Skip to main content
Identifying trustworthy upstream suppliers in a supply chain is an elusive task for an acquirer in nearly any industry. Obtaining assurance that an acquirer’s direct supplier is using a trusted tier II supplier instead of one that is... more
    • by 
    •   4  
      Supply Chain Risk ManagementSupply Chain SecurityBitcoinBlockchains
In recent years, U.S. military and civilian agencies have been rethinking security in the context of globalized production and trade. No longer lodged in a conflict between territorial borders and global flows, national security is... more
    • by 
    •   6  
      GeopoliticsLogisticsCitizenshipBorders
— Logistics industry in Malaysia is rather treated as strategic industry for economic growth and one of the key industries for Third Industrial Master Plan (IMP3) in Malaysia. It is worthwhile to study the environmental sustainable... more
    • by 
    •   6  
      Environmental SustainabilitySocial sustainabilitySupply Chain SecuritySustainable Logistics
Presented at The Infrastructure Security Partnership, Critical Infrastructure Symposium, Cheyenne Mountain Resort, April 7-8, 2014. The Conference has posted its proceedings at: http://www.tisp.org/index.cfm?pid=13346 The PowerPoint... more
    • by 
    •   6  
      International BusinessInternational SecurityPolitical Violence and TerrorismBehavioral Decision Making
Giriş Teknolojik gelişmeler hemen her gün hayatımızı değiştirmeye devam ediyor. İnternetin büyük bir devrim anlamına geldiği günler çok eski tarihler olmamasına rağmen geride kaldı, hatta unutuldu. Günümüzde " Nesnelerin İnterneti-Nİ... more
    • by  and +1
    •   4  
      Supply Chain ManagementLogisticsSupply Chain SecurityImport and Export Customs Clerance
Maraknya kegiatan distribusi dan transportasi barang dalam ekonomi global, yang sebagian besarnya didorong oleh outsourcing jasa / layanan, bersifat sangat kompleks. Bahan baku maupun produk jadi yang di distribusikan berasal dari... more
    • by 
    • Supply Chain Security
Tedarik zinciri güvenliği, eşyaya ilişkin üretim ve tedarik sürecinin başlangıcından nihai kullanıcı ya da tüketiciye sunulmasına kadar tüm süreçlerdeki güvenliğin geliştirilmesine yönelik olarak yapılan tüm işleri kapsamaktadır. 11 Eylül... more
    • by 
    •   3  
      Risk ManagementSupply Chain SecurityTedarik Zinciri Yönetimi
Keynote presentation at the 17th International Logistics and Supply Conference, Istanbul, Turkey, October 17, 2019
    • by 
    • Supply Chain Security
he Seamless Integrated Data Pipeline system was proposed to the European Union in order to overcome the information quality shortcomings of the current international supply chain information exchange systems. Next to identification and... more
    • by 
    •   3  
      Access ControlSupply Chain SecurityData Pipeline
In the case of the European Union there is a special notion of energy security, which comprises a number of elements. Energy security is frequently represented as part of energy policy, but we often deal with an overlap of the ideas of... more
    • by 
    •   14  
      Energy LawSustainable DevelopmentEnergyEnergy Policy
Theocracy, an anti-Bush diatribe against the role of fundamentalist Christians as a strong constituency of the Republican Party, and by the way paid some homage to the spurt of works at the time sharing the common opinion that "…, at the... more
    • by 
    •   4  
      American Foreign PolicyInternational law (public and private)Supply Chain SecurityPort and Maritime security
    • by 
    •   7  
      Food PolicySupply ChainFood SecuritySupply Chain Security
In order to make the international supply chain system highly efficient in worldwide transportation of goods, its business processes should be supported by high quality information systems that, “24x7”, provide the right data, at the... more
    • by 
    •   3  
      Supply Chain SecuritySecure Identification CardsData Pipeline
With the come into force of the ISPS, appears a very important conflict, due that the new “citizens ports” must be incorporated to the Port facility security plan from the starting point of the project, until they are finished and... more
    • by 
    •   9  
      Supply Chain ManagementSecuritySecurity StudiesShipping/ Transport Logistics
Study shows that counterfeit semiconductors or Integrated Circuits (ICs) are increasingly penetrating into advanced electronic defense systems. Traditional supply chain management policies have been found unsuccessful in protecting the IC... more
    • by 
    •   3  
      Integrated CircuitsSupply Chain SecurityAuthentication Protocols
The Seamless Integrated Data Pipeline system was proposed to the European Union in order to overcome the information quality shortcomings of the current international supply chain information exchange systems. Next to identification and... more
    • by 
    •   4  
      MonitoringSupply Chain SecurityDynamic SystemData Pipeline