Factors in the Adoption of Third-Party B2B Portals in the Textile Industry

Information sharing is a key element in any Supply Chain Management (SCM) system and is critical for improving supply chain performance and enhancing the competitive advantage of an organization. However, many organizations are reluctant to share information with their supply chain partners because of lack of trust, the fear of information leakage and security attacks from malicious individuals or groups. Through an extensive literature review, this paper examines the possible security threats/attacks in a SCM system. Then the key technologies and techniques for securing the information shared in SCM are identified with the goal of improving organizations' capabilities in sharing secure information.

[1]  Steven B. Lyman,et al.  Supply chain management: a strategic perspective , 2002 .

[2]  Robert E. Spekman,et al.  An empirical investigation into supply chain management: a perspective on partnerships , 1998 .

[3]  Gail-Joon Ahn,et al.  Role-based access control on the web , 2001, TSEC.

[4]  Sabrina De Capitani di Vimercati,et al.  Maximizing Sharing of Protected Information , 2002, J. Comput. Syst. Sci..

[5]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.

[6]  Stephen A. Weis Security and Privacy in Radio-Frequency Identification Devices , 2003 .

[7]  David Hillier,et al.  Radio frequency identification in the UK: opportunities and challenges , 2004 .

[8]  Chinho Lin,et al.  A Knowledge Management Architecture in Collaborative Supply Chain , 2002, J. Comput. Inf. Syst..

[9]  Yossi Aviv,et al.  The Effect of Collaborative Forecasting on Supply Chain Performance , 2001, Manag. Sci..

[10]  Chang Nian Zhang,et al.  Designing secure e-commerce with role-based access control , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..

[11]  John E. Anderson,et al.  Security in the Information Systems Curriculum: Identification & Status of Relevant Issues , 2002, J. Comput. Inf. Syst..

[12]  István Vajda,et al.  Lightweight Authentication Protocols for Low-Cost RFID Tags , 2003 .

[13]  R. Gaonkar,et al.  Collaboration and information sharing in global contract manufacturing networks , 2001 .

[14]  Karen A. Forcht,et al.  Developing a Computer Security Policy for Organizational Use and Implementation , 2001, J. Comput. Inf. Syst..

[15]  John R. Kros,et al.  Assessing & Quantifying the Loss of Network Intrusion , 2005, J. Comput. Inf. Syst..

[16]  Gail-Joon Ahn,et al.  Role-based Access Control on the Web Using LDAP , 2001, DBSec.

[17]  Vijayalakshmi Atluri,et al.  Role-based Access Control , 1992 .

[18]  Gail-Joon Ahn Role-based access control in DCOM , 2000, J. Syst. Archit..

[19]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[20]  Joni da Silva Fraga,et al.  Role-based access control for CORBA distributed object systems , 2002, Proceedings of the Seventh IEEE International Workshop on Object-Oriented Real-Time Dependable Systems. (WORDS 2002).

[21]  Keng Siau,et al.  Gaining Competitive Advantages through a Functionality Grid for Website Evaluation , 2004, J. Comput. Inf. Syst..

[22]  Bob D. Cutler,et al.  Identifying antecedents of information exchange within supply chains , 2002 .

[23]  Ralph O’Brien,et al.  Privacy and security , 2016 .

[24]  I. J. Petrick,et al.  Technology choice and pooled investment among networks: supply chain roadmaps , 2002, IEEE International Engineering Management Conference.

[25]  Julia H. Allen The CERT Guide to System and Network Security Practices , 2001 .

[26]  Denis Royston Towill,et al.  Simplified material flow holds the key to supply chain integration , 2003 .

[27]  Marshall L. Fisher,et al.  Supply Chain Inventory Management and the Value of Shared Information , 2000 .

[28]  Chris Clifton,et al.  SECURITY AND PRIVACY IMPLICATIONS OF DATA MINING , 1996 .

[29]  David C. Yen,et al.  The New Spectrum of the Cross-Enterprise Solution: The Integration of Supply Chain Management and Enterprise Resources Planning Systems , 2000, J. Comput. Inf. Syst..

[30]  Ari Juels,et al.  Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.

[31]  H.L. Lee,et al.  Aligning Supply Chain Strategies with Product Uncertainties , 2002, IEEE Engineering Management Review.

[32]  Fu-Ren Lin,et al.  Effects of information sharing on supply chain performance in electronic commerce , 2002, IEEE Trans. Engineering Management.

[33]  J. Jayaram,et al.  Supply Chain Management: A Strategic Perspective , 1997 .

[34]  M. Warren,et al.  Cyber attacks against supply chain management systems: A short note , 2000 .