Refine your search
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Khan, D. A.
- Information Technology in Supply Chain Management
Abstract Views :662 |
PDF Views:2
Authors
T. N. Varma
1,
D. A. Khan
1
Affiliations
1 Department of Computer Applications, National Institute of Technology, Jamshedpur, IN
1 Department of Computer Applications, National Institute of Technology, Jamshedpur, IN
Source
Journal of Supply Chain Management Systems, Vol 3, No 3 (2014), Pagination: 35-46Abstract
The exponential growth of Information Technology (IT) with communication technology in Supply Chain Management (SCM) is playing critical role in optimising decisions of the supply chain network flow for achieving organisational competitiveness, improving higher service level, lowering inventory, supply chain costs and reducing electronic risks (e-risks). To achieve integration and effective information sharing across and beyond the organisations, IT in SCM is also required. The organisations are moving towards the virtual supply chain with help of rapid changes in technology and IT applications viz; Electronic Data Exchange (EDI), Radio Frequency Identification (RFID), Bar Code, Electronic Commerce, Decision Support system, Enterprises Resource Planning (ERP) package, etc. It is also easily applicable in curbing the e-risks. Understanding the role and application of IT in managing and curbing e-risks of Supply Chain is the basic theme of this paper.Keywords
Information Technology, Supply Chain Management.References
- Ambrose, E., Marshall, D., Fynes, B., & Lynch, D. (2008). Communication media selection in buyer-supplier relationships. International Journal of Operations & Production Management, 28(4), 360-379.
- Attaran, M. (2007.) RFID: An enabler of supply chain operations. Supply Chain Management: An International Journal,12(4), 249-257.
- Auramo, J., Kauremaa, J., & Tanskanen, K. (2005). Benefi ts of IT in supply chain management-An explorative study of progressive companies. International Journal of Physical Distribution & Logistics Management, 35(2), 82-100.
- Boone T., & Ganeshan, R. (2007). The frontiers of e Business technology and supply chains. Journal of Operations Management, 25(6), 1195-1198.
- Boyle, R. D. (2004). Achieving your Supply Chain Goals: Conquering the 'First Mile' Hurdle of Data Capture' APICS-The Performance Advantage, July/August, 14(7).
- Brooks, F. D., & Davenport, T. H. (2004). Enterprise systems and the supply chain. Journal of Enterprise Information Management, 17(1), 8-19.
- Chavadi, C. A., & Kokatnur, S. S. (2009). RFID adoption by Indian retailers: An exploratory study.The IUP Journal of Supply Chain Management, 6(1), 66-77.
- Chen I. J., & Paulraj, A. (2004). Understanding supply chain management: Critical research and a theoretical framework. International Journal of Production Research, 42(1), 131-163.
- Chou, D. C., Tan, X., & Yen, D. C. (2004). Web technology and supply chain management. Information Management & Computer Society, 12(4), 338-349.
- Christopher, M., & Peck, H. (2007). 'Building the Resilient Supply Chain. Retrieved from http://www. martinchristopher.info/downloads/building%20 the%20resilient%20supply%20chain.pdf
- Coronado, A. E., Andrew, C., Lyons, Michaelides, Z., & Dennis, F. K. (2004). Automotive supply chain models and technologies: A review of some latest developments'. www.emeraldinsight.com/1741-0398.htm
- D'Avanzo, R., Starr, E., & Von Lewinski, H. (2004). Supply chain and the bottom line: A critical link. Outlook: Accenture, No. 1, 39-45.
- Danese, P. (2007). Designing CPFR collaborations: Insights from seven case studies. International Journal of Operations & Production Management, 27(2), 181-204.
- Ellram, L. M., La Londe, B. J., & Weber, M. M. (1999). Retail logistics. International Journal of Physical Distribution & Logistics Management, 29(7/8), 477-494.
- Picco, G. P. (2001). 'Mobile Agents: An Introduction. Microprocessors and Microsystems, 25(2), 65-74.
- Garcia-Dastugue, S. J., & Lambert, D. (2007). Inter organizational time-based postponement in the supply chain. Journal of Business Logistics, 28(1), 57-81.
- Gilaninia, Sh., Syed Danesh, S. Y., Amiri, M., & Mousavian, S. J. (2011). Effective factors on adoption of E-commerce in SME cooperative. Interdisciplinary Journal of Contemporary Research in Business, 3(6), 13-21.
- Gould, L. S. (2000). What you need to know about RFID. Automotive Manufacturing & Production, 112(2), 46-49.
- Gunasekaran, A., & Ngai, E. W. T. (2004). Information systems in supply chain integration and management. European Journal of Operational Research, 159(2), 269-295.
- Hillman, M., & Keltz, H. (2007). Managing risk in the supply chain - A quantitative study'. Retrieved from http://www.amrresearch.com/Content/View. aspx?pmillid=19994
- Jedermann, R., Ruiz-Garcia, L., & Lang, W. (2009). Spatial temperature profiling by semi-passive RFID loggers for perishable food transportation. Computers and Electronics in Agriculture, 65, 145-154.
- Kull, T. J., Bojer, K., & Calantone, R. (2007). Last-Mile supply chain efficiency: An Analysis of learning curves in online ordering. International Journal of Operations & Production Management, 27(4), 409-434.
- Laudon, K. C., & Laudon, J. P. (2000). Management Information Systems: Organization and Technology in the Networked Enterprises, (6th Ed). Prentice-Hall Inc., USA.
- Lee, H. L., Padmanabhan, P., & Whang, S. (1997). Information Distortion in a Supply Chain: The Bullwhip Effect. Management Science, 43, 546-558.
- Levary, R. R. (2000). Better supply chains through information technology. Industrial Management, 42(3), 24-30.
- Mabert, V. M., Soni, A., & Venkataramanan, M. A. (2001). Enterprise resource planning: Common myths versus evolving reality. Business Horizons, 44(3), 69-76.
- Mahamani, A., & Rao, P. K. (2010). Development of a spreadsheet bases vendor managed inventory model for the single echelon supply chain: A case study. Serbian Journal of Management, 5(2), 199-211.
- Moon Y. B. (2007). Enterprise Resource Planning (ERP): A review of the literature. International Journal of Management and Enterprise Development, 4(3), 235-263.
- Nair, P. R. (2012). RFID for supply chain management. CSI Communications, 36(8), 14-18.
- Nair, P. R. (2013). E-Supply chain management using software agents. CSI Communications, 37(4), 13-16.
- Patel R.B., & Garg, K. (2004). 'Distributed banking with mobile agents: An approach for E-Commerce. WSEAS transactions on computers,3(1), 98-102.
- Prasad, Ch.V.V.S.N.V., Govindan, K., & Kulkarni, D. M. (2010). Role of IT in SCM environment. International Journal of Business Performance and Supply Chain Modelling, 2(1), 81-94.
- Gowda, R. S. (2013). Role of software agents in E-commerce. International Journal of Computational Engineering Research, 3(3), 246-251.
- Ronchi, S., Brun, A., Golini, R., & Fan, X. (2010). What is the value of an IT e-procurement system? Journal of Purchasing and Supply Management, 16(2), 131-140.
- Sabbaghi, A., & Vaidyanathan G. (2008). Effectiveness and Efficiency of RFID technology in Supply Chain Management: Strategic values and Challenges. Journal of Theoretical and Applied Electronic Commerce Research ISSN 0718-1876 Electronic Version,3(2), 71-81.
- Sanchez, A., & Perez, M. (2003). The use of EDI for inter-organisational co-operation and co-ordination in the supply chain. Integrated Manufacturing Systems, 14(8), 642-651.
- Sanders, N. R., & Premus, R. (2002). 'IT applications in supply chain organizations: A link between competitive priorities and organizational benefits. Journal of Business Logistics, 23(1), 65-83.
- Silver, E. A., Pyke, D. F., & Peterson, R. (1998). Inventory management and production planning and scheduling(3rded). John Wiley and Sons, New York.
- Simchi-Levi, D., Kaminsky, P., & Simchi-Levi, E. (2003). Designing and managing the supply chain. Concepts, strategies, and case studies (2nd ed). Boston.
- Stroeken, J. H. M. (2000). Information technology, innovation and supply chain structure. International Journal of Technology Management, 26(3), 7-13.
- Tarn, J. M., Yen, D. C., & Beaumont, M. (2002). Exploring rationales for ERP and SCM integration. Industrial Management & Data Systems, 102(1), 26-34.
- Talluri S., (2000). A benchmarking method for business process reengineering and improvement. International Journal of Flexible Manufacturing Systems,12(4), 291-304.
- Van Donk, D., Van der Vaart, T., & Gimenez, C. (2008). Business conditions, integration and performance in supply chains. 14th International Annual Euroma Conference, Supply Chain Management.
- Varma, T. N., & Khan, D. A. (2012). Fraud detection in supply chain using benford distribution. International Journal of Research in Management, 5(2),90-96.
- Varma, T. N., & Khan, D. A. (2013). Curbing Cyber Crimes by Indian Law. Jamshedpur Research Review, 3(1), 40-51.
- Watson, R. T., Akelsen, S., & Pitt, L. F. (1998). Building mountains in that fl at landscape of the World Wide Web. California Management Review, 36-56.
- A Tidal Island Model for Carbonate Sedimentation: Karondia Limestone of Cretaceous Narmada Basin, India
Abstract Views :201 |
PDF Views:2
Authors
K. Akhtar
1,
D. A. Khan
1
Affiliations
1 Department of Geology, Aligarh Muslim University, Aligarh 202002, IN
1 Department of Geology, Aligarh Muslim University, Aligarh 202002, IN
Source
Journal of Geological Society of India (Online archive from Vol 1 to Vol 78), Vol 50, No 4 (1997), Pagination: 481-489Abstract
The Cretaceous sedimentary sequence of Narmada basin comprise a lower clastic formation (Nimar Sandstone) and an upper carbonate sequence (Karondia Limestone). The depositional model of limestones was reconstructed by identifying 8 microfacies which were regrouped into 5 facies associations. The carbonate sequence of the study area was interpreted to be deposited on a ramp without a striking break in the slope of the ramp and where shelf margin was not developed. The vertical arrangement of facies of Karondia Limestone forms a shallowing upward sequence. It shows much lateral and vertical variation which can be attributed to deposition on a platform dotted by a mosaic of exposed banks or island separated by subtidal areas with the whole complex shifting both laterally and vertically in response to hydrodynamic conditions through time.Keywords
Sedimentology, Cretaceous, Limestone, Narmada Basin.- Artificial Bee Colony based Test Data Generation for Data-Flow Testing
Abstract Views :178 |
PDF Views:0
Authors
Affiliations
1 Department of Information Technology, KIET, Ghaziabad – 201206, Uttar Pradesh, IN
2 NIT, Jamshedpur - 831014, Jharkhand, IN
1 Department of Information Technology, KIET, Ghaziabad – 201206, Uttar Pradesh, IN
2 NIT, Jamshedpur - 831014, Jharkhand, IN
Source
Indian Journal of Science and Technology, Vol 9, No 39 (2016), Pagination:Abstract
Objectives: It is a challenging task to generate and identify an optimal test set that satisfies a robust adequacy criterion, like data flow testing. A number of heuristic and meta-heuristics algorithms like GA, PSO have been applied to optimize the Test Data Generation (TDG) problem. The aim of this research work is to handle the automatic Test Data Generation problem. Methods/Statistical Analysis: This research work focuses on the application of Artificial Bee Colony (ABC) algorithm guided by a novel Fitness Function (FF) for TDG problem. The construction of FF based on the concept of dominance relations, weighted branch distance for ABC to guide the search direction. Ten well known academic programs were taken for experimental analysis. The proposed algorithm is implemented in C environment. Findings: To examine the effectiveness of ABC algorithm in Test Data Generation, ten academic programs were taken experiment. The effectiveness of proposed algorithm is evaluated using average number of generations and coverage percentages achieve parameters. The experimental results show that proposed ABC algorithm requires less number of generations in comparison to other algorithms. It is also noted that the proposed algorithm coverage almost all def-path for all programs. Application/Improvements: The experimental results depict that the ABC algorithm performs far better than other existing algorithm for optimizing test data.Keywords
Artificial Bee Colony, Branch Testing, Data Flow Testing, Structural Testing, Test Data Generation.- SAP System as Vendor Fraud Detector
Abstract Views :228 |
PDF Views:0
Authors
T. N. Varma
1,
D. A. Khan
1
Affiliations
1 Department of Computer Applications, NIT, Jamshedpur, Jharkhand, IN
1 Department of Computer Applications, NIT, Jamshedpur, Jharkhand, IN
Source
Journal of Supply Chain Management Systems, Vol 6, No 2 (2017), Pagination: 2-13Abstract
In the last decade, Enterprise Resource Planning (ERP) systems are one of the most important IT developments, which improve productivity and profitability of the organisation. SAP is the leading market player in ERP systems. The vendor master file in SAP is used to store information about critical and sensitive data of vendors and this data is target of fraudsters. However, fraud is increasing and it becomes a risk to supply chain management. Hence, it is a requirement to plug the opportunity of fraudsters by help of system. The present paper presents a review of red flags of vendor master, different vendor fraud etc. Further, this study makes the development of a prototype model for detection of vendor fraud based on analysis of SAP security log data, segregations of duties and fraudulent scenarios.Keywords
ERP, Fraud, SAP, Vendor.References
- ACFE. (2014). Report to the nation on occupational fraud and abuse. Retrieved from http://www.acfe.com/rttn
- Albrecht, W. S., Albrecht, C. C., Albrecht, C. D., & Zimbelman, M. (2009). Fraud Examination (3rd Ed.). Thomson/South-Western, Mason OH.
- Alles, M., Brennan, G., Kogan, A., & Vasarhelyi, M. A. (2006). Continuous monitoring of business process controls: A pilot implementation of a continuous auditing system at Siemens. International Journal of Accounting Information Systems, 7(2), 137-161.
- Best, P. J., Rikhardson, P., & Toleman, M. (2009). Continuous fraud detection in enterprise systems through audit trail analysis. Journal of Digital Forensics, Security and Law, 4(1).
- Broady, D. V., & Roland, H. A. (2008). SAP GRC for dummies. Retrieved from http://library.books24x7.com.ezproxy.usq.edu.au/toc.asp?bkid=25161
- Coderre, D., & Warner, P. D. (1999). Computer-asisted techniques for fraud detection. CPA Journal, 69(8), 57.
- Cressey, D. R. (1953). Other people’s money: A study of the social psychology of embezzlement. New York, NY US: Free Press.
- Debreceny, R. S., Gray, G. L., Jun-Jin Ng, J., Siow-Ping Lee, K., & Yau, W. F. (2005). Embedded audit modules in enterprise resource planning systems: Implementation and functionality. Journal of Information Systems, 19(2), 7-27.
- Edge, M. E., & Falcone Sampaio, P. R. (2009). A survey of signature based methods for financial fraud detection. Computers & Security, 28(6), 381-394.
- Islam, A., Corney, M., Mohay, G., Clark, A., Bracher, S., Raub, T., & Flegel, U. (2010). Fraud detection in ERP systems using scenario matching. Proceedings of the Twenty-Fifth IFIP International Conference on Information Security, 112-123.
- Little, A. G., & Best, P. J. (2003). A framework for separation of duties in an SAP R/3 environment. Managerial Auditing Journal, 18(5), 419-430.
- Narayan, V. (2008). Financial Accounting (FI). SAP FI/CO questions and answers. Sudbury: Infinity Science Press.
- O’Gara, J. D. (2004). Corporate fraud case studies in detection and prevention. Hoboken, NJ: Wiley & Sons.
- Padhi, S. N (2010). SAP ERP financials and FICO handbook. Burlington, MA: Jones and Bartlett.
- Phua, C., Lee, V., Smith, K., & Gayler, R. (2010). A com prehensive survey of data mining-based fraud detection research. arXiv 1-14.
- Potla, L. (2003). Detecting accounts payable abuse through continuous auditing. IT Audit, 6(3). Retrieved from http://www.theiia.org/itaudit/index.cfm?fuseaction=forum&fid=5458.
- Singh, K., & Best, P. J. (2015). Design and Implemen-tation of Continuous Monitoring and Auditing in SAP Enterprise Resource Planning. International Journal of Auditing, 19, 307-317. doi:10.1111/ijau.12051
- Singleton, T., Singleton, A., Bologna, J., & Lindquist, R. (2008). Fraud auditing and forensic accounting. Hoboken, NJ: John Wiley & Sons.
- Srinidhi, B. (1994). The influence of segregation of duties on internal control judgements. Journal of Accounting, Auditing & Finance, 9(3), 423-444.
- Wells, J. T. (2002a). Billing schemes, part 1: Shell companies that don’t deliver. Journal of Accountancy, 194(1), 76-79.
- Wells, J. T. (2008). Principles of fraud examination (2nd Ed.). Hoboken, NJ: John Wiley & Sons.
- Wells, J. T. (2011). Principles of fraud examination (3rd Ed.). Hoboken, NJ: John Wiley & Sons.