Search results

1 – 10 of over 1000
Article
Publication date: 5 February 2024

Swarup Mukherjee, Anupam De and Supriyo Roy

Identifying and prioritizing supply chain risk is significant from any product’s quality and reliability perspective. Under an input-process-output workflow, conventional risk…

Abstract

Purpose

Identifying and prioritizing supply chain risk is significant from any product’s quality and reliability perspective. Under an input-process-output workflow, conventional risk prioritization uses a risk priority number (RPN) aligned to the risk analysis. Imprecise information coupled with a lack of dealing with hesitancy margins enlarges the scope, leading to improper assessment of risks. This significantly affects monitoring quality and performance. Against the backdrop, a methodology that identifies and prioritizes the operational supply chain risk factors signifies better risk assessment.

Design/methodology/approach

The study proposes a multi-criteria model for risk prioritization involving multiple decision-makers (DMs). The methodology offers a robust, hybrid system based on the Intuitionistic Fuzzy (IF) Set merged with the “Technique for Order Performance by Similarity to Ideal Solution.” The nature of the model is robust. The same is shown by applying fuzzy concepts under multi-criteria decision-making (MCDM) to prioritize the identified business risks for better assessment.

Findings

The proposed IF Technique for Order Preference by Similarity to the Ideal Solution (TOPSIS) for risk prioritization model can improve the decisions within organizations that make up the chains, thus guaranteeing a “better quality in risk management.” Establishing an efficient representation of uncertain information related to traditional failure mode and effects analysis (FMEA) treatment involving multiple DMs means identifying potential risks in advance and providing better supply chain control.

Research limitations/implications

In a company’s supply chain, blockchain allows data storage and transparent transmission of flows with traceability, privacy, security and transparency (Roy et al., 2022). They asserted that blockchain technology has great potential for traceability. Since risk assessment in supply chain operations can be treated as a traceability problem, further research is needed to use blockchain technologies. Lastly, issues like risk will be better assessed if predicted well; further research demands the suitability of applying predictive analysis on risk.

Practical implications

The study proposes a hybrid framework based on the generic risk assessment and MCDM methodologies under a fuzzy environment system. By this, the authors try to address the supply chain risk assessment and mitigation framework better than the conventional one. To the best of their knowledge, no study is found in existing literature attempting to explore the efficacy of the proposed hybrid approach over the traditional RPN system in prime sectors like steel (with production planning data). The validation experiment indicates the effectiveness of the results obtained from the proposed IF TOPSIS Approach to Risk Prioritization methodology is more practical and resembles the actual scenario compared to those obtained using the traditional RPN system (Kim et al., 2018; Kumar et al., 2018).

Originality/value

This study provides mathematical models to simulate the supply chain risk assessment, thus helping the manufacturer rank the risk level. In the end, the authors apply this model in a big-sized organization to validate its accuracy. The authors validate the proposed approach to an integrated steel plant impacting the production planning process. The model’s outcome substantially adds value to the current risk assessment and prioritization, significantly affecting better risk management quality.

Details

International Journal of Quality & Reliability Management, vol. 41 no. 6
Type: Research Article
ISSN: 0265-671X

Keywords

Abstract

Details

Understanding Financial Risk Management, Third Edition
Type: Book
ISBN: 978-1-83753-253-7

Article
Publication date: 5 June 2023

Rishabh Rathore, Jitesh Thakkar and J.K. Jha

This paper investigates the overall system risk for a foodgrains supply chain capturing the interrelationship among the risk factors and the effect of risk mitigation strategies.

Abstract

Purpose

This paper investigates the overall system risk for a foodgrains supply chain capturing the interrelationship among the risk factors and the effect of risk mitigation strategies.

Design/methodology/approach

This paper first calculates the weight of risk factors using an integrated approach of failure mode, effects analysis and fuzzy VIKOR technique. Next, the weights are utilized as input for the weighted fuzzy Petri-net (WFPN) approach to calculate the system risk.

Findings

Two different WFPN models are developed based on the relationships among the risk factors, and both models demonstrate a higher risk value for the overall system.

Originality/value

The proposed methodology will help practitioners or managers understand the complexity involved in the system by capturing the interrelationship behaviour. This study also considers the concurrent effect of risk mitigation strategies for calculating the overall system risk, which helps to improve the system’s performance.

