Foreword |
|
ix | |
|
Rt. Hon. Sir John Wheeler |
|
Foreword |
|
xi | |
|
Acknowledgements |
|
xiii | |
Introduction |
|
1 | (6) |
Part One: Invisible Risk and its Impact on Investment |
|
|
Operating in overseas markets |
|
|
7 | (3) |
|
|
10 | (13) |
|
|
12 | (2) |
|
MIG's ten GADs and their sub sections |
|
|
14 | (5) |
|
|
19 | (4) |
|
The problem with strategy |
|
|
23 | (15) |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
26 | (9) |
|
|
35 | (1) |
|
|
36 | (2) |
|
|
38 | (11) |
|
|
41 | (4) |
|
|
45 | (4) |
|
Bureaucracy, corruption and Foreign Direct Investment |
|
|
49 | (20) |
|
Bureaucracy and liberality of investment regimes |
|
|
53 | (1) |
|
|
54 | (8) |
|
Case study: Indonesia (1) |
|
|
62 | (2) |
|
Case study: Indonesia (2) |
|
|
64 | (5) |
|
|
69 | (10) |
|
|
73 | (2) |
|
Case study: CIS/Ukraine/Russia |
|
|
75 | (4) |
|
|
79 | (17) |
|
|
85 | (4) |
|
Case study: parallel trading and product diversion |
|
|
89 | (4) |
|
|
93 | (1) |
|
Case study: European Union |
|
|
94 | (2) |
|
The good, the bad and the unethical |
|
|
96 | (9) |
|
|
99 | (2) |
|
Case study: Royal Dutch/Shell |
|
|
101 | (4) |
|
|
105 | (20) |
|
|
111 | (4) |
|
|
115 | (7) |
|
|
122 | (1) |
|
Case study: industrial espionage |
|
|
123 | (2) |
|
|
125 | (18) |
Part Two: The World's Troublespots |
|
|
|
143 | (4) |
|
Origins of the threat to business |
|
|
147 | (4) |
|
Religious fanaticism and creeping Islam |
|
|
147 | (1) |
|
International organized crime syndicates |
|
|
148 | (3) |
|
Political terrorist groups |
|
|
151 | (2) |
|
|
153 | (3) |
|
|
156 | (3) |
|
Middle East - the Saudi domino effect |
|
|
159 | (12) |
|
Instability in Saudi Arabia |
|
|
159 | (4) |
|
Expanded US operations against Iraq |
|
|
163 | (1) |
|
Re-radicalization in Iran |
|
|
164 | (3) |
|
Higher intensity Israeli-Palestinian conflict |
|
|
167 | (2) |
|
|
169 | (2) |
|
|
171 | (3) |
|
|
171 | (3) |
|
|
174 | (17) |
|
Indo-Pakistani conflict over Kashmir |
|
|
174 | (3) |
|
US operations extended into Pakistan |
|
|
177 | (2) |
|
Sino-Indian war as a result of Indo-Pakistani war |
|
|
179 | (2) |
|
A widened Sino-Indian war |
|
|
181 | (2) |
|
|
183 | (5) |
|
|
188 | (1) |
|
Islamic revolution in Indonesia |
|
|
189 | (2) |
|
The lesser risks - country by country |
|
|
191 | (36) |
|
|
191 | (6) |
|
Europe and the Former Soviet Union |
|
|
197 | (3) |
|
|
200 | (10) |
|
|
210 | (7) |
|
|
217 | (10) |
Part Three: Threat and Defence |
|
|
|
227 | (3) |
|
|
227 | (1) |
|
Kidnapping or hostage-taking |
|
|
228 | (1) |
|
|
229 | (1) |
|
The defence of buildings, personnel and stock |
|
|
230 | (19) |
|
The threat from direct action groups |
|
|
230 | (5) |
|
Protection after the blast |
|
|
235 | (4) |
|
Chemical and biological threats |
|
|
239 | (1) |
|
Evacuation of buildings on receipt of a warning or after terrorist attack |
|
|
240 | (6) |
|
|
246 | (1) |
|
|
247 | (2) |
|
Proactive and precautionary measures |
|
|
249 | (30) |
|
|
250 | (1) |
|
|
250 | (1) |
|
|
251 | (1) |
|
|
252 | (1) |
|
|
252 | (1) |
|
|
253 | (1) |
|
|
254 | (3) |
|
|
257 | (3) |
|
Portable computer and mobile telephone security |
|
|
260 | (1) |
|
|
261 | (1) |
|
|
262 | (1) |
|
|
263 | (1) |
|
|
263 | (1) |
|
Attack and kidnap for ransom |
|
|
264 | (1) |
|
|
264 | (2) |
|
|
266 | (4) |
|
|
270 | (3) |
|
Response to a kidnap call |
|
|
273 | (1) |
|
|
274 | (5) |
Part Four: Conclusions |
|
|
Conclusions - So Where Do We Stand Now? |
|
|
279 | (8) |
Appendices |
|
References |
|
287 | (1) |
About the authors |
|
288 | (1) |
About MIG |
|
289 | (2) |
Merchant International Group (MIG) publications |
|
291 | (2) |
Index |
|
293 | |