This study draws on information theory and aims to provide simulated evidence using real historical and statistical data to demonstrate how various levels of integration moderate the impact and uncertainties of information security breach on supply chain performance. We find that the supply chain behaves differently under various levels of integration when a security breach occurs. The entropy analysis revealed that the wholesaler experience the most uncertainty under system failure and data corruption. This sort of impact-uncertainty information will aid in designing and managing a resilient supply chain poised for minimal breach impact
While information sharing can benefit supply chains significantly, it may also have a "side effect",...
In this study, we develop a supply chain model with one manufacturer and one retailer, where the mar...
Thesis (M.Com.)-University of KwaZulu-Natal, Westville, 2010.A supply chain is an integrated process...
Impact studies relating to information security breach are few and somewhat understudied. This study...
Many small and medium enterprises (SMEs) engage in dyadic information integration partnerships or pa...
Over the years, supply chain reconfiguration decisions have been solely based on operational risk. S...
Recent supply chain reengineering efforts have focused on integrating firms\u27 production, invento...
Information security breaches have serious consequences for companies. And information security brea...
In today’s dynamic and competitive business environment, it is critical for firms to share informati...
The first primary objective of this dissertation is to develop a framework that can quantitatively m...
Since the September 11, 2001, terrorist attacks on the United States of America the cross-border sup...
Many studies, both theoretical and practical, have emphasised the benefits of information sharing (I...
Firms in a supply chain share information assets among them, and make use of inter-firm network conn...
The current world of post industrial value generation sees companies increasingly analyzing their in...
Measures aimed at making supply chains more efficient and responsive have also made them more vulner...
While information sharing can benefit supply chains significantly, it may also have a "side effect",...
In this study, we develop a supply chain model with one manufacturer and one retailer, where the mar...
Thesis (M.Com.)-University of KwaZulu-Natal, Westville, 2010.A supply chain is an integrated process...
Impact studies relating to information security breach are few and somewhat understudied. This study...
Many small and medium enterprises (SMEs) engage in dyadic information integration partnerships or pa...
Over the years, supply chain reconfiguration decisions have been solely based on operational risk. S...
Recent supply chain reengineering efforts have focused on integrating firms\u27 production, invento...
Information security breaches have serious consequences for companies. And information security brea...
In today’s dynamic and competitive business environment, it is critical for firms to share informati...
The first primary objective of this dissertation is to develop a framework that can quantitatively m...
Since the September 11, 2001, terrorist attacks on the United States of America the cross-border sup...
Many studies, both theoretical and practical, have emphasised the benefits of information sharing (I...
Firms in a supply chain share information assets among them, and make use of inter-firm network conn...
The current world of post industrial value generation sees companies increasingly analyzing their in...
Measures aimed at making supply chains more efficient and responsive have also made them more vulner...
While information sharing can benefit supply chains significantly, it may also have a "side effect",...
In this study, we develop a supply chain model with one manufacturer and one retailer, where the mar...
Thesis (M.Com.)-University of KwaZulu-Natal, Westville, 2010.A supply chain is an integrated process...