{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T06:57:49Z","timestamp":1760425069318,"version":"3.41.2"},"reference-count":59,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2012,1,27]],"date-time":"2012-01-27T00:00:00Z","timestamp":1327622400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,1,27]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to propose a novel risk assessment approach that considers the inter\u2010relationship between supply chain risks and the structure of network at the same time. To reduce the impact of the supply chain risk and enhance the flexibility of transportation route finding during the product delivery, the authors propose a way to model the risk propagation and how to integrate it with the supply chain network using Bayesian Belief Network (BBN). The key risk indicators (KRI) of each vertex and edge of the supply chain network which are measured or computed by the proposed approach can be utilized to develop the optimal transportation route in the execution phase.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>BBN is utilized to illustrate the relations among supply chain risks which may take place in a certain vertex. To apply the BBN to the supply chain network, the authors develop the framework to integrate BBN and the supply chain network by using the general functions that describe the characteristics of the risk factors and inter\u2010relationships between vertices.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>By using the proposed risk assessment and dynamic route\u2010finding approach, it is possible to reduce the unexpected cost from the supply chain risk and overcome the limitations of previous risk management strategies which focus on developing counter plans and assume the independency of supply chain risks.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>The proposed approach describes how to develop KRI\u2010BBN to model the risk propagation and to integrate the KRI\u2010BBN and supply chain network. The KRIs directly measured or computed by KRI\u2010BBN in real time can be utilized to alternate supply chain execution plans such as inventory management, demand management and product flow management. Transportation problem considering risk is developed to show how to apply the proposed approach and numerical experiments are conducted to prove the cost effectiveness.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The contribution of this paper lies in the way of developing KRI\u2010BBN to assess the supply chain risk and modelling of the risk propagation by integrating KRI\u2010BBN with supply chain network. With the proposed risk assessment approach, it is able to alternate the transportation route to minimize the unexpected cost and transportation cost simultaneously.<\/jats:p><\/jats:sec>","DOI":"10.1108\/02635571211193662","type":"journal-article","created":{"date-parts":[[2012,1,14]],"date-time":"2012-01-14T07:20:02Z","timestamp":1326525602000},"page":"102-124","source":"Crossref","is-referenced-by-count":14,"title":["Risk propagation based dynamic transportation route finding mechanism"],"prefix":"10.1108","volume":"112","author":[{"given":"KwangSup","family":"Shin","sequence":"first","affiliation":[]},{"given":"YongWoo","family":"Shin","sequence":"additional","affiliation":[]},{"given":"Ji\u2010Hye","family":"Kwon","sequence":"additional","affiliation":[]},{"given":"Suk\u2010Ho","family":"Kang","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020720014169900_b1","doi-asserted-by":"crossref","unstructured":"Altay, N. and Ramirez, A. (2010), \u201cImpact of disasters on firms in different sectors: implications for supply chains\u201d, Journal of Supply Chain Management, Vol. 46 No. 4, pp. 59\u201080.","DOI":"10.1111\/j.1745-493X.2010.03206.x"},{"key":"key2022020720014169900_b2","doi-asserted-by":"crossref","unstructured":"Barry, J. (2004), \u201cSupply chain risk in an uncertain global supply chain environment\u201d, International Journal of Physical Distribution & Logistics Management, Vol. 34 No. 9, pp. 695\u20107.","DOI":"10.1108\/09600030410567469"},{"key":"key2022020720014169900_b3","unstructured":"Bart, K. and Maurice, P. (2007), Supply Chain Risk Management, Better Control of Your Business Environment, Deloitte, New York, NY."},{"key":"key2022020720014169900_b4","doi-asserted-by":"crossref","unstructured":"Blome, C. and Schoenherr, T. (2011), \u201cSupply chain risk management in financial crises \u2013 a multiple case\u2010study approach\u201d, International Journal of Production Economics in press..","DOI":"10.1016\/j.ijpe.2011.01.002"},{"key":"key2022020720014169900_b5","doi-asserted-by":"crossref","unstructured":"Bonafede, C.E. and Giudici, P. (2007), \u201cBayesian networks for enterprise risk assessment\u201d, Physica A: Statistical Mechanics and its Applications, Vol. 382 No. 1, pp. 22\u20108.","DOI":"10.1016\/j.physa.2007.02.065"},{"key":"key2022020720014169900_b6","doi-asserted-by":"crossref","unstructured":"Canedy, S. (1997), \u201cSo many, so much, so far, so fast: United States transportation command and strategic deployment for operation desert shield\/desert storm \u2013 Matthews, JK, Holt, CJ\u201d, Public Historian, Vol. 19 No. 3, pp. 52\u20105.","DOI":"10.2307\/3379560"},{"key":"key2022020720014169900_b7","doi-asserted-by":"crossref","unstructured":"Chiles, T.H. and Mcmackin, J.F. (1996), \u201cIntegrating variable risk preferences, trust, and transaction cost economics\u201d, The Academy of Management Review, Vol. 21 No. 1, pp. 73\u201099.","DOI":"10.5465\/amr.1996.9602161566"},{"key":"key2022020720014169900_b8","unstructured":"Chopra, S. and Sodhi, M.S. (2004), \u201cManaging risk to avoid supply\u2010chain breakdown\u201d, MIT Sloan Management Review, Vol. 46 No. 1, pp. 53\u201061."},{"key":"key2022020720014169900_b9","doi-asserted-by":"crossref","unstructured":"Clark, A.J. and Scarf, H. (1960), \u201cOptimal policies for a multi\u2010echelon inventory problem\u201d, Management Science, Vol. 6 No. 4, pp. 475\u201090.","DOI":"10.1287\/mnsc.6.4.475"},{"key":"key2022020720014169900_b10","doi-asserted-by":"crossref","unstructured":"Dijkstra, E. (1959), \u201cA note on two problems in connection with graphs\u201d, Numerische Mathematik, Vol. 1, pp. 269\u201071.","DOI":"10.1007\/BF01386390"},{"key":"key2022020720014169900_b11","doi-asserted-by":"crossref","unstructured":"Faisal, M.N., Banwet, D.K. and Shankar, R. (2006), \u201cMapping supply chains on risk and customer sensitivity dimensions\u201d, Industrial Management & Data Systems, Vol. 106 No. 6, pp. 878\u201095.","DOI":"10.1108\/02635570610671533"},{"key":"key2022020720014169900_b12","doi-asserted-by":"crossref","unstructured":"Fan, C.\u2010F. and Yu, Y.\u2010C. (2004), \u201cBBN\u2010based software project risk management\u201d, Journal of Systems and Software, Vol. 73 No. 2, pp. 193\u2010203.","DOI":"10.1016\/j.jss.2003.12.032"},{"key":"key2022020720014169900_b13","doi-asserted-by":"crossref","unstructured":"Giannakis, M. and Louis, M. (2011), \u201cA multi\u2010agent based framework for supply chain risk management\u201d, Journal of Purchasing & Supply Management, Vol. 17 No. 1, pp. 23\u201031.","DOI":"10.1016\/j.pursup.2010.05.001"},{"key":"key2022020720014169900_b14","doi-asserted-by":"crossref","unstructured":"Harland, C., Brenchley, R. and Walker, H. (2003), \u201cRisk in supply networks\u201d, Journal of Purchasing & Supply Management, Vol. 9 No. 2, pp. 51\u201062.","DOI":"10.1016\/S1478-4092(03)00004-9"},{"key":"key2022020720014169900_b15","unstructured":"Headquater (1998) in Army, D.O.T. (Ed.), Risk Management Field Manual, Headquater, Washington, DC."