Details

International Journal of Productivity and Performance Management, vol. 73 no. 5
Type: Research Article
ISSN: 1741-0401

Keywords

Article
Publication date: 16 October 2023

Miguel Calvo and Marta Beltrán

This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it…

Abstract

Purpose

This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it and makes it much easier to use has been proposed too. Both, the method and the framework, have been validated within two challenging application domains: continuous risk assessment within a smart farm and risk-based adaptive security to reconfigure a Web application firewall.

Design/methodology/approach

The authors have identified a problem and provided motivation. They have developed their theory and engineered a new method and a framework to complement it. They have demonstrated the proposed method and framework work, validating them in two real use cases.

Findings

The GQM method, often applied within the software quality field, is a good basis for proposing a method to define new tailored cyber risk metrics that meet the requirements of current application domains. A comprehensive framework that formalises possible goals and questions translated to potential measurements can greatly facilitate the use of this method.

Originality/value

The proposed method enables the application of the GQM approach to cyber risk measurement. The proposed framework allows new cyber risk metrics to be inferred by choosing between suggested goals and questions and measuring the relevant elements of probability and impact. The authors’ approach demonstrates to be generic and flexible enough to allow very different organisations with heterogeneous requirements to derive tailored metrics useful for their particular risk management processes.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 4 June 2024

Avani Dixit, Raju Chauhan and Rajib Shaw

The purpose of this paper is to explore the application of smart systems and emerging technologies for disaster risk management (DRM) in Nepal. This delves into specific…

Abstract

Purpose

The purpose of this paper is to explore the application of smart systems and emerging technologies for disaster risk management (DRM) in Nepal. This delves into specific technologies, including advanced connection and communication technologies, AI, big data analytics, autonomous vehicles and advanced robotics, examining their capabilities and potential contributions to DRM. Further, it discusses the possibility of implementing these technologies in Nepal, considering the existing policies and regulations, as well as the challenges that need to be addressed for successful integration.

Design/methodology/approach

For this review journal series of search strategy for identifying relevant journals, the initial examination of results, a manual assessment, geographical refinement, establishment of criteria for the final selection, quality assessment and data management, along with a discussion of limitations. Before delving into the relevant literature within the field of research interest, the authors identified guiding keywords. Further, the authors refined the list by filtering for articles specifically related to Nepal, resulting in a final selection. The final selection of these 95 articles was based on their direct relevance to the research topics and their specific connection in the context of Nepal.

Findings

The way technology is used to reduce disaster risk has changed significantly in Nepal over the past few years. Every catastrophe has given us a chance to shift to something innovative. The use of new emerging technologies such as artificial intelligence (AI), big data analytics, autonomous vehicles, advanced robotics and advanced connection and communication technologies are increasing for the purpose of generating risk knowledge, reducing disaster risk and saving the loss of lives and properties. The authors conclude that the successful implementation of smart systems and emerging technologies for disaster risk management in Nepal has the potential to significantly improve the country's resilience and minimize the impact of future disasters. By leveraging data-driven decision-making, enhanced connectivity and automation, Nepal can build a more proactive, adaptive and efficient disaster management ecosystem.

Originality/value

Studies on the application of smart systems in Nepal are limited and scattered across different database. This work collects together such literatures to understand the current status of the application of the smart system and technologies and highlights the challenges and way forward for effective disaster risk management in Nepal. Therefore, this work is an original one and adds value to the existing literatures.

Details

International Journal of Disaster Resilience in the Built Environment, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1759-5908

Keywords

Article
Publication date: 2 May 2024

Sibel Yildiz Çankaya, Yesim Can Saglam and Bulent Sezen

With the increasing use of social media in operation and supply chain management (OSCM), it is of great importance for managers to consider risks in advance and take precautions…

Abstract

Purpose

With the increasing use of social media in operation and supply chain management (OSCM), it is of great importance for managers to consider risks in advance and take precautions against the risks that might arise from social media usage among supply chain members. The aim of this research is to identify and evaluate the risks related to the use of social media in OSCM.

Design/methodology/approach

An initial research of the literature revealed that there is no detailed risk categorization in this area. Current taxonomies on the business risks of social media usage were examined and integrated with classifications identified in a Delphi study. The authors empirically demonstrate how the determined risks are prioritized and how decision-makers may decide to manage risks effectively based on the analytical hierarchy process (AHP) method.

Findings

The findings of the research showed that reputation-associated risks such as criticism, language and loss of confidence should be prioritized over human, content and technical-associated risks.

Originality/value

To date, a comprehensive approach to determine risks arising from using social media in OSCM is missing. With the Delphi and AHP techniques, the authors provide a novel insight for managers to mitigate risks. The outcomes of this study may assist executives in achieving successful management of social media usage in OSCM. Besides, the proposed AHP model may provide guidelines and direction in this regard.

