Risk Management - Current Issues and Challenges 2012
DOI: 10.5772/48365
|View full text |Cite
|
Sign up to set email alerts
|

Supply Chain Security – Threats and Solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 56 publications
0
3
0
Order By: Relevance
“…In the past, a number of research studies have been conducted to use IoT solutions to manage the supply chain operations, workflow, and processing; the conducted research works are good enough to support the industrial productions and deliveries, in short, the ultimate target is to generate profit; however, there are limited concentrations paid to the main challenges: privacy, security, and scalability, associated to the supply chain or IoT integrated supply chain either. IoT distributive connectivity and centralized paradigms are not very supportive to provide and ensure system privacy and security of a large-scale supply chain system and its operations [ 17 , 18 ]. For example, IoT smart sensors and devices usually are low cost and have limited resources (e.g., limited energy consumption), design, and manufacture from distinct manufacturers whose main intensions are not to examine and embed the features of autonomous security and privacy for IoT open connectivity.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In the past, a number of research studies have been conducted to use IoT solutions to manage the supply chain operations, workflow, and processing; the conducted research works are good enough to support the industrial productions and deliveries, in short, the ultimate target is to generate profit; however, there are limited concentrations paid to the main challenges: privacy, security, and scalability, associated to the supply chain or IoT integrated supply chain either. IoT distributive connectivity and centralized paradigms are not very supportive to provide and ensure system privacy and security of a large-scale supply chain system and its operations [ 17 , 18 ]. For example, IoT smart sensors and devices usually are low cost and have limited resources (e.g., limited energy consumption), design, and manufacture from distinct manufacturers whose main intensions are not to examine and embed the features of autonomous security and privacy for IoT open connectivity.…”
Section: Introductionmentioning
confidence: 99%
“…As mentioned in [ 9 , 18 ], several organizations have started employing the Internet of Things (IoT) to manage and monitor the whole supply chain ecosystem, for example, by tracking and monitoring assets and supplies in real time. With IoT enabled featuring, including analytical processing, supply chain systems become more efficient, however, there have been limited intentions paid to underlying main issues of privacy and security [ 4 , 19 ].…”
Section: Introductionmentioning
confidence: 99%
“…Different authors designate different concepts to risk triggers, such as risk types [13], supply chain risk threats [14], or supply chain risk vulnerability constructs (sources, drivers, consequences and mitigating strategies) [15], with their respective proposes of prevention and mitigation. Identification of potential sources of risk and implementation of actions to contain vulnerability are considered supply chain risk management.…”
Section: Supply Chain Riskmentioning
confidence: 99%