Дисертації з теми "Software Supply Chain Security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Software Supply Chain Security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Vu, Duc Ly. "Towards Understanding and Securing the OSS Supply Chain." Doctoral thesis, Università degli studi di Trento, 2022. http://hdl.handle.net/11572/333508.
Повний текст джерелаMassimino, Brett J. "Operational Factors Affecting the Confidentiality of Proprietary Digital Assets." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1405683732.
Повний текст джерелаSichel, Alexander R. (Alexander Russell). "Supply chain security along the Columbia River : an analysis of maritime supply chain security with respect to communication between security experts." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33589.
Повний текст джерелаIncludes bibliographical references (leaves 74-75).
The amount of cargo that enters the US border is at an all time high. Cargo containers and vessel shipments enter the US from all over the world. Tracking these shipments from their origin to destination requires professional expertise. Security organizations, such as the Regional Maritime Security Coalition of the Columbia River, realize the potential of these professionals, who track and coordinate cargo containers as they move through a supply chain, to enhance security of maritime cargo. In order to utilize these supply chain logistic professionals in a security coalition, proper training and certification would be required to comply with the US Federal Code on Liability Protection. This study examines the requirements that are necessary to certify supply chain logistic professionals as certified volunteers in an information sharing, security communication network to prevent terrorist activity, smuggling, theft, and to assist in general crisis mitigation. The thesis studies how the RMSC is currently developing its security communication system around supply chain logistic professionals, and the requirements and training that would be necessary to certify them under the US Federal Code.
by Alexander R. Sichel.
S.M.
Park, Hong. "Impact of supply chain security orientation on port performance." Thesis, Cardiff University, 2013. http://orca.cf.ac.uk/52117/.
Повний текст джерелаGarshasbi, Farzam, and Ebrahimi Shahram Pasha. "Supply Chain Security Programs Comparing TAPA FSR with ISPS." Thesis, Högskolan i Borås, Institutionen Ingenjörshögskolan, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-16642.
Повний текст джерелаProgram: BSc in Industrial Engineering - International Business Engineering
Holt, Christopher Michael Taylor 1968. "Supply chain simulator : an approach for development of software and methodology for simulation of supply chain management." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/9495.
Повний текст джерелаIncludes bibliographical references (leaves 94-97).
Many companies see how new strategies and technologies can enable more efficient and adaptive supply chains-but they struggle to understand how these technologies overlay with existing processes and personnel issues both during and after implementation. This thesis investigates the concept of a simulated environment where multiple constituents whether they are different parts of a company's organization or different companies within a supply chain-can come together to design and experiment with new supply chain structures. The thesis explores the argument that the supply chain can be simulated, and evaluates different approaches to developing such a simulation that would allow low-risk experimentation and accelerated learning for supply chain managers. The thesis begins with an executive summary that provides a high level treatment of the challenges and recommendations associated with supply chain simulation, then proceeds to present a definition of the elaborate interrelationships between companies, technologies and business processes that collectively shape an industry's supply chain. This is followed by a discussion of complexity theory and general simulation techniques that could be applicable to the development of a software simulation environment in this area. Then, a review of efforts to date to simulate management of the supply chain, including approach, resources required, and eventual results is followed by a recommendation and justification of the thesis' approach to supply chain simulation. Finally, operating methods are presented for development and management of the learning and decision-making processes required to best utilize the software. The conclusion of the thesis is that because of the emergence of new technologies, the supply chain can be simulated for practical experimentation and learning. It is apparent that significant supply chain performance improvement can be identified and quantified through simulation. The thesis recommends using agent-based modeling, specifically a software package called Swarm, as the software environment. The software should be supported by operating methods that can maximize its capabilities while encouraging the likelihood of adoption of solutions identified.
by Christopher Michael Taylor Holt.
M.Eng.
Malinowski, Mateusz Ksawery. "CargoNet : micropower sensate tags for supply-chain management and security." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/41654.
Повний текст джерелаIncludes bibliographical references (p. 109-113).
This thesis describes the development of a system of sensate active RFID tags for supply-chain management and security applications, necessitated by the current lack of commercial platforms capable of monitoring the state of shipments at the crate and case level. To make a practical prototype, off-the-shelf components and custom-designed circuits that minimize power consumption and cost were assembled and integrated into an interrupt-driven, quasi-passive system that can monitor, log, and report environmental conditions inside a shipping crate while consuming only 23.7 microwatts of average power. To prove the feasibility of the system, the tags were tested in the laboratory and aboard transport conveyances.
by Mateusz Ksawery Malinowski.
M.Eng.
Barcelos, Mariana Alexandra Aleixo de. "Towards a security framework for the semiconductor supply chain environment." Master's thesis, Universidade de Aveiro, 2018. http://hdl.handle.net/10773/23555.
Повний текст джерелаHoje em dia, a troca de informação entre os parceiros da cadeia de forne-cimento de semicondutores pode ser alvo de muitas ameaças de segurança conhecidas e desconhecidas no ambiente interno/externo dos parceiros. Particularmente, estas vulnerabilidades, no ambiente da cadeia de fornecimento de semicondutores, podem ser exploradas por atacantes com um amplo espectro de motivações que vão desde intenções criminais, visando o ganho financeiro, até à espionagem industrial e a cyber-sabotagem. Os atacantes podem comprometer a comunicação de dados entre parceiros na cadeia de fornecimento e, portanto, podem prejudicar o fornecimento de serviços pelos parceiros, bem como a continuidade da prestação de serviços. Como resultado, os parceiros da cadeia de fornecimento de semicondutores poderão sofrer repercussões nocivas que podem causar perdas significativas de receita, destruição da sua marca e atrasos no avanço das suas tecnologias. Consequentemente, uma plataforma de segurança para o ambiente da cadeia de fornecimento de semicondutores é de extrema importância. Assim, a intenção desta tese é fornecer uma base para uma plataforma de segurança para comunicação segura de dados entre todos os parceiros da cadeia de fornecimento de semicondutores.
Nowadays, data communication across the partners in the semiconductor supply chain can be the target of many known and unknown security threats exploiting security vulnerabilities in the internal/external environment of the partners. Particularly, these vulnerabilities in the semiconductor supply chain environment can be exploited by attackers with a wide spectrum of motivations ranging from criminal intents aimed at nancial gain to industrial espionage and cyber-sabotage. Attackers can compromise the data communication between legitimate parties in the supply chain and thus can jeopardize the delivery of services across the partners as well as the continuity of the service provision. As a result, semiconductor supply chain partners will su er from damaging repercussions which can cause signi cant revenue loss, destroy their brand and eventually hinder their advancement. Consequently, a security framework for the semiconductor supply chain environment is of utmost importance. Hence, the intent of this thesis is to provide a foundation for a security framework for secure data communication across the partners in the semiconductor supply chain.
Williams, Zachary. "Supply chain security an institutional approach to strategies and outcomes /." Diss., Mississippi State : Mississippi State University, 2008. http://library.msstate.edu/etd/show.asp?etd=etd-03312008-163918.
Повний текст джерелаSheinbein, Rachel Felice 1975. "Applying supply chain methodology to a centralized software licensing strategy." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/34781.
Повний текст джерелаIncludes bibliographical references (p. 76).
Eleven percent of companies spend between $150K and $200K per year per engineer on software development tools and nine percent spend more than $200K, according to a Silicon Integration Initiative/Gartner/EE Times study from 2002. For Agilent Technologies, these costs result in spending tens of millions of dollars each year on software, and for Motorola, the costs are more than $100M each year. From the current trends in software spending, one can infer that companies will pay even more for software in the future, because the cost of the software itself is rising and because of the complexity of the technology needed for innovation. In order to understand whether the total spending on software is appropriate and necessary, Agilent sponsored this project to create a model that analyzes the trade-offs between the cost of software and the cost of software unavailability. The model treats software licenses as supplies to the development of a product, and thus, supply chain methodologies such as inventory (cost of licenses), stock outs (cost of unavailability) and service level are applied. The goal of the model is to minimize software costs while maintaining a satisfactory level of service. The thesis explains the model and then shows the results from applying it to four software products that Agilent currently uses. The results show that in the absence of this type of analysis, Agilent spends more than necessary for software licenses. In fact, Agilent can reduce costs by at least 5%. This model can be used by Agilent and other companies to optimize software purchases.
by Rachel Felice Sheinbein.
S.M.
M.B.A.
Klimova, Nadezda, and Anna Akimova. "Supply Chain Security. Tools, Trends, and Techniques : Toyota and Honda cases." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Företagsekonomi, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-15764.
Повний текст джерелаTang, Dawei. "Container Line Supply Chain security analysis under complex and uncertain environment." Thesis, University of Manchester, 2012. https://www.research.manchester.ac.uk/portal/en/theses/container-line-supply-chain-security-analysis-under-complex-and-uncertain-environment(2b058744-e0fc-4b4f-9222-6a4b41cf7348).html.
Повний текст джерелаLewis, Brian Michael. "Inventory Control with Risk of Major Supply Chain Disruptions." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7155.
Повний текст джерелаWinkler, Simon. "Supply Chain Finance Der Asset-Based-Financing-Ansatz in Unternehmensnetzwerken /." St. Gallen, 2006. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/00642892002/$FILE/00642892002.pdf.
Повний текст джерелаTan, Chow Yin 1973. "Supply-chain software systems : current issues and imperatives in selection and implementation." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/9932.
Повний текст джерелаRouse, Vicki Henderson. "An Internship with Choice Systems, Inc., A Supply Chain Solution Software Company." Miami University / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=miami1146622914.
Повний текст джерелаChang, Meng Ying M. Eng Massachusetts Institute of Technology /., and Raghavendran Mohan. "Impact of Drug Supply Chain Security Act on US pharmaceutical industry under decentralized information flow." Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/112875.
Повний текст джерелаCataloged from PDF version of thesis.
Includes bibliographical references (pages 46-47).
Drug counterfeiting is one of the major issues in the pharmaceutical industry across the world. These products could cause damages from ineffective treatments to death of patients. In order to fight against counterfeit drugs, the US government introduced Drug Supply Chain Security Act (DSCSA) mandating that all prescription drugs should be serialized. In addition, it mandates all pharmaceutical companies in the U.S. to provide tracking documents in response to a tracing request from FDA. While the act aims to improve drug security across the pharmaceutical industry, it poses a huge impact across the supply chain on both physical flow and information flow. This research evaluates the supply chain impact at an industry level. In this thesis, we evaluate the supply chain impact of Matryoshka model and Unit level model supported by a decentralized information flow. The thesis then evaluates the supply chain impact from three aspects, operational cost, IT infrastructure cost and capital investment. We reference Nabiyeva and Wu's research on centralized information flow model to conduct an exhaustive supply chain impact evaluation across the centralized model and the decentralized model. We conclude that among all these scenarios, unit level model under centralized information flow design bears the highest cost as it requires higher IT investment. On the other hand, the matryoshka model under decentralized information flow has a least supply chain impact from the cost perspective with low IT investment.
by Meng Ying Chang and Raghavendran Mohan.
M. Eng. in Supply Chain Management
Loke, Wai Leng. "An evaluation of the value of security in the international marine supply chain." Thesis, University of British Columbia, 2008. http://hdl.handle.net/2429/2519.
Повний текст джерелаArunachalam, Raghu. "An agent based compositional framework for supply chain simulation." Thesis, University of Warwick, 2000. http://wrap.warwick.ac.uk/36393/.
Повний текст джерелаBredenkamp, Frederick van Biljon. "The development of a generic just-in-time supply chain optimisation software tool /." Link to the online version, 2005. http://hdl.handle.net/10019/980.
Повний текст джерелаBredenkamp, F. v. B. "The development of a generic just-in-time supply chain optimisation software tool." Thesis, Stellenbosch : University of Stellenbosch, 2005. http://hdl.handle.net/10019.1/1920.
Повний текст джерелаBellefeuille, Cynthia Lynn. "Quantifying and managing the risk of information security breaches participants in a supply chain." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33313.
Повний текст джерелаIncludes bibliographical references (leaf 70).
Technical integration between companies can result in an increased risk of information security breaches. This thesis proposes a methodology for quantifying information security risk to a supply chain participant. Given a system responsible for supply chain interaction and the vulnerabilities attributed to the system, the variables that determine the probability and severity of security incidents were used to create a model to quantify the risk within three hypothetical information systems. The probability of an incident occurring was determined by rating the availability and ease of performing an exploit, the attractiveness of the target and an estimate of the frequency of the attack occurring Internet wide. In assigning a monetary value to the incident, the outcome from an attack was considered in terms of the direct impact on the business process and the potential impact on partnerships. A method for determining mitigation strategies was then proposed based on a given set of monetary constraints and the realization of corporate security policy.
by Cynthia Lynn Bellefeuille.
