Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Supply Chain Security Management

Supply chain risk management (SCRM) is supported by two concepts with supply chain security management (SCSM) and the business continuity management (BCM). All three concepts - i.e. SCRM, SCSM and BCM -are based on risk analysis and constitute a comprehensive approach to the assessment of, reducing of and response to various threats to supply chains (Wieteska 2012b). [Pg.142]

Security and business continuity management are two major pillars of ERM. The issue of security in ERM covers the following aspects (Province of British Columbia 2012, p. 11)  [Pg.142]

The research conducted among companies operating in Poland shows that they become more interested in information security as they develop. As the amoimt of information increases, so does the need to [Pg.143]

International transport processes are particularly significant with respect to protecting cargo. Security and safety are assiued by relevant organisations. Actions related to maritime transport are carried out by the International Maritime Organisation (IMO) air transport is covered by the International Civil Aviation Organisation (ICAO) and the International Air Transport Association (lATA). [Pg.144]

The European equivalent of C-TPAT is the Authorised Economic Operator (AEO) initiative. There are three types of AEO status AEOC, AEOS, AEOF. They differ from each other in privileges. Through the application of the security requirements a credible company operating on an international scale may gain an efficient and quick flow of goods, thanks to time saved and the reduction of red tape related to international trade and transport. These benefits result from less frequent controls of cargo and documents, easier access to customs simplifications, a reduced amount of data to be included in summary declarations, the possibility of companies receiving earlier notification of delivery controls, priority treatment of the company s shipment in the event of a check, and the possibility for the company to request that a shipment be checked in any location. [Pg.145]


Supply chain managers do more than coordinate flows efficiently and effectively, but must also simultaneously protect the supply chain and its stakeholders from harm. The study of supply chain security management emerged from this dilemma. Supply chain security management is defined as, the application of policies, procedures, and technology to protect supply chain assets (product, fecilities, equipment, information, and personnel) from theft, damage, or terrorism, and to prevent the introduction of unauthorized contraband, people, or weapons of mass destruction into the supply chain (Closs and McGarrell 2004 p. 8). [Pg.294]

Kolluru, R., Meredith, P.H. (2001). Security and trust management in supply chains. Information Management Computer Security, 9(5), 233-236. [Pg.160]

Our personal financial security may depend on how well our employers and our employers supply chain partners manage in the global economy. Many industries will prosper from added jobs if their own countries become the destination for offshoring or outsourcing from other countries. Other industries will founder as competition from abroad moves into their markets. [Pg.97]

Atkins, E. 2003. Top 10 tips to secure your supply chain. Materials Management and Distribution. 13(1) 56-60. [Pg.445]

Hau, L. L. 2004. Supply chain security Are you ready Stanford Global Supply Chain Management Forum. September 3, 2004 1-16. [Pg.447]

WiUiam Z., Leug J.E., LeMay S.A., 2008, Supply Chain Security An Overview and Research Agenda, International loumal of Logistics Management, 19(2), pp. 254-258. [Pg.159]

Target Stores, the North American retaiier, requires its suppiiers to sign an agreement that they wiii compiy with Target s requirements on suppiy chain security and risk management. Pfizer, the pharmaceuticai company, also has clearly established performance standards for its suppliers in terms of supply chain risk management which are audited continuously. [Pg.206]

Developing and applying performance standards to ensure management of risks where supply chain security is significant. [Pg.14]

Lee, H. and Whang, S. (2003) Higher supply chain security with lower cost lessons from total quality management . Working paper. Graduate School of Business, Stanford University. [Pg.65]

Stock, multiple sources and buildiug up supplier inventory. The behaviour-based approach tries to aim for the optimum performance of the existing supply chain through managing the risk directly. The buffer-oriented approach seeks to reduce risks through the use of cushions or buffers. The degree of security grows but at the cost of expensive redundancy. [Pg.134]

Lee H, Wolfe M (2003) Supply Chain Security Without Tears. Supply Chain Management Review, January/February issue, pp. 12-20. [Pg.173]

Beginning in 2005, a research team at Michigan State University embarked on an initiative sponsored by the U.S. Department of Homeland Security, in conjunction with the National Center for Food Protection and Defense (http //www.ncfipd. utnn.edu/), to examine best practices in security management within the food industry. Given the emerging nature of supply chain security and the lack of existing security frameworks, exploratory interviews were conducted in order to better understand the characteristics and current status of supply chain security in the food industry. [Pg.297]

A standard, open-ended interview guide was developed and pre-tested with academic reviewers (from supply chain management, information technology, and criminal justice disciplines) and with industry practitioners familiar with supply chain security issues. The interview guide was stractured, but allowed for the researchers to explore new issues raised during the interview process. [Pg.297]

Lee HL, Whang S (2003) Higher Supply Chain Security with Lower Cost Lessons Ifom Total Quality Management. Stanford Graduate School of Business Research Paper Series, Octoto, 1-28. [Pg.305]


See other pages where Supply Chain Security Management is mentioned: [Pg.142]    [Pg.142]    [Pg.144]    [Pg.293]    [Pg.308]    [Pg.309]    [Pg.310]    [Pg.311]    [Pg.312]    [Pg.312]    [Pg.313]    [Pg.313]    [Pg.142]    [Pg.142]    [Pg.144]    [Pg.293]    [Pg.308]    [Pg.309]    [Pg.310]    [Pg.311]    [Pg.312]    [Pg.312]    [Pg.313]    [Pg.313]    [Pg.43]    [Pg.147]    [Pg.110]    [Pg.12]    [Pg.12]    [Pg.13]    [Pg.104]    [Pg.300]    [Pg.301]    [Pg.303]    [Pg.309]    [Pg.309]    [Pg.310]    [Pg.311]    [Pg.312]    [Pg.313]    [Pg.314]    [Pg.315]    [Pg.326]    [Pg.328]   
See also in sourсe #XX -- [ Pg.293 , Pg.294 , Pg.308 , Pg.309 , Pg.310 , Pg.311 , Pg.312 ]




SEARCH



Managers supplies

Managing Supply

Secure supplies

Security managing

Supply chain security

Supply management

Supply-chain management

© 2024 chempedia.info