Skip to main content
Log in

Information and Knowledge Leakage in Supply Chain

  • Published:
Information Systems Frontiers Aims and scope Submit manuscript

Abstract

The current world of post industrial value generation sees companies increasingly analyzing their internal operations against their external organizations to identify supply/demand fluctuations along the supply chain. Within these integrated relationships between internal and external parties in the supply chain, knowledge and information have become very important production resources. The existence and success of an increasing number of organizations strongly depend on their capabilities to utilize knowledge and information for profit generation. By managing more efficient information sharing, the volume of company confidential information passing through the supply chain increases, and this brings about more incidences of knowledge leakage and information leakage. A survey by PricewaterhouseCoopers in 2014 shows information security spending over the next 12 months would increase 60.27 % in Asia and 48.98 % in all regions. This emphasizes the importance of information privacy and therefore the necessity to study the information and knowledge leakage in integrated supply chain. The objectives of this study are to investigate the factors triggering information and knowledge leakage and create a mitigation framework to soften the impact of leakages on performance. The above objectives will be met by formulating and examining several hypotheses of a conceptualized information leakage (IL) and knowledge leakage (KL) framework. A case study derived from a structured interview is adopted as a methodology in this research. As a result, this paper contributes a novel theoretical model that characterizes information and knowledge leakage in an integrated supply chain. Therefore, it also adds new knowledge of managing information and knowledge leakage to supply chain management.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  • Ahmad, A., Bosua, R., & Scheepers, R. (2014). Protecting organizational competitive advantage: a knowledge leakage perspective. Computers and Security, 42, 27–39.

    Article  Google Scholar 

  • Amaratunga, D., Baldry, D., Sarshar, M., & Newton, R. (2002). Quantitative and qualitative research in the built environment: application of mixed research approach. Work Study, 51(1), 17–31.

    Article  Google Scholar 

  • Anand, K., & Goyal, M. (2009). Strategic information management under leakage in a supply chain. Management Science, 55(3), 438–452.

    Article  Google Scholar 

  • Arushanyan, Y., Ekener-Petersen, E., & Finnveden, G. (2014). Lessons learned - Review of LCAs for ICT products and services. Computers in Industry, 65(2), 211–234.

    Article  Google Scholar 

  • Baccara, M. (2007). Outsourcing, information leakage, and consulting firms. The Rand Journal of Economics, 38(1), 269–289.

    Article  Google Scholar 

  • Bank Negara Annual Report (2013). Retrieved on 1 January 2015 at http://www.bnm.gov.my/files/publication/ar/en/2013/cp01.pdf

  • Baresel-Bofinger, A. C., Ketikidis, P. H., Koh, S. L., & Cullen, J. (2011). Role of‘green knowledge’in the environmental transformation of the supply chain: the case of Greek manufacturing. International Journal of Knowledge Based Development, 2(1), 107–128.

    Article  Google Scholar 

  • Barkataki, S., & Zeineddine, H. (2013). On achieving secure collaboration in supply chains. Information Systems Frontiers. doi:10.1007/s10796-013-9448-3.

    Google Scholar 

  • Bennett-Curry, A., Malhi, Y., & Menton, M. (2013). Leakage effects in natural resource supply chains: a case study from the Peruvian commercial charcoal market. International Journal of Sustainable Development and World Ecology, 20(4), 336–348.

    Article  Google Scholar 

  • Bian, J., Guo, X., Lai, K. K., & Hua, Z. (2014). The strategic peril of information sharing in a vertical-Nash supply chain: a note. International Journal of Production Economics, 158, 37–43.

    Article  Google Scholar 

  • Bonte, W., & Wiethaus, L. (2007). Knowledge disclosure and transmission in buyer-supplier relationships. Review of Industrial Organisations, 31, 275–288.

    Article  Google Scholar 

  • Creese, S., Erola, A., Goldsmith, M., & Nurse, J. (2015). Investigating the leakage of sensitive personal and organisational information in email headers. Journal of Internet Services and Information Security, 5(1), 70–84.

