供应链的风险识别框架及其柔性控制策略

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

IndustrialEngineeringandManagementNo.1,200820081:100725429(2008)0120047206:2007202214;:2007212201:(70572103):(19642),,,,,(,200052):,,,,,,,,:;;;:F252.21:AAFrameworkofIdentifyingSupplyChainRisksandTheirFlexibleMitigatingPolicesZHANGYi2bin,CHENJun2fang(AntiSchololofManagement,ShanghaiJiaotongUniversity,Shanghai200052,China)Abstract:Asupplychainsystemiscomposedofsupplier,ISCandretailer.Affectedbyitsendogenousvariablesorexogenousvariables,eitherdisruptionordelaymayberesulted.Aframeworkofidentifyingsupplychainriskswasbuiltbythemethodofcauseandeffectanalysisandhiberarchyanalysis,andbysixcomponents.Moreover,someeffectivepolicestohandletheserisksmaybetakenfromtheperspectiveofstrategicandtacticview.Ontheonehand,itisneces2sarytodesignarobustsupplychainnetworktoenhancetheinformationsharing,trustandcoop2erationbetweentwopartnersstrategically.Ontheotherhand,flexiblereserveistacticallybuiltthroughcapacityflexibility,inventoryflexibilityandleadtimeflexibilityinordertomitigateitsdisruptionordelay.Keywords:supplychainrisk;disruption;delay;flexibility110,,,,,,,,,,,,,742,,,MarchShapira[1],,,Kraljic[2]/()[3],,,,Cho2praSodhi[4]Kleindorfer[5],ChopraSodhi[4]Kleindorfer[5],,,,,,,3,,,,(SRM)(ISCM)(CRM)[3],11,,:,;,()(),,,,,,84,:13333333333()33()333333333()33()33()33;,,1,,1,,,,,/,,,3.1,94IndustrialEngineeringandManagementNo.1,200820081,,,,,,,,,,3.2,,,,,,,,3.3,[6],,,,,4,VaR,,,22333333:3()3:33()34.1,,,,,,,,,,,,05,:,,,,,,,,,,,,,,,,;,,20003,,,,,,4.2,,,,,,,,,,(),,,(),,,;,,,,,,,,,,,,,,,,,,,,,,,,,,,,;,,,,,,,,,,,,,,,,,,,15IndustrialEngineeringandManagementNo.1,2008200815,,,,,,,,,,,,,,,,,,,,,,,,,:[1]MarchJ,ShapiraZ.Managerialperspectivesonriskandrisktaking[J].ManagementScience,1987,33(11):140421418.[2]KraljicP.Purchasingmustbecomesupplymanagement[J].HarvardBusinessReview,1983,61(5):1092117.[3]ChopraS,MeindlP.SupplyChainManagement:Strategy,PlanningandOperation[M].2nded.PrenticeHallInc.2004.[4]ChopraS,SodhiMS.ManagingRisktoAvoidSupply2ChainBreakdown[J].MITSloanManagementReview,Fall2004,46(1):53261.[5]KleindorferPR,SaadGH.ManagingDisruptionRisksinSup2plyChains[J].ProductionandOperationsManagementSociety,2005,14(1):53268.[6]JohnsonE.Learningfromtoys:lessonsinmanagingsupplychainriskfromthetoyindustry[J].CaliforniaManagementReview,2001,43(3):106224.(35)5,,,,,21,,,,//,:[1]DaskinMS.NetworkandDiscteteLocation:Models,Algo2rithms,andApplications[M].NewYork,WileyInterscience,1995.[2]BeasleyJE,ChuPC.Ageneticalgorithmforthesetcoveringproblem[J].EuropeanJournalofOperationalResearch,1996,94:3922404.[3]GrossmanT,WoolA.Computationalexperiencewithapproxi2mationalgorithmsforthesetcoveringproblem[J].EuropeanJournalofOperationalResearch,1997,101:81292.[4]JaramilloJH,BhaduryJ,BattaR.Ontheuseofgeneticalgo2rithmstosolvelocationproblems[J].Computers&OperationsResearch,2002,29:7612779.[5]GenM,ChengR.Geneticalgorithmsandengineeringdesign[M].NewYork:Wiley,1996.[6]AlanderJT.Onoptimalpopulationsizeofgeneticalgorithms[A].ProceedingsofCompEuro,Silverspring,MD:IEEEComputerSocetyPress,1992,92:65270.25,:

1 / 6
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功