<?xml version="1.0" encoding="utf-8" ?><rss version="2.0" xml:base="http://scrmblog.dumke.me/taxonomy/term/15/all" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:og="http://ogp.me/ns#" xmlns:article="http://ogp.me/ns/article#" xmlns:book="http://ogp.me/ns/book#" xmlns:profile="http://ogp.me/ns/profile#" xmlns:video="http://ogp.me/ns/video#" xmlns:product="http://ogp.me/ns/product#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:sioc="http://rdfs.org/sioc/ns#" xmlns:sioct="http://rdfs.org/sioc/types#" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#">
  <channel>
    <title>Risk Mitigation</title>
    <link>http://scrmblog.dumke.me/taxonomy/term/15/all</link>
    <description></description>
    <language>en</language>
     <atom:link href="http://scrmblog.dumke.me/taxonomy/term/15/all/feed" rel="self" type="application/rss+xml" />
      <item>
    <title>Impact of Product Design Changes on Supply Chain Risk</title>
    <link>http://scrmblog.dumke.me/review/impact-of-product-design-changes-on-supply-chain-risk</link>
    <description>&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/InternationalJournalOfPhysicalDistribution%26LogisticsManagement2011LinTheImpactsOfProductDesignChangesOnSupplyChainRiskACaseStudy.png?itok=XhCv-nbC&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;In theory supply chains look really nice. Some even have a serial structure with three or sometimes even only two participants.&lt;/p&gt;

	&lt;p&gt;Almost any complication to this basic theme is still the focus ongoing research, especially if risks are involved.&lt;/p&gt;

	&lt;h5&gt;Concept&lt;/h5&gt;

	&lt;p&gt;So this study focusses on the effects of requests to change the product design on the risk environment of the supply chain.&lt;/p&gt;

	&lt;p&gt;The core questions are: &lt;/p&gt;

	&lt;p&gt;&lt;blockquote&gt;&lt;/p&gt;

	&lt;ul&gt;
		&lt;li&gt;RQ1. Why do certain supply chain risks occur following design change requests from customers?&lt;/li&gt;
	&lt;/ul&gt;

	&lt;ul&gt;
		&lt;li&gt;RQ2. How do customer design changes affect supply chain risk?&lt;/li&gt;
	&lt;/ul&gt;

	&lt;p&gt;&lt;/blockquote&gt;&lt;/p&gt;

	&lt;p&gt;Figure 1 shows the concept behind these questions. The product design change is triggered by the customer. This has effects on the supply and demand side equally and induce risks within the company and supply chain.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/lin_research_concept.png&quot; title=&quot;Conceptual research framework&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/lin_research_concept-500x239.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Conceptual research framework&quot; alt=&quot;Conceptual research framework&quot; width=&quot;500&quot; height=&quot;239&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 1: Research Concept (Lin and Zhou, 2011)&lt;/span&gt;&lt;/p&gt;

	&lt;h5&gt;Method&lt;/h5&gt;

	&lt;p&gt;This study uses a &lt;em&gt;case study&lt;/em&gt; approach. And this is one of those papers, that I would recommend reading, if you are doing your own case study.&lt;/p&gt;

	&lt;p&gt;Well, first of all the documentation is really thorough and comprehensive, covering many details from one of the core sources for case study research (Yin 2009).&lt;/p&gt;

	&lt;p&gt;Secondly, it seems that execution is equally exhaustive.&lt;/p&gt;

	&lt;p&gt;Figure 2 shows the three case studies covering different supply chains for special purpose vehicles (&lt;span class=&quot;caps&quot;&gt;SPV&lt;/span&gt;). In the lower part some of the properties of the participating companies are detailed.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/lin_case_study_companies.png&quot; title=&quot;Multiple-case study&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/lin_case_study_companies-500x604.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Multiple-case study&quot; alt=&quot;Multiple-case study&quot; width=&quot;500&quot; height=&quot;604&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 2: Characteristics of the Case Companies (Lin and Zhou, 2011)&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;Within each company several interviews were conducted. 20 of them more in-depth, with up to six hour of length, and another 40 shorter/focused interviews.&lt;/p&gt;

	&lt;p&gt;Of course, an interview question guideline was used to steer the interviews and several other sources were taped to support the data gathered during the interviews. Namely, secondary documentation (company information, design drafts, process files) and archival document like sales records, customer service records, organizational records.&lt;/p&gt;

	&lt;p&gt;Finally, the authors go the long way, using several trustworthiness criteria, to constitute the validity of their research.&lt;/p&gt;

	&lt;h5&gt;Results&lt;/h5&gt;

	&lt;p&gt;Sometimes in research the focus seems to be much more on the methodological foundations than on the results. Well, that is for a reason: since the results should later be used by other researcher to built their own work on, so it is always good to build on a trusted and valid source.&lt;/p&gt;

	&lt;p&gt;But, as a regular reader you know, that I am at least as interested in the final results.&lt;/p&gt;

	&lt;p&gt;So, let&amp;#8217;s have a look at them.&lt;/p&gt;

	&lt;p&gt;First, figure 3 shows the process mapping of the &lt;span class=&quot;caps&quot;&gt;SPV&lt;/span&gt; supply chain.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/lin_supply_chain_map.png&quot; title=&quot;Process mapping of the SPV supply chain&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/lin_supply_chain_map-500x300.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Process mapping of the SPV supply chain&quot; alt=&quot;Process mapping of the SPV supply chain&quot; width=&quot;500&quot; height=&quot;300&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 3: Mapping of the Special Purpose Vehicle Supply Chain (Lin and Zhou, 2011)&lt;/span&gt;&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;The double-dotted line shows the specific processes needed to handle the customer requirements with product design change, while the single-dotted lines show the normal process. According to the case studies, the potential risks might occur in several stages marked with a pointed star.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;blockquote&gt;
		&lt;p&gt;The &lt;span class=&quot;caps&quot;&gt;SPV&lt;/span&gt; industry is a highly customized-demand market. In such a market, the &lt;span class=&quot;caps&quot;&gt;SPV&lt;/span&gt; manufacturer always faces quickly changing customer demands. The order change rate is 10-15 percent. Most of the demanded changes are related to product design. For example, changing the requirements of the chassis (new brand or new length) and tank volume are the two most common customer requests.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;The authors found the following challenges in supply chain operations:&lt;/p&gt;

	&lt;p&gt;&lt;blockquote&gt;&lt;/p&gt;

	&lt;ul&gt;
		&lt;li&gt;Lack of design capability&lt;br /&gt;
From the internal view, the most important bottleneck is lack of design capability, so manufacturers carry risk in its ability to redesign the product to meet customer requirements. Even as an important strategic partner of a “top 3” automotive company in China that has received great technical support from the relationship, manufacturer M1 itself still lacks in product design and process engineering.&lt;/li&gt;
	&lt;/ul&gt;

	&lt;ul&gt;
		&lt;li&gt;Low level of communication&lt;br /&gt;
[&amp;#8230;] Sometimes the R&amp;amp;D department accepts the product change via the sales department without informing the production department to check whether it has the necessary and available production capacity.&lt;/li&gt;
	&lt;/ul&gt;

	&lt;ul&gt;
		&lt;li&gt;Supply uncertainty&lt;br /&gt;
Product design change results in changing material and component requirements; thus, a shortage of materials, especially of key components, occurs as a vital risk to the manufacturers M1 and M2.&lt;/li&gt;
	&lt;/ul&gt;

	&lt;ul&gt;
		&lt;li&gt;Unstable production plan&lt;br /&gt;
Production plans are changed frequently to accommodate the customers’ changed requirements. Correspondingly, production processes must be interrupted to restart and adjust to the new designs. Hence, the pace of the assembly line is unstable, and it is impossible to set up a stable standard production process&lt;/li&gt;
	&lt;/ul&gt;

