Abstract
Recent disruptions and shortages across the global supply chain have heightened awareness of resiliency and security risks for consumers, industry, and consumers. Of particular concern is the rise in counterfeit information and communication technology (ICT) products. Commonly used technology solutions to avoid counterfeit are cost prohibitive to small-medium enterprises (SME), leading to an increased security, cost, and reputational risks to these firms. This research develops a novel mathematical model to illustrate how minor purchasing decisions can compromise the integrity of a supply chain and network infrastructure. We conduct interviews with industry leaders to understand why counterfeit ICT continues to be purchased by industry. We then construct a system dynamics (SD) model to illustrate the model is applied to a case study based on a US government contract and evaluated. The findings show even a short-term use of an untrusted supplier can result in significant quantities of counterfeit ICT being purchased. Finally, we propose a new framework to support SMEs developing a counterfeit ICT abatement program.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.