Securing the supply chain

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing RFID-supported Supply Chains

Modern RFID-supported supply chains envision a seamless sharing of item-level data across multiple supply chain participants in the “Internet of Things”. However, many companies are reluctant to propagate large amounts of their track and trace information to others, as they fear the uncontrolled disclosure of vital business intelligence. Without built-in safeguards, such systems thus run the ri...

متن کامل

Securing the Containerized Supply Chain: An Economic Analysis of C-TPAT

We perform an economic analysis of the Customs-Trade Partnership Against Terrorism (C-TPAT), modeling the strategic interaction between the Bureau of Customs and Border Protection (CBP) and trading firms as a Stackelberg game. We characterize the unique equilibrium outcome and perform comparative statics. We provide insights relevant to policy planners and to private sector trading firms. We fi...

متن کامل

Securing the Containerized Supply Chain: Analysis of Government Incentives for Private Investment

To mitigate the threat that terrorists smuggle weapons of mass destruction (WMD) into the US through maritime containers, the US Bureau of Customs and Border Protection (CBP) inspects containers upon entry to domestic ports. Inspection-driven congestion is costly, and CBP provides incentives to firms to improve security upstream in the supply chain, thereby reducing the inspection burden at US ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Australian Prescriber

سال: 2012

ISSN: 0312-8008,1839-3942

DOI: 10.18773/austprescr.2012.003