Search results

1 – 10 of over 4000
Article
Publication date: 9 January 2017

Rofyanto Kurniawan, Suhaiza Hanim Zailani, Mohammad Iranmanesh and Premkumar Rajagopal

The vulnerability issue in supply chains is among the most pressing concerns that firms are currently facing. As a preliminary attempt to address the lack of empirical research…

4203

Abstract

Purpose

The vulnerability issue in supply chains is among the most pressing concerns that firms are currently facing. As a preliminary attempt to address the lack of empirical research, this paper aims to primarily explore the relationship between vulnerability mitigation strategies and supply chain effectiveness with security culture as a moderator.

Design/methodology/approach

Data are gathered via a survey of 209 Indonesian manufacturing firms. The data are analyzed using partial least squares technique.

Findings

Results indicate that supply chain visibility, supply chain flexibility and supplier development strategies positively affect supply chain effectiveness. Moreover, risk culture positively moderates the effects of supply chain visibility and supplier development on supply chain effectiveness.

Practical implications

The findings may improve supply chain effectiveness by mitigating the effects of vulnerability causes.

Originality/value

This study contributes to the advancement of knowledge on the relationships between vulnerability mitigation strategies and supply chain effectiveness.

Details

Supply Chain Management: An International Journal, vol. 22 no. 1
Type: Research Article
ISSN: 1359-8546

Keywords

Article
Publication date: 11 May 2021

Zulqurnain Ali, Bi Gongbing and Aqsa Mehreen

Currently, small and medium enterprises (SMEs) are facing different types of risk, and mitigating these risks is the primary concern for the emerging firms. This study intends to…

Abstract

Purpose

Currently, small and medium enterprises (SMEs) are facing different types of risk, and mitigating these risks is the primary concern for the emerging firms. This study intends to investigate “do vulnerability mitigation strategies (VMSs) predict firm performance (FP)”? Moreover, it explores the mediation mechanism of supply chain risk (SCR) in the association between VMSs and FP.

Design/methodology/approach

Using a survey method, the authors recruited 355 textile SME entrepreneurs and tested their proposed model and hypotheses in AMOS.

Findings

The findings depict that all VMSs significantly minimize SCR, which subsequently enhances FP. Moreover, he atudy also identifies supply chain finance (SCF), a new VMS in the context of textile SMEs.

Practical implications

The findings help SME officials to minimize SCR through proper implementation of VMSs in the firm's daily operations. SCF is strongly recommended to SMEs because it optimizes working capital and minimizes the risk of default.

Social implications

This research supports SMEs to overcome vulnerabilities using VMSs and provide sustainable employment to individuals in the society.

Originality/value

This study reviews four VMSs and how these strategies simultaneously mitigate SCR and enhance SME performance in the emerging market context, which was skipped in the literature of supply chain management. Moreover, the study identifies SCF as a significant risk mitigation strategy for SMEs.

Details

International Journal of Emerging Markets, vol. 18 no. 3
Type: Research Article
ISSN: 1746-8809

Keywords

Book part
Publication date: 26 January 2022

Oluponmile Olonilua

This chapter discusses some issues of diversity in hazard mitigation when just recovery is considered or not. Justice in hazard mitigation becomes crucial considering unequal…

Abstract

This chapter discusses some issues of diversity in hazard mitigation when just recovery is considered or not. Justice in hazard mitigation becomes crucial considering unequal distribution of resources, systemic racism, and social vulnerability to hazards. While there has been research on just recovery, there is little or no evidence of research that examines the issue of equity and justice in hazard mitigation, This chapter discusses what hazard mitigation is, the Disaster Mitigation Act of 2000 focusing on the planning process, public involvement in the planning process, some planning theories on vulnerability, and building the case for achieving and striving for justice and equity in promoting diversity in hazard mitigation. The chapter makes some recommendation on how to achieve diversity in hazard mitigation.

