Cultural influences on risks and risk management: six case studies

2000 ◽  
Vol 34 (1-3) ◽  
pp. 31-45 ◽  
Author(s):  
W van Vuuren
Author(s):  
Kevin K. C. Hung ◽  
Sonoe Mashino ◽  
Emily Y. Y. Chan ◽  
Makiko K. MacDermot ◽  
Satchit Balsari ◽  
...  

The Sendai Framework for Disaster Risk Reduction 2015–2030 placed human health at the centre of disaster risk reduction, calling for the global community to enhance local and national health emergency and disaster risk management (Health EDRM). The Health EDRM Framework, published in 2019, describes the functions required for comprehensive disaster risk management across prevention, preparedness, readiness, response, and recovery to improve the resilience and health security of communities, countries, and health systems. Evidence-based Health EDRM workforce development is vital. However, there are still significant gaps in the evidence identifying common competencies for training and education programmes, and the clarification of strategies for workforce retention, motivation, deployment, and coordination. Initiated in June 2020, this project includes literature reviews, case studies, and an expert consensus (modified Delphi) study. Literature reviews in English, Japanese, and Chinese aim to identify research gaps and explore core competencies for Health EDRM workforce training. Thirteen Health EDRM related case studies from six WHO regions will illustrate best practices (and pitfalls) and inform the consensus study. Consensus will be sought from global experts in emergency and disaster medicine, nursing, public health and related disciplines. Recommendations for developing effective health workforce strategies for low- and middle-income countries and high-income countries will then be disseminated.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ayman Ahmed Ezzat Othman ◽  
Fatma Othman Alamoudy

Purpose This paper aims to develop a framework for optimising building performance through the integration between risk management (RM) and building information modelling (BIM) during the design process. Design/methodology/approach To achieve this aim, a research strategy consisting of literature review, case studies and survey questionnaire is designed to accomplish four objectives. First, to examine the concepts of design process, building performance, RM and BIM; second, to present three case studies to explain the role of using RM and BIM capabilities towards optimising building performance; third, to investigate the perception and application of architectural design firms in Egypt towards the role of RM and BIM for enhancing building performance during the design process; and finally, to develop a framework integrating RM and BIM during the design process as an approach for optimising building performance. Findings Through literature review, the research identified 18 risks that hamper optimising building performance during the design process. In addition, 11 building performance values and 20 BIM technologies were defined. Results of data analysis showed that “Design budget overrun”, “Lack of considering life cycle cost” and “Inefficient use of the design time” were ranked the highest risks that affect the optimisation of building performance. Respondents ranked “Risk avoid” or “Risk transfer” as the most risk responses adopted in the Egyptian context. In addition, “BIM As Built” was ranked the highest BIM technology used for overcoming risks during the design process. These findings necessitated taking action towards developing a framework to optimising building performance. Originality/value The research identified the risks that affect optimising building performance during the design process. It focuses on improving the design process through using the capabilities of BIM technologies towards overcoming these risks during the design process. The proposed framework which integrates RM and BIM represents a synthesis that is novel and creative in thought and adds value to the knowledge in a manner that has not previously occurred.


2010 ◽  
Author(s):  
Benny Poedjono ◽  
Carlos Manuel Avila ◽  
Phan Van Chinh ◽  
Erhan Isevcan ◽  
John Richard Walker ◽  
...  

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  

Purpose This paper aims to review the latest management developments across the globe and pinpoint practical implications from cutting-edge research and case studies. Design/methodology/approach This briefing is prepared by an independent writer who adds their own impartial comments and places the articles in context. Findings Emerging contractor firms face significant challenges which threaten the survival of their business. Through a focus on risk management and other strategies, such companies can better ascertain and manage risks to achieve profitability and growth. Originality/value The briefing saves busy executives and researchers hours of reading time by selecting only the very best, most pertinent information and presenting it in a condensed and easy-to-digest format.


Concepts in risk management in PPP projects have continuously evolved over the years. Introduction of new concepts, risk management planning, sustainability risk management and risk stakeholders, create a greater understanding of the acceptable workings of PPP projects. This chapter aims to investigate and compare these concepts in academic literatures and to the practices of PPP project implementations as exemplified in numerous PPP projects. This chapter reviews and analyzes information on these concepts. Extant literatures are reviewed and their take on the concepts are compared with the results obtained from the case studies. The chapter found both similarities and differences and also suggests some interesting researches on several key areas that should be emphasized for a better take in having an effective risk management strategy.


Author(s):  
Robert F. Mills ◽  
Gilbert L. Peterson ◽  
Michael R. Grimaila

The purpose of this chapter is to introduce the insider threat and discuss methods for preventing, detecting, and responding to the threat. Trusted insiders present one of the most significant risks to an organization. They possess elevated privileges when compared to external users, have knowledge about technical and non-technical control measures, and potentially can bypass security measures designed to prevent, detect, or react to unauthorized access. In this chapter, we define the insider threat and summarize various case studies of insider attacks in order to highlight the severity of the problem. We then discuss best practices for preventing, detecting, and mitigating insider attacks, to include application of risk management principles specific to the insider threat. Finally, we provide a survey of ongoing research into detecting irregular activities that are potentially harmful to an organization.


Sign in / Sign up

Export Citation Format

Share Document