SwePub
Tyck till om SwePub Sök här!
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "LAR1:hj ;lar1:(fhs)"

Sökning: LAR1:hj > Försvarshögskolan

  • Resultat 1-5 av 5
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Ekström, Thomas, et al. (författare)
  • Differentiation strategies for defence supply chain design
  • 2020
  • Ingår i: Journal of Defense Analytics and Logistics. - : Emerald Group Publishing Limited. - 2399-6439. ; 4:2, s. 183-202
  • Tidskriftsartikel (refereegranskat)abstract
    • PurposeDefence supply chains (SCs) aim at operational outcomes, and armed forces depend on them to provide availability and preparedness in peace and sustainability in war. Previous research has focussed on strategies for SCs aiming at financial outcomes. This raises the question of how suitable commercial supply chain strategies (SCSs) are for supply chain design (SCD) in defence. The purpose of this paper is to explain the constructs of SCSs that satisfy military operational requirements and to propose SCSs that are appropriate in defence.Design/methodology/approachThis paper reports on a Delphi study with 20 experts from Swedish defence authorities. Through three Delphi rounds, two workshops and a validation round, these experts contributed to the reported findings.FindingsThe findings demonstrate that commercial SC constructs are acceptable and applicable in defence but not sufficient. An additional strategy is required to satisfy requirements on availability, preparedness and sustainability. The paper shows that different requirements in peace and war make it challenging to design suitable defence SCs and proposes eight SCSs that satisfy these requirements.Research limitations/implicationsThe results emanate from the Swedish defence context and further research is required for generalisation.Originality/valueThis paper extends theory by investigating SCs aiming at operational outcomes. For managers in companies and defence authorities, it explicates how the unique issues in defence must influence SCD to satisfy operational requirements.
  •  
2.
  • Ekström, Thomas, 1961- (författare)
  • Segmentation and differentiation in defence supply chain design : A dynamic purchasing portfolio model for defence procurement
  • 2020
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • An important priority in the current Swedish Defence Bill is to increase the operational warfighting capability of the Swedish Armed Forces, which has implications for the defence supply chain. A recent study suggested that the Swedish Armed Forces should use segmentation of supplies and differentiation of supply chains to enable an affordable supply chain design (SCD). This raises questions regarding which segmentation model and which supply chain strategies (SCSs) the Swedish Armed Forces should use.The purpose of this research is to design and develop a purchasing portfolio model (PPM) for defence procurement, which will be of practical use for defence authorities. The author defines a PPM as consisting of a segmentation model, tactical levers, differentiation strategies and guidance for management decisions. The research builds on a Delphi study with twenty experts from Swedish defence authorities. It addresses the operational requirements on readiness and sustainability that must be satisfied, as well as research gaps and open issues in the literature regarding PPM design and application.The findings include several novelties. The author proposes a dynamic PPM, including an innovative two-stage segmentation model, with a precursor and a two-dimensional model. The latter merges sixteen elements into one square and three other segments. Another originality is that the PPM is both prescriptive and serves as a catalyst for in-depth discussions. The author also develops guidance for management decisions, including twelve tactical levers, and eight SCSs to differentiate treatment of the supply segments.The research contributes to theory by combining constructs from the purchasing and supply management (PSM) literature and supply chain management (SCM) literature, and applying them in the context of military logistics, including defence procurement. It contributes to practice by developing a PPM that is relevant to practitioners in defence procurement and satisfies the operational requirements of the Swedish Armed Forces. It also contributes to methodology by investigating how researchers can use two panels in Delphi studies to enhance research validity.
  •  
3.
  • Ekström, Thomas, 1961- (författare)
  • The Delphi Technique – Limitations and Possibilities
  • 2020
  • Ingår i: The 32nd Annual NOFOMA Conference, 17 – 18 September on Internet.
  • Konferensbidrag (refereegranskat)abstract
