Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (2024)

Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (1) https://doi.org/10.1007/s10845-011-0527-3

Journal: Journal of Intelligent Manufacturing, 2011, №4, p.1351-1364

Publisher: Springer Science and Business Media LLC

Authors: Da Yong Zhang, Xinlin Cao, Lingyu Wang, Yong Zeng

List of references

  1. Aissaoui N., Haouari M., Hassini E. (2007) Supplier selection and order lot sizing modeling: A review. Computers & Operations Research 34(12): 3516–3540
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (2) https://doi.org/10.1016/j.cor.2006.01.016
  2. Anand K. S., Goyal M. (2009) Strategic information management under leakage in a supply chain. Management Science 55(3): 438–452
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (3) https://doi.org/10.1287/mnsc.1080.0930
  3. Atallah, M. J., Elmongui, H. G., Deshpande, V., & Schwarz, L. B. (2003). Secure supply-chain protocols. In: Proceedings of IEEE international conference on E-commerce 2003 (pp. 293–302).
  4. Barnhart C., Johnson E. L., Nemhauser G. L., Savelsbergh M. W. P., Vance P. H. (1998) Branch-and-price: Column generation for solving huge integer programs. Operations Research 46(3): 316–329. doi: 10.1287/opre.46.3.316
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (4) https://doi.org/10.1287/opre.46.3.316
  5. Carrera D., Mayorga R. (2008) Supply chain management: A modular fuzzy inference system approach in supplier selection for new product development. Journal of Intelligent Manufacturing 19(1): 1–12
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (5) https://doi.org/10.1007/s10845-007-0041-9
  6. Cera C. D., Braude I., Kim T., Han J., Regli W. C. (2006) Hierarchical role-based viewing for multi-level information security in collaborative CAD. Journal of Computing and Information Science in Engineering 6(1): 2–10
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (6) https://doi.org/10.1115/1.2161226
  7. Cera C. D., Kim T., Han J., Regli W. C. (2004) Role-based viewing envelopes for information protection in collaborative modeling. Computer-Aided Design 36(9): 873–886
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (7) https://doi.org/10.1016/j.cad.2003.09.014
  8. Chen L., Song Z., Feng L. (2004) Internet-enabled real-time collaborative assembly modeling via an e-assembly system: Status and promise. Computer-Aided Design 36(9): 835–847
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (8) https://doi.org/10.1016/j.cad.2003.09.010
  9. Chen S. J. G., Huang E. (2007) A systematic approach for supply chain improvement using design structure matrix. Journal of Intelligent Manufacturing 18(2): 285–299
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (9) https://doi.org/10.1007/s10845-007-0022-z
  10. Chen T. Y., Chen Y. M., Chu H. C. (2008) Developing a trust evaluation method between co-workers in virtual project team for enabling resource sharing and collaboration. Computers in Industry 59(6): 565–579
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (10) https://doi.org/10.1016/j.compind.2008.01.001
  11. Christopher M., Lee H. (2004) Mitigating supply chain risk through improved confidence. International Journal of Physical Distribution & Logistics Management 34(5): 388–396
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (11) https://doi.org/10.1108/09600030410545436
  12. de Boer L., Labro E., Morlacchi P. (2001) A review of methods supporting supplier selection. European Journal of Purchasing & Supply Management 7(2): 75–89
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (12) https://doi.org/10.1016/S0969-7012(00)00028-9
  13. Demirtas E. A., Ustun O. (2008) An integrated multiobjective decision making process for supplier selection and order allocation. Omega 36(1): 76–90
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (13) https://doi.org/10.1016/j.omega.2005.11.003
  14. Demirtas E. A., Ustun O. (2009) Analytic network process and multi-period goal programming integration in purchasing decisions. Computers & Industrial Engineering 56(2): 677–690
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (14) https://doi.org/10.1016/j.cie.2006.12.006
  15. Dickson G. W. (1966) An analysis of vendor selection systems and decisions. Journal of Purchasing 2(1): 5–17
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (15) https://doi.org/10.1111/j.1745-493X.1966.tb00818.x
  16. Ferraiolo D. F., Kuhn R., Sandhu R. S. (2007) RBAC standard rationale: Comments on a critique of the ANSI standard on role based access control. IEEE Security & Privacy 5(6): 51–53
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (16) https://doi.org/10.1109/MSP.2007.173
