首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Assessing customer trust in suppliers with regards to its influencing factors is an important open issue in supply chain management literature. In this paper, a customer trust index is designed as the trust level arising from the information sharing degree and quality, related to the information shared by a supplier with his customer. The customer trust level is evaluated using a fuzzy decision support system integrating information sharing dimensions. The core is a rule-based system designed using the results of questionnaires and interviews with supply chain experts. Several tests were generated in order to analyze the impact of the different information sharing attributes on the customer trust index. The developed approach is then applied to a real supply chain from the textile industry. Results show large differences of weight and impact between the different information-related factors that build the customer trust index. It is also shown that the proposed system has an important role in ensuring the objectivity of the trust assessment process and in helping decision makers evaluate their business partners.  相似文献   

2.
The paper aims to investigate the effects of information technology (IT) alignment and information sharing on operational performance in the context of supply chain. Based on the resource-based view, this study identifies IT alignment and information sharing as specific resources/capabilities for supply chain partnership. Data from 141 Chinese manufacturers are collected to test the relationships among IT alignment, information sharing, and operational performance. The results show that (1) both IT alignment and information sharing have direct and positive effects on operational performance, (2) IT alignment has an indirect effect on operational performance through information sharing, and (3) IT alignment and information sharing have different emphases in operational performance improvement. The resource-capability-performance paradigm is extended to supply chain context in the emerging economy. Chinese managers may have different emphases on IT resource/information sharing capability deployment for operational efficiency and effectiveness.  相似文献   

3.
With major developments in information and communication technologies, real-time information sharing becomes a significant challenge and has a considerable impact on the overall performance of supply chains. Here, we study the influence of information sharing for a monoproduct serial supply chain consisting of a supplier, warehouse, retailer and customers in the context of a decentralized decision. The objectives of this study are twofold: (1) to estimate the gains from sharing different types of information on each elementary cost and for each partner of the supply chain in detail and (2) to determine the cumulative impact of simultaneously sharing different types of information.A mathematical model is developed to assess the value of information sharing in terms of logistic costs and for different combinations related to the sharing or non-sharing of three types of upstream and downstream information: the customer demand and the supplier-warehouse and warehouse-retailer lead times. A perturbation is also injected to consider the intended or unintended distortion in the communicated information.Our study clearly showed that the gains are not cumulative when we simultaneously share different types of information. The results also highlighted the necessity to establish incentive cooperation mechanisms between the different links in the supply chain in many scenarios where the gains are not balanced. A distortion in the communicated information can also have a significant effect on the gains from sharing.  相似文献   

4.
The web services used on desktop can be accessed through a smartphone due to the development of smart devices. As the usage of smartphones increases, the importance of personal information security inside the smartphone is emphasized. The openness features of Android platform make a lot easier to develop an application and also deploying malicious codes into application is an easy task for hackers. The security practices are also growing rapidly as the number of malicious code increases exponentially. According to these circumstances, new methods for detecting and protecting the behavior of leaked personal information are needed to manage the personal information within a smartphone.In this paper, we study the permission access category in order to detect the malicious code, which discloses the personal information on Android environment such as equipment and location information, address book and messages, and solve the problem related to Resource access of Random Access Control method in conventional Android file system to detect the new malware or malicious code via the context ontology reasoning of permission access and API resource information which the personal information are leaked through. Then we propose an inference-based access control model, which can be enabled to access the proactive security. There is more improvement accuracy than existing malicious detecting techniques and effectiveness of access control model is verified through the proposal of inference-based access control model.  相似文献   

5.
Annotation-based access control for collaborative information spaces   总被引:1,自引:0,他引:1  
Web 2.0 social platforms (e.g., Flickr, YouTube) and Collaborative Working Environments (e.g., Microsoft SharePoint, BSCW) provide Web-based collaborative information spaces which enable common users and/or professionals to work together and share their online resources. Most of these collaborative information spaces provide role-based or group-based, coarse-grained access control policies which cannot successfully cope with the requirements posed by massive and open collaboration. In this paper, we present an annotation-based access control (AnBAC) model supported by a Collaboration Vocabulary (CoVoc) as a more flexible and user-centric access control approach. Based on this, we developed two tools: Uncle-Share is a gadget that provides annotation-based access control and can be equipped with CoVoc for annotating collaborative relationships. Who-With-Whom uses CoVoc to visualize extended social networks in order to help users to select appropriate contacts to grant access to resources.  相似文献   

