Digital Twin Integrated Reinforced Learning in Supply Chain and Logistics

https://www.mdpi.com/2305-6290/5/4/84/pdf

Abstract: Background: As the Internet of Things (IoT) has become more prevalent in recent years, digital twins have attracted a lot of attention. A digital twin is a virtual representation that replicates a physical object or process over a period of time. These tools directly assist in reducing the manufacturing and supply chain lead time to produce a lean, flexible, and smart production and supply chain setting. Recently, reinforced machine learning has been introduced in production and logistics systems to build prescriptive decision support platforms to create a combination of lean, smart, and agile production setup. Therefore, there is a need to cumulatively arrange and systematize the past research done in this area to get a better understanding of the current trend and future research directions from the perspective of Industry 4.0.

Results: The findings are snowballed as a systematic review and later the final data set has been conducted to understand the intensity and relevance of research work done in different subsections related to the context of the research agenda proposed. Conclusion: A framework for data-driven digital twin generation and reinforced learning has been proposed at the end of the paper along with a research paradigm.

Op-ed | SOS Space: Why cybersecurity and supply chain risk management must go hand in hand

Op-ed | SOS Space: Why cybersecurity and supply chain risk management must go hand in hand – SpaceNews

There is little doubt that the domains of space and cyber are currently being contested through antagonistic behavior across the globe.

Near-peer adversaries have already strategically prioritized these as preferred domains of action, both in competition and conflict. Cyber-enabled supply chain attacks are increasingly and globally being used as a hybrid warfare tactic to provide advantages. Predictably, they afford adversaries a relatively cost-effective means of engagement, plausible deniability, and avoid the political backlash that inevitably results from lethal action and physical incursion. Considering the emphasis placed on these domains, the U.S. space, defense, and intelligence communities must concentrate efforts to safeguard space assets, preserve strategic and military advantages, and solidify national security and global stability. Cybersecurity and supply chain integrity must become integral and elevated concerns for the space community, as well as space consumers and strategic stakeholders.

Supplier Risk Assessment Strategy

Supplier Risk Assessment Strategy

International Review of Applied Sciences and Engineering

ABSTRACT

The aim of the study is to create an effective and standard risk assessment tool that provides the company with support and security in purchasing of new products. The goal was to create a tool that complements and standardizes risk assessment forms and shows rapid results. Using the procurement risk management system, the risk associated with a given product can be determined easily and in a short time. In the process, critical areas where hazards may occur can be clearly identified and the risk can be minimized if properly managed.

Learning from Supply Disruptions Caused by SARS-CoV-2: Use of Additive Manufacturing as a Resilient Response for Public Procurement

Learning from supply disruptions caused by SARS-CoV-2: use of additive manufacturing as a resilient response for public procurement

Purpose

The SARS-CoV-2 pandemic has had severe effects on economies worldwide and, in particular, on public institutions that must keep their operations running while supply chains are interrupted. The purpose of this study is to examine how public institutions act during a pandemic to ensure the security of supply.

Design/methodology/approach

The distinct focus is if, why and how public institutions have adopted additive manufacturing (AM) – a production technology colloquially known as three-dimensional printing in which a product is created by joining raw material layer by layer based on a digital model (computer-aided design [CAD] file) of the product – in reaction to supply disruptions caused by the SARS-CoV-2 pandemic. For this purpose, four cases within the context of the pandemic supply disruption are used as the units of analysis.

Findings

The findings are twofold: public institutions reacted, on the one hand, with a behavioral solution approach, trying to solve the supply disruption with new or changed forms of cooperation and collaboration. On the other hand, public institutions used a technical solution approach (TSA) as a supply disruption response and intensified their use of AM.

Explainability in Supply Chain Operational Risk Management: A Systematic Literature Review

Explainability in supply chain operational risk management: A systematic literature review

It is important to manage operational disruptions to ensure the success of supply chain operations. To achieve this aim, researchers have developed techniques that determine the occurrence of operational risk events which assists supply chain operational risk managers develop plans to manage them by detection/monitoring, mitigation/management, or optimization techniques. Various artificial intelligence (AI) approaches have been used to develop such techniques in the broad activities of operational risk management. However, all of these techniques are black box in their working nature. This means that the chosen technique cannot explain why it has given that output and whether it is correct and free from bias. To address this, researchers argue the need for supply chain management professionals to move towards using explainable AI methods for operational risk management. In this paper, we conduct a systematic literature review on the techniques used to determine operational risks and analyse whether they satisfy the requirement of them being explainable. The findings highlight the shortcomings and inspires directions for future research. From a managerial perspective, the paper encourages risk managers to choose techniques for supply chain operational risk management that can be auditable as this will ensure that the risk managers know why they should take a particular risk management action rather than just what they should do to manage the operational risk.

