Search results
1 – 10 of over 1000Swarup Mukherjee, Anupam De and Supriyo Roy
Identifying and prioritizing supply chain risk is significant from any product’s quality and reliability perspective. Under an input-process-output workflow, conventional risk…
Abstract
Purpose
Identifying and prioritizing supply chain risk is significant from any product’s quality and reliability perspective. Under an input-process-output workflow, conventional risk prioritization uses a risk priority number (RPN) aligned to the risk analysis. Imprecise information coupled with a lack of dealing with hesitancy margins enlarges the scope, leading to improper assessment of risks. This significantly affects monitoring quality and performance. Against the backdrop, a methodology that identifies and prioritizes the operational supply chain risk factors signifies better risk assessment.
Design/methodology/approach
The study proposes a multi-criteria model for risk prioritization involving multiple decision-makers (DMs). The methodology offers a robust, hybrid system based on the Intuitionistic Fuzzy (IF) Set merged with the “Technique for Order Performance by Similarity to Ideal Solution.” The nature of the model is robust. The same is shown by applying fuzzy concepts under multi-criteria decision-making (MCDM) to prioritize the identified business risks for better assessment.
Findings
The proposed IF Technique for Order Preference by Similarity to the Ideal Solution (TOPSIS) for risk prioritization model can improve the decisions within organizations that make up the chains, thus guaranteeing a “better quality in risk management.” Establishing an efficient representation of uncertain information related to traditional failure mode and effects analysis (FMEA) treatment involving multiple DMs means identifying potential risks in advance and providing better supply chain control.
Research limitations/implications
In a company’s supply chain, blockchain allows data storage and transparent transmission of flows with traceability, privacy, security and transparency (Roy et al., 2022). They asserted that blockchain technology has great potential for traceability. Since risk assessment in supply chain operations can be treated as a traceability problem, further research is needed to use blockchain technologies. Lastly, issues like risk will be better assessed if predicted well; further research demands the suitability of applying predictive analysis on risk.
Practical implications
The study proposes a hybrid framework based on the generic risk assessment and MCDM methodologies under a fuzzy environment system. By this, the authors try to address the supply chain risk assessment and mitigation framework better than the conventional one. To the best of their knowledge, no study is found in existing literature attempting to explore the efficacy of the proposed hybrid approach over the traditional RPN system in prime sectors like steel (with production planning data). The validation experiment indicates the effectiveness of the results obtained from the proposed IF TOPSIS Approach to Risk Prioritization methodology is more practical and resembles the actual scenario compared to those obtained using the traditional RPN system (Kim et al., 2018; Kumar et al., 2018).
Originality/value
This study provides mathematical models to simulate the supply chain risk assessment, thus helping the manufacturer rank the risk level. In the end, the authors apply this model in a big-sized organization to validate its accuracy. The authors validate the proposed approach to an integrated steel plant impacting the production planning process. The model’s outcome substantially adds value to the current risk assessment and prioritization, significantly affecting better risk management quality.
Details
Keywords
Rishabh Rathore, Jitesh Thakkar and J.K. Jha
This paper investigates the overall system risk for a foodgrains supply chain capturing the interrelationship among the risk factors and the effect of risk mitigation strategies.
Abstract
Purpose
This paper investigates the overall system risk for a foodgrains supply chain capturing the interrelationship among the risk factors and the effect of risk mitigation strategies.
Design/methodology/approach
This paper first calculates the weight of risk factors using an integrated approach of failure mode, effects analysis and fuzzy VIKOR technique. Next, the weights are utilized as input for the weighted fuzzy Petri-net (WFPN) approach to calculate the system risk.
Findings
Two different WFPN models are developed based on the relationships among the risk factors, and both models demonstrate a higher risk value for the overall system.
Originality/value
The proposed methodology will help practitioners or managers understand the complexity involved in the system by capturing the interrelationship behaviour. This study also considers the concurrent effect of risk mitigation strategies for calculating the overall system risk, which helps to improve the system’s performance.
Details
Keywords
Miguel Calvo and Marta Beltrán
This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it…
Abstract
Purpose
This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it and makes it much easier to use has been proposed too. Both, the method and the framework, have been validated within two challenging application domains: continuous risk assessment within a smart farm and risk-based adaptive security to reconfigure a Web application firewall.
Design/methodology/approach
The authors have identified a problem and provided motivation. They have developed their theory and engineered a new method and a framework to complement it. They have demonstrated the proposed method and framework work, validating them in two real use cases.
Findings
The GQM method, often applied within the software quality field, is a good basis for proposing a method to define new tailored cyber risk metrics that meet the requirements of current application domains. A comprehensive framework that formalises possible goals and questions translated to potential measurements can greatly facilitate the use of this method.
Originality/value
The proposed method enables the application of the GQM approach to cyber risk measurement. The proposed framework allows new cyber risk metrics to be inferred by choosing between suggested goals and questions and measuring the relevant elements of probability and impact. The authors’ approach demonstrates to be generic and flexible enough to allow very different organisations with heterogeneous requirements to derive tailored metrics useful for their particular risk management processes.
Details
Keywords
Avani Dixit, Raju Chauhan and Rajib Shaw
The purpose of this paper is to explore the application of smart systems and emerging technologies for disaster risk management (DRM) in Nepal. This delves into specific…
Abstract
Purpose
The purpose of this paper is to explore the application of smart systems and emerging technologies for disaster risk management (DRM) in Nepal. This delves into specific technologies, including advanced connection and communication technologies, AI, big data analytics, autonomous vehicles and advanced robotics, examining their capabilities and potential contributions to DRM. Further, it discusses the possibility of implementing these technologies in Nepal, considering the existing policies and regulations, as well as the challenges that need to be addressed for successful integration.
Design/methodology/approach
For this review journal series of search strategy for identifying relevant journals, the initial examination of results, a manual assessment, geographical refinement, establishment of criteria for the final selection, quality assessment and data management, along with a discussion of limitations. Before delving into the relevant literature within the field of research interest, the authors identified guiding keywords. Further, the authors refined the list by filtering for articles specifically related to Nepal, resulting in a final selection. The final selection of these 95 articles was based on their direct relevance to the research topics and their specific connection in the context of Nepal.
Findings
The way technology is used to reduce disaster risk has changed significantly in Nepal over the past few years. Every catastrophe has given us a chance to shift to something innovative. The use of new emerging technologies such as artificial intelligence (AI), big data analytics, autonomous vehicles, advanced robotics and advanced connection and communication technologies are increasing for the purpose of generating risk knowledge, reducing disaster risk and saving the loss of lives and properties. The authors conclude that the successful implementation of smart systems and emerging technologies for disaster risk management in Nepal has the potential to significantly improve the country's resilience and minimize the impact of future disasters. By leveraging data-driven decision-making, enhanced connectivity and automation, Nepal can build a more proactive, adaptive and efficient disaster management ecosystem.
Originality/value
Studies on the application of smart systems in Nepal are limited and scattered across different database. This work collects together such literatures to understand the current status of the application of the smart system and technologies and highlights the challenges and way forward for effective disaster risk management in Nepal. Therefore, this work is an original one and adds value to the existing literatures.
Details
Keywords
Sibel Yildiz Çankaya, Yesim Can Saglam and Bulent Sezen
With the increasing use of social media in operation and supply chain management (OSCM), it is of great importance for managers to consider risks in advance and take precautions…
Abstract
Purpose
With the increasing use of social media in operation and supply chain management (OSCM), it is of great importance for managers to consider risks in advance and take precautions against the risks that might arise from social media usage among supply chain members. The aim of this research is to identify and evaluate the risks related to the use of social media in OSCM.
Design/methodology/approach
An initial research of the literature revealed that there is no detailed risk categorization in this area. Current taxonomies on the business risks of social media usage were examined and integrated with classifications identified in a Delphi study. The authors empirically demonstrate how the determined risks are prioritized and how decision-makers may decide to manage risks effectively based on the analytical hierarchy process (AHP) method.
Findings
The findings of the research showed that reputation-associated risks such as criticism, language and loss of confidence should be prioritized over human, content and technical-associated risks.
Originality/value
To date, a comprehensive approach to determine risks arising from using social media in OSCM is missing. With the Delphi and AHP techniques, the authors provide a novel insight for managers to mitigate risks. The outcomes of this study may assist executives in achieving successful management of social media usage in OSCM. Besides, the proposed AHP model may provide guidelines and direction in this regard.
Details
Keywords
Pengcheng Xiang, Simai Yang, Yongqi Yuan and Ranyang Li
The purpose of this paper is to develop a comprehensive understanding of the public safety risks of international construction projects (ICPs) from the perspective of threat and…
Abstract
Purpose
The purpose of this paper is to develop a comprehensive understanding of the public safety risks of international construction projects (ICPs) from the perspective of threat and vulnerability. A novel and comprehensive risk assessment approach is developed from a systemic perspective and applied to the Belt and Road Initiative (BRI) to improve the public safety risk management strategy for ICPs in BRI.
Design/methodology/approach
First, a public safety risk indicator system was constructed from the two dimensions, namely threat and vulnerability. Next, an integrated measurement model was constructed by combining the Genetic Algorithm-Backpropagation (GA-BP) neural network, fuzzy comprehensive evaluation method and matter-element extension (MME) method. Data from 49 countries involved in the BRI, as well as five typical projects, were used to validate the model. Finally, targeted risk prevention measures were identified for use at the national, enterprise and project levels.
Findings
The findings indicate that while the vulnerability risks of typical projects in each region of the BRI were generally low, threat risks were high in West Asia and North Africa, Commonwealth of Independent States (CIS) countries and South Asia.
Originality/value
First, the structure of the public safety risk system of ICPs was analyzed using vulnerability and system theories. The connotation of public safety risk was defined based on two dimensions, namely threat and vulnerability. The idea of measuring threat risk with public data and measuring vulnerability risk with project data was clarified, and the risk measurement was integrated into the measurement results to help researchers and managers understand and systematically consider the public safety risks of ICPs. Second, a public safety risk indicator system was constructed, including 18 threat risk indicators and 14 vulnerability risk indicators to address the gaps in the existing research. The MEE model was employed to overcome the problem of incompatible indicator systems and provide stable and credible integrated measurement results. Finally, the whole-process public safety risk management scheme designed in this study can help to both provide a reference point for the Chinese enterprises and oversea contractors in market selection as well as improve ICP public safety risk management.
Details
Keywords
Mohamed Zaki Balboula and Eman Elsayed Elfar
This study aims to examine how auditors' perfectionism types and time budget pressure (TBP) influence fraud detection in Egypt.
Abstract
Purpose
This study aims to examine how auditors' perfectionism types and time budget pressure (TBP) influence fraud detection in Egypt.
Design/methodology/approach
We utilize a mixed-methods approach, combining questionnaires with an experimental case study in a within-subjects quasi-experimental design. Based on Almost Perfect Scale-Revised (APS-R), perfectionism traits were categorized using cluster analysis into adaptive, maladaptive, and non-perfectionism. Auditors from Egyptian firms performed fraud-related tasks with TBP manipulated.
Findings
Auditors' perfectionism types significantly influence fraud detection capabilities. Adaptive perfectionists demonstrated higher relevance in identifying fraud factors and excelled in accurately assessing fraud risks and audit procedures planning. Conversely, maladaptive perfectionists identified more but less relevant factors. TBP notably impacted maladaptive and non-perfectionist auditors' planning quality, unlike adaptive perfectionists, who showed resilience.
Practical implications
Findings provide insights to audit firms to bolster audit quality through team formations and task assignments, harnessing the strengths of adaptive and maladaptive perfectionists. Regulatory entities are positioned to integrate safeguards that recognize auditor capabilities and vulnerabilities, particularly under TBP. Considering psychological assessments in auditor selection and development assures alignment of traits with audit tasks, enhancing audit quality.
Originality/value
This study breaks new ground in the effects of auditor perfectionism on fraud detection, considering situational factors like TBP in emerging markets. Through a mixed-methods approach and cluster analysis, it reveals how different perfectionism traits influence audit effectiveness, offering insights not previously considered in auditing literature and suggesting practical applications for enhancing fraud detection in similar contexts.
Details