M.Eng.in Logistics
Chung, Peter Wontae, and Tao Zhang. "A framework to evaluate interoperable data exchange models for Drug Supply Chain Security Act compliance." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/107520.
Повний текст джерелаCataloged from PDF version of thesis.
Includes bibliographical references (page 50).
The United States has one of the safest drug supply chains in the world. However, its security is threatened by new challenges such as counterfeit, diverted, and illegally imported drugs. To counter the new challenges, the Drug Supply Chain Security Act (DSCSA) was signed into law by President Obama on November 27, 2013, with a 10-year implementation timeframe. As a result, companies in the U.S. pharmaceutical industry, including drug manufacturers, distributors, and dispensers, are challenged to fully comply with the DSCSA by 2023. The compliance with the DSCSA will enable companies to operate and manage the risks of their supply chains more efficiently. Industry consortiums, such as the Healthcare Distribution Management Association (HDMA), and the industry leaders have recommended various interoperable data exchange models for the implementation of the compliance. However, domestic and international complexities make it difficult to pick the optimal model for the industry. In this research, we start with categorizing the known data exchange models that can be potentially used by the U.S. pharmaceutical industry. Second, we develop a scorecard methodology based on a framework that considers various factors across the entire supply chain. Next, we examine the categorized models using this scorecard methodology. Lastly, we conclude with recommendations on the data strategy decision for the U.S. pharmaceutical industry.
by Peter Wontae Chung and Tao Zhang.
M. Eng. in Logistics
Baker, Wade Henderson. "Toward a Decision Support System for Measuring and Managing Cybersecurity Risk in Supply Chains." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/85128.
Повний текст джерелаPh. D.
Karlsson, Daniel. "Modelling and Analysis of Swedish Heavy Industry Supply Chain Data Management to Improve Efficiency and Security." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-291230.
Повний текст джерелаHanteringen av produktcertifikat inom den svenska tungindustrin är en mycket manuell process vilket resulterar i att ett enormt arbete krävs för att upprätthålla en korrekt hantering av certifikaten. Att spåra orsaken till fel och att kontrollera efterlevnaden av krav inom industrin tar lång tid. Chaintraced har utvecklat en applikation som automatiserar hanteringen av certifikaten genom digitalisering och att som tredje part lagra informationen. Att introducera en tredje part i affärsverksamheter kräver att integriteten av datan bibehålls och att information anländer till korrekt mottagare. Ny forskning har visat att distribuerade liggare har möjligheten att uppfylla dessa krav. Framförallt gällande blockkedjetekniken med dess många egenskaper och garantier som företag letar efter, så som oföränderlig och spårbar data. Blockkedjetekniken reducerar också förtroendet som behövs för parter inom nätverket genom att förlita sig på kryptografi och konsensus mekanismer. Den här rapporten utreder användningen av distribuerade liggare för att ytterliggare automatisera den svenska tungindustrins leveranskedja och minska tilliten som krävs för en tredje part som hanterar certifikaten. Krav ställs upp för ett system och flertalet distribuerade databastekniker undersöks för att passa in i fallet angående den svenska tungindustrin. En prototyp är utvecklad baserad på kraven, prototypen är testad och jämförd med en central databas för att undersöka hur implementationen står sig vad gäller genomförbarhet, oföränderlighet, spårbarhet och säkerhet. Undersökningen resulterade i en prototyp baserad på Hyperledger Fabric. Prototypen lagrar produktcertifikaten och ger vissa garantier till oföränderligbarhet samt säkerhet. Möjligheten för aktörer i kedjan att använda prototypen hade stor inverkan på hur systemet utvecklades. Prototypen visar sig vara långsammare än en centraliserad lösning men mätningarna kan anses vara inom kraven för ett system inom tungindustrins leveranskedja. Skalbarheten av lösningen är beroende av kraven på säkerhet men är linjär i antalet certifikat som skickas och lagras. Resultaten visar också att den föreslagna lösningen inger mer tillit än en centraliserad lösning men att introducera blockkedjetekniken är en komplex process. Trovärdighet och garantier som ges av lösningen är till stor del beroende av komplexiteten vilket rapporten kommer fram till är det viktigaste för svensk tungindustri att ha i åtanke vid eventuell antagande av blockkedjeteknik.
