236,633 research outputs found

    The Effects Of Port Security Compliance On The Competitiveness Of European Union Maritime Industry Firms

    Get PDF
    ABSTRACT The Effects Of Port Security Compliance On The Competitiveness Of European Union Maritime Industry Firms. (May 2013) Jonathan Stone Department of Maritime Administration Texas A&M University Research Advisor: Dr. Joan Mileski Department of Maritime Administration Prior research has addressed European Union (EU) water transportation policy and its impact on firm strategy. We extend this research by attempting to measure the effect of port security regulation compliance implementation on the perceived competitiveness of maritime firms located in European Union ports. We ask the question: Can firm specific implementation of required port security compliance enhance or hinder a firm’s competitive advantage? We use Resource-Based Strategic Theory as a framework for evaluating competitiveness. Resource based theory purports that assets and systems can give a firm a competitive advantage if they follow the “VRIN” criteria of Valuable, Rare, Inimitable, and Not easily substitutable. We ask via email and snail mail survey instrument whether certain security assets, resources and systems are “VRIN” and whether these assets, resources and systems give competitive advantage to the firm. The type of resources/assets/systems include physical assets such as fencing; ongoing management assets such as communication systems, planning and structuring management assets such as security planning systems; human assets such as employee knowledge; technological assets such as software protection; intangible assets such as a safety culture and financial assets such as cost savings from security compliance. We administer the instrument to all firms operating in EU ports in 2011-2012. A list of firms is obtained from IHSfairplay Ports and Terminals Guide. The results of the survey shows that most managers do not perceive a competitive advantage was gained in the way security assets/resources/management systems were implemented. However, a strong minority 34.12% of managers did perceive competitive advantage was gained from port security compliance where systems/assets/resources were not easily imitated or the “I.” Furthermore, managers perceive where they were located within the port as an important advantage to security and competitiveness

    Enhancing Key Digital Literacy Skills: Information Privacy, Information Security, and Copyright/Intellectual Property

    Get PDF
    Key Messages Background Knowledge and skills in the areas of information security, information privacy, and copyright/intellectual property rights and protection are of key importance for organizational and individual success in an evolving society and labour market in which information is a core resource. Organizations require skilled and knowledgeable professionals who understand risks and responsibilities related to the management of information privacy, information security, and copyright/intellectual property. Professionals with this expertise can assist organizations to ensure that they and their employees meet requirements for the privacy and security of information in their care and control, and in order to ensure that neither the organization nor its employees contravene copyright provisions in their use of information. Failure to meet any of these responsibilities can expose the organization to reputational harm, legal action and/or financial loss. Context Inadequate or inappropriate information management practices of individual employees are at the root of organizational vulnerabilities with respect to information privacy, information security, and information ownership issues. Users demonstrate inadequate skills and knowledge coupled with inappropriate practices in these areas, and similar gaps at the organizational level are also widely documented. National and international regulatory frameworks governing information privacy, information security, and copyright/intellectual property are complex and in constant flux, placing additional burden on organizations to keep abreast of relevant regulatory and legal responsibilities. Governance and risk management related to information privacy, security, and ownership are critical to many job categories, including the emerging areas of information and knowledge management. There is an increasing need for skilled and knowledgeable individuals to fill organizational roles related to information management, with particular growth in these areas within the past 10 years. Our analysis of current job postings in Ontario supports the demand for skills and knowledge in these areas. Key Competencies We have developed a set of key competencies across a range of areas that responds to these needs by providing a blueprint for the training of information managers prepared for leadership and strategic positions. These competencies are identified in the full report. Competency areas include: conceptual foundations risk assessment tools and techniques for threat responses communications contract negotiation and compliance evaluation and assessment human resources management organizational knowledge management planning; policy awareness and compliance policy development project managemen

    The Effects Of Port Security Compliance On The Competitiveness Of European Union Maritime Industry Firms

    Get PDF
    ABSTRACT The Effects Of Port Security Compliance On The Competitiveness Of European Union Maritime Industry Firms. (May 2013) Jonathan Stone Department of Maritime Administration Texas A&M University Research Advisor: Dr. Joan Mileski Department of Maritime Administration Prior research has addressed European Union (EU) water transportation policy and its impact on firm strategy. We extend this research by attempting to measure the effect of port security regulation compliance implementation on the perceived competitiveness of maritime firms located in European Union ports. We ask the question: Can firm specific implementation of required port security compliance enhance or hinder a firm’s competitive advantage? We use Resource-Based Strategic Theory as a framework for evaluating competitiveness. Resource based theory purports that assets and systems can give a firm a competitive advantage if they follow the “VRIN” criteria of Valuable, Rare, Inimitable, and Not easily substitutable. We ask via email and snail mail survey instrument whether certain security assets, resources and systems are “VRIN” and whether these assets, resources and systems give competitive advantage to the firm. The type of resources/assets/systems include physical assets such as fencing; ongoing management assets such as communication systems, planning and structuring management assets such as security planning systems; human assets such as employee knowledge; technological assets such as software protection; intangible assets such as a safety culture and financial assets such as cost savings from security compliance. We administer the instrument to all firms operating in EU ports in 2011-2012. A list of firms is obtained from IHSfairplay Ports and Terminals Guide. The results of the survey shows that most managers do not perceive a competitive advantage was gained in the way security assets/resources/management systems were implemented. However, a strong minority 34.12% of managers did perceive competitive advantage was gained from port security compliance where systems/assets/resources were not easily imitated or the “I.” Furthermore, managers perceive where they were located within the port as an important advantage to security and competitiveness

    The Determinants of Employees Data Security in Human Resource Information System at Ilala City Council, Tanzania.

    Get PDF
    The study determined the the determinants of employees’ data security in human resource (HR) information system in Tanzania. Specifically aimed; to examine the knowledge of information security management policies and regulations do human resource personnel have at Ilala City Council, to examine the information security awareness, education and training programmes available for the HR personnel at Ilala City Council and examine the challenges associated with the proper functioning of the system at Ilala City Council. The study employed mixed research approach along with case study design in which qualitative methods and quantitative methods. The study employed face to face interviews, documentary review, and questionnaire to collect data. Thematic analysis and descriptive statistical analysis techniques were used to analyze qualitative and quantitative data respectively. The study found that little were invested education and training to HR management to be able to manage and enforce security policy and regulation Ilala City Council, on other hand most of study found there were no awareness to respondents on the information security awareness, education and training programmesavalaible for the human resources personnel, and the study found that 96.9% respondents responded to the challenges associated with the proper functioning of the HCMIS. The study concluded that; Ilala City Council has low awareness of information security in HR Department and users have little idea of information security compliance to regulations and policies. The study recommended that HR management should put in place an information security awareness programme to motivate HR officers and external users with regard to information security issues and their responsibilities. Keywords: Information security, Human Resources, Data protection, E-Government

    The economics of user effort in information security

    Get PDF
    A significant number of security breaches result from employees' failures to comply with security policies. The cause is often an honest mistake, such as when an employee enters their password in a phishing website, believing it to be a legitimate one.1 It can also be a workaround when faced with an impossible task, such as when an employee has so many different passwords that they must be written down

    Human Dimensions of the Ecosystem Approach to Fisheries: An Overview of Context, Concepts, Tools and Methods

    Get PDF
    This document aims to provide a better understanding of the role of the economic, institutional and sociocultural components within the ecosystem approach to fisheries (EAF) process and to examine some potential methods and approaches that may facilitate the adoption of EAF management. It explores both the human context for the ecosystem approach to fisheries and the human dimensions involved in implementing the EAF. For the former, the report provides background material essential to understand prior to embarking on EAF initiatives, including an understanding of key concepts and issues, of the valuation of aquatic ecosystems socially, culturally and economically, and of the many policy, legal, institutional, social and economic considerations relevant to the EAF. With respect to facilitating EAF implementation, the report deals with a series of specific aspects: (1) determining the boundaries, scale and scope of the EAF; (2) assessing the various benefits and costs involved, seen from social, economic, ecological and management perspectives; (3) utilizing appropriate decision-making tools in EAF; (4) creating and/or adopting internal incentives and institutional arrangements to promote, facilitate and fund the adoption of EAF management; and (5) finding suitable external (non-fisheries) approaches for financing EAF implementation

    Ecosystem Approach to Fisheries and Aquaculture: Implementing the FAO Code of Conduct for Responsible Fisheries

    Get PDF
    This publication provides guidance on how to implement the FAO Code of Conduct for Responsible Fisheries (CCRF) using an ecosystem approach to fisheries and aquaculture. The CCRF is a voluntary code covering all aspects of the management and development of fisheries and is designed to ensure sustainable development without adversely affecting the livelihoods of local communities that share the same resources as the fisheries. The authors outline the basic principles of the CCRF, describe concrete steps to be taken to use the ecosystem approach effectively, and recommend certain institutional changes and reforms that will be necessary if the potential of the ecosystem approach is to be realized in the Asia-Pacific region. The most significant reform needed is a paradigm shift in policy from one that is production oriented to one that is benefits oriented (social and economic). There is evidence that this is already being undertaken in the region with efforts being made to limit access, reduce the number of fishing vessels and introduce community-based rights systems. Stakeholder participation is essential and existing legal instruments and practices that interact with or impact fisheries may also need to be reconsidered, and adjustments made where necessary. In the future, it may even be necessary to regulate the inter-sectoral interactions and impacts through primary legislation. To promote broader adoption and implementation of the ecosystem approach by member countries, a wide range of regional activities is suggested by the authors including a media campaign, the building of fishery alliances among countries and capacity building in fishery agencies

    Are we predisposed to behave securely? Influence of risk disposition on individual security behaviors

    Get PDF
    Employees continue to be the weak link in organizational security management and efforts to improve the security of employee behaviors have not been as effective as hoped. Researchers contend that security-related decision making is primarily based on risk perception. There is also a belief that, if changed, this could improve security-related compliance. The extant research has primarily focused on applying theories that assume rational decision making e.g. protection motivation and deterrence theories. This work presumes we can influence employees towards compliance with information security policies and by means of fear appeals and threatened sanctions. However, it is now becoming clear that security-related decision making is complex and nuanced, not a simple carrot- and stick-related situation. Dispositional and situational factors interact and interplay to influence security decisions. In this paper, we present a model that positions psychological disposition of individuals in terms of risk tolerance vs. risk aversion and proposes research to explore how this factor influences security behaviors. We propose a model that acknowledges the impact of employees' individual dispositional risk propensity as well as their situational risk perceptions on security-related decisions. It is crucial to understand this decision-making phenomenon as a foundation for designing effective interventions to reduce such risk taking. We conclude by offering suggestions for further research.</p
    • …
    corecore