2,336 research outputs found
Future business and the role of purchasing and supply management: Opportunities for âbusiness-not-as-usualâ PSM research
The raison d'ĂȘtre for this article is simple: traditional ways of researching, theorizing, and practicing purchasing and supply management (PSM) are no longer sufficient to âmeet the momentâ. Scholars need to advance a âbusiness-not-as-usualâ footing approach to their work, if they are to make a meaningful contribution to addressing the current and future emergencies, as highlighted by recent extreme weather and the COVID-19 pandemic. Yet, what can this, or should this, mean for a field rooted in traditional business thinking? This article builds on the Journal of Purchasing and Supply Management's (JPSM) 25th Anniversary Special Issue editorial (2019); members of the JPSM's editorial team advance their unique perspectives on what âbusiness-not-as-usualâ means for PSM. Specifically, we advocate both thinking much more widely, in scope and ambition, than we currently do, and simultaneously building our ability to comprehend supply chains in a more nuanced and granular way. We explore whether the bias toward positivist work has omitted potentially interesting findings, and viewpoints. This leads to a call to re-think how we approach our work: should the key criteria always be to focus on theory development or testing? Should academics âthink biggerâ? Turning to specific research themes, illustrations of how our current thinking can be challenged or broadened by addressing the circular economy, and role of purchasing and innovation. Specifically, the focus on the PSM function as an intrapreneur within the larger organization, and the role of innovation and technology in PSM work. Taken together, we hope the ideas and arguments presented here will inform and inspire ambitious and novel approaches to PSM research with significant and enduring impact on the transformation of business
âTheyâre all about pushing the products and shiny things rather than fundamental securityâ: Mapping socio-technical challenges in securing the smart home
Insecure connected devices can cause serious threats not just to smart home-owners, but also the underlying infrastructural network. There has been increasing academic and regulatory interest in addressing cybersecurity risks from both the standpoint of IoT vendors and that of end-users. In addition to the current data protection and network security legal frameworks, for example, the UK government has initiated the âSecure by Designâ campaign. While there has been work on how organisations and individuals manage their own cybersecurity risks, it remains unclear to what extent IoT vendors are supporting end-users to perform day-to-day management of such risks, and what is stopping the vendors from improving such support. We interviewed 13 experts in the field of IoT and identified three main categories of barriers to making IoT products useably secure: technical, legal and organisational. In this paper we further discuss the policymaking implications of these findings and make some recommendations
What Ukraine Taught NATO about Hybrid Warfare
Russiaâs invasion of Ukraine in 2022 forced the United States and its NATO partners to be confronted with the impact of hybrid warfare far beyond the battlefield. Targeting Europeâs energy security, Russiaâs malign influence campaigns and malicious cyber intrusions are affecting global gas prices, driving up food costs, disrupting supply chains and grids, and testing US and Allied military mobility. This study examines how hybrid warfare is being used by NATOâs adversaries, what vulnerabilities in energy security exist across the Alliance, and what mitigation strategies are available to the member states.
Cyberattacks targeting the renewable energy landscape during Europeâs green transition are increasing, making it urgent that new tools are developed to protect these emerging technologies. No less significant are the cyber and information operations targeting energy security in Eastern Europe as it seeks to become independent from Russia. Economic coercion is being used against Western and Central Europe to stop gas from flowing. Chinaâs malign investments in Southern and Mediterranean Europe are enabling Beijing to control several NATO member statesâ critical energy infrastructure at a critical moment in the global balance of power. What Ukraine Taught NATO about Hybrid Warfare will be an important reference for NATO officials and US installations operating in the European theater.https://press.armywarcollege.edu/monographs/1952/thumbnail.jp
Future Implications of Emerging Disruptive Technologies on Weapons of Mass Destruction
This report asks the questions: What are the future implications of Emerging Disruptive Technologies (EDTs) on the future of Weapons of Mass Destruction (WMD) warfare? How might EDTs increase the lethality and effectiveness of WMDs in kinetic warfare in 2040?âŻHow can civic leaders and public servants prepare for and mitigate projected threats?
