Organizing Practices to Combat Supply Chain Security Breaches

被引:2
|
作者
Lu G. [1 ]
Koufteros X. [2 ]
机构
[1] Florida State University, Tallahassee, 32306, FL
[2] Texas AandM University, College Station, 77840, TX
来源
IEEE Engineering Management Review | 2019年 / 47卷 / 03期
关键词
classification; complementarity; practices; Supply chain security;
D O I
10.1109/EMR.2019.2931540
中图分类号
学科分类号
摘要
Supply chain security (SCS) breaches are torturing supply chains and they have the potential to inflict acute pain on society at large. To cope with such breaches, international bodies, nations, societies, industries, and leading firms have instituted several countermeasures in the form of standards and respective practices. Identifying SCS practices suitable to a firm's specific needs from a laundry list of practices is a difficult task. Relying on the risk management literature and interactions with professionals, we categorize SCS management practices into four classes based on their intent-detection, prevention, response, and mitigation. We consider here their differences and their complementary effects. Our classification can be used to diagnose a firm's supply chain security status. Managers can benchmark their company against their peers using this classification. Equipped with such knowledge, managers, and organizations can ascertain specific gaps and undertake a targeted approach to bridge those gaps. Our results suggest that security-oriented practices have differential effects on SCS performance. We also found that firms who deploy practices in a more integrated approach realize better SCS performance. Thus, firms are advised to adopt the practices as a system to take advantage of the reinforcing characteristics of these practices on each other. © 1973-2011 IEEE.
引用
收藏
页码:72 / 78
页数:6
相关论文
共 50 条
  • [41] Supply chain security practices in the food industry Do firms operating globally and domestically differ?
    Whipple, Judith M.
    Voss, M. Douglas
    Closs, David J.
    INTERNATIONAL JOURNAL OF PHYSICAL DISTRIBUTION & LOGISTICS MANAGEMENT, 2009, 39 (07) : 574 - 594
  • [42] Special issue on supply chain security
    Blackhurst, Jennifer
    Ekwall, Daniel
    Martens, Bobby J.
    INTERNATIONAL JOURNAL OF PHYSICAL DISTRIBUTION & LOGISTICS MANAGEMENT, 2015, 45 (07) : 650 - 651
  • [43] Security modeling on the supply chain networks
    Shing, Marn-Ling
    Shing, Chen-Chi
    Chen, Kuo Lane
    Lee, Huei
    EISTA '06: 4TH INT CONF ON EDUCATION AND INFORMATION SYSTEMS: TECHNOLOGIES AND APPLICAT/SOIC'06: 2ND INT CONF ON SOCIAL AND ORGANIZATIONAL INFORMATICS AND CYBERNETICS, VOL II, 2006, : 116 - +
  • [44] Struggling With Supply-Chain Security
    Viega, John
    Michael, James Bret
    COMPUTER, 2021, 54 (07) : 98 - 104
  • [45] Improving Drug Supply Chain Security
    Kannarkat, Joseph T.
    Denham, Michael W.
    Sarpatwari, Ameet
    JAMA HEALTH FORUM, 2024, 5 (01):
  • [46] CROSS BORDER SUPPLY CHAIN SECURITY
    Saric, Marija
    PROCEEDINGS OF THE 3RD LOGISTICS INTERNATIONAL CONFERENCE, 2017, : 276 - 281
  • [47] Cyber security in the ATM supply chain
    Mohnl, Gerald
    2016 INTEGRATED COMMUNICATIONS NAVIGATION AND SURVEILLANCE (ICNS), 2016,
  • [48] Scalable Policies for Supply Chain Security
    Hennen, Thomas, III
    PROCEEDINGS OF THE 2023 WORKSHOP ON SOFTWARE SUPPLY CHAIN OFFENSIVE RESEARCH AND ECOSYSTEM DEFENSES, SCORED 2023, 2023, : 39 - 39
  • [49] Maritime and Supply Chain Security in Europe
    Cant, Dominique
    HUMAN SYSTEMS INTEGRATION TO ENHANCE MARITIME DOMAIN AWARENESS FOR PORT/HARBOUR SECURITY, 2010, 28 : 1 - 14
  • [50] Aligning the infrastructures to supply chain practices
    Udomleartprasert, P
    Jungthirapanich, C
    IEMC-2003: MANAGING TECHNOLOGICALLY DRIVEN ORGANIZATIONS: THE HUMAN SIDE OF INNOVATION AND CHANGE, PROCEEDINGS, 2003, : 335 - 339