Integrated E-Enterprise Supply Chain Security Design and Implementation

2007 ◽  
pp. 286-312
Author(s):  
Stephen C. Shih ◽  
Michael Camarata ◽  
H. Joseph Wen

Web technology has enabled many organizations to form an e-enterprise for effective communicating, collaborating, and information sharing. To gain competitive advantages, it is necessary for e-enterprises to integrate the entire lines of business operations and critical business data with external supply chain participants over the Web, which may introduce significant security risks to the organizations’ critical assets and infrastructures. This chapter reports a case study of e-service security design and implementation at a leading U.S. company. First, the chapter reviews security concerns and challenges in front-end e-business and back-end supply chain operations. This is followed by the analysis of the company’s e-service and its security problems. The case then presents an integrated e-enterprise security methodology to guide the company for meeting its security needs. The results of this case study provides security professionals with practical steps and sustainable solutions for tackling the unique security challenges arising in an open, unbounded e-enterprise supply chain environment.

2017 ◽  
Vol 34 (7) ◽  
pp. 940-954 ◽  
Author(s):  
Abhijeet Ghadge ◽  
Xie Fang ◽  
Samir Dani ◽  
Jiju Antony

Purpose The purpose of this paper is to proactively analyse and mitigate the root causes of the product and security risks. The case study approach examines the effectiveness of the fuzzy logic approach for assessing the product and process-related failure modes within global supply chain context. Design/methodology/approach The case study of a Printed Circuit Board Company in China is used as a platform for conducting the research. Using data triangulation, the data are collected and analyzed through interviews, questionnaires, expert opinions and quantitative modelling for some interesting insights. Findings Fuzzy logic approach for failure mode and effect analysis (FMEA) provides a structured approach for understanding complex behaviour of failure modes and their associated risks for products and processes. Today’s managers should conduct robust risk assessment during the design stage to avoid product safety and security risks such as recalls. Research limitations/implications The research is based on the single case study and multiple cases from different industry sectors may provide some additional insights. Originality/value The study attempts to mitigate the root causes of product and processes using fuzzy approach to FMEA in supply chain network.


Author(s):  
Ma. Leticia Almanza-Serran ◽  
Nélida Carmona-García ◽  
Alejandro Ramírez-Barajas

Strategic planning allows organizations to visualize and build their future and can be conceptualized as an important process to help determine the major purposes of an organization. Therefore, the case study presented is referred to a company in the telecommunications sector, considered as a small company because of the number of people working in it, but due to the wide market it would be considered within the medium-sized company, it started operations Without considering strategic planning, therefore the growth phase in which it is located, is representing a serious problem, since it has not been able to determine the areas of opportunity it has to achieve the goal of staying in the market and continuing to be part of the supply chain for regional companies. Therefore, one of the fundamental parts of strategic planning is precisely the situational analysis, also known as SWOT analysis, which allows the collection and use of data, which makes it possible to know the operating profile of an organization at a given time, since it favors the development and execution of formal planning, from there an objective diagnosis is established for the design and implementation of strategies that help improve the competitiveness of said company.


2020 ◽  
Author(s):  
Muhammad Firdaus

Supply chain security is a vital component of American national security. United State officials have continued to warn that 5G infrastructure equipment built by Huawei could be subverted by China to conduct espionage. There has been an intense investigation on Huawei, ranging from their software development processes to allegations of back doors. While it may be debated if Huawei is a pawn in a trade war or national security risks, it reinforces the importance of knowing one’s ecosystem. This article summarizes a panel discussion at the RSA2020 cybersecurity conference in San Francisco, titled "How to Reduce Supply Chain Risk: Lessons from Efforts to Block Huawei" was moderated by Craig Spiezle, founder of Agelight Advisory and Research Group, with panelists Katie Arrington, cyber information security officer of acquisitions for the U.S. Department of Defense; Donald Andy Purdy, chief security officer of Huawei Technologies USA; Bruce Schneier, security researcher and lecturer at the Harvard Kennedy School; and Kathryn Waldron, a fellow at R Street Institute. This session uses Huawei as a case study for best practices to assess risk and provide transparency to all stakeholders.


Author(s):  
John C. Pendergrass ◽  
Karen Heart ◽  
C. Ranganathan ◽  
V. N. Venkatakrishnan

Information security within healthcare is paramount and telemedicine applications present unique security challenges. Technology is giving rise to new and advanced telemedicine applications and understanding the security threats to these applications is needed to ensure, among other things, the privacy of patient information. This paper proposes a threat table approach to assess security threats pertaining to telemedicine applications. The concept and its usefulness are illustrated using a case study. This case study focuses on the capture and representation of salient security threats in telemedicine. To analyze the security threats to an application, it presents a threat modeling framework utilizing a table driven approach. The study reveals that even in a highly controlled environment with static locations, the security risks posed by telemedicine applications are significant, and that using a threat table approach provides an easy-to-use and effective method for managing these threats.


Author(s):  
Yootaek Lee ◽  
Jay Kim ◽  
Jeffery G. Miller

The purpose of this chapter is to enhance our understanding of how web-based applications and complementary resources can work together to create competitive advantages in supply chains. This chapter is organized as follows. First, this chapter introduces the theoretical background of complementary resources. Then, it moves on to report a preliminary result of secondary data analysis that explores the role of complementary resources to the development of web-enabled supply chains. Lastly, this chapter reports a case study that focuses on identifying: 1) the complementary resources that influence the successful implementation of web-based applications for supply chain management, and 2) the degree to which certain types of complementary resources function to support the successful implementation of web-based applications.


2022 ◽  
Vol 14 (1) ◽  
pp. 459
Author(s):  
João F. Proença ◽  
Ana Cláudia Torres ◽  
Bernardo Marta ◽  
Débora Santos Silva ◽  
Grazielle Fuly ◽  
...  

The literature shows that companies increasingly need to become more sustainable. To achieve sustainable development, supply chain management needs to be related to sustainable business practices, which include relevant values and sustainable purchasing policies. Focusing on these principles on the topic of coffee, this study shows the difficulties associated with this product. The study finds that coffee production is dependent on factors unrelated to management. This paper presents a case study of Delta Cafés owned by Grupo Nabeiro, a Portuguese company that shows relevant ways of achieving sustainable business methods to be incorporated in supply chain management. Our research shows a business based on sustainable, efficient handling of the food safety of its product and certification along the supply chain, as well as an adaptable purchasing policy. By reviewing the literature and information provided by the company, we confirm that the case study is a business leader in innovation, thought process, and action related to sustainability practices. Our research illustrates how business operations and culture can be explored to achieve sustainable buying processes and practices.


2010 ◽  
pp. 1201-1214
Author(s):  
Yootaek Lee ◽  
Jay Kim ◽  
Jeffery G. Miller

This study focuses on identifying (a) the complementary resources that influence the successful implementation of Web-based applications for supply chain management, and (b) the degree to which certain types of complementary resources function to support the successful implementation of Web-based applications. An exploratory case study is employed to identify potential complementary resources that are required for the successful implementation of Web-based applications that support various portions of the supply chain management task. The utility of a potential complementary resource to each Web-based application for a supply chain task is evaluated to determine the relative value of the resource to the Webbased application. A matrix is then developed to show the degree to which a particular complementary resource is utilized to implement Web-based applications. The contribution of this study is to enhance our understanding of how Web-based applications and complementary resources can work together to create competitive advantages in supply chains.


Author(s):  
Peter Mensah ◽  
Yuri Merkuryev ◽  
Jelena Pecherka ◽  
Francesco Longo

The supply chain faces uncertainties, especially with the flow of products and information that may affect the productivity, revenue and competitive advantages of many organizations. It is therefore necessary for these organizations to be agile and resilient enough to meet with these uncertainties so that they may be managed appropriately or even avoided. In a publication by Mensah et.al (2014), the authors introduce a theoretical approach where the „conceptualization of risks for subsequent simulation-based analysis‟ is evaluated. This includes the description of „a generic conceptual model of a retail node‟ followed by the introduction of performance indicators relevant for simulation base analysis. Hence, a concept for further studies from a practical point of view has now arisen. This article therefore introduces a new case study where the flow of products in a real company is conceptualized for simulation base analysis to raise the awareness of the organization in case of uncertainties.


Author(s):  
John C. Pendergrass ◽  
Karen Heart ◽  
C. Ranganathan ◽  
V. N. Venkatakrishnan

Information security within healthcare is paramount and telemedicine applications present unique security challenges. Technology is giving rise to new and advanced telemedicine applications and understanding the security threats to these applications is needed to ensure, among other things, the privacy of patient information. This paper proposes a threat table approach to assess security threats pertaining to telemedicine applications. The concept and its usefulness are illustrated using a case study. This case study focuses on the capture and representation of salient security threats in telemedicine. To analyze the security threats to an application, it presents a threat modeling framework utilizing a table driven approach. The study reveals that even in a highly controlled environment with static locations, the security risks posed by telemedicine applications are significant, and that using a threat table approach provides an easy-to-use and effective method for managing these threats.


Sign in / Sign up

Export Citation Format

Share Document