• Title/Summary/Keyword: Supply Chain Threats

Search Result 27, Processing Time 0.02 seconds

Requirements for Meeting Consumer Expectations to Expand the Market for Organic Products (유기식품 시장의 확대를 위한 소비자 기대 충족 요건)

  • Pearson, David;Jung, Man-Chul
    • Korean Journal of Organic Agriculture
    • /
    • v.20 no.4
    • /
    • pp.491-502
    • /
    • 2012
  • The world's food production systems are becoming an area of great concern for both human and ecological health. Research has identified that one of the greatest threats to sustainability is conventional industrial agricultural systems and the high energy and material cost they require to function. The organic food movement is contributing as promising alternative to the current dominant model. Over the last 50 years it has developed into the most visible brand for a healthier and more environmentally sustainable food system. However, to achieve its full potential there are still a number of hurdles which must be overcome to make organic products a more viable and appealing option for consumers. This paper provides an overview of key research that has been conducted on why consumers are buying organic products, what they are buying and what is preventing them from purchasing more. It concludes that the key challenge is for the organic food movement to convince existing consumers of the superior 'value' of its products. In addition there are a number of methodological issues associated with analysing the market for organic products as well as issues of limited distribution, intermittent availability and high prices that are currently preventing increases in sales. Recognition and management of these barriers could contribute to more effective targeted research into consumer food purchasing motivations and subsequently the development of more sophisticated marketing strategies that assist in maintaining integrity with consumers and fending off challenges from conventional as well as other complementary food systems such as local food movement. And finally to achieve these market growth strategies the organic food movement will need to cope with its diverse constituency - ranging from global corporates through to local production and consumption - and provide attractive opportunities to individuals and business at all stages in supply chain whilst retaining credibility with government to ensure ongoing policy support.

An Analysis of Cyber Attacks and Response Cases Related to COVID-19 (코로나19 관련 사이버 공격 및 대응현황 분석)

  • Lee, Yongpil;Lee, Dong-Geun
    • Journal of Information Technology Services
    • /
    • v.20 no.5
    • /
    • pp.119-136
    • /
    • 2021
  • Since the global spread of COVID-19, social distancing and untact service implementation have spread rapidly. With the transition to a non-face-to-face environment such as telework and remote classes, cyber security threats have increased, and a lot of cyber compromises have also occurred. In this study, cyber-attacks and response cases related to COVID-19 are summarized in four aspects: cyber fraud, cyber-attacks on companies related to COVID-19 and healthcare sector, cyber-attacks on untact services such as telework, and preparation of untact services security for post-covid 19. After the outbreak of the COVID-19 pandemic, related events such as vaccination information and payment of national disaster aid continued to be used as bait for smishing and phishing. In the aspect of cyber-attacks on companies related to COVID-19 and healthcare sector, we can see that the damage was rapidly increasing as state-supported hackers attack those companies to obtain research results related to the COVID-19, and hackers chose medical institutions as targets with an efficient ransomware attack approach by changing 'spray and pray' strategy to 'big-game hunting'. Companies using untact services such as telework are experiencing cyber breaches due to insufficient security settings, non-installation of security patches, and vulnerabilities in systems constituting untact services such as VPN. In response to these cyber incidents, as a case of cyber fraud countermeasures, security notices to preventing cyber fraud damage to the public was announced, and security guidelines and ransomware countermeasures were provided to organizations related to COVID-19 and medical institutions. In addition, for companies that use and provide untact services, security vulnerability finding and system development environment security inspection service were provided by Government funding programs. We also looked at the differences in the role of the government and the target of security notices between domestic and overseas response cases. Lastly, considering the development of untact services by industry in preparation for post-COVID-19, supply chain security, cloud security, development security, and IoT security were suggested as common security reinforcement measures.

The Effect of Security Information Sharing and Disruptive Technology on Patient Dissatisfaction in Saudi Health Care Services During Covid-19 Pandemic

  • Beyari, Hasan;Hejazi, Mohammed;Alrusaini, Othman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3313-3332
    • /
    • 2022
  • This study is an investigation into the factors affecting patient dissatisfaction among Saudi hospitals. The selected factors considered for analysis are security of information sharing, operational practices, disruptive technologies, and the ease of use of EHR patient information management systems. From the literature review section, it was clear that hardly any other studies have embraced these concepts in one as was intended by this study. The theories that the study heavily draws from are the service dominant logic and the feature integration theory. The study surveyed 350 respondents from three large major hospitals in three different metropolitan cities in the Kingdom of Saudi Arabia. This sample came from members of the three hospitals that were willing to participate in the study. The number 350 represents those that successfully completed the online questionnaire or the limited physical questionnaires in time. The study employed the structural equation modelling technique to analyze the associations. Findings suggested that security of information sharing had a significant direct effect on patient satisfaction. Operational practice positively mediated the effect of security of information sharing on patient dissatisfaction. However, ease of use failed to significant impact this association. The study concluded that to improve patient satisfaction, Saudi hospitals must work on their systems to reinforce them against the active threats on the privacy of patients' data by leveraging disruptive technology. They should also improve their operational practices by embracing quality management techniques relevant to the healthcare sector.

Pig production in Latin America

  • Luciano Roppa;Marcos Elias Duarte;Sung Woo Kim
    • Animal Bioscience
    • /
    • v.37 no.4_spc
    • /
    • pp.786-793
    • /
    • 2024
  • Latin America is a culturally, geographically, politically, and economically diverse region. Agriculture in Latin America is marked by a remarkable diversity of production systems, reflecting various agroecological zones, farm sizes, and technological levels. In the last decade, the swine industry increased by 30.6%, emerging as a great contributor to food security and economic development in Latin America. Brazil and Mexico dominate the pig production landscape, together accounting for 70% of sow inventory in the region. The swine industry in Latin America is predominantly comprised of small and medium-sized farms, however, in the past 30 years, the number of pig producers in Brazil dropped by 78%, whereas pork production increased by 326%. Similar to the global pork industry, the growing demand for pork, driven by population growth and changing dietary habits, presents an opportunity for the industry with an expected growth of 16% over the next decade. The export prospects are promising, however subject to potential disruptions from global market conditions and shifts in trade policies. Among the challenges faced by the swine industry, disease outbreaks, particularly African Swine Fever (ASF), present significant threats, necessitating enhanced biosecurity and surveillance systems. In 2023, ASF was reported to the Dominican Republic and Haiti, Porcine Reproductive and Respiratory Syndrome (PRRS) in Mexico, Costa Rica, the Dominican Republic, Colombia, and Venezuela, and Porcine Epidemic Diarrhea (PED) in Mexico, Peru, the Dominican Republic, Colombia, and Ecuador. Additionally, feed costs, supply chain disruptions, and energy expenses have affected mainly the smaller and less efficient producers. The swine industry is also transitioning towards more sustainable and environmentally friendly practices, including efficient feed usage, and precision farming. Ensuring long-term success in the swine industry in Latin America requires a holistic approach that prioritizes sustainability, animal welfare, and consumer preferences, ultimately positioning the industry to thrive in the evolving global market.

A study on the O2O Commerce Business Process with Business Model Canvas

  • PARK, Hyun-Sung
    • Journal of Distribution Science
    • /
    • v.18 no.5
    • /
    • pp.89-98
    • /
    • 2020
  • Purpose: The growth of online commerce is now becoming a major threat and a new opportunity for retailers. Existing offline retailers struggle to cope with new online retailers' threats by utilizing offline infrastructure. Besides, online retailers expand their online strengths to offline sales by opening their offline stores. Many retailers are paying close attention to the O2O business and the resulting changes. Thus, this research focuses on the O2O business model and process that retailers can adopt. Research design, data and methodology: Considering the features of products that retailers sell, this paper divides O2O business process with the following criteria: delivery lead-time and delivery area. And This research uses the business model canvas to define the features of O2O commerce business process. This paper also uses nine key elements in the business model canvas for analyzing the structure of O2O commerce business. Results: This paper suggests the delivery model of retailers respond to offline customer orders and summarizes the following results. (1) Considering characteristics such as logistics process, delivery area, and product type, we define the features of O2O business models: wide-area (warehouse) based O2O business model, regional area (store) based O2O business model and time-separated O2O business model. (2) This study checks the availability of the business model through the business cases of O2O business models. (3) This study also analyzes the O2O business model of domestic retail companies by the factors defined in the business model canvas. Conclusions: Retailers can adopt the O2O business process to fit their business requirements and strategy. The online retailers who deal with normal consumer products mainly have the wide-area based O2O business model. The wide-area based O2O business model can be suitable for retailers who manage inventory centrally. The time-separated O2O business model can be a good solution for fresh food retailers to operate the logistics process efficiently. And to shorten the delivery lead-time of fresh foods, the regional area based O2O business model can be fit to the retailer that utilizes its offline logistics or sales infrastructure. It may be much more important for retailers to share the inventory information with other branches and to change the role of offline stores.

Maritime Security Training: Evaluation of the Impact on Seafarers' Security Awareness and Security Performance (선박보안교육: 선원의 보안인식과 보안성과에 미치는 영향 평가)

  • D'agostini, Enrico;Jo, Sohyun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.2
    • /
    • pp.201-211
    • /
    • 2019
  • Safety and security measures in the shipping industry play a pivotal role in ensuring efficient and reliable cargo and passengers operations at each stage of the supply chain. The ISPS Code was adopted into SOLAS convention to protect seafarers and vessels from security threats. Furthermore, according to the Manila amendments to STCW Convention in 2010, personnel employed on board are required to participate in security training. Effective seafarers' education and training programs are of major importance to guarantee satisfactory performance levels onboard to minimize security-related risks. The study's contribution focuses on empirically evaluating the relationship between personal level of awareness and security performance when seafarers undertake security training courses. Findings of this study suggest that (1) seafarers who undertake maritime security training have a higher awareness of ship security, (2) security training and security awareness have a positive influence on security performance, and (3) security awareness mediates the impact of security training and security performance. In conclusion, education and training programs are key tools in enhancing seafarers' security awareness and security performance which, from an industry viewpoint, can translate into major economic, operational and reputational benefits.

Efficient Mutual Authentication Protocol Suitable to Passive RFID System (수동형 RFID 시스템에 적합한 효율적인 상호 인증 프로토콜 설계)

  • Won, Tae-Youn;Chun, Ji-Young;Park, Choon-Sik;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.63-73
    • /
    • 2008
  • RFID(Radio Frequency IDentification) system is an automated identification system that basically consists of tags and readers and Back-End-Databases. Tags and Readers communicate with each other by RF signal. As a reader can identify many tags in contactless manner using RF signal, RFID system is expected to do a new technology to replace a bar-code system in supply-chain management and payment system and access control and medical record and so on. However, RFID system creates new threats to the security of systems and privacy of individuals, Because tags and readers communicate with each other in insecure channel using RF signal. So many people are trying to study various manners to solve these problems against attacks, But they are difficult to apply to RFID system based on EPCglobal UHF Class-1 Generation-2 tags. Recently, Chien and Chen proposed a mutual Authentication protocol for RFID conforming to EPCglobal UHF Class-1 Generation-2 tags. we discover vulnerabilities of security and inefficiency about their protocol. Therefore, We analyze vulnerabilities of their protocol and propose an efficient mutual authentication protocol that improves security and efficiency.