Eric Post
- Published in print:
- 2013
- Published Online:
- October 2017
- ISBN:
- 9780691148472
- eISBN:
- 9781400846139
- Item type:
- chapter
- Publisher:
- Princeton University Press
- DOI:
- 10.23943/princeton/9780691148472.003.0004
- Subject:
- Biology, Ecology
This chapter examines the implications of climate change for population dynamics and stability. Population dynamics, or the variation in abundance of a population through time, can be decomposed into ...
More
This chapter examines the implications of climate change for population dynamics and stability. Population dynamics, or the variation in abundance of a population through time, can be decomposed into two components: density-dependent and density-independent processes. Density-dependent processes are those involving competitive interactions among members of the same species within the same population that influence survival and reproduction. Density-independent processes are those that do not involve interactions with other members of the same species in the same population but rather owe to external factors such as environmental variation. It is this latter set of processes that has relevance to climate change, though density dependence certainly has a role to play in the response of populations to climate change.Less
This chapter examines the implications of climate change for population dynamics and stability. Population dynamics, or the variation in abundance of a population through time, can be decomposed into two components: density-dependent and density-independent processes. Density-dependent processes are those involving competitive interactions among members of the same species within the same population that influence survival and reproduction. Density-independent processes are those that do not involve interactions with other members of the same species in the same population but rather owe to external factors such as environmental variation. It is this latter set of processes that has relevance to climate change, though density dependence certainly has a role to play in the response of populations to climate change.
Jeffrey D. Corbin, Andrew R. Dyer, and Eric W. Seabloom
- Published in print:
- 2007
- Published Online:
- March 2012
- ISBN:
- 9780520252202
- eISBN:
- 9780520933972
- Item type:
- chapter
- Publisher:
- University of California Press
- DOI:
- 10.1525/california/9780520252202.003.0013
- Subject:
- Biology, Plant Sciences and Forestry
This chapter examines competitive interactions in California grasslands, first presenting the major components of grassland communities, including descriptions of their phenology and growth ...
More
This chapter examines competitive interactions in California grasslands, first presenting the major components of grassland communities, including descriptions of their phenology and growth strategies. It then describes how various life-history characteristics affect growth and survival and the interactions between species. Finally, the chapter considers how management strategies can be used to alter competitive interactions to favor native species, including grazing regimes and seed addition.Less
This chapter examines competitive interactions in California grasslands, first presenting the major components of grassland communities, including descriptions of their phenology and growth strategies. It then describes how various life-history characteristics affect growth and survival and the interactions between species. Finally, the chapter considers how management strategies can be used to alter competitive interactions to favor native species, including grazing regimes and seed addition.
Sea-Jin Chang
- Published in print:
- 2013
- Published Online:
- January 2014
- ISBN:
- 9780199687077
- eISBN:
- 9780191766923
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199687077.003.0004
- Subject:
- Business and Management, International Business
Chapter 4 examines competition between foreign multinationals and local firms, which were examined independently in the preceding two chapters. Until the early 1990s, multinational firms entered ...
More
Chapter 4 examines competition between foreign multinationals and local firms, which were examined independently in the preceding two chapters. Until the early 1990s, multinational firms entered high-end markets, while local companies maintained the low end of the market, with little competition between the two. Between 1998 and 2009, some multinationals expanded Chinese operations by localizing production. At the same time, several local firms emerged as serious competitors against multinational competitors. This chapter confirms that the greater relative competitive advantage of multinational firms vis-à-vis local firms corresponds to higher technological complexity and marketing knowhow. For instance, foreign firms’ market share is the highest when marketing knowhow and technological complexity are important. Weak intellectual property rights protection in China, however, poses a great threat to foreign firms. This chapter begins with a case study of China’s telecom industry, which demonstrates a drastic contrast between foreign and local firms by sub-industry.Less
Chapter 4 examines competition between foreign multinationals and local firms, which were examined independently in the preceding two chapters. Until the early 1990s, multinational firms entered high-end markets, while local companies maintained the low end of the market, with little competition between the two. Between 1998 and 2009, some multinationals expanded Chinese operations by localizing production. At the same time, several local firms emerged as serious competitors against multinational competitors. This chapter confirms that the greater relative competitive advantage of multinational firms vis-à-vis local firms corresponds to higher technological complexity and marketing knowhow. For instance, foreign firms’ market share is the highest when marketing knowhow and technological complexity are important. Weak intellectual property rights protection in China, however, poses a great threat to foreign firms. This chapter begins with a case study of China’s telecom industry, which demonstrates a drastic contrast between foreign and local firms by sub-industry.
