Module 4 - Case ECONOMIC JUSTICE AND ORGANIZATIONAL STRATEGY Assignment Overview Economic Justice Economic Justice is a global issue. The struggle for Economic Justice in modern America is not a new m

Running head: MANAGING THE SUPPLY CHAIN MODULE 4 SLP 0

Trident University International

Student Name

Managing the Supply Chain Module 4 SLP

Professor’s Name

Date of Submission

Managing the Supply Chain Module 4 SLP

2-3 sentence introduction. The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) hosts a Cyber Supply Chain Risk Management page that have link to publications, industry best practices, NIST-sponsored research and a Software and Supply Chain Assurance Forum. The U.S. Department of Homeland Security’s Cybersecurity & Infrastructure Security Agency (CISA) has a webpage for Supply Chain Risk that contains Task Force information and publications.

Supply chain security risk #1

Begin with the SLP background readings to learn about the SC security threats. Then move to expert or consultant publications written within the last three years. You may include control towers, authentication and serialization, and chain of custody solutions.

Provide a well-balanced assessment of what is required for supply chain security according to the readings and information from at least three experts (articles, interviews, presentations, etc.). You must include three different strategies/requirements. One strategy must focus on cybersecurity. NOTE: no resources should be more than three years old for this case because the industry is changing rapidly and the goal is to remain relevant throughout your career. This section should be 1 page in length.

Supply chain security risk #2

Provide a well-balanced assessment of what is required for supply chain security according to the readings and information from at least three experts (articles, interviews, presentations, etc.). You must include three different strategies/requirements. One strategy must focus on cybersecurity. This section should be 1 page in length. NOTE: no resources should be more than three years old for this SLP because the industry is changing rapidly and the goal is to remain relevant throughout your career.

Supply chain security risk #3

Provide a well-balanced assessment of what is required for supply chain security according to the readings and information from at least three experts (articles, interviews, presentations, etc.). You must include three different strategies/requirements. One strategy must focus on cybersecurity. This section should be 1 page in length. NOTE: no resources should be more than three years old for this SLP because the industry is changing rapidly and the goal is to remain relevant throughout your career.

Since you are engaging in research, be sure to cite and reference the sources in APA format. The paper should be written in third person; this means words like “I”, “we”, and “you” are not appropriate. For more information see Differences Between First and Third Person. The excessive use of quotes or unoriginal content will directly impact performance since it suggests lack of comprehension and indicates that a student may not have mastered the concepts.

Conclusion

This is your 2-3 sentence conclusion. Remember this is the last thing your reader will hear. Your submission will include:

  • Trident University International’s cover page

  • The body will be 3 pages with APA citations (2-3 sentence introduction, body, 2-3 sentence conclusion)

  • The alphabetized reference list page in APA format

References

This listing should be in alphabetical order. Below are a few examples of reference list entries. The following list needs to be removed before you submit the paper (not by category).

Journal in online library (be sure that you give the specific library database for journal articles that you have retrieved from the library, e.g., Proquest, EBSCO – Academic Search Complete, EBSCO – Business Source Complete, IBISWorld, etc.):

Last name, Initials. (yyyy of journal volume). Title of article. Title of Journal, volume

number,(issue number), pages. Retrieved from [insert name of library database]

Example:

Borgerson, J. L., Schroeder, J. E., Escudero Magnusson, M., & Magnusson, F. (2009).

Corporate communication, ethics, and operational identity: A SLP study of Benetton. Business Ethics: A European Review, 18(3), 209-223. Retrieved from Proquest.

Book in online library:

Last name, Initials. (yyyy published). Book title. Retrieved from [insert name of library

database]


Example:

Johnson, R. A. (2009). Helping really fat dogs. Retrieved from EBSCO eBook Collection.

Newspaper in online library:

Author last name, first initial. (YYYY, MM DD). Name of article. Title of Newspaper,

pages. Retrieved from [name of library database].


Example:


Dee, J. (2007, December 23). A toy maker’s conscience. New York Times Magazine, 34-39.

Retrieved from EBSCO – Academic Source Complete.

Websites

APA end reference for a website – with author:

Author. (Year [use n.d. if not given]). Article or page title.

Larger Publication Title. Retrieved from https://urladdress

Example:

Shiva, V. (2006, February 12). Bioethics: A third world issue. Nativeweb. Retrieved

from https://www.nativeweb.org/pages/legal/shiva.html

APA end reference for a website – with no author:

Title of article. (Year [use n.d. if not given]). Website Title. Retrieved from

https://www.website-name/ABCDEFG-12345

Example:

Media giants. (2014). Frontline: The Merchants of Cool. Retrieved from

https://www.pbs.org/wgbh/pages/frontline/shows/cool/giants/