To see the other types of publications on this topic, follow the link: Chain of Security.

Dissertations / Theses on the topic 'Chain of Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Chain of Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Sichel, Alexander R. (Alexander Russell). "Supply chain security along the Columbia River : an analysis of maritime supply chain security with respect to communication between security experts." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33589.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Ocean Engineering, 2005.<br>Includes bibliographical references (leaves 74-75).<br>The amount of cargo that enters the US border is at an all time high. Cargo containers and vessel shipments enter the US from all over the world. Tracking these shipments from their origin to destination requires professional expertise. Security organizations, such as the Regional Maritime Security Coalition of the Columbia River, realize the potential of these professionals, who track and coordinate cargo containers as they move through a supply chain, to enhance security of maritime cargo. In order to utilize these supply chain logistic professionals in a security coalition, proper training and certification would be required to comply with the US Federal Code on Liability Protection. This study examines the requirements that are necessary to certify supply chain logistic professionals as certified volunteers in an information sharing, security communication network to prevent terrorist activity, smuggling, theft, and to assist in general crisis mitigation. The thesis studies how the RMSC is currently developing its security communication system around supply chain logistic professionals, and the requirements and training that would be necessary to certify them under the US Federal Code.<br>by Alexander R. Sichel.<br>S.M.
APA, Harvard, Vancouver, ISO, and other styles
2

Houghton, Robert F. "The Chain-Link Fence Model: A Framework for Creating Security Procedures." DigitalCommons@USU, 2013. https://digitalcommons.usu.edu/etd/1967.

Full text
Abstract:
A long standing problem in information technology security is how to help reduce the security footprint. Many specific proposals exist to address specific problems in information technology security. Most information technology solutions need to be repeatable throughout the course of an information systems lifecycle. The Chain-Link Fence Model is a new model for creating and implementing information technology procedures. This model was validated by two different methods: the first being interviews with experts in the field of information technology and the second being four distinct case studies demonstrating the creation and implementation of information technology procedures. (169 pages)
APA, Harvard, Vancouver, ISO, and other styles
3

Goldman, Eric. "Securing the IT acquisition secruity chain : security concerns and human factors in IT acquisition /." Online version of thesis, 2010. http://hdl.handle.net/1850/12333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Park, Hong. "Impact of supply chain security orientation on port performance." Thesis, Cardiff University, 2013. http://orca.cf.ac.uk/52117/.

Full text
Abstract:
The terrorist attack at September 11, 2001 in the United States of America had a huge impact on the security of international cargo transportation. In order to minimize the threat of terrorism and secure the movement of goods in the supply chain, security initiatives such as ISPS code and CSI are adopted by the United Nations and the United States. Also, the term ‘security’ has emerged as an independent area of study in supply chain management studies after the 2000s. The objective of this study is to examine the impact of Supply Chain Security Orientation on Port Performance in the context of Korea. In order to explore the causal relationships, this study utilized Structural Equation Modelling (SEM) to examine the relationships. Also, a multi-group analysis between port group (port A and B) and port user group (shipping companies, forwarding companies, etc) was conducted to investigate the differences of the perceptions in two groups. This is to fill the gaps from previous studies by conducting quantitative and confirmatory research in the field of supply chain security. This study develops a conceptual model by literature review and semi-structured interviews in order to identify the impact of the constructs: Antecedents, Supply Chain Security Orientation, and Port Performance. There are 11 variables in total, and in-depth analysis of the inter-relationships among variables is identified. In conclusion, this study empirically develops a structural model and identified the importance of Financial Resources (FR), Supply Chain Security Initiatives (SCSI), Security Preparation and Planning (SPP), Security Related Partnership (SRP), Security Dedicated Communication and Technology (SDCT), Security Culture (SC), and Security Education (SE) on Port Performance. Also, the differences in perceptions between port group and port user group of the variables in the construct were also explored.
APA, Harvard, Vancouver, ISO, and other styles
5

Garshasbi, Farzam, and Ebrahimi Shahram Pasha. "Supply Chain Security Programs Comparing TAPA FSR with ISPS." Thesis, Högskolan i Borås, Institutionen Ingenjörshögskolan, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-16642.

Full text
Abstract:
In this era, where international outsourcing and global distribution systems are thriving, providing the security of products in the logistic system is very crucial now. For corporates, it is highly vital to know how secure high-tech products and materials are handled, warehoused and transported as they move throughout the globe. Different international security standards have been introduced, two of which are TAPA FSR and ISPS. TAPA FSR (Freight Security Requirements) defines the smallest required security standards for goods travelling throughout the supply chain and the suitable approaches in keeping those standards. ISPS (International Ship and Port Facility Security) is another security standard which identifies the tasks of governments, shipping companies, shipboard personnel, and port/facility personnel to find security threats and take preemptive actions against security events influencing ships or port facilities used in global business. This research attempts to study the literature on security of transportation in supply chain. By comparing the requirements of TAPA FSR and ISPS, we aim to find their basic differences and to analyze to what extent the two standards respond to the crucial concepts of security in the supply chain.<br>Program: BSc in Industrial Engineering - International Business Engineering
APA, Harvard, Vancouver, ISO, and other styles
6

Williams, Zachary. "Supply chain security an institutional approach to strategies and outcomes /." Diss., Mississippi State : Mississippi State University, 2008. http://library.msstate.edu/etd/show.asp?etd=etd-03312008-163918.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Malinowski, Mateusz Ksawery. "CargoNet : micropower sensate tags for supply-chain management and security." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/41654.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2007.<br>Includes bibliographical references (p. 109-113).<br>This thesis describes the development of a system of sensate active RFID tags for supply-chain management and security applications, necessitated by the current lack of commercial platforms capable of monitoring the state of shipments at the crate and case level. To make a practical prototype, off-the-shelf components and custom-designed circuits that minimize power consumption and cost were assembled and integrated into an interrupt-driven, quasi-passive system that can monitor, log, and report environmental conditions inside a shipping crate while consuming only 23.7 microwatts of average power. To prove the feasibility of the system, the tags were tested in the laboratory and aboard transport conveyances.<br>by Mateusz Ksawery Malinowski.<br>M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
8

Barcelos, Mariana Alexandra Aleixo de. "Towards a security framework for the semiconductor supply chain environment." Master's thesis, Universidade de Aveiro, 2018. http://hdl.handle.net/10773/23555.

Full text
Abstract:
Mestrado em Engenharia Eletrónica e Telecomunicações<br>Hoje em dia, a troca de informação entre os parceiros da cadeia de forne-cimento de semicondutores pode ser alvo de muitas ameaças de segurança conhecidas e desconhecidas no ambiente interno/externo dos parceiros. Particularmente, estas vulnerabilidades, no ambiente da cadeia de fornecimento de semicondutores, podem ser exploradas por atacantes com um amplo espectro de motivações que vão desde intenções criminais, visando o ganho financeiro, até à espionagem industrial e a cyber-sabotagem. Os atacantes podem comprometer a comunicação de dados entre parceiros na cadeia de fornecimento e, portanto, podem prejudicar o fornecimento de serviços pelos parceiros, bem como a continuidade da prestação de serviços. Como resultado, os parceiros da cadeia de fornecimento de semicondutores poderão sofrer repercussões nocivas que podem causar perdas significativas de receita, destruição da sua marca e atrasos no avanço das suas tecnologias. Consequentemente, uma plataforma de segurança para o ambiente da cadeia de fornecimento de semicondutores é de extrema importância. Assim, a intenção desta tese é fornecer uma base para uma plataforma de segurança para comunicação segura de dados entre todos os parceiros da cadeia de fornecimento de semicondutores.<br>Nowadays, data communication across the partners in the semiconductor supply chain can be the target of many known and unknown security threats exploiting security vulnerabilities in the internal/external environment of the partners. Particularly, these vulnerabilities in the semiconductor supply chain environment can be exploited by attackers with a wide spectrum of motivations ranging from criminal intents aimed at nancial gain to industrial espionage and cyber-sabotage. Attackers can compromise the data communication between legitimate parties in the supply chain and thus can jeopardize the delivery of services across the partners as well as the continuity of the service provision. As a result, semiconductor supply chain partners will su er from damaging repercussions which can cause signi cant revenue loss, destroy their brand and eventually hinder their advancement. Consequently, a security framework for the semiconductor supply chain environment is of utmost importance. Hence, the intent of this thesis is to provide a foundation for a security framework for secure data communication across the partners in the semiconductor supply chain.
APA, Harvard, Vancouver, ISO, and other styles
9

Klimova, Nadezda, and Anna Akimova. "Supply Chain Security. Tools, Trends, and Techniques : Toyota and Honda cases." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Företagsekonomi, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-15764.

Full text
Abstract:
Supply chain management has experienced great changes within the last fifty years. Inevitably, many companies entered the global market with the prime intention to achieve their defined goals. In comparison with the local markets, the global environment requires more efforts and changes in the supply chain operation in order to remain viable in business. Several business models are introduced for achieving the success in the market, suggested by the following researchers: Liker, Choi, Ronald Gilson, andMark J. Roeand others.  In a row with the study cases of Honda and Toyota Companies, the Supply Chain Trading Security is presented. Within this paper the security approaches are discussed during the processes of market penetration and development globally. The main strengths and weaknesses of the models are highlighted in the thesis. The description of market situations and explanation of the models’ application is presented. In order to achieve better results in the analysis of the case studies, the qualitative and inductive research methods have been implemented. The secondary data is considered to be the cornerstone of the thesis. Due to the fact that the thesis is based on descriptive, partially explanatory, and qualitative research methods, different meanings and experiences related to the Supply Chain Security phenomenon are discussed. In order to obtain the necessary data, library catalogues, encyclopedias, databases, and search engines in the Internet are utilized. The thesis goes through the following processes: choice of research area, formulation of research questions, choice of method, formulation of research design and data collection techniques, implementation of data collection, analysis of data, interpretation of data, and finally conclusions. The studied companies in the thesis – Toyota and Honda – conducted four major supply chain models that are neatly explained through the research. Partnership, Supplier Keiretsu, ARA, and Triple-A are the operated models. The following issues have been derived as conclusions: many components of supply chain security in terms of trade, affect the whole organization to a great extent. In order to keep the customer loyalty, image, and brand, companies should focus on their own core competence. Complex, transnational, and multi-vendor supply chain security models require more collaboration on safety issues that is approximately a half of the whole job. In addition, management and control of activities are necessary in order to achieve the target, go through the obstacles, and manage the current market situation.  Economic, political, and nature influence are key determinants of the supply network situation and give the possibility for a company to gain benefits, and control all business activities. The optimal choice of the model is considered to be the main tool aiming to manage all aforementioned tasks. Furthermore, diverse cultural differences influence the choice of the models that are implemented by the American and Japanese companies.
APA, Harvard, Vancouver, ISO, and other styles
10

Tang, Dawei. "Container Line Supply Chain security analysis under complex and uncertain environment." Thesis, University of Manchester, 2012. https://www.research.manchester.ac.uk/portal/en/theses/container-line-supply-chain-security-analysis-under-complex-and-uncertain-environment(2b058744-e0fc-4b4f-9222-6a4b41cf7348).html.

Full text
Abstract:
Container Line Supply Chain (CLSC), which transports cargo in containers and accounts for approximately 95 percent of world trade, is a dominant way for world cargo transportation due to its high efficiency. However, the operation of a typical CLSC, which may involve as many as 25 different organizations spreading all over the world, is very complex, and at the same time, it is estimated that only 2 percent of imported containers are physically inspected in most countries. The complexity together with insufficient prevention measures makes CLSC vulnerable to many threats, such as cargo theft, smuggling, stowaway, terrorist activity, piracy, etc. Furthermore, as disruptions caused by a security incident in a certain point along a CLSC may also cause disruptions to other organizations involved in the same CLSC, the consequences of security incidents to a CLSC may be severe. Therefore, security analysis becomes essential to ensure smooth operation of CLSC, and more generally, to ensure smooth development of world economy. The literature review shows that research on CLSC security only began recently, especially after the terrorist attack on September 11th, 2001, and most of the research either focuses on developing policies, standards, regulations, etc. to improve CLSC security from a general view or focuses on discussing specific security issues in CLSC in a descriptive and subjective way. There is a lack of research on analytical security analysis to provide specific, feasible and practical assistance for people in governments, organizations and industries to improve CLSC security. Facing the situation mentioned above, this thesis intends to develop a set of analytical models for security analysis in CLSC to provide practical assistance to people in maintaining and improving CLSC security. In addition, through the development of the models, the thesis also intends to provide some methodologies for general risk/security analysis problems under complex and uncertain environment, and for some general complex decision problems under uncertainty. Specifically, the research conducted in the thesis is mainly aimed to answer the following two questions: how to assess security level of a CLSC in an analytical and rational way, and according to the security assessment result, how to develop balanced countermeasures to improve security level of a CLSC under the constraints of limited resources. For security assessment, factors influencing CLSC security as a whole are identified first and then organized into a general hierarchical model according to the relations among the factors. The general model is then refined for security assessment of a port storage area along a CLSC against cargo theft. Further, according to the characteristics of CLSC security analysis, the belief Rule base Inference Methodology using the Evidential Reasoning approach (RIMER) is selected as the tool to assess CLSC security due to its capabilities in accommodating and handling different forms of information with different kinds of uncertainty involved in both the measurement of factors identified and the measurement of relations among the factors. To build a basis of the application of RIMER, a new process is introduced to generate belief degrees in Belief Rule Bases (BRBs), with the aim of reducing bias and inconsistency in the process of the generation. Based on the results of CLSC security assessment, a novel resource allocation model for security improvement is also proposed within the framework of RIMER to optimally improve CLSC security under the constraints of available resources. In addition, it is reflected from the security assessment process that RIMER has its limitations in dealing with different information aggregation patterns identified in the proposed security assessment model, and in dealing with different kinds of incompleteness in CLSC security assessment. Correspondently, under the framework of RIMER, novel methods are proposed to accommodate and handle different information aggregation patterns, as well as different kinds of incompleteness. To validate the models proposed in the thesis, several case studies are conducted using data collected from different ports in both the UK and China. From a methodological point of view, the ideas, process and models proposed in the thesis regarding BRB generation, optimal resource allocation based on security assessment results, information aggregation pattern identification and handling, incomplete information handling can be applied not only for CLSC security analysis, but also for dealing with other risk and security analysis problems and more generally, some complex decision problems. From a practical point of view, the models proposed in the thesis can help people in governments, organizations, and industries related to CLSC develop best practices to ensure secure operation, assess security levels of organizations involved in a CLSC and security level of the whole CLSC, and allocate limited resources to improve security of organizations in CLSC. The potential beneficiaries of the research may include: governmental organizations, international/regional organizations, industrial organizations, classification societies, consulting companies, companies involved in a CLSC, companies with cargo to be shipped, individual researchers in relevant areas etc.
APA, Harvard, Vancouver, ISO, and other styles
11

Loke, Wai Leng. "An evaluation of the value of security in the international marine supply chain." Thesis, University of British Columbia, 2008. http://hdl.handle.net/2429/2519.

Full text
Abstract:
Since the events of 9/11, there has been tremendous amount of renewed interests in the study of trade security. There has been an influx of security regulations and the private sector has been trying to keep pace in complying with them. However, due to the public externalities of security improvements and the lack of quantified and proven benefits, the private sector is struggling to establish business cases for their security initiatives. There is very little quantitative research in this area. Using exploratory factor analysis (EFA) and structural equation modeling (SEM), this study serves to fill this gap by introducing a statistical way of analysing and understanding the complex relationships amongst security effort, its motivators and performance and traditional supply chain performance (SCP). This study also proposes an evaluation framework for security efforts. EFA results show that security is a dimension of SCP. This means that organizations have all along been measuring an aspect of their operations that relates to security. As such, organizations should not perceive the current heightened interests in security as throwing them off-balance. In evaluating security efforts, organizations should select key performance indicators (KPIs) that represent each of the four areas of information, cargo, people and cost. SEM results show that organizations undertake security efforts as a result of both perceived security benefits and perceived collateral benefits, with perceived security benefits carrying a greater weight in the decision-making process. Results also show that organizations are implementing security initiatives out-of-compliance i.e. implementing initiatives that they perceive as not having significant impacts on security and SCP. In view of the positive relationships among perceived security impact, security effort and security performance, there is further imperative for an objective method for evaluating security efforts to prevent effort justification behaviour in determining the effectiveness of the same. Results also show that organizations perceive an improved performance in security leads to an overall improvement in SCP. However, as with other supply chain strategies, there are tradeoffs and not all aspects of SCP are impacted in the same way. Time, responsiveness and efficiency for instance are negatively impacted while reliability is positively impacted.
APA, Harvard, Vancouver, ISO, and other styles
12

Chang, Meng Ying M. Eng Massachusetts Institute of Technology /., and Raghavendran Mohan. "Impact of Drug Supply Chain Security Act on US pharmaceutical industry under decentralized information flow." Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/112875.

Full text
Abstract:
Thesis: M. Eng. in Supply Chain Management, Massachusetts Institute of Technology, Supply Chain Management Program, 2017.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 46-47).<br>Drug counterfeiting is one of the major issues in the pharmaceutical industry across the world. These products could cause damages from ineffective treatments to death of patients. In order to fight against counterfeit drugs, the US government introduced Drug Supply Chain Security Act (DSCSA) mandating that all prescription drugs should be serialized. In addition, it mandates all pharmaceutical companies in the U.S. to provide tracking documents in response to a tracing request from FDA. While the act aims to improve drug security across the pharmaceutical industry, it poses a huge impact across the supply chain on both physical flow and information flow. This research evaluates the supply chain impact at an industry level. In this thesis, we evaluate the supply chain impact of Matryoshka model and Unit level model supported by a decentralized information flow. The thesis then evaluates the supply chain impact from three aspects, operational cost, IT infrastructure cost and capital investment. We reference Nabiyeva and Wu's research on centralized information flow model to conduct an exhaustive supply chain impact evaluation across the centralized model and the decentralized model. We conclude that among all these scenarios, unit level model under centralized information flow design bears the highest cost as it requires higher IT investment. On the other hand, the matryoshka model under decentralized information flow has a least supply chain impact from the cost perspective with low IT investment.<br>by Meng Ying Chang and Raghavendran Mohan.<br>M. Eng. in Supply Chain Management
APA, Harvard, Vancouver, ISO, and other styles
13

Rodriguez, Cuevas Jose A. "The balloon effect and Mexican homeland security : what it means to be the weakest link in the Americas' security chain." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10684.

Full text
Abstract:
The sudden increase in crime and violence in some Mexican cities and regions has raised security concerns not only in Mexico, where President Felipe Calderon categorized these crimes as a threat to Mexican society, but also in the United States, where Homeland Secretary head Janet Napolitano referred to stemming the violence as "vital to core U.S. national interests." Mexico is concerned with the latent threat of violence spreading all over the nation, while the U.S. is trying to guard against spillover. Both governments are concerned by the increased violence and its impact on communities along the U.S.--Mexican border. Because of its geopolitical location along the southern U.S. border, Mexico is susceptible to possible undesired effects of U.S. strategies. These unintended, second-degree consequences are known as "balloon effects," after the airflow inside a balloon when constriction applied to one area sends pressure to another area in the balloon, thinning and weakening its wall. Since 2006, Mexico's strategy for countering transnational organized crime and related activities has sent the balloon effect in two directions: first, inside Mexico, where government actions have unbalanced the criminal structure, creating balloon effects inside Mexican territory; and second, within the U.S. while asking to escalate the Mexican effort to improve its anti-crime strategy with U.S. assistance has escalated conflict and led to a holistic strategy against transnational organized crime and related activities in the Americas.
APA, Harvard, Vancouver, ISO, and other styles
14

Farid, Muhammad S. M. Massachusetts Institute of Technology, and Bayu 1969 Hanantasena. "B2B E-commerce : value chain transformation, enablers and barriers, technology, privacy and security." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/8887.

Full text
Abstract:
Thesis (S.M.M.O.T.)--Massachusetts Institute of Technology, Sloan School of Management, Management of Technology Program, 2001.<br>Includes bibliographical references (leaves 134-141).<br>The Internet is changing the way we do business. Today's conventional wisdom says that in order to survive in the new economy era, companies must transform from and align their old business practices, processes and culture to suit the new business requirements. This thesis examines the dynamics of channel shift from traditional supply chain to on-line e-commerce, in particular the enablers and barriers, as well as the value transformation due to the channel shift. The scope of this thesis is limited to B2B E-commerce. This paper took global perspectives to analyze value transformation, enablers and barriers, technology, privacy and security due to channel shift from traditional channel to e-commerce.<br>by Muhammad Farid [and] Bayu Hanantasena.<br>S.M.M.O.T.
APA, Harvard, Vancouver, ISO, and other styles
15

Bellefeuille, Cynthia Lynn. "Quantifying and managing the risk of information security breaches participants in a supply chain." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33313.

Full text
Abstract:
Thesis (M. Eng. in Logistics)--Massachusetts Institute of Technology, Engineering Systems Division, 2005.<br>Includes bibliographical references (leaf 70).<br>Technical integration between companies can result in an increased risk of information security breaches. This thesis proposes a methodology for quantifying information security risk to a supply chain participant. Given a system responsible for supply chain interaction and the vulnerabilities attributed to the system, the variables that determine the probability and severity of security incidents were used to create a model to quantify the risk within three hypothetical information systems. The probability of an incident occurring was determined by rating the availability and ease of performing an exploit, the attractiveness of the target and an estimate of the frequency of the attack occurring Internet wide. In assigning a monetary value to the incident, the outcome from an attack was considered in terms of the direct impact on the business process and the potential impact on partnerships. A method for determining mitigation strategies was then proposed based on a given set of monetary constraints and the realization of corporate security policy.<br>by Cynthia Lynn Bellefeuille.<br>M.Eng.in Logistics
APA, Harvard, Vancouver, ISO, and other styles
16

Winkler, Simon. "Supply Chain Finance Der Asset-Based-Financing-Ansatz in Unternehmensnetzwerken /." St. Gallen, 2006. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/00642892002/$FILE/00642892002.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Lewis, Brian Michael. "Inventory Control with Risk of Major Supply Chain Disruptions." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7155.