Michael P. Fischerkeller, Emily O. Goldman, and Richard J. Harknett
- Published in print:
- 2022
- Published Online:
- May 2022
- ISBN:
- 9780197638255
- eISBN:
- 9780197638293
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780197638255.003.0003
- Subject:
- Political Science, International Relations and Politics
Cyberspace is an initiative persistent environment of opportunity and vulnerability wherein States face a structural imperative to persist in seizing and maintaining the initiative to set favorable ...
More
Cyberspace is an initiative persistent environment of opportunity and vulnerability wherein States face a structural imperative to persist in seizing and maintaining the initiative to set favorable security conditions in and through cyberspace. The dominant State security-seeking behavior is exploitation below the level of armed conflict, primarily manifesting in the cyber fait accompli—a limited unilateral gain that is retained when the target is unaware of the loss or is unable or unwilling to respond. A less frequent behavior is direct cyber engagement, a mutually dependent competition for control of key cyberspace terrain, whose prevalence may increase with advances in artificial intelligence. States are strategically incentivized in cyberspace to not breach the armed-attack equivalent ceiling. This produces a dynamic of competitive interaction, not escalation, and the inter-State phenomenon of cyber agreed competition, a tacitly bounded strategic competitive space inclusive of operational restraint and exclusive of operations causing armed-attack equivalent effects.Less
Cyberspace is an initiative persistent environment of opportunity and vulnerability wherein States face a structural imperative to persist in seizing and maintaining the initiative to set favorable security conditions in and through cyberspace. The dominant State security-seeking behavior is exploitation below the level of armed conflict, primarily manifesting in the cyber fait accompli—a limited unilateral gain that is retained when the target is unaware of the loss or is unable or unwilling to respond. A less frequent behavior is direct cyber engagement, a mutually dependent competition for control of key cyberspace terrain, whose prevalence may increase with advances in artificial intelligence. States are strategically incentivized in cyberspace to not breach the armed-attack equivalent ceiling. This produces a dynamic of competitive interaction, not escalation, and the inter-State phenomenon of cyber agreed competition, a tacitly bounded strategic competitive space inclusive of operational restraint and exclusive of operations causing armed-attack equivalent effects.
David R. Schiel and Michael S. Foster
- Published in print:
- 2015
- Published Online:
- January 2016
- ISBN:
- 9780520278868
- eISBN:
- 9780520961098
- Item type:
- chapter
- Publisher:
- University of California Press
- DOI:
- 10.1525/california/9780520278868.003.0008
- Subject:
- Biology, Ecology
This chapter examines the facilitative and competitive interactions in giant kelp communities. Broadly defined, facilitation denotes positive interactions between species where at least one species ...
More
This chapter examines the facilitative and competitive interactions in giant kelp communities. Broadly defined, facilitation denotes positive interactions between species where at least one species benefits and no harm is done to the other. The clearest examples of facilitation in giant kelp forests are the numerous invertebrates that use the fronds and holdfasts of giant kelp as a place to live, a refuge from predators, and perhaps an enhanced food supply in the form of plankton and the small epiphytes on fronds or detritus in holdfasts. On the other hand, competition, a negative interaction, occurs within and between species when individuals require the same resource that is insufficient for all and therefore compromises growth, reproduction, and survival. Within kelp forest patches, the array of species may be partially dictated by intraspecific competition within kelp species. The reduction in understory algae beneath thick canopies suggests that the giant kelp outcompete understory species for light.Less
This chapter examines the facilitative and competitive interactions in giant kelp communities. Broadly defined, facilitation denotes positive interactions between species where at least one species benefits and no harm is done to the other. The clearest examples of facilitation in giant kelp forests are the numerous invertebrates that use the fronds and holdfasts of giant kelp as a place to live, a refuge from predators, and perhaps an enhanced food supply in the form of plankton and the small epiphytes on fronds or detritus in holdfasts. On the other hand, competition, a negative interaction, occurs within and between species when individuals require the same resource that is insufficient for all and therefore compromises growth, reproduction, and survival. Within kelp forest patches, the array of species may be partially dictated by intraspecific competition within kelp species. The reduction in understory algae beneath thick canopies suggests that the giant kelp outcompete understory species for light.
