{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:20:22Z","timestamp":1742912422766,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319094915"},{"type":"electronic","value":"9783319094922"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09492-2_12","type":"book-chapter","created":{"date-parts":[[2014,7,24]],"date-time":"2014-07-24T11:33:31Z","timestamp":1406201611000},"page":"190-205","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Business Intelligence for Improving Supply Chain Risk Management"],"prefix":"10.1007","author":[{"given":"Lingzhe","family":"Liu","sequence":"first","affiliation":[]},{"given":"Hennie","family":"Daniels","sequence":"additional","affiliation":[]},{"given":"Wout","family":"Hofman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,25]]},"reference":[{"key":"12_CR1","volume-title":"International Logistics and Supply Chain Outsourcing: From Local to Global","author":"A Rushton","year":"2007","unstructured":"Rushton, A.: International Logistics and Supply Chain Outsourcing: From Local to Global. Kogan Page Publishers, London (2007)"},{"key":"12_CR2","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1108\/09600030410545436","volume":"34","author":"M Christopher","year":"2004","unstructured":"Christopher, M., Lee, H.L.: Mitigating supply chain risk through improved confidence. Int. J. Phys. Distrib. Logist. Manag. 34, 388\u2013396 (2004). doi:10.1108\/09600030410545436","journal-title":"Int. J. Phys. Distrib. Logist. Manag."},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1108\/09574090710816986","volume":"18","author":"PA Bartlett","year":"2007","unstructured":"Bartlett, P.A., Julien, D.M., Baines, T.S.: Improving supply chain performance through improved visibility. Int. J. Logist. Manag. 18, 294\u2013313 (2007). doi:10.1108\/09574090710816986","journal-title":"Int. J. Logist. Manag."},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1108\/09600030510599904","volume":"35","author":"H Peck","year":"2005","unstructured":"Peck, H.: Drivers of supply chain vulnerability: an integrated framework. Int. J. Phys. Distrib. Logist. Manag. 35, 210\u2013232 (2005). doi:10.1108\/09600030510599904","journal-title":"Int. J. Phys. Distrib. Logist. Manag."},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Hulstijn, J., Overbeek, S.: International Logistics and Supply Chain Outsourcing: From Local to Global. Advanced Information Systems Engineering Workshops, pp. 351\u2013365. Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-31069-0_29"},{"key":"12_CR6","unstructured":"Lee, G., Kulkarni, U.: Business intelligence in corporate risk management. AMCIS (2011)"},{"key":"12_CR7","first-page":"98","volume":"84","author":"T Davenport","year":"2006","unstructured":"Davenport, T.: Competing on analytics. Harv. Bus. Rev. 84, 98\u2013107 (2006)","journal-title":"Harv. Bus. Rev."},{"key":"12_CR8","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-1-84882-634-2_3","volume-title":"Managing Supply Chain Risk and Vulnerability","author":"MS Sodhi","year":"2009","unstructured":"Sodhi, M.S., Tang, C.S.: Managing supply chain disruptions via time-based risk management. In: Wu, T., Blackhurst, J. (eds.) Managing Supply Chain Risk and Vulnerability, pp. 29\u201340. Springer, London (2009)"},{"key":"12_CR9","doi-asserted-by":"publisher","unstructured":"Lund, M.S., Solhaug, B., St\u00f8len, K.: Model-Driven Risk Analysis: The CORAS Approach, 460 pp. Springer, Berlin (2011). doi:10.1007\/978-3-642-12323-8","DOI":"10.1007\/978-3-642-12323-8"},{"key":"12_CR10","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/978-3-642-27358-2_9","volume-title":"Business Intelligence","author":"S Rizzi","year":"2012","unstructured":"Rizzi, S.: Collaborative business intelligence. In: Aufaure, M.-A., Zim\u00e1nyi, E. (eds.) eBISS 2011. LNBIP, vol. 96, pp. 186\u2013205. Springer, Heidelberg (2012)"},{"key":"12_CR11","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1561\/0200000008","volume":"2","author":"P Van Baalen","year":"2009","unstructured":"Van Baalen, P., Zuidwijk, R., van Nunen, J.: Port inter-organizational information systems: capabilities to service global supply chains. Foundations and Trends\u00ae in Technology. Inf. Oper. Manag. 2, 81\u2013241 (2009). doi:10.1561\/0200000008","journal-title":"Inf. Oper. Manag."},{"key":"12_CR12","unstructured":"Hofman, W.: Compliance management by business event mining in supply chain networks. VMBO (2013)"},{"key":"12_CR13","doi-asserted-by":"crossref","first-page":"491","DOI":"10.2307\/259291","volume":"23","author":"TK Das","year":"1998","unstructured":"Das, T.K., Teng, B.-S.: Between trust and control: developing confidence in partner cooperation in alliances. Acad. Manag. Rev. 23, 491\u2013512 (1998)","journal-title":"Acad. Manag. Rev."},{"key":"12_CR14","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/S0361-3682(00)00018-0","volume":"26","author":"C Tomkins","year":"2001","unstructured":"Tomkins, C.: Interdependencies, trust and information in relationships, alliances and networks. Acc. Organ. Soc. 26, 161\u2013191 (2001). doi:10.1016\/S0361-3682(00)00018-0","journal-title":"Acc. Organ. Soc."},{"key":"12_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2013.06.009","author":"W Laurier","year":"2013","unstructured":"Laurier, W., Poels, G.: Invariant conditions in value system simulation models. Decis. Support Syst. (2013). doi:10.1016\/j.dss.2013.06.009","journal-title":"Decis. Support Syst."},{"key":"12_CR16","unstructured":"Turetken, O., Elgammal, A., van den Heuvel, W.J., Papazoglou, M.: Enforcing compliance on business processes through the use of patterns. ECIS 2011 Proceedings, Paper 5 (2011)"},{"key":"12_CR17","doi-asserted-by":"publisher","first-page":"133","DOI":"10.2307\/257999","volume":"12","author":"FJ Milliken","year":"1987","unstructured":"Milliken, F.J.: Three types of perceived uncertainty about the environment: state, effect, and response uncertainty. Acad. Manag. Rev. 12, 133 (1987). doi:10.2307\/257999","journal-title":"Acad. Manag. Rev."},{"key":"12_CR18","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1146\/annurev.psych.57.102904.190100","volume":"57","author":"G Von Wright","year":"1971","unstructured":"Von Wright, G.: Explanation and understanding. Annu. Rev. Psychol. 57, 227\u2013254 (1971). doi:10.1146\/annurev.psych.57.102904.190100","journal-title":"Annu. Rev. Psychol."},{"key":"12_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2308\/jeta.2004.1.1.1","volume":"1","author":"MA Vasarhelyi","year":"2004","unstructured":"Vasarhelyi, M.A., Alles, M.G., Kogan, A.: Principles of analytic monitoring for continuous assurance. J. Emerg. Technol. Acc. 1, 1\u201321 (2004). doi:10.2308\/jeta.2004.1.1.1","journal-title":"J. Emerg. Technol. Acc."},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Bay, S., Kumaraswamy, K., Anderle, M.G., Kumar, R., Steier, D.M.: Large scale detection of irregularities in accounting data. In: Sixth IEEE International Conference on Data Mining, 2006. ICDM\u201906, pp 75\u201386. IEEE (2006)","DOI":"10.1109\/ICDM.2006.93"},{"key":"12_CR21","unstructured":"Caron, E.A.M.: Explanation of Exceptional Values in Multi-dimensional Business Databases. Erasmus University Rotterdam (2012)"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Caron, E.A.M., Daniels, H.A.M.: Business analysis in the OLAP context. In: Cordeiro, J., Filipe, J. (eds) ICEIS 2009, Milan, Italy, pp. 325\u2013330 (2009)","DOI":"10.5220\/0001989103250330"},{"key":"12_CR23","doi-asserted-by":"publisher","first-page":"884","DOI":"10.1016\/j.ejor.2007.04.039","volume":"188","author":"EAM Caron","year":"2008","unstructured":"Caron, E.A.M., Daniels, H.A.M.: Explanation of exceptional values in multi-dimensional business databases. Eur. J. Oper. Res. 188, 884\u2013897 (2008). doi:10.1016\/j.ejor.2007.04.039","journal-title":"Eur. J. Oper. Res."},{"key":"12_CR24","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1016\/S0377-2217(99)00428-2","volume":"130","author":"A Feelders","year":"2001","unstructured":"Feelders, A., Daniels, H.A.M.: A general model for automated business diagnosis. Eur. J. Oper. Res. 130, 623\u2013637 (2001). doi:10.1016\/S0377-2217(99)00428-2","journal-title":"Eur. J. Oper. Res."},{"key":"12_CR25","unstructured":"Alles, M.G., Kogan, A., Vasarhelyi, M.A., Wu, J.: Analytical Procedures for Continuous Data Level Auditing: Continuity Equations (2010)"},{"key":"12_CR26","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/S0378-7206(99)00051-8","volume":"37","author":"A Feelders","year":"2000","unstructured":"Feelders, A., Daniels, H.A.M.: Methodological and practical aspects of data mining. Inf. Manag. 37, 271\u2013281 (2000). doi:10.1016\/S0378-7206(99)00051-8","journal-title":"Inf. Manag."},{"key":"12_CR27","unstructured":"Van Oosterhout, M.P.A.: Organizations and flows in the network. In: van Baalen, P., Zuidwijk, R., van Nunen, J. (eds.) Port Inter-Organizational Information Systems: Capabilities to Service Global Supply Chains, pp. 176\u2013185. Now Publishers, Hanover (2009)"},{"key":"12_CR28","unstructured":"Pham, D.A.: EDA & Data Mining for Supply Chain Security: Risk Analysis at the Dutch Customs. Erasmus University Rotterdam (2008)"}],"container-title":["Lecture Notes in Business Information Processing","Enterprise Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09492-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T07:08:51Z","timestamp":1676876931000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-09492-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319094915","9783319094922"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09492-2_12","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"25 July 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}