	&lt;ul&gt;
		&lt;li&gt;Delivery delay&lt;/li&gt;
	&lt;/ul&gt;

	&lt;ul&gt;
		&lt;li&gt;Immature regulation and policy&lt;/li&gt;
	&lt;/ul&gt;

	&lt;p&gt;&lt;/blockquote&gt;&lt;/p&gt;

	&lt;p&gt;Furthermore, the authors analyze the risks, which were mentioned during the interviews. Figure 4 summarizes the causes and effects of different risks and mitigation approaches.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/lin_risks_cause_consequence.png&quot; title=&quot;Cause effect diagram of supply chain risk in the context of product design change&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/lin_risks_cause_consequence-500x285.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Cause effect diagram of supply chain risk in the context of product design change&quot; alt=&quot;Cause effect diagram of supply chain risk in the context of product design change&quot; width=&quot;500&quot; height=&quot;285&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 4: Cause and Effects of Supply Chain Risks after Product Design Changes (click to zoom; Lin and Zhou, 2011)&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;The following core risks are affected by product design changes:&lt;/p&gt;

	&lt;ul&gt;
		&lt;li&gt;Internal risk dimension&lt;/li&gt;
	&lt;/ul&gt;

	&lt;p&gt;	&lt;ul&gt;
		&lt;li&gt;R&amp;amp;D risk&lt;/li&gt;
	&lt;/ul&gt;&lt;/li&gt;&lt;/p&gt;

	&lt;p&gt;	&lt;ul&gt;
		&lt;li&gt;Production risk&lt;/li&gt;
	&lt;/ul&gt;&lt;/li&gt;&lt;/p&gt;

	&lt;p&gt;	&lt;ul&gt;
		&lt;li&gt;Planning risk&lt;/li&gt;
	&lt;/ul&gt;&lt;/li&gt;&lt;/p&gt;

	&lt;p&gt;	&lt;ul&gt;
		&lt;li&gt;Information risk&lt;/li&gt;
	&lt;/ul&gt;&lt;/li&gt;&lt;/p&gt;

	&lt;p&gt;	&lt;ul&gt;
		&lt;li&gt;Organizational risk&lt;/li&gt;
	&lt;/ul&gt;&lt;/li&gt;&lt;/p&gt;

	&lt;ul&gt;
		&lt;li&gt;External risk dimension&lt;/li&gt;
	&lt;/ul&gt;

	&lt;p&gt;	&lt;ul&gt;
		&lt;li&gt;Supply risk&lt;/li&gt;
	&lt;/ul&gt;&lt;/li&gt;&lt;/p&gt;

	&lt;p&gt;	&lt;ul&gt;
		&lt;li&gt;Delivery risk&lt;/li&gt;
	&lt;/ul&gt;&lt;/li&gt;&lt;/p&gt;

	&lt;p&gt;	&lt;ul&gt;
		&lt;li&gt;Policy risk&lt;/li&gt;
	&lt;/ul&gt;&lt;/li&gt;&lt;/p&gt;

	&lt;p&gt;The authors conclude that: &amp;#8220;the dynamics of product design have significant impacts on the operations of the whole supply chain, including R&amp;amp;D, production, planning, information, organizational structure, supply, delivery, and policy&amp;#8221;&lt;/p&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;The authors already mention it: This research not only can prove useful for the manufacturer and its suppliers which are affected by the design changes itself. But this can also be useful for the customer itself, which then can estimate and weigh the risks connected to any changes from an original product design.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=International+Journal+of+Physical+Distribution+%26+Logistics+Management&amp;amp;rft_id=info%3Adoi%2F10.1108%2F09600031111118549&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=The+impacts+of+product+design+changes+on+supply+chain+risk%3A+a+case+study&amp;amp;rft.issn=0960-0035&amp;amp;rft.date=2011&amp;amp;rft.volume=41&amp;amp;rft.issue=2&amp;amp;rft.spage=162&amp;amp;rft.epage=186&amp;amp;rft.artnum=http%3A%2F%2Fwww.emeraldinsight.com%2F10.1108%2F09600031111118549&amp;amp;rft.au=Lin%2C+Y.&amp;amp;rft.au=Zhou%2C+L.&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other&quot;&gt;Lin, Y., &amp;amp; Zhou, L. (2011). The impacts of product design changes on supply chain risk: a case study &lt;span style=&quot;font-style: italic;&quot;&gt;International Journal of Physical Distribution &amp;amp; Logistics Management, 41&lt;/span&gt; (2), 162-186 DOI: &lt;a rev=&quot;review&quot; href=&quot;http://dx.doi.org/10.1108/09600031111118549&quot;&gt;10.1108/09600031111118549&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/15/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--2&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give Impact of Product Design Changes on Supply Chain Risk 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give Impact of Product Design Changes on Supply Chain Risk 2/5&lt;/option&gt;&lt;option value=&quot;60&quot;&gt;Give Impact of Product Design Changes on Supply Chain Risk 3/5&lt;/option&gt;&lt;option value=&quot;80&quot;&gt;Give Impact of Product Design Changes on Supply Chain Risk 4/5&lt;/option&gt;&lt;option value=&quot;100&quot; selected=&quot;selected&quot;&gt;Give Impact of Product Design Changes on Supply Chain Risk 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-RPUn97hgrhTJbpCq8iqxRVMAzCAqKm3f5kihpQ1AGVs&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/product-design&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;product design&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 21 May 2012 14:06:24 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1801 at http://scrmblog.dumke.me</guid>
  </item>
  <item>
    <title>Management of Vulnerabilities in the UK Aerospace Industry</title>
    <link>http://scrmblog.dumke.me/review/management-of-vulnerabilities-in-the-uk-aerospace-industry</link>
    <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/review/supply-chain-risk-management-for-smes-in-automotive-scs&quot; title=&quot;SCRM Blog: Supply Chain Risk Management for SMEs in Automotive SCs&quot;&gt;Just recently&lt;/a&gt; I took a closer look at some aspects of supply chain risk management in the automotive supply chain. Within limits insights gained from this industry could also be transferred to other examples.&lt;/p&gt;

	&lt;p&gt;Today I review an early work focussing on another manufacturing industry: the UK aerospace manufacturers.&lt;/p&gt;

	&lt;h5&gt;Method&lt;/h5&gt;

	&lt;p&gt;In 2003 Haywood and Peck published their findings of a case study. These covered the foundations of how the companies understand of supply chain risk management. They also reported on some of the risk measures used by the participating companies.&lt;/p&gt;

	&lt;p&gt;All in all 47 semi-structured interviews were conducted with managers of differing levels in the aerospace supply chain.&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;This purposive sampling allowed multiple levels of the supply chain networks to be included in the study, ranging from the focal firm’s customer (purchasing organisations for the armed forces of national governments), through two tiers of suppliers above the Prime. In addition, input came from two industry bodies representing small and medium enterprises (&lt;span class=&quot;caps&quot;&gt;SME&lt;/span&gt;s) nestling in the higher reaches of the supply networks. It was clear however that at least six or seven tiers existed upstream of the Prime Contractor and downstream the final consumers (pilots and other users) remained unvisited.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;As you can see the authors were quite blunt about the limitations of their endeavor to analyze the complete network. Though this constraint should not be taken too seriously, since this study aimed for a preliminary sketch of the status quo only.&lt;/p&gt;

	&lt;h5&gt;Key findings: Risk sources&lt;/h5&gt;