    • PurposeThe dual purpose of this paper is to analyse the implications on research rigour of using two panels in a Delphi study, and to take a first step towards investigating how researchers in logistics and SCM establish rigour in Delphi studies.Design/methodology/approachBased on a literature review on research rigour in Delphi studies, this paper analyses how a modified design, with two panels, effected research rigour in a Delphi study that produced unexpected results. The paper also conducts a pilot literature review on Delphi-studies in logistics and SCM research, and investigates how these authors establish research rigour.FindingsThis paper finds that with two panels, researchers may enhance rigour in a Delphi study, but also that such a design may lead to results that would be less likely with a conventional design, especially if combined with concluding workshops. The pilot literature review indicates that Delphi-studies in logistics and SCM research establish rigour through the provision of an audit trail, rather than by explicitly discussing the quality criteria of correspondence and/or trustworthiness.Research limitations/implications (if applicable)The research indicates limitations with a conventional Delphi design, with one expert panel, and opportunities with a modified design, with two panels. Further research is required to explore these indicative findings.Original/valueThe paper demonstrates how a modified design of the Delphi technique, in combination with concluding workshops, can produce results and insights that would be more difficult to achieve with only one expert panel.
  •  
4.
  • Ekström, Thomas, et al. (författare)
  • Towards a purchasing portfolio model for defence procurement – A Delphi study of Swedish defence authorities
  • 2021
  • Ingår i: International Journal of Production Economics. - : Elsevier. - 0925-5273 .- 1873-7579. ; 233
  • Tidskriftsartikel (refereegranskat)abstract
    • This study explains the constructs of a purchasing portfolio model (PPM) that defence authorities can use in practice in defence procurement and designs a segmentation model. We identify open PPM design and application questions in the literature and conduct a Delphi study with twenty experts from Swedish defence authorities to design a segmentation model that is fit-for-purpose. The paper addresses the open design and application questions discussed in the literature and satisfies the operational requirements of the Swedish Armed Forces (SwAF). The proposed segmentation model builds on three dimensions: the operational requirements of the SwAF, the market's ability to deliver supplies on time, and limitations in the SwAF operational capability if the market does not deliver supplies on time. To reduce complexity, we propose a two-stage model in which we use one dimension as a precursor to a two-dimensional model. In the latter, we merge sixteen elements into one square along with three other segments which users should treat differently. The paper contributes to extant academic knowledge on PPMs by eliciting practitioners' views on open design and application questions. We develop the proposed segmentation model in cooperation with practitioners and believe that it will be of value in defence procurement practice.
  •  
5.
  • Kävrestad, Joakim, 1989-, et al. (författare)
  • How the Civilian Sector in Sweden Perceive Threats from Offensive Cyberspace Operations
  • 2021
  • Ingår i: Proceedings of the 20th European Conference on Cyber Warfare and Security. - Reading : ACI Academic Conferences International. - 9781912764433 - 9781912764990 ; , s. 499-506
  • Konferensbidrag (refereegranskat)abstract
    • The presence of state-sponsored actors executing offensive cyberspace operations (OCO) has been made evident in recent years. The term offensive cyberspace operations encompass a range of different actions, including cyberespionage, disinformation campaigns, spread of malware and more. Based on an analysis of past events, it is evident that state-sponsored actors are causing harm to the civilian sector using OCO. However, the degree to which civilian organizations understand the threat from state-sponsored actors is currently unknown. This research seeks to provide new a better understanding of OCO and their impact on civilian organizations. To highlight this domain, the case of the threat actor Advanced Persistent Threat 1 (APT1) is presented, and its impact on three civilian organizations discussed. Semi-structured interviews were used to research how the threats from OCO and state-sponsored actors are perceived by civilian organizations. First, a computational literature review was used to get an overview of related work and establish question themes. Next, the question themes were used to develop questions for the interview guide, followed by separate interviews with five security professionals working in civilian organizations. The interviews were analysed using thematic coding and the identified themes summarized as the result of this research. The results show that all respondents are aware of the threat from OCO, but they perceive it in different ways. While all respondents acknowledge state-sponsored actors at a threat agent executing OCO, some respondent’s argue that state-sponsored actors are actively seeking footholds in systems for future use while others state that the main goal of state-sponsored actors is to steal information. This suggests that the understanding of the threat imposed by OCO is limited, or at least inconsistent, among civilian security experts. As an interview study, the generalisability of this research is limited. However, it does demonstrate that the civilian society does not share a common view of the threat from state-sponsored actors and OCO. As such, it demonstrates a need for future research in this domain and can serve as a starting point for such projects.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-5 av 5

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy