• Title/Summary/Keyword: Supply Chain Risk

Search Result 144, Processing Time 0.03 seconds

Efficient Supplier Selection with Uncertainty Using Monte Carlo DEA (몬테카를로 DEA를 이용한 불확실성을 고려한 효율적 공급자 선정)

  • Ha, Chunghun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.1
    • /
    • pp.83-89
    • /
    • 2015
  • Selection of efficient supplier is a very important process as risk or uncertainty of a supply chain and its environment are increasing. Previous deterministic DEA and probabilistic DEAs are very limited to handle various types of risk and uncertainty. In this paper, I propose an improved probabilistic DEA which consists of two steps; Monte Carlo simulation and statistical decision making. The simulation results show that the proposed method is proper to distinguish supplier's performance and provide statistical decision background.

Effect of Supply Chain Risk on Port Container Throughput: Focusing on the Case of Busan Port (공급망 리스크가 항만 컨테이너 물동량에 미치는 영향에 관한 연구: 부산항 사례를 중심으로)

  • Kim, Sung-Ki;Kim, Chan-Ho
    • Journal of Korea Port Economic Association
    • /
    • v.39 no.2
    • /
    • pp.25-39
    • /
    • 2023
  • As the scope of supply chains expands globally, unpredictable risks continue to arise. The occurrence of these supply chain risks affects port cargo throughput and hinders port operation. In order to examine the impact of global supply chain risks on port container throughput, this study conducted an empirical analysis on the impact of variables such as the Global Supply Chain Pressure Index (GSCPI), Shanghai Container Freight Index (SCFI), Industrial Production Index, and Retail Sales Index on port traffic using the vector autoregressive(VAR) model. As a result of the analysis, the rise in GSCPI causes a short-term decrease in the throughput of Busan Port, but after a certain point, it acts as a factor increasing the throughput and affects it in the form of a wave. In addition, the industrial production index and the retail sales index were found to have no statistically significant effect on the throughput of Busan Port. In the case of SCFI, the effect was almost similar to that of GSCPI. The results of this study reveal how risks affect port cargo throughput in a situation where supply chain risks are gradually increasing, providing many implications for establishing port operation policies for future supply chain risks.

A Study on the Importer Security Filing and Additional Carrier Requirements(10+2 rule) in U.S. (미국 관세청의 선적전 추가 보안관련 정보 제출법안(10+2 Rule)에 관한 연구)

  • Song, Seon-Uk
    • International Commerce and Information Review
    • /
    • v.10 no.4
    • /
    • pp.395-416
    • /
    • 2008
  • The advance information for oceangoing cargoes destined to th United States enable CBP to evaluate the potential risk of smuggling WMD and to facilitate the prompt release of legitimate cargo following its arrival in the Unites States. On January 1, 2008, CBP promulgate regulations, also known as 10+2 rule, to require the electronic transmission of additional data elements for improved high-risk targeting, including appropriate security elements of entry data for cargo destined to the United States by vessel prior to loading of such cargo on vessels at foreign seaports. The potential impact to an importer's international supply chain will be as follows ; Firstly, importers will take incremental supply chain costs and filing costs. Secondly, anticipate delay in shipment of containerized cargo. Thirdly, importers could be charged fines if they fail to file and file inaccurate or missing data. Companies exporting to the United States should be interested in 10+2 rule, analyze their current processes and procedures to ensure that they are prepared to handle the additional filing requirements of 10+2 rule. And they should focus on how 10+2 impacts their supply chain in terms of costs and sourcing. They will be necessary to revise service legal agreements with their forwarders, customs brokers or carriers in order to meet filing requirements of 10+2 rule.