6.
This paper considers a single product, two-echelon capacity constrained supply chain consisting of a supplier and two retailers facing correlated end-item demand. We use a decentralized Markov decision process with restricted observations to represent this system and conduct a numerical study to quantify the benefits of information sharing to the retailers under varying levels of supplier capacity and supply allocation mechanisms. Our results show an inverse relationship between capacity and information and indicate the retailers can achieve significant benefits as a result of the information sharing partnership.  相似文献   

7.
计算机网络对社会的影响日益增大,包括社会经济、国防教育以及很多的社会活动都离不开网络。计算机网络与信息系统的安全建立和系统的安全技术已经备受关注,计算机网络对信息安全的要求很高。介绍了计算机网络与信息安全存在的诸多问题,通过介绍如何搭建计算机网络与信息安全系统.让读者了解有关这方面的知识,并且使读者了解到计算机网络与信息安全系统的关键枝术问题。  相似文献   

8.
Controlled query evaluation (CQE) preserves confidentiality in information systems at runtime. A confidentiality policy specifies the information a certain user is not allowed to know. At each query, a censor checks whether the answer would enable the user to learn any classified information. In that case, the answer is distorted, either by lying or by refusal. We introduce a framework in which CQE can be analyzed wrt. possibly incomplete logic databases. For each distortion method, lying and refusal, a class of confidentiality-preserving mechanisms is presented. Furthermore, we specify a third approach that combines lying and refusal and compensates the disadvantages of the respective uniform methods. The enforcement methods are compared to the existing methods for complete databases. This work was partially funded by the German Research Foundation (DFG) under Grant No. BI-311/12-1. An extended abstract was presented at the LICS’05 Affiliated Workshop on Foundations of Computer Security, and is available from .  相似文献   

9.
This paper considers a two echelon seasonal supply chain model that consists of one supplier and one retailer, with the assumption that external demand from the customer follows a seasonal autoregressive moving average (SARMA) process, including marketing actions that cannot be deduced from the other parameters of the demand process. In our model, the supplier and the retailer employ order-up-to policy to replenish their inventory. In order to evaluate the value of information sharing in a two echelon seasonal supply chain, three levels of information sharing proposed by Yu, Yan, and Cheng (2002) are used. The results for optimal inventory policies under these three levels of information sharing are derived. We show that the seasonal effect has an important impact on optimal inventory policies of the supplier under the three levels of information sharing. Our findings also demonstrate that the replenishment of lead time must be less than the seasonal period in order to benefit from information sharing. Thus, this result provides managers with managerial insights to improve supply chain performance through information sharing integration partnerships.  相似文献   

10.
The lack of coordination in supply chains can cause various inefficiencies like bullwhip effect and inventory instability. Extensive researches quantified the value of sharing and forecasting of customer demand, considering that all the supply chain partners can have access to the same information. However, only few studies devoted to identify the value of limited collaboration or information visibility, considering their impact on the overall supply chain performances for local and global service level. This paper attempts to fill this gap by investigating the interaction of collaboration and coordination in a four-echelon supply chain under different scenarios of information sharing level. The results of the simulation study show to what extent the bullwhip effect and the inventory variance increase and amplify when a periodic review order-up-to level policy applies, noting that more benefits generate when coordination starts at downstream echelons. A factorial design confirmed the importance of information sharing and quantified its interactions with inventory control parameters, proving that a poor forecasting and definition of safety stock levels have a significant contribution to the instability across the chain. These results provide useful implications for supply chain managers on how to control and drive supply chain performances.  相似文献   

11.
The primary purpose of this study is to investigate the role of information sharing, information quality, and information availability in the development of trust and commitment in supply chain relationships. Samples were gathered in Taiwan and Canada using a field questionnaire. Multiple regression and ANOVA were used to analyze the data. It was found that there is a positive relationship between the level of quality, and availability, and the level of trust; information sharing and commitment. Additionally, results revealed that country moderates the relationship between information sharing and trust.  相似文献   

