Dissertations / Theses on the topic 'Software Supply Chain Security'

To see the other types of publications on this topic, follow the link: Software Supply Chain Security.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Software Supply Chain Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Vu, Duc Ly. "Towards Understanding and Securing the OSS Supply Chain." Doctoral thesis, Università degli studi di Trento, 2022. http://hdl.handle.net/11572/333508.

Full text
Abstract:
Free and Open-Source Software (FOSS) has become an integral part of the software supply chain in the past decade. Various entities (automated tools and humans) are involved at different stages of the software supply chain. Some actions that occur in the chain may result in vulnerabilities or malicious code injected in a published artifact distributed in a package repository. At the end of the software supply chain, developers or end-users may consume the resulting artifacts altered in transit, including benign and malicious injection. This dissertation starts from the first link in the software supply chain, ‘developers’. Since many developers do not update their vulnerable software libraries, thus exposing the user of their code to security risks. To understand how they choose, manage and update the libraries, packages, and other Open-Source Software (OSS) that become the building blocks of companies’ completed products consumed by end-users, twenty-five semi-structured interviews were conducted with developers of both large and small-medium enterprises in nine countries. All interviews were transcribed, coded, and analyzed according to applied thematic analysis. Although there are many observations about developers’ attitudes on selecting dependencies for their projects, additional quantitative work is needed to validate whether behavior matches or whether there is a gap. Therefore, we provide an extensive empirical analysis of twelve quality and popularity factors that should explain the corresponding popularity (adoption) of PyPI packages was conducted using our tool called py2src. At the end of the software supply chain, software libraries (or packages) are usually downloaded directly from the package registries via package dependency management systems under the comfortable assumption that no discrepancies are introduced in the last mile between the source code and their respective packages. However, such discrepancies might be introduced by manual or automated build tools (e.g., metadata, Python bytecode files) or for evil purposes (malicious code injects). To identify differences between the published Python packages in PyPI and the source code stored on Github, we developed a new approach called LastPyMile . Our approach has been shown to be promising to integrate within the current package dependency management systems or company workflow for vetting packages at a minimal cost. With the ever-increasing numbers of software bugs and security vulnerabilities, the burden of secure software supply chain management on developers and project owners increases. Although automated program repair approaches promise to reduce the burden of bug-fixing tasks by suggesting likely correct patches for software bugs, little is known about the practical aspects of using APR tools, such as how long one should wait for a tool to generate a bug fix. To provide a realistic evaluation of five state-of-the-art APR tools, 221 bugs from 44 open-source Java projects were run within a reasonable developers’ time and effort.
APA, Harvard, Vancouver, ISO, and other styles
2

Massimino, Brett J. "Operational Factors Affecting the Confidentiality of Proprietary Digital Assets." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1405683732.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sichel, Alexander R. (Alexander Russell). "Supply chain security along the Columbia River : an analysis of maritime supply chain security with respect to communication between security experts." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33589.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Ocean Engineering, 2005.
Includes bibliographical references (leaves 74-75).
The amount of cargo that enters the US border is at an all time high. Cargo containers and vessel shipments enter the US from all over the world. Tracking these shipments from their origin to destination requires professional expertise. Security organizations, such as the Regional Maritime Security Coalition of the Columbia River, realize the potential of these professionals, who track and coordinate cargo containers as they move through a supply chain, to enhance security of maritime cargo. In order to utilize these supply chain logistic professionals in a security coalition, proper training and certification would be required to comply with the US Federal Code on Liability Protection. This study examines the requirements that are necessary to certify supply chain logistic professionals as certified volunteers in an information sharing, security communication network to prevent terrorist activity, smuggling, theft, and to assist in general crisis mitigation. The thesis studies how the RMSC is currently developing its security communication system around supply chain logistic professionals, and the requirements and training that would be necessary to certify them under the US Federal Code.
by Alexander R. Sichel.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
4

Park, Hong. "Impact of supply chain security orientation on port performance." Thesis, Cardiff University, 2013. http://orca.cf.ac.uk/52117/.

Full text
Abstract:
The terrorist attack at September 11, 2001 in the United States of America had a huge impact on the security of international cargo transportation. In order to minimize the threat of terrorism and secure the movement of goods in the supply chain, security initiatives such as ISPS code and CSI are adopted by the United Nations and the United States. Also, the term ‘security’ has emerged as an independent area of study in supply chain management studies after the 2000s. The objective of this study is to examine the impact of Supply Chain Security Orientation on Port Performance in the context of Korea. In order to explore the causal relationships, this study utilized Structural Equation Modelling (SEM) to examine the relationships. Also, a multi-group analysis between port group (port A and B) and port user group (shipping companies, forwarding companies, etc) was conducted to investigate the differences of the perceptions in two groups. This is to fill the gaps from previous studies by conducting quantitative and confirmatory research in the field of supply chain security. This study develops a conceptual model by literature review and semi-structured interviews in order to identify the impact of the constructs: Antecedents, Supply Chain Security Orientation, and Port Performance. There are 11 variables in total, and in-depth analysis of the inter-relationships among variables is identified. In conclusion, this study empirically develops a structural model and identified the importance of Financial Resources (FR), Supply Chain Security Initiatives (SCSI), Security Preparation and Planning (SPP), Security Related Partnership (SRP), Security Dedicated Communication and Technology (SDCT), Security Culture (SC), and Security Education (SE) on Port Performance. Also, the differences in perceptions between port group and port user group of the variables in the construct were also explored.
APA, Harvard, Vancouver, ISO, and other styles
5

Garshasbi, Farzam, and Ebrahimi Shahram Pasha. "Supply Chain Security Programs Comparing TAPA FSR with ISPS." Thesis, Högskolan i Borås, Institutionen Ingenjörshögskolan, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-16642.

Full text
Abstract:
In this era, where international outsourcing and global distribution systems are thriving, providing the security of products in the logistic system is very crucial now. For corporates, it is highly vital to know how secure high-tech products and materials are handled, warehoused and transported as they move throughout the globe. Different international security standards have been introduced, two of which are TAPA FSR and ISPS. TAPA FSR (Freight Security Requirements) defines the smallest required security standards for goods travelling throughout the supply chain and the suitable approaches in keeping those standards. ISPS (International Ship and Port Facility Security) is another security standard which identifies the tasks of governments, shipping companies, shipboard personnel, and port/facility personnel to find security threats and take preemptive actions against security events influencing ships or port facilities used in global business. This research attempts to study the literature on security of transportation in supply chain. By comparing the requirements of TAPA FSR and ISPS, we aim to find their basic differences and to analyze to what extent the two standards respond to the crucial concepts of security in the supply chain.
Program: BSc in Industrial Engineering - International Business Engineering
APA, Harvard, Vancouver, ISO, and other styles
6

Holt, Christopher Michael Taylor 1968. "Supply chain simulator : an approach for development of software and methodology for simulation of supply chain management." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/9495.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Civil and Environmental Engineering, 1999.
Includes bibliographical references (leaves 94-97).
Many companies see how new strategies and technologies can enable more efficient and adaptive supply chains-but they struggle to understand how these technologies overlay with existing processes and personnel issues both during and after implementation. This thesis investigates the concept of a simulated environment where multiple constituents whether they are different parts of a company's organization or different companies within a supply chain-can come together to design and experiment with new supply chain structures. The thesis explores the argument that the supply chain can be simulated, and evaluates different approaches to developing such a simulation that would allow low-risk experimentation and accelerated learning for supply chain managers. The thesis begins with an executive summary that provides a high level treatment of the challenges and recommendations associated with supply chain simulation, then proceeds to present a definition of the elaborate interrelationships between companies, technologies and business processes that collectively shape an industry's supply chain. This is followed by a discussion of complexity theory and general simulation techniques that could be applicable to the development of a software simulation environment in this area. Then, a review of efforts to date to simulate management of the supply chain, including approach, resources required, and eventual results is followed by a recommendation and justification of the thesis' approach to supply chain simulation. Finally, operating methods are presented for development and management of the learning and decision-making processes required to best utilize the software. The conclusion of the thesis is that because of the emergence of new technologies, the supply chain can be simulated for practical experimentation and learning. It is apparent that significant supply chain performance improvement can be identified and quantified through simulation. The thesis recommends using agent-based modeling, specifically a software package called Swarm, as the software environment. The software should be supported by operating methods that can maximize its capabilities while encouraging the likelihood of adoption of solutions identified.
by Christopher Michael Taylor Holt.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
7

Malinowski, Mateusz Ksawery. "CargoNet : micropower sensate tags for supply-chain management and security." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/41654.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2007.
Includes bibliographical references (p. 109-113).
This thesis describes the development of a system of sensate active RFID tags for supply-chain management and security applications, necessitated by the current lack of commercial platforms capable of monitoring the state of shipments at the crate and case level. To make a practical prototype, off-the-shelf components and custom-designed circuits that minimize power consumption and cost were assembled and integrated into an interrupt-driven, quasi-passive system that can monitor, log, and report environmental conditions inside a shipping crate while consuming only 23.7 microwatts of average power. To prove the feasibility of the system, the tags were tested in the laboratory and aboard transport conveyances.
by Mateusz Ksawery Malinowski.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
8

Barcelos, Mariana Alexandra Aleixo de. "Towards a security framework for the semiconductor supply chain environment." Master's thesis, Universidade de Aveiro, 2018. http://hdl.handle.net/10773/23555.

Full text
Abstract:
Mestrado em Engenharia Eletrónica e Telecomunicações
Hoje em dia, a troca de informação entre os parceiros da cadeia de forne-cimento de semicondutores pode ser alvo de muitas ameaças de segurança conhecidas e desconhecidas no ambiente interno/externo dos parceiros. Particularmente, estas vulnerabilidades, no ambiente da cadeia de fornecimento de semicondutores, podem ser exploradas por atacantes com um amplo espectro de motivações que vão desde intenções criminais, visando o ganho financeiro, até à espionagem industrial e a cyber-sabotagem. Os atacantes podem comprometer a comunicação de dados entre parceiros na cadeia de fornecimento e, portanto, podem prejudicar o fornecimento de serviços pelos parceiros, bem como a continuidade da prestação de serviços. Como resultado, os parceiros da cadeia de fornecimento de semicondutores poderão sofrer repercussões nocivas que podem causar perdas significativas de receita, destruição da sua marca e atrasos no avanço das suas tecnologias. Consequentemente, uma plataforma de segurança para o ambiente da cadeia de fornecimento de semicondutores é de extrema importância. Assim, a intenção desta tese é fornecer uma base para uma plataforma de segurança para comunicação segura de dados entre todos os parceiros da cadeia de fornecimento de semicondutores.
Nowadays, data communication across the partners in the semiconductor supply chain can be the target of many known and unknown security threats exploiting security vulnerabilities in the internal/external environment of the partners. Particularly, these vulnerabilities in the semiconductor supply chain environment can be exploited by attackers with a wide spectrum of motivations ranging from criminal intents aimed at nancial gain to industrial espionage and cyber-sabotage. Attackers can compromise the data communication between legitimate parties in the supply chain and thus can jeopardize the delivery of services across the partners as well as the continuity of the service provision. As a result, semiconductor supply chain partners will su er from damaging repercussions which can cause signi cant revenue loss, destroy their brand and eventually hinder their advancement. Consequently, a security framework for the semiconductor supply chain environment is of utmost importance. Hence, the intent of this thesis is to provide a foundation for a security framework for secure data communication across the partners in the semiconductor supply chain.
APA, Harvard, Vancouver, ISO, and other styles
9

Williams, Zachary. "Supply chain security an institutional approach to strategies and outcomes /." Diss., Mississippi State : Mississippi State University, 2008. http://library.msstate.edu/etd/show.asp?etd=etd-03312008-163918.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sheinbein, Rachel Felice 1975. "Applying supply chain methodology to a centralized software licensing strategy." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/34781.

Full text
Abstract:
Thesis (M.B.A.)--Massachusetts Institute of Technology, Sloan School of Management; and, (S.M.)--Massachusetts Institute of Technology, Dept. of Civil and Environmental Engineering; in conjunction with the Leaders for Manufacturing Program at MIT, 2004.
Includes bibliographical references (p. 76).
Eleven percent of companies spend between $150K and $200K per year per engineer on software development tools and nine percent spend more than $200K, according to a Silicon Integration Initiative/Gartner/EE Times study from 2002. For Agilent Technologies, these costs result in spending tens of millions of dollars each year on software, and for Motorola, the costs are more than $100M each year. From the current trends in software spending, one can infer that companies will pay even more for software in the future, because the cost of the software itself is rising and because of the complexity of the technology needed for innovation. In order to understand whether the total spending on software is appropriate and necessary, Agilent sponsored this project to create a model that analyzes the trade-offs between the cost of software and the cost of software unavailability. The model treats software licenses as supplies to the development of a product, and thus, supply chain methodologies such as inventory (cost of licenses), stock outs (cost of unavailability) and service level are applied. The goal of the model is to minimize software costs while maintaining a satisfactory level of service. The thesis explains the model and then shows the results from applying it to four software products that Agilent currently uses. The results show that in the absence of this type of analysis, Agilent spends more than necessary for software licenses. In fact, Agilent can reduce costs by at least 5%. This model can be used by Agilent and other companies to optimize software purchases.
by Rachel Felice Sheinbein.
S.M.
M.B.A.
APA, Harvard, Vancouver, ISO, and other styles
11

Klimova, Nadezda, and Anna Akimova. "Supply Chain Security. Tools, Trends, and Techniques : Toyota and Honda cases." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Företagsekonomi, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-15764.

Full text
Abstract:
Supply chain management has experienced great changes within the last fifty years. Inevitably, many companies entered the global market with the prime intention to achieve their defined goals. In comparison with the local markets, the global environment requires more efforts and changes in the supply chain operation in order to remain viable in business. Several business models are introduced for achieving the success in the market, suggested by the following researchers: Liker, Choi, Ronald Gilson, andMark J. Roeand others.  In a row with the study cases of Honda and Toyota Companies, the Supply Chain Trading Security is presented. Within this paper the security approaches are discussed during the processes of market penetration and development globally. The main strengths and weaknesses of the models are highlighted in the thesis. The description of market situations and explanation of the models’ application is presented. In order to achieve better results in the analysis of the case studies, the qualitative and inductive research methods have been implemented. The secondary data is considered to be the cornerstone of the thesis. Due to the fact that the thesis is based on descriptive, partially explanatory, and qualitative research methods, different meanings and experiences related to the Supply Chain Security phenomenon are discussed. In order to obtain the necessary data, library catalogues, encyclopedias, databases, and search engines in the Internet are utilized. The thesis goes through the following processes: choice of research area, formulation of research questions, choice of method, formulation of research design and data collection techniques, implementation of data collection, analysis of data, interpretation of data, and finally conclusions. The studied companies in the thesis – Toyota and Honda – conducted four major supply chain models that are neatly explained through the research. Partnership, Supplier Keiretsu, ARA, and Triple-A are the operated models. The following issues have been derived as conclusions: many components of supply chain security in terms of trade, affect the whole organization to a great extent. In order to keep the customer loyalty, image, and brand, companies should focus on their own core competence. Complex, transnational, and multi-vendor supply chain security models require more collaboration on safety issues that is approximately a half of the whole job. In addition, management and control of activities are necessary in order to achieve the target, go through the obstacles, and manage the current market situation.  Economic, political, and nature influence are key determinants of the supply network situation and give the possibility for a company to gain benefits, and control all business activities. The optimal choice of the model is considered to be the main tool aiming to manage all aforementioned tasks. Furthermore, diverse cultural differences influence the choice of the models that are implemented by the American and Japanese companies.
APA, Harvard, Vancouver, ISO, and other styles
12

Tang, Dawei. "Container Line Supply Chain security analysis under complex and uncertain environment." Thesis, University of Manchester, 2012. https://www.research.manchester.ac.uk/portal/en/theses/container-line-supply-chain-security-analysis-under-complex-and-uncertain-environment(2b058744-e0fc-4b4f-9222-6a4b41cf7348).html.

Full text
Abstract:
Container Line Supply Chain (CLSC), which transports cargo in containers and accounts for approximately 95 percent of world trade, is a dominant way for world cargo transportation due to its high efficiency. However, the operation of a typical CLSC, which may involve as many as 25 different organizations spreading all over the world, is very complex, and at the same time, it is estimated that only 2 percent of imported containers are physically inspected in most countries. The complexity together with insufficient prevention measures makes CLSC vulnerable to many threats, such as cargo theft, smuggling, stowaway, terrorist activity, piracy, etc. Furthermore, as disruptions caused by a security incident in a certain point along a CLSC may also cause disruptions to other organizations involved in the same CLSC, the consequences of security incidents to a CLSC may be severe. Therefore, security analysis becomes essential to ensure smooth operation of CLSC, and more generally, to ensure smooth development of world economy. The literature review shows that research on CLSC security only began recently, especially after the terrorist attack on September 11th, 2001, and most of the research either focuses on developing policies, standards, regulations, etc. to improve CLSC security from a general view or focuses on discussing specific security issues in CLSC in a descriptive and subjective way. There is a lack of research on analytical security analysis to provide specific, feasible and practical assistance for people in governments, organizations and industries to improve CLSC security. Facing the situation mentioned above, this thesis intends to develop a set of analytical models for security analysis in CLSC to provide practical assistance to people in maintaining and improving CLSC security. In addition, through the development of the models, the thesis also intends to provide some methodologies for general risk/security analysis problems under complex and uncertain environment, and for some general complex decision problems under uncertainty. Specifically, the research conducted in the thesis is mainly aimed to answer the following two questions: how to assess security level of a CLSC in an analytical and rational way, and according to the security assessment result, how to develop balanced countermeasures to improve security level of a CLSC under the constraints of limited resources. For security assessment, factors influencing CLSC security as a whole are identified first and then organized into a general hierarchical model according to the relations among the factors. The general model is then refined for security assessment of a port storage area along a CLSC against cargo theft. Further, according to the characteristics of CLSC security analysis, the belief Rule base Inference Methodology using the Evidential Reasoning approach (RIMER) is selected as the tool to assess CLSC security due to its capabilities in accommodating and handling different forms of information with different kinds of uncertainty involved in both the measurement of factors identified and the measurement of relations among the factors. To build a basis of the application of RIMER, a new process is introduced to generate belief degrees in Belief Rule Bases (BRBs), with the aim of reducing bias and inconsistency in the process of the generation. Based on the results of CLSC security assessment, a novel resource allocation model for security improvement is also proposed within the framework of RIMER to optimally improve CLSC security under the constraints of available resources. In addition, it is reflected from the security assessment process that RIMER has its limitations in dealing with different information aggregation patterns identified in the proposed security assessment model, and in dealing with different kinds of incompleteness in CLSC security assessment. Correspondently, under the framework of RIMER, novel methods are proposed to accommodate and handle different information aggregation patterns, as well as different kinds of incompleteness. To validate the models proposed in the thesis, several case studies are conducted using data collected from different ports in both the UK and China. From a methodological point of view, the ideas, process and models proposed in the thesis regarding BRB generation, optimal resource allocation based on security assessment results, information aggregation pattern identification and handling, incomplete information handling can be applied not only for CLSC security analysis, but also for dealing with other risk and security analysis problems and more generally, some complex decision problems. From a practical point of view, the models proposed in the thesis can help people in governments, organizations, and industries related to CLSC develop best practices to ensure secure operation, assess security levels of organizations involved in a CLSC and security level of the whole CLSC, and allocate limited resources to improve security of organizations in CLSC. The potential beneficiaries of the research may include: governmental organizations, international/regional organizations, industrial organizations, classification societies, consulting companies, companies involved in a CLSC, companies with cargo to be shipped, individual researchers in relevant areas etc.
APA, Harvard, Vancouver, ISO, and other styles
13

Lewis, Brian Michael. "Inventory Control with Risk of Major Supply Chain Disruptions." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7155.

Full text
Abstract:
This thesis studies inventory control with risk of major supply chain disruptions, specifically border closures and congestion. We first investigate an inventory system in which the probability distributions of order leadtimes are dependent on the state of an exogenous Markov process; we will model border disruptions via this exogenous process. We consider stationary, state-dependent basestock policies, which are known to be optimal for the system under study, and develop an expression for the long-run average cost of an arbitrary policy of this form. Restricting our attention to state-invariant basestock policies, we show how to calculate the optimal basestock (or order-up-to) level and long-run average cost. We provide a sufficient condition for the optimality of a state-invariant basestock policy and monotonicity results for the optimal state-invariant order-up-to level. We finally give the optimal state-invariant order-up-to level for a special class of supply states. Motivated by the possibility of port of entry closures in the event of a security incident, we specialize the previous model to a two-stage international supply chain. A domestic manufacturer orders a single product from a foreign supplier and the orders must cross an international border that is subject to closure. We first assume that border congestion is negligible. The manufacturer's optimal inventory policy and long-run average cost are analyzed. We present structural policy results and the results of a comprehensive numerical study that have important implications for business and for the cooperation between business and government in disruption management and contingency planning. Finally we extend the border closure model to include both border closures and the resulting congestion. We model the border processing system as a discrete-time, single-server queue with constant arrival rate and Markov-modulated service rate. A key task is the development of the leadtime distribution, which is more complex than in the previous model. We present the results of a comprehensive numerical study and provide managerial insights.
APA, Harvard, Vancouver, ISO, and other styles
14

Winkler, Simon. "Supply Chain Finance Der Asset-Based-Financing-Ansatz in Unternehmensnetzwerken /." St. Gallen, 2006. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/00642892002/$FILE/00642892002.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Tan, Chow Yin 1973. "Supply-chain software systems : current issues and imperatives in selection and implementation." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/9932.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Rouse, Vicki Henderson. "An Internship with Choice Systems, Inc., A Supply Chain Solution Software Company." Miami University / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=miami1146622914.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Chang, Meng Ying M. Eng Massachusetts Institute of Technology /., and Raghavendran Mohan. "Impact of Drug Supply Chain Security Act on US pharmaceutical industry under decentralized information flow." Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/112875.

Full text
Abstract:
Thesis: M. Eng. in Supply Chain Management, Massachusetts Institute of Technology, Supply Chain Management Program, 2017.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 46-47).
Drug counterfeiting is one of the major issues in the pharmaceutical industry across the world. These products could cause damages from ineffective treatments to death of patients. In order to fight against counterfeit drugs, the US government introduced Drug Supply Chain Security Act (DSCSA) mandating that all prescription drugs should be serialized. In addition, it mandates all pharmaceutical companies in the U.S. to provide tracking documents in response to a tracing request from FDA. While the act aims to improve drug security across the pharmaceutical industry, it poses a huge impact across the supply chain on both physical flow and information flow. This research evaluates the supply chain impact at an industry level. In this thesis, we evaluate the supply chain impact of Matryoshka model and Unit level model supported by a decentralized information flow. The thesis then evaluates the supply chain impact from three aspects, operational cost, IT infrastructure cost and capital investment. We reference Nabiyeva and Wu's research on centralized information flow model to conduct an exhaustive supply chain impact evaluation across the centralized model and the decentralized model. We conclude that among all these scenarios, unit level model under centralized information flow design bears the highest cost as it requires higher IT investment. On the other hand, the matryoshka model under decentralized information flow has a least supply chain impact from the cost perspective with low IT investment.
by Meng Ying Chang and Raghavendran Mohan.
M. Eng. in Supply Chain Management
APA, Harvard, Vancouver, ISO, and other styles
18

Loke, Wai Leng. "An evaluation of the value of security in the international marine supply chain." Thesis, University of British Columbia, 2008. http://hdl.handle.net/2429/2519.

Full text
Abstract:
Since the events of 9/11, there has been tremendous amount of renewed interests in the study of trade security. There has been an influx of security regulations and the private sector has been trying to keep pace in complying with them. However, due to the public externalities of security improvements and the lack of quantified and proven benefits, the private sector is struggling to establish business cases for their security initiatives. There is very little quantitative research in this area. Using exploratory factor analysis (EFA) and structural equation modeling (SEM), this study serves to fill this gap by introducing a statistical way of analysing and understanding the complex relationships amongst security effort, its motivators and performance and traditional supply chain performance (SCP). This study also proposes an evaluation framework for security efforts. EFA results show that security is a dimension of SCP. This means that organizations have all along been measuring an aspect of their operations that relates to security. As such, organizations should not perceive the current heightened interests in security as throwing them off-balance. In evaluating security efforts, organizations should select key performance indicators (KPIs) that represent each of the four areas of information, cargo, people and cost. SEM results show that organizations undertake security efforts as a result of both perceived security benefits and perceived collateral benefits, with perceived security benefits carrying a greater weight in the decision-making process. Results also show that organizations are implementing security initiatives out-of-compliance i.e. implementing initiatives that they perceive as not having significant impacts on security and SCP. In view of the positive relationships among perceived security impact, security effort and security performance, there is further imperative for an objective method for evaluating security efforts to prevent effort justification behaviour in determining the effectiveness of the same. Results also show that organizations perceive an improved performance in security leads to an overall improvement in SCP. However, as with other supply chain strategies, there are tradeoffs and not all aspects of SCP are impacted in the same way. Time, responsiveness and efficiency for instance are negatively impacted while reliability is positively impacted.
APA, Harvard, Vancouver, ISO, and other styles
19

Arunachalam, Raghu. "An agent based compositional framework for supply chain simulation." Thesis, University of Warwick, 2000. http://wrap.warwick.ac.uk/36393/.

Full text
Abstract:
To survive in an ever increasing global and competitive marketplace, organisations are forging strategic alliances to gain a competitive advantage over their rivals. Consequently, it is now recognised that it is not sufficient to look at organisations in isolation, but view them in the wider context of the supply chain. In order to design arid manage supply chains it is necessary to understand and predict the behaviour of such systems. The ability to perform detailed studies of dynamic behaviour has made discrete event simulation (DES) an invaluable tool in the design and analysis of manufacturing systems. DES has been used to model individual stages of a supply chain, but rarely has it been applied comprehensively across the entire chain. The multi-faceted nature of supply chains makes the creation of a single model that represents all aspects of the chain difficult. A compositional framework, termed HerMIS (Heterogeneous Model Integration and Simulation), is proposed that allows pieces of a supply chain to not only be studied in isolation, but in the context of the other parts as well. Three requirements are identified for the development of HerMIS. These are: (1) to support a compositional approach so as to allow multi-facetted modelling, (2) to function in a distributed environment where models and information about them are distributed at different locations amongst various organisations, and (3) to provide an execution mechanism that allows the composite model to be simulated efficiently. A class based taxonomy of component models and their interaction is conceived that forms the basis of a representation scheme for composite modelling. An agent based paradigm that employs a collection of synthesis_agents and model_agents is devised to support the distributed operation of the framework. The synthesis_agents function as sources of knowledge for synthesising composite models and are used in conjunction with an interactive blackboard based system to guide the user in creating composite models. Each of the model_agents incorporate a discrete event model of a supply chain component, arid supports the distributed simulation of the composite model. Finally, a parallel discrete event simulation algorithm is proposed that enables the composite model to be simulated on a network of computer workstations. The algorithm is based on the optimistic PDES approach and takes into consideration some of the operating characteristics of a composite supply chain model.
APA, Harvard, Vancouver, ISO, and other styles
20

Bredenkamp, Frederick van Biljon. "The development of a generic just-in-time supply chain optimisation software tool /." Link to the online version, 2005. http://hdl.handle.net/10019/980.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Bredenkamp, F. v. B. "The development of a generic just-in-time supply chain optimisation software tool." Thesis, Stellenbosch : University of Stellenbosch, 2005. http://hdl.handle.net/10019.1/1920.

Full text
Abstract:
The demand from modern day customers for quality products, supplied in any quantity and within a short lead-time, forces organisations to stock the correct amount of inventory in the correct locations in its supply chain. Establishing the correct inventory levels within an organisation’s supply chain is complicated by the various stochastic processes occurring in a supply chain. The thesis is aimed at the development of a generic Just-In-Time (JIT) supply chain optimisation software tool, whereby the correct inventory levels for an organisation can be determined. These inventory levels will ensure that the organisation will achieve a predefined customer service level at the minimum cost to the company. The tool was developed and satisfactory results were obtained using the Harmony Search Algorithm (HSA) for optimising the inventory levels.
APA, Harvard, Vancouver, ISO, and other styles
22

Bellefeuille, Cynthia Lynn. "Quantifying and managing the risk of information security breaches participants in a supply chain." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33313.

Full text
Abstract:
Thesis (M. Eng. in Logistics)--Massachusetts Institute of Technology, Engineering Systems Division, 2005.
Includes bibliographical references (leaf 70).
Technical integration between companies can result in an increased risk of information security breaches. This thesis proposes a methodology for quantifying information security risk to a supply chain participant. Given a system responsible for supply chain interaction and the vulnerabilities attributed to the system, the variables that determine the probability and severity of security incidents were used to create a model to quantify the risk within three hypothetical information systems. The probability of an incident occurring was determined by rating the availability and ease of performing an exploit, the attractiveness of the target and an estimate of the frequency of the attack occurring Internet wide. In assigning a monetary value to the incident, the outcome from an attack was considered in terms of the direct impact on the business process and the potential impact on partnerships. A method for determining mitigation strategies was then proposed based on a given set of monetary constraints and the realization of corporate security policy.
by Cynthia Lynn Bellefeuille.
M.Eng.in Logistics
APA, Harvard, Vancouver, ISO, and other styles
23

Chung, Peter Wontae, and Tao Zhang. "A framework to evaluate interoperable data exchange models for Drug Supply Chain Security Act compliance." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/107520.