Full text
Abstract:
This thesis studies inventory control with risk of major supply chain disruptions, specifically border closures and congestion. We first investigate an inventory system in which the probability distributions of order leadtimes are dependent on the state of an exogenous Markov process; we will model border disruptions via this exogenous process. We consider stationary, state-dependent basestock policies, which are known to be optimal for the system under study, and develop an expression for the long-run average cost of an arbitrary policy of this form. Restricting our attention to state-invariant basestock policies, we show how to calculate the optimal basestock (or order-up-to) level and long-run average cost. We provide a sufficient condition for the optimality of a state-invariant basestock policy and monotonicity results for the optimal state-invariant order-up-to level. We finally give the optimal state-invariant order-up-to level for a special class of supply states. Motivated by the possibility of port of entry closures in the event of a security incident, we specialize the previous model to a two-stage international supply chain. A domestic manufacturer orders a single product from a foreign supplier and the orders must cross an international border that is subject to closure. We first assume that border congestion is negligible. The manufacturer's optimal inventory policy and long-run average cost are analyzed. We present structural policy results and the results of a comprehensive numerical study that have important implications for business and for the cooperation between business and government in disruption management and contingency planning. Finally we extend the border closure model to include both border closures and the resulting congestion. We model the border processing system as a discrete-time, single-server queue with constant arrival rate and Markov-modulated service rate. A key task is the development of the leadtime distribution, which is more complex than in the previous model. We present the results of a comprehensive numerical study and provide managerial insights.
APA, Harvard, Vancouver, ISO, and other styles
18

Chung, Peter Wontae, and Tao Zhang. "A framework to evaluate interoperable data exchange models for Drug Supply Chain Security Act compliance." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/107520.

Full text
Abstract:
Thesis: M. Eng. in Logistics, Massachusetts Institute of Technology, Supply Chain Management Program, 2016.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (page 50).<br>The United States has one of the safest drug supply chains in the world. However, its security is threatened by new challenges such as counterfeit, diverted, and illegally imported drugs. To counter the new challenges, the Drug Supply Chain Security Act (DSCSA) was signed into law by President Obama on November 27, 2013, with a 10-year implementation timeframe. As a result, companies in the U.S. pharmaceutical industry, including drug manufacturers, distributors, and dispensers, are challenged to fully comply with the DSCSA by 2023. The compliance with the DSCSA will enable companies to operate and manage the risks of their supply chains more efficiently. Industry consortiums, such as the Healthcare Distribution Management Association (HDMA), and the industry leaders have recommended various interoperable data exchange models for the implementation of the compliance. However, domestic and international complexities make it difficult to pick the optimal model for the industry. In this research, we start with categorizing the known data exchange models that can be potentially used by the U.S. pharmaceutical industry. Second, we develop a scorecard methodology based on a framework that considers various factors across the entire supply chain. Next, we examine the categorized models using this scorecard methodology. Lastly, we conclude with recommendations on the data strategy decision for the U.S. pharmaceutical industry.<br>by Peter Wontae Chung and Tao Zhang.<br>M. Eng. in Logistics
APA, Harvard, Vancouver, ISO, and other styles
19

Agrianidis, Anastasios. "Information Security Training and Serious Games." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85460.

Full text
Abstract:
The digital transformation of the 21st century has led to a series of new possibilities and challenges, where one major concern of many major organizations and enterprises is promoting Information Security Awareness and Training (ISAT) for their employees. This aspect of Information Security (IS) can promote cybersecurity in the work environment against threats related to the human factor. Apart from traditional methods as workshops and seminars, researchers study the effect of gamification on ISAT, by proposing customized digital games to train employees regardless their IT skills. This thesis is trying to propose what techniques and approaches can be considered to train people throughout a full threat progression by studying the features of previous efforts. For this purpose, a literature study based on the principles of a systematic literature review (SLR) is essential to gather the available data and review their characteristics. More specifically, the solutions of the researchers are analyzed against the seven steps of the Lockheed Martin Cyber Kill Chain (LM CKC), where each game is classified to one or more phases, according to the training they offer. Thus, some tools can provide a wide range of training, covering many aspects of the CKC, while others are targeting a specific IS topic. The results also suggest that popular attacks involving social engineering, phishing, password and anti-malware software are addressed by many games, mainly in the early stages of the CKC and are focus on trainees without professional IT background. On the other hand, in the last two phases of the CKC, the majority of categorized games involves countermeasures that IS specialists must launch to prevent the security breach. Therefore, this study offers insight on the characteristics of serious games, which can influence an ISAT program, tailored to the enterprise’s distinct IS issue(s) and the IT background of the trainees.
APA, Harvard, Vancouver, ISO, and other styles
20

Xue, Hao. "Hardware Security and VLSI Design Optimization." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright1546466777397815.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Baker, Wade Henderson. "Toward a Decision Support System for Measuring and Managing Cybersecurity Risk in Supply Chains." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/85128.

Full text
Abstract:
Much of the confusion about the effectiveness of information security programs concerns not only how to measure, but also what to measure — an issue of equivocality. Thus, to lower uncertainty for improved decision-making, it is first essential to reduce equivocality by defining, expanding, and clarifying risk factors so that metrics, the "necessary measures," can be unambiguously applied. We formulate a system that (1) allows threats to be accurately measured and tracked, (2) enables the impacts and costs of successful threats to be determined, and (3) aids in evaluating the effectiveness and return on investment of countermeasures. We then examine the quality of controls implemented to mitigate cyber risk and study how effectively they reduce the likelihood of security incidents. Improved control quality was shown to reduce the likelihood of security incidents, yet the results indicate that investing in maximum quality is not necessarily the most efficient use of resources. The next manuscript expands the discussion of cyber risk management beyond single organizations by surveying perceptions and experiences of risk factors related to 3rd parties. To validate and these findings, we undertake in an in-depth investigation of nearly 1000 real-world data breaches occurring over a ten-year period. It provides a robust data model and rich database required by a decision support system for cyber risk in the extended enterprise. To our knowledge, it is the most comprehensive field study ever conducted on the subject. Finally, we incorporate these insights, data, and factors into a simulation model that enables us study the transfer of cyber risk across different supply chain configurations and draw important managerial implications.<br>Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
22

Karlsson, Daniel. "Modelling and Analysis of Swedish Heavy Industry Supply Chain Data Management to Improve Efficiency and Security." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-291230.

Full text
Abstract:
Product certificates are sent throughout the supply chain of Swedish heavy industry in order to show provenance and physical characteristics of objects such as screws. The data management of the certificates has been, and still is, a very manual process. The process requires extensive work in order to maintain a correct record of the certificates. In particular, tracing causes of errors and establishing compliance takes a long time and effort. The company Chaintraced is developing an application to automate the process by acting as a third party to digitalize and manage the certificates. Introducing a third party into a business-to-business process requires that data integrity is preserved and that information reaches its expected destination. Recent research has indicated that distributed ledger technologies showpromise to fulfill these requirements. In particular, blockchain-based systems offer immutability and traceability of data, and can reduce the trust needed between different parties by relying on cryptographic primitives and consensus mechanisms. This thesis investigates the application of distributed ledger technology to further automate the Swedish heavy industry supply chain and reduce the trust needed in a third party managing the certificates. Requirements for an industrial strength system is set up and several distributed ledger technology solutions are considered to fit the use case of Swedish heavy industry. A proof of concept based on the findings is implemented, tested and compared with a centralized database to explore its possible usage in the supply chain with regard to feasibility, immutability, traceability and security. The investigation resulted in a prototype based on Hyperledger Fabric to store product certificates. The solution provides certain guarantees to immutability and security while being developed with feasibility for deployment in mind. The proposed solution is shown to be slow compared to a centralized solution but scales linearly with number of certificates and is considered within bounds for the use case. The results also show that the proposed solution is more trustworthy than a centralized solution, but that adopting blockchain technology is an extensive task. In particular, trustworthiness and guarantees provided by the solution is highly dependent on the feasibility aspect and the investigation concludes that adoption of blockchain technology within the Swedish heavy industry must take this into consideration.<br>Hanteringen av produktcertifikat inom den svenska tungindustrin är en mycket manuell process vilket resulterar i att ett enormt arbete krävs för att upprätthålla en korrekt hantering av certifikaten. Att spåra orsaken till fel och att kontrollera efterlevnaden av krav inom industrin tar lång tid. Chaintraced har utvecklat en applikation som automatiserar hanteringen av certifikaten genom digitalisering och att som tredje part lagra informationen. Att introducera en tredje part i affärsverksamheter kräver att integriteten av datan bibehålls och att information anländer till korrekt mottagare. Ny forskning har visat att distribuerade liggare har möjligheten att uppfylla dessa krav. Framförallt gällande blockkedjetekniken med dess många egenskaper och garantier som företag letar efter, så som oföränderlig och spårbar data. Blockkedjetekniken reducerar också förtroendet som behövs för parter inom nätverket genom att förlita sig på kryptografi och konsensus mekanismer. Den här rapporten utreder användningen av distribuerade liggare för att ytterliggare automatisera den svenska tungindustrins leveranskedja och minska tilliten som krävs för en tredje part som hanterar certifikaten. Krav ställs upp för ett system och flertalet distribuerade databastekniker undersöks för att passa in i fallet angående den svenska tungindustrin. En prototyp är utvecklad baserad på kraven, prototypen är testad och jämförd med en central databas för att undersöka hur implementationen står sig vad gäller genomförbarhet, oföränderlighet, spårbarhet och säkerhet. Undersökningen resulterade i en prototyp baserad på Hyperledger Fabric. Prototypen lagrar produktcertifikaten och ger vissa garantier till oföränderligbarhet samt säkerhet. Möjligheten för aktörer i kedjan att använda prototypen hade stor inverkan på hur systemet utvecklades. Prototypen visar sig vara långsammare än en centraliserad lösning men mätningarna kan anses vara inom kraven för ett system inom tungindustrins leveranskedja. Skalbarheten av lösningen är beroende av kraven på säkerhet men är linjär i antalet certifikat som skickas och lagras. Resultaten visar också att den föreslagna lösningen inger mer tillit än en centraliserad lösning men att introducera blockkedjetekniken är en komplex process. Trovärdighet och garantier som ges av lösningen är till stor del beroende av komplexiteten vilket rapporten kommer fram till är det viktigaste för svensk tungindustri att ha i åtanke vid eventuell antagande av blockkedjeteknik.
APA, Harvard, Vancouver, ISO, and other styles
23

Manocha, Jitendra. "Using innovation from block chain technology to address privacy and security problems of Internet of Things." Thesis, KTH, Industriell Marknadsföring och Entreprenörskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209682.