  • PDF

IMPROVING GLOBAL SUPPLY CHAIN RISK IDENTIFICATION USING RCF

  • MYUNGHYUN, JUNG;SEYEON, LEE;MINJUNG, GIM;HYUNGJO, KIM;JAEHO, LEE
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.26 no.4
    • /
    • pp.280-295
    • /
    • 2022
  • This paper contains an introduction to industrial problems, solutions, and results conducted with the Korea Association of Machinery Industry. The client company commissioned the problem of upgrading the method of identifying global supply risky items. Accordingly, the factors affecting the supply and demand of imported items in the global supply chain were identified and the method of selecting risky items was studied and delivered. Through research and discussions with the client companies, it is confirmed that the most suitable factors for identifying global supply risky items are 'import size', 'import dependence', and 'trend abnormality'. The meaning of each indicator is introduced, and risky items are selected using export/import data until October 2022. Through this paper, it is expected that countries and companies will be able to identify global supply risky items in advance and prepare for risks in the new normal situation: the economic situation caused by infectious diseases such as the COVID-19 pandemic; and the export/import regulation due to geopolitical problems. The client company will include in his report, the method presented in this paper and the risky items selected by the method.

A Study on the Supplementation of the Korea's National Information Security Manual from the Perspective of Cyber Supply Chain Security (사이버 공급망 보안 관점의 국가 정보보안 기본지침 개선방안 연구)

  • You, Young-in;Bae, Sunha;Kim, So Jeong;Kim, Dong Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.309-327
    • /
    • 2022
  • As ICT convergence is progressing in all industrial fields and creating the global ecosystem of the supply chain is accelerating, supply chain risk related with cyber area are also increasing. In particular. the supply chain of ICT products is very complex in terms of technical and environmental factors to be managed, so it is vert difficult to transparently manage the entire life cycle. Accordingly, the US, UK, and EU, etc. are conducting and establishing cyber supply chainsecurity-related research and policies for ICT product supply chains. Korea also has the plan to establish management system to secure the supply chain of major ICT equipment as a task in the basic plan of the national cybersecurity strategy announced in 2019, but there is no concrete policy yet. So, In this paper, we review the cyber supply chain security management system in the United States and present a supplementary way to the National Information Security Manual in Korea from the perspective of cyber supply chain security. It is expected that this will serve as a reference material for cyber supply chain measures that can be introduced in domestic information security field.

인공신경망을 이용한 공급 사슬 상에서의 재고관리

  • 정성원;서용원;박찬권;박진우
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2002.11a
    • /
    • pp.101-105
    • /
    • 2002
  • In a traditional hierarchical inventory system, direct orders are the only information for inventory management that is exchanged between the firms involved. But due to the rapid development of modern information technology, it becomes possible for the firms to share more information in real time, e.g. demand and inventory status data. And so the term Supply Chain has emerged because it is seen as an important source of competitive advantage. Now it is possible to challenge traditional approaches to inventory management. In the past, one of the de-facto assumptions for inventory management was that the demand pattern follows a specific distribution function. However, it is undesirable to apply this assumption in real situations because the demand information in the supply chain tends to be distorted due to the bullwhip effect in a supply chain. To overcome this weakness, we propose a new solution method using NN (Neural Network). Our method proceeds in three steps. First, we find the patterns of optimal reorder points by analyzing past data. Second. train the NN using these pattern data and finally decide the reorder point. Using simulation experiment, we show that the proposed solution method gives better result than that of traditional research.

  • PDF

Corporation's Adaptation to Climate Change Related Natural Disasters : Embedding Resiliency in Supply Chain - A Study on Climate Change Related Natural Disaster Adaptation for Corporations -

  • Pak, Myong Sop;Kim, In Sun
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.64
    • /
    • pp.239-264
    • /
    • 2014
  • Two types of responses to climate change exist. First is climate mitigation which includes efforts of reducing CO2 and GHG emissions. Second response is climate adaptation process which is establishing climate resilience in the supply chain. The two are inherently different since mitigation strategy focus on eliminating the source of climate change and is long term in nature but adaptation strategy is moderating the impact of potential or current climate change. In order to embed climate resilience in the supply chain, mitigation strategies and adaption strategies must be implemented simultaneously. Corporation's adaptation to climate change related natural disaster can be seen as a response that includes mitigation and adaptation strategies simultaneously. A comprehensive climate change resilience supply chain approach has to be developed. This paper illustrated guidelines and adaptation process framework businesses can utilize in order to build climate resilience. Screening process before the actual assessment of risk was introduced as well as the whole adaptation process of establishing information system and strengthening climate-related operational flexibility.

