Advertisement

Information System Risks and Countermeasures in Supply Chain Integration and Management for an Enterprise

  • Joseph Akomode

Abstract

Manufacturing may be viewed as the foundation for economic growth and modern comfort. The increasing application of the internet and electronic commerce (e-commerce) coupled with market forces has the potential to lead an enterprise into increased business risks in the domain of supply chain integration and management (SCIM) in manufacturing. Consequently, there is a need for a generic evolutionary framework for optimising activities in SCIM and for supporting managers in decision making. In manufacturing, supply chain represents a system of services (or a network of activities) and distribution alternatives that combine to perform the tasks of: (i) procurement of input materials, (ii) transformation of the input materials into intermediate and final-stage products and (iii) the delivery of these products to customers who may be business buyers or individual consumers. The explanation given above about the supply chain may be substantiated by the work of some experts and commentators such as: Lee and Billington (1995); Ganeshan and Harrison (1995); Swaminathan et al (1996). Supply chain as a network of activities is not exclusive to manufacturing but does exist in the service industry and firms, often with different levels of complexity. The research findings presented in this paper form part of an ongoing research effort towards the development of a generic (or useful) evolutionary framework for optimising SCIM activities. The sections below discuss: (1) conventional and contemporary supply chain mechanisms; (2) supply chain integration and management; (3) manufacturing activities and potential risks in SCIM; (4) possible countermeasures for improving security.

Keywords

Supply Chain Supply Chain Management Inventory Level Place Order Business Risk 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adams, J. (1998). Hacker Ideology http://vallejo.phil3.uni-freiburg.de/1998/hackers.htmlGoogle Scholar
  2. Akomode, J. (1999) “Project Risks and Issues of Security Associated with Information Technology Systems in an Enterprise ” inProceedings of the 9 t Annual BIT Conference, 3rd/4thNovember 1999, (Generative Futures), (R. Hackney, ed.), (CD).Google Scholar
  3. Akomode, J. (2000) “Potential Risks in E-Business and Possible Measures for an Enterprise ” inProceedings of the 10 th Annual BIT Conference, lst/2ndNovember 2000, (E-Futures), (R. Hackney, ed.), (CD).Google Scholar
  4. Akomode, J. (2001) “Measuring the Satisfaction of Customers to Minimise Business Risks and Improve Quality in New Products” inProceedings of the 5th World Multiconference on Systemic, Cybernetics and Informatics (SCI 2001), (N. Callaos; S. Long and M. Loutfí, eds.), Orlando, Florida, USA, July 22 -25, 2001, (xvii):575–580.Google Scholar
  5. Briney, A. (1999). Got Security? www.infosecuritymag.com/july99/cover.htmGoogle Scholar
  6. Cronbach L. J. (1951). Coefficient Alpha and The Internal Structure of Tests,Psychometrika, 16(3), September 1951, 297–334.CrossRefGoogle Scholar
  7. Cronbach, L. J. (1984).Essentials of Psychological Testing, Harper & Row, London.Google Scholar
  8. Deming, W. E. (1985). Transformation of Western Style of Management,Interfaces(May/June), (l5):6–ll.CrossRefGoogle Scholar
  9. Deming, W. E. (1993).The New Economics for Industry, Government, Education. Massachusetts Institute of Technology.Google Scholar
  10. Freeman, B. (1998). http://www.infochain.org/quarterly/Spring98/Survey.htmlGoogle Scholar
  11. Ganeshan, R. and Harrison, T. P. (1995) “An Introduction to Supply Chain Management. Penn State University ” http://silmaril.smeal.psu.edu/misc/supply_chain_intro.html).Google Scholar
  12. Graham, B. (1999). www.computeruser.com/newstoday/99/ll/09/news9.htmlGoogle Scholar
  13. Hammersley, M. (1992).What’s Wrong with Ethnography: Methodological Explorations, Routledge, London.Google Scholar
  14. http://www.delboy.com/iwp4.htm Info-sec.com (1999). http://www.info-sec.com/internet/99/internet_080399dJ.shtmlGoogle Scholar
  15. Kirk, J and Miller, M. (1986).Reliability and Validity in Qualitative Research, Qualitative Research Method Series, No. 1, Sage, London.Google Scholar
  16. Kovacich, G. L. (1999) “I-Way Robbery: Crimes on the internet ”Computers & Security, l8(3):2l 1–220.Google Scholar
  17. Lee, H. L. and Billington, C. (1995) “The Evolution of Supply Chain Management Models and Practice at Hewlett-Packard”.Interfaces(25):42–63, 5 September-October, 1995.Google Scholar
  18. Lewis, J.; Nairn, M. Wardle, S.; Varity, L. and Williams, E. (1998) “Quick Scan Your Way to Supply Chain Management ”Control UK, 24 (5):14–16.Google Scholar
  19. Litwin, M. S. (1995).How to Measure Reliability and Validity, Sage, LondonGoogle Scholar
  20. Nunnaily, J. C. (1967).Psychometric Theory, McGraw-Hill, LondonGoogle Scholar
  21. O’Connor, B. (1998) “Supply Chain Challenges”Control UK, 24 (6):23–26.Google Scholar
  22. Proctor, P. E.(1998) Information Risk Management, www.centraxcorp.com/techpubs.htmlGoogle Scholar
  23. Silverman, D. (1994)Interpreting Qualitative Data: methods for analysing talk. Text and interaction, Sage, LondonGoogle Scholar
  24. Swaminathan, J. M; Smith, S. F. and Sadeh, N. M. (1996). A Multi Agent Framework for Modelling Supply Chain Dynamics. Technical Report, The Robotic Institute, Carnegie Mellon UniversityGoogle Scholar
  25. Taguchi, G. and Clausing, D. (1990) Robust quality,Harvard Business Review, Jan-Feb, pp.65–75.Google Scholar
  26. Teigen, R. (1997). http://www.eil.utoronto.ca/profiles/rune/node5.htmlGoogle Scholar
  27. The Times (1996). 26thMarch, UK.Google Scholar
  28. Turkle, S. (1984).The Second Self: Computers and the Human Spirit, Simon and Schuster.Google Scholar
  29. Warren, M. J. (1998). Cyber Terrorism, inProceedings of the IFIP TC 11 14 th international Conference on Information Security(31 August - 2 September, 1998), Vienna, (A. Papp and R. Posch, eds.), Austrian Computer SocietyGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2002

Authors and Affiliations

  • Joseph Akomode
    • 1
  1. 1.School of Computing and Mathematical SciencesLiverpool John Moores UniversityLiverpoolUK

Personalised recommendations