African Journal of
Business Management

  • Abbreviation: Afr. J. Bus. Manage.
  • Language: English
  • ISSN: 1993-8233
  • DOI: 10.5897/AJBM
  • Start Year: 2007
  • Published Articles: 4135

Full Length Research Paper

Information technology and e-risk of supply chain management

T. N. Varma
  • T. N. Varma
  • Department of Computer Applications, National Institute of Technology, Jamshedpur, India.
  • Google Scholar
D.A. Khan
  • D.A. Khan
  • Department of Computer Applications, National Institute of Technology, Jamshedpur, India.
  • Google Scholar


  •  Received: 06 December 2013
  •  Accepted: 02 March 2015
  •  Published: 28 March 2015

References

Attaran M (2007). 'RFID: An Enabler of Supply Chain Operations', Supply Chain Manag. 12(4): 249- 257.
Crossref

 

Boone T, Ganeshan R (2007) 'The frontiers of e Business technology and supply chains', J. Oper. Manage. 25 (6): 1195-1198.
Crossref

 

Bose I, Mahapatra RK (2001) 'Business data mining — a machine learning perspective', Inform. Manage. 39(3): 211–225.
Crossref

 

Boyle RD (2004). 'Achieving your Supply Chain Goals: Conquering the 'First Mile' Hurdle of Data Capture'APICS-The Performance Advantage, July/August, Vol. 14, No.7.

 

Calia E (2010). 'The Internet of Things & Identity in the Future Internet', Istituto Superiore Mario Boella: Torino Italy.

 

Cerullo MJ, Cerullo V (1999). 'Using neural networks to predict financial reporting fraud, Computer Fraud & Security May/June 14–17.
Crossref

 

Chandan AC, Shilpa SK (2009). 'RFID Adoption by Indian Retailers: An Exploratory Study', IUP J. Supply Chain Manage. 6(1): 66-77.

 

Chou DC, Tan X, Yen DC (2004). 'Web technology and supply chain management', Inf. Manage Comp. Soc.12(4): pp.338–349.
Crossref

 

Christopher M, Peck H (2007). 'Building the Resilient Supply Chain', http://www.martinchristopher.info/downloads/building%20the%20resilient%20supply%20chain.pdf (Accessed on 10.09.2014)

 

Coronado AE, Andrew CL, Zenon M, Dennis FK (2004). 'Automotive supply chain models and technologies: A review of some latest developments', www.emeraldinsight.com/1741-0398.htm (Accessed on 10.09.2014)

 

D'Avanzo R, Starr E, Von Lewinski H (2004). 'Supply chain and the bottom line: a critical link', Outlook: Accenture, 1: 39-45.

 

Davenport TH, Brooks FD (2004). 'Enterprise systems and the supply chain', J. Enterp. Inf. Manage. 17(1): 8–19.
Crossref

 

Dowling C, Leech S (2007). 'Audit support systems and decision aids: Current practice and opportunities for future research', Int. J. Account. Inf. Syst. 8(2): 92-116.
Crossref

 

Fosso WS (2012) 'Achieving Supply Chain Integration using RFID Technology: the Case of Emerging Intelligent B-to-B e-Commerce Processes in a Living Laboratory', Bus. Process Manage. J. 18(1):58-81.
Crossref

 

Fosso WS, Lefebvre LA, Bendavid Y Lefebvre E (2008). 'Exploring the impact of RFID technology and the EPC network on mobile B2B eCommerce: A case study in the retail industry', Int. J. Prod. Econ. 112(2): 614-629.
Crossref

 

Gao X, Wang H, Shen J, Huang J, Song B (2004). "An Approach to Security and Privacy of RFID System FOR Supply Chain," Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business (CEC-East'04), pp. 164-168.

 

Garcia-Dastugue SJ, Lambert D (2007). 'Inter organizational time-based postponement in the supply chain', J. Bus. Logistics, 28(1): 57–81
Crossref

 

Gilaninia SHS, Danesh, SY, Amiri M, Mousavian SJ (2011). 'Effective Factors on Adoption of E-Commerce in SME Cooperative', Interdisciplinary J. Contemp. Res. Bus. 3(6): 13-21.

 

Gould LS (2000). 'What you need to know about RFID', Automotive Manufacturing & Production, 112(2): 46-49.

 

Hillman M, Keltz H (2007) 'Managing Risk in the Supply Chain – A Quantitative Study', http://www.amrresearch.com/Content/View.aspx?pmillid=19994 (Accessed on 10.09.2014)

 

Janvrin D, Bierstaker J, Love DJ (2008). 'An Examination of Audit Information Technology Use and Perceived Importance', Account. Horizons, 22(1): 1-21.
Crossref

 

Jedermann R, Ruiz-Garcia L, Lang W (2009) 'Spatial temperature profiling by semi-passive RFID loggers for perishable food transportation', Comput. Electron. Agr. 65: 145–154.
Crossref

 

Kirkos E, Spathis C, Manolopoulos Y (2007). 'Data mining techniques for the detection of fraudulent financial statement', Expert Syst. Appl. 32(2): 995–1003.
Crossref

 

KPMG. International (2006). 'Developing a strategy for prevention, detection and response', Fraud Risk Management.

 

Kull TJ, Bojer K, Calantone R (2007). 'Last-Mile supply chain efficiency: an analysis of learning curves in online ordering', Int. J. Oper. Prod. Manage. 27(4): 409–434.
Crossref

 

Laudon KC, Laudon JP (2000). Management Information Systems: Organization and Technology in the Networked Enterprises. 6th Edn., Prentice-Hall Inc., USA.

 

Lee HL, Padmanabhan P, Whang S (1997). 'Information Distortion in a Supply Chain: The Bullwhip Effect', Manage. Sci. 43: 546-558.
Crossref

 

Little AG, Best PJ (2003). 'A framework for separation of duties in an SAP R/3 environment', Managerial Auditing J. 18(5): 419–430.
Crossref

 

Mabert VM, Soni A, Venkataramanan MA (2001). 'Enterprise resource planning: Common myths versus evolving Reality', Bus. Horizons, 44(3): 69–76.
Crossref

 

Mahamani A, Rao KP (2010). 'Development of a spreadsheet bases vendor managed inventory model for the single echelon supply chain: A case study', Serbian J. Manage. 5(2):199–211.

 

Mahinderjit-Singh M, Li X (2009). 'Trust Framework for RFID Tracking in Supply Chain Management', Proc of The 3rd International Workshop on RFID Technology – Concepts, Applications, Challenges (IWRT 2009), Milan, Italy, pp 17-26, 6-7 May.

 

Mahinderjit-Singh M, Li X (2010). 'Trust in RFID-Enabled Supply-Chain', Management', Int. J. Security Networks, 5(2/3): 96-105.
Crossref

 

Moon YB (2007). 'Enterprise resource planning (ERP): A review of the literature', Int. J. Manage. Enterprise Dev. 4(3): 235-263.
Crossref

 

Nair PR (2012). 'RFID for Supply Chain Management', CSI Communications, November. 36(8):14-18

 

Nair PR (2013). 'E-Supply Chain Management using Software Agents', CSI Communications, July 2013, 37(4): 13-16.

 

Ngai EWT, Gunasekaran A (2004). 'Information systems in supply chain integration and management', Eur. J. Oper. Res. 159(2): 269-295.
Crossref

 

Owusu-Ansah S, Moyes GD, Oyelere PB, Hay P (2002). 'An empirical analysis of the likelihood of detecting fraud in New Zealand', Manage. Auditing J. 17(4): 192–204.
Crossref

 

Panik M (2009). 'Regression Modeling Methods, Theory, and Computation with SAS', CRC Press.
Crossref

 

Patel RB, Garg K (2004). 'Distributed Banking with Mobile Agents: An Approach for E-Commerce', WSEAS TRANSACTIONS ON COMPUTERS 3(1): 98-102.

 

Phua C, Lee V, Smith K, Gayler R (2005). 'A comprehensive survey of data mining-based fraud detection research', Artif. Intell. Rev. pp. 1–14.

 

Picco GP (2001) 'Mobile Agents: An Introduction', Microprocessors and Microsystems, 25(2): 65-74.
Crossref

 

Prasad Ch.VVSNV, Govindan K, Kulkarni DM (2010). 'Role of IT in SCM environment', Int. J. Bus. Perfor. Supply Chain Modelling, 2(1): 81-94(14).

 

Ramya SG (2013) 'Role of Software Agents in E-Commerce', Int. J. Comp. Eng. Res. 3(3): 246-251.

 

Ronchi S, Brun A, Golini R, Fan X (2010). 'What is the value of an IT e-procurement system? J. Purchasing Supply Manage. 16(2): 131-140.
Crossref

 

Sabbaghi A, Vaidyanathan G (2008) 'Effectiveness and Efficiency of RFID technology in Supply Chain Management: Strategic values and Challenges', J. Theor. Appl. Elect. Com. Res. ISSN 0718–1876 Electronic Version, 3(2): 71-81.
Crossref

 

Sanchez A, Perez M (2003). 'The use of EDI for interorganisational co-operation and co-ordination in the supply chain', Integrated Manufacturing Systems, Vol. 14, No. 8, pp.642–651.
Crossref

 

Sanders NR, Premus R (2002). 'IT applications in supply chain organizations: A link between competitive priorities and organizational benefits', J. Bus. Logistics, 23(1): 65–83.
Crossref

 

SAP (2007), 'ABAP AS Authorization Concept-SAP NetWeaver', SAP AG.

 

Sarac A, Absi N, Dauzère-Pérès S (2010), 'A literature review on the impact of RFID technologies on supply chain management', Int. J. Prod. Econ. 128(1): 77-95.
Crossref

 

Silver EA, Pyke DF, Peterson R (1998). 'Inventory Management and Production Planning and Scheduling', third edition, John Wiley and Sons, New York

 

Simchi-Levi D, Kaminsky P, Simchi-Levi E (2003).' Designing and managing the supply chain. Concepts, strategies, and case studies' second edition, Boston.

 

Spathis C, Doumpos M, Zopounidis C (2002) 'Detecting falsified financial statements: a comparative study using multicriteria analysis and multivariate statistical techniques', Eur. Account.Rev.11(3): 509–535.
Crossref

 

Srivastava, B (2004), 'Radio Frequency ID technology: the next revolution in SCM', Bus. Horizons, 47(6): 60-68.
Crossref

 

Stroeken JHM (2000). 'Information technology, innovation and supply chain structure', Int J. Technol. Manage. 26(3): 7-13.
Crossref

 

Talluri S., (2000). A benchmarking Method for Business-Process Reengineering and Improvement, Int. J. Flex. Manuf. Sys. 12(4): 291-304.
Crossref

 

Turban E, Aronson JE, Liang TP, Sharda R (2007). 'Decision Support and Business Intelligence Systems', Eighth edition, Pearson Education.

 

Van Donk D, Van der Vaart T, Gimenez C (2008). 'Business Conditions, Integration and Performance in Supply Chains', 14th International Annual Euroma Conference, Supply Chain Management

 

Varma TN, Khan DA (2012). 'Fraud Detection in Supply Chain using Benford Distribution', Int. J. Res. Manage. 5(2): 90-96.

 

Varma TN, Khan DA (2014). 'MS excel functions as supply chain fraud detector', Afr. J. Bus. Manage. 8(24): 1109-1117.

 

Viaene S, Derrig RA, Dedene G (2004) 'A case study of applying boosting naive Bayes to claim fraud diagnosis', IEEE Transactions on Knowledge and Data Engineering, 16(5): 612–620.
Crossref

 

Watson RT, Akelsen S, Pitt LF (1998). 'Building mountains in that flat landscape of the World Wide Web. California Manage. Rev. pp. 36–56
Crossref

 

Wyld D (2006). 'RFID 101: The next big thing in management', Manage. Res. News, 29(4): 154-173.
Crossref

 

Yuan J, Yuan C, Deng X, Yuan C (2008). 'The effects of manager compensation and market competition on financial fraud in public companies: an empirical study in China, Int. J. Manage. 25(2): 322–335.