12.
Web-based supply chain applications promise to provide information sharing capabilities that will enhance the participating organizations’ information capabilities and business benefits. We performed an empirical study of a sophisticated Web-based supply chain application to determine the effect of such information sharing and business systems leveraging on business benefits. We also examined the importance of relational concurrence (i.e., shared business interests among supply chain partners), as an antecedent to both information sharing and business systems leveraging. Our work showed that both information sharing and business system leveraging provided important business benefits and that relational concurrence was only marginally related to information sharing and not at all related to business systems leveraging, limiting the significance attributed to this factor in prior research on inter-organizational systems.  相似文献   

13.
This paper investigates the information sharing issue in a simple supply chain with one manufacturer and one retailer. The market demand might be subject to disruption, but the retailer can get access to some signals from social media platforms to better forecast the market state (regular or disrupted) even though the signals might be not fully reliable. Different from the traditional information sharing literature, we incorporate the shutdown policy into our model. We first characterize the equilibrium outcomes under both with- and without-information sharing cases and then examine the players’ preferences over information sharing or not. It is shown that when the level of information reliability is relatively low, the manufacturer prefers the information sharing cases, whereas the retailer prefers the no-sharing case, and information sharing does harm to the whole channel. In addition, our results show that as the level of information reliability increases, the manufacturer benefits more but the retailer and the whole channel lose more from information sharing. Contrary to the conventional wisdom, when the level of information reliability falls into an intermediary interval, the retailer will have an incentive to share information, and information sharing will benefit the manufacturer and the whole supply chain. However, the benefits from information sharing decrease as the level of information reliability increases. When the level of information reliability is sufficiently high, both firms are indifferent between the information sharing and no-sharing cases. Additionally, the incorporation of the shutdown policy has important implications for the information sharing issue, and thus, the policy should not be overlooked.  相似文献   

14.
ABSTRACT

Information technology is increasingly facilitating mechanisms by which information asymmetry between lenders and borrowers in the financial sector can be reduced in order to enhance financial access for human and economic development in developing countries. We examine conditional financial development from ICT-driven information sharing in 53 African countries for the period 2004–2011, using contemporary and non-contemporary quantile regressions. ICT is measured with mobile phone penetration and internet penetration, whereas information-sharing offices are public credit registries and private credit bureaus. The following findings are established. First, there are positive effects with positive thresholds from ICT-driven information sharing on financial depth (money supply and liquid liabilities) and financial activity (at banking and financial system levels). Second, for financial intermediation efficiency, the positive effects from mobile-driven information sharing are apparent exclusively in certain levels of financial efficiency. Third, with regard to financial size, mobile-driven information sharing is positive with a negative threshold, whereas internet-driven information sharing is positive exclusively among countries in the bottom half of financial size. Positive thresholds are defined as decreasing negative or increasing positive estimated effects from information-sharing offices and vice versa for negative thresholds. Policy implications are discussed.  相似文献   

15.
The aim of this study was to determine the support and information needs of older and disabled older people in the UK. Following an initial literature survey, an examination of data on enquiries made by older people to information providers, and a series of focus groups, a questionnaire was developed for a nationwide survey. Over 1630 questionnaires were completed by disabled older clients of Day Care Centres and less frail older members of social clubs. Findings showed that there is a serious shortfall in the number of older people getting the practical support that they need, and the information that enables access to this support, compared to the number that actually need help. Substantial percentages of the survey respondents experienced difficulty with everyday tasks and with accessing the information they needed. Implications for formal sources of support and information are discussed.  相似文献   

16.
数字港城景观照明信息与控制平台的设计与研究   总被引:3,自引:0,他引:3       下载免费PDF全文
为了实现数字化照明,该文基于全新的数字城市的整体概念,运用先进的网络技术、集成技术等构建了对整个城市的景观照明进行控制和运作的平台模型,并且对平台运行的关键技术——接入与控制协议进行了深入的探讨和研究。  相似文献   