Towards Resilient Supply Chain Structures

Towards Resilient Supply Chain Structures | SpringerLink

Disruptions pose a significant threat to supply chains, as their impact may have devastating consequences. As a result, the research in supply chain resilience has increased immensely over the last years. This article focuses on the supply chain structure and investigates how resilience depends on it. Research was conducted to identify the vulnerabilities the supply chain structure is exposed to and the strategies that exist to counteract these vulnerabilities and increase supply chain resilience. Findings show that vulnerabilities are manifold and that there is no strategy that in itself leads to supply chain resilience. It is especially crucial first to examine the supply chain structure, identify the specific vulnerabilities to the supply chain and subsequently choose an appropriate strategy.

Network Analytics and Digital Twin: Identifying and Mitigating Risks in Defence Supply Chain and Logistics

Authors: Singupuram, Vamsi; Agrawal, Shreya; Guha, Saurabh

TCG_Digital_Logistics-Network_Analytics_and_Digital_Twin_for_Risk_Mitigation _v1 (tcgdigital.com)

Abstract: Digital twin is at the heart of Industry 4.0 solutions for Supply Chain. Equipped with an intricately mapped supply chain network, a digital twin can enable organizations to simulate possible scenarios and identify possible choke points as well as predict and respond to shocks in real-time. This white paper starts with an introduction to familiarize readers with the kinds of supply chain shocks that an organization must prepare for. It then proposes a recursive approach to map a supply chain network and provides a framework for defining the components of the network, before describing a digital twin that can effectively harness the potential of the mapped supply chain network. Finally, it touches upon the stress testing methods that can be used to predict shocks to unlock value from the digital twin.

Third Party Risk Management and Cyber Supply Chain Risk Management

Today’s business environment continues to be a challenge. Businesses whether small, or large leverage third-party vendors to provide critical services like data handling (security, transmitting, and storage), cloud storage/applications, and systems security monitoring.

Each business must ask themselves a few simple questions about one of their most valuable assets “Data”. If or when it leaves your secure working environment:

  • How secure is your customer data in transit and storage?
  • Do your third-party vendors handle your “critical information”?
    • Provide a secure environment for processing?
    • Comply with a proven Cyber Security Framework?
    • Perform a “Due Diligence” on-boarding step for the Nth vendors (how many vendors handles your specific data) in your cyber supply chain?
    • Follow security agreements and service level agreements catered to information security?
    • Ensure data privacy is an important element of their InfoSec Program?

Bipartisan Bill Introduced to Strengthen U.S. Supply Chains

Bipartisan legislation was introduced in the House last week to boost U.S. supply chains and foster domestic manufacturing of “critical goods” by creating a Supply Chain Resiliency and Crisis Response Office in the Department of Commerce.

The Building Resilient Supply Chains Act was introduced by Rep. Tom Malinowski, D-N.J., along with Reps. Adam Kinzinger, R-Ill., and Lisa Blunt Rochester, D-Del.— members of the House Committee on Energy and Commerce.

In addition to creating the supply chain office within Commerce, the bill would authorize $45 billion for the office to create grants and loans that support the “expansion of domestic manufacturing of critical goods and services, industrial equipment, and manufacturing technology.

Read Entire Article

Cybersecurity: Biden Cyber Officials Back Breach Incident Reporting Mandate

The head of the U.S. cybersecurity enforcement agency “is a huge supporter” of bipartisan legislation to mandate that operators of critical infrastructure report data breaches to the government.

Jen Easterly, director of the Cybersecurity and Infrastructure Security Agency, said she backs draft legislation from the Senate Homeland Security and Governmental Affairs Committee to require certain private companies, federal agencies and government contractors to report cyberattacks to the agency.

The proposed legislation is partly in response to a surge of major cyberattacks that targeted government agencies and critical industries, including Colonial Pipeline Co. and meat producer JBS SA. The hacks increased pressure on the Biden administration to bolster U.S. cyber defenses and fueled calls for federal legislation to require companies to share incidents with the federal government to assist in response and recovery. 

Read Entire Article