Infiltration, Interdiction, and Other Covert Supply Chain Operations: A Research Agenda
Sodhi, M. S.
ORCID: 0000-0002-2031-4387, Roscoe, S., Ellram, L. M. , Tang, C., Sarkis, J., Handfield, R., Roehrich, J. & Schleper, M. (2025).
Infiltration, Interdiction, and Other Covert Supply Chain Operations: A Research Agenda.
International Journal of Operations and Production Management, 45(13),
pp. 233-252.
doi: 10.1108/ijopm-02-2025-0115
Abstract
Purpose: The masterminds behind covert supply chain operations aim to hide their activities from government agencies and society at large, often for illegal gains or to intentionally cause harm. This conceptual article outlines a research agenda for future studies by framing covert supply chain activities and the countermeasures used to disrupt them.
Design/methodology/approach: Secondary data was collected from various news sources (observation) and analyzed to understand the nature of covert supply chain operations and efforts to identify and disrupt them (conceptualization).
Findings: To date, covert supply chain operations and counter-operations categories have been scarcely scrutinized in the supply chain literature, and our framework presents many fruitful avenues for further research.
Practical implications: Policymakers may aim to enhance the visibility of covert supply chains to achieve strategic objectives. Our framework enables logistics providers, network orchestrators, and shippers to identify vulnerabilities and detect covert infiltration by hostile actors within customer supply networks.
Originality/value: The mainstream supply chain literature has viewed supply chains of illegal goods and disruptive counter-operations as piecemeal. This conceptual article addresses the topic holistically to create a framework for guiding future research.
| Publication Type: | Article |
|---|---|
| Additional Information: | Published by Emerald Publishing Limited. This article is published under the Creative Commons Attribution (CC BY 4.0) licence. Anyone may reproduce, distribute, translate and create derivative works of this article (for both commercial and non-commercial purposes), subject to full attribution to the original publication and authors. |
| Publisher Keywords: | Smuggling, Trafficking, supply chains, disruption, infiltration, interdiction, counter-operations, illegitimate supply chains, research agenda, security, counterfeiting |
| Subjects: | H Social Sciences > HD Industries. Land use. Labor > HD28 Management. Industrial Management |
| Departments: | Bayes Business School Bayes Business School > Faculty of Management |
| SWORD Depositor: |
Available under License Creative Commons Attribution.
Download (781kB) | Preview
Download (777kB) | Preview
Export
Downloads
Downloads per month over past year
Metadata
Metadata