Search results

1 – 10 of 501
Open Access
Article
Publication date: 24 October 2022

Annika Eklund, Sofia Karlsson and Lina Gyllencreutz

Major incidents in tunnel environment will pose several challenges for the emergency service organisations in terms of heat, visibility and lack of experiences from working in…

Abstract

Purpose

Major incidents in tunnel environment will pose several challenges for the emergency service organisations in terms of heat, visibility and lack of experiences from working in confined environments. These aspects, in turn, could pose challenges to establish collaboration. This study aims to contribute to the field of collaborative tunnel responses by exploring how “common knowledge” (Edwards, 2011) is built by the emergency services organisations, that is, what the organisations consider important while working on a potentially common problem, and their motives for the interpretations and actions if a major tunnel incident occurs.

Design/methodology/approach

Participants from the road traffic control centre, emergency dispatch centre, emergency medical service, rescue service and police were included in the study. Data from four focus group sessions was analysed using thematic analysis.

Findings

The study revealed that the tunnel environment presents specific aspects of how common knowledge was produced related to lifesaving and safety. The themes structuring mechanisms to reduce uncertainty, managing information for initial priorities, aligning responsibilities without hampering each other's work and adjusting actions to manage distance, illustrated how common knowledge was produced as crucial aspects to a collaborative response. Organising management sites, grasping and communicating risks, accessing the injury victims, was challenged by the confined environment, physical distances and imbalance in access to information and preparedness activities in tunnel environments.

Originality/value

This study offers new insights of common knowledge, by illustrating a motive perspective on collaborative responses in tunnel incidents. Creating interoperability calls not just for readiness for action and tunnel safety, but also training activities acknowledging different interpretations and motives to further develop tunnel responses.

Details

International Journal of Emergency Services, vol. 12 no. 2
Type: Research Article
ISSN: 2047-0894

Keywords

Open Access
Article
Publication date: 19 October 2023

Pauline van Beusekom – Thoolen, Paul Holmes, Wendy Jansen, Bart Vos and Alie de Boer

This paper aims to explore the interdisciplinary nature of coordination challenges in the logistic response to food safety incidents while distinguishing the food supply chain…

1147

Abstract

Purpose

This paper aims to explore the interdisciplinary nature of coordination challenges in the logistic response to food safety incidents while distinguishing the food supply chain positions involved.

Design/methodology/approach

This adopts an exploratory qualitative research approach over a period of 11 years. Multiple research periods generated 38 semi-structured interviews and 2 focus groups. All data is analysed by a thematic analysis.

Findings

The authors identified four key coordination challenges in the logistics response to food safety incidents: first, information quality (sharing information and the applied technology) appears to be seen as the biggest challenge for the response; second, more emphasis on external coordination focus is required; third, more extensive emphasis is needed on the proactive phase in the logistic response; fourth, a distinct difference exists in the position’s views on coordination in the food supply chain. Furthermore, the data supports the interdisciplinary nature as disciplines such as operations management, strategy and organisation but also food safety and risk management, have to work together to align a rapid response, depending on the incident’s specifics.

Research limitations/implications

The paper shows the need for comprehensively reviewing and elaborating on the research gap in coordination decisions for the logistic response to food safety incidents while using the views of the different supply chain positions. The empirical data indicates the interdisciplinary nature of these coordination decisions, supporting the need for more attention to the interdisciplinary food research agenda. The findings also indicate the need for more attention to organisational learning, and an open and active debate on exploratory qualitative research approaches over a long period of time, as this is not widely used in supply chain management studies.

Practical implications

The results of this paper do not present a managerial blueprint but can be helpful for practitioners dealing with aspects of decision-making by the food supply chain positions. The findings help practitioners to systematically go through all phases of the decision-making process for designing an effective logistic response to food safety incidents. Furthermore, the results provide insight into the distinct differences in views of the supply chain positions on the coordination decision-making process, which is helpful for managers to better understand in what phase(s) and why other positions might make different decisions.

Social implications

The findings add value for the general public, as an effective logistic response contributes to consumer’s trust in food safety by creating more transparency in the decisions made during a food safety incident. As food sources are and will remain essential for human existence, the need to contribute to knowledge related to aspects of food safety is evident because it will be impossible to prevent all food safety incidents.

Originality/value

As the main contribution, this study provides a systematic and interdisciplinary understanding of the coordination decision-making process for the logistic response to food safety incidents while distinguishing the views of the supply chain positions.

Details

Supply Chain Management: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-8546

Keywords

Open Access
Article
Publication date: 7 April 2020

Fatima M. Isiaka, Salihu Abdullahi Audu and Mustafa Ahmed Umar

The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered…

2247

Abstract

Purpose

The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered national economies, enhanced how governments interact with their citizens and how ordinary people connect with friends and family. However, this dependence has equally resulted to a high rise in vulnerability, threat and risk associated with more use of information and communication technology. Cyber-attacks that have the potential to disrupt or damage information system infrastructure are getting more complex with some level of sophistication. Traditional protection of information system infrastructure is no longer sufficient; systems have proven to be immune to failure or incidents. This paper aims to ensure that there is a continuous availability of services through a fail-safe proof.

