Learning Exercise

SECURING THE SUPPLY CHAIN

REQUIREMENTS : Concepts and methods for security management along the entire commodity chain, with the aim of identifying and assessing failure risks and damage potential, detecting security gaps at an early stage, recognizing technical and organizational deficits, and identifying potential for the reduction of dependencies from delivery failures. SCENARIO ACTORS: End users include public authorities, security and emergency services (police, customs, disaster relief, and others) and infrastructure operators (e.g. transport and logistics providers, commercial enterprises, and operators of storage facilities and transportation hubs for goods and commodities). EDIAUDIT LEARNING EXERCISE : HOW TO ELABORATE INNOVATIVE DESIGN COLLABORATIVE SUPPLY CHAIN SECURING PROCESS USING INTELLIGENT DOCUMENT CONCEPT? http://www.mlfcham.com/images/stories/pdf/securingsupplychain.pdf
Course: Standard Process Description Format
Share

Web services are primarily adopted in industry as a means to develop architecturally sound information systems. They do... see more

Exercise

HOW TO ELABORATE INNOVATIVE DESIGN COLLABORATIVE SUPPLY CHAIN SECURING PROCESS USING INTELLIGENT DOCUMENT CONCEPT?

Technical Notes

Some technical documents shall be provided to those who apply for the above learning exercise.

Requirements

UNIX environment, JAVA programming languge, XML standard

Topics

Serious Games

Type of Task

Learning Objectives

Design & Monitoring automated process