Search results

1 – 10 of 135
Open Access
Article
Publication date: 20 October 2021

Virva Tuomala and David B. Grant

Access to food through retail supply chain distribution can vary significantly among the urban poor and leads to household food insecurity. The paper explores this sustainable…

5111

Abstract

Purpose

Access to food through retail supply chain distribution can vary significantly among the urban poor and leads to household food insecurity. The paper explores this sustainable supply chain phenomenon through a field study among South Africa's urban poor.

Design/methodology/approach

Urban metabolic flows is the theoretical basis in the context of supply chain management (SCM). The field study comprised 59 semi-structured interviews in one South African township. Data were recorded, transcribed and translated, and coded using NVivo 12 to provide an inventory of eight themes categorized and patterned from the analysis.

Findings

Findings indicate societal factors play a significant role affecting food distribution, access and security from a spatial perspective of retail outlet locations and a nutritional standpoint regarding quality and quantity of food.

Research limitations/implications

The study is exploratory in one township, and while rigorously conducted, the generalizability of findings is limited to this context.

Practical implications

The study practically contributes by providing guidance for food retailers and policymakers to include nutritional guidelines in their distribution planning, as well as the dynamics of diverse neighbourhoods that exist in modern urban contexts.

Social implications

New forms of retail food distribution can provide better security and access to food for the urban poor, contributing to Sustainable Development Goals (SDGs) 2 Zero Hunger and 11 Liveable Cities.

Originality/value

The study is interdisciplinary and contributes by linking UN SDGs and SCM through urban metabolic flows from development studies as an overarching framework to enable analysis of relationships between physical, social and economic factors in the urban environment.

Details

The International Journal of Logistics Management, vol. 33 no. 5
Type: Research Article
ISSN: 0957-4093

Keywords

Content available
Article
Publication date: 3 January 2017

Louise Manning

Abstract

Details

British Food Journal, vol. 119 no. 1
Type: Research Article
ISSN: 0007-070X

Content available
Book part
Publication date: 16 September 2022

Abstract

Details

Counterfeiting and Fraud in Supply Chains
Type: Book
ISBN: 978-1-80117-574-6

Content available
Article
Publication date: 6 June 2016

Rosa Caiazza, Tiziana Volpe and John L Stanton

827

Abstract

Details

British Food Journal, vol. 118 no. 6
Type: Research Article
ISSN: 0007-070X

Open Access
Article
Publication date: 18 February 2021

Pamela Danese, Riccardo Mocellin and Pietro Romano

The purpose of this paper is to contribute to the debate on blockchain (BC) adoption for preventing counterfeiting by investigating BC systems where different options for BC…

8598

Abstract

Purpose

The purpose of this paper is to contribute to the debate on blockchain (BC) adoption for preventing counterfeiting by investigating BC systems where different options for BC feeding and reading complement the use of BC technology. By grounding on the situational crime prevention, this study analyses how BC systems can be designed to effectively prevent counterfeiting.

Design/methodology/approach

This is a multiple-case study of five Italian wine companies using BC to prevent counterfeiting.

Findings

This study finds that the desired level of upstream/downstream counterfeiting protection that a brand owner intends to guarantee to customers through BC is the key driver to consider in the design of BC systems. The study identifies which variables are relevant to the design of feeding and reading processes and explains how such variables can be modulated in accordance with the desired level of counterfeiting protection.

Research limitations/implications

The cases investigated are Italian companies within the wine sector, and the BC projects analysed are in the pilot phase.

Practical implications

The study provides practical suggestions to address the design of BC systems by identifying a set of key variables and explaining how to properly modulate them to face upstream/downstream counterfeiting.

Originality/value

This research applies a new perspective based on the situational crime prevention approach in studying how companies can design BC systems to effectively prevent counterfeiting. It explains how feeding and reading process options can be configured in BC systems to assure different degrees of counterfeiting protection.

Details

International Journal of Operations & Production Management, vol. 41 no. 13
Type: Research Article
ISSN: 0144-3577

Keywords

Content available
Article
Publication date: 21 March 2023

Abel Yeboah-Ofori and Francisca Afua Opoku-Boateng

Various organizational landscapes have evolved to improve their business processes, increase production speed and reduce the cost of distribution and have integrated their…

Abstract

Purpose

Various organizational landscapes have evolved to improve their business processes, increase production speed and reduce the cost of distribution and have integrated their Internet with small and medium scale enterprises (SMEs) and third-party vendors to improve business growth and increase global market share, including changing organizational requirements and business process collaborations. Benefits include a reduction in the cost of production, online services, online payments, product distribution channels and delivery in a supply chain environment. However, the integration has led to an exponential increase in cybercrimes, with adversaries using various attack methods to penetrate and exploit the organizational network. Thus, identifying the attack vectors in the event of cyberattacks is very important in mitigating cybercrimes effectively and has become inevitable. However, the invincibility nature of cybercrimes makes it challenging to detect and predict the threat probabilities and the cascading impact in an evolving organization landscape leading to malware, ransomware, data theft and denial of service attacks, among others. The paper explores the cybercrime threat landscape, considers the impact of the attacks and identifies mitigating circumstances to improve security controls in an evolving organizational landscape.

