• 沒有找到結果。

6. Discussion

6.3 Further Research

As has been implied, there is a need for further research efforts focused on accumulating empirical evidence for the validation and assessment of measurement properties and data surmounting the limitations of the present study. Such research is needed to address how other variables relate to supply chain performance. Wearable interface in IoT, for example, has received inadequate attention in MIS and technology innovation theories. Further research could also investigate the relative importance of the factors impacting each stage of the supply chain process. These efforts should involve studies identifying the organizational factors which affect such independent variables as process fit, information quality, and system support. Also, special attention should be focused on data collected in various industries or specific context over an extended period. The analysis of such data may enable conclusions to be drawn about both more generalized relationships among variables and causality.

29

References

Armbrust, M., Stoica, I., Zaharia, M., Fox, A., Griffith, R., Joseph, A. D., & Rabkin, A. (2010). A view of cloud computing.

Communications of the ACM, 53(4),

50.

doi:10.1145/1721654.1721672

Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer Networks,

54(15), 2787-2805. doi:10.1016/j.comnet.2010.05.010

Barney, J. (1991). Firm Resources and Sustained Competitive Advantage Journal of Management,

17(1), 99-120. doi:10.1177/014920639101700108

Baron, R. M., & Kenny, D. A. (1986). The moderator–mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations. Journal of

Personality and Social Psychology, 51(6), 1173-1182. doi:10.1037/0022-3514.51.6.1173

Beamon, B. M. (1999). Measuring supply chain performance. International Journal of Operations

& Production Management, 19(3), 275-292. doi:10.1108/01443579910249714

Bharadwaj, A. S. (2000). A resource-based perspective on information technology capability and firm performance: an empirical investigation. MIS Quarterly, 24(1), 169-196.

Cegielski, C. G., Allison Jones‐Farmer, L., Wu, Y., & Hazen, B. T. (2012). Adoption of cloud computing technologies in supply chains. The International Journal of Logistics

Management, 23(2), 184-211. doi:10.1108/09574091211265350

Chang, R. M., Kauffman, R. J., & Kwon, Y. (2014). Understanding the paradigm shift to computational social science in the presence of big data. Decision Support Systems, 63, 67-80. doi:10.1016/j.dss.2013.08.008

Chen, H., Chiang, R. H. L., & Storey, V. C. (2012). Business Intelligence and Analytics: From Big Data to Big Impact. MIS Quarterly, 36(4), 1165-1188.

Chiang, R. H. L., Goes, P., & Stohr, E. A. (2012). Business Intelligence and Analytics Education, and Program Development. ACM Transactions on Management Information Systems, 3(3), 1-13. doi:10.1145/2361256.2361257

Cicchetti, D. V., Koenig, K., Klin, A., Volkmar, F. R., Paul, R., & Sparrow, S. (2011). From Bayes through marginal utility to effect sizes: a guide to understanding the clinical and statistical significance of the results of autism research findings. J Autism Dev Disord, 41(2), 168-174.

doi:10.1007/s10803-010-1035-6

Cronbach, L. (1951). Coefficient alpha and the internal structure of tests. Psychometrika, 16(3), 297-334. doi:10.1007/BF02310555

Day, G. S., & Wensley, R. (1988). Assessing advantage: a framework for diagnosing competitive superiority. Journal of Marketing, 52(2), 1-20.

DeGroote, S. E., & Marx, T. G. (2013). The impact of IT on supply chain agility and firm performance: An empirical investigation. International Journal of Information Management,

30

33(6), 909-916. doi:10.1016/j.ijinfomgt.2013.09.001

Dong, S., Xu, S. X., & Zhu, K. X. (2009). Research Note—Information Technology in Supply Chains: The Value of IT-Enabled Resources Under Competition. Information Systems

Research, 20(1), 18-32. doi:10.1287/isre.1080.0195

Edelman, L. F., Brush, C. G., & Manolova, T. (2005). Co-alignment in the resource–performance relationship: strategy as mediator. Journal of Business Venturing, 20(3), 359-383.

doi:10.1016/j.jbusvent.2004.01.004

Garrison, G., Kim, S., & Wakefield, R. L. (2012). Success factors for deploying cloud computing.

