Search results

1 – 10 of 114
Open Access
Article
Publication date: 30 June 2007

Charles-Henri Fredouet

Organizations, would they be individual companies or large multi-firm networks, face a wide variety of potential risks requiring dedicated keen management. It all the better…

Abstract

Organizations, would they be individual companies or large multi-firm networks, face a wide variety of potential risks requiring dedicated keen management. It all the better applies to supply-chains as risk, related to both physical and information flows, pervades the whole logistics network and has acquired a new and growing security dimension since 9/11. More specifically, as they are now under the permanent threat of terrorism, and because offering sufficient security levels is bound to become a necessary condition for global supply-chain membership, seaports need to adjust their risk management strategy and processes accordingly. In such a context, this paper aims at describing the project of a decision-support system, dedicated to container transit security-wise decision making and which features an expert-system architecture.

Details

Journal of International Logistics and Trade, vol. 5 no. 1
Type: Research Article
ISSN: 1738-2122

Keywords

Open Access
Article
Publication date: 19 May 2020

Wael Zakaria Farag

The purpose of this paper is to examine evolution of the American strategy toward terrorism in the aftermath of the events of September 11, 2001. In other words, this study…

3592

Abstract

Purpose

The purpose of this paper is to examine evolution of the American strategy toward terrorism in the aftermath of the events of September 11, 2001. In other words, this study revolves around a key question: How and why the American security strategy toward terrorism evolved in the aftermath of the September 11 attacks in 2001? Based on the neorealist approach in international relations, this paper attempted to answer that question: first, through defining the concept of terrorism and how the Americans perceive it; second, via pinpointing the characteristic of the American counter-terrorism strategy before September 11 attacks; and third, through examining the effects of those terrorist attacks on that strategy.

Design/methodology/approach

The nature of the subject of this study calls for reliance on the analytical descriptive approach to highlight the role and strategy of the USA in the fight against terrorism following the events of September 11, in addition to the use of the system analysis methodology, which can identify the inputs and outputs of the system that had an impact in formulating the US counter-terrorism strategy.

Findings

This study has come up with seven findings. The first finding was that the 9/11 attacks served as a turning point of the US counter-terrorism strategy and restructured its agenda. Confronting the communist threat had been its primary objective, until terrorism came to the fore and became its first and foremost priority. The USA vowed that terrorism is its enemy and waged the war on terror to thwart its risk as a global threat. The second finding revolves around the idea of double standards in the American foreign policy. True to its long-standing tradition of favoring its own interests, in complete disregard of the interests of any other party, the USA continued to uphold the double-standards policy.

Originality/value

This study adds a new study to the Arab Library in the field of counter-terrorism studies, national security strategies and American foreign policy. In addition, the researcher seeks to complete the scientific effort to study the US strategy against terrorism, with a clear impact on the development of the situation in the region. This study contributes to the study of how one of the great powers in the international system, the USA, deals with the terrorist organizations that have become widespread in the Arab region.

Details

Review of Economics and Political Science, vol. 5 no. 4
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 30 April 2017

Dicky Hadi Pratama and Sophia Everett

Discussion of security in supply chains has been intensified since the tragedy of 9/11 in the United States. The World Customs Organization's SAFE Framework with its Authorized…

Abstract

Discussion of security in supply chains has been intensified since the tragedy of 9/11 in the United States. The World Customs Organization's SAFE Framework with its Authorized Economic Operators (AEO) program is one of the prominent supply chain security initiatives. At the time of its introduction in 2005, 168 member countries signed their support for its implementation. However, the last AEO Compendium reports only 69 countries currently have AEO program in place. This relatively slow development indicates the complexity of issues that might challenge countries to implement the initiative. Against this background, this paper aims to look at the AEO implementation in an environment where supply chain security initiative is relatively new. It focuses on policy development perspectives where the case study of Indonesia might represent challenges of other countries. Involving methods of desk research, interviews, and field observation, this paper starts with the development of various international supply chain security programs where the AEO finds it prominence. It follows with a discussion on the Indonesian AEO implementation where challenges and its policy development process are explored.

Details

Journal of International Logistics and Trade, vol. 15 no. 1
Type: Research Article
ISSN: 1738-2122

Keywords

Open Access
Article
Publication date: 4 June 2019

Yok-Fong Paat and Luis R. Torres

Drawing insights from the ecological theory, the purpose of this paper is to explore social determinants related to pathways to high-risk sexual behaviors of international…

Abstract

Purpose

Drawing insights from the ecological theory, the purpose of this paper is to explore social determinants related to pathways to high-risk sexual behaviors of international travelers across their life span.

