Abstract
The current world of post industrial value generation sees companies increasingly analyzing their internal operations against their external organizations to identify supply/demand fluctuations along the supply chain. Within these integrated relationships between internal and external parties in the supply chain, knowledge and information have become very important production resources. The existence and success of an increasing number of organizations strongly depend on their capabilities to utilize knowledge and information for profit generation. By managing more efficient information sharing, the volume of company confidential information passing through the supply chain increases, and this brings about more incidences of knowledge leakage and information leakage. A survey by PricewaterhouseCoopers in 2014 shows information security spending over the next 12 months would increase 60.27 % in Asia and 48.98 % in all regions. This emphasizes the importance of information privacy and therefore the necessity to study the information and knowledge leakage in integrated supply chain. The objectives of this study are to investigate the factors triggering information and knowledge leakage and create a mitigation framework to soften the impact of leakages on performance. The above objectives will be met by formulating and examining several hypotheses of a conceptualized information leakage (IL) and knowledge leakage (KL) framework. A case study derived from a structured interview is adopted as a methodology in this research. As a result, this paper contributes a novel theoretical model that characterizes information and knowledge leakage in an integrated supply chain. Therefore, it also adds new knowledge of managing information and knowledge leakage to supply chain management.
Similar content being viewed by others
References
Ahmad, A., Bosua, R., & Scheepers, R. (2014). Protecting organizational competitive advantage: a knowledge leakage perspective. Computers and Security, 42, 27–39.
Amaratunga, D., Baldry, D., Sarshar, M., & Newton, R. (2002). Quantitative and qualitative research in the built environment: application of mixed research approach. Work Study, 51(1), 17–31.
Anand, K., & Goyal, M. (2009). Strategic information management under leakage in a supply chain. Management Science, 55(3), 438–452.
Arushanyan, Y., Ekener-Petersen, E., & Finnveden, G. (2014). Lessons learned - Review of LCAs for ICT products and services. Computers in Industry, 65(2), 211–234.
Baccara, M. (2007). Outsourcing, information leakage, and consulting firms. The Rand Journal of Economics, 38(1), 269–289.
Bank Negara Annual Report (2013). Retrieved on 1 January 2015 at http://www.bnm.gov.my/files/publication/ar/en/2013/cp01.pdf
Baresel-Bofinger, A. C., Ketikidis, P. H., Koh, S. L., & Cullen, J. (2011). Role of‘green knowledge’in the environmental transformation of the supply chain: the case of Greek manufacturing. International Journal of Knowledge Based Development, 2(1), 107–128.
Barkataki, S., & Zeineddine, H. (2013). On achieving secure collaboration in supply chains. Information Systems Frontiers. doi:10.1007/s10796-013-9448-3.
Bennett-Curry, A., Malhi, Y., & Menton, M. (2013). Leakage effects in natural resource supply chains: a case study from the Peruvian commercial charcoal market. International Journal of Sustainable Development and World Ecology, 20(4), 336–348.
Bian, J., Guo, X., Lai, K. K., & Hua, Z. (2014). The strategic peril of information sharing in a vertical-Nash supply chain: a note. International Journal of Production Economics, 158, 37–43.
Bonte, W., & Wiethaus, L. (2007). Knowledge disclosure and transmission in buyer-supplier relationships. Review of Industrial Organisations, 31, 275–288.
Creese, S., Erola, A., Goldsmith, M., & Nurse, J. (2015). Investigating the leakage of sensitive personal and organisational information in email headers. Journal of Internet Services and Information Security, 5(1), 70–84.
CWE-200: Information Leak (Information Disclosure). (2008). Retrieved November 2, 2014, from Common Weakness Enumeration: http://cwe.mitre.org/data/definitions/200.html.
Davenport, T. H., & Prusak, L. (2000). Working knowledge: How 1525 organizations manage what they know. Boston: Harvard Business School Press.
den Uijl, M., Hulstijn, J., van Ipenburg, F. (2013). An integrated platform for supply chain transparency: a case in the cocoa industry.
Done, A., Voss, C., & Rytter, N. G. (2011). Best practice interventions: short-term impact and long-term outcomes. Journal of Operations Management, 29(4), 500–513.
Dye, R. A., & Sridhar, S. S. (2003). Investment implications of information acquisition and leakage. Management Science, 49(6), 767–783.
Easterby-Smith, M., Lyles, M. A., & Tsang, E. W. (2008). Inter-organizational knowledge transfer: current themes and future prospects. Journal of Management Studies, 45(4), 677–690.
Eisenhardt, K. M. (1989). Building theories from case study research. Academy of Management Review, 14(4), 532–550.
Faisal, M. N., Banwet, D. K., & Shankar, R. (2007). Information risks management in supply chain: an assessment and mitigation framework. Journal of Enterprise Information Management, 20(6), 677–699.
Flynn, B. B., Huo, B., & Zhao, X. (2010). The impact of suppy chain integration on performance: a contingency and configuration approach. Journal of Operations Management, 28(1), 58–71.
Frishammar, J., Ericsson, K., & Patel, P. C. (2015). The dark side of knowledge transfer: exploring knowledge leakage in joint R&D projects. Technovation. doi:10.1016/j.technovation.2015.01.001.
Frohlich, M. T., & Westbrook, R. (2001). Arcs of integration: an international study of supply chain strategies. Journal of Operations Management, 19, 185–200.
Gao, X., Zhong, W., & Mei, S. (2013). Security investment and information sharing under an alternative security breach probability function. Information Systems Frontiers. doi:10.1007/s10796-013-9411-3.
Harhoff, D., Henkel, J., & von Hippel, E. (2003). Profiting from voluntary information spillovers: how users benefit by freely revealing their innovations. Research Policy, 32, 1753–1769.
Hernandez, E., Sanders, W. G., & Tuschke, A. (2014). Network defense: pruning, grafting, and closing to prevent leakage of strategic knowledge to rivals. Academy of Management Journal. doi:10.5465/amj.2012.0773.
Ho, S. J. (2009). Information leakage in innovation outsourcing. R&d Management, 39(5), 431–443.
Hoecht, A., & Trott, P. (2006a). Innovation risks of strategic outsourcing. Technovation, 26(5–6), 672–681.
Hoecht, A., & Trott, P. (2006b). Outsourcing, information leakage and the risk of losing technology-based competencies. European Business Review, 18(5), 395–412.
Kovach, K. A., Pruett, M., Samuels, L. B., & Duvall, C. F. (2004). Protecting trade secrets during employee migration: what you don’t know can hurt you. Labour Law Journal, 55(2), 69–84.
Lee, H. (2002). Aligning supply chain strategies with product uncertainties. California Management Review, 44(3), 105–119.
Lee, H. (2004). The triple-A supply chain. Harvard Business Review, 82(10), 102–112.
Li, S., Rao, S. S., Ragu-Nathan, T. S., & Ragu-Nathan, B. (2002). Development and validation of a measurement instrument for studying supply chain management practices. Journal of Operations Management, 23(6), 618–641.
Mohamed, S., Mynors, D., Grantham, A., Walsh, K., Chan, P. (2006). Understanding one aspect of the knowledge leakage concept: people. In Proceedings of the European and Mediterranean Conference on Information Systems (EMCIS) (pp. 6–7).
Nonaka, I., & Takeuchi, H. (1995). The knowledge-creating company: How Japanese companies create the dynamics of innovation. New York: Oxford University Press.
Nouh, M., Almaatouq, A., Alabdulkareem, A., Singh, V. K., Shmueli, E., Alsaleh, M., … & Alfaris, A. (2014). Social information leakage: Effects of awareness and peer pressure on user behavior. In Human Aspects of Information Security, Privacy, and Trust (pp. 352–360). New York: Springer International Publishing.
Owen, L., Goldwasser, C., Choate, K., & Blitz, A. (2008). Collaborative innovation throughout the extended exterprise. Strategy & Leadership, 36(1), 39–45.
Ryu, S., Tsukishma, T., & Onari, H. (2009). A study on evaluation of demand information-sharing methods in supply chain. International Jounal of Production Economics, 120, 162–175.
Sicari, S., Cappiello, C., Pellegrini, F. D., Miorandi, D., & Coen-Porisini, A. (2014). A security-and quality-aware system architecture for Internet of Things. Information Systems Frontiers. doi:10.1007/s10796-014-9538-x.
Spekman, R. E., & Davis, E. W. (2004). Risky business: expanding the discussion on risk and the extended enterprise. International Journal of Physical Distribution and Logistics Management, 34(5), 414–433.
Stanly, E. F., Lisa, M. E., & Jeffrey, A. O. (2007). Supply chain management: From vision to implementation (pp. 283–285). New Jersey: Prentice Hall.
Tenth Malaysia Plan 2011-2015. Kuala Lumpur: The Economic Planning Unit. Retrieved at 25 November (2013) from http://www.pmo.gov.my/dokumenattached/RMK/RMK10_Eds.pdf
Tse, Y. K., & Tan, K. H. (2011). Managing product quality risk in a multi-tier global supply chain. International Journal of Production Research, 49(1), 139–158.
Voss, C., Tsikriktsis, N., & Frohlich, M. (2002). Case research in operations management. International Journal of Operations and Production Management, 22(2), 195–219.
Yang, D. (2011). How does knowledge sharing and governance mechanism affect innovation capabilities?-from the coevolution perspective. International Business Research, 4(1), 154–157.
Yin, R. K. (2014). Case study research: Design and methods. New York: Sage publications.
Zhang, D. Y. (2011). Modeling and evaluating information leakage caused by inferences in supply chains. Computers in Industry, 62, 351–363.
Zhang,D. Y., Cao,X.,Wang, L., & Zeng,Y. (2012).Mitigating the risk of 1750 information leakage in a two-level supply chain through optimal supplier selection. Journal of Intelligent Manufacturing, 23(4),1351–1364.
Zhao, X., Xie, J., & Zhang, W. J. (2002). The impact of information sharing and ordering co-ordination on supply chain performance. Supply Chain Management: An International Journal, 7(1), 24–40.
Zhao, X., Huo, B., Flynn, B. B., & Yeung, J. H. (2008). The impact of power and reationship commitment on the integration between manufacturers and customers in a supply chain. Journal of Operations Management, 26, 368–388.
Acknowledgments
The authors would like to thank Mr Ernest Chong for his help in the case study data collection. Wong W.P. thanks the support of Universiti Sains Malaysia RU Grant (1001/PMGT/816191).
Author information
Authors and Affiliations
Corresponding author
Appendix A- Questionnaire Sample
Appendix A- Questionnaire Sample
1.1 Items/ Variables
Internal Integration
Item | Measurement items |
SCII 01 | We encourage cross-functional integration on key internal supply chain activities such as manufacturing, procurement, marketing, accounting, and logistics. |
SCII 02 | We practise such internal integration to prevent and solve problems |
SCII 03 | Open communication of relevant information occurs among all internal employees |
External Integration
Item | Measurement items |
SCEI 01 | We integrate closely with suppliers (including direct and indirect suppliers) |
SCEI 02 | We integrate closely with distributors/retailers |
SCEI 03 | We integrate closely with customers (including direct and indirect customers) |
SCEI 04 | Our organisation collaborate intensively with Multinational Corporations (MNCs) |
SCEI 05 | We outsource most of our operations to external parties |
SCEI 06 | We cooperate with external parties in new product development (NPD) |
SCEI 07 | We cooperate with external parties in developing new process technologies |
SCEI 08 | We practise such external integration to prevent and solve problems |
Integration measures
Item | Measurement items |
SCIM 01 | We enable external parties to access our planning systems |
SCIM 02 | We share our production plans with external parties |
SCIM 03 | We implement joint EDI access/networks with external parties |
SCIM 04 | We perform packaging customization with external parties |
SCIM 05 | We share common use of third-party logistical services |
SCIM 06 | We share common outsourcing providers/sub-contractors with trading partners and/or other external parties |
Information Sharing and Leakage/Lost
Item | Measurement items |
ISL 01 | We share our business units’ proprietary and/or confidential information with trading partners and/or external parties |
ISL 02 | Our trading partners and/or external parties share their proprietary and/or confidential information with us |
ISL 03 | We and our trading partners and/or other external parties exchange information which helps business planning. |
ISL 04 | We experience issues with information leakage/lost to external parties |
ISL 05 | We experience issues with information leakage through technological related incidents (ie: company’s data bases being hacked) |
ISL 06 | We experience issues with information leakage through internal employees’ fraud (i.e., theft or unauthorized information acquisition by employees) |
ISL 07 | We encounter issues of information leakage through the collaboration efforts with external parties. |
ISL 08 | We encountered issues with information leakage through the movement of employees to other organisations |
ISL 09 | There is a high possibility that external parties would benefit from the leaked information. |
ISL 09 | Severe disruptions to our daily operations and supply chain have taken place due to information leakage/lost |
Knowledge leakage/Lost
Item | Measurement items |
KLL 01 | We and our trading partners and/or other external parties integrate our knowledge bases to further enhance our operations. |
KLL 02 | We experience issues with knowledge leakage/lost to external parties. |
KLL 03 | We experience issues with knowledge leakage through the movement of employees to other organisations. |
KLL 04 | We encounter issues with knowledge leakage through fraud cases (i.e., unauthorised transfer of your organisation’s operational knowledge) |
KLL 05 | Severe disruptions to our daily operations and supply chain have taken place due to knowledge leakage/lost. |
Mitigation/Prevention methods on Information knowledge leakage
Item | Measurement items |
MPM 01 | We have established procedures to mitigate and/or prevent the event of information leakage. |
MPM 02 | We have established procedures to mitigate and/or prevent the event of Knowledge leakage. |
MPM 03 | Our organisation has effective strategies in storage information. |
MPM 04 | Our organisation has effective strategies in codifying and storing knowledge. |
Open ended questions:
-
a.
How dependent is your company on a single person for certain knowledge and experience?
-
b.
What mitigation and/or prevention measures are taken by your organisation to counteract the issues of information/knowledge leakage
-
c.
Do you see any risks in global supply chain integration process? (please specify any risks associated with it.)
-
d.
What is the risk and possibility of outsourcing providers, suppliers and/or sub-contractors becoming competitors arising from supply chain integration?
Rights and permissions
About this article
Cite this article
Tan, K.H., Wong, W.P. & Chung, L. Information and Knowledge Leakage in Supply Chain. Inf Syst Front 18, 621–638 (2016). https://doi.org/10.1007/s10796-015-9553-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10796-015-9553-6