610 research outputs found

    Competing during a pandemic? Retailers’ ups and downs during the COVID-19 outbreak

    Get PDF
    The COVID-19 pandemic (that started in early 2020) is causing several disruptions in the short- and mid-term, to which businesses have to adapt. Some retailers have reacted to the emergency immediately, displaying a plethora of different intervention types. The authors aim to synthesize the challenges that retailers are facing during the COVID-19 emergency. We do this from the perspective of both consumers and managers, with the goal of providing guidelines on and examples of how retailers can handle this unprecedented situation

    Competing during a pandemic? Retailers’ ups and downs during the COVID-19 outbreak

    Get PDF
    The COVID-19 pandemic (that started in early 2020) is causing several disruptions in the short- and mid-term, to which businesses have to adapt. Some retailers have reacted to the emergency immediately, displaying a plethora of different intervention types. The authors aim to synthesize the challenges that retailers are facing during the COVID-19 emergency. We do this from the perspective of both consumers and managers, with the goal of providing guidelines on and examples of how retailers can handle this unprecedented situation

    Ethical, Legal, and Social Issues In Homeland Security – What They Are and How to Address Them

    Get PDF
    Homeland security is a nationwide effort, including all of government across federal, state, local, territorial and tribal tiers; the public and the private sector, and the whole community, with each single citizen. The overarching homeland security vision comprises safeguarding the American way of life and is embedded into the goals of the National Security Strategy that include respect for universal values at home and abroad. It thus is evident that ethical, legal, and social-or ELSI-issues are important to consider. This chapter discusses the origins and essence of ELSI and explores ELSI integration into everyday homeland security. Two defining debates are reviewed: homeland security legislation (specifically the USA Patriot Act of 2001 and the USA Freedom Act of 2015) and domestic surveillance, with related use of technology such as drones. Subsequently, the relevance of ELSI is summarized across prevention, protection, mitigation, response, and recovery missions. After adding some examples of how ELSI are addressed in other countries\u27 civil security policy, best practices to effectively address ELSI, as well as limitations of ELSI integration in homeland security, are discussed

    Refugee Outreach and Engagement Programs for Police Agencies

    Get PDF
    The world is in the midst of a global migration crisis. By the close of 2015, the number of forcibly displaced persons around the globe had reached 65.3 million, surpassing levels seen in the aftermath of the Second World War. Of these, 21.3 million were refugees—persons whose displacement forces them to flee their home countries due to a well-founded fear of persecution.Much of the attention surrounding the migration crisis in the past two years has centered on Europe, to which more than one million migrants and refugees made their way in 2015. Most came from Syria, fleeing the violence that has beset the country since 2011.Historically, however, it is the United States that has resettled more refugees than any other country in the world.4, 5 Since 1975, more than three million refugees have begun new lives in the United States. For police agencies across the country, this means that every year refugees are joining the communities they serve. Refugees often face unique challenges when building new lives in the United States, and police departments play a critical role in ensuring their successful integration into the community.In 2016, and as part of a general support grant from Carnegie Corporation, the Police Executive Research Forum (PERF) examined promising practices and lessons learned for police outreach to refugees in the community. As part of this study, PERF documented the impact that refugee outreach has on police work, public safety, and building trust with the community. PERF conducted site visits with police departments and their community partners, as well as in-depth telephone interviews with police practitioners across the country. With support from Carnegie Corporation, PERF also held a one-day forum in Washington, D.C. on September 13, 2016 for police agencies and their community partners to discuss refugee engagement and methods for success. This report details PERF's findings. Intended to serve as a guide for police professionals, this report presents promising practices and lessons learned for conducting outreach to your refugee community.

    In the Face of Ethics

    Get PDF

    DATA PRIVACY IN THE FIRE SERVICE: UNDERSTANDING THE POLICY ENVIRONMENT, FIREFIGHTER PREFERENCES, AND LEADERSHIP PERSPECTIVES

    Get PDF
    Objective: Firefighters experience high rates of occupational injury and fatality while serving their communities. Despite growing interest in using health and safety data to understand and prevent injuries, little is known about the policies governing such data or firefighter or leadership perspectives on data privacy. This dissertation unpacks the policies governing firefighter occupational health and safety data in Maryland and Virginia and fire service stakeholders’ views towards current and future data practices. Methods: Manuscript One leveraged legal research methods to identify and analyze federal, Maryland, and Virginia laws and regulations, and local union contracts. Manuscripts Two and Three used interviews and focus groups to assess the views of firefighters and fire department leaders in Maryland and Virginia, as well as national-level leaders. Results: There were few laws and regulations directly related to occupational health and safety data privacy; of the 20 laws and regulations we identified, federal policies were most comprehensive in addressing data privacy. 11 union contracts varied significantly, with some limiting data access and others authorizing surveillance. 65 participants across 35 interviews and 4 focus groups described similar current data collection practices. Firefighters had few concerns about current practices while leaders described privacy concerns and resource challenges. Participants called for improved infrastructure, communication, and more mental health and exposure data. Firefighters were resistant to using biometric data from wearable devices on calls, citing autonomy and privacy concerns, whereas leadership supported this use case. Participants described barriers to implementation and conditions for acceptable wearable use, including limiting use cases and data access, sharing individual data with firefighters, and communicating the purpose and benefits to firefighters. Conclusions: Data and wearable technology have the potential to contribute to firefighter health and safety but must be utilized in a way that protects firefighter autonomy and privacy. Unions could play a key role in negotiating for data privacy protections. Government officials and fire departments can help ensure ethical use of firefighter data by integrating privacy protections into data infrastructure and wearable interventions. Future research should fill data gaps and foster trust in data by communicating research results back to firefighters

    Security Enhanced Applications for Information Systems

    Get PDF
    Every day, more users access services and electronically transmit information which is usually disseminated over insecure networks and processed by websites and databases, which lack proper security protection mechanisms and tools. This may have an impact on both the users’ trust as well as the reputation of the system’s stakeholders. Designing and implementing security enhanced systems is of vital importance. Therefore, this book aims to present a number of innovative security enhanced applications. It is titled “Security Enhanced Applications for Information Systems” and includes 11 chapters. This book is a quality guide for teaching purposes as well as for young researchers since it presents leading innovative contributions on security enhanced applications on various Information Systems. It involves cases based on the standalone, network and Cloud environments
    • …
    corecore