<?xml version="1.0" encoding="utf-8" ?><rss version="2.0" xml:base="http://scrmblog.dumke.me/taxonomy/term/710/all" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:og="http://ogp.me/ns#" xmlns:article="http://ogp.me/ns/article#" xmlns:book="http://ogp.me/ns/book#" xmlns:profile="http://ogp.me/ns/profile#" xmlns:video="http://ogp.me/ns/video#" xmlns:product="http://ogp.me/ns/product#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:sioc="http://rdfs.org/sioc/ns#" xmlns:sioct="http://rdfs.org/sioc/types#" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#">
  <channel>
    <title>Xinlin Cao</title>
    <link>http://scrmblog.dumke.me/taxonomy/term/710/all</link>
    <description></description>
    <language>en</language>
     <atom:link href="http://scrmblog.dumke.me/taxonomy/term/710/all/feed" rel="self" type="application/rss+xml" />
      <item>
    <title>Secure Collaboration in Global Supply Chain Management</title>
    <link>http://scrmblog.dumke.me/review/secure-collaboration-in-global-supply-chain-management</link>
    <description>&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/ComputersInIndustry2012ZengSecureCollaborationInGlobalDesignAndSupplyChainEnvironmentProblemAnalysisAndLiteratureReview.png?itok=izCZj1b_&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;One of the fundamental problems in supply chain management in general is that of finding the right trade-offs between information sharing and keeping one&amp;#8217;s distance towards potential competitors.&lt;/p&gt;

	&lt;p&gt;Zeng et al. did a literature review to collect some of the current insights on how to solve this problem.&lt;/p&gt;

	&lt;h5&gt;Collaboration in product design and supply chain environment&lt;/h5&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/zeng_product_development.png&quot; title=&quot;Workflow of collaborative global design and supply chain environment.&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/zeng_product_development-500x338.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Workflow of collaborative global design and supply chain environment.&quot; alt=&quot;Workflow of collaborative global design and supply chain environment.&quot; width=&quot;500&quot; height=&quot;338&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;image_comment&quot;&gt;Figure 1: Collaborative Product Development Process (Zeng et al., 2012)&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;Figure 1 shows a typical process from problem formulation up to delivery of the finished product. This process can be decomposed into: collaborative product development (&lt;span class=&quot;caps&quot;&gt;CPD&lt;/span&gt;), design chain management (&lt;span class=&quot;caps&quot;&gt;DCM&lt;/span&gt;) and supply chain management (&lt;span class=&quot;caps&quot;&gt;SCM&lt;/span&gt;).&lt;/p&gt;

	&lt;h5&gt;Collaboration conflicts&lt;/h5&gt;

	&lt;p&gt;Several conflicts threaten the viability of the collaboration. These are all related to the information which is interchanged by the stakeholders.&lt;/p&gt;

	&lt;p&gt;Figure 2 shows the information flow.&lt;br /&gt;
&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/zeng_information_flow.png&quot; title=&quot;Information flow of manufactuer/supplier collaboration in design and production phases.&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/zeng_information_flow-500x335.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Information flow of manufactuer/supplier collaboration in design and production phases.&quot; alt=&quot;Information flow of manufactuer/supplier collaboration in design and production phases.&quot; width=&quot;500&quot; height=&quot;335&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;image_comment&quot;&gt;Figure 2: Information Flow between Supply Chain Participants (Zeng et al., 2012)&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;This information can be divided into &lt;em&gt;information to protect&lt;/em&gt; and &lt;em&gt;information to share&lt;/em&gt;. &lt;br /&gt;
Figure 3 lists some of the relevant information.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/zeng_information_to_share.png&quot; title=&quot;Information to share/protect between focal manufacturer and supplier.&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/zeng_information_to_share-500x143.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Information to share/protect between focal manufacturer and supplier.&quot; alt=&quot;Information to share/protect between focal manufacturer and supplier.&quot; width=&quot;500&quot; height=&quot;143&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;image_comment&quot;&gt;Figure 3: Information to Protect and Information to Share (Zeng et al., 2012)&lt;/span&gt;&lt;/p&gt;

	&lt;h5&gt;Securing collaboration&lt;/h5&gt;

	&lt;p&gt;Figure 4 summarizes the problem analysis and the corresponding conclusions the authors draw.&lt;br /&gt;
&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/zeng_problem_analysis.png&quot; title=&quot;Problem analysis of secure collaboration.&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/zeng_problem_analysis-500x45.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Problem analysis of secure collaboration.&quot; alt=&quot;Problem analysis of secure collaboration.&quot; width=&quot;500&quot; height=&quot;45&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;image_comment&quot;&gt;Figure 4: Problem Analysis and Potential Solutions (Zeng et al., 2012)&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;The authors suggest and elaborate on four categories to secure collaboration:
	&lt;ul&gt;
		&lt;li&gt;Computer security and privacy technologies&lt;br /&gt;
Which consists of &lt;em&gt;measures for access control&lt;/em&gt; and &lt;em&gt;secure multi-party computation&lt;/em&gt;, where computations can be done on multiple datasets without revealing the underlying information. Furthermore &lt;em&gt;privacy-preserving location-based services&lt;/em&gt; are summarized here.&lt;/li&gt;
		&lt;li&gt;Information partitioning&lt;br /&gt;
This contains the aspects of &lt;em&gt;document classification&lt;/em&gt; and &lt;em&gt;risk management&lt;/em&gt;.&lt;/li&gt;
		&lt;li&gt;Contract management&lt;/li&gt;
		&lt;li&gt;Partner relationship management&lt;br /&gt;
Here the authors include &lt;em&gt;trust management&lt;/em&gt; and &lt;em&gt;innovation capability and reverse engineering mitigation&lt;/em&gt;.&lt;/li&gt;
	&lt;/ul&gt;&lt;/p&gt;

	&lt;p&gt;Last but not least figure 5 summarizes the current state of the art for the above mentioned problems and potential future research directions.&lt;br /&gt;
&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/zeng_future_research.png&quot; title=&quot;Future development of literatures on secure collaboration.&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/zeng_future_research-500x62.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Future development of literatures on secure collaboration.&quot; alt=&quot;Future development of literatures on secure collaboration.&quot; width=&quot;500&quot; height=&quot;62&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;image_comment&quot;&gt;Figure 5: Future Research Directions on Secure Collaboration (Zeng et al., 2012)&lt;/span&gt;&lt;/p&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;The authors take the view of a computer scientist and find technical solutions (like secure multi-party computation) to fight supply chain problems.&lt;br /&gt;
One of the first things that came to my mind: &amp;#8220;One cannot use technology to solve social problems.&amp;#8221;&lt;br /&gt;
I do think that those measures should be pursued further in research as well as business. But the first steps have to be done by describing and defining their individual information buckets, by answering the strategic question: What information is core to our business and should be protected and what can be shared?&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=Computers+in+Industry&amp;amp;rft_id=info%3Adoi%2F10.1016%2Fj.compind.2012.05.001&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=Secure+collaboration+in+global+design+and+supply+chain+environment%3A+Problem+analysis+and+literature+review&amp;amp;rft.issn=&amp;amp;rft.date=2012&amp;amp;rft.volume=63&amp;amp;rft.issue=6&amp;amp;rft.spage=545&amp;amp;rft.epage=556&amp;amp;rft.artnum=&amp;amp;rft.au=Zeng%2C+Y.&amp;amp;rft.au=Wang%2C+L.&amp;amp;rft.au=Deng%2C+X.&amp;amp;rft.au=Cao%2C+X.&amp;amp;rft.au=Khundker%2C+N.&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other%2CBusiness+Management%2C+Supply+Chain+Management&quot;&gt;Zeng, Y., Wang, L., Deng, X., Cao, X., &amp;amp; Khundker, N. (2012). Secure collaboration in global design and supply chain environment: Problem analysis and literature review &lt;span style=&quot;font-style: italic;&quot;&gt;Computers in Industry, 63&lt;/span&gt; (6), 545-556 DOI: &lt;a rev=&quot;review&quot; href=&quot;http://dx.doi.org/10.1016/j.compind.2012.05.001&quot;&gt;10.1016/j.compind.2012.05.001&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/710/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--2&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give Secure Collaboration in Global Supply Chain Management 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give Secure Collaboration in Global Supply Chain Management 2/5&lt;/option&gt;&lt;option value=&quot;60&quot;&gt;Give Secure Collaboration in Global Supply Chain Management 3/5&lt;/option&gt;&lt;option value=&quot;80&quot;&gt;Give Secure Collaboration in Global Supply Chain Management 4/5&lt;/option&gt;&lt;option value=&quot;100&quot; selected=&quot;selected&quot;&gt;Give Secure Collaboration in Global Supply Chain Management 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-iRlvsw2wRCRydspPqj9LVWUVi-qeVgNFwm_Do2O5-Uw&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/security&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;security&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/collaboration&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;collaboration&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/information&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;information&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/partnership&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;partnership&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/sharing&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;sharing&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 16 Jul 2012 09:54:07 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1811 at http://scrmblog.dumke.me</guid>
  </item>
  </channel>
</rss>