  17. Giunipero L. C., Eltantawy R. A. (2004) Securing the upstream supply chain: A risk management approach. International Journal of Physical Distribution & Logistics Management 34(9): 698–713
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (17) https://doi.org/10.1108/09600030410567478
  18. Goldreich, O., Micali, S., & Wigderson, A. (1987). How to play any mental game. In: Proceedings of the 19th annual ACM conference on theory of computing (pp. 218–229).
  19. Hoecht A., Trott P. (2006) Outsourcing, information leakage and the risk of losing technology-based competencies. European Business Review 18(5): 395–412
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (18) https://doi.org/10.1108/09555340610686967
  20. Huang G. Q., Lau J. S. K., Mak K. L. (2003) The impacts of sharing production information on supply chain dynamics: A review of the literature. International Journal of Production Research 41(7): 1483–1517
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (19) https://doi.org/10.1080/0020754031000069625
  21. Huang S. H., Keskar H. (2007) Comprehensive and configurable metrics for supplier selection. International Journal of Production Economics 105(2): 510–523
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (20) https://doi.org/10.1016/j.ijpe.2006.04.020
  22. Juttner U. (2005) Supply chain risk management: Understanding the business requirements from a practitioner perspective. The International Journal of Logistics Management 16(1): 120–141
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (21) https://doi.org/10.1108/09574090510617385
  23. Juttner U., Peck H., Christopher M. (2003) Supply chain risk management: Outlining an agenda for future research. International Journal of Logistics: Research and Applications 6(4): 197–210
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (22) https://doi.org/10.1080/13675560310001627016
  24. Kahraman C., Cebeci U., Ulukan Z. (2003) Multi-criteria supplier selection using fuzzy AHP. Logistics Information Management 16(6): 382–394
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (23) https://doi.org/10.1108/09576050310503367
  25. Khan O., Christopher M., Burnes B. (2008) The impact of product design on supply chain risk: A case study. International Journal of Physical Distribution & Logistics Management 38(5): 412–432
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (24) https://doi.org/10.1108/09600030810882834
  26. Kim K. Y., Wang Y., Muogboh O. S., Nnaji B. O. (2004) Design formalism for collaborative assembly design. Computer-Aided Design 36(9): 849–871
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (25) https://doi.org/10.1016/j.cad.2003.09.011
  27. Kim T., Cera C. D., Regli W. C., Choo H., Han J. (2006) Multi-level modeling and access control for data sharing in collaborative design. Advanced Engineering Informatics 20(1): 47–57
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (26) https://doi.org/10.1016/j.aei.2005.05.016
  28. Kubat, C., & Yuce, B. (2010). A hybrid intelligent approach for supply chain management system. Journal of Intelligent Manufacturing (in press).
  29. Lee A. H. I. (2009) A fuzzy supplier selection model with the consideration of benefits, opportunities, costs and risks. Expert Systems with Applications 36(2, Part 2): 2879–2893
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (27) https://doi.org/10.1016/j.eswa.2008.01.045
  30. Lee H. L., Whang S. (2000) Information sharing in a supply chain. International Journal of Manufacturing Technology and Management 1(1): 79–93
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (28) https://doi.org/10.1504/IJMTM.2000.001329
  31. Leong K. K., Yu K. M., Lee W. B. (2003) A security model for distributed product data management system. Computers in Industry 50(2): 179–193
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (29) https://doi.org/10.1016/S0166-3615(02)00119-7
  32. Li L. (2002) Information sharing in a supply chain with horizontal competition. Management Science 48(9): 1196–1212
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (30) https://doi.org/10.1287/mnsc.48.9.1196.177
  33. Li, H., & Geng, Y. (2008). Confidential information protection for industry design. Technical report, Concordia Institute for Information Systems Engineering, Concordia University, Montreal.
  34. Li, J., Xiong, N., Park, J., Liu, C., Ma, S., & Cho, S. (2009). Intelligent model design of cluster supply chain with horizontal cooperation. Journal of Intelligent Manufacturing, 1–15.
  35. Lindell Y., Pinkas B. (2002) Privacy preserving data mining. Journal of Cryptology 15(3): 177–206
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (31) https://doi.org/10.1007/s00145-001-0019-2
  36. Lockamy A. III, McCormack K. (2010) Analysing risks in supply networks to facilitate outsouring decisions. International Journal of Production Research 48(2): 593–611
