1,261
Views
18
CrossRef citations to date
0
Altmetric
Articles

Adapting supply chain management strategies to security – an analysis of existing gaps and recommendations for improvement

&
Pages 276-295 | Received 15 Jul 2015, Accepted 27 Jul 2016, Published online: 11 Sep 2016

References

  • Aqlan, Faisal, and Sarah S. Lam. 2015. “Supply Chain Risk Modelling and Mitigation.” International Journal of Production Research 53 (18): 1–17. Advance online publication. doi: 10.1080/00207543.2015.1047975
  • Asbjørnslett, Bjørn Egil. 2009. “Assessing the Vulnerability of Supply Chains.” In Supply Chain Risk, edited by George A. Zsidisin, Bob Ritchie, 15–33. New York: Springer.
  • Autry, C. W., and L. M. Bobbitt. 2008. “Supply Chain Security Orientation: Conceptual Development and a Proposed Framework.” The International Journal of Logistics Management 19 (1): 42–64. doi: 10.1108/09574090810872596
  • Bauer, Frank, Hermann Groß, Rafael Muñoz de Bustillo y Llorente, Enrique Fernández Macías, and Georg Sieglen. 2007. “Cross-country Comparison of Operating Hours, Capacity Utilisation, Working Times and Employment.” In Operating Hours and Working Times, edited by Lei Delsen, Derek Bosworth, Hermann Groß, and Rafael Muñoz de Bustillo y Llorente 41–71. Springer.
  • Blos, Mauricio F, Mohammed Quaddus, HM Wee, and Kenji Watanabe. 2009. “Supply Chain Risk Management (SCRM): A Case Study on the Automotive and Electronic Industries in Brazil.” Supply Chain Management: An International Journal 14 (4): 247–252. doi: 10.1108/13598540910970072
  • Bowersox, Donald J., David J. Closs, and M Bixby Cooper. 2002. Supply Chain Logistics Management. Vol. 2. New York: McGraw-Hill.
  • Christopher, Martin, Carlos Mena, Omera Khan, and Oznur Yurt. 2011. “Approaches to Managing Global Sourcing Risk.” Supply Chain Management: An International Journal 16 (2): 67–81. doi: 10.1108/13598541111115338
  • Christopher, Martin, and Helen Peck. 2004. “Building the Resilient Supply Chain.” The International Journal of Logistics Management 15 (2): 1–14. doi: 10.1108/09574090410700275
  • Cisco. 2011. “ Security Annual Report – Highlighting Global Security Threats and Trends.” http://www.cisco.com/en/US/prod/collateral/vpndevc/security_annual_report_2011.pdf.
  • Closs, D. J., and E. F. McGarrell. 2004. Enhancing Security Throughout the Supply Chain. Washington, DC: IBM Center for the Business of Government..
  • Colicchia, Claudia, Fabrizio Dallari, and Marco Melacini. 2011. “A Simulation-Based Framework to Evaluate Strategies for Managing Global Inbound Supply Risk.” International Journal of Logistics Research and Applications 14 (6): 371–384. doi: 10.1080/13675567.2011.644270
  • Croxton, Keely L, and Walter Zinn. 2005. “Inventory Considerations in Network Design.” Journal of Business Logistics 26 (1): 149–168. doi: 10.1002/j.2158-1592.2005.tb00197.x
  • Dang, H., Yan, J. H., and Lai, Y. 2015. “Discussion about the Influence of the Computer Information Technology on the Logistics Management.” In Advanced Materials Research, edited by Wen-Pei Sung, and Jimmy (C.M.) Kao, Vol. 1079, 1158–1161. Trans Tech Publications.
  • Erlandson, David A., Edward L. Harris, Barbara L. Skipper, and Steve D. Allen. 1993. Doing Naturalistic Inquiry: A Guide to Methods. Newbury Park: Sage.
  • Finch, Peter. 2004. “Supply Chain Risk Management.” Supply Chain Management: An International Journal 9 (2): 183–196. doi: 10.1108/13598540410527079
  • Foddy, William. 1994. Constructing Questions for Interviews and Questionnaires: Theory and Practice in Social Research. Cambridge: Cambridge University Press.
  • Fossi, Marc, Gerry Egan, Kevin Haley, Eric Johnson, Trevor Mack, Téo Adams, Joseph Blackbird, Mo King Low, Debbie Mazurek, and David McKinney. 2011. “Symantec Internet Security Threat Report Trends for 2010.” Volume 16: 1–20.
  • Franck, C. 2007. “ Framework for Supply Chain Risk Management.” Supply Chain Forum: An International Journal 8 (2): 2–13.
  • Freightwatch. 2016. “Europe Intelligence Note.” http://www.freightwatchintl.com/intelligencecenter/securitynews/freightwatch-international-scic-europe-intelligence-note-12-february.
  • Frey, James H., and Andrea Fontana. 1991. “The Group Interview in Social Research.” The Social Science Journal 28 (2): 175–187. doi: 10.1016/0362-3319(91)90003-M
  • Glenn Richey Jr, R., and Carol Reade. 2009. “Human Resource Management Implications of Terrorist Threats to Firms in the Supply Chain.” International Journal of Physical Distribution & Logistics Management 39 (6): 469–485. doi: 10.1108/09600030910985820