Design/methodology/approach

MYSQL replication technique was used to develop a model based on three-tier layers using the principle of network interdependency and the replication techniques. Tier 1 depicts a Telecom organization serving as service provider that provides internet service to Tier 2 organization – a Bank; Tier 3 is the financial App that can be used by bank staff and customers. The fail-safe mode integrated mechanism enables Tier 3 to continue to render its services in the event of an attack on Tier 1 such as DDoS without disruption.

Findings

This technique succeeded in mitigating the loss of data if cyber incident occurred or reception of uninterrupted services is countered, which give rise to future master-to-master architecture.

Research limitations/implications

The study conducted is limited to the design and development of a fail-safe system for interdependent networks or systems using MYSQL replication technique.

Originality/value

In an interdependent environment such as the cyberspace, the sectors are interdependent for optimal results. The originality of the work ensures that there is availability of services which is sustained and that data integrity is assured using the fail-safe technique based on MySQL replication method.

Details

International Journal of Crowd Science, vol. 4 no. 2
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Article
Publication date: 11 April 2023

Lina Gyllencreutz, Carl-Pontus Carlsson, Sofia Karlsson and Pia Hedberg

This study describes preparedness of emergency physicians and general practitioners following chemical, radiological and nuclear incidents.

Abstract

Purpose

This study describes preparedness of emergency physicians and general practitioners following chemical, radiological and nuclear incidents.

Design/methodology/approach

Five emergency physicians and six general practitioners were interviewed individually, and data was analysed using qualitative content analysis.

Findings

The study results showed that physicians' preparedness for chemical, radiological and nuclear incidents is linked to one main category: to be an expert and to seek expertise and two categories: preparations before receiving CRN patients, and physical examination and treatment of CRN patients with subcategories.

Research limitations/implications

The results have implications for further research on the complexity of generalist vs specialist competence and knowledge when responding to chemical, radiological and nuclear incidents.

Originality/value

This study provides insights regarding chemical, radiological and nuclear preparedness among physicians at emergency departments and primary healthcare centres.

Details

International Journal of Emergency Services, vol. 12 no. 2
Type: Research Article
ISSN: 2047-0894

Keywords

Open Access
Article
Publication date: 31 May 2022

Bennet Simon von Skarczinski, Arne Dreißigacker and Frank Teuteberg

Literature repeatedly complains about the lack of empirical data on the costs of cyber incidents within organizations. Simultaneously, managers urgently require transparent and…

Abstract

Purpose

Literature repeatedly complains about the lack of empirical data on the costs of cyber incidents within organizations. Simultaneously, managers urgently require transparent and reliable data in order to make well-informed and cost-benefit optimized decisions. The purpose of this paper is to (1) provide managers with differentiated empirical data on costs, and (2) derive an activity plan for organizations, the government and academia to improve the information base on the costs of cyber incidents.

Design/methodology/approach

The authors analyze the benchmark potential of costs within existing literature and conduct a large-scale interview survey with 5,000 German organizations. These costs are directly assignable to the most severe incident within the last 12 months, further categorized into attack types, cost items, employee classes and industry types. Based on previous literature, expert interviews and the empirical results, the authors draft an activity plan containing further research questions and action items.

Findings

The findings indicate that the majority of organizations suffer little to no costs, whereas only a small proportion suffers high costs. However, organizations are not affected equally since prevalence rates and costs according to attack types, employee classes, and other variables tend to vary. Moreover, the findings indicate that board members and IS/IT-managers show partly different response behaviors.

Originality/value

The authors present differentiated insights into the direct costs of cyber incidents, based on the authors' knowledge, this is the largest empirical survey in continental Europe and one of the first surveys providing in-depth cost information on German organizations.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 2 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 23 December 2022

W. Alec Cram and Rissaile Mouajou-Kenfack

The growing frequency of cybersecurity incidents commonly requires organizations to notify customers of ongoing events. However, the content contained within these notifications…

Abstract

Purpose

The growing frequency of cybersecurity incidents commonly requires organizations to notify customers of ongoing events. However, the content contained within these notifications varies widely, including differences in the level of detail, apportioning of blame, compensation and corrective action. This study seeks to identify patterns contained within cybersecurity incident notifications by constructing a typology of organizational responses.

Design/methodology/approach

Based on a detailed review of 1,073 global cybersecurity incidents occurring during 2020, the authors obtained and qualitatively analyzed 451 customer notifications.

