Search results
1 – 10 of over 70000
The function of a port has evolved from a platform providing simple loading and unloading activities to a gateway that opens up numerous opportunities that proliferate economic…
Abstract
Purpose
The function of a port has evolved from a platform providing simple loading and unloading activities to a gateway that opens up numerous opportunities that proliferate economic benefits. The effects of globalization and modern supply chain trends have reinforced the role that ports play in supply chains. This calls for contemporary studies on supply chain management to expand to address the management of supply chain disruptions that originate from port operations. The purpose of this paper is to provide perspectives from the industry on the proposed management model that seeks to address port-related supply chain disruptions (PSCD).
Design/methodology/approach
In-depth interviews were conducted with professionals from the port management and port users to preliminarily substantiate the findings.
Findings
A list of port-related supply chain threats was first identified and their occurrences were analyzed. Then, through the interviews with the management of industry players, the factors which may affect the implementation of the management model have been identified.
Research limitations/implications
This paper fills gaps in literature related to management of port risks and port resiliency.
Practical implications
The findings raised important issues in the management of PSCD with respect to strategic decision making and policy development.
Originality/value
This study contributes by aiming to minimize the potential of a list of identified threats through the implementation of a practical management model by port management to increase port resilience and maintain supply chain sustainability.
Details
Keywords
Joe Christopher, Gerrit Sarens and Philomena Leung
This study aims to critically analyse the independence of the internal audit function through its relationship with management and the audit committee.
Abstract
Purpose
This study aims to critically analyse the independence of the internal audit function through its relationship with management and the audit committee.
Design/methodology/approach
Results are based on a critical comparison of responses from questionnaires sent out to Australian chief audit executives (CAEs) versus existing literature and best practice guidelines.
Findings
With respect to the internal audit function's relationship with management, threats identified include: using the internal audit function as a stepping stone to other positions; having the chief executive officer (CEO) or chief finance officer (CFO) approve the internal audit function's budget and provide input for the internal audit plan; and considering the internal auditor to be a “partner”, especially when combined with other indirect threats. With respect to the relationship with the audit committee, significant threats identified include CAEs not reporting functionally to the audit committee; the audit committee not having sole responsibility for appointing, dismissing and evaluating the CAE; and not having all audit committee members or at least one member qualified in accounting.
Originality/value
This study introduces independence threat scores, thereby generating analysis of the internal audit function's independence taking into account a combination of threats.
Details
Keywords
Kajsa Asplund, Pernilla Bolander and Andreas Werr
Performance management can play an important role in the implementation of strategic change, by aligning employees’ mindsets and behavior with organizational goals. However, the…
Abstract
Performance management can play an important role in the implementation of strategic change, by aligning employees’ mindsets and behavior with organizational goals. However, the ways in which employees react to change efforts aided by performance management practices are far from straight-forward. In this chapter, we develop a conceptual framework for understanding employees’ reactions to strategic change as a consequence of their occupational identities and their performance management outcome. We further apply the framework to an empirical study of a strategic change initiative in a school organization that was supported by a new performance management practice. We show how variations in perceived identity threat translate into four distinct patterns of emotional and behavioral reactions, where only one represents whole-hearted change acceptance. The study contributes to our understanding of individual- and group-level heterogeneity in reactions to strategic change, and also to a more nuanced conception of identity threat.
Details
Keywords
Rita Dalton and Helen Eracleous
This article considers the literature on threats made by individuals, with particular reference to threats made by patients against health care workers. It is in two parts. The…
Abstract
This article considers the literature on threats made by individuals, with particular reference to threats made by patients against health care workers. It is in two parts. The first part considers the definitions and classification of threats, the prevalence of threat‐making and suggestions for assessment and management. The second part concerns the characteristics of those who threaten and the impact of the threats on the victims, and considers threats as predictors of, and part of, the escalating process which leads to further violence.
Details
Keywords
H. Mouratidis, H. Jahankhani and M.Z. Nkhoma
The purpose of this study is to explore the rationale that governs implementation of information systems and network security expenditures through a case study approach.
Abstract
Purpose
The purpose of this study is to explore the rationale that governs implementation of information systems and network security expenditures through a case study approach.
Design/methodology/approach
The research method took the form of a mixed‐method assessment of the perceptions of persons of authority in the management and the network security areas of an organization that has implemented network security protocols. Two stages of the research process were completed in order to gather the necessary data for the study. The first stage of the study was the administration of a Likert‐type questionnaire in which respondents answered 30 unique items on network security. In the second phase of the study, a number of responders were contacted to further expand upon the themes presented in the Likert‐type questionnaire.
Findings
Empirical evidence gathered justifies theoretical claims that personnel from general management have different perspectives towards network security than personnel from the network security management. In particular, the study indicates that such differences are demonstrated on a number of areas such as the effectiveness and the efficiency of the networked system; control of network security; security‐related decision‐making processes; and users of the network. The latter being the most controversial issue with one side indicating that users should be allowed to use the network in an efficient manner, and the other side emphasizing that users pose one of the greatest security risks to the system.
Research limitations/implications
The limitations of the study are found in its focus on a specific company and on its perception‐centred nature of risk and risk analysis. No two persons identify and frame risk in an identical manner. This creates potential conflict of interest when the participants within a risk assessment process approach the issues and present their arguments as to how to best identify and respond to risks.
Practical implications
Through comparing and contrasting the perspectives of the two sample populations, the research assists in demonstrating how, why, and to what extent specific problems are recognized by those within management and those within network security. This allowed the analysis of how these problems are defined and what steps can be taken that would help to reduce or eliminate its impact in the organization used in our case study.
Originality/value
It has been argued in the literature that there is lack of empirically based research to explore and effectively analyze the perceptions held by management and by security specialists within organizations with respect to security. This paper presents the results of the application of a novel two‐stage framework on an empirical case study focused on a large national bank. The work allowed the identification of the various perceptions held by management and by security specialists, and the degree to which these perceptions are similar.
Details
Keywords
Pengcheng Xiang, Simai Yang, Yongqi Yuan and Ranyang Li
The purpose of this paper is to develop a comprehensive understanding of the public safety risks of international construction projects (ICPs) from the perspective of threat and…
Abstract
Purpose
The purpose of this paper is to develop a comprehensive understanding of the public safety risks of international construction projects (ICPs) from the perspective of threat and vulnerability. A novel and comprehensive risk assessment approach is developed from a systemic perspective and applied to the Belt and Road Initiative (BRI) to improve the public safety risk management strategy for ICPs in BRI.
Design/methodology/approach
First, a public safety risk indicator system was constructed from the two dimensions, namely threat and vulnerability. Next, an integrated measurement model was constructed by combining the Genetic Algorithm-Backpropagation (GA-BP) neural network, fuzzy comprehensive evaluation method and matter-element extension (MME) method. Data from 49 countries involved in the BRI, as well as five typical projects, were used to validate the model. Finally, targeted risk prevention measures were identified for use at the national, enterprise and project levels.
Findings
The findings indicate that while the vulnerability risks of typical projects in each region of the BRI were generally low, threat risks were high in West Asia and North Africa, Commonwealth of Independent States (CIS) countries and South Asia.
Originality/value
First, the structure of the public safety risk system of ICPs was analyzed using vulnerability and system theories. The connotation of public safety risk was defined based on two dimensions, namely threat and vulnerability. The idea of measuring threat risk with public data and measuring vulnerability risk with project data was clarified, and the risk measurement was integrated into the measurement results to help researchers and managers understand and systematically consider the public safety risks of ICPs. Second, a public safety risk indicator system was constructed, including 18 threat risk indicators and 14 vulnerability risk indicators to address the gaps in the existing research. The MEE model was employed to overcome the problem of incompatible indicator systems and provide stable and credible integrated measurement results. Finally, the whole-process public safety risk management scheme designed in this study can help to both provide a reference point for the Chinese enterprises and oversea contractors in market selection as well as improve ICP public safety risk management.
Details
Keywords
Luca Urciuoli, Sangeeta Mohanty, Juha Hintsa and Else Gerine Boekesteijn
The purpose of this paper is to enhance the understanding about how energy supply chains work to build resilience against exogenous security threats and thereafter what support…
Abstract
Purpose
The purpose of this paper is to enhance the understanding about how energy supply chains work to build resilience against exogenous security threats and thereafter what support mechanisms should be introduced or improved by the European Union.
Design/methodology/approach
Five case studies and data collection from multiple sources is used to understand what exogenous security threats could lead to the disruption of oil and gas flows to Europe, how energy companies, from a supply chain perspective, are working to manage these threats and finally, how the EU may coordinate the security of the energy sector in collaboration with supply chain companies.
Findings
Results show that today, oil and gas supply chains have in place a good combination of disruption strategies, including portfolio diversification, flexible contracts, transport capacity planning and safety stocks. The most relevant security threats the companies fear, include hijacking of vessels (sea piracy), but also terrorism, and wars. Finally, the study highlights that the European Union has built a comprehensive portfolio of strategies to deal with scarcity of oil and gas resources. However, these approaches are not often synchronized with supply chain strategies.
Practical implications
The paper provides guidance for supply chain managers dealing with critical suppliers located in conflict environments. The paper recommends that supply chain managers fine tune their strategies in coordination with governmental actions in foreign politics, dependence reduction and crisis management. This may be achieved by closer communication with governments and potentially through the creation of a pan-European sector alliance.
Originality/value
Previous research discusses the topic of supply chain resilience and supply chain risk management. However, none of these studies report on exogenous security threats and disruption strategies of oil and gas supply chains. At the same time, previous research lacks detailed studies describing the interaction between governments and energy supply chains.
Details
Keywords
Monique Combes-Joret and Laëtitia Lethielleux
After eight years of reforms, the French Red Cross (FRC) changed status from humanitarian association to nonprofit organization (NPO). This in-depth study of the organization’s…
Abstract
Purpose
After eight years of reforms, the French Red Cross (FRC) changed status from humanitarian association to nonprofit organization (NPO). This in-depth study of the organization’s recent past (2005-2013) aims to highlight several identity threats linked to the ongoing process of organizational rationalization and managerialization. The main contribution of this paper is based on the responses provided by this NPO to deal with it.
Design/methodology/approach
This communication has been produced as part of a three-year research contract (2010-2013) for the FRC. A total of 39 semi-structured interviews conducted between February and June 2013, participatory observation and documentary study. Of the 39 interviews, 29 were usable, and these were analyzed using ALCESTE software. This software enabled the authors to quantify and extract the strongest signifying structures.
Findings
The “Red Cross” meta-identity has so far enabled FRC to change its identity, not without difficulty, but without major organizational crises. In this case, the results confirm the Ravasi at Schultz model (2006) by underlining the difficulty to create a “giving sense process.” At managerial level, the choice of “self-regulated” professionalization seems to have made the most impact in changing the members’ identity understanding. In response to the threat of the fragmentation of social links, the implementation of an important internal communication policy around the idea of a “community of actors” has not had the expected results.
Research limitations/implications
This study is based on a unique case with unusual dimensions (18,025 employees and 56,136 volunteers).
Practical implications
The example of the FRC is indicative of what happens in the nonprofit sector. The answers provided by this extraordinary association may inspire other organizations facing an identity crisis.
Originality/value
This paper reveals two major contributions. First, it validates the appropriateness of the Ravasi and Schultz model (2006) for the study of identity change in social enterprises. Second, it assists managers through its analysis of the appropriateness of procedures and tools used to support identity change. From an international perspective, this paper also contributes by describing the evolution of NPOs in the French context.
Details
Keywords
Eileen Weisenbach Keller, Stephanie Hughes and Giles Hertz
An increase in the number of disruptive and violent events on college and university campuses instigated this review of the methods used to interrupt the trend, with the goal of…
Abstract
Purpose
An increase in the number of disruptive and violent events on college and university campuses instigated this review of the methods used to interrupt the trend, with the goal of identifying a preliminary model for systematic management of such threats. The intent is to instigate research, review and discussion in order to decrease the number and severity of threatening incidents on college campuses.
Design/methodology/approach
Thorough review of plans from primary and secondary education, plans in use in higher education, literature on risk and threat assessment, literature on “whistle blowers”, and of violent events on college campuses was used to construct a model.
Findings
It was found that, in terms of managing and reducing threats to people who study, live and work in post‐secondary educational institutions, insufficient attention has been given to the unique needs of this setting and therefore efforts to mitigate threats have been insufficient. The investigation resulted in the development of a model of assessment and management of threats on university and college campuses.
Research limitations/implications
College campus threat assessment research is very much in its infancy and will certainly develop over time. This paper is the first step in an effort to develop and ultimately test the plausibility of a model. Future research should be pursued to determinewhether the model holds up under a majority of situations on college campuses. Those involved in threat mitigation in university settings should be queried to determine their agreement with the proposed framework and for assistance in refining it.
Originality/value
This paper presents suggestions for the systematic management of threats and mitigation in university settings.
Details