5 pages/≈1375 words
Counterfeit components in electronics management (Research Paper Sample)
purpose of paper: identify problems related to electronics management write an annotated bibliography, identify 25 sources that will provide the information required to write a comprehensive research report about counterfeit components in electronics management. when considering books and most journals, look for those that provide detailed information about management concepts and practices that are relevant to electronics management. each one of the 25 entries in the bibliography must include a brief annotation that explains why that source is important to your research. follow the example below: Aaron, J. E. The Little, Brown compact handbook (5th ed.). Reading, MA: Allen Bacon Longman, Inc. Importance: This book contains detailed information on organizing sentences, paragraphs, and reports. It also provides clear examples of correct grammar usage. source..
Pecht, M. (2005). Parts Selection and Management. Hoboken, NJ: John Wiley & Sons.
This book constitutes a detailed analysis on how electronic companies can minimize risks and boost profitability through effective components or parts selection and management. It also acknowledges the role of technology in product design besides outlining decision making approaches, product specifications and requirements assessment procedures, and management activities that can ensure efficient selection of electronic parts.
Bartels, B., Ermel, U., Sandborn, P., & Pecht, M. G. (2012). Strategies to the Prediction, Mitigation and Management of Product Obsolescence. Hoboken, NJ: John Wiley & Sons.
This discusses management strategies that can be used to alleviate obsolescence among electronic products. It also examines supply chain issues and how semiconductor companies strive to produce cheaper products day after day at the expense of quality, and the effect this has on "long-field life products" such as ships and airplanes which use those electronic components for years if not decades.
Pecht, M. G. (2008). Prognostics and Health Management of Electronics. Hoboken, NJ: John Wiley & Sons.
This book constitutes an in-depth account on how PHM (Prognostics and Heath Management) technology can be employed in supply chain management to avert the problem of counterfeit parts and minimize product tampering. It also explores how PHM concepts such as useful-line estimations and precursors can be used to recall defective parts or finished electronic products. It also provides useful tips on how users/engineers can isolate and detect faulty components.
Ross, R. J., & EDFAS. (2011). Microelectronics Failure Analysis: Desk Reference (6th ed) . Ohio: ASM International.
This book identifies repackaging, refurbishing and relabeling as some of the aspects that aggravate proliferation of counterfeit electronic components. It goes ahead to provide a systematic management methodologies through which counterfeit parts can be detected. It also recommends effective management of the supply chain to minimize use of counterfeit components and reduce hefty costs incurred through tedious inspections.
Simchi-Levi, D. (2010). Operations Rules: Delivering Customer Value Through Flexible Operations. New York: MIT Press.
This book details management rules which can be employed to enhance operations performance and boost customer value. It identifies counterfeit components control as one of the key risk management strategies in electronic production. It also acknowledges the fact that, use of counterfeit computer and electronic components in communication networks, ships and warplanes is likely to result in numerous fatalities during military operations.
Pascoe, N. (2011). Reliability Technology: Principles and Practice of Failure Prevention in Electronic Systems. Hoboken, NJ: John...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
YOU MAY ALSO LIKE
- How the healthcare industry copes with computer hacking in their technological systems a cas. . .Description: Technology: How the healthcare industry copes with computer hacking in their technological systems a case of US...5 pages/≈1375 words | 10 Sources | APA | Technology | Research Paper |
- Why is it important to build one's awareness and proper perception of information security? . . .Description: Undergraduate writing level 3 pages Technology Format Style English (U.S.) Research Paper. Why is it important to build one's awareness and proper perception of information security? And how to build such awareness/proper perception in the management of an organization?...3 pages/≈825 words | 4 Sources | APA | Technology | Research Paper |
- Information Security Management Frameworks Description: Technology: Information Security Management Frameworks ...2 pages/≈550 words | 2 Sources | APA | Technology | Research Paper |