scholarly journals An Analysis of Various Types of Supply Chain Management Systems: Case of Global Public Sector versus Private Sector Procurement

Author(s):  
Sakhile Manyathi ◽  
Author(s):  
Thomas F. Humphrey

The University of Rhode Island requested an assessment of the potential demand for developing new academic programs in the areas of transportation and logistics. Although the research focused on Rhode Island public- and private-sector organizations, it was concluded that the results have broader applications for the academic community. The research was accomplished by interviewing a total of 24 key executives in four large private companies and five large public-sector organizations. The questions focused on “skills required to do your job.” The interviews resulted in the following conclusions: ( a) a distinct difference must be made between education needs, training needs, and outreach needs; ( b) concerning public agency needs, responses tracked closely to the several national studies that have taken place over the past several years; ( c) private-sector organizations view logistics and supply chain management as critical to their bottom line; ( d) there appears to be a common interest among interviewees for universities to establish more outreach programs; ( e) private-sector companies all expressed possible interest in targeted logistics and supply chain management programs (certificate programs or individual courses could be of interest, either as traditional classroom or Internet-based); ( f) definite interest existed among public agencies to establish courses and distance-learning–based certificate programs in “transportation policy and management” (the author's label); and ( g) there were a surprising number of common needs.


2021 ◽  
Vol 11 (12) ◽  
pp. 5585
Author(s):  
Sana Al-Farsi ◽  
Muhammad Mazhar Rathore ◽  
Spiros Bakiras

Blockchain is a revolutionary technology that is being used in many applications, including supply chain management. Although, the primary motive of using a blockchain for supply chain management is to reduce the overall production cost while providing the comprehensive security to the system. However, current blockchain-based supply-chain management (BC-SCM) systems still hold the possibility of cyber attacks. Therefore, the goal of this study is to investigate practical threats and vulnerabilities in the design of BC-SCM systems. As a starting point, we first establish key requirements for the reliability and security of supply chain management systems, i.e., transparency, privacy and traceability, and then discern a threat model that includes two distinctive but practical threats including computational (i.e., the ones that threaten the functionality of the application) and communication (i.e., the ones that threaten information exchange among interconnected services of the application). For investigation, we follow a unique approach based on the hypothesis that reliability is pre-requisite of security and identify the threats considering (i) design of smart contracts and associated supply chain management applications, (ii) underlying blockchain execution environment and (iii) trust between all interconnected supply management services. Moreover, we consider both academic and industry solutions to identify the threats. We identify several challenges that hinder to establish reliability and security of the BC-SCM systems. Importantly, we also highlight research gaps that can help to establish desired security of the BC-SCM. To the best of our knowledge, this paper is the first effort that identifies practical threats to blockchain-based supply chain management systems and provides their counter measures. Finally, this work establishes foundation for future investigation towards practical security of BC-SCM system.


2012 ◽  
Vol 6 (44) ◽  
pp. 11003-11014 ◽  
Author(s):  
M Ambe Intaher ◽  
A Badenhorst Weiss Johanna

2013 ◽  
pp. 1166-1188
Author(s):  
Qiang Yan ◽  
Yingjiu Li ◽  
Robert H. Deng

As RFID-enabled technology is becoming pervasive in enterprise systems and human life, it triggers significant concerns over the malware that can infect, damage, and even destroy RFID-enabled network systems. RFID malware can spread malicious codes or data quickly to a large number of RFID systems via RFID read and write, which are pervasive operations on RFID tags that are transported from one RFID system to another. To address this concern, this chapter uses RFID-enabled supply chain management systems in the EPCglobal network as a case study to demonstrate the important issues in RFID malware protection. This case study shows that although there are fundamental difficulties in preventing RFID malware from entering the systems, the behaviors of RFID malware resemble traditional malware after it enters the systems. Based on this characteristic, the security threats of RFID malware can be effectively controlled.


2010 ◽  
pp. 303-324
Author(s):  
Bhuvan Unhelkar ◽  
Ming-Chien Wu ◽  
Abbass Ghanbary

This chapter investigates opportunities to integrate mobile technologies within an organization’s enterprise architecture (EA), with an emphasis on supply chain management (SCM) systems. These SCM systems exist within the overall EA of the business. SCM systems are further influenced by the increasing modern-day need for information and communications technologies (ICTs) within a business, to bring together all of its disparate applications. The resultant enterprise application integration (EAI) also stands to benefit immensely from the incorporation of mobile technologies within it. Traditionally, supply chain management systems have involved management of the flows of material, information, and finances in a complex web of networks that include suppliers, manufacturers, distributors, retailers, and customers. Thus, these traditional supply chain management systems have a great need for integration under the umbrella of EAI. Mobile technologies can provide time and location independence to these EAIs in terms of information in the supply chain systems, creating the possibility of multiple business processes that traverse diverse geographical regions. This chapter, based on the research conducted by the authors at the University of Western Sydney, discusses the opportunities that arise in supply chain management systems due to the time and location independence offered by mobility, and the resultant advantages and limitations of such integration to the business.


2011 ◽  
pp. 1012-1033
Author(s):  
Bhuvan Unhelkar ◽  
Ming-Chien Wu ◽  
Abbass Ghanbary

This chapter investigates opportunities to integrate mobile technologies within an organization’s enterprise architecture (EA), with an emphasis on supply chain management (SCM) systems. These SCM systems exist within the overall EA of the business. SCM systems are further influenced by the increasing modern-day need for information and communications technologies (ICTs) within a business, to bring together all of its disparate applications. The resultant enterprise application integration (EAI) also stands to benefit immensely from the incorporation of mobile technologies within it. Traditionally, supply chain management systems have involved management of the flows of material, information, and finances in a complex web of networks that include suppliers, manufacturers, distributors, retailers, and customers. Thus, these traditional supply chain management systems have a great need for integration under the umbrella of EAI. Mobile technologies can provide time and location independence to these EAIs in terms of information in the supply chain systems, creating the possibility of multiple business processes that traverse diverse geographical regions. This chapter, based on the research conducted by the authors at the University of Western Sydney, discusses the opportunities that arise in supply chain management systems due to the time and location independence offered by mobility, and the resultant advantages and limitations of such integration to the business.


Sign in / Sign up

Export Citation Format

Share Document