{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T17:01:41Z","timestamp":1773162101476,"version":"3.50.1"},"reference-count":74,"publisher":"Emerald","issue":"7","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9,28]]},"abstract":"<jats:sec>\n                  <jats:title>Purpose<\/jats:title>\n                  <jats:p>The purpose of this paper is to investigate the knowledge gaps in the published research on terrorism-related risk in supply chains, and to develop a framework of strategies and effective decision-making to enable practitioners to address terrorism-related risks in supply chain risk management (SCRM) and security.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Design\/methodology\/approach<\/jats:title>\n                  <jats:p>The study adopts a novel combination of triangulated methods comprising a systematic literature review (SLR), text mining and network analysis. These methods have not been jointly utilized in past studies, and the approach constitutes a rigorous methodology that cross-validates results and ensures the reliability and validity of qualitative data.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Findings<\/jats:title>\n                  <jats:p>The study reveals a number of key themes in the field of SCRM and security linked with terrorism. The authors identify relevant mitigation strategies and practices for effective strategic decision making. This subsequently leads us to develop a strategic framework of strategies and effective decision-making practices to address terrorism-related risk, affecting SCRM and security. The authors also identify key knowledge gaps in the literature and explore the main contributions by disciplines (e.g. business schools, engineering and maritime institutions) and countries.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Practical implications<\/jats:title>\n                  <jats:p>The authors provide a strategic framework of strategies and effective decision-making practices that managers can use to minimize terrorism-related risk in the context of SCRM and security.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Originality\/value<\/jats:title>\n                  <jats:p>This paper introduces a novel methodological combination for improving the quality of SLRs. It uses the approach to systematically review the strategies and effective decision-making practices interlinked with terrorism risk, affecting SCRM and security. It identifies significant knowledge gaps and defines directions for future research.<\/jats:p>\n               <\/jats:sec>","DOI":"10.1108\/imds-09-2017-0449","type":"journal-article","created":{"date-parts":[[2018,9,24]],"date-time":"2018-09-24T10:05:42Z","timestamp":1537783542000},"page":"1528-1546","source":"Crossref","is-referenced-by-count":15,"title":["Strategies and effective decision-making against terrorism affecting supply chain risk management and security"],"prefix":"10.1108","volume":"118","author":[{"given":"Muhammad Naveed","family":"Khan","sequence":"first","affiliation":[{"name":"University of Hull Department of Management Systems and Logistics, Faculty of Business, Law and Politics, , Hull,","place":["UK"]}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pervaiz","family":"Akhtar","sequence":"additional","affiliation":[{"name":"University of Hull Department of Management Systems and Logistics, Faculty of Business, Law and Politics, , Hull,","place":["UK"]},{"name":"IESEG School of Management, Paris, France"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yasmin","family":"Merali","sequence":"additional","affiliation":[{"name":"University of Hull Centre for Systems Studies, Faculty of Business, Law and Politics, , Hull,","place":["UK"]}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"140","published-online":{"date-parts":[[2018,9,24]]},"reference":[{"issue":"1","key":"2025072819530690300_ref001","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/s12198-011-0080-5","article-title":"Black swans and supply chain strategic necessity","volume":"5","author":"Aggarwal","year":"2012","journal-title":"Journal of Transportation Security"},{"key":"2025072819530690300_ref002","volume-title":"Terrorism: Theory and Practice","author":"Alexander","year":"1979"},{"issue":"4","key":"2025072819530690300_ref003","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1016\/j.intman.2005.09.008","article-title":"Assurance of security in maritime supply chains: conceptual issues of vulnerability and crisis management","volume":"11","author":"Barnes","year":"2005","journal-title":"Journal of International Management"},{"issue":"1","key":"2025072819530690300_ref004","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1177\/103530461102200103","article-title":"Supply chain security: agency theory and port drayage drivers","volume":"22","author":"Belzer","year":"2012","journal-title":"The Economic and Labor Relations Review"},{"key":"2025072819530690300_ref005","unstructured":"British Standards Institute Report\n           (2017), \u201cImpact of supply chain attacks hits highest rate ever\u201d, available at:\u2008www.bsi-intelligencecenter.com\/#threat-analysis-report\u2008(accessed\u2008December 16, 2017)."},{"key":"2025072819530690300_ref006","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.tre.2013.09.005","article-title":"Dynamic impact on global supply chains performance of disruptions propagation produced by terrorist acts","volume":"61","author":"Bueno-Solano","year":"2014","journal-title":"Transportation Research Part E"},{"issue":"5","key":"2025072819530690300_ref007","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1108\/09600030410545436","article-title":"Mitigating supply chain risk through improved confidence","volume":"34","author":"Christopher","year":"2004","journal-title":"International Journal of Physical Distribution & Logistics Management"},{"issue":"2","key":"2025072819530690300_ref008","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1016\/j.tranpol.2010.09.004","article-title":"Transportation security and the role of resilience: a foundation for operational metrics","volume":"18","author":"Cox","year":"2011","journal-title":"Transport Policy"},{"issue":"4","key":"2025072819530690300_ref009","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1016\/j.intman.2005.09.011","article-title":"Positioning terrorism in management and marketing: research propositions","volume":"11","author":"Czinkota","year":"2005","journal-title":"Journal of International Management"},{"issue":"22","key":"2025072819530690300_ref010","doi-asserted-by":"crossref","first-page":"6752","DOI":"10.1080\/00207543.2015.1057624","article-title":"Risk readiness and resiliency planning for a supply chain","volume":"53","author":"Das","year":"2015","journal-title":"International Journal of Production Research"},{"issue":"5","key":"2025072819530690300_ref011","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1108\/09600030910973733","article-title":"Segmenting consumers for food defense communication strategies","volume":"39","author":"Degeneffe","year":"2009","journal-title":"International Journal of Physical Distribution & Logistics Management"},{"issue":"4","key":"2025072819530690300_ref012","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1080\/13675567.2013.813443","article-title":"Defining a common ground for supply chain risk management a case study in the fast-moving consumer goods industry","volume":"16","author":"Diehl","year":"2013","journal-title":"International Journal of Logistics Research and Applications"},{"issue":"4","key":"2025072819530690300_ref013","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/s12198-010-0048-x","article-title":"On analyzing the official statistics for antagonistic threats against transports in EU: a supply chain risk perspective","volume":"3","author":"Ekwall","year":"2010","journal-title":"Journal of Transportation Security"},{"issue":"4","key":"2025072819530690300_ref014","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/s12198-012-0086-7","article-title":"Antagonistic threats against supply chain activities are wicked problems","volume":"5","author":"Ekwall","year":"2012","journal-title":"Journal of Transportation Security"},{"key":"2025072819530690300_ref015","unstructured":"Europol\n           (2007), \u201cEU terrorism situation and trend report\u201d, available at:\u2008www.europol.europa.eu\/content\/publication\/te-sat-2007-eu-terrorism-situation-trend-report-1467\u2008(accessed\u2008June 12, 2015)."},{"issue":"3","key":"2025072819530690300_ref016","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1108\/09600030510594576","article-title":"Improving supply chain disaster preparedness: a decision process for secure site location","volume":"35","author":"Hale","year":"2005","journal-title":"International Journal of Physical Distribution & Logistics Management"},{"issue":"1","key":"2025072819530690300_ref017","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.retrec.2009.12.007","article-title":"The international legal instruments in addressing piracy and maritime terrorism: a critical review","volume":"27","author":"Hong","year":"2010","journal-title":"Research in Transportation Economics"},{"key":"2025072819530690300_ref018","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1108\/S1572-8323(2014)0000022010","volume-title":"Understanding