Název: Internet of things and its challenges in supply chain management: a rough strength- relation analysis method
Autoři: Pishdar, Mahsa
Ghasemzadeh, Fatemeh
Antucheviciene, Jurgita
Saparauskas, Jonas
Citace zdrojového dokumentu: E+M. Ekonomie a Management = Economics and Management. 2018, roč. 21, č. 2, s. 208-222.
Datum vydání: 2018
Nakladatel: Technická univerzita v Liberci
Typ dokumentu: článek
article
URI: http://hdl.handle.net/11025/31091
ISSN: 2336-5604 (Online)
1212-3609 (Print)
Klíčová slova: skupinové rozhodování;skupina DEMANTEL;internet věcí;management rizik;teorie hrubých množin;management dodavatelského řetězce
Klíčová slova v dalším jazyce: group decision making;group DEMATEL;internet of things;risk management;rough set theory;supply chain management
Abstrakt v dalším jazyce: Internet of Things application (IOT) in supply chain management is becoming imperative and can shape a strategic competitive advantage. Albeit, different challenges appear through this application, most of the previous studies consider less about these challenges and focus on the advantages of IOT. To overcome this defect, different challenges that a supply chain may face as whole are determined based on systematic literature review and expert opinions. Then, a rough group decision-making and trial evaluation laboratory (DEMATEL) is applied. Advantages of the proposed model are that both internal strength and external influence of challenges and also vagueness and ambiguity of experts’ opinions are simultaneously noticed to completely show the importance of these challenges. The results show that challenges such as lack of strategy and scenario planning in IOT, storage issues, lack of security and lack of privacy are of great importance. So, these challenges should have a higher priority in attracting attention and resources. These results help managers to be equipped to face with main challenges in their path toward IOT in their supply chains. Accordingly some practical suggestions for managers are discussed in this paper, such as starting the journey toward IOT step by step, planning for a data storage system which is appropriate for big data, setting up a security policy to prevent out-coming problems caused by lack of security and privacy inherited by IOT, conducting a privacy or security risk assessment, minimizing the data collection and retain and testing the security measures before launching the products, and establishment of a legal framework to construct a problem-solving network in such a messed up and dynamic environment for processing such complicated huge data.
Práva: CC BY-NC 4.0
Vyskytuje se v kolekcích:Číslo 2 (2018)
Číslo 2 (2018)

Soubory připojené k záznamu:
Soubor Popis VelikostFormát 
EM_2_2018_14.pdfPlný text1,5 MBAdobe PDFZobrazit/otevřít


Použijte tento identifikátor k citaci nebo jako odkaz na tento záznam: http://hdl.handle.net/11025/31091

Všechny záznamy v DSpace jsou chráněny autorskými právy, všechna práva vyhrazena.