Infiltration, Interdiction, and Other Covert Supply Chain Operations: A Research Agenda
Sodhi, M. S. ORCID: 0000-0002-2031-4387, Roscoe, S., Ellram, L. M. , Tang, C., Sarkis, J., Handfield, R., Roehrich, J. & Schleper, M. (2025).
Infiltration, Interdiction, and Other Covert Supply Chain Operations: A Research Agenda.
Intenational Journal of Operations and Production Management,
Abstract
Purpose: The masterminds behind covert supply chain operations aim to hide their activities from government agencies and society at large, often for illegal gains or to intentionally cause harm. This conceptual article outlines a research agenda for future studies by framing covert supply chain activities and the countermeasures used to disrupt them.
Design/methodology/approach: Secondary data was collected from various news sources (observation) and analyzed to understand the nature of covert supply chain operations and efforts to identify and disrupt them (conceptualization).
Findings: To date, covert supply chain operations and counter-operations categories have been scarcely scrutinized in the supply chain literature, and our framework presents many fruitful avenues for further research.
Practical implications: Policymakers may aim to enhance the visibility of covert supply chains to achieve strategic objectives. Our framework enables logistics providers, network orchestrators, and shippers to identify vulnerabilities and detect covert infiltration by hostile actors within customer supply networks.
Originality/value: The mainstream supply chain literature has viewed supply chains of illegal goods and disruptive counter-operations as piecemeal. This conceptual article addresses the topic holistically to create a framework for guiding future research.
Publication Type: | Article |
---|---|
Additional Information: | © Emerald 2025. This AAM is provided for your own personal use only. It may not be used for resale, reprinting, systematic distribution, emailing, or for any other commercial purpose without the permission of the publisher. |
Publisher Keywords: | Smuggling, Trafficking, supply chains, disruption, infiltration, interdiction, counter-operations, illegitimate supply chains, research agenda, security, counterfeiting |
Subjects: | H Social Sciences > HD Industries. Land use. Labor > HD28 Management. Industrial Management |
Departments: | Bayes Business School Bayes Business School > Management |
SWORD Depositor: |
Export
Downloads
Downloads per month over past year