Search results

1 – 10 of over 2000
Article
Publication date: 10 March 2021

Yair Levy and Ruti Gafni

This paper aims to introduce the concept of cybersecurity footprint.

1071

Abstract

Purpose

This paper aims to introduce the concept of cybersecurity footprint.

Design/methodology/approach

Characteristics of cybersecurity footprint are presented based on documented cases, and the domino effect of cybersecurity is illustrated. Organizational and individual cybersecurity footprints are outlined. Active and passive – digital vs cybersecurity footprints are then reviewed. Taxonomy of aware/unaware vs active/passive cybersecurity footprints are presented, followed by brief discussion of the implications for future research.

Findings

The concept of cybersecurity footprint is defined, and the evidence from prior cyber incidents is shown to emphasize the concept. Smaller organizations may have a large cybersecurity footprint, whereas larger organizations may have smaller one. Cyberattacks are focusing on the individuals or small organizations that are in the supply chain of larger organizations causing the domino effect.

Practical implications

Implications of cybersecurity footprint to individuals, organizations, societies and governments are discussed. The authors present organizations with ways to lower cybersecurity footprint along with recommendations for future research.

Social implications

Cybersecurity has a significant social implication worldwide, as the world is becoming cyber dependent. With the authors’ introduction of the cybersecurity footprint concept and call to further understand how organizations can measure and reduce it, the authors envision it as another perspective of assessing cyber risk and further help mitigate future cyber incidents.

Originality/value

This paper extends the existing information and computer security body of knowledge on the concept of cybersecurity footprint with illustrated cases.

Article
Publication date: 4 November 2013

LaDonna M. Thornton, Terry L. Esper and Michael L. Morris

– The purpose of this research is to investigate the dynamics and dimensions of behaviors of supply chain employees that may impede the success of supply chain relationships.

2181

Abstract

Purpose

The purpose of this research is to investigate the dynamics and dimensions of behaviors of supply chain employees that may impede the success of supply chain relationships.

Design/methodology/approach

A grounded theory qualitative method was used to explore the concept of counterproductive work behavior in a supply chain context.

Findings

Through analysis and evaluation of the data, five key supply chain counterproductive work behaviors (avoiding, withholding, emoting, confounding, and shifting) emerged. Overall, these behaviors are associated with perceived contract breaches, which undermines trust within supply chain relationships.

Research limitations/implications

This work provides a basis for researchers to explore counterproductive work behaviors within supply chain management and managers to consider these behaviors in relational exchange. Future research can build on the insights provided here by applying quantitative methods to exploring the phenomenon and investigating counterproductive behaviors from the actor's perspective.

Originality/value

This research provides an overarching framework for relationship management behaviors that may detract from supply chain relationships. Research has previously explored these types of behaviors in a segmented fashion. This work takes a comprehensive look at behaviors and through evaluation of the data, relational and informational contract breaches emerge. The data suggests these contract breaches may undermine the trust within supply chain relationships.

Details

International Journal of Physical Distribution & Logistics Management, vol. 43 no. 9
Type: Research Article
ISSN: 0960-0035

Keywords

Article
Publication date: 7 December 2015

Tobias Schoenherr, Ram Narasimhan and Piyas (P) Bandyopadhyay

– Taking a social network perspective, the purpose of this paper is to develop a framework for the assurance of food safety via relational networking.

2037

Abstract

Purpose

Taking a social network perspective, the purpose of this paper is to develop a framework for the assurance of food safety via relational networking.

Design/methodology/approach

The authors consider both informal and formal relational networking, and explore a firm’s learning orientation, risk aversion and consumer pressure as potential precursors to such relational networking. It is further hypothesized that relational networking generates both industry and supply chain knowledge, which is suggested to be beneficial for contamination detection. The model is tested with survey data collected among food-producing firms in India, the world’s second largest food producer.

Findings

The authors find a positive influence of consumer pressure on both a firm’s learning orientation and risk aversion, which in turn affect both informal and formal relational networking. Informal networking further generated industry knowledge and was beneficial for contamination detection. Formal relational networking influenced supply chain knowledge, which in turn enabled contamination detection.

Originality/value

Recent food product-related safety breaches, which have, in the worst case, led to fatalities, illustrate the importance of food safety in supply chains. This study represents the first systematic investigation of relational networking in the context of food safety from the perspective of social network theory.

Details

International Journal of Operations & Production Management, vol. 35 no. 12
Type: Research Article
ISSN: 0144-3577

Keywords

Article
Publication date: 23 May 2008

Chad W. Autry and L. Michelle Bobbitt

This paper aims to report on an exploratory study investigating supply chain security orientation (SCSO), a firm‐level construct addressing companies' multiple approaches toward…

4308

Abstract

Purpose

This paper aims to report on an exploratory study investigating supply chain security orientation (SCSO), a firm‐level construct addressing companies' multiple approaches toward mitigation of supply chain security breaches and supply chain risk management.

Design/methodology/approach

Structured interviews were conducted with managers who were responsible for firms' supply chain security efforts. The resulting data were content analyzed and critical themes presented depicting SCSO.

Findings

Key antecedents, outcomes, and moderating conditions were identified based on the qualitative data. Four primary dimensions of the SCSO concept are revealed.

Originality/value

The major contribution of the paper is the delineation of the components of SCSO, which appear to be pervasive across firms. Additionally, several drivers of SCSO are identified, and SCSO is linked to positive financial and customer outcomes, as well as supply chain continuity.

Details

The International Journal of Logistics Management, vol. 19 no. 1
Type: Research Article
ISSN: 0957-4093

Keywords

Article
Publication date: 10 June 2021

Sindhuja P.N.

Information security is an essential element in all business activities. The damage to businesses from information security breaches has become pervasive. The scope of information…

Abstract

Purpose

Information security is an essential element in all business activities. The damage to businesses from information security breaches has become pervasive. The scope of information security has widened as information has become a critical supply chain asset, making it more important to protect the organization’s data. Today’s global supply chains rely upon the speedy and robust dissemination of information among supply chain partners. Hence, processing of accurate supply chain information is quintessential to ensure the robustness and performance of supply chains. An effective information security management (ISM) is deemed to ensure the robustness of supply chains. The purpose of the paper is to examine the impact of information security initiatives on supply chain robustness and performance.

Design/methodology/approach

Based on extant literature, a research model was developed and validated using a questionnaire survey instrument administered among information systems/information technology managers. Data collected were analyzed using exploratory and confirmatory factor analysis. Further, to test the hypotheses and to fit the theoretical model, Structural equation modeling techniques were used.

Findings

Results of this study indicated that information security initiatives are positively associated with supply chain robustness and performance. These initiatives are likely to enhance the robustness and performance of the supply chains.

Originality/value

With the advancements in internet technologies and capabilities as well as considering the dynamic environment of supply chains, this study is relevant in terms of the capability that an organization needs to acquire with regards to ISM. Benefiting from the resource dependency theory, information security initiatives could be considered as a critical resource having an influence on the internal and external environment of supply chains.

Details

Information & Computer Security, vol. 29 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 19 October 2012

Olatunde Amoo Durowoju, Hing Kai Chan and Xiaojun Wang

Manufacturing organizations and networks are heavily dependent on the flow of information within and across organization boundaries. A disruption in information flow might…

2076

Abstract

Purpose

Manufacturing organizations and networks are heavily dependent on the flow of information within and across organization boundaries. A disruption in information flow might interrupt the operations of the organization and make management even more difficult. The purpose of this paper is to incorporate information theory approach to investigate the perturbation introduced into a manufacturing organization as a result of disruption in the flow of critical information needed in manufacturing operations.

Design/methodology/approach

This study proposes the use of entropy theory to assess the level of risk introduced by different sources of perturbation into the material flow stream and the use of discrete event simulation to investigate the impact of the resulting disruption on collaborating members.

Findings

The result of the analysis carried out on the effect of system failure on supply chain performance revealed that the retailer experiences the most uncertainty in the supply chain while the holding cost constitutes the most unpredictable cost measure when a system failure breach occurs. For the manufacturer and wholesaler, the holding cost is responsible for most of the uncertainty in predicting the impact of the threat on inventory management cost, while the backlog cost holds the highest complexity level for the retailer.

Practical implications

Once this methodology is well developed for use in industrial networks, it can serve as a risk assessment, risk monitoring and risk prediction tool. The paper also calls for a proactive approach to disruption risk management.

Originality/value

This paper proposes a novel approach to assess the impact of information disruption, using entropy theory coupled with simulation methodology.

Article
Publication date: 15 August 2008

Zachary Williams, Jason E. Lueg and Stephen A. LeMay

Supply chain security (SCS), as a component of an organization's overall supply chain risk management strategy, has become a critical factor for businesses and government agencies…

6469

Abstract

Purpose

Supply chain security (SCS), as a component of an organization's overall supply chain risk management strategy, has become a critical factor for businesses and government agencies since September 11, 2001, yet little empirical research supports policy or practice for the field. Therefore, this paper develops and presents a categorization of SCS based on existing research. This categorization of supply chain literature can help academics and practitioners to better understand SCS and also helps to identify a research agenda. Setting a research agenda for SCS will help academic and practitioner research focus on critical issues surrounding SCS.

Design/methodology/approach

The researchers thoroughly reviewed the literature on SCS, including academic publications, white papers, and practitioner periodicals. The literature was then categorized according to the approach to SCS and the practical implications of this categorization are presented. In addition, this categorization was used to identify research gaps.

Findings

This analysis found that SCS needs more attention from the academic community. Like earlier assessments of this literature, this analysis found it to be mainly normative, with little research based on primary data. This paper categorizes the literature into four approaches to SCS: intraorganizational, interorganizational, a combination of intraorganizational and interorganizational, and ignore. This study develops a focused agenda for future, primary, empirical research on SCS.

Research limitations/implications

The sources of data for this literature review are secondary. The review sets a research agenda and calls for future empirical testing.

Practical implications

Practitioners will benefit from the framework presented here by better understanding approaches to SCS. This comprehensive review discusses the characteristics of SCS in great depth. As other researchers follow the research agenda, practitioners will benefit from the empirical findings and theory building.

Originality/value

This paper summarizes the literature on SCS to date, a topic that has grown in importance, yet received little attention from academics. This is the first comprehensive literature review of SCS. It includes a categorization of four possible approaches to SCS. It also distinguishes SCS from supply chain risk, while also recognizing their relationship. It identifies key issues in SCS research and calls for future research.

Details

The International Journal of Logistics Management, vol. 19 no. 2
Type: Research Article
ISSN: 0957-4093

Keywords

Book part
Publication date: 12 January 2012

Hokey Min

Despite a hangover from the worldwide economic crisis, international trade rebounded nicely with a record-level growth in late 2010. A sharp rise in international trade has…

Abstract

Despite a hangover from the worldwide economic crisis, international trade rebounded nicely with a record-level growth in late 2010. A sharp rise in international trade has sparked the international traffic growth. A majority of this traffic growth originated from maritime logistics which could move cargoes in large volume and at cheaper freight costs. Due to its cost-efficiency and easy access, maritime logistics typically accounts for more than half of the worldwide freight volume. However, maritime logistics poses a greater supply chain risk, since ocean carriers used for maritime logistics are more vulnerable to unpredictable weather conditions, piracy attacks, terrorist hijacking, and cargo damages on the open sea than any other modes of transportation. Also, given the vast areas that maritime logistics covers, it is more difficult to protect maritime logistics activities from potential hazards and threats.

To better protect maritime logistics activities from potential security lapses, this chapter introduces and develops a variety of systematic security measures and tools that were successfully used by best-in-class companies and government entities across the world. Also, this chapter proposes a total maritime security management model as a way to formulate maritime risk mitigation strategies. To elaborate, this chapter sheds light on the roots of maritime security measures and tools, the ways that those measures and tools are best utilized, the roles of advanced information technology in maritime security from the global supply chain perspectives, the visualization and identification of potential maritime and its related supply chain risks, and policy guidelines that will help enhance maritime security.

Article
Publication date: 8 August 2018

Satyendra Kumar Sharma, Ravinder Singh and Rajesh Matai

Strategic sourcing and supply risk management have become interesting topics of research in the recent years. Automotive industry experts are increasingly focussing on improving…

1187

Abstract

Purpose

Strategic sourcing and supply risk management have become interesting topics of research in the recent years. Automotive industry experts are increasingly focussing on improving the supply efficiency and performance towards gaining sustainable competitive advantage. This study aims to classify, through an exhaustive review of past literature, the various enablers and barriers of strategic sourcing risk management (SSRM) and use them to identify the problems in the automobile sector.

Design/methodology/approach

For the purpose of this research, responses were collected through structured questionnaire from respondents belonging to senior management cadre in the industry. Factor analysis and force field analysis tools have been used for analysis.

Findings

Through independent exploratory factor analysis (EFA), four SSRM enablers, namely, supplier risk assessment, data sharing in supply network, partnership with supplier and supply flexibility, were identified. Similarly EFA revealed four SSRM barriers, namely, cost focus, ad hoc or poor planning, data security/privy breaches and hard visualization of SSRM benefits. Through a force field analysis, it was found out that the barriers had a higher impact on the SSRM initiatives than enablers.

Practical implications

The research suggests the ways how managers can reduce the impact of barriers and increase the enabling forces.

Originality/value

This paper enumerates the barriers and enablers together on the same platform to prioritize and evolve strategies to overpower the barriers and strengthen the enablers.

Details

Measuring Business Excellence, vol. 22 no. 3
Type: Research Article
ISSN: 1368-3047

Keywords

Article
Publication date: 2 December 2019

Abhijeet Ghadge, Maximilian Weiß, Nigel D. Caldwell and Richard Wilding

In spite of growing research interest in cyber security, inter-firm based cyber risk studies are rare. Therefore, this study aims to investigate cyber risk management in supply

6596

Abstract

Purpose

In spite of growing research interest in cyber security, inter-firm based cyber risk studies are rare. Therefore, this study aims to investigate cyber risk management in supply chain contexts.

Design/methodology/approach

Adapting a systematic literature review process, papers from interdisciplinary areas published between 1990 and 2017 were selected. Different typologies, developed for conducting descriptive and thematic analysis, were established using data mining techniques to conduct a comprehensive, replicable and transparent review.

Findings

The review identifies multiple future research directions for cyber security/resilience in supply chains. A conceptual model is developed, which indicates a strong link between information technology, organisational and supply chain security systems. The human/behavioural elements within cyber security risk are found to be critical; however, behavioural risks have attracted less attention because of a perceived bias towards technical (data, application and network) risks. There is a need for raising risk awareness, standardised policies, collaborative strategies and empirical models for creating supply chain cyber-resilience.

Research limitations/implications

Different types of cyber risks and their points of penetration, propagation levels, consequences and mitigation measures are identified. The conceptual model developed in this study drives an agenda for future research on supply chain cyber security/resilience.

Practical implications

A multi-perspective, systematic study provides a holistic guide for practitioners in understanding cyber-physical systems. The cyber risk challenges and the mitigation strategies identified support supply chain managers in making informed decisions.

Originality/value

To the best of the authors’ knowledge, this is the first systematic literature review on managing cyber risks in supply chains. The review defines supply chain cyber risk and develops a conceptual model for supply chain cyber security systems and an agenda for future studies.

1 – 10 of over 2000