{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T10:46:01Z","timestamp":1776681961629,"version":"3.51.2"},"reference-count":27,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2019,3,19]],"date-time":"2019-03-19T00:00:00Z","timestamp":1552953600000},"content-version":"vor","delay-in-days":77,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2019,1]]},"abstract":"<jats:p>Supply risk can have a negative impact on a manufacturer\u2019s performance. Backup sourcing is one of the most commonly used strategies to mitigate the adverse consequences of supply risks. In this paper, we study a procurement strategy with backup sourcing when a manufacturer faces stochastic supply risk and demand. The optimal decisions of the players involved are investigated theoretically using the game theoretic framework, and the impacts of the key parameters, such as wholesale prices and the risk probability, are assessed numerically under supply information symmetry and asymmetry. The results illustrate that the reservation price provided by the backup supplier varies greatly under different information\u2010sharing conditions. Reservation quantity is negatively correlated with the reservation price, which is affected by the risk probability, wholesale prices, and marginal cost of the backup supplier. We also show that given the same wholesale prices, the potential supply risk has a substantial impact on the manufacturer\u2019s expected profit, and the performance of the manufacturer under asymmetrical supply information is not always better than that under symmetrical information. In addition, we also discuss the impact of wholesale prices on reservation price and participants\u2019 profits based on numerical examples. The research enriches the understanding of a procurement strategy under stochastic supply risk, and the conclusions have certain management significance.<\/jats:p>","DOI":"10.1155\/2019\/3541352","type":"journal-article","created":{"date-parts":[[2019,3,19]],"date-time":"2019-03-19T23:34:40Z","timestamp":1553038480000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Procurement Strategy with Backup Sourcing under Stochastic Supply Risk"],"prefix":"10.1155","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1764-2117","authenticated-orcid":false,"given":"Yixin","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xifu","family":"Wang","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2019,3,19]]},"reference":[{"key":"e_1_2_10_1_2","volume-title":"Research on Procurement and Operation Strategies of Competitive Enterprises under Supply Risk","author":"He B.","year":"2015"},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2012.08.016"},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2013.03.025"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1060.0515"},{"key":"e_1_2_10_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2008.05.006"},{"key":"e_1_2_10_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2015.01.052"},{"key":"e_1_2_10_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2016.11.011"},{"key":"e_1_2_10_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2013.06.007"},{"key":"e_1_2_10_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2015.04.008"},{"key":"e_1_2_10_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2007.10.039"},{"key":"e_1_2_10_11_2","doi-asserted-by":"publisher","DOI":"10.1108\/13598541011054643"},{"key":"e_1_2_10_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2006.07.007"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.1287\/opre.1080.0667"},{"key":"e_1_2_10_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2011.09.001"},{"key":"e_1_2_10_15_2","doi-asserted-by":"crossref","unstructured":"HeB. HuangH. andYuanK. The comparison of two procurement strategies in the presence of supply disruption 2015.","DOI":"10.1016\/j.cie.2015.03.019"},{"key":"e_1_2_10_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2014.10.008"},{"key":"e_1_2_10_17_2","doi-asserted-by":"publisher","DOI":"10.1080\/00207721.2013.879234"},{"key":"e_1_2_10_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2006.10.036"},{"key":"e_1_2_10_19_2","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1080.0943"},{"key":"e_1_2_10_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2010.03.012"},{"key":"e_1_2_10_21_2","article-title":"Outsource planning with asymmetric supply cost information through a menu of option contracts","author":"Nosoohi I.","year":"2017","journal-title":"International Transactions in Operational Research"},{"key":"e_1_2_10_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2011.12.031"},{"key":"e_1_2_10_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2014.07.014"},{"key":"e_1_2_10_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2015.09.017"},{"key":"e_1_2_10_25_2","article-title":"On the loss-averse dual-sourcing problem under supply disruption","author":"Li X.","year":"2016","journal-title":"Computers Operations Research"},{"key":"e_1_2_10_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2017.06.004"},{"key":"e_1_2_10_27_2","first-page":"1","article-title":"Strategic cooperation with a backup supplier for the mitigation of supply disruptions","volume":"56","author":"Zhe Y.","year":"2017","journal-title":"International Journal of Production Research"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2019\/3541352.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2019\/3541352.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2019\/3541352","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T14:22:53Z","timestamp":1723040573000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2019\/3541352"}},"subtitle":[],"editor":[{"given":"Dimitri","family":"Volchenkov","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["10.1155\/2019\/3541352"],"URL":"https:\/\/doi.org\/10.1155\/2019\/3541352","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"value":"1076-2787","type":"print"},{"value":"1099-0526","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1]]},"assertion":[{"value":"2018-11-29","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-02-17","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-03-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"3541352"}}