	&lt;p&gt;The first findings come from the assessment of the risk sources faced by the interviewees.&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;First, the respondents did not deal with either the precise geographical location of a problem or on the impact of other ‘external’ sources of risks. [&amp;#8230;]&lt;br /&gt;
In fact several of the managers interviewed related the sources of risk directly back to the Critical Success Factors (&lt;span class=&quot;caps&quot;&gt;CSF&lt;/span&gt;s) for the focal firm’s Strategic Supplier and Commodity Management processes: Cost Focussed Decisions; Extreme Quality/Performance Requirements; Delivery Schedule Adherence; Customer-Supplier Relationships. [&amp;#8230;]&lt;br /&gt;
Nevertheless, the examples put forward by interviewees highlighted tensions between them. The link between interviewees’ perceptions of ‘sources of risk’ and process &lt;span class=&quot;caps&quot;&gt;CSF&lt;/span&gt;s was upheld by members of the industry focus groups involved in the validation exercise. [&amp;#8230;]&lt;br /&gt;
The second theme to emerge was that managers frequently defined a source of risk with reference to acknowledged or perceived constraints imposed by the nature of the product and the structure of the industry.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;Furthermore, many interviewees acknowledged that their supply chain is most vulnerable during times of change, but also that change is a constant state in their supply chain activities. &lt;/p&gt;

	&lt;h5&gt;Key findings: Tools&lt;/h5&gt;

	&lt;p&gt;The second stream of findings analyzes the tools and techniques, which were employed by the companies.&lt;br /&gt;
The authors therefore divide the realm of supply chain management into three tool categories: Supply Chain Planning, Supply Chain Management and Supply Chain Change Management (figure 1).&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/haywood_categories.png&quot; title=&quot;The Spectrum of Supply Chain Management Activity&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/haywood_categories-500x111.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;The Spectrum of Supply Chain Management Activity&quot; alt=&quot;The Spectrum of Supply Chain Management Activity&quot; width=&quot;500&quot; height=&quot;111&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;image_comment&quot;&gt;Figure 1: Continuum of Supply Chain Management Activities (From Strategic to Operational; Haywood and Peck, 2003)&lt;/span&gt;&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;The extreme left of the spectrum is occupied by pure supply chain planning, which in an ‘ideal world’ would be unencumbered by the legacy commitments of existing production facilities or supplier contracts. The right by pure supply chain management actives. These are the day-to-day activities undertaken in the management of a mature established supply chain.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;Figure 2 summarizes the tools used by or considered useful (marked in italics), by the interviewed managers.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/haywood_measures.png&quot; title=&quot;Summary of Tools and Techniques&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/haywood_measures-500x725.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Summary of Tools and Techniques&quot; alt=&quot;Summary of Tools and Techniques&quot; width=&quot;500&quot; height=&quot;725&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;image_comment&quot;&gt;Figure 2: Selected Measures to mitigate Supply Chain Risks (Haywood and Peck, 2003; click to zoom)&lt;/span&gt;&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;However, it is important to recognise that Figure 2 represents only a summary of what is or could be in use somewhere in the network.&lt;br /&gt;
[Also it should be recognized, that] other tools and mitigation techniques again suggest contradictory requirements. For example, to mitigate cost-related risks, lean manufacturing techniques were being used (Set 5), while elsewhere someone is using inventory, capacity and capability buffers on a regular or temporary basis to mitigate delivery or schedule adherence problems (Set 7 and 11).&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;h5&gt;Key findings: Implementation&lt;/h5&gt;

	&lt;p&gt;Lastly, the authors took a look at the obstacles preventing implementation of the tools.&lt;br /&gt;
Three key factors were unveiled.&lt;/p&gt;

	&lt;p&gt;&lt;blockquote&gt;
	&lt;ul&gt;
		&lt;li&gt;The first was staff training, there was quite a widespread recognition that existing tools could be much more effective if implemented correctly.&lt;/li&gt;
		&lt;li&gt;The second was widespread confusion over terminology.&lt;br /&gt;
The research revealed that there was absence of a common understanding of the scope or extent of supply chain risk management, muc h of it relating to confusing and contradictory interpretations of ‘supply chain’.&lt;/li&gt;
		&lt;li&gt;The third issue was visibility.&lt;br /&gt;
&lt;/blockquote&gt;&lt;/li&gt;
	&lt;/ul&gt;&lt;/p&gt;

	&lt;p&gt;Based on the findings the authors developed three methods to help improve implementation.&lt;br /&gt;
&lt;blockquote&gt;
	&lt;ul&gt;
		&lt;li&gt;Method 1, a ‘go it alone’ option was motivated by the possibility of achieving competitive advantage over rival organisations through exclusive or advanced identification of sources of risk. For example, if the consequences of an anticipated event were expected to disrupt others in the same industry sector, an organisation might gain advantage by simply improving its tolerance relative to its competitors.&lt;/li&gt;
		&lt;li&gt;The second method tabled was a more limited audit encompassing the focal firm, its immediate customers and suppliers. The method involves organisations acting collaboratively, in interlocking risk management relationships to produce overlapping information flows all along the supply chains. Such an approach would allow organisations to identify relevant sources of risk within their locus of control or immediate supply chain vicinity and enjoy the confidence that others were doing the same.&lt;/li&gt;
		&lt;li&gt;Method 3 was an extension of Method 2, based on interviewees’ suggestions that the effectiveness of their current management tools would be improved by the introduction of a shared data environment. It was felt that this would significantly reduce the commercial risks attached to sub-optimal supply chain performance. The majority of interviewees considered Method 3 to be sound in principle. It reflected the frequently expressed view that improved sharing of data would lead to consequential improvements in profitability and facilitate the continuous improvement practices that contribute to longer term supply chain health. &lt;br /&gt;
&lt;/blockquote&gt;&lt;/li&gt;
	&lt;/ul&gt;&lt;/p&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;This research gives an glimpse into the early stages of risk management in supply chains in the UK around the turn of the millennium.&lt;br /&gt;
For many companies and supply chains the detected problems still exist.&lt;br /&gt;
Two tasks still remain: First, opening the eyes of decision makers to include a trans-corporate view on risks and embrace supply chain strategies to battle supply chain risks. Ergo, applying holistic system thinking to system problems.&lt;/p&gt;

	&lt;p&gt;Second, finding ways to circumvent the implementation obstacles. How can risks be reduced without compromising the competitiveness and autonomy of the focal company?&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/2003HaywoodImprovingTheManagementOfSupplyChainVulnera-BilityInUkAerospaceManufacturing.png?itok=A-ysD7j0&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=Proceedings+of+the+first+EUROMA%2FPOMS+Conference&amp;amp;rft_id=info%3A%2F&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=Improving+the+Management+of+Supply+Chain+Vulnerability+in+UK+Aerospace+Manufacturing&amp;amp;rft.issn=&amp;amp;rft.date=2003&amp;amp;rft.volume=2&amp;amp;rft.issue=&amp;amp;rft.spage=121&amp;amp;rft.epage=130&amp;amp;rft.artnum=&amp;amp;rft.au=Haywood%2C+M.&amp;amp;rft.au=Peck%2C+H.&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other%2CBusiness+Management%2C+Supply+Chain+Management&quot;&gt;Haywood, M., &amp;amp; Peck, H. (2003). Improving the Management of Supply Chain Vulnerability in UK Aerospace Manufacturing &lt;span style=&quot;font-style: italic;&quot;&gt;Proceedings of the first EUROMA/POMS Conference, 2&lt;/span&gt;, 121-130&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/15/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget--2&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--4&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give Management of Vulnerabilities in the UK Aerospace Industry 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give Management of Vulnerabilities in the UK Aerospace Industry 2/5&lt;/option&gt;&lt;option value=&quot;60&quot;&gt;Give Management of Vulnerabilities in the UK Aerospace Industry 3/5&lt;/option&gt;&lt;option value=&quot;80&quot; selected=&quot;selected&quot;&gt;Give Management of Vulnerabilities in the UK Aerospace Industry 4/5&lt;/option&gt;&lt;option value=&quot;100&quot;&gt;Give Management of Vulnerabilities in the UK Aerospace Industry 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit--2&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-DX02AWpEjGbtqxthPqa-OepOzwRWrKOo02V3FVDxNjE&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/aerospace&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;aerospace&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/case-study&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;case study&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/implementation&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;implementation&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-count-pixel field-type-text-long field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;&lt;img src=&quot;http://vg05.met.vgwort.de/na/8458bd40653d4f3fbc4c3cfa8795bada&quot; width=&quot;1&quot; height=&quot;1&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 14 May 2012 13:40:33 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1799 at http://scrmblog.dumke.me</guid>
  </item>
  <item>
    <title>Supply Chain Risk Management for SMEs in Automotive SCs</title>
    <link>http://scrmblog.dumke.me/review/supply-chain-risk-management-for-smes-in-automotive-scs</link>
    <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;When it comes to supply chain management some positions within the network have better chances of fighting supply chain risks, due to structural and negotiating-power-related issues.&lt;/p&gt;

