1,261
Views
18
CrossRef citations to date
0
Altmetric
Articles

Adapting supply chain management strategies to security – an analysis of existing gaps and recommendations for improvement

&
Pages 276-295 | Received 15 Jul 2015, Accepted 27 Jul 2016, Published online: 11 Sep 2016
 

ABSTRACT

The purpose of this paper is to determine the main security threats in supply chains, to understand gaps in today’s supply chain management strategies and to make recommendations to enhance security in the context of supply chain management. Previous research lacks comprehensive studies and recommendations about how supply chain managers deal with security issues in line with the business visions and strategies of their companies. The study methodology is based on an exploratory approach. Data were collected from 20 managers from international companies by means of self-administered surveys, one-to-one interviews and group interviews. Study findings point out risk management as an important tool at the disposal of managers for trading off performance and vulnerability. However, some important challenges also need to be considered, such as lack of data, insiders, IT vulnerabilities, regulatory frameworks, criminal behaviour, etc. Hence, recommendations are made for managers to improve their understanding of supply chain security.

Acknowledgements

This publication reflects only the authors’ views and the European Union is not liable for any use that may be made of the information contained therein.

Disclosure statement

No potential conflict of interest was reported by the authors.

Additional information

Funding

The research leading to these results has received funding from the European Union Seventh Framework Programme (FP7/2007–2013) under the grant agreement no. 241676 (LOGSEC project, www.logsec.eu).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.