SC Security :Supply Chain Management, SCRC Articles Library
SC Security: Supply Chain Management Articles
References 1 Barlas, D. August 2001. When EDI is mandatory. www.line56.com. 2 Browing, J. September 2000. Developing “fast track” policies and procedures. CAPS Research. 4(1): 7-13. 3 Carr, A. & Pearson, J. 1999. Strategically managed buyer-supplier relationships and performance outcomes. Journal of Operations Management. 17(5): 497-520. 4 Christopher, M. 1998. Logistics and supply chain management (2nd ed.) Upper Saddle River, NJ: Financial Times Prentice Hall. 5 Cohen, E. & Schmidt, W.1999. XML: powering the web into the twenty-first century. CPA Journal. 69(11): 20-25. 6 Dyer, J. & Chu, W. 2003. The role of trustworthiness in reducing transaction costs and improving performance: Empirical evidence from the United States, Japan, and Korea. Organization Science. 14(1): 57-69. 7 Ellram, L.
Abstract: An industry initiative, SST, was established in October of 2002. The purpose is to identify the tampering of containers while in transit using automated tracking, detection and security technologies. Once the initiative is fully implemented, the goal is for these SST containers to quickly move through customs throughout the world. Smart and Secure Tradelanes (SST) Over 17,000 containers arrive daily in United States seaports, which are located in or near major industrial centers (1). These containers must be secured to ensure the contents and containers are not compromised in any way. The Smart and Secure Tradelanes initiative was established by the container
Even before the events of 9/11, security was a priority for the United States Customs and Border Patrol (CBP). The following initiatives are in place to ensure the highest security along the supply chain. Several initiatives were in place before 9/11, while others started after to continuously improve the security of not only the United States but also the world. Companies must be aware and understand these guidelines to comply with all transportation requirements. Separate articles about each initiative will further explain the reasoning and requirements of each program. Container Security Initiative (CSI) For the most efficient supply chain security process, prevention
As China provides an increasing amount of manufacturing power for the United States and other countries, companies and the government like to understand the associated costs of establishing operations in the country. Reporting on labor statistics in the Peoples Republic of China (PRC) has long been a challenge for the U.S. government. To gain a better understanding, the U.S. Department of Labor, Bureau of Labor Statistics hired an outside consultant, Judith Banister of the Beijing Javelin Investment Consulting Group, to examine the data available. Data Challenges One problem is the collection of data in the manufacturing environment. 2002 estimates
Abstract: During the first quarter of 2005, the next step in using RFID as a means of identifying and tracking merchandise at a higher level of aggregation will be tested. IIJ Group plans to participate in a Japanese government RFID pilot project providing network and system environment for the world’s first shipping container RFID. If successful, this effort will contribute to a higher level of accuracy and supply chain security, while reducing the cost of direct materials associated with shipping and logistics services. During the first quarter of 2005, the next step in using RFID as a means of identifying and
Borders between the United States and Canada and the United States and Mexico have been strongly secured since the events of September 11, 2001. The increased security will cause wait times to increase at the borders. Small and medium size businesses that transport goods across borders must realize the effects of the strengthened border security. In today’s global business environment, on-time shipments are critical to business success. Security wait time at a border crossing could mean the difference between an on-time delivery or a late delivery. If that delivery is critical to a customer’s operations and is late, that customer
- E-Procurement and the Purchasing Process
- What is Supply Chain Management?
- Role of Procurement within an Organization: Procurement : A Tutorial
- The Procurement Process - Creating a Sourcing Plan: Procurement : A Tutorial
- The Procurement Process - e-Procurement: Procurement : A Tutorial
- Introduction: Collaborative Planning, Forecasting and Replenishment (CPFR): A Tutorial