Document Type : Original Article


1 Associate Professor, University of Allameh Tabataba'i.

2 M.A., Allameh Tabatabaei University.


Given the increasing use of information, financial and physical exchanges in supply chains as well as the role of order reinforcement in supply chain performance, it is necessary to examine the role of information security management in order reinforcement. Some researchers have investigated the impact of ISMSs on the integration of organizational processes, improving business performance, and enhancing the accuracy of information exchanges, but no research has addressed this issue. Therefore, this article seeks to examine how ISMS impacts on the strength of orders in the automotive supply chains. By studying the literature of these two themes, different dimensions and factors were identified and by factor analysis their important factors in the automotive industry were determined. In the following, how correlation is affected by ISMS on order strengths in supply chains is discussed. The results of the study indicate the impact of various aspects of ISMS on information coordination, accuracy of information, creation of training areas, etc., including order reinforcement such as ordering, physical and information delays, machinery disruption, etc. Is.


1. Bourland K.E., Powell S.G., Pyke D.F., ( 1996). Exploiting timely demand information to reduce inventories. European Journal of Operational Research, 92, 239–253.
2. Broderick, J. S. (2006). ISMS, security standards and security regulations, information security technical report. 11: 26 –31.
3. BS 7799-2, BS ISO/IEC 27001, (2005). Information technology-Security techniques-Information security management systems–Requirements (First edition).
5. Butman, J. (2002) "A pain in the (supply) chain," Harvard Business Review, 80(5), 31–44.
6. Childhouse, P., Towill, D.R. (2003). Simplified material flow holds the key to supply chain integration. Omega. 31(1), 17–27.
7. Edwards, J. E., Thomas. M. D., Rosenfeld. P., Booth-Kewley, S. (1997). How to Conduct Organizational Survey: A Step-by-Step Guide. Thousand Oaks, CA: Sage.
8. Fathian, M., Akhavan, P., Hoorali, M. (2008). E-readiness assessment of non-profit ICT SMEs in a developing country: The case of Iran. Technovation. 28, 578–590.
9. Forrester, J. (1958). Industrial dynamics: A major breakthrough for decision makers. Harvard Bus. Re. 36, 37–66.
10. Hair J. F., Anderson, R. E., Tathman, R. L. Black, W. C. (1995). Multivariate Data Analysis. Prentice Hall. NJ: Englewood Cliffs.
11. Hanafizadeh, M. R., Hanafizadeh, P., Saghaei, A. (2009). The pros and cons of digital divide and e-readiness assessments. International Journal of E-Adoption, 1(3), 1-29.
12. Handfield, R. B., Nichols, E. L. (1999). Introduction to Supply Chain Management. Upper Saddle River, NJ. , Prentice-Hall.
13. Hong-Minh, S.M., Disney, S.M., Naim, M.M., (2000). The dynamics of emergency transshipment supply chains. Int Journal of Physical Distribution and Logistics Management. 30 (9), 788–815.
14. Hutcheson, G. D. Sofroniou, N. (1999). The Multivariate Social Scientist: Introductory statistics using generalized linear models. London.
15. ISO/IEC 27001, 2005. (2005). Information technology-Security techniques-Information security management systems–Requirements (First edition).
16. ISO/IEC 27005, 2008. (2008) Information technology - Security techniques-Information security risk management (First edition).
17. Kaiser, H. F. 1958. The Varimax criterion for analytic rotation in factor analysis. Psychometrika, 23(3), 187–200.
18. Kannan, V.R., Choon, K. (2005). Just in time, total quality management, and supply chain management: understanding their linkages and impact on business performance. Omega, 33, 153–162.
19. Kline, P. (1994).An Easy Guide to Factor Analysis. Routledge.
20. Lee, H., P. Padmanabhan, S. Whang. (1997b). Information distortion in a supply chain: The bullwhip effect. Management Sci. 43,546–558.
21. Lee, H., P. Padmanabhan, S. Whang.(1997a). Information distortion in supply chains. Sloan Management Rev. 38, 93–102.
22. Li, S., Ragu-Nathan, B., Ragu, T.S., Subba R.S. (2006). The impact of supply chain management practices on competitive advantage and organizational performance, Omega. 34, 107 – 124
23. Mason-Jones, R. and Towill, D.R. (1999). Using the Information Decoupling Point to Improve Supply Chain Performance , International Journal of Logistics Management, 10(2),13-26
24. Nunnally J. (1988).Psychometric theory. NY: Mc Graw -Hill.
25. Paik, S.K., (2003). Analysis of the causes of bullwhip effect in a supply chain: A simulation approach. Ph.D. Dissertation, The George Washington University.
26. POA. (2003). Asset Protection and Security Management Handbook. Auerbach Publications. POA Publishing LLC.
27. Potter. A., Disney, S.M. (2006). Bullwhip and batching: An exploration. Int
Jour on Production Economics, 104(2),408-418.
28. Scheck, S. (1998). Net tools could save automakers $1 billion .Electronic News. 14 (September). 104.
29. Smart, T. (1996) “Jack Welch's Cyber-Czar”, Business Week, August .15, 82-83.
30. Solms, R.V. (1996). Information Security Management: The second Generation. Computers & Security. 15, 281-288.
31. Stein, T. (1998). SAP targets apparel. Information Week 140(May 4).
32. Sterman, J., (1989). “Modeling managerial behavior : Misperceptions of feedback in a dynamic decision making experiment”. Management Science. 35(3), 321–339.
33. Stevens, G. (1989) .Integrating the Supply Chain. Int Journal of Physical Distribution and Material Management, 19(8),3-8.
34. Sungho, K., Jang. S., Lee, J., Kim, S. (2007). Common defects in information security management system of Korean companies, The Journal of Systems and Software. 80(10),1631–1638.
35. Tan, K.C., Lyman, S.B., Wisner, J.D. (2002). Supply chain management: a strategic perspective. International Journal of Operations and Production Management. 22(6), 614–31.
36. Taylor, D.H., (1999). “Measurement and Analysis of Demand Amplification across the Supply Chain” International Journal of Logistics Management, 110(2), 55–70.
37. Tipton, H.F., Krause, M. 2003. Information Security Management Hand Book (5th Ed). 2. CRC Press LLC.