Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
survey
Open access

An Interdisciplinary Survey on Information Flows in Supply Chains

Published: 14 September 2023 Publication History
  • Get Citation Alerts
  • Abstract

    Supply chains form the backbone of modern economies and therefore require reliable information flows. In practice, however, supply chains face severe technical challenges, especially regarding security and privacy. In this work, we consolidate studies from supply chain management, information systems, and computer science from 2010–2021 in an interdisciplinary meta-survey to make this topic holistically accessible to interdisciplinary research. In particular, we identify a significant potential for computer scientists to remedy technical challenges and improve the robustness of information flows. We subsequently present a concise information flow-focused taxonomy for supply chains before discussing future research directions to provide possible entry points.

    1 Introduction

    Supply chains connect organizations on a regional, national, and global level, enabling them to jointly manufacture products and offer services. The importance of well-functioning supply chains for both business and everyday life has been prominently demonstrated over the past years. Disruptions caused by climate change [94], COVID-19 [177], the Suez canal obstruction [93], or the Russian invasion of Ukraine [195] have a lasting impact on the production and distribution of goods and materials, resulting, e.g., in shortages of grain, fuel, pharmaceuticals, and semiconductors that affect manufacturers, consumers, and societies worldwide. As a result, organizations invest in strengthening the robustness and resilience of supply chains, i.e., the ability to maintain or quickly return to normal operation after disruptions [110]. Due to globally connected economies with complex supply chains, this endeavor requires holistic solutions, e.g., by establishing circular economies [13] or redesigning global production networks and manufactured products [110].
    Data sharing and tighter collaborations between supply chain participants have been identified as prominent drivers for increasing the robustness and resilience of global supply chains [159, 202]. In fact, the establishment of reliable communication channels has long been recognized as a critical success factor for managing supply chains [1] as well as the business processes the supply chains run on top of [143]; in the face of today’s challenges, this requirement only gains further importance.
    For example, production planning and control requires organizations to exchange accurate delivery estimates and demand forecasts, e.g., to avoid the bullwhip effect [38]. Similarly, to identify and react to unforeseen circumstances quickly, real-time monitoring systems must be established, and they must be able to collect information from the entire supply chain [92, 100, 154, 214]. Lastly, provenance information is required to recall defunct products and to detect their origins by tracing them upstream in supply chains [56, 129].
    As a consequence, digital supply chains (DSCs), which center around the automated and digitized information exchange between organizations, have emerged and gained further traction in recent years [27, 151, 190]. This notable shift increasingly connects traditional supply chain management to IT-based solutions. However, related work so far has primarily been driven by supply chain experts, who may not be aware of state-of-the-art solutions in potentially beneficial IT-related research. Missing this opportunity could lead to unused potentials in both supply chain research and real-world deployments of DSCs.
    While organizational barriers, such as a missing sense of urgency or costs [4], are present, organizations also face severe technological challenges, e.g., related to IT security and privacy when setting up the required communication infrastructure [103, 181], for which they lack the corresponding competence and skills [66].
    In light of the transition from traditional to digitized supply chains, in this article, we investigate the extent and building blocks of technical contributions that promise reliable information flows. Considering that the academic literature on supply chain management is vast and diverse, we first have to gain an overview of which computer science-related ideas are already well-accepted in the supply-chain community. Accordingly, we center our efforts on analyzing to which extent these ideas are captured in survey articles and recent research articles from the supply-chain domain. Overall, we find that survey articles in this domain focus on quantitative aspects (articles per year, articles by region or venue, used methods, and others) for specific factors only. Despite the acclaim of their importance, more emphasis should be put on the essential, crucial information flows, their underlying data communication, and the means and concepts to implement them. Furthermore, we observe that corresponding (academic) solutions are either (1) not on-point (i.e., too general), (2) overly use case-specific, (3) with a strictly economic focus only, or (4) not properly evaluated. Consequently, the latest advances in IT-based solutions have little influence on real-world deployments and the evolution of supply chains. In conclusion, we find that computer science research has widely neglected to establish reliable information flows in supply chains, thus impeding sustainable technical solutions from a computer science perspective.
    Fig. 1.
    Fig. 1. The foundation and methodology of our survey article.
    With our work, we systematically survey the current state of reaching reliability for information (flows) as a critical building block for DSCs to incentivize further collaboration between computer scientists and supply-chain experts in the future. To this end, we qualitatively evaluate to which extent technological solutions and relevant security needs for establishing (reliable) information flows are already prevalent in the context of supply chains.
    Furthermore, we follow a holistic approach as proposed by Peng et al. [127]; that is, we comprehensively analyze the impact of the respective technology on supply chains. Generally, we adopt the approach in Figure 1: Based on domain knowledge in foundational supply chain literature, we summarize key supply chain characteristics as a first step. These characteristics enable us to systematically discuss the nature of a specific supply chain and, in particular, the business relations within it. We then focus on information flows that need to be established to support use cases such as production planning or tracking and tracing. Here, we conduct a qualitative meta-survey, i.e., we specifically target existing survey articles to analyze the state of the art. Our approach has two distinct advantages. First, focusing on survey articles allows us to efficiently cover a vast research corpus of thousands of research articles. Second, this approach enables us to identify which general ideas are well-known and accepted in the respective research community. We argue that covered articles and ideas are likely to have a certain level of visibility and potentially even impact on future developments.
    Our corresponding meta-survey covers the period 2010–2021, i.e., we capture developments of more than one decade. Based on our meta-survey, we derive an information flow taxonomy. The objective of this step is to systematically describe requirements on the information flows along three dimensions: (1) data (the nature of the data that needs to be exchanged), (2) security (aspects focusing on the protection of exchanged information), and (3) utility (aspects related to the quality of the information flow). In a subsequent step, we then utilize the supply chain characteristics and our novel taxonomy to discuss the current state of technical solutions for implementing (new) information flows within specific supply chains and eventually discuss future research directions.
    Contributions. Our contributions are threefold. First, we conduct a systematic literature review to provide a comprehensive overview of information flows in supply chains, revealing the neglected view of the full information lifecycle. Second, we consolidate the discussions of different strings of research by (a) formalizing the characteristics of supply chains and (b) deriving a taxonomy on information flow-focused supply chain research to facilitate interdisciplinary exchange. Third, based on our findings, we derive the need for in-depth interdisciplinary research, with an emphasis on the reliability of information flows in supply chains. This work thus lays the foundation to make this interdisciplinary topic holistically accessible to computer scientists and supply chain experts.
    Organization. The remainder of this article is structured as follows. Section 2 introduces fundamental background on supply chains (including characteristics to describe business relations within). Section 3 presents our meta-survey, including our research questions, the review approach, an overview of the identified publications, and a brief discussion of the respective publications. Based on our survey, Section 4 introduces our supply chain information flow taxonomy, reviews existing terms that characterize information flows against our taxonomy, and exemplifies our taxonomy using common supply chain use cases. Section 5 discusses currently (mostly) untapped research directions and how they are required for a successful future supply chain management on a more general level, covering the intersection of supply chain and computer science research. Finally, Section 6 concludes this survey article.

    2 Motivation and Background

    As a foundation for our analysis of information flows, we first establish a common basis concerning supply chains from a business perspective that is also comprehensible for other domains. To this end, in Section 2.1, we give a brief overview of supply chain management (SCM). Subsequently, in Section 2.2, we introduce the dimensions of digital SCM and we describe its relation with business process management in Section 2.3. Moving toward information flows along supply chains, we highlight well-established use cases in Section 2.4. Based on this overview, Section 2.5 then discusses SCM and its information flows from a computer science perspective, i.e., we present analogies to well-known computer science concepts to ease the comprehension of this business-focused view.

    2.1 Supply Chain Management (SCM)

    Traditionally, supply chains are primarily concerned with the flow of (physical) products. To improve cross-company business processes, supply chains also increasingly implement information flows between their participants. In contrast to mostly unidirectional product flows, information flows are implemented both upstream and downstream (cf. Figure 2), and even detached from the original supply chain structure. More importantly though, information flows are not necessarily limited to a single hop, i.e., they might cover multiple hops (vertical collaboration), e.g., between tier-1 suppliers and consumers [35, 84], different branches, e.g., multiple customers of a single supplier, or even structures that exceed the scope of a supply chain (horizontal collaboration) [16]. In fact, numerous actors are involved in supply chains, and the complexity increases constantly [55, 111, 123, 145]. Extending on Figure 2, distributors, retailers, commodity corporations, and many other actors can be involved in complex supply chain networks [111].
    Fig. 2.
    Fig. 2. Product and information flows concern a number of stakeholders along the supply chain (based on [89]). While product flows are unidirectional, information flows are established in both directions and potentially cover multiple hops. As such, data communication is the backbone of modern supply chains.
    SCM coordinates and optimizes the material, information, and financial flows throughout the supply chain [108, 160] while aiming at the maximization of value creation [196]. The affected supply chain processes range from raw material extraction to delivering the manufactured product while considering consumer relationships, customer service and demands, order fulfillment, manufacturing flow, procurement, and product development, as well as commercialization and respective return processes [33]. The fundamental idea of SCM is based on the belief that efficiency can be improved through information sharing, joint planning across suppliers and customers, and other collaborations [21].
    The effectiveness of SCM also depends on real-time processing of information, process alignment (supplier integration), (aligned) decision-making [197], and synchronized financial flows [108]. In particular, order management, production planning, data management, and tracking can counteract the efficiency decline of the supply chain [73]. As such, SCM enables the systematic planning, management, and coordination of supply chains. However, only when implemented effectively, SCM helps its diverse actors to monitor the supply chain in real-time to promote its responsiveness [164] as well as resilience [98]. With the increasing awareness of SCM success factors, stakeholders are gradually beginning to provide and source more information within supply chains [208].
    Overall, SCM concerns both short-term and long-term decisions and strategies of a multitude of stakeholders in supply chains to handle product, financial, and information flows.

    2.2 Dimensions of Digital SCM

    With the past and still ongoing developments of supply chains toward increasingly integrated suppliers, and more dynamic business relationships, the importance of digitized supply chains, their management, and the integration of novel technologies to support (data) communication is significantly increasing [61, 111, 209]. Thus, overall, supply chains transitioned to complex and global networks, encompassing a large number of stakeholders. Moreover, the reduction of trade barriers and greater interconnection of additional supply chain partners are driving the scope and growth of a global economy.

    2.2.1 Supply Chain Characteristics.

    Conceptually, various features that determine the business relationship influence the characteristics of supply chains. The structural complexity of supply chains is influenced by the system size, the degree of order (linkage), and the categories of elements [31]. Here, the elements include the different members of the supply chains (e.g., suppliers, manufacturers, distributors) as well as the information, product, and financial flows [31, 163]. The supply chain, modeled as a graph or network, is further characterized by the path length (average number of actors or tiers that must be traversed between any two actors), the connectivity distribution (average number of connections possessed by each node in the network) and the clustering coefficient (expresses network transitivity, i.e., the average probability of two neighboring nodes that are connected to a given local node are also connected to each other) [65]. Moreover, different network structures (small-world, scale-free, community, and hierarchical) exist in practice [201].
    Depending on the geographic location of supply chain partners, we also gradually distinguish local and global supply chains [101]. Additionally, the duration of collaboration can range from short-term to long-term, and the relationship can be coordinated or a pure exchange relationship [165]. When looking at the dynamism in the choice of business partners, supply chains can be static (partners are relatively stable) or dynamic (partners vary depending on the market opportunity) [87]. Thus, based on the dynamism and the background of relationships, trust is a crucial factor as well [60].
    Fawcett et al. [46] distinguish four levels of trust (limited trust, transactional trust, relational trust, and collaborative trust). With limited trust, the focus on the relationship lies in obtaining the lowest short-term cost at a fixed quality level. Transactional trust forms arms-length relationships, while in relationships based on relational trust, collaborative behavior increases. Collaborative trust is a close relationship focused on mutual success, joint planning and problem-solving, and increased competitiveness of the whole supply chain.
    Especially in large supply chain networks, companies are concerned with safeguarding sensitive information and trade secrets [28, 96, 118]. Moreover, reservations regarding new technologies (e.g., blockchain technology) can impair the establishment of information flows [61, 127, 198], and, thus, negatively affect SCM. Therefore, approaches to securely exchange information along supply chains, irrespective of the supply chain’s individual characteristics, are critical.

    2.2.2 Types of Information Flows.

    In light of developments toward global communication, interconnectivity, and integration, the potential for new business models arises: Data has become a crucial asset for the creation of value in companies’ operations [52]. The large amount of data leads to disruptions of established value creation structures as well as traditional business models and offers opportunities for innovative products and services. However, these new data-driven innovations cannot be advanced by a single stakeholder [145]. Instead, increasingly interconnected supply chains lead to the combination, enrichment, and sharing of various data sources from different actors in cross-industry data ecosystems [52].
    For traditional SCM (cf. Section 2.1), we can differentiate between repeated and one-time information flows. While the former is linked to subscribed events, the latter is usually present for specifically exchanging product information.
    Repeated Flows. Such flows increase the transparency of the current status or other relevant information, for example, with the goal to reduce uncertainties or improve reliability during the planning process by extending the amount of available information (cf. bullwhip effect [91]). Corresponding information flows entail a quicker availability of information. Thus, they might allow companies to improve their supply chain resilience, deal with disruptions, and improve their flexibility in general. They further contribute to reducing the latency until a decision has been made, as the reduced data latency allows companies to analyze reported events more quickly [216]. Consequently, after a taken action, the overall time until its measures show effect is reduced.
    One-Time Sharing. These flows primarily improve the transparency regarding a specific product and its quality. They also address issues with documentation (e.g., fair-trade products, sustainability, or authenticity) and traceability along the supply chain in general. However, corresponding information flows can also trigger actions that cause repeated flows. For example, minor production deviations might be acceptable for one customer but not for the originally intended recipient [189].

    2.3 Business Process Management and Supply Chain Management

    Digitized SCM and the interaction between different supply chain actors, with respective information and financial flows, are also closely related to business processes. Business process management (BPM) can support the management of such processes. In particular, BPM oversees how work is performed in an organization to achieve consistent outcomes [43]. As such, BPM considers the flow of work (control flow), the flow of information and physical artifacts (data perspective), and who performs particular tasks (resource perspective). Success in SCM and BPM goes hand in hand: internal processes that are developed with supply chain members in mind have been shown to have lower costs and satisfy service requirements better [143]. Moreover, both BPM and SCM are vital for performance improvements and competitiveness [143]. Focusing on BPM practices also helps to support collaborative activities with supply chain partners of an organization [169].
    Traditionally, BPM has focused on knowledge-intensive work processes by coordinating work and information flows within an organization [18]. In Figure 2, BPM would consider all processes within the manufacturer, spanning purchasing, logistics, marketing & sales, finance, development, and production. For instance, a business process may start as an engagement with marketing, then lead to a sale for which parts are purchased, and finally, the ordered products are manufactured and delivered by logistics. Business processes are well supported by information systems: A BPM system (BPMS) can be given a process model and will execute it for each incoming case by distributing work items amongst human and robotic workers, thereby interacting with auxiliary digital systems [2].
    While BPM mostly focuses on intra-organizational aspects, recently, inter-organizational BPM emerged to support collaboration between organizations [143]. For instance, choreography diagrams of the BPMN standard [125] provide a means to describe the communication between organizations that collaborate to achieve positive outcomes in an orchestrator-less setting. Choreography diagrams form a bridge between inter-organizational BPM and research on protocols, such as validation of properties using model checking. However, the use of such diagrams for supply chain analysis is challenged by the coarseness of the modeled communication. Moreover, BPMSs do not adequately support choreographies or processes that span multiple organizations [42], with only a few exceptions [3]. On account of describing the flow of sensitive information, BPM also entails essential security needs without focusing on them.
    In BPM, analysis and improvement of existing business processes play a significant role [43]. To support these steps, process mining offers automated tools to gain insights into running processes from recorded event data [187]. The need for automated analysis techniques for inter-organizational process mining has been identified [187] and initial work has been performed [183, 188]. While corresponding concepts that deal with the flow of information have been applied to supply chains (e.g., process mining techniques) [25], they do not consider technical aspects of (reliable) information flows, which we focus on in this article. Thus, despite the outlined interplay between BPM and SCM for supply chains in real-world deployments, in the following, we place our emphasis on the impact of digital SCM on information flows. Accordingly, we continue with an introduction of the most common inter-organizational SCM use cases in modern supply chain networks.

