Organizing Practices to Combat Supply Chain Security Breaches

被引:2
|
作者
Lu G. [1 ]
Koufteros X. [2 ]
机构
[1] Florida State University, Tallahassee, 32306, FL
[2] Texas AandM University, College Station, 77840, TX
来源
IEEE Engineering Management Review | 2019年 / 47卷 / 03期
关键词
classification; complementarity; practices; Supply chain security;
D O I
10.1109/EMR.2019.2931540
中图分类号
学科分类号
摘要
Supply chain security (SCS) breaches are torturing supply chains and they have the potential to inflict acute pain on society at large. To cope with such breaches, international bodies, nations, societies, industries, and leading firms have instituted several countermeasures in the form of standards and respective practices. Identifying SCS practices suitable to a firm's specific needs from a laundry list of practices is a difficult task. Relying on the risk management literature and interactions with professionals, we categorize SCS management practices into four classes based on their intent-detection, prevention, response, and mitigation. We consider here their differences and their complementary effects. Our classification can be used to diagnose a firm's supply chain security status. Managers can benchmark their company against their peers using this classification. Equipped with such knowledge, managers, and organizations can ascertain specific gaps and undertake a targeted approach to bridge those gaps. Our results suggest that security-oriented practices have differential effects on SCS performance. We also found that firms who deploy practices in a more integrated approach realize better SCS performance. Thus, firms are advised to adopt the practices as a system to take advantage of the reinforcing characteristics of these practices on each other. © 1973-2011 IEEE.
引用
收藏
页码:72 / 78
页数:6
相关论文
共 50 条
  • [1] Antecedents and outcomes of supply chain security practices: the role of organizational security culture and supply chain disruption occurrence
    Asamoah, David
    Nuertey, Dorcas
    Agyei-Owusu, Benjamin
    Acquah, Ishmael Nanaba
    INTERNATIONAL JOURNAL OF QUALITY & RELIABILITY MANAGEMENT, 2022, 39 (04) : 1059 - 1082
  • [2] Deployment of Supply Chain Security Practices: Antecedents and Consequences
    Lu, Guanyi
    Koufteros, Xenophon
    Talluri, Srinivas
    Hult, G. Tomas M.
    DECISION SCIENCES, 2019, 50 (03) : 459 - 497
  • [3] Avoid security breaches with the right tools and practices
    Mannion, Patrick, 1600, Hearst Business Communications (60):
  • [4] Examining the influence of Organizational Security Culture on Supply Chain Disruption Occurrence: The Mediating Role of Supply Chain Security Practices
    Adu, James Peprah
    Dorasamy, Nirmala
    JOURNAL OF DISTRIBUTION SCIENCE, 2025, 23 (01): : 1 - 20
  • [5] Cybersecurity Breaches in the Supply Chain and Earnings Management
    He, Zhijian
    HuangFu, JiangBo
    Walton, Stephanie
    JOURNAL OF INFORMATION SYSTEMS, 2022, 36 (03) : 83 - 113
  • [6] Internet banking in Nigeria: Cyber security breaches, practices and capability
    Wang, Victoria
    Nnaji, Harrison
    Jung, Jeyong
    INTERNATIONAL JOURNAL OF LAW CRIME AND JUSTICE, 2020, 62
  • [7] Describing and organizing green practices in the context of Green Supply Chain Management: Case studies
    Sellitto, Miguel Afonso
    Hermann, Felipe F.
    Blers, Attila E., Jr.
    Barbosa-Povoa, Ana P.
    RESOURCES CONSERVATION AND RECYCLING, 2019, 145 : 1 - 10
  • [8] Supply chain security
    Tejero, Hector
    Electronics World, 2023, 128 (2030):
  • [9] Security Supply Chain
    Dias, Eduardo Mario
    Fontana, Caio Fernando
    Mori, Fabio Hideo
    Facioli, Luiz Paulo
    Zancul, Paulo Jose
    NEW ASPECTS OF SYSTEMS, PTS I AND II, 2008, : 771 - +
  • [10] Investigation of the Effect of e-Platform Information Security Breaches: A Small and Medium Enterprise Supply Chain Perspective
    Durowoju, Olatunde
    Chan, Hing Kai
    Wang, Xiaojun
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2022, 69 (06) : 3694 - 3709