Complementarities Between Product Design Modularity and IT Infrastructure Flexibility in IT-Enabled Supply Chains

2010 ◽  
Vol 57 (2) ◽  
pp. 240-254 ◽  
Author(s):  
Ashley A. Bush ◽  
Amrit Tiwana ◽  
Arun Rai
2016 ◽  
Vol 27 (2) ◽  
pp. 395-417 ◽  
Author(s):  
Lifang Wu ◽  
Xiaohang Yue ◽  
Alan Jin ◽  
David C. Yen

Purpose – As traditional supply chains are increasingly becoming intelligent with more objects embedded with sensors and better communication, intelligent decision making and automation capabilities, the new smart supply chain presents unprecedented opportunities for achieving cost reduction and enhancing efficiency improvement. The purpose of this paper is to study and explore the currents status and remaining issues of smart supply chain management. Design/methodology/approach – A literature review is conducted to synthesize the earlier work in this area, and to conceptualize and discuss the smart supply chain characteristics. Further, the authors formulate and investigate five key research topics including information management, IT infrastructure, process automation, advanced analytics, and supply chain integration. Findings – Studies in those aforementioned subject fields are reviewed, categorized, and analyzed based on the review questions defined in the study. It is notable that while the topics of converging atoms with digits are increasingly attracting attention from researchers and practitioners alike, there are many more interesting research questions needing to be addressed. Originality/value – The paper provides original and relevant guidance for supply chain management researchers and practitioners on developing smart supply chains.


Sensors ◽  
2021 ◽  
Vol 21 (18) ◽  
pp. 6057
Author(s):  
Xavi Masip-Bruin ◽  
Eva Marín-Tordera ◽  
José Ruiz ◽  
Admela Jukan ◽  
Panagiotis Trakadas ◽  
...  

The specific demands of supply chains built upon large and complex IoT systems, make it a must to design a coordinated framework for cyber resilience provisioning, intended to guarantee trusted supply chains of ICT systems, built upon distributed, dynamic, potentially insecure, and heterogeneous ICT infrastructures. As such, the solution proposed in this paper is envisioned to deal with the whole supply chain system components, from the IoT ecosystem to the infrastructure connecting them, addressing security and privacy functionalities related to risks and vulnerabilities management, accountability, and mitigation strategies, as well as security metrics and evidence-based security assurance. In this paper, we present FISHY as a preliminary architecture that is designed to orchestrate existing and beyond state-of-the-art security appliances in composed ICT scenarios. To this end, the FISHY architecture leverages the capabilities of programmable networks and IT infrastructure through seamless orchestration and instantiation of novel security services, both in real-time and proactively. The paper also includes a thorough business analysis to go far beyond the technical benefits of a potential FISHY adoption, as well as three real-world use cases highlighting the envisioned benefits of a potential FISHY adoption.


2002 ◽  
Vol 20 (3) ◽  
pp. 289-302 ◽  
Author(s):  
Jaya Singhal ◽  
Kalyan Singhal
Keyword(s):  

2019 ◽  
Vol 57 (19) ◽  
pp. 6181-6201 ◽  
Author(s):  
Mithu Rani Kuiti ◽  
Debabrata Ghosh ◽  
Sirish Gouda ◽  
Sanjeev Swami ◽  
Ravi Shankar

Author(s):  
Xavi Masip-Bruin ◽  
Eva Marín-Tordera ◽  
José Ruiz ◽  
Admela Jukan ◽  
Panagiotis Trakadas ◽  
...  

The specific demands inherent to supply chains built upon large IoT systems, make a must the design of a coordinated framework for cyber resilience provisioning intended to guaranteeing trusted supply chains of ICT systems, built upon distributed, dynamic, potentially insecure and heterogeneous ICT infrastructures. As such, the proposed solution is envisioned to deal with the whole supply chain system components, from the IoT ecosystem to the infrastructure connecting them, addressing security and privacy functionalities related to risks and vulnerabilities management, accountability and mitigation strategies as well as security metrics and evidence-based security assurance. In this paper we present FISHY, as a preliminary designed architecture, designed to orchestrate both existing and beyond state-of-the-art security appliances in composed ICT scenarios and also leveraging capabilities of programmable network and IT infrastructure through seamless orchestration and instantiation of novel security services, both in real-time and proactively. The paper also includes a thorough business analysis to go far beyond the technical benefits of a potential FISHY adoption as well as three real-world use cases where to strongly support the envisioned benefits of a FISHY adoption.


Sign in / Sign up

Export Citation Format

Share Document