Browse Papers
From IFORS
Contact Us
English
Remember me
Login
Forgot password?
Keyword: security
Found
180 papers
in total
Date Descending
Date Ascending
Title Descending
Title Ascending
Interactions between energy security and climate change: A focus on developing countries
2011,
Hobbs Benjamin F
We consider the tensions between climate change and energy security policy. Often...
Smart grids: Another step towards competition, energy security and climate change objectives
2011,
Clastres Cdric
The deployment of smart grids in electricity systems has given rise to much...
Measuring energy security: Trends in the diversification of oil and natural gas supplies
2011,
Loungani Prakash
We present evidence on one facet of energy security in OECD economies–the extent...
Securing energy equity
2011,
Grimsby Lars Kre
Addressing energy poverty rather than energy equity conveniently evades the problem of...
Contracting Information Security in the Presence of Double Moral Hazard
2013,
Raghunathan Srinivasan
In information security outsourcing, it is the norm that the outsourcing firms and the...
Supply chain crime - taxonomy development and empirical validation
2014,
Hintsa Juha
Supply chain security (SCS) management has been widely discussed among...
Increasing security and efficiency in supply chains: a five-step approach
2014,
Pero Margherita
The actions that companies implement to protect business continuity from threats like...
Supply chain visibility and security - the SMART-CM project solution
2014,
Boile Maria
In a business environment characterised by increasingly complex supply chains forming...
The vulnerability of transport logistics to extreme weather events
2014,
Doll Claus
Records of international organisations and reinsurance companies highlight the rising...
Using portfolio optimisation to calculate the efficient relationship between maritime port security residual risk and security investment
2014,
Talas Risto
The research employs an adaptive cross‐disciplinary research strategy in an...
Dealing with supply chain security - case of Poland in a global perspective
2014,
JadewskaGutta Magdalena
The interest in supply chain security has been growing among academics, business...
From large to small: Reorienting rural development policies in response to climate change, food security and poverty
2013,
Pokorny Benno
We critically reflect on policies for the development of the Amazon. Policies are...
Introduction to the Asian Energy Security project: Project organization and methodologies
2011,
Von Hippel David
The spectacular recent economic growth in the Asia‐Pacific region in general,...
Energy security and sustainability in Northeast Asia
2011,
Savage Timothy
‘Energy Security’ has typically, to those involved in making energy...
Secure federation of semantic information services
2013,
Fabian Benjamin
A fundamental challenge for product‐lifecycle management in collaborative value...
Preventing ticket-switching of RFID-tagged items in apparel retail stores
2013,
Piramuthu Selwyn
We consider ticket‐switching in apparel retail stores. We develop...
A secure query assurance approach for distributed health records
2014,
Clarke Andrew
Health information system architectures inherently include distributed systems and...
A cutting‐plane algorithm for solving a weighted influence interdiction problem
2014,
Cole Smith J
We consider a two‐stage defender‐attacker game that takes place on a...
Traffic control in Canada‐USA border checkpoint operations: impacts on supply chain velocity, infrastructure spending, and national security
2013,
Isotupa K P Sapna
In this paper, we examine the traffic control tactic of reducing the amplitude of...
Modelling security in the maritime supply chain using knowledge constructs
2013,
Norbis Mario
The purpose of this research is to develop a decision process and modelling framework...
X‐ray cargo inspection for enhancing the maritime safety and security: a case study of international container ports
2013,
Min Hokey
As the international container traffic continues to rise, there is a growing concern...
Exploring security effects on transport performance
2013,
Sternberg Henrik
The purpose of this investigation is to learn the effects of security on transport...
Code updates based on minimal backbone and group key management for secure sensor networks
2013,
Doh Inshil
Code update in sensor networks is a useful technology to update codes to change the...
A generic framework for the description and analysis of energy security in an energy system
2012,
Hughes Larry
While many energy security indicators and models have been developed for specific...
First Page
3
4
5
6
7
Last Page
Papers per page:
6 Papers
12 Papers
24 Papers
36 Papers
48 Papers