COMPLIANCEdigital
  • Kontakt
  • |
  • Impressum
  • |
  • Datenschutz
  • |
  • AGB
  • |
  • Hilfe
Hilfe zur Suche
Ihr Warenkorb ist leer
Login | Registrieren
Sie sind Gast
  • Home
    • Nachrichten
    • Top Themen
    • Rechtsprechung
    • Neu auf
  • Inhalt
    • eJournals
    • eBooks
    • Rechtsprechung
    • Arbeitshilfen
  • Service
    • Infodienst
    • Kontakt
    • Stellenmarkt
    • Veranstaltungen
    • Literaturhinweise
    • Links
  • Bestellen
  • Über
    • Kurzporträt
    • Mediadaten
    • Benutzerhinweise

Suche verfeinern

Nutzen Sie die Filter, um Ihre Suchanfrage weiter zu verfeinern.

Ihre Auswahl

  • nach Inhalt
    (Auswahl entfernen)
  • nach "eBook-Kapitel"
    (Auswahl entfernen)
  • nach Büchern
    (Auswahl entfernen)

… nach Jahr

  • 2009 (19)
Alle Filter entfernen

Am häufigsten gesucht

Anforderungen internen Instituts Banken Rahmen Revision deutsches Fraud Compliance Arbeitskreis deutschen Controlling Unternehmen Kreditinstituten Ifrs
Instagram LinkedIn X Xing YouTube

COMPLIANCEdigital

ist ein Angebot des

Erich Schmidt Verlag GmbH & Co. KG

Suchergebnisse

19 Treffer, Seite 1 von 2, sortieren nach: Relevanz Datum
  • eBook-Kapitel aus dem Buch Managing Risks in Supply Chains

    Evaluation of Transportation Network Reliability in Incidents

    Afshin Shariat Mohaimani, Poria Mohammadian, Navid Kalantari
    …Making, Accessibility, Transport Routing Problems 1 Introduction Transportation network providers favor networks that offer good performance. The… …separation model are models that are based on graph theory, their general form are as equation (1). They are more a mea- sure of mobility than accessibility… …. b d A j ij i ¦ (1) In this equation dij is the distance between i and j and b is a parameter. Graph theory measures could be expressed as the… …cost of fuel, tolls and fleet amortization. m psk ,G is defined as equation (6): ¯ ® ­   sk skm psk Ppif Ppif 0 1 ,G (6) Where Psk is… …S which has the probability of – M i ip 1 0 in the network. To achieve the most probable state of the network we generate new state by small… …phases: Phase 1 Continue cycling over the Pij in this phase, recursively generating new sets of states via the recursion defined by (2)/(3). In this… …phase, the set of states will progressively increase in cardinality. When the set first containst m. States, termi- nate Phase 1 and move to Phase 2… …. Phase 2 Starting from the last set of states generated in Phase 1, first ‘prune’ this set to contain only the m most probable of its elements. Then… …continue cycling over all the remaining Pij (not considered in Phase 1) in this phase, again generating new sets of states via the recursion defined by… …Assume the network of Figure (1) with the travel cost and incident probabilities of table (1): Figure 1: The example network 3 1 2 D B C A…
    Alle Treffer im Inhalt anzeigen
  • eBook-Kapitel aus dem Buch Managing Risks in Supply Chains

    Identification of Key Risk Factors for Logistics Outsourcing - A Case of Retailing Industry in Taiwan