Full text
Abstract:
Internet of things (IoT) is growing at a phenomenal speed and outpacing all the technological revolutions that occurred in the past. Together with window of opportunity it also poses quite a few challenges. One of the most important and unresolved challenge is vulnerability in security and privacy in IoT. This is mainly due to lack of a global decentralized standard even though characteristically IoT is based on distributed systems. Due to lack of standard IoT has interoperability issue between different devices and platform suppliers which implicitly creates need of reliance on the suppliers as they store and control user data. There is no decentralized industry wide solution which can offer the control of user data and security back to the user. While experts in IoT are still wondering on solving the challenge, a new Block chain technology has surfaced in past few years and showed signs of disruptive innovation in financial industry. This technology is decentralized, secure and private. Let alone information, block chain innovation has proven to keep assets secure. Recently few forms of block chains have emerged. This research will focus on analyzing the innovative block chain technology, their characteristics specifically the types of block chain to address the privacy and security challenges of IoT. Research proposes a new concept of hybrid block chain as a solution to IoT security and privacy problem.
APA, Harvard, Vancouver, ISO, and other styles
24

Mwewa, Lameck [Verfasser]. "Evaluation of Jatropha Biofuels Value Chain for Sustainability and Food Security : a Conceptual Framework Approach / Lameck Mwewa." Gieߟen : Universitätsbibliothek, 2019. http://d-nb.info/1209134705/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Meyers, Jared James. "Training Security Professionals in Social Engineering with OSINT and Sieve." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/6863.

Full text
Abstract:
This research attempts to create a novel process, Social Engineering Vulnerability Evaluation, SiEVE, to use open source data and open source intelligence (OSINT) to perform efficient and effectiveness spear phishing attacks. It is designed for use by "œred teams" and students learning to conduct a penetration test of an organization, using the vector of their workforce. The SiEVE process includes the stages of identifying targets, profiling the targets, and creating spear phishing attacks for the targets. The contributions of this research include the following: (1) The SiEVE process itself was developed using an iterative process to identify and fix initial shortcomings; (2) Each stage of the final version of the SiEVE process was evaluated in an experiment that compared performance of students using SiEVE against performance of those not using SiEVE in order to test effectiveness of the SiEVE process in a learning environment; Specifically, the study showed that those using the SiEVE process (a) did not identify more targets, (b) did identify more information about targets, and (c) did lead to more effective spear phishing attacks. The findings, limitations, and future work are discussed in order to provide next steps in developing formalized processes for red teams and students learning penetration testing.
APA, Harvard, Vancouver, ISO, and other styles
26

Stone, Jamie. "Development of a framework for enhancing resilience in the UK food and drink manufacturing sector." Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/33501.

Full text
Abstract:
This thesis presents research undertaken to understand and enhance resilience in the UK Food and Drink Manufacturing Sector. It focuses on the development of a conceptual framework which establishes how specific vulnerabilities link to individual mitigation strategies available to the sector and the impact of such strategies on wider sustainability. The research in this thesis is divided into four main parts. The first part consists of three complementary review chapters exploring resilience as a theoretical concept, resilience in the UK Food and Drink Manufacturing sector and existing methods used to study and/or enhance resilience. The second part of the thesis begins by describing how the pragmatic philosophy and abductive stance underpinning the research, in combination with review findings, helped to determine the research techniques used in this work, which included the systematic review process and the mixed methods case study. Next, the research facilitating a novel conceptual framework describing how real-time vulnerabilities can be identified and mitigated in a way that is complimentary to the wider sustainability of the organisation is discussed. The third part of the thesis describes the practical set of tools, presented in the form of a workbook, which enable a Food and Drink Manufacturer to utilise the conceptual framework teachings to enhance their own resilience. The final section details key conclusions regarding the conceptual nature and practical enhancement of resilience for Food and Drink Manufacturers and the wider food system, as well as opportunities for future work. The conceptual integrity and practical usefulness of the conceptual framework and its derivative workbook toolset have been demonstrated through case studies with two UK Food and Drink Manufacturers. Results suggest two major benefits of the framework are the ability to identify an organisation's vulnerabilities based on actual mapping of their supply network and the ability to evaluate mitigating resilience strategies based on their broader impacts elsewhere within the organisation. In summary, the research reported in this thesis has concluded that resilience cannot be seen as a one-off solution for returning to how things were before disruption, but instead is a constant process of learning and adaptation in response to a company's ever-changing operating environments. The framework and workbook presented provide a novel and practical method for UK Food and Drink Manufacturers, of all sizes and production ranges, to identify and respond to their evolving vulnerabilities, as well as providing much needed synthesis and directions for future work at an academic level.
APA, Harvard, Vancouver, ISO, and other styles
27

Ekwall, Daniel. "Managing the risk for antagonistic threats against the transport network." Doctoral thesis, Göteborg : Borås : Division of Logistics and Transportation, Chalmers University of Technology ; School of Engineering, University of Borås, 2009. http://hdl.handle.net/2320/5033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Johnson, Ludwig, and Lukas Mårtensson. "Assessing HTTP Security Header implementations : A study of Swedish government agencies’ first line of defense against XSS and client-side supply chain attacks." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21725.

Full text
Abstract:
Background. Security on the web is a fundamental requirement as it becomes a bigger part of society and more information than ever is shared over it. However, as recent incidents have shown, even Swedish government agencies have had issues with their website security. One such example is when a client-side supply chain for several governmental websites was hacked and malicious javascript was subsequently found on several governmental websites. Hence this study is aimed at assessing the security of Swedish government agencies’ first line of defense against attacks like XSS and client-side supply chain. Objectives. The main objective of the thesis is to assess the first line of defense, namely HTTP security headers, of Swedish government agency websites. In addition, collecting statistics of what HTTP security headers are actually used by Swedish government agencies today were gathered for comparison with similar studies. Methods. To fulfill the objectives of the thesis, a scan of all Swedish government agency websites, found on Myndighetsregistret, was completed and an algorithm was developed to assess the implementation of the security features. In order to facilitate tunable assessments for different types of websites, the algorithm has granular weights that can be assigned to each test to make the algorithm more generalized. Results. The results show a low overall implementation rate of the various HTTP security headers among the Swedish government agency websites. However, when compared to similar studies, the adoption of all security features are higher among the Swedish government agency websites tested in this thesis. Conclusions. Previous tools/studies mostly checked if a header was implemented or not. With our algorithm, the strength of the security header implementation is also assessed. According to our results, there is a significant difference between if a security header has been implemented, and if it has been implemented well, and provides adequate security. Therefore, traditional tools for testing HTTP security headers may be inefficient and misleading.
APA, Harvard, Vancouver, ISO, and other styles
29

Ba, Hélène Aminatou. "Contribution of contract farming to sustainable value chain upgrading in the Mekong River Delta in Vietnam." Thesis, Paris Est, 2019. http://www.theses.fr/2019PESC0025.

Full text
Abstract:
Les mutations et la libéralisation des marchés agricoles et alimentaires mondiaux ont accéléré la formation de relations verticales entre producteurs et firmes agro-industrielles et la diffusion de l’agriculture dite contractuelle dans les secteurs de la production et de la commercialisation des produits agricoles. L'agriculture contractuelle est un accord entre un exploitant agricole et un acheteur (ou entreprise), établi avant la saison de production, pour une quantité et une qualité spécifiques du produit, avec sa datede livraison à un prix parfois préétabli. Le contrat garantit au producteur la vente assurée de sa production et une assistance technique et financière (crédit, technologie,intrants agricoles). L'acheteur quant à lui, a la garantie d'une offre régulière du produit et du contrôle de la qualité.Cette thèse vise à évaluer le rôle de l'agriculture contractuelle dans la durabilité des chaînes de valeur du riz au Vietnam.Dans la sphère sociale de la durabilité, nous avons démontré que les modèles d’agriculture contractuelle privilégient davantage les moyennes ou grandes exploitations agricoles du fait des coûts de transaction accompagnant le contrat et le volume de production désiré. Cela engendre l’exclusion des petits agriculteurs qui ont de faibles capacités de production. Toutefois, la participation à un système d'intégration horizontale permet de lever cette contrainte. Sur le plan économique, les producteurs sous contrat gagnent plus que les producteurs sans contrat (environ 121 USD/hectare). Finalement, sur le plan environnemental, les producteurs sous contrat sont disposés à adopter des pratiques respectueuses de l'environnement. Cependant, les coûts élevés des certifications environnementales découragent les firmes à inclure ces normes environnementales dans les attributs de contrat<br>In recent years, the structure of the Vietnamese rice sector has changed. From a highly fragmented value chain producing rice for low value-added markets, the shift toward more vertically integrated and coordinated value chains through contract farming has begun to emerge. Contract farming is used as a tool to govern more effectively rice quality and penetrate new and lucrative markets for higher quality rice.Many empirical studies have assessed the role of contract farming in developing economies. Contract farming is perceived as an engine for rural development and a golden opportunity for farmers to have direct access to modern markets, agricultural inputs, credit, and technical support. Worldwide, contract farming adoption is promoted as an institutional innovation. In the Vietnamese rice sector, there is a specific legislation to encourage its diffusion such as the Small Farm Large Field program.This thesis aims at assessing the contribution of contract farming to internalize sustainable production standards in rice value chains. The central assumption of this thesis is that some contract attributes may contribute to improving sustainability. A set of attributes of performance declined in sustainable indicators was selected to test our research hypothesis. The attributes of performance stem from the Sustainable Rice Platform’s principles of sustainable rice production and the existing contract attributes in the Mekong River Delta.In the economic dimension of sustainability, we found that participation in contract farming improves the welfare of rice farmers as farmers selling their paddy using a contract gain, on average, $121 per hectare of paddy more compared to farmers producing outside of a contract. The increase in price is mainly a result of an increase in the selling price (price premium).In the social principle of sustainability, we found that participation in contract farming could improve the welfare of small rice farmers through rent and risk-sharing. Export firms share some of its profits with farmers through a price premium. However, due to the large heterogeneity of contract farming models in the Vietnamese rice sector, not all contract models facilitate risk-sharing. In a marketing contract, farmers bear all the production risks whereas in resource contracts some of the production risks may shift to the export firms. Therefore, resource contracts are more likely to improve equity through risk-sharing between farmers and export firms. Moreover, participation in resource contracts is found to improve farmers’ financial inclusion. Export firms are willing to prefinance farmers under contract. However, the opportunity cost of prefinancing may include the loss of farmers’ autonomy. Evidence from our discrete choice experiment reveals a conflicting interest between farmers and export firms regarding the decision rights in a contract. Last but not least, smallest farmers were excluded from contract farming as firms did not always want to support the transaction costs of dealing with numerous individual farmers. However, our findings suggest that the scale-bias could be successfully relaxed through the Small Farm Large Field program.Finally, in the environmental dimension of sustainability, we examined both firms’ and farmers’ prospective responses to the internalization of sustainability through contract farming using an experimental approach. Farmers are found willing to internalize the environmental dimension of sustainability through contract farming in exchange for a price premium. Export firms are found less likely to implement the GlobalG.A.P./VietGAP or the Pesticide free production standards. The cost of such standard implementation and the lack of institutional support are more likely to justify this outcome
APA, Harvard, Vancouver, ISO, and other styles
30

Barkhadle, Hassan. "Contribution du maillon portuaire à la performance de la chaîne logistique globale : cas du port de Djibouti." Thesis, Brest, 2014. http://www.theses.fr/2014BRES0052.

Full text
Abstract:
Aujourd’hui, avec la mondialisation et la concurrence internationale effrénées, les chaînes logistiques globales (CLG) sont conçues à l’échelle planétaire, les places portuaires deviennent entre autre, des sites d’implantation idéale, permettant ainsi la valorisation des marchandises, grâce à la performance de son maillon portuaire. Depuis l’élaboration d’un partenariat commercial en 2000, entre le maillon portuaire de Djibouti (MPD) et le groupe international portuaire Dubaï Port World (DPW), entre 2002 et 2012, le trafic conteneurisé s’est accru de près de 700 %. De plus, depuis l’ouverture de Djibouti Free Zone (DFZ) en 2004, gérée totalement par une filiale du groupe DPW, près de 150 entreprises sont venues s’y implanter, dont plus de la moitié sont des entreprises étrangères. Partant de ce double constat, notre problématique de recherche s’attache à comprendre la contribution du MPD, à la performance de la CLG. Dans une phase de recherche empirique, qui nous a permis d’identifier les dimensions et les axes caractérisant la performance logistique du MPD, nous déployons un modèle descriptif et synthétique de la performance portuaire<br>With globalization and international competition sprees, the Supply Chain (SC) are designed on a global scale, the port spaces, thus allowing ideal implementation sites, thanks to the performance of its link port. Since the development of a strategic partnership between the link port of Djibouti (LPD) and the international group port Dubai Port World (DPW) in 2000, the containerized traffic increased of almost 700 %, between 2002 and 2012. With in addition, with the opening of Djibouti Free Zone (DFZ) in 2004, managed entirely by a subsidiary of the group DPW, nearly 150 businesses have implemented there warehouses in DFZ, with more than half of whom are foreign companies. Starting from this dual observation, our research has been focused on understanding the contribution of the LPD, to the performance of the SC. In a phase of empirical research, which has allowed us to identify dimensions and axes characterizing the logistics performance of the LPD, we deploy a descriptive and synthetic model of the port performance
APA, Harvard, Vancouver, ISO, and other styles
31

Leonel, Ana Paula da Silva [UNESP]. "Viabilidade econômica de produtos à base de tilápia para alimentação escolar nos municípios de Toledo-PR e Marechal Cândido Rondon-PR." Universidade Estadual Paulista (UNESP), 2016. http://hdl.handle.net/11449/148648.

Full text
Abstract:
Submitted by ANA PAULA DA SILVA LEONEL null (apsleonel@gmail.com) on 2017-01-27T17:00:41Z No. of bitstreams: 1 tese ana paula leonel.pdf: 1601886 bytes, checksum: fc5fe0dd93218a43b48c43d4d92aeb60 (MD5)<br>Approved for entry into archive by LUIZA DE MENEZES ROMANETTO (luizamenezes@reitoria.unesp.br) on 2017-01-31T15:26:02Z (GMT) No. of bitstreams: 1 leonel_aps_dr_jabo.pdf: 1601886 bytes, checksum: fc5fe0dd93218a43b48c43d4d92aeb60 (MD5)<br>Made available in DSpace on 2017-01-31T15:26:02Z (GMT). No. of bitstreams: 1 leonel_aps_dr_jabo.pdf: 1601886 bytes, checksum: fc5fe0dd93218a43b48c43d4d92aeb60 (MD5) Previous issue date: 2016-03-29<br>Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)<br>Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)<br>Objetivou-se a realização de análise da viabilidade econômica da inserção de almôndega, quibe, bolo de chocolate e bolo de cenoura à base de tilápia na alimentação escolar. O estudo foi realizado nos municípios de Toledo-PR e Marechal Cândido Rondon-PR. Cidades que são destaque nacional na produção de tilápias, e apresentam estudos acerca do tema. Para isto o estudo foi dividido em três etapas. A primeira, consistiu no estudo do perfil socioeconômico de 12 pisciculturas. Para esta caracterização, foram realizados levantamentos de dados necessários na determinação dos custos de produção, rentabilidade e identificação das principais características dos empreendimentos rurais. No segundo momento, foram realizados os custos dos ingredientes dos quatro produtos à base de tilápia, onde foram levantados os valores pagos pelos ingredientes de cada receita pelas prefeituras municipais. A viabilidade da inserção dos produtos à base de pescado nas escolas foi a última etapa, onde os valores determinados no item anterior foram utilizados para o cálculo dos cardápios com e sem inserção do pescado. Como resultados observou-se que as propriedades apresentam em sua maioria mão-de-obra familiar, a lâmina d´água média é de 20.800m², de 1 a 18 tanques escavados e, para 41,6%. A piscicultura é sua atividade econômica principal, sendo o principal canal de comercialização, os frigoríficos da região. Constatou-se grande variação na produtividade de tilápias nos municípios de Toledo-PR e Marechal Cândido Rondon, esta variou de 5.714 kg/ha a 97.540 kg/ha. O Custo Operacional Total (COT) médio foi de R$2,69 e o preço médio de venda de R$3,13. As pisciculturas mais eficientes foram T6 o município de Toledo e M3 em Marechal Cândido Rondon. A Carne Mecanicamente Separada (CMS) mostrou-se mais vantajosa economicamente para a preparação dos quatro produtos à base de tilápia, devido ao menor valor de aquisição quando comparado ao do filé. O produto com menor custo de ingredientes por quilograma produzido, foi o bolo de cenoura de CMS, com valores de R$3,21 para Toledo e R$ 3,55 para Marechal Cândido Rondon. É viável economicamente a inserção de produtos à base de tilápia na alimentação escolar, nos municípios estudados. Os produtos almôndega e quibe de CMS, no município de Toledo reduziram os custos em comparação aos cardápios tradicionais. E no município de Marechal Cândido Rondon o mesmo aconteceu com o bolo de chocolate e bolo de cenoura de CMS e filé.<br>The objective of this study is to perform analysis of the economic viability of meatball insertion, kebab, chocolate cake and carrot cake for tilapia based school feeding. The study was conducted in the cities of Toledo-PR and Marechal Cândido Rondon-PR which are of national prominence in the production of tilapia and present studies on the subject. This study was divided into three stages. The first phase consisted in the study of the socioeconomic profile of 12 fish farms. For this characterization they were conducted data surveys to determine the production costs and profitability and identify the main characteristics of rural enterprises. In the second stage were carried out the cost of the ingredients of the four products based on tilapia meat, where the amounts paid for the ingredients of each recipe by municipalities were raised. The feasibility of insertion of the school feeding products based on fish is evaluated in the last stage, where the values determined in the previous section were used for the calculation of the diets with and without inclusion of fish. As a result it was found that the properties have mostly family labor and the average water depth were 20.800m², with 1 to 18 excavated tanks. For 41.6% of the fish farming the main marketing channel are slaughterhouses in the region. It was found a wide variation in tilapia productivity in the counties of Toledo-PR and M.C.Rondon-PR, ranged from 5,714 kg/ha to 97,540 kg/ha. The average COT was R$ 2.69 and the average selling price was R$ 3.13. The most efficient fish farms were the T6 in the county of Toledo-PR and the M3 in M.C.Rondon-PR. Mechanically separated meat (CMS) was more economically advantageous for the preparation of the four tilapia based products due to lower purchase price, compared to the tilapia fillet. The product with lower cost of ingredients per kilogram produced was the CMS based carrot cake, with R$ 3.21 values for Toledo-PR and R$ 3.55 for M.C.Rondon-PR. The inclusion of tilapia based products in school meals is economically viable in the studied counties. The meatball and kebab products based on CMS, in the county of Toledo-PR, reduced costs compared to traditional menus. In the county of M.C.Rondon-PR, so did the chocolate cake and carrot cake CMS based and the fillet.<br>CNPq: 027/2012
APA, Harvard, Vancouver, ISO, and other styles
32

Trompeter, Philipp, and Paavo Melin. "Examination of the advantageousness of the AEO certification to NORMA Sweden AB." Thesis, Linnéuniversitetet, Institutionen för ekonomistyrning och logistik (ELO), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-57337.

Full text
Abstract:
NORMA Sweden AB is part of NORMA Group, a global market and technology leader in engineered joining technology. The Swedish business unit, NORMA Sweden, trades with various internal and external customers in different customs territories. In order to facilitate this, the management is considering to attain the Authorized Economic Operator (AEO) certification that allows for customs facilitations. The AEO program consists of the AEO-C and AEO-S certification. Those two certifications can be achieved independently, they have different barriers and create different benefits. The extent to that these general benefits and barriers create benefits and barriers in a specific company varies a lot depending on the individual supply chain settings of the organisation. The purpose of this thesis is to assess the advantage of the AEO-C and the AEO-S certification to NORMA Sweden. In order to achieve a comprehensive result, the benefits and barriers of the AEO certifications to NORMA Sweden are analysed in the context of the company’s strategy and the drivers for the AEO application. A Framework is developed to conduct the examination. It allows to appraise the benefits and barriers of the certification that are combined into different impact areas. This is accomplished by a quantitative analysis that is based on a simplified scale of 0-3. The results are verified by a subsequent qualitative analysis. The Analysis has been conducted under consideration of literature, customs guidelines and empirical information that has been gathered by expert interviews as well as by observations. The results of the quantitative analysis indicate that both certifications are currently not beneficial to NORMA Sweden. Further, it is obvious that the gap between barriers and benefits is smaller for the AEO-C certification as it is for the AEO-S certification. The qualitative analysis reveals that NORMA Sweden should aim for an AEO certification anyway due to the strategy of the parent company and expected future developments. Following the findings of the quantitative and qualitative analysis the company is advised to aim for the AEO-C certification first.
APA, Harvard, Vancouver, ISO, and other styles
33

Mazaheri, Arsham. "How the ISPS code affects port and port activities." Thesis, Högskolan i Borås, Institutionen Ingenjörshögskolan, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-18834.

Full text
Abstract:
Following terrorist attacks on twin towers in the USA and Limburg oil tanker in Yemen, theIMO has defined a supplementary chapter and an appendix named ISPS code to its SOLAS,to prevent similar events in maritime transportation. The ISPS code forces the ports, ships andall organizations, who work in marine industry, to keep their security gates more tightly. Thissituation affects involved parties in good and bad ways. Good impacts like increasing insecurity level, efficiency, effectiveness and competitiveness; and bad effects like increasing inannual costs, administration works and manning.This thesis is based on a study that was run by preparing an electronic questionnaire anddistributing among the Swedish ports to get first hand information about the ISPS codeimpacts on port and port activities. Through them it was found that the ISPS code achieved itsmain goal, which it has been described as less smuggling and less theft in Sweden; whileactually the ISPS is an anti terrorism regulation by its nature.On the other hand, the indirect impacts of the code have played an important role in itssuccess; therefore they have been reviewed as well. The ISPS code’s indirect impacts on portscan be summarized as its effects on efficiency, effectiveness, administration cost, serviceprice, profit, competitiveness, service level, customer satisfaction, damage occurring,documentation, manning , lead time and checking process.<br>Uppsatsnivå: D
APA, Harvard, Vancouver, ISO, and other styles
34

Rybková, Jana. "Poistný trh Lloyd's of London." Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-195502.

Full text
Abstract:
Diploma thesis deals with the insurance market Lloyd's of London. The main aim is to give a complex view on this specific subject on the insurance and reinsurance market, its history and market position. The work also contains a description of structure of the market, Corporation and capital, an overview of laws that involve Lloyd's market and also plans to expand its scope. Part of the work is focused on the development of a regulatory system in United Kingdom, the European Union and their impact on the market.
APA, Harvard, Vancouver, ISO, and other styles
35

Hložanka, Filip. "Simulace správy informační bezpečnosti ve fakultním prostředí." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2020. http://www.nusl.cz/ntk/nusl-417806.

