Advanced Search
MyIDEAS: Login

The Role Of Information Sharing In Supply Chain Management: The Securescm Approach

Contents:

Author Info

  • ERNESTO DAMIANI

    ()
    (DTI – Università degli Studi di Milano, Via Bramante, 65 – 26013 Crema (CR), Italy)

  • FULVIO FRATI

    ()
    (DTI – Università degli Studi di Milano, Via Bramante, 65 – 26013 Crema (CR), Italy)

  • ROMARIC TCHOKPON

    ()
    (DTI – Università degli Studi di Milano, Via Bramante, 65 – 26013 Crema (CR), Italy)

Registered author(s):

    Abstract

    Information sharing plays a role of paramount importance in modern supply chain environments. In fact, the elements that compose the chain need to share information about sensitive aspects of their business in order to build more accurate and profitable supply plans. In this paper, we describe how the increasing of information released increases the overall economic results of the whole chain, and how this information can be protected, exploiting secure computation techniques, to reduce the risk of data disclosure and prevent quasi-altruistic or selfish behaviors without interfering with the chain's normal operation, and in particular with the minimization of the cost function.

    Download Info

    If you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
    File URL: http://www.worldscinet.com/cgi-bin/details.cgi?type=pdf&id=pii:S0219877011002386
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: http://www.worldscinet.com/cgi-bin/details.cgi?type=html&id=pii:S0219877011002386
    Download Restriction: Access to full text is restricted to subscribers.

    As the access to this document is restricted, you may want to look for a different version under "Related research" (further below) or search for a different version of it.

    Bibliographic Info

    Article provided by World Scientific Publishing Co. Pte. Ltd. in its journal International Journal of Innovation and Technology Management.

    Volume (Year): 08 (2011)
    Issue (Month): 03 ()
    Pages: 455-467

    as in new window
    Handle: RePEc:wsi:ijitmx:v:08:y:2011:i:03:p:455-467

    Contact details of provider:
    Web page: http://www.worldscinet.com/ijitm/ijitm.shtml

    Order Information:
    Email:

    Related research

    Keywords: Supply chain; secure computation; information risk; secureSCM;

    References

    No references listed on IDEAS
    You can help add them by filling out this form.

    Citations

    Lists

    This item is not listed on Wikipedia, on a reading list or among the top items on IDEAS.

    Statistics

    Access and download statistics

    Corrections

    When requesting a correction, please mention this item's handle: RePEc:wsi:ijitmx:v:08:y:2011:i:03:p:455-467. See general information about how to correct material in RePEc.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Tai Tone Lim).

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If references are entirely missing, you can add them using this form.

    If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.