Show simple item record

dc.contributor.advisorDonna H. Rhodes.en_US
dc.contributor.authorRovito, Sarah Mariaen_US
dc.contributor.otherTechnology and Policy Program.en_US
dc.date.accessioned2016-10-14T14:41:44Z
dc.date.available2016-10-14T14:41:44Z
dc.date.copyright2016en_US
dc.date.issued2016en_US
dc.identifier.urihttp://hdl.handle.net/1721.1/104816
dc.descriptionThesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program, 2016.en_US
dc.descriptionThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.en_US
dc.descriptionCataloged from student-submitted PDF version of thesis.en_US
dc.descriptionIncludes bibliographical references (pages 200-214).en_US
dc.description.abstractSupply chains are critical to delivering components and products safely, affordably, and securely. However, these complex networks of suppliers, manufacturers, and customers are vulnerable to internal and external disruptions and subject to exploitation. This can result in adverse impacts to the system and inhibit value delivery. This thesis proposes a generic electronics supply chain model that can guide a user through different vulnerability assessment techniques and reveal information regarding system vulnerabilities as well as opportunities for decision-makers to intervene. The model draws upon a previously-developed Cause-Effect Mapping (CEM) analytic technique and assists with making decisions affecting complex systems, including those operating in resource-constrained environments. Elements of System Security Engineering (SSE) and Trusted Systems and Networks (TSN) analysis are taken into consideration, and leading indicators are utilized to provide a greater understanding of security concerns and impacts to a supply chain focusing on electronics for the defense industry. The model, adaptable to a diversity of systems and capable of recognizing non-obvious sources of vulnerability, can be used by systems engineers to provide a holistic view of a complex supply chain. The model facilitates the communication of information regarding supply chain vulnerabilities to decision-makers and other individuals.en_US
dc.description.statementofresponsibilityby Sarah Maria Rovito.en_US
dc.format.extent214 pagesen_US
dc.language.isoengen_US
dc.publisherMassachusetts Institute of Technologyen_US
dc.rightsM.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission.en_US
dc.rights.urihttp://dspace.mit.edu/handle/1721.1/7582en_US
dc.subjectInstitute for Data, Systems, and Society.en_US
dc.subjectEngineering Systems Division.en_US
dc.subjectTechnology and Policy Program.en_US
dc.titleAn integrated framework for the vulnerability assessment of complex supply chain systemsen_US
dc.typeThesisen_US
dc.description.degreeS.M. in Technology and Policyen_US
dc.contributor.departmentMassachusetts Institute of Technology. Institute for Data, Systems, and Society.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Engineering Systems Division.en_US
dc.contributor.departmentTechnology and Policy Program.en_US
dc.identifier.oclc959232903en_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record