Search results

1 – 10 of over 12000
Book part
Publication date: 12 January 2012

Hokey Min

Despite a hangover from the worldwide economic crisis, international trade rebounded nicely with a record-level growth in late 2010. A sharp rise in international trade has…

Abstract

Despite a hangover from the worldwide economic crisis, international trade rebounded nicely with a record-level growth in late 2010. A sharp rise in international trade has sparked the international traffic growth. A majority of this traffic growth originated from maritime logistics which could move cargoes in large volume and at cheaper freight costs. Due to its cost-efficiency and easy access, maritime logistics typically accounts for more than half of the worldwide freight volume. However, maritime logistics poses a greater supply chain risk, since ocean carriers used for maritime logistics are more vulnerable to unpredictable weather conditions, piracy attacks, terrorist hijacking, and cargo damages on the open sea than any other modes of transportation. Also, given the vast areas that maritime logistics covers, it is more difficult to protect maritime logistics activities from potential hazards and threats.

To better protect maritime logistics activities from potential security lapses, this chapter introduces and develops a variety of systematic security measures and tools that were successfully used by best-in-class companies and government entities across the world. Also, this chapter proposes a total maritime security management model as a way to formulate maritime risk mitigation strategies. To elaborate, this chapter sheds light on the roots of maritime security measures and tools, the ways that those measures and tools are best utilized, the roles of advanced information technology in maritime security from the global supply chain perspectives, the visualization and identification of potential maritime and its related supply chain risks, and policy guidelines that will help enhance maritime security.

Abstract

Details

Transforming Information Security
Type: Book
ISBN: 978-1-83909-928-1

Book part
Publication date: 21 May 2021

İbrahim Murat BİCİL and Kumru TURKOZ

Introduction: Although the concept of energy security has different meanings for each country, it is included in the energy policies of all countries in general. Energy security…

Abstract

Introduction: Although the concept of energy security has different meanings for each country, it is included in the energy policies of all countries in general. Energy security policies have more strategic importance especially for energy-importing countries. Imported energy sources are widely used in Turkey as in many countries. The variety of imported energy sources and the density of imports according to the imported countries affect the security of imported energy supply. Although the high density of imports is a risk factor, there are political and structural factors that may affect economic relations with the countries where energy is imported.

Aim: The aim of this study is to measure the short-term risk for the import of fossil resources in Turkey for the period 1999–2018.

Method: An index has composed by revising the risky external energy supply index included in the study of Le Coq and Paltseva (2009).

Findings: Empirical findings showed that on average, the most risky source of imports based on fossil resources is oil, followed by natural gas and coal respectively.

Originality of the Study: Various risk factors such as fossil fuel import intensity, political risk, and logistics performance have been taken into consideration in the proposed index. So this index proposed for Turkey, is expected to offer a different perspective to the energy supply security literature.

Implications: The proposed risk index has enabled the measurement of the level of risk in imported fossil sources in Turkey. Thus, policy implications have been made for energy supply security.

Details

New Challenges for Future Sustainability and Wellbeing
Type: Book
ISBN: 978-1-80043-969-6

Keywords

Book part
Publication date: 15 September 2022

Ayşen Akbaş Tuna and Zafer Türkmendağ

Cyber management of organizations includes eliminating security gaps, ensuring information confidentiality, and protecting customers' data. In addition, production and planning…

Abstract

Cyber management of organizations includes eliminating security gaps, ensuring information confidentiality, and protecting customers' data. In addition, production and planning, protecting cyber and digital infrastructure are included in the chapter. The chapter deals with these issues in the context of strategy and management. In addition, the conflicts arising from competitors to access the tacit knowledge (confidential information, commercial secrets, commercial relations, customers, and tenders) of the businesses are discussed in the chapter. Cyber conflicts have now turned into a business-to-business war. Businesses have become targets in cyberwars. This chapter, therefore, examines these issues in depth.

Book part
Publication date: 26 August 2014

Andy Phippen and Simon Ashby

This research explores the implications for risk management of “People Risk.” In particular how online digital behaviors, particularly from young people entering the workplace for…

Abstract

Purpose

This research explores the implications for risk management of “People Risk.” In particular how online digital behaviors, particularly from young people entering the workplace for the first time, might impact on the work setting and how risk management might mitigate impact on the employee and organization.

Design/methodology/approach

A mixed methods approach was used to consider these implications and draws from a number of data sources in the United Kingdom including a database of self-review data around online safety policy and practice from over 2000 schools, a survey of over 1000 14–16 year olds and their attitudes toward sexting, and a survey of over 500 undergraduate students. In addition the work considers existing risk management approaches and the models therein and how they might be applied to people risk.

Findings

The dataset analyzed in this exploration show an education system in the United Kingdom that is not adequately preparing young people with an awareness of the implications of digital behavior in their lives and the survey data shows distorted social norms that might have serious consequences in the workplace.

Practical implications

This research should raise concerns for managers in the workplace who need to be aware of the changes in “normal” behavior and how these potentially harmful practices may be mitigated in the workplace.

Originality/value

The research provides a strong evidence base for a change in “acceptable” social behavior by children and young people alongside an education system not promoting effective awareness. These two datasets combined highlight potential new risks to the workplace.

Details

Social Media in Strategic Management
Type: Book
ISBN: 978-1-78190-898-3

Keywords

Abstract

Details

Multinational Enterprises and Terrorism
Type: Book
ISBN: 978-1-83867-585-1

Book part
Publication date: 25 March 2021

Tayfun Kasapoglu and Anu Masso

Purpose: This study explores the perspectives of data experts (DXs) and refugees on the algorithms used by law enforcement officers and focuses on emerging insecurities. The…

Abstract

Purpose: This study explores the perspectives of data experts (DXs) and refugees on the algorithms used by law enforcement officers and focuses on emerging insecurities. The authors take police risk-scoring algorithms (PRSA) as a proxy to examine perceptions on algorithms that make/assist sensitive decisions affecting people’s lives.

Methodology/approach: In-depth interviews were conducted with DXs (24) in Estonia and refugees (19) in Estonia and Turkey. Using projective techniques, the interviewees were provided a simple definition of PRSA and a photo to encourage them to share their perspectives. The authors applied thematic analysis to the data combining manual and computer-aided techniques using the Maxqda software.

Findings: The study revealed that the perspectives on PRSA may change depending on the individual’s position relative to the double security paradox surrounding refugees. The use of algorithms for a sensitive matter such as security raises concerns about potential social outcomes, intentions of authorities and fairness of the algorithms. The algorithms are perceived to construct further social borders in society and justify extant ideas about marginalized groups.

Research limitations: The study made use of a small population sample and aimed at exploring perspectives of refugees and DXs by taking PRSA as the case without targeting representativeness.

Originality/value: The study is based on a double security paradox where refugees who escape their homelands due to security concerns are also considered to be national security threats. DXs, on the other hand, represent a group that takes an active role in decisions about who is at risk and who is risky. The study provides insights on two groups of people who are engaged with algorithms in different ways.

Details

Theorizing Criminality and Policing in the Digital Media Age
Type: Book
ISBN: 978-1-83909-112-4

Keywords

Book part
Publication date: 7 September 2020

Oleg E. Afanasiev, Alexandra V. Afanasieva, Mikhail A. Sarancha and Matvey S. Oborin

The present chapter has reviewed the opportunities and limitations of the Russian Federation to situate as a leading international destination. There are significant

Abstract

The present chapter has reviewed the opportunities and limitations of the Russian Federation to situate as a leading international destination. There are significant methodological and conceptual issues during the assessment of the world countries and regions safety level. They are caused by lack of the universal assessment method of such risks, incompleteness of the risk criteria taken into consideration, subjective assessment factors, and occasional substitution of the risk factors with the political–competitive ones. Still, the safety issue is one of the most important for a modern tourist. The available information resources, providing their own safety level assessment of the world countries and regions for travellers, differ between them in terms of the selected categories, specified safety levels of the countries and regions and also in terms of understanding and details of the travel risk notion itself. But the greatest challenge for an ordinary tourist, who does not have experience in searching specialised information, is to become familiar with these information resources.

Details

Tourism, Terrorism and Security
Type: Book
ISBN: 978-1-83867-905-7

Keywords

Book part
Publication date: 9 November 2009

Viktoria Baklanova

In July 2008 the U.S. Securities and Exchange Commission (SEC) published three proposals relating to the use of credit ratings in its rules and forms. The proposals were designed…

Abstract

In July 2008 the U.S. Securities and Exchange Commission (SEC) published three proposals relating to the use of credit ratings in its rules and forms. The proposals were designed to address concerns that the misuse of credit ratings may have contributed to the current crisis. The SEC sought market feedback regarding the effect the removal of credit rating references may produce on the markets.

This article examines the use of ratings by various market constituents, analyzes the details of the SEC proposals, and reviews the provided feedback. The main finding is that the majority of the market participants opposed the SEC proposals. Fiduciaries and regulated entities are looking to regulators to offer a common measure of risk, stable, accurate and free of conflict of interests.

Details

Credit, Currency, or Derivatives: Instruments of Global Financial Stability Or crisis?
Type: Book
ISBN: 978-1-84950-601-4

Abstract

Details

Energy Economics
Type: Book
ISBN: 978-1-83867-294-2

1 – 10 of over 12000