Full text
Abstract:
Thesis: M. Eng. in Logistics, Massachusetts Institute of Technology, Supply Chain Management Program, 2016.
Cataloged from PDF version of thesis.
Includes bibliographical references (page 50).
The United States has one of the safest drug supply chains in the world. However, its security is threatened by new challenges such as counterfeit, diverted, and illegally imported drugs. To counter the new challenges, the Drug Supply Chain Security Act (DSCSA) was signed into law by President Obama on November 27, 2013, with a 10-year implementation timeframe. As a result, companies in the U.S. pharmaceutical industry, including drug manufacturers, distributors, and dispensers, are challenged to fully comply with the DSCSA by 2023. The compliance with the DSCSA will enable companies to operate and manage the risks of their supply chains more efficiently. Industry consortiums, such as the Healthcare Distribution Management Association (HDMA), and the industry leaders have recommended various interoperable data exchange models for the implementation of the compliance. However, domestic and international complexities make it difficult to pick the optimal model for the industry. In this research, we start with categorizing the known data exchange models that can be potentially used by the U.S. pharmaceutical industry. Second, we develop a scorecard methodology based on a framework that considers various factors across the entire supply chain. Next, we examine the categorized models using this scorecard methodology. Lastly, we conclude with recommendations on the data strategy decision for the U.S. pharmaceutical industry.
by Peter Wontae Chung and Tao Zhang.
M. Eng. in Logistics
APA, Harvard, Vancouver, ISO, and other styles
24

Baker, Wade Henderson. "Toward a Decision Support System for Measuring and Managing Cybersecurity Risk in Supply Chains." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/85128.

Full text
Abstract:
Much of the confusion about the effectiveness of information security programs concerns not only how to measure, but also what to measure — an issue of equivocality. Thus, to lower uncertainty for improved decision-making, it is first essential to reduce equivocality by defining, expanding, and clarifying risk factors so that metrics, the "necessary measures," can be unambiguously applied. We formulate a system that (1) allows threats to be accurately measured and tracked, (2) enables the impacts and costs of successful threats to be determined, and (3) aids in evaluating the effectiveness and return on investment of countermeasures. We then examine the quality of controls implemented to mitigate cyber risk and study how effectively they reduce the likelihood of security incidents. Improved control quality was shown to reduce the likelihood of security incidents, yet the results indicate that investing in maximum quality is not necessarily the most efficient use of resources. The next manuscript expands the discussion of cyber risk management beyond single organizations by surveying perceptions and experiences of risk factors related to 3rd parties. To validate and these findings, we undertake in an in-depth investigation of nearly 1000 real-world data breaches occurring over a ten-year period. It provides a robust data model and rich database required by a decision support system for cyber risk in the extended enterprise. To our knowledge, it is the most comprehensive field study ever conducted on the subject. Finally, we incorporate these insights, data, and factors into a simulation model that enables us study the transfer of cyber risk across different supply chain configurations and draw important managerial implications.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
25

Karlsson, Daniel. "Modelling and Analysis of Swedish Heavy Industry Supply Chain Data Management to Improve Efficiency and Security." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-291230.

Full text
Abstract:
Product certificates are sent throughout the supply chain of Swedish heavy industry in order to show provenance and physical characteristics of objects such as screws. The data management of the certificates has been, and still is, a very manual process. The process requires extensive work in order to maintain a correct record of the certificates. In particular, tracing causes of errors and establishing compliance takes a long time and effort. The company Chaintraced is developing an application to automate the process by acting as a third party to digitalize and manage the certificates. Introducing a third party into a business-to-business process requires that data integrity is preserved and that information reaches its expected destination. Recent research has indicated that distributed ledger technologies showpromise to fulfill these requirements. In particular, blockchain-based systems offer immutability and traceability of data, and can reduce the trust needed between different parties by relying on cryptographic primitives and consensus mechanisms. This thesis investigates the application of distributed ledger technology to further automate the Swedish heavy industry supply chain and reduce the trust needed in a third party managing the certificates. Requirements for an industrial strength system is set up and several distributed ledger technology solutions are considered to fit the use case of Swedish heavy industry. A proof of concept based on the findings is implemented, tested and compared with a centralized database to explore its possible usage in the supply chain with regard to feasibility, immutability, traceability and security. The investigation resulted in a prototype based on Hyperledger Fabric to store product certificates. The solution provides certain guarantees to immutability and security while being developed with feasibility for deployment in mind. The proposed solution is shown to be slow compared to a centralized solution but scales linearly with number of certificates and is considered within bounds for the use case. The results also show that the proposed solution is more trustworthy than a centralized solution, but that adopting blockchain technology is an extensive task. In particular, trustworthiness and guarantees provided by the solution is highly dependent on the feasibility aspect and the investigation concludes that adoption of blockchain technology within the Swedish heavy industry must take this into consideration.
Hanteringen av produktcertifikat inom den svenska tungindustrin är en mycket manuell process vilket resulterar i att ett enormt arbete krävs för att upprätthålla en korrekt hantering av certifikaten. Att spåra orsaken till fel och att kontrollera efterlevnaden av krav inom industrin tar lång tid. Chaintraced har utvecklat en applikation som automatiserar hanteringen av certifikaten genom digitalisering och att som tredje part lagra informationen. Att introducera en tredje part i affärsverksamheter kräver att integriteten av datan bibehålls och att information anländer till korrekt mottagare. Ny forskning har visat att distribuerade liggare har möjligheten att uppfylla dessa krav. Framförallt gällande blockkedjetekniken med dess många egenskaper och garantier som företag letar efter, så som oföränderlig och spårbar data. Blockkedjetekniken reducerar också förtroendet som behövs för parter inom nätverket genom att förlita sig på kryptografi och konsensus mekanismer. Den här rapporten utreder användningen av distribuerade liggare för att ytterliggare automatisera den svenska tungindustrins leveranskedja och minska tilliten som krävs för en tredje part som hanterar certifikaten. Krav ställs upp för ett system och flertalet distribuerade databastekniker undersöks för att passa in i fallet angående den svenska tungindustrin. En prototyp är utvecklad baserad på kraven, prototypen är testad och jämförd med en central databas för att undersöka hur implementationen står sig vad gäller genomförbarhet, oföränderlighet, spårbarhet och säkerhet. Undersökningen resulterade i en prototyp baserad på Hyperledger Fabric. Prototypen lagrar produktcertifikaten och ger vissa garantier till oföränderligbarhet samt säkerhet. Möjligheten för aktörer i kedjan att använda prototypen hade stor inverkan på hur systemet utvecklades. Prototypen visar sig vara långsammare än en centraliserad lösning men mätningarna kan anses vara inom kraven för ett system inom tungindustrins leveranskedja. Skalbarheten av lösningen är beroende av kraven på säkerhet men är linjär i antalet certifikat som skickas och lagras. Resultaten visar också att den föreslagna lösningen inger mer tillit än en centraliserad lösning men att introducera blockkedjetekniken är en komplex process. Trovärdighet och garantier som ges av lösningen är till stor del beroende av komplexiteten vilket rapporten kommer fram till är det viktigaste för svensk tungindustri att ha i åtanke vid eventuell antagande av blockkedjeteknik.
APA, Harvard, Vancouver, ISO, and other styles
26

Pippow, Ingo. "Software-Agenten in Distributionsnetzen : Potenziale vertikaler Informationsteilung zur Senkung von Transaktionskosten /." Wiesbaden : Dt. Univ.-Verl, 2004. http://www.gbv.de/dms/zbw/388109858.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Fang, Fang, and 方芳. "A life-cycle-oriented negotiation framework for supply chain management: an agent-based approach withhybrid learning." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B39362437.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Fang, Fang. "A life-cycle-oriented negotiation framework for supply chain management : an agent-based approach with hybrid learning /." View the Table of Contents & Abstract, 2007. http://sunzi.lib.hku.hk/hkuto/record/B38289659.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Ekwall, Daniel. "Managing the risk for antagonistic threats against the transport network." Doctoral thesis, Göteborg : Borås : Division of Logistics and Transportation, Chalmers University of Technology ; School of Engineering, University of Borås, 2009. http://hdl.handle.net/2320/5033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Huang, Hsin-Hui. "An exploration of the execution of software system project for supply chain management in practice: Project as Practice study." Thesis, Umeå University, Umeå School of Business, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-18673.

Full text
Abstract:

 

The advantages of adopting a new software system for Supply Chain Management (SCM) enable the organization to enhance work efficiency as well as customer satisfaction in the supply chain network. These advantages make enterprises update their SCM system through project as a method of realize their strategic change. This research explores how the project manager leads the project team, a temporarily formed unit with multi-functional members, by looking into three focus concepts of the practice perspective: Practitioner, Praxis, and Practices. The empirical study utilized two projects in the electronics firms as the case study. It was decided that a qualitative approach was the most appropriate method to gather the data based on the practice perspective.

 

The findings of this thesis support this primacy of communication.  To successfully execute the short duration project for system change, intra-organizational communication has an important part to play in the success of change initiatives. Analysis revealed that the project managers’ soft skills are more important than their knowledge of using project-specific tools or techniques in managing short-duration projects. In the empirical study, the requirements of all project practitioners were not met due to tight schedule and limited resource. However, the project objectives were still achieved on time. Some key success factors were identified, such as top management commitment to the project, correct prioritization of different stakeholders’ power, and involvement of employees as early as possible within the change process. The study concludes that the three focus concepts of the practice perspective interplay during the project process and they contribute to the general framework in the short duration project for realizing strategic change, which can be a reference for industry participants in managing similar projects.

 

 

 

 

APA, Harvard, Vancouver, ISO, and other styles
31

Haberleitner, Helmut, Herbert Meyr, and Alfred Taudes. "Implementation of a demand planning system using advance order information." Elsevier, 2010. http://dx.doi.org/10.1016/j.ijpe.2010.07.003.

Full text
Abstract:
In times of demand shocks, when quantitative forecasting based on historical time series becomes obsolete, the only information about future demand is "advance demand information", i.e. interpreting early customer bookings as an indicator of not yet known demand. This paper deals with a forecasting method which selects the optimal forecasting model type and the level of integration of advance demand information, depending on the patterns of the particular time series. This constitutes the applicability of the procedure within an industrial application where a large number of time series is automatically forecasted in a flexible and data-driven way. The architecture of such a planning system is explained and using real-world data from a make-to-order industry it is shown that the system is flexible enough to cover different demand patterns and is well-suited to forecast demand shocks. (authors' abstract)
APA, Harvard, Vancouver, ISO, and other styles
32

Xue, Hao. "Hardware Security and VLSI Design Optimization." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright1546466777397815.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

van, Hooff Jonathan, and Oscar Tegni. "Development of Supply Chain : Information System Integration at Consignment Warehouse for Improved Efficiency." Thesis, Umeå universitet, Institutionen för matematik och matematisk statistik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-90520.