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (32) https://doi.org/10.1080/00207540903175152
  37. Mason-Jones R., Towill D. R. (1998) Shrinking the supply chain uncertainty circle. Control 24(7): 17–22
  38. McCauley-Bell P. (1999) Intelligent agent characterization and uncertainty management with fuzzy set theory: A tool to support early supplier integration. Journal of Intelligent Manufacturing 10(2): 135–147
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (33) https://doi.org/10.1023/A:1008968419061
  39. Mun D., Hwang J., Han S. (2009) Protection of intellectual property based on a skeleton model in product design collaboration. Computer-Aided Design 41(9): 641–648
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (34) https://doi.org/10.1016/j.cad.2009.04.007
  40. Neiger D., Rotaru K., Churilov L. (2009) Supply chain risk identification with value-focused process engineering. Journal of Operations Management 27(2): 154–168
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (35) https://doi.org/10.1016/j.jom.2007.11.003
  41. Saaty T. L. (2004) Fundamentals of the analytic network process-multiple networks with benefits, opportunities, costs and risks. Journal of Systems Science and Systems Engineering 13(3): 348–379
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (36) https://doi.org/10.1007/s11518-006-0171-1
  42. Sandhu R. S., Coyne E. J., Feinstein H. L., Youman C. E. (1996) Role-based access control models. IEEE Computer 29(2): 38–47
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (37) https://doi.org/10.1109/2.485845
  43. Shyamsundar N., Gadh R. (2002) Collaborative virtual prototyping of product assemblies over the Internet. Computer-Aided Design 34(10): 755–768
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (38) https://doi.org/10.1016/S0010-4485(01)00204-4
  44. Sun, X., Zeng, Y., & Liu, W. (2010). Formalization of design chain management using environment-based design (EBD) theory. Journal of Intelligent Manufacturing (accepted).
  45. Svensson G. (2000) A conceptual framework for the analysis of vulnerability in supply chains. International Journal of Physical Distribution & Logistics Management 30(9): 731–750
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (39) https://doi.org/10.1108/09600030010351444
  46. Svensson G. (2002) A conceptual framework of vulnerability in firms’ inbound and outbound logistics flows. International Journal of Physical Distribution & Logistics Management 32(2): 110–134
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (40) https://doi.org/10.1108/09600030210421723
  47. Tolone W., Ahn G. J., Pai T., Hong S. P. (2005) Access control in collaborative systems. ACM Computing Surveys 37(1): 29–41
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (41) https://doi.org/10.1145/1057977.1057979
  48. Wang Y., Ajoku P. N., Brustoloni J. C., Nnaji B. O. (2006) Intellectual property protection in collaborative design through lean information modeling and sharing. Journal of Computing and Information Science in Engineering 6(2): 149–159
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (42) https://doi.org/10.1115/1.2190235
  49. Yao, A. (1986). How to generate and exchange secrete. In: Proceedings of the 27th annual symposium on foundations of computer science (pp. 162–167).
  50. Zeng Y., Gu P. (1999) A science-based approach to product design theory part II: Formulation of design requirements and products. Robotics and Computer-Integrated Manufacturing 15(4): 341–352
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (43) https://doi.org/10.1016/S0736-5845(99)00029-0
  51. Zhang H. (2002) Vertical information exchange in a supply chain with duopoly retailers. Production and Operations Management 11(4): 531–546
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (44) https://doi.org/10.1111/j.1937-5956.2002.tb00476.x
  52. Zhang D.Y., Zeng Y., Wang L., Li H., Geng Y. (2011) Modeling and evaluating information leakage caused by inferences in supply chains. Computer in Industry 62(3): 351–363
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (45) https://doi.org/10.1016/j.compind.2010.10.002
  53. Zsidisin G. A., Ellram L. M., Carter J. R., Cavinato J. L. (2004) An analysis of supply risk assessment techniques. International Journal of Physical Distribution & Logistics Management 34(5): 397–413
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (46) https://doi.org/10.1108/09600030410545445
  54. Zsidisin G. A., Smith M. E. (2005) Managing supply risk with early supplier involvement: A case study and research propositions. Journal of Supply Chain Management 41(4): 44–57
    Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (47) https://doi.org/10.1111/j.1745-493X.2005.04104005.x