    2.4 Common Use Cases in Supply Chains

    We now introduce the motivation as well as the workflows of typical use cases along with their requirements regarding information flows in the context of supply chains and SCM.
    UC1: Collaborative Planning. A well-known problem of supply chains with multiple hops is the bullwhip effect [91]. To allow for improved production planning and enhanced demand forecasts, transparency along the entire supply chain is needed, i.e., companies should share their and their suppliers’ changes in demand with their customers [92]. This workflow would enable a simple adaption of the capacity planning based on capacity utilization within the supply chain [100]. However, sharing these business insights might also provide competitors with valuable insights [184]. Regardless, several approaches and their corresponding information flows are increasingly prevalent in today’s supply chains. Exemplary collaboration concepts include vendor-managed inventory (VMI), collaborative planning, forecasting, and replenishment (CPFR), and just-in-sequence (JiS) inventory management to realize a just-in-time (JiT) production [68, 92, 174].
    UC2: Supply Chain Design. Maintaining a global supply chain network and especially bootstrapping new business relationships is a significant challenge for companies [62, 141]. For example, manufacturing a new product might require a completely new set of suppliers. In light of custom production, reacting to customer change requests is a crucial aspect of manufacturing. In such a setting, a manufacturer is interested in suitable business partners, while potential suppliers do not necessarily want to globally announce their production and delivery capabilities [130, 131]. Regardless, reliable on-demand information sharing on available capabilities could establish a fairer and more competitive market with direct implications on the design and maintenance of supply chains [133].
    UC3: Tracking – Real-Time Monitoring. To primarily anticipate problems as early as possible, manufacturers are interested in full visibility of the upstream and downstream activities [56, 141]. When transported, goods are often handled by many different parties, including lead logistics, carriers, shipping lines, ports, airports, and customs. These parties are independent, and their cooperation is often limited to a single hop which significantly challenges the uninterrupted monitoring [92]. Overall, this use case is not limited to location information only. It can also cover condition monitoring, e.g., whether a cold chain was intact during transit [17, 155]. Besides, tracking data helps in improving delivery date predictions (ETAs) and time slot management [15, 142].
    UC4: Tracing – Handling Faults. Likewise, when identifying issues with products after the fact, manufacturers are interested in tracing the product along the supply chain to the current user (i.e., customer) while identifying used components, tools, and products as well as the respective suppliers [24, 149]. Such an approach allows them to be informed, for example, about reduced product lifetimes or improper operational reliability [185]. Moreover, they can inquire about their products’ usage data to obtain a better understanding of the extent and severity of the fault at hand. If needed, they can also instruct a product recall, a practice that is common for food supply chains or in the event of safety-critical failures (cf. automotive or aviation industry). Established data sharing reduces follow-up costs and application latency until the measures show their effect.
    UC5: Tracing – Sourcing Faults. Conversely, a customer can also identify an issue with a product, potentially in a specific subcomponent only, i.e., identifying the root cause is of interest. To this end, tracing the product and its components backward through the supply chain is a suitable approach [147]. Successfully pinpointing the failure’s origin also benefits other companies with similar or identical products in use, effectively triggering a tracing process [60].
    UC6: Tracing – Validation. As specified by customers or by law, supply chains need to abide by regulations and contracts (e.g., the supply chain act [26]). For example, auditors might want to verify that all regulations are followed [147]. Thus, complete, unmodified, and accurate historical information about the activities and production processes in the supply chain is needed. Such verifications can also occur through third-party regulators or certifiers, e.g., to look at sustainably sourced products, organic food items, or authentic origins of diamonds. Similarly, digital certificates regarding the product’s quality can be of value. Especially with pharmaceutical products [40, 59] or art [148], staying clear of counterfeit products is a crucial requirement. Even more, the benefits of tracing also translate to end-customers who increasingly care whether their products are ethically and sustainably sourced [158].
    UC7: Critical Infrastructures. Especially for international supply chains, goods flow through critical infrastructures, such as ports or airports. There, operators interact with different logistics companies. Often, information about the freight that results in actions by the operator, e.g., storage, pickup, and safety and custom inspections of freight, is provided by the lead logistics but stems from other, original shipping companies. Most prominently, the effect of unreliable information in this context has been demonstrated in the Antwerp container port hack, where information about containers was altered to bypass inspections and to smuggle drugs [162]. Consequently, the impact of unreliable information in these infrastructures can be enormous on both society and economy.
    UC8: Product Information. Information on products is not only relevant for production planning (e.g., for logistics and inventory), but it also allows companies to adjust their manufacturing accordingly [120, 172]. Thereby, manufacturers can, for example, react to slight deviations or identify critical issues early on. Thus, sharing detailed information about an individual part from the supplier to subsequent customers, even over multiple hops, can entail significant process improvements and benefits. However, given its sensitivity and the potentially adverse effects for suppliers (e.g., by willingly reporting on deviations), this practice is not yet widely established [203].
    Each use case expresses specific needs for the exchange of information, i.e., the respective information flows vary even across different implementations of the same use case due to the varying supply chain characteristics (cf. Section 2.2.1). However, in the end, they all build upon access to reliable information [37]. Thus, in the next sections, we specifically look into challenges regarding the design and development of reliable digital information sharing in supply chains.

    2.5 A Technical Perspective on Information Flows

    Before looking at these information flows in more detail, we first want to improve the comprehension of SCM and its information flows for computer scientists by introducing two analogies: First, we compare them to the network stack, and, second, we match decision processes within (global) supply chains to control loops in cyber-physical systems (CPSs).
    Different Layers Interacting. As for the network stack in communication systems, data sensed in supply chains is also passed through different logical layers until decisions are made, as we illustrate in Figure 3(a). Here, the upper two layers depend on (reliable) data for their decision-making. We consider the exact physical handling as well as the specific decision-making, i.e., SCM planning algorithms, as out of scope for this article. Instead, we focus on the flow of information and the associated data processing.
    Supply Chain Decisions. As we model in Figure 3(c), we can identify a decision loop within supply chains, which sources information during the decision-making that is partly based on suppliers forwarding information (e.g., on products and shipments) to allow them to adjust their (local) processes accordingly. Here, most of the decision loop steps are significantly influenced by external (global) actions and (sensed) information. Thus, it requires reliable information.
    Physical Process. This step cannot be digitized as it concerns real-world shipments. Its events are the main source of information for decision-making in the context of SCM.
    Sensing. The sensing step is needed to capture and digitize the information of physical processes and concerns all kinds of information, e.g., shipment status, environmental conditions, or processing of goods along the supply chain.
    Decision-Making. Based on the available information, companies can make decisions to adjust shipments or production planning (e.g., sourcing components from another supplier). Depending on the information quality and magnitude of the decision, this step is either human-managed or automated. In the future, we expect increased automation following AI-driven advances, potentially with the need for a human operator to simply confirm suggested changes.
    Reacting. This step basically orchestrates any required changes that follow from the decision-making to the physical processes. Consequently, this step manipulates real-world shipments and/or production processes accordingly.
    CPS Control Loop. Our suggested supply chain model is an analogy to the CPS model on control loops [179], which features similar phases and challenges (cf. Figure 3(b)), i.e., sensing, controlling, and acting. However, in contrast to digitized supply chains, CPS control loops usually source their information locally. Thus, a single control cycle is much quicker than in supply chains, where we consider a global view with potentially multi-hop information flows from different stakeholders. Thus, our supply chain model is much broader than the traditional CPS model.
    Concerning the reliability challenges of information flows, transferring security and privacy analyses from the CPS model to supply chains could be a wise idea to capture all relevant aspects within global supply chain environments.
    Fig. 3.
    Fig. 3. Analogies from the domain of computer science to illustrate the decision-making in supply chains.

    3 A Meta-survey On Information Flows in Supply Chains

    This article aims at making the topic of information flows in supply chains readily accessible to interdisciplinary research and experts from different domains. Therefore, we conduct a systematic literature review (SLR) targeting the current state of (technical) research on information flows in supply chains. For this work, we focus on a qualitative survey and refrain from presenting a quantitative analysis as it would (1) introduce an inherent bias based on the underlying surveys’ inclusion criteria, (2) add little value w.r.t. the goals of our article, and (3) lack depth and insights due to the expressed oversight of compelling and profound research to date (cf. Section 4; we refer to relevant articles when presenting our taxonomy). Our corresponding presentation is as follows.
    First, in Section 3.1, we outline the primary research questions for our SLR. Subsequently, in Section 3.2, we detail our SLR methodology, including potential limitations. Then, we present statistics on the SLR process (Section 3.3) and general characteristics to establish a high-level overview of relevant work in the area (Section 3.4). Finally, in Section 3.5, we discuss the main findings of our SLR before concluding this section with takeaways on the evolution in Section 3.6.

    3.1 Research Questions

    With our survey, we assess the current state of information flows in the context of supply chains while also providing a detailed, technical view of the underlying concepts. This approach thus provides a viewpoint that does not primarily focus on the business perspective and primarily focuses on two aspects:
    (1)
    What are the limitations of existing approaches implementing reliable information flows in supply chains?
    (2)
    How can general requirements for information flows in supply chains be systematically described and grouped?
    Led by these research questions, we thoroughly conducted an SLR. Before presenting and discussing our findings, we first detail our methodology in the following.

    3.2 Survey Methodology

    Research in the area of supply chains is characterized by an exceptional amount and wide range of work. To thoroughly capture this domain, we focus our SLR on existing literature surveys (no questionnaire-based surveys), which cover more than one decade of research and developments in the area. Furthermore, we resort to relatively general keywords to identify relevant articles. The benefits of this approach are twofold. First, we get a curated overview of the most important research directions in the field without excluding potentially relevant articles too early. Second, individual proposals of single articles do not bias our overview and understanding since the considered survey articles are bound to contextualize the articles’ impact within the covered research area. Not considering individual proposals in our methodology could also be seen as a limitation hindering the immediate transfer of existing solutions. However, we argue that this work should lay the foundation for a sustainable interdisciplinary approach by identifying reliable and commonly known technological building blocks instead of individually recommending specific and possibly outdated or obsolete solutions.
    Concerning our methodology, we adapt distinct best practices [23, 86, 135, 136]: We use Parsifal [48] to broadly identify potentially relevant literature from Scopus and Web of Science (WoS), published in 2010+. Namely, we started with all articles matching the following query either in title, abstract, or keywords: supply chain \(\wedge\) (information \(\vee\) data) \(\wedge\) (literature \(\wedge\) (survey \(\vee\) review)). After a broad initial filtering, e.g., to remove duplicates, we conducted two increasingly refined rounds of content-based filtering, i.e., we first screened the titles and abstracts and then assessed the introductions and conclusions of the respectively remaining articles. Finally, we systematically analyzed all remaining articles in preparation for this survey article.

    3.3 Statistics of Our Conducted Meta-Survey

    On October 4 2021, we extracted 2,708 articles from Scopus and 2,769 articles from WoS matching our search query. During the initial filtering, we removed duplicates (1,306), full proceedings (25), and non-English articles (5). After this step, a total of 4,141 articles remained for further consideration.
    We then proceeded to screen titles and abstracts of the remaining articles. Here, we excluded 3,786 articles overall: At least 1,268 articles were deemed off-topic (i.e., research not primarily concerned with supply chains), at least 1,121 articles had orthogonal research questions (they covered supply chains or logistics more remotely), and at least 217 articles reported on survey types unsuitable for a meta-survey (e.g., they were based on expert interviews or questionnaires). After this screening, a total of 355 articles remained eligible.
    Subsequently, we obtained the available full texts of the remaining articles, read their introductions and conclusions, and assessed the quality of the articles’ publishing outlets. Here, we identified 175 articles to be irrelevant to our meta-survey (we were unable to access the full text of 17 articles), and we excluded 101 articles deemed only “partially relevant,” i.e., they fell below our scoring threshold in Parsifal. Furthermore, we identified one article that had been retracted previously; hence, we excluded it as well. Thus, as a basis for our meta-survey, we obtained 79 surveys that were either highly related to research on (reliable) information flows in supply chains or partly related but published at high-impact venues.
    During the final reading of these 79 articles, we further excluded 9 ineligible articles that could only be excluded based on the full text, leaving us with 70 articles in total (Table 1), whereby most of them have a primary background in the engineering, computer science, or business domains.
    Table 1.
    Table 1. For our interdisciplinary meta-survey, we eventually considered 70 survey papers

    3.4 Content Systemization

    Now, we give a general overview of the fully read articles of our SLR. Most notably, our meta-survey revealed a large body of especially extensive surveys (including SLRs). The extensiveness of these surveys (hundreds [9] to thousands [175] of considered articles) underpins the availability of a large but insufficiently structured body of knowledge in this area. We visualize the time-wise distribution of the surveyed articles per domain along with the publication years of articles cited by these surveys as an indicator for research interest in Figure 4.
    Content-wise, the surveys usually emphasize one specific topic for a detailed analysis (e.g., value of information [193] or supply chain resilience [109]). Overall, these surveys mainly approach and evaluate information flows in supply chains from a business perspective, e.g., with a focus on the implications on BPM [10, 29]. The most prominent research area that utilizes shared information (cf. Figure 3) is “smart” decision-making (e.g., [30, 137, 171, 213]). However, in light of our focus on information flows (cf. Section 3.1), we consider this area mostly out of scope. Other particularly business-driven topics are the bullwhip effect (e.g., [32, 53, 67, 122]), logistics management (e.g., [19, 30, 115, 119, 134, 167, 178]), and the quality of business data (e.g., [9, 77, 157, 175, 193, 212]).
    Still, information sharing seemingly has become more and more relevant to supply chain experts in recent years, as indicated by the increasing numbers of relevant articles (cf. Table 1). The studied surveys cover a wide range of years that even date back to 1993 [213]. Use cases (cf. Section 2.4) related to tracking and tracing (e.g., [12, 19, 51, 70, 156, 215]) are studied especially frequently. Contrarily, we noticed that technical discussions were either lacking or underrepresented in the studied literature. While terms such as information technology, security, or interoperability are mentioned, they are not elaborated on, i.e., technical aspects are considered crucial, but they mostly remain unexplored.
    As supply chains have gained universal relevance, surveys tend to focus on specific sectors. A larger number of articles covers food supply chains (e.g., [19, 30, 34, 82, 99, 116, 152, 213]), including the branches on cold chains and agricultural supply chains. In addition, we also discover targeted areas, such as pharmaceutical supply chains [36] (a focus on certification and origin tracing), steel processing [215] (product identification and traceability), or agile manufacturing [58] (complex supply chain networks). Overall, past literature covers applications and use cases in various domains.
    Moving toward more technical aspects, we want to highlight that nearly all surveys touch upon a number of technology-related concepts and paradigms. Well-known concepts, such as the Internet of Things, cloud computing, Big Data, machine learning, or artificial intelligence, are frequently mentioned in these works. In particular, a specific emphasis is put on RFID, constituting the link between physical flows and digital supply chains. Likewise, technologies such as electronic product codes, bar codes, and QR codes are also present. When looking at the communication, we observe that (1) either no details on how the information is exchanged are given at all, (2) old and inflexible technologies are suggested or in use (e.g., fax [30, 72, 85, 163, 212], SMS [30], or email [8, 72, 85, 212]), or (3) a technology is named without giving details. Despite the different research domains of the surveyed articles, we observe a significant cross-domain coverage, i.e., although not always discussed in great detail, many surveys recognize the importance of other domains’ aspects.
    Fig. 4.
    Fig. 4. For our interdisciplinary meta-survey, we considered articles from three primary domains (as derived from their publication venues), namely, engineering, computer science, and business. We visualize their distribution across the surveyed years. Furthermore, we indicate the cumulative number of articles cited by these surveys to provide an indicator for research interest across the respective domains and years.
    Overall, the technical perspective, which would assume the task of augmenting these crucial discussions and developments with the required background, is severely underrepresented. Next, we discuss respectively arising challenges in more detail.

    3.5 Discussion on Data Sharing and Information Flows

    Now, we discuss the most prominent aspects of information flows and collaboration raised by our meta-survey. This section provides a solid overview of the current state of the art in research.
    Motivation. Collaboration and data sharing can greatly improve the supply chain performance as well as resilience [32, 45, 166, 204]. Besides, the dynamism in business relationships can be improved [12] as needed to account for customer requests and design specifications [58]. So far, only restricted data sharing is already implemented. Consequently, several challenges remain on the road toward globally collaborating supply chain networks (e.g., [112]).
    Enabler. In this regard, the quality or value of information is a crucial aspect [77, 193]. Only when effectively integrating the information sharing in SCM, the decision-making, and in turn, performance and resilience can be improved. In this context, standardization and governance are further needed to reliably enable information flows [30, 70, 76, 152].
    Information Flows. As the establishment of information flows becomes a necessity [32, 122], further research is required to improve the coordination [171], multi-hop collaboration [107], and dynamism of supply chains [9]. Especially, recent initiatives (e.g., Internet of Production [22, 132] or Physical Internet [14, 114]) with their wide range of benefits mandate the large-scale sharing of information, and, as such, also the implementation of information flows [12, 115].
    Concerns. Unfortunately, the evolution toward extensive data sharing with many information flows also spawns diverse concerns. Apart from the risks of (un-)intentionally leaking sensitive information [9, 32] or drowning in information through oversharing [204], trust and its establishment constitute another major challenge [32, 116, 199]. Hence, future work should take them seriously and address these concerns by coming up with appropriate and scalable technical solutions.
    Threats. Apart from these concerns by stakeholders, the literature also discusses a number of other threats, with (cyber) attacks being mentioned most frequently (e.g., [19, 44, 182]). Additionally, scalability and regulatory questions are notable challenges [99]. However, the primary focus is on internal threats [32], i.e., information security [170], including access control [9], is of significant relevance. To our understanding, corresponding countermeasures and concepts are rarely analyzed in light of their universal applicability.
    Building Blocks. Finally, to address these concerns and threats and to allow for a successful implementation of information sharing, secure building blocks are needed. Especially, their international application [107], general interoperability [20], and cross-domain applicability (including different industry sectors) [215] remain challenging to date. Many recent surveys identify blockchain technology as a promising solution [74, 97, 166, 199]. However, so far, many solutions remain at a prototypical level [44], and concerns about their maturity exist [116]. These challenges are understandable as an application of blockchain technology in the context of supply chains is still considered to be in its infancy [119]. As such, privacy, throughput, and scalability issues should be resolved in the future [12, 71]. In Section 4.4, we will provide a more elaborate overview of currently proposed solutions.
    Moving on, we will conclude our meta-survey before presenting our derived information flow taxonomy in Section 4.

    3.6 Main Implications for the Evolution of Supply Chains

    The future evolution of supply chains will be challenging and very interesting to observe, for example, the implications and developments following increasingly implemented coopetition [107]. Along with the increasing number of articles on the Industrial IoT, the number of published surveys on supply chains further seems to indicate an increasing activity in the field (cf. Table 1).
    However, evaluating the impact of approaches is still difficult as a bridge to real-world use and deployments is missing so far. A re-iteration of research questions over time is mostly missing. According to our meta-survey, real-world evolution is rarely studied (only [32]). Besides, due to the focus on specific use cases, we should question their universality, not only in the context of information flows but also more generally, as it is difficult for computer scientists to draw meaningful conclusions without feedback from supply chain experts. In our view, any technically driven research effort is severely hindered by the insufficient exchange of open challenges, needs, and goals. On a more general note, we attribute the observed lack of technical details to the authors’ backgrounds and their primary focus on business implications, i.e., a computer science (or at least interdisciplinary) perspective is missing for most work.
    Fig. 5.
    Fig. 5. Simultaneously fulfilling the three presented aspects for information sharing in practice is non-trivial.
    Yet, we observe an inherent tension between the often-requested general properties for information sharing in supply chains on a technical level, which is reminiscent of another well-known result from computer science. Namely, the CAP theorem [47] captures the inherent tradeoffs between consistency, availability, and partition tolerance in any distributed storage system. Likewise, we argue that Scalability, Privacy, and Reliability are unlikely to be satisfiable simultaneously with reasonable effort when sharing information along supply chains. These tensions are further expressed in our corresponding SPR triangle in Figure 5.
    Intuitively, focusing on any particular property can imply limitations on the other two. Measures to ensure reliability and privacy both add processing costs, which negatively impact the performance and ultimately the scalability when sharing information. Conversely, maximizing the scalability in the absence of major technical improvements implies compromises on either reliability, privacy, or both. Finally, achieving full data privacy and full reliability is mutually exclusive as privacy implies confidential data exchanges and full reliability involves ensuring that information flows are transparent, e.g., to facilitate the higher-level decision-making processes (cf. Section 2.5).
    Building upon this intermediate takeaway, we next set out to formalize information flows and their technical properties to allow for a better understanding of these three aspects in practice.
    Table 2.
    CharacteristicDefinition
    Structural ComplexityDetermined by the number of actors which are involved in a supply chain and their (indirect) interconnections through business relations
    Geographic LocationSupply chains range from local to global
    Duration of CollaborationBusiness relations range from short-term to long-term
    DynamismExpresses whether the set of actors is static or dynamic
    TrustOutlines the trust relationships between actors
    Table 2. Overview of essential supply chain characteristics (cf. Section 2.2.1) that determine business relationships
    They greatly influence the circumstances and technological building blocks of information flows.

    4 A Taxonomy for Supply Chains

    We now present our information flow-centric taxonomy for supply chains from an interdisciplinary perspective based on our SLR. We formalize our taxonomy in Section 4.1. Specifically, we group ten properties into three dimensions to structure and simplify its application. In Section 4.2, we present our taxonomy and its properties in light of the common supply chain use cases we detailed in Section 2.4. Subsequently, we briefly note organizational matters related to practical implementations of information flows in Section 4.3. In Section 4.4, we then discuss the suitability of proposed technical building blocks based on different supply chain characteristics and the dimensions of information flows. To aid this discussion, we summarize these supply chain characteristics here in Table 2. Based on this overview, we highlight the technological gap when realizing information flows considering given supply chain characteristics in Section 4.5. Thereby, we (1) formalize an abstract and reusable taxonomy for future use, and (2) outline relevant research aspects where successful collaborations between supply chain experts and computer scientists would be highly beneficial.

    4.1 An Information Flow Taxonomy

    Based on our conducted meta-survey, we now derive a taxonomy that focuses on established information flows for the communication and exchange of data within supply chains.
    Methodology. We build upon the aspects discussed in the different survey articles for our taxonomy. We first collected all referenced properties before merging related properties under a single definition and, finally, grouped the remaining definitions into three distinct dimensions. However, we also reference the original properties throughout our discussion to provide an overview of existing terms. As these discussions are scattered across the literature and emphasized to varying degrees, we provide exemplary pointers here and consider fully embedding these articles into our taxonomy out of scope (cf. Section 3).
    We explicitly base our proposed taxonomy on well-known terms and models from the domain of computer science to
    (1)
    ease its understanding in general and
    (2)
    improve the recognition of our taxonomy through its simplicity.
    Overview. Table 3 provides an overview of our taxonomy. At its core, we identify three relevant dimensions of reliable information flows that align well with the core concepts of their respective subdomains. First, the data dimension covers all aspects related to the flow and shape of exchanged information and is characterized by the 3 Vs of Big Data [153]. Second, the security dimension captures relevant criteria of data and information security and can be expressed via the well-known CIA triad [200]. Third, in the utility dimension, we group properties loosely related to the quality of the information flows [139]. These properties are motivated by attributes that describe the data quality in other areas, i.e., we adopt this view for information flows in supply chains. In the following, we present each dimension in more detail.
    Table 3.
     PropertyDefinition
    DataVolumeThe amount of data that is shared
    VelocityThe frequency with which data is shared
    VarietyThe types of data that are shared
    SecurityConfidentialityMeasures against unauthorized access (privacy)
    IntegrityMeasures against unauthorized manipulation
    AvailabilityMeasures to ensure accessibility and flow of data
    UtilityAccountability & VerifiabilityInformation is clearly attributable, and received information can be (independently) corroborated
    AuthenticityInformation is considered legitimate and genuine
    Durability & TimelinessInformation is still valid (accurate + usable), and received information is on time for further use
    Liability & SafetyInformation use is conformable to public law and steers clear of unwanted dangerous (side) effects
    Table 3. The dimensions data, security, and utility must be considered when talking about reliable information
    Data Dimension. The first dimension, the data dimension, provides an abstract view of the shape of exchanged data to allow for properly expressing corresponding challenges of the information flow in question. Instead of focusing on the monetary value or information communicated via the data, we here rely on the 3 Vs of Big Data [153], i.e., volume, velocity, and variety, and emphasize the associated processing needs.
    Traditionally, related work captures Big Data only for the local processing of information. However, with increased interconnection and information sharing, this dimension is also crucial for established information flows between supply chain actors. In our survey, we further came across a variety of (corresponding) terms, ranging from “growth” [8] over “capacity” and “breadth” [19] to “scalability” [9, 12, 99] when referring to volume (e.g., used by [9, 137]). Contrarily, velocity was discussed less prominently: Apart from the synonym “frequency” [206], we only attribute frequency-related aspects of scalability to this property. As an alternative for variety (e.g., used by [9]), we found the use of “heterogeneity” [175].
    Security Dimension. Especially with several stakeholders and the flow of sensitive information, security is a crucial challenge. Thus, based on the well-known CIA triad [200], we also define a security dimension for information flows.
    Literature from supply chain experts frequently refers to related concepts only collectively as “security” [12, 99, 115, 175, 206, 210]. Apart from a subset of the three terms known from the CIA triad [77, 170, 182, 193], authors frequently also refer to “(data) privacy” [12, 51, 99, 175, 186, 206, 210] or “data access” [170], which are related to data confidentiality. Then again, “access control” [170] and “authentication” [20, 170] occasionally capture the combination of confidentiality and integrity. Concerning availability (e.g., used by [77, 193])—a rarely explicitly covered topic—we also noticed discussions about “single points of failures” [119], the role of “reliability” [166], or advocating for “decentralization” [199].
    However, when developing technical building blocks to secure information flows, a more fine-granular view of security is needed not only in light of privacy concerns but also from a safety perspective. Thus, we capture this “general” aspect using the properties of confidentiality, integrity, and availability. Here, availability should be considered more broadly when compared to the traditional CIA triad. Additionally, the need for delayed information flows and resulting long-term data availability requirements should be considered. Naturally, other best practices for data security, such as data minimalism, are relevant as well when describing and implementing information flows. However, these soft criteria are not directly applicable when categorizing information flows.
    Utility Dimension. Data quality and utility are often key concerns of information management, and they directly translate to information flows, e.g., to capture details on the origin of data. Consequently, we augment the data and security dimensions with a utility dimension. Here, we intend to abstract from content, i.e., the value for the supply chain process itself and focus on “hard” properties of the information flow instead. The surveyed articles discuss the related properties heterogeneously, and hence we group them more broadly but in line with previously proposed attributes [139] as follows.
    Accountability & Verifiability. This property covers all aspects related to the lifecycle and path of the information flow and its associated data. Overall, any data should be clearly attributable to a party to ensure accountability. Hence, this property also covers the traceability of data across information flows. In terms of auditing, verifying the legitimacy and correctness of data is important, e.g., to discover faulty data. Thus, information flows might have to account for these needs as well. Depending on the use case, ensuring that this property is fulfilled in the long term can be highly beneficial, e.g., when dealing with product faults after decades of usage.
    Apart from “accountability” [12, 112] and “verifiability” [12], related work also occasionally discusses the aspects of “non-repudiation” [170], “identification and certification” [19], and “trust” (based on accountability) [116] in this regard.
    Authenticity. When further considering the origin of information, authenticity is another important property. Companies desire that information is legitimate and genuine. In settings where the origin cannot be properly identified, data tampering cannot be reliably excluded. Consequently, information flows should ensure that authenticity can be verified. We chose the umbrella term based on how the majority of authors refer to this property (e.g., found in [20, 112]). Further, lack of information “transparency” [8], “credibility” [72], or “provenance” [51] are used rarely.
    Durability & Timeliness. Especially for information flows that rapidly deliver updates, exchanged data might only be valid for a short period, i.e., data becomes obsolete, inaccurate, or unusable over time. Hence, the information flow must allow for frequent updates in such a setting. Furthermore, depending on the use case, low-latency information flows might be required to ensure usability. Thus, we can also characterize information flows according to their latency and timeliness. Consequently, we capture these aspects in a property.
    Most frequently, surveys talk about “timeliness” [12, 72, 137, 193] or “timely information” [8, 19] as well. As the most prominent alternative, we discovered the expression “real time” [9, 45, 137]. Finally, we encountered “delivery” (to express speed and dependability) [212].
    Liability & Safety. The last property for the utility dimension mainly has relevance for legal ramifications that potentially have an implication on the technical solution as well. First, implemented information flows should be conformable to public law. Otherwise, involved companies should be liable for their actions (cf. accountability). Second, when operating and utilizing information flows, they should be safe for the operators, humans, and the environment. For example, an interruption of the information flow should not result in a disaster. Thus, safety also contributes to this property.
    This property is rarely featured in related work. Primarily in the context of food supply chains, “safety” (or labeled as “accuracy” [8]) is considered [19, 44]. Furthermore, surveys talk about missing policies, regulations, and legislation [99, 115], which we include under this umbrella as well.
    Implications of our Taxonomy. To conclude, only when combining these three dimensions, we can uniquely characterize and describe information flows within supply chains. These flows create the foundation to exchange valuable data between stakeholders, where the aspect of information and data quality is key (e.g., [9, 77, 137, 157, 175, 193, 212]). Hence, building upon this base, the aspects of value and veracity become very important for practitioners. However, only when having access to reliable information (flows), the added value from a business perspective can be created and reliably implemented, e.g., through improved decision-making. Thus, our taxonomy with its properties is key when talking about reliable information and evolved, digital SCM.

    4.2 Application of the Taxonomy to Common Use Cases in Supply Chains

    After establishing our taxonomy on information flows, we now look at exemplary applications for the previously outlined use cases (cf. Section 2.4). Even though all dimensions should be considered when implementing a use case, their importance varies depending on the specific use case (and the individual preferences of the involved stakeholders). Accordingly, in the following, we highlight which use cases are particularly affected by the different properties of our taxonomy.
    Data Dimension. The data dimension and its properties are of particular importance when various actors and information sources are involved. On the one hand, the management of critical infrastructure (UC7) deals with a wide variety of different data from various sources from around the world. Hence, the properties variety and volume must be given special consideration. On the other hand, real-time monitoring (UC3) is characterized by a high amount of generated data that must be shared between various actors. Moreover, for real-time monitoring, information must be shared quickly and frequently. Thus, this use case commonly has high demands on the velocity and volume of information flows. When sharing detailed product or production information with customers (UC8), special attention needs to be given to the data’s variety since vastly different types of information may be shared to accommodate the needs of every supply chain actor.
    Security Dimension. Even though security is crucial in every use case where information is shared between different actors, some properties are especially important for certain use cases.
    Collaborative planning (UC1) and supply chain design (UC2) deal with information that is critical (and sensitive) for the business of multiple stakeholders. Similarly, when sharing product information (UC8), sensitive data on product details and production setups is processed as part of the information flow. All of these use cases handle highly sensitive information, such that its confidentiality must be ensured. Further, the integrity property is especially relevant when validating entire products or certain characteristics (UC6) as unauthorized manipulations must be prevented. For information flows related to the design and structure of supply chains (i.e., its business relationships and the production composition), the availability of information is a primary concern. Especially the sourcing (UC5) and handling (UC4) of faults both require continuous information flows. Thus, for these use cases, the availability property is particularly important.
    Utility Dimension. As described before (cf. Section 4.1), the utility dimension refers to “hard” properties of an information flow. Here, special attention needs to be paid to accountability & verifiability of information when relying on accurate product tracing data (UC4UC6). In addition to the relevance of integrity when validating tracing information (UC6), the authenticity of said information flows is equally important. For collaborative planning (UC1), decisions need to be based on current developments, emphasizing the particular importance of the durability & timeliness property. Likewise, in the context of critical infrastructures (UC7), information needs to remain actionable. Finally, the liability & safety of information flows is also highly relevant for the validation of product tracing data (UC6) as this use case is largely influenced by regulations and contracts.
    While all properties from our taxonomy are important for information flows in supply chains, mapping these use cases to our taxonomy highlights the vastly different demands of different use cases. In practice, real-world realizations of information flows are further challenged by stakeholder-specific preferences. Consequently, when integrating information flows into inter-organizational processes, a variety of valid approaches is expected based on the needs of specific supply chains (and their actors). Ideally, proposed and field-tested solutions can be expanded and integrated over time to realize more general and flexible solutions for reliable information flows that satisfactorily realize all properties outlined in our taxonomy, even for the most stringent requirements.

    4.3 Integrating Information Flows into Inter-Organizational Processes

    Several operational aspects become important when integrating information flows into inter-organizational processes. However, they are not primarily relevant for the flows themselves, but rather for the overarching organization and management of the supply chain (network).
    Operational Dimension. Several properties affect the (local) success, acceptance, and market penetration of recently integrated information flows in practice. They mainly relate to obstacles in effectively sourcing, utilizing, and sharing data.
    Apart from interoperability challenges of prevalent information systems [20, 99, 152] and their technical realization, the operational dimension is also affected and inhibited by power relations between different supply chain stakeholders [32, 150]. To circumvent such relations, stakeholders have to be integrated into a joint governance and compliance concept, and thus, they must implement the information flows and information sharing with clearly defined roles, rights, and obligations [49, 51, 76, 138]. Importantly, newly implemented information flows need to establish added values for each involved actor. One common approach to motivate actors to participate, and to realize an added value, is the use of incentive mechanisms [52, 206].
    The added value not only follows from the value of shared information but also depends on the costs that occur by establishing the information flows [36, 112, 117, 122, 206]. In addition to initial setup costs, additional costs for the communication infrastructure and the processing of shared information must be considered. Thus, the cost property significantly influences the operational dimensions, and in turn, the establishment of information flows and the exchange of data.
    Takeaway. Thus, when integrating advanced information flows into (potentially already established) supply chain networks, considering both technical and operational aspects is important. Through our information flow taxonomy and the overview of operational aspects, we provide a foundation and a guideline for assessing and modeling existing supply chains and describing relevant use cases for information flows along with their characteristics. Based on these specifications, suitable building blocks for communication can be identified and finally combined for realizing and implementing thorough, yet tailored technical solutions to realize reliable information flows. With our subsequent discussion on literature-proposed technical building blocks, we now outline their suitability for specific supply chain characteristics and information flow requirements along with relevant implications of their usage.
    Fig. 6.
    Fig. 6. The data lifecycle encompasses acquisition, protection against unintended access or manipulation, secure long-term storage, and processing to gain insights. For each stage, we identify major technical building blocks that promise to improve the reliability of information flows. However, they have not yet been rigorously implemented in the context of supply chain-specific information flows.

    4.4 Proposed (Technical) Solutions in Practice

    Our SLR in Section 3 highlights that a multitude of technological building blocks has been suggested to establish information flows in supply chains. However, we also identified a notable distance in how the surveyed articles’ authors assess them. In this section, we thus revisit the data lifecycle from acquisition to processing and, for each step, identify and discuss underlying core problems and the applicability of specific technical building blocks. We base our assessment on the essential supply chain characteristics (Table 2) and the identified dimensions of information flows (Table 3). In Figure 6, we provide an overview of the main available building blocks that are suitable for addressing the core problems of information flows in supply chain networks. Our observations further serve as a basis for identifying current gaps in addressing these core problems later on.
    Data Acquisition. As an initial step, supply chains require solutions linking physical flows to their digital counterparts. In this regard, QR codes and RFID tags [20, 30, 34, 70, 137, 193] offer reliable identification, i.e., such technologies enable automatic tracking and tracing of objects and thus reduce data acquisition errors. Moreover, they inherently provide basic means of accountability and verifiability. Particularly food supply chains benefit from nearly real-time inventory data and product quality information [20, 34]. However, obtaining such associated data requires active scanning of QR codes and RFID tags at discrete points in time and thus might contradict the desired timeliness of information flows [70].
    In turn, the Internet of Things (IoT) extends the idea of linking the physical to the digital world by introducing sensors that actively report measurements using wireless links and thus fully automate said process. For supply chains, IoT-based solutions may cover high volumes, velocities, and varieties of data and offer means to provide confidentiality, integrity, and availability. Nevertheless, the adoption of IoT technology is generally slow due to high initial costs and high perceived complexity [45, 58, 67, 115, 119, 166, 175]. Moreover, battery-powered IoT devices might struggle to satisfy desirable security needs in practice.
    Data Protection. After the acquisition, the data has to be prepared for storage and further utilization. With additional (shorter-lived) collaborations, i.e., a high level of dynamism, come elevated risks of accidental and direct or indirect data and knowledge leaks [210], for example, untrusted parties gaining illegitimate access, or (previous) access rights are not fully revoked (on time). These associated risks of losing control over one’s data or the need to deliberately give up this control primarily hinder large-scale information exchanges [12, 70, 170]. Available cryptographic building blocks, such as encryption (including identity- or attribute-based encryption [12]) or access control, promise to mitigate unintentional data leaks. However, collaboration may require collaborators to share their knowledge to create further insights. In cases where the collaborators do not fully trust each other, i.e., perceived risks primarily originate within the supply chain [32], SMC can be applied to help collaborators compute the result of a function based on confidential inputs without having to reveal these inputs [210]. Unfortunately, the performance of SMC-based protocols decreases quickly with increasing complexity or inputs [69], i.e., the application of SMC in its current state for large supply-chain settings currently requires intensive analyses of feasibility, costs, and benefits.
    Data Storage. Data exchanges require that the data is available to all intended receivers. In recent years, we have observed an increased interest in the application of blockchain technology and smart contracts to facilitate the coordination between collaborators in (especially complex and globally distributed) supply chains [12]. Blockchain-based solutions are especially promising in settings where trust between collaborators has not been fully established yet, e.g., in settings where supply chains are highly dynamic. Blockchain systems can be either permissionless or permissioned, i.e., publicly available to anyone or accessible by a mutually known set of collaborators. Even though permissionless blockchains allow for much more flexibility in dynamic settings, while providing public verifiability of what data has been recorded in the past, these systems have to resort to resource-intensive consensus protocols to cope with the higher risk of interference by untrusted participants. Contrarily, permissioned blockchains allow for more fine-grained and more efficient control over the exchanged information, e.g., mutually known collaborators can establish data authenticity more easily. However, this approach does not allow for the same dynamism as permissionless blockchains do. In conclusion, the means to operate in a decentralized manner with (only) partly trusted collaborators highly depend on the parameters of the underlying supply chain and the required flexibility regarding potential collaborators.
    So far, blockchains are predominantly deployed to improve traceability in food supply chains [97]. However, other sectors (e.g., textile industry) have started to explore their potential [119]. Especially food safety is an often-cited driver for the use of blockchain-based information exchange [97, 119]. As the deployment of blockchains to support supply chains increases, the volume, velocity, and variety of blockchain-recorded data are bound to increase. However, unresolved scalability concerns of blockchain frameworks, as well as a lacking standardization in this field [116], impose further challenges for the widespread adoption of blockchain-backed supply chains, especially if the supply chains experience high levels of dynamism. This lack has also been identified for general supply-chain solutions [20].
    Smart contracts can serve as an interface to codify and thus automate contractual rules, e.g., conditional payments, and thereby alleviate the complexity of blockchain-backed collaborations. However, growing validity and security concerns challenge their use [116], and they publish codified agreements to all partners. If data confidentiality among the collaborators is a priority, the discussed building blocks for data protection are needed to ensure the privacy of information flows as well.
    Data Processing. Finally, the data will be processed to gain further utilizable insights. With structurally complex supply chain networks and high data volumes, special requirements for technical solutions arise that should handle complex and extensive data. With increasing volume, velocity, or variety (cf. Table 3), big data-based solutions are discussed frequently [32, 99, 171, 175, 213]. However, given the widespread confidentiality and availability concerns, a distributed processing of data might be more suitable.
    To realize data processing, related work repeatedly mentions two basic concepts. Cloud computing has been identified as a promising building block when dealing with a complex data dimension [213] due to its flexibility [30] and scalability [9], but also for the ease of extending the set of stakeholders. However, as a (logically) centralized concept, cloud computing introduces a single point of failure, where cyber-attacks or other outages can have an enormous negative impact on the security and utility dimensions [83]. As an alternative, edge computing [44] follows the principle of decentralized data processing with a centralized purpose while still focusing on added value for all involved stakeholders, i.e., the processing is closer to the origin or the recipients of specific information, which increases capabilities regarding data volumes while further dealing with confidentiality concerns. However, new technology, e.g., edge-based setups, might increase coordination overheads and might even deter companies from participating [70, 170]. Regardless of the approach, standardized formats [30], approaches [82], and interfaces are needed to realize inter-organizational collaborations [115]. Still, more work in this direction is needed [51].
    In conclusion, computer scientists have developed a multitude of technical building blocks that seem suitable to also improve the reliability and confidentiality of data exchanges in supply chains at every stage. However, the complexity of modern supply chains and their highly individual requirements necessitate further tailoring of these building blocks in this challenging scenario. In the following, we thus take a closer look at this technological gap.

    4.5 Technological Gap

    The technical solutions that we compiled with our meta-survey (cf. Section 3) address various aspects and challenges for information flows within supply chains. Despite their individual strengths and potentials, open challenges remain for various combinations of supply chain characteristics and information flow properties. To the best of our understanding, these challenges primarily arise from technological gaps, which in turn follow from both missing technical building blocks as well as a lack of shared inter-domain knowledge.
    Supply Chain Complexity. An important finding is that today’s solutions were initially and mainly proposed for use in small, static supply chains. Thus, they fail to satisfy the requirements of modern, complex, and rapidly evolving supply chain networks [20]. Especially, the security and utility dimensions must be carefully revisited in light of multi-hop collaborations, i.e., a transformation from local collaboration clusters to global networks [107] is not only needed from a business perspective, but also from a technological one.
    Reliability-by-Design. As in other settings, security and privacy are unfortunately still mostly regarded as an unwanted necessity, i.e., when selecting technologies for deployment and means of communication, the concepts of security-, safety-, and privacy-by-design are rarely considered. Further, concepts that target the authenticity of submitted data [128] still lack practical implementations. Finally, technical solutions for reliable retraction of shared information, e.g., at the end of an extensive collaboration phase, are missing. Thus, proposed and developed building blocks as well as thorough approaches frequently neglect these aspects in their entirety as well. Consequently, today’s solutions frequently fail to consider all relevant information flow properties, potentially raising the bar for their practical deployment. However, without a doubt, depending on the use case, their importance varies.
    Inter-Domain Collaboration. Altogether, we notice that computer scientists cannot tackle all raised aspects on their own (cf. organizational dimension). Still, upcoming research efforts should pursue advances in supply chains more holistically, primarily by considering both the supply chain characteristics and the different properties of our taxonomy when developing, evolving, and proposing (new) building blocks, methods, and models for use in supply chains. Moving toward a more abstract view of general challenges at the intersection of supply chain and computer science research, we next discuss the most crucial direction in Section 5.

    5 Future Research Directions

    Based on the insights generated from our literature meta-survey (Section 3) and our own research experience in the area, we now discuss and motivate relevant future research directions toward more secure and reliable information flows along supply chains. With this background in mind, our discussion focuses on necessary steps to close the inter-domain gap between industry and scientific perspectives, especially computer science, to promote comprehensive and sustainable solutions.
    Already in 2010, Sarac et al. [156] criticized the separation of supply chain literature into industry-specific and academic works. Due to the lack of details on corresponding technical solutions in the surveyed articles, we specifically complement our findings with directions identified by additional related work to achieve a thorough and well-founded collection of research directions. Even though several of these aspects are already well-addressed within the computer science research community on a conceptual or isolated level, use-case-specific requirements and challenges result in novel, still open research areas when adopting existing technologies and concepts. Thus, we identify a prevalent inter-domain gap impeding the adaption of existing (sophisticated) IT-based solutions. Hence, this section covers both (1) novel computer science research directions and (2) well-known research areas with a need for inter-domain adaptation and refinements. Indisputably, past efforts also proposed valuable approaches at the intersection of computer science and supply chain research. However, to the best of our knowledge, these efforts primarily focus on higher layers (cf. Figure 3(a)), disregarding the (technical) foundations of information flows—primarily concerning the layer sensing and processing. That is, they build on (and also require) reliable information flows to truly realize their presented contributions without outlining how to implement them in practice.
    In Table 4, we provide a high-level overview of the different research directions and the required inter-domain collaborations along with the respective required expertise (involvement) and preliminary work of both domains. We stylistically distinguish the different properties and rate each property on a scale from one (little) to three (significant) to give an overview of our impression w.r.t. specific research directions: While we expect the need for significant contributions by computer scientists in some directions (e.g., improving data reliability), other directions (e.g., the development of supply chain models) have a stronger focus on the supply chain background. Overall, our table underlines the significant need for interdisciplinary collaborations, where the required (research) input depends on the concrete direction. These insights motivate our following discussion.
    Table 4.
    Table 4. Despite existing and ongoing, yet primarily isolated, preliminary work in both domains, we identify the significant need for inter-domain collaborations to truly advance the research intersection of reliable information flows in supply chains
    Refining Information Flows. The deficiencies regarding inter-domain concepts for information flows identified by our meta-survey call for an interdisciplinary treatment of these concepts, covering deployment and management aspects of supply chains. First, these deficiencies must be addressed by formalizing the concepts of information flows to allow the seamless cooperation of interdisciplinary teams on their application to realistic problems. Then, the technical challenges of integrating these developed concepts into deployable systems must be addressed. Thus, future research on supply chain information flow should address the following two questions.
    \(\blacktriangleright\) How can the different perspectives and requirements of information flows be formalized in an interdisciplinary fashion? While research on information flow concepts is not novel per se, the required novelty stems from exchanging domain-specific knowledge and requirements with a common inter-domain taxonomy (cf. Section 4) to initially derive, extend, and ultimately formalize feasible information flow concepts. Here, a more methodical and formal treatment of the present requirements and restrictions from the supply chain domain by all stakeholders paves the way for computer scientists to propose thorough, feasible, and viable solutions for sophisticated information flows and business processes within and along supply chains.
    \(\blacktriangleright\) How can these refined information flows be realized in practice? Today’s technologies can result in improved decision-making when being combined with emerging technologies, new algorithms, and specific use cases [30, 99, 213]. Currently, such opportunities are, however, often under-utilized, as their full potential can only be unleashed through inter-domain collaboration. While a formal treatment of information flow concepts can identify where novel information flows can bring disruptive changes, deploying these advances poses at least as big of a challenge. Not only systems realizing these flows handle enterprise-sized processes, but they must also be deployable seamlessly and most likely incrementally into functioning supply chains with many stakeholders having different deployment processes and requirements, e.g., regarding privacy [194].
    Implications of Governance. Despite the potential (theoretic) benefits of evolved supply chains, considerations regarding governance and standardization in practice constitute a highly relevant topic. While computer science-driven solutions often are decentralized and designed without a controlling third party, companies frequently demand central monitoring capabilities (partly due to regulatory purposes). For example, compliance verification is mandatory (during tracing and tracking) and might assist at the time of recalls [180]. Hence, future work should look into governance frameworks that allow for a certain degree of autonomy, regulation, and legal penalties yet combined with information confidentiality (cf. security dimension, Section 4.1). In particular, sophisticated or even optimal solutions from a computer science perspective require changes that respect governance and legal requirements. Consequently, technical measures that provide regulators with reliable access to the required information while prohibiting them from analyzing the content should be developed while also considering the following questions.
    \(\blacktriangleright\) How can supply chain actors motivate their partners to increase the visibility of their information flows for regulatory purposes? To date, privacy concerns challenge the establishment of additional information flows. Thus, future research should address these aspects to ultimately push for real-world use, e.g., using incentive mechanisms that reward actors who share crucial information [104].
    \(\blacktriangleright\) What is the optimal tradeoff between human and technological resources for successfully implementing reliable information? Conceptually, technology can only support governance. However, governance cannot be automated entirely [41, 126]. Consequently, techniques and strategies are required to effectively analyze the human in the loop to govern, provide regulation, and make decisions wherever necessary.
    Mitigating Opportunistic Behavior. At times, supply chain actors only invest in traceability systems to mitigate their internal risks and do not consider implications on external partners [176], seeking a local financial optimization with potential global long-term shortcomings [168]. Thus, more emphasis should be put on models that represent such changes holistically, i.e., minimizing the (global) implications of opportunistic behavior. Existing research has identified game theory as a promising technique to analyze and influence the opportunistic behavior of individual stakeholders [207]. That said, future research should further try to derive universal incentive models that balance internal and external benefits.
    Transparency vs. Confidentiality. Distantly related to opportunistic behavior, information transparency and confidentiality directly oppose each other and significantly influence how businesses benefit from sophisticated information flows and corresponding business relationships [147] (cf. the mentioned concerns in Section 3.5). In practice, corresponding information flows and pressing concerns may still differ across supply chains due to different views of confidentiality as well as cultural and legal aspects [124]. Thus, these views may also affect the level of openness [90] and transparency, such that further research needs to consider them when developing inter-domain solutions that are guided by the following questions.
    \(\blacktriangleright\) Which risks are associated with sharing information? Proper risk assessments on sharing information with collaborators are needed to establish information flows in practice. Existing literature either focuses on the confidentiality or the availability of the data and very few (e.g., [104, 106]) discuss both aspects while maintaining the utility of the data. In line with this question, researchers should investigate what information must be exchanged at the bare minimum to implement (novel) use cases. Data minimalism is well-known in this context [54] and is frequently applied.
    \(\blacktriangleright\) Which information must be shared to realize minimalistic, and thus efficient and privacy-preserving, dataflows for specific supply chains? Future research should explore the potential benefits of creating data-sharing standards for supply chain collaborators that focus on accurately and adequately sharing only relevant information. Besides the performance benefits, avoiding oversharing data also mitigates the severity of privacy issues. Technical solutions to address these issues while maintaining the gained efficiency are needed as well.
    Improving Data Reliability. To strengthen businesses’ advantages of—and hence their incentives for—providing sophisticated transparency, the respectively shared supply chain data, irrespective of its content, must be authentic and trustworthy to allow for reliable decision-making in practice. Suppose the available data is of low quality, faulty, or tampered with in any way. In that case, improper or costly business decisions likely arise, potentially raising justified concerns against data sharing. Hence, future research must address the following questions to overcome the risks resulting from unreliable data sharing and utilization (along supply chains).
    \(\blacktriangleright\) How can we ensure the reliability of supply chain data? When looking at the complete data lifecycle, measures and concepts are needed to handle the data with care at all times, which might eventually improve reliability, trust, and data quality as well. Initially, the data acquisition and sensing must be secured, e.g., through trusted sensing [128], especially when handling goods in untrusted environments. Trusted platform modules (TPMs) and trusted execution environments (TEEs) can help to aid secure data exchanges and processing [11, 75]. So far, corresponding approaches are still in their infancy. Data reliability can also be improved by adopting strong cryptographic measures, such as data consistency through hash functions in blockchains [105, 205]. Similarly, trust models [39, 105] known from information sharing can also be adopted for reliable communication [50].
    \(\blacktriangleright\) How can we reliably map product and information flows? In light of data reliability needs, we look forward to further evolution of initial approaches for tamperproof markings of shipments and products (e.g., molecular fingerprinting, smart fingerprints, laser markings, and others) [140, 173, 191, 211, 215]. Such smart fingerprints (e.g., [88]), for example, cannot be counterfeited and thus can be very useful in conjunction with trust models, trust architectures, and modern digital technology, for validation purposes and for identifying faults (cf. Section 2.4). Third-party certificates attesting the product quality can also improve reliability [6]. They can also be digitized for (automated) usage in information flows. The first examples cover pharmaceuticals, diamonds, organic produce, and wherever ethical and sustainable practices [146] in product manufacturing demand verification.
    New Technologies for SCM. The operation of existing and future technical solutions for reliable information flows within supply chains needs to be coordinated to allow for smooth operation and for gradual adoption. Consequently, corresponding influences need to be well-researched.
    Adoption Potential. Newly proposed approaches have to be efficiently and effectively deployable in real-world supply chains to introduce benefits. First, organizations must establish their processes for long-term operations to attenuate spent investment costs over time. Second, introducing new technologies (cf. Section 4.4) constitutes further investments and bears the risk of disrupting any of the carefully established and validated supply chain processes. Hence, organizations tend to be reluctant to explore the potential benefits of emerging new technologies in practice.
    \(\blacktriangleright\) What are the organizational barriers when adopting new technologies, both cost-wise and beyond costs? How can we overcome them? Detailed analyses of the associated direct and indirect costs must be conducted when adopting new technologies that enable new use cases, for example, through information flows [29, 70, 122, 206]. Thus, they should also cover the aspects of decision-making and training of the workforce when deploying a new technology [9]. In addition, organizations need to factor in the potential revenue as well as long-term benefits following the adoption of new technologies. These cross-domain challenges can only be tackled with appropriate technical expertise (cf. our taxonomy).
    \(\blacktriangleright\) To what extent can digital product verification be improved using new technologies? Involved organizations and businesses also need to factor in advances in data reliability following the adoption of new technologies, i.e., they need to confirm that they can still satisfy the required certification and data integrity. Thus, we call for additional research to compare the effectiveness of newly proposed technologies. Today’s mix of varying maturity, at different operational levels, and various scales of adoption over the years, require a more standardized assessment of their potential, primarily focusing on the presented dimensions of data, security, and utility [147].
    Standardization: The Road toward SCM-as-a-Service. This contemplated integration of new technologies requires establishing processes that facilitate both the technologies’ adoption and the onboarding of affected businesses. Corresponding reliability improvements of information flows, and more generally, computer science-induced advances in the information lifecycle, promise the potential to develop SCM-as-a-Service-like approaches that are based on digital, reliable, and accountable SCM. Thus, traditional supply chain actors could be encouraged to outsource parts of their current SCM, e.g., data analytics, storage, blockchain nodes, or ML/AI-based decision-making when provided with a sophisticated yet comprehensible standardized information exchange and processing infrastructure. When researching this direction, future work can greatly benefit from foundational work that promotes and fosters interoperability in supply chain networks, in parts through interdisciplinary efforts. In addition, where applicable, cross-domain standards [215] can also be adopted more widely to make information flows generally more interoperable [64]. However, to ensure that these advances succeed in practice, research must holistically solve the distinct technical challenges of all layers (cf. Figure 3(a)), including the often neglected lowest layer on sensing and processing of information flows.
    Findability of Data and Information. When implementing (such) new data-driven processes to improve decision-making (cf. Figure 3(c)), all required input data must be accessible. Due to the increasingly decentralized sourcing of information, companies must ensure that they can find, access, and retrieve all relevant data. Appropriate technical solutions must be deployed in the field, especially in settings where information needs to be shared over multiple hops. So far, research still prioritizes the local view at times [80], and thus, corresponding solutions are not widely applicable.
    Sophisticated Evaluations. Given the emergence of concepts and technical solutions for realizing reliable information flows, evaluating their costs, applicability, performance, data reliability, and security features constitute another crucial inter-domain research direction.
    Universal Supply Chain Models. As a first important measure, having access to standardized supply chain models would be highly beneficial for both the development of novel solutions as well as their evaluation, especially when comparing different approaches. However, so far, no such model exists, hindering real-world feasibility studies as well as a standardized way to compare new approaches to existing work. Such information is essential to fully tap into the envisioned benefits (and to deploy research concepts and prototypes into productive use). Since such evaluation models could ease the adoption decisions for companies [156], respective research efforts and proposals are highly encouraged.
    Availability of Real-World Testbeds. Moreover, standardized supply chain environments that allow researchers to evaluate novel approaches for varying supply chain models are missing. Although existing work already addresses physical testbeds in the context of supply chains and logistics [63], more sophisticated and information flow-focused approaches are yet to be developed. Overall, this shortcoming concerns both reliable sensing, i.e., to evaluate reliable information processing, and testbeds to study the effects of revisited decision-making (e.g., a setup to source realistic information from). Integrating new technologies (including different sensing devices, blockchain technology, or storage solutions) and processes, which do not exist across existing supply chain networks, thus poses a significant barrier, especially in less technology-experienced industry sectors and supply chains.
    Longitudinal Studies. While simulations are still the predominant means to evaluate information flows in supply chains [67], empirical research and real-world evaluations are lacking [44]. Most new approaches do not investigate the deployment in the field and over time thoroughly or at all. Therefore, we require more work (and corresponding academic incentives to do so) that also studies the impact of novel solutions in the wild (being positive or negative) [166]. Such a shift would allow researchers and practitioners to better judge approaches regarding their real-world potentials, consequences, and adoption chances. Currently, a barrier between academia and industry seems to exist where industry acts far more pragmatically than ‘sophisticated’ academic research. Thus, as a third measure toward sophisticated evaluations, we identify improved and deepened collaborations, acceptance, and attribution between those two worlds as highly desirable.
    As outlined in this section and summarized in Table 4, the need for future research, particularly inter-domain research efforts, is significant. With our interdisciplinary contributions, i.e., a newly proposed taxonomy and the list of supply chain characteristics, we hope to support upcoming collaborations by providing them with standardized terms and properties. Apart from easing the bootstrapping of collaborations, we further expect that our holistic view of the research area will reduce the risk that researchers accidentally overlook or purposely ignore specific dimensions when researching communication infrastructures and information flows in supply chains.

    6 Conclusion and Outlook

    Increasingly complex supply chain networks imply the need to exchange information reliably. Recent disruptions, such as COVID-19, the Suez canal obstruction, or the Russian invasion of Ukraine, further underline this situation. Only with extensive communication and reliable information can companies make well-informed decisions to deal with disruptions and strengthen their resilience. Surprisingly, as a result of our meta-survey, research in computer science has widely overlooked this aspect. Using analogies from the domain of computer science, we intend to familiarize computer scientists with research in supply chains to eventually foster collaborations with supply chain experts and contribute toward more secure and reliable information flow implementations. Although this article offers only an initial building block for this ambitious goal, it provides a unique perspective on tackling the imminent challenges of supply chains with the help of computer science.
    In particular, given the various use cases in supply chain management and their individual requirements, a single technical solution (as frequently advocated) is not a realistic option. Instead, practitioners must compile a precise overview of the needed information for a particular use case and the requirements concerning the corresponding information flow as well as its underlying communication infrastructure. However, to date, a common information flow terminology is missing, which leads to a situation where research challenges are not properly communicated to computer scientists or already existing building blocks are not applied (correctly or at all) in practice. To mitigate this cumbersome situation, we derived an abstract taxonomy, based on an extensive survey, that captures information flows within supply chains using the dimensions of data, security, and utility. Thus, we create a foundation to establish a common understanding of information flows by appropriately referring to research challenges, needs, and strategies.
    For future work, we call for a two-fold research agenda. First, appropriate technical building blocks from computer science are required to fully address the challenging needs in supply chains. Second, more general research guidelines (including standardized evaluation models) should be established to improve the comparability of proposed approaches. Thereby, their readiness and potential can be judged more accurately. To conclude, computer scientists can be a powerful driver in advancing information exchange and decision-making in supply chains, with improvements for participating companies and society in general.