Communications of the ACM, 55(9), 62. doi:10.1145/2330667.2330685

Gartner. (2014). The Top 10 Strategic Technology Trends for 2014. Retrieved from

https://www.gartner.com/doc/2667526

Gartner. (2015). Research Guide: The Top 10 Strategic Technology Trends for 2015. Retrieved from https://www.gartner.com/doc/2966917

Graham, M. (2011). Cloud Collaboration: Peer-Production and the Engineering of the internet.

67-83. doi:10.1007/978-90-481-9920-4_5

Gunasekaran, A., Patel, C., & McGaughey, R. E. (2004). A framework for supply chain performance measurement. International Journal of Production Economics, 87(3), 333-347.

doi:10.1016/j.ijpe.2003.08.003

Gunasekaran, A., Patel, C., & Tirtiroglu, E. (2001). Performance measures and metrics in a supply chain environment. International Journal of Operations & Production Management,

21(1/2), 71-87. doi:10.1108/01443570110358468

Gupta, P., Seetharaman, A., & Raj, J. R. (2013). The usage and adoption of cloud computing by small and medium businesses. International Journal of Information Management, 33(5), 861-874. doi:10.1016/j.ijinfomgt.2013.07.001

Hancke, G. P., Markantonakis, K., & Mayes, K. E. (2010). Security Challenges for User-Oriented RFID Applications within the Internet of Things. Journal of Internet Technology, 11(3), 307-313.

Helland, P. (2013). Condos and clouds. Communications of the ACM, 56(1), 50.

doi:10.1145/2398356.2398374

Huo, B., Qi, Y., Wang, Z., & Zhao, X. (2014). The impact of supply chain integration on firm performance. Supply Chain Management: An International Journal, 19(4), 369-384.

doi:10.1108/scm-03-2013-0096

Iansiti, M., & Lakhani, K. R. (2014). Digital Ubiquity - How Connections, Sensors, and Data Are Revolutionizing Business. Harvard Business Review, November, 91-99.

IDC. (2014). IDC Predictions 2014: Battles for Dominance — and Survival — on the 3rd Platform (244606). Retrieved from

IDC. (2015). IDC Predictions 2015: Accelerating Innovation — and Growth — on the 3rd Platform (252700). Retrieved from

31

IEEE. (2014). Top Technology Trends for 2014. Retrieved from

http://www.computer.org/portal/web/membership/Top-10-Tech-Trends-in-2014

IEEE. (2015). Top Technology Trends for 2015. Retrieved from

http://www.computer.org/portal/web/membership/Top-Tech-Trends-for-2015

Ilie-Zudor, E., Kemény, Z., van Blommestein, F., Monostori, L., & van der Meulen, A. (2011). A survey of applications and requirements of unique identification systems and RFID techniques. Computers in Industry, 62(3), 227-252. doi:10.1016/j.compind.2010.10.004 Isoherranen, V. (2011). Analysis of Strategy Focus vs. Market Share in the Mobile Phone Case

Business. Technology and Investment, 02(02), 134-141. doi:10.4236/ti.2011.22014

Iyer, B., & Henderson, J. C. (2010). Preparing for the Future: Understanding the Seven Capabilities of Cloud Computing. MIS Quarterly Executive, 9(2), 117-131.

Jaccard, J., Wan, C. K., & Turrisi, R. (1990). The Detection and Interpretation of Interaction Effects Between Gontinuous Variables in Multiple Regression. Multivariate Behavioral Research,

25(4), 467-478.

Jacobs, A. (2009). The pathologies of big data. Communications of the ACM, 52(8), 36.

doi:10.1145/1536616.1536632

Jelinek, M., & Bergey, P. (2013). Innovation as the strategic driver of sustainability: big data knowledge for profit and survival. IEEE Engineering Management Review, 41(2), 14-22.

doi:10.1109/emr.2013.2259978

Kalloniatis, C., Mouratidis, H., & Islam, S. (2013). Evaluating cloud deployment scenarios based on security and privacy requirements. Requirements Engineering, 18(4), 299-319.

doi:10.1007/s00766-013-0166-7

Katzan, H. J. (2009). Cloud Software Service: Concepts, Technology, Economics. Service Science,

1(4), 256-269.

