Abstract
Information leakage in supply chains is drawing more and more attention in supply chain management. Unlike existing research, which usually focuses on the effect of information leakage on the supply chain’s material and information flow, this paper aims to evaluate and mitigate the risk of information leakage. First, we formulate the problem of information leakage caused by inferences in a two-level supply chain where potential competition may exist between a supplier and the manufacturer. Second, we propose a method to mitigate the risk of such information leakage through optimal supplier selection. An example is used to demonstrate the problem and our proposed approach.
Similar content being viewed by others
References
Aissaoui N., Haouari M., Hassini E. (2007) Supplier selection and order lot sizing modeling: A review. Computers & Operations Research 34(12): 3516–3540
Anand K. S., Goyal M. (2009) Strategic information management under leakage in a supply chain. Management Science 55(3): 438–452
Atallah, M. J., Elmongui, H. G., Deshpande, V., & Schwarz, L. B. (2003). Secure supply-chain protocols. In: Proceedings of IEEE international conference on E-commerce 2003 (pp. 293–302).
Barnhart C., Johnson E. L., Nemhauser G. L., Savelsbergh M. W. P., Vance P. H. (1998) Branch-and-price: Column generation for solving huge integer programs. Operations Research 46(3): 316–329. doi:10.1287/opre.46.3.316
Carrera D., Mayorga R. (2008) Supply chain management: A modular fuzzy inference system approach in supplier selection for new product development. Journal of Intelligent Manufacturing 19(1): 1–12
Cera C. D., Braude I., Kim T., Han J., Regli W. C. (2006) Hierarchical role-based viewing for multi-level information security in collaborative CAD. Journal of Computing and Information Science in Engineering 6(1): 2–10
Cera C. D., Kim T., Han J., Regli W. C. (2004) Role-based viewing envelopes for information protection in collaborative modeling. Computer-Aided Design 36(9): 873–886
Chen L., Song Z., Feng L. (2004) Internet-enabled real-time collaborative assembly modeling via an e-assembly system: Status and promise. Computer-Aided Design 36(9): 835–847
Chen S. J. G., Huang E. (2007) A systematic approach for supply chain improvement using design structure matrix. Journal of Intelligent Manufacturing 18(2): 285–299
Chen T. Y., Chen Y. M., Chu H. C. (2008) Developing a trust evaluation method between co-workers in virtual project team for enabling resource sharing and collaboration. Computers in Industry 59(6): 565–579
Christopher M., Lee H. (2004) Mitigating supply chain risk through improved confidence. International Journal of Physical Distribution & Logistics Management 34(5): 388–396
de Boer L., Labro E., Morlacchi P. (2001) A review of methods supporting supplier selection. European Journal of Purchasing & Supply Management 7(2): 75–89
Demirtas E. A., Ustun O. (2008) An integrated multiobjective decision making process for supplier selection and order allocation. Omega 36(1): 76–90
Demirtas E. A., Ustun O. (2009) Analytic network process and multi-period goal programming integration in purchasing decisions. Computers & Industrial Engineering 56(2): 677–690
Dickson G. W. (1966) An analysis of vendor selection systems and decisions. Journal of Purchasing 2(1): 5–17
Ferraiolo D. F., Kuhn R., Sandhu R. S. (2007) RBAC standard rationale: Comments on a critique of the ANSI standard on role based access control. IEEE Security & Privacy 5(6): 51–53
Giunipero L. C., Eltantawy R. A. (2004) Securing the upstream supply chain: A risk management approach. International Journal of Physical Distribution & Logistics Management 34(9): 698–713
Goldreich, O., Micali, S., & Wigderson, A. (1987). How to play any mental game. In: Proceedings of the 19th annual ACM conference on theory of computing (pp. 218–229).
Hoecht A., Trott P. (2006) Outsourcing, information leakage and the risk of losing technology-based competencies. European Business Review 18(5): 395–412
Huang G. Q., Lau J. S. K., Mak K. L. (2003) The impacts of sharing production information on supply chain dynamics: A review of the literature. International Journal of Production Research 41(7): 1483–1517
Huang S. H., Keskar H. (2007) Comprehensive and configurable metrics for supplier selection. International Journal of Production Economics 105(2): 510–523
Juttner U. (2005) Supply chain risk management: Understanding the business requirements from a practitioner perspective. The International Journal of Logistics Management 16(1): 120–141
Juttner U., Peck H., Christopher M. (2003) Supply chain risk management: Outlining an agenda for future research. International Journal of Logistics: Research and Applications 6(4): 197–210
Kahraman C., Cebeci U., Ulukan Z. (2003) Multi-criteria supplier selection using fuzzy AHP. Logistics Information Management 16(6): 382–394
Khan O., Christopher M., Burnes B. (2008) The impact of product design on supply chain risk: A case study. International Journal of Physical Distribution & Logistics Management 38(5): 412–432
Kim K. Y., Wang Y., Muogboh O. S., Nnaji B. O. (2004) Design formalism for collaborative assembly design. Computer-Aided Design 36(9): 849–871
Kim T., Cera C. D., Regli W. C., Choo H., Han J. (2006) Multi-level modeling and access control for data sharing in collaborative design. Advanced Engineering Informatics 20(1): 47–57
Kubat, C., & Yuce, B. (2010). A hybrid intelligent approach for supply chain management system. Journal of Intelligent Manufacturing (in press).
