Search results

1 – 10 of over 106000
Book part
Publication date: 14 August 2014

Jacques Fontanel and Bénédicte Corvaisier-Drouart

International security is a constant threat to the pursuit of economic optimum. In the traditional economic analysis history, states are seen as agents in constant search for…

Abstract

International security is a constant threat to the pursuit of economic optimum. In the traditional economic analysis history, states are seen as agents in constant search for power, which leads to the emergence of conflicts of interests. The modern concept of security can be defined as the economic study of all the risks of short, medium and long term on the functioning of economic and social life. It can be divided into four sublevels: individual security, national security, international security and global security. The adoption of an enlarged approach to international security by integrating economic and environmental conditions highlights the expression of new collective priorities. Today, theories of security take into account the economic, human and social relationships, societal priorities and the balance of power in the international system. Human security implies a multi-disciplinary analysis, including human rights, state organisation, international relations and strategic studies. Security and sustainable development are deeply interconnected, which involves bearable production conditions for the environment in the long term, the end of extreme poverty, the creation of social stability and the rejection of discrimination.

Details

The Evolving Boundaries of Defence: An Assessment of Recent Shifts in Defence Activities
Type: Book
ISBN: 978-1-78350-965-2

Article
Publication date: 1 April 2004

Georgios I. Zekos

Investigates the differences in protocols between arbitral tribunals and courts, with particular emphasis on US, Greek and English law. Gives examples of each country and its way…

9542

Abstract

Investigates the differences in protocols between arbitral tribunals and courts, with particular emphasis on US, Greek and English law. Gives examples of each country and its way of using the law in specific circumstances, and shows the variations therein. Sums up that arbitration is much the better way to gok as it avoids delays and expenses, plus the vexation/frustration of normal litigation. Concludes that the US and Greek constitutions and common law tradition in England appear to allow involved parties to choose their own judge, who can thus be an arbitrator. Discusses e‐commerce and speculates on this for the future.

Details

Managerial Law, vol. 46 no. 2/3
Type: Research Article
ISSN: 0309-0558

Keywords

Article
Publication date: 1 July 2006

Chwen Sheu, Lilly Lee and Brian Niehoff

To investigate the practices and value of a voluntary logistics security program, C‐TPAT certification, and its impact on international supply chain collaboration.

4326

Abstract

Purpose

To investigate the practices and value of a voluntary logistics security program, C‐TPAT certification, and its impact on international supply chain collaboration.

Design/methodology/approach

Both case study and secondary data research methods were used to collect data from five companies (one customs broker, three importers, and one transporter/freight forwarder) at different supply chain positions. A case study protocol was designed and used to guide the interviews and data collection. Data analysis was performed at three levels: within‐case analysis, cross‐case analysis, and expert analysis.

Findings

In addition to reporting the current practices of the C‐TPAT implementation, the results confirmed the significant impact of the C‐TPAT program to the international trade community. As for the overall goal of improving border security, the results suggest that the C‐TPAT is a means rather than an end and its current value to logistic security is not clear due to the inconsistent practices of supplier involvement. International supply chain security is still in its infancy and has many issues to resolve before it becomes a fully collaborative system.

Research limitations/implications

Future research with more samples is necessary to validate the findings and research positions.

Practical implications

A voluntary logistics security program such as C‐TPAT could enhance the collaboration with international suppliers. Global logistics security systems can learn from the quality movement by focusing on “prevention” and adopting the “total supply chain” approach.

Originality/value

This paper addresses the anxiety and confusion in the international trade community toward the C‐TPAT certification and its impact on international supply chain security. The findings confirmed the linkage between quality program and supply chain security systems.

Details

Supply Chain Management: An International Journal, vol. 11 no. 4
Type: Research Article
ISSN: 1359-8546

Keywords

Book part
Publication date: 18 November 2020

Ana Aliverti and Celine Tan

Global mobility remains one of the most pressing challenges of our times. Countries in the north are turning to major ‘sending’ countries in the south to secure their cooperation…

Abstract

Global mobility remains one of the most pressing challenges of our times. Countries in the north are turning to major ‘sending’ countries in the south to secure their cooperation in controlling their borders and in repatriation processes. By explicitly linking migration to global security threats and weak governance, these migration control initiatives are justified by development goals and sometimes financed by official development assistance (ODA). By connecting criminology with international development scholarship, this chapter seeks to advance our understanding of the novel intersections between criminal justice, security and development to govern mass migration. Focusing on UK policies and the analysis of specific programmes, it interrogates what does the sustainable development goal (10.7) of facilitating ‘orderly, safe, regular and responsible migration’ concretely entail? And to what extent does the language of ‘managed migration’ legitimise restrictive border controls policies and even conflict with other global development goals?