Details

Justice, Equity, and Emergency Management
Type: Book
ISBN: 978-1-83982-332-9

Keywords

Article
Publication date: 16 August 2021

Zhen Bi, Feng Yang and Jean-Noël Beka Be Nguema

Little is known about the effects of supply chain finance (SCF) adoption on organizational performance (OP). This study aims to address this relevant research gap, and hence draws…

Abstract

Purpose

Little is known about the effects of supply chain finance (SCF) adoption on organizational performance (OP). This study aims to address this relevant research gap, and hence draws on the dynamic capability view of the organization under the contingent effect of environmental dynamism (ED) and supply chain risk (SCR) to investigate the effects of SCF adoption on OP.

Design/methodology/approach

A conceptual framework is developed and then tested using survey with data collected from a cross section of 217 organizations in China.

Findings

The findings show that SCF significantly mitigates the SCR, which therefore has a strong positive effect on OP (e.g. cost performance and operational performance). Moreover, the findings indicate that when ED is high, then the relationship between SCF and SCR is stronger, whereas when ED is low, the relationship between SCF and SCR is weak. Further, SCR mediates the relationship between SCF and OP. Hypothesis regarding the moderating effect of ED on the paths joining SCF and SCR was also confirmed. SCR has a strong negative effect on OP. However, hypothesis regarding the effect of ED on SCR was rejected.

Research limitations/implications

This paper has the following limitations. First, the authors conducted the study with organizations in China, which may result in low generalizability. Moreover, the authors used survey method and cross-sectional data design in this paper, which may cause the potential issue of common method bias. However, this research provided some significant theoretical and managerial implications for organizations, practitioners and researchers, while exploring different factors such SCF, SCR and ED, and their effect on organizational output.

Practical implications

From the managerial perspective, this study provides some relevant new insights to the supply chain managers of organizations. First, the findings of present study guide the organization executives to mitigate their organizations’ risk through risk mitigation strategies such as SCF; optimize their liquidity and working capital while getting the credit at best cost from lenders; and mitigate vulnerability. Second, organizations should adopt vulnerability strategies for improving their capability to respond promptly and cost-effectively toward uncertainties. Third, the perfect identification of factors leading to the adoption of SCF and improving OP are of incredible attractiveness for executives to discover the relevant practice of SCF. Fourth, the results also offer an opportunity to organizations and practitioners, a decision-making approach, to manage which mitigation scheme to be adopted to aid the supply chain practices of mitigation. Moreover, SCF emphasizes that the organization managers’ expand their overall supply chain by getting easy credit and reducing the risk and produce higher organizational productivity. Further, this paper offers a completive advantage for both buyers and suppliers to strengthen their relationships while collaborating with each other. The supply chain executives may explore the level of relationship amongst SCF adoption and their effects on organizational productivity. Therefore, SCF provides equal competitive advantage to both main partners of the supply chain to mitigate the overall risks and improve their competiveness.

Originality/value

This research fulfilled the research gap in operations management, strategic management, marketing and supply chain management by exploring the effects of SCF adoption as risk mitigation strategy but also as an instrument which can aid organizational to carry out their performance.

Details

Journal of Business & Industrial Marketing, vol. 37 no. 3
Type: Research Article
ISSN: 0885-8624

Keywords

Article
Publication date: 3 April 2020

Yesim Can Saglam, Sibel Yildiz Çankaya and Bulent Sezen

In spite of its potential benefits in a wide range of situations, supply chain risk mitigation strategies have received scant attention on the subject of managing the supply chain…

3892

Abstract

Purpose

In spite of its potential benefits in a wide range of situations, supply chain risk mitigation strategies have received scant attention on the subject of managing the supply chain risk in the business environment. Especially, there is still a limited understanding of the importance of firms’ supply chain flexibility, resilience and responsiveness in the supply chain risk management (SCRM) literature. This research focuses on exploring the relationship between significant proactive risk mitigation strategies, namely supply chain (SC) flexibility, resilience and responsiveness, as well as SCRM performance to facilitate bridging the gap between mitigation strategies and SCRM performance. The moderating role of risk management (RM) culture was also hypothesized and tested.

Design/methodology/approach

A survey-based methodology is adopted. The data are analyzed using the technique of partial least squares.

Findings

The results indicate that SC resilience and responsiveness are positively associated with SCRM performance; however, SC flexibility does not. In addition, interestingly, RM culture does not moderate these relationships in spite of the extant literature. We argue that this could be due to the fact that risk management culture is at the beginning stage for an enterprise in Turkey.

