37,090 research outputs found

    Risky business: managing electronic payments in the 21st Century

    Get PDF
    On June 20 and 21, 2005, the Payment Cards Center of the Federal Reserve Bank of Philadelphia, in conjunction with the Electronic Funds Transfer Association (EFTA), hosted a day-and-a-half forum, “Risky Business: Managing Electronic Payments in the 21st Century.” The Center and EFTA invited participants from the financial services and processing sectors, law enforcement, academia, and policymakers to explore key topics associated with the challenge of effectively managing risk in a payments environment that is increasingly electronic. The meeting’s goal was to identify areas of potential risk and explore interindustry solutions. This paper provides highlights from the forum presentations and ensuing conversations.

    Enforcement Guide: Near Shore Artisanal Fisheries

    Get PDF
    We need healthy oceans to support our way of life. Unfortunately, fish stocks are under growing pressure and the need to find innovative and pragmatic resource management strategies is more important than ever. Disregard for fisheries and environmental laws is common and if we are to succeed in reversing the declining trend, we must draft relevant regulations, design and fund comprehensive enforcement programs and cultivate a culture of compliance. Historically, marine law enforcement has been the competency of Naval and Coast Guard authorities; however, many fishery and park agencies, who lack training, equipment, and at times controlling legal authority, are tasked with fisheries management and enforcement. Complicating matters, most agencies are understaffed; lack budgetary resources, and possess limited authority (i.e. power of arrest and the ability to use force). WildAid in cooperation with The Nature Conservancy developed this guide to assist managers in designing a cost effective enforcement strategy for near shore artisanal fisheries. This document is not a recompilation of literature, but a practical guide based on our experience in the Eastern and Western Pacific. Generally, an enforcement system is designed to monitor all activities within a given area ranging from tourism, investigation, and transportation to fisheries; however, this guide will focus primarily on near shore artisanal fisheries. The objectives of this guide are three-fold:1. Examine all factors considered for the design and operation of a marine law enforcement system; 2. Illustrate key components of an enforcement system and evaluate surveillance technology and patrol equipment options; 3. Guide managers in the design and implementation of an enforcement system.In summary, it aims to equip managers with the tools needed to strengthen fisheries management and design enforcement systems that are practical, affordable and feasible to implement in a timely manner. Fisheries enforcement requires a holistic approach that accounts for surveillance, interdiction, systematic training, education and outreach and lastly, meaningful sanctions. Although it explores many surveillance technologies and management tools, this guide more importantly provides a blueprint for the capacity building and professionalization of enforcement officers, who truly are the core component of any fisheries enforcement program

    Social media analytics: a survey of techniques, tools and platforms

    Get PDF
    This paper is written for (social science) researchers seeking to analyze the wealth of social media now available. It presents a comprehensive review of software tools for social networking media, wikis, really simple syndication feeds, blogs, newsgroups, chat and news feeds. For completeness, it also includes introductions to social media scraping, storage, data cleaning and sentiment analysis. Although principally a review, the paper also provides a methodology and a critique of social media tools. Analyzing social media, in particular Twitter feeds for sentiment analysis, has become a major research and business activity due to the availability of web-based application programming interfaces (APIs) provided by Twitter, Facebook and News services. This has led to an ‘explosion’ of data services, software tools for scraping and analysis and social media analytics platforms. It is also a research area undergoing rapid change and evolution due to commercial pressures and the potential for using social media data for computational (social science) research. Using a simple taxonomy, this paper provides a review of leading software tools and how to use them to scrape, cleanse and analyze the spectrum of social media. In addition, it discussed the requirement of an experimental computational environment for social media research and presents as an illustration the system architecture of a social media (analytics) platform built by University College London. The principal contribution of this paper is to provide an overview (including code fragments) for scientists seeking to utilize social media scraping and analytics either in their research or business. The data retrieval techniques that are presented in this paper are valid at the time of writing this paper (June 2014), but they are subject to change since social media data scraping APIs are rapidly changing