Full text
Abstract:
Sandvik Rock Tools is operating in a highly competitive market. This requires them to constantly improve the efficiency of their organization, in order for them to maintain their position as market leaders, both in a short-term and a long-term perspective. Sandvik Rock Tools is currently working on developing and further improving their supply chain. The supply chain is a key organizational function and improvements of the supply chain aim to yield benefits like lowered total costs and better utilized inventory levels. The purpose of our work has been to develop the supply chain between Sandvik’s in-market warehouse and their customer site at Dannemora. The main focus of this thesis has been to enable automatic data collection and to lower the stock levels at the customer site in Dannemora. This would be accomplished by improving the information flow between the two entities in the observed supply chain and by enabling real-time inventory information, easily accessible to the warehouse manager. A barcode system was implemented in the warehouse at the Dannemora customer site and was integrated with warehouse management software that was developed by the authors. The implemented barcode system and the warehouse management software were used at the Dannemora customer site for a period of two months. The effects of the implemented barcode system working in combination with the warehouse management software were observed in several operational areas after implementation, and the results were positive and beneficial. Firstly, the barcode system and warehouse management software simplified the warehouse manager’s decision process, by providing easy access to necessary warehouse management information, like realtime inventory information. Secondly, it made the day-to-day work routine of the warehouse manager easier, this being the case because the barcode system that had been implemented had digitalized and automated many tasks that had previously been performed manually by warehouse manager. An excellent example would be the simplified process for order placement and stocktaking. Thirdly, it improved the information flow between the Dannemora customer site and Sandvik’s in-market warehouse in Sandviken, thereby improving the overall effectiveness of the entire supply chain, through shared information. The barcode implementation successfully lowered inventory levels by six percent on average.
APA, Harvard, Vancouver, ISO, and other styles
34

Stone, Jamie. "Development of a framework for enhancing resilience in the UK food and drink manufacturing sector." Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/33501.

Full text
Abstract:
This thesis presents research undertaken to understand and enhance resilience in the UK Food and Drink Manufacturing Sector. It focuses on the development of a conceptual framework which establishes how specific vulnerabilities link to individual mitigation strategies available to the sector and the impact of such strategies on wider sustainability. The research in this thesis is divided into four main parts. The first part consists of three complementary review chapters exploring resilience as a theoretical concept, resilience in the UK Food and Drink Manufacturing sector and existing methods used to study and/or enhance resilience. The second part of the thesis begins by describing how the pragmatic philosophy and abductive stance underpinning the research, in combination with review findings, helped to determine the research techniques used in this work, which included the systematic review process and the mixed methods case study. Next, the research facilitating a novel conceptual framework describing how real-time vulnerabilities can be identified and mitigated in a way that is complimentary to the wider sustainability of the organisation is discussed. The third part of the thesis describes the practical set of tools, presented in the form of a workbook, which enable a Food and Drink Manufacturer to utilise the conceptual framework teachings to enhance their own resilience. The final section details key conclusions regarding the conceptual nature and practical enhancement of resilience for Food and Drink Manufacturers and the wider food system, as well as opportunities for future work. The conceptual integrity and practical usefulness of the conceptual framework and its derivative workbook toolset have been demonstrated through case studies with two UK Food and Drink Manufacturers. Results suggest two major benefits of the framework are the ability to identify an organisation's vulnerabilities based on actual mapping of their supply network and the ability to evaluate mitigating resilience strategies based on their broader impacts elsewhere within the organisation. In summary, the research reported in this thesis has concluded that resilience cannot be seen as a one-off solution for returning to how things were before disruption, but instead is a constant process of learning and adaptation in response to a company's ever-changing operating environments. The framework and workbook presented provide a novel and practical method for UK Food and Drink Manufacturers, of all sizes and production ranges, to identify and respond to their evolving vulnerabilities, as well as providing much needed synthesis and directions for future work at an academic level.
APA, Harvard, Vancouver, ISO, and other styles
35

Pimenta, de Almeida Mariana. "Automation of Supply Processes : A Study at Ericsson AB." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-264414.

Full text
Abstract:
In the Information and Communication Technology (ICT) industry, the pressure to accelerate the deployment of 5G technology has created a new competitive environment for businesses. This technology not only enables lower latency, but also higher number of connected devices, higher amounts of shared data, and faster. The growing demand from customers is pressuring every stage of the supply chain to become more efficient. In this industry, achieving a short time-tomarket is vital to stay ahead of competitors and position the company as a trend-setter in the eyes of customers. Therefore, it has become necessary to overall shorten lead times and deliver products in a faster way. This study was performed in collaboration with Ericsson AB, more specifically in the Ericsson Outbound Supply EMEA. Recent escalations from customers have shown that Ericsson’s ways of working to handle customer purchase orders are not being efficient. In many cases, it is taking longer to process the order than the lead times agreed on the contract with the customer. As a result, this study investigates how automation technologies can improve end-to-end order flows, how these can affect Ericsson as an organisation and its workforce, as well as which factors must be taken into consideration when implementing automation. In order to support the investigation, an analysis of the issues most frequently affecting hardware deliveries to customers was also conducted through the Spiderweb program. The latter is an internal improvement initiative of Ericsson Supply, focused on improving Ericsson’s order handling flows for the Market Area Europe and Latin America. The study was based on the following research questions: How can automation technologies help to improve Supply’s performance? How does automation impact the company as an organisation, its culture and workforce? How can the improvement methodology followed in the Spiderweb drive automation discoveries? Qualitative data was primarily collected through meetings with Spiderweb program drivers and 11 interviews held with different stakeholders at Ericsson Supply. Conclusively, this study indicates that the four critical factors that will require further developments for automation in Supply to become a reality are: its culture; the establishment of a data-driven organisation; the coordination of different processes and communication between dependent stakeholders; and the technical implementation of automation technology and other tools used locally. It is also concluded that the full potential of automation will only be realised if accompanied by a corresponding development of the workforce, and a clear communication of the strategy from top management. Lastly, the main recommendation to Supply regards the need to standardise order handling processes and simplify order flows, prior to any automation implementation in Supply.
Inom informations- och kommunikationsteknologinäringen (IKT) har trycket för att påskynda implementeringen av 5G-teknik skapat en ny konkurrensmiljö för företagen. Denna teknik möjliggör inte bara lägre latens, utan också större antal anslutna enheter, större mängder delad data och snabbare. Den växande efterfrågan från kunderna pressar varje steg i leveranskedjan att bli effektivare. I denna bransch är det viktigt att uppnå en kort tid till marknaden för att ligga före konkurrenterna och positionera företaget som trendmässigt i kunders ögon. Därför har det blivit nödvändigt att övergripande förkorta ledtiderna och leverera produkter på ett snabbare sätt. Denna studie utfördes i samarbete med Ericsson AB, mer specifikt i Ericsson Outbound Supply EMEA. Nya upptrappningar från kunder har visat att Ericssons sätt att arbeta för att hantera kundköporder inte är effektiva. I många fall tar det längre tid att behandla beställningen än de ledtider som avtalats med kunden. I denna studie undersöks hur automatiseringstekniker kan förbättra ordningsflödena från början till slut, hur dessa kan påverka Ericsson som organisation och dess arbetskraft, samt vilka faktorer som måste beaktas vid implementering av automatisering. För att stödja utredningen genomfördes också en analys av de problem som oftast påverkar hårdvaruleveranser till kunder genom Spiderweb-programmet. Det senare är ett internt förbättringsinitiativ från Ericsson Supply, fokuserat på att förbättra Ericssons orderhanteringsflöden för marknadsområdet Europa och Latinamerika. Studien baserades på följande forskningsfrågor: Hur kan automatiseringsteknologier bidra till att förbättra Supply’s prestanda? Hur påverkar automatisering företaget som organisation, dess kultur och arbetskraft? Hur kan förbättringsmetodiken följas i Spiderweb-enhetens automatiseringsupptäckter? Kvalitativ data samlades främst genom möten med Spiderwebprogramdrivare och 11 intervjuer med olika intressenter på Ericsson Supply. Sammanfattningsvis indikerar denna studie att de fyra kritiska faktorerna som kommer att kräva ytterligare utveckling för att automatisering i Supply ska bli verklighet är: dess kultur; inrättande av en datadriven organisation; samordning av olika processer och kommunikation mellan beroende intressenter; och teknisk implementering av automatiseringsteknologi och andra verktyg som används lokalt. Det dras också slutsatsen att automatiseringspotentialen fullt ut kommer att realiseras om den åtföljs av en motsvarande utveckling av arbetskraften och en tydlig kommunikation av strategin från toppledningen. Slutligen beaktar huvudrekommendationen till Supply behovet av att standardisera orderhanteringsprocesser och förenkla orderflöden innan automatiseringsimplementering i Supply startar.
APA, Harvard, Vancouver, ISO, and other styles
36

Johnson, Ludwig, and Lukas Mårtensson. "Assessing HTTP Security Header implementations : A study of Swedish government agencies’ first line of defense against XSS and client-side supply chain attacks." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21725.

Full text
Abstract:
Background. Security on the web is a fundamental requirement as it becomes a bigger part of society and more information than ever is shared over it. However, as recent incidents have shown, even Swedish government agencies have had issues with their website security. One such example is when a client-side supply chain for several governmental websites was hacked and malicious javascript was subsequently found on several governmental websites. Hence this study is aimed at assessing the security of Swedish government agencies’ first line of defense against attacks like XSS and client-side supply chain. Objectives. The main objective of the thesis is to assess the first line of defense, namely HTTP security headers, of Swedish government agency websites. In addition, collecting statistics of what HTTP security headers are actually used by Swedish government agencies today were gathered for comparison with similar studies. Methods. To fulfill the objectives of the thesis, a scan of all Swedish government agency websites, found on Myndighetsregistret, was completed and an algorithm was developed to assess the implementation of the security features. In order to facilitate tunable assessments for different types of websites, the algorithm has granular weights that can be assigned to each test to make the algorithm more generalized. Results. The results show a low overall implementation rate of the various HTTP security headers among the Swedish government agency websites. However, when compared to similar studies, the adoption of all security features are higher among the Swedish government agency websites tested in this thesis. Conclusions. Previous tools/studies mostly checked if a header was implemented or not. With our algorithm, the strength of the security header implementation is also assessed. According to our results, there is a significant difference between if a security header has been implemented, and if it has been implemented well, and provides adequate security. Therefore, traditional tools for testing HTTP security headers may be inefficient and misleading.
APA, Harvard, Vancouver, ISO, and other styles
37

Barkhadle, Hassan. "Contribution du maillon portuaire à la performance de la chaîne logistique globale : cas du port de Djibouti." Thesis, Brest, 2014. http://www.theses.fr/2014BRES0052.