Findings

The results reveal three distinct organizational response types associated with the level of detail contained within the notification (full transparency, guarded and opacity), as well as three response types associated with the benefitting party (customer interest, balanced interest and company interest).

Originality/value

This work extends past classifications of cybersecurity incident notifications and provides a template of possible notification approaches that could be adopted by organizations.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 28 March 2024

Juan A. Nel and Zindi Venter

This paper aims to provide an overview of South African perspectives on preventing, monitoring and combating hate victimisation, towards informing international understandings.

Abstract

Purpose

This paper aims to provide an overview of South African perspectives on preventing, monitoring and combating hate victimisation, towards informing international understandings.

Design/methodology/approach

Using a general review approach, this paper provides a historical examination of measures proposed by the South African Government and civil society since 1994, to prevent, monitor and combat hate crime, hate speech and intentional unfair discrimination.

Findings

Regardless of a constitutional commitment to social inclusion, diversity and minority rights, significant progress remains lacking after almost three decades of related advocacy, lobbying and limited government intervention. Findings of the South African Hate Crimes Working Group (HCWG) longitudinal Monitoring Project emphasise the need for decisive legal responses to hate victimisation.

Social implications

A Bill, recognising hate crime and hate speech as distinct criminal offences, has been in development for almost 15 years and will soon serve before Parliament. Enactment of this legislation will be ground-breaking in Africa.

Originality/value

This paper contributes to the field of hate studies by providing an overview of the journey towards current conceptual understandings of hate in (South) Africa. It sets the stage for evaluating the potential of the redesigned HCWG monitoring tool, which holds promise for early identification and intervention in hate hotspots and targeted sectors. This instrument can establish trends not only in South Africa but also across the African continent.

Open Access
Article
Publication date: 7 November 2023

Darrell Norman Burrell

This case study paper aims to explore the complexities and challenges of epidemic response and public health surveillance in Native American and Indigenous American communities…

Abstract

Purpose

This case study paper aims to explore the complexities and challenges of epidemic response and public health surveillance in Native American and Indigenous American communities in the United States and find viable solutions. This paper explores these topics through the emergence and impact of the hantavirus pulmonary syndrome (HPS) within the Navajo Nation in the United States using critical incident analysis and best practices.

Design/methodology/approach

This project is a case study paper based on a topical review of the literature. A topical review of the literature is a comprehensive exploration of the current body of knowledge within a particular research field. It is an important tool used by scholars and practitioners to further the development of existing knowledge as well as to identify potential directions for future research (Fourie, 2020). Such a paper can provide a useful insight into the various aspects of the process that the researcher may have overlooked, as well as highlighting potential areas of improvement (Gall et al., 2020). It can also provide a useful source of ideas and inspiration for the researcher as it can provide an overview of the various approaches used by other researchers in the field (Göpferich, 2009). Case study papers using a topical review of the literature have been used to help frame and inform research topics, problems and best practices for some time. They are typically used to explore a topic in greater depth and to provide an overview of the literature to improve the world of practice to provide a foundation for future comprehensive empirical research. Case study papers can provide research value by helping to identify gaps in the literature and by providing a general direction for further research. They can also be used to provide a starting point for research questions and hypotheses and to help identify potential areas of inquiry.

Findings

This study explores best practices in public health surveillance and epidemic response that can help strengthen public health infrastructure by informing the development of effective surveillance systems and emergency response plans, as well as improving data collection and analysis capabilities within Native American and Indigenous American communities in the United States that also have the option to include new technologies like artificial intelligence (AI) with similar outbreaks in the future.

Research limitations/implications

The literature review did not include any primary data collection, so the existing available research may have limited the findings. The scope of the study was limited to published literature, which may not have reported all relevant findings. For example, unpublished studies, field studies and industry reports may have provided additional insights not included in the literature review. This research has significant value based on the limited amount of studies on how infectious diseases can severely impact Native American communities in the United States, leading to unnecessary and preventable suffering and death. As a result, research on viable best practices is needed on the best practices in public health surveillance and epidemic response in Native American and Indigenous American communities through historical events and critical incident analysis.

Practical implications

Research on public health surveillance and epidemic response in Native American communities can provide insights into the challenges faced by these communities and help identify potential solutions to improve their capacity to detect, respond to and prevent infectious diseases using innovative approaches and new technologies like AI.

Originality/value

More research on public health surveillance and epidemic response can inform policies and interventions to improve access to healthcare for Native American populations, such as increasing availability of healthcare services, providing culturally appropriate health education and improving communication between providers and patients. By providing better public health surveillance and response capacity, research can help reduce the burden of infectious diseases in Native American communities and ultimately lead to improved public health outcomes.

