Access the full text.
Sign up today, get DeepDyve free for 14 days.
R. Schumacker, R. Lomax (2022)
A Beginner's Guide to Structural Equation Modeling
Andrew White, E. Daniel, Mohdzaher Mohdzain (2005)
The role of emergent information technologies and systems in enabling supply chain agilityInt. J. Inf. Manag., 25
K. Choy, Wing Lee, V. Lo (2004)
An enterprise collaborative management system - a case study of supplier relationship managementJ. Enterp. Inf. Manag., 17
Mathias Kirchmer (2004)
E-business process networks - successful value chains through standardsJ. Enterp. Inf. Manag., 17
S. Búrca, B. Fynes, D. Marshall (2005)
Strategic technology adoption: extending ERP across the supply chainJ. Enterp. Inf. Manag., 18
M. Earl (1996)
The Risks of Outsourcing ITSloan Management Review, 37
(1977)
Interpretive Structural Modeling: Methodology for Large-scale Systems, McGraw-Hill
Christopher Tang (2006)
Perspectives in supply chain risk managementInternational Journal of Production Economics, 103
R. Ford, Helayne Ray (2004)
Web Information Leakage: Googling for goldNetwork Security archive, 2004
W.K. Chen
Graph Theory and its Engineering Applications: Advanced Series in Electrical and Computer Engineering
M. Bertolini, M. Bevilacqua, E. Bottani, A. Rizzi (2004)
Requirements of an ERP enterprise modeller for optimally managing the fashion industry supply chainJ. Enterp. Inf. Manag., 17
B. Ritchie, C. Brindley (2000)
Disintermediation, disintegration and risk in the SME global supply chainManagement Decision, 38
Sanjay Jharkharia, R. Shankar (2005)
IT-enablement of supply chains: understanding the barriersJ. Enterp. Inf. Manag., 18
Hau Lee, K. So, Christopher Tang (2000)
The Value of Information Sharing in a Two-Level Supply ChainManagement Science, 46
V. Ravi, R. Shankar, M. Tiwari (2005)
Productivity improvement of a computer hardware supply chainInternational Journal of Productivity and Performance Management, 54
M. Christopher, Hau Lee (2004)
Mitigating supply chain risk through improved confidenceInternational Journal of Physical Distribution & Logistics Management, 34
(2000)
Digraph Theory, Algorithms, and Organizations
E. Walden, J. Hoffman (2007)
Organizational form, incentives and the management of information technology: Opening the black box of outsourcingComput. Oper. Res., 34
C. Harland, R. Brenchley, H. Walker (2003)
Risk in supply networksJournal of Purchasing and Supply Management, 9
M. Dennis, A. Kambil (2003)
SERVICE MANAGEMENT: BUILDING PROFITS AFTER THE SALE.Supply Chain Management Review
K. Kucera, M. Plaisent, P. Bernard, Lassana Maguiraga (2005)
An empirical investigation of the prevalence of spyware in internet shareware and freeware distributionsJ. Enterp. Inf. Manag., 18
Aishah Sabki, P. Ahmed, Glenn Hardaker (2004)
Developing an e-commerce solution: a case study of TimeXtraJ. Enterp. Inf. Manag., 17
A. Mandal, S. Deshmukh (1994)
Vendor Selection Using Interpretive Structural Modelling (ISM)International Journal of Operations & Production Management, 14
A. Sharif, Z. Irani (1999)
Research note: theoretical optimisation of IT/IS investmentsLogistics Information Management, 12
T. Aven, J. Vinnem, H. Wiencke (2007)
A decision framework for risk management, with application to the offshore oil and gas industryReliab. Eng. Syst. Saf., 92
(1997)
Graph Theory and its Engineering Applications: Advanced Series in Electrical and Computer Engineering, University of Illinois, Chicago, IL
Y. Yusuf, A. Gunasekaran, Ezekiel Adeleye, K. Sivayoganathan (2004)
Agile supply chain capabilities: Determinants of competitive objectivesEur. J. Oper. Res., 159
T. Davenport, J. Brooks (2004)
Enterprise systems and the supply chainJ. Enterp. Inf. Manag., 17
(2000)
Logistics in Canada survey: tracking year 2000 supply chain issues and trends
A. Khalfan (2004)
Information security considerations in IS/IT outsourcing projects: a descriptive case study of two sectorsInt. J. Inf. Manag., 24
Z. Irani, A. Sharif, P. Love, C. Kahraman (2002)
Applying concepts of fuzzy cognitive mapping to model: The IT/IS investment evaluation processInternational Journal of Production Economics, 75
P. Ganguli (2000)
Intellectual property rights: mothering innovations to marketsWorld Patent Information, 22
Paul Bender (2000)
DEBUNKING 5 SUPPLY CHAIN MYTHSSupply Chain Management Review
S. Chopra, M. Sodhi (2004)
Managing Risk To Avoid Supply-Chain BreakdownMIT Sloan Management Review, 46
S. Maguire (2002)
Identifying risks during information system development: managing the processInf. Manag. Comput. Secur., 10
L. Willcocks, Mary Lacity, T. Kern (1999)
Risk mitigation in IT outsourcing strategy revisited: longitudinal case research at LISAJ. Strateg. Inf. Syst., 8
J. Collins, Robert Millen (1995)
Information Systems Outsourcing by Large American Industrial Firms: Choices and ImpactsInformation Resources Management Journal, 8
A.P. Sage
Interpretive Structural Modeling: Methodology for Large‐scale Systems
Sara Cullen, Peter Seddon, L. Willcocks (2005)
IT outsourcing configuration: Research into defining and designing outsourcing arrangementsJ. Strateg. Inf. Syst., 14
M. Faisal, D. Banwet, R. Shankar (2006)
Mapping supply chains on risk and customer sensitivity dimensionsInd. Manag. Data Syst., 106
(1993)
The information systems outsourcing bandwagon
I. Lewis, A. Talalayevsky (2004)
Improving the interorganizational supply chain through optimization of information flowsJ. Enterp. Inf. Manag., 17
Ruishan Zhang, Kefei Chen (2005)
Improvements on the WTLS protocol to avoid denial of service attacksComput. Secur., 24
T. Simatupang, R. Sridharan (2004)
Benchmarking supply chain collaboration: an empirical studyBenchmarking: An International Journal, 11
R. Cardinali (1998)
If the system fails, who is liable?Logistics Information Management, 11
F. Harary
Graphs and Organizations
Cai-feng Li (2009)
Agile Supply Chain: competing in volatile markets, 3
B. Shore, A. Venkatachalam (2003)
Evaluating the information sharing capabilities of supply chain partnersInternational Journal of Physical Distribution & Logistics Management, 33
J. Hallikas, I. Karvonen, U. Pulkkinen, V. Virolainen, M. Tuominen (2004)
Risk management processes in supplier networksInternational Journal of Production Economics, 90
M. Fisher (1997)
What is the Right Supply Chain for Your ProductHarvard Business Review
L. Halchin (2004)
Electronic government: Government capability and terrorist resourceGov. Inf. Q., 21
R. Handfield, Ernest Nichols (1998)
Introduction to Supply Chain Management
B. Shore, A.R. Venkatachalam
Evaluating the information sharing capabilities of supply chain partners: a fuzzy logic model
A. Norrman, Ulf Jansson (2004)
Ericsson’s Proactive Supply Chain Risk Management-approach After a Serious Supplier AccidentInternational Journal of Physical Distribution & Logistics Management, 34
R. Bolanos, E. Fontela, Alfredo Nenclares, P. Pastor (2005)
Using interpretive structural modelling in strategic decision‐making groupsManagement Decision, 43
Robert Spekman, E. Davis (2004)
Risky business: expanding the discussion on risk and the extended enterpriseInternational Journal of Physical Distribution & Logistics Management, 34
H.L. Lee, V. Padmanabham, S. Whang
The bullwhip effect in supply chains
(1999)
Introduction to Supply Chain Management, Prentice-Hall, Upper Saddle River, NJ
R. Stockdale, C. Standing
Journal of Enterprise Information Management Emerald Article : Benefits and barriers of electronic marketplace participation : an SME perspective
W. Chen (1997)
Graph theory and its engineering applications
(2000)
Debunking five supply chain myths
M. Biehl (2005)
Selecting internal and external supply chain functionality: The case of ERP systems versus electronic marketplacesJ. Enterp. Inf. Manag., 18
P. Fiala (2005)
Information sharing in supply chainsOmega-international Journal of Management Science, 33
P. Sinha, L. Whitman, D. Malzahn (2004)
Methodology to mitigate supplier risk in an aerospace supply chainSupply Chain Management, 9
Z. Irani (2002)
Information systems evaluation: navigating through the problem domainInf. Manag., 40
T. Kern, L. Willcocks (2000)
Exploring information technology outsourcing relationships: theory and practiceJ. Strateg. Inf. Syst., 9
R. Stockdale, C. Standing
Benefits and barriers of electronic marketplace participation: an SME perspective
B. Bahli, S. Rivard (2005)
Validating measures of information technology outsourcing risk factorsOmega-international Journal of Management Science, 33
N. Abouzakhar, G. Manson (2002)
An intelligent approach to prevent distributed systems attacksInf. Manag. Comput. Secur., 10
J. Warfield (1974)
Developing Interconnection Matrices in Structural ModelingIEEE Trans. Syst. Man Cybern., 4
(2004)
Googling for gold: web crawlers, hacking and defence explained
Charles Møller (2005)
ERP II: a conceptual framework for next-generation enterprise systems?J. Enterp. Inf. Manag., 18
S. Sutton (2006)
Extended-enterprise systems' impact on enterprise risk managementJ. Enterp. Inf. Manag., 19
J. Whipple, R. Frankel, P. Daugherty (2002)
INFORMATION SUPPORT FOR ALLIANCES: PERFORMANCE IMPLICATIONSJournal of Business Logistics, 23
J. Barthélemy (2003)
The Hard and Soft Sides of IT Outsourcing ManagementEuropean Management Journal, 21
J. Motwani, M. Madan, A. Gunasekaran (2000)
Information technology in managing global supply chainsLogistics Information Management, 13
R. Rao, K. Padmanabhan (2006)
Selection, identification and comparison of industrial robots using digraph and matrix methodsRobotics and Computer-integrated Manufacturing, 22
James Hoyt, F. Huq (2000)
From arms‐length to collaborative relationships in the supply chainInternational Journal of Physical Distribution & Logistics Management, 30
(1996)
A Beginner’s Guide to Structural Equation
M. Faisal, D. Banwet, R. Shankar (2006)
Supply chain risk mitigation: modeling the enablersBus. Process. Manag. J., 12
Alan Brandyberry, Arun Rai, Gregory White (1999)
Intermediate Performance Impacts of Advanced Manufacturing Technology Systems: An Empirical Investigation*Decision Sciences, 30
Purpose – This paper aims to identify various information risks that could impact a supply chain, and develops a conceptual framework to quantify and mitigate them. Design/methodology/approach – Graph theory has been used to quantify information risks while interpretive structural modelling (ISM) is employed to understand the interrelationships among the enablers of information risks mitigation. Findings – The research presents a classification of the enablers of information risks mitigation according to their driving power and dependence. It also presents a risk index to quantify information risks. The research suggests that management should focus on improving the high driving power enabler variables. Practical implications – The proposed risk index and the hierarchy‐based model would help to develop suitable strategies to manage information risks in supply chains. Originality/value – The major contribution of this paper lies in the development of a framework to quantify information risks and a hierarchy based model for their mitigation in context of supply chains.
Journal of Enterprise Information Management – Emerald Publishing
Published: Oct 23, 2007
Keywords: Supply chain management; Information management; Risk management; Graph theory
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.