2陈安 刘鲁 陈宁 等.供应链管理中的数据挖掘[A]..Proceedings of the 3rd World Congress on Intelligent Control and Automation[C].Hefei, P.R. China,June 28-July 2, 2000..
3[1]James B Rice, Richard M Hoppe. Supply Chain Versus Supply Chain: The Hype & The Reality[J].Supply Chain Management Review, 2001,79(9):46~54.
4[2]Sheffi, Yossi.Supply Chain Management Under The Threat Of International Terrorism[J].The International Journal Of Logistics Management,2001, 12(2):1~11.
5[3]Lonsdale, C.Effectively Managing Vertical Supply Relationships:A Risk Management Model For Outsourcing[J].Supply Chain Management:An International Journal, 1999, 4(4): 176~183.
6[4]Lee, Hau & Wolfe, Michael.Supply Chain Security Without Tears[J].Supply Chain Management Review. 2003,1: 12~20.
7[5]Svensson, G.A Conceptual Framework For The Analysis Of Vulnerability In Supply Chains[J].International Journal Of Physical Distribution & Logistics Management, 2000,32(2):110~134.
8[6]Das TK, Bing-Sheng Teng.Managing Risks In Strategic Alliances[J].Academy Of Management Executive, 1999,13(4): 50~62.
9Parnaby. J. Business Process Systems Engineering, International Journal of Technology Management, 1994.
10J. Hughes. Transform Your Supply Chain, International Thomson Business Press, 1999.