采购外包风险管理研究

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

华中科技大学硕士学位论文采购外包风险管理研究姓名:余安邦申请学位级别:硕士专业:工商管理指导教师:徐天亮20060425I,6WLCLCLCIIAbstractTomaintaincompetingadvantagesinsuchvarietiesofchallengesandperfervidcompetition,enterprisesshallfocustheirlimitinternalresourceswhilemakingthebestuseoftheexternalandcomprehensivelyenhancetheircompetitivecapability.Duetothecomplexityoftheprocurementoutsourcing,thereexistsgreatrisk.Theprocurementoutsourcingenterprisesareinterdependent,andmustworkincoordination.Anyproblemthatoccurredinanycasewouldinfluenceproduction.Furthermore,businessriskandcontinuitymanagementisnowreceivingincreasingattentionbycompaniesandtheirinsurers,particularlyasregardsthelossofmarketshareandthetime,andcost,ofre-enteringamarketafterasignificantdisruptiontoprocurementoutsourcing.Onsuchbasis,itdirectstheemphasesattheriskofsupplychain,centersonthetheoriesinrisksystem,andresearchesthesystemoftheriskmanagementinsupplychaincompletely.Thisthesiscanbedividedintofiveparts:Partoneintroducesthebackgroundoftheriskmanagementintheprocurementoutsourcing.Thispartalsodiscussesthenecessityandtheimportancetoriskmanagementintheprocurementoutsourcing.Bytheway,thepartintroducestheconditionintheresearchandresearchmethodandcontentofthisthesis.Parttwointroducessomeconceptionssuchastherisk,riskmanagementandtheprocurementoutsourcingmanagementandthefundamentalofthesystemofriskmanagementintheprocurementoutsourcing,andthenitcanberegardedasthetheoreticalbasisofthispaper.Partthreediscriminatestheriskoftheprocurementoutsourcingandpointsoutthepossiblecriseswhichcomefromthem.Thenitcanprovidethebasisofbuildingofthesystemofriskevaluationintheprocurementoutsourcing.Partfourbasesontheanalysesofthesourcesandfactorsofriskoftheprocurementoutsourcing.ItevaluatetheriskinLCcompanybyemploying“6W”evaluation.ItshowshandlingofriskofLCcompanycompletely.Partfivebuildsuptheinitiativeearly-warningsystemoftheLCcompanyinriskwhichisbasedontheresearchofriskmanagementinLCcompany.Keywords:EnterprisemanagementProcurementoutsourcingRiskmanagement111.12090RoadwayRoadway14072425010%2005GMGM21.2·[1]50(RIMS)101··[2]··(COCAS)[3]911[4]3[5-8]1.3123456WLCLCLC422.12.1.1··[9](DOD)()“··()5??()[10]12361234710055101005100.551011062.1.28302.2209060050%~80%30%~50%()15%~25%9[11]2.32.3.12-1JIT102-12.3.2[12]111232.3.31233.13.1.112133456783.1.214123()4155()6719863-1163-13.23.2.1171233-23-2183.2.2[13]12;19342056W6W6who()why()what().whichway()wherewith()when()whowhywhatwhichwaywherewithwhen[14]2144.145.3%6%3%6%64%80%[15]JIT224.24.2.1[12]12323[16-19]4.2.21234[20][21]4-1244-14.2.3[22]4.2.412253ISO9000ISO9000ISO9000[20]ISO90021919ISO9002ISO9002[23]4.2.51262345[24]4.2.64-2274-2()[25]28295LC5.1LCLC1997LC2004114122000LC4100LC2004LC5-1Rightspeed2014,LS190052085-13010000LC5.2WLC6w”1whoLCLCLC312whyLC3whatwhatLC5-25-2LCLC324whichway,wherewith,when5.3LC123:33LC5.3.15.3.2:34:5.4LC5.4.1LC5-3///YYNN35LC5-35.4.2///LCLC1LCLC5-45-4///36LC123456LC7837LC125-12;1-2:38IS09000635-1394LC98%LC:LC402(Win-Win)LCLCLC1/23LC:4112LCLC345(3-5)342:;Q.C.D.S4LCLC5208LC700/20LC85%4398%30205LCLC/IS09000445.4.3LCLC(5-5)5-5LC,123452090LC123ABC446547MBAMBA200642548[1][],..,1982[2][],M,,,..:,1990.11[3][],,,..:,2003[4],..,2004.4:68-69[5]Sheffi,Yossi.SupplyChainManagementUnderTheThreatOfInternationalTerrorismf[J].TheInternationalJournalOfLogisticsManagement,2001,12(2):1-11[6]Lonsdale,C.EffectivelyManagingVerticalSupplyRelationships:ARiskManagementModelForOutsourcing[J].SupplyChainManagement:AnInternationalJournal,1999,4(4):176-183[7]Lee,Hau&Wolfe.Michael.SupplyChainSecurityWithoutTears[J]·SupplyChainManagementReview.2003,1:12-20[8]Svenson.G.AConceptualFrameworkForTheAnalysisOfVulnerabilityInSupplyChains[J].InternationalJournalOfPhysicalDistribution&LogisticsManagement,2000.32(2):110-134[9][]·,·,.:.:,2003[10],..:,1998[11],..,2004.3:20-22[12],,..,2004.12:40-42[13].6W.:,2004.4[14]..:,2003.3[15]..,2002.1249[16].[J].,2003,21(5):141-144,148[17].[J].,2004,24(308):147-150[18],.[J].,2001(3):98-102[19].[J].,2002(7):186-188[20].[J].,2002(6):47-50[21].[J].LogisticTechnology,2003(SerialNo.126):40-41[22].[J].,2001,26(98):13-16[23],.[J].,2001(9):92-95[24].[J]..2001(11):75-77[25].[J].,2004(169):43-44[26].[J].,2004.4,32(2):51-54[27],.[J].,2002(16):58-61[28],,.[J].,2004(4):27-28[29].[M].,2002(3):16-18[30],.[J].,2000(5):30-32[31].[J].,2002(2):14-15[32]Davenelson,PatriciaE.MoodyandJonathanSteiner,ThePurchasingMachine-Howthetoptencompaniesusebestpracticestomanagethirdsupplychain[M],Simon&Schuster,Inc,200150[33]BowenKim,Coordinatinganinnovationinsupplychainmanagement[J],EuropeanJournalofOperationalResearch,2000(123):568-584[34]CharlesA.Weber,JohnR.currentandW.C.Benton,VendorselectionCriteriaandMethod[J],EuropeanJournalofOperationalResearch,1991(50):2-18[35]Speckman,RobertE.StrategicSupplierSelectionUnderstandingLong-TermBuyerRelationships.[J]BusinessHorizons,1988(31)(July/August):7-8,75-81[36]RoozbehKangari.RiskManagementPerceptionsandTrendsofU.S.Construction.JournalofConstructionEngineeringandManagement,December1995,121(4)[37]GerardPCachon,MrshallFisher.SupplyChainInventoryManagementandtheValueofShar

1 / 54
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功