Emerging Information Technologies Usage: Opportunities and Challenges for Supply Chain Vulnerability

被引:0
作者
Guo, Xiaoting [1 ]
Yang, Zhaojun [1 ]
Tan, Chrissie Diane [2 ]
机构
[1] Xidian Univ, Sch Econ & Management, Xian, Shaanxi, Peoples R China
[2] Northwestern Polytech Univ, Sch Management, Xian, Shaanxi, Peoples R China
来源
2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM) | 2019年
关键词
Big Data Analysis (BDA); Blockchain; Cloud technology; Internet of Things (IoT); Radio Frequency Identification (RFID); supply chain vulnerability; BIG DATA ANALYTICS; THINGS IOT; INTERNET; MANAGEMENT; LOGISTICS; IMPACT; RISK;
D O I
10.1109/ieem44572.2019.8978928
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Due to the frequent occurrence of destructive events, organizations are more vulnerable to obstruction. As this has become a prominent problem, reducing the vulnerability of the supply chain is imperative. In such an environment, the rapid development of information technology has made emerging technologies a powerful weapon to solve supply chain problems. According to existing research, information technology can improve an enterprise's ability to cope with supply chain risks. Therefore, it is necessary to examine the specific relationship between information technology and supply chain vulnerability. This paper adopts the literature review method to explore the drivers of vulnerability from three aspects: demand control, supplier selection, and cooperation, and supply chain process control. Five emerging information technologies with wide application scopes and interactions were selected to examine the multiple relationships between information technology and vulnerability by analyzing their capabilities and strengths, as well as their disadvantages.
引用
收藏
页码:845 / 849
页数:5
相关论文
共 34 条
  • [21] Humanitarian supply chain use of cloud computing
    Schniederjans, Dara G.
    Ozpolat, Koray
    Chen, Yuwen
    [J]. SUPPLY CHAIN MANAGEMENT-AN INTERNATIONAL JOURNAL, 2016, 21 (05) : 569 - 588
  • [22] Tajima May, 2007, Journal of Purchasing and Supply Management, V13, P261, DOI 10.1016/j.pursup.2007.11.001
  • [23] Nguyen TL, 2017, COMPLEXITY, P1, DOI [10.1155/2017/3083745, 10.1109/CLEOE-EQEC.2017.8086935]
  • [24] RFID, privacy and the perception of risk: A strategic framework
    Thiesse, Frederic
    [J]. JOURNAL OF STRATEGIC INFORMATION SYSTEMS, 2007, 16 (02) : 214 - 232
  • [25] Patching Traceroute Using Geographic Information In Neutrality Inference Crowdsourcing
    Tian, Feng
    Wang, Lei
    Liu, Xinyang
    Gao, Shan
    [J]. 2017 3RD INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM), 2017, : 1 - 9
  • [26] Tiwari A., 2013, International Journal of Innovative Technology and Exploring Engineering, V3, P152
  • [27] A hierarchical model of the impact of RFID practices on retail supply chain performance
    Vlachos, Ilias P.
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (01) : 5 - 15
  • [28] Wagner SM, 2009, INT SER OPER RES MAN, V124, P271
  • [29] Assessing the vulnerability of supply chains using graph theory
    Wagner, Stephan M.
    Neshat, Nikrouz
    [J]. INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 2010, 126 (01) : 121 - 129
  • [30] Big data analytics in logistics and supply chain management: Certain investigations for research and applications
    Wang, Gang
    Gunasekaran, Angappa
    Ngai, Eric W. T.
    Papadopoulos, Thanos
    [J]. INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 2016, 176 : 98 - 110