Search results

1 – 10 of over 51000
Book part
Publication date: 21 May 2021

İbrahim Murat BİCİL and Kumru TURKOZ

Introduction: Although the concept of energy security has different meanings for each country, it is included in the energy policies of all countries in general. Energy security

Abstract

Introduction: Although the concept of energy security has different meanings for each country, it is included in the energy policies of all countries in general. Energy security policies have more strategic importance especially for energy-importing countries. Imported energy sources are widely used in Turkey as in many countries. The variety of imported energy sources and the density of imports according to the imported countries affect the security of imported energy supply. Although the high density of imports is a risk factor, there are political and structural factors that may affect economic relations with the countries where energy is imported.

Aim: The aim of this study is to measure the short-term risk for the import of fossil resources in Turkey for the period 1999–2018.

Method: An index has composed by revising the risky external energy supply index included in the study of Le Coq and Paltseva (2009).

Findings: Empirical findings showed that on average, the most risky source of imports based on fossil resources is oil, followed by natural gas and coal respectively.

Originality of the Study: Various risk factors such as fossil fuel import intensity, political risk, and logistics performance have been taken into consideration in the proposed index. So this index proposed for Turkey, is expected to offer a different perspective to the energy supply security literature.

Implications: The proposed risk index has enabled the measurement of the level of risk in imported fossil sources in Turkey. Thus, policy implications have been made for energy supply security.

Details

New Challenges for Future Sustainability and Wellbeing
Type: Book
ISBN: 978-1-80043-969-6

Keywords

Abstract

Details

Energy Economics
Type: Book
ISBN: 978-1-83867-294-2

Article
Publication date: 11 December 2018

Claudia Colicchia, Alessandro Creazza and David A. Menachof

The purpose of this paper is to explore how companies approach the management of cyber and information risks in their supply chain, what initiatives they adopt to this aim, and to…

5234

Abstract

Purpose

The purpose of this paper is to explore how companies approach the management of cyber and information risks in their supply chain, what initiatives they adopt to this aim, and to what extent along the supply chain. In fact, the increasing level of connectivity is transforming supply chains, and it creates new opportunities but also new risks in the cyber space. Hence, cyber supply chain risk management (CSCRM) is emerging as a new management construct. The ultimate aim is to help organizations in understanding and improving the CSCRM process and cyber resilience in their supply chains.

Design/methodology/approach

This research relied on a qualitative approach based on a comparative case study analysis involving five large multinational companies with headquarters, or branches, in the UK.

Findings

Results highlight the importance for CSCRM to shift the viewpoint from the traditional focus on companies’ internal information technology (IT) infrastructure, able to “firewall themselves” only, to the whole supply chain with a cross-functional approach; initiatives for CSCRM are mainly adopted to “respond” and “recover” without a well-rounded approach to supply chain resilience for a long-term capacity to adapt to changes according to an evolutionary approach. Initiatives are adopted at a firm/dyadic level, and a network perspective is missing.

Research limitations/implications

This paper extends the current theory on cyber and information risks in supply chains, as a combination of supply chain risk management and resilience, and information risk management. It provides an analysis and classification of cyber and information risks, sources of risks and initiatives to managing them according to a supply chain perspective, along with an investigation of their adoption across the supply chain. It also studies how the concept of resilience has been deployed in the CSCRM process by companies. By laying the first empirical foundations of the subject, this study stimulates further research on the challenges and drivers of initiatives and coordination mechanisms for CSCRM at a supply chain network level.

Practical implications

Results invite companies to break the “silos” of their activities in CSCRM, embracing the whole supply chain network for better resilience. The adoption of IT security initiatives should be combined with organisational ones and extended beyond the dyad. Where applicable, initiatives should be bi-directional to involve supply chain partners, remove the typical isolation in the CSCRM process and leverage the value of information. Decisions on investments in CSCRM should involve also supply chain managers according to a holistic approach.

Originality/value

A supply chain perspective in the existing scientific contributions is missing in the management of cyber and information risk. This is one of the first empirical studies dealing with this interdisciplinary subject, focusing on risks that are now very high in the companies’ agenda, but still overlooked. It contributes to theory on information risk because it addresses cyber and information risks in massively connected supply chains through a holistic approach that includes technology, people and processes at an extended level that goes beyond the dyad.

Details

Supply Chain Management: An International Journal, vol. 24 no. 2
Type: Research Article
ISSN: 1359-8546

Keywords

Article
Publication date: 7 August 2009

Zachary Williams, Jason E. Lueg, Ronald D. Taylor and Robert L. Cook

The events of September 11, 2001 heightened the awareness of supply chain professionals to the threat of man‐made disasters on the security of supply chains. According to…

3382

Abstract

Purpose

The events of September 11, 2001 heightened the awareness of supply chain professionals to the threat of man‐made disasters on the security of supply chains. According to institutional theory, the environment in which an organization operates creates pressures (normative, coercive, and mimetic) to adopt “institutionalized” norms and practices in order to be perceived as “legitimate.” Using an institutional theory perspective, this paper identifies and explores the environmental drivers that motivate firms to engage in supply chain security (SCS) practices to thwart man‐made supply chain disasters.

