Search results
1 – 10 of over 12000Despite a hangover from the worldwide economic crisis, international trade rebounded nicely with a record-level growth in late 2010. A sharp rise in international trade has…
Abstract
Despite a hangover from the worldwide economic crisis, international trade rebounded nicely with a record-level growth in late 2010. A sharp rise in international trade has sparked the international traffic growth. A majority of this traffic growth originated from maritime logistics which could move cargoes in large volume and at cheaper freight costs. Due to its cost-efficiency and easy access, maritime logistics typically accounts for more than half of the worldwide freight volume. However, maritime logistics poses a greater supply chain risk, since ocean carriers used for maritime logistics are more vulnerable to unpredictable weather conditions, piracy attacks, terrorist hijacking, and cargo damages on the open sea than any other modes of transportation. Also, given the vast areas that maritime logistics covers, it is more difficult to protect maritime logistics activities from potential hazards and threats.
To better protect maritime logistics activities from potential security lapses, this chapter introduces and develops a variety of systematic security measures and tools that were successfully used by best-in-class companies and government entities across the world. Also, this chapter proposes a total maritime security management model as a way to formulate maritime risk mitigation strategies. To elaborate, this chapter sheds light on the roots of maritime security measures and tools, the ways that those measures and tools are best utilized, the roles of advanced information technology in maritime security from the global supply chain perspectives, the visualization and identification of potential maritime and its related supply chain risks, and policy guidelines that will help enhance maritime security.
Details
Keywords
İbrahim Murat BİCİL and Kumru TURKOZ
Introduction: Although the concept of energy security has different meanings for each country, it is included in the energy policies of all countries in general. Energy security…
Abstract
Introduction: Although the concept of energy security has different meanings for each country, it is included in the energy policies of all countries in general. Energy security policies have more strategic importance especially for energy-importing countries. Imported energy sources are widely used in Turkey as in many countries. The variety of imported energy sources and the density of imports according to the imported countries affect the security of imported energy supply. Although the high density of imports is a risk factor, there are political and structural factors that may affect economic relations with the countries where energy is imported.
Aim: The aim of this study is to measure the short-term risk for the import of fossil resources in Turkey for the period 1999–2018.
Method: An index has composed by revising the risky external energy supply index included in the study of Le Coq and Paltseva (2009).
Findings: Empirical findings showed that on average, the most risky source of imports based on fossil resources is oil, followed by natural gas and coal respectively.
Originality of the Study: Various risk factors such as fossil fuel import intensity, political risk, and logistics performance have been taken into consideration in the proposed index. So this index proposed for Turkey, is expected to offer a different perspective to the energy supply security literature.
Implications: The proposed risk index has enabled the measurement of the level of risk in imported fossil sources in Turkey. Thus, policy implications have been made for energy supply security.
Details
Keywords
Ayşen Akbaş Tuna and Zafer Türkmendağ
Cyber management of organizations includes eliminating security gaps, ensuring information confidentiality, and protecting customers' data. In addition, production and planning…
Abstract
Cyber management of organizations includes eliminating security gaps, ensuring information confidentiality, and protecting customers' data. In addition, production and planning, protecting cyber and digital infrastructure are included in the chapter. The chapter deals with these issues in the context of strategy and management. In addition, the conflicts arising from competitors to access the tacit knowledge (confidential information, commercial secrets, commercial relations, customers, and tenders) of the businesses are discussed in the chapter. Cyber conflicts have now turned into a business-to-business war. Businesses have become targets in cyberwars. This chapter, therefore, examines these issues in depth.
Details
Keywords
This research explores the implications for risk management of “People Risk.” In particular how online digital behaviors, particularly from young people entering the workplace for…
Abstract
Purpose
This research explores the implications for risk management of “People Risk.” In particular how online digital behaviors, particularly from young people entering the workplace for the first time, might impact on the work setting and how risk management might mitigate impact on the employee and organization.
Design/methodology/approach
A mixed methods approach was used to consider these implications and draws from a number of data sources in the United Kingdom including a database of self-review data around online safety policy and practice from over 2000 schools, a survey of over 1000 14–16 year olds and their attitudes toward sexting, and a survey of over 500 undergraduate students. In addition the work considers existing risk management approaches and the models therein and how they might be applied to people risk.
Findings
The dataset analyzed in this exploration show an education system in the United Kingdom that is not adequately preparing young people with an awareness of the implications of digital behavior in their lives and the survey data shows distorted social norms that might have serious consequences in the workplace.
Practical implications
This research should raise concerns for managers in the workplace who need to be aware of the changes in “normal” behavior and how these potentially harmful practices may be mitigated in the workplace.
Originality/value
The research provides a strong evidence base for a change in “acceptable” social behavior by children and young people alongside an education system not promoting effective awareness. These two datasets combined highlight potential new risks to the workplace.
Details
Keywords
Tayfun Kasapoglu and Anu Masso
Purpose: This study explores the perspectives of data experts (DXs) and refugees on the algorithms used by law enforcement officers and focuses on emerging insecurities. The…
Abstract
Purpose: This study explores the perspectives of data experts (DXs) and refugees on the algorithms used by law enforcement officers and focuses on emerging insecurities. The authors take police risk-scoring algorithms (PRSA) as a proxy to examine perceptions on algorithms that make/assist sensitive decisions affecting people’s lives.
Methodology/approach: In-depth interviews were conducted with DXs (24) in Estonia and refugees (19) in Estonia and Turkey. Using projective techniques, the interviewees were provided a simple definition of PRSA and a photo to encourage them to share their perspectives. The authors applied thematic analysis to the data combining manual and computer-aided techniques using the Maxqda software.
Findings: The study revealed that the perspectives on PRSA may change depending on the individual’s position relative to the double security paradox surrounding refugees. The use of algorithms for a sensitive matter such as security raises concerns about potential social outcomes, intentions of authorities and fairness of the algorithms. The algorithms are perceived to construct further social borders in society and justify extant ideas about marginalized groups.
Research limitations: The study made use of a small population sample and aimed at exploring perspectives of refugees and DXs by taking PRSA as the case without targeting representativeness.
Originality/value: The study is based on a double security paradox where refugees who escape their homelands due to security concerns are also considered to be national security threats. DXs, on the other hand, represent a group that takes an active role in decisions about who is at risk and who is risky. The study provides insights on two groups of people who are engaged with algorithms in different ways.
Details
Keywords
Oleg E. Afanasiev, Alexandra V. Afanasieva, Mikhail A. Sarancha and Matvey S. Oborin
The present chapter has reviewed the opportunities and limitations of the Russian Federation to situate as a leading international destination. There are significant…
Abstract
The present chapter has reviewed the opportunities and limitations of the Russian Federation to situate as a leading international destination. There are significant methodological and conceptual issues during the assessment of the world countries and regions safety level. They are caused by lack of the universal assessment method of such risks, incompleteness of the risk criteria taken into consideration, subjective assessment factors, and occasional substitution of the risk factors with the political–competitive ones. Still, the safety issue is one of the most important for a modern tourist. The available information resources, providing their own safety level assessment of the world countries and regions for travellers, differ between them in terms of the selected categories, specified safety levels of the countries and regions and also in terms of understanding and details of the travel risk notion itself. But the greatest challenge for an ordinary tourist, who does not have experience in searching specialised information, is to become familiar with these information resources.
Details
Keywords
In July 2008 the U.S. Securities and Exchange Commission (SEC) published three proposals relating to the use of credit ratings in its rules and forms. The proposals were designed…
Abstract
In July 2008 the U.S. Securities and Exchange Commission (SEC) published three proposals relating to the use of credit ratings in its rules and forms. The proposals were designed to address concerns that the misuse of credit ratings may have contributed to the current crisis. The SEC sought market feedback regarding the effect the removal of credit rating references may produce on the markets.
This article examines the use of ratings by various market constituents, analyzes the details of the SEC proposals, and reviews the provided feedback. The main finding is that the majority of the market participants opposed the SEC proposals. Fiduciaries and regulated entities are looking to regulators to offer a common measure of risk, stable, accurate and free of conflict of interests.