LEADER 03599nam 22007095 450 001 996465707003316 005 20200706005506.0 010 $a3-642-40358-1 024 7 $a10.1007/978-3-642-40358-3 035 $a(CKB)3710000000015918 035 $a(SSID)ssj0000988122 035 $a(PQKBManifestationID)11539164 035 $a(PQKBTitleCode)TC0000988122 035 $a(PQKBWorkID)10965715 035 $a(PQKB)11376602 035 $a(DE-He213)978-3-642-40358-3 035 $a(MiAaPQ)EBC3093048 035 $a(PPN)172429404 035 $a(EXLCZ)993710000000015918 100 $a20130820d2013 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aElectronic Government$b[electronic resource] $e12th IFIP WG 8.5 International Conference, EGOV 2013, Koblenz, Germany, September 16-19, 2013, Proceedings /$fedited by Maria A. Wimmer, Marijn Janssen, Hans Jochen Scholl 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XIV, 335 p. 37 illus.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v8074 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-40357-3 327 $aResearch foundations -- Open government data and transparency -- Service design and improvement -- Adoption and service evaluation -- Social media and social network analysis. 330 $aThis book constitutes the refereed proceedings of the 12th IFIP WG 8.5 International Conference on Electronic Government, EGOV 2013, held in Koblenz, Germany, in September 2013. The 27 revised full papers presented were carefully reviewed and selected for inclusion in this volume. The papers have been organized in the following topical sections: research foundations; open government data and transparency; service design and improvement; adoption and service evaluation; and social media and social network analysis. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v8074 606 $aComputers and civilization 606 $aComputers 606 $aLaw and legislation 606 $aApplication software 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aLegal Aspects of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I24059 606 $aInformation Systems and Communication Service$3https://scigraph.springernature.com/ontologies/product-market-codes/I18008 606 $aComputer Appl. in Administrative Data Processing$3https://scigraph.springernature.com/ontologies/product-market-codes/I2301X 615 0$aComputers and civilization. 615 0$aComputers. 615 0$aLaw and legislation. 615 0$aApplication software. 615 14$aComputers and Society. 615 24$aLegal Aspects of Computing. 615 24$aInformation Systems and Communication Service. 615 24$aComputer Appl. in Administrative Data Processing. 676 $a352.3802854678 702 $aWimmer$b Maria A$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aJanssen$b Marijn$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aScholl$b Hans Jochen$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465707003316 996 $aElectronic Government$9772425 997 $aUNISA LEADER 04956nam 22006615 450 001 9910298514503321 005 20250612133637.0 010 $a1-4939-2178-9 024 7 $a10.1007/978-1-4939-2178-2 035 $a(CKB)3710000000315781 035 $a(EBL)1965048 035 $a(OCoLC)898213723 035 $a(SSID)ssj0001407892 035 $a(PQKBManifestationID)11818645 035 $a(PQKBTitleCode)TC0001407892 035 $a(PQKBWorkID)11411605 035 $a(PQKB)10881125 035 $a(DE-He213)978-1-4939-2178-2 035 $a(MiAaPQ)EBC1965048 035 $a(PPN)183149238 035 $a(EXLCZ)993710000000315781 100 $a20141212d2015 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aGlobal Supply Chain Security $eEmerging Topics in Research, Practice and Policy /$fedited by Andrew R. Thomas, Sebastian Vaduva 205 $a1st ed. 2015. 210 1$aNew York, NY :$cSpringer New York :$cImprint: Springer,$d2015. 215 $a1 online resource (208 p.) 300 $aDescription based upon print version of record. 311 08$a1-4939-2177-0 320 $aIncludes bibliographical references at the end of each chapters. 327 $aThe Context of Global Supply Chain Security -- Maritime Piracy and the Supply Chain -- Political Risk to the Supply Chain -- Corporate Security: A Supply Chain Program -- An Examination of Global Supply Chain Security through the Lens of Grid and Group Theory -- Aviation Security and Organizational Behavior -- An Evaluation of Capacity and Inventory Buffers as Mitigation for Catastrophic Supply Chain -- Closing the Last 1/2 mile of Emergency Response -- Breach with Intent: A Risk Analysis of Deliberate Security Breaches in the Seafood Supply Chain -- The Role of Suez Canal Development in Logistics Chain -- Planned and Emergent Strategy. 330 $aThis volume presents new theoretical insights, practical strategies, and policy initiatives in the rapidly evolving field of global supply chain security. As businesses, governments, and society at large have become increasingly dependent on a global network to provide goods and services, protecting global supply chains has become an issue of vital importance for industries, nations, and regions.  The "supply chain" encompasses all the links connecting a manufacturer to end users of its products. Links may take the form of plants, supplier warehouses, vendor facilities, ports or hubs, retail warehouses or facilities, and outbound shipping centers. Links also involve all the ways goods are moved?by truck, ship, airplane, or rail car. A great deal can go wrong in the supply chain due to company or systemic mismanagement and inefficiency, criminal activity, employee or technology errors, or terrorism, to name just a few of the threats. Then there are government regulation, industry or association oversight, and security agencies (both public and private) keeping track. Globalization, stricter security regimes, and increasingly sophisticated criminal activity have made cross-border cargo movements more complex, putting the integrity of end-to-end supply chains at much greater risk. This is why the security of the supply chain has become such an important issue for business people: there is too much at stake to let problems proliferate or stagnate. It has been estimated, for example, that thieves now steal $50 billion in goods each year from various points along the supply chain. Synthesizing the most current research, practical application, and policy, Global Supply Chain Security covers a  range of emerging topics?from risk assessment to technology deployment to continuity planning?and will serve as a useful resource for anyone concerned with supply chain security issues, including scholars, students, business executives and policymakers. 606 $aProduction management 606 $aEconomic policy 606 $aInternational economic relations 606 $aOperations Management$3https://scigraph.springernature.com/ontologies/product-market-codes/519000 606 $aEconomic Policy$3https://scigraph.springernature.com/ontologies/product-market-codes/W34010 606 $aInternational Economics$3https://scigraph.springernature.com/ontologies/product-market-codes/W33000 615 0$aProduction management. 615 0$aEconomic policy. 615 0$aInternational economic relations. 615 14$aOperations Management. 615 24$aEconomic Policy. 615 24$aInternational Economics. 676 $a330 676 $a337 676 $a338.9 676 $a658.5 702 $aThomas$b Andrew R.$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aVaduva$b Sebastian$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910298514503321 996 $aGlobal Supply Chain Security$92533003 997 $aUNINA