    Google Scholar 

  • CWE-200: Information Leak (Information Disclosure). (2008). Retrieved November 2, 2014, from Common Weakness Enumeration: http://cwe.mitre.org/data/definitions/200.html.

  • Davenport, T. H., & Prusak, L. (2000). Working knowledge: How 1525 organizations manage what they know. Boston: Harvard Business School Press.

  • den Uijl, M., Hulstijn, J., van Ipenburg, F. (2013). An integrated platform for supply chain transparency: a case in the cocoa industry.

  • Done, A., Voss, C., & Rytter, N. G. (2011). Best practice interventions: short-term impact and long-term outcomes. Journal of Operations Management, 29(4), 500–513.

    Article  Google Scholar 

  • Dye, R. A., & Sridhar, S. S. (2003). Investment implications of information acquisition and leakage. Management Science, 49(6), 767–783.

    Article  Google Scholar 

  • Easterby-Smith, M., Lyles, M. A., & Tsang, E. W. (2008). Inter-organizational knowledge transfer: current themes and future prospects. Journal of Management Studies, 45(4), 677–690.

    Article  Google Scholar 

  • Eisenhardt, K. M. (1989). Building theories from case study research. Academy of Management Review, 14(4), 532–550.

    Google Scholar 

  • Faisal, M. N., Banwet, D. K., & Shankar, R. (2007). Information risks management in supply chain: an assessment and mitigation framework. Journal of Enterprise Information Management, 20(6), 677–699.

    Article  Google Scholar 

  • Flynn, B. B., Huo, B., & Zhao, X. (2010). The impact of suppy chain integration on performance: a contingency and configuration approach. Journal of Operations Management, 28(1), 58–71.

    Article  Google Scholar 

  • Frishammar, J., Ericsson, K., & Patel, P. C. (2015). The dark side of knowledge transfer: exploring knowledge leakage in joint R&D projects. Technovation. doi:10.1016/j.technovation.2015.01.001.

    Google Scholar 

  • Frohlich, M. T., & Westbrook, R. (2001). Arcs of integration: an international study of supply chain strategies. Journal of Operations Management, 19, 185–200.

    Article  Google Scholar 

  • Gao, X., Zhong, W., & Mei, S. (2013). Security investment and information sharing under an alternative security breach probability function. Information Systems Frontiers. doi:10.1007/s10796-013-9411-3.

    Google Scholar 

  • Harhoff, D., Henkel, J., & von Hippel, E. (2003). Profiting from voluntary information spillovers: how users benefit by freely revealing their innovations. Research Policy, 32, 1753–1769.

    Article  Google Scholar 

  • Hernandez, E., Sanders, W. G., & Tuschke, A. (2014). Network defense: pruning, grafting, and closing to prevent leakage of strategic knowledge to rivals. Academy of Management Journal. doi:10.5465/amj.2012.0773.

    Google Scholar 

  • Ho, S. J. (2009). Information leakage in innovation outsourcing. R&d Management, 39(5), 431–443.

    Article  Google Scholar 

  • Hoecht, A., & Trott, P. (2006a). Innovation risks of strategic outsourcing. Technovation, 26(5–6), 672–681.

    Article  Google Scholar 

  • Hoecht, A., & Trott, P. (2006b). Outsourcing, information leakage and the risk of losing technology-based competencies. European Business Review, 18(5), 395–412.

    Article  Google Scholar 

  • Kovach, K. A., Pruett, M., Samuels, L. B., & Duvall, C. F. (2004). Protecting trade secrets during employee migration: what you don’t know can hurt you. Labour Law Journal, 55(2), 69–84.

    Google Scholar 

  • Lee, H. (2002). Aligning supply chain strategies with product uncertainties. California Management Review, 44(3), 105–119.

    Article  Google Scholar 

  • Lee, H. (2004). The triple-A supply chain. Harvard Business Review, 82(10), 102–112.

    Google Scholar 

  • Li, S., Rao, S. S., Ragu-Nathan, T. S., & Ragu-Nathan, B. (2002). Development and validation of a measurement instrument for studying supply chain management practices. Journal of Operations Management, 23(6), 618–641.

    Article  Google Scholar 

  • Mohamed, S., Mynors, D., Grantham, A., Walsh, K., Chan, P. (2006). Understanding one aspect of the knowledge leakage concept: people. In Proceedings of the European and Mediterranean Conference on Information Systems (EMCIS) (pp. 6–7).

  • Nonaka, I., & Takeuchi, H. (1995). The knowledge-creating company: How Japanese companies create the dynamics of innovation. New York: Oxford University Press.

    Google Scholar 

  • Nouh, M., Almaatouq, A., Alabdulkareem, A., Singh, V. K., Shmueli, E., Alsaleh, M., … & Alfaris, A. (2014). Social information leakage: Effects of awareness and peer pressure on user behavior. In Human Aspects of Information Security, Privacy, and Trust (pp. 352–360). New York: Springer International Publishing.

  • Owen, L., Goldwasser, C., Choate, K., & Blitz, A. (2008). Collaborative innovation throughout the extended exterprise. Strategy & Leadership, 36(1), 39–45.

    Article  Google Scholar 

  • Ryu, S., Tsukishma, T., & Onari, H. (2009). A study on evaluation of demand information-sharing methods in supply chain. International Jounal of Production Economics, 120, 162–175.

    Article  Google Scholar 

  • Sicari, S., Cappiello, C., Pellegrini, F. D., Miorandi, D., & Coen-Porisini, A. (2014). A security-and quality-aware system architecture for Internet of Things. Information Systems Frontiers. doi:10.1007/s10796-014-9538-x.

    Google Scholar 

  • Spekman, R. E., & Davis, E. W. (2004). Risky business: expanding the discussion on risk and the extended enterprise. International Journal of Physical Distribution and Logistics Management, 34(5), 414–433.

    Article  Google Scholar 

  • Stanly, E. F., Lisa, M. E., & Jeffrey, A. O. (2007). Supply chain management: From vision to implementation (pp. 283–285). New Jersey: Prentice Hall.

    Google Scholar 

  • Tenth Malaysia Plan 2011-2015. Kuala Lumpur: The Economic Planning Unit. Retrieved at 25 November (2013) from http://www.pmo.gov.my/dokumenattached/RMK/RMK10_Eds.pdf

  • Tse, Y. K., & Tan, K. H. (2011). Managing product quality risk in a multi-tier global supply chain. International Journal of Production Research, 49(1), 139–158.

    Article  Google Scholar 

  • Voss, C., Tsikriktsis, N., & Frohlich, M. (2002). Case research in operations management. International Journal of Operations and Production Management, 22(2), 195–219.

    Article  Google Scholar 

  • Yang, D. (2011). How does knowledge sharing and governance mechanism affect innovation capabilities?-from the coevolution perspective. International Business Research, 4(1), 154–157.

    Google Scholar 

  • Yin, R. K. (2014). Case study research: Design and methods. New York: Sage publications.

    Google Scholar 

  • Zhang, D. Y. (2011). Modeling and evaluating information leakage caused by inferences in supply chains. Computers in Industry, 62, 351–363.

    Article  Google Scholar 

  • Zhang,D. Y., Cao,X.,Wang, L., & Zeng,Y. (2012).Mitigating the risk of 1750 information leakage in a two-level supply chain through optimal supplier selection. Journal of Intelligent Manufacturing, 23(4),1351–1364.

  • Zhao, X., Xie, J., & Zhang, W. J. (2002). The impact of information sharing and ordering co-ordination on supply chain performance. Supply Chain Management: An International Journal, 7(1), 24–40.

    Article  Google Scholar 

  • Zhao, X., Huo, B., Flynn, B. B., & Yeung, J. H. (2008). The impact of power and reationship commitment on the integration between manufacturers and customers in a supply chain. Journal of Operations Management, 26, 368–388.

    Article  Google Scholar 

Download references

Acknowledgments

The authors would like to thank Mr Ernest Chong for his help in the case study data collection. Wong W.P. thanks the support of Universiti Sains Malaysia RU Grant (1001/PMGT/816191).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to W. P. Wong.

Appendix A- Questionnaire Sample

Appendix A- Questionnaire Sample

1.1 Items/ Variables

Internal Integration

Item

Measurement items

SCII 01

We encourage cross-functional integration on key internal supply chain activities such as manufacturing, procurement, marketing, accounting, and logistics.

SCII 02

We practise such internal integration to prevent and solve problems

SCII 03

Open communication of relevant information occurs among all internal employees

External Integration

Item

Measurement items

SCEI 01

We integrate closely with suppliers (including direct and indirect suppliers)

SCEI 02

We integrate closely with distributors/retailers

SCEI 03

We integrate closely with customers (including direct and indirect customers)

SCEI 04

Our organisation collaborate intensively with Multinational Corporations (MNCs)

SCEI 05

We outsource most of our operations to external parties

SCEI 06

We cooperate with external parties in new product development (NPD)

SCEI 07

We cooperate with external parties in developing new process technologies

SCEI 08

We practise such external integration to prevent and solve problems

Integration measures

Item

Measurement items

SCIM 01

We enable external parties to access our planning systems

SCIM 02

We share our production plans with external parties

SCIM 03

We implement joint EDI access/networks with external parties

SCIM 04

We perform packaging customization with external parties

SCIM 05

We share common use of third-party logistical services

SCIM 06

We share common outsourcing providers/sub-contractors with trading partners and/or other external parties

Information Sharing and Leakage/Lost

Item

Measurement items

ISL 01

We share our business units’ proprietary and/or confidential information with trading partners and/or external parties

ISL 02

Our trading partners and/or external parties share their proprietary and/or confidential information with us

ISL 03

We and our trading partners and/or other external parties exchange information which helps business planning.

ISL 04

We experience issues with information leakage/lost to external parties

ISL 05

We experience issues with information leakage through technological related incidents (ie: company’s data bases being hacked)

ISL 06

We experience issues with information leakage through internal employees’ fraud (i.e., theft or unauthorized information acquisition by employees)

ISL 07

We encounter issues of information leakage through the collaboration efforts with external parties.

ISL 08

We encountered issues with information leakage through the movement of employees to other organisations

ISL 09

There is a high possibility that external parties would benefit from the leaked information.

ISL 09

Severe disruptions to our daily operations and supply chain have taken place due to information leakage/lost

Knowledge leakage/Lost

Item

Measurement items

KLL 01

We and our trading partners and/or other external parties integrate our knowledge bases to further enhance our operations.

KLL 02

We experience issues with knowledge leakage/lost to external parties.

KLL 03

We experience issues with knowledge leakage through the movement of employees to other organisations.

KLL 04

We encounter issues with knowledge leakage through fraud cases (i.e., unauthorised transfer of your organisation’s operational knowledge)

KLL 05

Severe disruptions to our daily operations and supply chain have taken place due to knowledge leakage/lost.

Mitigation/Prevention methods on Information knowledge leakage

Item

Measurement items

MPM 01

We have established procedures to mitigate and/or prevent the event of information leakage.

MPM 02

We have established procedures to mitigate and/or prevent the event of Knowledge leakage.

MPM 03

Our organisation has effective strategies in storage information.

MPM 04

Our organisation has effective strategies in codifying and storing knowledge.

Open ended questions:

  1. a.

    How dependent is your company on a single person for certain knowledge and experience?

  2. b.

    What mitigation and/or prevention measures are taken by your organisation to counteract the issues of information/knowledge leakage

  3. c.

    Do you see any risks in global supply chain integration process? (please specify any risks associated with it.)

  4. d.

    What is the risk and possibility of outsourcing providers, suppliers and/or sub-contractors becoming competitors arising from supply chain integration?

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tan, K.H., Wong, W.P. & Chung, L. Information and Knowledge Leakage in Supply Chain. Inf Syst Front 18, 621–638 (2016). https://doi.org/10.1007/s10796-015-9553-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10796-015-9553-6

Keywords

Navigation