scholarly journals Developing Smart Supply Chain Management Systems Using Google Trend’s Search Data: A Case Study

Author(s):  
Ramin Sabbagh ◽  
Dragan Djurdjanovic
2013 ◽  
pp. 1166-1188
Author(s):  
Qiang Yan ◽  
Yingjiu Li ◽  
Robert H. Deng

As RFID-enabled technology is becoming pervasive in enterprise systems and human life, it triggers significant concerns over the malware that can infect, damage, and even destroy RFID-enabled network systems. RFID malware can spread malicious codes or data quickly to a large number of RFID systems via RFID read and write, which are pervasive operations on RFID tags that are transported from one RFID system to another. To address this concern, this chapter uses RFID-enabled supply chain management systems in the EPCglobal network as a case study to demonstrate the important issues in RFID malware protection. This case study shows that although there are fundamental difficulties in preventing RFID malware from entering the systems, the behaviors of RFID malware resemble traditional malware after it enters the systems. Based on this characteristic, the security threats of RFID malware can be effectively controlled.


Author(s):  
Qiang Yan ◽  
Yingjiu Li ◽  
Robert H. Deng

As RFID-enabled technology is becoming pervasive in enterprise systems and human life, it triggers significant concerns over the malware that can infect, damage, and even destroy RFID-enabled network systems. RFID malware can spread malicious codes or data quickly to a large number of RFID systems via RFID read and write, which are pervasive operations on RFID tags that are transported from one RFID system to another. To address this concern, this chapter uses RFID-enabled supply chain management systems in the EPCglobal network as a case study to demonstrate the important issues in RFID malware protection. This case study shows that although there are fundamental difficulties in preventing RFID malware from entering the systems, the behaviors of RFID malware resemble traditional malware after it enters the systems. Based on this characteristic, the security threats of RFID malware can be effectively controlled.


2019 ◽  
Vol 5 (1) ◽  
pp. 38-49 ◽  
Author(s):  
B. K. Handoyo ◽  
M. R. Mashudi ◽  
H. P. Ipung

Current supply chain methods are having difficulties in resolving problems arising from the lack of trust in supply chains. The root reason lies in two challenges brought to the traditional mechanism: self-interests of supply chain members and information asymmetry in production processes. Blockchain is a promising technology to address these problems. The key objective of this paper is to present qualitative analysis for blockchain in supply chain as the decision-making framework to implement this new technology. The analysis method used Val IT business case framework, validated by the expert judgements. The further study needs to be elaborated by either the existing organization that use blockchain or assessment by the organization that will use blockchain to improve their supply chain management.


2021 ◽  
Vol 11 (12) ◽  
pp. 5585
Author(s):  
Sana Al-Farsi ◽  
Muhammad Mazhar Rathore ◽  
Spiros Bakiras

Blockchain is a revolutionary technology that is being used in many applications, including supply chain management. Although, the primary motive of using a blockchain for supply chain management is to reduce the overall production cost while providing the comprehensive security to the system. However, current blockchain-based supply-chain management (BC-SCM) systems still hold the possibility of cyber attacks. Therefore, the goal of this study is to investigate practical threats and vulnerabilities in the design of BC-SCM systems. As a starting point, we first establish key requirements for the reliability and security of supply chain management systems, i.e., transparency, privacy and traceability, and then discern a threat model that includes two distinctive but practical threats including computational (i.e., the ones that threaten the functionality of the application) and communication (i.e., the ones that threaten information exchange among interconnected services of the application). For investigation, we follow a unique approach based on the hypothesis that reliability is pre-requisite of security and identify the threats considering (i) design of smart contracts and associated supply chain management applications, (ii) underlying blockchain execution environment and (iii) trust between all interconnected supply management services. Moreover, we consider both academic and industry solutions to identify the threats. We identify several challenges that hinder to establish reliability and security of the BC-SCM systems. Importantly, we also highlight research gaps that can help to establish desired security of the BC-SCM. To the best of our knowledge, this paper is the first effort that identifies practical threats to blockchain-based supply chain management systems and provides their counter measures. Finally, this work establishes foundation for future investigation towards practical security of BC-SCM system.


Author(s):  
Dick Verbeek

This case study has been developed to facilitate discussion about current supply chain management issues and potential solutions. The scenario presented in this case is very representative of the pressures experienced by supply chain managers. Namely, the need to reduce costs while maintaining quality and customer service. This case presents some unusual challenges and constraints that are unique to the cruise line industry. These constraints can provide an opportunity to explore new supply chain paradigms.


Sign in / Sign up

Export Citation Format

Share Document