Design/methodology/approach

Qualitative research in the form of 19 depth interviews with mid‐to‐high level supply chain management professionals is conducted.

Findings

The findings of the qualitative research indicate that four primary drivers of SCS exist: government, customers, competitors, and society. Implications and suggestions for future research are provided.

Research limitations/implications

The qualitative findings call for future empirical testing.

Practical implications

Practitioners will benefit from the research presented here by better understanding what environmental factors are causing improved security measures in the supply chain.

Originality/value

This paper investigates drivers of SCS, an issue that is currently having an impact on supply chain operations worldwide. This is the first SCS study to investigate the reason behind why supply chains are implementing security strategies.

Details

International Journal of Physical Distribution & Logistics Management, vol. 39 no. 7
Type: Research Article
ISSN: 0960-0035

Keywords

Article
Publication date: 1 July 2006

Chwen Sheu, Lilly Lee and Brian Niehoff

To investigate the practices and value of a voluntary logistics security program, C‐TPAT certification, and its impact on international supply chain collaboration.

4326

Abstract

Purpose

To investigate the practices and value of a voluntary logistics security program, C‐TPAT certification, and its impact on international supply chain collaboration.

Design/methodology/approach

Both case study and secondary data research methods were used to collect data from five companies (one customs broker, three importers, and one transporter/freight forwarder) at different supply chain positions. A case study protocol was designed and used to guide the interviews and data collection. Data analysis was performed at three levels: within‐case analysis, cross‐case analysis, and expert analysis.

Findings

In addition to reporting the current practices of the C‐TPAT implementation, the results confirmed the significant impact of the C‐TPAT program to the international trade community. As for the overall goal of improving border security, the results suggest that the C‐TPAT is a means rather than an end and its current value to logistic security is not clear due to the inconsistent practices of supplier involvement. International supply chain security is still in its infancy and has many issues to resolve before it becomes a fully collaborative system.

Research limitations/implications

Future research with more samples is necessary to validate the findings and research positions.

Practical implications

A voluntary logistics security program such as C‐TPAT could enhance the collaboration with international suppliers. Global logistics security systems can learn from the quality movement by focusing on “prevention” and adopting the “total supply chain” approach.

Originality/value

This paper addresses the anxiety and confusion in the international trade community toward the C‐TPAT certification and its impact on international supply chain security. The findings confirmed the linkage between quality program and supply chain security systems.

Details

Supply Chain Management: An International Journal, vol. 11 no. 4
Type: Research Article
ISSN: 1359-8546

Keywords

Article
Publication date: 7 January 2014

Luca Urciuoli, Sangeeta Mohanty, Juha Hintsa and Else Gerine Boekesteijn

The purpose of this paper is to enhance the understanding about how energy supply chains work to build resilience against exogenous security threats and thereafter what support…

8579

Abstract

Purpose

The purpose of this paper is to enhance the understanding about how energy supply chains work to build resilience against exogenous security threats and thereafter what support mechanisms should be introduced or improved by the European Union.

Design/methodology/approach

Five case studies and data collection from multiple sources is used to understand what exogenous security threats could lead to the disruption of oil and gas flows to Europe, how energy companies, from a supply chain perspective, are working to manage these threats and finally, how the EU may coordinate the security of the energy sector in collaboration with supply chain companies.

Findings

Results show that today, oil and gas supply chains have in place a good combination of disruption strategies, including portfolio diversification, flexible contracts, transport capacity planning and safety stocks. The most relevant security threats the companies fear, include hijacking of vessels (sea piracy), but also terrorism, and wars. Finally, the study highlights that the European Union has built a comprehensive portfolio of strategies to deal with scarcity of oil and gas resources. However, these approaches are not often synchronized with supply chain strategies.

Practical implications

The paper provides guidance for supply chain managers dealing with critical suppliers located in conflict environments. The paper recommends that supply chain managers fine tune their strategies in coordination with governmental actions in foreign politics, dependence reduction and crisis management. This may be achieved by closer communication with governments and potentially through the creation of a pan-European sector alliance.

Originality/value

Previous research discusses the topic of supply chain resilience and supply chain risk management. However, none of these studies report on exogenous security threats and disruption strategies of oil and gas supply chains. At the same time, previous research lacks detailed studies describing the interaction between governments and energy supply chains.

Details

Supply Chain Management: An International Journal, vol. 19 no. 1
Type: Research Article
ISSN: 1359-8546

Keywords

Article
Publication date: 10 November 2014

Sindhuja PN

The purpose of this empirical research is to attempt to explore the effect of information security initiatives (ISI) on supply chain performance, considering various intra- and…

2308

Abstract

Purpose

The purpose of this empirical research is to attempt to explore the effect of information security initiatives (ISI) on supply chain performance, considering various intra- and inter-organization information security aspects that are deemed to have an influence on supply chain operations and performance.

Design/methodology/approach

Based on extant information security management and supply chain security management literature, a conceptual model was developed and validated. A questionnaire survey instrument was developed and administered among supply chain managers to collect data. Data were collected from 197 organizations belonging to various sectors. The study used exploratory and confirmatory factor analysis for data analysis. Further, to test the hypotheses and to fit the theoretical model, structural equation modeling techniques were used.

Findings

Results of this study indicate that ISI, comprising technical, formal and informal security aspects in an intra- and inter-organizational environment, are positively associated with supply chain operations, which, in turn, positively affects supply chain performance.

Research limitations/implications

This study provides the foundation for future research in the management of information security in supply chains. Findings are expected to provide the communities of practice with better information security decision-making in a supply chain context, by clearly formulating technical, formal and informal information security policies for improving supply chain performance.

Originality/value

In today’s global supply chain environment where competition prevails among supply chains, this research is relevant in terms of capability that an organization has to acquire for managing internal and external information security. In that sense, this study contributes to the body of knowledge with an empirical analysis of organizations’ information security management initiatives as a blend of technical, formal and informal security aspects.

Details

Information Management & Computer Security, vol. 22 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 29 June 2010

Sachi Findlater and Pierre Noël

The purpose of this paper is to assess the level of gas supply security enjoyed by the three Baltic States: Latvia, Lithuania and Estonia.

Abstract

Purpose

The purpose of this paper is to assess the level of gas supply security enjoyed by the three Baltic States: Latvia, Lithuania and Estonia.

Design/methodology/approach

The research is predominantly qualitative and is based on information gathered at interviews, policy analysis and analysis of national statistics on the structure of gas consumption.

Findings

The research finds that the three Baltic States enjoy a relatively low level of gas supply security and that of the three, Lithuania, with more extensive dual fuel obligations, is most secure.

Originality/value

The paper presents work on countries in a previously under‐researched region and provides a detailed and tailored analysis of their gas supply security situations and policies.

Details

International Journal of Energy Sector Management, vol. 4 no. 2
Type: Research Article
ISSN: 1750-6220

Keywords

Article
Publication date: 23 May 2008

Chad W. Autry and L. Michelle Bobbitt

This paper aims to report on an exploratory study investigating supply chain security orientation (SCSO), a firm‐level construct addressing companies' multiple approaches toward…

4308

Abstract

Purpose

This paper aims to report on an exploratory study investigating supply chain security orientation (SCSO), a firm‐level construct addressing companies' multiple approaches toward mitigation of supply chain security breaches and supply chain risk management.

Design/methodology/approach

Structured interviews were conducted with managers who were responsible for firms' supply chain security efforts. The resulting data were content analyzed and critical themes presented depicting SCSO.

Findings

Key antecedents, outcomes, and moderating conditions were identified based on the qualitative data. Four primary dimensions of the SCSO concept are revealed.

Originality/value

The major contribution of the paper is the delineation of the components of SCSO, which appear to be pervasive across firms. Additionally, several drivers of SCSO are identified, and SCSO is linked to positive financial and customer outcomes, as well as supply chain continuity.

Details

The International Journal of Logistics Management, vol. 19 no. 1
Type: Research Article
ISSN: 0957-4093

Keywords

Article
Publication date: 3 August 2015

Suhaiza Hanim Zailani, Karthigesu Seva Subaramaniam, Mohammad Iranmanesh and Mohd Rizaimy Shaharudin

The security issue in supply chains is among the most pressing concerns that firms are currently facing. As a preliminary attempt to address this lack of empirical research, the…

3104

Abstract

Purpose

The security issue in supply chains is among the most pressing concerns that firms are currently facing. As a preliminary attempt to address this lack of empirical research, the primary purpose of this paper is to explore the relationship between security practices and the security operational performance with respect to security culture as a moderator.

Design/methodology/approach

With the resource-based view of the firm as the theoretical underpinning, the study utilizes survey data to test the propositions derived from the security literature and partial least squares for the analysis.

Findings

The research reveals four crucial practices of supply chain security that collectively affect a firm’s security operational performance among Malaysian service providers. It is also interesting to observe that security culture positively moderates the relationship between facility management and the security operational performance of the firm.

Research limitations/implications

Firms in emerging countries need to realize that supply chain security practices can result in significant benefits to their firms that can give them additional incentives to adopt these initiatives. This study may also help policymakers in emerging countries, in general, in setting appropriate policies and strategies, and Malaysia, in particular, for ensuring that it is a secure location for exporting cargo and giving assurance to the local and international investors to continue their investment.

Practical implications

This study will assist supply chain managers and logisticians to re-examine their existing supply chain security model by considering the selected supply chain security practices, which have a significant impact on supply chain security operational performance. Individual firms need to strategize their business model with the inclusion of security aspects, which will surely create a competitive advantage over other players in the logistics industry. Firms can develop the best appropriate supply chain security model that will benefit the firm, customers, and business partners, such as suppliers and local authorities.

Originality/value

The study highlights is the important role of the supply chain security practices to deliver high quality of service in terms of supply chain security operational performance in emerging countries. In addition, it offers an empirical analysis of the moderating role of security culture on the relationship between supply chain security practices and security operational performance.

Details

International Journal of Physical Distribution & Logistics Management, vol. 45 no. 7
Type: Research Article
ISSN: 0960-0035

Keywords

1 – 10 of over 51000