Full text
Abstract:
This diploma thesis is concerned with simulating information security management within a university environment. It is divided into three parts. The theoretical part focuses on describing the assets which could be part of a faculty network, attacks that could target it, security processes which could protect it and users that are active within it. The analytical part then applies these segments on a real faculty network. Based on this analysis, a set of specific assets, attacks, security processes and other tasks is created in order to simulate a simplified version of the analyzed network using a sophisticated cybernetic polygon. The security of the network is then assessed after several iterations of the simulations. Its parameters are adjusted in the effort to increase its security and the module is tested on an academic employee in order to assess its effectiveness. The conclusion evaluates the possibilities of increasing the security of the simulated network as well as the usability of the cybernetic polygon in practice.
APA, Harvard, Vancouver, ISO, and other styles
36

Ramanauskaitė, Eglė. "Tarptautinės prekybos grandinės saugumo užtikrinimo būdai ir priemonės." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2008. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2008~D_20080121_103841-29060.

Full text
Abstract:
Pastaraisiais dešimtmečiais pastebimas nepaprastai spartus pasaulinės prekybos augimas, viršijantis gamybos augimą. Lygiagrečiai su minėtu prekybos augimu, didėja ir nelegalios prekybos, terorizmo, ginklų, pavojingų medžiagų įvežimo grėsmės, kurios įgauna vis intelektualesnes ir išradingesnes formas bei būdus. Šiai temai atskleisti buvo atlikta tarptautinio prekybos saugumo užtikrinimo teisinių dokumentų, programinių dokumentų, Lietuvos bei užsienio literatūros, analizė. Išnagrinėjus muitinės ir ūkio subjektų veiklos teisinį reglamentavimą tarptautinės prekybos saugumui užtikrinti, pateikti šios problemos spendimo būdai bei priemonės. Siekiant apsaugoti ne tik ekonomiką, bet ir visuomenės saugumą, reikia, jog dėmesio centre būtų visa tarptautinės prekybos grandinė, apimanti ištisą prekių, medžiagų judėjimo logistinę grandinę, kurioje tam tikras operacijas, procedūras ar funkcijas atliktų gamintojai, eksportuotojai, importuotojai, vežimo ir/ar sandėliavimo operatoriai, ekspedicinės įmonės, muitinės įstaigos, tarpininkai. Vienintelė muitinė, turėdama specifinius įgaliojimus ir žinias, kurių neturi jokia kita valstybės institucija, gali ir turi vaidinti pagrindinį vaidmenį saugant pasaulinės prekybos grandinę. Darbe apžvelgiami tarptautinės prekybos liberalizavimo privalumai, bei kylančios grėsmės tarptautinės prekybos grandinės saugumui, nagrinėjamos tarptautinės prekybos grandinės saugumo užtikrinimo teisinio-organizacinio reglamentavimo priemonės, analizuojami muitinės, kaip... [toliau žr. visą tekstą]<br>In recent decades extremely rapid growth in the world trade process is being observed. However the said trade growth is accompanied by the boost of illegal trade, terrorism, import of weapons and hazardous materials as well as other threats acquiring increasingly inventive intellectual forms and ways. In order to assure the security of the economics and society at large it is necessary to focus attention on the whole international trade chain covering all logistic chain of movement of the goods and materials including producers, exporters, importers, carriers and/or warehouse operators, expedition entities, customs enterprises, and agents performing special operations, procedures and functions. Each of these chains contains certain security risks. The customs exclusively with its specific authorizations that no other state institution is rendered can and must play the main role in the security assurance in the world trade chain. In order to determine and evaluate risks in the international trade chain and to develop measures necessary to evaluate risk factors and corresponding to the national and international criteria, the customs inspection must be founded on risk analysis. Effective cooperation of business and state institutions in submitting advance information on goods carried, electronic data exchange, interdepartmental and international cooperation – these are the key provisions as the security assurance in the international trade chain promotes economics growth and... [to full text]
APA, Harvard, Vancouver, ISO, and other styles
37

Fontana, Caio Fernando. "Metodologia para a implantação dos processos da cadeia logística segura." Universidade de São Paulo, 2009. http://www.teses.usp.br/teses/disponiveis/3/3143/tde-12082010-120918/.

Full text
Abstract:
A formulação da Metodologia para a Implantação dos Processos da Cadeia Logística Segura visa estabelecer parâmetros e metodologia para aplicação dos diversos conceitos e programas de segurança para o comércio exterior visando o controle de carga que vêm sendo implementados por órgãos de governo e organismos internacionais. Estes programas têm como foco o controle sobre os processos de movimentação de carga, através da utilização de tecnologia aplicada à inspeção não intrusiva de carga, rastreamento e lacres eletrônicos, sistemas de troca eletrônica de informação e da integração sistêmica destes componentes. Desta forma, esta tese busca demonstrar como o modelo proposto impactará nos controles fiscais e aduaneiros bem como na otimização dos fluxos logísticos. O modelo proposto está ancorado nas diretrizes de segurança estabelecidas pela Organização Mundial das Aduanas (OMA) através do SAFE Framework of Standards, pela International Maritime Organization (IMO) através do Código Internacional de Segurança e Proteção a Navios e Instalações Portuárias (ISPS-Code), pelo Governo dos Estados Unidos da América através do Container Security Initiative (CSI) e do Safe Ports Act, pela Secretaria da Receita Federal Brasileira através do Plano Nacional de Segurança Aduaneira (PNSA) da Nota Fiscal Eletrônica (NFe) e Conhecimento de Trânsito Eletrônico (CTe) em conjunto com as Secretarias de Fazenda Estaduais, bem como pelo setor privado quem vêm implementado iniciativas voltadas ao controle e monitoramento de carga através de sistemas de Gerenciamento de Risco e os sistemas de Rastreamento e Lacres Eletrônicos aplicados à cargas e veículos. Para efeito de contextualização será apresentado o processo de importação e exportação, seus aspectos de transporte, armazenagem e manipulação de carga, bem como uma macro visão do fluxo documental e os intervenientes públicos e privados envolvido no processo. A seguir, serão apresentadas as propostas de normatização do processo de cadeia logística segura elaboradas pela Customs-Trade Partnership Against Terrorism (C-TPAT), Business Alliance for Secure Commerce (BASC) e da International Organization for Standardization (ISO) através da ISO 28000 e correlatas. Feitas estas análises e contextualização será formulado o modelo operacional que consiste na proposição de um controle logístico integrado. Esta abordagem tem por objetivo apresentar as diversas características dos fluxos de carga por modal e tipo, ou seja, granel, container e carga geral. Este modelo, se implementado, poderá proporcionar um aumento de produtividade do setor, pois a adoção de medidas de controle de carga exige que o planejamento das operações logísticas seja efetuado, acompanhado e corrigido sempre que necessário. Desta forma, o setor de logística poderá se valer desta ferramenta para o aumento de produtividade e conseqüente redução do Custo Brasil. O modelo de implementação será proposto apoiado em quatro diretrizes: normatização de processos, formulação de um modelo de avaliação contínua de nível de serviço das empresas e do processo, normatização de tecnologia, modelo de acreditação de processo e entidades por modal e/ou área de atuação. Neste trabalho serão detalhados o Modelo de Normatização de Processos e o Sistema de Avaliação de Nível de Serviço. A Normatização Tecnológica e o Modelo de Acreditação serão desenvolvidos em trabalhos futuros.<br>The development of the Methodology for the Implantation of the Processes of the Safe Logistic Chain aims at to establish parameters and methodology for application of the diverse concepts and programs of security for the foreign commerce being aimed at the load control that come being implemented for agencies of government and international organisms. These programs have as focus the control on the processes of load movement, through the use of technology applied to the not intrusive inspection of load, electronic tracking and sealing waxes, systems of electronic exchange of information and the systemic integration of these components. In such a way, this thesis searchs to demonstrate as the considered model will impact in the fiscal and customs controls as well as in the improvement of the logistic flows. The considered model is anchored in the lines of direction of security established by the Organização Munidal das Aduanas (OMA) through the SAFE Frameworks of Standards through the International Maritime Organization (IMO), through the International Code of Security and Protection the Ships and Port Installations (ISPS-Code), for the Government of the United States of America through Container Security Initiative (CSI) and of Safe Ports Act, for the Secretariat of the Brazilian Federal Prescription through the Plano Nacional de Segurança Aduaneira (PNSA) of Nota Fiscal Eletrônica (NFe) and Conhecimento de Trânsito Eletrônico (CTe) in set with the Secretarias de Fazenda Estaduais, as well as for the private sector who they come implemented initiatives directed to the control and monitorial of load through systems of Management of Risk and the systems of Tracking and Electronic Sealing waxes applied to loads and vehicles. For context effect, it will be presented the process of importation and exportation, its aspects of transport, load storage and manipulation, as well as a macro vision of the documentary flow and the intervening private public and involved in the process. To follow the proposals of regularization of the logistic process of chain will be presented insurance elaborated by Customs-Trade Partnership Against Terrorism (C-TPAT), Business Alliance will be Secure Commerce (BASC) and of the International Organization for Standardization (ISO) through the ISO 28000 and correlates. The operational model that will be formulated consists of the proposal of an integrated logistic control. This boarding has for objective to present the diverse characteristics of the modal load flows and type, that is granary, container and general load. The implementation of this model will provide to an increase of productivity of the sector therefore the adoption of measures of load control demands that the planning of the logistic operations is effected, followed and corrected whenever necessary. In such a way the sector of logistic could use this tool for the increase of productivity and consequence reduction of what is called as Custo Brasil. The implementation model will be formulated supported in four pillars: regularization of processes, regularization of technology, formularization of a model of Acreditação of modal process and entities for and/or area of performance and the formularization of a model of continuous evaluation of level of service of the companies and the process.
APA, Harvard, Vancouver, ISO, and other styles
38

Bonatto, Heitor. "Segurança na cadeia de suprimentos internacional : protocolo de gestão de risco para o transporte marítimo de cargas less than container load." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2016. http://hdl.handle.net/10183/150492.

