The impact of security and scalability of cloud service on supply chain performance
暂无分享,去创建一个
Xiaojun Wang | Hing Kai Chan | Olatunde A. Durowoju | Olatunde Amoo Durowoju | Xiaojun Wang | H. Chan | Olatunde Durowoju
[1] Oliver Prokein,et al. Management of Security Risks – A Controlling Model for Banking Companies , 2008 .
[2] Frank Wiengarten,et al. Collaborative supply chain practices and performance: exploring the key role of information quality , 2010 .
[3] David F. Pyke,et al. Exploiting timely demand information to reduce inventories , 1996 .
[4] Patricio Donoso,et al. Assessing an ambulance service with queuing theory , 2008, Comput. Oper. Res..
[5] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[6] Taho Yang,et al. Evaluation of robustness of supply chain information-sharing strategies using a hybrid Taguchi and multiple criteria decision-making method , 2011 .
[7] Janet Efstathiou,et al. An information‐theoretic methodology for measuring the operational complexity of supplier‐customer systems , 2002 .
[8] Che-Wei Chang,et al. THE LEVELS OF INFORMATION TECHNOLOGY ADOPTION, BUSINESS NETWORK, AND A STRATEGIC POSITION MODEL FOR EVALUATING SUPPLY CHAIN INTEGRATION , 2004 .
[9] P. Burke. The Output Process of a Stationary $M/M/s$ Queueing System , 1968 .
[10] Jean Hitchings,et al. Deficiencies of the traditional approach to information security and the requirements for a new methodology , 1995, Comput. Secur..
[11] Jinxing Xie,et al. Effects of inventory policy on supply chain performance: A simulation study of critical decision parameters , 2008, Comput. Ind. Eng..
[12] Minder Chen,et al. Web Services Enabled Procurement in the Extended Enterprise: An Architectural Design and Implementation , 2003, J. Electron. Commer. Res..
[13] Edoardo M. Airoldi,et al. An entropy approach to disclosure risk assessment: Lessons from real applications and simulated domains , 2011, Decis. Support Syst..
[14] Myoung-Ho Kim,et al. An analysis of the optimal number of servers in distributed client/server environments , 2004, Decis. Support Syst..
[15] Averill M. Law,et al. Simulation modelling and analysis , 1991 .
[16] Werner Jammernegg,et al. Performance improvement of supply chain processes by coordinated inventory and capacity management , 2007 .
[17] Hing Kai Chan,et al. Effect of information sharing in supply chains with flexibility , 2009 .
[18] Amir M. Sharif,et al. It's written in the cloud: the hype and promise of cloud computing , 2010, J. Enterp. Inf. Manag..
[19] Yves Dallery,et al. Queueing models for full-flexible multi-class call centers with real-time anticipated delays , 2009 .
[20] Michael F. Smith,et al. Strategic Internet application trends in supply chain management , 2003 .
[21] Jayashankar M. Swaminathan,et al. Modeling Supply Chain Dynamics: A Multiagent Approach , 1998 .
[22] Chun-Che Huang,et al. Sharing knowledge in a supply chain using the semantic web , 2010, Expert Syst. Appl..
[23] Michael E. Whitman. Enemy at the gate: threats to information security , 2003, CACM.
[24] Yacov Y. Haimes,et al. Risk modeling, assessment, and management , 1998 .
[25] Won Kim,et al. The dark side of the Internet: Attacks, costs and responses , 2011, Inf. Syst..
[26] Roger Smith. Computing Beyond the Firewall , 2010 .
[27] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[28] Vineet Padmanabhan,et al. Comments on "Information Distortion in a Supply Chain: The Bullwhip Effect" , 1997, Manag. Sci..
[29] Ting Zhang,et al. The impact of collaborative transportation management on supply chain performance , 2010, 2010 8th International Conference on Supply Chain Management and Information.
[30] N. Gautam,et al. Computing, Artificial Intelligence and Information Technology Performance analysis and optimization of web proxy servers and mirror sites , 2002 .
[31] Mahesh S. Raisinghani,et al. THE INFORMATION TECHNOLOGY AND TELECOMMUNICATIONS SECURITY IMPERATIVE: IMPORTANT ISSUES AND DRIVERS , 2002 .
