Skip to main content
Log in

Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection

  • Published:
Journal of Intelligent Manufacturing Aims and scope Submit manuscript

Abstract

Information leakage in supply chains is drawing more and more attention in supply chain management. Unlike existing research, which usually focuses on the effect of information leakage on the supply chain’s material and information flow, this paper aims to evaluate and mitigate the risk of information leakage. First, we formulate the problem of information leakage caused by inferences in a two-level supply chain where potential competition may exist between a supplier and the manufacturer. Second, we propose a method to mitigate the risk of such information leakage through optimal supplier selection. An example is used to demonstrate the problem and our proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Aissaoui N., Haouari M., Hassini E. (2007) Supplier selection and order lot sizing modeling: A review. Computers & Operations Research 34(12): 3516–3540

    Article  Google Scholar 

  • Anand K. S., Goyal M. (2009) Strategic information management under leakage in a supply chain. Management Science 55(3): 438–452

    Article  Google Scholar 

  • Atallah, M. J., Elmongui, H. G., Deshpande, V., & Schwarz, L. B. (2003). Secure supply-chain protocols. In: Proceedings of IEEE international conference on E-commerce 2003 (pp. 293–302).

  • Barnhart C., Johnson E. L., Nemhauser G. L., Savelsbergh M. W. P., Vance P. H. (1998) Branch-and-price: Column generation for solving huge integer programs. Operations Research 46(3): 316–329. doi:10.1287/opre.46.3.316

    Article  Google Scholar 

  • Carrera D., Mayorga R. (2008) Supply chain management: A modular fuzzy inference system approach in supplier selection for new product development. Journal of Intelligent Manufacturing 19(1): 1–12

    Article  Google Scholar 

  • Cera C. D., Braude I., Kim T., Han J., Regli W. C. (2006) Hierarchical role-based viewing for multi-level information security in collaborative CAD. Journal of Computing and Information Science in Engineering 6(1): 2–10

    Article  Google Scholar 

  • Cera C. D., Kim T., Han J., Regli W. C. (2004) Role-based viewing envelopes for information protection in collaborative modeling. Computer-Aided Design 36(9): 873–886

    Article  Google Scholar 

  • Chen L., Song Z., Feng L. (2004) Internet-enabled real-time collaborative assembly modeling via an e-assembly system: Status and promise. Computer-Aided Design 36(9): 835–847

    Article  Google Scholar 

  • Chen S. J. G., Huang E. (2007) A systematic approach for supply chain improvement using design structure matrix. Journal of Intelligent Manufacturing 18(2): 285–299

    Article  Google Scholar 

  • Chen T. Y., Chen Y. M., Chu H. C. (2008) Developing a trust evaluation method between co-workers in virtual project team for enabling resource sharing and collaboration. Computers in Industry 59(6): 565–579

    Article  Google Scholar 

  • Christopher M., Lee H. (2004) Mitigating supply chain risk through improved confidence. International Journal of Physical Distribution & Logistics Management 34(5): 388–396

    Article  Google Scholar 

  • de Boer L., Labro E., Morlacchi P. (2001) A review of methods supporting supplier selection. European Journal of Purchasing & Supply Management 7(2): 75–89

    Article  Google Scholar 

  • Demirtas E. A., Ustun O. (2008) An integrated multiobjective decision making process for supplier selection and order allocation. Omega 36(1): 76–90

    Article  Google Scholar 

  • Demirtas E. A., Ustun O. (2009) Analytic network process and multi-period goal programming integration in purchasing decisions. Computers & Industrial Engineering 56(2): 677–690

    Article  Google Scholar 

  • Dickson G. W. (1966) An analysis of vendor selection systems and decisions. Journal of Purchasing 2(1): 5–17

    Google Scholar 

  • Ferraiolo D. F., Kuhn R., Sandhu R. S. (2007) RBAC standard rationale: Comments on a critique of the ANSI standard on role based access control. IEEE Security & Privacy 5(6): 51–53

    Article  Google Scholar 

  • Giunipero L. C., Eltantawy R. A. (2004) Securing the upstream supply chain: A risk management approach. International Journal of Physical Distribution & Logistics Management 34(9): 698–713

    Article  Google Scholar 

  • Goldreich, O., Micali, S., & Wigderson, A. (1987). How to play any mental game. In: Proceedings of the 19th annual ACM conference on theory of computing (pp. 218–229).

  • Hoecht A., Trott P. (2006) Outsourcing, information leakage and the risk of losing technology-based competencies. European Business Review 18(5): 395–412

    Article  Google Scholar 

  • Huang G. Q., Lau J. S. K., Mak K. L. (2003) The impacts of sharing production information on supply chain dynamics: A review of the literature. International Journal of Production Research 41(7): 1483–1517

    Article  Google Scholar 

  • Huang S. H., Keskar H. (2007) Comprehensive and configurable metrics for supplier selection. International Journal of Production Economics 105(2): 510–523

    Article  Google Scholar 

  • Juttner U. (2005) Supply chain risk management: Understanding the business requirements from a practitioner perspective. The International Journal of Logistics Management 16(1): 120–141

    Article  Google Scholar 

  • Juttner U., Peck H., Christopher M. (2003) Supply chain risk management: Outlining an agenda for future research. International Journal of Logistics: Research and Applications 6(4): 197–210

    Google Scholar 

  • Kahraman C., Cebeci U., Ulukan Z. (2003) Multi-criteria supplier selection using fuzzy AHP. Logistics Information Management 16(6): 382–394

    Article  Google Scholar 

  • Khan O., Christopher M., Burnes B. (2008) The impact of product design on supply chain risk: A case study. International Journal of Physical Distribution & Logistics Management 38(5): 412–432

    Article  Google Scholar 

  • Kim K. Y., Wang Y., Muogboh O. S., Nnaji B. O. (2004) Design formalism for collaborative assembly design. Computer-Aided Design 36(9): 849–871

    Article  Google Scholar 

  • Kim T., Cera C. D., Regli W. C., Choo H., Han J. (2006) Multi-level modeling and access control for data sharing in collaborative design. Advanced Engineering Informatics 20(1): 47–57

    Article  Google Scholar 

  • Kubat, C., & Yuce, B. (2010). A hybrid intelligent approach for supply chain management system. Journal of Intelligent Manufacturing (in press).

  • Lee A. H. I. (2009) A fuzzy supplier selection model with the consideration of benefits, opportunities, costs and risks. Expert Systems with Applications 36(2, Part 2): 2879–2893

    Article  Google Scholar 

  • Lee H. L., Whang S. (2000) Information sharing in a supply chain. International Journal of Manufacturing Technology and Management 1(1): 79–93

    Article  Google Scholar 

  • Leong K. K., Yu K. M., Lee W. B. (2003) A security model for distributed product data management system. Computers in Industry 50(2): 179–193

    Article  Google Scholar 

  • Li L. (2002) Information sharing in a supply chain with horizontal competition. Management Science 48(9): 1196–1212

    Article  Google Scholar 

  • Li, H., & Geng, Y. (2008). Confidential information protection for industry design. Technical report, Concordia Institute for Information Systems Engineering, Concordia University, Montreal.

  • Li, J., Xiong, N., Park, J., Liu, C., Ma, S., & Cho, S. (2009). Intelligent model design of cluster supply chain with horizontal cooperation. Journal of Intelligent Manufacturing, 1–15.

  • Lindell Y., Pinkas B. (2002) Privacy preserving data mining. Journal of Cryptology 15(3): 177–206

    Article  Google Scholar 

  • Lockamy A. III, McCormack K. (2010) Analysing risks in supply networks to facilitate outsouring decisions. International Journal of Production Research 48(2): 593–611

    Article  Google Scholar 

  • Mason-Jones R., Towill D. R. (1998) Shrinking the supply chain uncertainty circle. Control 24(7): 17–22

    Google Scholar 

  • McCauley-Bell P. (1999) Intelligent agent characterization and uncertainty management with fuzzy set theory: A tool to support early supplier integration. Journal of Intelligent Manufacturing 10(2): 135–147

    Article  Google Scholar 

  • Mun D., Hwang J., Han S. (2009) Protection of intellectual property based on a skeleton model in product design collaboration. Computer-Aided Design 41(9): 641–648

    Article  Google Scholar 

  • Neiger D., Rotaru K., Churilov L. (2009) Supply chain risk identification with value-focused process engineering. Journal of Operations Management 27(2): 154–168

    Article  Google Scholar 

  • Saaty T. L. (2004) Fundamentals of the analytic network process-multiple networks with benefits, opportunities, costs and risks. Journal of Systems Science and Systems Engineering 13(3): 348–379

    Article  Google Scholar 

  • Sandhu R. S., Coyne E. J., Feinstein H. L., Youman C. E. (1996) Role-based access control models. IEEE Computer 29(2): 38–47

    Article  Google Scholar 

  • Shyamsundar N., Gadh R. (2002) Collaborative virtual prototyping of product assemblies over the Internet. Computer-Aided Design 34(10): 755–768

    Article  Google Scholar 

  • Sun, X., Zeng, Y., & Liu, W. (2010). Formalization of design chain management using environment-based design (EBD) theory. Journal of Intelligent Manufacturing (accepted).

  • Svensson G. (2000) A conceptual framework for the analysis of vulnerability in supply chains. International Journal of Physical Distribution & Logistics Management 30(9): 731–750

    Article  Google Scholar 

  • Svensson G. (2002) A conceptual framework of vulnerability in firms’ inbound and outbound logistics flows. International Journal of Physical Distribution & Logistics Management 32(2): 110–134

    Article  Google Scholar 

  • Tolone W., Ahn G. J., Pai T., Hong S. P. (2005) Access control in collaborative systems. ACM Computing Surveys 37(1): 29–41

    Article  Google Scholar 

  • Wang Y., Ajoku P. N., Brustoloni J. C., Nnaji B. O. (2006) Intellectual property protection in collaborative design through lean information modeling and sharing. Journal of Computing and Information Science in Engineering 6(2): 149–159

    Article  Google Scholar 

  • Yao, A. (1986). How to generate and exchange secrete. In: Proceedings of the 27th annual symposium on foundations of computer science (pp. 162–167).

  • Zeng Y., Gu P. (1999) A science-based approach to product design theory part II: Formulation of design requirements and products. Robotics and Computer-Integrated Manufacturing 15(4): 341–352

    Article  Google Scholar 

  • Zhang H. (2002) Vertical information exchange in a supply chain with duopoly retailers. Production and Operations Management 11(4): 531–546

    Article  Google Scholar 

  • Zhang D.Y., Zeng Y., Wang L., Li H., Geng Y. (2011) Modeling and evaluating information leakage caused by inferences in supply chains. Computer in Industry 62(3): 351–363

    Article  Google Scholar 

  • Zsidisin G. A., Ellram L. M., Carter J. R., Cavinato J. L. (2004) An analysis of supply risk assessment techniques. International Journal of Physical Distribution & Logistics Management 34(5): 397–413

    Article  Google Scholar 

  • Zsidisin G. A., Smith M. E. (2005) Managing supply risk with early supplier involvement: A case study and research propositions. Journal of Supply Chain Management 41(4): 44–57

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yong Zeng.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhang, D.Y., Cao, X., Wang, L. et al. Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection. J Intell Manuf 23, 1351–1364 (2012). https://doi.org/10.1007/s10845-011-0527-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10845-011-0527-3

Keywords

Navigation