The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Supply chain information sharing can be achieved by a reimbursable information sharing mechanisms. Through using the theory of entrusted agency and a single-task entrusted agency, the paper studies the problem about supply chain information sharing between manufacturers and sellers. The level effecting two sides can be described by a linear relation and income relations, as well as the morale of the...
A Service supply chain occurs when a service provider outsources part of the service to a supplier. In service supply chains, as supplier offers service directly to final customers, it's hard for service provider to monitor or measure supplier's work. For this reason, the service provider has to offer an incentive mechanism to the supplier. This paper studies the optimal incentive mechanism in the...
This paper develops a conceptual model to assess the complexity of the supply chain (SC). It is built on the theory on the complex adaptive systems (CASs) and it identifies the main SC features that match the CAS properties. The conceptual framework is used in two case studies that regards the SCs of two Italian firms. The analysis aims at assessing the complexity of the considered SCs as well as...
Drug security is very important to people. The adverse drug reaction events happened several times these years. The drug retail record should be monitored to prevent drug security event occur. There should be a system to monitor the drug stores to find out which one is selling the outdated drugs, or selling the drugs that have no license agreement. When drug security event occurred, the retail information...
Information sharing is increasingly recognized as an area offering significant potential for generating improvements and creating competitive advantage to supply chain. The value of information sharing within a supply chain has been analyzed extensively by number of researchers. However, there are few scholars who have ever specially discussed on information sharing risk both in domestic and foreign...
AutoID technology has been extensively used for a diversity of applications ranging from access control systems to airport baggage handling, livestock management systems, automated toll collection, theft-prevention, and automated production systems. Being able to efficiently perform complex real-time analysis on top of streams of RFID events is a key challenge. This will provide management with a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.