A conceptual framework of e-fraud control in an integrated supply chain
暂无分享,去创建一个
[1] R. McIvor. Lean supply: the design and cost reduction dimensions , 2001 .
[2] Hau L. Lee,et al. e-Business and Supply Chain Integration , 2004 .
[3] William T. Walker,et al. Supply Chain Networks and Business Process Orientation: Advanced Strategies and Best Practices , 2002 .
[4] Michael Quayle. A study of supply chain management practice in UK industrial SMEs , 2003 .
[5] Iván Arce,et al. The Weakest Link Revisited , 2003, IEEE Secur. Priv..
[6] Grant Wardlaw. THE FUTURE AND CRIME : CHALLENGES FOR LAW ENFORCEMENT , 1999 .
[7] Thomas W. Lauer,et al. Supplier source integration in a large manufacturing company , 2004 .
[8] Charles R. Gowen,et al. Enhancing supply chain practices through human resource management , 2003 .
[9] M. Barratt. Understanding the meaning of collaboration in the supply chain , 2004 .
[10] D. Lambert,et al. SUPPLY CHAIN MANAGEMENT , 2003 .
[11] Andrew Popp,et al. Information flow in automotive supply chains - present industrial practice , 2003, Ind. Manag. Data Syst..
[12] Edsger W. Dijkstra,et al. The end of computing science? , 2001, CACM.
[13] C. Harland. Supply Chain Management: Relationships, Chains and Networks , 1996 .
[14] E. L. Nichols,et al. AN EXAMINATION OF CULTURAL COMPETITIVENESS AND ORDER FULFILLMENT CYCLE TIME WITHIN SUPPLY CHAINS , 2002 .
[15] A. Dainty,et al. New perspectives on construction supply chain integration , 2001 .
[16] Bjørn Andersen,et al. Benchmarking supply chain management: finding best practices , 1999 .
[17] Robert D Austin,et al. The myth of secure computing. , 2003, Harvard business review.
[18] T. Somers,et al. Alignment of a firm's competitive strategy and information technology management sophistication: the missing link , 1997 .
[19] R. V. Hoek,et al. E‐supply chains – virtually non‐existing , 2001 .
[20] Elias Levy. Poisoning the Software Supply Chain , 2003, IEEE Secur. Priv..
[21] G. Dhillon. Managing information system security , 1997 .
[22] J. Shapiro. Modeling the Supply Chain , 2000 .
[23] Alison Hayman,et al. Causes of IT failures in teams , 1995, ECIS.
[24] Ioana Vasiu,et al. Dissecting computer fraud: from definitional issues to a taxonomy , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[25] Neelam Bhalla. Is the mouse click mighty enough to bring society to its knees? , 2003, Comput. Secur..
[26] K. Tan,et al. Benchmarking supply chain management practice in New Zealand , 2003 .
[27] Fred Cohen,et al. Computer Fraud Scenarios , 2002 .
[28] David N. Kirk,et al. Serious fraud : investigation and trial , 1992 .
[29] Fritz H. Grupe,et al. Watching systems in action: security at the periphery , 1998, Inf. Manag. Comput. Secur..
[30] Howard Silverstone,et al. Fraud 101: Techniques and Strategies for Detection , 2000 .
[31] Charles B. Keating,et al. A framework for systemic analysis of complex issues , 2001 .
[32] Norman L. Chervany,et al. What Trust Means in E-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology , 2001, Int. J. Electron. Commer..