Details

Business Process Management Journal, vol. 30 no. 3
Type: Research Article
ISSN: 1463-7154

Keywords

Abstract

Details

Professional Perspectives on Banking and Finance, Volume 1
Type: Book
ISBN: 978-1-83549-335-9

Abstract

Details

Understanding Financial Risk Management, Third Edition
Type: Book
ISBN: 978-1-83753-253-7

Article
Publication date: 3 June 2024

Pengcheng Xiang, Simai Yang, Yongqi Yuan and Ranyang Li

The purpose of this paper is to develop a comprehensive understanding of the public safety risks of international construction projects (ICPs) from the perspective of threat and…

Abstract

Purpose

The purpose of this paper is to develop a comprehensive understanding of the public safety risks of international construction projects (ICPs) from the perspective of threat and vulnerability. A novel and comprehensive risk assessment approach is developed from a systemic perspective and applied to the Belt and Road Initiative (BRI) to improve the public safety risk management strategy for ICPs in BRI.

Design/methodology/approach

First, a public safety risk indicator system was constructed from the two dimensions, namely threat and vulnerability. Next, an integrated measurement model was constructed by combining the Genetic Algorithm-Backpropagation (GA-BP) neural network, fuzzy comprehensive evaluation method and matter-element extension (MME) method. Data from 49 countries involved in the BRI, as well as five typical projects, were used to validate the model. Finally, targeted risk prevention measures were identified for use at the national, enterprise and project levels.

Findings

The findings indicate that while the vulnerability risks of typical projects in each region of the BRI were generally low, threat risks were high in West Asia and North Africa, Commonwealth of Independent States (CIS) countries and South Asia.

Originality/value

First, the structure of the public safety risk system of ICPs was analyzed using vulnerability and system theories. The connotation of public safety risk was defined based on two dimensions, namely threat and vulnerability. The idea of measuring threat risk with public data and measuring vulnerability risk with project data was clarified, and the risk measurement was integrated into the measurement results to help researchers and managers understand and systematically consider the public safety risks of ICPs. Second, a public safety risk indicator system was constructed, including 18 threat risk indicators and 14 vulnerability risk indicators to address the gaps in the existing research. The MEE model was employed to overcome the problem of incompatible indicator systems and provide stable and credible integrated measurement results. Finally, the whole-process public safety risk management scheme designed in this study can help to both provide a reference point for the Chinese enterprises and oversea contractors in market selection as well as improve ICP public safety risk management.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 28 May 2024

Mohamed Zaki Balboula and Eman Elsayed Elfar

This study aims to examine how auditors' perfectionism types and time budget pressure (TBP) influence fraud detection in Egypt.

Abstract

Purpose

This study aims to examine how auditors' perfectionism types and time budget pressure (TBP) influence fraud detection in Egypt.

Design/methodology/approach

We utilize a mixed-methods approach, combining questionnaires with an experimental case study in a within-subjects quasi-experimental design. Based on Almost Perfect Scale-Revised (APS-R), perfectionism traits were categorized using cluster analysis into adaptive, maladaptive, and non-perfectionism. Auditors from Egyptian firms performed fraud-related tasks with TBP manipulated.

Findings

Auditors' perfectionism types significantly influence fraud detection capabilities. Adaptive perfectionists demonstrated higher relevance in identifying fraud factors and excelled in accurately assessing fraud risks and audit procedures planning. Conversely, maladaptive perfectionists identified more but less relevant factors. TBP notably impacted maladaptive and non-perfectionist auditors' planning quality, unlike adaptive perfectionists, who showed resilience.

Practical implications

Findings provide insights to audit firms to bolster audit quality through team formations and task assignments, harnessing the strengths of adaptive and maladaptive perfectionists. Regulatory entities are positioned to integrate safeguards that recognize auditor capabilities and vulnerabilities, particularly under TBP. Considering psychological assessments in auditor selection and development assures alignment of traits with audit tasks, enhancing audit quality.

Originality/value

This study breaks new ground in the effects of auditor perfectionism on fraud detection, considering situational factors like TBP in emerging markets. Through a mixed-methods approach and cluster analysis, it reveals how different perfectionism traits influence audit effectiveness, offering insights not previously considered in auditing literature and suggesting practical applications for enhancing fraud detection in similar contexts.

Details

Journal of Financial Reporting and Accounting, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1985-2517

Keywords

1 – 10 of over 1000