Kim, E., Nam, D.-i., & Stimpert, J. L. (2004). The applicability of Porter's generic strategies in the digital age: assumptions, conjectures, and suggestions. Journal of Management, 30(5), 569-589. doi:10.1016/j.jm.2003.12.001

Kim, H., & Feamster, N. (2013). Improving Network Management with Software Defined Networking. IEEE Communications Magazine, February, 114-119.

Koo, C. M., Koh, C. E., & Nam, K. (2004). An Examination of Porter's Competitive Strategies in Electronic Virtual Markets: A Comparison of Two On-line Business Models. International

Journal of Electronic Commerce, 9(1), 163-180.

Kwon, O., Lee, N., & Shin, B. (2014). Data quality management, data usage experience and acquisition intention of big data analytics. International Journal of Information

Management, 34(3), 387-394. doi:10.1016/j.ijinfomgt.2014.02.002

Laosirihongthong, T., Tan, K. C., & Kannan, V. R. (2010). The impact of market focus on operations practices. International Journal of Production Research, 48(20), 5943-5961.

doi:10.1080/00207540903232797

32

Leong, L.-Y., Hew, T.-S., Tan, G. W.-H., & Ooi, K.-B. (2013). Predicting the determinants of the NFC-enabled mobile credit card acceptance: A neural networks approach. Expert Systems

with Applications, 40(14), 5604-5620. doi:10.1016/j.eswa.2013.04.018

Lin, A., & Chen, N.-C. (2012). Cloud computing as an innovation: Percepetion, attitude, and adoption. International Journal of Information Management, 32(6), 533-540.

doi:10.1016/j.ijinfomgt.2012.04.001

McAfee, A., & Brynjolfsson, E. (2012). Big Data- The Management Revolution. Harvard Business

Review, October, 1-9.

Miller, A., & Dess, G. G. (1993). Assessing Porter’s (1980) model in terms of generalizability, ccuracy, and simplicity Journal of Management Studies, 30(4), 553-585.

Miller, D. (1987). The structural and environmental correlates of business strategy. Strategic

Management Journal, 8(1), 55-76.

Miller, D. (1988). Relating porter’s business strategies to environment and structure: analysis and performance implications. Academy of Management Journal, 31(2), 280-308.

Mills, L. A., Knezek, G., & Khaddage, F. (2014). Information Seeking, Information Sharing, and going mobile: Three bridges to informal learning. Computers in Human Behavior, 32, 324-334. doi:10.1016/j.chb.2013.08.008

Neely, A., Gregory, M., & Platts, K. (1995). Performance measurement system design.

International Journal of Operations & Production Management, 15(4), 80-116.

doi:10.1108/01443579510083622

Nunnally, J. C., & Bernstein, I. H. (1994). Psychometric theory (3 ed.). New York: McGraw-Hill.

Oltra, M. J., & Luisa Flor, M. (2010). The moderating effect of business strategy on the relationship between operations strategy and firms' results. International Journal of Operations &

Production Management, 30(6), 612-638. doi:10.1108/01443571011046049

Piran, M. J., Murthy, G. R., & Babu, G. P. (2011). Vehicular Ad Hoc and Sensor Networks:

Principals and Challenges. International Journal of Ad hoc, Sensor & Ubiquitous

Computing, 2(2), 38-49. doi:10.5121/ijasuc.2011.2204

Porter, M. E. (1980). Competitive Strategy. New York: Free Press.

Porter, M. E. (1985). Competitive Advantage. New York: Free Press.

Porter, M. E. (2001). Strategy and the Internet. Harvard Business Review, 79(2), 63-78.

Porter, M. E., & Heppelmann, J. E. (2014). How Smart, Connected Products Are Transforming Competition. Harvard Business Review, November, 64-88.

