z-logo
open-access-imgOpen Access
Mitigating Counterfeit Part Intrusions with Enterprise Simulation
Author(s) -
Douglas A. Bodner
Publication year - 2015
Publication title -
procedia computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.334
H-Index - 76
ISSN - 1877-0509
DOI - 10.1016/j.procs.2015.09.203
Subject(s) - computer science , counterfeit , computer security , law , political science
In recent years, counterfeit parts have infiltrated the defense supply chain, which provides replacement parts and sub-systems for deployed systems. This creates a significant amount of risk. Both government and industry have formulated and implemented various policy initiatives to address the problem, including inspections, penalties and trusted sourcing. However, the problem is still on-going. Additional policies are under consideration, and the unintended effects of policies are not known. To study the problem and potential policy solutions, we present an enterprise simulation model of counterfeit parts intrusion and policy alternatives. The model reflects the defense enterprise, tiers of suppliers, counterfeiters and other government policy actors. Interactions of these actors and their reactions to events and policies form an important part of the enterprise system behavior. Policies, their effects and their interactions are detailed in this multi-stakeholder environment

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom