Risk and Crisis Management for Daily Life: Cases 28–62
Akira Ishikawa and
Atsushi Tsujimoto
Additional contact information
Akira Ishikawa: Aoyama Gakuin University, Japan
Atsushi Tsujimoto: The University of Tokyo, Japan
Chapter 2 in Risk and Crisis Management:101 Cases, 2009, pp 65-141 from World Scientific Publishing Co. Pte. Ltd.
Abstract:
AbstractThe following sections are included:Why Everyone Must Take Precautionary MeasuresWhy We Need to Repeat Simulated ExperiencesWhen Knowledge Is Not EnoughHow Knowledge Acquired by Experience is SuperiorWhat to Do If a War Breaks Out While in a Foreign CountryWhat to Do If You Get Caught in an Emergency AbroadWhat to Do If You Get Arrested While AbroadHow to Avoid Terrorist Bombing AttacksWhat to Do If You Find an Intruder in Your Hotel Room (1)What to Do If You Find an Intruder in Your Hotel Room (2)How to Respond to a Medical Emergency AbroadWhy Analysis of Real-life Experiences are NeededHow to Prepare for Emergencies on a Routine BasisWhy Portable Toilets Are EssentialHow Typhoon Psychology is FatalWhy Specific Roles Should Be AllocatedHow Specific Roles Should Be AllocatedHow to Deal With Personal Risk (1)How to Deal With Personal Risk (2)How to Prevent Fires at Home (1)How to Prevent Fires at Home (2)How to Ensure the Safety of Your InfantHow to Ensure Water SupplyHow to Maximize the Use of FlashlightsWhy the Need for Self-InsuranceHow to Deal with Bankruptcy of Financial InstitutionsHow the Lifting of Payoffs Ban has Affected RiskWhat Clothing and Other Personal Effects are AppropriateWhat to Do In An Emergency When Driving or Using an ElevatorWhy the Need to Fall Back on “Self-Help” When OverseasHow Spyware Infects Your ComputerWhy Internet Auctions are at Your Own RiskHow to Counter Phishing FraudHow to Protect Yourself Against Credit Card Skimming (1)How to Protect Yourself Against Credit Cards Skimming (2)
Keywords: Crisis Management; Risk Management; Contingency Plan; Disaster Recovery; Crisis Communication; Recovery Plan; Terrorism; Internet Security; Information Security (search for similar items in EconPapers)
Date: 2009
References: Add references at CitEc
Citations:
Downloads: (external link)
https://www.worldscientific.com/doi/pdf/10.1142/9789814273909_0002 (application/pdf)
https://www.worldscientific.com/doi/abs/10.1142/9789814273909_0002 (text/html)
Ebook Access is available upon purchase.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:wsi:wschap:9789814273909_0002
Ordering information: This item can be ordered from
Access Statistics for this chapter
More chapters in World Scientific Book Chapters from World Scientific Publishing Co. Pte. Ltd.
Bibliographic data for series maintained by Tai Tone Lim ().