[32] Scott R. Swenseth,et al. Evaluating vendor-managed inventory (VMI) in non-traditional environments using simulation , 2008 .
[33] Mahesh S. Raisinghani,et al. The Information Technology and Telecommunications (or E-Business) Security Imperative: Important Issues and Drivers , 2002, J. Electron. Commer. Res..
[34] Mark Ryan,et al. Cloud computing privacy concerns on our doorstep , 2011, Commun. ACM.
[35] F. Chan,et al. Comparative study of adaptability and flexibility in distributed manufacturing supply chains , 2010, Decis. Support Syst..
[36] Loren Paul Rees,et al. Decision support for Cybersecurity risk planning , 2011, Decis. Support Syst..
[37] J. Keynes. A Treatise on Probability. , 1923 .
[38] Kaushik Dutta,et al. Cost-based decision-making in middleware virtualization environments , 2011, Eur. J. Oper. Res..
[39] Michael D. Clements,et al. Disruptions in Information Flow: A Revenue Costing Supply Chain Dilemma , 2008, J. Theor. Appl. Electron. Commer. Res..
[40] O. M. Akanle,et al. An agent-based approach for e-manufacturing and supply chain integration , 2006, Comput. Ind. Eng..
[41] Brian W. Fitzpatrick,et al. The Case Against Data Lock-in , 2010, ACM Queue.
[42] Roger Smith,et al. Computing in the Cloud , 2009 .
[43] Xun Xu,et al. From cloud computing to cloud manufacturing , 2012 .
[44] Ricki G. Ingalls,et al. Introduction to simulation , 2001, 2008 Winter Simulation Conference.
[45] Daniel E. Rivera,et al. Simulation-based optimization of process control policies for inventory management in supply chains , 2006, Autom..
[46] Dave Durkee,et al. Why cloud computing will never be free , 2010, ACM Queue.
[47] Rynson W. H. Lau,et al. A performance study on multi-server DVE systems , 2003, Inf. Sci..
[48] M. Shaw,et al. A strategic analysis of inter organizational information sharing , 2006, Decis. Support Syst..
[49] Subhas C. Misra,et al. Identification of a company's suitability for the adoption of cloud computing and modelling its corresponding Return on Investment , 2011, Math. Comput. Model..
[50] Subhajyoti Bandyopadhyay,et al. Cloud computing - The business perspective , 2011, Decis. Support Syst..
[51] M. Warren,et al. Cyber attacks against supply chain management systems: A short note , 2000 .
[52] Cynthia Lynn Bellefeuille. Quantifying and managing the risk of information security breaches participants in a supply chain , 2005 .
[53] César Martínez-Olvera,et al. Entropy as an assessment tool of supply chain information sharing , 2008, Eur. J. Oper. Res..
[54] T. Hennig-Thurau,et al. The impact of customer satisfaction and relationship quality on customer retention: A critical reassessment and model development , 1997 .
[55] George Q. Huang,et al. Impact of information sharing on inventory replenishment in divergent supply chains , 2004 .
[56] Huaiqing Wang,et al. On-demand e-supply chain integration: A multi-agent constraint-based approach , 2008, Expert Syst. Appl..
[57] Brian W. Fitzpatrick,et al. The Case Against Data Lock-in , 2010, ACM Queue.
[58] Di Jin,et al. Modeling and simulation of performance analysis for a cluster-based Web server , 2006, Simul. Model. Pract. Theory.
[59] G Frizelle,et al. Measuring complexity as an aid to developing operational strategy , 1995 .
[60] Robert E. Shannon,et al. Introduction to the art and science of simulation , 1998, 1998 Winter Simulation Conference. Proceedings (Cat. No.98CH36274).
[61] Susan M. Broniarczyk,et al. Factors influencing the likelihood of customer defection: The role of consumer knowledge , 2003 .
[62] George Q. Huang,et al. Web‐based simulation portal for investigating impacts of sharing production information on supply chain dynamics from the perspective of inventory allocation , 2002 .
[63] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[64] Michael A. Cusumano,et al. Cloud computing and SaaS as new computing platforms , 2010, CACM.