	&lt;p&gt;In this case the focus is on a supplier of a automotive &lt;span class=&quot;caps&quot;&gt;OEM&lt;/span&gt;. Natural hedging, as defined below, is the core strategy analyzed in this study.&lt;/p&gt;

	&lt;h5&gt;Natural hedging&lt;/h5&gt;

	&lt;p&gt;The author utilizes a literature review to found his conceptual approach.&lt;/p&gt;

	&lt;p&gt;He defines natural hedging as &amp;#8220;an instrument of real economical risk management, where transactions are hedged through real economic counter deals.&amp;#8221;&lt;/p&gt;

	&lt;p&gt;The term &amp;#8220;natural&amp;#8221; is seen as a contrast to immaterial hedging using financial derivatives.&lt;/p&gt;

	&lt;p&gt;This strategy can be employed to mitigate price risk of commodities.&lt;/p&gt;

	&lt;h5&gt;Theoretical case&lt;/h5&gt;

	&lt;p&gt;The author develops the following theoretical case study with three echelons: tier 2 supplier, tier 1 supplier (focal company) and the &lt;span class=&quot;caps&quot;&gt;OEM&lt;/span&gt;.&lt;/p&gt;

	&lt;p&gt;Tier 2 supplier is located within a different currency area.&lt;/p&gt;

	&lt;p&gt;In the short run there are no substitute products available for the &lt;span class=&quot;caps&quot;&gt;OEM&lt;/span&gt; and vice-versa there is no other demand for the tier 1 supplier than the &lt;span class=&quot;caps&quot;&gt;OEM&lt;/span&gt;.&lt;/p&gt;

	&lt;p&gt;For the tier 1 supplier the following risks can be observed:&lt;/p&gt;

	&lt;p&gt;&lt;blockquote&gt;&lt;/p&gt;

	&lt;ul&gt;
		&lt;li&gt;Owing to relatively small purchase quantities, a potential risk of unavailability exists for the &lt;span class=&quot;caps&quot;&gt;SME&lt;/span&gt;-supplier. This could probably be expected if the Tier 2-commodity supplier has capacity constraints and thus prefers to supply larger customers.&lt;/li&gt;
	&lt;/ul&gt;

	&lt;ul&gt;
		&lt;li&gt;Because of volatile commodity prices on the world market, the &lt;span class=&quot;caps&quot;&gt;SME&lt;/span&gt;-supplier faces a price risk for the required raw materials. An adequate hedge of single components with &amp;#8220;classical&amp;#8221; financial derivatives is difficult, due to limited management capacities and lack of know-how. In addition, respective fees for listed hedges hamper an economic execution of futures or options contracts.&lt;/li&gt;
	&lt;/ul&gt;

	&lt;ul&gt;
		&lt;li&gt;Continuous fluctuations on the derivative markets, as well as exclusive activities in currency area B on the purchasing side, and on the sales side in currency area A, lead to a currency risk for the &lt;span class=&quot;caps&quot;&gt;SME&lt;/span&gt;-supplier. Cost-intensive development of currency management or billable usage of hedging instruments prevents an economic reduction of currency risks.&lt;/li&gt;
	&lt;/ul&gt;

	&lt;p&gt;&lt;/blockquote&gt;&lt;/p&gt;

	&lt;p&gt;The &lt;span class=&quot;caps&quot;&gt;OEM&lt;/span&gt; on the other hand also faces risks:&lt;/p&gt;

	&lt;p&gt;&lt;blockquote&gt;&lt;/p&gt;

	&lt;ul&gt;
		&lt;li&gt;The &lt;span class=&quot;caps&quot;&gt;SME&lt;/span&gt;-supplier&amp;#8217;s accumulated risks could lead to non-availability of input goods for the &lt;span class=&quot;caps&quot;&gt;OEM&lt;/span&gt;, due to supply bottlenecks or even insolvency. This would trigger unemployment, damage the company&amp;#8217;s image or force the award of supplementary grants, in order to finance damage limitation activities.&lt;/li&gt;
	&lt;/ul&gt;

	&lt;ul&gt;
		&lt;li&gt;Like the supplier, the &lt;span class=&quot;caps&quot;&gt;OEM&lt;/span&gt; is exposed to many commodity price and currency risks. It does, however, possess larger resources to deal with single risk sources within the scope of supply chain risk management.&lt;/li&gt;
	&lt;/ul&gt;

	&lt;p&gt;&lt;/blockquote&gt;&lt;/p&gt;

	&lt;p&gt;The flow of goods and money in the initial situation is displayed in figure 1.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/hofmann_status_quo.png&quot; title=&quot;Initial situation of the supplier-buyer-relation in a supply chain without natural hedging&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/hofmann_status_quo-500x287.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Initial situation of the supplier-buyer-relation in a supply chain without natural hedging&quot; alt=&quot;Initial situation of the supplier-buyer-relation in a supply chain without natural hedging&quot; width=&quot;500&quot; height=&quot;287&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 1: Case Study Supply Chain (Hofmann, 2011)&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;Figure 2 shows the implementation of a financial hedge. If the &lt;span class=&quot;caps&quot;&gt;OEM&lt;/span&gt; also has end-customers in the currency area B, it would be possible to have the &lt;span class=&quot;caps&quot;&gt;OEM&lt;/span&gt; directly pay the tier 2 supplier in currency B using the money obtained by the customers.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/hofmann_financial.png&quot; title=&quot;Natural hedging in supply chains with a financial component - financial hedge&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/hofmann_financial-500x282.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Natural hedging in supply chains with a financial component - financial hedge&quot; alt=&quot;Natural hedging in supply chains with a financial component - financial hedge&quot; width=&quot;500&quot; height=&quot;282&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 2: Natural Hedge using an purely Financial Angle (Hofmann, 2011)&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;In figure 3 a natural hedge is conducted which focusses on a re-design of the supply chain structure:&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/hofmann_physical.png&quot; title=&quot;Natural hedging in supply chains with a physical component - physical hedge&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/hofmann_physical-500x293.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Natural hedging in supply chains with a physical component - physical hedge&quot; alt=&quot;Natural hedging in supply chains with a physical component - physical hedge&quot; width=&quot;500&quot; height=&quot;293&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 3: Natural Hedge using a Physical Angle (Hofmann, 2011)&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;&lt;blockquote&gt;&lt;/p&gt;

	&lt;p&gt;The &lt;span class=&quot;caps&quot;&gt;OEM&lt;/span&gt; shall (for now) not be active in the currency area B. Nonetheless, it takes over currency risk and pays the Tier 2-commodity supplier directly in the respective currency. The flow of materials is also &amp;#8220;reorganized and not carried out through the Tier 1-supplier, but initially through the &lt;span class=&quot;caps&quot;&gt;OEM&lt;/span&gt;. This alternative, which corresponds to a &amp;#8220;vertical purchasing cooperation&amp;#8221; or a centralized purchasing approach on the network level [&amp;#8230;]. Due to the modified flows of materials, it is called &amp;#8220;physical component of natural hedging in supply chains&amp;#8221; or for short: &amp;#8220;physical hedge&amp;#8221;. In this version, the &lt;span class=&quot;caps&quot;&gt;OEM&lt;/span&gt; carries the sole supply risk for purchased commodities.&lt;/p&gt;

	&lt;p&gt;&lt;/blockquote&gt;&lt;/p&gt;

	&lt;p&gt;Overall, the risk management costs in a supply chain section can be reduced through die natural hedging approach on the network level, since the costs to hedge single risks arc higher for one actor than the costs for harmonized hedging of bundled risks.&lt;/p&gt;

	&lt;h5&gt;Results&lt;/h5&gt;

	&lt;p&gt;Beside this theoretical foundation the author calculates an example with figures for the steel-price-fluctuations in 2008.&lt;/p&gt;

	&lt;p&gt;The following advantages can be summarized (figure 4):&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/hofmann_pros.png&quot; title=&quot;Supply chain situation without and with natural hedging&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/hofmann_pros-500x154.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Supply chain situation without and with natural hedging&quot; alt=&quot;Supply chain situation without and with natural hedging&quot; width=&quot;500&quot; height=&quot;154&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 4: Advantages of Natural Hedging for the Stakeholders (Hofmann, 2011)&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;The author prescribes the following process to implement the natural hedging.&lt;/p&gt;

	&lt;p&gt;&lt;blockquote&gt;&lt;/p&gt;

	&lt;ol&gt;
		&lt;li&gt;Preparation of managerial prerequisites, as well as examination of contractual and legal framework.&lt;/li&gt;
	&lt;/ol&gt;

	&lt;ol&gt;
		&lt;li&gt;Business model decision and concept evaluation.&lt;/li&gt;
	&lt;/ol&gt;

	&lt;ol&gt;
		&lt;li&gt;Ramp-up and organizational integration.&lt;/li&gt;
	&lt;/ol&gt;

	&lt;ol&gt;
		&lt;li&gt;Performance measurement of results.&lt;/li&gt;
	&lt;/ol&gt;

	&lt;p&gt;&lt;/blockquote&gt;&lt;/p&gt;

	&lt;p&gt;The following issues should be considered:&lt;/p&gt;

	&lt;p&gt;&lt;blockquote&gt;&lt;/p&gt;

	&lt;ul&gt;
		&lt;li&gt;&lt;em&gt;Framework contract model.&lt;/em&gt; The &lt;span class=&quot;caps&quot;&gt;OEM&lt;/span&gt; signs the contract with the pre-material Tier 2-suppliers. Part of the framework contract is usually a quantity purchasing structure, serving as a target figure for a certain amount of time.&lt;/li&gt;
	&lt;/ul&gt;

	&lt;ul&gt;
		&lt;li&gt;&lt;em&gt;Coaching model.&lt;/em&gt; The &lt;span class=&quot;caps&quot;&gt;OEM&lt;/span&gt; takes on the role of the &amp;#8220;purchasing advisor&amp;#8221;, supplying his &lt;span class=&quot;caps&quot;&gt;SME&lt;/span&gt;-suppliers with information about purchasing sources and prices of the needed raw and prc-material, as well as financing alternatives.&lt;/li&gt;
	&lt;/ul&gt;

	&lt;ul&gt;
		&lt;li&gt;&lt;em&gt;Trade model.&lt;/em&gt; Within this resale or buy-sell approach, the &lt;span class=&quot;caps&quot;&gt;OEM&lt;/span&gt; is the broker for prc-material. Thereby, he typically waits to purchase from the commodity Tier 2-supplier until an order from the Tier 1-supplier-basis comes in (order pass-dirough).&lt;/li&gt;
	&lt;/ul&gt;

	&lt;ul&gt;
		&lt;li&gt;&lt;em&gt;Procurement service provider model.&lt;/em&gt; The use of a procurement service provider constitutes the intersection point between the supplier and his assortment and the &lt;span class=&quot;caps&quot;&gt;OEM&lt;/span&gt;. The &lt;span class=&quot;caps&quot;&gt;OEM&lt;/span&gt; signs a framework contract with the service provider about die purchase of materials or product groups. This could also include financial aspects (e.g. prc-financing conditions or payment terms for the Tier 1-suppliers).&lt;/li&gt;
	&lt;/ul&gt;

	&lt;ul&gt;
		&lt;li&gt;&lt;em&gt;Marketplace model.&lt;/em&gt; Within such an &amp;#8220;infomediary&amp;#8221; model, the &lt;span class=&quot;caps&quot;&gt;OEM&lt;/span&gt; initiates a platform (often a web-based E- marketplacc), through which suppliers can mutually access pre-material suppliers or pre-material offers. This model could also include payment processing in the&lt;/li&gt;
	&lt;/ul&gt;

	&lt;p&gt;supply chain.&lt;/p&gt;

	&lt;p&gt;&lt;/blockquote&gt;&lt;/p&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;Not only natural disasters pose risks to supply chains. Also ordinary price changes can pose a threat to the profitability of a company.&lt;/p&gt;

	&lt;p&gt;But those risks have been on the risk management agenda for quite some time now. Still, supply chain risk management enables companies to handle some risks differently and natural hedging as described here may be one option.&lt;/p&gt;

	&lt;p&gt;Even though the empirical support for this strategy presented in this paper is quite weak, it should give food for thought and using some concrete figures should help with the decision if and how such a strategy might help your company, be it &lt;span class=&quot;caps&quot;&gt;OEM&lt;/span&gt; or supplier.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/TN_hofmann_physical.png?itok=k-t40_3S&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=Supply+Chain+Management%3A+An+International+Journal&amp;amp;rft_id=info%3Adoi%2F10.1108%2F13598541111115374&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=Natural+hedging+as+a+risk+prophylaxis+and+supplier+financing+instrument+in+automotive+supply+chains&amp;amp;rft.issn=1359-8546&amp;amp;rft.date=2011&amp;amp;rft.volume=16&amp;amp;rft.issue=2&amp;amp;rft.spage=128&amp;amp;rft.epage=141&amp;amp;rft.artnum=http%3A%2F%2Fwww.emeraldinsight.com%2F10.1108%2F13598541111115374&amp;amp;rft.au=Hofmann%2C+E.&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other%2CBusiness+Management%2C+Supply+Chain+Management&quot;&gt;Hofmann, E. (2011). Natural hedging as a risk prophylaxis and supplier financing instrument in automotive supply chains &lt;span style=&quot;font-style: italic;&quot;&gt;Supply Chain Management: An International Journal, 16&lt;/span&gt; (2), 128-141 DOI: &lt;a rev=&quot;review&quot; href=&quot;http://dx.doi.org/10.1108/13598541111115374&quot;&gt;10.1108/13598541111115374&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/15/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget--3&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--6&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give Supply Chain Risk Management for SMEs in Automotive SCs 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give Supply Chain Risk Management for SMEs in Automotive SCs 2/5&lt;/option&gt;&lt;option value=&quot;60&quot;&gt;Give Supply Chain Risk Management for SMEs in Automotive SCs 3/5&lt;/option&gt;&lt;option value=&quot;80&quot; selected=&quot;selected&quot;&gt;Give Supply Chain Risk Management for SMEs in Automotive SCs 4/5&lt;/option&gt;&lt;option value=&quot;100&quot;&gt;Give Supply Chain Risk Management for SMEs in Automotive SCs 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit--3&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-n_89KgkY_lpIM0AQBLOb7hDvJ_g6a04-Qc2JlwAr5bE&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/small-companies&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;small companies&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/strategies&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Strategies&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/hedging&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;hedging&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-count-pixel field-type-text-long field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;&lt;img src=&quot;http://vg05.met.vgwort.de/na/846f0746b1df4751afefd6281101fca0&quot; width=&quot;1&quot; height=&quot;1&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 30 Apr 2012 14:02:46 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1795 at http://scrmblog.dumke.me</guid>
  </item>
  <item>
    <title>Conceptual and Analytical Framework for SCRM</title>
    <link>http://scrmblog.dumke.me/review/conceptual-and-analytical-framework-for-scrm</link>
    <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;A supply chain risk management framework should help to define the cornerstones of risk related supply chain problems and give hints on how to take actions to mitigate impending disruptions.&lt;/p&gt;

	&lt;p&gt;Today&amp;#8217;s full paper has been published in 2004 and in it the authors (Gaonkar and Viswanadham) deal with this problem.&lt;/p&gt;

	&lt;h5&gt;Core definitions&lt;/h5&gt;

	&lt;p&gt;At the core of their framework the authors define the risk/supply chain related terms.&lt;/p&gt;

	&lt;p&gt;First, risks can be seen from an organizational-, supply chain- or industry-level. &lt;/p&gt;

	&lt;p&gt;&lt;blockquote&gt;&lt;br /&gt;
Network- related risk sources represent the second category of risk sources, which are the primary focus of this paper. These risks are of two broad kinds:
	&lt;ol&gt;
		&lt;li&gt;Firms are vulnerable not only to attacks on their own assets, but also to attacks on their suppliers, customers, transportation providers, communication lines, and other elements in their eco-system.&lt;/li&gt;
		&lt;li&gt;Firms are also vulnerable to irregular behavior of their network partners such as a supplier sharing sensitive product design with a competitor manufacturer.&lt;br /&gt;
&lt;/blockquote&gt;&lt;/li&gt;
	&lt;/ol&gt;&lt;/p&gt;

	&lt;p&gt;Second, there are different classes of risk problems:
	&lt;ul&gt;
		&lt;li&gt;Deviations: &amp;#8220;A deviation is said to have occurred when one or more parameters, such as cost, demand, lead-time, etc., within the supply chain system stray from their expected or mean value, without any changes to the underlying supply chain structure.&amp;#8221;&lt;/li&gt;
		&lt;li&gt;Disruptions: &amp;#8220;A disruption occurs when the structure of the supply chain system is radically transformed, through the non-availability of certain production, warehousing and distribution facilities or transportation options due to unexpected events caused by human or natural factors.&amp;#8221;&lt;/li&gt;
		&lt;li&gt;Disasters: &amp;#8220;A disaster is defined as a temporary irrecoverable shut-down of the supply chain network due to unforeseen catastrophic system-wide disruptions.&amp;#8221;&lt;/li&gt;
	&lt;/ul&gt;&lt;/p&gt;

	&lt;p&gt;This classification also contains an implicit rating of the risk impact and while it is possible to create a robust supply chain which can withstand deviations and disruptions &amp;#8220;it is impossible to design a supply chain network that is robust enough to react to disasters. This arises from the constraints of any system design, which is limited by its operational specification.&amp;#8221;&lt;/p&gt;

	&lt;p&gt;The authors require the supply chains to be robust at three levels: the strategic, tactical and operational level. So each of these levels has to be prepared for deviations, disruptions and disasters.&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;For example, at the operational level, companies require decision support systems that can act on information from various partners regarding various deviations and disruptions to reschedule activities so that the business processes are synchronized and deliveries are undertaken within customer delivery windows and cost limitations. At the tactical level, plans need to have redundancies in terms of human and machine resources and also logistics and supply organizations. At the strategic level, more reliable partners with intrinsic capabilities in deviation and disruption handling, and the skills and ability to adapt to changing market conditions will be preferred and selected.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;There are two distinct ways to supply chain risk mitigation:
	&lt;ul&gt;
		&lt;li&gt;&amp;#8220;The first approach involves the time tested “just in case” way of maintaining inventories all along the chain, employing dual or multi-sourcing and manufacturing at multiple sites. This is a highly inefficient option.&amp;#8221;&lt;/li&gt;
		&lt;li&gt;&amp;#8220;A better option would be to first design a sourcing strategy taking into account the disruption costs for the most relevant failure modes and then putting in place contingency plans for each disruption that include both description of the procedures to follow and a definition of roles and responsibilities.&amp;#8221;&lt;/li&gt;
	&lt;/ul&gt;&lt;/p&gt;

	&lt;p&gt;The authors distinguish three analytical approaches to risk management:
	&lt;ul&gt;
		&lt;li&gt;Mathematical planning models,&lt;/li&gt;
		&lt;li&gt;Adaptive control, and&lt;/li&gt;
		&lt;li&gt;Rule-based control.&lt;br /&gt;
And they continue to explain their preventive and interceptive approaches to risk management. Some of which can be found summarized in &lt;a href=&quot;http://scrmblog.dumke.me/review/exception-handling-for-robust-supply-chain-design&quot; title=&quot;SCRM Blog: Exception Handling for Robust Supply Chain Design&quot;&gt;this article in the blog&lt;/a&gt;.&lt;/li&gt;
	&lt;/ul&gt;&lt;/p&gt;

	&lt;h5&gt;Results&lt;/h5&gt;

	&lt;p&gt;Based on their framework of supply chain risks the authors develop two strategic level (mathematical) models which include risk considerations.&lt;br /&gt;
&lt;blockquote&gt;
	&lt;ol&gt;
		&lt;li&gt;Strategic-level Deviation Management Model: Given the expected costs and variability (deviation) of costs for all suppliers, the first problem relates to the selection of an optimal group of suppliers such that the expected cost of operating the entire supply chain and the risk of variations in total supply chain costs is minimized.&lt;/li&gt;
		&lt;li&gt;Strategic-level Disruption Management Model: Given the expected probabilities for various supplier disruption scenarios and the supply shortfalls under each of these scenarios the objective for the manufacturer is to choose a set of suppliers that minimize the expected shortfall during the operation of the supply chain.&lt;br /&gt;
&lt;/blockquote&gt;&lt;/li&gt;
	&lt;/ol&gt;&lt;/p&gt;

	&lt;p&gt;With the models numerical example case studies are executed and the authors conclude:&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;Robustness is build into our supply chain design by selecting a portfolio of suppliers that minimize the variability of supply chain performance in terms of cost and output. The models we develop are preventive in nature and employ mathematical programming tools.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;This article is a double publication, the models and their results have already been discussed &lt;a href=&quot;http://scrmblog.dumke.me/review/exception-handling-for-robust-supply-chain-design&quot; title=&quot;SCRM Blog: Exception Handling for Robust Supply Chain Design&quot;&gt;here&lt;/a&gt;. Even though this is questionable behavior from a scientific point I did include this article due to the good and aggregated summary of the terms and definitions used in the field of supply chain risk management. &lt;br /&gt;
Using those as a minimum to analyze supply chains can already help a great deal in finding fitting mitigation strategies.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/RoboticsAndAutomation2004.Proceedings.Icra%2704.2004IeeeInternationalConferenceOn2005GaonkarAConceptualAndAnalyticalFrameworkForTheManagementOfRiskInSupplyChains.png?itok=23jrt7sB&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=Robotics+and+Automation&amp;amp;rft_id=info%3A%2F&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=A+Conceptual+and+Analytical+Framework+for+the+Management+of+Risk+in+Supply+Chains&amp;amp;rft.issn=&amp;amp;rft.date=2005&amp;amp;rft.volume=3&amp;amp;rft.issue=&amp;amp;rft.spage=2699&amp;amp;rft.epage=2704&amp;amp;rft.artnum=&amp;amp;rft.au=Gaonkar%2C+R.&amp;amp;rft.au=Viswanadham%2C+N.&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other%2CBusiness+Management%2C+Supply+Chain+Management&quot;&gt;Gaonkar, R., &amp;amp; Viswanadham, N. (2005). A Conceptual and Analytical Framework for the Management of Risk in Supply Chains &lt;span style=&quot;font-style: italic;&quot;&gt;Robotics and Automation, 3&lt;/span&gt;, 2699-2704&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/15/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget--4&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--8&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give Conceptual and Analytical Framework for SCRM 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give Conceptual and Analytical Framework for SCRM 2/5&lt;/option&gt;&lt;option value=&quot;60&quot;&gt;Give Conceptual and Analytical Framework for SCRM 3/5&lt;/option&gt;&lt;option value=&quot;80&quot; selected=&quot;selected&quot;&gt;Give Conceptual and Analytical Framework for SCRM 4/5&lt;/option&gt;&lt;option value=&quot;100&quot;&gt;Give Conceptual and Analytical Framework for SCRM 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit--4&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-OLkjtAs4x_M26LlaSkEF9iPqckIa_1TfsO2goqXSmwU&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/framework&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;framework&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/supply-chain&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;supply chain&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/disruption&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;disruption&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-count-pixel field-type-text-long field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 12 Mar 2012 18:18:16 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1782 at http://scrmblog.dumke.me</guid>
  </item>
  <item>
    <title>Managing Global Sourcing Risk</title>
    <link>http://scrmblog.dumke.me/review/managing-global-sourcing-risk</link>
    <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;Probably most companies source at least some parts for their products from global sources. This could be the steel from Australia, electronics from Taiwan or cloth from India. The reasons for international sourcing usually include cost and quality, which might be superior compared to local sources.&lt;/p&gt;