    Ming-Chih Tsai, Shu-Chun Hung, Chia-Shing Han
    …Han 180 1 Introduction Logistics outsourcing has become a broad business solution for competitiveness (Boyson et al., 1999; Laarhoven, Berglund… …have long involvement with logistics outsourcing were invited for face to face in- terview. The three main items identified were listed in Tab 1 along… …183 Main-items Sub-items References 1.1 Delay of time [1] [2] [3] [12] [14] [17] [18] [21] [22] [25] 1.2 Hidden Cost [1] [24] [26] 1.3 Quality… …inferior to anticipation [1] [2] [3] [12] [14] [15] [17] [18] [21] [22] [23] [25] 1. Contract- Related Performance 1.4 Unable to help solve emergency… …customers [9] [10] [12] [13] [14] [23] 3. Market Competition 3.2 Diminish of market reaction elasticity [1] [2] [3] [12] [14] [17] [18] [21] [22] [25]… …Table 1: References of Outsourcing Failure Events References: [1] Adeleye, B., Annansingh, F. and Nunes, M., (2004); [2] Bahli, B. and Rivard, S… …of occurrence of the risk factor identified,PFij, and its corresponding relative weight of impact, wFij, as indicated in Eq. (1). The indicator… …signifies the definition of logistics outsourcing risk. ijij FFijF wPR u (1) Ming-Chih Tsai; Shu-Chun Hung, and Chia-Shing Han 184 As for the… …general risk value, RF, is the summantion of the risk value of each risk factor, as indicated in Eq (2). ¦¦¦¦¦¦ u�u � 2 1 33 4 1 2 1 2 1… …3 4 1 2 1 )()( j jFjF j ijFijF ij jF j ijF i F wPwPRRR (2) In this indicator, the probability of the occurrence of risk factor, PF, is…
    Alle Treffer im Inhalt anzeigen
  • eBook-Kapitel aus dem Buch Managing Risks in Supply Chains

    Enterprise and Supply Risk Management from the Perspective of Internal and External Auditors

    Michael Henke, Reiner Kurzhals, Christopher Jahns
    …of ERM. 1 Nature and relevance of the problems: Enterprise Risk Management (ERM) as a starting point for the further development of an integrated… …“Enterprise Risk Management (ERM) Framework” in the year 2004 (cp. Figure 1). It is safe to assume that the ERM framework will spread worldwide. Its great… …Christopher Jahns 98 Figure 1: Enterprise Risk Management (ERM) – the model of the Committee of Sponsoring Organizations of the Treadway Commission The… …risks. ___________________ 1 Risk analysis is not specifically mentioned in the ERM framework, but it is directly related to risk identification and… …institutions will be combined into two survey categories (cp. Table 1): Institution Frequency n % Survey Group Frequency n % Supply Managers 24 35 Group 1… …Controllers 8 12 Group 1 32 47 Internal Auditors 20 29 Group 2 External Auditors 16 24 Group 2 36 53 Total 68 100 Groups 1 + 2 68 100 Table 1… …system in 2005 For an exact illustration of the research results, clusters 1*, 2* and 3* should be re- ferred to according to their portfolio… …Controllers (Group 1) Internal and External Auditors (Group 2) Total Advanced n = 14 / 52 % n = 8 / 27 % n = 22 / 39 % Awareness n = 9 / 33 % n = 10 /… …implemented with above average pro- fessionalism. Group 1 subscribes to a different notion. – 1/3 of the Internal and External Auditors place less importance… …the “A- wareness” companies in group 1. – But the majority of Internal and External Auditors, in contrast to group 1, belong to the „Beginners,“ who…
    Alle Treffer im Inhalt anzeigen
  • eBook-Kapitel aus dem Buch Managing Risks in Supply Chains

    Complexity-Induced Supply Chain Risks – Interdependencies between Supply Chain Risk and Complexity Management

    Corinna Engelhardt-Nowitzki, Helmut E. Zsifkovits
    …. Zsifkovits 38 1 The Need to Manage Uncertainties and Risks along the Supply Chain Induces Crucial Questions for a Company As a consequence of increasing… …markets (“outbound SC”) as well as financial and labour markets (Diederichs, 2004, p. 1). The customer’s ability to quickly and advantageously sub- stitute… …of risk management in supply chains which is briefly described in Figure 1: Calls for Action P re ve n ti on / R ea ct io n pr io ri ti se… …Scheduling Risk Assessment & Prioritization Risk Identification & Prevention Risk Management Model Risk Management Model Figure 1: Risk Management in… …resources according to resource characteristics and contract type “taking effect on” “being applied on” 1. Autonomous (Enterprise) Correlated… …effect on” “being applied on” 1. Outbound Structure Dynamics Adaptation Inbound int. Process Interface Make / Buy Process-Dimension SC-Location… …resources according to resource characteristics and contract type “taking effect on” “being applied on” 1. Persuasibility3. Persuasibility3… …contract type “taking effect on” “being applied on” 1. Outbound Structure Dynamics Adaptation Inbound int. Process Interface Make / Buy… …scheduling of human, ma- chine and material resources according to resource characteristics and contract type “taking effect on” “being applied on” 1… …characteristics and contract type “taking effect on” “being applied on” 1. Outbound Structure Dynamics Adaptation Inbound int. Process Interface Make / Buy…
    Alle Treffer im Inhalt anzeigen
  • eBook-Kapitel aus dem Buch Managing Risks in Supply Chains

    Mitigating Risk during Strategic Supply Network Modelling

    Nikolaus Müssigmann
    …purchasing is exposed to. Keywords: Strategic Supply Network, Supply Network Management, Supply Risk 1 Introduction Reducing vertical integration and… …(see illustration in Figure 1) (Haller 1986). Prevent Reduce Transfer Bear the risk Overall risk Prevent Reduce Transfer Bear the risk Overall… …risk Figure 1: Risk mitigating mechanisms As shown in Figure 2 risk management is a cyclic process and can be divided into 4 phases: risk… …Supplier 3-1 S 1-1 S 2-2 S 2-1 S 3-1 Results of Strategic Supply Network Identification: Supply Network 1: Supply Network2: Supply Network3… …S 3-1 Produkt 1 Produkt 2 Pr od uc t 1 Prod uct 1 Product 2 Product 2Product2 OEM tier-1 tier-2 tier-3 OEM Supplier 1-1 Supplier 1-2… …Supplier 3-1 S 1-1 S 2-2 S 2-1 S 3-1 Results of Strategic Supply Network Identification: Supply Network 1: Supply Network2: Supply Network3… …Supplier 3-1 S 1-1 S 2-2 S 2-1 S 3-1 Results of Strategic Supply Network Identification: Supply Network 1: Supply Network2: Supply Network3… …S 3-1 Produkt 1 Produkt 2 Pr od uc t 1 Prod uct 1 Product 2 Product 2Product2 Figure 5 Identification of strategic supply networks In order… …is analogue to the theory of constraints used in OPT (Optimized Production Technology) (Zäpfel 1994). 1 3 2 4 5 6 7 8 9 10 11 12 13 14… …Critical sub - networks 4 and 6 are critical nodes 1 3 2 4 5 6 7 8 9 10 11 12 13 14 Critical sub - networks 4 and 6 are critical nodes…
    Alle Treffer im Inhalt anzeigen
  • eBook-Kapitel aus dem Buch Managing Risks in Supply Chains

    Assessment of the Uncertainty of Delivery – Promises to Increase the Reliability of Production Networks

    Lars Zschorn
    …1 Introduction Especially small and medium-sized enterprises increasingly concentrate on their core competencies and can only act successfully on… …fe rtarri val t A1 A2 A11 A31 * * a1 a3 a2a4 a5 M2 M3 A3* A4* a6 a7 Figure 1: Example of a machine schedule including time buffers The… …is processed in a number of r jobs by s machines with r t s t 1 and r, s  N, the first buffer time a1 results ac- cording to equation (1). Figure 1… …illustrates the meaning of that buffer time a1 using an example of a Gantt-diagram. * 1 rA endoffer tta � (1) Where: r = number of the jobs of the… …the viewed order in case r t s and s > 1, this means in case the viewed order comprises several jobs of several machines. The set Vi comprises all the… …least s – 1 of such differences. In Figure 1, the periods of time a2, a3 and a4 represent such time buffers. jl VA end MA starti MAtta kljk œ� … …. Those tem- poral buffers a correspond to the specific downtimes of the machines before the last job of the viewed order on the machine j. In Figure 1 a5… …, a6 and a7 represent such time buffers. jitta jiji MAend MA startij , '' 1 ��  � (4) Where: I = 2,…,bj J = 1, …,s The viewed order can… …. As a consequence, equation (6) respectively (7) is valid for the quantification of the CP. � �mP LLPC ˆˆ �1 (6) ¸ ¸ ¹ · ¨ ¨ © § °¿ ° ¾ ½ °¯ °… …xfxxf i 1 1 ,,� ; n  N (8) The probability that the n-dimensional random variable Y has a state in the area B  Rn, can be calculated by the help of…
    Alle Treffer im Inhalt anzeigen
  • eBook-Kapitel aus dem Buch Managing Risks in Supply Chains

    Managing Supply Risks: A System Theory Approach to Supply Early Warning Systems

    Christopher Jahns, Evi Hartmann, Marco Moder
    …automotive industry. Keywords: Supply Management, Early Warning System, Risk Exposure, Supply Risk Management 1 Developments in Supply Environment and… …core processes of Supply Risk Management, because they represent the starting point for the whole procedure (cp. Figure 1). From this view, the identi-… …Strategy 5. Ana lysi s of Ris k Situ atio n 4. Risk Management Action 3.RiskAnalysisandAssessment 2. Ris k Ide nti- fica tion 1. Formulation… …lysi s of Ris k Situ atio n 4. Risk Management Action 3.RiskAnalysisandAssessment 2. Ris k Ide nti- fica tion 1. Formulation / Revision… …of Risk Strategy Supply Early Warning System Figure 1: Supply Early Warning System in the holistic process of Supply Risk Management (adapted from… …defined as all methods which are used to identify, analyse, and assess Supply Risks (corresponding to Figure 1 as well). 3 The Need for More Theoretical… …selection of the Top 50 most important Supply Risks has been identified which will be the basis for further research in this area. Table 1 shows 16 out of… …. War or Terrorism (Fieten 2005, p. 32; Jüttner et al. 2003, p. 201; Zsidisin et al. 2005, p. 24) Table 1: Selection of supply risks from literature… …can look like. A basic procedure for the construction of a Supply Early Warning System as a social system will be determined as follows: 1… …search for its own sense (1) Observation of environment as a precondition for the difference between system and environment Preparing the…
    Alle Treffer im Inhalt anzeigen
  • eBook-Kapitel aus dem Buch Managing Risks in Supply Chains

    An Empirical Investigation into Supply Chain Vulnerability Experienced by German Firms

    Stephan M. Wagner, Christoph Bode
    …fine-grained understanding of antecedents of supply chain risks. Keywords: Supply Chain Management, Risk Management, Vulnerability, Survey 1 Introduction… …risk categories. Figure 1 shows the underlying mo- del. Customer dependence Supplier dependence Supplier concentration Single sourcing Global sourcing… …aspects were considered: (1) the development of a purposeful definition or notion of “risk” for the context of supply chain management and (2) the… …fo- cal firm) depends at least on two aspects: (1) on the characteristics of the supply chain disruption (e.g., magnitude, location of occurrence) and… …Table 1. Stephan M. Wagner and Christoph Bode 88 4.2 Questionnaire and Measure Development As indicated earlier, previous studies on supply chain… …could have been used for this study were not available, new measures and a fully standardized survey instrument (Appendix 1) were developed in several… …. Translations of the individual scale items and response cues for each measure are listed in Appendix 1. The demand side risk measure consists of two items… …principal com- ponent factor analysis using varimax as the method of rotation. Reliabilities and factor analysis results are included in Appendix 1… …: Organizational structure, environment and performance: The role of strategic choice, Sociology, Vol. 6, No. 1, pp 1-22. Chopra, Sunil, & ManMohan S. Sodhi… …(2004): Managing risk to avoid supply-chain breakdown, Sloan Management Review, Vol. 46, No. 1, pp. 53-61. An Empirical Investigation into Supply…
    Alle Treffer im Inhalt anzeigen
  • eBook-Kapitel aus dem Buch Managing Risks in Supply Chains

    A Tool for Assessing Product Non-Compliance Risks in Supply Chains

    Alex Martin, Kieren Mayers, Chris France
    …1 Introduction Products for consumer and industrial use within Europe must comply with national safety and environmental regulations. In many… …the distribution, marketing and sales of Play- ___________________ 1 Defined in EU product safety and environmental legislation as manufacturers… …SMMT, 1989; Abbott, 1992; McDermott et al., 1996; Franceschini and Galetto, 2001). FMEA follows a step-by-step approach that: 1. Identifies the… …the effects of the failure (again by assigning a number from a 1- 10 scale, but this time high to low). 6. Calculates the risk by multiplying the… …range from 1 to 1,000 for each failure mode) can then be ranked to prioritise where management action to eliminate or reduce potential failure mo- des is… …design or manufacturing failure on customer satisfaction. This has been graded in severity of effects scales; an example is shown in Table 1. At the same… …Chris France 154 Rating Description Definition 1 None Failure would not be noticeable to the customer and would not affect the customer’s process or… …non-compliance with regulations. 10 Dangerously high Failure could injure the customer or an employee. Table 1: Severity of effects rating scale used in product… …design/process FMEA (from McDermott et al., 1996) Rating Description Definition 1 Remote: failure is unlikely One occurrence in greater than five years… …Product Non-Compliance Risks in Supply Chains 155 Rating Description Definition 1 Almost certain The defect is obvious or there is 100% automatic…
    Alle Treffer im Inhalt anzeigen
  • eBook-Kapitel aus dem Buch Managing Risks in Supply Chains

    Reliability Improvement in Supply Chain Design under Demand and Supply Uncertainties

    Ilham Kissani
    …selection. Keywords: Reliability, Redundancy, Supply and Demand Uncertainties, Mathematical Programming, Supply Chain Design 1 Introduction The objective… …LAYOUTS Closing: Ys0 Status-quo: Ys1 Enlarge: Ys2 Machine added LAYOUTS Closing: Ys0 Status-quo: Ys1 Enlarge: Ys2 Machine added Figure 1: Site… …of the load in units of the strength. The statement of unreliability 1- R is a statement of failure probability expressed by Rao as: R=… …network 1 2 n …. (R1) (R2) (Rn) R=Ri Reliability Improvement in Supply Chain Design under Demand and Supply Uncertainties 65 We assume that… …RrSsYEZe sr d�¦  ,,0 Constraints of capacity options and layout selection s Jj j RrSsZ sr d¦  ,,1 SsY sRr sr  ¦  ,1 All the variables are… …(1) TtDdMPpTtDF i pdSs ppdtpsdt  ¦  ,,,, Constraints of suppliers’ selection (2) TtVvRMpOF o pvSs ppvtpvst d¦  ,, TtFfVvvRMpyMF p Ss… …f pvpvst o pv ud¦  ,,,, ¦  dd pVv pv RMpwy ,1 RMpFfxy RMpRPx RMpRP p f p Vv v p Ff f f p px Ff f f p p f p p �� » » ¼… …product p between node n and node n’ in period t Yrs = Binary variable equal to 1 if layout r is used on site s and to 0 otherwise. Zj = Binary variable… …equal to 1 if capacity option j is installed and to 0 otherwise. Reliability Improvement in Supply Chain Design under Demand and Supply Uncertainties… …Constraints of capacity options and layout selection (6) s j j RrSsZ d¦  ,,1 srJ SsY sRr sr  ¦  ,1 ^ ` ^ ` ;1,0;,1,0;Vv,y ppv JjZSsRrYRMp jssr…
    Alle Treffer im Inhalt anzeigen
zurück 1 2 weiter ►
  • Kontakt
  • |
  • Impressum
  • |
  • Datenschutz
  • |
  • Cookie-Einstellung
  • |
  • AGB
  • |
  • Hilfe

Die Nutzung für das Text und Data Mining ist ausschließlich dem Erich Schmidt Verlag GmbH & Co. KG vorbehalten. Der Verlag untersagt eine Vervielfältigung gemäß §44b UrhG ausdrücklich.
The use for text and data mining is reserved exclusively for Erich Schmidt Verlag GmbH & Co. KG. The publisher expressly prohibits reproduction in accordance with Section 44b of the Copy Right Act.

© 2025 Erich Schmidt Verlag GmbH & Co. KG, Genthiner Straße 30 G, 10785 Berlin
Telefon: +49 30 25 00 85-0, Telefax: +49 30 25 00 85-305 E- Mail: ESV@ESVmedien.de
Erich Schmidt Verlag        Zeitschrift für Corporate Governance        Consultingbay        Zeitschrift Interne Revision        Risk, Fraud & Compliance

Wir verwenden Cookies.

Um Ihnen ein optimales Webseitenerlebnis zu bieten, verwenden wir Cookies. Mit dem Klick auf „Alle akzeptieren“ stimmen Sie der Verwendung von allen Cookies zu. Für detaillierte Informationen über die Nutzung und Verwaltung von Cookies klicken Sie bitte auf „Anpassen“. Mit dem Klick auf „Cookies ablehnen“ untersagen Sie die Verwendung von zustimmungspflichtigen Cookies. Sie haben die Möglichkeit, Ihre Einstellungen jederzeit individuell anzupassen. Weitere Informationen finden Sie in unserer Datenschutzerklärung.


Anpassen Cookies ablehnen Alle akzeptieren

Cookie-Einstellungen individuell konfigurieren

Bitte wählen Sie aus folgenden Optionen:




zurück