The Experts below are selected from a list of 1266 Experts worldwide ranked by ideXlab platform
Nadya Bartol - One of the best experts on this subject based on the ideXlab platform.
-
Cyber Supply Chain Security practices DNA – Filling in the puzzle using a diverse set of disciplines
Technovation, 2014Co-Authors: Nadya BartolAbstract:Abstract This paper describes the journey of the evolving cyber Supply Chain community towards creating practical and useful standards and best practices. It is based on the author׳s experience working on the topic since 2006 and contains observations and lessons learned, refined over the years. Cyber Supply Chain Security requires members of several different professional communities to come together including information Security, system and software engineering, Supply Chain and logistics, and process improvement, to name a few. These professional communities have not worked or interacted before and had divergent experiences, vocabularies, frameworks, standards, ways of demonstrating that the practices were performed, and many other things. Over the years these people have learned that many practices that they thought were missing already existed in another discipline and that reinventing them was not necessary. The paper will summarize this journey with the goal of helping those new to this subject matter learn from those who have been working on it for some time. The paper also describes the current landscape of cyber Supply Chain standards, including the ones that provide foundational practices that may not be strictly cyber Supply Chain, those that are truly cyber Supply Chain, and processes and techniques that can be used in support of cyber Supply Chain Security. The readers of this paper will learn what these emerging efforts have to offer and what is needed to successfully implement the practices that these efforts propose.
-
cyber Supply Chain Security practices dna filling in the puzzle using a diverse set of disciplines
Technovation, 2014Co-Authors: Nadya BartolAbstract:Abstract This paper describes the journey of the evolving cyber Supply Chain community towards creating practical and useful standards and best practices. It is based on the author׳s experience working on the topic since 2006 and contains observations and lessons learned, refined over the years. Cyber Supply Chain Security requires members of several different professional communities to come together including information Security, system and software engineering, Supply Chain and logistics, and process improvement, to name a few. These professional communities have not worked or interacted before and had divergent experiences, vocabularies, frameworks, standards, ways of demonstrating that the practices were performed, and many other things. Over the years these people have learned that many practices that they thought were missing already existed in another discipline and that reinventing them was not necessary. The paper will summarize this journey with the goal of helping those new to this subject matter learn from those who have been working on it for some time. The paper also describes the current landscape of cyber Supply Chain standards, including the ones that provide foundational practices that may not be strictly cyber Supply Chain, those that are truly cyber Supply Chain, and processes and techniques that can be used in support of cyber Supply Chain Security. The readers of this paper will learn what these emerging efforts have to offer and what is needed to successfully implement the practices that these efforts propose.
-
Cyber Supply Chain Security practices DNA - Filling in the puzzle using a diverse set of disciplines
Technovation, 2014Co-Authors: Nadya BartolAbstract:This paper describes the journey of the evolving cyber Supply Chain community towards creating practical and useful standards and best practices. It is based on the authors experience working on the topic since 2006 and contains observations and lessons learned, refined over the years. Cyber Supply Chain Security requires members of several different professional communities to come together including information Security, system and software engineering, Supply Chain and logistics, and process improvement, to name a few. These professional communities have not worked or interacted before and had divergent experiences, vocabularies, frameworks, standards, ways of demonstrating that the practices were performed, and many other things. Over the years these people have learned that many practices that they thought were missing already existed in another discipline and that reinventing them was not necessary. The paper will summarize this journey with the goal of helping those new to this subject matter learn from those who have been working on it for some time. The paper also describes the current landscape of cyber Supply Chain standards, including the ones that provide foundational practices that may not be strictly cyber Supply Chain, those that are truly cyber Supply Chain, and processes and techniques that can be used in support of cyber Supply Chain Security. The readers of this paper will learn what these emerging efforts have to offer and what is needed to successfully implement the practices that these efforts propose. © 2014 Elsevier Ltd.
Juha Hintsa - One of the best experts on this subject based on the ideXlab platform.
-
Methodology for Development of a Supply Chain Security Resilience System
2020Co-Authors: Dimitrios A Tsamboulas, Anna Maria Lekka, Mark R Miller, Juha HintsaAbstract:This paper will present the key elements and steps of a methodology that assists in the development of a Supply Chain Security resilience system. The core of the methodology is the identification of the required elements of a pre-standardisation framework for Supply Chain Resilience Management System services standard adapted for the critical industry sectors. The paper tackles internal sources of risks of disruption in the Supply Chain activities so that catastrophic events, like terrorist attacks can be addressed without having to resort to disaster recovery and business continuity plans. The paper addresses both the challenges and enhances established management strategies and operations management practices. The methodology contributes to the development of best practices facilitating business to achieve a more efficient organisation, thus creating and delivering better value to customers and shareholders.
-
A comprehensive framework for analysis and design of Supply Chain Security standards
Journal of Transportation Security, 2010Co-Authors: Juha HintsaAbstract:An avalanche of new Supply Chain Security (SCS) standards, programs and regulations have emerged since 2001. These have been developed and promoted by various governmental, Supply Chain and standardization parties. Due to political, economic, technical and legal reasons, no dominating global standard has been developed that covers all possible aspects of SCS. Instead, we have seen national and regional, transport mode-specific, crime issue-specific, and other types of more focused SCS standards gaining some popularity within Supply Chain operating communities. This paper intends to capture and explain the most relevant SCS standard characteristics, in order to form a pragmatic framework for the analysis and design of SCS standards for the benefit of governmental policy makers and business community Supply Chain and Security experts. A theoretical framework derived from the literature is tested and further developed in a real-life SCS standardization feasibility study project. Recommendations are made as to how the framework might be exploited, and topics for future research are suggested.
-
Supply Chain Security management an overview
International Journal of Logistics Systems and Management, 2009Co-Authors: Juha Hintsa, Ximena Gutierrez, Philip Wieser, Aripekka HameriAbstract:Supply Chain Security Management (SCSM) is a relatively new research discipline, thus introductory papers are scarce. The recent concerns on Security are driving the introduction of new Security initiatives forward to an extent that they are becoming an integral part of Supply Chain management. This paper presents the current state of SCSM initiatives, and discusses their managerial implications, highlighting the importance of interplay between various business and governmental parties. The paper concludes that a gap exists between SCSM research, standards development and practical managerial actions; the academic community can bridge this gap, e.g., by carrying in-depth Supply Chain case studies.
-
voluntary Supply Chain Security program impacts an empirical study with basc member companies
World Customs Journal, 2007Co-Authors: Ximena Gutierrez, Philippe Wieser, Juha HintsaAbstract:Managing Security in global Supply Chains has been gaining increasing attention in business and governmental agendas since the terrorist attacks in the United States in 2001. Since then several new voluntary government-business partnership programs have emerged to enhance Security in end-to-end Supply Chains. However, a few programs have existed for a longer time, one of them is the BASC (Business Alliance for Secure Commerce) program, active as a business alliance in Latin America since 1996, originally fi ghting narcotics smuggling, and later converted into a holistic Supply Chain Security management program. Understanding the implications – costs, tradeoffs, benefi ts, etc. – of Security management programs is a complicated task, with very limited existing literature. This paper, being the fi rst survey of its kind, presents the results of the survey carried out with 102 BASC member companies, including: (1) the most commonly implemented Security measures; (2) the most (and least) efficient Security measures; (3) the relationship between the cost and effectiveness of the measures; and (4) the benefi ts obtained while implementing these Security measures. Finally, the paper provides recommendations for governmental and company decision makers on designing future ‘win-win’ Supply Chain Security programs.
-
voluntary Supply Chain Security programs a systematic comparison
2006Co-Authors: Ximena Gutierrez, Juha HintsaAbstract:International crime and terrorism has become a major concern to both governments and businesses, due to the vulnerability of international Supply Chains of being either a direct target for crime and terrorism, or a means to deliver weapons. In response to this new threat, several voluntary Supply Chain Security programs have been created or modified. This paper analyses and compares nine different Security initiatives around the world, to establish their compatibility and identify the Security measures that may become mandatory in the near future. The study is carried out as an archive study, supported by direct input from various program experts.
Seungjin Whang - One of the best experts on this subject based on the ideXlab platform.
-
Higher Supply Chain Security with lower cost: Lessons from total quality management
International Journal of Production Economics, 2005Co-Authors: Hau L Lee, Seungjin WhangAbstract:Supply Chain Security has become a major concern to the private and public sector, after the disastrous event of September 11, 2001. Prior to September 11, 2001, Supply Chain Security concerns were related to controlling theft and reducing contraband such as illegal drugs, illegal immigrants, and export of stolen goods. But after September 11, 2001, the threat of terrorist attacks has heightened the need to assure Supply Chain Security. The public is of course concerned with the potential of having weapons of mass destruction embedded in the shipments through the Supply Chain. In addition, the private sector is concerned with the costs of assuring Security, and the potential disruptions associated with real or potential terrorist acts. Governments and industry have all responded with proposals to create more confidence in Supply Chain Security, while maintaining smooth flows of goods and services in a global Supply Chain. One of the most effective strategies may be to apply the lessons of successful quality improvement programs. In this paper, we describe how the principles of total quality management can actually be used to design and operate processes to assure Supply Chain Security. The central theme of the quality movement - that higher quality can be attained at lower cost by proper management and operational design - is also applicable in Supply Chain Security. By using the right management approach, new technology, and re-engineered operational processes, we can also achieve higher Supply Chain Security at lower cost. We will demonstrate how this can be done with a quantitative model of a specific case example. © 2004 Elsevier B.V. All rights reserved.
-
higher Supply Chain Security with lower cost lessons from total quality management
Research Papers, 2003Co-Authors: Seungjin WhangAbstract:Supply Chain Security has become a major concern to the private and public sector, after the disastrous event of September 11, 2001. Prior to September 11, 2001, Supply Chain Security concerns were related to controlling theft and reducing contraband such as illegal drugs, illegal immigrants, and export of stolen goods. But after September 11, 2001, the threat of terrorist attacks has heightened the need to assure Supply Chain Security. The public is of course concerned with the potential of having weapons of mass destruction embedded in the shipments through the Supply Chain. In addition, the private sector is concerned with the costs of assuring Security, and the potential disruptions associated with real or potential terrorist acts. Governments and industry have all responded with proposals to create more confidence in Supply Chain Security, while maintaining smooth flows of goods and services in a global Supply Chain. One of the most effective strategies may be to apply the lessons of successful quality improvement programs. In this paper, we describe how the principles of total quality management can actually be used to design and operate processes to assure Supply Chain Security. The central theme of the quality movement--that higher quality can be attained at lower cost by proper management and operational design--is also applicable in Supply Chain Security. By using the right management approach, new technology, and re-engineered operational processes, we can also achieve higher Supply Chain Security at lower cost. We will demonstrate how this can be done with a quantitative model of a specific case example.
Daniel Ekwall - One of the best experts on this subject based on the ideXlab platform.
-
Supply Chain Security – Threats and Solutions
Risk Management - Current Issues and Challenges, 2012Co-Authors: Daniel EkwallAbstract:In recent years, the cargo transport process has improved mainly in the areas of logistics efficiency and documentation handling. The World Trade Centre terror attack in 2001 changed the world and with it the conditions for logistics world-wide. The logistics consequences were according to[1]: It is instructive to note that these disruptions were not caused by the attack itself, but rather by the government’s response to the attack: closing borders, shutting down air traffic and evacuating buildings throughout the country. The aftermath to the attack brought needed attention to the vulnerability of modern Supply Chains. Supply Chain vulnerability reflects sensitivity of the Supply Chain to disruption [2]. This vulnerability can in many cases be described as “unwanted effects” in the Supply Chain caused either by internal or external forces that create disturbances larger than the Supply Chain is designed to handle. The objective of Supply Chain Security is to prevent antagonistic threats from affecting the Supply Chain performance. Antagonistic threats and other risks and uncertainties are demarcated by three key words: deliberate (caused), illegal (defined by law), and hostile (negative impact for transport network activities) [3]. This chapter presents first the major antagonistic threats to the Supply Chain and secondly how these threats should be prevented. This leads to the current development of different Supply Chain Security programs.
-
Possible impacts of Supply Chain Security on efficiency : A survey study about the possible impacts of AEO Security certifications on Supply Chain efficiency
2012Co-Authors: Luca Urciuoli, Daniel EkwallAbstract:Possible impacts of Supply Chain Security on efficiency : A survey study about the possible impacts of AEO Security certifications on Supply Chain efficiency
-
Supply Chain Security Programs : Comparing Authorithy and Business Certifications
2009Co-Authors: Luca Urciuoli, Daniel EkwallAbstract:Purpose of this paper A new topic that during the last years has come to the attention of researchers is Supply Chain Security. Stakeholders are progressively realizing the importance to join the a ...
-
Supply Chain Security programs comparing business and authority certifications
Proceedings of The 21st Annual Nofoma Conference 11-12 June 2009 Jönköping Sweden; (2009), 2009Co-Authors: Luca Urciuoli, Daniel EkwallAbstract:A new topic that during the last years has come to the attention of researchers is Supply Chain Security. Stakeholders are progressively realizing the importance to join the authority regulations issued by governments (e.g. AEO) to reduce transport delays at Customs or other business certifications (e.g. TAPA) to reduce theft or counterfeiting. However the differences and impacts of Security certifications are not always well understood. This paper has the main purpose to explore similarities and diversities of Security certifications and to identify their effects on Supply Chain efficiency and Security.
Guanyi Lu - One of the best experts on this subject based on the ideXlab platform.
-
deployment of Supply Chain Security practices antecedents and consequences
Decision Sciences, 2019Co-Authors: Guanyi Lu, Xenophon Koufteros, Srinivas Talluri, Tomas G M HultAbstract:Despite the importance of Supply Chain Security (SCS), there is significant variance regarding the level of deployment of SCS practices across firms and little is known about the efficacy of these practices. This study examines the role of external (coercive pressure) and internal (top management involvement) factors that potentially explain SCS practice deployment and its effect on SCS performance. It also examines the moderating role of organizational culture. In essence, this inquiry examines the role of external and internal forces in a context where organizational action is perhaps effectively mobilized only when both external and internal pressures are salient. Using data from 166 U.S. manufacturing firms, we found that the effects of coercive forces on SCS practice deployment are transmitted via top management involvement. In addition, the effect of top management involvement on SCS practice deployment is more salient for firms with high Security‐oriented organizational culture, although a diminishing return was detected. SCS practice deployment was found to be strongly related to SCS performance. We discuss the theoretical contributions and managerial implications based on our findings.
-
Organizing Practices to Combat Supply Chain Security Breaches
IEEE Engineering Management Review, 2019Co-Authors: Guanyi Lu, Xenophon KoufterosAbstract:Supply Chain Security (SCS) breaches are torturing Supply Chains and they have the potential to inflict acute pain on society at large. To cope with such breaches, international bodies, nations, societies, industries, and leading firms have instituted several countermeasures in the form of standards and respective practices. Identifying SCS practices suitable to a firm's specific needs from a laundry list of practices is a difficult task. Relying on the risk management literature and interactions with professionals, we categorize SCS management practices into four classes based on their intent-detection, prevention, response, and mitigation. We consider here their differences and their complementary effects. Our classification can be used to diagnose a firm's Supply Chain Security status. Managers can benchmark their company against their peers using this classification. Equipped with such knowledge, managers, and organizations can ascertain specific gaps and undertake a targeted approach to bridge those gaps. Our results suggest that Security-oriented practices have differential effects on SCS performance. We also found that firms who deploy practices in a more integrated approach realize better SCS performance. Thus, firms are advised to adopt the practices as a system to take advantage of the reinforcing characteristics of these practices on each other.
-
toward a taxonomy of food Supply Chain Security practices
Journal of Marketing Channels, 2017Co-Authors: Guanyi Lu, Xenophon KoufterosAbstract:Supply Chain Security (SCS) breaches in the food Supply Chains are distressing respective firms across the globe. They also have the potential of inflicting pain on the society at large. Despite the abundance of practices that have been advocated to cope with SCS breaches, the literature lacks a conceptual taxonomy to organize them. Classifying practices into respective taxa can advance theory building and stimulate the testing of substantive hypotheses. Toward this end, we develop a taxonomy which conceptually rests on the human immune system and its attempts to protect the human body from pathogens. We deploy a metaphorical transfer process and postulate that SCS practices can be classified into four classes based on their intent: prevention, detection, reaction, and restoration. We then discuss the implications of the taxonomy and assert that our taxonomy can be exploited to a variety of domains in the realm of risk management.
-
Supply Chain Security: A Classification of Practices and an Empirical Study of Differential Effects and Complementarity
IEEE Transactions on Engineering Management, 2017Co-Authors: Guanyi Lu, Xenophon Koufteros, Lorenzo LucianettiAbstract:Supply Chain Security (SCS) breaches (a form of Supply Chain risk) are distressing Supply Chains and they have the potential to engender acute pain on the society at large. To counteract such breaches, international bodies, nations, societies, industries, and firms have instituted several countermeasures in the form of standards and respective practices. Given that not all incidences/breaches can be averted, the risk management literature advocates that firms should adopt practices that can thwart incidences/breaches and practices that can provide a swift response once an incident/breach is detected in order to contain damages, ease the pain, and restore operations. Resting on the risk management literature and interactions with professionals, we classify SCS management practices into four categories based on their intent (i.e., detection, prevention, response, and mitigation) and operationalize each via multiple indicators. We then test the relative efficacy of these practices to explain SCS performance using responses from 462 firms operating in the United States and Italy.