Search results

1 – 10 of over 14000
Article
Publication date: 27 January 2012

Mayukh Dass and Piyush Kumar

A critical issue faced by retailers is determining the composition of the product assortment in every category and setting the price levels for each product without compromising…

1737

Abstract

Purpose

A critical issue faced by retailers is determining the composition of the product assortment in every category and setting the price levels for each product without compromising category‐level customer demand or operational efficiency. The purpose of this paper is to propose a novel, model‐based clustering approach to bring parsimony to retailers' assortment configuration and pricing process. The objective of the model is to group alternative assortment configurations into sets to which the category exhibits equivalent vulnerability.

Design/methodology/approach

In this method, each possible assortment and pricing configuration is first conceptualized as a unified entity and then these entities are clustered based on the vulnerability of category level sales. The authors illustrate the benefits of this new method for category planning using two sets of data for brands of soft drinks and enhanced water, collected from a panel of adult customers.

Findings

The results from both data sets show that several assortment configurations, varying significantly in terms of numbers of products and prices, result in similar levels of category vulnerability. In other words, several widely‐different product‐pricing combinations result in similar levels of category demand.

Originality/value

The paper's findings imply that retailers can bring parsimony to their category management process by shifting their strategic focus from individual brands to assortment clusters. Specifically, they can select the most efficient or the smallest assortment from each cluster without sacrificing category demand. Overall, the authors' approach can help simplify the complex decision‐making process related to product selection and price setting, and help retailers achieve the dual objective of operational efficiency and high category demand.

Details

International Journal of Retail & Distribution Management, vol. 40 no. 1
Type: Research Article
ISSN: 0959-0552

Keywords

Article
Publication date: 4 September 2007

Roger L. Kemp

The purpose of this paper is to set forth a rigorous methodology for building owners and managers to conduct a vulnerability assessment of their facilities. Such a process would…

832

Abstract

Purpose

The purpose of this paper is to set forth a rigorous methodology for building owners and managers to conduct a vulnerability assessment of their facilities. Such a process would facilitate the use of remediation measures to limit the loss of life and property during a disaster, whether natural or man‐made.

Design/methodology/approach

The author sets forth nine criteria to conduct a vulnerability assessment, along with a six‐point rating system. The criteria selected are: the level of visibility, the criticality of the site to the jurisdiction in which it is located, the impact of the site outside of the jurisdiction in which it is located, access to the site, size hazards, building height, type of construction, site population capacity, and the potential for collateral mass casualties. This evaluative process leads to five site vulnerability ratings, ranked as follows: negligible, low, medium, high, and critical.

Findings

Property owners and building managers can use this process to assess the vulnerability of their facilities and, based on this process and the resulting vulnerability rating, initiate common‐sense remediation measures to limit the loss of life and property, should a disaster occur.

Research limitations/implications

The field of vulnerability assessment is a new discipline within the evolving subject of homeland security. Other methodologies will be needed in the future to determine the vulnerability of other public and private facilities, such as ports, airports, transportation centers, hospitals, colleges and universities, and other vital public and private facilities.

Practical implications

This research provides a framework for future research on the topic of vulnerability assessments. Refinements and modifications can be made to the proposed methodology (both to the vulnerability assessment criteria and to the vulnerability ratings).

Originality/value

This paper provides original research and sets forth a new methodology for conducting vulnerability assessments of public and private buildings.

Details

Disaster Prevention and Management: An International Journal, vol. 16 no. 4
Type: Research Article
ISSN: 0965-3562

Keywords

Article
Publication date: 26 January 2024

Ana Argento Nasser

This article aims to provide a new paradigm for thinking about disability, which can be applied to other social groups, historically invisible and whose rights have been violated…

Abstract

Purpose

This article aims to provide a new paradigm for thinking about disability, which can be applied to other social groups, historically invisible and whose rights have been violated. The Model of Communication and Legitimate Acknowledgement of Disability (MCLAD) tries to break with the logic of continuing to add terms and euphemisms around the issue. The author proposes a new line to think about relationships in democratic societies. Taking the step from inclusion to acknowledgment does not imply another way of naming the disability, but rather addressing the problem from concrete practices of recognition. In order to arrive at the proposal of the MCLAD, the author will make a journey that addresses how disability has been understood throughout history, according to the study of different authors.

Design/methodology/approach

Disability has been perceived over time in many different ways, which led some authors to build models in order to explain certain social approaches to the subject. This article traces a journey from the first model to the present. In turn, it proposes a new one: the MCLAD, which is characterized by a paradigm shift: moving from inclusion to acknowledgment. To substantiate this, three categories are presented: acknowledgment, distance and vulnerability. The different theories and concepts that support the model will also be presented. The purpose of the MCLAD is to deepen the idea of empowering people with disabilities as part of today’s diverse societies and closing historically constructed gaps which are still in force.

Findings

The MCLAD proposes three categories: acknowledgment, distance and vulnerability. In turn, in each of them, there is a link between three axes: person with disability/society/state, analyzing the dynamics of these relationships presented, will provide us with the necessary elements to understand the proposed turnaround.

Research limitations/implications

Although the different models will be presented according to the chronological order of definition over time, all of them still coexist today, in many cases in hybrid and naturalized ways in social practices. Recognizing what practices and conceptions are behind each model, allows us to recognize and resignify the ways of communicating toward people with disabilities (PWD) and on the issue of disability. It also allows other specific recognition practices, such as the legitimization of public policies from the laws that protect them.

Practical implications

To replace the paradigm of inclusion for that of acknowledgment and to recognize how the three categories (acknowledgment, distance and vulnerability) are linked with the three issues (PWD – society and state) allowing specific relationship and practises of legitimate or not acknowledgement. When the author affirms that the MCLAD implies a paradigm shift, the author means that it provides some elements from legitimate acknowledgment to complement aspects which inclusion does not address, and that the other models did not take into account. These are: the self-acknowledgment of people with disabilities and the sense of responsibility linked to empowerment; vulnerability as a category of reconciliation, which is typical of every human being; the contribution of the Phenomenology of the Among to think about how relationships and practices actually occur in society and, finally, the role of the state, which must watch over all its citizens, avoiding the distance between discourse (laws) and practices and, above all, avoiding exclusion from the system due to lack of monitoring of actions.

Social implications

It should be noted that the MCLAD starts from the idea of language as a constructor of realities and conceives communication as an enabler of the acknowledgment of the other, who is also subject to rights. At the same time, it vindicates the voice of people with disabilities as protagonists (“Nothing about us without us”) and fosters the need for PWD themselves to be active in their struggles, promulgating legitimate acknowledgment. At the same time, it points out that the empowerment of PWD implies not only that they are aware of their rights but also that they themselves know and fulfill their duties within the democratic societies of which they are a part of and which, at least discursively, are regulated by laws. In other words, being empowered is also being responsible for living in society.

Originality/value

The main contribution that the MCLAD has to offer is to replace the paradigm of inclusion for that of acknowledgment. And, throughout the path followed in this article, an attempt has been made to establish that the turnaround is not to capriciously install a new concept (acknowledgment), but to demonstrate that the new paradigm involves three categories that sustain and support a model that seeks to be the basis for effective public policies, for a society that values diversity and for people who feel worthy and contribute to dignify others.

Details

Equality, Diversity and Inclusion: An International Journal, vol. 43 no. 2
Type: Research Article
ISSN: 2040-7149

Keywords

Article
Publication date: 2 September 2014

Issam Kouatli

The purpose of this paper is to classify and categorize the vulnerability types emerged with time as information technology (IT) systems evolved. This comparative study aims to…

1990

Abstract

Purpose

The purpose of this paper is to classify and categorize the vulnerability types emerged with time as information technology (IT) systems evolved. This comparative study aims to compare the seriousness of the old well-known vulnerabilities that may still exist with lower possibility of happening with that of new technologies like cloud computing with Mobility access. Cloud computing is a new structure of IT that is becoming the main part of the new model of business environment. However, issues regarding such new hype of technology do not come without obstacles. These issues have to be addressed before full acceptability of cloud services in a globalized business environment. Businesses need to be aware of issues of concerns before joining the cloud services. This paper also highlights these issues and shows the comparison table to help businesses with appropriate decision-making when joining the cloud.

Design/methodology/approach

A historical review of emerged vulnerabilities as IT systems evolved was conducted, then these vulnerabilities were categorized into eight different categories, each of which composed of multiple vulnerability types. Simple scoring techniques were used to build a “risk” analysis table where each vulnerability type was given a score based on availability of matured solution and the likeliness of happening, then in case of vulnerability type, another score was used to derive the impact of such vulnerability. The resulted weighted score can be derived from the multiplication of likeliness to happen score with that of its impact in case it did happen. Percentage of seriousness represented by the percentage of the derived weighted score of each of the vulnerabilities can then be concluded. Similar table was developed for issues related to cloud computing environment in specific.

Findings

After surveying the historical background of IT systems and emerged vulnerabilities as well as reviewing the common malicious types of system vulnerabilities, this paper identifies 22 different types of vulnerability categorized in eight different categories. This comparative study explores amount of possible vulnerabilities in new technology like cloud computing services. Specific issues for cloud computing were also explored and a similar comparative study was developed on these issues. The result of the comparative study between all types of vulnerabilities since the start of IT system development till today’s technology of cloud computing, shows that the highest percentage vulnerability category was the one related to mobility access as mobile applications/systems are relatively newly emerged and do not have a matured security solution(s).

Practical implications

Learning from history, one can conclude the current risk factor in dealing with new technology like cloud computing. Businesses can realize that decision to join the cloud requires thinking about the issues mentioned in this paper and identifying the most vulnerability types to try to avoid them.

Originality/value

A new comparative study and new classification of vulnerabilities demonstrated with risk analysis using simple scoring technique.

Article
Publication date: 5 February 2020

Michael Skidmore, Janice Goldstraw-White and Martin Gill

Frameworks for understanding victim harm and vulnerability have become central to priority-setting and resource allocation for decision-makers in the police and government in the…

Abstract

Purpose

Frameworks for understanding victim harm and vulnerability have become central to priority-setting and resource allocation for decision-makers in the police and government in the UK. This paper aims to look at the meaning of vulnerability in the context of fraud.

Design/methodology/approach

The research took a mixed methods approach, including analysis of national crime data (n = 61,902), qualitative data collected from interviews with practitioners (n = 107) and a survey of strategic lead officers in the police (n = 32).

Findings

There was a lack of clarity across practitioners and organisations in their understanding of vulnerability and the way it informed the police response to fraud, and a lack of resources and capability for identifying it.

Research limitations/implications

The authors invite reconsideration of the approach to fraud victims which have for too long been forgotten by response and support agencies.

Practical implications

We need to standardise and agree the definition of “vulnerability”; rethink eligibility levels; and refocus police on fraud victims taking vulnerability as a meaningful criterion in deciding who to support.

Originality/value

There is very little research on vulnerability and fraud victims; this paper, based on original research, fills this gap.

Details

Journal of Criminological Research, Policy and Practice, vol. 6 no. 1
Type: Research Article
ISSN: 2056-3841

Keywords

Article
Publication date: 1 October 2004

Krishna S. Vatsa

Households are exposed to a wide array of risks, characterized by a known or unknown probability distribution of events. Disasters are one of these risks at the extreme end…

6471

Abstract

Households are exposed to a wide array of risks, characterized by a known or unknown probability distribution of events. Disasters are one of these risks at the extreme end. Understanding the nature of these risks is critical to recommending appropriate mitigation measures. A household’s resilience in resisting the negative outcomes of these risky events is indicative of its level of vulnerability. Vulnerability has emerged as the most critical concept in disaster studies, with several attempts at defining, measuring, indexing and modeling it. The paper presents the concept and meanings of risk and vulnerability as they have evolved in different disciplines. Building on these basic concepts, the paper suggests that assets are the key to reducing risk and vulnerability. Households resist and cope with adverse consequences of disasters and other risks through the assets that they can mobilize in face of shocks. Asustainable strategy for disaster reduction must therefore focus on asset‐building. There could be different types of assets, and their selection and application for disaster risk management is necessarily a contextual exercise. The mix of asset‐building strategies could vary from one community to another, depending upon households’ asset profile. The paper addresses the dynamics of assets‐risk interaction, thus focusing on the role of assets in risk management.

Details

International Journal of Sociology and Social Policy, vol. 24 no. 10/11
Type: Research Article
ISSN: 0144-333X

Keywords

Article
Publication date: 29 December 2021

Sadaf Aman and Stefan Seuring

The Covid-19 pandemic has made it essential to explore the resilience factors specific to developing regions, not only because they pose threats of extreme poverty and offer a…

1260

Abstract

Purpose

The Covid-19 pandemic has made it essential to explore the resilience factors specific to developing regions, not only because they pose threats of extreme poverty and offer a novel context but also because they play an important role in globalisation.

Design/methodology/approach

A mixed-method approach was undertaken to address this novel pandemic situation. First, an open-ended structured questionnaire was developed, and data were collected from three neighbouring emerging economies: Pakistan, India and Iran. Experts' perspectives on vulnerabilities, response measures, resilience and restoration of supply chain activities, and the role of social capital were collected. Second, building upon the findings from phase one of the studies, a quantitative structured questionnaire using the supply chain operational reference (SCOR) model was used to collect data in a structured manner. This quantitative data were further analysed using frequency and contingency analysis.

Findings

The findings from the first phase of the study inductively derive 36 resilience categories. Later, the contingency findings show that supply chain (SC) disruption is a major vulnerability for emerging economies, whereas solutions offered to combat it lay in the reconfiguration of resources, such as financial, technological, human, information and material. Additionally, supply network structure and social capital play an integral part in making SCs resilient against disruption.

Research limitations/implications

The respondents comprise the academics/SC researchers, which make the findings interesting though they lack the industrial experts' perspectives, directly. Nevertheless, the propositions can be tested in industrial settings to see whether the results are limited to a specific industrial setting or are rather generalised.

Practical implications

Similarly, practitioners and policy makers can incorporate the SCOR metrics/factors outlined in this study into their performance measurement systems and ensure continuous monitoring for firm's resilience.

Originality/value

The study offers a holistic understanding of the developing regions' approaches to Covid-19. The paper also takes a social capital perspective to explain firms' resilience in these emerging economies.

Details

The International Journal of Logistics Management, vol. 34 no. 4
Type: Research Article
ISSN: 0957-4093

Keywords

Article
Publication date: 7 February 2022

Sujeet Deshpande, Manoj Hudnurkar and Urvashi Rathod

Manufacturing supply chains (SCs) across the world have become increasingly vulnerable to disruptions due to the increasing fragmentation of business functions and tasks across…

Abstract

Purpose

Manufacturing supply chains (SCs) across the world have become increasingly vulnerable to disruptions due to the increasing fragmentation of business functions and tasks across many firms located within the country and abroad. Despite the numerous instances of SC disruptions being reported in the literature, the study of SC vulnerability lacks adequate conceptual and empirical support. This study aims to address this research gap.

Design/methodology/approach

The concept of SC vulnerability was examined considering the outcome and contextual models of vulnerability, which are well established in extant multi-disciplinary vulnerability literature. An exploratory Delphi study was then conducted to understand the extent of vulnerability of various manufacturing SCs in India, drivers of this vulnerability and the key hazards exploiting this vulnerability.

Findings

The study confirms the increasing vulnerability of manufacturing SCs in India. It also highlights the lack of top management commitment to risk mitigation as the key vulnerability driver and frequent changes in government laws and regulations as the key hazard being faced by the manufacturing SCs in India.

Originality/value

This study highlights the utility of outcome and contextual models of vulnerability as conceptual frameworks for understanding SC vulnerability. These conceptual insights along with the key manufacturing SC vulnerability drivers and hazards identified in the study should provide a basis for SC redesign for vulnerability reduction and the selection of SC risk mitigation strategies.

Details

Benchmarking: An International Journal, vol. 30 no. 1
Type: Research Article
ISSN: 1463-5771

Keywords

Book part
Publication date: 6 December 2018

Pablo Hernández-Marrero, Sandra Martins Pereira, Joana Araújo and Ana Sofia Carvalho

This chapter aims to provide an overview of the ethical framework and decision-making in clinical dementia research, and to analyze and discuss the ethical challenges and issues…

Abstract

This chapter aims to provide an overview of the ethical framework and decision-making in clinical dementia research, and to analyze and discuss the ethical challenges and issues that can arise when conducting clinical dementia research.

Informed consent is the most scrutinized and controversial aspect of clinical research ethics. In clinical dementia research, assessing decision-making capacity may be challenging as the nature and progress of each disease influences decision-making capacity in diverse ways. Persons with dementia represent a vulnerable population deserving special attention when developing, implementing, and evaluating the informed consent process. In this chapter, particular attention will be given to vulnerability categories and how these influence decision-making capacity. Ethical frameworks with a pragmatic contour and implication are needed to protect vulnerable patients from potential harms and ensure their optimal participation in clinical dementia research.

In addition, this chapter analyses important ethical challenges and issues in clinical dementia research. If handled thoughtfully, they would not pose insuperable barriers to research. But if they are ignored, they could slow the research process, alienate potential study subjects and cause harm to research participants. Ethical considerations in research involving persons with dementia primarily concern the representation of the interests of the participants with dementia and protection of their vulnerabilities and rights.

A core set of ethical questions and recommendations are drawn to aid researchers, institutional review boards and potential research participants in the process of participating in clinical dementia research.

Details

Ethics and Integrity in Health and Life Sciences Research
Type: Book
ISBN: 978-1-78743-572-8

Keywords

Book part
Publication date: 25 April 2022

Muhammad Wafiy Adli Ramli, Nor Eliza Binti Alias, Zulkifli bin Yusop and Shazwin Mat Taib

This chapter reviews and compares Southeast Asia country practices on global, regional, and local practices for disaster risk assessment (DRA). DRA research and practices include

Abstract

This chapter reviews and compares Southeast Asia country practices on global, regional, and local practices for disaster risk assessment (DRA). DRA research and practices include and create a disaster risk management (DRM) solution. There are 11 countries in Southeast Asia, but only 10 countries are members of the Association of Southeast Asian Nations (ASEAN), except Timor-Leste. The key objective of ASEAN’s formation is cooperation in economic growth, social, regional peace and cultural development, disaster management cooperation, and humanitarian assistance at the regional level. The DRM system practiced in ASEAN member countries is discussed in this chapter. Furthermore, the system and findings of DRAs are also addressed. Globally, two DRA structures are discussed and compared, namely Index of Risk Management (INFORM) and World Risk Index (WRI). In addition, regional vulnerability assessment guidelines for regional and national levels are discussed. However, several selected studies and practices such as the Indonesian Risk Index (InaRISK) are being discussed at the local level. Overall, there is space for improvement of coordination in terms of data and technology sharing for DRM, especially for assessment. The finding of this review highlighted the complexity of DRA at the global and regional levels and encouraging community DRA among the ASEAN members.

1 – 10 of over 14000