here, we monitored individually marked male reindeer Rangifer tarandus and classified their mating tactics as harem-defense, sneaking, or mixed. The costs of the male reproductive effort were assessed using both direct (i.e. percentage of body mass lost) and indirect measures (i.e. activity patterns such as feeding, standing, and walking), while mating group size and reproductive success were recorded as mating effort benefits. Our results show that reindeer males may switch between the harem-defense and sneaking tactics throughout the same breeding season, providing further support to the notion that reproductive tactics are flexible in ungulates. The costs and benefits of male mating effort vary according to the mating tactic, reaching the highest values in harem-holders and the lowest values in sneaking males. Moreover, males who switched between the sneaking tactic and the harem-defence tactic tended to achieve higher mating success than males who consistently used the least costly tactic. Indeed, all harem-holders successfully sired offspring, whereas only two out of three mixed-tactic males sired one calf, and sneaking males did not sire any calves. In conclusion, our results show that reindeer males can modulate their mating efforts during the same breeding season by switching between the most costly harem-defense tactic and the least costly sneaking tactic, suggesting individual solutions to the balance between reproductive effort and mating opportunities.
APA, Harvard, Vancouver, ISO, and other styles
14

Grenier, Jonathan, Bradley Pomeroy, and Andrew Reffett. "When Do Auditor Defense Tactics Increase Rather Than Decrease Perceived Auditor Negligence?" Current Issues in Auditing 6, no. 2 (August 1, 2012): P7—P12. http://dx.doi.org/10.2308/ciia-50280.

Full text
Abstract:
SUMMARY In cases of alleged audit failure, audit firms and/or their defense teams can make statements intended to decrease jurors' assessments of auditor negligence. For example, Cornell et al. (2009) find that expressing sympathy for the victims of undetected fraud successfully decreases mock jurors' assessments of auditor negligence. Extending this research, Grenier et al. (2012) report the results of an experiment indicating that the effectiveness of defense tactics depends on their perceived credibility, and that credibility depends on at least two prevalent situational factors: the importance of the client to the audit firm and the source of the defense tactic (i.e., the national office or the local office that conducted the audit). Specifically, mock jurors perceive auditor defense tactics to be credible (not credible) when client importance is low (high), and when implemented by the firm's national (local) office. Hence, when client importance is low, defense tactics successfully decrease negligence assessments if implemented by the firm's national office, but “backfire” and increase negligence assessments when client importance is high, regardless of the defense tactic's source (national versus local office). Audit firms should therefore use caution when deciding whether to use defense tactics, particularly in negligence suits involving clients that could be perceived as highly important to the audit firm. This article summarizes Grenier et al. (2012) by discussing its motivation, method, results, and practical implications.
APA, Harvard, Vancouver, ISO, and other styles
15

Brown, Michelle, Carol T. Kulik, and Victoria Lim. "Managerial tactics for communicating negative performance feedback." Personnel Review 45, no. 5 (August 1, 2016): 969–87. http://dx.doi.org/10.1108/pr-10-2014-0242.

Full text
Abstract:
Purpose – Delivering negative feedback to employees is highly problematic for managers. Negative feedback is important in generating improvements in employee performance, but likely to generate adverse employee reactions. However, if managers do not address poor performance, good performers may become demoralized or exit the organization. The purpose of this paper is to investigate how managers communicate negative feedback and the factors that drive their choice of tactic. Design/methodology/approach – The authors use interview data from practicing line managers with experience in delivering negative feedback to learn whether their tactic choices are consistent with Implicit (“best practice”) or Contingency (“best fit”) theory. Findings – The authors identify five negative feedback tactics: evidence, emotive and communication tactics are foundation tactics while evidence + communication and evidence + emotive tactics are bundles of the foundation tactics. Managers apply a “best fit” approach from a set of “best practice” negative feedback options. The choice of negative feedback tactic is driven by the manager’s assessment of the “best fit” with the employee’s personality. Research limitations/implications – Most of the managers believed that their negative feedback tactic had been effective. Future researchers should investigate which negative feedback tactics employees regard as most effective. Practical implications – A best fit approach to the delivery of negative feedback requires organizations to give managers discretion in the delivery of negative feedback. Managers may mis-assess fit which can undermine the effectiveness of the appraisal process. Originality/value – The authors focus on how negative feedback is communicated by managers. Existing research focusses on reactions to negative feedback without taking into account how it is delivered.
APA, Harvard, Vancouver, ISO, and other styles
16

Derik, Ilona, and Tetyana Druzhyna. "SCIENTIFIC TEXTS IN THE PARADIGM OF TRANSLATION STUDIES." Naukovy Visnyk of South Ukrainian National Pedagogical University named after K. D. Ushynsky: Linguistic Sciences 2020, no. 30 (March 2020): 88–101. http://dx.doi.org/10.24195/2616-5317-2020-30-6.

Full text
Abstract:
The article is dedicated to the study of the specificity of translating scientific texts from English into Ukrainian. In the focus of the research there is the survey of the finding in this field. There is also provided the analysis of the strategies and tactics of translation employed in accordance with the functional-communicative approach to translation studies. The research was carried out on the basis of the scientific texts of different genres (articles, theses, reports) presented in English and their translations into Ukrainian. The objective was formulated as the analysis of the adequacy of the tactics employed to the dominant translation strategy, the search for the grounding of the accuracy of the operations at work as well as the formulation of the assessment criteria. The conclusion was drawn that the employment of such translation transformations as grammatical and functional replacement, transposition and search for translation equivalent are observed while employing the tactic of conveying relevant information. It has been proved that the strategy of communicatively relevant translation is the most appropriate for the translation of the scientific texts. It is realized by means of the following tactics: the tactic of rendering relevant information, the tactic of preserving formal and structural peculiarities, the tactic of the correct presentation of information and rendering the distinctive features of the functional style and genre. The quantitative parameters of the distribution of translation strategies, tactics and operations have revealed the typological commonness of the operations employed. There has been observed the correlation of the transformations of transcoding (transliteration and transcription), contextual replacement and the tactic of linguistic and cultural adaptation. The perspective of the study of the variability of strategies and tactics in translating scientific discourse is seen in researching the distinctive parameters of the translation strategies and tactics and in performing comparative analysis.
APA, Harvard, Vancouver, ISO, and other styles
17

Rofii, Afif, and Lisa Yuniarti. "TAKTIK RETORIS NAJWA SHIHAB PADA PROGRAM TALK SHOW MATA NAJWA DI METRO TV." Aksara: Jurnal Ilmiah Pendidikan Bahasa dan Sastra Indonesia 7, no. 2 (September 26, 2023): 186. http://dx.doi.org/10.33087/aksara.v7i2.563.

Full text
Abstract:
The research aims to describe the rhetorical tactics used by Najwa Shihab on the Mata Najwa talk show program that aired on one of Indonesia’s private television stations, Metro TV. This type of research is qualitative research analyzed by descriptive method. The data type is qualitative data which is the result of conversation transcript of the Mata Najwa talk show Sang Penantang episode which aired on Metro TV. As for data collection technique used is a listening technique with data collection instruments in the form of field records. Based on the findings and analysis, it can be drawn to the conclusion that the rhetorical tactics used by Najwa Shihab in the Mata Najwa on Sang Penantang episode are affirmation and offensive tactics. The affirmation tactive is used by Najwa Shihab to ask questions that are explaining something or asking for approval from the source. "The affirmation tactics used by Najwa Shihab in this program include ""yes"", repeat tactics, togetherness tactics and compromise tactics." Offensive tactics are used by Najwa Shihab to dig up information that is justification, defense and recognition. Offensive tactics used include anticipation tactics, surprising tactics, asking back tactics, provocation tactics, encompassing tactics and overestimating tactics
APA, Harvard, Vancouver, ISO, and other styles
18

Jaehyuk, Jang, and Kim Kisun. "Comparative Study of the Military Tactics of the Roman Empire and Mongol Empire." Mongolian Diaspora. Journal of Mongolian History and Culture 1, no. 2 (September 1, 2021): 7–35. http://dx.doi.org/10.1515/modi-2021-010203.

Full text
Abstract:
Abstract The study is conducted as a comparative study of military tactics of the two powers representing different regions and time periods throughout human history. Despite the differences in circumstance and time, common success factors are identified in the military tactics of the two great powers. Based on these success factors, it is possible to compare the military tactics of these armies using the following common criteria: basic tactical unit system, strategic flexibility, tactical mobility, and strategic planning. The Roman Empire and Mongol Empire had long been the dominant military powers in their regions. Among them, the Mongol army was one of the greatest in human history, and through its power and military skill, led to the magnificent growth of the Mongol Empire. Thus, this study identifies the success factors of the Mongol military tactics through comparisons with Roman military tactics.
APA, Harvard, Vancouver, ISO, and other styles
19

Ring-Ramirez, Misty, Heidi Reynolds-Stenson, and Jennifer Earl. "Culturally Constrained Contention: Mapping the Meaning Structure of the Repertoire of Contention." Mobilization: An International Quarterly 19, no. 4 (December 1, 2014): 405–19. http://dx.doi.org/10.17813/maiq.19.4.d972218lu6826510.

Full text
Abstract:
While social network analysis (SNA) has traditionally been used to study actor networks, it can also reveal "meaning structures" (Mohr 1998), the relationships connecting cultural elements such as ideas and practices. We argue that the repertoire of contention represents a meaning structure, analyzable using SNA of tactical co-deployments at protests. We use data from over 7,000 protest events in New York State from 1960 to 1995. Our analyses suggest that co-deployed tactics are not chosen independently or combined randomly but rather cluster into sets with distinct roles. These roles reveal cultural affinities among the tactics and are largely stable over time, although some variation related to the protest cycle and tactical form can be detected. We also examine the position of a specific theoretical category of tactics, radical tactics, within the larger tactical repertoire.
APA, Harvard, Vancouver, ISO, and other styles
20

Yuan, Zhigang, Yongkui Zhang, Bo Li, and Xinlong Jin. "A Diagnostic Model of Volleyball Techniques and Tactics Based on Wireless Communication Network." Computational and Mathematical Methods in Medicine 2022 (March 30, 2022): 1–12. http://dx.doi.org/10.1155/2022/2185908.

Full text
Abstract:
Volleyball is a sport of teamwork competition and tactical coordination. It tests the ability of team members to cooperate with each other and personal resilience. With the development of wireless communication networks, how to use wireless communication networks in the analysis of volleyball tactics is the subject of this article. To explore how to design the volleyball tactics analysis model of the wireless communication network, this paper proposes the method of LTE system and MIMO technology and designs the tactics analysis model based on the characteristics of the wireless network, then combined volleyball tactics and game theory to design a wireless communication network volleyball tactics analysis model. Then, this paper designs the simulation experiment of scene allocation problem, the algorithm simulation experiment, and the comparative investigation and analysis of volleyball game spiking technical ability. The results of the experiment are optimized for the tactical analysis model, and finally, the improvement of the training of the volleyball tactical analysis model based on the wireless communication network is verified through comparative experiments. The experimental results show that the team fit of the volleyball tactical analysis model training based on the wireless communication network has increased by 22.12% compared with the traditional volleyball tactical training. Compared with the traditional volleyball tactical training, the personal on-the-spot adaptability of the volleyball tactical analysis model training based on the wireless communication network has increased by 9.05%.
APA, Harvard, Vancouver, ISO, and other styles
21

Moffa, Morgan S., and Judith Platania. "Effects of Expert Testimony and Interrogation Tactics on Perceptions of Confessions." Psychological Reports 100, no. 2 (April 2007): 563–70. http://dx.doi.org/10.2466/pr0.100.2.563-570.

Full text
Abstract:
Evidence obtained through the process of interrogation is frequently undermined by what can be perceived as overzealous interrogation tactics. Although the majority of psychologically oriented tactics are legally permissible, they nonetheless contribute to innocent suspects confessing to crimes they did not commit. The present study examined the effect of expert testimony and interrogation tactics on perceptions of a confession. 182 undergraduates read a transcript of a homicide trial that varied based on interrogation tactic: implicit threat of punishment (maximization) or leniency (minimization) and expert witness testimony (presence or absence of expert testimony). Analysis indicated that the type of interrogation tactic used in obtaining the confession affected participants' perceptions of the coerciveness of the interrogation process.
APA, Harvard, Vancouver, ISO, and other styles
22

Giunchiglia, Fausto, and Paolo Traverso. "Program tactics and logic tactics." Annals of Mathematics and Artificial Intelligence 17, no. 2 (September 1996): 235–59. http://dx.doi.org/10.1007/bf02127970.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Koslowsky, Meni, and Joseph Schwarzwald. "THE USE OF POWER TACTICS TO GAIN COMPLIANCE: TESTING ASPECTS OF RAVEN'S (1988) THEORY IN CONFLICTUAL SITUATIONS." Social Behavior and Personality: an international journal 21, no. 2 (January 1, 1993): 135–43. http://dx.doi.org/10.2224/sbp.1993.21.2.135.

Full text
Abstract:
French and Raven's sixfold taxonomy has been used widely to examine social influence processes. A recent elaboration by Raven (1988a) proposes that the use of power tactics is situationally contingent, depending on availability of alternatives. The present study examined the pattern of power tactic preferences as a function of setting and status. A total of 89 subjects were given scenarios describing an attempt to influence another party. The scenario differed in setting (work vs. school) and status level of the influencing agent (manager or teacher vs. employee or student). Factor analysis indicated that several tactics (reward, coercion, and expertise) are unique whereas other tactics overlap. Findings indicated that higher status individuals as compared to lower status counterparts were perceived as using a greater variety of power tactics to gain compliance in conflict situations. In addition, power tactic patterns were found to be situationally contingent. The findings were discussed in terms of the original sixfold approach and its possible implications for management.
APA, Harvard, Vancouver, ISO, and other styles
24

Yang, Delin. "Application of Data Mining Technology in the Subject Tactical Teaching of Badminton." International Journal of Emerging Technologies in Learning (iJET) 13, no. 07 (June 28, 2018): 30. http://dx.doi.org/10.3991/ijet.v13i07.8778.

Full text
Abstract:
In badminton field tactics teaching, there are problems of not timely, inaccu-rate and incomplete data collection of completion cases, not deep enough da-ta and too few personalized training programs for athletes' tactics. Aiming at solving the above problems, the traditional Apriori association algorithm was optimized, and the algorithm was applied to the acquisition of badminton field tactics case data. Moreover, the multidimensional data mining was con-ducted, thus providing a scientific and personalized teaching plan for bad-minton field tactical teaching. The simulation experiments showed that data mining technology applied to badminton field tactics teaching could effec-tively put forward personalized teaching plan for data support from the tacti-cal point of view, and improve the effect of badminton field tactical teach-ing.
APA, Harvard, Vancouver, ISO, and other styles
25

Goelzner, Herbert, Abraham Stefanidis, and Moshe Banai. "Ethically questionable negotiation tactics in the Austrian workplace." European Business Review 31, no. 1 (January 14, 2019): 115–38. http://dx.doi.org/10.1108/ebr-08-2015-0081.

Full text
Abstract:
Purpose This study aims to generalize the research findings about the impact of individualism-collectivism, ethical idealism and inter-personal trust on ethically questionable negotiation tactics, such as pretending, deceiving and lying, in a Germanic culture, namely, that of Austria. Design/methodology/approach Survey questionnaires translated from English to German were collected from 304 respondents. A regression analysis was used to test the contribution of the independent variables to the explanation of negotiators’ attitudes towards questionable negotiation tactics. Findings The research empirically corroborated a classification of three groups of negotiation tactics, namely, pretending, deceiving and lying, in Austria. Austrian negotiators who scored high on vertical individualism tended to score high on the endorsement of the pretending tactic; those who scored high on horizontal collectivism tended to score low on the endorsement of the deceiving and lying tactics; those who scored high on vertical collectivism tended to score high on the endorsement of the deceiving and lying tactics; and those who scored high on inter-personal trust tended to score low on the endorsement of the pretending negotiation tactic. Idealistic negotiators tended not to endorse the use of pretending, deceiving and lying negotiation tactics. Research limitations/implications The study investigated the respondents’ perceptions, rather than their actual negotiation behavior. Findings are limited to Germanic culture. Practical implications The study provides negotiators in Austria with a tool that has the potential to predict the extent to which Austrian negotiators would use various ethically questionable negotiation tactics. Originality/value This is the first study to present a model of the antecedents of negotiation tactics in a Germanic cultural context, where negotiation studies are limited. This study validates in Austria three questionable negotiation tactics groups of varying severity, which had previously been studied only in non-Germanic cultures. This research significantly contributes to the generalization of a model of the antecedents of the endorsement of questionable tactics across cultures.
APA, Harvard, Vancouver, ISO, and other styles
26

Szabo, Amanda L., Elizabeth R. Neil, Stacy E. Walker, Ashley B. Thrasher, and Lindsey E. Eberman. "Professional Program Preparation, Orientation, and Mentoring Tactics Used to Develop Professional Responsibility in Early-Career Athletic Trainers." Athletic Training Education Journal 15, no. 2 (April 1, 2020): 93–101. http://dx.doi.org/10.4085/150119035.

Full text
Abstract:
Context Transition to practice is a pivotal period in an athletic trainer's (AT) career that includes higher-than-average job-related stress due to many changes. Objective To assess how early-career ATs from professional master's athletic training programs (PMATP) developed professional responsibility during their transition to practice. Design Cross-sectional study. Setting Web-based survey. Patients or Other Participants A total of 137 participants who graduated from a PMATP and who were board certified from 2016 to 2018 completed the study. Intervention(s) The Web-based survey asked which transition-to-practice tactics were used, if they were helpful, and how they were helpful with respect to preparation (formal coursework and clinical experiences), orientation, and mentorship. Main Outcome Measure(s) We calculated frequencies for each tactic in transition to practice, the tactic's helpfulness, and what the tactic specifically aided during the participant's transition. Results Overall, 78.8% (108/137) of participants perceived their PMATP prepared them to transition to practice. Regarding formal coursework, the majority indicated they discussed professional behaviors (78.1%, 107/137), which was very helpful (43.9%, 47/107) in developing professional communication (70.1%, 96/137). The most frequent tactics in clinical experiences included being encouraged to make patient-care decisions (82.5%, 113/137, extremely helpful = 76.1%, 86/113) and being provided feedback about performance (81.8%, 112/137, extremely helpful = 76.1%, 86/113), which developed confidence (75.9%, 104/137). Few participants (24.1%, 33/137) indicated they were exposed to formal orientation. Almost half reported having informal orientation by learning on the job (39.4%, 54/137). Few participants were assigned a mentor (25.5%, 35/137); those who were indicated that the mentor was extremely helpful (40.0%, 14/35) for understanding the role of an AT. Conclusions Early-career ATs perceived that their PMATP, informal orientation, and unassigned mentors were helpful in developing professional responsibility. Often these tactics were effective at developing confidence, but other tactics may be necessary to assist role understanding, managing patient load and administrative duties, and resolving conflicts.
APA, Harvard, Vancouver, ISO, and other styles
27

Todak, Natalie, and Lois James. "A Systematic Social Observation Study of Police De-Escalation Tactics." Police Quarterly 21, no. 4 (July 10, 2018): 509–43. http://dx.doi.org/10.1177/1098611118784007.

Full text
Abstract:
This study analyzes 131 police–citizen interactions observed during Fall 2016 and coded through systematic social observation. We assessed how often officers use de-escalation tactics, factors associated with their use, and the relationship between de-escalation and calm citizen demeanor. We found officers frequently employed de-escalation tactics, including the “respect” tactic of treating citizens in a respectful manner, the “human” tactic of getting on the citizen’s level and reducing power imbalances, and the “honest” tactic of being up front about the facts of the situation. Officers were more influenced by citizen demeanor than demographics in their use of de-escalation. The use of several tactics, including “human” (reducing the power differential between the cop and the citizen) and “calm” (the officer making an effort to control his or her own emotions), was associated with calm citizen demeanor. Directions for future research on this important topic are offered.
APA, Harvard, Vancouver, ISO, and other styles
28

Yiu, Tak Wing, and Yuet Nog Chung. "Face-saving tactics as an aid to construction negotiation in Hong Kong." Engineering, Construction and Architectural Management 21, no. 6 (November 17, 2014): 609–30. http://dx.doi.org/10.1108/ecam-05-2013-0049.

Full text
Abstract:
Purpose – In construction, the involvement of complex human interactions and incompatible interests among negotiating parties would pose as an obstacle in any negotiation process. The purpose of this paper is to examine the role of face in governing the behaviour of negotiating parties. Design/methodology/approach – This paper identified the generic types of face-saving tactics used by construction negotiators, investigated the tactic-outcome relationships and examined the effects of face-inducement factors on these relationships with the use of moderated multiple regression (MMR). Findings – A taxonomy of face-saving tactics has been developed by employing the technique of principal component of factor analysis. The results suggest that the use of face-saving tactics in construction negotiation would statistically result in an achievement of mutual agreement, maintenance of harmony and avoidance of offending situations. The MMR models finally affirm that some tactic-outcome relationships would significantly depend on the face-inducement factors. Research limitations/implications – This research highlights the usefulness of face-saving tactics in construction negotiation. Practical implications – The findings revealed that these tactics can help facilitate the achievement of mutual agreement, maintain harmony and avoid offending situations. In this connection, an awareness of the proper use of face-saving tactics is worth-noticing in order to have successful dealings in negotiating project disputes. Originality/value – In construction, there are some distinct features which may influence the use of face-saving tactics and the behaviour of project dispute negotiators. The findings of this research would provide an insight into promoting proactive and collaborative project dispute resolution.
APA, Harvard, Vancouver, ISO, and other styles
29

Park, Myunghwan, Jihyun Oh, Cheonyoung Kim, and Hyeonju Seol. "The Specification of Air-to-Air Combat Tactics Using UML Sequence Diagram." Journal of the Korea Institute of Military Science and Technology 24, no. 6 (December 5, 2021): 664–75. http://dx.doi.org/10.9766/kimst.2021.24.6.664.

Full text
Abstract:
Air force air-to-air combat tactics are occurring at a high speed in three-dimensional space. The specification of the tactics requires dealing with a quite amount of information, which makes it a challenge to accurately describe the maneuvering procedure of the tactics. The specification of air-to-air tactics using natural languages is not suitable because of the intrinsic ambiguity of natural languages. Therefore, this paper proposes an approach of using UML Sequence Diagram to describe air-to-air combat tactics. Since the current Sequence Diagram notation is not sufficient to express all aspects of the tactics, we extend the syntax of the Sequence Diagram to accommodate the required features of air-to-air combat tactics. We evaluate the applicability of the extended Sequence Diagram to air-to-air combat tactics using a case example, that is the manned-unmanned teaming combat tactic. The result shows that Sequence Diagram specification is more advantageous than natural language specification in terms of readability, conciseness, and accuracy. However, the expressiveness of the Sequence Diagram is evaluated to be less powerful than natural language, requiring further study to address this issue.
APA, Harvard, Vancouver, ISO, and other styles
30

Vanpoucke, Evelyne, and Scott C. Ellis. "Building supply-side resilience – a behavioural view." International Journal of Operations & Production Management 40, no. 1 (August 2, 2019): 11–33. http://dx.doi.org/10.1108/ijopm-09-2017-0562.

Full text
Abstract:
Purpose To build resilient supply chains, buyers should implement risk mitigation tactics. The purpose of this paper is to provide insights into the risky decision-making process that underlies buyers’ decisions to adopt supply risk mitigation tactics for creating supply-side resilience. Design/methodology/approach The authors employ experimental scenarios to simulate supply disruptions of low and high likelihood. The authors then assess buyers’ decisions to adopt supply risk mitigation tactics in response to these scenarios. Findings The authors find that buyers’ perceptions of supply disruption likelihood are positively related to their adoption of buffer- and process-oriented risk mitigation tactics and preference for process-oriented risk mitigation tactics. Conversely, risk propensity negatively affects buyers’ adoption of buffer- and process-oriented mitigation tactics. Originality/value Beyond risk perceptions, the authors consider how risk propensity also affects the risky decision-making process. Moreover, whereas previous studies often focus on a single mitigation tactic, the authors study buyers’ adoption of multiple buffer- and process-oriented risk mitigation tactics to create supply-side resilience.
APA, Harvard, Vancouver, ISO, and other styles
31

Burmakova, Elena A., and Natalia V. Polyakova. "Combined Tactics of Communication Strategy: Discrediting Biden’s Administration in Tucker Carlson Tonight." SibScript 26, no. 1 (February 22, 2024): 62–71. http://dx.doi.org/10.21603/sibscript-2024-26-1-62-71.

Full text
Abstract:
The speech-behavioral strategy of discrediting is a manipulative form of information aggression exerted on the consciousness of the mass audience. Since it is inherent in modern media, it affects politics and society and thus needs to be resisted. The article introduces an analysis of combined discrediting tactics that implement the communication strategy of discrediting against the President Biden’s administration. The corpus came from the Tucker Carlson Tonight show and included 563 contexts of combined discrediting tactics. Standard, statistical, and linguistic methods made it possible to classify the discrediting tactics into accusations, insults, negative predictions, deceived expectations, irony, polarization, and comparison. The resulting classification of combined tactics of discrediting included five quantitative groups and 51 content subgroups. The accusation tactics proved to be the most popular combined tactic (260 cases; 60 % of the corpus). Two-component tactics were the most representative (337; 60 %) whereas the subgroup of irony + insult was the most frequent in other subgroups (45; 8 %). Combined tactics had a more significant discrediting effect and a more intensive impact on the target audience.
APA, Harvard, Vancouver, ISO, and other styles
32

Haverila, Matti J., and Nicholas Ashill. "Launch Effort and NPD Success: A Study of Technology Intensive Companies in Finland." International Journal of Innovation and Technology Management 11, no. 04 (July 25, 2014): 1450024. http://dx.doi.org/10.1142/s0219877014500242.

Full text
Abstract:
In this paper, we present an exploratory investigation of the types of product launch tactics managers use in technology-intensive companies in Finland and explore the role that such tactics play in differentiating between successful and unsuccessful NPD outcomes. Our findings indicate that managers perceive two types of tactical product launch tactics during the NPD process, which we label "promotions and sales-distribution effort" and "production start-up effort". All tactical launch effort variables are positively related to NPD success. This study identifies similarity in the way of how managers conceptualize the launch effort in successful and unsuccessful NPD projects.
APA, Harvard, Vancouver, ISO, and other styles
33

Samin, Giofandi, Gilang Ramadan, Ardin Abdul Gani, Ratna Dewi, and Iwan Fataha. "SSB Mahardika's Offensive Tactics." JUARA : Jurnal Olahraga 7, no. 3 (November 30, 2022): 955–63. http://dx.doi.org/10.33222/juara.v7i3.2696.

Full text
Abstract:
This study aims to produce a product development model for football attack tactics training at an early age and to increase the effectiveness of the ability to attack football tactics during competitions. This research is research and development carried out by adapting development research steps. This method begins with a needs analysis by developing an attack tactics training model with characteristics that match the results of the effectiveness test conducted at SSB Mahardika. Data were analyzed by descriptive quantitative on the rating scale. The number-based soccer attack tactic training model is used as a tool so that the players can increase their effectiveness against attacking abilities. Based on the results of the analysis in small group trials, it was found that the average choice was 76.67%; this stated that the attack tactics training model had a good category. In the large group trial, the middle option was 86.49%, which noted that the soccer attack tactics training model had a particular type. The soccer attack tactics training model based on the number of players is effective for increasing the ability of football tactics with a significance value of <0.05.
APA, Harvard, Vancouver, ISO, and other styles
34

Zhmayeva, Natalya. "ON THE ISSUE OF TRANSLATION STRATEGIES OF POLITICAL SPEECHES." Naukovy Visnyk of South Ukrainian National Pedagogical University named after K. D. Ushynsky: Linguistic Sciences 2022, no. 34 (July 2022): 28–37. http://dx.doi.org/10.24195/2616-5317-2022-34-3.

Full text
Abstract:
Modern translation studies which are of descriptive nature mainly presuppose the opportunity of altering the function of the source text in translation, reconstruction of sense and structure in correspondence with the aim of translation. The investigation has been carried out in the framework of the communicativefunctional approach to translation which accounts for the entire spectrum of linguistic and extra linguistic factors influencing translation in the broad sense. This fact proves the relevance of the article. The carried out analysis is aimed at determining the inventory of tactics and operations of the translations resulted from applying the strategy of communicatively equivalent translation and the strategy of tertiary translation. The implemented strategies of translation have been actualized by common tactics (the tactic of rendering relevant information, the tactic of rendering stylistic features, the tactic of rendering the source text formal and structural features), each having specific features of realization. Common operations for the applied tactics have proved to be as following: search for an equivalent or a variant equivalent.
APA, Harvard, Vancouver, ISO, and other styles
35

Henningsen, David Dryden, and Mary Lynn Miller Henningsen. "Nuanced Aggression in Group Decision Making." International Journal of Business Communication 57, no. 1 (April 27, 2017): 145–58. http://dx.doi.org/10.1177/2329488417704951.

Full text
Abstract:
Group decision making in organizations represents an opportunity for group members to seek to exert social influence. Whining and bullying are examined as nonrational influence tactics used by individuals in groups. Both tactics are envisioned as forms of aggression, differing across a dominance—submissiveness continuum. The impact of whining and bullying as compliance gaining tactics for organizational group decision making is examined using 234 individuals whose jobs include group decision making in organizations. The use of bullying and whining tactics are positively correlated indicating dominance complementarity, with increases in one tactic being associated with increases in the other. In addition, bullying and whining are found to have negative effects on cohesiveness and group decision-making effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
36

Garrone-Neto, Domingos, and Ivan Sazima. "Stirring, charging, and picking: hunting tactics of potamotrygonid rays in the upper Paraná River." Neotropical Ichthyology 7, no. 1 (March 2009): 113–16. http://dx.doi.org/10.1590/s1679-62252009000100015.

Full text
Abstract:
Hunting tactics of potamotrygonid freshwater rays remain unreported under natural conditions. Three main foraging tactics of Potamotrygon falkneri and P. motoro are described here based on underwater observations in the upper Paraná River. Both species displayed similar behaviors. The most common tactic was to undulate the disc margins close to, or on, the bottom and thus stirring the substrate and uncovering hidden preys. Another tactic was to charge upon prey concentrated in the shallows. The least common tactic was to pick out prey adhered to the substrate. The first tactic is widespread in several species of marine rays in the Dasyatidae, whereas the remainder (especially picking up prey on substrata above water surface) may be restricted to the Potamotrygonidae.
APA, Harvard, Vancouver, ISO, and other styles
37

Wu, Jiarong. "INTERLEAVED TACTICAL TRAINING OF BIG FOOTBALL TEAMS." Revista Brasileira de Medicina do Esporte 28, no. 6 (December 2022): 753–56. http://dx.doi.org/10.1590/1517-8692202228062022_0099.

Full text
Abstract:
ABSTRACT Introduction Tactical football training is significant in teaching great football teams. Analyzing and discussing existing problems and proposals for corresponding countermeasures should be carried out periodically. Objective Investigate and understand the main factors that affect the development of tactical training activities of big football teams. Methods Large-scale soccer match tactics at the 2018 World Cup are evaluated and treated statistically by dividing the defensive behaviors in the game between individual defensive tactics and collective defensive tactics. Results The primary means of launching a fast defensive attack is a medium to long pass across the court. Launching a fast attack requires combining a pass with a sudden attack. Conclusion Attackers often take the initiative in their confrontation tactics. The aggressive style of the players excels in the initiative and midfield advantage. Evidence level II; Therapeutic Studies - Investigating the results.
APA, Harvard, Vancouver, ISO, and other styles
38

Lapierre, Matthew A., and Eunjoo Choi. "Parental awareness of new online advertising techniques targeting children: an exploratory study of American parents." Young Consumers 22, no. 2 (May 20, 2021): 290–305. http://dx.doi.org/10.1108/yc-12-2020-1271.

Full text
Abstract:
Purpose This study aims to examine what parents from across the USA know about online advertising/marketing tactics directed at children, their familiarity with these tactics and what they believe about the appropriateness of using these promotional methods to target children. Design/methodology/approach The online survey company Qualtrics was used to collect data from 500 parents in the USA. Parents had to have at least one child between the ages of 5 and 14 to participate. To ensure socio-economic diversity, half of the participants had an associate degree or more of schooling while the other half of participants had some college or less. Participants were given vignettes describing 11 different online advertising/marketing tactics and were asked how familiar they were with each tactic, whether they could identify the tactic by name, at what age they believed their child could understand the promotional intent of the tactic and the age that they thought it was ethical to use this tactic with children. Findings The results revealed that parents were only moderately familiar with many of these advertising/marketing tactics and had difficulty identifying most of them by name. In addition, parents reported that, on average, most 11-year-old children would understand the purpose of these marketing approaches and that it was ethical to target children with them. Originality/value The results of this exploratory study offer researchers some key insights into how American parents perceive online advertising that targets children.
APA, Harvard, Vancouver, ISO, and other styles
39

McBean, Sam. "Feminist diagrams." Feminist Theory 22, no. 2 (February 23, 2021): 206–25. http://dx.doi.org/10.1177/1464700121997182.

Full text
Abstract:
On 4 January 1971, Ti-Grace Atkinson delivered a talk entitled ‘Strategy and Tactics: A Presentation of Political Lesbianism’. The talk was later published in her collected essays, Amazon Odyssey. The essay contains thirty-five diagrams: ten ‘Strategy Charts’, three ‘Tactical Charts’ and twenty-two ‘Tactical-Strategy Charts’, which map a strategy of the ‘Oppressor’ (men) and the tactics that the ‘Oppressed’ (women) might develop to lead to a revolution – lesbians, significantly, are the ‘Buffer Zone’ between these two classes. In the only reference I have managed to find to these diagrams, they are referred to as ‘crazy’. This article re-visits these diagrams, exploring the role of the diagram in how Atkinson attempts to map patriarchal relations and also imagine a feminist revolution. Taking Atkinson’s diagrams as a starting point, the article then uses them to begin to narrate a genealogy of the diagram in feminist theory, exploring a diagrammatic imaginary that is an often-used but rarely discussed tactic in feminist writing. Finally, the article opens out to consider how this history of feminist diagrams might be a precursor to more contemporary feminist data visualisations.
APA, Harvard, Vancouver, ISO, and other styles
40

Takeshita, Fumio, and Takumi Maekawa. "Paratectonatica tigrina (Gastropoda: Naticidae) adjusts its predation tactics depending on the chosen prey and their shell weight relative to its own." Journal of the Marine Biological Association of the United Kingdom 100, no. 6 (September 2020): 921–26. http://dx.doi.org/10.1017/s0025315420000831.

Full text
Abstract:
AbstractParatectonatica tigrina employs three predatory tactics against bivalve prey: wall-drilling, edge-drilling and non-drilling (suffocation) tactics. In this study, we conducted laboratory experiments to examine the predator–prey interactions between the naticid gastropod P. tigrina and two species of bivalve prey, Ruditapes philippinarum and Meretrix lusoria, and to investigate how predatory tactics differ for the bivalve species. Predation success increased with the shell weight ratio between predator and prey, however, there was no significant difference among prey species. The shell weight ratio significantly differed (P < 0.05) between predatory tactics against R. philippinarum, but not against M. lusoria, implying that P. tigrina determines its predatory tactics based on the shell weight ratio for R. philippinarum. However, we observed that feeding duration was not influenced by shell weight ratio or prey species, even though data were separated for each predatory tactic. These results suggest that there is no difference in feeding efficiency based on shell weight ratio between prey species and between predatory tactics. Paratectonatica tigrina may alter its predatory tactics suitably depending on the prey species and the relative size difference, despite the same feeding efficiency.
APA, Harvard, Vancouver, ISO, and other styles
41

Moss, Jennifer A., and John E. Barbuto. "Machiavellianism's Association with Sources of Motivation and Downward Influence Strategies." Psychological Reports 94, no. 3 (June 2004): 933–43. http://dx.doi.org/10.2466/pr0.94.3.933-943.

Full text
Abstract:
Recent studies have examined the relationship between motivation and influence tactics with mixed results. Barbuto and Scholl found several strong relationships between leaders' sources of motivation and the influence tactics used when influencing subordinates, but replication yielded weaker relationships between motivation and influence tactics. Examinations of moderating variables such as leaders' Machiavellian disposition were suggested as possible explanations for this difference. Several interacting effects between leaders' sources of motivation and Machiavellianism have been proposed as predictors of the influence tactic used. This study tested these relationships and found modest association between motivation sources and influence tactics. Some moderating effects of Machiavellianism on this relationship were evident; however, interpretation is cautioned given poor psychometric properties of the measure. These issues are discussed along with suggestions for research.
APA, Harvard, Vancouver, ISO, and other styles
42

Dai, Zhao. "Complexity Computer Simulation in the Study of the Overall Playing Method of Campus Football." Complexity 2021 (April 23, 2021): 1–9. http://dx.doi.org/10.1155/2021/9920443.

Full text
Abstract:
With the mutual exchange and integration of world football, modern football is in an increasingly comprehensive direction. This research mainly discusses complexity computer simulation in the study of the overall play of campus football. Complexity computer simulation is used to design the background of the simulated football field, and the area is divided according to the size ratio of the actual football field. Then, it uses drawing software to draw the football and player controls. The construction of the knowledge base of this paper is mainly combined with the functional modules of rapid formation and response tactics. In the fast formation function, the required formation can be quickly given through football experience and knowledge rules. In the applied tactics function, for the responsibilities of forwards, midfielders, defenders, and other roles, the tactics implemented are given, including partially coordinated offensive and defensive tactics, personal offensive and defensive tactics, and set-ball tactics. The “holistic play” football tactics studied in this paper use XML files as recording and playback data, which not only greatly reduce the amount of file data but also make the operation of XML files intuitive and simple. XML can not only realize the recording and playback of player and football track but also be used in the function of rapid formation. The coach uses the “holistic play” football tactics simulation to demonstrate the movement route through the image, guide the players in each position to perceive the game scene by observing the movement route, and analyze and judge the tactical coordination of their respective positions. The computer simulation tactical analysis of the precision of the passing and running and the path coefficient of the passing factor is 0.606 and 0.59, respectively. This research helps to provide guidance on the overall playing tactics of football.
APA, Harvard, Vancouver, ISO, and other styles
43

Mubarak, Ahmed Sahib, and Hawraa Jabbar Rahi. "Pragmatic tactics in traffic trials." Linguistics and Culture Review 5, S1 (September 21, 2021): 954–68. http://dx.doi.org/10.21744/lingcure.v5ns1.1480.

Full text
Abstract:
This study aims at finding out the pragmatic tactics employed in the contexts of traffic trials as used by the judge and the defendants and the purposes to which they serve. Based on the data analysis, it is found that there are six pragmatic tactics in contexts of the traffic trials interaction which are felicitousness, effectiveness, maximum efficiency, appropriateness, avoidance of imposition, and maximal options for deniability. The purpose behind the use of these tactics is that a pragmatic tactic is a particular way in which a pragmatic strategy is employed to comply with a particular aim in a particular situation. It can be regarded as the starting step towards achieving a short-term goal using certain pragmatic strategies. Thus, both pragmatic tactics and pragmatic strategies are activated in the contexts of traffic trials.
APA, Harvard, Vancouver, ISO, and other styles
44

Gukosyants, O. Yu, O. A. Alimuradov, and Z. U. Khakiyeva. "Communicative Strategies and Tactics of Trolls-Aggressors in Computer-Mediated Communication during COVID-19 Pandemic." Nauchnyi dialog 11, no. 7 (October 1, 2022): 175–96. http://dx.doi.org/10.24224/2227-1295-2022-11-7-175-196.

Full text
Abstract:
The article considers the aggressive communicative behaviour of a virtual linguistic personality provoking a communication conflict in the virtual space (a troll-aggressor). The data include comments retrieved from LiveJournal posts and Internet memes published during the COVID-19 pandemic. In the course of the analysis, the authors reveal the communicative roles, strategies and tactics of trolls-aggressors. The common strategy of the troll’s aggressive conflict interaction in the indicated time period is the strategy of hostility which is embodied in particular strategies (micro-strategies) of discrediting and attack. It is concluded that discrediting as a micro-strategy can be implemented via a false compliment, the tactic of taunt, the tactic of insult and the tactic of blaming. The micro-strategy of attack is implemented by means of threat and indignation. Particular attention is paid to the description of the markers of the above-listed tactics observed in trolls-aggressors’ communicative behaviour. Enumeration of the tactics used for provoking conflicts in virtual environment made it possible to concretize the typology of trolls-aggressors which has been revealed in the course of empiric data analysis. As a result, the authors present a scheme which reflects the types of trolls, belonging to the general type “troll-aggressor”, and the implemented communicative strategies and tactics within the framework of the common strategy of hostility.
APA, Harvard, Vancouver, ISO, and other styles
45

Hua, Lin, and Guangyu Liu. "Development of Basketball Tactics Basic Cooperation Teaching System Based on CNN and BP Neural Network." Computational Intelligence and Neuroscience 2021 (September 22, 2021): 1–11. http://dx.doi.org/10.1155/2021/9497388.

Full text
Abstract:
The traditional basketball teaching mode cannot meet the needs of students for the basic cooperation of basketball tactics. Therefore, a basic cooperation teaching system of basketball tactics based on artificial neural network is studied and designed. The system has a professional basketball game video tactical learning module. The events in the basketball game video are classified through a convolutional neural network and combined with the explanation of teachers to make the students have an intuitive understanding of the basic cooperation of basketball tactics and then design the basketball game module based on a BP neural network to provide students with an online basketball tactics training platform. Finally, the teacher scores the performance of the actual on-site training students in the basic cooperation of basketball tactics through the tactical scoring module on the system. The results show that after the introduction of global and collective motion patterns, the classification accuracy of the convolutional neural network is improved by 22.48%, which has significant optimization. The average accuracy of basketball game video event classification is 62.35%, and the accuracy of snatch event classification is improved to 95.28%. The recognition rate of the BP neural network combined with momentum gradient descent method is 75%, the number of weight adjustment is less, and the memory is small while ensuring fast running speed. Students who accept the basic basketball tactics cooperation teaching system based on the artificial neural network for basketball teaching have an overall score of 27.99 ± 2.11 points The overall score of exchange defense cooperation was 24.12 ± 2.03, which was higher than that of the control group. The above results show that the basketball tactical basic cooperation teaching system based on the artificial neural network has a good teaching effect in improving students’ basketball tactical basic cooperation ability.
APA, Harvard, Vancouver, ISO, and other styles
46

Beauchamp, G. "Consistency and flexibility in the scrounging behaviour of zebra finches." Canadian Journal of Zoology 79, no. 3 (March 1, 2001): 540–44. http://dx.doi.org/10.1139/z01-008.

