نقش به کارگیری مدیریت امنیت اطلاعات در کاهش تقویت پذیری سفارشات در زنجیره های تأمین

نوع مقاله : مقاله پژوهشی

نویسندگان

1 دانشیار، دانشگاه علامه طباطبائی.

2 دانشجوی کارشناسی ارشد، دانشگاه علامه طباطبایی.

چکیده

با توجه به استفاده روز افزون از تبادلات اطلاعاتی، مالی و فیزیکی در زنجیره های تأمین و همچنین نقش تقویت پذیری سفارش ها در کارایی زنجیره های تأمین، ضرورت بررسی نقش مدیریت امنیت اطلاعات در تقویت پذیری سفارش ها بیش از پیش احساس می گردد. برخی محققین، تأثیر سیستم های مدیریت امنیت اطلاعات ISMS بر یکپارچگی فرایندهای سازمانی، بهبود عملکرد کسب و کار و افزایش دقت و صحت تبادلات اطلاعاتی را بررسی کرده اند، اما در هیچ پژوهشی به این مساله پرداخته نشده است. لذا این نوشتار به دنبال بررسی چگونگی تاثیر گذاری ISMS بر تقویت پذیری سفارش ها در زنجیره های تأمین در صنعت خودرو می باشد. با مطالعه ادبیات این دو موضوع، ابعاد و عوامل مختلف شناسایی شدند و به کمک تحلیل عاملی، فاکتورهای مهم آنها در صنعت خودرو تعیین شدند. در ادامه، به کمک تحلیل همبستگی، به چگونگی تاثیر ISMS بر تقویت پذیری سفارش ها در زنجیره های تأمین پرداخته شده است. نتایج بررسی ها حاکی از تاثیر ابعاد متنوعی از ISMS هماهنگی اطلاعات، دقت و صحت اطلاعات، ایجاد زمینه های آموزشی و غیره برعوامل به وجود آورنده تقویت پذیری سفارش ها از قبیل دسته بندی سفارش ها، تأخیرهای فیزیکی و اطلاعاتی، ازکارافتادن ماشین آلات و غیره، است.

کلیدواژه‌ها


عنوان مقاله [English]

The role of information security management in decreasing the orderliness of orders in the supply chains

نویسندگان [English]

  • Laya Olfat 1
  • Ahmad Jafarian 2
  • Amir Hasanzadeh 2
1 Associate Professor, University of Allameh Tabataba'i.
2 M.A., Allameh Tabatabaei University.
چکیده [English]

Given the increasing use of information, financial and physical exchanges in supply chains as well as the role of order reinforcement in supply chain performance, it is necessary to examine the role of information security management in order reinforcement. Some researchers have investigated the impact of ISMSs on the integration of organizational processes, improving business performance, and enhancing the accuracy of information exchanges, but no research has addressed this issue. Therefore, this article seeks to examine how ISMS impacts on the strength of orders in the automotive supply chains. By studying the literature of these two themes, different dimensions and factors were identified and by factor analysis their important factors in the automotive industry were determined. In the following, how correlation is affected by ISMS on order strengths in supply chains is discussed. The results of the study indicate the impact of various aspects of ISMS on information coordination, accuracy of information, creation of training areas, etc., including order reinforcement such as ordering, physical and information delays, machinery disruption, etc. Is.

کلیدواژه‌ها [English]

  • Information and Security Management
  • Supply Chain Management
  • Order Enhancement
  • Information Security
1. Bourland K.E., Powell S.G., Pyke D.F., ( 1996). Exploiting timely demand information to reduce inventories. European Journal of Operational Research, 92, 239–253.
2. Broderick, J. S. (2006). ISMS, security standards and security regulations, information security technical report. 11: 26 –31.
3. BS 7799-2, BS ISO/IEC 27001, (2005). Information technology-Security techniques-Information security management systems–Requirements (First edition).
5. Butman, J. (2002) "A pain in the (supply) chain," Harvard Business Review, 80(5), 31–44.
6. Childhouse, P., Towill, D.R. (2003). Simplified material flow holds the key to supply chain integration. Omega. 31(1), 17–27.
7. Edwards, J. E., Thomas. M. D., Rosenfeld. P., Booth-Kewley, S. (1997). How to Conduct Organizational Survey: A Step-by-Step Guide. Thousand Oaks, CA: Sage.
8. Fathian, M., Akhavan, P., Hoorali, M. (2008). E-readiness assessment of non-profit ICT SMEs in a developing country: The case of Iran. Technovation. 28, 578–590.
9. Forrester, J. (1958). Industrial dynamics: A major breakthrough for decision makers. Harvard Bus. Re. 36, 37–66.
10. Hair J. F., Anderson, R. E., Tathman, R. L. Black, W. C. (1995). Multivariate Data Analysis. Prentice Hall. NJ: Englewood Cliffs.
11. Hanafizadeh, M. R., Hanafizadeh, P., Saghaei, A. (2009). The pros and cons of digital divide and e-readiness assessments. International Journal of E-Adoption, 1(3), 1-29.
12. Handfield, R. B., Nichols, E. L. (1999). Introduction to Supply Chain Management. Upper Saddle River, NJ. , Prentice-Hall.
13. Hong-Minh, S.M., Disney, S.M., Naim, M.M., (2000). The dynamics of emergency transshipment supply chains. Int Journal of Physical Distribution and Logistics Management. 30 (9), 788–815.
14. Hutcheson, G. D. Sofroniou, N. (1999). The Multivariate Social Scientist: Introductory statistics using generalized linear models. London.
15. ISO/IEC 27001, 2005. (2005). Information technology-Security techniques-Information security management systems–Requirements (First edition).
16. ISO/IEC 27005, 2008. (2008) Information technology - Security techniques-Information security risk management (First edition).
17. Kaiser, H. F. 1958. The Varimax criterion for analytic rotation in factor analysis. Psychometrika, 23(3), 187–200.
18. Kannan, V.R., Choon, K. (2005). Just in time, total quality management, and supply chain management: understanding their linkages and impact on business performance. Omega, 33, 153–162.
19. Kline, P. (1994).An Easy Guide to Factor Analysis. Routledge.
20. Lee, H., P. Padmanabhan, S. Whang. (1997b). Information distortion in a supply chain: The bullwhip effect. Management Sci. 43,546–558.
21. Lee, H., P. Padmanabhan, S. Whang.(1997a). Information distortion in supply chains. Sloan Management Rev. 38, 93–102.
22. Li, S., Ragu-Nathan, B., Ragu, T.S., Subba R.S. (2006). The impact of supply chain management practices on competitive advantage and organizational performance, Omega. 34, 107 – 124
23. Mason-Jones, R. and Towill, D.R. (1999). Using the Information Decoupling Point to Improve Supply Chain Performance , International Journal of Logistics Management, 10(2),13-26
24. Nunnally J. (1988).Psychometric theory. NY: Mc Graw -Hill.
25. Paik, S.K., (2003). Analysis of the causes of bullwhip effect in a supply chain: A simulation approach. Ph.D. Dissertation, The George Washington University.
26. POA. (2003). Asset Protection and Security Management Handbook. Auerbach Publications. POA Publishing LLC.
27. Potter. A., Disney, S.M. (2006). Bullwhip and batching: An exploration. Int
Jour on Production Economics, 104(2),408-418.
28. Scheck, S. (1998). Net tools could save automakers $1 billion .Electronic News. 14 (September). 104.
29. Smart, T. (1996) “Jack Welch's Cyber-Czar”, Business Week, August .15, 82-83.
30. Solms, R.V. (1996). Information Security Management: The second Generation. Computers & Security. 15, 281-288.
31. Stein, T. (1998). SAP targets apparel. Information Week 140(May 4).
32. Sterman, J., (1989). “Modeling managerial behavior : Misperceptions of feedback in a dynamic decision making experiment”. Management Science. 35(3), 321–339.
33. Stevens, G. (1989) .Integrating the Supply Chain. Int Journal of Physical Distribution and Material Management, 19(8),3-8.
34. Sungho, K., Jang. S., Lee, J., Kim, S. (2007). Common defects in information security management system of Korean companies, The Journal of Systems and Software. 80(10),1631–1638.
35. Tan, K.C., Lyman, S.B., Wisner, J.D. (2002). Supply chain management: a strategic perspective. International Journal of Operations and Production Management. 22(6), 614–31.
36. Taylor, D.H., (1999). “Measurement and Analysis of Demand Amplification across the Supply Chain” International Journal of Logistics Management, 110(2), 55–70.
37. Tipton, H.F., Krause, M. 2003. Information Security Management Hand Book (5th Ed). 2. CRC Press LLC.