Search results
1 – 10 of over 51000İbrahim Murat BİCİL and Kumru TURKOZ
Introduction: Although the concept of energy security has different meanings for each country, it is included in the energy policies of all countries in general. Energy security…
Abstract
Introduction: Although the concept of energy security has different meanings for each country, it is included in the energy policies of all countries in general. Energy security policies have more strategic importance especially for energy-importing countries. Imported energy sources are widely used in Turkey as in many countries. The variety of imported energy sources and the density of imports according to the imported countries affect the security of imported energy supply. Although the high density of imports is a risk factor, there are political and structural factors that may affect economic relations with the countries where energy is imported.
Aim: The aim of this study is to measure the short-term risk for the import of fossil resources in Turkey for the period 1999–2018.
Method: An index has composed by revising the risky external energy supply index included in the study of Le Coq and Paltseva (2009).
Findings: Empirical findings showed that on average, the most risky source of imports based on fossil resources is oil, followed by natural gas and coal respectively.
Originality of the Study: Various risk factors such as fossil fuel import intensity, political risk, and logistics performance have been taken into consideration in the proposed index. So this index proposed for Turkey, is expected to offer a different perspective to the energy supply security literature.
Implications: The proposed risk index has enabled the measurement of the level of risk in imported fossil sources in Turkey. Thus, policy implications have been made for energy supply security.
Details
Keywords
Claudia Colicchia, Alessandro Creazza and David A. Menachof
The purpose of this paper is to explore how companies approach the management of cyber and information risks in their supply chain, what initiatives they adopt to this aim, and to…
Abstract
Purpose
The purpose of this paper is to explore how companies approach the management of cyber and information risks in their supply chain, what initiatives they adopt to this aim, and to what extent along the supply chain. In fact, the increasing level of connectivity is transforming supply chains, and it creates new opportunities but also new risks in the cyber space. Hence, cyber supply chain risk management (CSCRM) is emerging as a new management construct. The ultimate aim is to help organizations in understanding and improving the CSCRM process and cyber resilience in their supply chains.
Design/methodology/approach
This research relied on a qualitative approach based on a comparative case study analysis involving five large multinational companies with headquarters, or branches, in the UK.
Findings
Results highlight the importance for CSCRM to shift the viewpoint from the traditional focus on companies’ internal information technology (IT) infrastructure, able to “firewall themselves” only, to the whole supply chain with a cross-functional approach; initiatives for CSCRM are mainly adopted to “respond” and “recover” without a well-rounded approach to supply chain resilience for a long-term capacity to adapt to changes according to an evolutionary approach. Initiatives are adopted at a firm/dyadic level, and a network perspective is missing.
Research limitations/implications
This paper extends the current theory on cyber and information risks in supply chains, as a combination of supply chain risk management and resilience, and information risk management. It provides an analysis and classification of cyber and information risks, sources of risks and initiatives to managing them according to a supply chain perspective, along with an investigation of their adoption across the supply chain. It also studies how the concept of resilience has been deployed in the CSCRM process by companies. By laying the first empirical foundations of the subject, this study stimulates further research on the challenges and drivers of initiatives and coordination mechanisms for CSCRM at a supply chain network level.
Practical implications
Results invite companies to break the “silos” of their activities in CSCRM, embracing the whole supply chain network for better resilience. The adoption of IT security initiatives should be combined with organisational ones and extended beyond the dyad. Where applicable, initiatives should be bi-directional to involve supply chain partners, remove the typical isolation in the CSCRM process and leverage the value of information. Decisions on investments in CSCRM should involve also supply chain managers according to a holistic approach.
Originality/value
A supply chain perspective in the existing scientific contributions is missing in the management of cyber and information risk. This is one of the first empirical studies dealing with this interdisciplinary subject, focusing on risks that are now very high in the companies’ agenda, but still overlooked. It contributes to theory on information risk because it addresses cyber and information risks in massively connected supply chains through a holistic approach that includes technology, people and processes at an extended level that goes beyond the dyad.
Details
Keywords
Zachary Williams, Jason E. Lueg, Ronald D. Taylor and Robert L. Cook
The events of September 11, 2001 heightened the awareness of supply chain professionals to the threat of man‐made disasters on the security of supply chains. According to…
Abstract
Purpose
The events of September 11, 2001 heightened the awareness of supply chain professionals to the threat of man‐made disasters on the security of supply chains. According to institutional theory, the environment in which an organization operates creates pressures (normative, coercive, and mimetic) to adopt “institutionalized” norms and practices in order to be perceived as “legitimate.” Using an institutional theory perspective, this paper identifies and explores the environmental drivers that motivate firms to engage in supply chain security (SCS) practices to thwart man‐made supply chain disasters.
Design/methodology/approach
Qualitative research in the form of 19 depth interviews with mid‐to‐high level supply chain management professionals is conducted.
Findings
The findings of the qualitative research indicate that four primary drivers of SCS exist: government, customers, competitors, and society. Implications and suggestions for future research are provided.
Research limitations/implications
The qualitative findings call for future empirical testing.
Practical implications
Practitioners will benefit from the research presented here by better understanding what environmental factors are causing improved security measures in the supply chain.
Originality/value
This paper investigates drivers of SCS, an issue that is currently having an impact on supply chain operations worldwide. This is the first SCS study to investigate the reason behind why supply chains are implementing security strategies.
Details
Keywords
Chwen Sheu, Lilly Lee and Brian Niehoff
To investigate the practices and value of a voluntary logistics security program, C‐TPAT certification, and its impact on international supply chain collaboration.
Abstract
Purpose
To investigate the practices and value of a voluntary logistics security program, C‐TPAT certification, and its impact on international supply chain collaboration.
Design/methodology/approach
Both case study and secondary data research methods were used to collect data from five companies (one customs broker, three importers, and one transporter/freight forwarder) at different supply chain positions. A case study protocol was designed and used to guide the interviews and data collection. Data analysis was performed at three levels: within‐case analysis, cross‐case analysis, and expert analysis.
Findings
In addition to reporting the current practices of the C‐TPAT implementation, the results confirmed the significant impact of the C‐TPAT program to the international trade community. As for the overall goal of improving border security, the results suggest that the C‐TPAT is a means rather than an end and its current value to logistic security is not clear due to the inconsistent practices of supplier involvement. International supply chain security is still in its infancy and has many issues to resolve before it becomes a fully collaborative system.
Research limitations/implications
Future research with more samples is necessary to validate the findings and research positions.
Practical implications
A voluntary logistics security program such as C‐TPAT could enhance the collaboration with international suppliers. Global logistics security systems can learn from the quality movement by focusing on “prevention” and adopting the “total supply chain” approach.
Originality/value
This paper addresses the anxiety and confusion in the international trade community toward the C‐TPAT certification and its impact on international supply chain security. The findings confirmed the linkage between quality program and supply chain security systems.
Details
Keywords
Luca Urciuoli, Sangeeta Mohanty, Juha Hintsa and Else Gerine Boekesteijn
The purpose of this paper is to enhance the understanding about how energy supply chains work to build resilience against exogenous security threats and thereafter what support…
Abstract
Purpose
The purpose of this paper is to enhance the understanding about how energy supply chains work to build resilience against exogenous security threats and thereafter what support mechanisms should be introduced or improved by the European Union.
Design/methodology/approach
Five case studies and data collection from multiple sources is used to understand what exogenous security threats could lead to the disruption of oil and gas flows to Europe, how energy companies, from a supply chain perspective, are working to manage these threats and finally, how the EU may coordinate the security of the energy sector in collaboration with supply chain companies.
Findings
Results show that today, oil and gas supply chains have in place a good combination of disruption strategies, including portfolio diversification, flexible contracts, transport capacity planning and safety stocks. The most relevant security threats the companies fear, include hijacking of vessels (sea piracy), but also terrorism, and wars. Finally, the study highlights that the European Union has built a comprehensive portfolio of strategies to deal with scarcity of oil and gas resources. However, these approaches are not often synchronized with supply chain strategies.
Practical implications
The paper provides guidance for supply chain managers dealing with critical suppliers located in conflict environments. The paper recommends that supply chain managers fine tune their strategies in coordination with governmental actions in foreign politics, dependence reduction and crisis management. This may be achieved by closer communication with governments and potentially through the creation of a pan-European sector alliance.
Originality/value
Previous research discusses the topic of supply chain resilience and supply chain risk management. However, none of these studies report on exogenous security threats and disruption strategies of oil and gas supply chains. At the same time, previous research lacks detailed studies describing the interaction between governments and energy supply chains.
Details
Keywords
The purpose of this empirical research is to attempt to explore the effect of information security initiatives (ISI) on supply chain performance, considering various intra- and…
Abstract
Purpose
The purpose of this empirical research is to attempt to explore the effect of information security initiatives (ISI) on supply chain performance, considering various intra- and inter-organization information security aspects that are deemed to have an influence on supply chain operations and performance.
Design/methodology/approach
Based on extant information security management and supply chain security management literature, a conceptual model was developed and validated. A questionnaire survey instrument was developed and administered among supply chain managers to collect data. Data were collected from 197 organizations belonging to various sectors. The study used exploratory and confirmatory factor analysis for data analysis. Further, to test the hypotheses and to fit the theoretical model, structural equation modeling techniques were used.
Findings
Results of this study indicate that ISI, comprising technical, formal and informal security aspects in an intra- and inter-organizational environment, are positively associated with supply chain operations, which, in turn, positively affects supply chain performance.
Research limitations/implications
This study provides the foundation for future research in the management of information security in supply chains. Findings are expected to provide the communities of practice with better information security decision-making in a supply chain context, by clearly formulating technical, formal and informal information security policies for improving supply chain performance.
Originality/value
In today’s global supply chain environment where competition prevails among supply chains, this research is relevant in terms of capability that an organization has to acquire for managing internal and external information security. In that sense, this study contributes to the body of knowledge with an empirical analysis of organizations’ information security management initiatives as a blend of technical, formal and informal security aspects.
Details
Keywords
Sachi Findlater and Pierre Noël
The purpose of this paper is to assess the level of gas supply security enjoyed by the three Baltic States: Latvia, Lithuania and Estonia.
Abstract
Purpose
The purpose of this paper is to assess the level of gas supply security enjoyed by the three Baltic States: Latvia, Lithuania and Estonia.
Design/methodology/approach
The research is predominantly qualitative and is based on information gathered at interviews, policy analysis and analysis of national statistics on the structure of gas consumption.
Findings
The research finds that the three Baltic States enjoy a relatively low level of gas supply security and that of the three, Lithuania, with more extensive dual fuel obligations, is most secure.
Originality/value
The paper presents work on countries in a previously under‐researched region and provides a detailed and tailored analysis of their gas supply security situations and policies.
Details
Keywords
Chad W. Autry and L. Michelle Bobbitt
This paper aims to report on an exploratory study investigating supply chain security orientation (SCSO), a firm‐level construct addressing companies' multiple approaches toward…
Abstract
Purpose
This paper aims to report on an exploratory study investigating supply chain security orientation (SCSO), a firm‐level construct addressing companies' multiple approaches toward mitigation of supply chain security breaches and supply chain risk management.
Design/methodology/approach
Structured interviews were conducted with managers who were responsible for firms' supply chain security efforts. The resulting data were content analyzed and critical themes presented depicting SCSO.
Findings
Key antecedents, outcomes, and moderating conditions were identified based on the qualitative data. Four primary dimensions of the SCSO concept are revealed.
Originality/value
The major contribution of the paper is the delineation of the components of SCSO, which appear to be pervasive across firms. Additionally, several drivers of SCSO are identified, and SCSO is linked to positive financial and customer outcomes, as well as supply chain continuity.
Details
Keywords
Suhaiza Hanim Zailani, Karthigesu Seva Subaramaniam, Mohammad Iranmanesh and Mohd Rizaimy Shaharudin
The security issue in supply chains is among the most pressing concerns that firms are currently facing. As a preliminary attempt to address this lack of empirical research, the…
Abstract
Purpose
The security issue in supply chains is among the most pressing concerns that firms are currently facing. As a preliminary attempt to address this lack of empirical research, the primary purpose of this paper is to explore the relationship between security practices and the security operational performance with respect to security culture as a moderator.
Design/methodology/approach
With the resource-based view of the firm as the theoretical underpinning, the study utilizes survey data to test the propositions derived from the security literature and partial least squares for the analysis.
Findings
The research reveals four crucial practices of supply chain security that collectively affect a firm’s security operational performance among Malaysian service providers. It is also interesting to observe that security culture positively moderates the relationship between facility management and the security operational performance of the firm.
Research limitations/implications
Firms in emerging countries need to realize that supply chain security practices can result in significant benefits to their firms that can give them additional incentives to adopt these initiatives. This study may also help policymakers in emerging countries, in general, in setting appropriate policies and strategies, and Malaysia, in particular, for ensuring that it is a secure location for exporting cargo and giving assurance to the local and international investors to continue their investment.
Practical implications
This study will assist supply chain managers and logisticians to re-examine their existing supply chain security model by considering the selected supply chain security practices, which have a significant impact on supply chain security operational performance. Individual firms need to strategize their business model with the inclusion of security aspects, which will surely create a competitive advantage over other players in the logistics industry. Firms can develop the best appropriate supply chain security model that will benefit the firm, customers, and business partners, such as suppliers and local authorities.
Originality/value
The study highlights is the important role of the supply chain security practices to deliver high quality of service in terms of supply chain security operational performance in emerging countries. In addition, it offers an empirical analysis of the moderating role of security culture on the relationship between supply chain security practices and security operational performance.
Details