Summary of Supply Chain Security

Looking for the book?
We have the summary! Get the key insights in just 10 minutes.

Supply Chain Security book summary
Start getting smarter:
or see our plans

Rating

9 Overall

8 Importance

9 Innovation

7 Style


Recommendation

Everyone talks about globalization, but almost no one ever discusses the gritty details about how goods actually move around the world. This two-volume set changes that situation with 24 comprehensive essays on international best practices in supply chain security. The first volume deals with “The Context of Global Supply Chain Security,” and the second volume covers “Emerging Issues in Supply Chain Security.” These collections of thorough, practical, well-written articles by leading experts in security, crime prevention and logistics cover a range of issues and detailed information from legal exposure and risk assessment to supply chain management. They include specific precautions for those involved in transporting goods worldwide by air, road, rail and sea. These essays are focused, revealing and fully documented with citations and bibliographies. While some chapters are redundant and technical, this is a worthwhile, unusual and timely package of deeply informative books. getAbstract highly recommends it to global supply chain managers, shipping industry practitioners and their clients, and anyone concerned about the compounding, disruptive effects of terrorism and crime on a global economy. (And if you’re a terrorist or an international cargo thief, just forget these inside prevention tips, OK?)

In this summary, you will learn

  • Why establishing global supply chain security is so difficult,
  • What threats terrorists and thieves pose to transportation, and
  • How major industries are implementing security innovations.
 

About the Author

Andrew R. Thomas is Assistant Professor of Marketing and International Business at the University of Akron, Ohio.

 

Summary

Supply Chain Theft
Theft is all too common in business, from outright stealing to online schemes to the purchase of stolen goods. To complicate the problem, thieves commonly use legitimate channels to ship and sell stolen merchandise, including guns, drugs, and counterfeit goods. Each ...

More on this topic

Customers who read this summary also read

Door to Door
Door to Door
9
Uncharted Territory
Uncharted Territory
8
Sea Power
Sea Power
8
The Supply Chain Revolution
The Supply Chain Revolution
8
Will Amazon Kill FedEx?
Will Amazon Kill FedEx?
8
Stragility
Stragility
8

Related Channels

Comment on this summary