时效性产品物流外包风险研究

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

华中科技大学硕士学位论文时效性产品物流外包风险研究姓名:储力申请学位级别:硕士专业:企业管理指导教师:刘志学20060425IIIIIAbstractLogisticsoutsourcingcomesfromtheapplicationofthecorecompetencetheory,meanstheenterpriseusingexternallogisticsresourcestohelpadapttothecircumstancechangesandcustomerneeds.Ithasbeenprovedthatthroughappropriateoutsourcing,enterprisecanstrengthenitscorecompetenceandreduceoperationalcosts.However,besidesadvantages,logisticsoutsourcingalsobringsrisks,oncehandledinthewrongway,itwillnotreachtheoriginaltarget,evenmakesthecooperationbetweenenterpriseandlogisticsserviceprovidergotoend,andbringstotalfailuretothelogisticsoutsourcing.Atthesametime,becauseofdifferentcharacteristicsamongproducts,needsforlogisticsoutsourcingisofmuchdifference,soistheoutsourcingrisk.Thus,enterprisemustrecognizetheuniqueriskduringtheoutsourcingandseektheaccordinglycontrolmethodsinordertopreventoutsourcingrisk.Thisthesischoosesproductcharacteristicsastheresearchpenetrationpoint,discussestheproductcharacteristicsoftime-basedproduct,itsneedforlogisticsoutsourcing,risksofoutsourcingandriskcontrolmethods.Firstly,thethesisdiscussestheproductcharacteristicsoftime-basedproductfromthedimensionsofbasicattributes,marketcompetitioncharacteristics,customercharacteristics,supplychainandlogisticsoperationalcharacteristics,thenexplainstheneedsforlogisticsoutsourcingfromthedimensionsofquickresponse,variance,lowstock,continuousqualityimprovement,lifecyclesupportandintegratedlogisticstarget.Then,thethesisidentifiesthelogisticsoutsourcingrisksfromthepointofriskformationprocessandtheresultsofrisk,designsariskcontrolframeoftime-basedproduct.Atlast,accordingtothecontrolframe,thethesisconstructscontrolmechanism,riskpre-controlsystemandcooperativegamemodeltomanagelogisticsoutsourcingrisk.Keywords:time-basedproductlogisticsoutsourcingriskidentificationriskcontrolI(“”)::::111.1,,,,21.2IT31.31-131231-1422.1outsourcingcontractingoutmanagementbygoingoutsidesupportserviceLaabs[1](TheOutsourcingInstitute)[2]2003[3][4](2003)[5]2.1.1ITLacity,WillcocksFeeny(1995)[6]Cross(1995)[7]Nelson(1996)5[8]LacityHischheim(1993)[9]Lacity,Willcocks(1995)[6]20901999[10](2002)[11](2003)[12]Everest(1997)ClemonsHittSnir2000(2002)[11](2003)[12]62.1.2Aubert(2001)[13]Clemons2000IT[14]AmeliaC.ReanChuanxuWang(2003)[15]Clemons[14](2002)[11](2003)[12]2.2EBSCOABIElsevierEmerald2.2.1,7BardiTracey(1991)[16]Bradley(1995)[17]Lynch2002[18]QuinnHilmer1994[19]Earl1996[20](2003)![21](2004)[22]WeiShi8Lim(2000)[23]Earl(1996)[20]Bartholomew(2001)[24]Piachaud(2002)[25]ChuanxuWangAmeliaC.Regan(2003)[15]2.2.2DanAndersson&AndreasNorrman20029[26]Seyed-MahmoudAghazadeh2003TPLTPLTPLTPLTPL[27]LauraMeade&JosephSarkis2002TPL[28]2003AHP[29]TPLTPLBoyson(1999)[30]C.JohnlanleyJr.2003[31]IraLewis&AlexanderTalalayevsky2000IOS[32]AnuHBask2001[33]JanneHuiskonen(2002)10[34]ChuanxuWangAmeliaC.Regan(2003)[15]JoãoMigueldaCostaSousa(2003)[35](2005)/,[36](2004),,10[22](2003)()();,[21](2005)VMIVMI[37]2003[38]11J.T.WDamen(2001)[39]RemkoIvanHoek2000[40]2.31233.13.1.1[41]3-13-11312345IT143.1.213-23-2(%)(%)1523-33-33.23.2.1RiskUncertaintyRiskPerilHazardRiskPerilHazard161Knight1921[42]2Miller2000[43]Christopher2003StakeUncertainty[44]3.2.21117223-1183-13.2.33-43-4123193.3Beck(1992)[45]3-2Corerisk20033-33-2203-33-23-33-43-42144.14.1.14-14-112344.1.222()4.1.34-14.24.2.14-24-1234-2124.2.2244-34-34.2.3123254-44-44.34.3.1264.3.24-54-52755.1123285.25.2.1123455.2.2295-11235-1455.2.35.2.2305.35.3.135-15.3.2315-13241,2,3,4XXXX1PPLR(,)RfPL=PsLs1PsP=−1LsL=−(,)1RfPLPsLsPLPL==−=+−R4(1,2,3,4)XXXXX=(1,2,3,4,5)(0.1,0.3,0.5,0.7,0.9)Bbbbbb=={}N(1,2,3,4,5)bjj=(1,2,3,4;1,2,3,4,5)XibjneijijN===1Xi(1,2,3,4)=P4511()TijPwieijbjWEB====∑∑22LU33{}{1,2,3,4}UUUUU==(1/4,1/4,1/4,1/4)M={}{1,2,3,4,5}(0.1,0.3,0.5,0.7,0.9)VVVVVV===VU(1,2,3,4)RRRRR=BVBMR=B,(1,2,3,4,5)Bbbbbb=L,,0.110.320.530.740.95LBVbbbbb==++++3PL(,)1RfPLPsLsPLPL==−=+−45-25-2R0.9R0.70.9R≤0.30.7R≤0.3R≤5.3.31,2,3,4XXXX5-2R0.9R0.70.9R≤0.30.7R≤0.3R≤345-25-23566.1-aθaθππ36-6.2(,,,)Tawxyz=wxyz6-1wxyz6-131iiiwpw==∑31iiixqx==∑11yym=31iiizzn==∑iwipixiqiyimizin1w1p1x1q1m1z1n2w2p2x2q2z2n3w3p3x3q3z3n371234wxyztπλλλλθ=+++++2~(0,)Nθσ1λ2λ3λ4λwxyztR∈π(,)faππ1ρ2ρ22221234()()/2cakwkxkykz=+++1k2k3k4kwxyz()sπαβπ=+αβπ()()uscaπ=−()vsππ=−()sπαβπ=+0u=IR(IC)IRu0u=(IC)*aa*aaa1a2a38max(,)(())fadvsππππ−∫1s.t.(IR)(,)()0(())fadcausπππ−≥∫2(IC)2211(,)()(,)()(())(())fadcafadcaususππππππ−≥−∫∫36.31234()(1)()vswxyztππαβλλλλθ=−=−+−+++++42211(1)/2RCρβσ=−522112341(1)()(1)/2EvRCwxyztαβλλλλρβσ−=−+−++++−−6222212341234()()()()/2uscawxyztkwkxkykzπαβλλλλθ=−=++++++−+++72222/2RCρβσ=82222222123412342()()/2/2EuRCwxyztkwkxkykzαβλλλλρβσ−=+++++−+++−939IC2max()EuRC−wxyz11/wkλβ=22/xkλβ=33/ykλβ=44/zkλβ=(,)αβ1max()EvRC−10s.t.(IR)20EuRC−=11(IC)11/wkλβ=,22/xkλβ=,33/ykλβ=,44/zkλβ=1222222*234113421243123412341123422222223411342124312341234112341()2()kkkkkkkkkkkkkkkkkkkktkkkkkkkkkkkkkkkkkkkkλλλλρσβλλλλρσρσ++++−=+++++132222**22*3124212341()2tkkkkλλλλαβρσβ=−−−−−144077.1123417.212VMI34243[1]LaabsJJ.Successfuloutsourcingdependsoncriticalfactors.PersonalJournal1993(10)51-60[2]TheOutsourcingI

1 / 53
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功