Design/methodology/approach

Data were collected from 45 international travelers in Houston, a critical transit point frequented by international visitors.

Findings

Overall, several ecological settings (individuals, interpersonal, institutional and contextual) related to two typologies of international travelers (risk takers vs non-risk takers) and their inclination to engage in high-risk sexual practices in an international or/and local context were identified.

Research limitations/implications

This research calls for the need to assess high-risk sexual behaviors from the ecological perspective to better understand the dynamics of disease transmission among frequent international travelers from diverse backgrounds/life styles and age cohorts.

Practical implications

Prevention and treatment programs developed for at-risk international travelers should target both distal and proximal social factors that predispose travelers to vulnerable situations. To build a reliable health surveillance network, policy makers, health practitioners and educators must focus not only on individual-level determinants but also on other ecological determinants that branch out beyond the personal level (e.g. interpersonal, institutional and contextual levels). Multi-level formal and informal social networks can be developed to promote a global social climate and environment that encourage safe sex and safety precautions.

Social implications

To raise awareness, the public must be constantly reminded that outbreaks of potentially health hazards can lead to unpredictable morbidity/mortality and security risks that place a burden on our nation’s economic growth, emergency responsiveness and homeland security infrastructure.

Originality/value

The study is one of very few to address international travelers’ health risk, while abroad, from an ecological lens across the life course.

Details

Journal of Health Research, vol. 33 no. 4
Type: Research Article
ISSN: 2586-940X

Keywords

Open Access
Article
Publication date: 31 December 2019

Bilge Yigit Ozkan, Marco Spruit, Roland Wondolleck and Verónica Burriel Coll

This paper presents a method for adapting an Information Security Focus Area Maturity (ISFAM) model to the organizational characteristics (OCs) of a small- and medium-sized…

2595

Abstract

Purpose

This paper presents a method for adapting an Information Security Focus Area Maturity (ISFAM) model to the organizational characteristics (OCs) of a small- and medium-sized enterprise (SME) cluster. The purpose of this paper is to provide SMEs with a tailored maturity model enabling them to capture and improve their information security capabilities.

Design/methodology/approach

Design Science Research was followed to design and evaluate the method as a design artifact.

Findings

The method has successfully been used to adapt the ISFAM model to a group of SMEs within a regional cluster resulting in a model that is aligned with the OCs of the cluster. Areas for further investigation and improvements were identified.

Research limitations/implications

The study is based on applying the proposed method for the SMEs active in the transport, logistics and packaging sector in the Port of Rotterdam. Future research can focus on different sectors and regions. The method can be used for adapting other focus area maturity models.

Practical implications

The resulting adapted maturity model can facilitate the creation and further development of a base of common or shared knowledge in the cluster. The adapted maturity model can cut the cost of over implementation of information security capabilities for the SMEs with scarce resources.

Originality/value

The resulting adapted maturity model can facilitate the creation and further development of a base of common or shared knowledge in the cluster. The adapted maturity model can cut the cost of over implementation of information security capabilities for the SMEs with scarce resources.

Details

Journal of Intellectual Capital, vol. 21 no. 2
Type: Research Article
ISSN: 1469-1930

Keywords

Open Access
Article
Publication date: 30 June 2010

Won-Mog Choi

Radio frequency identification (RFID) provides a useful tool for the prescreening or detection of goods and containers moving across the border and for controlling the trade of…

Abstract

Radio frequency identification (RFID) provides a useful tool for the prescreening or detection of goods and containers moving across the border and for controlling the trade of illicit materials and preventing or mitigating the effects of terrorism. Although anti-terrorism measures are important in today’s dangerous world, RFID tools, if misused, may violate the WTO trade rules. Whenever goods or container control measures using RFID are proposed, their contents, objectives, and rationale must be published, and WTO members must be notified through the WTO Secretariat and allowed to make comments. WTO members should not take such measures that are designed or applied in a discriminatory manner and those measures must be adopted only under necessary situations and to the extent necessary. These measures must reduce the incidence and complexity of import and export formalities, and there should not be substantial penalties for minor breaches of the requirements under the measures. If the measures require country-of-origin information in RFID tags, they must apply in the same way to like products, and they must not cause unnecessary inconveniences or unreasonable cost. If the measures deal with containers in international transit, they must be reasonable, consider the conditions of the traffic, and guarantee transit through the most convenient routes for international transit.

