Organizing Practices to Combat Supply Chain Security Breaches

被引:2
|
作者
Lu G. [1 ]
Koufteros X. [2 ]
机构
[1] Florida State University, Tallahassee, 32306, FL
[2] Texas AandM University, College Station, 77840, TX
来源
IEEE Engineering Management Review | 2019年 / 47卷 / 03期
关键词
classification; complementarity; practices; Supply chain security;
D O I
10.1109/EMR.2019.2931540
中图分类号
学科分类号
摘要
Supply chain security (SCS) breaches are torturing supply chains and they have the potential to inflict acute pain on society at large. To cope with such breaches, international bodies, nations, societies, industries, and leading firms have instituted several countermeasures in the form of standards and respective practices. Identifying SCS practices suitable to a firm's specific needs from a laundry list of practices is a difficult task. Relying on the risk management literature and interactions with professionals, we categorize SCS management practices into four classes based on their intent-detection, prevention, response, and mitigation. We consider here their differences and their complementary effects. Our classification can be used to diagnose a firm's supply chain security status. Managers can benchmark their company against their peers using this classification. Equipped with such knowledge, managers, and organizations can ascertain specific gaps and undertake a targeted approach to bridge those gaps. Our results suggest that security-oriented practices have differential effects on SCS performance. We also found that firms who deploy practices in a more integrated approach realize better SCS performance. Thus, firms are advised to adopt the practices as a system to take advantage of the reinforcing characteristics of these practices on each other. © 1973-2011 IEEE.
引用
收藏
页码:72 / 78
页数:6
相关论文
共 50 条