Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection

Information leakage in supply chains is drawing more and more attention in supply chain management. Unlike existing research, which usually focuses on the effect of information leakage on the supply chain’s material and information flow, this paper aims to evaluate and mitigate the risk of information leakage. First, we formulate the problem of information leakage caused by inferences in a two-level supply chain where potential competition may exist between a supplier and the manufacturer. Second, we propose a method to mitigate the risk of such information leakage through optimal supplier selection. An example is used to demonstrate the problem and our proposed approach.

[1]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[2]  Seng-Phil Hong,et al.  Access control in collaborative systems , 2005, CSUR.

[3]  JungHyun Han,et al.  Hierarchical Role-Based Viewing for Multilevel Information Security in Collaborative CAD , 2006, J. Comput. Inf. Sci. Eng..

[4]  P. Trott,et al.  Outsourcing, information leakage and the risk of losing technology based competencies , 2006 .

[5]  Lode Li Information Sharing in a Supply Chain with Horizontal Competition , 2002, Manag. Sci..

[6]  Shi-Jie Chen,et al.  A systematic approach for supply chain improvement using design structure matrix , 2007, J. Intell. Manuf..

[7]  Li Chen,et al.  Internet-enabled real-time collaborative assembly modeling via an e-Assembly system: status and promise , 2004, Comput. Aided Des..

[8]  George Q. Huang,et al.  The impacts of sharing production information on supply chain dynamics: A review of the literature , 2003 .

[9]  Thomas L. Saaty,et al.  Fundamentals of the analytic network process — multiple networks with benefits, costs, opportunities and risks , 2004 .

[10]  Samuel H. Huang,et al.  Comprehensive and configurable metrics for supplier selection , 2007 .

[11]  A. Yao,et al.  Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.

[12]  Cemalettin Kubat,et al.  A hybrid intelligent approach for supply chain management system , 2012, J. Intell. Manuf..

[13]  Soonhung Han,et al.  Protection of intellectual property based on a skeleton model in product design collaboration , 2009, Comput. Aided Des..

[14]  Yuh-Min Chen,et al.  Developing a trust evaluation method between co-workers in virtual project team for enabling resource sharing and collaboration , 2008, Comput. Ind..

[15]  Göran Svensson,et al.  A conceptual framework for the analysis of vulnerability in supply chains , 2000 .

[16]  Uta Jüttner Supply chain risk management: Understanding the business requirements from a practitioner perspective , 2005 .

[17]  Wei Liu,et al.  Formalization of design chain management using environment-based design (EBD) theory , 2013, J. Intell. Manuf..

[18]  JungHyun Han,et al.  Role-based viewing envelopes for information protection in collaborative modeling , 2004, Comput. Aided Des..

[19]  Yan Wang,et al.  Design formalism for collaborative assembly design , 2004, Comput. Aided Des..

[20]  Manu Goyal,et al.  Strategic Information Management Under Leakage in a Supply Chain , 2009, Manag. Sci..

[21]  Gary W. Dickson,et al.  AN ANALYSIS OF VENDOR SELECTION SYSTEMS AND DECISIONS , 1966 .

[22]  Hau L. Lee,et al.  Information sharing in a supply chain , 2000, Int. J. Manuf. Technol. Manag..

[23]  Hongtao Li,et al.  Modeling and evaluating information leakage caused by inferences in supply chains , 2011, Comput. Ind..

[24]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2000, Journal of Cryptology.

[25]  PAMELA MCCAULEY-BELL Intelligent agent characterization and uncertainty management with fuzzy set theory: a tool to support early supplier integration , 1999 .

[26]  C. Kahraman,et al.  Multi‐criteria supplier selection using fuzzy AHP , 2003 .

[27]  Rajit Gadh,et al.  Collaborative virtual prototyping of product assemblies over the Internet , 2002, Comput. Aided Des..

[28]  José Carlos Brustoloni,et al.  Intellectual Property Protection in Collaborative Design through Lean Information Modeling and Sharing , 2006, J. Comput. Inf. Sci. Eng..

[29]  Naixue Xiong,et al.  Intelligent model design of cluster supply chain with horizontal cooperation , 2012, J. Intell. Manuf..

[30]  M. Christopher,et al.  Supply chain risk management: outlining an agenda for future research , 2003 .

[31]  D. Neiger,et al.  Supply chain risk identification with value-focused process engineering , 2009 .

[32]  Andrew Chi-Chih Yao,et al.  How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).

[33]  L. D. Boer,et al.  A review of methods supporting supplier selection , 2001 .

[34]  G. Zsidisin,et al.  Managing Supply Risk with Early Supplier Involvement: A Case Study and Research Propositions , 2005 .

[35]  Yong Zeng,et al.  A science-based approach to product design theory Part II: formulation of design requirements and products , 1999 .

[36]  Kevin McCormack,et al.  Analysing risks in supply networks to facilitate outsourcing decisions , 2010 .

[37]  Hicham G. Elmongui,et al.  Secure supply-chain protocols , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..

[38]  René V. Mayorga,et al.  Supply chain management: a modular Fuzzy Inference System approach in supplier selection for new product development , 2008, J. Intell. Manuf..

[39]  R. Eltantawy,et al.  Securing the upstream supply chain: a risk management approach , 2004 .

[40]  Martin W. P. Savelsbergh,et al.  Branch-and-Price: Column Generation for Solving Huge Integer Programs , 1998, Oper. Res..

[41]  Najla Aissaoui,et al.  Supplier selection and order lot sizing modeling: A review , 2007, Comput. Oper. Res..

[42]  Ozden Ustun,et al.  Analytic network process and multi-period goal programming integration in purchasing decisions , 2009, Comput. Ind. Eng..

[43]  Hongtao Zhang VERTICAL INFORMATION EXCHANGE IN A SUPPLY CHAIN WITH DUOPOLY RETAILERS , 2002 .

[44]  Hyunseung Choo,et al.  Multi-Level modeling and access control for data sharing in collaborative design , 2006, Adv. Eng. Informatics.

[45]  W. B. Lee,et al.  A security model for distributed product data management system , 2003, Comput. Ind..

[46]  J. R. Carter,et al.  An analysis of supply risk assessment techniques , 2004 .

[47]  Hau L. Lee,et al.  Mitigating supply chain risk through improved confidence , 2004 .

[48]  G. Svensson A conceptual framework of vulnerability in firms’ inbound and outbound logistics flows , 2002 .

[49]  Ezgi Aktar Demirtaş,et al.  An integrated multiobjective decision making process for supplier selection and order allocation , 2008 .

[50]  Ravi S. Sandhu,et al.  RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control" , 2007, IEEE Security & Privacy.

[51]  Amy Hsin-I Lee,et al.  A fuzzy supplier selection model with the consideration of benefits, opportunities, costs and risks , 2009, Expert Syst. Appl..

[52]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[53]  M. Christopher,et al.  The impact of product design on supply chain risk: A case study , 2008 .