Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Supply chain security

Estabhsh standards that provide supply chain security and facilitation at a global level to promote certainty and predictability... [Pg.116]

Hau (2004) Case study Supply chain security Discusses implementation of RFID to enhance supply chain security in international shipping... [Pg.443]

Hau, L. L. 2004. Supply chain security Are you ready Stanford Global Supply Chain Management Forum. September 3, 2004 1-16. [Pg.447]

Starting materials compliance and supply chain security... [Pg.541]

Supply chain risk management (SCRM) is supported by two concepts with supply chain security management (SCSM) and the business continuity management (BCM). All three concepts - i.e. SCRM, SCSM and BCM -are based on risk analysis and constitute a comprehensive approach to the assessment of, reducing of and response to various threats to supply chains (Wieteska 2012b). [Pg.142]

C-TPAT, 2006, Supply Chain Security Best Practices Catalog, Customs Trade Partnership against Terrorism (C-TPAT), U.S. Customs and Border Protection, pp. 1-49. [Pg.158]

Peleg-Gillal B., Bhat G., Sept L., 2006, Innovators in Supply Chain Security Better Security Drives Business Value, Stanford, CA Stanford University Manufacturing Institute. [Pg.159]

Rice J.B., Spayd F.W., 2005, Investing in Supply Chain Security Collateral Benefits, Center for the Business of Government, IBM. [Pg.159]

WiUiam Z., Leug J.E., LeMay S.A., 2008, Supply Chain Security An Overview and Research Agenda, International loumal of Logistics Management, 19(2), pp. 254-258. [Pg.159]

Efforts to Solve Supply Chain Security Problems.337... [Pg.1]

Developing and applying performance standards to ensure management of risks where supply chain security is significant. [Pg.14]

Lee, H. and Whang, S. (2003) Higher supply chain security with lower cost lessons from total quality management . Working paper. Graduate School of Business, Stanford University. [Pg.65]

Lee H, Wolfe M (2003) Supply Chain Security Without Tears. Supply Chain Management Review, January/February issue, pp. 12-20. [Pg.173]

Chapter 18 Food Supply Chain Security Issues and Implications... [Pg.293]

Supply chain managers do more than coordinate flows efficiently and effectively, but must also simultaneously protect the supply chain and its stakeholders from harm. The study of supply chain security management emerged from this dilemma. Supply chain security management is defined as, the application of policies, procedures, and technology to protect supply chain assets (product, fecilities, equipment, information, and personnel) from theft, damage, or terrorism, and to prevent the introduction of unauthorized contraband, people, or weapons of mass destruction into the supply chain (Closs and McGarrell 2004 p. 8). [Pg.294]

Importance and Challenges of Food Supply Chain Security... [Pg.295]

In addition, food supply chain security is important because the food supply chain is vulnerable to both unintended as well as intended supply disraption. The food supply chain is vulnerable for mat r reasons. First and foremost, food is susceptible to unintentional dismptions that conld occur via disease (e.g., Asian bird flu), blight, infestation, improper handling, and perishability. Second, the food supply chain is vulnerable to intentional harm. Harl (2002) identified seven general areas of security susceptibility, and five of those areas relate to the agri-food supply chain. Further, on average food travels 1,300 miles from farm to fork (Harl 2002) which creates a ready-made distribution channel for rapid and widespread disruption (Bmenuner 2003). [Pg.295]

Rice and Caniato (2003) discussed the emerging expectations with respect to supply chain security when they described the need for creating both secure supply chains (e.g., supply chains that maintain advanced security processes/procedures) and resilient supply chains (e.g., supply chains that are able to react quickly and restore operations when unexpected sruptions occur). Given the widespread nature of the food supply chain, creating both a secure supply chain as well as a resilient supply chain is of utmost importance. [Pg.295]

Beginning in 2005, a research team at Michigan State University embarked on an initiative sponsored by the U.S. Department of Homeland Security, in conjunction with the National Center for Food Protection and Defense (http //www.ncfipd. utnn.edu/), to examine best practices in security management within the food industry. Given the emerging nature of supply chain security and the lack of existing security frameworks, exploratory interviews were conducted in order to better understand the characteristics and current status of supply chain security in the food industry. [Pg.297]

A standard, open-ended interview guide was developed and pre-tested with academic reviewers (from supply chain management, information technology, and criminal justice disciplines) and with industry practitioners familiar with supply chain security issues. The interview guide was stractured, but allowed for the researchers to explore new issues raised during the interview process. [Pg.297]

These security competencies culminate in improved overall supply chain security as presented in Fig. 18.1. Based on the literature review conducted as part of this research as well as the results of the in-depth interviews, it is clear that some firms are more advanced in their security efforts than others. There is a continuum of security initiatives and preparedness. As discussed by Rice and Caniato (2003), security competencies exist at four levels (1) basic - where fundamental security and preparedness activities exist (2) reactive - where a greater awareness exists with respect to security vulnerabilities (3) proactive -where security and resilience practices beyond the norm are adopted and (4) advanced - where a firm exists as a leader in progressive secnrity initiatives and creates a highly resilient supply chain. Given that security is an emerging field, it is not surprising that Rice and Caniato (2003) report few companies have reached the advanced level. [Pg.301]


See other pages where Supply chain security is mentioned: [Pg.142]    [Pg.142]    [Pg.144]    [Pg.145]    [Pg.158]    [Pg.130]    [Pg.110]    [Pg.1]    [Pg.7]    [Pg.12]    [Pg.12]    [Pg.12]    [Pg.13]    [Pg.104]    [Pg.292]    [Pg.293]    [Pg.294]    [Pg.295]    [Pg.297]    [Pg.300]    [Pg.301]    [Pg.302]   
See also in sourсe #XX -- [ Pg.5 , Pg.10 , Pg.11 , Pg.104 , Pg.293 , Pg.294 , Pg.297 , Pg.300 , Pg.301 , Pg.302 , Pg.308 , Pg.309 ]




SEARCH



Encouraging Security Enhanced Supply Chains

Food Supply Chain Security Issues and Implications

Food supply chain security

Secure supplies

Securing Supply Chains Through Capability Development

Supply Chain Security A Dynamic Capabilities Approach

Supply Chain Security Management

Supply chain security orientation

© 2024 chempedia.info