  • PDF

Evaluation of Quantity Discounts for Buyer's Stocking Risk

  • Shin, Ho-Jung;Benton, W.C.;Park, Soo-Hoon
    • Management Science and Financial Engineering
    • /
    • v.16 no.3
    • /
    • pp.21-47
    • /
    • 2010
  • Quantity discounts provide a practical foundation for supply chain inventory policies, improving the supplier's profit and reducing the buyer's inventory cost simultaneously. Traditional quantity-discount research, which deals with inventory coordination between a buyer and a supplier, is extended to a stationary stochastic environment. This research shows that the magnitude of the optimal discounts scheduled by the deterministic quantity discount models may not be large enough to cover the buyer's additional inventory stocking risks under uncertain conditions. As a result, the buyer's total inventory cost may often increase rather than decrease. In contrast, the proposed model allows the supplier to identify the discount level, which shares the buyer's amplified risk associated with temporary overstocking and ensures that both buyer and supplier benefit economically. The performance of the proposed model was tested in the continuous review environments via numerical experiments. The experimental results support the proposed method as a feasible alternative in coordinating inventory decisions under stochastic demand.

A Study on the Software Supply Chain Security Policy for the Strengthening of Cybersecurity: Based on SBOM Policy Cases (사이버안보 강화를 위한 소프트웨어 공급망 보안 정책 연구: SBOM 정책 추진 사례를 중심으로)

  • Son, Hyo-Hyun;Kim, Dong-Hee;Kim, So-Jeong
    • Journal of Digital Convergence
    • /
    • v.20 no.2
    • /
    • pp.9-20
    • /
    • 2022
  • Supply chain attacks target critical infrastructure, causing large amounts of damage and evolving into a threat to public safety and national security. Accordingly, when establishing cybersecurity strategies and policies, supply chain risk management is specified to enhance security, and the US Biden administration recently issued the Executive Order on Improving the Nation's Cybersecurity, SBOM was mentioned as part of the guidelines for strengthening software supply chain security. If the government mandates SBOM and uses it as a security verification tool for supply chains, it can be affected by the domestic procurement system in the future and can be referenced when establishing a security system for domestic supply chains according to the progress of policy implementation. Accordingly, in this paper, countries that are promoting the SBOM policy as a way to strengthen the security of the software supply chain were selected and analyzed with a focus on related cases. In addition, through comparison and analysis of foreign SBOM policy trends, methods for using domestic SBOM in terms of technology, policy, and law were considered. As the value of using SBOM as a supply chain integrity/transparency verification tool is expected in the future, it is necessary to continuously identify trends in the establishment of international standardization and policy development for SBOM and study the standard format.

A risk management methodology for maritime logistics and supply chain applications

  • Mokhtari, Kambiz;Ren, Jun
    • Ocean Systems Engineering
    • /
    • v.4 no.2
    • /
    • pp.137-150
    • /
    • 2014
  • In the marine industry although there has been significant growth towards safety, security and risk assessments or risk-based strategies such as marine insurance and regulations to avoid the risks of damage to properties and the environment or the prospect of premature death caused by accidents etc, the moves toward managing the risks which are linked directly to the business functions and decision making processes have been very slow. Furthermore in the marine industry most perceptions, methodologies and frameworks of dealing with hazards, risks, safety and security issues are for their assessment rather than their management. This trend reveals the fact that in different marine industry sectors such as logistics and shipping there is a lack of coherent risk management framework or methodology from which to understand the risk-based decisions especially for the purpose of design, construction, operation, management and even decommissioning of the marine related applications. On the other hand risk management is not yet viewed holistically in the marine industry in order to, for example, assign a right person, i.e. risk manager, who can act as a coordinator and advisor with responsibilities that are only specific to risk management. As a result this paper, by examining the present physical borders and risk-based activities in the marine industry, aims to propose an appropriate risk management methodology in addition to the emergent role of risk managers which will enable the industry users initially to become familiar with the concept of risk management at its holistic level. In the later stages this eventually can lead to development of risk management capabilities at an exclusive level and its integration into the marine industry functions in future.