	&lt;p&gt;On the other hand longer shipment ways and less direct access and control may also increase the risks of quality failures, delays or even disruptions.&lt;/p&gt;

	&lt;p&gt;So at the moment a lot of companies struggle to find the right balance between increased risks and reduced cost in international sourcing. This study gives an inside view into fifteen companies and how they handle risks related to global sourcing, and therefore this overview is a good example for current practices in the field of supply chain risk mitigation.&lt;/p&gt;

	&lt;h5&gt;Method&lt;/h5&gt;

	&lt;p&gt;The authors still see a gap in the knowledge about how other companies analyze their sourcing related risks and how these risks are mitigated by them.&lt;/p&gt;

	&lt;p&gt;Therefore they use a multiple case study approach with 15 cases / companies within seven industries. In each company several information sources were tapped, including expert interviews.&lt;/p&gt;

	&lt;p&gt;Afterwards the authors compared the individual results in a cross case analysis.&lt;/p&gt;

	&lt;h5&gt;Sourcing globally&lt;/h5&gt;

	&lt;p&gt;But first the authors start with a literature analysis to analyze the reasons and risks of global sourcing.&lt;/p&gt;

	&lt;p&gt;Figure 1 shows their results regarding the advantages and risks of sourcing globally.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/christopher%20global%20sourcing%20advantages%20and%20risks.png&quot; title=&quot;Sourcing Globally: Advantages and Risks&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/christopher%20global%20sourcing%20advantages%20and%20risks-500x321.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Sourcing Globally: Advantages and Risks&quot; alt=&quot;Sourcing Globally: Advantages and Risks&quot; width=&quot;500&quot; height=&quot;321&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 1: Sourcing Globally: Advantages and Risks (Christopher et al., 2011; click to zoom)&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;From this the authors extract a risk classification for global sourcing risks (figure 2).&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/christopher%20global%20sourcing%20risks%20classification.png&quot; title=&quot;Fig.1: Dies ist ein tolles Bild&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/christopher%20global%20sourcing%20risks%20classification-500x141.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Fig.1: Dies ist ein tolles Bild&quot; alt=&quot;Fig.1: Dies ist ein tolles Bild&quot; width=&quot;500&quot; height=&quot;141&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 2: Sourcing Globally: Risk Classification (Christopher et al., 2011; click to zoom)&lt;/span&gt;&lt;/p&gt;

	&lt;h5&gt;Risks in global sourcing&lt;/h5&gt;

	&lt;p&gt;Building on this literature review the authors conduct their case study. The cross-case analysis reveals risks in the following industries:&lt;/p&gt;

	&lt;ul&gt;
		&lt;li&gt;retail,&lt;/li&gt;
	&lt;/ul&gt;

	&lt;ul&gt;
		&lt;li&gt;fashion retail and wholesale,&lt;/li&gt;
	&lt;/ul&gt;

	&lt;ul&gt;
		&lt;li&gt;consumer electronics,&lt;/li&gt;
	&lt;/ul&gt;

	&lt;ul&gt;
		&lt;li&gt;oil/gas,&lt;/li&gt;
	&lt;/ul&gt;

	&lt;ul&gt;
		&lt;li&gt;mechanical and electrical equipment,&lt;/li&gt;
	&lt;/ul&gt;

	&lt;ul&gt;
		&lt;li&gt;fast moving consumer goods (food and drink), and&lt;/li&gt;
	&lt;/ul&gt;

	&lt;ul&gt;
		&lt;li&gt;aerospace.&lt;/li&gt;
	&lt;/ul&gt;

	&lt;p&gt;The risks are shown in figure 3.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/christopher%20global%20sourcing%20risks.png&quot; title=&quot;Risk Overview - Sourcing Globally&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/christopher%20global%20sourcing%20risks-500x577.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Risk Overview - Sourcing Globally&quot; alt=&quot;Risk Overview - Sourcing Globally&quot; width=&quot;500&quot; height=&quot;577&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 3: Risk Overview (Sourcing Globally) (Christopher et al., 2011; click to zoom)&lt;/span&gt;&lt;/p&gt;

	&lt;h5&gt;Strategies for risk mitigation&lt;/h5&gt;

	&lt;p&gt;The identified risks are handled very differently by each of the companies. Figure 4 shows the different approaches to identify and manage the risks.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/christopher%20global%20sourcing%20strategies.png&quot; title=&quot;Risk Management Strategies and Tools&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/christopher%20global%20sourcing%20strategies-500x803.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Risk Management Strategies and Tools&quot; alt=&quot;Risk Management Strategies and Tools&quot; width=&quot;500&quot; height=&quot;803&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 4: Risk Management Strategies and Tools (Christopher et al., 2011; click to zoom)&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;Overall the authors find:&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;The study proposes four generic strategies for managing global sourcing risk: &lt;strong&gt;network re-engineering&lt;/strong&gt;, &lt;strong&gt;collaboration&lt;/strong&gt;, &lt;strong&gt;agility&lt;/strong&gt; and a &lt;strong&gt;risk management culture&lt;/strong&gt;. Evidence of each of these strategics was found in the case studies although no single company was applying all of them.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;The study also shows that even though many managers were aware of the risks their companies were exposed to, risk management strategies were not implemented in a systematic and holistic manner.&lt;/p&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;It is not possible to generalize these results for &lt;em&gt;any company&lt;/em&gt;,  due to the specific exploratory nature of the method used. But I find the findings quite interesting and I think they could be used as a foundation to build your own mix of mitigation strategies. &lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/SupplyChainManagementAnInternationalJournal2011ChristopherApproachesToManagingGlobalSourcingRisk.png?itok=Lnai0Wi1&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;Thumbnail Paper&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;Christopher, M., Mena, C., Khan, O., &amp;amp; Yurt, O. (2011). Approaches to managing global sourcing risk Supply Chain Management: An International Journal, 16 (2), 67-81 DOI: &lt;a rev=&quot;review&quot; href=&quot;http://dx.doi.org/10.1108/13598541111115338&quot;&gt;10.1108/13598541111115338&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/15/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget--5&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--10&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give Managing Global Sourcing Risk 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give Managing Global Sourcing Risk 2/5&lt;/option&gt;&lt;option value=&quot;60&quot;&gt;Give Managing Global Sourcing Risk 3/5&lt;/option&gt;&lt;option value=&quot;80&quot;&gt;Give Managing Global Sourcing Risk 4/5&lt;/option&gt;&lt;option value=&quot;100&quot; selected=&quot;selected&quot;&gt;Give Managing Global Sourcing Risk 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit--5&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-nEunE5L1L3y1BQAIXhA3Pm5qFlRnjGe9wLAOrOajqjU&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/risks&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;risks&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/global&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;global&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/sourcing&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;sourcing&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-count-pixel field-type-text-long field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 23 Jan 2012 17:34:15 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1766 at http://scrmblog.dumke.me</guid>
  </item>
  <item>
    <title>Hedging against Disruptions with ripple Effects</title>
    <link>http://scrmblog.dumke.me/review/hedging-against-disruptions-with-ripple-effects</link>
    <description>&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/Omega2012LiberatoreHedgingAgainstDisruptionsWithRippleEffectsInLocationAnalysis_0.png?itok=eGwBb0A6&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;I have read several articles by Mark Daskin (also reviewed &lt;a href=&quot;http://scrmblog.dumke.me/archives/220-Customer-Service-or-Cost-Optimization-of-the-Supply-Chain-Design.html&quot; title=&quot;SCRM Blog: Customer Service or Cost? Optimization of the Supply Chain Design&quot;&gt;another one here&lt;/a&gt;). So with him on the author list of today&amp;#8217;s paper I think one can expect a clearcut research question, some kind of mathematical model, a fitting solution method and a definite answer to the underling problem. Well, let&amp;#8217;s have a look!&lt;/p&gt;

