Cargo: 1. Goods transported or to be transported, all goods carried on a ship covered by a B/L. 2. Any goods, wares, merchandise, and articles of every kind whatsoever carried on a ship, other than mail, ship’s stores, ship’s spare parts, ship’s equipment, stowage material, crew’s effects and passengers’ accompanied baggage
CHIPS: Clearing House Interbank Payments System. An interbank payment system related to international trade, CHIPS is used for the transfer of international trade dollars. CHIPS is used by both Fedwire and S.W.I.F.T. see also: Conditional S.W.I.F.T or SWIFT
Closed-circuit television (CCTV): is a form of cable television accessible to a limited user group. It is used especially in security systems and military establishments, and for educational purposes.
Competitive advantage: is gained by exploiting the unique blend of activities, assets, attributes, market conditions, and relationships that differentiates an organization from its competitors. These may include: access to natural resources, specific location, skilled workforce, lower costs, better-quality products, unique technologies, or exceptional customer service. The fundamental strategies involved are: cost leadership, differentiation, and focus (or establishing a niche).
Competitive Intelligence (CI): is the process of monitoring the competitive environment and analyzing the findings in the context of internal issues, for the purpose of decision support. CI enables senior managers in companies of all sizes to make more-informed decisions about everything from marketing, R&D, and investing tactics to long-term business strategies. Effective CI is a continuous process involving the legal and ethical collection of information, analysis that does not avoid unwelcome conclusions, and controlled dissemination of actionable intelligence to decision makers.
CI: is the gathering and analyzing of intelligence about the behavior of the market you deal in, in order to make certain decisions based on market trends
Computer-aided design (CAD): involves the use of computers in the design and engineering process. The term embraces geometric modeling, Analysis, testing, and drafting.
Contingency planning: differs from Scenario planning in that it usually takes into account only one probable future event.
Corporate culture: is the set of values, beliefs, and relationships between individuals and functions that guide the decisions of the company in order to achieve its objectives. It results in behavior that has been learned within a group or transferred between individuals over time. It may also be referred to as Organizational culture.
Corporate security: aims at protecting Knowledge assets, whether in the form of physical entities or intellectual (tangible and intangible) property.
Cost/Benefit Analysis: is a process in planning, related to the decision to commit funds or assets. This is a systematic attempt to measure or analyze the value of all the benefits that accrue from a particular expenditure. Usually, this process involves three steps:
- Identification of all direct and indirect consequences of the expenditure.
- Assignment of a monetary value to all costs and benefits resulting from the expenditure.
- Discounting expected future costs and revenues accruing from the expenditure to express those costs and revenues in current monetary values.
Counterintelligence: refers to those activities that are concerned with identifying and counteracting the threat to security posed by hostile intelligence services or organizations, or by individuals engaged in Espionage, sabotage, or subversion.
Crisis: Any global, regional, or local natural or human-caused event or business interruption that runs the risk of (1) escalating in intensity, (2) adversely impacting shareholder value or the organization’s financial position, (3) causing harm to people or damage to property or the environment, (4) falling under close media or government scrutiny, (5) interfering with normal operations and wasting significant management time and/or financial resources, (6) adversely affecting employee morale, or (7) jeopardizing the organization’s reputation, products, or officers, and therefore negatively impacting its future.
CSI: Container Security Initiative. A legal initiative in the USA which, among other things, introduced a network of security-certified ports outside the USA, with American customs personnel stationed at the ports
C-TPAT: is a US Customs and Border Protection (CBP) voluntary joint government-business initiative to build cooperative relationships that strengthen overall supply chain and border security. This initiative recognizes that Customs can provide the highest level of security only through close cooperation with the ultimate owners of the supply chain, importers, carriers, brokers, warehouse operators, and manufacturers. This initiative asks that business work to ensure the integrity of their supply chain processes and business partners, and successfully maintain open communication of their status. The program is not limited to large importer/exporters as CBP recognizes that small and medium-sized companies are integral parts of maintaining secure borders.
Cybersquatting: appears to be growing increasingly popular. According to MarkMonitor’s Brand Jacking Index, the number of daily instances of cybersquatting against 30 of the top global brands jumped from 382,246 in 2007 to 449,484 last year, an increase of 17 percent. The company also says that cybersquatting cost marketers around the world roughly $175 billion in lost revenue. “When the economy goes south, white-collar criminals don’t quit,” says MarkMonitor’s Fred Felman says. The increase in cybersquatting has been attributed to the growing use of search engine optimization among marketers trying to reach consumers online. But despite the increase in cybersquatting, many marketers are not investing large amounts of money to protect their brands. A study by the Chief Marketing Officer Council found that 52 percent of marketers spend less than $100,000 on brand protection each year, while just 2.7 percent spend $5 million or more. “We’re at a point in which marketers need a wake-up call in what’s happening to their brand,” says the council’s Liz Miller. “Marketing is in the dark, and cybercriminals are ramping up their game.”