Full Length Research Paper
References
Attaran M (2007). 'RFID: An Enabler of Supply Chain Operations', Supply Chain Manag. 12(4): 249- 257. |
|
|
|
Boone T, Ganeshan R (2007) 'The frontiers of e Business technology and supply chains', J. Oper. Manage. 25 (6): 1195-1198. |
|
|
|
Bose I, Mahapatra RK (2001) 'Business data mining — a machine learning perspective', Inform. Manage. 39(3): 211–225. |
|
|
|
Boyle RD (2004). 'Achieving your Supply Chain Goals: Conquering the 'First Mile' Hurdle of Data Capture'APICS-The Performance Advantage, July/August, Vol. 14, No.7. |
|
|
|
Calia E (2010). 'The Internet of Things & Identity in the Future Internet', Istituto Superiore Mario Boella: Torino Italy. |
|
|
|
Cerullo MJ, Cerullo V (1999). 'Using neural networks to predict financial reporting fraud, Computer Fraud & Security May/June 14–17. |
|
|
|
Chandan AC, Shilpa SK (2009). 'RFID Adoption by Indian Retailers: An Exploratory Study', IUP J. Supply Chain Manage. 6(1): 66-77. |
|
|
|
Chou DC, Tan X, Yen DC (2004). 'Web technology and supply chain management', Inf. Manage Comp. Soc.12(4): pp.338–349. |
|
|
|
Christopher M, Peck H (2007). 'Building the Resilient Supply Chain', http://www.martinchristopher.info/downloads/building%20the%20resilient%20supply%20chain.pdf (Accessed on 10.09.2014) |
|
|
|
Coronado AE, Andrew CL, Zenon M, Dennis FK (2004). 'Automotive supply chain models and technologies: A review of some latest developments', www.emeraldinsight.com/1741-0398.htm (Accessed on 10.09.2014) |
|
|
|
D'Avanzo R, Starr E, Von Lewinski H (2004). 'Supply chain and the bottom line: a critical link', Outlook: Accenture, 1: 39-45. |
|
|
|
Davenport TH, Brooks FD (2004). 'Enterprise systems and the supply chain', J. Enterp. Inf. Manage. 17(1): 8–19. |
|
|
|
Dowling C, Leech S (2007). 'Audit support systems and decision aids: Current practice and opportunities for future research', Int. J. Account. Inf. Syst. 8(2): 92-116. |
|
|
|
Fosso WS (2012) 'Achieving Supply Chain Integration using RFID Technology: the Case of Emerging Intelligent B-to-B e-Commerce Processes in a Living Laboratory', Bus. Process Manage. J. 18(1):58-81. |
|
|
|
Fosso WS, Lefebvre LA, Bendavid Y Lefebvre E (2008). 'Exploring the impact of RFID technology and the EPC network on mobile B2B eCommerce: A case study in the retail industry', Int. J. Prod. Econ. 112(2): 614-629. |
|
|
|
Gao X, Wang H, Shen J, Huang J, Song B (2004). "An Approach to Security and Privacy of RFID System FOR Supply Chain," Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business (CEC-East'04), pp. 164-168. |
|
|
|
Garcia-Dastugue SJ, Lambert D (2007). 'Inter organizational time-based postponement in the supply chain', J. Bus. Logistics, 28(1): 57–81 |
|
|
|
Gilaninia SHS, Danesh, SY, Amiri M, Mousavian SJ (2011). 'Effective Factors on Adoption of E-Commerce in SME Cooperative', Interdisciplinary J. Contemp. Res. Bus. 3(6): 13-21. |
|
|
|
Gould LS (2000). 'What you need to know about RFID', Automotive Manufacturing & Production, 112(2): 46-49. |
|
|
|
Hillman M, Keltz H (2007) 'Managing Risk in the Supply Chain – A Quantitative Study', http://www.amrresearch.com/Content/View.aspx?pmillid=19994 (Accessed on 10.09.2014) |
|
|
|
Janvrin D, Bierstaker J, Love DJ (2008). 'An Examination of Audit Information Technology Use and Perceived Importance', Account. Horizons, 22(1): 1-21. |
|
|
|
Jedermann R, Ruiz-Garcia L, Lang W (2009) 'Spatial temperature profiling by semi-passive RFID loggers for perishable food transportation', Comput. Electron. Agr. 65: 145–154. |
|
|
|
Kirkos E, Spathis C, Manolopoulos Y (2007). 'Data mining techniques for the detection of fraudulent financial statement', Expert Syst. Appl. 32(2): 995–1003. |
|
|
|
KPMG. International (2006). 'Developing a strategy for prevention, detection and response', Fraud Risk Management. |
|
|
|
Kull TJ, Bojer K, Calantone R (2007). 'Last-Mile supply chain efficiency: an analysis of learning curves in online ordering', Int. J. Oper. Prod. Manage. 27(4): 409–434. |
|
|
|
Laudon KC, Laudon JP (2000). Management Information Systems: Organization and Technology in the Networked Enterprises. 6th Edn., Prentice-Hall Inc., USA. |
|
|
|
Lee HL, Padmanabhan P, Whang S (1997). 'Information Distortion in a Supply Chain: The Bullwhip Effect', Manage. Sci. 43: 546-558. |
|
|
|
Little AG, Best PJ (2003). 'A framework for separation of duties in an SAP R/3 environment', Managerial Auditing J. 18(5): 419–430. |
|
|
|
Mabert VM, Soni A, Venkataramanan MA (2001). 'Enterprise resource planning: Common myths versus evolving Reality', Bus. Horizons, 44(3): 69–76. |
|
|
|
Mahamani A, Rao KP (2010). 'Development of a spreadsheet bases vendor managed inventory model for the single echelon supply chain: A case study', Serbian J. Manage. 5(2):199–211. |
|
|
|
Mahinderjit-Singh M, Li X (2009). 'Trust Framework for RFID Tracking in Supply Chain Management', Proc of The 3rd International Workshop on RFID Technology – Concepts, Applications, Challenges (IWRT 2009), Milan, Italy, pp 17-26, 6-7 May. |
|
|
|
Mahinderjit-Singh M, Li X (2010). 'Trust in RFID-Enabled Supply-Chain', Management', Int. J. Security Networks, 5(2/3): 96-105. |
|
|
|
Moon YB (2007). 'Enterprise resource planning (ERP): A review of the literature', Int. J. Manage. Enterprise Dev. 4(3): 235-263. |
|
|
|
Nair PR (2012). 'RFID for Supply Chain Management', CSI Communications, November. 36(8):14-18 |
|
|
|
Nair PR (2013). 'E-Supply Chain Management using Software Agents', CSI Communications, July 2013, 37(4): 13-16. |
|
|
|
Ngai EWT, Gunasekaran A (2004). 'Information systems in supply chain integration and management', Eur. J. Oper. Res. 159(2): 269-295. |
|
|
|
Owusu-Ansah S, Moyes GD, Oyelere PB, Hay P (2002). 'An empirical analysis of the likelihood of detecting fraud in New Zealand', Manage. Auditing J. 17(4): 192–204. |
|
|
|
Panik M (2009). 'Regression Modeling Methods, Theory, and Computation with SAS', CRC Press. |
|
|
|
Patel RB, Garg K (2004). 'Distributed Banking with Mobile Agents: An Approach for E-Commerce', WSEAS TRANSACTIONS ON COMPUTERS 3(1): 98-102. |
|
|
|
Phua C, Lee V, Smith K, Gayler R (2005). 'A comprehensive survey of data mining-based fraud detection research', Artif. Intell. Rev. pp. 1–14. |
|
|
|
Picco GP (2001) 'Mobile Agents: An Introduction', Microprocessors and Microsystems, 25(2): 65-74. |
|
|
|
Prasad Ch.VVSNV, Govindan K, Kulkarni DM (2010). 'Role of IT in SCM environment', Int. J. Bus. Perfor. Supply Chain Modelling, 2(1): 81-94(14). |
|
|
|
Ramya SG (2013) 'Role of Software Agents in E-Commerce', Int. J. Comp. Eng. Res. 3(3): 246-251. |
|
|
|
Ronchi S, Brun A, Golini R, Fan X (2010). 'What is the value of an IT e-procurement system? J. Purchasing Supply Manage. 16(2): 131-140. |
|
|
|
Sabbaghi A, Vaidyanathan G (2008) 'Effectiveness and Efficiency of RFID technology in Supply Chain Management: Strategic values and Challenges', J. Theor. Appl. Elect. Com. Res. ISSN 0718–1876 Electronic Version, 3(2): 71-81. |
|
|
|
Sanchez A, Perez M (2003). 'The use of EDI for interorganisational co-operation and co-ordination in the supply chain', Integrated Manufacturing Systems, Vol. 14, No. 8, pp.642–651. |
|
|
|
Sanders NR, Premus R (2002). 'IT applications in supply chain organizations: A link between competitive priorities and organizational benefits', J. Bus. Logistics, 23(1): 65–83. |
|
|
|
SAP (2007), 'ABAP AS Authorization Concept-SAP NetWeaver', SAP AG. |
|
|
|
Sarac A, Absi N, Dauzère-Pérès S (2010), 'A literature review on the impact of RFID technologies on supply chain management', Int. J. Prod. Econ. 128(1): 77-95. |
|
|
|
Silver EA, Pyke DF, Peterson R (1998). 'Inventory Management and Production Planning and Scheduling', third edition, John Wiley and Sons, New York |
|
|
|
Simchi-Levi D, Kaminsky P, Simchi-Levi E (2003).' Designing and managing the supply chain. Concepts, strategies, and case studies' second edition, Boston. |
|
|
|
Spathis C, Doumpos M, Zopounidis C (2002) 'Detecting falsified financial statements: a comparative study using multicriteria analysis and multivariate statistical techniques', Eur. Account.Rev.11(3): 509–535. |
|
|
|
Srivastava, B (2004), 'Radio Frequency ID technology: the next revolution in SCM', Bus. Horizons, 47(6): 60-68. |
|
|
|
Stroeken JHM (2000). 'Information technology, innovation and supply chain structure', Int J. Technol. Manage. 26(3): 7-13. |
|
|
|
Talluri S., (2000). A benchmarking Method for Business-Process Reengineering and Improvement, Int. J. Flex. Manuf. Sys. 12(4): 291-304. |
|
|
|
Turban E, Aronson JE, Liang TP, Sharda R (2007). 'Decision Support and Business Intelligence Systems', Eighth edition, Pearson Education. |
|
|
|
Van Donk D, Van der Vaart T, Gimenez C (2008). 'Business Conditions, Integration and Performance in Supply Chains', 14th International Annual Euroma Conference, Supply Chain Management |
|
|
|
Varma TN, Khan DA (2012). 'Fraud Detection in Supply Chain using Benford Distribution', Int. J. Res. Manage. 5(2): 90-96. |
|
|
|
Varma TN, Khan DA (2014). 'MS excel functions as supply chain fraud detector', Afr. J. Bus. Manage. 8(24): 1109-1117. |
|
|
|
Viaene S, Derrig RA, Dedene G (2004) 'A case study of applying boosting naive Bayes to claim fraud diagnosis', IEEE Transactions on Knowledge and Data Engineering, 16(5): 612–620. |
|
|
|
Watson RT, Akelsen S, Pitt LF (1998). 'Building mountains in that flat landscape of the World Wide Web. California Manage. Rev. pp. 36–56 |
|
|
|
Wyld D (2006). 'RFID 101: The next big thing in management', Manage. Res. News, 29(4): 154-173. |
|
|
|
Yuan J, Yuan C, Deng X, Yuan C (2008). 'The effects of manager compensation and market competition on financial fraud in public companies: an empirical study in China, Int. J. Manage. 25(2): 322–335. |
Copyright © 2024 Author(s) retain the copyright of this article.
This article is published under the terms of the Creative Commons Attribution License 4.0