×

Supplier evaluation model for computer auditing and decision-making analysis. (English) Zbl 1192.90096

Summary: The purpose of this paper is to present a model and a supporting approach for effective supplier selection decisions. Structural equation modeling (SEM) and confirmatory factor analysis are applied to test the evaluation principles and samples. Next, the data tested by SEM is used for artificial neural network (ANN) by Likert and fuzzy scales to structure a classification model, accompanying with canonical discriminate analysis (CANDISC) to diminish variables. After the training and test of the model, multiple discriminate analysis is applied to compare the accuracy of the classification. Last, the CANDISC variable reduction method with ANN classification model utilized in the study is applied. The supplier selection model designed with ANN classification model and fuzzy scales will be more effective than with the traditional statistics analysis. The new paradigm for decision making includes a combination of several effective methods and analysis. This research provides an integrated model for internal auditors and managers to classify their supplier selection decisions. This paper contributes to the new approach of the decision model building process for computer auditing and improves the classification accuracy effectively.

MSC:

90B50 Management decision making, including multiple objectives
90C70 Fuzzy and other nonstochastic uncertainty mathematical programming
Full Text: DOI

References:

[1] DOI: 10.1108/02635570910926591 · doi:10.1108/02635570910926591
[2] DOI: 10.1016/j.jdeveco.2006.01.012 · doi:10.1016/j.jdeveco.2006.01.012
[3] DOI: 10.1108/03684920510575726 · doi:10.1108/03684920510575726
[4] DOI: 10.1016/S0305-0548(03)00199-0 · Zbl 1076.90002 · doi:10.1016/S0305-0548(03)00199-0
[5] DOI: 10.1108/13598540310463369 · doi:10.1108/13598540310463369
[6] DOI: 10.1108/02635570810876796 · doi:10.1108/02635570810876796
[7] DOI: 10.1016/j.ejor.2006.01.032 · Zbl 1114.90047 · doi:10.1016/j.ejor.2006.01.032
[8] DOI: 10.1016/0377-2217(93)90232-C · Zbl 0800.90115 · doi:10.1016/0377-2217(93)90232-C
[9] DOI: 10.1016/j.eswa.2005.09.022 · doi:10.1016/j.eswa.2005.09.022
[10] DOI: 10.1016/S0272-6963(96)00091-5 · doi:10.1016/S0272-6963(96)00091-5
[11] DOI: 10.1016/j.jom.2005.07.002 · doi:10.1016/j.jom.2005.07.002
[12] DOI: 10.1016/j.knosys.2004.05.003 · doi:10.1016/j.knosys.2004.05.003
[13] DOI: 10.1002/smj.4250120802 · doi:10.1002/smj.4250120802
[14] Dickson, G.W. (1996), ”An analysis of vendor selection systems and decisions”,Journal of Purchasing, Vol. 2, pp. 5-17.
[15] DOI: 10.1108/03684920410534461 · Zbl 1102.68552 · doi:10.1108/03684920410534461
[16] DOI: 10.1108/02635570810883996 · doi:10.1108/02635570810883996
[17] DOI: 10.1016/S0377-2217(01)00261-2 · Zbl 0998.90519 · doi:10.1016/S0377-2217(01)00261-2
[18] Hinkle, C.L., Robinson, P.J. and Green, P.E. (1969), ”Vendor evaluation using cluster analysis”,Journal of Purchasing, Vol. 5 No. 3, pp. 49-58. · doi:10.1111/j.1745-493X.1969.tb00602.x
[19] DOI: 10.1016/S0360-8352(02)00052-9 · doi:10.1016/S0360-8352(02)00052-9
[20] DOI: 10.2307/249629 · doi:10.2307/249629
[21] DOI: 10.1111/j.1745-493X.1999.tb00237.x · doi:10.1111/j.1745-493X.1999.tb00237.x
[22] DOI: 10.1108/13598540610662095 · doi:10.1108/13598540610662095
[23] DOI: 10.1016/j.indmarman.2004.05.001 · doi:10.1016/j.indmarman.2004.05.001
[24] DOI: 10.1016/j.ijpe.2004.06.022 · doi:10.1016/j.ijpe.2004.06.022
[25] DOI: 10.1108/02635570910926582 · doi:10.1108/02635570910926582
[26] DOI: 10.1108/02635570810847581 · doi:10.1108/02635570810847581
[27] DOI: 10.1007/s00170-003-1808-6 · doi:10.1007/s00170-003-1808-6
[28] DOI: 10.1109/17.946529 · doi:10.1109/17.946529
[29] DOI: 10.1016/j.ejor.2006.06.023 · Zbl 1161.90309 · doi:10.1016/j.ejor.2006.06.023
[30] DOI: 10.1108/02635570810884030 · doi:10.1108/02635570810884030
[31] DOI: 10.1108/01443570110404736 · doi:10.1108/01443570110404736
[32] DOI: 10.1111/j.1745-493X.2002.tb00140.x · doi:10.1111/j.1745-493X.2002.tb00140.x
[33] DOI: 10.1007/s00170-003-1975-5 · doi:10.1007/s00170-003-1975-5
[34] DOI: 10.1016/j.jom.2003.12.005 · doi:10.1016/j.jom.2003.12.005
[35] DOI: 10.1108/02635570810868353 · doi:10.1108/02635570810868353
[36] DOI: 10.1016/j.ejor.2005.08.006 · Zbl 1137.90359 · doi:10.1016/j.ejor.2005.08.006
[37] DOI: 10.1108/03684920210443879 · doi:10.1108/03684920210443879
[38] DOI: 10.1108/03684920610688577 · doi:10.1108/03684920610688577
[39] DOI: 10.1108/02635570810844124 · doi:10.1108/02635570810844124
[40] Soukup, W.R. (1987), ”Supplier selection strategies”,Journal of Purchasing and Materials Management, Vol. 23 No. 2, pp. 7-13. · doi:10.1111/j.1745-493X.1987.tb00180.x
[41] Sutton, S.G., Khazanchi, D., Hampton, C. and Arnold, V. (2008), ”Risk analysis in extended enterprise environments: identification of critical risk factors in B2B e-commerce relationships”,Journal of the Association for Information Systems, Vol. 9 Nos 3/4, pp. 151-69.
[42] DOI: 10.1016/0148-2963(94)00043-E · doi:10.1016/0148-2963(94)00043-E
[43] DOI: 10.1111/j.1540-5885.2006.00233.x · doi:10.1111/j.1540-5885.2006.00233.x
[44] DOI: 10.1016/0377-2217(93)90301-3 · Zbl 0800.90587 · doi:10.1016/0377-2217(93)90301-3
[45] DOI: 10.1016/0377-2217(91)90033-R · Zbl 1403.90061 · doi:10.1016/0377-2217(91)90033-R
[46] Wei, J., Ende, L.V.D. and Lin, B. (2009), ”Customer-focused e-business model for the oil industry”,Journal of Computer Information Systems, Vol. XLIX No. 3, pp. 11-20.
[47] DOI: 10.1016/j.im.2004.11.004 · doi:10.1016/j.im.2004.11.004
[48] DOI: 10.1016/S0305-0483(98)00023-1 · doi:10.1016/S0305-0483(98)00023-1
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.