Entropy assessment of supply chain disruption

Purpose – Manufacturing organizations and networks are heavily dependent on the flow of information within and across organization boundaries. A disruption in information flow might interrupt the operations of the organization and make management even more difficult. The purpose of this paper is to incorporate information theory approach to investigate the perturbation introduced into a manufacturing organization as a result of disruption in the flow of critical information needed in manufacturing operations.Design/methodology/approach – This study proposes the use of entropy theory to assess the level of risk introduced by different sources of perturbation into the material flow stream and the use of discrete event simulation to investigate the impact of the resulting disruption on collaborating members.Findings – The result of the analysis carried out on the effect of system failure on supply chain performance revealed that the retailer experiences the most uncertainty in the supply chain while the hold...

[1]  M. Shaw,et al.  A strategic analysis of inter organizational information sharing , 2006, Decis. Support Syst..

[2]  Frank Wiengarten,et al.  Collaborative supply chain practices and performance: exploring the key role of information quality , 2010 .

[3]  S. Dani Predicting and Managing Supply Chain Risks , 2009 .

[4]  Hong Yan,et al.  Benefits of information sharing with supply chain partnerships , 2001, Ind. Manag. Data Syst..

[5]  Barbara B. Flynn,et al.  The impact of supply chain integration on performance: A contingency and configuration approach , 2010 .

[6]  Subhajyoti Bandyopadhyay,et al.  Cloud computing - The business perspective , 2011, Decis. Support Syst..

[7]  Mahender Singh,et al.  Quantifying supply chain disruption risk using Monte Carlo and discrete-event simulation , 2009, Proceedings of the 2009 Winter Simulation Conference (WSC).

[8]  Jennifer Blackhurst,et al.  The Severity of Supply Chain Disruptions: Design Characteristics and Mitigation Capabilities , 2007, Decis. Sci..

[9]  Ganthan Narayana Samy,et al.  Security threats categories in healthcare information systems , 2010, Health Informatics J..

[10]  Leon A. Kappelman,et al.  A manager’s guide to electronic data interchange: doing business on the information superhighway , 1996 .

[11]  Hing Kai Chan,et al.  Supply chain planning and configuration in the global arena—A syncretic perspective , 2010 .

[12]  Amir M. Sharif,et al.  It's written in the cloud: the hype and promise of cloud computing , 2010, J. Enterp. Inf. Manag..

[13]  Jao-Hong Cheng,et al.  Inter-organizational relationships and information sharing in supply chains , 2011, Int. J. Inf. Manag..

[14]  Michele Bezzi,et al.  An entropy based method for measuring anonymity , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[15]  W. C. Benton,et al.  Supply chain practice and information sharing , 2007 .

[16]  Edoardo M. Airoldi,et al.  An entropy approach to disclosure risk assessment: Lessons from real applications and simulated domains , 2011, Decis. Support Syst..

[17]  Elie Ofek,et al.  Manufacturer Benefits from Information Integration with Retail Customers , 2004, Manag. Sci..

[18]  Hing Kai Chan,et al.  Effect of information sharing in supply chains with flexibility , 2009 .

[19]  Boaz Ronen,et al.  An information entropy approach to the small-lot concept , 1994 .

[20]  M. Warren,et al.  Cyber attacks against supply chain management systems: A short note , 2000 .

[21]  Houston H. Carr,et al.  Threats to Information Systems: Today's Reality, Yesterday's Understanding , 1992, MIS Q..

[22]  Roger Smith,et al.  Computing in the Cloud , 2009 .

[23]  Thomas J. Goldsby,et al.  Supply chain risks: a review and typology , 2009 .

[24]  Binshan Lin,et al.  Accessing information sharing and information quality in supply chain management , 2006, Decis. Support Syst..

[25]  Houston H. Carr,et al.  Risk Analysis for Information Technology , 1991, J. Manag. Inf. Syst..

[26]  Janet Efstathiou,et al.  An information‐theoretic methodology for measuring the operational complexity of supplier‐customer systems , 2002 .

[27]  Chun-Che Huang,et al.  Sharing knowledge in a supply chain using the semantic web , 2010, Expert Syst. Appl..

[28]  Michael E. Whitman Enemy at the gate: threats to information security , 2003, CACM.

[29]  Xiaojun Wang,et al.  The impact of security and scalability of cloud service on supply chain performance , 2011 .

[30]  Jun Pang,et al.  Measuring Anonymity with Relative Entropy , 2006, Formal Aspects in Security and Trust.

[31]  César Martínez-Olvera,et al.  Entropy as an assessment tool of supply chain information sharing , 2008, Eur. J. Oper. Res..

[32]  Xun Xu,et al.  From cloud computing to cloud manufacturing , 2012 .

[33]  Angappa Gunasekaran,et al.  Information systems in supply chain integration and management , 2004, Eur. J. Oper. Res..

[34]  G. Stoneburner,et al.  Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .

[35]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[36]  David F. Pyke,et al.  Exploiting timely demand information to reduce inventories , 1996 .

[37]  Sunder Kekre,et al.  Strategic and Operational Benefits of Electronic Integration in B2B Procurement Processes , 2002, Manag. Sci..

[38]  Desheng Dash Wu,et al.  A review of enterprise risk management in supply chain , 2010, Kybernetes.

[39]  Jerry C. Wei,et al.  Impact of eBusiness technologies on operational performance: The role of production information integration in the supply chain , 2007 .

[40]  Won Kim,et al.  The dark side of the Internet: Attacks, costs and responses , 2011, Inf. Syst..

[41]  Loren Paul Rees,et al.  Decision support for Cybersecurity risk planning , 2011, Decis. Support Syst..

[42]  Y. K. Tse,et al.  Quality risk in global supply network , 2010, 2010 8th International Conference on Supply Chain Management and Information.

[43]  George Q. Huang,et al.  Impact of information sharing on inventory replenishment in divergent supply chains , 2004 .

[44]  Rob Dekkers,et al.  Industrial Networks of the Future: Review of Research and Practice , 2009 .

[45]  Kin Keung Lai,et al.  GBOM-oriented management of production disruption risk and optimization of supply chain construction , 2014, Expert Syst. Appl..

[46]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[47]  Taho Yang,et al.  Evaluation of robustness of supply chain information-sharing strategies using a hybrid Taguchi and multiple criteria decision-making method , 2011 .

[48]  G Frizelle,et al.  Measuring complexity as an aid to developing operational strategy , 1995 .

[49]  T. R. Rakes,et al.  Managing supply chain risk and disruption from IT security incidents , 2009 .

[50]  Abby Ghobadian,et al.  Digital/web‐based technology in purchasing and supply management: a UK study , 2008 .

[51]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[52]  Michael D. Clements,et al.  Disruptions in Information Flow: A Revenue Costing Supply Chain Dilemma , 2008, J. Theor. Appl. Electron. Commer. Res..

[53]  I. Mitroff,et al.  Preparing for evil. , 2003, Harvard business review.

[54]  Hau L. Lee,et al.  Information distortion in a supply chain: the bullwhip effect , 1997 .

[55]  Michael F. Smith,et al.  Strategic Internet application trends in supply chain management , 2003 .

[56]  Nezih Altay,et al.  IMPACT OF DISASTERS ON FIRMS IN DIFFERENT SECTORS: IMPLICATIONS FOR SUPPLY CHAINS , 2010 .

[57]  Mu-Chen Chen,et al.  Evaluating the cross-efficiency of information sharing in supply chains , 2010, Expert Syst. Appl..

[58]  Mike Gregory,et al.  Operation and performance of international manufacturing networks , 2003 .

[59]  Hing Kai Chan,et al.  The Role of Integration in Information Security Breach Incidents , 2012 .

[60]  Robyn L. Raschke Process-based view of agility: The value contribution of IT and the effects on process outcomes , 2010, Int. J. Account. Inf. Syst..