Terrorism","author":"Hyslop","year":"2014"},{"issue":"4","key":"2025072819530690300_ref019","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1080\/13675560310001627016","article-title":"Supply chain risk management: outlining an agenda for future research","volume":"6","author":"J\u00fcttner","year":"2003","journal-title":"International Journal of Logistics"},{"key":"2025072819530690300_ref020","doi-asserted-by":"crossref","first-page":"484","DOI":"10.1016\/j.ijpe.2016.10.006","article-title":"Managing country disruption risks and improving operational performance: risk management along integrated supply chains","volume":"182","author":"Kauppi","year":"2016","journal-title":"International Journal of Production Economics"},{"issue":"8","key":"2025072819530690300_ref021","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1016\/j.marpol.2004.04.006","article-title":"The security of merchant shipping","volume":"2","author":"King","year":"2005","journal-title":"Marine Policy"},{"issue":"1","key":"2025072819530690300_ref022","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1111\/j.1937-5956.2005.tb00009.x","article-title":"Managing disruption risks in supply chains","volume":"14","author":"Kleindorfer","year":"2005","journal-title":"Production and Operations Management"},{"issue":"2","key":"2025072819530690300_ref023","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/j.jom.2008.06.002","article-title":"Proactive planning for catastrophic events in supply chains","volume":"27","author":"Knemeyer","year":"2009","journal-title":"Journal of Operations Management"},{"issue":"2","key":"2025072819530690300_ref024","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1177\/0022002703262869","article-title":"Economic globalization and transnational terrorism: a pooled time series analysis transnational terrorism","volume":"48","author":"Li","year":"2004","journal-title":"Journal of Conflict Resolution"},{"key":"2025072819530690300_ref025","first-page":"1","volume-title":"Understanding Terrorism","author":"Locatelli","year":"2014"},{"issue":"1","key":"2025072819530690300_ref026","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1080\/08853900701784052","article-title":"The impact of the US bio-terrorism act upon Canadian exporters of food products to the United States: a firm-level analysis","volume":"22","author":"MacPherson","year":"2008","journal-title":"The International Trade Journal"},{"issue":"4","key":"2025072819530690300_ref027","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1108\/00070700510589512","article-title":"Deliberate contamination of the food supply chain","volume":"107","author":"Manning","year":"2005","journal-title":"British Food Journal"},{"issue":"3","key":"2025072819530690300_ref028","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1504\/IJSTL.2014.060784","article-title":"Supply chain crime taxonomy development and empirical validation","volume":"6","author":"M\u00e4nnist\u00f6","year":"2014","journal-title":"International Journal Shipping and Transport Logistics"},{"issue":"3","key":"2025072819530690300_ref029","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1108\/09600030810866986","article-title":"Global supply chain risk management strategies","volume":"38","author":"Manuj","year":"2008","journal-title":"International Journal of Physical Distribution & Logistics Management"},{"issue":"11","key":"2025072819530690300_ref030","doi-asserted-by":"crossref","first-page":"1404","DOI":"10.1287\/mnsc.33.11.1404","article-title":"Managerial perspectives on risk and risk taking","volume":"33","author":"March","year":"1987","journal-title":"Management Science"},{"issue":"9","key":"2025072819530690300_ref031","doi-asserted-by":"crossref","first-page":"1815","DOI":"10.1016\/j.techfore.2012.10.019","article-title":"A Delphi-based risk analysis: identifying and assessing future challenges for supply chain security in a multi-stakeholder environment","volume":"80","author":"Markmann","year":"2013","journal-title":"Technological Forecasting & Social Change"},{"key":"2025072819530690300_ref032","unstructured":"Marle, G.V.\n           (2016), \u201cSupply chain disruption cost $56bn last year and there\u2019s more risk to come\u201d, The Loadstar, available at:\u2008https:\/\/theloadstar.co.uk\/supply-chain-disruption-cost-56bn-last-year-and-theres-more-risk-to-come\u2008(accessed\u2008November 13, 2016)."},{"issue":"7","key":"2025072819530690300_ref033","doi-asserted-by":"crossref","first-page":"667","DOI":"10.1080\/03088839.2010.524734","article-title":"Maritime security: an update of key issues","volume":"37","author":"Marlow","year":"2010","journal-title":"Maritime Policy & Management"},{"issue":"3","key":"2025072819530690300_ref034","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/s12198-012-0090-y","article-title":"The effect of transnational threats on the security of Persian Gulf maritime petroleum transportation","volume":"5","author":"Modarress","year":"2012","journal-title":"Journal of Transportation Security"},{"issue":"2","key":"2025072819530690300_ref035","doi-asserted-by":"crossref","first-page":"174","DOI":"10.14488\/BJOPM.2016.v13.n2.a4","article-title":"A management system for preventing intentional food contamination based on risk analysis","volume":"13","author":"Navarrete","year":"2016","journal-title":"Brazilian Journal of Operations & Production Management"},{"key":"2025072819530690300_ref036","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.procir.2014.01.125","article-title":"Capacity scalability in robust design of supply flow subject to disruptions","volume":"17","author":"Nejad","year":"2014","journal-title":"Procedia CIRP"},{"issue":"5","key":"2025072819530690300_ref037","doi-asserted-by":"crossref","first-page":"1265","DOI":"10.1111\/j.1467-8276.2008.01215.x","article-title":"Models of interdependent security along the mike supply chain","volume":"90","author":"Nganje","year":"2008","journal-title":"American Journal Agricultural Economics"},{"issue":"10","key":"2025072819530690300_ref038","doi-asserted-by":"crossref","first-page":"1161","DOI":"10.1108\/IJOPM-01-2015-0041","article-title":"Why be first if it doesn\u2019t pay? The case of early adopters of C-TPAT supply chain security certification","volume":"36","author":"Ni","year":"2016","journal-title":"International Journal of Operations & Production Management"},{"issue":"4","key":"2025072819530690300_ref039","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1016\/j.techsoc.2003.09.017","article-title":"Urban infrastructure security","volume":"25","author":"Nurthen","year":"2003","journal-title":"Technology in Society"},{"issue":"3","key":"2025072819530690300_ref040","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1504\/IJSTL.2014.060785","article-title":"Increasing security and efficiency in supply chains: a five-step approach","volume":"6","author":"Pero","year":"2014","journal-title":"International Journal Shipping and Transport Logistics"},{"key":"2025072819530690300_ref041","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.omega.2014.09.011","article-title":"Decision support for risks managers in the case of deliberate food contamination: the dairy industry as an example","volume":"53","author":"Pinior","year":"2015","journal-title":"Omega"},{"issue":"1","key":"2025072819530690300_ref042","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s12198-007-0002-8","article-title":"Tangible and intangible benefits of transportation security measures","volume":"1","author":"Prentice","year":"2008","journal-title":"Journal of Transportation Security"},{"issue":"2","key":"2025072819530690300_ref043","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1080\/09546550500383225","article-title":"Maritime terrorism in Southeast Asia: a risk assessment","volume":"18","author":"Raymond","year":"2006","journal-title":"Terrorism and Political Violence"},{"issue":"6","key":"2025072819530690300_ref044","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1108\/09600030910985820","article-title":"Human resource management implications of terrorist threats to firms in the supply chain","volume":"39","author":"Reade","year":"2009","journal-title":"International Journal of Physical Distribution & Logistics Management"},{"issue":"1","key":"2025072819530690300_ref045","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.tre.2011.06.002","article-title":"Game theory-based identification of facility use restrictions for the movement of hazardous materials under terrorist threat","volume":"48","author":"Reilly","year":"2012","journal-title":"Transportation Research Part E"},{"issue":"2","key":"2025072819530690300_ref046","first-page":"20","article-title":"Maritime Counter-terrorism: the challenges of center\u2013state relations in India","volume":"9","author":"Shah","year":"2013","journal-title":"Maritime Affairs: Journal of the National Maritime Foundation of India"},{"issue":"7","key":"2025072819530690300_ref047","doi-asserted-by":"crossref","first-page":"1108","DOI":"10.1057\/jors.2013.53","article-title":"Subsidizing to disrupt a terrorism supply chain\u2013a four-player game","volume":"65","author":"Shan","year":"2014","journal-title":"Journal of the Operational Research Society"},{"issue":"2","key":"2025072819530690300_ref048","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1108\/09574090110806262","article-title":"Supply chain management under the threat of international terrorism","volume":"12","author":"Sheffi","year":"2001","journal-title":"The International Journal of Logistics Management"},{"issue":"4","key":"2025072819530690300_ref049","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1108\/13598540610671815","article-title":"A voluntary logistics security program and international supply chain partnership","volume":"11","author":"Sheu","year":"2006","journal-title":"Supply Chain Management: An International Journal"},{"key":"2025072819530690300_ref050","volume-title":"The Terrorist Trap: America\u2019s Experience with Terrorism","author":"Simon","year":"1994","edition":"2001st ed."},{"key":"2025072819530690300_ref051","first-page":"234","article-title":"Planning for disruptions in supply chain networks","volume":"2006","author":"Snyder","year":"2006","journal-title":"Tutorials in Operations Research"},{"issue":"3","key":"2025072819530690300_ref052","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1080\/10466690902932551","article-title":"Sources of supply chain disruptions, factors that breed vulnerability, and mitigating strategies","volume":"16","author":"Stecke","year":"2009","journal-title":"Journal of Marketing Channels"},{"issue":"3","key":"2025072819530690300_ref053","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1007\/s12198-013-0116-0","article-title":"Rail bound traffic a prime target for contemporary terrorist attacks\u202f?","volume":"6","author":"Strandberg","year":"2013","journal-title":"Journal of Transportation Security"},{"issue":"3","key":"2025072819530690300_ref054","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1108\/1525383X200500012","article-title":"Towards an understanding of terrorism risk in the MNE","volume":"13","author":"Suder","year":"2005","journal-title":"Multinational Business Review"},{"issue":"6","key":"2025072819530690300_ref055","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MNET.2010.5634440","article-title":"Layered defense: modeling terrorist transfer threat networks and optimizing network risk reduction","volume":"24","author":"Taquechel","year":"2010","journal-title":"IEEE Network"},{"issue":"1","key":"2025072819530690300_ref056","doi-asserted-by":"crossref","first-page":"5","DOI":"10.2307\/20713622","article-title":"The response security of the US to the new initiatives maritime industry container","volume":"45","author":"Thibault","year":"2006","journal-title":"Transportation Journal"},{"issue":"4","key":"2025072819530690300_ref057","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1108\/09653560410556537","article-title":"The indirect economic effects of a terrorist attack on transport infrastructure: a proposal for a SAGE","volume":"13","author":"Thissen","year":"2004","journal-title":"Disaster Prevention and Management"},{"issue":"3","key":"2025072819530690300_ref058","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1111\/1467-8551.00375","article-title":"Towards a methodology for developing evidence-informed management knowledge by means of systematic review","volume":"14","author":"Tranfield","year":"2003","journal-title":"British Journal of Management"},{"key":"2025072819530690300_ref059","unstructured":"United Nations\n           (1999), \u201cMeasures to eliminate international terrorism\u201d, available at:\u2008www.un.org\/en\/ga\/sixth\/69\/int_terrorism.shtml\u2008(assessed\u2008June 13, 2016)."},{"issue":"1","key":"2025072819530690300_ref060","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1108\/SCM-09-2012-0307","article-title":"The resilience of energy supply chains: a multiple case study approach on oil and gas supply chains to Europe","volume":"19","author":"Urciuoli","year":"2014","journal-title":"Supply Chain Management"},{"issue":"3","key":"2025072819530690300_ref061","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1177\/0891242408321390","article-title":"strategic responses by Canadian and US exporters to increased US border security measures: a firm-level analysis","volume":"22","author":"Vance","year":"2008","journal-title":"Economic Development Quarterly"},{"issue":"6","key":"2025072819530690300_ref062","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1016\/j.pursup.2007.01.004","article-title":"An empirical investigation into supply chain vulnerability","volume":"12","author":"Wagner","year":"2007","journal-title":"Journal of Purchasing and Supply Management"},{"key":"2025072819530690300_ref063","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.trb.2012.12.004","article-title":"A continuum approximation approach to competitive facility location design under facility disruption risks","volume":"50","author":"Wang","year":"2013","journal-title":"Transportation Research Part B: Methodological"},{"key":"2025072819530690300_ref064","unstructured":"World Economic Forum\n           (2013), \u201cBuilding resilience in supply chain\u201d, available at:\u2008www3.weforum.org\/docs\/WEF_RRN_MO_BuildingResilienceSupplyChains_ExecutiveSummary_2013\u2008(assessed\u2008March 12, 2016)."},{"key":"2025072819530690300_ref065","first-page":"72","article-title":"A new risk quantification approach in port facility security assessment","volume":"59","author":"Yang","year":"2014","journal-title":"Transportation Research Part A"},{"issue":"2","key":"2025072819530690300_ref066","doi-asserted-by":"crossref","first-page":"2102","DOI":"10.1016\/j.eswa.2011.07.137","article-title":"Developing a supply chain disruption analysis model: application of colored","volume":"39","author":"Zegordi","year":"2012","journal-title":"Expert Systems With Applications"},{"issue":"16","key":"2025072819530690300_ref067","doi-asserted-by":"crossref","first-page":"3401","DOI":"10.1080\/00207540500095613","article-title":"An institutional theory perspective of business continuity planning for purchasing and supply management","volume":"43","author":"Zsidisin","year":"2005","journal-title":"International Journal of Production Research"},{"issue":"8\/9","key":"2025072819530690300_ref068","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1080\/09537287.2012.666861","article-title":"Design of a resilient shock absorber for disrupted supply chain networks: a shock-dampening fortification framework for mitigating excursion events","volume":"24","author":"Bhattacharya","year":"2013","journal-title":"Production Planning & Control"},{"key":"2025072819530690300_ref069","unstructured":"Global Terrorism Index\n           (2015), \u201cMeasuring and understanding the impact of terrorism\u201d, available at:\u2008http:\/\/economicsandpeace.org\/wp-content\/uploads\/2015\/11\/Global-Terrorism-Index-2015\/\u2008(accessed\u2008May 22, 2016)."},{"issue":"150","key":"2025072819530690300_ref070","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/07266472.2006.10878826","article-title":"Dangerous goods: the legal ramifications of recent responses to terrorism on the high seas","volume":"2006","author":"Gordon","year":"2006","journal-title":"Maritime Studies"},{"issue":"2","key":"2025072819530690300_ref071","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1353\/sais.2013.0023","article-title":"Flag state responsibility for maritime terrorism","volume":"33","author":"Karim","year":"2013","journal-title":"SAIR Review International Affairs"},{"issue":"3","key":"2025072819530690300_ref072","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1080\/02722010709481805","article-title":"A survey of cross-border trade at a time of heightened security: the case of the Niagara Bi-National region","volume":"37","author":"Macpherson","year":"2007","journal-title":"The American Review of Canadian Studies"},{"issue":"3","key":"2025072819530690300_ref073","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1111\/j.1539-6924.2007.00908.x","article-title":"A risk and economic analysis of dirty bomb attacks on the ports of Los Angeles and Long Beach","volume":"27","author":"Rosoff","year":"2007","journal-title":"Risk Analysis"},{"issue":"2","key":"2025072819530690300_ref074","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1108\/IMDS-04-2013-0176","article-title":"Security investment in aviation industry: a longitudinal analysis","volume":"114","author":"Wang","year":"2014","journal-title":"Industrial Management & Data Systems"}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IMDS-09-2017-0449\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/imds\/article-pdf\/118\/7\/1528\/1345016\/imds-09-2017-0449.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/imds\/article-pdf\/118\/7\/1528\/1345016\/imds-09-2017-0449.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T23:53:22Z","timestamp":1753746802000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/imds\/article\/118\/7\/1528\/182362\/Strategies-and-effective-decision-making-against"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,24]]},"references-count":74,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2018,9,28]]}},"URL":"https:\/\/doi.org\/10.1108\/imds-09-2017-0449","relation":{},"ISSN":["0263-5577","1758-5783"],"issn-type":[{"value":"0263-5577","type":"print"},{"value":"1758-5783","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,24]]}}}