• Title/Summary/Keyword: Supply Chain Security

Search Result 119, Processing Time 0.036 seconds

Trends in Supply-Chain Security Technologies (공급망 보안기술 동향)

  • Kim, Daewon;Kang, Dongwook;Choi, Yongje;Lee, Sangsu;Choi, Byeongcheol
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.4
    • /
    • pp.149-157
    • /
    • 2020
  • Security threats in supply-chains can be targeted at all the users who use products related to these supply-chains as well as at single equipment or individuals. This implies that these security threats can cause nationwide economic and social damages. In particular, it is true that hardware security threat analysis technology in supply-chains has significant technical barriers due to the lack of software knowledge as well as the need to study and understand undisclosed hardware designs. In this paper, we discuss the future direction of studies by introducing basic concepts and attack cases, along with domestic and foreign technology trends related to supply-chain security technology.

Extenuating Food Integrity Risk through Supply Chain Integration: The Case of Halal Food

  • Ali, Mohd Helmi;Tan, Kim Hua;Pawar, Kulwant;Makhbul, Zafir Mohd
    • Industrial Engineering and Management Systems
    • /
    • v.13 no.2
    • /
    • pp.154-162
    • /
    • 2014
  • Effects of food scandals on religious belief, human health and even on causes of death indicate that firms and consumers are vulnerable to integrity risks in the global supply chain. Mitigating the integrity risk and maintaining the credence quality products like halal food is very challenging, if not impossible. Our aim in this research is to show that supply chain integration can mitigate the halal food integrity risk. To illustrate this idea, we have conducted case studies and interviews in seven Malaysian chicken supply chain focal firms. We unpack the halal integrity risks along the supply chain, such as production risk, raw material risk, food security risk, outsourcing practices risk, service risk, and logistics risk. The research argues that supply chain integration, such as internal integration and external integration practices, could minimize the halal integrity risk. The advantages of supply chain integration in mitigating the halal integrity risk are also highlighted in this paper.

Traditional Circular Economy vs Integrated Blockchain Technology in the Coffee Supply Chain: A Comparative Study (커피 공급망의 전통적 순환경제 vs 통합적 블록체인 기술 비교 연구)

  • Cho Nwe Zin Latt;Igugu Tshisekedi Etienne;Muhammad Firdaus;Kyung-hyune Rhee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.264-267
    • /
    • 2023
  • The circular economy approach in the coffee supply chain promotes a more sustainable, environmentally friendly, and socially responsible coffee industry. It aims to reduce the environmental impact of coffee production and consumption while ensuring the long-term viability of coffee farming communities and ecosystems. However, there are many challenges in the traditional circular economy coffee supply chain. Hence, this paper undertakes a comparative analysis between the traditional circular economy coffee supply chain and its integration with blockchain. As a result, we display the benefits of incorporating blockchain technology into the conventional circular economy framework of the coffee supply chain. Additionally, this integration promises to overcome the challenges in the traditional circular economy coffee supply chain.

Global Trade Management Strategies for Export Companies from the Supply Chain Management Perspective (공급사슬관점에서 수출기업의 글로벌 무역관리 전략)

  • Yang, Jung-Ho
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.35
    • /
    • pp.179-219
    • /
    • 2007
  • Cross-border supply chains undergone complexity in the global trade process, unpredictability and continually evolving regulations and information requirements. Under these circumstances, longer lead time inhibiting quick response to market demands, unanticipated supply chain costs eroding product cost savings, compliance and documentation errors causing delays and fines are challenging global trade companies when they execute global business. These problems are mainly caused by unautomated, unintegrated process which lead to longer and more unpredictable lead times, slower cash flow, cost overruns, and ultimately lower profits and less satisfied customers. Complex and unpredictable global trade environment requires global trade companies of global trade management functions to automate and control this complex environment for driving out cost, time and risk from their business. Global trade management allows cost savings, supply chain efficiencies and improved compliance through improving global supply chain visibility, facilitating cash flow by supply chain financing, enhancing supply chain security and risk management.

  • PDF

RFID BASED INTRA SUPPLY CHAIN MANAGEMENT SYSTEM IN TEXTILE INDUSTRY

  • Mateen, Ahmed;Zhu, Qingsheng;Afsar, Salman;Bashir, Salman
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.166-177
    • /
    • 2019
  • Radio Frequency Identification (RFID) skill is becoming a technology that might deliver a response to manual glitches. The use of tags, receiver and wireless surfs to join with each other would mean that RFID in combination with the EPC would speech these pain opinions and offer many welfares in different sectors such as production, distribution, trade, logistics, and security. Potential benefits include increased visibility rising supply chain, enlarged proficiency and cost savings through improved data harmonization, better responsiveness to actual prominence change. Trendy the case of the textile or industrial applications, recent systems used by the industry to control the supply chain in addition strength discernibility are being studied, besides improvements in the overall perceptibility of assets are anticipated through labels, readers, drivers, POEs, etc. this model will be developed with new situations and a lively construction industry. It will be focused on Cost, Hardware compatibility, security and maintenance issues.

A Review on Preserving Data Confidentiality in Blockchain-based IoT-Supply Chain Systems

  • Omimah Alsaedi;Omar Batarfi;Mohammed Dahab
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.110-116
    • /
    • 2023
  • Data confidentiality refers to the characteristic that information kept undisclosed or hidden from unauthorized parties. It considered a key security requirement in current supply chain management (SCM) systems. Currently, academia and industry tend to adopt blockchain and IoT technologies in order to develop efficient and secure SCM systems. However, providing confidential data sharing among these technologies is quite challenging due to the limitations associated with blockchain and IoT devices. This review paper illustrates the importance of preserving data confidentiality in SCM systems by highlighting the state of the art on confidentiality-preserving methodologies in the context of blockchain based IoT-SCM systems and the challenges associated with it.

A Implementation of Blockchain based Manufacturing Supply Chain Tracking System (블록체인 기반 제조 공급망 추적 시스템 구현)

  • Lee, Jae-Ho;Nam, Ho-Ki
    • Journal of the Korea Safety Management & Science
    • /
    • v.19 no.4
    • /
    • pp.183-188
    • /
    • 2017
  • Block Chain is a technology that records and shares distributed ledgers without a central authority, providing a decentralized platform for transparent transactions in the business and enhancing transparency and traceability in all transactions to ensure trust in the transaction. Despite initial doubts about this technology, it is committed to adopting, adapting and improving the technology in a wide range of industries, including finance, government, security, logistics, food, medical, legal, and real estate. This study examines this technology, its applicability and potential benefits to the manufacturing supply chain. A tracking system of manufacturing supply chain to visualize transparency and traceability is implemented, and the conditions for adopting the technology in the manufacturing supply chain and the issues to be addressed are discussed.

A Study on Performance Improvement of ConTracer Using Taguchi Method (다구찌법을 이용한 컨테이너화물 안전수송장치 ConTracer의 성능향상에 관한 연구)

  • Choi, Hyung-Rim;Kim, Jae-Joong;Kang, Moo-Hong;Shon, Jung-Rock;Shin, Joong-Jo;Lee, Ho-In;Kim, Gwang-Pil;Kim, Chae-Soo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.2
    • /
    • pp.23-31
    • /
    • 2009
  • Since 9.11 terrorist attacks against the USA, the new paradigm for "supply chain security" has been established. And at the same time a lot of researches are being made on supply chain security by many foreign companies or research institutes. However, domestically the terms "supply chain security" themselves are not yet familiar, and the paradigm of security are not being used in the logistics, while little researches are being made on them But recently along with development of "ConTracer," a supply chain security technology, which is to be used as the equipment for container cargo transportation safety based on RF1D technology, related researches have begun to be activated. The key issues for the development of equipment for container transportation safety are to obtain both a high recognition rate and enough recognition distance. To this end, this study has tested the ConTracer (433 MHz type and 2.4 GHz type) by using Taguchi Method. According to our test results, in the case of 433 MHz type, it is a little more effective that the reader faces to the front-right side, and in the case of 2.4 GHz, reader direction does not make difference in the view of sensitivity. The test also has proved that it is better that antenna location, as expected, is to be installed on the outside for both types alike.

Supply chain attack detection technology using ELK stack and Sysmon (ELK 스택과 Sysmon을 활용한 공급망 공격 탐지 기법)

  • hyun-chang Shin;myung-ho Oh;seung-jun Gong;jong-min Kim
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.13-18
    • /
    • 2022
  • With the rapid development of IT technology, integration with existing industries has led to an increase in smart manufacturing that simplifies processes and increases productivity based on 4th industrial revolution technology. Security threats are also increasing and there are. In the case of supply chain attacks, it is difficult to detect them in advance and the scale of the damage is extremely large, so they have emerged as next-generation security threats, and research into detection technology is necessary. Therefore, in this paper, we collect, store, analyze, and visualize logs in multiple environments in real time using ELK Stack and Sysmon, which are open source-based analysis solutions, to derive information such as abnormal behavior related to supply chain attacks, and efficiently We try to provide an effective detection method.

Case studies : Security issues of IT products in terms of supply chain (사례 위주로 본 공급자망을 중심으로 한 IT제품 보안 위험)

  • Choi, Woongchul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.4
    • /
    • pp.89-96
    • /
    • 2016
  • Before an IT product is used, there is a sequence of the process such as the components supply-demand of the product, their assembly and production, their logistics and delivery, and then finally, the product can be used by a user. During this sequence of the process, there can be many security exposures and risks. In this paper, we show, by examining security cases of various IT products, that there are many security exposures in the process of IT products from their production to their delivery to end users and in their use, and also show how critical the security exposures are. Even though there are various security theories, technologies and security controls, there is still weak link from the production of an IT product to its use, and this weak link can lead to security vulnerabilities and risks. This paper tries to call attention to the importance of the execution of the security control and the control components. We examine the practical cases to find out how the security control is paralyzed, and to show how it is compromised by asymmetric security resources. Lastly, from the cases, we examine and review the possible domestic security issues and their countermeasures.