Full text
Abstract:
Aujourd’hui, avec la mondialisation et la concurrence internationale effrénées, les chaînes logistiques globales (CLG) sont conçues à l’échelle planétaire, les places portuaires deviennent entre autre, des sites d’implantation idéale, permettant ainsi la valorisation des marchandises, grâce à la performance de son maillon portuaire. Depuis l’élaboration d’un partenariat commercial en 2000, entre le maillon portuaire de Djibouti (MPD) et le groupe international portuaire Dubaï Port World (DPW), entre 2002 et 2012, le trafic conteneurisé s’est accru de près de 700 %. De plus, depuis l’ouverture de Djibouti Free Zone (DFZ) en 2004, gérée totalement par une filiale du groupe DPW, près de 150 entreprises sont venues s’y implanter, dont plus de la moitié sont des entreprises étrangères. Partant de ce double constat, notre problématique de recherche s’attache à comprendre la contribution du MPD, à la performance de la CLG. Dans une phase de recherche empirique, qui nous a permis d’identifier les dimensions et les axes caractérisant la performance logistique du MPD, nous déployons un modèle descriptif et synthétique de la performance portuaire
With globalization and international competition sprees, the Supply Chain (SC) are designed on a global scale, the port spaces, thus allowing ideal implementation sites, thanks to the performance of its link port. Since the development of a strategic partnership between the link port of Djibouti (LPD) and the international group port Dubai Port World (DPW) in 2000, the containerized traffic increased of almost 700 %, between 2002 and 2012. With in addition, with the opening of Djibouti Free Zone (DFZ) in 2004, managed entirely by a subsidiary of the group DPW, nearly 150 businesses have implemented there warehouses in DFZ, with more than half of whom are foreign companies. Starting from this dual observation, our research has been focused on understanding the contribution of the LPD, to the performance of the SC. In a phase of empirical research, which has allowed us to identify dimensions and axes characterizing the logistics performance of the LPD, we deploy a descriptive and synthetic model of the port performance
APA, Harvard, Vancouver, ISO, and other styles
38

Tasyurt, Ibrahim. "A Web Service Based Trust And Reputation System For Transitory Collaboration Formation In Supply Chains." Master's thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12610887/index.pdf.

Full text
Abstract:
Today, advancements in the information technologies increased the significance of electronic business in the world. Besides the numerous advantages provided by these advancements, competition has also increased for the enterprises. In this competitive environment, companies have to access information faster and response to the changes quickly. In a supply chain, it is a highly possible that one of the partners may defect in providing its services. When these exceptional cases occur, the pending parties have to establish transitory collaborations to replace the missing partner promptly in order not to suffer this deficiency economically. Companies need to know the competences and capabilities of their prospective business partners before establishing partnerships. Furthermore, the reputations of the candidate partners have to be known to avoid possible regrettable partnerships. In this thesis, we have developed a trust and reputation model that can be used over supply chains to determine and exploit the reputation of providers in transitory collaboration formation. The trust model takes the behaviors of providers, consumers into account and combines multiple criteria to aggregate a single reputation value. Experimental results show that, our model provides a robust and reliable reputation mechanism addressing a number of issues that have not been covered in the related studies. In addition to this, an implementation of the model is realized within a Web application and the functionalities have been exposed as Web Services. The interoperability of the Web Services have been ensured through standard GS1 XML documents, which are utilized and extended in scope of the thesis. Furthermore, client interaction is provided through Web based user interfaces and REST services.
APA, Harvard, Vancouver, ISO, and other styles
39

Li, Xiao Wen. "Strategic supply chain management : application of QAD, a leading provider of industry-specific e-business software and services to manufacturers in China." Thesis, University of Macau, 2000. http://umaclib3.umac.mo/record=b1636662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Milovan, Tomašević. "Adaptivni model za upravljanje lancima snabdevanja u malim i srednjim preduzećima." Phd thesis, Univerzitet u Novom Sadu, Fakultet tehničkih nauka u Novom Sadu, 2018. https://www.cris.uns.ac.rs/record.jsf?recordId=106850&source=NDLTD&language=en.

Full text
Abstract:
Osnovni istraživački problem ove disertacije predstavlja razvoj modelaza upravljanje lancima snabdevanja u cilju podizanje kvaliteta usluge.Stoga je razvijen adaptivni model za upravljanje lancima snabdevanjakoji se sastoji od modela za: upravljanje lancima snabdevanja,upravljanje korisničkim zahtevima i ocenu kvaliteta pružene usluge. Usvrhu primene adaptivni model je predstavljen algoritmom sa preciznodefinisanim koracima koje korisnik treba da sprovede da bi podigaonivo kvaliteta usluge i održao stabilnost lanca snabdevanja. Verifikacijamodela je urađena na primeru 17 lanaca snabdevanja na teritorijiRepublike Srbije, što je rezultiralo odgovorima na koji način se možepodići kvalitet usluge.Doprinos istraživanja ogleda u mogućnosti direktne primenerazvijenog modela i pružanja novih informacija za naučnu i stručnujavnost koje mogu predstavljati kvalitetnu podlogu daljem razvojumodela za upravljanje lancima snabdevanja.
The basic research problem of this dissertation is the development ofsupply chain management model in order to improve the quality ofservice. Therefore, an adaptive supply chain management model hasbeen developed that consists of a model for: supply chain management,management of user requirements and assessment of the quality ofservice provided. For the purpose of application the adaptive model, itis presented an algorithm with precisely defined steps that the userneeds to implement in order to raise the level of service quality andmaintain the stability of supply. The model verification was done onthe example of 17 supply chains in the territory of the Republic ofSerbia, which resulted in answers on how to improve the quality of theservice. The contribution of the research is reflected in the possibilityof direct application of the developed model and providing newinformation for the scientific and professional public, which canrepresent a quality basis for the further development of the supplychain management model.
APA, Harvard, Vancouver, ISO, and other styles
41

Franco, Emilio. "Information Technology (IT) Projects – A Psychological Contract Perspective." Thèse, Université d'Ottawa / University of Ottawa, 2013. http://hdl.handle.net/10393/24276.

Full text
Abstract:
Incorporating a psychological contract perspective into information technology projects, this study intends to explore the elements of the software publisher-reseller-end user psychological contract in the context of IT projects and contribute to existing literature in the field of IT psychological contracts. The data for this study was collected via 10 interviews conducted across 5 different cases. Interviewees were asked to describe IT projects they were recently involved in and outline what they perceived to be their obligations towards the other stakeholders and likewise, the obligations of the other stakeholders upon them. Interviews were transcribed and coded in accordance with existing IT project psychological contract elements derived from literature. The results of this study provided support to all psychological contract elements of the existing model and suggest refinements to better capture the perceived obligations of stakeholders in IT Projects. Furthermore, we observe that while the resellers’ and software publishers’ psychological contracts with end users conformed to the obligations expected under the model of supplier-customer relationships, the software reseller-software publisher psychological contracts reciprocally contained elements of both supplier and customer obligations. Finally, the findings of this study revealed that critical to the success of IT projects are the elements of transparency, accuracy, dedication, knowledge and responsibility.
APA, Harvard, Vancouver, ISO, and other styles
42

Trompeter, Philipp, and Paavo Melin. "Examination of the advantageousness of the AEO certification to NORMA Sweden AB." Thesis, Linnéuniversitetet, Institutionen för ekonomistyrning och logistik (ELO), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-57337.

Full text
Abstract:
NORMA Sweden AB is part of NORMA Group, a global market and technology leader in engineered joining technology. The Swedish business unit, NORMA Sweden, trades with various internal and external customers in different customs territories. In order to facilitate this, the management is considering to attain the Authorized Economic Operator (AEO) certification that allows for customs facilitations. The AEO program consists of the AEO-C and AEO-S certification. Those two certifications can be achieved independently, they have different barriers and create different benefits. The extent to that these general benefits and barriers create benefits and barriers in a specific company varies a lot depending on the individual supply chain settings of the organisation. The purpose of this thesis is to assess the advantage of the AEO-C and the AEO-S certification to NORMA Sweden. In order to achieve a comprehensive result, the benefits and barriers of the AEO certifications to NORMA Sweden are analysed in the context of the company’s strategy and the drivers for the AEO application. A Framework is developed to conduct the examination. It allows to appraise the benefits and barriers of the certification that are combined into different impact areas. This is accomplished by a quantitative analysis that is based on a simplified scale of 0-3. The results are verified by a subsequent qualitative analysis. The Analysis has been conducted under consideration of literature, customs guidelines and empirical information that has been gathered by expert interviews as well as by observations. The results of the quantitative analysis indicate that both certifications are currently not beneficial to NORMA Sweden. Further, it is obvious that the gap between barriers and benefits is smaller for the AEO-C certification as it is for the AEO-S certification. The qualitative analysis reveals that NORMA Sweden should aim for an AEO certification anyway due to the strategy of the parent company and expected future developments. Following the findings of the quantitative and qualitative analysis the company is advised to aim for the AEO-C certification first.
APA, Harvard, Vancouver, ISO, and other styles
43

Tröger, Ralph. "Supply Chain Event Management – Bedarf, Systemarchitektur und Nutzen aus Perspektive fokaler Unternehmen der Modeindustrie." Doctoral thesis, Universitätsbibliothek Leipzig, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-155014.

