Search results
1 – 10 of 187A healthcare system in any country is rarely the product of one logical policy-making experience, but rather a manifestation of many years of historical development. The purpose…
Abstract
Purpose
A healthcare system in any country is rarely the product of one logical policy-making experience, but rather a manifestation of many years of historical development. The purpose of this paper is to examine the characteristics, components, and variables of South Africa’s healthcare system in the context of global patterns. It leverages a dynamic period in South Africa since 1994, and applies a comparative health systems analysis to explain where the country’s healthcare system is, and where it is potentially going.
Design/methodology/approach
This paper reviews literature related to South Africa’s healthcare system, outlines its historical development, and discusses three fundamental challenges experienced in the country. This paper also reviews the literature on healthcare system typologies and identifies three framework models that have been used to categorise national healthcare systems since the 1970s. This paper then discusses the categorisation of South Africa’s healthcare system in these models, in comparison to Canada and the USA.
Findings
This paper finds that the framework models are useful tools for comparative analysis of healthcare systems. However, any use of such typologies should be done with the awareness that national healthcare systems are not isolated entities because they function within a larger context. They are not static, since they are constantly evolving with many nuances, even with very similar healthcare system categorisations.
Originality/value
This paper charts the trajectory of change in the South African healthcare system, and demonstrates that the change process must keep internal conditions in mind if the outcome is to be successful. Imitating policies of countries with well-functioning systems, without regard to local realities, may not work, as the government attempts to usher in changes within a short span of time.
Details
Keywords
The increasing frequency and intensity of the extreme weather events could cause devastating consequences in tourism. Climate change–related extreme weather events and their…
Abstract
Purpose
The increasing frequency and intensity of the extreme weather events could cause devastating consequences in tourism. Climate change–related extreme weather events and their relation to tourism is an emerging field for education and research. The purpose of this study is to categorize the impact of climate change on tourist destinations with regard to extreme weather-related risks in outdoor recreation and tourism. Managerial implications for policymakers and stakeholders are discussed.
Design/methodology/approach
To outline the risks from climate change associated with tourism, this study uses the Prisma analysis for identification, screening, checking for eligibility and finding relevant literature for further categorization.
Findings
Based on a thoroughly examination of relevant literature, risks and threats posed by climate change could be categorized into following four areas: reduced experiential value in outdoor winter recreation; reduced value in beach scenery and comfort; land degradation and reduced biodiversity; and reduced value in personal safety and comfort in tourism. It also focuses on the significance of using big data applications in catastrophic disaster management and risk reduction. Recommendations with technology and data analytics to continuously improve the disaster management process in tourism education are provided based on findings of this study.
Originality/value
Primary contributions of this study include the following: providing a summarized overview of the risks associated with climate change in terms of tourist experiential value for educational implications; and revealing the role of data analytics in disaster management in the context of tourism and climate change for tourism education.
Details
Keywords
Chiara Bertolin and Elena Sesana
The overall objective of this study is envisaged to provide decision makers with actionable insights and access to multi-risk maps for the most in-danger stave churches (SCs…
Abstract
Purpose
The overall objective of this study is envisaged to provide decision makers with actionable insights and access to multi-risk maps for the most in-danger stave churches (SCs) among the existing 28 churches at high spatial resolution to better understand, reduce and mitigate single- and multi-risk. In addition, the present contribution aims to provide decision makers with some information to face the exacerbation of the risk caused by the expected climate change.
Design/methodology/approach
Material and data collection started with the consultation of the available literature related to: (1) SCs' conservation status, (2) available methodologies suitable in multi-hazard approach and (3) vulnerability leading indicators to consider when dealing with the impact of natural hazards specifically on immovable cultural heritage.
Findings
The paper contributes to a better understanding of place-based vulnerability with local mapping dimension also considering future threats posed by climate change. The results highlight the danger at which the SCs of Røldal, in case of floods, and of Ringebu, Torpo and Øye, in case of landslide, may face and stress the urgency of increasing awareness and preparedness on these potential hazards.
Originality/value
The contribution for the first time aims to homogeneously collect and report all together existing spread information on architectural features, conservation status and geographical attributes for the whole group of SCs by accompanying this information with as much as possible complete 2D sections collection from existing drawings and novel 3D drawn sketches created for this contribution. Then the paper contributes to a better understanding of place-based vulnerability with local mapping dimension also considering future threats posed by climate change. Then it highlights the danger of floods and landslides at which the 28 SCs are subjected. Finally it reports how these risks will change under the ongoing impact of climate change.
Details
Keywords
Kambiz Mokhtari, Noorul Shaiful Fitri Abdul Rahman, Hamid Reza Soltani, Salim Ahmed Al Rashdi and Kawkab Abdul Aziz Mohammed Al Balushi
At the substantive level, there exists a gap in knowledge about the position of security risk management (i.e. SRM) during the terminals’ operations and management; particularly…
Abstract
Purpose
At the substantive level, there exists a gap in knowledge about the position of security risk management (i.e. SRM) during the terminals’ operations and management; particularly when there is potential for deliberate anti-security acts. Correspondingly, the purpose of this paper is a need for more practical research to find out the justification for the existence of the SRM and different techniques for its appropriate execution on these logistics infrastructures principally with due regard to the potential requirements in the near future.
Design/methodology/approach
Both qualitative and quantitative techniques are used in this study incorporating fuzzy set theory and risk assessment matrix to achieve the research objective.
Findings
A designed SRM framework tailored for Qalhat liquefied petroleum gas (LNG) terminal in Sultanate of Oman was established to manage the security threats which can be resulted from any probable terrorist attacks.
Research limitations/implications
The limited numbers of experts for the purpose of the addressed SRM are causing challenges in data collection.
Practical implications
The pressures for enhanced attention to critical infrastructure security have fostered new challenges for petrochemical seaports and terminals (PSTs). These tendencies dictate to maintain comprehensive security regimens that can be integrated with national and international strategies to support the country’s security against terrorism.
Originality/value
The development of the security risk factor table model in the case of Qalhat LNG Terminal.
Details
Keywords
Jackson Sekasi and Habeeb Solihu
Railway-level crossings (RLCs) are the point of intersection between rail and road users and are therefore hotpots of road-rail user conflict and catastrophic collisions. The…
Abstract
Purpose
Railway-level crossings (RLCs) are the point of intersection between rail and road users and are therefore hotpots of road-rail user conflict and catastrophic collisions. The purpose of this study is to assess the risks associated with RLCs and suggest probable reduction measures. Through questionnaires and visual inspection, the authors identify the safety risks, hazards and hazardous events at some railway crossing of Addis Ababa light rail transit (AA-LRT) north-south (N-S) route. The identified risky events are then categorized based on As Low As Reasonably Practicable (ALARP) principle and generic risk ranking matrix. The authors then examine existing safety management measures at railway crossing and assess the need for additional safety management. Five major crossings on the 16.9 km (10.5 mi) N-S line, starting from Menelik II Square to Kality, were considered for the study. This study is carried out by data collection from about 145 stakeholders and the application of statistical data and risk analysis methods. The major findings of this study and the recommendations for improvement are suggested.
Design/methodology/approach
The research followed a case study approach. Through questionnaires and visual inspection, the authors identify the safety risks, hazards and hazardous events at some railway crossing of AA-LRT N-S route. The identified risky events are then categorized based on ALARP principle and generic risk ranking matrix. Collected data was then analyzed using SPSS to deduce relationships.
Findings
The study findings reveal human factors as the greatest cause of accidents, injury or death. About 22% of hazards identified by category are human factors, whereas 20% are because of technical problems. Intolerable risks stand at 42%, whereas the tolerable risks are at 36% according to risk classification results as per the ALARP model. Because the process of risk management is a long-term cycle, its importance should not be missed at any time.
Research limitations/implications
Because of design considerations of RLCs and the difference in generalized human behaviors for people of a given region, the results are limited to AA-LRT RLCs. This study opens a discourse for detailed evaluations, qualitative and quantitative analysis into the categorized identified hazards. There is also room for additional research into the performance of RLCs aimed at formulating standard necessary features that should be included on RLCs for proper risk control especially in emerging economies.
Originality/value
The research paper is original and has not been submitted for consideration to other journals.
Details
Keywords
Eylem Thron, Shamal Faily, Huseyin Dogan and Martin Freer
Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…
Abstract
Purpose
Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new security and safety risks that can be realised, both in terms of human error, and malicious and non-malicious behaviour. This study aims to identify the human factors (HF) and cyber-security risks relating to the role of signallers on the railways and explores strategies for the improvement of “Digital Resilience” – for the concept of a resilient railway.
Design/methodology/approach
Overall, 26 interviews were conducted with 21 participants from industry and academia.
Findings
The results showed that due to increased automation, both cyber-related threats and human error can impact signallers’ day-to-day operations – directly or indirectly (e.g. workload and safety-critical communications) – which could disrupt the railway services and potentially lead to safety-related catastrophic consequences. This study identifies cyber-related problems, including external threats; engineers not considering the human element in designs when specifying security controls; lack of security awareness among the rail industry; training gaps; organisational issues; and many unknown “unknowns”.
Originality/value
The authors discuss socio-technical principles through a hexagonal socio-technical framework and training needs analysis to mitigate against cyber-security issues and identify the predictive training needs of the signallers. This is supported by a systematic approach which considers both, safety and security factors, rather than waiting to learn from a cyber-attack retrospectively.
Details
Keywords
Joan Mileski, Christopher Clott and Cassia Bomer Galvao
The maritime industry is increasingly impacted by the Internet of things (IoT) through the automation of ships and port activities. This increased automation creates new security…
Abstract
Purpose
The maritime industry is increasingly impacted by the Internet of things (IoT) through the automation of ships and port activities. This increased automation creates new security vulnerabilities for the maritime industry in cyberspace. Any obstruction in the global supply chain due to a cyberattack can cause catastrophic problems in the global economy. This paper aims to review automatic identification systems (AISs) aboard ships for cyber issues and weaknesses.
Design/methodology/approach
The authors do so by comparing the results of two receiver systems of the AIS in the Port of Houston; the JAMSS system aboard the Space Station and the “Harborlights” system for traffic control in the Port.
Findings
The authors find that inconsistent information is presented on the location of same ships at the same time in the Port. Upon further investigation with pilots, the authors find that these inconsistencies may be the result of the strength of power with which an AIS is transmitted. It appears the power may be reduced to the AIS in port but that it varies within port and varies by pilot operators. This practice may open the AIS system for tampering.
Originality/value
Further, this inconsistency may require further policy regulation to properly address cyber information in a port.
Details
Keywords
Antonis Skouloudis, Walter Leal Filho, Georgios Deligiannakis, Panagiotis Vouros, Ioannnis Nikolaou and Konstantinos Evangelinos
This paper aims to investigate aspects of flood experience, attitudes and responses of micro-, small- and medium-sized enterprises (MSMEs) in Greece and to indicate a typology of…
Abstract
Purpose
This paper aims to investigate aspects of flood experience, attitudes and responses of micro-, small- and medium-sized enterprises (MSMEs) in Greece and to indicate a typology of strategies associated with their relative effort to build flood resilience capacity.
Design/methodology/approach
A qualitative study protocol was used, based on pertinent literature that considers how business entities withstand, adapt and/or recover from non-linear climate change impacts, natural hazards and extreme weather. Data was obtained by conducting semi-structured interviews with 82 MSMEs’ owners-managers who had recently experienced flooding.
Findings
The study reports limited activities of MSMEs towards flood resilience capacity despite the threat of relevant disasters. Findings suggest that most owners-managers of these enterprises are not adequately preparing their businesses for the impacts of flooding.
Research limitations/implications
The findings call for multi-level and dynamic perspectives to be examined in assessing MSME resilience capacity to floods. It is attitudinal, managerial, organisational, behavioural and regulatory (as well as other institutional) factors that merit further investigation. Such an investigation would allow a better understanding as to whether these factors hinder or enable conditions for microeconomic flood preparedness and resilience as well as how they may interact with each other or create feedback loops.
Practical implications
The study carries managerial implications and policy recommendations in terms of nurturing opportunities towards awareness-raising campaigns for reducing deficits in managerial knowledge and competencies. It also encapsulates practical implications in terms of emphasising supporting mechanisms from key institutional stakeholders to allow MSMEs scan available options they have in effectively reinforcing the business premises from the forces of rising waters.
Originality/value
Most of the related studies have examined flood impacts, responses and/or resilience capacity at the household- or community-level. Empirical work that is conducted to ascertain how MSMEs cope with flooding remains thin on the ground. In response to this, the current study and the typology of MSMEs’ strategic postures that are suggested seek to contribute to this under-researched topic.
Details
Keywords
Michael Salter and Elly Hanson
This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the…
Abstract
This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the absence of adequate intervention by internet service providers, social media platforms, and government. The chapter discusses the history of online CSE, focusing on regulatory stances over time in which online risks to children have been cast as natural and inevitable by the hegemony of a “cyberlibertarian” ideology. We illustrate the success of this ideology, as well as its profound contradictions and ethical failures, by presenting key examples in which internet users have taken decisive action to prevent online CSE and promote the removal of CSAM. Rejecting simplistic characterizations of “vigilante justice,” we argue instead that the fact that often young internet users report feeling forced to act against online CSE and CSAM undercuts libertarian claims that internet regulation is impossible, unworkable, and unwanted. Recent shifts toward a more progressive ethos of online harm minimization are promising; however, this ethos risks offering a new legitimizing ideology for online business models that will continue to put children at risk of abuse and exploitation. In conclusion, we suggest ways forward toward an internet built in the interests of children, rather than profit.
Details
Keywords
Erik Framner, Simone Fischer-Hübner, Thomas Lorünser, Ala Sarah Alaqra and John Sören Pettersson
The purpose of this paper is to develop a usable configuration management for Archistar, which utilizes secret sharing for redundantly storing data over multiple independent…
Abstract
Purpose
The purpose of this paper is to develop a usable configuration management for Archistar, which utilizes secret sharing for redundantly storing data over multiple independent storage clouds in a secure and privacy-friendly manner. Selecting the optimal secret sharing parameters, cloud storage servers and other settings for securely storing the secret data shares, while meeting all of end user’s requirements and other restrictions, is a complex task. In particular, complex trade-offs between different protection goals and legal privacy requirements need to be made.
Design/methodology/approach
A human-centered design approach with structured interviews and cognitive walkthroughs of user interface mockups with system administrators and other technically skilled users was used.
Findings
Even technically skilled users have difficulties to adequately select secret sharing parameters and other configuration settings for adequately securing the data to be outsourced.
Practical implications
Through these automatic settings, not only system administrators but also non-technical users will be able to easily derive suitable configurations.
Originality/value
The authors present novel human computer interaction (HCI) guidelines for a usable configuration management, which propose to automatically set configuration parameters and to solve trade-offs based on the type of data to be stored in the cloud. Through these automatic settings, not only system administrators but also non-technical users will be able to easily derive suitable configurations.
Details