    References

    [1]
    Giuseppe Aceto, Valerio Persico, and Antonio Pescapé. 2019. A survey on information and communication technologies for industry 4.0: State-of-the-art, taxonomies, perspectives, and challenges. IEEE Communications Surveys & Tutorials 21, 4 (2019), 3467–3501.
    [2]
    Michael Adams, Andreas V. Hense, and Arthur H. M. ter Hofstede. 2020. YAWL: An open source business process management system from science for science. SoftwareX 12 (2020), 100576. https://www.sciencedirect.com/science/article/pii/S2352711020302892?pes=vor
    [3]
    Michael Adams, Suriadi Suriadi, Akhil Kumar, and Arthur H. M. ter Hofstede. 2020. Flexible integration of blockchain with business process automation: A federated architecture. In Proceedings of the 32nd International Conference on Advanced Information Systems Engineering. Springer, 1–13.
    [4]
    Prakash Agrawal, Rakesh Narain, and Inayat Ullah. 2020. Analysis of barriers in implementation of digital transformation of supply chain using interpretive structural modelling approach. Journal of Modelling in Management 15, 1 (2020), 297–317.
    [5]
    Benjamin Agyei-Owusu, John Serbe Marfo, Emmanuel Kweku Quansah, and Caleb Amankwaa Kumi. 2021. The use of interorganizational information systems in digitalizing supply chains: A systematic literature review and research agenda for Africa. In Proceedings of the 27th Annual Americas Conference on Information Systems.
    [6]
    Friederike Albersmeier, Holger Schulze, Gabriele Jahn, and Achim Spiller. 2009. The reliability of third-party certification in the food chain: From checklists to risk-oriented auditing. Food Control 20, 10 (2009), 927–935.
    [7]
    Mohammad M. Ali and John E. Boylan. 2014. On the value of sharing demand information in supply chains. In Proceedings of the 56th Annual Conference of the Operational Research Society. The OR Society, 44–56.
    [8]
    Kaur Arshinder, Arun Kanda, and S. G. Deshmukh. 2011. A Review on Supply Chain Coordination: Coordination Mechanisms, Managing Uncertainty and Research Directions. Springer, 39–82.
    [9]
    Deepak Arunachalam, Niraj Kumar, and John Paul Kawalek. 2018. Understanding big data analytics capabilities in supply chain management: Unravelling the issues, challenges and implications for practice. Transportation Research Part E: Logistics and Transportation Review 114 (2018), 416–436. https://www.sciencedirect.com/science/article/abs/pii/S1366554516303799
    [10]
    Goknur Arzu Akyuz and Turan Erman Erkan. 2010. Supply chain performance measurement: A literature review. International Journal of Production Research 48, 17 (2010), 5137–5155.
    [11]
    Gbadebo Ayoade, Vishal Karande, Latifur Khan, and Kevin Hamlen. 2018. Decentralized IoT data management using blockchain and trusted execution environment. In Proceedings of the IEEE IRI.
    [12]
    Lennart Bader, Jan Pennekamp, Roman Matzutt, David Hedderich, Markus Kowalski, Volker Lücken, and Klaus Wehrle. 2021. Blockchain-based privacy preservation for supply chains supporting lightweight multi-hop information accountability. Information Processing & Management 58, 3 (2021), 102529. https://www.sciencedirect.com/science/article/abs/pii/S0306457321000364
    [13]
    Surajit Bag, Shivam Gupta, and Cyril Foropon. 2019. Examining the role of dynamic remanufacturing capability on supply chain resilience in circular economy. Management Decision 57, 4 (2019), 863–885.
    [14]
    Eric Ballot, Benoit Montreuil, and Russell Meller. 2014. The Physical Internet. La Documentation Française.
    [15]
    Andreas Balster, Ole Hansen, Hanno Friedrich, and André Ludwig. 2020. An ETA prediction model for intermodal transport networks based on machine learning. Business & Information Systems Engineering 62, 5 (2020), 403–416.
    [16]
    Mark Barratt. 2004. Understanding the meaning of collaboration in the supply chain. Supply Chain Management 9, 1 (2004), 30–42.
    [17]
    Rahul C. Basole and Maciek Nowak. 2018. Assimilation of tracking technology in the supply chain. Transportation Research Part E: Logistics and Transportation Review 114 (2018), 350–370. https://www.sciencedirect.com/science/article/abs/pii/S1366554516303453
    [18]
    Iris Beerepoot, Claudio Di Ciccio, Hajo A. Reijers, Stefanie Rinderle-Ma, Wasana Bandara, Andrea Burattin, Diego Calvanese, Tianwa Chen, Izack Cohen, Benoît Depaire, Gemma Di Federico, Marlon Dumas, van, Christopher Dun, Tobias Fehrer, Dominik A. Fischer, Avigdor Gal, Marta Indulska, Vatche Isahagian, Christopher Klinkmüller, Wolfgang Kratsch, Henrik Leopold, Amy Van Looy, Hugo Lopez, Sanja Lukumbuzya, Jan Mendling, Lara Meyers, Linda Moder, Marco Montali, Vinod Muthusamy, Manfred Reichert, Yara Rizk, Michael Rosemann, Maximilian Röglinger, Shazia Sadiq, Ronny Seiger, Tijs Slaats, Mantas Simkus, Ida Asadi Someh, Barbara Weber, Ingo Weber, Mathias Weske, and Francesca Zerbato. 2023. The biggest business process management problems to solve before we die. Computers in Industry 146 (2023), 103837. https://www.sciencedirect.com/science/article/pii/S0166361522002330
    [19]
    Techane Bosona and Girma Gebresenbet. 2013. Food traceability as an integral part of logistics management in food and agricultural supply chain. Food Control 33, 1 (2013), 32–48.
    [20]
    Abdesselam Bougdira, Abdelaziz Ahaitouf, and Ismail Akharraz. 2019. Conceptual framework for general traceability solution: Description and bases. Journal of Modelling in Management 15, 2 (2019), 509–530.
    [21]
    Donald J. Bowersox. 1974. Logistical Management. Macmillan.
    [22]
    Philipp Brauner, Manuela Dalibor, Matthias Jarke, Ike Kunze, István Koren, Gerhard Lakemeyer, Martin Liebenberg, Judith Michael, Jan Pennekamp, Christoph Quix, Bernhard Rumpe, Wil van der Aalst, Klaus Wehrle, Andreas Wortmann, and Martina Ziefle. 2022. A computer science perspective on digital transformation in production. ACM Transactions on Internet of Things 3, 2 (2022), 1--32.
    [23]
    Pearl Brereton, Barbara A. Kitchenham, David Budgen, Mark Turner, and Mohamed Khalil. 2007. Lessons from applying the systematic literature review process within the software engineering domain. Journal of Systems and Software 80, 4 (2007), 571–583.
    [24]
    Alexander Brewer, Nancy Sloan, and Thomas L. Landers. 1999. Intelligent tracking in manufacturing. Journal of Intelligent Manufacturing 10, 3 (1999), 245–250.
    [25]
    Morten Brinch. 2018. Understanding the value of big data in supply chain management and its business processes: Towards a conceptual framework. International Journal of Operations & Production Management 38, 7 (2018), 1589–1614.
    [26]
    Bundestag. 2021. Act on Corporate Due Diligence Obligations in Supply Chains. Technical Report. Federal Republic of Germany.
    [27]
    Gülçin Büyüközkan and Fethullah Göçer. 2018. Digital supply chain: Literature review and a proposed framework for future research. Computers in Industry 97 (2018), 157–177. https://www.sciencedirect.com/science/article/abs/pii/S0166361517304487
    [28]
    Qing Cao, Dara G. Schniederjans, and Marc Schniederjans. 2017. Establishing the use of cloud computing in supply chain management. Operations Management Research 10, 1 (2017), 47–63.
    [29]
    Shuchih E. Chang and Yichian Chen. 2020. When blockchain meets supply chain: A systematic literature review on current development and potential applications. IEEE Access 8 (2020), 62478–62494. https://ieeexplore.ieee.org/document/9047881
    [30]
    Atanu Chaudhuri, Iskra Dukovska-Popovska, Nachiappan Subramanian, Hing Kai Chan, and Ruibin Bai. 2018. Decision-making in cold chain logistics using data analytics: A literature review. The International Journal of Logistics Management 29, 3 (2018), 839–861.
    [31]
    Chen-Yang Cheng, Tzu-Li Chen, and Yin-Yann Chen. 2014. An analysis of the structural complexity of supply chain networks. Applied Mathematical Modelling 38, 9–10 (2014), 2328–2344.
    [32]
    Claudia Colicchia, Alessandro Creazza, Carlo Noè, and Fernanda Strozzi. 2019. Information sharing in supply chains: A review of risks and opportunities using the systematic literature network analysis (SLNA). Supply Chain Management 24, 1 (2019), 5–21.
    [33]
    Martha C. Cooper, Douglas M. Lambert, and Janus D. Pagh. 1997. Supply chain management: More than a new name for logistics. The International Journal of Logistics Management 8, 1 (1997), 1–14.
    [34]
    Angelo Corallo, Maria Elena Latino, Marta Menegoli, and Pierpaolo Pontrandolfo. 2020. A systematic literature review to explore traceability and lifecycle relationship. International Journal of Production Research 58, 15 (2020), 4789–4807.
    [35]
    Rachel Croson and Karen Donohue. 2005. Upstream versus downstream information and its impact on the bullwhip effect. System Dynamics Review 21, 3 (2005), 249–260. DOI:
    [36]
    Ronaldo Brito da Silva and Claudia Aparecida de Mattos. 2019. Critical success factors of a drug traceability system for creating value in a pharmaceutical supply chain (PSC). International Journal of Environmental Research and Public Health 16, 11 (2019), 11. https://www.mdpi.com/1660-4601/16/11/1972
    [37]
    Mohammad Daneshvar Kakhki and Vidyaranya B. Gargeya. 2019. Information systems for supply chain management: A systematic literature analysis. International Journal of Production Research 57, 15–16 (2019), 5318–5339.
    [38]
    Marly Mizue Kaibara de Almeida, Fernando Augusto Silva Marins, Andréia Maria Pedro Salgado, Fernando César Almada Santos, and Sérgio Luis da Silva. 2015. Mitigation of the bullwhip effect considering trust and collaboration in supply chain management: A literature review. The International Journal of Advanced Manufacturing Technology 77, 1 (2015), 495–513.
    [39]
    Volkan Dedeoglu, Raja Jurdak, Guntur D. Putra, Ali Dorri, and Salil S. Kanhere. 2019. A trust architecture for blockchain in IoT. In Proceedings of the EAI MobiQuitous.
    [40]
    Anil K. Deisingh. 2005. Pharmaceutical counterfeiting. Analyst 130, 3 (2005), 271–279.
    [41]
    William DeLone, Demetrio Migliorati, and Giovanni Vaia. 2018. Digital IT Governance. Springer, 205–230.
    [42]
    Monica Divitini, Chihab Hanachi, and Christophe Sibertin-Blanc. 2001. Inter—Organizational Workflows for Enterprise Coordination (1st. ed.). Springer, 369–398.
    [43]
    Marlon Dumas, Marcello La Rosa, Jan Mendling, and Hajo A. Reijers. 2018. Fundamentals of Business Process Management (2nd. ed.). Springer.
    [44]
    Niloofar Etemadi, Yari Borbon-Galvez, and Fernanda Strozzi. 2019. Blockchain technology for cybersecurity applications in the food supply chain: A systematic literature review. In Proceedings of the XXIV Summer School “Francesco Turco” – Industrial Systems Engineering. AIDI.
    [45]
    Hajar Fatorachian and Hadi Kazemi. 2021. Impact of industry 4.0 on supply chain performance. Production Planning & Control 32, 1 (2021), 63–81.
    [46]
    Stanley E. Fawcett, Stephen L. Jones, and Amydee M. Fawcett. 2012. Supply chain trust: The catalyst for collaborative innovation. Business Horizons 55, 2 (2012), 163–178.
    [47]
    Armando Fox and Eric A. Brewer. 1999. Harvest, yield, and scalable tolerant systems. In Proceedings of the 7th Workshop on Hot Topics in Operating Systems. IEEE, 174–178.
    [48]
    Vitor Freitas. 2013. Parsifal. Retrieved from https://parsif.al/. Accessed January 14, 2022.
    [49]
    Markham T. Frohlich and Roy Westbrook. 2001. Arcs of integration: An international study of supply chain strategies. Journal of Operations Management 19, 2 (2001), 185–200.
    [50]
    Xiao Fu, Hao Tan, Ekaterina Tsenina, Shuchun Liu, and Guanghua Han. 2022. Information sharing based on two-way perceptions of trust and supply chain decisions: A simulation based approach. Chaos, Solitons & Fractals 157 (2022), 111938. https://www.sciencedirect.com/science/article/abs/pii/S0960077922001485
    [51]
    Sofia Garcia-Torres, Laura Albareda, Marta Rey-Garcia, and Stefan Seuring. 2019. Traceability for sustainability – literature review and conceptual framework. Supply Chain Management 24, 1 (2019), 85–106.
    [52]
    Joshua Gelhaar, Tan Gürpinar, Michael Henke, and Boris Otto. 2021. Towards a taxonomy of incentive mechanisms for data sharing in data ecosystems. In Proceedings of the 2021 25th Pacific Asia Conference on Information Systems. AIS.
    [53]
    Vincent Giard and Mustapha Sali. 2013. The bullwhip effect in supply chains: A study of contingent and incomplete literature. International Journal of Production Research 51, 13 (2013), 3880–3893.
    [54]
    Lars Gleim, Jan Pennekamp, Martin Liebenberg, Melanie Buchsbaum, Philipp Niemietz, Simon Knape, Alexander Epple, Simon Storms, Daniel Trauth, Thomas Bergs, Christian Brecher, Stefan Decker, Gerhard Lakemeyer, and Klaus Wehrle. 2020. FactDAG: Formalizing data interoperability in an internet of production. IEEE Internet of Things Journal 7, 4 (2020), 3243–3253.
    [55]
    Keith Goffin, Fred Lemke, and Marek Szwejczewski. 2006. An exploratory study of ‘close’ supplier–manufacturer relationships. Journal of Operations Management 24, 2 (2006), 189–209.
    [56]
    Peter Gonczol, Panagiota Katsikouli, Lasse Herskind, and Nicola Dragoni. 2020. Blockchain implementations and use cases for supply Chains-A survey. IEEE Access 8 (2020), 11856–11871. https://ieeexplore.ieee.org/abstract/document/8952728
    [57]
    Tonci Grubic and Ip-Shing Fan. 2010. Supply chain ontology: Review, analysis and synthesis. Computers in Industry 61, 8 (2010), 776–786.
    [58]
    Angappa Gunasekaran, Yahaya Y. Yusuf, Ezekiel O. Adeleye, Thanos Papadopoulos, Dharma Kovvuri, and Dan’Asabe G. Geyi. 2019. Agile manufacturing: An evolutionary review of practices. International Journal of Production Research 57, 15–16 (2019), 5154–5174.
    [59]
    Tan Gürpinar, Sk. Riad Bin Ashraf, Natalia Broza-Abut, and Dominik Sparer. 2022. Blockchain-Based Infrastructure for Product Traceability in the Medical Supply Chain. IGI Global, 119–134.
    [60]
    Tan Gürpinar, Gilberto Guadiana, Philipp Asterios Ioannidis, Natalia Straub, and Michael Henke. 2021. The current state of Blockchain applications in supply chain management. In Proceedings of the 2021 3rd International Conference on Blockchain Technology. ACM, 168–175.
    [61]
    Tan Gürpinar, Sophie Harre, Michael Henke, and Farah Saleh. 2020. Blockchain technology – integration in supply chain processes. In Proceedings of the Hamburg International Conference of Logistics. epubli, 153–185.
    [62]
    Sung Ho Ha and Sang Chan Park. 2001. Matching buyers and suppliers: An intelligent dynamic-exchange model. IEEE Intelligent Systems 16, 4 (2001), 28–40.
    [63]
    Jannicke Baalsrud Hauge, Masoud Zafarzadeh, Yongkuk Jeong, Yi Li, Wajid Ali Khilji, and Magnus Wiktorsson. 2020. Digital and physical testbed for production logistics operations. In Proceedings of the IFIP WG 5.7 International Conference on Advances in Production Management Systems. Springer, 625–633.
    [64]
    Abhishek Hazra, Mainak Adhikari, Tarachand Amgoth, and Satish Narayana Srirama. 2023. A comprehensive survey on interoperability for IIoT: Taxonomy, standards, and future directions. Computing Surveys 55, 1 (2023), 1--35. https://dl.acm.org/doi/abs/10.1145/3485130
    [65]
    Edward J. S. Hearnshaw and Mark M. J. Wilson. 2013. A complex network approach to supply chain network theory. International Journal of Operations & Production Management 33, 4 (2013), 442–469.
    [66]
    Frauke Hellweg, Luis Meierkort, Tim Severin, and Bernd Hellingrath. 2021. Preconditions and Challenges in the Digital Transformation of Supply Chains: Findings from Academia and Practice. Springer, 15–32.
    [67]
    Enrique Holgado de Frutos, Juan R. Trapero, and Francisco Ramos. 2020. A literature review on operational decisions applied to collaborative supply chains. PLOS ONE 15, 3 (2020), 1--28. https://journals.plos.org/plosone/article/citation?id=10.1371/journal.pone.0230152
    [68]
    Matthias Holweg, Stephen Disney, Jan Holmström, and Johanna Småros. 2005. Supply chain collaboration: Making sense of the strategy continuum. European Management Journal 23, 2 (2005), 170–181.
    [69]
    Yuan Hong, Jaideep Vaidya, and Shengbin Wang. 2014. A survey of privacy-aware supply chain collaboration: From theory to applications. Journal of Information Systems 28, 1 (2014), 243–268.
    [70]
    Madeleine R. Høyer, Olumide E. Oluyisola, Jan O. Strandhagen, and Marco G. Semini. 2019. Exploring the challenges with applying tracking and tracing technology in the dairy industry. IFAC-PapersOnLine 52, 13 (2019), 1727–1732.
    [71]
    Huawei Huang, Wei Kong, Sicong Zhou, Zibin Zheng, and Song Guo. 2022. A survey of state-of-the-art on blockchains: Theories, modelings, and tools. Computing Surveys 54, 2 (2022), 1--42. https://dl.acm.org/doi/abs/10.1145/3441692
    [72]
    Manoj Hudnurkar, Suresh Jakhar, and Urvashi Rathod. 2014. Factors affecting collaboration in supply chain: A literature review. Procedia - Social and Behavioral Sciences 133 (2014), 189–202. https://www.sciencedirect.com/journal/procedia-social-and-behavioral-sciences/vol/134/suppl/C, https://www.sciencedirect.com/science/article/pii/S1877042814030948
    [73]
    Michael H. Hugos. 2002. Essentials of Supply Chain Management. John Wiley & Sons.
    [74]
    Ru Huo, Shiqin Zeng, Zhihao Wang, Jiajia Shang, Wei Chen, Tao Huang, Shuo Wang, F Richard Yu, and Yunjie Liu. 2022. A comprehensive survey on Blockchain in industrial Internet of Things: Motivations, research progresses, and future challenges. IEEE Communications Surveys & Tutorials 24, 1 (2022), 88–122.
    [75]
    Michael Hutter and Ronald Toegl. 2011. Touch’n trust: An NFC-enabled trusted platform module. International Journal on Advances in Security 4, 1 & 2 (2011), 131--141. https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=66d6457ca3139f1621487422ea423bc595912326#page=137
    [76]
    Joonhwan In, Randy Bradley, Bogdan C. Bichescu, and Chad W. Autry. 2019. Supply chain information governance: Toward a conceptual framework. The International Journal of Logistics Management 30, 2 (2019), 506–526.
    [77]
    Patrik Jonsson and Paulina Myrelid. 2016. Supply chain information utilisation: Conceptualisation and antecedents. International Journal of Operations & Production Management 36, 12 (2016), 1769–1799.
    [78]
    Sudhanshu Joshi. 2013. E-Supply Chain Collaboration and Integration: Implementation Issues and Challenges. IGI Global, 9–26.
    [79]
    Florian Kache and Stefan Seuring. 2014. Linking collaboration and integration to risk and performance in supply chains via a review of literature reviews. Supply Chain Management 19, 5/6 (2014), 665–682.
    [80]
    Florian Kache and Stefan Seuring. 2017. Challenges and opportunities of digital information at the intersection of Big Data Analytics and supply chain management. International Journal of Operations & Production Management 37, 1 (2017), 10–36.
    [81]
    Muhammad Mustafa Kamal and Zahir Irani. 2014. Analysing supply chain integration through a systematic literature review: A normative perspective. Supply Chain Management 19, 5/6 (2014), 523–557.
    [82]
    Kine Mari Karlsen, Bent Dreyer, Petter Olsen, and Edel O. Elvevoll. 2013. Literature review: Does a common theoretical framework to implement food traceability exist? Food Control 32, 2 (2013), 409–417.
    [83]
    Hakan Kayan, Matthew Nunes, Omer Rana, Pete Burnap, and Charith Perera. 2022. Cybersecurity of industrial cyber-physical systems: A review. Comput. Surveys 54, 11s (2022), 1--35. https://dl.acm.org/doi/abs/10.1145/3510410
    [84]
    Joakim Kembro and Dag Näslund. 2014. Information sharing in supply chains, myth or reality? A critical analysis of empirical literature. International Journal of Physical Distribution & Logistics Management 44, 3 (2014), 179–200. DOI:
    [85]
    Joakim Kembro, Kostas Selviaridis, and Dag Näslund. 2014. Theoretical perspectives on information sharing in supply chains: A systematic literature review and conceptual framework. Supply Chain Management 19, 5/6 (2014), 609–625.
    [86]
    Barbara Ann Kitchenham. 2007. Guidelines for Performing Systematic Literature Reviews in Software Engineering. EBSE-2007-01. Keele University and University of Durham.
    [87]
    Kuldeep Kumar and Ellen Christiaanse. 1999. From static supply chains to dynamic supply webs: Principles for radical redesign in the age of information. In Proceedings of the 20th International Conference on Information Systems. AIS, 300–306.
    [88]
    Laava. 2017. Laava Smart Fingerprints. Retrieved March 21, 2022 from https://laava.id/.
    [89]
    Douglas M. Lambert and Martha C. Cooper. 2000. Issues in supply chain management. Industrial Marketing Management 29, 1 (2000), 65–83.
    [90]
    Anja Leckel and Maria Linnartz. 2023. Towards the internet of production–how to increase data sharing for successful supply chain collaboration. Journal of Production Systems and Logistics 3 (2023), 3. https://www.repo.uni-hannover.de/handle/123456789/13518
    [91]
    Hau L. Lee, Venkata Padmanabhan, and Seungjin Whang. 1997. The bullwhip effect in supply chains. Sloan Management Review 38, 3 (1997), 93–102.
    [92]
    Hau L. Lee and Seungjin Whang. 2000. Information sharing in a supply chain. International Journal of Manufacturing Technology and Management 1, 1 (2000), 79–93.
    [93]
    Matt Leonard and Shefali Kapadia. 2021. Timeline: How the Suez Canal Blockage Unfolded Across Supply Chains. Retrieved March 21, 2022 from https://www.supplychaindive.com/news/timeline-ever-given-evergreen-blocked-suez-canal-supply-chain/597660/.
    [94]
    Jacques Leslie. 2022. How Climate Change Is Disrupting the Global Supply Chain. Retrieved March 21, 2022 from https://e360.yale.edu/features/how-climate-change-is-disrupting-the-global-supply-chain.
    [95]
    Lejing Li. 2019. Supply chain contracts in the context of asymmetric information: A literature review. In Proceedings of the 2019 16th International Conference on Service Systems and Service Management. IEEE.
    [96]
    Lode Li and Hongtao Zhang. 2008. Confidentiality and information sharing in supply chain coordination. Management Science 54, 8 (2008), 1467–1481.
    [97]
    Ming K. Lim, Yan Li, Chao Wang, and Ming-Lang Tseng. 2021. A literature review of blockchain technology applications in supply chains: A comprehensive analysis of themes, methodologies and industries. Computers & Industrial Engineering 154 (2021), 107133. https://www.sciencedirect.com/science/article/abs/pii/S0360835221000371
    [98]
    Maria Linnartz, Ursula Motz, Tobias Schröer, Volker Stich, Kai Müller, and Christoph Greb. 2021. Increasing resilience in procurement in the context of the internet of production. Journal of Production Systems and Logistics 1, 2021 (2021), 1--14. https://www.repo.uni-hannover.de/bitstream/handle/123456789/11437/Linnartz%202021%20-%20Increasing%20Resilience%20in%20Procurement%20in%20the%20Context%20of%20the%20Internet%20of%20Production.pdf?sequence=3&isAllowed=y
    [99]
    Wei Liu, Xue-Feng Shao, Chia-Huei Wu, and Ping Qiao. 2021. A systematic literature review on applications of information and communication technologies and blockchain technologies for precision agriculture development. Journal of Cleaner Production 298 (2021), 126763. https://www.sciencedirect.com/science/article/abs/pii/S0959652621009823
    [100]
    Zahra Lotfi, Muriati Mukhtar, Shahnorbanun Sahran, and Ali Taei Zadeh. 2013. Information sharing in supply chain management. Procedia Technology 11 (2013), 298–304. https://www.sciencedirect.com/science/article/pii/S2212017313003484
    [101]
    Laura Macchion and Rosanna Fornasiero. 2020. Global–local supply chain configurations for different production strategies: A comparison between traditional and customized productions. Journal of Fashion Marketing and Management 25, 2 (2020), 290–309.
    [102]
    Kumaraguru Mahadevan. 2010. Supply chain visibility and integration – The current directions in organisations: A comprehensive literature review and research questions. In Proceedings of the 2010 2nd International Conference on Computer and Automation Engineering. IEEE, 226–229.
    [103]
    Imran Makhdoom, Mehran Abolhasan, Justin Lipman, Ren Ping Liu, and Wei Ni. 2018. Anatomy of threats to the internet of things. IEEE Communications Surveys & Tutorials 21, 2 (2018), 1636–1675.
    [104]
    Sidra Malik, Volkan Dedeoglu, Salil Kanhere, and Raja Jurdak. 2022. PrivChain: Provenance and privacy preservation in blockchain enabled supply chains. In Proceedings of the 2022 IEEE International Conference on Blockchain. IEEE, 157–166.
    [105]
    Sidra Malik, Volkan Dedeoglu, Salil S. Kanhere, and Raja Jurdak. 2019. TrustChain: Trust management in Blockchain and IoT supported supply chains. In Proceedings of the 2019 IEEE International Conference on Blockchain. IEEE, 184–193.
    [106]
    Sidra Malik, Naman Gupta, Volkan Dedeoglu, Salil Kanhere, and Raja Jurdak. 2021. TradeChain: Decoupling traceability and identity in blockchain enabled supply chains. In Proceedings of the 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE.
    [107]
    Leonardo Marques. 2019. Sustainable supply network management: A systematic literature review from a knowledge perspective. International Journal of Productivity and Performance Management 68, 6 (2019), 1164–1190.
    [108]
    John T. Mentzer, William DeWitt, James S. Keebler, Soonhong Min, Nancy W. Nix, Carlo D. Smith, and Zach G. Zacharia. 2001. Defining supply chain management. Journal of Business Logistics 22, 2 (2001), 1–25.
    [109]
    Rosario Michel-Villarreal, Eliseo Luis Vilalta-Perdomo, Maurizio Canavari, and Martin Hingley. 2021. Resilience and digitalization in short food supply chains: A case study approach. Sustainability 13, 11 (2021), 5913. https://www.mdpi.com/2071-1050/13/11/5913
    [110]
    Sébastien Miroudot. 2020. Resilience versus robustness in global value chains: Some policy implications. In COVID-19 and Trade Policy: Why Turning Inward Won’t Work. CEPR Press, Chapter 9, 117–130.
    [111]
