Open Access. Powered by Scholars. Published by Universities.®

Operations Research, Systems Engineering and Industrial Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Operations Research, Systems Engineering and Industrial Engineering

Social Media For Supply Chain Risk Management, Xiuju Fu, Rick S. M. Goh, J. C. Tong, Loganathan Ponnanbalam, Xiaofeng Yin, Zhaoxia Wang, H. Y. Xu, Sifei Lu Dec 2013

Social Media For Supply Chain Risk Management, Xiuju Fu, Rick S. M. Goh, J. C. Tong, Loganathan Ponnanbalam, Xiaofeng Yin, Zhaoxia Wang, H. Y. Xu, Sifei Lu

Research Collection School Of Computing and Information Systems

With the rapid increase of online social network users worldwide, social media feeds have become a rich and valuable information resource and attract great attention across diversified domains. In social media data, there are abundant contents of two-way and interactive communication about products, demand, customer services and supply. This makes social media a valuable channel for listening to the voices from the market and measuring supply chain risks and new market trends for companies. In this study, we surveyed the potential value of social media in supply chain risk management (SCRM) and examined how they can be applied to SCRM …


Deployed Communications In An Austere Environment: A Delphi Study, Andrew Soine, James Harker, Alan R. Heminger Nov 2013

Deployed Communications In An Austere Environment: A Delphi Study, Andrew Soine, James Harker, Alan R. Heminger

Faculty Publications

The information and communications technology (ICT) field is undergoing a period of tremendous change. The exponential growth rate of ICT capability in recent decades, which has had an undeniable effect on every aspect of our society, will likely have ramifications for military operations in austere environments. 1 The Air Force’s 689th Combat Communications Wing commissioned a study to forecast the future of mobile ICT in such environments. Researchers at the Air Force Institute of Technology chose to employ the Delphi technique as the methodology for executing this task. The following scenario, based on the results of that study, demonstrates how …