scholarly journals How to Reduce Supply Chain Risk: Lessons from Efforts to Block Huawei

2020 ◽  
Author(s):  
Muhammad Firdaus

Supply chain security is a vital component of American national security. United State officials have continued to warn that 5G infrastructure equipment built by Huawei could be subverted by China to conduct espionage. There has been an intense investigation on Huawei, ranging from their software development processes to allegations of back doors. While it may be debated if Huawei is a pawn in a trade war or national security risks, it reinforces the importance of knowing one’s ecosystem. This article summarizes a panel discussion at the RSA2020 cybersecurity conference in San Francisco, titled "How to Reduce Supply Chain Risk: Lessons from Efforts to Block Huawei" was moderated by Craig Spiezle, founder of Agelight Advisory and Research Group, with panelists Katie Arrington, cyber information security officer of acquisitions for the U.S. Department of Defense; Donald Andy Purdy, chief security officer of Huawei Technologies USA; Bruce Schneier, security researcher and lecturer at the Harvard Kennedy School; and Kathryn Waldron, a fellow at R Street Institute. This session uses Huawei as a case study for best practices to assess risk and provide transparency to all stakeholders.

2007 ◽  
pp. 286-312
Author(s):  
Stephen C. Shih ◽  
Michael Camarata ◽  
H. Joseph Wen

Web technology has enabled many organizations to form an e-enterprise for effective communicating, collaborating, and information sharing. To gain competitive advantages, it is necessary for e-enterprises to integrate the entire lines of business operations and critical business data with external supply chain participants over the Web, which may introduce significant security risks to the organizations’ critical assets and infrastructures. This chapter reports a case study of e-service security design and implementation at a leading U.S. company. First, the chapter reviews security concerns and challenges in front-end e-business and back-end supply chain operations. This is followed by the analysis of the company’s e-service and its security problems. The case then presents an integrated e-enterprise security methodology to guide the company for meeting its security needs. The results of this case study provides security professionals with practical steps and sustainable solutions for tackling the unique security challenges arising in an open, unbounded e-enterprise supply chain environment.


Author(s):  
S M Parenreng ◽  
M Rusman ◽  
Nilda ◽  
A Darmawan ◽  
I Bakri ◽  
...  

2017 ◽  
Vol 34 (7) ◽  
pp. 940-954 ◽  
Author(s):  
Abhijeet Ghadge ◽  
Xie Fang ◽  
Samir Dani ◽  
Jiju Antony

Purpose The purpose of this paper is to proactively analyse and mitigate the root causes of the product and security risks. The case study approach examines the effectiveness of the fuzzy logic approach for assessing the product and process-related failure modes within global supply chain context. Design/methodology/approach The case study of a Printed Circuit Board Company in China is used as a platform for conducting the research. Using data triangulation, the data are collected and analyzed through interviews, questionnaires, expert opinions and quantitative modelling for some interesting insights. Findings Fuzzy logic approach for failure mode and effect analysis (FMEA) provides a structured approach for understanding complex behaviour of failure modes and their associated risks for products and processes. Today’s managers should conduct robust risk assessment during the design stage to avoid product safety and security risks such as recalls. Research limitations/implications The research is based on the single case study and multiple cases from different industry sectors may provide some additional insights. Originality/value The study attempts to mitigate the root causes of product and processes using fuzzy approach to FMEA in supply chain network.


2021 ◽  
pp. 697-704
Author(s):  
Jihene Jlassi ◽  
Nesrin Halouani ◽  
Abderrahman El Mhamedi

Sign in / Sign up

Export Citation Format

Share Document