  • Glenn Richey Jr, R., Joseph B. Skipper, and Joe B. Hanna. 2009. “Minimizing Supply Chain Disruption Risk Through Enhanced Flexibility.” International Journal of Physical Distribution & Logistics Management 39 (5): 404–427. doi: 10.1108/ijpdlm.2009.00539eaa.001
  • Grainger, A. 2007. “Supply Chain Security: Adding to a Complex Operational and Institutional Environment.” World Customs Journal 1 (2): 17–29.
  • Gunasekaran, Angappa. 1999. “Agile Manufacturing: A Framework for Research and Development.” International Journal of Production Economics 62 (1): 87–105. doi: 10.1016/S0925-5273(98)00222-9
  • Halldorsson, Arni, and Jesper Aastrup. 2003. “Quality Criteria for Qualitative Inquiries in Logistics.” European Journal of Operational Research 144 (2): 321–332. doi: 10.1016/S0377-2217(02)00397-1
  • Hameri, Ari-Pekka, and Juha Hintsa. 2009. “Assessing the Drivers of Change for Cross-border Supply Chains.” International Journal of Physical Distribution & Logistics Management 39 (9): 741–761. doi: 10.1108/09600030911008184
  • Hintsa, Juha. 2011. Post-2001 Supply Chain Security – Impacts on the Private Sector. Lausanne: HEC Lausanne.
  • Hintsa, J., J. Ahokas, T. Männistö, and J. Sahlstedt. 2010. CEN Supply Chain Security (SCS) Feasibility Study – Final Report. Lausanne.
  • Holland, Christopher P., and A. Geoffrey Lockett. 1997. “Mixed Mode Network Structures: The Strategic use of Electronic Communication by Organizations.” Organization Science 8 (5): 475–488. doi: 10.1287/orsc.8.5.475
  • Jesson, Jill, Lydia Matheson, and Fiona M. Lacey. 2011. Doing Your Literature Review: Traditional and Systematic Techniques. Los Angeles: Sage.
  • Jüttner, U., H. Peck, and M. Christopher. 2003. “Supply Chain Risk Management: Outlining an Agenda for Future Research.” International Journal of Logistics: Research and Applications 6 (5): 197–210. doi: 10.1080/13675560310001627016
  • Khan, Omera, Martin Christopher, and Alessandro Creazza. 2012. “Aligning Product Design with the Supply Chain: A Case Study.” Supply Chain Management: An International Journal 17 (3): 323–336. doi: 10.1108/13598541211227144
  • Krippendorff, Klaus. 2004. “Reliability in Content Analysis.” Human Communication Research 30 (3): 411–433.
  • Kye, Dongmin, Jeongeun Lee, and Kang-Dae Lee. 2013. “The Perceived Impact of Packaging Logistics on the Efficiency of Freight Transportation (EOT).” International Journal of Physical Distribution & Logistics Management 43 (8): 707–720. doi: 10.1108/IJPDLM-08-2011-0143
  • Lee, Hau, and Özalp Özer. 2007. “Unlocking the Value of RFID.” Production and Operations Management 16 (1): 40–64. doi: 10.1111/j.1937-5956.2007.tb00165.x
  • Li, Changming, Lihong Guo, and Zhixin Li. 2014. “Design of Decision-Making System of Emergency Logistics Information System Based on Data Mining.” Journal of Digital Information Management 12 (6): 383–386.
  • Lincoln, Yvonna S., and Egon G. Guba. 1989. Fourth Generation Evaluation. Sage.
  • Liu, X. Y. 2014. “Design of Logistics Information System Based on RFID Technology.” In Applied Mechanics and Materials, edited by Maode Ma, and Xilong Qu, Vol. 608, 343–346. Trans Tech Publications.
  • Männistö, Toni, Juha Hintsa, and Luca Urciuoli. 2014. “Supply Chain Crime-Taxonomy Development and Empirical Validation.” International Journal of Shipping and Transport Logistics 6 (3): 238–256. doi: 10.1504/IJSTL.2014.060784
  • Manuj, Ila, and John T. Mentzer. 2008. “Global Supply Chain Risk Management Strategies.” International Journal of Physical Distribution & Logistics Management 38 (3): 192–223. doi: 10.1108/09600030810866986
  • Melacini, M., A. Creazza, and S. Perotti. 2011. “Analysis of Supply Chain Planning Centralisation for Multinational Companies.” International Journal of Logistics Systems and Management 9 (4): 478–500. doi: 10.1504/IJLSM.2011.041867
  • Morgan, David L. 1997. Focus Groups as Qualitative Research. Vol. 16. Sage.
  • Norrman, Andreas, and Ulf Jansson. 2004. “Ericsson’s Proactive Supply Chain Risk Management Approach after a Serious Sub-supplier Accident.” International Journal of Physical Distribution & Logistics Management 34 (5): 434–456. doi: 10.1108/09600030410545463
  • Patton, Michael Q. 1999. “Enhancing the Quality and Credibility of Qualitative Analysis.” Health Services Research 34 (5 Pt 2): 1189–1208.
  • Peck, H. 2006. “Reconciling Supply Chain Vulnerability, Risk and Supply Chain Management.” International Journal of Logistics: Research and Applications 9 (2): 127–142. doi: 10.1080/13675560600673578
  • Sheffi, Y. 2001. “Supply Chain Management under the Threat of International Terrorism.” The International Journal of Logistics Management 12 (2): 1–11. doi: 10.1108/09574090110806262
  • Sheffi, Yossi. 2006. “Resilience Reduces Risk.” Logistics Quarterly 12 (1): 12–14.
  • Sillekens, Thomas, Achim Koberstein, and Leena Suhl. 2011. “Aggregate Production Planning in the Automotive Industry with Special Consideration of Workforce Flexibility.” International Journal of Production Research 49 (17): 5055–5078. doi: 10.1080/00207543.2010.524261
  • Stock, James R. 1995. “ Advancing Logistics Research and Thought Through the Borrowing of Theories from Other Disciplines: Some Old Ideas Whose Times Have Come.” Paper presented at the proceedings of the twenty fourth annual transportation and logistics educators conference, San Diego, CA.
  • Svensson, Göran. 2000. “A Conceptual Framework for the Analysis of Vulnerability in Supply Chains.” International Journal of Physical Distribution & Logistics Management 30 (9): 731–750. doi: 10.1108/09600030010351444
  • Tang, Christopher S. 2006. “Robust Strategies for Mitigating Supply Chain Disruptions.” International Journal of Logistics: Research and Applications 9 (1): 33–45. doi: 10.1080/13675560500405584
  • Tomlin, Brian. 2006. “On the Value of Mitigation and Contingency Strategies for Managing Supply Chain Disruption Risks.” Management Science 52 (5): 639–657. doi: 10.1287/mnsc.1060.0515
  • Tørhaug, Magne. 2006. “Petroleum Supply Vulnerability due to Terrorism at North Sea Oil and Gas Infrastructures.” In Protection of Civilian Infrastructure from Acts of Terrorism, edited by Konstantin V. Frolov, and Gregory B. Baecher, 73–84. Springer.
  • Tranfield, David, David Denyer, and Palminder Smart. 2003. “Towards a Methodology for Developing Evidence-Informed Management Knowledge by Means of Systematic Review.” British Journal of Management 14 (3): 207–222. doi: 10.1111/1467-8551.00375
  • Urciuoli, Luca. 2010. “Supply Chain Security – Mitigation Measures and a Logistics Multi-layered Framework.” Journal of Transportation Security 3 (1): 1–28. doi: 10.1007/s12198-009-0034-3
  • Urciuoli, Luca, Juha Hintsa, and Juha Ahokas. 2013. “Drivers and Barriers Affecting Usage of E-customs – A Global Survey with Customs Administrations Using Multivariate Analysis Techniques.” Government Information Quarterly 30 (4): 473–485. doi: 10.1016/j.giq.2013.06.001
  • Urciuoli, Luca, Toni Männistö, Juha Hintsa, and Tamanna Khan. 2013. “Supply Chain Cyber Security-Potential Threats.” Information & Security 29 (1): 51–67.
  • Urciuoli, L., S. Mohanty, J. Hiintsa, and E. G. Boekesteijn. 2014. “The Resilience of Energy Supply Chains: A Multiple Case Study Approach on Oil and Gas Supply Chains to Europe.” Supply Chain Management: An International Journal 19 (1): 46–63. doi: 10.1108/SCM-09-2012-0307
  • Wang, Hua, Shuaian Wang, and Qiang Meng. 2014. “Simultaneous Optimization of Schedule Coordination and Cargo Allocation for Liner Container Shipping Networks.” Transportation Research Part E: Logistics and Transportation Review 70: 261–273. doi: 10.1016/j.tre.2014.07.005
  • Warren, Matthew, and William Hutchinson. 2000. “Cyber Attacks Against Supply Chain Management Systems: A Short Note.” International Journal of Physical Distribution & Logistics Management 30 (7/8): 710–716. doi: 10.1108/09600030010346521
  • Waters, C. D. J. 2007. Supply Chain Risk Management: Vulnerability and Resilience in Logistics. London: Kogan Page.
  • Williams, Z., J. E. Lueg, and S. A. LeMay. 2008. “Supply Chain Security: An Overview and Research Agenda.” The International Journal of Logistics Management 19 (2): 254–281. doi: 10.1108/09574090810895988
  • Yao, Enjian, Zhifeng Lang, Yang Yang, and Yongsheng Zhang. 2015. “Vehicle Routing Problem Solution Considering Minimising Fuel Consumption.” IET Intelligent Transport Systems 9 (5): 523–529. doi: 10.1049/iet-its.2015.0027
  • Zsidisin, George A., Alex Panelli, and Rebecca Upton. 2000. “Purchasing Organization Involvement in Risk Assessments, Contingency Plans, and Risk Management: An Exploratory Study.” Supply Chain Management: An International Journal 5 (4): 187–198. doi: 10.1108/13598540010347307

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.