Managing the Risks of Outsourcing IT Security in Supply Chain

Author(s):  
Theodosios Tsiakis ◽  
Panagiotis Tsiakis

Enterprises are expeditiously outsourcing the non-core business processes and functions. This is happening in order for new efficiencies to be found and costs to be reduced along with the increase of shareholder value. Enterprises in a supply chain use networks to share information assets. Information Systems and Information Technology are essential for their business operations. Organizations resort to outsourcing, in order to balance the infinite requirements with organisational assets. Supply chains that are relying upon sourced Information Systems (or/and IT) are vulnerable from Information Security (IS) specific types of risks to supply chains. These systems and their components are at increasing risk of supply chain. The process of securing all elements of IT systems (whether it is hardware, software, or services) throughout their life cycle is critical. The scope of the chapter is to identify the basic process of outsourcing Information Security functions/processes in Supply Chain and moreover to adduce the practice of it.

Author(s):  
Samuel Gemechu ◽  
Meaza Getnet ◽  
Alemu Tereda

This article aims to study the harmony of supply chain actors in Live Animal Export at Gurage Zone, Ethiopia. This problem is relevant and researches in this sense can help policies that aim to improve the functioning of supply chains. Harmony of supply chain is the collaboration level of supply chain participants which is measured in terms of common planning and action guidelines they have, how they share information and generally the overall relations they have one another. Being descriptive in design, the study has targeted main live animals supply chain actors who are 719 producers, 6 traders and 2 exporters in Gurage zone from whom 257 producers were randomly chosen as a sample and all the traders and exporter have been used directly from whom questionnaires were collected from. The findings have proved that there is relatively consistent flow of information throughout the supply chain actors in live animals export in Gurage zone. Additionally there have been seen that there is a culture of planning jointly among the chain actors followed by having common updating means in case of plan fails to meet the expectations even though there exists problems of sitting for evaluation of actions made by the chain elements which is the key for future improvement of the export business. Finally it has been found that the overall harmony of the chain actors is attractive with some reservations.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Sindhuja P.N.

Purpose Information security is an essential element in all business activities. The damage to businesses from information security breaches has become pervasive. The scope of information security has widened as information has become a critical supply chain asset, making it more important to protect the organization’s data. Today’s global supply chains rely upon the speedy and robust dissemination of information among supply chain partners. Hence, processing of accurate supply chain information is quintessential to ensure the robustness and performance of supply chains. An effective information security management (ISM) is deemed to ensure the robustness of supply chains. The purpose of the paper is to examine the impact of information security initiatives on supply chain robustness and performance. Design/methodology/approach Based on extant literature, a research model was developed and validated using a questionnaire survey instrument administered among information systems/information technology managers. Data collected were analyzed using exploratory and confirmatory factor analysis. Further, to test the hypotheses and to fit the theoretical model, Structural equation modeling techniques were used. Findings Results of this study indicated that information security initiatives are positively associated with supply chain robustness and performance. These initiatives are likely to enhance the robustness and performance of the supply chains. Originality/value With the advancements in internet technologies and capabilities as well as considering the dynamic environment of supply chains, this study is relevant in terms of the capability that an organization needs to acquire with regards to ISM. Benefiting from the resource dependency theory, information security initiatives could be considered as a critical resource having an influence on the internal and external environment of supply chains.


Author(s):  
Петр Юрьевич Филяк ◽  
Максим Константинович Постников ◽  
Семен Евгеньевич Федоров ◽  
Александр Григорьевич Остапенко ◽  
Андрей Петрович Преображенский

В условиях развития информационного общества (Knowledgeable society - KS) информационные системы стали неотъемлемой частью любой организации, даже самой малой, независимо от реализуемых ими бизнес-процессов. Такие информационные системы принято называть корпоративными информационными системами (КИС), или Corporate Information System (CIS). Особые требования при разработке КИС предъявляются к обеспечению их информационной безопасности, что может быть реализовано путем разработки КИС в защищенном исполнении. Технологии blockchain являются очень перспективными не только при применении их в традиционных сферах - производстве, сервисе, на транспорте, но и для решения проблем безопасности и информационной, в частности. Анализу данной проблемы и подходам к ее решению и посвящена данная статья. At present, in the context of the development of Knowledgeable society, information systems are at now an integral part of any organization, even the smallest, regardless of the business processes they implement. Such information systems are commonly referred to as Corporate Information Systems (CIS). Special requirements for the development of CIS are made to ensure their information security, which can be achieved by developing a protected version of the CIS. In this article is considered the analysis of this problem and approaches to its solution. Block Chain technologies are very promising not only when applying them in traditional spheres - manufacturing, service, transport, but also to solve security and information problems, in particular.


Author(s):  
Susan A. Sherer

Although many companies have implemented ERP systems to track and share information across cross functional business processes, they often supplement them with legacy, custom, or best of breed applications to support supply chain execution and management. This article offers a framework for understanding all types of enterprise applications that support the supply chain. In this study, the authors organize these applications, define acronyms, and describe the various types of systems that make up an information infrastructure for supply chain management.


Author(s):  
Tim S. McLaren ◽  
Milena M. Head ◽  
Yufei Yuan

Recent advances in supply chain management information systems (SCM IS) have enabled firms to more fully collaborate with their supply chain partners — driving out costs while increasing responsiveness to market demands. This chapter examines various types of SCM IS — from traditional EDI systems to more recent Web-services-based e-business applications. It argues that the approach best suited for an organization depends in part on the degree of integration between the partners, the complexity of the business processes, and the number of partners involved. A model is presented for analyzing the costs and benefits that can be expected from each type of SCM IS. The model enables researchers and practitioners to better understand the differences among SCM IS and thus can help reduce the risks of implementing these valuable yet complex information systems.


2011 ◽  
pp. 136-152
Author(s):  
Iskra Dukovska-Popovska ◽  
Malcolm Bertoni ◽  
Hans-Henrik Hvolby ◽  
Paul Turner ◽  
Kenn Steger-Jensen

Integrating environmental considerations into supply-chain management has become an increasingly important issue for industry, government and academic researchers. Supply chain managers are being required to respond to the challenges of new legislation, standards and regulations; changing customer demands; drivers for efficiency, cost effectiveness and return on investment; while simultaneously being ‘green’. The fundamental tension between business and environmental drivers is difficult, but critical to understanding how to effectively re-engineer and re-design existing supply chains in a manner that is sustainable both financially and environmentally. Information systems have a significant role to play in supporting corporate responses to environmental management and the development of holistic green logistic solutions. This chapter examines contemporary discussions on the current state of sustainable supply-chain management and green logistics. It presents a case study from the Fujitsu Corporation in Japan and explores models of information systems and RFID use in green logistics. Combining insights from the case and existing models the chapter explores an example of how a combined model can be used to explore the potential of a specific emerging technology (RFIDs) in ‘greening’ supply chains.


VINE ◽  
2014 ◽  
Vol 44 (3) ◽  
pp. 375-393 ◽  
Author(s):  
Mohsen Shafiei Nikabadi

Purpose – The main aim of this study is to provide a framework for technology-based factors for knowledge management in supply chain. Design/methodology/approach – This is an applied research and has been done as a survey in Iran Khodro and Saipa Company as the largest companies in automotive industry of Iran. In this study, 206 experts participated. Reliability methods were Cronbach’s alfa, and validity tests were content and construction analyses. In response to one main question and three sub-questions in this research, first and second confirmative factor analysis were used. Findings – In this research, after a literature review, a comprehensive framework with three factors is presented. These factors are information technology (IT) tools, information systems integration and information security management. The findings indicate that the first framework in supply chain of the automotive industry has a good fitness and perfect validity. Second, in this framework, factors have also been considered based on importance. The technique of factor analysis was given the highest importance to the information systems integration. Then, IT tools and, ultimately, information security management are considered. In addition, findings indicate that information systems integration has the highest correlation with IT tools. Originality/value – The main innovation aspect of the research is to present a comprehensive framework for technology-based factors and indices for knowledge management in supply chain. In this paper, in addition to presenting a grouping for IT tools for knowledge management processes in supply chain, key indices for information systems integration and information security management are also referred.


