498,074 research outputs found

    Critical Management Issues for Implementing RFID in Supply Chain Management

    Get PDF
    The benefits of radio frequency identification (RFID) technology in the supply chain are fairly compelling. It has the potential to revolutionise the efficiency, accuracy and security of the supply chain with significant impact on overall profitability. A number of companies are actively involved in testing and adopting this technology. It is estimated that the market for RFID products and services will increase significantly in the next few years. Despite this trend, there are major impediments to RFID adoption in supply chain. While RFID systems have been around for several decades, the technology for supply chain management is still emerging. We describe many of the challenges, setbacks and barriers facing RFID implementations in supply chains, discuss the critical issues for management and offer some suggestions. In the process, we take an in-depth look at cost, technology, standards, privacy and security and business process reengineering related issues surrounding RFID technology in supply chains

    Exploring Vietnamese logistics service quality in the run up to AEC 2015

    Get PDF
    Paper presented at the 7th International Conference on Logistics and Transport, 17th to 20th November, Lyon, France. Abstract: The logistics and supply chain management domain faces a number of ongoing trends and resultant challenges including costs, the globalisation of supply and markets, time compression, product complexity and shrinking product life cycles, quality of performance and service, a shortage of logistics and supply chain management talent, their impact on the natural environment, and risk and disruption and supply chain security (Grant, 2014). This is particularly true in and important for developing economies such as Vietnam

    Supply Chain Security Using RSA Algorithm

    Get PDF
    The success of supply chain depends greatly on how its information technology is used. Over the years the rate at which supply chain sensitive information is sent over the internet and network has increased drastically. It is for this reason that every company wants to ensure that its supply chain information is secured because large volume of sensitive information is sent over the internet on daily basis. This has created room for this information to be properly secure so that unauthorized user cannot gain access to such sensitive information. There is need for supply chain information to be transmitted via the internet and computer networks to be protected. The integrity of supply chain information can be secured by using appropriate data security technology. The aims of this thesis were to focus on supply chain security and how supply chain information sent through the computer network and internet can be secured using RSA technique. The thesis elucidates on the limitations of RSA algorithm and how these limitations can be overcome. The methods used in this thesis are information derived from secondary source materials made up of journal articles, conference proceedings, textbooks and good websites source. In this thesis, it was showed that supply chain security powered with RSA techniques was very important in supply chain management. In conclusion, 2048 bits or more bits RSA are recommended for better supply chain security

    Supply Chain and Logistics Security

    Get PDF

    Measuring information security breach impact and uncertainties under various information sharing scenarios

    Get PDF
    This study draws on information theory and aims to provide simulated evidence using real historical and statistical data to demonstrate how various levels of integration moderate the impact and uncertainties of information security breach on supply chain performance. We find that the supply chain behaves differently under various levels of integration when a security breach occurs. The entropy analysis revealed that the wholesaler experience the most uncertainty under system failure and data corruption. This sort of impact-uncertainty information will aid in designing and managing a resilient supply chain poised for minimal breach impact

    Supply Chain Security Management Among Service Provider In Logistic Industry: Role Of Supply Chain Security

    Get PDF
    Di dalam kajian ini, mengkaji hubungan di antara tiga dimensi itu Inisiatif Tugasan Rangkaian Keselamatan, Tugasan Rangkaian Keselamatan Orientasi dan Prestasi Operasi Tugasan Rangkaian Keselamatan. In this research, service providers in logistic industry in Malaysia are selected to test the effect and relationship between three dimension such as Supply Chain Security Initiatives as the Independent Variables, Supply Chain Security Orientation as Moderator and Supply Chain Security Operational Performance as Dependent Variable

    GLOBALIZATION AND THE NEW ENERGY CHALLENGES

    Get PDF
    A New Global Energy Economy is emerging, in which energy demand and supply issues will make regions of the world much more dependent upon each other. International extensive energetic interdependence on energy resources and networks grows in the global economy. Some $22 trillion of investment in supply infrastructure is needed to meet projected global demand until 2030. Mobilising all this investment will be challenging. Adherence to these policies will ensure that the global energy investments materializes, the necessary infrastructure is built, and the lengthening worldwide energy supply chain operates in security. Strong global energy policy is needed to move the world into a more sustainable energy path.energy security, extensive energetic interdependency, global energy consumption, supply infrastructure

    Reviewing the Drivers and Challenges in RFID Implementation in the Pharmaceutical Supply Chain

    Get PDF
    Counterfeiting is a global phenomenon that poses a serious financial threat to the pharmaceutical industry and more importantly jeopardizes public safety and security. Different measures, including new laws and regulations, have been put in place to mitigate the threat and tighten control in the pharmaceuticals supply chain. However, it appears that the most promising countermeasure is track-and-trace technology such as electronic-pedigree (E-pedigree) with Radio Frequency Identification (RFID) technology. In this study we present a framework exploring the antecedents and consequences of RFID applications in the pharmaceutical supply chain. The framework proposes that counterfeiting and E-pedigree regulation will drive the implementation of RFID in the pharmaceutical supply chain, which in turn provides strategic and operational benefits that enable competitive advantage. Meanwhile, the implementation of RFID requires overcoming many operational, technical and financial challenges. The framework provides a springboard that future study can explore using empirical data
    corecore