scholarly journals Cyber Security Threat Modeling for Supply Chain Organizational Environments

2019 ◽  
Vol 11 (3) ◽  
pp. 63 ◽  
Author(s):  
Abel Yeboah-Ofori ◽  
Shareeful Islam

Cyber security in a supply chain (SC) provides an organization the secure network facilities to meet its overall business objectives. The integration of technologies has improved business processes, increased production speed, and reduced distribution costs. However, the increased interdependencies among various supply chain stakeholders have brought many challenges including lack of third party audit mechanisms and cascading cyber threats. This has led to attacks such as the manipulation of the design specifications, alterations, and manipulation during distribution. The aim of this paper is to investigate and understand supply chain threats. In particular, the paper contributes towards modeling and analyzing CSC attacks and cyber threat reporting among supply chain stakeholders. We consider concepts such as goal, actor, attack, TTP, and threat actor relevant to the supply chain, threat model, and requirements domain, and modeled the attack using the widely known STIX threat model. The proposed model was analyzed using a running example of a smart grid case study and an algorithm to model the attack. A discrete probability method for calculating the conditional probabilities was used to determine the attack propagation and cascading effects, and the results showed that our approach effectively analyzed the threats. We have recommended a list of CSC controls to improve the overall security of the studied organization.

2011 ◽  
pp. 41-64 ◽  
Author(s):  
Robert B. Johnston

Many authors (Cunningham and Tynan, 1993; Dearing, 1990; Johnston, 1998; Rochester, 1989; Skagen, 1989; Swatman, 1993) now recognize that the significance of business-to-business electronic commerce in the supply chain is not just its ability to reduce direct operational costs (Colberg, 1990; Dearing, 1990), but also as an enabling technology for business process simplification, particularly as part of the over-arching simplification philosophy that goes variously by the names Just-In-Time (Abraham, Holt and Kathawala, 1990; Groenevelt, 1993), Quick Response (Fiorito, May and Straughn, 1995) and Efficient Consumer Response (Kurt Salmon Associates, 1993). There is also increasing recognition that supplier / customer interactions and supply chain performance as a whole are the correct units of analysis of supply chain reforms and their benefits (Buxmann and Gabauer, 1999; Johnston, 1998). Yet few accounts have attempted to define the precise principles by which the various technologies that make up supply chain electronic commerce are able to provide this simplification of business processes and supply chain performance improvement. This chapter takes up that challenge by describing an increasingly sophisticated series of supply chain reform initiatives with the aim of extracting the underlying principles of digitally mediated replenishment. It is hoped that such an approach will provide a richer, more unified, and more principled account of various EC-enabled supply chain reforms which are often discussed in isolation, but also, by drawing out from diverse supply chain reforms a small set of underlying principles, that it will be possible to more easily generalize from these cases to create other process simplifications appropriate to novel circumstances and business requirements. The chapter begins with fairly well known supply chain reforms analyzed in a new way, but leads on to quite novel issues such as the role of EC in pull as well as push JIT replenishment systems, the use of two dimensional bar code as a medium for EDI, and the use of the new Internet-based business document exchange and presentation products and services. This work is empirically grounded upon a series of case studies conducted in the past four years with some of the largest manufacturing and retail enterprises in Australia, but the reforms described are very much typical of world best practice in supply chain management. The case descriptions are kept brief: greater detail can be found in the references provided. The chapter concentrates on replenishment of retail goods, component parts, and raw materials along the supply chain of large retail and manufacturing enterprises. It focuses on the interaction between a “customer” enterprise which wishes to replenish goods from a “supplier” that distributes or manufacturers them. For simplicity, certain potential intermediaries to this process, such as third-party transport companies, are ignored. In the next two sections, the pertinent technologies involved are described, and a small number of principles that explain their use and their effectiveness in creating supply chain reform through electronic commerce are stated.


Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


Author(s):  
Lily N Edwards-Callaway ◽  
M Caitlin Cramer ◽  
Caitlin N Cadaret ◽  
Elizabeth J Bigler ◽  
Terry E Engle ◽  
...  

ABSTRACT Shade is a mechanism to reduce heat load providing cattle with an environment supportive of their welfare needs. Although heat stress has been extensively reviewed, researched, and addressed in dairy production systems, it has not been investigated in the same manner in the beef cattle supply chain. Like all animals, beef cattle are susceptible to heat stress if they are unable to dissipate heat during times of elevated ambient temperatures. There are many factors that impact heat stress susceptibility in beef cattle throughout the different supply chain sectors, many of which relate to the production system, i.e. availability of shade, microclimate of environment, and nutrition management. The results from studies evaluating the effects of shade on production and welfare are difficult to compare due to variation in structural design, construction materials used, height, shape, and area of shade provided. Additionally, depending on operation location, shade may or may not be beneficial during all times of the year, which can influence the decision to make shade a permanent part of management systems. Shade has been shown to lessen the physiologic response of cattle to heat stress. Shaded cattle exhibit lower respiration rates, body temperatures, and panting scores compared to un-shaded cattle in weather that increases the risk of heat stress. Results from studies investigating the provision of shade indicate that cattle seek shade in hot weather. The impact of shade on behavioral patterns is inconsistent in the current body of research, some studies indicating shade provision impacts behavior and other studies reporting no difference between shaded and un-shaded groups. Analysis of performance and carcass characteristics across feedlot studies demonstrated that shaded cattle had increased ADG, improved feed efficiency, HCW, and dressing percentage when compared to cattle without shade. Despite the documented benefits of shade, current industry statistics, although severely limited in scope, indicate low shade implementation rates in feedlots and data in other supply chain sectors do not exist. Industry guidelines and third party on-farm certification programs articulate the critical need for protection from extreme weather but are not consistent in providing specific recommendations and requirements. Future efforts should include: updated economic analyses of cost versus benefit of shade implementation, exploration of producer perspectives and needs relative to shade, consideration of shade impacts in the cow-calf and slaughter plant segments of the supply chain, and integration of indicators of affective (mental) state and preference in research studies to enhance the holistic assessment of cattle welfare.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5307
Author(s):  
Ricardo Borges dos Santos ◽  
Nunzio Marco Torrisi ◽  
Rodrigo Palucci Pantoni