Pippow, Ingo. "Software-Agenten in Distributionsnetzen : Potenziale vertikaler Informationsteilung zur Senkung von Transaktionskosten /." Wiesbaden : Dt. Univ.-Verl, 2004. http://www.gbv.de/dms/zbw/388109858.pdf.
Повний текст джерелаFang, Fang, and 方芳. "A life-cycle-oriented negotiation framework for supply chain management: an agent-based approach withhybrid learning." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B39362437.
Повний текст джерелаFang, Fang. "A life-cycle-oriented negotiation framework for supply chain management : an agent-based approach with hybrid learning /." View the Table of Contents & Abstract, 2007. http://sunzi.lib.hku.hk/hkuto/record/B38289659.
Повний текст джерелаEkwall, Daniel. "Managing the risk for antagonistic threats against the transport network." Doctoral thesis, Göteborg : Borås : Division of Logistics and Transportation, Chalmers University of Technology ; School of Engineering, University of Borås, 2009. http://hdl.handle.net/2320/5033.
Повний текст джерелаHuang, Hsin-Hui. "An exploration of the execution of software system project for supply chain management in practice: Project as Practice study." Thesis, Umeå University, Umeå School of Business, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-18673.
Повний текст джерела
The advantages of adopting a new software system for Supply Chain Management (SCM) enable the organization to enhance work efficiency as well as customer satisfaction in the supply chain network. These advantages make enterprises update their SCM system through project as a method of realize their strategic change. This research explores how the project manager leads the project team, a temporarily formed unit with multi-functional members, by looking into three focus concepts of the practice perspective: Practitioner, Praxis, and Practices. The empirical study utilized two projects in the electronics firms as the case study. It was decided that a qualitative approach was the most appropriate method to gather the data based on the practice perspective.
The findings of this thesis support this primacy of communication. To successfully execute the short duration project for system change, intra-organizational communication has an important part to play in the success of change initiatives. Analysis revealed that the project managers’ soft skills are more important than their knowledge of using project-specific tools or techniques in managing short-duration projects. In the empirical study, the requirements of all project practitioners were not met due to tight schedule and limited resource. However, the project objectives were still achieved on time. Some key success factors were identified, such as top management commitment to the project, correct prioritization of different stakeholders’ power, and involvement of employees as early as possible within the change process. The study concludes that the three focus concepts of the practice perspective interplay during the project process and they contribute to the general framework in the short duration project for realizing strategic change, which can be a reference for industry participants in managing similar projects.
Haberleitner, Helmut, Herbert Meyr, and Alfred Taudes. "Implementation of a demand planning system using advance order information." Elsevier, 2010. http://dx.doi.org/10.1016/j.ijpe.2010.07.003.
Повний текст джерелаXue, Hao. "Hardware Security and VLSI Design Optimization." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright1546466777397815.
Повний текст джерелаvan, Hooff Jonathan, and Oscar Tegni. "Development of Supply Chain : Information System Integration at Consignment Warehouse for Improved Efficiency." Thesis, Umeå universitet, Institutionen för matematik och matematisk statistik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-90520.
Повний текст джерелаStone, Jamie. "Development of a framework for enhancing resilience in the UK food and drink manufacturing sector." Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/33501.
Повний текст джерелаPimenta, de Almeida Mariana. "Automation of Supply Processes : A Study at Ericsson AB." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-264414.
Повний текст джерелаInom informations- och kommunikationsteknologinäringen (IKT) har trycket för att påskynda implementeringen av 5G-teknik skapat en ny konkurrensmiljö för företagen. Denna teknik möjliggör inte bara lägre latens, utan också större antal anslutna enheter, större mängder delad data och snabbare. Den växande efterfrågan från kunderna pressar varje steg i leveranskedjan att bli effektivare. I denna bransch är det viktigt att uppnå en kort tid till marknaden för att ligga före konkurrenterna och positionera företaget som trendmässigt i kunders ögon. Därför har det blivit nödvändigt att övergripande förkorta ledtiderna och leverera produkter på ett snabbare sätt. Denna studie utfördes i samarbete med Ericsson AB, mer specifikt i Ericsson Outbound Supply EMEA. Nya upptrappningar från kunder har visat att Ericssons sätt att arbeta för att hantera kundköporder inte är effektiva. I många fall tar det längre tid att behandla beställningen än de ledtider som avtalats med kunden. I denna studie undersöks hur automatiseringstekniker kan förbättra ordningsflödena från början till slut, hur dessa kan påverka Ericsson som organisation och dess arbetskraft, samt vilka faktorer som måste beaktas vid implementering av automatisering. För att stödja utredningen genomfördes också en analys av de problem som oftast påverkar hårdvaruleveranser till kunder genom Spiderweb-programmet. Det senare är ett internt förbättringsinitiativ från Ericsson Supply, fokuserat på att förbättra Ericssons orderhanteringsflöden för marknadsområdet Europa och Latinamerika. Studien baserades på följande forskningsfrågor: Hur kan automatiseringsteknologier bidra till att förbättra Supply’s prestanda? Hur påverkar automatisering företaget som organisation, dess kultur och arbetskraft? Hur kan förbättringsmetodiken följas i Spiderweb-enhetens automatiseringsupptäckter? Kvalitativ data samlades främst genom möten med Spiderwebprogramdrivare och 11 intervjuer med olika intressenter på Ericsson Supply. Sammanfattningsvis indikerar denna studie att de fyra kritiska faktorerna som kommer att kräva ytterligare utveckling för att automatisering i Supply ska bli verklighet är: dess kultur; inrättande av en datadriven organisation; samordning av olika processer och kommunikation mellan beroende intressenter; och teknisk implementering av automatiseringsteknologi och andra verktyg som används lokalt. Det dras också slutsatsen att automatiseringspotentialen fullt ut kommer att realiseras om den åtföljs av en motsvarande utveckling av arbetskraften och en tydlig kommunikation av strategin från toppledningen. Slutligen beaktar huvudrekommendationen till Supply behovet av att standardisera orderhanteringsprocesser och förenkla orderflöden innan automatiseringsimplementering i Supply startar.
Johnson, Ludwig, and Lukas Mårtensson. "Assessing HTTP Security Header implementations : A study of Swedish government agencies’ first line of defense against XSS and client-side supply chain attacks." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21725.
Повний текст джерелаBarkhadle, Hassan. "Contribution du maillon portuaire à la performance de la chaîne logistique globale : cas du port de Djibouti." Thesis, Brest, 2014. http://www.theses.fr/2014BRES0052.
Повний текст джерелаWith globalization and international competition sprees, the Supply Chain (SC) are designed on a global scale, the port spaces, thus allowing ideal implementation sites, thanks to the performance of its link port. Since the development of a strategic partnership between the link port of Djibouti (LPD) and the international group port Dubai Port World (DPW) in 2000, the containerized traffic increased of almost 700 %, between 2002 and 2012. With in addition, with the opening of Djibouti Free Zone (DFZ) in 2004, managed entirely by a subsidiary of the group DPW, nearly 150 businesses have implemented there warehouses in DFZ, with more than half of whom are foreign companies. Starting from this dual observation, our research has been focused on understanding the contribution of the LPD, to the performance of the SC. In a phase of empirical research, which has allowed us to identify dimensions and axes characterizing the logistics performance of the LPD, we deploy a descriptive and synthetic model of the port performance
Tasyurt, Ibrahim. "A Web Service Based Trust And Reputation System For Transitory Collaboration Formation In Supply Chains." Master's thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12610887/index.pdf.
Повний текст джерелаLi, Xiao Wen. "Strategic supply chain management : application of QAD, a leading provider of industry-specific e-business software and services to manufacturers in China." Thesis, University of Macau, 2000. http://umaclib3.umac.mo/record=b1636662.
Повний текст джерелаMilovan, Tomašević. "Adaptivni model za upravljanje lancima snabdevanja u malim i srednjim preduzećima." Phd thesis, Univerzitet u Novom Sadu, Fakultet tehničkih nauka u Novom Sadu, 2018. https://www.cris.uns.ac.rs/record.jsf?recordId=106850&source=NDLTD&language=en.
Повний текст джерелаThe basic research problem of this dissertation is the development ofsupply chain management model in order to improve the quality ofservice. Therefore, an adaptive supply chain management model hasbeen developed that consists of a model for: supply chain management,management of user requirements and assessment of the quality ofservice provided. For the purpose of application the adaptive model, itis presented an algorithm with precisely defined steps that the userneeds to implement in order to raise the level of service quality andmaintain the stability of supply. The model verification was done onthe example of 17 supply chains in the territory of the Republic ofSerbia, which resulted in answers on how to improve the quality of theservice. The contribution of the research is reflected in the possibilityof direct application of the developed model and providing newinformation for the scientific and professional public, which canrepresent a quality basis for the further development of the supplychain management model.
Franco, Emilio. "Information Technology (IT) Projects – A Psychological Contract Perspective." Thèse, Université d'Ottawa / University of Ottawa, 2013. http://hdl.handle.net/10393/24276.
Повний текст джерелаTrompeter, Philipp, and Paavo Melin. "Examination of the advantageousness of the AEO certification to NORMA Sweden AB." Thesis, Linnéuniversitetet, Institutionen för ekonomistyrning och logistik (ELO), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-57337.
Повний текст джерелаTröger, Ralph. "Supply Chain Event Management – Bedarf, Systemarchitektur und Nutzen aus Perspektive fokaler Unternehmen der Modeindustrie." Doctoral thesis, Universitätsbibliothek Leipzig, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-155014.
Повний текст джерелаŽideckas, Egidijus. "Tiekimo proceso kontrolės metodų analizė ir taikymas kuriant informacinę sistemą." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2004. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2004~D_20040527_154217-86410.
Повний текст джерелаMazaheri, Arsham. "How the ISPS code affects port and port activities." Thesis, Högskolan i Borås, Institutionen Ingenjörshögskolan, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-18834.
Повний текст джерелаUppsatsnivå: D
Cunha, Gilberto José da. "Metodologia para modelagem do sistema agroindustrial visando identificar parâmetros de rastreabilidade e qualidade - aplicação na malacocultura continental." Universidade de São Paulo, 2008. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-11052009-134159/.
Повний текст джерелаIt is proposed the application of some Systems and Software Engeneering techniques to the modeling of agro-industrial systems, in an innovative way, defining a methodology in order to better understand the activities and relationships among the many agents within an specific supply chain. It also permits the productive chain graphical modeling using IDEF0, BPMN and Use Cases. The main goal is to identify information for product traceability and quality through the productive chain. There is also presented, another innovation, the application of this methodology to the Continental Malacoculture Agro-industrial System. Customers\' requirements for agro food products quality, safety and traceability have been rising year after year due to the fear of health problems, such as the mad cow disease. The Productive Chain Modeling helps identifying the information and automation needs of a production chain, exploring its possibilities in order to specify information systems that support the business of the many agents throughout the agro food chain and fulfills customers\' quality and traceability requirements. The application of Use Case Model is also presented for requirements and traceability identification and gathering throughout the productive chain. The Use Case technique applied to the productive chain helps to specify more quality and adherent information systems. As an example of those methods, some business and information processes modeling applied to the Continental Malacoculture Productive Chain are presented, using the IDEF0, BPMN and use case techniques. Worldwide aquaculture has increased in importance due to growth and successive increase in productivity, conferring this type of production an outstanding position in the international animal production sector. Amongst different modalities of aquaculture, in the last two decades, the production of escargots (malacoculture) has deserved attention from businessmen, government and researchers. In continental waters, Continental Malacoculture, especially ampullariculture can be seen as a way of producing low impact mollusks, using a system compatible with small farms production, contributing to a greater increase in the availability of high nutritional value food and also improving rural families\' income.
Salman, Rosine Hanna. "Exploring Capability Maturity Models and Relevant Practices as Solutions Addressing IT Service Offshoring Project Issues." PDXScholar, 2014. https://pdxscholar.library.pdx.edu/open_access_etds/1843.
Повний текст джерелаFontana, Caio Fernando. "Metodologia para a implantação dos processos da cadeia logística segura." Universidade de São Paulo, 2009. http://www.teses.usp.br/teses/disponiveis/3/3143/tde-12082010-120918/.
Повний текст джерелаThe development of the Methodology for the Implantation of the Processes of the Safe Logistic Chain aims at to establish parameters and methodology for application of the diverse concepts and programs of security for the foreign commerce being aimed at the load control that come being implemented for agencies of government and international organisms. These programs have as focus the control on the processes of load movement, through the use of technology applied to the not intrusive inspection of load, electronic tracking and sealing waxes, systems of electronic exchange of information and the systemic integration of these components. In such a way, this thesis searchs to demonstrate as the considered model will impact in the fiscal and customs controls as well as in the improvement of the logistic flows. The considered model is anchored in the lines of direction of security established by the Organização Munidal das Aduanas (OMA) through the SAFE Frameworks of Standards through the International Maritime Organization (IMO), through the International Code of Security and Protection the Ships and Port Installations (ISPS-Code), for the Government of the United States of America through Container Security Initiative (CSI) and of Safe Ports Act, for the Secretariat of the Brazilian Federal Prescription through the Plano Nacional de Segurança Aduaneira (PNSA) of Nota Fiscal Eletrônica (NFe) and Conhecimento de Trânsito Eletrônico (CTe) in set with the Secretarias de Fazenda Estaduais, as well as for the private sector who they come implemented initiatives directed to the control and monitorial of load through systems of Management of Risk and the systems of Tracking and Electronic Sealing waxes applied to loads and vehicles. For context effect, it will be presented the process of importation and exportation, its aspects of transport, load storage and manipulation, as well as a macro vision of the documentary flow and the intervening private public and involved in the process. To follow the proposals of regularization of the logistic process of chain will be presented insurance elaborated by Customs-Trade Partnership Against Terrorism (C-TPAT), Business Alliance will be Secure Commerce (BASC) and of the International Organization for Standardization (ISO) through the ISO 28000 and correlates. The operational model that will be formulated consists of the proposal of an integrated logistic control. This boarding has for objective to present the diverse characteristics of the modal load flows and type, that is granary, container and general load. The implementation of this model will provide to an increase of productivity of the sector therefore the adoption of measures of load control demands that the planning of the logistic operations is effected, followed and corrected whenever necessary. In such a way the sector of logistic could use this tool for the increase of productivity and consequence reduction of what is called as Custo Brasil. The implementation model will be formulated supported in four pillars: regularization of processes, regularization of technology, formularization of a model of Acreditação of modal process and entities for and/or area of performance and the formularization of a model of continuous evaluation of level of service of the companies and the process.
Bonatto, Heitor. "Segurança na cadeia de suprimentos internacional : protocolo de gestão de risco para o transporte marítimo de cargas less than container load." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2016. http://hdl.handle.net/10183/150492.
Повний текст джерелаThe management of threats and risks in the company has been dedicated to study these problems by market bias in order to make them better prepared to face these challenges. In this regard a number of analytical tools diagnosed threats and risks as part of the business relations. Among the many relationships that a company established to achieve their goals, we highlight those that are embedded in a system called the supply chain, which as a result of the globalization process has become internationalized. Companies to extend their supply chains "across borders", are subject to the influences of economic, geopolitical, social and historical environment. In these environments, the year 2001 led to a series of risk management studies that have identified the external or exogenous threats, those outside the market bias, the possibility of making the chain of uncertain international supplies. Such threats are configured shares of nature and actions taken by humans, by means of criminal acts as terrorism, trafficking, smuggling and maritime piracy In addition to companies, countries have created international regimes that sought to protect supply chains, especially in its transport system, highlighting the called maritime, because of their heavy use to transport cargo. The thesis aims to propose a risk management protocol for the shipping cargo "less than container load" to make the international supply chain more secure. The methodology used was based on descriptive type and documentary because described the operational process and analized documents used in the management of shipping “less than container load”, In conclusion, the multimodal transport operator who is responsible for operating a means of transporting cargo , which makes the supply chain insecure supplies, has conditions , and especially the obligation to join the other actors , in favor of the increase system security.
Casto, Matthew James. "Multi-Attribute Design for Authentication and Reliability (MADAR)." The Ohio State University, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=osu1512009861557857.
Повний текст джерела