Organizing Practices to Combat Supply Chain Security Breaches

被引:2
|
作者
Lu G. [1 ]
Koufteros X. [2 ]
机构
[1] Florida State University, Tallahassee, 32306, FL
[2] Texas AandM University, College Station, 77840, TX
来源
IEEE Engineering Management Review | 2019年 / 47卷 / 03期
关键词
classification; complementarity; practices; Supply chain security;
D O I
10.1109/EMR.2019.2931540
中图分类号
学科分类号
摘要
Supply chain security (SCS) breaches are torturing supply chains and they have the potential to inflict acute pain on society at large. To cope with such breaches, international bodies, nations, societies, industries, and leading firms have instituted several countermeasures in the form of standards and respective practices. Identifying SCS practices suitable to a firm's specific needs from a laundry list of practices is a difficult task. Relying on the risk management literature and interactions with professionals, we categorize SCS management practices into four classes based on their intent-detection, prevention, response, and mitigation. We consider here their differences and their complementary effects. Our classification can be used to diagnose a firm's supply chain security status. Managers can benchmark their company against their peers using this classification. Equipped with such knowledge, managers, and organizations can ascertain specific gaps and undertake a targeted approach to bridge those gaps. Our results suggest that security-oriented practices have differential effects on SCS performance. We also found that firms who deploy practices in a more integrated approach realize better SCS performance. Thus, firms are advised to adopt the practices as a system to take advantage of the reinforcing characteristics of these practices on each other. © 1973-2011 IEEE.
引用
收藏
页码:72 / 78
页数:6
相关论文
共 50 条
  • [21] SUSTAINABLE SUPPLY CHAIN PRACTICES
    de Jesus Pacheco, Diego Augusto
    Rocha, Elenise
    Valle Antunes Junior, Jose Antonio
    Jung, Carlos Fernando
    da Luz, Daniel Fonseca
    Pergher, Isaac
    INTERCIENCIA, 2016, 41 (07) : 506 - 511
  • [22] The impact of Big Data analytics and data security practices on service supply chain performance
    Fernando, Yudi
    Chidambaram, Ramanathan R. M.
    Wahyuni-TD, Ika Sari
    BENCHMARKING-AN INTERNATIONAL JOURNAL, 2018, 25 (09) : 4009 - 4034
  • [23] Interplay between cyber supply chain risk management practices and cyber security performance
    Gani, Anisha Banu Dawood
    Fernando, Yudi
    Lan, Shulin
    Lim, Ming K.
    Tseng, Ming-Lang
    INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2023, 123 (03) : 843 - 861
  • [24] Supply Chain Security: International Practices and Innovations in Moving Goods Safely and Efficiently—A Review
    Jennifer Crawford Leonard
    Journal of Transportation Security, 2010, 3 (3) : 147 - 147
  • [25] Supply Chain Practices for a Sustainable Value Chain
    Centobelli P.
    Cerchione R.
    Strazzullo S.
    Shehri K.A.
    Farag T.
    El-Garaihy W.H.
    IEEE Engineering Management Review, 2023, 51 (03): : 130 - 147
  • [26] BREACHES OF COMPUTER SECURITY
    LLAURADO, JG
    INTERNATIONAL JOURNAL OF BIO-MEDICAL COMPUTING, 1983, 14 (02): : 87 - 93
  • [27] Investigating security breaches
    Casey, Eoghan
    DIGITAL INVESTIGATION, 2005, 2 (03) : 169 - 170
  • [28] The Study of Supply Chain Management Strategy and Practices on Supply Chain Performance
    Sukati, Inda
    Hamid, Abu Bakar
    Baharun, Rohaizat
    Yusoff, Rosman Md
    ASIA PACIFIC BUSINESS INNOVATION AND TECHNOLOGY MANAGEMENT SOCIETY, 2012, 40 : 225 - 233
  • [29] Supply chain practices and performance: the indirect effects of supply chain integration
    Sundram, Veera Pandiyan Kaliani
    Chandran, V. G. R.
    Bhatti, Muhammad Awais
    BENCHMARKING-AN INTERNATIONAL JOURNAL, 2016, 23 (06) : 1445 - 1471
  • [30] THE RELATION BETWEEN SUPPLY CHAIN PERFORMANCE AND SUPPLY CHAIN GOVERNANCE PRACTICES
    Crisan, Emil
    Parpucea, Ilie
    Ilies, Liviu
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON BUSINESS EXCELLENCE, VOL 1, 2011, : 142 - 145