Raw Data Library
About
Aims and ScopeAdvisory Board Members
More
Who We Are?
User Guide
Green Science
​
​
EN
Kurumsal BaşvuruSign inGet started
​
​

About
Aims and ScopeAdvisory Board Members
More
Who We Are?
User GuideGreen Science

Language

Kurumsal Başvuru

Sign inGet started
RDL logo

Verified research datasets. Instant access. Built for collaboration.

Navigation

About

Aims and Scope

Advisory Board Members

More

Who We Are?

Contact

Add Raw Data

User Guide

Legal

Privacy Policy

Terms of Service

Support

Got an issue? Email us directly.

Email: info@rawdatalibrary.netOpen Mail App
​
​

© 2026 Raw Data Library. All rights reserved.
PrivacyTermsContact
  1. Raw Data Library
  2. /
  3. Publications
  4. /
  5. Infiltration, interdiction, and other covert supply chain operations: a research agenda

Verified authors • Institutional access • DOI aware
50,000+ researchers120,000+ datasets90% satisfaction
Article
en
2025

Infiltration, interdiction, and other covert supply chain operations: a research agenda

0 Datasets

0 Files

en
2025
Vol 45 (13)
Vol. 45
DOI: 10.1108/ijopm-02-2025-0115

Get instant academic access to this publication’s datasets.

Create free accountHow it works

Frequently asked questions

Is access really free for academics and students?

Yes. After verification, you can browse and download datasets at no cost. Some premium assets may require author approval.

How is my data protected?

Files are stored on encrypted storage. Access is restricted to verified users and all downloads are logged.

Can I request additional materials?

Yes, message the author after sign-up to request supplementary files or replication code.

Advance your research today

Join 50,000+ researchers worldwide. Get instant access to peer-reviewed datasets, advanced analytics, and global collaboration tools.

Get free academic accessLearn more
✓ Immediate verification • ✓ Free institutional access • ✓ Global collaboration
Access Research Data

Join our academic network to download verified datasets and collaborate with researchers worldwide.

Get Free Access
Institutional SSO
Secure
This PDF is not available in different languages.
No localized PDFs are currently available.
Joseph Sarkis
Joseph Sarkis

Worcester Polytechnic Institute

Verified
ManMohan S. Sodhi
Samuel Roscoe
Lisa M. Ellram
+5 more

Abstract

Purpose The masterminds behind covert supply chain operations aim to hide their activities from government agencies and society at large, often for illegal gains or to intentionally cause harm. This conceptual article outlines a research agenda for future studies by framing covert supply chain activities and the countermeasures used to disrupt them. Design/methodology/approach Secondary data were collected from various news sources (observation) and analyzed to understand the nature of covert supply chain operations and efforts to identify and disrupt them (conceptualization). Findings To date, covert supply chain operations and counter-operations categories have been scarcely scrutinized in the supply chain literature, and our framework presents many fruitful avenues for further research. Practical implications Policymakers may aim to enhance the visibility of covert supply chains to achieve strategic objectives. Our framework enables logistics providers, network orchestrators, and shippers to identify vulnerabilities and detect covert infiltration by hostile actors within customer supply networks. Originality/value The mainstream supply chain literature has viewed supply chains of illegal goods and disruptive counter-operations as piecemeal. This conceptual article addresses the topic holistically to create a framework for guiding future research.

How to cite this publication

ManMohan S. Sodhi, Samuel Roscoe, Lisa M. Ellram, Christopher S. Tang, Joseph Sarkis, Robert Handfield, Jens K. Roehrich, Martin C. Schleper (2025). Infiltration, interdiction, and other covert supply chain operations: a research agenda. , 45(13), DOI: https://doi.org/10.1108/ijopm-02-2025-0115.

Related publications

Why join Raw Data Library?

Quality

Datasets shared by verified academics with rich metadata and previews.

Control

Authors choose access levels; downloads are logged for transparency.

Free for Academia

Students and faculty get instant access after verification.

Publication Details

Type

Article

Year

2025

Authors

8

Datasets

0

Total Files

0

Language

en

DOI

https://doi.org/10.1108/ijopm-02-2025-0115

Join Research Community

Access datasets from 50,000+ researchers worldwide with institutional verification.

Get Free Access