|
[1]
|
Guo, X., Su, Z. and Zhou, F. (2025) Supplier Encroachment with Decision Biases. European Journal of Operational Research, 324, 129-141. [Google Scholar] [CrossRef]
|
|
[2]
|
Luo, S. and Choi, T. (2022) E‐Commerce Supply Chains with Considerations of Cyber‐Security: Should Governments Play a Role? Production and Operations Management, 31, 2107-2126. [Google Scholar] [CrossRef]
|
|
[3]
|
Wu, Y., Feng, G. and Fung, R.Y.K. (2018) Comparison of Information Security Decisions under Different Security and Business Environments. Journal of the Operational Research Society, 69, 747-761. [Google Scholar] [CrossRef]
|
|
[4]
|
王文隆, 王成军. 基于竞争型制造商创新投入的零售商需求预测信息共享研究[J]. 中国管理科学, 2020, 28(8): 127-138.
|
|
[5]
|
许明辉, 袁睢秋, 秦颖, 等. 基于质量与零售服务投资的制造商入侵和零售商信息共享策略[J]. 系统工程理论与实践, 2025, 45(11): 3853-3872.
|
|
[6]
|
Chen, K.B., Liu, J.W., Huang, Z.Y. and Wang, S. (2024) Information Sharing Strategy and Channel Selection with Substitutable Products. International Journal of Production Economics, 268, Article ID: 109129. [Google Scholar] [CrossRef]
|
|
[7]
|
Zhang, S.C. and Zhang, J.X. (2020) Agency Selling or Reselling: E-Tailer Information Sharing with Supplier Offline Entry. European Journal of Operational Research, 280, 134-151. [Google Scholar] [CrossRef]
|
|
[8]
|
Li, L., Guo, Q.Y., Li, Y.T. and Hou, P. (2024) Implications of Demand Information Transparency on a Platform’s Bundling Strategy. IEEE Transactions on Engineering Management, 71, 9618-9629. [Google Scholar] [CrossRef]
|
|
[9]
|
Ma, C., Sun, Q., Xu, M., Dai, Y. and Zhang, M. (2023) Strategic Selling Agreement and Information Management under Leakage in an E-Commerce Supply Chain. Electronic Commerce Research and Applications, 61, Article ID: 101288. [Google Scholar] [CrossRef]
|
|
[10]
|
Kong, G., Rajagopalan, S. and Zhang, H. (2013) Revenue Sharing and Information Leakage in a Supply Chain. Management Science, 59, 556-572. [Google Scholar] [CrossRef]
|
|
[11]
|
丛海彬, 祁张辉, 唐敏, 等. 网络安全风险、跨境数据流动限制与数字服务贸易出口[J]. 工业技术经济, 2026, 45(1): 140-149.
|
|
[12]
|
邓胜利, 赵海平. 信息泄露情境下的个人信息价值评估及个体差异: 基于离散选择模型的实证研究[J]. 情报学报, 2019, 38(3): 266-276.
|
|
[13]
|
Wu, Y., Wang, N., Dai, T., et al. (2024) Information Security Outsourcing Strategies in the Supply Chain Considering Security Externality. Journal of the Operational Research Society, 76, 1-16.
|
|
[14]
|
Cezar, A., Cavusoglu, H. and Raghunathan, S. (2017) Sourcing Information Security Operations: The Role of Risk Interdependency and Competitive Externality in Outsourcing Decisions. Production and Operations Management, 26, 860-879. [Google Scholar] [CrossRef]
|