Logistic support of cultural heritage evacuation
Journal Title: Logistics and Transport - Year 2007, Vol 5, Issue 2
Abstract
Cultural heritage is irrecoverable treasure of every nation; it indicates the development of community and demonstrates its cultural level and education. Reasons of damage or cultural heritage devastation vary: threats can be caused by anthropogenic or environmental affects, war conflict, terrorist attacks, etc. Cultural heritage protection is included into the Constitution as well as into further legislative acts and standards. Evacuation of movable cultural heritage is one way of its protection; there are high requirements for professional preparation as well as competent and complex logistic support.
Authors and Affiliations
Zdena Rosická, Miroslav Tomek
Multi-Criteria Evaluation and Ranking of Suppliers - Case Study Analysis
The article presents a coherent methodology of a multiple criteria evaluation of suppliers in furniture industry covering: the definition of a set of variants - laminated chipboards suppliers, the definition of a consist...
Foreign Direct Investments in the Automotive Industry in Poland
The automotive industry is one of the branches with the highest degree of internationalization of production. The beginnings of the investment activities of automobile concerns, including Western Europe, in the new Membe...
Ergonomic Evaluation of Physical Risk for Packing Line Operators
One of the elements of the logistics system is the subsystem of production, which is composed of physical elements such as machinery and equipment, tools, and, most importantly, people. In addition, systems dependent on...
Supply Chain Vulnerability and Resilience – Case Study of Footwear Retail Distribution Network
The aim of this article is to present and investigate the main concepts of supply chain vulnerability and resilience. Thus, the fundamental differences between vulnerability and resilience definitions are discussed. The...
Možné ohrozenia manažerských informačných systemov v doprave
The article describes actual view for threats which threaten information systems. There are various parts of information systems, threats and risks. Next are defined possible attack and attackers which threats informatio...