    Teboho M. Mofokeng and Richard Chinomona. 2019. Supply chain partnership, supply chain collaboration and supply chain integration as the antecedents of supply chain performance. South African Journal of Business Management 50, 1 (2019), 1--10. https://www.econstor.eu/bitstream/10419/218692/1/sajbm-v50i1-0193.pdf
    [112]
    Matteo Montecchi, Kirk Plangger, and Douglas West. 2021. Supply chain transparency: A bibliometric review and research agenda. International Journal of Production Economics 238 (2021), 108152. https://www.sciencedirect.com/science/article/abs/pii/S0925527321001286
    [113]
    Jairo R. Montoya-Torres and Diego A. Ortiz-Vargas. 2014. Collaboration and information sharing in dyadic supply chains: A literature review over the period 2000–2012. Estudios Gerenciales 30, 133 (2014), 343–354.
    [114]
    Benoit Montreuil. 2011. Toward a physical Internet: Meeting the global logistics sustainability grand challenge. Logistics Research 3, 2 (2011), 71–87.
    [115]
    Taofeeq D. Moshood and Shahryar Sorooshian. 2021. The physical Internet: A means towards achieving global logistics sustainability. Open Engineering 11, 1 (2021), 815–829.
    [116]
    Giorgio Alessandro Motta, Bedir Tekinerdogan, and Ioannis N. Athanasiadis. 2020. Blockchain applications in the agri-food domain: The first wave. Frontiers in Blockchain 3 (2020), 6. https://www.frontiersin.org/articles/10.3389/fbloc.2020.00006/full?ref=elnucleo.rocks
    [117]
    Abdelhamid Moutaoukil, Ridha Derrouiche, and Gilles Neubert. 2012. Pooling supply chain: Literature review of collaborative strategies. In Proceedings of the 13th IFIP WG 5.5 Working Conference on Virtual Enterprises. Springer, 513–525.
    [118]
    Mirza B. Murtaza, Vipul Gupta, and Richard C. Carroll. 2004. E-marketplaces and the future of supply chain management: Opportunities and challenges. Business Process Management Journal 10, 3 (2004), 325–335.
    [119]
    Benjamin Müßigmann, Heiko von der Gracht, and Evi Hartmann. 2020. Blockchain technology in logistics and supply chain management—A bibliometric literature review from 2016 to January 2020. IEEE Transactions on Engineering Management 67, 4 (2020), 988–1007.
    [120]
    Renáta Myšková and Michal Kuběnka. 2019. Information sharing in the context of business cooperation – as a source of competitive advantage. Journal of International Studies 12, 3 (2019), 169–182.
    [121]
    Thomas Neumann, Stephan Schosser, Bodo Vogt, and Guido Voigt. 2019. Credible information sharing in supply chains - a behavioral assessment of review strategies. In Proceedings of the 52nd Hawaii International Conference on System Sciences. AIS, 1528–1537.
    [122]
    J. S. Nimmy, Arjun Chilkapure, and V. Madhusudanan Pillai. 2019. Literature review on supply chain collaboration: Comparison of various collaborative techniques. Journal of Advances in Management Research 16, 4 (2019), 537–562.
    [123]
    Gilbert N. Nyaga, Judith M. Whipple, and Daniel F. Lynch. 2010. Examining supply chain relationships: Do buyer and supplier perspectives on collaborative relationships differ? Journal of Operations Management 28, 2 (2010), 101–114.
    [124]
    Nnamdi Johnson Ogbuke, Yahaya Y. Yusuf, Kovvuri Dharma, and Burcu A. Mercangoz. 2022. Big data supply chain analytics: Ethical, privacy and security challenges posed to business, industries and society. Prod. Plan. Control. 33, 2–3 (2022), 123--137. https://www.tandfonline.com/doi/abs/10.1080/09537287.2020.1810764
    [125]
    OMG. 2011. Business Process Model and Notation (BPMN). OMG Document Number: formal/2011-01-03. Version 2.0.
    [126]
    Nikolaos A. Panayiotou, Stavros T. Ponis, and Sotiris P. Gayialis. 2007. Transforming the Government Value Chain: Emerging Business Models and Enabling Technologies. Springer, 213–239.
    [127]
    Ying Peng, Xu Chen, and Xiaojun Wang. 2022. Enhancing supply chain flows through blockchain: A comprehensive literature review. International Journal of Production Research 61, 13 (2022), 4503--4524. https://www.tandfonline.com/doi/abs/10.1080/00207543.2022.2157064
    [128]
    Jan Pennekamp, Fritz Alder, Roman Matzutt, Jan Tobias Mühlberg, Frank Piessens, and Klaus Wehrle. 2020. Secure end-to-end sensing in supply chains. In Proceedings of the 2020 IEEE Conference on Communications and Network Security.
    [129]
    Jan Pennekamp, Lennart Bader, Roman Matzutt, Philipp Niemietz, Daniel Trauth, Martin Henze, Thomas Bergs, and Klaus Wehrle. 2020. Private multi-hop accountability for supply chains. In Proceedings of the 2020 IEEE International Conference on Communications Workshops.
    [130]
    Jan Pennekamp, Markus Dahlmanns, Frederik Fuhrmann, Timo Heutmann, Alexander Kreppein, Dennis Grunert, Christoph Lange, Robert H. Schmitt, and Klaus Wehrle. 2023. Offering two-way privacy for evolved purchase inquiries. ACM Transactions on Internet Technology (2023). https://dl.acm.org/doi/abs/10.1145/3599968
    [131]
    Jan Pennekamp, Frederik Fuhrmann, Markus Dahlmanns, Timo Heutmann, Alexander Kreppein, Dennis Grunert, Christoph Lange, Robert H. Schmitt, and Klaus Wehrle. 2021. Confidential Computing-Induced Privacy Benefits for the Bootstrapping of New Business Relationships. Technical Report RWTH-2021-09499. RWTH Aachen University. Blitz Talk at the 2021 Cloud Computing Security Workshop (CCSW’21).
    [132]
    Jan Pennekamp, René Glebke, Martin Henze, Tobias Meisen, Christoph Quix, Rihan Hai, Lars Gleim, Philipp Niemietz, Maximilian Rudack, Simon Knape, Alexander Epple, Daniel Trauth, Uwe Vroomen, Thomas Bergs, Christian Brecher, Andreas Bührig-Polaczek, Matthias Jarke, and Klaus Wehrle. 2019. Towards an infrastructure enabling the Internet of production. In Proceedings of the 2019 IEEE International Conference on Industrial Cyber Physical Systems. IEEE, 31–37.
    [133]
    Jan Pennekamp, Martin Henze, Simo Schmidt, Philipp Niemietz, Marcel Fey, Daniel Trauth, Thomas Bergs, Christian Brecher, and Klaus Wehrle. 2019. Dataflow challenges in an Internet of production: A security & privacy perspective. In Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy. ACM, 27–38.
    [134]
    Alessandro Perego, Sara Perotti, and Riccardo Mangiaracina. 2011. ICT for logistics and freight transportation: A literature review and research agenda. International Journal of Physical Distribution & Logistics Management 41, 5 (2011), 457–483.
    [135]
    Kai Petersen, Robert Feldt, Shahid Mujtaba, and Michael Mattsson. 2008. Systematic mapping studies in software engineering. In Proceedings of the 12th International Conference on Evaluation and Assessment in Software Engineering. BCS Learning & Development, 68–77.
    [136]
    Kai Petersen, Sairam Vakkalanka, and Ludwik Kuzniarz. 2015. Guidelines for conducting systematic mapping studies in software engineering: An update. Information and Software Technology 64 (2015), 1–18. https://www.sciencedirect.com/science/article/abs/pii/S0950584915000646
    [137]
    Lukas Pfahl and Claire Moxham. 2014. Achieving sustained competitive advantage by integrating ECR, RFID and visibility in retail supply chains: A conceptual framework. Production Planning & Control 25, 7 (2014), 548–571.
    [138]
    Yangheran Piao, Kai Ye, and Xiaohui Cui. 2021. A data sharing scheme for GDPR-compliance based on consortium blockchain. Future Internet 13, 8 (2021), 217. https://www.mdpi.com/1999-5903/13/8/217
    [139]
    Leo L. Pipino, Yang W. Lee, and Richard Y. Wang. 2002. Data quality assessment. Communications of the ACM 45, 4 (2002), 211–218.
    [140]
    Stephen Pollard, Guy Adams, Faisal Azhar, and Fraser Dickin. 2018. Authentication of 3D printed parts using 3D physical signatures. In Proceedings of the NIP & Digital Fabrication Conference, Printing for Fabrication 2018. Society for Imaging Science and Technology, 196–201.
    [141]
    Stavros T. Ponis and Epaminondas Koronis. 2012. Supply chain resilience: Definition of concept and its formative elements. Journal of Applied Business Research 28, 5 (2012), 921–930.
    [142]
    Peter Poschmann, Manuel Weinke, Andreas Balster, Frank Straube, Hanno Friedrich, and André Ludwig. 2019. Realization of ETA predictions for intermodal logistics networks using artificial intelligence. In Proceedings of the 4th Interdisciplinary Conference on Production, Logistics and Traffic. Springer, 155–176.
    [143]
    Jiraporn Pradabwong, Christos Braziotis, Kulwant S. Pawar, and James Tannock. 2015. Business process management and supply chain collaboration: A critical comparison. Logistics Research 8, 1 (2015), 6. https://link.springer.com/article/10.1007/s12159-015-0123-6
    [144]
    Lila Rajabion, Amin Sataei Mokhtari, Mohammad Worya Khordehbinan, Mansoureh Zare, and Alireza Hassani. 2019. The role of knowledge sharing in supply chain success: Literature review, classification and current trends. Journal of Engineering, Design and Technology 17, 6 (2019), 1222–1249.
    [145]
    Usha Ramanathan and Angappa Gunasekaran. 2014. Supply chain collaboration: Impact of success in long-term partnerships. International Journal of Production Economics 147, Part B (2014), 252–259.
    [146]
    Minh Trang Rausch-Phan and Patrick Siegfried. 2022. Green Supply Chain Management. Springer.
    [147]
    Ghadafi M. Razak, Linda C. Hendry, and Mark Stevenson. 2021. Supply chain traceability: A review of the benefits and its relationship with supply chain resilience. Production Planning & Control (2021), 1--21. https://www.tandfonline.com/doi/pdf/10.1080/09537287.2021.1983661
    [148]
    Wajiha Rehman, Hijab e Zainab, Jaweria Imran, and Narmeen Zakaria Bawany. 2021. NFTs: Applications and challenges. In Proceedings of the 2021 22nd International Arab Conference on Information Technology. IEEE.
    [149]
    Werner Reinartz, Nico Wiegand, and Monika Imschloss. 2019. The impact of digital transformation on the retailing value chain. International Journal of Research in Marketing 36, 3 (2019), 350–366.
    [150]
    Ziyang Ren, Atour Taghipour, and Béatrice Canel-Depitre. 2016. Information sharing in supply chain under uncertainty. In Proceedings of the 2016 6th International Conference on Information Communication and Management. IEEE, 67–71.
    [151]
    Fred Ricker and Ravi Kalakota. 1999. Order fulfillment: The hidden key to e-commerce success. Supply Chain Management Review 11, 3 (1999), 60–70.
    [152]
    Henrik Ringsberg. 2014. Perspectives on food traceability: A systematic literature review. Supply Chain Management 19, 5/6 (2014), 558–576.
    [153]
    Seref Sagiroglu and Duygu Sinanc. 2013. Big data: A review. In Proceedings of the 2013 International Conference on Collaboration Technologies and Systems. IEEE, 42–47.
    [154]
    B. S. Sahay and Jayanthi Ranjan. 2008. Real time business intelligence in supply chain analytics. Information Management & Computer Security 16, 1 (2008), 22–48.
    [155]
    Khaled Salah, A. Alfalasi, M. Alfalasi, M. Alharmoudi, M. Alzaabi, A. Alzyeodi, and Raja Wasim Ahmad. 2020. IoT-enabled shipping container with environmental monitoring and location tracking. In Proceedings of the 2020 IEEE 17th Annual Consumer Communications & Networking Conference. IEEE.
    [156]
    Aysegul Sarac, Nabil Absi, and Stéphane Dauzère-Pérès. 2010. A literature review on the impact of RFID technologies on supply chain management. International Journal of Production Economics 128, 1 (2010), 77–95.
    [157]
    Thomas Schäffer and Christian Leyh. 2017. Master data quality in the era of digitization-Toward inter-organizational master data quality in value networks: A problem identification. In Proceedings of the 5th International Conference on Innovations in Enterprise Resource Planning Systems. Springer, 99–113.
    [158]
    Christophe Schinckus, Mohammadreza Akbari, and Steve Clarke. 2019. Corporate social responsibility in sustainable supply chain management: An econo-bibliometric perspective. Theoretical Economics Letters 9, 1 (2019), 247–270.
    [159]
    Kirstin Scholten and Sanne Schilder. 2015. The role of collaboration in supply chain resilience. Supply Chain Management 20, 4 (2015), 471–484.
    [160]
    Bernd Scholz-Reiter and Jens Jakobza. 1999. Supply chain management - Überblick und Konzeption. HMD Praxis der Wirtschaftsinformatik 36, 207 (1999), 7–15. https://katalog.slub-dresden.de/en/id/0-1148122664
    [161]
    Holger Schroedl and Klaus Turowski. 2011. Service-oriented information systems architectures in supply chain management for hybrid value bundles – a structured comparison. In Proceedings of the Pacific Asia Conference on Information Systems. AIS.
    [162]
    Monina Schwarz, Matthias Marx, and Hannes Federrath. 2021. A Structured Analysis of Information Security Incidents in the Maritime Sector. arXiv:2112.06545. Retrieved from https://arxiv.org/abs/2112.06545.
    [163]
    Padraig Scully and Michael Höbig. 2019. Exploring the impact of blockchain on digitized Supply Chain flows: A literature review. In Proceedings of the 2019 6th International Conference on Software Defined Systems. IEEE, 278–283.
    [164]
    Erik Selldin. 2004. Supply chain frontier: Achieving excellence in efficiency and responsiveness. In Proceedings of the 11th International Conference of Annual European Operations Management Association. INSEAD.
    [165]
    Rachna Shah, Susan M. Goldstein, and Peter T. Ward. 2002. Aligning supply chain management characteristics and interorganizational information system types: An exploratory study. IEEE Transactions on Engineering Management 49, 3 (2002), 282–292.
    [166]
    Ashutosh Sheel and Vishnu Nath. 2019. Effect of blockchain technology adoption on supply chain adaptability, agility, alignment and performance. Management Research Review 42, 12 (2019), 1353–1374.
    [167]
    Yossi Sheffi, Maria Jesus Saenz, Liliana Rivera, and David Gligor. 2019. New forms of partnership: The role of logistics clusters in facilitating horizontal collaboration mechanisms. European Planning Studies 27, 5 (2019), 905–931.
    [168]
    Togar M. Simatupang and Ramaswami Sridharan. 2002. The collaborative supply chain. The International Journal of Logistics Management 13, 1 (2002), 15–30.
    [169]
    Togar M. Simatupang and Ramaswami Sridharan. 2008. Design for supply chain collaboration. Business Process Management Journal 14, 3 (2008), 401–418.
    [170]
    P. N. Sindhuja and Anand S. Kunnathur. 2015. Information security in supply chains: A management control perspective. Information and Computer Security 23, 5 (2015), 476–496.
    [171]
    Rajesh Kumar Singh, Pravin Kumar, and Mahesh Chand. 2021. Evaluation of supply chain coordination index in context to Industry 4.0 environment. Benchmarking: An International Journal 28, 5 (2021), 1622–1637.
    [172]
    Frank Siqueira and Joseph G. Davis. 2022. Service computing for industry 4.0: State of the art, challenges, and research opportunities. Comput. Surveys 54, 9 (2022), 1.38. https://dl.acm.org/doi/abs/10.1145/3478680
    [173]
    Anatoly P. Sobolev, Simone Circi, Donatella Capitani, Cinzia Ingallina, and Luisa Mannina. 2017. Molecular fingerprinting of food authenticity. Current Opinion in Food Science 16 (2017), 59–66. https://www.sciencedirect.com/science/article/abs/pii/S2214799317300541
    [174]
    Claudine Antoinette Soosay and Paul Hyland. 2015. A decade of supply chain collaboration and directions for future research. Supply Chain Management 20, 6 (2015), 613–630.
    [175]
    Konstantina Spanaki, Zeynep Gürgüç, Richard Adams, and Catherine Mulligan. 2018. Data supply chain (DSC): Research synthesis and future directions. International Journal of Production Research 56, 13 (2018), 4447–4466.
    [176]
    Stefanella Stranieri, Luigi Orsi, and Alessandro Banterle. 2017. Traceability and risks: An extended transaction cost perspective. Supply Chain Management 22, 2 (2017), 145–159.
    [177]
    Tarek Sultan Al Essa. 2022. 5 Ways the COVID-19 Pandemic has Changed the Supply Chain. Retrieved March 21, 2022 from https://www.weforum.org/agenda/2022/01/5-ways-the-covid-19-pandemic-has-changed-the-supply-chain/.
    [178]
    Nouha Hadj Taieb and Habib Affes. 2013. Approaches to improve the performance of the collaborative supply chain management: Literature review. In Proceedings of the 2013 International Conference on Advanced Logistics and Transport. IEEE, 440–445.
    [179]
    Ying Tan, Steve Goddard, and Lance C. Pérez. 2008. A prototype architecture for cyber-physical systems. ACM SIGBED Review 5, 1 (2008), 1--2. https://dl.acm.org/doi/abs/10.1145/1366283.1366309
    [180]
    Christopher S. Tang. 2008. Making products safe: Process and challenges. International Commerce Review 8, 1 (2008), 48–55.
    [181]
    Koen Tange, Michele De Donno, Xenofon Fafoutis, and Nicola Dragoni. 2020. A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities. IEEE Communications Surveys & Tutorials 22, 4 (2020), 2489–2520.
    [182]
    Saurabh Tiwari. 2021. Supply chain integration and Industry 4.0: A systematic literature review. Benchmarking: An International Journal 28, 9 (2021), 990–1030.
    [183]
    Stefan Tönnissen and Frank Teuteberg. 2019. Using Blockchain technology for cross-organizational process mining – concept and case study. In Proceedings of the 22nd International Conference on Business Information Systems. Springer, 121–131.
    [184]
    Thi Thanh Huong Tran, Paul Childerhouse, and Eric Deakins. 2016. Supply chain information sharing: Challenges and risk mitigation strategies. Journal of Manufacturing Technology Management 27, 8 (2016), 1102–1126.
    [185]
    Huy Quang Truong, Maria Sameiro, Ana Cristina Fernandes, Paulo Sampaio, Binh An Thi Duong, Hiep Hoang Duong, and Estela Vilhenac. 2017. Supply chain management practices and firms’ operational performance. International Journal of Quality & Reliability Management 34, 2 (2017), 176–193.
    [186]
    Arvind Upadhyay, Sumona Mukhuty, Vikas Kumar, and Yigit Kazancoglu. 2021. Blockchain technology and the circular economy: Implications for sustainability and social responsibility. Journal of Cleaner Production 293 (2021), 126130. https://www.sciencedirect.com/science/article/abs/pii/S0959652621003504
    [187]
    Wil van der Aalst, Arya Adriansyah, Ana Karla Alves de Medeiros, Franco Arcieri, Thomas Baier, Tobias Blickle, Jagadeesh Chandra Bose, Peter van den Brand, Ronald Brandtjen, Joos Buijs, Andrea Burattin, Josep Carmona, Malu Castellanos, Jan Claes, Jonathan Cook, Nicola Costantini, Francisco Curbera, Ernesto Damiani, Massimiliano de Leoni, Pavlos Delias, Boudewijn F. van Dongen, Marlon Dumas, Schahram Dustdar, Dirk Fahland, Diogo R. Ferreira, Walid Gaaloul, Frank van Geffen, Sukriti Goel, Christian Günther, Antonella Guzzo, Paul Harmon, Arthur ter Hofstede, John Hoogland, Jon Espen Ingvaldsen, Koki Kato, Rudolf Kuhn, Akhil Kumar, Marcello La Rosa, Fabrizio Maggi, Donato Malerba, Ronny S. Mans, Alberto Manuel, Martin McCreesh, Paola Mello, Jan Mendling, Marco Montali, Hamid R. Motahari-Nezhad, Michael zur Muehlen, Jorge Munoz-Gama, Luigi Pontieri, Joel Ribeiro, Anne Rozinat, Hugo Seguel Pérez, Ricardo Seguel Pérez, Marcos Sepúlveda, Jim Sinur, Pnina Soffer, Minseok Song, Alessandro Sperduti, Giovanni Stilo, Casper Stoel, Keith Swenson, Maurizio Talamo, Wei Tan, Chris Turner, Jan Vanthienen, George Varvaressos, Eric Verbeek, Marc Verdonk, Roberto Vigo, Jianmin Wang, Barbara Weber, Matthias Weidlich, Ton Weijters, Lijie Wen, Michael Westergaard, and Moe Wynn. 2012. Process mining manifesto. In Proceedings of the BPM 2011 International Workshops on Business Process Management. Springer, 169–194.
    [188]
    Wil M. P. van der Aalst. 2011. Intra-and inter-organizational process mining: Discovering processes within and between organizations. In Proceedings of the 4th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling. Springer, 1–11.
    [189]
    Jack G. A. J. van der Vorst, Olaf van Kooten, Willem Marcelis, Pieternel Luning, and Adrie J. M. Beulens. 2007. Quality controlled logistics in food supply chain networks: Integrated decision-making on quality and logistics to meet advanced customer demands. In Proceedings of the 14th International Conference of Annual European Operations Management Association. EurOMA.
    [190]
    Remko Van Hoek. 2001. E-supply chains – virtually non-existing. Supply Chain Management 6, 1 (2001), 21–28.
    [191]
    Diana M. Segura Velandia, Navjot Kaur, William G. Whittow, Paul P. Conway, and Andrew A. West. 2016. Towards industrial internet of things: Crankshaft monitoring, traceability and tracking using RFID. Robotics and Computer-Integrated Manufacturing 41 (2016), 66–77. https://www.sciencedirect.com/science/article/abs/pii/S0736584516300576
    [192]
    María-José Verdecho, Juan-José Alfaro-Saiz, and Raúl Rodríguez-Rodríguez. 2011. A review of factors influencing collaborative relationships. In Proceedings of the 12th IFIP WG 5.5 Working Conference on Virtual Enterprises. Springer, 535–542.
    [193]
    Nguyen Quoc Viet, Behzad Behdani, and Jacqueline Bloemhof. 2018. The value of information in supply chain decisions: A review of the literature and research agenda. Computers & Industrial Engineering 120 (2018), 68–82. https://www.sciencedirect.com/science/article/abs/pii/S0360835218301761
    [194]
    Eric Wagner, Roman Matzutt, Jan Pennekamp, Lennart Bader, Irakli Bajelidze, Klaus Wehrle, and Martin Henze. 2022. Scalable and privacy-focused company-centric supply chain management. In Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocurrency. IEEE.
    [195]
    Rene Wagner and Nadine Schimroszik. 2022. Ukraine Conflict Adds to European Supply Chain Snags. Retrieved March 21, 2022 from https://www.reuters.com/markets/europe/ukraine-conflict-adds-european-supply-chain-snags-2022-03-09/.
    [196]
    David Walters and Geoff Lancaster. 2000. Implementing value strategy through the value chain. Management Decision 38, 3 (2000), 160–178.
    [197]
    Huaiqing Wang, Kun Chen, and Dongming Xu. 2016. A maturity model for blockchain adoption. Financial Innovation 2 (2016), 12. https://link.springer.com/article/10.1186/s40854-016-0031-z#citeas
    [198]
    Michael Wang, Yong Wu, Bruce Chen, and Melissa Evans. 2020. Blockchain and supply chain management: A new paradigm for supply chain integration and collaboration. Operations and Supply Chain Management: An International Journal 14, 1 (2020), 111–122.
    [199]
    Yingli Wang, Jeong Hugh Han, and Paul Beynon-Davies. 2019. Understanding blockchain technology for future supply chains: A systematic literature review and research agenda. Supply Chain Management 24, 1 (2019), 62–84.
    [200]
    Michael E. Whitman and Herbert J. Mattord. 2011. Principles of Information Security (4th ed.). Course Technology Press.
    [201]
    Robert Wiedmer and Stanley E. Griffis. 2021. Structural characteristics of complex supply chain networks. Journal of Business Logistics 42, 2 (2021), 264–290.
    [202]
    Andreas Wieland and Carl Marcus Wallenburg. 2013. The influence of relational competencies on supply chain resilience: A relational view. International Journal of Physical Distribution & Logistics Management 43, 4 (2013), 300–320.
    [203]
    Jianghua Wu, Xin Zhai, Cheng Zhang, and Xu Liu. 2011. Sharing quality information in a dual-supplier network: A game theoretic perspective. International Journal of Production Research 49, 1 (2011), 199–214.
    [204]
    Lifang Wu, Xiaohang Yue, Alan Jin, and David C. Yen. 2016. Smart supply chain management: A review and implications for future research. The International Journal of Logistics Management 27, 2 (2016), 395–417.
    [205]
    Yue Wu and Yingfeng Zhang. 2022. An integrated framework for blockchain-enabled supply chain trust management towards smart manufacturing. Advanced Engineering Informatics 51 (2022), 101522. https://www.sciencedirect.com/science/article/abs/pii/S1474034621002706
    [206]
    Vanessa Yanes-Estévez, Ana María García-Pérez, and Juan Ramón Oreja-Rodríguez. 2019. Arcs of communication and small-and medium-sized enterprise performance. Journal of Advances in Management Research 16, 4 (2019), 625–644.
    [207]
    Zhonghua Yang and Ling Zhang. 2013. Information sharing in supply chain: A review. Journal of Digital Information Management 11, 2 (2013), 125–130.
    [208]
    Minjae Yoo and Yoojae Won. 2018. A study on the transparent price tracing system in supply chain management based on blockchain. Sustainability 10, 11 (2018), 15. https://www.mdpi.com/2071-1050/10/11/4037
    [209]
    Kamar Zekhnini, Anass Cherrafi, Imane Bouhaddou, Youssef Benghabrit, and Jose Arturo Garza-Reyes. 2020. Supply chain management 4.0: A literature review and research framework. Benchmarking: An International Journal 28, 2 (2020), 465–501.
    [210]
    Yong Zeng, Lingyu Wang, Xiaoguang Deng, Xinlin Cao, and Nafisa Khundker. 2012. Secure collaboration in global design and supply chain environment: Problem analysis and literature review. Computers in Industry 63, 6 (2012), 545–556.
    [211]
    Heyang Zhang, Dawei Hua, Chaobo Huang, Sangram Keshari Samal, Ranhua Xiong, Félix Sauvage, Kevin Braeckmans, Katrien Remaut, and Stefaan C. De Smedt. 2020. Materials and technologies to combat counterfeiting of pharmaceuticals: Current and future problem tackling. Advanced Materials 32, 11 (2020), 1905486. https://onlinelibrary.wiley.com/doi/epdf/10.1002/adma.201905486?saml_referrer
    [212]
    Xuan Zhang, Dirk Pieter van Donk, and Taco van Der Vaart. 2011. Does ICT influence supply chain management and performance? A review of survey-based research. International Journal of Operations & Production Management 31, 11 (2011), 1215–1247.
    [213]
    Ray Zhong, Xun Xu, and Lihui Wang. 2017. Food supply chain management: Systems, implementations, and future research. Industrial Management & Data Systems 117, 9 (2017), 2085–2114.
    [214]
    Honggeng Zhou and W. C. Benton Jr. 2007. Supply chain practice and information sharing. Journal of Operations Management 25, 6 (2007), 1348–1365.
    [215]
    Helmut Zsifkovits, Johannes Kapeller, Hermann Reiter, Christian Weichbold, and Manuel Woschank. 2020. Consistent Identification and Traceability of Objects as an Enabler for Automation in the Steel Processing Industry. Palgrave Macmillan, 163–192.
    [216]
    Michael Zur Mühlen and Robert Shapiro. 2010. Business Process Analytics. Springer, 137–157.

    Cited By

    View all
    • (2024)Evolving the Industrial Internet of Things: The Advent of Secure CollaborationsNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10575325(1-6)Online publication date: 6-May-2024
    • (2024)Securing Sensing in Supply Chains: Opportunities, Building Blocks, and DesignsIEEE Access10.1109/ACCESS.2024.335077812(9350-9368)Online publication date: 2024
    • (2024)The unresolved need for dependable guarantees on security, sovereignty, and trust in data ecosystemsData & Knowledge Engineering10.1016/j.datak.2024.102301151:COnline publication date: 1-May-2024
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Computing Surveys
    ACM Computing Surveys  Volume 56, Issue 2
    February 2024
    974 pages
    ISSN:0360-0300
    EISSN:1557-7341
    DOI:10.1145/3613559
    Issue’s Table of Contents
    This work is licensed under a Creative Commons Attribution-NoDerivs International 4.0 License.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 September 2023
    Online AM: 30 June 2023
    Accepted: 22 June 2023
    Revised: 06 June 2023
    Received: 24 June 2022
    Published in CSUR Volume 56, Issue 2

    Check for updates

    Author Tags

    1. Information flows
    2. data communication
    3. supply chain management
    4. data security
    5. data sharing
    6. systematic literature review

    Qualifiers

    • Survey

    Funding Sources

    • Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) under Germany's Excellence Strategy -- EXC-2023 Internet of Production
    • Alexander von Humboldt (AvH) Foundation

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2,588
    • Downloads (Last 6 weeks)259
    Reflects downloads up to 11 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Evolving the Industrial Internet of Things: The Advent of Secure CollaborationsNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10575325(1-6)Online publication date: 6-May-2024
    • (2024)Securing Sensing in Supply Chains: Opportunities, Building Blocks, and DesignsIEEE Access10.1109/ACCESS.2024.335077812(9350-9368)Online publication date: 2024
    • (2024)The unresolved need for dependable guarantees on security, sovereignty, and trust in data ecosystemsData & Knowledge Engineering10.1016/j.datak.2024.102301151:COnline publication date: 1-May-2024
    • (2024)Reputation Systems for Supply Chains: The Challenge of Achieving Privacy PreservationMobile and Ubiquitous Systems: Computing, Networking and Services10.1007/978-3-031-63989-0_24(464-475)Online publication date: 19-Jul-2024
    • (2024)Progress and Challenges in Polystyrene Recycling and UpcyclingChemSusChem10.1002/cssc.202400474Online publication date: 11-Jun-2024
    • (2023)Vision Paper: Leveraging Industrial Big Data – Past, Present, and Future of the World Wide Lab2023 IEEE International Conference on Big Data (BigData)10.1109/BigData59044.2023.10386257(1308-1313)Online publication date: 15-Dec-2023
    • (2023)Blockchain Technology Accelerating Industry 4.0Blockchains10.1007/978-3-031-32146-7_17(531-564)Online publication date: 10-Aug-2023

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media