Search results

1 – 10 of over 3000
Article
Publication date: 28 October 2020

Takahiro Nishimura

Since 1974, Japan's total fertility rate has been constantly below replacement level. The purpose of this paper is to focus on Japan's low fertility issue and countermeasures that…

Abstract

Purpose

Since 1974, Japan's total fertility rate has been constantly below replacement level. The purpose of this paper is to focus on Japan's low fertility issue and countermeasures that were adopted, in order to explore the reasons why the countermeasures were unable to solve the problem?

Design/methodology/approach

The paper analyzes both the historical changes and the current situation of Japan's countermeasures. It also focuses on how in Japan marriage behavior and couples' fertility behavior changed during the implementation of the countermeasures from both objective and subjective perspectives. Based on results of the analysis, the paper explores the inherent problems regarding the countermeasures.

Findings

The paper shows that there is no sign that Japan's low fertility could be overcome, and puts forward three problems regarding the countermeasures. The paper suggests paying greater attention to the contradictions in the current policies and to go beyond the field of family policy and population policy to consider the following questions from a more macro perspective: (1) how to make fertility more desirable and meaningful and (2) how to encourage the related social systems to promote people's spontaneity both in marriage and childbearing.

Originality/value

The paper uses the latest data and focuses on analyzing the countermeasures from a more macro perspective rather than discussing specific problems of the countermeasures. Based on both objective data and subjective views and, given the characteristics of Japanese society, the paper explores in depth the problems regarding the countermeasures. By improving empirical knowledge, the paper seeks to contribute more generally to low fertility countries' “fertility revival”.

Details

Asian Education and Development Studies, vol. 11 no. 1
Type: Research Article
ISSN: 2046-3162

Keywords

Article
Publication date: 23 November 2012

Haizhe Jin, Masahiko Munechika, Masataka Sano and Chisato Kajihara

In order to improve working methods, this study proposes a method for the analysis of medication incidents and the systematic planning of error‐proofing (EP) countermeasures, in…

154

Abstract

Purpose

In order to improve working methods, this study proposes a method for the analysis of medication incidents and the systematic planning of error‐proofing (EP) countermeasures, in the hope that it might contribute to a reduction in medication incidents.

Design/methodology/approach

In order to simplify the process of planning EP countermeasures, the following approaches are employed in this study. Improvement elements are extracted in order to plan EP countermeasures. The improvement elements that caused the error‐factor are called improvement objects, and the authors designed the extraction set of improvement objects. The authors correlated the improvement objects with recommended EP solutions. Finally, these parameters are collated. Moreover, these tools are summarized as a procedure for analysis of such incidents and for the creation of appropriate EP countermeasures.

Findings

Using this approach, this paper suggests four steps to reduce medical incidents. The proposed procedure can facilitate the planning of EP countermeasures and can reduce the rate of medical incidents.

Research limitations/implications

It can be surmised that the proposed method can serve as a useful means for planning EP countermeasures and reducing the number of medication incidents. On the other hand, there are various countermeasures which can be planned for one incident by applying the proposed method.

Originality/value

The relationship between Error factors and improvement objects were then clarified through utilizing maps. Furthermore, a list that clearly indicates which EP solutions should be adopted for the improvement objects were suggested. There is, therefore, a significant difference between the proposed and the conventional method, and this makes it possible to plan the EP countermeasures easily.

Details

International Journal of Quality and Service Sciences, vol. 4 no. 4
Type: Research Article
ISSN: 1756-669X

Keywords

Article
Publication date: 3 May 2018

Hashim Zameer, Ying Wang, Humaira Yasmeen, Amirhossein Akhavan Mofrad and Rashid Saeed

The purpose of this paper is to design a game theory based model that not only provide theoretical basis to control brand counterfeiting, but it also provide a mechanism to…

Abstract

Purpose

The purpose of this paper is to design a game theory based model that not only provide theoretical basis to control brand counterfeiting, but it also provide a mechanism to enhance brand revenue.

Design/methodology/approach

This study used the dynamic game theory of incomplete information to understand and encounter the brand counterfeiting issues. The study analyzed the economic relationship of legitimate brand, counterfeiter and consumers using mixed strategy of the dynamic game theory of incomplete information.

Findings

The results have indicated that brands those take countermeasures to reduce counterfeiting earn maximum revenue, even when the legitimate brands and consumers are unaware from the actions of counterfeiting firms, the legitimate brands should take countermeasures to reduce counterfeiting to earn maximum revenue, and there exists optimal anti-counterfeiting cost for the legitimate brand. Further, this study provides theoretical basis where brand managers can decide to adopt or not to adopt anti-counterfeiting strategy, and also indicate the consequences of each decision.

Practical implications

Based upon the findings, the study put forward valuable managerial implications. The study revealed that the legitimate brand must emphasize on the significance of taking countermeasures against counterfeiter and also, brand managers should focus on making product traceable, empowering the consumer and ensuring coordination with government officials to control the counterfeiting issues.

Originality/value

This paper incorporates the role of legitimate brand, counterfeiter and a consumer to establish the dynamic game theory model using mixed strategy to understand and address the counterfeiting issues in the global market.

Details

Marketing Intelligence & Planning, vol. 36 no. 5
Type: Research Article
ISSN: 0263-4503

Keywords

Article
Publication date: 7 October 2013

Karin Hedström, Fredrik Karlsson and Ella Kolkowska

Employees' compliance with information security policies is considered an essential component of information security management. The research aims to illustrate the usefulness of…

1434

Abstract

Purpose

Employees' compliance with information security policies is considered an essential component of information security management. The research aims to illustrate the usefulness of social action theory (SAT) for management of information security.

Design/methodology/approach

This research was carried out as a longitudinal case study at a Swedish hospital. Data were collected using a combination of interviews, information security documents, and observations. Data were analysed using a combination of a value-based compliance model and the taxonomy laid out in SAT to determine user rationality.

Findings

The paper argues that management of information security and design of countermeasures should be based on an understanding of users' rationale covering both intentional and unintentional non-compliance. The findings are presented in propositions with practical and theoretical implications: P1. Employees' non-compliance is predominantly based on means-end calculations and based on a practical rationality, P2. An information security investigation of employees' rationality should not be based on an a priori assumption about user intent, P3. Information security management and choice of countermeasures should be based on an understanding of the use rationale, and P4. Countermeasures should target intentional as well as unintentional non-compliance.

Originality/value

This work is an extension of Hedström et al. arguing for the importance of addressing user rationale for successful management of information security. The presented propositions can form a basis for information security management, making the objectives underlying the study presented in Hedström et al. more clear.

Details

Information Management & Computer Security, vol. 21 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 3 June 2019

Erik Bergström, Martin Lundgren and Åsa Ericson

The study aims to revisit six previously defined challenges in information security risk management to provide insights into new challenges based on current practices.

1429

Abstract

Purpose

The study aims to revisit six previously defined challenges in information security risk management to provide insights into new challenges based on current practices.

Design/methodology/approach

The study is based on an empirical study consisting of in-depth interviews with representatives from public sector organisations. The data were analysed by applying a practice-based view, i.e. the lens of knowing (or knowings). The results were validated by an expert panel.

Findings

Managerial and organisational concerns that go beyond a technical perspective have been found, which affect the ongoing social build-up of knowledge in everyday information security work..

Research limitations/implications

The study has delimitation as it consists of data from four public sector organisations, i.e. statistical analyses have not been in focus, while implying a better understanding of what and why certain actions are practised in their security work.

Practical implications

The new challenges that have been identified offer a refined set of actionable advice to practitioners, which, for example, can support cost-efficient decisions and avoid unnecessary security trade-offs.

Originality/value

Information security is increasingly relevant for organisations, yet little is still known about how related risks are handled in practice. Recent studies have indicated a gap between the espoused and the actual actions. Insights from actual, situated enactment of practice can advise on process adaption and suggest more fit approaches.

Details

Information & Computer Security, vol. 27 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 12 November 2018

Stefan Fenz and Thomas Neubauer

The purpose of this paper is to provide a method to formalize information security control descriptions and a decision support system increasing the automation level and…

3674

Abstract

Purpose

The purpose of this paper is to provide a method to formalize information security control descriptions and a decision support system increasing the automation level and, therefore, the cost efficiency of the information security compliance checking process. The authors advanced the state-of-the-art by developing and applying the method to ISO 27002 information security controls and by developing a semantic decision support system.

Design/methodology/approach

The research has been conducted under design science principles. The formalized information security controls were used in a compliance/risk management decision support system which has been evaluated with experts and end-users in real-world environments.

Findings

There are different ways of obtaining compliance to information security standards. For example, by implementing countermeasures of different quality depending on the protection needs of the organization. The authors developed decision support mechanisms which use the formal control descriptions as input to support the decision-maker at identifying the most appropriate countermeasure strategy based on cost and risk reduction potential.

Originality/value

Formalizing and mapping the ISO 27002 controls to the security ontology enabled the authors to automatically determine the compliance status and organization-wide risk-level based on the formal control descriptions and the modelled environment, including organizational structures, IT infrastructure, available countermeasures, etc. Furthermore, it allowed them to automatically determine which countermeasures are missing to ensure compliance and to decrease the risk to an acceptable level.

Details

Information & Computer Security, vol. 26 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Abstract

Details

Traffic Safety and Human Behavior
Type: Book
ISBN: 978-1-78635-222-4

Open Access
Article
Publication date: 2 February 2024

Sara Rogerson, Martin Svanberg, Ceren Altuntas Vural, Sönke von Wieding and Johan Woxenius

Severe disruptions to maritime supply chains, including port closures, congestion and shortages in shipping capacity, have occurred during the COVID-19 pandemic. This paper’s…

Abstract

Purpose

Severe disruptions to maritime supply chains, including port closures, congestion and shortages in shipping capacity, have occurred during the COVID-19 pandemic. This paper’s purpose is to explore flexibility-based countermeasures that enable actors in maritime supply chains to mitigate the effects of disruptions with different characteristics.

Design/methodology/approach

Semi-structured interviews were conducted with shipping lines, shippers, forwarders and ports. Data on the COVID-19 pandemic's effects and countermeasures were collected and compared with data regarding the 2016–2017 Gothenburg port conflict.

Findings

Spatial, capacity, service and temporal flexibility emerged as the primary countermeasures, whilst important characteristics of disruptions were geographical spread, duration, uncertainty, criticality, the element of surprise and intensity. Spatial flexibility was exercised in both disruptions by switching to alternative ports. During the COVID-19 pandemic, ensuring capacity flexibility included first removing and then adding vessels. Shipping lines exercising service flexibility prioritised certain cargo, which made the spot market uncertain and reduced flexibility for forwarders, importers and exporters that changed carriers or traffic modes. Experience with disruptions meant less surprise and better preparation for spatial flexibility.

Practical implications

Understanding how actors in maritime supply chains exercise flexibility-based countermeasures amid disruptions with different characteristics can support preparedness for coming disruptions.

Originality/value

Comparing flexibility-based measures in a pandemic versus port conflict provides insights into the important characteristics of disruptions and the relevance of mitigation strategies. The resilience of maritime supply chains, although underexamined compared with manufacturing supply chains, is essential for maintaining global supply chain flows.

Details

International Journal of Physical Distribution & Logistics Management, vol. 54 no. 2
Type: Research Article
ISSN: 0960-0035

Keywords

Article
Publication date: 31 August 2023

Mohamed Abadi, Jieling Huang, Jillian Yeow, Saeed Reza Mohandes and Lihong Zhang

The development of circular construction supply chains (CCSCs) is impeded by various barriers, but the current literature overlooks the interrelationships among these barriers and…

Abstract

Purpose

The development of circular construction supply chains (CCSCs) is impeded by various barriers, but the current literature overlooks the interrelationships among these barriers and the varying nature of associated countermeasures with the growth of circular economy (CE). This paper aims to develop new perspectives about the transition to CCSCs through the lens of supply-push (SP)/demand-pull (DP) strategies and related underpinning theories.

Design/methodology/approach

A systematic literature review including 136 journal articles was undertaken to identify barriers to CCSCs and associated countermeasures that are analysed for their relevance to SP/DP. The interplay between SP/DP approaches was discussed using the “technology acceptance” and “innovation chain” models.

Findings

(1) Thirty-five barriers were identified and organised into nine main barrier factors; (2) the predominant factors are knowledge and awareness, policy and regulations, technological capabilities, and incentives; (3) CCSCs transition is SP-configured primarily driven by actors above the project network; (4) “push” measures are devised to gradually create a “pull” environment and can be revoked when demand for circularity is created, suggesting a new “push-to-pull” perspective of CCSCs; and (5) a complex adaptative system is witnessed in relationships between barriers and countermeasures, and interactions among actors at all levels.

Practical implications

The findings offer practitioners countermeasures to barriers encountered in CE initiatives. It also informs policymakers of adjusting policies to accommodate the SP-DP movement in steering the circular transition.

Originality/value

This study uses theoretical models to interpret the dynamics in CCSCs transition and proposes a new definition of CCSCs highlighting their complex and dual transitional/transformational nature.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Open Access
Article
Publication date: 12 July 2021

Thomas Jones and Minh-Hoang Nguyen

Different countries have responded to the pandemic with distinct domestic and international travel restrictions. The purpose of this paper is to investigate the stringency of the…

1510

Abstract

Purpose

Different countries have responded to the pandemic with distinct domestic and international travel restrictions. The purpose of this paper is to investigate the stringency of the coronavirus disease 2019 (COVID-19) countermeasures in Japan against their G20 cohorts. Primary data were monitored at a ski resort in Kyushu regarding the social acceptance of initial COVID-19 countermeasures, ranging from hygiene and local “lockdowns” to border control measures.

Design/methodology/approach

The stringency of the COVID-19 countermeasures was examined using data from the Oxford COVID-19 Government Response Tracker (OxCGRT) and triangulated with the early stage social acceptance of survey respondents in Aso Kuju National Park in February 2020 that consisted of 165 valid Japanese language questionnaires.

Findings

An one-way analysis of variance (ANOVA) identified significant differences in social acceptance for countermeasures, with more-concerned respondents agreeing more strongly with “low-tech” health protocols, such as washing hands (M = 3.7) or wearing a mask (3.4). More concerned visitors were significantly more likely to modify their travel plans (2.9) or cancel their trip altogether (2.7). Male day trippers were less likely to be concerned by the COVID-19 pandemic.

Originality/value

This paper's originality is derived from a triangulation of the stringency of Japan's initial COVID-19 countermeasures via a combination of comparison with G20 cohorts and social acceptance of domestic snowboarders and skiers. Moreover, by shining a light on the trade-off between public health and human rights, the paper provides a current review of the ethical dimension of a travel restriction debate that is often overlooked in the ongoing pandemic.

1 – 10 of over 3000