Author(s):  
N. Baisholan ◽  
K.E. Kubayev ◽  
T.S. Baisholanov

Efficiency of business processes in modern organizations depends on the capabilities of applied information technologies. The article describes and analyzes the role and features of audit tools and other methodological tools and models in ensuring the quality and security of information systems. The standard’s principles are reviewed, as well as the importance of meeting business needs. In order to protect virtual values in a company’s system environment, the importance of using information security models is revealed. Practical proposals in risk management and information security in information technology are analyzed through the COBIT standard. Measures for protecting the information system of an organization from accidental, deliberate or fake threats are considered. The possibility of using one of the real information security models by the information recipient or provider in accordance with the requirements of external processes is reported. Furthermore, in connection with increase in the number of attack methods and techniques and development of their new tools and vectors, the need to improve and ways to ensure information security are being considered. The essential tasks of security audit are considered, and the stages of their implementation are described. With regard to security of information systems, an analytical model is proposed for determining vulnerability’s numerical value.


Author(s):  
Sungmin Ryu ◽  
Ken Hung

<p class="MsoBodyText" style="text-justify: inter-ideograph; text-align: justify; margin: 0in 0.5in 0pt;"><span style="font-family: Times New Roman;"><span style="font-size: 10pt;">Information exchange between the buyer and supplier is an important aspect of supply chain management. B2B e-commerce helps firms to share information, maintain relationships, and conduct transactions more efficiently. The choice of B2B e-commerce transactions will influence, and as well as affect, the relationships between exchange parties. </span><span style="font-size: 10pt; mso-fareast-language: KO; mso-bidi-font-weight: bold;">Thus, the choice of e-commerce transaction mechanisms has a relational context. An </span><span style="font-size: 10pt; mso-fareast-language: KO;">appropriate choice of a transaction mechanism can affect a firm&rsquo;s strategy, procurement decisions, and performance. It had been argued that </span><span style="font-size: 10pt;">e-commerce facilitates both discrete and relational exchanges, and it has a dual impact on business relationships. In this paper, we examine a collection of diverse studies on EDI and e-marketplace from marketing and information systems literatures. We assimilate these findings for managers considering choices on e-commerce transaction mechanisms. We hope that this will provide managers a more consistent understanding of buyer-supplier relationships in the B2B e-commerce context. </span></span></p>


2020 ◽  
Vol 32 (5) ◽  
pp. 639-653
Author(s):  
Aleksandar Grubor ◽  
Jelena Končar ◽  
Radenko Marić ◽  
Goran Vukmirović ◽  
Nikola Milićević

The research aims to identify the limitations and expectations of producers, transport companies, distributors and retailers in introducing intelligent packaging into supply chains of food products on the market of the Western Balkans. The limitations and benefits from the use of intelligent packaging have been identified in transportation, storage, operations of physical handling and display of food products at the place of their final purchase. The results have shown that there are significant differences in terms of limitations affecting the implementation of intelligent packaging into business operations of supply chains, bearing in mind the business type, number of employees, available capital and integrated standards into business operations. In contrast to this, the results point that there are no significant differences in terms of benefits that the analysed entities expect from introducing intelligent packaging into their systems. A set of measures and incentives have been defined for the competent institutions and food supply chain management to take, in order to minimize the restrictions and advance the implementation of intelligent packaging. The proposals and suggestions for further research are stated in the paper.


Sign in / Sign up

Export Citation Format

Share Document