Details

Arab Gulf Journal of Scientific Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1985-9899

Keywords

Open Access
Article
Publication date: 26 April 2023

Kim Janssens, Cees J. Gelderman and Jordy Petersen

The main purpose of this research is exploring the tipping points for a radical shift in supplier (dis)satisfaction. This study identifies triggers and links them to consequences…

Abstract

Purpose

The main purpose of this research is exploring the tipping points for a radical shift in supplier (dis)satisfaction. This study identifies triggers and links them to consequences for the buyer–supplier relationship.

Design/methodology/approach

The Critical Incident Technique (CIT) was used to interview Dutch supplier representatives in the infrastructure sector, resulting in rich descriptions of 29 critical incidents, extracting first-hand information.

Findings

Safety issues, technical disputes and recruitment of supplier’s technical staff have been identified as tipping points for suppliers to become dissatisfied. Implementing performance-based contracting is another critical incident that caused irritation and disappointment. On a more operational level, dissatisfaction was provoked by tender errors and price discussions with the buyer. This study also identified tipping points by which dissatisfied suppliers abruptly turned into satisfied suppliers. The effect of a solution-oriented buyer intervention appears to be most powerful if this behaviour transcends prior expectations.

Practical implications

Consequences of misunderstandings and discussion between supplier and buyer may be manageable or repairable, depending on the causes and triggers that influenced a supplier’s dissatisfaction. An early warning system could prove its worth, so that buyers are not faced with unpleasant surprises.

Originality/value

Despite the growing number of studies, processes of how antecedents lead to supplier (dis)satisfaction are not well understood. Antecedents are predominantly investigated by cross-sectional survey data, giving little insights into micro-processes and actual interaction between buyers and suppliers. Although CIT has been applied in many disciplines, the technique is hardly used within the context of purchasing and supply management research.

Details

Journal of Business & Industrial Marketing, vol. 38 no. 13
Type: Research Article
ISSN: 0885-8624

Keywords

Open Access
Article
Publication date: 15 June 2021

Sarandis Mitropoulos, Christos Mitsis, Petros Valacheas and Christos Douligeris

The purpose of this paper is to investigate the way technology affects the provision of prehospital emergency care, upgrading the quality of services offered and significantly…

2498

Abstract

Purpose

The purpose of this paper is to investigate the way technology affects the provision of prehospital emergency care, upgrading the quality of services offered and significantly reducing the risk of premature termination of the patients.

Design/methodology/approach

The paper presents the development of the eEKAB, a pilot emergency medical information system that simulates the main services offered by the Greek National Instant Aid Centre (EKAB). The eEKAB was developed on an agile system methodology. From a technical perspective, the features and the technology were mainly chosen to provide reliable and user-friendly interfaces that will attract many users. eEKAB is based on three important pillars for offering health care to the patients: the “On-time Incident Reporting”, the “On-time Arrival at the Incident” and “Transfer to the Health Center”. According to the literature review, the emergency medical services (EMS) systems that combine all the features are very few.

Findings

It reduces the total time of the EMS procedures and it allows for an easier management of EMS, by providing a better allocation of human resources and a better geographical distribution of ambulances. The evaluation displayed that it is a very helpful application for the ambulance drivers as it reduces the ambulance response time to arrive in the patient's location and contributes significantly to the general performance of the prehospital medical care system. Also, the survey verified the importance of implementing eEKAB on a larger scale beyond the pilot usage. It is worth mentioning that the younger ambulance drivers had a more positive view for the purpose of the application.

Research limitations/implications

The paper clearly identifies implications for further research. Regarding interoperability, the mobile app cooperates with the Operational Center of EKAB, while further collaboration could be achieved with other operational ambulance handling center, mainly, of the private sector. The system can evolve to include better communications among the EKAB departments. Particularly, the ambulance crew as well as the doctors should be informed with more incident features such as the emergency signal so that they know whether to open the siren, the patient's name, etc. The authors are currently working on implementing some features to provide effective medical health services to the patient in the ambulance.

Practical implications

eEKAB will have very significant implications in case of its enforcement, such as the reduction of the total time of EMS procedures with a corresponding reduction of the operating costs of an accident management system and an ambulance fleet handling system while in parallel informing in time the doctors/clinics. It will provide better distribution of ambulances as well as of total human resources. It will greatly assist ambulance drivers, while reducing ambulance response time to reach the patient's location. In other words, the authors will have a better performance of the whole prehospital care system.

Social implications

Providing emergency care before the hospital is of great importance for upgrading the quality of health services provided at the accident site, thus significantly reducing the risk of premature death of patients. This in itself has a significant social implication.

Originality/value

The paper demonstrates a solid understanding in the field of the EMS systems and the corresponding medical services offered. It proposes the development of an effective, feasible and innovative EMS information system that will improve the existing emergency health care system in Greece (EKAB). An in depth literature review and presentation of the adopted new technologies and the respective architecture take place. An evaluation and statistical validation were conducted for proving the high applicability of eEKAB in case of real-life running.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

1 – 10 of 501