Publications that cite this publication

Risk assessment in supply chains: a state-of-the-art review of methodologies and their applications

Nishat Alam Choudhary, Shalabh Singh, Tobias Schoenherr, M. Ramkumar

Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (48) https://doi.org/10.1007/s10479-022-04700-9 · Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (49)

2022, Annals of Operations Research, №2, p.565-607

Scopus

WoS

Crossref citations:2

Dark Side of Digitalisation: Discussion on Digital Assets Leakage and Its Protection Mechanisms in Operations and Supply Chain Research

Ying Chen, Fangli Zeng

Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (50) https://doi.org/10.1007/978-981-19-4480-2_4

2022, Responsible Innovation Management Responsible Innovation in Industry, p.65-78

Crossref citations:0

A new newsvendor policy model for dual-sourcing supply chains by considering disruption risk and special order

Ashkan Mohsenzadeh Ledari, Seyed Hamid Reza Pasandideh, Mehrdad Nouri Koupaei

Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (51) https://doi.org/10.1007/s10845-015-1104-y

2015, Journal of Intelligent Manufacturing, №1, p.237-244

Scopus

WoS

Crossref citations:4

Intelligent information sharing among manufacturers in supply networks: supplier selection case

Hyesung Seok, Shimon Y. Nof

Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (52) https://doi.org/10.1007/s10845-015-1159-9

2015, Journal of Intelligent Manufacturing, №5, p.1097-1113

Scopus

WoS

Crossref citations:3

GA–SA/CPM/Markov based dynamic risk-management planning for virtual enterprises

Guanjie Jiang, Min Huang, Chunhui Xu, Xingwei Wang

Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (53) https://doi.org/10.1007/s10845-014-0905-8 · Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (54) Full text

2014, Journal of Intelligent Manufacturing, №5, p.899-910

Scopus

WoS

Crossref citations:1

Ubiquitous-City Integrated Authentication System (UCIAS)

Jae-Soo Jang, Hyung-Min Lim

Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (55) https://doi.org/10.1007/s10845-014-0877-8

2014, Journal of Intelligent Manufacturing, №2, p.347-355

Scopus

WoS

Crossref citations:0

Information and Knowledge Leakage in Supply Chain

Kim Hua Tan, W. P. Wong, Leanne Chung

Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (56) https://doi.org/10.1007/s10796-015-9553-6 · Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (57) Full text

2015, Information Systems Frontiers, №3, p.621-638

Scopus

WoS

Crossref citations:55

Applying the concept of exponential approach to enhance the assessment capability of FMEA

Kuei-Hu Chang, Yung-Chia Chang, Pei-Ting Lai

Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (58) https://doi.org/10.1007/s10845-013-0747-9

2013, Journal of Intelligent Manufacturing, №6, p.1413-1427

Scopus

WoS

Crossref citations:20

Security in Cyber-Enabled Design and Manufacturing: A Survey

Siva Chaitanya Chaduvula, Adam Dachowicz, Mikhail J. Atallah, Jitesh H. Panchal

Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (59) https://doi.org/10.1115/1.4040341

2018, Journal of Computing and Information Science in Engineering, №4

Scopus

WoS

Crossref citations:16

Optimization of a supply portfolio in the context of supply chain risk management: literature review

Faiza Hamdi, Ahmed Ghorbel, Faouzi Masmoudi, Lionel Dupont

Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (60) https://doi.org/10.1007/s10845-015-1128-3

2015, Journal of Intelligent Manufacturing, №4, p.763-788

Scopus

WoS

Crossref citations:13

Find all citations of the publication

About this publication

Publication type Журнальна стаття
Number of citations 23
Number of works in the list of references 54
Journal indexed in Scopus Yes
Journal indexed in Web of Science Yes
Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection (2024)
Top Articles
Latest Posts
Recommended Articles
Article information

Author: Corie Satterfield

Last Updated:

Views: 5668

Rating: 4.1 / 5 (62 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Corie Satterfield

Birthday: 1992-08-19

Address: 850 Benjamin Bridge, Dickinsonchester, CO 68572-0542

Phone: +26813599986666

Job: Sales Manager

Hobby: Table tennis, Soapmaking, Flower arranging, amateur radio, Rock climbing, scrapbook, Horseback riding

Introduction: My name is Corie Satterfield, I am a fancy, perfect, spotless, quaint, fantastic, funny, lucky person who loves writing and wants to share my knowledge and understanding with you.