Search results
1 – 10 of over 2000Betul Gokkaya, Erisa Karafili, Leonardo Aniello and Basel Halak
The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and…
Abstract
Purpose
The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and their limitations. The security of SCs has received increasing attention from researchers, due to the emerging risks associated with their distributed nature. The increase in risk in SCs comes from threats that are inherently similar regardless of the type of SC, thus, requiring similar defence mechanisms. Being able to identify the types of threats will help developers to build effective defences.
Design/methodology/approach
In this work, we provide an analysis of the threats, possible attacks and traceability solutions for SCs, and highlight outstanding problems. Through a comprehensive literature review (2015–2021), we analysed various SC security solutions, focussing on tracking solutions. In particular, we focus on three types of SCs: digital, food and pharmaceutical that are considered prime targets for cyberattacks. We introduce a systematic categorization of threats and discuss emerging solutions for prevention and mitigation.
Findings
Our study shows that the current traceability solutions for SC systems do not offer a broadened security analysis and fail to provide extensive protection against cyberattacks. Furthermore, global SCs face common challenges, as there are still unresolved issues, especially those related to the increasing SC complexity and interconnectivity, where cyberattacks are spread across suppliers.
Originality/value
This is the first time that a systematic categorization of general threats for SC is made based on an existing threat model for hardware SC.
Details
Keywords
Amrou Awaysheh, Robert D. Klassen, Asad Shafiq and P. Fraser Johnson
Globalization and increased outsourcing have contributed to increased supply chain complexity, exposing firms to greater vulnerability in the areas of product safety and supply…
Abstract
Purpose
Globalization and increased outsourcing have contributed to increased supply chain complexity, exposing firms to greater vulnerability in the areas of product safety and supply chain security. Meanwhile, stakeholders pressure firms to ensure that their products are safe, and their supply chains are secure. Drawing from stakeholder theory, this paper aims to explore how the supply chain characteristics of distance and power affect the adoption of consumer protection (CP) practices, which ensure product safety and supply chain security.
Design/methodology/approach
Using primary survey data from a sample of Canadian manufacturing firms, this research examines the relationships among supply chain characteristics, adoption of CP practices and firm performance.
Findings
Analysis supported the use of two practices related to product safety (consumer education and product design) and three practices for supply chain security (packaging, tracking and authenticity). Greater cultural distance between the focal firm and its suppliers was positively associated with investments in safer design practices, while increased geographical distance between the focal firm and the customer was significantly related to increased consumer education. Moreover, as power of a focal firm relative to its suppliers increased, so too did investments in supply chain security. Finally, CP practices were related to improved operational performance along multiple dimensions.
Originality/value
This research focuses on the critical role of two key stakeholder groups in improving product safety and supply chain security: suppliers and customers. The authors add to the theoretical discussion of product safety and supply chain security by identifying critical differences between suppliers and customers for the focal firm. Second, the research informs the managerial community of the potential benefits of investments in CP practices.
Details
Keywords
Enrico Bonetti, Chiara Bartoli and Alberto Mattiacci
The purpose of this paper is to enrich the knowledge about blockchain (BC) technology implementation in the agri-food industry by providing an interpretive framework of the key…
Abstract
Purpose
The purpose of this paper is to enrich the knowledge about blockchain (BC) technology implementation in the agri-food industry by providing an interpretive framework of the key marketing opportunities and challenges, related to the adoption of BC for Geographical Indication (GI) products.
Design/methodology/approach
The study adopts an explorative qualitative research design through the cognitive mapping technique applied to the cognition of different market players involved in agri-food BC projects: farmers, distributors, companies and consultancies.
Findings
This study presents a comprehensive examination of the marketing impacts of BC across various marketing objectives, including product enhancement, brand positioning, consumer relationships, market access and supply chain relationships. It highlights the capability of BC to facilitate data-enabled ecosystems within the agri-food sector, involving supply chain actors and control agencies. Additionally, the study sheds light on the challenges (technological, collaborative, political, financial and organizational) associated with the implementation of BC in the marketing of agri-food products.
