{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,9,6]],"date-time":"2022-09-06T13:51:46Z","timestamp":1662472306877},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2013,8,2]],"date-time":"2013-08-02T00:00:00Z","timestamp":1375401600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["OR Spectrum"],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1007\/s00291-013-0339-2","type":"journal-article","created":{"date-parts":[[2013,8,1]],"date-time":"2013-08-01T10:41:51Z","timestamp":1375353711000},"page":"835-865","source":"Crossref","is-referenced-by-count":4,"title":["A robust optimization approach to enhancing reliability in production planning under non-compliance risks"],"prefix":"10.1007","volume":"35","author":[{"given":"Ban","family":"Kawas","sequence":"first","affiliation":[]},{"given":"Marco","family":"Laumanns","sequence":"additional","affiliation":[]},{"given":"Eleni","family":"Pratsini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,8,2]]},"reference":[{"issue":"2","key":"339_CR1","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1147\/sj.462.0219","volume":"46","author":"C Abrams","year":"2007","unstructured":"Abrams C, von Kanel J, Muller S, Pfitzmann B, Ruschka-Taylor S (2007) Optimized enterprise risk management. IBM Syst J 46(2):219\u2013234","journal-title":"IBM Syst J"},{"key":"339_CR2","first-page":"670","volume":"88","author":"KA Bamberger","year":"2010","unstructured":"Bamberger KA (2010) Technologies of compliance: risk and regulation in a digital age. Tex Law Rev 88:670\u2013739","journal-title":"Tex Law Rev"},{"key":"339_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0167-6377(99)00016-4","volume":"25","author":"A Bental","year":"1999","unstructured":"Bental A, Nemirovski A (1999) Robust solutions of uncertain linear programs. Oper Res Lett 25:1\u201313","journal-title":"Oper Res Lett"},{"key":"339_CR4","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1007\/PL00011380","volume":"88","author":"A Bental","year":"2000","unstructured":"Bental A, Nemirovski A (2000) Robust solutions of linear programming problems contaminated with uncertain data. Math Program 88:411\u2013424","journal-title":"Math Program"},{"key":"339_CR5","volume-title":"Robust optimization. Princeton series in applied mathematics","author":"A Bental","year":"2009","unstructured":"Bental A, El Ghaoui L, Nemirovski A (2009) Robust optimization. Princeton series in applied mathematics. Princeton University Press, Princeton"},{"issue":"10","key":"339_CR6","doi-asserted-by":"crossref","first-page":"1450","DOI":"10.1109\/21.310528","volume":"24","author":"GEG Beroggi","year":"1994","unstructured":"Beroggi GEG, Wallace WA (1994) Operational risk management: a new paradigm for decision making. IEEE Trans Syst Man Cybern 24(10):1450\u20131457","journal-title":"IEEE Trans Syst Man Cybern"},{"issue":"1","key":"339_CR7","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1287\/opre.1030.0065","volume":"52","author":"D Bertsimas","year":"2004","unstructured":"Bertsimas D, Sim M (2004) The price of robustness. Oper Res 52(1):35\u201353","journal-title":"Oper Res"},{"key":"339_CR8","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4899-0685-4","volume-title":"Reliability evaluation of engineering systems: concepts and techniques","author":"R Billinton","year":"1992","unstructured":"Billinton R, Allan RN (1992) Reliability evaluation of engineering systems: concepts and techniques, 2nd edn. Springer, Berlin","edition":"2"},{"key":"339_CR9","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4899-1860-4","volume-title":"Reliability evaluation of power systems","author":"R Billinton","year":"1996","unstructured":"Billinton R, Allan RN (1996) Reliability evaluation of power systems, 2nd edn. Springer, Berlin","edition":"2"},{"issue":"4","key":"339_CR10","doi-asserted-by":"crossref","first-page":"1035","DOI":"10.1137\/S0895479896298130","volume":"18","author":"L Ghaoui El","year":"1997","unstructured":"El Ghaoui L, Lebert H (1997) Robust solutions to least-square problems with uncertain data. SIAM J Matrix Anal Appl 18(4):1035\u20131064","journal-title":"SIAM J Matrix Anal Appl"},{"key":"339_CR11","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1137\/S1052623496305717","volume":"9","author":"L Ghaoui El","year":"1998","unstructured":"El Ghaoui L, Oustry F, Lebert H (1998) Robust solutions to uncertain semidefinite programs. SIAM J Optim 9:33\u201352","journal-title":"SIAM J Optim"},{"issue":"3","key":"339_CR12","doi-asserted-by":"crossref","first-page":"6:1","DOI":"10.1147\/JRD.2010.2045251","volume":"54","author":"A Elisseeff","year":"2010","unstructured":"Elisseeff A, Pellet J-P, Pratsini E (2010) Causal networks for risk and compliance: methodology and applications. IBM J Res Dev 54(3):6:1\u20136:12","journal-title":"IBM J Res Dev"},{"key":"339_CR13","first-page":"20","volume":"44","author":"ML Frigo","year":"2009","unstructured":"Frigo ML, Anderson RJ (2009) A strategic framework for governance, risk, and compliance. Strateg Finance 44:20\u201361","journal-title":"Strateg Finance"},{"key":"339_CR14","unstructured":"Facts about current good manufacturing practices (cGMPs), U.S. Food and Drug Administration. 2013. http:\/\/www.fda.gov\/Drugs\/DevelopmentApprovalProcess\/Manufacturing\/ucm169105.htm"},{"key":"339_CR15","unstructured":"Graves SC (2022) Manufacturing planning and control. In: Resende M, Paradalos P (eds) Handbook of applied optimizationpp. Oxford University Press, New York, pp 728\u2013746"},{"key":"339_CR16","doi-asserted-by":"crossref","unstructured":"Laumanns M, Pratsini E, Prestwich S, Tiseanu C-S (2010) Production planning for pharmaceutical companies under non-compliance risk. In: Hu B, Morasch K, Pickl S, Siegle M (eds) Operations research proceedings 2010. Springer, Heidelberg, pp 545\u2013550. doi: 10.1007\/978-3-642-20009-0_86","DOI":"10.1007\/978-3-642-20009-0_86"},{"key":"339_CR17","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1111\/1098-1616.00019","volume":"6","author":"AP Liebenbergm","year":"2003","unstructured":"Liebenbergm AP, Hoyt RE (2003) The determinants of enterprise risk management: evidence from the appointment of chief risk officers. Risk Manag Insur Rev 6:37\u201352","journal-title":"Risk Manag Insur Rev"},{"key":"339_CR18","volume-title":"Quantitative risk management: concepts, techniques, and tools","author":"AJ McNeil","year":"2005","unstructured":"McNeil AJ, Frey R, Embrechts P (2005) Quantitative risk management: concepts, techniques, and tools. Princeton University Press, Princeton"},{"key":"339_CR19","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1016\/j.ijpe.2005.09.001","volume":"103","author":"J Mula","year":"2006","unstructured":"Mula J, Poler R, Garcia-Sabater JP, Lario FC (2006) Models for production planning under uncertainty: a review. Int J Prod Econ 103:271\u2013285","journal-title":"Int J Prod Econ"},{"key":"339_CR20","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1147\/rd.513.0295","volume":"51","author":"S Muller","year":"2007","unstructured":"Muller S, Supatgiat C (2007) A quantitative optimization model for dynamic risk-based compliance management. IBM J Res Dev 51:295\u2013307","journal-title":"IBM J Res Dev"},{"key":"339_CR21","unstructured":"Pratsini E, Dean D (2005) Regulatory compliance of pharmaceutical supply chains. ERCIM News 60:51\u201352"},{"key":"339_CR22","unstructured":"Rasmussen M (2008) Corporate integrity: strategic direction for GRC, 2008 GRC drivers, trends, and market directions"},{"key":"339_CR23","doi-asserted-by":"crossref","first-page":"971","DOI":"10.1016\/j.compchemeng.2003.09.017","volume":"28","author":"NV Sahinidis","year":"2004","unstructured":"Sahinidis NV (2004) Optimization under uncertainty: state-of-the-art and opportunities. Comput Chem Eng 28:971\u2013983","journal-title":"Comput Chem Eng"},{"key":"339_CR24","volume-title":"Theory of linear and integer programming","author":"A Schrijver","year":"1986","unstructured":"Schrijver A (1986) Theory of linear and integer programming. Wiley, New York"},{"key":"339_CR25","unstructured":"Silver EA, Pyke DF, Peterson R (1998) Inventory management and production planning and scheduling, 3rd edn. Wiley, New York"},{"key":"339_CR26","doi-asserted-by":"crossref","first-page":"1151","DOI":"10.1287\/opre.21.5.1154","volume":"21","author":"A Soyster","year":"1973","unstructured":"Soyster A (1973) Convex programming with set-inclusive constraints and applications to inexact linear programming. Oper Res 21:1151\u20131154","journal-title":"Oper Res"},{"key":"339_CR27","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1287\/deca.1110.0221","volume":"9","author":"L McLay","year":"2012","unstructured":"McLay L, Rothschild C, Guikema S (2012) Robust adversarial risk analysis: a level-k approach. Decision Anal 9:41\u201354","journal-title":"Decision Anal"},{"key":"339_CR28","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1287\/opre.43.3.477","volume":"43","author":"JM Mulvey","year":"1995","unstructured":"Mulvey JM, Vanderbei RJ, Zenios SA (1995) Robust optimization of large-scale systems. Oper Res 43:477\u2013490","journal-title":"Oper Res"},{"issue":"1","key":"339_CR29","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/s10107-003-0373-y","volume":"99","author":"S Takriti","year":"2004","unstructured":"Takriti S, Ahmed S (2004) On robust optimization of two-stage systems. Math Program 99(1):109\u2013126","journal-title":"Math Program"},{"issue":"8","key":"339_CR30","doi-asserted-by":"crossref","first-page":"869","DOI":"10.1080\/01446190600631856","volume":"24","author":"R Sacks","year":"2006","unstructured":"Sacks R, Harel M (2006) An economic game theory model of subcontractor resource allocation behaviour. Constr Manag Econ 24(8):869\u2013881","journal-title":"Constr Manag Econ"},{"key":"339_CR31","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511973031","volume-title":"Security and game theory: algorithms, deployed systems, lessons learned","author":"M Tambe","year":"2011","unstructured":"Tambe M (2011) Security and game theory: algorithms, deployed systems, lessons learned. Cambridge University Press, Cambridge"},{"key":"339_CR32","doi-asserted-by":"crossref","unstructured":"Nisan N, Roughgarden T, Tardos E, Vazirani VV (2007) Algorithmic game theory. Cambridge University Press, Cambridge","DOI":"10.1017\/CBO9780511800481"}],"container-title":["OR Spectrum"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00291-013-0339-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00291-013-0339-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00291-013-0339-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T11:00:04Z","timestamp":1559041204000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00291-013-0339-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,2]]},"references-count":32,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,11]]}},"alternative-id":["339"],"URL":"https:\/\/doi.org\/10.1007\/s00291-013-0339-2","relation":{},"ISSN":["0171-6468","1436-6304"],"issn-type":[{"value":"0171-6468","type":"print"},{"value":"1436-6304","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,8,2]]}}}