Porter, M. E., & Millar, V. E. (1985). How information gives you competitive advantage. Harvard

Business Review, 63(4), 61-78.

Qrunfleh, S., & Tarafdar, M. (2014). Supply chain information systems strategy: Impacts on supply chain performance and firm performance. International Journal of Production Economics,

147, 340-350. doi:10.1016/j.ijpe.2012.09.018

Reimann, M., Schilke, O., & Thomas, J. S. (2009). Customer relationship management and firm

33

performance: the mediating role of business strategy. Journal of the Academy of Marketing

Science, 38(3), 326-346. doi:10.1007/s11747-009-0164-y

Serrano, N., Hernantes, J., & Gallardo, G. (2013). Mobile Web Apps. IEEE Software,

September/October, 22-27.

Shin, S., Kim, K., Kim, K.-H., & Yeh, H. (2012). A Remote User Authentication Scheme with Anonymity for Mobile Devices. International Journal of Advanced Robotic Systems, 1.

doi:10.5772/50912

Sotomayor, B., Montero, R. S., Lorente, I. M., & Foster, I. (2009). Virtual infrastructure management in private and hybrid clouds. IEEE Internet Computing, 13(5), 14-22.

Straub, D. W. (1989). Validating instruments in MIS research. MIS Quarterly, 13(2), 147-169.

Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing.

Journal of Network and Computer Applications, 34(1),

1-11.

doi:10.1016/j.jnca.2010.07.006

Sultan, N. (2013). Cloud computing: A democratizing force? International Journal of Information

Management, 33(5), 810-815. doi:10.1016/j.ijinfomgt.2013.05.010

Sultan, N., & van de Bunt-Kokhuis, S. (2012). Organisational culture and cloud computing: coping with a disruptive innovation. Technology Analysis & Strategic Management, 24(2), 167-179.

doi:10.1080/09537325.2012.647644

Tan, G. W.-H., Ooi, K.-B., Chong, S.-C., & Hew, T.-S. (2014). NFC mobile credit card: The next frontier of mobile payment?

Telematics and Informatics, 31(2),

292-307.

doi:10.1016/j.tele.2013.06.002

Venkatraman, N. (1989). The concept of fit in strategy research - Toward verbal and statistical correspondence. Academy of Management Review, 14(3), 423-444.

Vijayasarathy, L. R. (2010). An investigation of moderators of the link between technology use in the supply chain and supply chain performance. Information & Management, 47(7-8), 364-371. doi:10.1016/j.im.2010.08.004

Vouk, M. A. (2008). Cloud Computing – Issues, Research and Implementations. Journal of

Computing and Information Technology, 16(4), 235-246. doi:10.2498/cit.1001391

Wagner, S. M., Grosse-Ruyken, P. T., & Erhun, F. (2012). The link between supply chain fit and financial performance of the firm. Journal of Operations Management, 30(4), 340-353.

doi:10.1016/j.jom.2012.01.001

Waller, M. A., & Fawcett, S. E. (2013). Data Science, Predictive Analytics, and Big Data: A Revolution That Will Transform Supply Chain Design and Management. Journal of

Business Logistics, 34(2), 77-84.

Watson, C., McCarthy, J., & Rowley, J. (2013). Consumer attitudes towards mobile marketing in the smart phone era. International Journal of Information Management, 33(5), 840-849.

doi:10.1016/j.ijinfomgt.2013.06.004

Wernerfelt, B. (1984). A Resource-based View of the Firm. Strategic .Management Journal, 5,

34

171-180.

Wright, P. (1987). A Refinement of Porter’s generic strategies. Strategic Management Journal, 8, 93-101.

Wu, F., Yeniyurt, S., Kim, D., & Cavusgil, S. T. (2006). The impact of information technology on supply chain capabilities and firm performance: A resource-based view. Industrial

Marketing Management, 35(4), 493-504. doi:10.1016/j.indmarman.2005.05.003

Zhang, X., Pieter van Donk, D., & van der Vaart, T. (2011). Does ICT influence supply chain management and performance? International Journal of Operations & Production

Management, 31(11), 1215-1247. doi:10.1108/01443571111178501

1

科技部補助專題研究計畫出席國際學術會議心得報告

日期: 104 年 10 月 1 日

一、參加會議經過

APDSI 國際學術研討會(Asia Pacific Decision Sciences Institute Conference)本年度(2015)與 The 2nd International conference on Supply Chain for Sustainability 共同舉辦,於 2015 年 7 月 19 日至 22 日在香港(Hong Kong)舉行。會議中除論文的發表,並作相關研 究成果的討論與意見的交流。我於會議中發表之論文題目為「The Research on Developing a Supply Chain Risk Management Strategy Evaluation Simulation Model」 ,論文全文附於本心得報告之「三、發 表論文全文或摘要」 。

二、與會心得

計畫編號 MOST 103-2410-H-004-110

計畫名稱 應用於供應鏈管理上之新興軟體技術的選擇與運用策略研究 出國人員

姓名 林我聰 服務機構

及職稱

政治大學資訊管理學系 教授

會議時間 2015 年 7 月 19 日至

2015 年 7 月 22 日 會議地點 香港(Hong Kong)

會議名稱

(中文)

(英文)

APDSI 2015(20th Asia Pacific Decision Sciences Institute Conference)

發表論文 題目

(中文)

(英文)

The Research on Developing a Supply Chain Risk

Management Strategy Evaluation Simulation Model

2

研討會論文發表共分為 27 個 Panels,Panel 名稱如下:

1. International Business Research 2. Manufacturing Management 3. Retail Marketing

4. Quality & Product Development 5. Supply Chain Coordination 6. Service Management

7. Social Networking

8. Supply Chain Risk & Resilience 9. Healthcare Management

10. MS/OR

11. Supply Chain Integration

12. Sustainability: Economic Benefits 13. Asia Business Strategy & Management 14. Financial Markets

15. Knowledge Management & Strategy 16. Supply Chain Purchasing & Logistics 17. e-Commerce & Social Media Network 18. Organization Behavior

19. Service Industries & Performance 20. Sustainability

21. Case Studies 22. Statistics

23. Green Trade Pacts & Strategic Alliances 24. Green Corporate Sustainability

25. Environmental Footprint - Green Design

26. Asia Pacific Supply Chain - Challenges & Opportunities in the 21st Century

27. Environmental Footprint – Marketing & POM

與會之發表人員皆能就其論文題目及所屬研究領域,提出頗為 深入的想法與創見;同時藉由和發表人員的面對面討論與意見交流,

更能掌握其研究成果的精髓,及觸發後續可能之研究議題。

三、發表論文全文或摘要

3

THE RESEARCH ON DEVELOPING A SUPPLY CHAIN RISK MANAGEMENT STRATEGY EVALUATION SIMULATION MODEL

Yun-Feng Wu, Department of Management Information Systems, National Chengchi

University, No. 64, Sec.2, ZhiNan Rd., Wenshan District, Taipei City 11605,Taiwan (R.O.C), 101356035@nccu.edu.tw

Woo-Tsong Lin, Department of Management Information Systems, National Chengchi University, No. 64, Sec.2, ZhiNan Rd., Wenshan District, Taipei City 11605,Taiwan (R.O.C), lin@mis.nccu.edu.tw

ABSTRACT

As part of the division of labor and globalization, enterprises, customers and suppliers are located in various countries and regions. Complex, globalized supply chain network have greatly increased total supply chain risks. Therefore, improving the management of risk associated with the supply chain has become important to many enterprises. A supply chain risk management strategy evaluation simulation model is proposed in the present research.

The simulation model, which constructed by using System Dynamics approach and the supply chain risk factor framework proposed by Chen and Lin [4], is used to evaluate the

performance of supply chain risk management strategies, and is a useful tool for managers to assess supply chain risks as well as to test and select proper supply chain risk management strategies.

Keywords: supply chain risk management; risk management strategy; simulation

INTRODUCTION

In order to reduce costs and improve overall supply chain efficiency, enterprises are looking for the best solutions over the world. Partners of the enterprise formed an extremely complex global supply chain network, and this situation also makes supply chain risk has been severely tested. Miyagi earthquake occurred on 11 March 2011 in Japan and after that a tsunami

impact Japan east coast. Japan Miyagi earthquake and tsunami happened, many enterprises industry experienced supply chain interruption like Apple i-Devices, Boeing 787 airplane etc.

In the same year Thailand floods impact computer industry. Hard drive shortages cause

4

related enterprises supply chain disruptions, and also caused huge losses in sales. We can find that want be the best companies in the supply chain could ignore the risk out occur probability.

Manuj and Mentzer noted that global supply chains have numerous links interconnecting a wide network of firms. These links are prone to disruptions, bankruptcies, breakdowns, macroeconomic and political changes, and disasters leading to higher risks and making risk management difficult[16]. Elangovan et al. noted that Supply chain risk will have a very large impact, and even further become supply chain disruptions situation [7]. As a result enterprises suffer great harm. Therefore supply chain risk management is very important for the

enterprise. Companies must pay more attention to issues of supply chain risk management strategy to reduce supply chain risk probability of occurrence. Blos et al. noted that supply chain risk management has become an important issue facing by all companies currently.

Hence, this research will focus on the issue "how to reduce the impact of the occurrence of the supply chain risk effectively" [3]. This paper uses Chen and Lin proposed the interrelatedness of risk factors, and used it to establish model for researching related risk management policies [4]. The research results can help enterprises develop related strategies to the effectiveness and reduce the impact of the supply chain its members. This paper purpose is to propose a supply chain risk management strategy decision model and use the simulation method to validate the effectiveness of the model.

LITERATURE REVIEW

The goal of this research is to establish a supply chain risk management strategy decision model. This chapter will review the relevant literature.

Supply chain operations reference model

Supply Chain Council (SCC) has developed a Supply Chain Operations Reference model (SCOR-model) to be a reference model for supply chain management cross industry. The model spans all customer interactions, spans all product transactions, from your supplier’s supplier to your customer’s customer; and spans all market interactions, from the

understanding of aggregate demand to the fulfilment of each order. The SCOR-model ver.9 comprises five components: Plan, Source, Make, Deliver and Return. Each of these

components is considered both an important intra-organizational function and a critical inter-organization process. This framework can be viewed as a strategic tool for describing, communicating, implementing, controlling, and measuring complex supply chain processes

5

to achieve good performance.

Figure 1 – supply chain operations reference model

Supply chain management (SCM)

According to Blos et al. (2009, p247), they define SCM is “the management of material, information and finance through a network of organizations (i.e. suppliers, manufacturers, logistics providers, wholesales/distributors and retailers) that aims to produce and deliver products or services for the consumers [3]. Craighead et al. (2007, p134) defined SCM is “A supply chain comprises different entities that are connected by the physical flow of materials.

These different entities are involved in the conversion, the logistics, or the selling of

materials, with the materials reaching final customers in some desired form and quantity.” [5]

And the supply chain (SC) concept originated in the traditional logistics. SCC definition the SCM is the process of all activities from production to delivery of the final product to the customer. And members include a series of suppliers, manufacturers to the final customer.

Supply chain risk management (SCRM)

Presently supply chain risk management is very important for enterprises. Jing et al. noted that SCRM main purpose is to control, monitor or evaluate supply chain risk and guarantee the continuity of the supply chain and the pursuit of best interests. And SCRM uses strategy, human resources, process, technology and knowledge to pursue the best architecture and consultation process [9]. Manuj and Mentzer noted that a globalized supply chain network is easy in chaos, collapse and lead to a greater risk due to political and economic change [16].

Researchers think SCRM is an assessment and identification process of risk by loss in supply chain, and reduce or avoid the damage caused by the enterprise through the implementation of appropriate policy coordination among members of the supply chain.

6

Tummala and Schoenherr noted that Supply chains become longer and more complex than before but its performance improvements are not achieving the expected because possibility of failure has increased [28].

Classification of supply chain risk factors

Papers about risk factors have been research for long time, and have different define and classification methods. Elangovan et al. classified risk factors in 6 parts (improper selection of materials and supply, improper use of machines and equipment, improper manpower utilization, etc.)[7]. Manuj and Mentzer classified risk factors in 4 parts (supply, requirement, operations, and security)[16]. This paper use Chen and Lin propose supply chain risk factors [4]. Their research use previous supply chain risk factors research papers and build an enterprise overall risk factor patterns model based on SCOR model. The supply chain risk factors table as Table 1. In Table 1, Source phase 4 risk factors, Make phase 3 risk factors, Deliver phase 3 risk factors, and Return phase 3 risk factors. Total 12have mutual influence and more important risk factors.

Table 1 - classification of risk factors Stage Risk factor

1.Source

1.1 Suppliers supply enterprises with poor-quality raw materials.

1.2 The enterprises have weak planning of raw materials.

1.3 Enterprise has only one supplier.

1.4 Poor information transparency between enterprise and suppliers.

2.Make

2.1 The enterprises have weak planning of manufacturing.

2.2 Flexibility of manufacturing is poor.

2.3 Cost of inventory is too high.

3.Deliver

3.1 Forecast of customers’ demand is incorrect.

3.2 The enterprises have poor flexibility of replenishment for customers’

order.

3.3 Poor information transparency between enterprise and customers.

4.Return 4.1 Quality of recycling is uncertain.

4.2 Lead time of recycling is uncertain.

Supply chain risk management strategy

Supply chain risk management strategy literature can be divided into two categories:

principle strategies and case strategies. Principle strategies, for example: Manuj and Mentzer noted that we can use six methods to solve supply chain risks, which are postponement, speculation, hedging, control/share/transfer, security and avoidance [16]. Gaudenzi and

7

Borghesi propose four phase to problems: risk assessment, risk reporting and decision, risk treatment, and risk monitoring [8]. Case strategies are against risk situations in cases. This paper use case strategies to match the risk factors in Table 1.

System dynamic and simulation

System Dynamics is an approach to understanding the behavior of complex systems over time. It is a process-oriented research method and deals with internal feedback loops and time delays that affect the behavior of the entire system. System Dynamics is also a

methodology and mathematical modeling technique specializes in a lot of variables, studies of higher order nonlinear for understanding, and discussing complex issues and problems and it developed to help corporate managers improve their understanding of industrial processes. My main research method is system dynamic.

Simulation is the imitation of the operation of a real-world process or system over time. The act of simulating something first requires that a model be developed; this model represents the key characteristics or behaviors/functions of the selected physical or abstract system or process [13]. The model represents the system itself, whereas the simulation represents the operation of the system over time. In this paper we use simulation method to operate the model and prove the model is useful.

RESEARCH METHOD

This research use System Dynamics approach to construct a supply chain risk management strategy evaluation simulation model. And then we use this simulation model to evaluate the performance of risk management strategies. This research has three stages. The first stage use the supply chain risk factors proposed by Chen and Lin [4] to search the related risk

management strategies. The second stage is to build a supply chain risk management strategy evaluation simulation model. And the final stage is to use this simulation model to evaluate the performance of risk management strategies. The below tables are the risk management strategies found for the supply chain risk factors proposed by Chen and Lin [4].

8

Source stage:

Table 2 – SCRM strategies in source stage 1.1 Suppliers supply enterprises with poor-quality raw materials.

Tse & Tan, 2012; Managing product quality risk and visibility in multi-layer supply chain

S 1.1-1 Yoo et al, 2012; Inventory models for imperfect production and inspection

processes with various inspection options under one-time and continuous improvement investment

S 1.1-2

1.2 The enterprises have weak planning of raw materials.

Snyder, 2006; A tight approximation for a continuous-review inventory model with supplier disruptions

S 1.2-1 Schmitt, & Singh, 2012; A quantitative analysis of disruption risk in a

multi-echelon supply chain

S 1.2-2 1.3 Enterprise has only one supplier.

Sawik, 2013; Selection of resilient supply portfolio under disruption risks S 1.3-1 Nicola & Roberta, 2010; Choosing between single and multiple sourcing based

on supplier default risk

on supplier default risk

相關文件