Details

The Emerald Handbook of Crime, Justice and Sustainable Development
Type: Book
ISBN: 978-1-78769-355-5

Keywords

Article
Publication date: 1 June 1999

Rocco R. Vanasco

The Foreign Corrupt Practices Act (FCPA) of 1977 and its amendment – the Trade and Competitive Act of 1988 – are unique not only in the history of the accounting and auditing…

17277

Abstract

The Foreign Corrupt Practices Act (FCPA) of 1977 and its amendment – the Trade and Competitive Act of 1988 – are unique not only in the history of the accounting and auditing profession, but also in international law. The Acts raised awareness of the need for efficient and adequate internal control systems to prevent illegal acts such as the bribery of foreign officials, political parties and governments to secure or maintain contracts overseas. Its uniqueness is also due to the fact that the USA is the first country to pioneer such a legislation that impacted foreign trade, international law and codes of ethics. The research traces the history of the FCPA before and after its enactment, the role played by the various branches of the United States Government – Congress, Department of Justice, Securities Exchange commission (SEC), Central Intelligence Agency (CIA) and the Internal Revenue Service (IRS); the contributions made by professional associations such as the American Institute of Certified Public Accountants (AICFA), the Institute of Internal Auditors (IIA), the American Bar Association (ABA); and, finally, the role played by various international organizations such as the United Nations (UN), the Organization for Economic Cooperation and Development (OECD), the World Trade Organization (WTO) and the International Federation of Accountants (IFAC). A cultural, ethical and legalistic background will give a better understanding of the FCPA as wll as the rationale for its controversy.

Details

Managerial Auditing Journal, vol. 14 no. 4/5
Type: Research Article
ISSN: 0268-6902

Keywords

Abstract

Details

Environmental Security in Greece
Type: Book
ISBN: 978-1-80071-360-4

Book part
Publication date: 7 September 2020

David McA. Baker

If aeroplanes and passengers, as well as property and people on the ground are to be protected, potential perpetrators of aviation terrorism must be prevented from breaching…

Abstract

If aeroplanes and passengers, as well as property and people on the ground are to be protected, potential perpetrators of aviation terrorism must be prevented from breaching security checkpoints and gaining access to ‘secure’ airport areas and to aircrafts. Given the interconnectedness of the air transportation system, a sufficiently high level of security must be provided throughout the entire system. In this chapter we examine terrorism issues relevant to airline and airport security internationally, a topic that has received much attention since 9/11. Understanding the key issues is crucial in evaluating the various methods of regulating and providing aviation safety and security. The purpose of this chapter is to review the key features of the Aviation and Transportation Security Act and the characteristics of the resulting security policy. Then we examine terrorism, previous terrorists' acts against aviation as well as current and future aviation threats. A summary of our major points completes the chapter.

Details

Tourism, Terrorism and Security
Type: Book
ISBN: 978-1-83867-905-7

Keywords

Article
Publication date: 7 August 2009

Judith M. Whipple, M. Douglas Voss and David J. Closs

This paper compares firms purchasing and/or selling food products internationally to those with domestic supply chains in order to determine if international firms: place greater…

3115

Abstract

Purpose

This paper compares firms purchasing and/or selling food products internationally to those with domestic supply chains in order to determine if international firms: place greater managerial importance on security; and are more likely to engage supply chain partners in security‐related verification and information exchange. The purpose of this paper is to explore the link between security initiatives and firm performance in terms of security outcomes, product quality, and customer service.

Design/methodology/approach

A series of one‐way ANOVA tests are used to assess the differences between firms with international and domestic supply chains. Additionally, cluster analysis is conducted to group firms based on their performance levels.

Findings

Initial results indicate respondents with international supply chains perceive that their firms place more importance on security and are more likely to assess the security procedures of supply chain partners. Results further indicate that, in general, respondents in international firms perceive better security performance is achieved in terms of the ability to detect and recover from security incidents. Once firms are grouped by performance, respondents in the high‐performance cluster, represented predominantly by international firms, perceived significantly higher performance in the areas examined.

Originality/value

This paper is the first to compare, the differences in security measures employed by firms maintaining internationally oriented as opposed to domestically oriented supply chains and also relates the implementation of supply chain security measures to security and firm performance.

Details

International Journal of Physical Distribution & Logistics Management, vol. 39 no. 7
Type: Research Article
ISSN: 0960-0035

Keywords

Book part
Publication date: 12 January 2012

Hokey Min

Despite a hangover from the worldwide economic crisis, international trade rebounded nicely with a record-level growth in late 2010. A sharp rise in international trade has…

Abstract

Despite a hangover from the worldwide economic crisis, international trade rebounded nicely with a record-level growth in late 2010. A sharp rise in international trade has sparked the international traffic growth. A majority of this traffic growth originated from maritime logistics which could move cargoes in large volume and at cheaper freight costs. Due to its cost-efficiency and easy access, maritime logistics typically accounts for more than half of the worldwide freight volume. However, maritime logistics poses a greater supply chain risk, since ocean carriers used for maritime logistics are more vulnerable to unpredictable weather conditions, piracy attacks, terrorist hijacking, and cargo damages on the open sea than any other modes of transportation. Also, given the vast areas that maritime logistics covers, it is more difficult to protect maritime logistics activities from potential hazards and threats.

To better protect maritime logistics activities from potential security lapses, this chapter introduces and develops a variety of systematic security measures and tools that were successfully used by best-in-class companies and government entities across the world. Also, this chapter proposes a total maritime security management model as a way to formulate maritime risk mitigation strategies. To elaborate, this chapter sheds light on the roots of maritime security measures and tools, the ways that those measures and tools are best utilized, the roles of advanced information technology in maritime security from the global supply chain perspectives, the visualization and identification of potential maritime and its related supply chain risks, and policy guidelines that will help enhance maritime security.

Abstract

Details

From Human to Post Human Security in Latin America: Examples and Reflections from Across the Region
Type: Book
ISBN: 978-1-80071-253-9

1 – 10 of over 106000