{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T03:42:59Z","timestamp":1767066179758,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030152345"},{"type":"electronic","value":"9783030152352"}],"license":[{"start":{"date-parts":[[2019,4,25]],"date-time":"2019-04-25T00:00:00Z","timestamp":1556150400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-15235-2_97","type":"book-chapter","created":{"date-parts":[[2019,4,24]],"date-time":"2019-04-24T13:02:48Z","timestamp":1556110968000},"page":"706-713","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The Review of Risk Identification of E-Commerce Supply Chain Under the Network Economy"],"prefix":"10.1007","author":[{"given":"Ping","family":"Kang","sequence":"first","affiliation":[]},{"given":"Tianyu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,25]]},"reference":[{"key":"97_CR1","unstructured":"Ji Y (1998) The externality of network economy and the economic efficiency of connection. Quant Econ Econ Technol (8):61\u201364 (in Chinese)"},{"key":"97_CR2","unstructured":"The 40th statistics on the development of China\u2019s Internet, [EB\/OL] [2017]. \n                    http:\/\/www.cnnic.net.cn\/"},{"key":"97_CR3","unstructured":"Ma S (2003) How to prevent supply chain risks. Chin Comput Users (1):21 (in Chinese)"},{"key":"97_CR4","unstructured":"Ding W, Liu K, He G (2003) Supply chain risk research. Chin J Saf Sci (4):64\u201366 (in Chinese)"},{"key":"97_CR5","doi-asserted-by":"crossref","unstructured":"Zhang Y (2016) Analysis on the transformation of marketing strategy and the countermeasures under the network economic times (9):16\u201318","DOI":"10.12783\/dtssehs\/asshm2016\/8402"},{"key":"97_CR6","unstructured":"Hu Z (2014) Study on the marketing strategy of the small and medium-sized enterprises in the network economy \u300aShandong Trade Unions\u2019 Tribune\u300b"},{"key":"97_CR7","unstructured":"Wang Y (2012) Corporate marketing strategy choice and innovation under the network economy. Reform Strateg"},{"key":"97_CR8","unstructured":"Sun J (2012) Studies on Chinese enterprise management mode and marketing channel reform under the network economy circumstance. Int Bus Manag 4(2)"},{"key":"97_CR9","unstructured":"Barua A, Pinnell J, Shutter J et al (1999) Measuring the Internet economy: an exploratory study"},{"issue":"5","key":"97_CR10","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/2.841787","volume":"33","author":"A Barua","year":"2000","unstructured":"Barua A, Whinston AB, Yin F (2000) Value and productivity in the Internet economy. Computer 33(5):102\u2013105","journal-title":"Computer"},{"key":"97_CR11","unstructured":"Hausman WH (2012) Supply chain performance metrics. In: The practice of supply chain management: where theory and application converge. Springer, Boston, pp 61\u201373"},{"key":"97_CR12","unstructured":"Gim\u00e9nez C, Lourenco HR (2013) E-supply chain management: review, implication and directions for future research. In: Working papers"},{"issue":"2","key":"97_CR13","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1108\/09685220610678613","volume":"14","author":"S Lancaster","year":"2014","unstructured":"Lancaster S, Yen DC, Ku CY (2014) E-supply chain management: an evaluation of current web initiative. Inf Manag Comput Secur 14(2):167\u2013184","journal-title":"Inf Manag Comput Secur"},{"issue":"6","key":"97_CR14","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1016\/S0272-6963(02)00037-2","volume":"20","author":"MT Frohlich","year":"2011","unstructured":"Frohlich MT, Westbrook R (2011) Demand chain management in manufacturing and service: web-based integration, drivers and performance. J Oper Manag 20(6):729\u2013745","journal-title":"J Oper Manag"},{"key":"97_CR15","doi-asserted-by":"crossref","unstructured":"Dalmas M, Giaroa S, Zamboni A, Bezzo F (2011) Strategic design and investment capacity planning of the ethanol supply chain under price uncertanity. Biomass Bioenergy 35(5)","DOI":"10.1016\/j.biombioe.2011.01.060"},{"key":"97_CR16","unstructured":"Wang L (2010) Characteristics and classification of supply chain risk in e-commerce environment. Sci Technol Entrepreneurship Mon 23(4) (in Chinese)"},{"key":"97_CR17","unstructured":"Su Y (2015) Research on risk identification and evaluation of supply chain based on O2O e-Commerce enterprises. Wuhan University of Technology (in Chinese)"},{"key":"97_CR18","unstructured":"Nie R (2016) Supply chain risk and prevention in O2O mode. J Bus Econ (4):72\u201374 (in Chinese)"},{"key":"97_CR19","unstructured":"Zhong X (2016) Supply chain risk management in the age of \u201cInternet+\u201d\u2014taking coal traders as an example. China Bus Rev (16):137\u2013138 (in Chinese)"},{"key":"97_CR20","unstructured":"Liu Z, Sun Q, Guo D (2017) Research on supply chain risk prevention mechanism in rural e-Commerce in Hebei Province. Modern Mark (Mag) (8):222\u2013223 (in Chinese)"},{"key":"97_CR21","unstructured":"Luo Y, Wang Y (2018) Discussion on financial risks and prevention of internet supply chain. Logist Eng Manag (1):125\u2013127 (in Chinese)"},{"key":"97_CR22","unstructured":"Huang W (2005) Internet-based enterprise supply chain risk and its prevention. China Manag Inf (a09):60\u201364 (in Chinese)"},{"key":"97_CR23","unstructured":"Li P (2018) E-commerce supply chain financing model and risk prevention. Accountant (1) (in Chinese)"},{"key":"97_CR24","unstructured":"Wang H (2016) Internet+ start-up intelligent hardware company supply chain risk management research. University of International Business and Economics (in Chinese)"}],"container-title":["Advances in Intelligent Systems and Computing","Cyber Security Intelligence and Analytics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-15235-2_97","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T03:06:50Z","timestamp":1558148810000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-15235-2_97"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,25]]},"ISBN":["9783030152345","9783030152352"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-15235-2_97","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,4,25]]},"assertion":[{"value":"25 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSIA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The International Conference on Cyber Security Intelligence and Analytics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenyang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 February 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 February 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"csia2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/csia2019.csp.escience.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}