PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Vulnerability Analysis of 18-hour Retail Delivery Service Using by Bayesian Network

Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
PL
Analiza wrażliwych punktów 18-godzinnej sieci sprzedaży z wykorzystaniem sieci Bayesa
Języki publikacji
EN
Abstrakty
EN
With the growth in electronic commerce, ordering books on the Internet is clearly becoming a significant market. Hence, logistics management exposes the formerly latent logistics system in the economic activities and reveals the inner connections between parts of logistics activities. The retail delivery system in Taiwan provides an easy on-line shopping process, safe payment method and quick delivery service for eretailing. The main purpose of this study is to examine the retailing delivery service process of KingStone on-line book store and highlight all of the most vulnerable parts of the system through Bayesian network (BN). The Bayesian network analysis provides preliminary insights into the direction of relationship management toward maximizing effectiveness of retail delivery service.
PL
System sprzedaży detalicznej w Taiwanie realizuje w większości metody on-line, bezpieczne płacenie i szybką dostawę. Celem prezentowanej pracy jest analiza procesu sprzedaży detalicznej sklepu internetowego KingStone i uwypuklenie najbardziej wrażliwych części systemu z wykorzystaniem sieci bayesowskiej.
Rocznik
Strony
9--12
Opis fizyczny
Bibliogr. 9 poz., rys., tab.
Twórcy
autor
  • Institute of Publishing and Culture Enterprise Management, Nanhua University, Taiwan
Bibliografia
  • [1] Huang Y.K., Feng C.M., A catastrophe model for developing loyalty strategies: a case study on choice behaviour of pick-up point for online shopping, International Journal of Services Operations and Informatics, (2009), No. 4, 107-122
  • [2] Hongliang, Z., A redefinition of the project risk process: Using vulnerability to open up the event-consequence link, International Journal of Project Management, (2007), No. 25, 694-701
  • [3] Albino V., Garavelli, A.C., A methodology for the vulnerability analysis of just-in-time production systems, International Journal of Production Economics, (1995), No. 41, 71-80
  • [4] Stephan M.W., Nikrouz N., Assessing the vulnerability of supply chains using graph theory, International Journal of Production Economics, (2010), No. 126, 121-129
  • [5] Jüttner, U., Peck, H., Christopher, M., Supply Chain Risk Management: Outlining an Agenda for Future Research. International Journal of Logistics: Research and Applications, (2003), No. 6, 197-210
  • [6] Peck, H., Drivers of supply chain vulnerability: an integrated framework, International Journal of Physical Distribution & Logistics Management, (2005), No. 35, 210-232
  • [7] Göran S., A typology of vulnerability scenarios towards suppliers and customers in supply chains based upon perceived time and relationship dependencies, International Journal of Physical Distribution & Logistics Management, (2002), No. 32, 168-187
  • [8] Stephan M.W., Christoph B., An empirical investigation into supply chain vulnerability, Journal of Purchasing and Supply Management, (2006), No. 12, 301-312
  • [9] Pearl J., Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference, Morgan Kaufmann, San Mateo
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-851c84cf-656f-40d1-87cf-82f0db546621
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.