A conceptual framework of e-fraud control in an integrated supply chain

The integration of supply chains offers many benefits; yet, it may also render organisations more vulnerable to electronic fraud (e-fraud). E-fraud can drain on organisations’ financial resources, and can have a significant adverse effect on the ability to achieve their strategic objectives. Therefore, efraud control should be part of corporate board-level due diligence, and should be integrated into organisations’ practices and business plans. Management is responsible for taking into consideration the relevant cultural, strategic and implementation elements that inter-relate with each other and to coordinating the human, technological and financial resources necessary to designing and implementing policies and procedures for controlling e-fraud. Due to the characteristics of integrated supply chains, a move from the traditional vertical approach to a systemic, horizontal-vertical approach is necessary. Although the e-fraud risk cannot be eliminated, risk mitigation policies and processes tailored to an organisation’s particular vulnerabilities can significantly reduce the risk and may even preclude certain classes of frauds. In this paper, a conceptual framework of e-fraud control in an integrated supply chain is proposed. The proposed conceptual framework can help managers and practitioners better understand the issues and plan the activities involved in a systemic, horizontal-vertical approach to e-fraud control in an integrated supply chain, and can be a basis upon which empirical studies can be build.

[1]  R. McIvor Lean supply: the design and cost reduction dimensions , 2001 .

[2]  Hau L. Lee,et al.  e-Business and Supply Chain Integration , 2004 .

[3]  William T. Walker,et al.  Supply Chain Networks and Business Process Orientation: Advanced Strategies and Best Practices , 2002 .

[4]  Michael Quayle A study of supply chain management practice in UK industrial SMEs , 2003 .

[5]  Iván Arce,et al.  The Weakest Link Revisited , 2003, IEEE Secur. Priv..

[6]  Grant Wardlaw THE FUTURE AND CRIME : CHALLENGES FOR LAW ENFORCEMENT , 1999 .

[7]  Thomas W. Lauer,et al.  Supplier source integration in a large manufacturing company , 2004 .

[8]  Charles R. Gowen,et al.  Enhancing supply chain practices through human resource management , 2003 .

[9]  M. Barratt Understanding the meaning of collaboration in the supply chain , 2004 .

[10]  D. Lambert,et al.  SUPPLY CHAIN MANAGEMENT , 2003 .

[11]  Andrew Popp,et al.  Information flow in automotive supply chains - present industrial practice , 2003, Ind. Manag. Data Syst..

[12]  Edsger W. Dijkstra,et al.  The end of computing science? , 2001, CACM.

[13]  C. Harland Supply Chain Management: Relationships, Chains and Networks , 1996 .

[14]  E. L. Nichols,et al.  AN EXAMINATION OF CULTURAL COMPETITIVENESS AND ORDER FULFILLMENT CYCLE TIME WITHIN SUPPLY CHAINS , 2002 .

[15]  A. Dainty,et al.  New perspectives on construction supply chain integration , 2001 .

[16]  Bjørn Andersen,et al.  Benchmarking supply chain management: finding best practices , 1999 .

[17]  Robert D Austin,et al.  The myth of secure computing. , 2003, Harvard business review.

[18]  T. Somers,et al.  Alignment of a firm's competitive strategy and information technology management sophistication: the missing link , 1997 .

[19]  R. V. Hoek,et al.  E‐supply chains – virtually non‐existing , 2001 .

[20]  Elias Levy Poisoning the Software Supply Chain , 2003, IEEE Secur. Priv..

[21]  G. Dhillon Managing information system security , 1997 .

[22]  J. Shapiro Modeling the Supply Chain , 2000 .

[23]  Alison Hayman,et al.  Causes of IT failures in teams , 1995, ECIS.

[24]  Ioana Vasiu,et al.  Dissecting computer fraud: from definitional issues to a taxonomy , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[25]  Neelam Bhalla Is the mouse click mighty enough to bring society to its knees? , 2003, Comput. Secur..

[26]  K. Tan,et al.  Benchmarking supply chain management practice in New Zealand , 2003 .

[27]  Fred Cohen,et al.  Computer Fraud Scenarios , 2002 .

[28]  David N. Kirk,et al.  Serious fraud : investigation and trial , 1992 .

[29]  Fritz H. Grupe,et al.  Watching systems in action: security at the periphery , 1998, Inf. Manag. Comput. Secur..

[30]  Howard Silverstone,et al.  Fraud 101: Techniques and Strategies for Detection , 2000 .

[31]  Charles B. Keating,et al.  A framework for systemic analysis of complex issues , 2001 .

[32]  Norman L. Chervany,et al.  What Trust Means in E-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology , 2001, Int. J. Electron. Commer..