498,074 research outputs found
Critical Management Issues for Implementing RFID in Supply Chain Management
The benefits of radio frequency identification (RFID) technology in the supply chain are fairly compelling. It has the potential to revolutionise the efficiency, accuracy and security of the supply chain with significant impact on overall profitability. A number of companies are actively involved in testing and adopting this technology. It is estimated that the market for RFID products and services will increase significantly in the next few years. Despite this trend, there are major impediments to RFID adoption in supply chain. While RFID systems have been around for several decades, the technology for supply chain management is still emerging. We describe many of the challenges, setbacks and barriers facing RFID implementations in supply chains, discuss the critical issues for management and offer some suggestions. In the process, we take an in-depth look at cost, technology, standards, privacy and security and business process reengineering related issues surrounding RFID technology in supply chains
Exploring Vietnamese logistics service quality in the run up to AEC 2015
Paper presented at the 7th International Conference on Logistics and Transport, 17th to 20th November, Lyon, France. Abstract: The logistics and supply chain management domain faces a number of ongoing trends and resultant challenges including costs, the globalisation of supply and markets, time compression, product complexity and shrinking product life cycles, quality of performance and service, a shortage of logistics and supply chain management talent, their impact on the natural environment, and risk and disruption and supply chain security (Grant, 2014). This is particularly true in and important for developing economies such as Vietnam
Supply Chain Security Using RSA Algorithm
The success of supply chain depends greatly on how its information technology is used. Over the years the rate at which supply chain sensitive information is sent over the internet and network has increased drastically. It is for this reason that every company wants to ensure that its supply chain information is secured because large volume of sensitive information is sent over the internet on daily basis. This has created room for this information to be properly secure so that unauthorized user cannot gain access to such sensitive information. There is need for supply chain information to be transmitted via the internet and computer networks to be protected. The integrity of supply chain information can be secured by using appropriate data security technology.
The aims of this thesis were to focus on supply chain security and how supply chain information sent through the computer network and internet can be secured using RSA technique. The thesis elucidates on the limitations of RSA algorithm and how these limitations can be overcome.
The methods used in this thesis are information derived from secondary source materials made up of journal articles, conference proceedings, textbooks and good websites source. In this thesis, it was showed that supply chain security powered with RSA techniques was very important in supply chain management. In conclusion, 2048 bits or more bits RSA are recommended for better supply chain security
Measuring information security breach impact and uncertainties under various information sharing scenarios
This study draws on information theory and aims to provide simulated evidence using real historical and statistical data to demonstrate how various levels of integration moderate the impact and uncertainties of information security breach on supply chain performance. We find that the supply chain behaves differently under various levels of integration when a security breach occurs. The entropy analysis revealed that the wholesaler experience the most uncertainty under system failure and data corruption. This sort of impact-uncertainty information will aid in designing and managing a resilient supply chain poised for minimal breach impact
Supply Chain Security Management Among Service Provider In Logistic Industry: Role Of Supply Chain Security
Di dalam kajian ini, mengkaji hubungan di antara tiga dimensi itu Inisiatif Tugasan Rangkaian Keselamatan, Tugasan Rangkaian Keselamatan Orientasi dan Prestasi Operasi Tugasan Rangkaian Keselamatan.
In this research, service providers in logistic industry in Malaysia are selected to test the effect and relationship between three dimension such as Supply Chain Security Initiatives as the Independent Variables, Supply Chain Security Orientation as Moderator and Supply Chain Security Operational Performance as Dependent Variable
GLOBALIZATION AND THE NEW ENERGY CHALLENGES
A New Global Energy Economy is emerging, in which energy demand and supply issues will make regions of the world much more dependent upon each other. International extensive energetic interdependence on energy resources and networks grows in the global economy. Some $22 trillion of investment in supply infrastructure is needed to meet projected global demand until 2030. Mobilising all this investment will be challenging. Adherence to these policies will ensure that the global energy investments materializes, the necessary infrastructure is built, and the lengthening worldwide energy supply chain operates in security. Strong global energy policy is needed to move the world into a more sustainable energy path.energy security, extensive energetic interdependency, global energy consumption, supply infrastructure
Reviewing the Drivers and Challenges in RFID Implementation in the Pharmaceutical Supply Chain
Counterfeiting is a global phenomenon that poses a serious financial threat to the pharmaceutical industry and more importantly jeopardizes public safety and security. Different measures, including new laws and regulations, have been put in place to mitigate the threat and tighten control in the pharmaceuticals supply chain. However, it appears that the most promising countermeasure is track-and-trace technology such as electronic-pedigree (E-pedigree) with Radio Frequency Identification (RFID) technology. In this study we present a framework exploring the antecedents and consequences of RFID applications in the pharmaceutical supply chain. The framework proposes that counterfeiting and E-pedigree regulation will drive the implementation of RFID in the pharmaceutical supply chain, which in turn provides strategic and operational benefits that enable competitive advantage. Meanwhile, the implementation of RFID requires overcoming many operational, technical and financial challenges. The framework provides a springboard that future study can explore using empirical data
- …