    Epistemic policy networks in the European Union’s CBRN risk mitigation policy

    No full text
    This paper offers insights into an innovative and currently flagship approach of the European Union (EU) to the mitigation of chemical, biological, radiological, and nuclear (CBRN) risks. Building on its long-time experience in the CBRN field, the EU has incorporated methods familiar to the students of international security governance: it is establishing regional networks of experts and expertise. CBRN Centers of Excellence, as they are officially called, aim to contribute to the security and safety culture in different parts of Africa, the Middle East, South East Asia, and South East Europe, in the broadly construed CBRN area. These regional networks represent a modern form of security cooperation, which can be conceptualized as an epistemic policy networks approach. It offers flexibility to the participating states, which have different incentives to get involved. At the same, however, the paper identifies potential limitations and challenges of epistemic policy networks in this form

    カイワ ダイアログ アンショウ ニ ジュウジ サセル ガイコクゴ シドウホウ ガ スピーキングジ ノ テイケイ ヒョウゲン ノ シヨウ ト アンキ ガクシュウ ニ オヨボス エイキョウ ニ カンスル キソ ケンキュウ

    Get PDF
    PDF/A formatsAccess: via World Wide Web東京外国語大学大学院総合国際学研究科博士 (学術) 論文 (2016年4月)Author's thesis (Ph.D)--Tokyo University of Foreign Studies, 2016博甲第214号Bibliography: p. 183-195Summary in English and Japanese東京外国語大学 (Tokyo University of Foreign Studies)博士 (学術

    Supply chain management as the key to a firm’s strategy in the global marketplace

    Get PDF
    Purpose: This research aims to analyze the intersection of two literature streams: that of strategy and supply chain management (SCM). This review should create a better understanding of “strategic SCM” by focusing on relevant theories in the strategic management field and their intersection with SCM to develop a joint research agenda. Design/Methodology/Approach: We conducted a correspondence analysis on the content of 3,402 articles from the top SCM journals. This analysis provides a map of the intellectual structure of content in this field to date. The key trends and changes were identified in strategic SCM research from 1990-2014 as well as the intersection with the key schools of strategic management. Findings: The results suggest that SCM is key to a successful deployment of strategy for competing in the global marketplace. The main theoretical foundations for research in this field were identified and discussed. Gaps were detected and combinations of theoretical foundations of strategic management and SCM suggest four poles for future research: agents and focal firm; distributions and logistics strategic models; SCM competitive requirements; SCM relational governance. Research limitations/implications: Scholars in both the strategy and the SCM fields continue to search for competitive advantages. Much recent research indicates that strategic SCM can be a critical source for that advantage. One of the limitations of our research is that the analysis does not include every journal that published an article mentioning SCM. However, the 34 journals selected are reputed to be the most influential on SCM and focused primarily on SCM. Practical implications: The map of the intellectual structure of research to strategic SCM highlights the need to combine different theoretical approaches to the complex phenomenon of SCM. Practitioners should consider the supply chain as an informal organization and should devote time and resources to build a shared advantage across the supply chain. They should also consider the inherent benefits and risks that sharing Originality/value: The paper demonstrates that strategic SCM needs a balanced and rigorous combination of theoretical approaches to deliver more theory-driven evidences. Our research combines both a qualitative analysis and a quantitative methodology that summarizes gaps and then outlines future research from a large sample of articles. This methodology is an original contribution to this field and offers some assistance for enlarging the sample of future literature reviews

    Framing the UK’s counter-terrorism policy within the context of a wicked problem

    Get PDF
    Terrorist attacks can be seen as the ultimate wicked problem. After 9/11, terrorists moved from so-called ‘spectacular’ events to relatively low-intensity attacks against individuals and groups. The emergence of what has become known as the ‘home-grown’ terrorist has added a further dimension to the ‘wicked’ nature of the problem. This paper considers the UK’s CONTEST and PREVENT strategies as a policy response to the threats from terrorism and the impact that the policies themselves can have on the radicalization of individuals. The author highlights some of the limitations of the PREVENT strand of the overall strategy and the constraints that are imposed on government policies by failing to take a holistic perspective on the nature of the problem
    corecore