Font Size: a A A

Research On Supplier Selection And Management Mechanism In The Construction Of Cyber Supply Chain

Posted on:2021-11-17Degree:MasterType:Thesis
Country:ChinaCandidate:M N JiaFull Text:PDF
GTID:2518306482483864Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
Modern information technology provides new development opportunities for the supply chain.Network technology provides an integrated management platform for business operations,information sharing,and corporate communications.However,the complexity and dynamics of information systems make supply chain information systems face a series of problems and security challenges.In recent years,governments and enterprises have attached great importance to the security issues of cyber supply chain,with particular attention to the security risks and management of upstream suppliers in the supply chain,aiming to reduce the risk factor of cyber supply chain from the source.Based on the existing research,this paper establishes a security capability signal transmission and information screening mechanism for information vendors,separates different vendors through security capability signal screening,and establishes procurement control and strict admission standards for members to achieve supply chain security capability risk control.In addition,from the perspective of benefit sharing and reputation mechanism,this paper designs an IT buyer incentive mechanism in the process of building a cyberspace supply chain so that IT suppliers do not conceal their true ability level and effectively manage IT suppliers to avoid adverse selection while occurring improve the overall efficiency of the supply chain and reduce the security risks of the cyber supply chain.Firstly,aiming at the procurement strategy in the supply chain construction of cyber supply chain,based on the existing research on security risks in the cyber supply chain,the evolutionary game theory bounded rationality hypothesis is used to build a model,and the strategic choices and IT strategy choices of IT suppliers and IT buyer groups in software procurement are discussed.The evolution of the game analyzes the factors that influence the choice of suppliers in the construction of a cyberspace supply chain.Research shows that the losses suffered by IT buyers and the reputational losses of IT suppliers when security incidents occur are the main factors affecting the strategic choices of both parties.IT suppliers need to strengthen self-discipline and IT buyers need to strengthen the review process and establish cooperation with quality suppliers This can reduce security risks in the cyberspace supply chain and improve coordination of supply chain.Secondly,based on the research of purchasing strategy,the process of building a cyber supply chain is divided into two processes: procurement and maintenance.A contract menu for IT suppliers to choose is designed to the maximization of IT buyers' business expectation.It discusses the improvement of supply chain benefits by modifying the original contract under asymmetric information,and Pareto improvement of contract to avoid the adverse selection.Studies have shown that when the modified income distribution rates of different types of IT suppliers are large or small,the gap between the original income distribution rates of different types of IT suppliers can be increased,and the adverse selection of suppliers can be effectively avoided.Finally,a supplier management mechanism was developed to encourage suppliers to make efforts during the maintenance phase.The profit distribution rate was jointly determined by the effort effect coefficients of both the supply and demand sides.It was discussed that IT suppliers and IT buyers had different efforts effect coefficients when the effect coefficients were different.IT buyers modify the original allocation rate for IT suppliers of different types of capability levels.Studies have shown that the higher the level of IT suppliers' capabilities and the higher the coefficient of effort effectiveness,the more dominant they are in the construction of a cyber supply chain,the higher the rate of income distribution,the higher the returns and the greater the incentive for IT suppliers.
Keywords/Search Tags:cyber supply chain security, purchasing strategy, adverse selection, incentives mechanism
PDF Full Text Request
Related items