intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Supply chain security

Xem 1-20 trên 54 kết quả Supply chain security
  • Based on the interview result, this study introduces a list of pushes and pulls to the supply chain security standard. This contributes to implementation of ISO 28000 in mining industry of Malaysia, specifically Pahang. In the industry, the result of this study is beneficial for supply chain managers and policymakers to ease the ISO implementation and reduce supply chain risks.

    pdf4p longtimenosee10 26-04-2024 6 1   Download

  • This study is conducted using qualitative research method to collect and analyse both primary and secondary data. Primary data was obtained through official documents and an in-depth interview with key informants among Malaysian households of the communities near Malaysia-Thailand border, local leaders and academicians. Meanwhile, the secondary source of data was obtained from published materials and online documents such as books, journal articles and reports.

    pdf6p longtimenosee10 26-04-2024 2 1   Download

  • The study has used qualitative exploratory case study through semi-structured interviews. The interviews were conducted by the project manager, coordination officer, and supply manager from humanitarian NGOs providing educational services for Syrian refugees in their offices in Amman. The results were analysed based on the interviews, conducted among employees.

    pdf9p longtimenosee10 26-04-2024 2 1   Download

  • This paper is objective to examine the barrier of ISO28000 implementation. As more and more supply chain process faced disruption and delay due to accident, importance of supply chain security management attract the concern from top management of organization. ISO 28000 is a standard that released in 2007 which specify requirement for security management system for the supply chain. However, there are still many organization didn’t apply for this standard.

    pdf8p longtimenosee10 26-04-2024 8 1   Download

  • The paper describes specific aspects of land use planning and forecasting for effective supply chain management. Close attention is paid to the territorial planning projects having been implemented in the United States, England, Germany, the former Soviet Union and Russia. Land is characterized as an object for planning and forecasting as well as the basis for food security. There is a real need for area development planning and forecasting to provide management of agri-food supply chains.

    pdf6p longtimenosee10 26-04-2024 2 1   Download

  • This paper describes the US activity on greater access of American corporations on the European market and differences in approaches of the US and the EU to the quality and security food standards and to the use of genetically modified foods. Strained relationships between the US and the EU in 2016 is a result of the publication of the US intentions to secretly push American standards and rules into the draft agreement.

    pdf6p longtimenosee10 26-04-2024 2 1   Download

  • A study of the state of the theory of fuzzy sets shows that until recently in Russia there were almost no studies in the chemical sector of the economy and finance using fuzzy analysis and forecasting, although by that time all necessary prerequisites for modeling financial systems had been created. The current situation in Russia is characterized by a high degree of science lagging behind the requests of state and commercial supply chain management.

    pdf6p longtimenosee10 26-04-2024 2 1   Download

  • This paper reviews the challenges in implementing Industry 4.0. The literatures found in this paper mainly from Google Scholar, Science Direct and Emerald. In short, the challenges can be imparted into seven major categories. There are data management and Integration, knowledgedriven, process, security, capital, workforce, and education.

    pdf8p longtimenosee09 08-04-2024 6 0   Download

  • The aims of this study is to examine the effect of security, quality of service, operations and information management and trustworthiness on Eloyalty customer moderated by customer satisfaction for online shop website. The sample was taken using random sampling technique as many as 1300 respondents. The data was tabulated and processed using questionnaires, interviews, observation and documentation. The results of this study showed that security, information management, reliability and trustworthiness has positive and direct impact on customer satisfaction.

    pdf9p longtimenosee09 08-04-2024 1 0   Download

  • One of the main trends in the law development is its digitalization under the supply chain strategies, which is manifested both in the digitalization of legal regulation, legal technologies, legal processes and law enforcement. In the emergence of regulations affecting the issues of the digital economy, electronic state, information security.

    pdf6p longtimenosee09 08-04-2024 5 0   Download

  • The article substantiates the idea that increasing social inequality and persistent large-scale poverty in post-Soviet Russia should be considered as one of the main reasons for the low birth rate in the country and a serious challenge to ensuring its demographic security. The authors propose a concept of demographic security and outline its primary indicators and their threshold values—the methodological basis for diagnosing and forecasting demographic processes from the perspective of Russia’s national and economic security.

    pdf10p longtimenosee09 08-04-2024 4 1   Download

  • The objective of the study is to analyze existing personnel risks and develop an adaptive, universal methodology for assessing their likelihood, with further modeling of possible risk scenarios. In the framework of the study, a two-stage method for estimating the probability of occurrence of 30 personnel risks characteristic of different types of personnel flows was tested. Possible scenarios were simulated using the Scenario Manager method.

    pdf9p longtimenosee09 08-04-2024 8 1   Download

  • The paper discusses the concept and problem of identifying DDoS attacks for information management. The main starting mechanisms and types of DDoS attacks are analyzed. To identify them, signature and behavioral methods of analyzing network traffic are used. Analysis of the advantages and disadvantages of these methods actualized the need for their combined use. To detect and classify DDoS attacks, the need to develop and use a neural network model has been updated. The training and testing of the model were made on the initial data from the NSL-KDD set.

    pdf5p longtimenosee09 08-04-2024 4 1   Download

  • The article is devoted to the cooperation of the Russian Federation and the Republic of Tajikistan in the sphere of security in the period from 2000 to 2017. It explores the relations of the two states in the political and military-technical spheres in the context of Eurasian integration processes. Some economic, cultural and humanitarian aspects of cooperation are also considered, complementing the security policy with elements of "soft power". Particular attention is paid to bilateral meetings and political decisions of the presidents of Russia and Tajikistan.

    pdf5p longtimenosee09 08-04-2024 5 1   Download

  • The study was carried out on the basis of work with grant of the RFBR No. 19-010-00040 “Interaction between the real and virtual sectors of the economy in order to increase their efficiency and ensure a balance of interests between business, society and the state”. This paper proposed to introduce integrated indicators of the effect of digitalization.

    pdf9p longtimenosee09 08-04-2024 6 2   Download

  • The significant objective of this study therefore centres on how to improve trust using extended technology acceptance model (e-TAM) by incorporating perceived security and e-trust with perceived usefulness and perceived ease of use to predict adoption of e-banking.

    pdf11p longtimenosee07 29-03-2024 3 2   Download

  • The results of the research shows that PT. KCI needs to increase the number of toilets at Bogor Station, to add the first-aid kits at Bogor and Manggarai Station, to increase the number of waiting chairs at Manggarai Station, to add stairs for platforms whose height are not the same as the train floor at Manggarai Station, and to improve the performance of security officers and the awareness of the users about the use of priority passengers seats.

    pdf6p longtimenosee07 29-03-2024 5 2   Download

  • The aim of study "Coronavirus (COVID-19): How to secure the supply chain? – A case study" is to address this question performing an analysis of the current KPIs in the main affected countries in Europe (Italy) and Asia (China). After a review of the literature on Supply Chain Risk Management (SCRM) and published official statistics in China, Italy and Germany, a case study focused on a set of interviews with practitioners based on a firm located in Germany was used to generate uncaptured insights in previous research of the area.

    pdf8p longtimenosee07 29-03-2024 3 2   Download

  • The paper "Examining the supply chain impact on labor social security in Indonesia: A systems thinking analysis" could benefit supply chain to evaluate the existing membership program and to improve its quality and approach. Moreover, policymakers could utilize findings and recommendations from this study to perfecting the policy based on evidence.

    pdf13p longtimenosee07 29-03-2024 3 2   Download

  • In the current momentum of economic development, insurance increasingly demonstrates its essential role in socio-economic life. The critical part of insurance is financial service and social security mechanisms in the national economy. The life insurance product is a necessary product with both mental and physical value. Therefore, understanding life insurance’s meaning and benefits help customers have a positive outlook on life. Thus, the paper objective determines the factors affecting the decision to purchase life insurance products in Vietnam.

    pdf10p longtimenosee07 29-03-2024 6 1   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
5=>2