Full text
Abstract:
A gestão das ameaças e dos riscos nas empresas tem se dedicado a estudar estes problemas, pelo viés de mercado, com o intuito de torná-las mais preparadas para enfrentar estes desafios. Nesse sentido, uma série de instrumentos de análise diagnosticaram que as ameaças e os riscos fazem parte da natureza das relações empresariais. Dentre as inúmeras relações que uma empresa estabelece para atingir os seus objetivos, destacam-se as que estão inseridas em um sistema denominado “cadeia de suprimentos” que, em decorrência do processo de globalização tornou-se internacionalizada. As empresas, ao prolongarem suas cadeias de suprimentos “além fronteiras”, estão submetidas, às influências do ambiente econômico, geopolítico, social e histórico. Nesses ambientes, o ano de 2001 originou uma série de estudos de gestão de risco que identificaram, nas ameaças externas ou exógenas, isto é, as que estão fora do viés de mercado, a possibilidade de tornar a cadeia de suprimentos internacional insegura. Tais ameaças se configuram em ações da natureza e ações praticadas pelo ser humano, por meio de atos criminosos, como, o terrorismo, o tráfico, o contrabando e a pirataria marítima Além das empresas, os países criaram regimes internacionais que buscaram proteger as cadeias de suprimentos, principalmente, em seu sistema de transporte, destacando-se o modo chamado “marítimo”, em razão da sua intensa utilização para transportar cargas. O presente estudo tem como objetivo propor um protocolo de gestão de risco para o transporte marítimo de cargas “less than container load”, para tornar a cadeia de suprimentos internacional mais segura. A metodologia utilizada nesta pesquisa, foi descritiva e documental, já que descreveu o processo de operacionalização e baseou-se na análise dos documentos, utilizados na gestão do transporte marítimo “less than container load”. Conclui-se, assim, que o operador de transporte multimodal, como responsável por operacionalizar uma forma de transportar cargas, a qual torna a cadeia de suprimentos insegura, tem condições e, principalmente, o dever de juntar-se aos outros atores, em prol do aumento da segurança do sistema.<br>The management of threats and risks in the company has been dedicated to study these problems by market bias in order to make them better prepared to face these challenges. In this regard a number of analytical tools diagnosed threats and risks as part of the business relations. Among the many relationships that a company established to achieve their goals, we highlight those that are embedded in a system called the supply chain, which as a result of the globalization process has become internationalized. Companies to extend their supply chains "across borders", are subject to the influences of economic, geopolitical, social and historical environment. In these environments, the year 2001 led to a series of risk management studies that have identified the external or exogenous threats, those outside the market bias, the possibility of making the chain of uncertain international supplies. Such threats are configured shares of nature and actions taken by humans, by means of criminal acts as terrorism, trafficking, smuggling and maritime piracy In addition to companies, countries have created international regimes that sought to protect supply chains, especially in its transport system, highlighting the called maritime, because of their heavy use to transport cargo. The thesis aims to propose a risk management protocol for the shipping cargo "less than container load" to make the international supply chain more secure. The methodology used was based on descriptive type and documentary because described the operational process and analized documents used in the management of shipping “less than container load”, In conclusion, the multimodal transport operator who is responsible for operating a means of transporting cargo , which makes the supply chain insecure supplies, has conditions , and especially the obligation to join the other actors , in favor of the increase system security.
APA, Harvard, Vancouver, ISO, and other styles
39

Casto, Matthew James. "Multi-Attribute Design for Authentication and Reliability (MADAR)." The Ohio State University, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=osu1512009861557857.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Ratnayake, Yohan. "PKI based Encryption for Document Sharing, Optimized Storage, and Proof of Existence in the Cloud." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-182906.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Rössler, Rafaela Godoy. "O desafio de alimentar o mundo de maneira sustentável: circuitos curtos agro-alimentares no Brasil e em Portugal." Master's thesis, Universidade de Évora, 2020. http://hdl.handle.net/10174/28974.

Full text
Abstract:
Há atualmente muitos desafios globais e tendências que podem influenciar a alimentação e a agricultura nas próximas décadas. A insegurança alimentar ainda se faz proeminente em um cenário que progrediu quanto à produtividade agrícola, mas regrediu quanto à viabilidade do acesso aos alimentos. Paralelamente, o crescimento demográfico robusto, a alteração dos padrões de consumo e a consequente pressão sobre os recursos naturais passaram a oprimir a sustentabilidade dos sistemas alimentares. Nesse sentido, o circuito curto agro-alimentar aparece como uma proposta para revitalizar relações socioeconómicas ora apartadas pela modernidade, coadjuvando na ressignificação dos valores territoriais. A sua atuação se mostrou representativa na dinamização da economia local, para além de fomentar o consumo ético de alimentos e minimizar os impactos ambientais. Ademais, alguns agentes observados e entrevistados em regiões brasileiras e portuguesas revelaram possuir diversos comportamentos ambientalistas e indicaram compreender a importância deste circuito em uma conjuntura global e de longo prazo; ABSTRACT: There are many global challenges and trends that influence food and agriculture along the next decades. Food insecurity is still prominent in a scenario that developed the farming productivity but shrank the population’s access to said production. Moreover, the solid demographic growth, the alteration in consumption patterns and the consequent pressure over natural resources are risking the food chain sustainability. Therefore, the short agri-food supply chain rises as a proposition to revitalize socio economic bonds - once separated by the contemporaneity - co-acting in reframing territorial values. The usage of the short agricultural circuit is representative when fostering the local economy and the ethical consumption of food and also reducing the environmental impacts. Furthermore, some observed and interviewed agents - in Brazilian and Portuguese areas - have revealed to have several positive environmental behaviours and showed a comprehension of the circuit’s importance in the long term and in a global sphere.
APA, Harvard, Vancouver, ISO, and other styles
42

Pera, Thiago Guilherme. "Modelagem das perdas na agrologística de grãos no Brasil: uma aplicação de programação matemática." Universidade de São Paulo, 2017. http://www.teses.usp.br/teses/disponiveis/3/3148/tde-17072017-160658/.

Full text
Abstract:
A redução das perdas é de grande importância para estabilizar a oferta de alimentos ao longo da cadeia de suprimentos e fortalecer a segurança alimentar. O objetivo geral desta pesquisa foi realizar um diagnóstico detalhado sobre as perdas que ocorrem nas diversas atividades logísticas de soja e milho no Brasil, envolvendo a quantificação das perdas físicas, econômicas e ambientais acumuladas na cadeia de suprimentos de tais grãos e a identificação de estratégias e políticas públicas para mitiga-las, através da modelagem de programação matemática. Além disso, foi possível estruturar uma função de perdas na agrologística de grãos a partir de quatro variáveis: tipo de armazenagem, qualidade das vias rodoviárias, modalidade de transporte e canal de comercialização. As perdas totais na cadeia de suprimentos de soja e milho no ano de 2015 no Brasil atingiram o patamar de 2,381 milhões de toneladas, ou seja, algo em torno de 1,303% da produção, incorrendo em perdas econômicas decorrentes do custo de oportunidade com vendas perdidas e de gastos logísticos desnecessários na ordem de R$ 2,04 bilhões (US$ 610,78 milhões). Os cenários avaliados demonstram que a ampliação no uso da armazenagem dentro da fazenda, melhoria nas condições das rodovias brasileiras e das estradas que conectam as fazendas aos armazéns apresentam grande potencial para mitigação das perdas. Apesar da perda relativa de uma atividade logística assumir valor decimal, a perda acumulada ao longo da cadeia de suprimentos assume um valor global bastante considerável. Esse retrato enfatiza a necessidade de conscientização sobre as perdas visando fomentar políticas públicas e gestões eficientes para mitiga-las, dado as externalidades econômicas, ambientais e sociais geradas.<br>Reducing losses is of great importance in stabilizing the supply of food throughout the supply chain and strengthening food security. The general objective of this research was to perform a detailed diagnosis of the losses that occur in the many logistic activities of soybeans and maize in Brazil, involving the quantification of accumulated physical, economic and environmental losses in the supply chain of such grains and the identification of strategies and public policies to mitigate such losses through mathematical programming modeling. Besides, it was possible to structure a loss function of grains\' agrologistics in terms of four variables: type of storage, quality of roads, modality of transportation and marketing channel. Total losses in the soy and maize supply chain in 2015 in Brazil reached up to 2.381 million tons, or about 1.303% of production, incurring economic reductions due to the cost of loss (reduced sales and unnecessary logistical expenses for the handling of losses) in the order of R$ 2.04 billion (US$ 610.78 million). The evaluated scenarios show that the increase in the use of on-farm storage, the improvement in the conditions of the Brazilian highways and roads that connect the farms to the external warehouses present great potential to mitigate the losses. In spite the relative loss of a logistic activity takes on decimal value, the cumulative loss along the supply chain assumes a fairly considerable overall value. This reality emphasizes the need to raise awareness about losses in order to foster public policies and efficient management to mitigate them, given the created economic, environmental and social externalities.
APA, Harvard, Vancouver, ISO, and other styles
43

Eirinha, Ana Catarina da Silva. "Perda e desperdício de alimentos ao longo da cadeia alimentar - trabalho de revisão." Bachelor's thesis, [s.n.], 2021. http://hdl.handle.net/10284/9673.

Full text
Abstract:
Trabalho Complementar apresentado à Universidade Fernando Pessoa como parte dos requisitos para obtenção do grau de licenciada em Ciências da Nutrição<br>Introduction: Food loss concerns a certain part of the food that is produced for human consumption but for the most different reasons ends up leaving the supply chain. Food waste, however, refers only to the part of the food loss that is still suitable for consumption but ends up being eliminated by human action or omission. The present literature review aims to address the problem of food loss and waste in an integrated and systemic way, identifying the challenges of the various sectors of the food chain and possible opportunities to improve their efficiency. Results: Food waste is, undoubtedly, a complex issue at global to local scale related to the malfunctioning of the food system. Across the food supply chain, food and nutrients are lost due too many causes either controllable or uncontrollable by different actors. Most are related to inefficient interlinkages between food system actors and the particularities of the food system. In particular, clear differences are observed among high and low economic developed regions. Conclusion: Food waste involves a complex set of issues of concern which present huge challenges for the 2030 agenda. A multidisciplinary and multi-sectoral effort is necessary to mitigate food waste. All sectors can benefit from looking at the interdependencies throughout the food system to address the functioning of the food supply chain more effectively while investing in more sustainable partnerships. Moreover, more research is needed in this area focused on the standardization of definitions related to food loss and waste, the creation of standardized quantification methods but also impact assessment across food supply chains.<br>Introdução: A perda de alimentos (PA) diz respeito a uma determinada parte dos alimentos que são produzidos para consumo humano mas que pelas mais diferentes razões acaba por sair da cadeia de abastecimento. O desperdício alimentar (DA), por sua vez, refere-se apenas à parte da PA que ainda se encontra própria para consumo mas acaba por ser eliminada por ação ou omissão humana. O presente trabalho de revisão de literatura pretende abordar a problemática da perda e desperdício de alimentos de um modo integrado e sistémico, identificando os desafios dos vários setores da cadeia alimentar bem como possíveis oportunidades para melhorar a sua eficiência. Resultados: O DA é, sem dúvida, uma questão complexa à escala global e local relacionada com o mau funcionamento do sistema alimentar. No decorrer da cadeia alimentar, alimentos e nutrientes são perdidos e desperdiçados por variadas causas, controláveis ou incontroláveis, e por diferentes atores. A maioria destas causas, estão relacionadas com interligações ineficientes entre os atores do sistema alimentar e as particularidades do sistema alimentar. Em particular, são observadas claras diferenças entre regiões desenvolvidas de alto e baixo nível económico. Conclusão: O DA envolve um conjunto complexo de questões preocupantes que apresentam enormes desafios para a agenda de 2030. É necessário um esforço e colaboração multidisciplinar e multissectorial, incluindo o envolvimento dos nutricionistas, para mitigar o desperdício de alimentos. Todos os setores podem beneficiar da análise das interdependências em todo o sistema alimentar para abordar o funcionamento da cadeia de abastecimento alimentar de forma mais eficaz, ao mesmo tempo que investem em parcerias mais sustentáveis. Além disso, é necessária mais investigação nesta área centrada na padronização de definições relacionadas com perdas e desperdício alimentares, na criação de métodos de quantificação padronizados e na avaliação de impacto em todas as cadeias de abastecimento alimentar.<br>N/A
APA, Harvard, Vancouver, ISO, and other styles
44

Massimino, Brett J. "Operational Factors Affecting the Confidentiality of Proprietary Digital Assets." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1405683732.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Bennett, Allison C. (Allison Christine), and Yi Zhuan Chin. "100% container scanning : security policy implications for global supply chains." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/45248.

Full text
Abstract:
Thesis (M. Eng. in Logistics)--Massachusetts Institute of Technology, Engineering Systems Division, 2008.<br>Includes bibliographical references (leaves 164-169).<br>On August 3, 2007, President George Bush signed into law HR1 the "Implementing Recommendations of the 9/11 Commission Act of 2007." The 9/11 Act requires 100% scanning of US-bound containers at foreign seaports by 2012 through the use of non-intrusive (NII) and radiation detection equipment. Maritime stakeholders and the government community have actively debated the feasibility of this plan, citing economic impacts, barriers to global trade and insufficient technology and physical space. This thesis focuses on importer concerns relating to potential shipment delays, financial burdens, sourcing issues and contingency planning concerns in global supply chain operations. Using port statistics, field study data as well as industry insights, frameworks are developed to identify major stakeholder issues and quantify the financial costs and delay risks bourn across the entire supply chain. Cost and delay analyses are based on 2 prototypical ports - a small/low-volume export port and a large/high-volume export port. Cost analysis is performed for a consolidated (port authority) level installation and a segmented (terminal operator) level installation to calculate a per-box scanning fee. Queuing models and Monte-Carlo simulations are also developed to quantify truck congestion due to primary scanning and the risk of containers missing vessels due to secondary inspections. Results of the cost analysis indicate that scanning configurations, particularly related to NII, greatly affect the-per box scanning cost. It is not economically feasible to scan only US-bound containers at half of the 600 ports with direct connections to the US. Analysis of truck congestion suggests that the ramp metering effect of the entry gate can help to abate congestion at the scanning area.<br>(cont.) Analysis on secondary inspection delays revealed that under a set of assumptions that reflect current operations, the risk of containers missing sailings could potentially increase to 1.5%, which may in turn require a 0.5% to 5% increase in safety stock. Our study shows that cost and delay implications of 100% export US-bound container scanning may be less severe than industry anticipated. Supply chain disruptions due to scanning is best mitigated through earlier container dispatch, increased safety stock or increased scanning infrastructure and personnel at ports.<br>by Allison C. Bennett and Yi Zhuan Chin.<br>M.Eng.in Logistics
APA, Harvard, Vancouver, ISO, and other styles
46

Ziani, Adel. "Modeling of Secure Dependable (S&D) applications based on patterns for Resource-Constrained Embedded Systems (RCES)." Phd thesis, Université Toulouse le Mirail - Toulouse II, 2013. http://tel.archives-ouvertes.fr/tel-00929836.

Full text
Abstract:
Non-functional requirements such as Security and Dependability (S&D) become more and more important as well as more and more difficult to achieve, particularly in embedded systems development. Such systems come with a large number of common characteristics, including real-time and temperature constraints, security and dependability as well as efficiency requirements. In particular, the development of Resource Constrained Embedded Systems (RCES) has to address constraints regarding memory, computational processing power and/or energy consumption. In this work, we propose a modeling environment which associates model-driven paradigm and a model-based repository, to support the design and the packaging of S&D patterns, resource models and their property models. The approach is based on a set of modeling languages coupled with a model-repository, search and instantiation engines towards specific development environments. These modeling languages allow to specify patterns, resources and a set of property models. These property models will allow to govern the use of patterns and their analysis for reuse. In addition, we propose a specification and generation process of repositories. As part of the assistance for the development of S&D applications, we have implemented a suite of tool-chain based on the Eclipse platform to support the different activities around the repository, including the analysis activities. The proposed solutions were evaluated in the TERESA project through a case study from the railway domain.
APA, Harvard, Vancouver, ISO, and other styles
47

Riahi, Ramin. "Enabling security and risk-based operation of container line supply chains under high uncertainties." Thesis, Liverpool John Moores University, 2010. http://researchonline.ljmu.ac.uk/5991/.

Full text
Abstract:
Container supply chains are vulnerable to many risks. Vulnerability can be defined as an exposure to serious disturbances arising from the risks within the supply chain as well as the risks external to the supply chain. Vulnerability can also be defined as exposure to serious disturbances arising from a hazard or a threat. Containers are one of the major sources of security concerns and have been used, for example, to smuggle illegal immigrants, weapons, and drugs. The consequences of the use of a weapon of mass destruction or discovery of such a device in a container are serious. Estimates suggest that a weapon of mass destruction explosion and the resulting port closure could cost billions of dollars. The annual cost of container losses as consequences of serious disturbances arising from hazards is estimated as $500 million per year. The literature review, historical failure data, and statistical analysis in the context of containerships' accidents from a safety point of view clearly indicate that the container cargo damage, machinery failure, collision, grounding, fire/explosion, and contact are the most significant accident categories with high percentages of occurrences. Another important finding from the literature review is that the most significant basic event contributing to the supply chains' vulnerability is human error. Therefore, firstly, this research makes full use of the Evidential Reasoning (ER) advantages and further develops and extends the Fuzzy Evidential Reasoning (FER) by exploiting a conceptual and sound methodology for the assessment of a seafarer's reliability. Accordingly, control options to enhance seafarers' reliability are suggested. The proposed methodology enables and facilitates the decision makers to measure the reliability of a seafarer before his/her designation to any activities and during his/her seafaring period. Secondly, this research makes full use of the Bayesian Networks (BNs) advantages and further develops and extends the Fuzzy Bayesian Networks (FBNs) and a "symmetric method" by exploiting a conceptual and sound methodology for the assessment of human reliability. Furthermore a FBN model (i. e. dependency network), which is capable of illustrating the dependency among the variables, is constructed. By exploiting the proposed FBN model, a general equation for the reduction of human reliability attributable to a person's continuous hours of wakefulness, acute sleep loss and cumulative sleep debt is formulated and tested. A container supply chain includes dozens of stakeholders who can physically come into contact with containers and their contents and are potentially related with the container trade and transportation. Security-based disruptions can occur at various points along the supply chain. Experience has shown that a limited percentage of inspection, coupled with a targeted approach based on risk analysis, can provide an acceptable security level. Thus, in order not to hamper the logistics process in an intolerable manner, the number of physical checks should be chosen cautiously. Thirdly, a conceptual and sound methodology (i. e. FBN model) for evaluating a container's security score, based on the importer security filling, shipping documents, ocean or sea carriers' reliability, and the security scores of various commercial operators and premises, is developed. Accordingly, control options to avoid unnecessary delays and security scanning are suggested. Finally, a decision making model for assessing the security level of a port associated with ship/port interface and based on the security score of the ship's cargo containers, is developed. It is further suggested that regardless of scanning all import cargo containers, one realistic way to secure the supply chain, due to lack of information and number of variables, is to enhance the ocean or sea carriers' reliability through enhancing their ship staff's reliability. Accordingly a decision making model to analyse the cost and benefit (i.e. CBA) is developed.
APA, Harvard, Vancouver, ISO, and other styles
48

Klasson, Sebastian, and Nina Lindström. "Longitudinal analysis of the certificate chains of big tech company domains." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-178396.

Full text
Abstract:
The internet is one of the most widely used mediums for communication in modern society and it has become an everyday necessity for many. It is therefore of utmost importance that it remains as secure as possible. SSL and TLS are the backbones of internet security and an integral part of these technologies are the certificates used. Certificate authorities (CAs) can issue certificates that validate that domains are who they claim to be. If a user trusts a CA they can in turn also trust domains that have been validated by them. CAs can in turn trust other CAs and this, in turn, creates a chain of trust called a certificate chain. In this thesis, the structure of these certificate chains is analysed and a longitudinal dataset is created. The analysis looks at how the certificate chains have changed over time and puts extra focus on the domains of big tech companies. The dataset created can also be used for further analysis in the future and will be a useful tool in the examination of historical certificate chains. Our findings show that the certificate chains of the domains studied do change over time; both their structure and the lengths of them vary noticeably. Most of the observed domains show a decrease in average chain length between the years of 2013 and 2020 and the structure of the chains vary significantly over the years.
APA, Harvard, Vancouver, ISO, and other styles
49

Singh, Gurpreet. "Statistical Modeling of Dynamic Risk in Security Systems." Thesis, KTH, Matematisk statistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-273599.

Full text
Abstract:
Big data has been used regularly in finance and business to build forecasting models. It is, however, a relatively new concept in the security industry. This study predicts technology related alarm codes that will sound in the coming 7 days at location $L$ by observing the past 7 days. Logistic regression and neural networks are applied to solve this problem. Due to the problem being of a multi-labeled nature logistic regression is applied in combination with binary relevance and classifier chains. The models are trained on data that has been labeled with two separate methods, the first method labels the data by only observing location $L$. The second considers $L$ and $L$'s surroundings. As the problem is multi-labeled the labels are likely to be unbalanced, thus a resampling technique, SMOTE, and random over-sampling is applied to increase the frequency of the minority labels. Recall, precision, and F1-score are calculated to evaluate the models. The results show that the second labeling method performs better for all models and that the classifier chains and binary relevance model performed similarly. Resampling the data with the SMOTE technique increases the macro average F1-scores for the binary relevance and classifier chains models, however, the neural networks performance decreases. The SMOTE resampling technique also performs better than random over-sampling. The neural networks model outperforms the other two models on all methods and achieves the highest F1-score.<br>Big data har använts regelbundet inom ekonomi för att bygga prognosmodeller, det är dock ett relativt nytt koncept inom säkerhetsbranschen. Denna studie förutsäger vilka larmkoder som kommer att låta under de kommande 7 dagarna på plats $L$ genom att observera de senaste 7 dagarna. Logistisk regression och neurala nätverk används för att lösa detta problem. Eftersom att problemet är av en multi-label natur tillämpas logistisk regression i kombination med binary relevance och classifier chains. Modellerna tränas på data som har annoterats med två separata metoder. Den första metoden annoterar datan genom att endast observera plats $L$ och den andra metoden betraktar $L$ och $L$:s omgivning. Eftersom problemet är multi-labeled kommer annoteringen sannolikt att vara obalanserad och därför används resamplings metoden, SMOTE, och random over-sampling för att öka frekvensen av minority labels. Recall, precision och F1-score mättes för att utvärdera modellerna. Resultaten visar att den andra annoterings metoden presterade bättre för alla modeller och att classifier chains och binary relevance presterade likartat. Binary relevance och classifier chains modellerna som tränades på datan som använts sig av resamplings metoden SMOTE gav ett högre macro average F1-score, dock sjönk prestationen för neurala nätverk. Resamplings metoden SMOTE presterade även bättre än random over-sampling. Neurala nätverksmodellen överträffade de andra två modellerna på alla metoder och uppnådde högsta F1-score.
APA, Harvard, Vancouver, ISO, and other styles
50

Kissloy, Luitfred Donacian [Verfasser]. "Food security outcomes of smallholders' integration in traditional agricultural value chains in Tanzania and Kenya / Luitfred Donacian Kissloy." Hannover : Technische Informationsbibliothek (TIB), 2016. http://d-nb.info/1126665770/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography