Entropy assessment of supply chain disruption
暂无分享,去创建一个
Hing Kai Chan | Xiaojun Wang | Olatunde A. Durowoju | Olatunde Amoo Durowoju | Xiaojun Wang | H. Chan
[1] M. Shaw,et al. A strategic analysis of inter organizational information sharing , 2006, Decis. Support Syst..
[2] Frank Wiengarten,et al. Collaborative supply chain practices and performance: exploring the key role of information quality , 2010 .
[3] S. Dani. Predicting and Managing Supply Chain Risks , 2009 .
[4] Hong Yan,et al. Benefits of information sharing with supply chain partnerships , 2001, Ind. Manag. Data Syst..
[5] Barbara B. Flynn,et al. The impact of supply chain integration on performance: A contingency and configuration approach , 2010 .
[6] Subhajyoti Bandyopadhyay,et al. Cloud computing - The business perspective , 2011, Decis. Support Syst..
[7] Mahender Singh,et al. Quantifying supply chain disruption risk using Monte Carlo and discrete-event simulation , 2009, Proceedings of the 2009 Winter Simulation Conference (WSC).
[8] Jennifer Blackhurst,et al. The Severity of Supply Chain Disruptions: Design Characteristics and Mitigation Capabilities , 2007, Decis. Sci..
[9] Ganthan Narayana Samy,et al. Security threats categories in healthcare information systems , 2010, Health Informatics J..
[10] Leon A. Kappelman,et al. A manager’s guide to electronic data interchange: doing business on the information superhighway , 1996 .
[11] Hing Kai Chan,et al. Supply chain planning and configuration in the global arena—A syncretic perspective , 2010 .
[12] Amir M. Sharif,et al. It's written in the cloud: the hype and promise of cloud computing , 2010, J. Enterp. Inf. Manag..
[13] Jao-Hong Cheng,et al. Inter-organizational relationships and information sharing in supply chains , 2011, Int. J. Inf. Manag..
[14] Michele Bezzi,et al. An entropy based method for measuring anonymity , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[15] W. C. Benton,et al. Supply chain practice and information sharing , 2007 .
[16] Edoardo M. Airoldi,et al. An entropy approach to disclosure risk assessment: Lessons from real applications and simulated domains , 2011, Decis. Support Syst..
[17] Elie Ofek,et al. Manufacturer Benefits from Information Integration with Retail Customers , 2004, Manag. Sci..
[18] Hing Kai Chan,et al. Effect of information sharing in supply chains with flexibility , 2009 .
[19] Boaz Ronen,et al. An information entropy approach to the small-lot concept , 1994 .
[20] M. Warren,et al. Cyber attacks against supply chain management systems: A short note , 2000 .
[21] Houston H. Carr,et al. Threats to Information Systems: Today's Reality, Yesterday's Understanding , 1992, MIS Q..
[22] Roger Smith,et al. Computing in the Cloud , 2009 .
[23] Thomas J. Goldsby,et al. Supply chain risks: a review and typology , 2009 .
[24] Binshan Lin,et al. Accessing information sharing and information quality in supply chain management , 2006, Decis. Support Syst..
[25] Houston H. Carr,et al. Risk Analysis for Information Technology , 1991, J. Manag. Inf. Syst..
[26] Janet Efstathiou,et al. An information‐theoretic methodology for measuring the operational complexity of supplier‐customer systems , 2002 .
[27] Chun-Che Huang,et al. Sharing knowledge in a supply chain using the semantic web , 2010, Expert Syst. Appl..
[28] Michael E. Whitman. Enemy at the gate: threats to information security , 2003, CACM.
[29] Xiaojun Wang,et al. The impact of security and scalability of cloud service on supply chain performance , 2011 .
[30] Jun Pang,et al. Measuring Anonymity with Relative Entropy , 2006, Formal Aspects in Security and Trust.
[31] César Martínez-Olvera,et al. Entropy as an assessment tool of supply chain information sharing , 2008, Eur. J. Oper. Res..
[32] Xun Xu,et al. From cloud computing to cloud manufacturing , 2012 .
[33] Angappa Gunasekaran,et al. Information systems in supply chain integration and management , 2004, Eur. J. Oper. Res..
[34] G. Stoneburner,et al. Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .
[35] C. E. SHANNON,et al. A mathematical theory of communication , 1948, MOCO.
[36] David F. Pyke,et al. Exploiting timely demand information to reduce inventories , 1996 .
[37] Sunder Kekre,et al. Strategic and Operational Benefits of Electronic Integration in B2B Procurement Processes , 2002, Manag. Sci..
[38] Desheng Dash Wu,et al. A review of enterprise risk management in supply chain , 2010, Kybernetes.
[39] Jerry C. Wei,et al. Impact of eBusiness technologies on operational performance: The role of production information integration in the supply chain , 2007 .
[40] Won Kim,et al. The dark side of the Internet: Attacks, costs and responses , 2011, Inf. Syst..
[41] Loren Paul Rees,et al. Decision support for Cybersecurity risk planning , 2011, Decis. Support Syst..
[42] Y. K. Tse,et al. Quality risk in global supply network , 2010, 2010 8th International Conference on Supply Chain Management and Information.
[43] George Q. Huang,et al. Impact of information sharing on inventory replenishment in divergent supply chains , 2004 .
[44] Rob Dekkers,et al. Industrial Networks of the Future: Review of Research and Practice , 2009 .
[45] Kin Keung Lai,et al. GBOM-oriented management of production disruption risk and optimization of supply chain construction , 2014, Expert Syst. Appl..
[46] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[47] Taho Yang,et al. Evaluation of robustness of supply chain information-sharing strategies using a hybrid Taguchi and multiple criteria decision-making method , 2011 .
[48] G Frizelle,et al. Measuring complexity as an aid to developing operational strategy , 1995 .
[49] T. R. Rakes,et al. Managing supply chain risk and disruption from IT security incidents , 2009 .
[50] Abby Ghobadian,et al. Digital/web‐based technology in purchasing and supply management: a UK study , 2008 .
[51] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[52] Michael D. Clements,et al. Disruptions in Information Flow: A Revenue Costing Supply Chain Dilemma , 2008, J. Theor. Appl. Electron. Commer. Res..
[53] I. Mitroff,et al. Preparing for evil. , 2003, Harvard business review.
[54] Hau L. Lee,et al. Information distortion in a supply chain: the bullwhip effect , 1997 .
[55] Michael F. Smith,et al. Strategic Internet application trends in supply chain management , 2003 .
[56] Nezih Altay,et al. IMPACT OF DISASTERS ON FIRMS IN DIFFERENT SECTORS: IMPLICATIONS FOR SUPPLY CHAINS , 2010 .
[57] Mu-Chen Chen,et al. Evaluating the cross-efficiency of information sharing in supply chains , 2010, Expert Syst. Appl..
[58] Mike Gregory,et al. Operation and performance of international manufacturing networks , 2003 .
[59] Hing Kai Chan,et al. The Role of Integration in Information Security Breach Incidents , 2012 .
[60] Robyn L. Raschke. Process-based view of agility: The value contribution of IT and the effects on process outcomes , 2010, Int. J. Account. Inf. Syst..