Originality/value

This study extends the existing literature by advancing the knowledge on the relationship between proactive risk management strategies, which applied to overcome uncertainties and SCRM performance.

Details

Journal of Manufacturing Technology Management, vol. 32 no. 6
Type: Research Article
ISSN: 1741-038X

Keywords

Open Access
Article
Publication date: 2 January 2024

Eylem Thron, Shamal Faily, Huseyin Dogan and Martin Freer

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…

Abstract

Purpose

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new security and safety risks that can be realised, both in terms of human error, and malicious and non-malicious behaviour. This study aims to identify the human factors (HF) and cyber-security risks relating to the role of signallers on the railways and explores strategies for the improvement of “Digital Resilience” – for the concept of a resilient railway.

Design/methodology/approach

Overall, 26 interviews were conducted with 21 participants from industry and academia.

Findings

The results showed that due to increased automation, both cyber-related threats and human error can impact signallers’ day-to-day operations – directly or indirectly (e.g. workload and safety-critical communications) – which could disrupt the railway services and potentially lead to safety-related catastrophic consequences. This study identifies cyber-related problems, including external threats; engineers not considering the human element in designs when specifying security controls; lack of security awareness among the rail industry; training gaps; organisational issues; and many unknown “unknowns”.

Originality/value

The authors discuss socio-technical principles through a hexagonal socio-technical framework and training needs analysis to mitigate against cyber-security issues and identify the predictive training needs of the signallers. This is supported by a systematic approach which considers both, safety and security factors, rather than waiting to learn from a cyber-attack retrospectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 12 April 2018

Faith Ngum, Dieudonne Alemagi, Lalisa Duguma, Peter A. Minang, Anderson Kehbila and Zac Tchoundjeu

This paper aims to examine the policy environments, institutional arrangements and practical implementation of some initiatives undertaken by the Government of Cameroon, together…

3622

Abstract

Purpose

This paper aims to examine the policy environments, institutional arrangements and practical implementation of some initiatives undertaken by the Government of Cameroon, together with some relevant stakeholders, in addressing climate change mitigation and adaptation at various levels in the country, which are prerequisites to promote synergistic ways of addressing climate change mitigation and adaptation.

Design/methodology/approach

Using a qualitative approach to data collection, the paper draws upon information collected from relevant literature and interviews with 18 key country resource personnel.

Findings

Results revealed that most reviewed policies/programs/strategies do not mention “climate change” explicitly but propose some activities which indirectly address it. Interaction is fair within the government ministries but weak between these ministries and other institutions. Inadequate financial resources are being opined as the most important challenge stakeholders are (and would continue) facing as a result of adopting integrated approaches to climate change. Other challenges include inadequate coordination, insufficient sensitization and capacity building, ineffective implementation, inadequate compliance, lack of proper transparency and inadequate public participation. To redress the aforementioned constraints and challenges, the paper concludes by outlining a number of recommendations for policy design.

Originality/value

The following recommendations were made: create a national technical committee to oversee and provide scientific guidance to the government on synergistic approaches; promote private sector investment and sponsorship on synergistic approaches; create local awareness, etc. It is important to underscore that minimal studies have been conducted to analyze multi-stakeholder perspectives on synergies between climate change mitigation and adaptation in Cameroon. This study attempts to bridge this major gap.

Details

International Journal of Climate Change Strategies and Management, vol. 11 no. 1
Type: Research Article
ISSN: 1756-8692

Keywords

Article
Publication date: 16 April 2019

Salomée Ruel, Sabry Shaaban and Margaux Ducros

Companies today observe an increase in the complexity and vulnerability of their supply chains (SCs) as a result of global scale networks and a turbulent environment. The purpose…

Abstract

Purpose

Companies today observe an increase in the complexity and vulnerability of their supply chains (SCs) as a result of global scale networks and a turbulent environment. The purpose of this paper is to explore knowledge management (KM) as a potential way of reducing SC vulnerability and answer the following question: how does inter-organisational KM influence efforts to reduce SC vulnerability?

Design/methodology/approach

Drawing on the resource-based view and the knowledge-based view (KBV), a single case study in the energy industry is conducted by collecting various data through interviews, observations and internal documents.

