2,336 research outputs found

    Future business and the role of purchasing and supply management: Opportunities for ‘business-not-as-usual’ PSM research

    Get PDF
    The raison d'ĂȘtre for this article is simple: traditional ways of researching, theorizing, and practicing purchasing and supply management (PSM) are no longer sufficient to ‘meet the moment’. Scholars need to advance a “business-not-as-usual” footing approach to their work, if they are to make a meaningful contribution to addressing the current and future emergencies, as highlighted by recent extreme weather and the COVID-19 pandemic. Yet, what can this, or should this, mean for a field rooted in traditional business thinking? This article builds on the Journal of Purchasing and Supply Management's (JPSM) 25th Anniversary Special Issue editorial (2019); members of the JPSM's editorial team advance their unique perspectives on what “business-not-as-usual” means for PSM. Specifically, we advocate both thinking much more widely, in scope and ambition, than we currently do, and simultaneously building our ability to comprehend supply chains in a more nuanced and granular way. We explore whether the bias toward positivist work has omitted potentially interesting findings, and viewpoints. This leads to a call to re-think how we approach our work: should the key criteria always be to focus on theory development or testing? Should academics “think bigger”? Turning to specific research themes, illustrations of how our current thinking can be challenged or broadened by addressing the circular economy, and role of purchasing and innovation. Specifically, the focus on the PSM function as an intrapreneur within the larger organization, and the role of innovation and technology in PSM work. Taken together, we hope the ideas and arguments presented here will inform and inspire ambitious and novel approaches to PSM research with significant and enduring impact on the transformation of business

    ‘They’re all about pushing the products and shiny things rather than fundamental security’: Mapping socio-technical challenges in securing the smart home

    Get PDF
    Insecure connected devices can cause serious threats not just to smart home-owners, but also the underlying infrastructural network. There has been increasing academic and regulatory interest in addressing cybersecurity risks from both the standpoint of IoT vendors and that of end-users. In addition to the current data protection and network security legal frameworks, for example, the UK government has initiated the ‘Secure by Design’ campaign. While there has been work on how organisations and individuals manage their own cybersecurity risks, it remains unclear to what extent IoT vendors are supporting end-users to perform day-to-day management of such risks, and what is stopping the vendors from improving such support. We interviewed 13 experts in the field of IoT and identified three main categories of barriers to making IoT products useably secure: technical, legal and organisational. In this paper we further discuss the policymaking implications of these findings and make some recommendations

    What Ukraine Taught NATO about Hybrid Warfare

    Get PDF
    Russia’s invasion of Ukraine in 2022 forced the United States and its NATO partners to be confronted with the impact of hybrid warfare far beyond the battlefield. Targeting Europe’s energy security, Russia’s malign influence campaigns and malicious cyber intrusions are affecting global gas prices, driving up food costs, disrupting supply chains and grids, and testing US and Allied military mobility. This study examines how hybrid warfare is being used by NATO’s adversaries, what vulnerabilities in energy security exist across the Alliance, and what mitigation strategies are available to the member states. Cyberattacks targeting the renewable energy landscape during Europe’s green transition are increasing, making it urgent that new tools are developed to protect these emerging technologies. No less significant are the cyber and information operations targeting energy security in Eastern Europe as it seeks to become independent from Russia. Economic coercion is being used against Western and Central Europe to stop gas from flowing. China’s malign investments in Southern and Mediterranean Europe are enabling Beijing to control several NATO member states’ critical energy infrastructure at a critical moment in the global balance of power. What Ukraine Taught NATO about Hybrid Warfare will be an important reference for NATO officials and US installations operating in the European theater.https://press.armywarcollege.edu/monographs/1952/thumbnail.jp

    Future Implications of Emerging Disruptive Technologies on Weapons of Mass Destruction

    Get PDF
    This report asks the questions: What are the future implications of Emerging Disruptive Technologies (EDTs) on the future of Weapons of Mass Destruction (WMD) warfare? How might EDTs increase the lethality and effectiveness of WMDs in kinetic warfare in 2040? How can civic leaders and public servants prepare for and mitigate projected threats? Problem  In the coming decade, state and non-state adversaries will use EDTs to attack systems and populations that may initiate and accelerate existing geopolitical conflict escalation. EDTs are expected to be used both in the initial attack or escalation as well as a part of the detection and decision-making process. Due to the speed of EDTs, expected confusion, and common lack of human oversight, attacks will also be incorrectly attributed, which has the capacity to escalate rapid geopolitical conflict to global military conflict, and ultimately, to the use of nuclear WMDs. The use of EDTs in the shadow of nuclear WMDs is also expected to create an existential threat to possible adversaries, pushing them to “lower the bar” of acceptability for using nuclear WMDs. EDTs will enable and embolden insider threats, both willing and unknowing, to effect geopolitical conflict on a global scale. In addition, the combination of multiple EDTs when used together for attacks will create WMD effects on populations and governments. Furthermore, EDTs will be used by adversaries to target and destabilize critical infrastructure systems, such as food, energy, and transportation, etc. that will have a broader effect on populations and governments. EDTs will enable adversaries to perpetrate a long-game attack, where the effect and attribution of the attack may not be detected for an extended period -- if ever. Solution  To combat these future threats, organizations will need to conduct research and intelligence gathering paired with exploratory research and development to better understand the state of EDTs and their potential impacts. With this information, organizations will need to conduct collaborative “wargaming” and planning to explore a range of possible and potential threats of EDTs. The knowledge gained from all of these activities will inform future training and best practices to prepare for and address these threats. Organizations will also need to increase their investments in EDT related domains, necessitating countries to not only change how they fight, but also evolve their thinking about deterrence. Expanded regulation, policy making, and political solidarity among members will take on an increasingly more significant and expanded role. Broader government, military, and civilian cooperation will be needed to disrupt and mitigate some of these future threats in conjunction with broader public awareness. All of these actions will place a higher value on cooperation and shared resiliency among NATO members

    Enabling NATO’s Collective Defense: Critical Infrastructure Security and Resiliency (NATO COE-DAT Handbook 1)

    Get PDF
    In 2014 NATO’s Center of Excellence-Defence Against Terrorism (COE-DAT) launched the inaugural course on “Critical Infrastructure Protection Against Terrorist Attacks.” As this course garnered increased attendance and interest, the core lecturer team felt the need to update the course in critical infrastructure (CI) taking into account the shift from an emphasis on “protection” of CI assets to “security and resiliency.” What was lacking in the fields of academe, emergency management, and the industry practitioner community was a handbook that leveraged the collective subject matter expertise of the core lecturer team, a handbook that could serve to educate government leaders, state and private-sector owners and operators of critical infrastructure, academicians, and policymakers in NATO and partner countries. Enabling NATO’s Collective Defense: Critical Infrastructure Security and Resiliency is the culmination of such an effort, the first major collaborative research project under a Memorandum of Understanding between the US Army War College Strategic Studies Institute (SSI), and NATO COE-DAT. The research project began in October 2020 with a series of four workshops hosted by SSI. The draft chapters for the book were completed in late January 2022. Little did the research team envision the Russian invasion of Ukraine in February this year. The Russian occupation of the Zaporizhzhya nuclear power plant, successive missile attacks against Ukraine’s electric generation and distribution facilities, rail transport, and cyberattacks against almost every sector of the country’s critical infrastructure have been on world display. Russian use of its gas supplies as a means of economic warfare against Europe—designed to undermine NATO unity and support for Ukraine—is another timely example of why adversaries, nation-states, and terrorists alike target critical infrastructure. Hence, the need for public-private sector partnerships to secure that infrastructure and build the resiliency to sustain it when attacked. Ukraine also highlights the need for NATO allies to understand where vulnerabilities exist in host nation infrastructure that will undermine collective defense and give more urgency to redressing and mitigating those fissures.https://press.armywarcollege.edu/monographs/1951/thumbnail.jp

    Cybersecurity: Past, Present and Future

    Full text link
    The digital transformation has created a new digital space known as cyberspace. This new cyberspace has improved the workings of businesses, organizations, governments, society as a whole, and day to day life of an individual. With these improvements come new challenges, and one of the main challenges is security. The security of the new cyberspace is called cybersecurity. Cyberspace has created new technologies and environments such as cloud computing, smart devices, IoTs, and several others. To keep pace with these advancements in cyber technologies there is a need to expand research and develop new cybersecurity methods and tools to secure these domains and environments. This book is an effort to introduce the reader to the field of cybersecurity, highlight current issues and challenges, and provide future directions to mitigate or resolve them. The main specializations of cybersecurity covered in this book are software security, hardware security, the evolution of malware, biometrics, cyber intelligence, and cyber forensics. We must learn from the past, evolve our present and improve the future. Based on this objective, the book covers the past, present, and future of these main specializations of cybersecurity. The book also examines the upcoming areas of research in cyber intelligence, such as hybrid augmented and explainable artificial intelligence (AI). Human and AI collaboration can significantly increase the performance of a cybersecurity system. Interpreting and explaining machine learning models, i.e., explainable AI is an emerging field of study and has a lot of potentials to improve the role of AI in cybersecurity.Comment: Author's copy of the book published under ISBN: 978-620-4-74421-

    Future business and the role of purchasing and supply management:Opportunities for ‘business-not-as-usual’ PSM research

    Get PDF
    The raison d'ĂȘtre for this article is simple: traditional ways of researching, theorizing, and practicing purchasing and supply management (PSM) are no longer sufficient to ‘meet the moment’. Scholars need to advance a “business-not-as-usual” footing approach to their work, if they are to make a meaningful contribution to addressing the current and future emergencies, as highlighted by recent extreme weather and the COVID-19 pandemic. Yet, what can this, or should this, mean for a field rooted in traditional business thinking? This article builds on the Journal of Purchasing and Supply Management's (JPSM) 25th Anniversary Special Issue editorial (2019); members of the JPSM's editorial team advance their unique perspectives on what “business-not-as-usual” means for PSM. Specifically, we advocate both thinking much more widely, in scope and ambition, than we currently do, and simultaneously building our ability to comprehend supply chains in a more nuanced and granular way. We explore whether the bias toward positivist work has omitted potentially interesting findings, and viewpoints. This leads to a call to re-think how we approach our work: should the key criteria always be to focus on theory development or testing? Should academics “think bigger”? Turning to specific research themes, illustrations of how our current thinking can be challenged or broadened by addressing the circular economy, and role of purchasing and innovation. Specifically, the focus on the PSM function as an intrapreneur within the larger organization, and the role of innovation and technology in PSM work. Taken together, we hope the ideas and arguments presented here will inform and inspire ambitious and novel approaches to PSM research with significant and enduring impact on the transformation of business

    AN ANALYSIS OF PROCUREMENT ACQUISITION LEAD TIME (PALT) AND ACQUISITION LEAD TIME (ALT) IN THE DEPARTMENT OF DEFENSE (DOD)

    Get PDF
    We evaluate the Department of Defense (DOD) Procurement Acquisition Lead Time (PALT), as it produces a vital role toward the fielding weapon systems to support our warfighters at the speed of relevance. We examine the roles of the contracting processes and associated PALT by gaining knowledge based off previous topic-related research including but not limited to: peer-review articles, theses, governing regulations, and real-life PALT data provided by a Naval Surface Warfare Center. We discuss the impact on actual real-world situations such as political agendas and worldwide events similar to the pandemic, and how it plays a role on PALT today and the influence that may arise as a nation. We studied the acquisition professional’s duties at the higher-level DOD Program Objective Memorandum (POM) and the Planning, Programming, Budgeting, and Execution (PPBE) process. From this analysis, we developed recommendations for acquisition professionals to effectively and efficiently navigate within the constraint of the POM and PPBE five-year cycle.Civilian, Department of the NavyCivilian, Department of the NavyCivilian, Department of the NavyApproved for public release. Distribution is unlimited
    • 

    corecore