A container control measure designed to restrict the flow of fissionable materials or their derivative materials, traffic in arms, ammunition, and implements of war, or traffic in military supply goods and materials may be justified, even if it violates some of the GATT rules. In addition, a measure established in time of war or other emergency in international relations or based on the United Nations Charter and designed to maintain international peace and security can also be justified. As a last resort, WTO members may request a waiver from GATT and TBT Agreement obligations for container control measures that include RFID.

Superpowers must be careful not to use RFID to practice power politics and create regulations to deal with national security and anti-terrorism issues that do not conform to international law. The key question is how to maintain a balance between the two inalienable values of free trade and national security in this era of globalization, harmonization, and terrorism .

Details

Journal of International Logistics and Trade, vol. 8 no. 1
Type: Research Article
ISSN: 1738-2122

Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7101

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 28 March 2023

Saheeh Shafi

This paper aims to interpret the multidimensional Asian American identity of immigrant Indians in terms of pan-ethnicity, gender and religion.

1106

Abstract

Purpose

This paper aims to interpret the multidimensional Asian American identity of immigrant Indians in terms of pan-ethnicity, gender and religion.

Design/methodology/approach

The social construction and experience of race in the US and the intersection of multiethnic Asian American identity with race, gender and religion will be used in critically commenting on the interview of primary ethnic identity of Indian Americans including the pan-ethnic identity of Indians in the US as Asian Americans, the Mar Thoma Church community, the second-generation Patel family's union formation in terms of gender identity.

Findings

The future directives include Asian American Movement (AAM) which is trying to incorporate Indians as pan-ethnic identity assimilation and the process of holding American identity as primary identification of Indians.

Practical implications

Policy recommendations are that the US Census Bureau should include Indian Americans as separate ethnic identity for Indian immigrants like the Chinese Americans. USCIS (US Citizenship and Immigration Services) should reform policies to include the wives of H-4 visa holders. The Department of Homeland Security (DHS) should provide secure living environment for Indian immigrants. The US Department of Labor should provide equal opportunities for women in their immigration policies.

Originality/value

This paper will critically analyze the interview results of primary ethnic identity and justify the hypotheses of Asian American identity of Indians, whether (1) they merge with the American identity as part of cultural assimilation or (2) retain their Asian identity beyond Americanized identity or (3) go beyond both American and Asian identity to restate their Indian ethnicity.

Details

Journal of Humanities and Applied Social Sciences, vol. 5 no. 3
Type: Research Article
ISSN: 2632-279X

Keywords

Open Access
Article
Publication date: 30 April 2014

Sonia Froufe, Mame Gningue and Charles–Henri Fredouet

Due to the globalization of trade, hundreds of millions containers pass every year through world ports. Such a situation is extremely challenging in terms of securing freight…

Abstract

Due to the globalization of trade, hundreds of millions containers pass every year through world ports. Such a situation is extremely challenging in terms of securing freight transport operations. However, costs and lead-times are still very important components of supply chains' performance models. Therefore, the drive for enhanced safety and security cannot be made at the expense of these other two factors of competitiveness, and the processes implemented by the global supply chain links, including the maritime port one, should tend to a joint optimization of trade facilitation and operational safety / security.

The research on which this paper feeds back falls within the frame of this mixed performance requirement. More specifically, the paper presents a decision-support system dedicated to managing the risks associated with land and maritime container transportation; this system is based on the modeling of the knowledge of a group of experts, and covers the three phases of risk identification, assessment and avoidance / mitigation.

Open Access
Article
Publication date: 9 November 2021

Zareef Mohammed

Data breaches are an increasing phenomenon in today's digital society. Despite the preparations an organization must take to prevent a data breach, it is still necessary to…

3782

Abstract

Purpose

Data breaches are an increasing phenomenon in today's digital society. Despite the preparations an organization must take to prevent a data breach, it is still necessary to develop strategies in the event of a data breach. This paper explores the key recovery areas necessary for data breach recovery.

Design/methodology/approach

Stakeholder theory and three recovery areas (customer, employee and process recovery) are proposed as necessary theoretical lens to study data breach recovery. Three data breach cases (Anthem, Equifax, and Citrix) were presented to provide merit to the argument of the proposed theoretical foundations of stakeholder theory and recovery areas for data breach recovery research.

Findings

Insights from these cases reveal four areas of recovery are necessary for data breach recovery – customer recovery, employee recovery, process recovery and regulatory recovery.

Originality/value

These areas are presented in the data recovery areas model and are necessary for: (1) organizations to focus on these areas when resolving data breaches and (2) future data breach recovery researchers in developing their research in the field.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 2 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

1 – 10 of 114