Findings

This edifying case study indicates that a lack of KM hinders any attempt to mitigate SC vulnerability.

Research limitations/implications

This research shows several limitations such as data privacy, generalisation and the decision to study an atypical SC.

Practical implications

The paper points out in a dedicated section the key actions a company should take in order to develop the required characteristics of knowledge expressed in the KBV.

Originality/value

This is the first qualitative research that investigates the relationships between SC vulnerability and KM, and more particularly in a recycling context where a strong research gap exists.

Details

Journal of Enterprise Information Management, vol. 32 no. 2
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 24 March 2021

Jean-Noël Beka Be Nguema, Gongbing Bi, Temidayo O. Akenroye and Jamal El Baz

This paper aims to draw on the dynamic capabilities approach and aims to empirically investigate the impact of supply chain finance (SCF) on firm performance (e.g. operational…

1687

Abstract

Purpose

This paper aims to draw on the dynamic capabilities approach and aims to empirically investigate the impact of supply chain finance (SCF) on firm performance (e.g. operational risk and operational performance), the critical effect of environmental dynamism (ED) as moderator and supply chain risk (SCR) and a mediator in the relationship between SCF and organizational performance (OP).

Design/methodology/approach

This study is based on empirical data collected from a survey of 210 companies and their supply chains in mainland China. Structural equation modeling is used to test the proposed relationships.

Findings

The findings show that SCF significantly mitigates the SCR, which subsequently has a significant positive effect on OP (e.g. operational risk and operational performance). The findings also show that when ED is high, the relationship between SCF and SCR is stronger and vice versa. Moreover, SCR mediates the relationship between SCF and OP. The hypothesis regarding the moderating effect of ED on the paths joining SCF and SCR was also supported. SCR has a significant negative effect on OP. However, the hypothesis regarding the effect of ED on SCR was not supported.

Research limitations/implications

This study has some limitations. First, this paper conducted the research with Chinese organizations. This may result in low generalizability in other contexts. In addition, this paper used the survey method and cross-sectional data design in this study, which may generate the potential issue of common method bias. However, the findings of this study will help organizations across China and other emerging economies to adopt SCF as a secure financing mechanism to enhance working capital and mitigate risk. In addition, the paper provides some new managerial insights for decision-makers in organizations, while exploring different factors such as SCF, SCR and ED and their effect on the organization.

Originality/value

This study has greatly developed a general SCF adoption model that helps to guide empirical research investigating the critical impact of SCF on firm performance.

Details

Supply Chain Management: An International Journal, vol. 27 no. 1
Type: Research Article
ISSN: 1359-8546

Keywords

Open Access
Article
Publication date: 3 November 2022

Godwin Thomas and Mary-Jane Sule

This paper proposes a holistic, proactive and adaptive approach to cybersecurity from a service lens, given the continuously evolving cyber-attack techniques, threat and…

1722

Abstract

Purpose

This paper proposes a holistic, proactive and adaptive approach to cybersecurity from a service lens, given the continuously evolving cyber-attack techniques, threat and vulnerability landscape that often overshadow existing cybersecurity approaches.

Design/methodology/approach

Through an extensive literature review of relevant concepts and analysis of existing cybersecurity frameworks, standards and best practices, a logical argument is made to produce a dynamic end-to-end cybersecurity service system model.

Findings

Cyberspace has provided great value for businesses and individuals. The COVID-19 pandemic has significantly motivated the move to cyberspace by organizations. However, the extension to cyberspace comes with additional risks as traditional protection techniques are insufficient and isolated, generally focused on an organization's perimeter with little attention to what is out there. More so, cyberattacks continue to grow in complexity creating overwhelming consequences. Existing cybersecurity approaches and best practices are limited in scope, and implementation strategies, differing in strength and focus, at different levels of granularity. Nevertheless, the need for a proactive, adaptive and responsive cybersecurity solution is recognized.

Originality/value

This paper presents a model that promises proactive, adaptive and responsive end-to-end cybersecurity. The proposed cybersecurity continuity and management model premised on a service system, leveraging on lessons learned from existing solutions, takes a holistic analytical view of service activities from source (service provider) to destination (Customer) to ensure end-to-end security, whether internally (within an organization) or externally.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

1 – 10 of over 4000