17.
The main idea of this research is to devise the smart module to pick the best supplier bid(s) automatically. The hybrid model is composed of three useful tools: fuzzy logic, AHP, and QFD. The approach has been carefully implemented and verified via a real-world case study in a medium-to-large industry manufacturing vehicle tires and other rubber products. A collection of 12 assessment criteria classified into two categories have been considered. Eight factors are derived from customer suggestions and the other four are design specifications required to manufacture the product. The main outcomes are: a hybrid autonomous model to evaluate supplier bids without direct human intervention; devising a hybrid three-module method and overcoming complexity of computations in resulting algorithm by means of agents; outlining the best criteria to assess suppliers; evaluating the suppliers based on voice of customer during all stages of the process; and discussing analysis, design, and implementation issues of the evaluation agent. The paper includes implications for development of an integrated total system for supply chain coordination. The most important advantages of this work over earlier researches on supplier selection are: implementation of an autonomous assessment mechanism using intelligent agents for the first time, making the best out of three widely applied methodologies all at once, evaluation process mainly based on features of customer order, coordination of supply job based on a bidding system, and portal-mediated operation and control.  相似文献   

18.
Today's manufacturing industry is characterised by strong interdependencies between companies operating in globally distributed production networks. The operation of such value-added chains has been enabled by recent developments in information and communication technologies (ICT) and computer networking. To gain competitive advantages and efficiency improvements such as reduced inventory and higher delivery reliability, companies are introducing information exchange systems that communicate demand to suppliers and production progress information to customers in the network. This article proposes a system that supports co-operation in complex production networks by enabling companies to determine and exchange supply information with their customers. The requirements for such a system are analysed and it is embedded in a framework of supply chain management business processes. The system facilitates the determination and exchange of meaningful, reliable and up-to-date order status information from the supplier to the customer. Based on comparing the progress of an internal production order with a pre-defined milestone model for each product, the status of the customer order is determined and—in case of lateness—communicated to the customer together with an early warning. To demonstrate the developed supply information concepts and processes, the business process is implemented as a pilot system and evaluated by the user companies participating in the 5th Framework IST project Co-OPERATE.  相似文献   

19.
PurposeThe purpose of this paper is to investigate the impact of Supply Chain Information Integration (SCII) on the Operational Performance of manufacturing firms in Malaysia considering the role of information leakage.Design/methodology/approachTo test the model developed, we conducted an online questionnaire survey with Malaysian manufacturing companies drawn from the Federation of Malaysian Manufacturers directory of 2018. Out of the 400 questionnaires sent out to the manufacturing companies, 144 useable responses were received giving a response rate of 36 %. The data were analyzed using SmartPLS, a second-generation statistical tool.FindingsThe findings of this study showed that information quality, information security, and information technology (IT) had a positive effect on SCII with an explanatory power of 47.2 % while SCII, in turn, had a positive effect on operational performance explaining 17% of the variance. Intentional information leakage (IIL) moderated the relationship between SCII and operational performance, whereas accidental information leakage did not moderate the same relationship.Practical implicationsThis study provides insights into difficulties faced when implementing SCII, particularly by medium and large manufacturing companies in Malaysia. It helps identify appropriate strategies that can guide the management in its effort to improve performance by SCII.Originality/valueThis research is arguably the first study that simultaneously investigates the effect of information quality, IT, and information security on SCII and the moderating effect of information leakage on the relationships between SCII and operational performance. The results of this study indicate that information security has the largest impact on SCII, followed by IT, and information quality. Furthermore, IIL as a negative aspect of information integration may deprive the strength of the relationship between SCII and operational performance.  相似文献   

20.
Twitter, Facebook, and other social media display the combined opinion of users as collective opinion. The purpose of the work reported here was to examine how collective opinion might influence the perceived truthfulness and the sharing likelihood of health-related statements on social media. Experiment 1 revealed that, when evaluating the truthfulness of a statement, participants adopted the collective truthfulness rating associated with the statement. Similarly, Experiment 2 showed that the likelihood that participants would share a statement followed the collective sharing likelihood associated with the statement. These social impacts were extensive, taking place for statements perceived as true, debatable, and false. These results contribute new insights into how people perceive and share information on social media as well as how collective opinion might affect the quality of information on social media.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号