Design/methodology/approach

The approach follows two main cybercrime framework design principles that focus on existing attack detection phases and proposes a cybercrime mitigation framework (CCMF) that uses detect, assess, analyze, evaluate and respond phases and subphases to reduce the attack surface. The methods and implementation processes were derived by identifying an organizational goal, attack vectors, threat landscape, identification of attacks and models and validation of framework standards to improve security. The novelty contribution of this paper is threefold: first, the authors explore the existing threat landscapes, various cybercrimes, models and the methods that adversaries are deploying on organizations. Second, the authors propose a threat model required for mitigating the risk factors. Finally, the authors recommend control mechanisms in line with security standards to improve security.

Findings

The results show that cybercrimes can be mitigated using a CCMF to detect, assess, analyze, evaluate and respond to cybercrimes to improve security in an evolving organizational threat landscape.

Research limitations/implications

The paper does not consider the organizational size between large organizations and SMEs. The challenges facing the evolving organizational threat landscape include vulnerabilities brought about by the integrations of various network nodes. Factor influencing these vulnerabilities includes inadequate threat intelligence gathering, a lack of third-party auditing and inadequate control mechanisms leading to various manipulations, exploitations, exfiltration and obfuscations.

Practical implications

Attack methods are applied to a case study for the implementation to evaluate the model based on the design principles. Inadequate cyber threat intelligence (CTI) gathering, inadequate attack modeling and security misconfigurations are some of the key factors leading to practical implications in mitigating cybercrimes.

Social implications

There are no social implications; however, cybercrimes have severe consequences for organizations and third-party vendors that integrate their network systems, leading to legal and reputational damage.

Originality/value

The paper’s originality considers mitigating cybercrimes in an evolving organization landscape that requires strategic, tactical and operational management imperative using the proposed framework phases, including detect, assess, analyze, evaluate and respond phases and subphases to reduce the attack surface, which is currently inadequate.

Details

Continuity & Resilience Review, vol. 5 no. 1
Type: Research Article
ISSN: 2516-7502

Keywords

Content available
Book part
Publication date: 30 July 2018

Abstract

Details

Marketing Management in Turkey
Type: Book
ISBN: 978-1-78714-558-0

Content available
Book part
Publication date: 9 March 2021

Abstract

Details

The Emerald Handbook of Blockchain for Business
Type: Book
ISBN: 978-1-83982-198-1

Open Access
Article
Publication date: 30 April 2017

Dicky Hadi Pratama and Sophia Everett

Discussion of security in supply chains has been intensified since the tragedy of 9/11 in the United States. The World Customs Organization's SAFE Framework with its Authorized…

Abstract

Discussion of security in supply chains has been intensified since the tragedy of 9/11 in the United States. The World Customs Organization's SAFE Framework with its Authorized Economic Operators (AEO) program is one of the prominent supply chain security initiatives. At the time of its introduction in 2005, 168 member countries signed their support for its implementation. However, the last AEO Compendium reports only 69 countries currently have AEO program in place. This relatively slow development indicates the complexity of issues that might challenge countries to implement the initiative. Against this background, this paper aims to look at the AEO implementation in an environment where supply chain security initiative is relatively new. It focuses on policy development perspectives where the case study of Indonesia might represent challenges of other countries. Involving methods of desk research, interviews, and field observation, this paper starts with the development of various international supply chain security programs where the AEO finds it prominence. It follows with a discussion on the Indonesian AEO implementation where challenges and its policy development process are explored.

Details

Journal of International Logistics and Trade, vol. 15 no. 1
Type: Research Article
ISSN: 1738-2122

Keywords

Open Access
Article
Publication date: 3 July 2019

Martin Caraher and Robbie Davison

In the UK, food poverty has increased in the last 15 years and the food aid supply chain that has emerged to tackle it is now roughly 10 years old. In this time, we have seen the…

Abstract

In the UK, food poverty has increased in the last 15 years and the food aid supply chain that has emerged to tackle it is now roughly 10 years old. In this time, we have seen the food aid supply chain grow at a rate that has astounded many. Recently that growth has been aided by a grant of £20m from a large supermarket chain. It appears institutionalisation is just around the corner, if not already here. It also appears that there is far greater emphasis on dealing with the symptoms as opposed to solving the root causes of the problem. As an opinion piece, this paper reflects on some of the prevalent issues, and suggests some ways forward.

Details

Emerald Open Research, vol. 1 no. 6
Type: Research Article
ISSN: 2631-3952

Keywords

1 – 10 of 135