Research limitations/implications
This work provides a comprehensive examination of the relevance of BC in the marketing activities of firms, particularly in the context of quality food products. It highlights the main areas of impact and effects and emphasizes the complexity of the phenomenon, which extends beyond its technical issues. Furthermore, it offers a systematic exploration of the challenges associated with the adoption of BC in marketing activities, thus contributing to a broader understanding of the implications of BC adoption in companies' marketing strategies.
Practical implications
The practical implications for this work addresses both GI companies and policy makers. Implications for companies relate to the market benefits associated with the implementation of BC, which allow further strengthening of market positioning, relationships of trust within the supply chain and integration between physical and digital market channels. The study also systematizes the challenges underlying the implementation of BC projects. The implications for policy makers regard the role they have to play in BC projects at regulatory, financial and policy levels.
Originality/value
Studies focusing on BC applications in marketing are still limited and characterized by a very narrow perspective (especially in the food industry). This study contributes to the conceptual design of the marketing applications of BC in the agri-food sector. The value of the study also lies in having framed the marketing impacts of BC in a holistic perspective, along with the technological and non-technological challenges that are related to the integration of BC in marketing strategy and operations.
Details
Keywords
R.L. Manogna, Nishil Kulkarni and D. Akshay Krishna
The study endeavors to explore whether the financialization of agricultural commodities, traditionally viewed as a catalyst for price volatility, has any repercussions on food…
Abstract
Purpose
The study endeavors to explore whether the financialization of agricultural commodities, traditionally viewed as a catalyst for price volatility, has any repercussions on food security in BRICS economies.
Design/methodology/approach
The empirical analysis employs the examination of three agricultural commodities, namely wheat, maize and soybean. Utilizing data from the Chicago Board of Trade on futures trading for these commodities, we focus on parameters such as annual trading volume, annual open interest contracts and the ratio of annual trading volume to annual open interest contracts. The study spans the period 2000–2021, encompassing pre- and post-financial crisis analyses and specifically explores the BRICS countries namely the Brazil, Russia, India, China and South Africa. To scrutinize the connections between financialization indicators and food security measures, the analysis employs econometric techniques such as panel data regression analysis and a moderating effects model.
Findings
The results indicate that the financialization of agricultural products contributes to the heightened food price volatility and has adverse effects on food security in emerging economies. Furthermore, the study reveals that the impact of the financialization of agricultural commodities on food security was more pronounced in emerging nations after the global financial crisis of 2008 compared to the pre-crisis period.
Research limitations/implications
This paper seeks to draw increased attention to the financialization of agricultural commodities by presenting empirical evidence of its potential impact on food security in BRICS economies. The findings serve as a valuable guide for policymakers, offering insights to help them safeguard the security and availability of the world’s food supply.
Originality/value
Very few studies have explored the effect of financialization of agricultural commodities on food security covering a sample of developing economies, with sample period from 2000 to 2021, especially at the individual agriculture commodity level. Understanding the evolving effects of financialization is further improved by comparing pre and post-financial crisis times.
Details
Keywords
Derek L. Nazareth, Jae Choi and Thomas Ngo-Ye
This paper aims to examine the conditions under which small and medium enterprises (SMEs) invest in security services when they migrate their e-commerce applications to the cloud…
Abstract
Purpose
This paper aims to examine the conditions under which small and medium enterprises (SMEs) invest in security services when they migrate their e-commerce applications to the cloud environment. Using a risk management perspective, the paper assesses the impact of security service pricing, security incident prevalence and virulence to estimate SME security spending at the market level and draw out implications for SMEs and security service providers.
Design/methodology/approach
Security risks are inherently characterized by uncertainty. This study uses a Monte Carlo approach to understand the role of uncertainty in the decision to adopt security services. A model relating key security constructs is assembled based on key constructs from the domain. By manipulating security service costs and security incident types, the model estimates the market-level adoption of services, security incidents and damages incurred, along with measures of their relative dispersion.
Findings
Three key findings emerge from this study. First, adoption of services and protection is higher when tiered security services are provided, indicating that SMEs prefer to choose their security services rather than accept uniformly priced products. Second, SMEs are considered price-sensitive, resulting in a maximum level of spending in the market. Third, results indicate that security incidents and damages can be much higher than the mean in some cases, and this should serve as a cautionary note to SMEs.
Originality/value
Security spending has been modeled at the firm level. Adopting a market-level perspective represents a novel contribution. Additionally, the Monte Carlo approach provides managers with tangible measures of uncertainty, affording additional information and insight when making security service adoption decisions.
Details
Keywords
Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in…
Abstract
Purpose
Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in these evaluations is the assurance context in which they are conducted. This paper aims to explore the role of assurance context in system SAEs and proposes a conceptual model to integrate the assurance context into the evaluation process.
Design/methodology/approach
The conceptual model highlights the interrelationships between the various elements of the assurance context, including system boundaries, stakeholders, security concerns, regulatory compliance and assurance assumptions and regulatory compliance.
Findings
By introducing the proposed conceptual model, this research provides a framework for incorporating the assurance context into SAEs and offers insights into how it can influence the evaluation outcomes.
Originality/value
By delving into the concept of assurance context, this research seeks to shed light on how it influences the scope, methodologies and outcomes of assurance evaluations, ultimately enabling organizations to strengthen their system security postures and mitigate risks effectively.
Details
Keywords
Xiangfeng Chen, Chuanjun Liu and Zhaolong Yang
In China, supply chain finance (SCF) has gradually emerged as a new service for the retail industry. This case systematically discusses how JD conducts product design and risk…
Abstract
In China, supply chain finance (SCF) has gradually emerged as a new service for the retail industry. This case systematically discusses how JD conducts product design and risk control of supply chain finance and related financial services, and analyze the impact of supply chain finance on JD's retail operations. The case also analyzes the relationship between JD supply chain finance and traditional financial institutions, and explore the future development of retail supply chain finance.
Miguel Calvo and Marta Beltrán
This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it…
Abstract
Purpose
This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it and makes it much easier to use has been proposed too. Both, the method and the framework, have been validated within two challenging application domains: continuous risk assessment within a smart farm and risk-based adaptive security to reconfigure a Web application firewall.
Design/methodology/approach
The authors have identified a problem and provided motivation. They have developed their theory and engineered a new method and a framework to complement it. They have demonstrated the proposed method and framework work, validating them in two real use cases.
Findings
The GQM method, often applied within the software quality field, is a good basis for proposing a method to define new tailored cyber risk metrics that meet the requirements of current application domains. A comprehensive framework that formalises possible goals and questions translated to potential measurements can greatly facilitate the use of this method.
Originality/value
The proposed method enables the application of the GQM approach to cyber risk measurement. The proposed framework allows new cyber risk metrics to be inferred by choosing between suggested goals and questions and measuring the relevant elements of probability and impact. The authors’ approach demonstrates to be generic and flexible enough to allow very different organisations with heterogeneous requirements to derive tailored metrics useful for their particular risk management processes.
Details
Keywords
Elena Isabel Vazquez Melendez, Paul Bergey and Brett Smith
This study aims to examine the blockchain landscape in supply chain management by drawing insights from academic and industry literature. It identifies the key drivers…
Abstract
Purpose
This study aims to examine the blockchain landscape in supply chain management by drawing insights from academic and industry literature. It identifies the key drivers, categorizes the products involved and highlights the business values achieved by early adopters of blockchain technology within the supply chain domain. Additionally, it explores fingerprinting techniques to establish a robust connection between physical products and the blockchain ledger.
Design/methodology/approach
The authors combined the interpretive sensemaking systematic literature review to offer insights into how organizations interpreted their business challenges and adopted blockchain technology in their specific supply chain context; content analysis (using Leximancer automated text mining software) for concept mapping visualization, facilitating the identification of key themes, trends and relationships, and qualitative thematic analysis (NVivo) for data organization, coding and enhancing the depth and efficiency of analysis.
Findings
The findings highlight the transformative potential of blockchain technology and offer valuable insights into its implementation in optimizing supply chain operations. Furthermore, it emphasizes the importance of product provenance information to consumers, with blockchain technology offering certainty and increasing customer loyalty toward brands that prioritize transparency.
Research limitations/implications
This research has several limitations that should be acknowledged. First, there is a possibility that some relevant investigations may have been missed or omitted, which could impact the findings. In addition, the limited availability of literature on blockchain adoption in supply chains may restrict the scope of the conclusions. The evolving nature of blockchain adoption in supply chains also poses a limitation. As the technology is in its infancy, the authors expect that a rapidly emerging body of literature will provide more extensive evidence-based general conclusions in the future. Another limitation is the lack of information contrasting academic and industry research, which could have provided more balanced insights into the technology’s advancement. The authors attributed this limitation to the narrow collaborations between academia and industry in the field of blockchain for supply chain management.
Practical implications
Practitioners recognize the potential of blockchain in addressing industry-specific challenges, such as ensuring transparency and data provenance. Understanding the benefits achieved by early adopters can serve as a starting point for companies considering blockchain adoption. Blockchain technology can verify product origin, enable truthful certifications and comply with established standards, reinforcing trust among stakeholders and customers. Thus, implementing blockchain solutions can enhance brand reputation and consumer confidence by ensuring product authenticity and quality. Based on the results, companies can align their strategies and initiatives with their needs and expectations.
Social implications
In essence, the integration of blockchain technology within supply chain provenance initiatives not only influences economic aspects but also brings substantial social impacts by reinforcing consumer trust, encouraging sustainable and ethical practices, combating product counterfeiting, empowering stakeholders and contributing to a more responsible, transparent and progressive socioeconomic environment.
Originality/value
This study consolidates current knowledge on blockchain’s capacity and identifies the specific drivers and business values associated with early blockchain adoption in supply chain provenance. Furthermore, it underscores the critical role of product fingerprinting techniques in supporting blockchain for supply chain provenance, facilitating more robust and efficient supply chain operations.
Details
Keywords
Decision-making, reinforced by artificial intelligence (AI), is predicted to become potent tool within the domain of supply chain management. Considering the importance of this…
Abstract
Purpose
Decision-making, reinforced by artificial intelligence (AI), is predicted to become potent tool within the domain of supply chain management. Considering the importance of this subject, the purpose of this study is to explore the triggers and technological inhibitors affecting the adoption of AI. This study also aims to identify three-dimensional triggers, notably those linked to environmental, social, and governance (ESG), as well as technological inhibitors.
Design/methodology/approach
Drawing upon a six-step systematic review following the preferred reporting items for systematic reviews and meta analysis (PRISMA) guidelines, a broad range of journal publications was recognized, with a thematic analysis under the lens of the ESG framework, offering a unique perspective on factors triggering and inhibiting AI adoption in the supply chain.
Findings
In the environmental dimension, triggers include product waste reduction and greenhouse gas emissions reduction, highlighting the potential of AI in promoting sustainability and environmental responsibility. In the social dimension, triggers encompass product security and quality, as well as social well-being, indicating how AI can contribute to ensuring safe and high-quality products and enhancing societal welfare. In the governance dimension, triggers involve agile and lean practices, cost reduction, sustainable supplier selection, circular economy initiatives, supply chain risk management, knowledge sharing and the synergy between supply and demand. The inhibitors in the technological category present challenges, encompassing the lack of regulations and rules, data security and privacy concerns, responsible and ethical AI considerations, performance and ethical assessment difficulties, poor data quality, group bias and the need to achieve synergy between AI and human decision-makers.
Research limitations/implications
Despite the use of PRISMA guidelines to ensure a comprehensive search and screening process, it is possible that some relevant studies in other databases and industry reports may have been missed. In light of this, the selected studies may not have fully captured the diversity of triggers and technological inhibitors. The extraction of themes from the selected papers is subjective in nature and relies on the interpretation of researchers, which may introduce bias.
Originality/value
The research contributes to the field by conducting a comprehensive analysis of the diverse factors that trigger or inhibit AI adoption, providing valuable insights into their impact. By incorporating the ESG protocol, the study offers a holistic evaluation of the dimensions associated with AI adoption in the supply chain, presenting valuable implications for both industry professionals and researchers. The originality lies in its in-depth examination of the multifaceted aspects of AI adoption, making it a valuable resource for advancing knowledge in this area.
Details