Full text
Abstract:
Supply Chain Event Management (SCEM) bezeichnet eine Teildisziplin des Supply Chain Management und ist für Unternehmen ein Ansatzpunkt, durch frühzeitige Reaktion auf kritische Ausnahmeereignisse in der Wertschöpfungskette Logistikleistung und -kosten zu optimieren. Durch Rahmenbedingungen wie bspw. globale Logistikstrukturen, eine hohe Artikelvielfalt und volatile Geschäftsbeziehungen zählt die Modeindustrie zu den Branchen, die für kritische Störereignisse besonders anfällig ist. In diesem Sinne untersucht die vorliegende Dissertation nach einer Beleuchtung der wesentlichen Grundlagen zunächst, inwiefern es in der Modeindustrie tatsächlich einen Bedarf an SCEM-Systemen gibt. Anknüpfend daran zeigt sie nach einer Darstellung bisheriger SCEM-Architekturkonzepte Gestaltungsmöglichkeiten für eine Systemarchitektur auf, die auf den Designprinzipien der Serviceorientierung beruht. In diesem Rahmen erfolgt u. a. auch die Identifikation SCEM-relevanter Business Services. Die Vorzüge einer serviceorientierten Gestaltung werden detailliert anhand der EPCIS (EPC Information Services)-Spezifikation illustriert. Abgerundet wird die Arbeit durch eine Betrachtung der Nutzenpotenziale von SCEM-Systemen. Nach einer Darstellung von Ansätzen, welche zur Nutzenbestimmung infrage kommen, wird der Nutzen anhand eines Praxisbeispiels aufgezeigt und fließt zusammen mit den Ergebnissen einer Literaturrecherche in eine Konsolidierung von SCEM-Nutzeffekten. Hierbei wird auch beleuchtet, welche zusätzlichen Vorteile sich für Unternehmen durch eine serviceorientierte Architekturgestaltung bieten. In der Schlussbetrachtung werden die wesentlichen Erkenntnisse der Arbeit zusammengefasst und in einem Ausblick sowohl beleuchtet, welche Relevanz die Ergebnisse der Arbeit für die Bewältigung künftiger Herausforderungen innehaben als auch welche Anknüpfungspunkte sich für anschließende Forschungsarbeiten ergeben.
APA, Harvard, Vancouver, ISO, and other styles
44

Žideckas, Egidijus. "Tiekimo proceso kontrolės metodų analizė ir taikymas kuriant informacinę sistemą." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2004. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2004~D_20040527_154217-86410.

Full text
Abstract:
An overall process of globalization influences major changes in companies’ bussiness strategy. Supply chain management (SCM) becomes one of the most prioritetical activities in company. Seeking to survive in hard competition, they must improve their distribution strategies. Spreading Net technology requires flexible company to work directly with suppliers and to be able to react quickly and reasonably to demanding environmental changes. The classic objective of SCM is to be able to have the right products in the right quantities (at the right place) at the right moment at minimal cost. This requires a close integration of effective control functions and SCM to assure correctness and maturity of sending and receiving information, complience with internal company rules and supply strategies. This paper analyses SCM information systems emphasising their principles, pecularities and weaknesses. A new control method of SCM is introduced — „SCM using complex control methods“. It adds content management principles to current SCM control methods. This paper describes system concept, system architecture and generic business process models. To prove effectiveness of this method software was designed, developed and implemented in one big trading company. Additionally quality research of implemented software was made and it showed the effectiveness of applying quality assurence in software implementation process.
APA, Harvard, Vancouver, ISO, and other styles
45

Mazaheri, Arsham. "How the ISPS code affects port and port activities." Thesis, Högskolan i Borås, Institutionen Ingenjörshögskolan, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-18834.

Full text
Abstract:
Following terrorist attacks on twin towers in the USA and Limburg oil tanker in Yemen, theIMO has defined a supplementary chapter and an appendix named ISPS code to its SOLAS,to prevent similar events in maritime transportation. The ISPS code forces the ports, ships andall organizations, who work in marine industry, to keep their security gates more tightly. Thissituation affects involved parties in good and bad ways. Good impacts like increasing insecurity level, efficiency, effectiveness and competitiveness; and bad effects like increasing inannual costs, administration works and manning.This thesis is based on a study that was run by preparing an electronic questionnaire anddistributing among the Swedish ports to get first hand information about the ISPS codeimpacts on port and port activities. Through them it was found that the ISPS code achieved itsmain goal, which it has been described as less smuggling and less theft in Sweden; whileactually the ISPS is an anti terrorism regulation by its nature.On the other hand, the indirect impacts of the code have played an important role in itssuccess; therefore they have been reviewed as well. The ISPS code’s indirect impacts on portscan be summarized as its effects on efficiency, effectiveness, administration cost, serviceprice, profit, competitiveness, service level, customer satisfaction, damage occurring,documentation, manning , lead time and checking process.
Uppsatsnivå: D
APA, Harvard, Vancouver, ISO, and other styles
46

Cunha, Gilberto José da. "Metodologia para modelagem do sistema agroindustrial visando identificar parâmetros de rastreabilidade e qualidade - aplicação na malacocultura continental." Universidade de São Paulo, 2008. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-11052009-134159/.

Full text
Abstract:
O trabalho apresenta como inovação, inclusive em nível internacional, a utilização de métodos e técnicas de engenharia de software e de sistemas aplicadas aos Sistemas Agroindustriais (SAG), definindo uma metodologia objetivando facilitar maior compreensão dos relacionamentos e atividades dos diversos agentes componentes de um SAG; modelar graficamente as atividades dos agentes e demais envolvidos em cada etapa de uma cadeia produtiva, através de IDEF0, BPMN e Casos de Uso; identificar informações para qualidade, rastreabilidade do produto e seus insumos ao longo da cadeia produtiva. Efetua, também com caráter inovador, a aplicação dessa metodologia na área de produtos exóticos através da modelagem de atividades pertencentes ao SAG da Malacocultura Continental (criação comercial de escargots), agronegócio inserido na política de incentivo à Agroindústria Familiar. As exigências dos consumidores de produtos agropecuários em relação a qualidade, segurança e rastreabilidade tem crescido ano após ano devido ao medo de problemas com saúde, como o mal da vaca louca. A modelagem do Sistema Agroindustrial (SAG) possibilita identificar necessidades de informação e automação em uma cadeia produtiva, explorar essas possibilidades de modo a permitir a especificação de sistemas de informação que suportem os negócios dos diversos agentes ao longo da cadeia produtiva satisfazendo os requisitos de qualidade e rastreabilidade dos consumidores. A aplicação de um modelo de caso de uso também é apresentada, descrevendo as atividades componentes de processos ao longo da cadeia produtiva, permitindo a identificação de requisitos e informações de rastreabilidade e qualidade. A técnica de casos de uso aplicada na cadeia produtiva ajuda na especificação de sistemas de informação de melhor qualidade e mais aderentes aos processos de negócio envolvidos. Como exemplo é a apresentada a modelagem (utilizando IDEF0, BPMN e casos de uso) de alguns processos de negócio e informação pertencentes à cadeia produtiva da malacocultura continental. A aqüicultura mundial tem se destacado pelo crescimento e sucessivo aumento de produtividade, conferindo, a este tipo de produção, posição de destaque dentro do setor pecuário internacional. Entre as várias modalidades de aqüicultura, nas duas últimas décadas, a criação de escargots (malacocultura) tem merecido atenção de empresários, órgãos de fomento governamentais e pesquisadores. Em águas continentais, a malacocultura continental especialmente a ampularicultura pode ser reconhecida como forma para produção de moluscos com baixo impacto ambiental, sob sistema de produção compatível com pequenas propriedades, o que contribui na maior oferta de alimento para as famílias rurais, aumento na disponibilidade de alimentos de alto valor nutricional e na renda familiar.
It is proposed the application of some Systems and Software Engeneering techniques to the modeling of agro-industrial systems, in an innovative way, defining a methodology in order to better understand the activities and relationships among the many agents within an specific supply chain. It also permits the productive chain graphical modeling using IDEF0, BPMN and Use Cases. The main goal is to identify information for product traceability and quality through the productive chain. There is also presented, another innovation, the application of this methodology to the Continental Malacoculture Agro-industrial System. Customers\' requirements for agro food products quality, safety and traceability have been rising year after year due to the fear of health problems, such as the mad cow disease. The Productive Chain Modeling helps identifying the information and automation needs of a production chain, exploring its possibilities in order to specify information systems that support the business of the many agents throughout the agro food chain and fulfills customers\' quality and traceability requirements. The application of Use Case Model is also presented for requirements and traceability identification and gathering throughout the productive chain. The Use Case technique applied to the productive chain helps to specify more quality and adherent information systems. As an example of those methods, some business and information processes modeling applied to the Continental Malacoculture Productive Chain are presented, using the IDEF0, BPMN and use case techniques. Worldwide aquaculture has increased in importance due to growth and successive increase in productivity, conferring this type of production an outstanding position in the international animal production sector. Amongst different modalities of aquaculture, in the last two decades, the production of escargots (malacoculture) has deserved attention from businessmen, government and researchers. In continental waters, Continental Malacoculture, especially ampullariculture can be seen as a way of producing low impact mollusks, using a system compatible with small farms production, contributing to a greater increase in the availability of high nutritional value food and also improving rural families\' income.
APA, Harvard, Vancouver, ISO, and other styles
47

Salman, Rosine Hanna. "Exploring Capability Maturity Models and Relevant Practices as Solutions Addressing IT Service Offshoring Project Issues." PDXScholar, 2014. https://pdxscholar.library.pdx.edu/open_access_etds/1843.