Every consumer’s buying decision at the supermarket influences food brands to make first party claims of sustainability and socially responsible farming methods on their agro-product labels. Fine wines are often subject to counterfeit along the supply chain to the consumer. This paper presents a method for efficient unrestricted publicity to third party certification (TPC) of plant agricultural products, starting at harvest, using smart contracts and blockchain tokens. The method is capable of providing economic incentives to the actors along the supply chain. A proof-of-concept using a modified Ethereum IGR token set of smart contracts using the ERC-1155 standard NFTs was deployed on the Rinkeby test net and evaluated. The main findings include (a) allowing immediate access to TPC by the public for any desired authority by using token smart contracts. (b) Food safety can be enhanced through TPC visible to consumers through mobile application and blockchain technology, thus reducing counterfeiting and green washing. (c) The framework is structured and maintained because participants obtain economical incentives thus leveraging it´s practical usage. In summary, this implementation of TPC broadcasting through tokens can improve transparency and sustainable conscientious consumer behaviour, thus enabling a more trustworthy supply chain transparency.


Mathematics ◽  
2021 ◽  
Vol 9 (3) ◽  
pp. 253
Author(s):  
Yuyan Wang ◽  
Zhaoqing Yu ◽  
Liang Shen ◽  
Runjie Fan ◽  
Rongyun Tang

Considering the peculiarities of logistics in the electronic commerce (e-commerce) supply chain (ESC) and e-commerce platform’s altruistic preferences, a model including an e-commerce platform, third-party logistics service provider, and manufacturer is constructed. Based on this, three decision models are proposed and equilibrium solutions are obtained by the Stackelberg game. Then, an “altruistic preference joint fixed-cost” contract is proposed to maximize system efficiency. Finally, numerical analysis is used to validate the findings of the paper. The article not only analyzes and compares the optimal decisions under different ESC models, but also explores the intrinsic factors affecting the decisions. This paper finds that the conclusions of dual-channel supply chains or traditional supply chains do not necessarily apply to ESC, and that the effect of altruistic behavior under ESC is influenced by consumer preferences. Moreover, there is a multiparty win–win state for ESC, and this state can be achieved through the “altruistic preference joint fixed-cost” contract. Therefore, the findings of this paper contribute to the development of an e-commerce market and the cooperation of ESC members.


2021 ◽  
Vol 14 (1) ◽  
pp. 205979912098776
Author(s):  
Joseph Da Silva

Interviews are an established research method across multiple disciplines. Such interviews are typically transcribed orthographically in order to facilitate analysis. Many novice qualitative researchers’ experiences of manual transcription are that it is tedious and time-consuming, although it is generally accepted within much of the literature that quality of analysis is improved through researchers performing this task themselves. This is despite the potential for the exhausting nature of bulk transcription to conversely have a negative impact upon quality. Other researchers have explored the use of automated methods to ease the task of transcription, more recently using cloud-computing services, but such services present challenges to ensuring confidentiality and privacy of data. In the field of cyber-security, these are particularly concerning; however, any researcher dealing with confidential participant speech should also be uneasy with third-party access to such data. As a result, researchers, particularly early-career researchers and students, may find themselves with no option other than manual transcription. This article presents a secure and effective alternative, building on prior work published in this journal, to present a method that significantly reduced, by more than half, interview transcription time for the researcher yet maintained security of audio data. It presents a comparison between this method and a fully manual method, drawing on data from 10 interviews conducted as part of my doctoral research. The method presented requires an investment in specific equipment which currently only supports the English language.


Author(s):  
Chinmay Sane ◽  
Conrad S. Tucker

With continued emphasis on sustainability-driven design, reverse logistics is emerging as a vital competitive supply chain strategy for many of the global high-tech manufacturing firms. Various original equipment manufacturers (OEMs) and multi-product manufacturing firms are enhancing their reverse logistics strategies in order to establish an optimal closed-loop supply chain through which they can introduce refurbished variants of their products back into the market. While a refurbished product strategy helps to mitigate environmental impact challenges as well as provide additional economic benefits, it is limited to an existing product market, possibly a subset of the existing market, and fails to commercialize/target new markets. In addition to refurbishing, the alternatives available for utilizing End-Of-Life (EOL) products are currently restricted to recycling and permanent disposal. In this work, the authors propose employing a new EOL option called “resynthesis” that utilizes existing waste from EOL products in a novel way. This is achieved through the synthesis of assemblies/subassemblies across multiple domains. The “newly” synthesized product can then be incorporated into the dynamics of a closed-loop supply chain. The proposed methodology enables OEMs to not only offer refurbished products as part of their reverse logistics strategy, but also provide them with resynthesized product concepts that can be used to expand to new/emerging markets. The proposed methodology provides a general framework that includes OEMs (manufacturers of the original product), retailers (distributors of the original product and collectors of the EOL products) and third-party firms (managers of the EOL products) as part of a closed-loop supply chain strategy. The proposed methodology is compared with the existing methodologies in the literature wherein a third-party supplies the OEM only with refurbished products and supplies products unsuitable for refurbishing to another firm(s) for recycling/disposal. A case study involving a multi-product electronics manufacturer is presented to demonstrate the feasibility of the proposed methodology.


Sign in / Sign up

Export Citation Format

Share Document