Lee A. H. I. (2009) A fuzzy supplier selection model with the consideration of benefits, opportunities, costs and risks. Expert Systems with Applications 36(2, Part 2): 2879–2893
Lee H. L., Whang S. (2000) Information sharing in a supply chain. International Journal of Manufacturing Technology and Management 1(1): 79–93
Leong K. K., Yu K. M., Lee W. B. (2003) A security model for distributed product data management system. Computers in Industry 50(2): 179–193
Li L. (2002) Information sharing in a supply chain with horizontal competition. Management Science 48(9): 1196–1212
Li, H., & Geng, Y. (2008). Confidential information protection for industry design. Technical report, Concordia Institute for Information Systems Engineering, Concordia University, Montreal.
Li, J., Xiong, N., Park, J., Liu, C., Ma, S., & Cho, S. (2009). Intelligent model design of cluster supply chain with horizontal cooperation. Journal of Intelligent Manufacturing, 1–15.
Lindell Y., Pinkas B. (2002) Privacy preserving data mining. Journal of Cryptology 15(3): 177–206
Lockamy A. III, McCormack K. (2010) Analysing risks in supply networks to facilitate outsouring decisions. International Journal of Production Research 48(2): 593–611
Mason-Jones R., Towill D. R. (1998) Shrinking the supply chain uncertainty circle. Control 24(7): 17–22
McCauley-Bell P. (1999) Intelligent agent characterization and uncertainty management with fuzzy set theory: A tool to support early supplier integration. Journal of Intelligent Manufacturing 10(2): 135–147
Mun D., Hwang J., Han S. (2009) Protection of intellectual property based on a skeleton model in product design collaboration. Computer-Aided Design 41(9): 641–648
Neiger D., Rotaru K., Churilov L. (2009) Supply chain risk identification with value-focused process engineering. Journal of Operations Management 27(2): 154–168
Saaty T. L. (2004) Fundamentals of the analytic network process-multiple networks with benefits, opportunities, costs and risks. Journal of Systems Science and Systems Engineering 13(3): 348–379
Sandhu R. S., Coyne E. J., Feinstein H. L., Youman C. E. (1996) Role-based access control models. IEEE Computer 29(2): 38–47
Shyamsundar N., Gadh R. (2002) Collaborative virtual prototyping of product assemblies over the Internet. Computer-Aided Design 34(10): 755–768
Sun, X., Zeng, Y., & Liu, W. (2010). Formalization of design chain management using environment-based design (EBD) theory. Journal of Intelligent Manufacturing (accepted).
Svensson G. (2000) A conceptual framework for the analysis of vulnerability in supply chains. International Journal of Physical Distribution & Logistics Management 30(9): 731–750
Svensson G. (2002) A conceptual framework of vulnerability in firms’ inbound and outbound logistics flows. International Journal of Physical Distribution & Logistics Management 32(2): 110–134
Tolone W., Ahn G. J., Pai T., Hong S. P. (2005) Access control in collaborative systems. ACM Computing Surveys 37(1): 29–41
Wang Y., Ajoku P. N., Brustoloni J. C., Nnaji B. O. (2006) Intellectual property protection in collaborative design through lean information modeling and sharing. Journal of Computing and Information Science in Engineering 6(2): 149–159
Yao, A. (1986). How to generate and exchange secrete. In: Proceedings of the 27th annual symposium on foundations of computer science (pp. 162–167).
Zeng Y., Gu P. (1999) A science-based approach to product design theory part II: Formulation of design requirements and products. Robotics and Computer-Integrated Manufacturing 15(4): 341–352
Zhang H. (2002) Vertical information exchange in a supply chain with duopoly retailers. Production and Operations Management 11(4): 531–546
Zhang D.Y., Zeng Y., Wang L., Li H., Geng Y. (2011) Modeling and evaluating information leakage caused by inferences in supply chains. Computer in Industry 62(3): 351–363
Zsidisin G. A., Ellram L. M., Carter J. R., Cavinato J. L. (2004) An analysis of supply risk assessment techniques. International Journal of Physical Distribution & Logistics Management 34(5): 397–413
Zsidisin G. A., Smith M. E. (2005) Managing supply risk with early supplier involvement: A case study and research propositions. Journal of Supply Chain Management 41(4): 44–57
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhang, D.Y., Cao, X., Wang, L. et al. Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection. J Intell Manuf 23, 1351–1364 (2012). https://doi.org/10.1007/s10845-011-0527-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10845-011-0527-3