Full text
Abstract:
Western countries' information technology and software intensive firms are increasingly producing software and IT services in developing countries. With this swift advancement in offshoring, there are many issues that can be investigated which will enable companies to maximize their benefits from offshoring. However, significant challenges can occur throughout the lifecycle of offshoring IT service projects that turn the potential benefits into losses. This research investigated CMM/CMMI best practices and their effects on managing and mitigating critical issues associated with offshore development. Using a web based survey, data was collected from 451 Information Technology and software development firms in the US. The survey instrument was validated by an expert panel which included practitioners and researchers. The survey population consisted of Information Technology and software engineering managers who work on offshore IT and software development projects. Statistical methods including Chi Square and Cramer's V were used to test the research hypotheses. The results of the analysis show that IT companies applying CMM/CMMI models have fewer issues associated with IT offshoring. When US IT companies utilize and incorporate different practices from TSP and People CMM into CMMI for DEV/SVC and CMMI for ACQ, they have fewer offshoring issues related to language barriers and cultural differences. The results of this research contribute to the existing body of knowledge on the offshoring of IT services from the client management perspective and provide practitioners with increased knowledge regarding IT offshoring decisions.
APA, Harvard, Vancouver, ISO, and other styles
48

Fontana, Caio Fernando. "Metodologia para a implantação dos processos da cadeia logística segura." Universidade de São Paulo, 2009. http://www.teses.usp.br/teses/disponiveis/3/3143/tde-12082010-120918/.

Full text
Abstract:
A formulação da Metodologia para a Implantação dos Processos da Cadeia Logística Segura visa estabelecer parâmetros e metodologia para aplicação dos diversos conceitos e programas de segurança para o comércio exterior visando o controle de carga que vêm sendo implementados por órgãos de governo e organismos internacionais. Estes programas têm como foco o controle sobre os processos de movimentação de carga, através da utilização de tecnologia aplicada à inspeção não intrusiva de carga, rastreamento e lacres eletrônicos, sistemas de troca eletrônica de informação e da integração sistêmica destes componentes. Desta forma, esta tese busca demonstrar como o modelo proposto impactará nos controles fiscais e aduaneiros bem como na otimização dos fluxos logísticos. O modelo proposto está ancorado nas diretrizes de segurança estabelecidas pela Organização Mundial das Aduanas (OMA) através do SAFE Framework of Standards, pela International Maritime Organization (IMO) através do Código Internacional de Segurança e Proteção a Navios e Instalações Portuárias (ISPS-Code), pelo Governo dos Estados Unidos da América através do Container Security Initiative (CSI) e do Safe Ports Act, pela Secretaria da Receita Federal Brasileira através do Plano Nacional de Segurança Aduaneira (PNSA) da Nota Fiscal Eletrônica (NFe) e Conhecimento de Trânsito Eletrônico (CTe) em conjunto com as Secretarias de Fazenda Estaduais, bem como pelo setor privado quem vêm implementado iniciativas voltadas ao controle e monitoramento de carga através de sistemas de Gerenciamento de Risco e os sistemas de Rastreamento e Lacres Eletrônicos aplicados à cargas e veículos. Para efeito de contextualização será apresentado o processo de importação e exportação, seus aspectos de transporte, armazenagem e manipulação de carga, bem como uma macro visão do fluxo documental e os intervenientes públicos e privados envolvido no processo. A seguir, serão apresentadas as propostas de normatização do processo de cadeia logística segura elaboradas pela Customs-Trade Partnership Against Terrorism (C-TPAT), Business Alliance for Secure Commerce (BASC) e da International Organization for Standardization (ISO) através da ISO 28000 e correlatas. Feitas estas análises e contextualização será formulado o modelo operacional que consiste na proposição de um controle logístico integrado. Esta abordagem tem por objetivo apresentar as diversas características dos fluxos de carga por modal e tipo, ou seja, granel, container e carga geral. Este modelo, se implementado, poderá proporcionar um aumento de produtividade do setor, pois a adoção de medidas de controle de carga exige que o planejamento das operações logísticas seja efetuado, acompanhado e corrigido sempre que necessário. Desta forma, o setor de logística poderá se valer desta ferramenta para o aumento de produtividade e conseqüente redução do Custo Brasil. O modelo de implementação será proposto apoiado em quatro diretrizes: normatização de processos, formulação de um modelo de avaliação contínua de nível de serviço das empresas e do processo, normatização de tecnologia, modelo de acreditação de processo e entidades por modal e/ou área de atuação. Neste trabalho serão detalhados o Modelo de Normatização de Processos e o Sistema de Avaliação de Nível de Serviço. A Normatização Tecnológica e o Modelo de Acreditação serão desenvolvidos em trabalhos futuros.
The development of the Methodology for the Implantation of the Processes of the Safe Logistic Chain aims at to establish parameters and methodology for application of the diverse concepts and programs of security for the foreign commerce being aimed at the load control that come being implemented for agencies of government and international organisms. These programs have as focus the control on the processes of load movement, through the use of technology applied to the not intrusive inspection of load, electronic tracking and sealing waxes, systems of electronic exchange of information and the systemic integration of these components. In such a way, this thesis searchs to demonstrate as the considered model will impact in the fiscal and customs controls as well as in the improvement of the logistic flows. The considered model is anchored in the lines of direction of security established by the Organização Munidal das Aduanas (OMA) through the SAFE Frameworks of Standards through the International Maritime Organization (IMO), through the International Code of Security and Protection the Ships and Port Installations (ISPS-Code), for the Government of the United States of America through Container Security Initiative (CSI) and of Safe Ports Act, for the Secretariat of the Brazilian Federal Prescription through the Plano Nacional de Segurança Aduaneira (PNSA) of Nota Fiscal Eletrônica (NFe) and Conhecimento de Trânsito Eletrônico (CTe) in set with the Secretarias de Fazenda Estaduais, as well as for the private sector who they come implemented initiatives directed to the control and monitorial of load through systems of Management of Risk and the systems of Tracking and Electronic Sealing waxes applied to loads and vehicles. For context effect, it will be presented the process of importation and exportation, its aspects of transport, load storage and manipulation, as well as a macro vision of the documentary flow and the intervening private public and involved in the process. To follow the proposals of regularization of the logistic process of chain will be presented insurance elaborated by Customs-Trade Partnership Against Terrorism (C-TPAT), Business Alliance will be Secure Commerce (BASC) and of the International Organization for Standardization (ISO) through the ISO 28000 and correlates. The operational model that will be formulated consists of the proposal of an integrated logistic control. This boarding has for objective to present the diverse characteristics of the modal load flows and type, that is granary, container and general load. The implementation of this model will provide to an increase of productivity of the sector therefore the adoption of measures of load control demands that the planning of the logistic operations is effected, followed and corrected whenever necessary. In such a way the sector of logistic could use this tool for the increase of productivity and consequence reduction of what is called as Custo Brasil. The implementation model will be formulated supported in four pillars: regularization of processes, regularization of technology, formularization of a model of Acreditação of modal process and entities for and/or area of performance and the formularization of a model of continuous evaluation of level of service of the companies and the process.
APA, Harvard, Vancouver, ISO, and other styles
49

Bonatto, Heitor. "Segurança na cadeia de suprimentos internacional : protocolo de gestão de risco para o transporte marítimo de cargas less than container load." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2016. http://hdl.handle.net/10183/150492.

Full text
Abstract:
A gestão das ameaças e dos riscos nas empresas tem se dedicado a estudar estes problemas, pelo viés de mercado, com o intuito de torná-las mais preparadas para enfrentar estes desafios. Nesse sentido, uma série de instrumentos de análise diagnosticaram que as ameaças e os riscos fazem parte da natureza das relações empresariais. Dentre as inúmeras relações que uma empresa estabelece para atingir os seus objetivos, destacam-se as que estão inseridas em um sistema denominado “cadeia de suprimentos” que, em decorrência do processo de globalização tornou-se internacionalizada. As empresas, ao prolongarem suas cadeias de suprimentos “além fronteiras”, estão submetidas, às influências do ambiente econômico, geopolítico, social e histórico. Nesses ambientes, o ano de 2001 originou uma série de estudos de gestão de risco que identificaram, nas ameaças externas ou exógenas, isto é, as que estão fora do viés de mercado, a possibilidade de tornar a cadeia de suprimentos internacional insegura. Tais ameaças se configuram em ações da natureza e ações praticadas pelo ser humano, por meio de atos criminosos, como, o terrorismo, o tráfico, o contrabando e a pirataria marítima Além das empresas, os países criaram regimes internacionais que buscaram proteger as cadeias de suprimentos, principalmente, em seu sistema de transporte, destacando-se o modo chamado “marítimo”, em razão da sua intensa utilização para transportar cargas. O presente estudo tem como objetivo propor um protocolo de gestão de risco para o transporte marítimo de cargas “less than container load”, para tornar a cadeia de suprimentos internacional mais segura. A metodologia utilizada nesta pesquisa, foi descritiva e documental, já que descreveu o processo de operacionalização e baseou-se na análise dos documentos, utilizados na gestão do transporte marítimo “less than container load”. Conclui-se, assim, que o operador de transporte multimodal, como responsável por operacionalizar uma forma de transportar cargas, a qual torna a cadeia de suprimentos insegura, tem condições e, principalmente, o dever de juntar-se aos outros atores, em prol do aumento da segurança do sistema.
The management of threats and risks in the company has been dedicated to study these problems by market bias in order to make them better prepared to face these challenges. In this regard a number of analytical tools diagnosed threats and risks as part of the business relations. Among the many relationships that a company established to achieve their goals, we highlight those that are embedded in a system called the supply chain, which as a result of the globalization process has become internationalized. Companies to extend their supply chains "across borders", are subject to the influences of economic, geopolitical, social and historical environment. In these environments, the year 2001 led to a series of risk management studies that have identified the external or exogenous threats, those outside the market bias, the possibility of making the chain of uncertain international supplies. Such threats are configured shares of nature and actions taken by humans, by means of criminal acts as terrorism, trafficking, smuggling and maritime piracy In addition to companies, countries have created international regimes that sought to protect supply chains, especially in its transport system, highlighting the called maritime, because of their heavy use to transport cargo. The thesis aims to propose a risk management protocol for the shipping cargo "less than container load" to make the international supply chain more secure. The methodology used was based on descriptive type and documentary because described the operational process and analized documents used in the management of shipping “less than container load”, In conclusion, the multimodal transport operator who is responsible for operating a means of transporting cargo , which makes the supply chain insecure supplies, has conditions , and especially the obligation to join the other actors , in favor of the increase system security.
APA, Harvard, Vancouver, ISO, and other styles
50

Casto, Matthew James. "Multi-Attribute Design for Authentication and Reliability (MADAR)." The Ohio State University, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=osu1512009861557857.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography