Can we defend the defense supply chain? lessons learned from industry leaders in supply chain management
Download
Author
Menz, Ronald H.
Date
2018-03Advisor
Nieto-Gomez, Rodrigo
Wollman, Lauren
Metadata
Show full item recordAbstract
To protect the defense supply chain from counterfeit electronic parts, this thesis suggests that the Department of Defense (DOD) should adopt supply chain management methodologies used by Apple and the United Kingdom’s Ministry of Defence (MoD). The paper explains how the 2011 Senate Armed Services Committee investigation exposed the problem of counterfeit components throughout the defense supply chain and describes the DOD’s subsequent measures to address the issue, which have proven ineffective at best. The author uses two case studies and comparative analysis to identify and examine the practices Apple and the MoD use to protect their supply chains, some of which have become industry standards. The two case studies also highlight the disparities between the industry-recognized best practices in supply chain management and current DOD practices. Based on analysis of the case studies, the thesis provides a number of policy recommendations that the DOD could employ as part of its strategic effort to improve and protect the defense supply chain from counterfeit components.
Rights
Copyright is reserved by the copyright owner.Collections
Related items
Showing items related by title, author, creator and subject.
-
WE’RE OUT OF WHAT? THE DISASTROUS CONSEQUENCES OF SUPPLY SHORTAGES ON FIRST RESPONDERS DURING PUBLIC HEALTH EMERGENCIES
Baker, Brent E. (Monterey, CA; Naval Postgraduate School, 2023-12);Every link in the global supply chain was strained to the breaking point during the COVID-19 pandemic. First responders experienced shortages of life-saving personal protective equipment (PPE), which led to workplace illness ... -
Cyber System Assurance through Improved Network Anomaly Modeling and Detection
Bollmann, Chad A. (Monterey, California: Naval Postgraduate SchoolMonterey, California. Naval Postgraduate School, 2019-12); NPS-19-N039-AThe objectives of this work were to investigate the source of the dual natures of network traffic (i.e., Gaussian and alpha-stable) in order prove the merit of further development, improvement, and application of non-parametric ... -
Cyber System Assurance through Improved Network Anomaly Modeling and Detection
Bollmann, Chad A. (Monterey, California: Naval Postgraduate SchoolMonterey, California. Naval Postgraduate School, 2019-12); NPS-19-N039-AThe objectives of this work were to investigate the source of the dual natures of network traffic (i.e., Gaussian and alpha-stable) in order prove the merit of further development, improvement, and application of non-parametric ...