Louise H. Emmons
- Published in print:
- 2000
- Published Online:
- March 2012
- ISBN:
- 9780520222915
- eISBN:
- 9780520925045
- Item type:
- chapter
- Publisher:
- University of California Press
- DOI:
- 10.1525/california/9780520222915.003.0005
- Subject:
- Biology, Animal Biology
This chapter examines the diet and foraging behavior of treeshrews in Malaysia, explaining that the diet of treeshrews was from earliest reports correctly known to consist of fruit and insects. It ...
More
This chapter examines the diet and foraging behavior of treeshrews in Malaysia, explaining that the diet of treeshrews was from earliest reports correctly known to consist of fruit and insects. It describes the nature of fruit- and insect-eating by treeshrews, along with the behavioral characteristics of foraging for each food type, and analyzes the possible relation between diet and morphology. The chapter evaluates the possible competitive interactions that might occur for different food types, both among treeshrew species and among treeshrews and other vertebrates in their community.Less
This chapter examines the diet and foraging behavior of treeshrews in Malaysia, explaining that the diet of treeshrews was from earliest reports correctly known to consist of fruit and insects. It describes the nature of fruit- and insect-eating by treeshrews, along with the behavioral characteristics of foraging for each food type, and analyzes the possible relation between diet and morphology. The chapter evaluates the possible competitive interactions that might occur for different food types, both among treeshrew species and among treeshrews and other vertebrates in their community.
Josh Lerner and Mark Schankerman
- Published in print:
- 2010
- Published Online:
- August 2013
- ISBN:
- 9780262014632
- eISBN:
- 9780262289573
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262014632.003.0006
- Subject:
- Business and Management, Information Technology
This chapter focuses on government policies on computer software. It examines how a government can develop a framework that facilitates the competitive interactions between open source and ...
More
This chapter focuses on government policies on computer software. It examines how a government can develop a framework that facilitates the competitive interactions between open source and proprietary software in a manner that boosts efficiency and innovation. It analyzes arguments for why the government should support open source software and suggests that when it comes to regulation, governments should encourage vigorous competition between open and proprietary software. This chapter also argues that the government should play a lead role in providing information about the features of different types of software to consumers.Less
This chapter focuses on government policies on computer software. It examines how a government can develop a framework that facilitates the competitive interactions between open source and proprietary software in a manner that boosts efficiency and innovation. It analyzes arguments for why the government should support open source software and suggests that when it comes to regulation, governments should encourage vigorous competition between open and proprietary software. This chapter also argues that the government should play a lead role in providing information about the features of different types of software to consumers.
Michael P. Fischerkeller, Emily O. Goldman, and Richard J. Harknett
- Published in print:
- 2022
- Published Online:
- May 2022
- ISBN:
- 9780197638255
- eISBN:
- 9780197638293
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780197638255.003.0004
- Subject:
- Political Science, International Relations and Politics
A multi-method approach comprising quantitative analysis, case studies, unsealed criminal indictments, open source government reporting, and cyber security industry surveys, experiments, and trend ...
More
A multi-method approach comprising quantitative analysis, case studies, unsealed criminal indictments, open source government reporting, and cyber security industry surveys, experiments, and trend reports supports hypotheses derived from cyber persistence theory. States have built cyber infrastructure and employed it to act persistently in and through cyberspace. Exploitation through cyber faits accomplis is the dominant behavior, with illustrative case studies of China’s cyber-enabled intellectual property theft and North Korea’s sanctions circumvention demonstrating the independent strategic significance of this behavior. Direct cyber engagement outside of armed conflict is rare, but not absent. Cyber incidents between States, including rival dyads, display no escalation dynamics. Concerns that open source materials may not be representative of proprietary and classified data are allayed with two counterfactuals that demonstrate the value of cyber persistence theory prescriptions no matter the representativeness of publicly available data.Less
A multi-method approach comprising quantitative analysis, case studies, unsealed criminal indictments, open source government reporting, and cyber security industry surveys, experiments, and trend reports supports hypotheses derived from cyber persistence theory. States have built cyber infrastructure and employed it to act persistently in and through cyberspace. Exploitation through cyber faits accomplis is the dominant behavior, with illustrative case studies of China’s cyber-enabled intellectual property theft and North Korea’s sanctions circumvention demonstrating the independent strategic significance of this behavior. Direct cyber engagement outside of armed conflict is rare, but not absent. Cyber incidents between States, including rival dyads, display no escalation dynamics. Concerns that open source materials may not be representative of proprietary and classified data are allayed with two counterfactuals that demonstrate the value of cyber persistence theory prescriptions no matter the representativeness of publicly available data.