Search results

1 – 10 of 187
Open Access
Article
Publication date: 16 April 2018

Shadrack Katuu

A healthcare system in any country is rarely the product of one logical policy-making experience, but rather a manifestation of many years of historical development. The purpose…

18226

Abstract

Purpose

A healthcare system in any country is rarely the product of one logical policy-making experience, but rather a manifestation of many years of historical development. The purpose of this paper is to examine the characteristics, components, and variables of South Africa’s healthcare system in the context of global patterns. It leverages a dynamic period in South Africa since 1994, and applies a comparative health systems analysis to explain where the country’s healthcare system is, and where it is potentially going.

Design/methodology/approach

This paper reviews literature related to South Africa’s healthcare system, outlines its historical development, and discusses three fundamental challenges experienced in the country. This paper also reviews the literature on healthcare system typologies and identifies three framework models that have been used to categorise national healthcare systems since the 1970s. This paper then discusses the categorisation of South Africa’s healthcare system in these models, in comparison to Canada and the USA.

Findings

This paper finds that the framework models are useful tools for comparative analysis of healthcare systems. However, any use of such typologies should be done with the awareness that national healthcare systems are not isolated entities because they function within a larger context. They are not static, since they are constantly evolving with many nuances, even with very similar healthcare system categorisations.

Originality/value

This paper charts the trajectory of change in the South African healthcare system, and demonstrates that the change process must keep internal conditions in mind if the outcome is to be successful. Imitating policies of countries with well-functioning systems, without regard to local realities, may not work, as the government attempts to usher in changes within a short span of time.

Details

International Journal of Health Governance, vol. 23 no. 2
Type: Research Article
ISSN: 2059-4631

Keywords

Open Access
Article
Publication date: 29 May 2023

Jane Lu Hsu and Pankaj Sharma

The increasing frequency and intensity of the extreme weather events could cause devastating consequences in tourism. Climate change–related extreme weather events and their…

3153

Abstract

Purpose

The increasing frequency and intensity of the extreme weather events could cause devastating consequences in tourism. Climate change–related extreme weather events and their relation to tourism is an emerging field for education and research. The purpose of this study is to categorize the impact of climate change on tourist destinations with regard to extreme weather-related risks in outdoor recreation and tourism. Managerial implications for policymakers and stakeholders are discussed.

Design/methodology/approach

To outline the risks from climate change associated with tourism, this study uses the Prisma analysis for identification, screening, checking for eligibility and finding relevant literature for further categorization.

Findings

Based on a thoroughly examination of relevant literature, risks and threats posed by climate change could be categorized into following four areas: reduced experiential value in outdoor winter recreation; reduced value in beach scenery and comfort; land degradation and reduced biodiversity; and reduced value in personal safety and comfort in tourism. It also focuses on the significance of using big data applications in catastrophic disaster management and risk reduction. Recommendations with technology and data analytics to continuously improve the disaster management process in tourism education are provided based on findings of this study.

Originality/value

Primary contributions of this study include the following: providing a summarized overview of the risks associated with climate change in terms of tourist experiential value for educational implications; and revealing the role of data analytics in disaster management in the context of tourism and climate change for tourism education.

Details

International Journal of Climate Change Strategies and Management, vol. 15 no. 5
Type: Research Article
ISSN: 1756-8692

Keywords

Open Access
Article
Publication date: 2 February 2023

Chiara Bertolin and Elena Sesana

The overall objective of this study is envisaged to provide decision makers with actionable insights and access to multi-risk maps for the most in-danger stave churches (SCs…

1183

Abstract

Purpose

The overall objective of this study is envisaged to provide decision makers with actionable insights and access to multi-risk maps for the most in-danger stave churches (SCs) among the existing 28 churches at high spatial resolution to better understand, reduce and mitigate single- and multi-risk. In addition, the present contribution aims to provide decision makers with some information to face the exacerbation of the risk caused by the expected climate change.

Design/methodology/approach

Material and data collection started with the consultation of the available literature related to: (1) SCs' conservation status, (2) available methodologies suitable in multi-hazard approach and (3) vulnerability leading indicators to consider when dealing with the impact of natural hazards specifically on immovable cultural heritage.

Findings

The paper contributes to a better understanding of place-based vulnerability with local mapping dimension also considering future threats posed by climate change. The results highlight the danger at which the SCs of Røldal, in case of floods, and of Ringebu, Torpo and Øye, in case of landslide, may face and stress the urgency of increasing awareness and preparedness on these potential hazards.

Originality/value

The contribution for the first time aims to homogeneously collect and report all together existing spread information on architectural features, conservation status and geographical attributes for the whole group of SCs by accompanying this information with as much as possible complete 2D sections collection from existing drawings and novel 3D drawn sketches created for this contribution. Then the paper contributes to a better understanding of place-based vulnerability with local mapping dimension also considering future threats posed by climate change. Then it highlights the danger of floods and landslides at which the 28 SCs are subjected. Finally it reports how these risks will change under the ongoing impact of climate change.

Details

International Journal of Building Pathology and Adaptation, vol. 42 no. 1
Type: Research Article
ISSN: 2398-4708

Keywords

Content available
Article
Publication date: 22 December 2020

Kambiz Mokhtari, Noorul Shaiful Fitri Abdul Rahman, Hamid Reza Soltani, Salim Ahmed Al Rashdi and Kawkab Abdul Aziz Mohammed Al Balushi

At the substantive level, there exists a gap in knowledge about the position of security risk management (i.e. SRM) during the terminals’ operations and management; particularly…

1374

Abstract

Purpose

At the substantive level, there exists a gap in knowledge about the position of security risk management (i.e. SRM) during the terminals’ operations and management; particularly when there is potential for deliberate anti-security acts. Correspondingly, the purpose of this paper is a need for more practical research to find out the justification for the existence of the SRM and different techniques for its appropriate execution on these logistics infrastructures principally with due regard to the potential requirements in the near future.

Design/methodology/approach

Both qualitative and quantitative techniques are used in this study incorporating fuzzy set theory and risk assessment matrix to achieve the research objective.

Findings

A designed SRM framework tailored for Qalhat liquefied petroleum gas (LNG) terminal in Sultanate of Oman was established to manage the security threats which can be resulted from any probable terrorist attacks.

Research limitations/implications

The limited numbers of experts for the purpose of the addressed SRM are causing challenges in data collection.

Practical implications

The pressures for enhanced attention to critical infrastructure security have fostered new challenges for petrochemical seaports and terminals (PSTs). These tendencies dictate to maintain comprehensive security regimens that can be integrated with national and international strategies to support the country’s security against terrorism.

Originality/value

The development of the security risk factor table model in the case of Qalhat LNG Terminal.

Open Access
Article
Publication date: 16 November 2021

Jackson Sekasi and Habeeb Solihu

Railway-level crossings (RLCs) are the point of intersection between rail and road users and are therefore hotpots of road-rail user conflict and catastrophic collisions. The…

2298

Abstract

Purpose

Railway-level crossings (RLCs) are the point of intersection between rail and road users and are therefore hotpots of road-rail user conflict and catastrophic collisions. The purpose of this study is to assess the risks associated with RLCs and suggest probable reduction measures. Through questionnaires and visual inspection, the authors identify the safety risks, hazards and hazardous events at some railway crossing of Addis Ababa light rail transit (AA-LRT) north-south (N-S) route. The identified risky events are then categorized based on As Low As Reasonably Practicable (ALARP) principle and generic risk ranking matrix. The authors then examine existing safety management measures at railway crossing and assess the need for additional safety management. Five major crossings on the 16.9 km (10.5 mi) N-S line, starting from Menelik II Square to Kality, were considered for the study. This study is carried out by data collection from about 145 stakeholders and the application of statistical data and risk analysis methods. The major findings of this study and the recommendations for improvement are suggested.

Design/methodology/approach

The research followed a case study approach. Through questionnaires and visual inspection, the authors identify the safety risks, hazards and hazardous events at some railway crossing of AA-LRT N-S route. The identified risky events are then categorized based on ALARP principle and generic risk ranking matrix. Collected data was then analyzed using SPSS to deduce relationships.

Findings

The study findings reveal human factors as the greatest cause of accidents, injury or death. About 22% of hazards identified by category are human factors, whereas 20% are because of technical problems. Intolerable risks stand at 42%, whereas the tolerable risks are at 36% according to risk classification results as per the ALARP model. Because the process of risk management is a long-term cycle, its importance should not be missed at any time.

Research limitations/implications

Because of design considerations of RLCs and the difference in generalized human behaviors for people of a given region, the results are limited to AA-LRT RLCs. This study opens a discourse for detailed evaluations, qualitative and quantitative analysis into the categorized identified hazards. There is also room for additional research into the performance of RLCs aimed at formulating standard necessary features that should be included on RLCs for proper risk control especially in emerging economies.

Originality/value

The research paper is original and has not been submitted for consideration to other journals.

Details

Smart and Resilient Transportation, vol. 3 no. 3
Type: Research Article
ISSN: 2632-0487

Keywords

Open Access
Article
Publication date: 2 January 2024

Eylem Thron, Shamal Faily, Huseyin Dogan and Martin Freer

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…

Abstract

Purpose

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new security and safety risks that can be realised, both in terms of human error, and malicious and non-malicious behaviour. This study aims to identify the human factors (HF) and cyber-security risks relating to the role of signallers on the railways and explores strategies for the improvement of “Digital Resilience” – for the concept of a resilient railway.

Design/methodology/approach

Overall, 26 interviews were conducted with 21 participants from industry and academia.

Findings

The results showed that due to increased automation, both cyber-related threats and human error can impact signallers’ day-to-day operations – directly or indirectly (e.g. workload and safety-critical communications) – which could disrupt the railway services and potentially lead to safety-related catastrophic consequences. This study identifies cyber-related problems, including external threats; engineers not considering the human element in designs when specifying security controls; lack of security awareness among the rail industry; training gaps; organisational issues; and many unknown “unknowns”.

Originality/value

The authors discuss socio-technical principles through a hexagonal socio-technical framework and training needs analysis to mitigate against cyber-security issues and identify the predictive training needs of the signallers. This is supported by a systematic approach which considers both, safety and security factors, rather than waiting to learn from a cyber-attack retrospectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Content available
Article
Publication date: 21 November 2018

Joan Mileski, Christopher Clott and Cassia Bomer Galvao

The maritime industry is increasingly impacted by the Internet of things (IoT) through the automation of ships and port activities. This increased automation creates new security…

3850

Abstract

Purpose

The maritime industry is increasingly impacted by the Internet of things (IoT) through the automation of ships and port activities. This increased automation creates new security vulnerabilities for the maritime industry in cyberspace. Any obstruction in the global supply chain due to a cyberattack can cause catastrophic problems in the global economy. This paper aims to review automatic identification systems (AISs) aboard ships for cyber issues and weaknesses.

Design/methodology/approach

The authors do so by comparing the results of two receiver systems of the AIS in the Port of Houston; the JAMSS system aboard the Space Station and the “Harborlights” system for traffic control in the Port.

Findings

The authors find that inconsistent information is presented on the location of same ships at the same time in the Port. Upon further investigation with pilots, the authors find that these inconsistencies may be the result of the strength of power with which an AIS is transmitted. It appears the power may be reduced to the AIS in port but that it varies within port and varies by pilot operators. This practice may open the AIS system for tampering.

Originality/value

Further, this inconsistency may require further policy regulation to properly address cyber information in a port.

Details

Maritime Business Review, vol. 3 no. 4
Type: Research Article
ISSN: 2397-3757

Keywords

Open Access
Article
Publication date: 2 January 2023

Antonis Skouloudis, Walter Leal Filho, Georgios Deligiannakis, Panagiotis Vouros, Ioannnis Nikolaou and Konstantinos Evangelinos

This paper aims to investigate aspects of flood experience, attitudes and responses of micro-, small- and medium-sized enterprises (MSMEs) in Greece and to indicate a typology of…

2481

Abstract

Purpose

This paper aims to investigate aspects of flood experience, attitudes and responses of micro-, small- and medium-sized enterprises (MSMEs) in Greece and to indicate a typology of strategies associated with their relative effort to build flood resilience capacity.

Design/methodology/approach

A qualitative study protocol was used, based on pertinent literature that considers how business entities withstand, adapt and/or recover from non-linear climate change impacts, natural hazards and extreme weather. Data was obtained by conducting semi-structured interviews with 82 MSMEs’ owners-managers who had recently experienced flooding.

Findings

The study reports limited activities of MSMEs towards flood resilience capacity despite the threat of relevant disasters. Findings suggest that most owners-managers of these enterprises are not adequately preparing their businesses for the impacts of flooding.

Research limitations/implications

The findings call for multi-level and dynamic perspectives to be examined in assessing MSME resilience capacity to floods. It is attitudinal, managerial, organisational, behavioural and regulatory (as well as other institutional) factors that merit further investigation. Such an investigation would allow a better understanding as to whether these factors hinder or enable conditions for microeconomic flood preparedness and resilience as well as how they may interact with each other or create feedback loops.

Practical implications

The study carries managerial implications and policy recommendations in terms of nurturing opportunities towards awareness-raising campaigns for reducing deficits in managerial knowledge and competencies. It also encapsulates practical implications in terms of emphasising supporting mechanisms from key institutional stakeholders to allow MSMEs scan available options they have in effectively reinforcing the business premises from the forces of rising waters.

Originality/value

Most of the related studies have examined flood impacts, responses and/or resilience capacity at the household- or community-level. Empirical work that is conducted to ascertain how MSMEs cope with flooding remains thin on the ground. In response to this, the current study and the typology of MSMEs’ strategic postures that are suggested seek to contribute to this under-researched topic.

Details

International Journal of Climate Change Strategies and Management, vol. 15 no. 1
Type: Research Article
ISSN: 1756-8692

Keywords

Open Access
Book part
Publication date: 4 June 2021

Michael Salter and Elly Hanson

This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the…

Abstract

This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the absence of adequate intervention by internet service providers, social media platforms, and government. The chapter discusses the history of online CSE, focusing on regulatory stances over time in which online risks to children have been cast as natural and inevitable by the hegemony of a “cyberlibertarian” ideology. We illustrate the success of this ideology, as well as its profound contradictions and ethical failures, by presenting key examples in which internet users have taken decisive action to prevent online CSE and promote the removal of CSAM. Rejecting simplistic characterizations of “vigilante justice,” we argue instead that the fact that often young internet users report feeling forced to act against online CSE and CSAM undercuts libertarian claims that internet regulation is impossible, unworkable, and unwanted. Recent shifts toward a more progressive ethos of online harm minimization are promising; however, this ethos risks offering a new legitimizing ideology for online business models that will continue to put children at risk of abuse and exploitation. In conclusion, we suggest ways forward toward an internet built in the interests of children, rather than profit.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 9 October 2019

Erik Framner, Simone Fischer-Hübner, Thomas Lorünser, Ala Sarah Alaqra and John Sören Pettersson

The purpose of this paper is to develop a usable configuration management for Archistar, which utilizes secret sharing for redundantly storing data over multiple independent…

3938

Abstract

Purpose

The purpose of this paper is to develop a usable configuration management for Archistar, which utilizes secret sharing for redundantly storing data over multiple independent storage clouds in a secure and privacy-friendly manner. Selecting the optimal secret sharing parameters, cloud storage servers and other settings for securely storing the secret data shares, while meeting all of end user’s requirements and other restrictions, is a complex task. In particular, complex trade-offs between different protection goals and legal privacy requirements need to be made.

Design/methodology/approach

A human-centered design approach with structured interviews and cognitive walkthroughs of user interface mockups with system administrators and other technically skilled users was used.

Findings

Even technically skilled users have difficulties to adequately select secret sharing parameters and other configuration settings for adequately securing the data to be outsourced.

Practical implications

Through these automatic settings, not only system administrators but also non-technical users will be able to easily derive suitable configurations.

Originality/value

The authors present novel human computer interaction (HCI) guidelines for a usable configuration management, which propose to automatically set configuration parameters and to solve trade-offs based on the type of data to be stored in the cloud. Through these automatic settings, not only system administrators but also non-technical users will be able to easily derive suitable configurations.

Details

Information & Computer Security, vol. 27 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of 187