ProblemâŻ
In the coming decade, state and non-state adversaries will use EDTs to attack systems and populations that may initiate and accelerate existing geopolitical conflict escalation. EDTs are expected to be used both in the initial attack or escalation as well as a part of the detection and decision-making process. Due to the speed of EDTs, expected confusion, and common lack of human oversight, attacks will also be incorrectly attributed, which has the capacity to escalate rapid geopolitical conflict to global military conflict, and ultimately, to the use of nuclear WMDs.
The use of EDTs in the shadow of nuclear WMDs is also expected to create an existential threat to possible adversaries, pushing them to âlower the barâ of acceptability for using nuclear WMDs. EDTs will enable and embolden insider threats, both willing and unknowing, to effect geopolitical conflict on a global scale.
In addition, the combination of multiple EDTs when used together for attacks will create WMD effects on populations and governments. Furthermore, EDTs will be used by adversaries to target and destabilize critical infrastructure systems, such as food, energy, and transportation, etc. that will have a broader effect on populations and governments. EDTs will enable adversaries to perpetrate a long-game attack, where the effect and attribution of the attack may not be detected for an extended period -- if ever.
SolutionâŻ
To combat these future threats, organizations will need to conduct research and intelligence gathering paired with exploratory research and development to better understand the state of EDTs and their potential impacts. With this information, organizations will need to conduct collaborative âwargamingâ and planning to explore a range of possible and potential threats of EDTs. The knowledge gained from all of these activities will inform future training and best practices to prepare for and address these threats.
Organizations will also need to increase their investments in EDT related domains, necessitating countries to not only change how they fight, but also evolve their thinking about deterrence. Expanded regulation, policy making, and political solidarity among members will take on an increasingly more significant and expanded role. Broader government, military, and civilian cooperation will be needed to disrupt and mitigate some of these future threats in conjunction with broader public awareness. All of these actions will place a higher value on cooperation and shared resiliency among NATO members
Enabling NATOâs Collective Defense: Critical Infrastructure Security and Resiliency (NATO COE-DAT Handbook 1)
In 2014 NATOâs Center of Excellence-Defence Against Terrorism (COE-DAT) launched the inaugural course on âCritical Infrastructure Protection Against Terrorist Attacks.â As this course garnered increased attendance and interest, the core lecturer team felt the need to update the course in critical infrastructure (CI) taking into account the shift from an emphasis on âprotectionâ of CI assets to âsecurity and resiliency.â What was lacking in the fields of academe, emergency management, and the industry practitioner community was a handbook that leveraged the collective subject matter expertise of the core lecturer team, a handbook that could serve to educate government leaders, state and private-sector owners and operators of critical infrastructure, academicians, and policymakers in NATO and partner countries. Enabling NATOâs Collective Defense: Critical Infrastructure Security and Resiliency is the culmination of such an effort, the first major collaborative research project under a Memorandum of Understanding between the US Army War College Strategic Studies Institute (SSI), and NATO COE-DAT.
The research project began in October 2020 with a series of four workshops hosted by SSI. The draft chapters for the book were completed in late January 2022. Little did the research team envision the Russian invasion of Ukraine in February this year. The Russian occupation of the Zaporizhzhya nuclear power plant, successive missile attacks against Ukraineâs electric generation and distribution facilities, rail transport, and cyberattacks against almost every sector of the countryâs critical infrastructure have been on world display. Russian use of its gas supplies as a means of economic warfare against Europeâdesigned to undermine NATO unity and support for Ukraineâis another timely example of why adversaries, nation-states, and terrorists alike target critical infrastructure. Hence, the need for public-private sector partnerships to secure that infrastructure and build the resiliency to sustain it when attacked. Ukraine also highlights the need for NATO allies to understand where vulnerabilities exist in host nation infrastructure that will undermine collective defense and give more urgency to redressing and mitigating those fissures.https://press.armywarcollege.edu/monographs/1951/thumbnail.jp
Cybersecurity: Past, Present and Future
The digital transformation has created a new digital space known as
cyberspace. This new cyberspace has improved the workings of businesses,
organizations, governments, society as a whole, and day to day life of an
individual. With these improvements come new challenges, and one of the main
challenges is security. The security of the new cyberspace is called
cybersecurity. Cyberspace has created new technologies and environments such as
cloud computing, smart devices, IoTs, and several others. To keep pace with
these advancements in cyber technologies there is a need to expand research and
develop new cybersecurity methods and tools to secure these domains and
environments. This book is an effort to introduce the reader to the field of
cybersecurity, highlight current issues and challenges, and provide future
directions to mitigate or resolve them. The main specializations of
cybersecurity covered in this book are software security, hardware security,
the evolution of malware, biometrics, cyber intelligence, and cyber forensics.
We must learn from the past, evolve our present and improve the future. Based
on this objective, the book covers the past, present, and future of these main
specializations of cybersecurity. The book also examines the upcoming areas of
research in cyber intelligence, such as hybrid augmented and explainable
artificial intelligence (AI). Human and AI collaboration can significantly
increase the performance of a cybersecurity system. Interpreting and explaining
machine learning models, i.e., explainable AI is an emerging field of study and
has a lot of potentials to improve the role of AI in cybersecurity.Comment: Author's copy of the book published under ISBN: 978-620-4-74421-
Future business and the role of purchasing and supply management:Opportunities for âbusiness-not-as-usualâ PSM research
The raison d'ĂȘtre for this article is simple: traditional ways of researching, theorizing, and practicing purchasing and supply management (PSM) are no longer sufficient to âmeet the momentâ. Scholars need to advance a âbusiness-not-as-usualâ footing approach to their work, if they are to make a meaningful contribution to addressing the current and future emergencies, as highlighted by recent extreme weather and the COVID-19 pandemic. Yet, what can this, or should this, mean for a field rooted in traditional business thinking? This article builds on the Journal of Purchasing and Supply Management's (JPSM) 25th Anniversary Special Issue editorial (2019); members of the JPSM's editorial team advance their unique perspectives on what âbusiness-not-as-usualâ means for PSM. Specifically, we advocate both thinking much more widely, in scope and ambition, than we currently do, and simultaneously building our ability to comprehend supply chains in a more nuanced and granular way. We explore whether the bias toward positivist work has omitted potentially interesting findings, and viewpoints. This leads to a call to re-think how we approach our work: should the key criteria always be to focus on theory development or testing? Should academics âthink biggerâ? Turning to specific research themes, illustrations of how our current thinking can be challenged or broadened by addressing the circular economy, and role of purchasing and innovation. Specifically, the focus on the PSM function as an intrapreneur within the larger organization, and the role of innovation and technology in PSM work. Taken together, we hope the ideas and arguments presented here will inform and inspire ambitious and novel approaches to PSM research with significant and enduring impact on the transformation of business
AN ANALYSIS OF PROCUREMENT ACQUISITION LEAD TIME (PALT) AND ACQUISITION LEAD TIME (ALT) IN THE DEPARTMENT OF DEFENSE (DOD)
We evaluate the Department of Defense (DOD) Procurement Acquisition Lead Time (PALT), as it produces a vital role toward the fielding weapon systems to support our warfighters at the speed of relevance. We examine the roles of the contracting processes and associated PALT by gaining knowledge based off previous topic-related research including but not limited to: peer-review articles, theses, governing regulations, and real-life PALT data provided by a Naval Surface Warfare Center. We discuss the impact on actual real-world situations such as political agendas and worldwide events similar to the pandemic, and how it plays a role on PALT today and the influence that may arise as a nation. We studied the acquisition professionalâs duties at the higher-level DOD Program Objective Memorandum (POM) and the Planning, Programming, Budgeting, and Execution (PPBE) process. From this analysis, we developed recommendations for acquisition professionals to effectively and efficiently navigate within the constraint of the POM and PPBE five-year cycle.Civilian, Department of the NavyCivilian, Department of the NavyCivilian, Department of the NavyApproved for public release. Distribution is unlimited
- âŠ