scholarly journals Cultivating Safety in the Information Technology Era

2020 ◽  
Vol 6 (2) ◽  
Author(s):  
Endah Kumala Dewi

In the information technology era, the banking industry must compete in an external environment characterized by high levels of uncertainty, complexity and change. Accidents in high-risk manufacturing organizations are generally related to safety studies. The researcher attempted to study "accidents" due to network vulnerabilities in IT-based organizations using the safety concept. This qualitative study is important because it provides analysis of IT support for organizational development. This study used multi-case study and grounded research approaches. The process of developing an information safety climate is considered an alternative solution other than technology. The study revealed that normal accident theory can be used to explain accidents in IT-based organizations. The process of developing an information security climate in banking organizations is categorized as the emergency type. The manifestation of information safety climate is attentiveness, accountability, ethical sensitivity, integrity and sustainability. Phases that need to be undergone in cultivating the safety climate are: adaptation, learning, awareness to risk, and resilience. Thus, it can be concluded that the climate of an IT-based organization is different from the climate of a non technology-based organization.

Author(s):  
Cherise M. Cole ◽  
Darrell Norman Burrell ◽  
Delores Springs

Significant labor shortages in fields like information technology and information security has created a critical need to recruit, hire, develop, and retain more woman. The challenge remains how to make these technical organizations more welcoming and inclusive for women. Sexual harassment continues to be a significant problem in all workplaces. Research shows that harassment blossoms in careers and organizations where men dominate the majority of all management positions and women have such limited representation within the organization. This case study explores an actual organizational intervention in a technical organization.


Author(s):  
Shruti Makarand Kanade

 Cloud computing is the buzz word in today’s Information Technology. It can be used in various fields like banking, health care and education. Some of its major advantages that is pay-per-use and scaling, can be profitably implemented in development of Enterprise Resource Planning or ERP. There are various challenges in implementing an ERP on the cloud. In this paper, we discuss some of them like ERP software architecture by considering a case study of a manufacturing company.


2020 ◽  
Author(s):  
George Karagiannakis

This paper deals with state of the art risk and resilience calculations for industrial plants. Resilience is a top priority issue on the agenda of societies due to climate change and the all-time demand for human life safety and financial robustness. Industrial plants are highly complex systems containing a considerable number of equipment such as steel storage tanks, pipe rack-piping systems, and other installations. Loss Of Containment (LOC) scenarios triggered by past earthquakes due to failure on critical components were followed by severe repercussions on the community, long recovery times and great economic losses. Hence, facility planners and emergency managers should be aware of possible seismic damages and should have already established recovery plans to maximize the resilience and minimize the losses. Seismic risk assessment is the first step of resilience calculations, as it establishes possible damage scenarios. In order to have an accurate risk analysis, the plant equipment vulnerability must be assessed; this is made feasible either from fragility databases in the literature that refer to customized equipment or through numerical calculations. Two different approaches to fragility assessment will be discussed in this paper: (i) code-based Fragility Curves (FCs); and (ii) fragility curves based on numerical models. A carbon black process plant is used as a case study in order to display the influence of various fragility curve realizations taking their effects on risk and resilience calculations into account. Additionally, a new way of representing the total resilience of industrial installations is proposed. More precisely, all possible scenarios will be endowed with their weighted recovery curves (according to their probability of occurrence) and summed together. The result is a concise graph that can help stakeholders to identify critical plant equipment and make decisions on seismic mitigation strategies for plant safety and efficiency. Finally, possible mitigation strategies, like structural health monitoring and metamaterial-based seismic shields are addressed, in order to show how future developments may enhance plant resilience. The work presented hereafter represents a highly condensed application of the research done during the XP-RESILIENCE project, while more detailed information is available on the project website https://r.unitn.it/en/dicam/xp-resilience.


2019 ◽  
Vol 22 (4) ◽  
pp. 744-752
Author(s):  
Sisira Dharmasri Jayasekara ◽  
Iroshini Abeysekara

Purpose The purpose of this paper is to discuss the role of digital forensics in an evolving environment of cyber laws giving attention to Bay of Bengal Initiative for Multi-Sectoral Technical and Economic Cooperation (BIMSTEC) countries, comprising Bangladesh, India, Myanmar, Sri Lanka, Thailand, Nepal and Bhutan, in a dynamic global context. Design/methodology/approach This study uses a case study approach to discuss the digital forensics and cyber laws of BIMSTEC countries. The objective of the study was expected to be achieved by referring to decided cases in different jurisdictions. Cyber laws of BIMSTEC countries were studied for the purpose of this study. Findings The analysis revealed that BIMSTEC countries are required to amend legislation to support the growth of information technology. Most of the legislation are 10-15 years old and have not been amended to resolve issues on cyber jurisdictions. Research limitations/implications This study was limited to the members of the BIMSTEC. Originality/value This paper is an original work done by the authors who have discussed the issues of conducting investigations with respect to digital crimes in a rapidly changing environment of information technology and deficient legal frameworks.


Sign in / Sign up

Export Citation Format

Share Document