Full text
Abstract:
When foraging in groups, individuals can use the "producer" tactic to locate food patches and the "scrounger" tactic to exploit the food discoveries of companions. Most producer–scrounger models assume that birds are flexible in using tactics in response to changing conditions and that foragers are phenotypically identical. Individual differences and flexibility in tactic use were investigated in zebra finches (Taenopygia guttata) foraging in two flocks of different composition. Birds varied widely in their use of tactics, and individual differences proved consistent both within and between flocks. Significant adjustments in tactic use occurred from one flock to the other. Results suggest that tactic use in zebra finches foraging in small flocks is characterized by consistency and flexibility. Individual differences in tactic use demonstrate the need to examine further the consequences of phenotypic variation in producer–scrounger models.
APA, Harvard, Vancouver, ISO, and other styles
47

Wang, Ling. "Construction of Evaluation Model of Tennis Skills and Tactic Level and Application of Grey Relational Algorithm." Journal of Sensors 2022 (April 13, 2022): 1–11. http://dx.doi.org/10.1155/2022/9446175.

Full text
Abstract:
Based on the application characteristics of the world’s elite tennis players’ skills and tactics, this paper establishes the evaluation model of skill and tactic level. According to the principle of normal distribution, taking the overall average as the reference value and the overall standard deviation as the discrete distance, the deviation method commonly used in sports statistics is adopted to formulate the grade evaluation standard. The standard is divided into five evaluation grades: excellent, good, passing, poor, and extremely poor. The equivalent evaluation scale of diagnostic indexes of tennis skill and tactic level is established. It also discusses many factors that characterize the skills and tactics of tennis singles. At the same time, it introduces the grey relational algorithm, constructs the evaluation model of skills and tactic level, and makes an example application. Through experimental analysis, it is concluded that this model can be applied not only to the diagnosis of individual athletes but also to the evaluation of a sports team. This article is aimed at further enriching the analysis system of tennis skills and tactics.
APA, Harvard, Vancouver, ISO, and other styles
48

Goyes, David Rodríguez. "‘Tactics Rebounding’ in the Colombian Defence of Seed Freedom." International Journal for Crime, Justice and Social Democracy 7, no. 1 (March 1, 2018): 91–107. http://dx.doi.org/10.5204/ijcjsd.v7i1.425.

Full text
Abstract:
This article investigates the Red de Semillas Libres de Colombia [Colombian Network of Free Seeds] movement, since its inception to date (2013-2016). The study, developed within the framework of green criminology and with a focus on environmental justice, draws on ethnographic observations of Red de Semillas and semi-structured interviews with group members. I explore processes of repertoire appropriation developed by social movements. The main argument advanced is that the Red de Semillas experienced a case of ‘tactics rebound’, in which tactics deployed at the global level shaped local tactics, bringing a set of problematic consequences. The article starts by summarising key explorations of repertoires of contention and connecting them with framing theory propositions. My interest is to locate processes of tactic appropriation in the context of collective action frames. I situate this theory in a study of the organisation and the tactics it used to elucidate how the concept of ‘collective action frame hierarchies’ can be used to explain instances of ‘tactics rebounding’.
APA, Harvard, Vancouver, ISO, and other styles
49

Wang, Yu, Xiyang Zhang, and Jiebo Luo. "Tactics and Tallies: A Study of the 2016 U.S. Presidential Campaign Using Twitter 'Likes'." Proceedings of the International AAAI Conference on Web and Social Media 11, no. 1 (May 3, 2017): 775–82. http://dx.doi.org/10.1609/icwsm.v11i1.14978.

Full text
Abstract:
We propose a framework to measure, evaluate, and rank campaign effectiveness in the ongoing 2016 U.S. presidential election. Using Twitter data collected from Sept. 2015 to Jan. 2016, we first uncover the tweeting tactics of the candidates and second, using negative binomial regression and exploiting the variations in `likes,' we evaluate the effectiveness of these tactics. Thirdly, we rank the candidates' campaign tactics by calculating the conditional expectation of their generated 'likes.' We show that while Ted Cruz and Marco Rubio put much weight on President Obama, this tactic is not being well received by their supporters. We demonstrate that Hillary Clinton's tactic of linking herself to President Obama resonates well with her supporters but the same is not true for Bernie Sanders. In addition, we show that Donald Trump is a major topic for all the other candidates and that the women issue is equally emphasized in Sanders' campaign as in Clinton's. Finally, we suggest two ways that politicians can use the feedback mechanism in social media to improve their campaign: (1) use feedback from social media to improve campaign tactics within social media; (2) prototype policies and test the public response from the social media.
APA, Harvard, Vancouver, ISO, and other styles
50

Bagui, Sikha S., Dustin Mink, Subhash C. Bagui, and Sakthivel Subramaniam. "Resampling to Classify Rare Attack Tactics in UWF-ZeekData22." Knowledge 4, no. 1 (March 14, 2024): 96–119. http://dx.doi.org/10.3390/knowledge4010006.

Full text
Abstract:
One of the major problems in classifying network attack tactics is the imbalanced nature of data. Typical network datasets have an extremely high percentage of normal or benign traffic and machine learners are skewed toward classes with more data; hence, attack data remain incorrectly classified. This paper addresses the class imbalance problem using resampling techniques on a newly created dataset, UWF-ZeekData22. This is the first dataset with tactic labels, labeled as per the MITRE ATT&CK framework. This dataset contains about half benign data and half attack tactic data, but specific tactics have a meager number of occurrences within the attack tactics. Our objective in this paper was to use resampling techniques to classify two rare tactics, privilege escalation and credential access, never before classified. The study also looks at the order of oversampling and undersampling. Varying resampling ratios were used with oversampling techniques such as BSMOTE and SVM-SMOTE and random undersampling without replacement was used. Based on the results, it can be observed that the order of oversampling and undersampling matters and, in many cases, even an oversampling ratio of 10% of the majority data is enough to obtain the best results.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography