280
Views
0
CrossRef citations to date
0
Altmetric
Articles

Toward a Taxonomy of Food Supply Chain Security Practices

&

REFERENCES

  • Ades, G., Henry, C. W., & Feldstein, F. (2011 / 2012). The food safety challenge of the global food supply chain. Food Safety Magazine, (December–January). Retrieved from https://www.foodsafetymagazine.com/magazine-archive1/december-2011january-2012/the-food-safety-challenge-of-the-global-food-supply-chain/
  • Autry, C. W., & Bobbitt, L. M. (2008). Supply chain security orientation: Conceptual development and a proposed framework. International Journal of Logistics Management, 19(1), 42–64.
  • Bakshi, N., Flynn, S. E., & Gans, N. (2011). Estimating the operational impact of container inspections at international ports. Management Science, 57(1), 1–20.
  • Bakshi, N., & Gans, N. (2010). Securing the containerized supply chain: Analysis of government incentives for private investment. Management Science, 56(2), 219–233.
  • Battaïa, O., & Dolgui, A. (2013). A taxonomy of line balancing problems and their solution approaches. International Journal of Production Economics, 142(2), 259–277.
  • Chao, S.-L., & Lin, P.-S. (2009). Critical factors affecting the adoption of container security service: The shippers' perspective. International Journal of Production Economics, 122(1), 67–77.
  • Chen, Y., Rungtusanatham, M. J., Goldstein, S. M., & Koerner, A. (2013). Theorizing through metaphorical transfer in OM / SCM research: Divorce as a metaphor for strategic buyer-supplier relationship dissolution. Journal of Operations Management, 31(7–8), 579–586.
  • China Daily. (2016, April 10). China arrests 9 in fake baby formula scandal. Retrieved from http://www.chinadaily.com.cn/china/2016-04/10/content_24406252.htm
  • Closs, D. J., & McGarrell, E. F. (2004, April). Enhancing security throughout the supply chain (Special Report Series). Retrieved from the IBM Center for the Business of Government website: https://www-03.ibm.com/procurement/proWeb.nsf/objectdocswebview/filesupply+chain+security+white+paper+and+assessment+guide+april+2004/$file/supply+chain+security+white+paper+and+assessment+guide+april+2004.pdf
  • Closs, D. J., Speier, C., Whipple, J., & Voss, M. D. (2008). A framework for protecting your supply chain. Supply Chain Management Review, 12(2), 38–45.
  • Cornelissen, J. P., Kafouros, M., & Lock, A. R. (2005). Metaphorical images of organization: How organizational researchers develop and select organizational metaphors. Human Relations, 58(12), 1545–1578.
  • Dalton, D. R., Todor, W. D., & Krackhardt, D. M. (1982). Turnover overstated: The functional taxonomy. Academy of Management Review, 7(1), 117–123.
  • Ekwall, D. (2009). The displacement effect in cargo theft. International Journal of Physical Distribution & Logistics Management, 39(1), 47–62.
  • Eshkenazi, A. (2013, February 15). Security in the food supply chain. APICS Magazine. Retrieved from http://www.apics.org/apics-for-individuals/apics-magazine-home/magazine-detail-page/2013/02/15/security-in-the-food-supply-chain
  • FDA. (2011). Pathway to global product safety and quality [Special Report]. U.S. Food and Drug Administration. Retrieved from https://www.scribd.com/document/59064316/FDA-Pathway-to-Global-Product-Safety-and-Quality
  • Frohlich, M. T., & Dixon, J. R. (2001). A taxonomy of manufacturing strategies revisited. Journal of Operations Management, 19(5), 541–558.
  • Garud, R., & Kotha, S. (1994). Using the brain as a metaphor to model flexible production systems. Academy of Management Review, 19(4), 671–698.
  • Gutierrez, X., & Hintsa, J. (2006). Voluntary supply chain security programs: A systematic comparison. Paper presented at The International Conference on Information Systems, Logistics and Supply Chain, Lyon, France.
  • Haas, J. E., Hall, R. H., & Johnson, N. J. (1966). Towards an empirically derived taxonomy of organizations. In R. V. Bowers (Ed.), Studies on behavior in organizations: A research symposium (pp. 157–180). Athens, GA: University of Georgia Press.
  • Harl, N. E. (2002). US agriculture, food production is threatened by bioterrorism attacks. Ag Lender, 6(4), 10–11.
  • Helferich, O. K., & Cook, R. L. (2002). Securing the supply chain. Oak Brook, IL: Council of Supply Chain Management Professionals.
  • Hollenbeck, J. R., Beersma, B., & Schouten, M. E. (2012). Beyond team types and taxonomies: A dimensional scaling conceptualization for team description. Academy of Management Review, 37(1), 82–106.
  • Hunt, S. D., & Menon, A. (1995). Metaphors and competitive advantage: Evaluating the use of metaphors in theories of competitive strategy. Journal of Business Research, 33(2), 81–90.
  • ISO 22000:2005. (2005). Food safety management ( ISO 22000:2005). Retrieved from the International Organization for Standardization website: https://www.iso.org/iso-22000-food-safety-management.html
  • ISO 28000:2007. (2007). Specification for security management systems for the supply chain (ISO 28000:2007). Retrieved from the International Organization for Standardization website: http://www.iso.org/iso/catalogue_detail?csnumber=44641
  • Janeway, C. A., Jr. (1989). Approaching the asymptote? Evolution and revolution in immunology. In J. D. Watson & J. R. Inglis (Eds.), Immunological recognition [Cold Spring Harbor Symposia on Quantitative Biology] (Vol. 54, pp. 11–13). Cold Spring Harbor, NY: Cold Spring Harbor Laboratory.
  • Janeway, C. A., Jr. (1992). The immune system evolved to discriminate infectious nonself from noninfectious self. Immunology Today, 13(1), 11–16.
  • Kaufmann, S. H. E., Medzhitov, R., & Gordon, S. (2004). The innate immune response to infection. Washington, DC: ASM Press.
  • Kleindorfer, P. R., & Saad, C. H. (2005). Managing disruption risks in supply chains. Production and Operations Management, 14(1), 53–68.
  • Knemeyer, A. M., Zinn, W., & Eroglu, C. (2009). Proactive planning for catastrophic events in supply chains. Journal of Operations Management, 27(2), 141–153.
  • Lee, H. L., & Whang, S. (2005). Higher supply chain security with lower cost: Lessons from total quality management. International Journal of Production Economics, 96(3), 289–300.
  • Lu, G., Koufteros, X., & Lucianetti, L. (2017). Supply chain security: A classification of practices and an empirical study of differential effects and complementarity. IEEE Transactions on Engineering Management, 64(2), 234–248.
  • Martens, B. J., Crum, M. R., & Poist, R. F. (2011). Examining antecedents to supply chain security effectiveness: An exploratory study. Journal of Business Logistics, 32(2), 153–166.
  • Marucheck, A., Greis, N., Mena, C., & Cai, L. (2011). Product safety and security in the global supply chain: Issues, challenges and research opportunities. Journal of Operations Management, 29(7–8), 707–720.
  • Matzinger, P. (1994). Tolerance, danger, and the extended family. Annual Review of Immunology, 12, 991–1045.
  • Matzinger, P. (1998). An innate sense of danger. Seminars in Immunology, 10(5), 399–415.
  • McKinney, J. C. (1966). Constructive typology and social theory. New York, NY: Appleton-Century-Crofts.
  • McLelland, E. (2016, February 23). Fruit seller hid £24million of cocaine in fake bananas in his warehouse which Colombian drug cartel were to use treasure map to find. Daily Mail (London, United Kingdom). Retrieved from http://www.dailymail.co.uk/news/article-3460517/Fruit-seller-hid-24million-cocaine-fake-bananas-warehouse-Colombian-drug-cartel-use-treasure-map-find.html
  • Miller, J. G., & Roth, A. V. (1994). A taxonomy of manufacturing strategies. Management Science, 40(3), 285–304.
  • Parham, P. (2005). The immune system (2nd ed.). New York, NY: Garland Science Publishing.
  • Peleg-Gillai, B., Bhat, G., & Sept, L. (2006, July). Innovators in supply chain security: Better security drives business value ( Manufacturing Innovation Series). Washington, DC: Manufacturing Institute. Retrieved from https://www.gsb.stanford.edu/sites/gsb/files/publication-pdf/white-paper-innovators-supply-chain-security.pdf
  • Playfair, J., & Bancroft, G. (2004). Infection and immunity (2nd ed.). New York, NY: Oxford University Press.
  • Prokop, D. (2004). Smart and safe borders: The logistics of inbound cargo security. International Journal of Logistics Management, 15(2), 65–76.
  • Reade, C. (2009). Human resource management implications of terrorist threats to firms in the supply chain. International Journal of Physical Distribution & Logistics Management, 39(6), 469–485.
  • Rice, J. B., Jr., & Caniato, F. (2003). Building a secure and resilient supply network. Supply Chain Management Review, 7(5), 22–30.
  • Rice, J. B., Jr., & Spayd, P. W. (2005, May). Investing in supply chain security: Collateral benefits (Special Report Series). Retrieved from the IBM Center for the Business of Government website: http://www-07.ibm.com/au/pdf/investinginsupplychainsecurity-collateralbenefitsmay2005.pdf
  • Rich, P. (1992). The organizational taxonomy: Definition and design. Academy of Management Review, 17(4), 758–781.
  • Russell, D. M., & Saldanha, J. P. (2003). Five tenets of security-aware logistics and supply chain operation. Transportation Journal, 42(4), 44–54.
  • Sarathy, R. (2006). Security and the global supply chain. Transportation Journal, 45(4), 28–51.
  • Segel, L. A., & Cohen, I. R. (2001). Design principles for the immune system and other distributed autonomous systems. New York, NY: Oxford University Press.
  • Sheffi, Y. (2001). Supply chain management under the threat of international terrorism. International Journal of Logistics Management, 12(2), 1–11.
  • Sheffi, Y. (2005). The resilient enterprise: Overcoming vulnerability for competitive advantage. Cambridge, MA: MIT Press.
  • Sheu, C., Lee, L., & Niehoff, B. (2006). A voluntary logistics security program and international supply chain partnership. Supply Chain Management: An International Journal, 11(4), 363–374.
  • Sila, I., & Ebrahimpour, M. (2002). An investigation of the total quality management survey based research published between 1989 and 2000: A literature review. International Journal of Quality & Reliability Management, 19(7), 902–970.
  • Sodhi, M. S., Son, B.-G., & Tang, C. S. (2011). Researchers' perspectives on supply chain risk management. Production and Operations Management, 21(1), 1–13.
  • Sowinski, L. L. (2013, September 23). Improving safety and security throughout the food supply chain. Food Logistics. Retrieved from http://www.foodlogistics.com/article/11151734/food-supply-chain-safety-security-cover-story
  • Speier, C., Whipple, J. M., Closs, D. J., & Voss, M. D. (2011). Global supply chain design considerations: Mitigating product safety and security risks. Journal of Operations Management, 29(7–8), 721–736.
  • Starr, M. K., & Van Wassenhove, L. N. (2014). Introduction to the special issue on humanitarian operations and crisis management. Production and Operations Management, 23(6), 925–937.
  • Tang, C. S. (2006). Robust strategies for mitigating supply chain disruptions. International Journal of Logistics Research and Applications, 9(1), 33–45.
  • Tang, C. S., & Tomlin, B. (2008). The power of flexibility for mitigating supply chain risks. International Journal of Production Economics, 116(1), 12–27.
  • Thibault, M., Brook, M. R., & Button, K. J. (2006). The response of the US maritime industry to the new container security initiatives. Transportation Journal, 45(1), 5–15.
  • Tsoukas, H. (1991). The missing link: A transformation view of metaphors in organizational science. Academy of Management Review, 16(3), 566–585.
  • von Nordenflycht, A. (2010). What is a professional service firm? Toward a theory and taxonomy of knowledge-intensive firms. Academy of Management Review, 35(1), 155–174.
  • Voss, M. D., Closs, D. J., Calantone, R. J., Helferich, O. K., & Speier, C. (2009). The role of security in the food supplier selection decision. Journal of Business Logistics, 30(1), 127–155.
  • Voss, M. D., & Whipple, J. M. (2009). Food supply chain security: Issues and implications. In G. A. Zsidisin & B. Ritchie (Eds.), Supply chain risk: A handbook of assessment, management, and performance (pp. 293–305). New York, NY: Springer Science & Business Media.
  • Voss, M. D., Whipple, J. M., & Closs, D. J. (2009). The role of strategic security: Internal and external security measures with security performance implications. Transportation Journal, 48(2), 5–23.
  • Warriner, C. K. (1984). Organizations and their environments: Essays in the sociology of organizations. Greenwich, CT: JAI Press.
  • Wein, L. M., & Liu, Y. (2005). Analyzing a bioterror attack on the food supply chain: The case of botulinum toxin in milk. Proceedings of the National Academy of Sciences, 102(28), 9984–9989.
  • Whang, S. (1995). Coordination in operations: A taxonomy. Journal of Operations Management, 12(3–4), 413–422.
  • Whipple, J. M., Voss, M. D., & Closs, D. J. (2009). Supply chain security practices in the food industry: Do firms operating globally and domestically differ? International Journal of Physical Distribution & Logistics Management, 39(7), 574–594.
  • White House Press Secretary. (2012, January 25). National strategy for global supply chain security [Fact Sheet]. Retrieved from https://obamawhitehouse.archives.gov/the-press-office/2012/01/25/fact-sheet-national-strategy-global-supply-chain-security
  • Williams, Z., Lueg, J. E., & LeMay, S. A. (2008). Supply chain security: An overview and research agenda. International Journal of Logistics Management, 19(2), 254–281.
  • Williams, Z., Lueg, J. E., Taylor, R. D., & Cook, R. L. (2009). Why all the changes? An institutional theory approach to exploring the drivers of supply chain security. International Journal of Physical Distribution & Logistics Management, 39(7), 595–618.
  • Williams, Z., Ponder, N., & Autry, C. W. (2009). Supply chain security culture: Measure development and validation. International Journal of Logistics Management, 20(2), 243–260.
  • Zhao, X., Sum, C.-C., Qi, Y., Zhang, H., & Lee, T.-S. (2006). A taxonomy of manufacturing strategies in China. Journal of Operations Management, 24(5), 621–636.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.