},{"key":"key2022020720014169900_b16","doi-asserted-by":"crossref","unstructured":"Heckerman, D. (1995), \u201cA tutorial on learning with Bayesian networks\u201d, Microsoft Research, March.","DOI":"10.1016\/B978-1-55860-377-6.50079-7"},{"key":"key2022020720014169900_b17","doi-asserted-by":"crossref","unstructured":"Hu, Y., Chen, J., Huang, J., Liu, M. and Xie, K. (2007), \u201cAnalyzing software system quality risk using Bayesian belief network\u201d, paper presented at 2007 IEEE International Conference on Granular Computing (GRC 2007), San Jose.","DOI":"10.1109\/GrC.2007.83"},{"key":"key2022020720014169900_b18","unstructured":"Hui, A.K.T. and Liu, D.B. (2004), \u201cA Bayesian belief network model and tool to evaluate risk and impact in software development projects\u201d, Reliability and Maintainability, 2004 Annual Symposium \u2013 RAMS, 26\u201029 January, pp. 297\u2010301."},{"key":"key2022020720014169900_b19","doi-asserted-by":"crossref","unstructured":"Huss, W.R. (1988), \u201cA move toward scenario analysis\u201d, International Journal of Forecasting, Vol. 4 No. 3, pp. 377\u201088.","DOI":"10.1016\/0169-2070(88)90105-7"},{"key":"key2022020720014169900_b20","unstructured":"Iglehart, J.D. and Karlin, S. (1961), \u201cOptimal policy for dynamic inventory process with non\u2010stationary stochastic demands\u201d, in Arrow, K.J., Karlin, S. and Scarf, H. (Eds), Studies in Applied Probability and Management Science, Stanford University Press, Stanford, CA."},{"key":"key2022020720014169900_b22","unstructured":"Jensen, F.V. (1996), An Introduction to Bayesian Networks, Springer, New York, NY."},{"key":"key2022020720014169900_b21","doi-asserted-by":"crossref","unstructured":"J\u00fcttner, U., Peck, H. and Christopher, M. (2003), \u201cSupply chain risk management: outlining an agenda for future research\u201d, International Journal of Logistics Research and Applications: A Leading Journal of Supply Chain Management, Vol. 6 No. 4, pp. 197\u2010210.","DOI":"10.1080\/13675560310001627016"},{"key":"key2022020720014169900_b23","unstructured":"Kaj\u00fcter, P. (2003), \u201cRisk management in supply chains\u201d, in Seuring, S.M.M., Goldbach, M. and Schneidewind, U. (Eds), Strategy and Organization in Supply Chain, Physica\u2010Verlag, Heidelberg."},{"key":"key2022020720014169900_b24","doi-asserted-by":"crossref","unstructured":"Kim, C.O., Jun, J., Baek, J.K., Smith, R.L. and Kim, Y.D. (2005), \u201cAdaptive inventory control models for supply chain management\u201d, The International Journal of Advanced Manufacturing Technology, Vol. 26 No. 9, pp. 1184\u201092.","DOI":"10.1007\/s00170-004-2069-8"},{"key":"key2022020720014169900_b25","doi-asserted-by":"crossref","unstructured":"Kondakci, S. (2010), \u201cNetwork security risk assessment using Bayesian belief networks\u201d, IEEE Second International Conference on Social Computing (SocialCom'10) 20\u201022 August, Minneapolis, MN, USA, pp. 952\u201060.","DOI":"10.1109\/SocialCom.2010.141"},{"key":"key2022020720014169900_b27","unstructured":"La Londe, B.J. (1997), \u201cSupply chain management: myth or reality?\u201d, Supply Chain Management Review, Vol. 1."},{"key":"key2022020720014169900_b28","doi-asserted-by":"crossref","unstructured":"Lai, G., Debo, L.G. and Sycara, K. (2009), \u201cSharing inventory risk in supply chain: the implication of financial constraint\u201d, Omega, Vol. 37 No. 4, pp. 811\u201025.","DOI":"10.1016\/j.omega.2008.06.003"},{"key":"key2022020720014169900_b29","doi-asserted-by":"crossref","unstructured":"Laur\u00eda, E.J.M. and Duchessi, P.J. (2006), \u201cA Bayesian belief network for IT implementation decision support\u201d, Decision Support Systems, Vol. 42 No. 3, pp. 1573\u201088.","DOI":"10.1016\/j.dss.2006.01.003"},{"key":"key2022020720014169900_b30","doi-asserted-by":"crossref","unstructured":"Lee, E., Park, Y. and Shin, J.G. (2009), \u201cLarge engineering project risk management using a Bayesian belief network\u201d, Expert Systems with Applications, Vol. 36 No. 3, pp. 5880\u20107, Part 2.","DOI":"10.1016\/j.eswa.2008.07.057"},{"key":"key2022020720014169900_b26","doi-asserted-by":"crossref","unstructured":"L\u00e9ger, P.\u2010M., Cassivi, L., Hadaya, P. and Caya, O. (2006), \u201cSafeguarding mechanisms in a supply chain network\u201d, Industrial Management & Data Systems, Vol. 106 No. 6, pp. 759\u201077.","DOI":"10.1108\/02635570610671461"},{"key":"key2022020720014169900_b31","doi-asserted-by":"crossref","unstructured":"Lingxiu, D. and Hau, L.L. (2003), \u201cOptimal policies and approximations for a serial multiechelon inventory system with time\u2010correlated demand\u201d, Oper. Res., Vol. 51 No. 6, pp. 969\u201080.","DOI":"10.1287\/opre.51.6.969.24920"},{"key":"key2022020720014169900_b32","doi-asserted-by":"crossref","unstructured":"Liu, L.P., Ji, H.H., Fan, T.J., Qi, L.L. and Wu, Z. (2006), \u201cRisk management in chemical industry supply chain\u201d, Proceedings of the 2006 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI 2006), Shanghai, pp. 415\u201018.","DOI":"10.1109\/SOLI.2006.329039"},{"key":"key2022020720014169900_b33","doi-asserted-by":"crossref","unstructured":"Manuj, I. and Mentzer, J.T. (2008), \u201cGlobal supply chain risk management\u201d, Journal of Business Logistics, Vol. 29 No. 1, pp. 133\u201055.","DOI":"10.1002\/j.2158-1592.2008.tb00072.x"},{"key":"key2022020720014169900_b34","doi-asserted-by":"crossref","unstructured":"March, J.G. and Shapira, Z. (1987), \u201cManagerial perspectives on risk and risk taking\u201d, Management Science, Vol. 33 No. 11, pp. 1404\u201018.","DOI":"10.1287\/mnsc.33.11.1404"},{"key":"key2022020720014169900_b35","doi-asserted-by":"crossref","unstructured":"Markowitz, H.M. (1952), \u201cPortfolio selection\u201d, The Journal of Finance, Vol. 7 No. 1, pp. 77\u201091.","DOI":"10.1111\/j.1540-6261.1952.tb01525.x"},{"key":"key2022020720014169900_b36","unstructured":"Matthews, J.K. and Holt, C.J. (1995), So Many, So Much, So Far, So Fast: United States Transportation Command and Strategic Deployment for Operation Desert Shield\/Desert Storm, United States Government Printing, Washington, DC."},{"key":"key2022020720014169900_b37","doi-asserted-by":"crossref","unstructured":"Miller, K.D. (1992), \u201cA framework for integrated risk management in international business\u201d, Journal of International Business Studies, Vol. 23 No. 2, pp. 311\u201031.","DOI":"10.1057\/palgrave.jibs.8490270"},{"key":"key2022020720014169900_b38","doi-asserted-by":"crossref","unstructured":"Morgan, M.G. and Henrion, M. (1990), Uncertainty: A Guide to Dealing with Uncertainty in Quantitative Risk and Policy Aalysis, Cambridge University Press, Cambridge.","DOI":"10.1017\/CBO9780511840609"},{"key":"key2022020720014169900_b39","doi-asserted-by":"crossref","unstructured":"Neil, M., Littlewood, B. and Fenton, N. (1996), \u201cApplying Bayesian belief networks to systems dependability assessment\u201d, Proceedings of Safety Critical Systems Club Symposium, Springer, Berlin, pp. 71\u201094.","DOI":"10.1007\/978-1-4471-1480-2_5"},{"key":"key2022020720014169900_b40","doi-asserted-by":"crossref","unstructured":"Nyberg, J.B., Marcot, G.B. and Sulyma, R. (2006), \u201cUsing Bayesian belief networks in adaptive management\u201d, Canadian Journal of Forest Research, Vol. 36 No. 12, pp. 3104\u201016.","DOI":"10.1139\/x06-108"},{"key":"key2022020720014169900_b41","doi-asserted-by":"crossref","unstructured":"Oehmen, J., Ziegenbein, A., Alard, R. and Schonsleben, P. (2009), \u201cSystem\u2010oriented supply chain risk management\u201d, Production Planning & Control, Vol. 20 No. 4, pp. 343\u201061.","DOI":"10.1080\/09537280902843789"},{"key":"key2022020720014169900_b42","unstructured":"Ogilvy, J.A. and Mancle, T. (1984), How to Construct and Use Scenarios, SRI International, Menlo Park, CA."},{"key":"key2022020720014169900_b43","doi-asserted-by":"crossref","unstructured":"Pearl, J. (1988), Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference, Morgan Kaufmann, San Francisco, CA.","DOI":"10.1016\/B978-0-08-051489-5.50008-4"},{"key":"key2022020720014169900_b44","doi-asserted-by":"crossref","unstructured":"Pfohl, H.\u2010C., K\u00f6hler, H. and Thomas, D. (2010), \u201cState of the art in supply chain risk management research: empirical and conceptual findings and a roadmap for the implementation in practice\u201d, Logistics Research, Vol. 2 No. 1, pp. 33\u201044.","DOI":"10.1007\/s12159-010-0023-8"},{"key":"key2022020720014169900_b45","doi-asserted-by":"crossref","unstructured":"Rao, S. and Goldsby, T.J. (2009), \u201cSupply chain risks: a review and typology\u201d, International Journal of Logistics Management, Vol. 20 No. 1, pp. 97\u2010123.","DOI":"10.1108\/09574090910954864"},{"key":"key2022020720014169900_b46","unstructured":"Rowe, W.D. (1980), \u201cRisk assessment approaches and methods\u201d, in Conran, G. (Ed.), Society, Technology and Risk Assessment, Academic Press, New York, NY."},{"key":"key2022020720014169900_b47","doi-asserted-by":"crossref","unstructured":"Ryu, I., So, S. and Koo, C. (2009), \u201cThe role of partnership in supply chain performance\u201d, Industrial Management & Data Systems, Vol. 109 No. 4, pp. 496\u2010514.","DOI":"10.1108\/02635570910948632"},{"key":"key2022020720014169900_b48","doi-asserted-by":"crossref","unstructured":"Sabio, N., Gadalla, M., Guill\u00e9n\u2010gos\u00e1lbez, G. and Jim\u00e9nez, L. (2010), \u201cStrategic planning with risk control of hydrogen supply chains for vehicle use under uncertainty in operating costs: a case study of Spain\u201d, International Journal of Hydrogen Energy, Vol. 35 No. 13, pp. 6836\u201052.","DOI":"10.1016\/j.ijhydene.2010.04.010"},{"key":"key2022020720014169900_b49","doi-asserted-by":"crossref","unstructured":"Schmitt, A.J. and Singh, M. (2009), \u201cQuantifying supply chain disruption risk using Monte Carlo and discrete\u2010event simulation\u201d, Winter Simulation Conference (WSC), Proceedings of the 2009, 13\u201016 December, Institute of Electrical and Electronics Engineers, Cambridge, MA, pp. 1237\u201048.","DOI":"10.1109\/WSC.2009.5429561"},{"key":"key2022020720014169900_b50","doi-asserted-by":"crossref","unstructured":"Skipper, J.B. and Hanna, J.B. (2009), \u201cMinimizing supply chain disruption risk through enhanced flexibility\u201d, International Journal of Physical Distribution & Logistics Management, Vol. 39 No. 5, pp. 404\u201027.","DOI":"10.1108\/09600030910973742"},{"key":"key2022020720014169900_b51","doi-asserted-by":"crossref","unstructured":"Song, J.\u2010S. and Zipkin, P. (1993), \u201cInventory control in a fluctuating demand environment\u201d, Operations Research, Vol. 41 No. 2, pp. 351\u201070.","DOI":"10.1287\/opre.41.2.351"},{"key":"key2022020720014169900_b52","doi-asserted-by":"crossref","unstructured":"Tang, C.S. (2006), \u201cPerspectives in supply chain risk management\u201d, International Journal of Production Economics, Vol. 103 No. 2, pp. 451\u201088.","DOI":"10.1016\/j.ijpe.2005.12.006"},{"key":"key2022020720014169900_b53","doi-asserted-by":"crossref","unstructured":"Trucco, P., Cagno, E., Ruggeri, F. and Grande, O. (2008), \u201cA Bayesian belief network modelling of organisational factors in risk analysis: a case study in maritime transportation\u201d, Reliability Engineering & System Safety, Vol. 93 No. 6, pp. 845\u201056.","DOI":"10.1016\/j.ress.2007.03.035"},{"key":"key2022020720014169900_b55","doi-asserted-by":"crossref","unstructured":"Vanany, I. and Pujawan, N. (2009), \u201cSupply chain risk management: literature reivew and future research\u201d, International journal of Information Systems and Supply Chain Management, Vol. 2 No. 1, pp. 16\u201033.","DOI":"10.4018\/jisscm.2009010102"},{"key":"key2022020720014169900_b54","doi-asserted-by":"crossref","unstructured":"Van der Gaag, L.C. (1996), \u201cBayesian belief networks: odds and ends\u201d, The Computer Journal, Vol. 39 No. 2, pp. 97\u2010113.","DOI":"10.1093\/comjnl\/39.2.97"},{"key":"key2022020720014169900_b56","doi-asserted-by":"crossref","unstructured":"Van der Gaag, L.C. (1996), \u201cBayesian belief networks: odds and ends\u201d, Computer Journal, Vol. 39 No. 2, pp. 97\u2010113.","DOI":"10.1093\/comjnl\/39.2.97"},{"key":"key2022020720014169900_b57","doi-asserted-by":"crossref","unstructured":"Wu, L.\u2010C. (2009), \u201cSupplier selection under uncertainty: a switching options perspective\u201d, Industrial Management & Data Systems, Vol. 109 No. 2, pp. 191\u2010205.","DOI":"10.1108\/02635570910930091"},{"key":"key2022020720014169900_b58","doi-asserted-by":"crossref","unstructured":"Xiao, T. and Yang, D. (2009), \u201cRisk sharing and information revelation mechanism of a one\u2010manufacturer and one\u2010retailer supply chain facing an integrated competitor\u201d, European Journal of Operational Research, Vol. 196 No. 3, pp. 1076\u201085.","DOI":"10.1016\/j.ejor.2008.05.004"},{"key":"key2022020720014169900_b59","doi-asserted-by":"crossref","unstructured":"Zelbst, P.J. Jr, Green, K.W.G., Sower, V.E. and Reyes, P. (2009), \u201cImpact of supply chain linkages on supply chain performance\u201d, Industrial Management & Data Systems, Vol. 109 No. 5, pp. 665\u201082.","DOI":"10.1108\/02635570910957641"}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02635571211193662","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635571211193662\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635571211193662\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:38:38Z","timestamp":1753400318000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/112\/1\/102-124\/175019"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1,27]]},"references-count":59,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,1,27]]}},"alternative-id":["10.1108\/02635571211193662"],"URL":"https:\/\/doi.org\/10.1108\/02635571211193662","relation":{},"ISSN":["0263-5577"],"issn-type":[{"type":"print","value":"0263-5577"}],"subject":[],"published":{"date-parts":[[2012,1,27]]}}}