	&lt;h5&gt;Topic and method&lt;/h5&gt;

	&lt;p&gt;The goal of this research is to analyze disruptions with a regional effect (as opposed to local, single facility disruptions). An example for a regional disruption may be an earthquake, storms or floods. The results should show how to better handle disruptions which are not locally limited and exhibit contagious tendencies.&lt;/p&gt;

	&lt;p&gt;The authors approach the problem by modeling three separate sub-models, namely the Defender Problem, the Attacker Problem and the User Problem.&lt;br /&gt;
The basic assumptions are:
	&lt;ul&gt;
		&lt;li&gt;each facility has a fixed capacity,&lt;/li&gt;
		&lt;li&gt;the capacity is affected by a disruption,&lt;/li&gt;
		&lt;li&gt;a defense strategy can be defined for selected facilities, it protects the facilities against the disruption&lt;/li&gt;
	&lt;/ul&gt;&lt;/p&gt;

	&lt;p&gt;&lt;em&gt;Defender Problem:&lt;/em&gt;&lt;br /&gt;
&amp;#8220;The objective of the defender is to minimize the impact of the disruption by optimally choosing Q facilities to protect. Constraints states that no partial protection of a facility is possible.&amp;#8221;&lt;/p&gt;

	&lt;p&gt;&lt;em&gt;Attacker Problem:&lt;/em&gt;&lt;br /&gt;
&amp;#8220;The objective of this program is to strike the system as hard as possible by identifying the worst-case set of exactly R facilities chosen among those which are not protected (6).2 Finally, no partial interdiction is possible.&amp;#8221;&lt;/p&gt;

	&lt;p&gt;&lt;em&gt;User Problem:&lt;/em&gt;&lt;br /&gt;
&amp;#8220;The user level problem deals with the minimum cost assignment of customer demands to facilities. The total cost is given by the cost for the service provided, plus the penalties paid for the demand which is not met.&amp;#8221;&lt;/p&gt;

	&lt;p&gt;&lt;em&gt;Correlation Matrix:&lt;/em&gt;&lt;br /&gt;
&amp;#8220;The correlation matrix represents the interdependence among the facilities when an attack occurs or, in other words, the extent to which other facilities are affected when a target facility is disrupted.&lt;/p&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;491&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/liberatoreearthquakemap.png&quot; title=&quot;Map of the 2009 earthquake in L&amp;#039;Aquila, Italy (Liberatore, et al. 2012; USGS)&quot; alt=&quot;2009 L’Aquila earthquake map, main shock peak acceleration map (in %g) (USGS)&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 1: Map of the 2009 earthquake in L&amp;#8217;Aquila, Italy (Liberatore, et al. 2012; &lt;span class=&quot;caps&quot;&gt;USGS&lt;/span&gt;)&lt;/div&gt;&lt;/div&gt;

	&lt;h5&gt;Solution and Case &lt;/h5&gt;

	&lt;p&gt;The authors develop a solution method, to optimize the given problem.&lt;br /&gt;
Data from the 2009 &lt;a href=&quot;http://en.wikipedia.org/wiki/2009_L&amp;#39;Aquila_earthquake&quot; title=&quot;Wikipedia&quot;&gt;earthquake in L&amp;#8217;Aquila, Italy&lt;/a&gt; was used to test the model. &lt;br /&gt;
Figure 1 shows a map of the area.&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;The dataset represents the Abruzzo region, a seismically active region of Italy, where L’Aquila is located. The set of the demand nodes, N, includes all the 305 towns and cities in the region and the associated demands, ai, correspond to the number of inhabitants as at beginning of April 2009 expressed in thousands of citizens. The set of initial facilities, F, represents the 35 hospitals of the region.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;The model is solved for different parameters in two steps: first calculating the optimal defense program and second calculating the &amp;#8220;optimal&amp;#8221; attack, also calculating the incurred cost and correlated disruptions.&lt;/p&gt;

	&lt;p&gt;Figure 2 shows the example for two different solutions:&lt;br /&gt;
The buildings represent the available hospitals, stars mark the defended locations and the colored circles represent the disruption, which causes the  worst effects.&lt;/p&gt;

&lt;div class=&quot;scrm_imageComment_left&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_left&quot; width=&quot;500&quot; height=&quot;266&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/liberatoredefenseplan.png&quot; title=&quot;Two solution Results (a and b). Buildings representing Hospitals, Stars protected Locations, Circles worst possible Disruption Effects&quot; alt=&quot; Fortification and interdiction sets for the instance with Q1⁄42, R1⁄42, and B1⁄40.0. Legend: the black line represents regional borders, buildings represent hospitals, stars represents fortifications, and interdictions are represented by concentric (colored) seismic impact areas. (a) RIMF solution. Fortifications: L’Aquila (west) and Sant’Omero (north). Interdictions: Pescara (east) and Avezzano (south-west). (b) WaveRIMF solution. Fortifications: Pescara (east) and Teramo (north). Interdictions: Citta Sant’Angelo (next to Pescara) and Sant’Omero (next to Teramo). (For interpretation of the references to color in this figure legend, the reader is referred to the web version of this article.)&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 2: Two solution Results (a and b). Buildings representing Hospitals, Stars protected Locations, Circles worst possible Disruption Effects (Liberatore, et al. 2012)&lt;/div&gt;&lt;/div&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;The attacker (in this case an earthquake) always looks for the place where it can hit hardest, so the focus is on the worst case scenario: How can one fortify a system so that even in the worst case it still performs at a desired level?&lt;/p&gt;

	&lt;p&gt;But keeping that in mind also leads to the conclusion that this system might not be for everyone: What if the earthquake does not hit at the worst point? Or not at all? As a rule of thumb, I would say the investments suggested by this model are magnitudes higher than those of an &amp;#8220;optimal&amp;#8221; (in terms of money) solution. So when do you use such a model?&lt;br /&gt;
I think there are two cases: Either if one is dealing with critical infrastructure, like water, food or possibly military installations and (I know its related) if one has to decide how to safe lives: As in the case study itself, where the optimal hospital location has to be found.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;	&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=Omega&amp;amp;rft_id=info%3A%2F&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=Hedging+against+disruptions+with+ripple+effects+in+location+analysis&amp;amp;rft.issn=&amp;amp;rft.date=2012&amp;amp;rft.volume=40&amp;amp;rft.issue=1&amp;amp;rft.spage=21&amp;amp;rft.epage=30&amp;amp;rft.artnum=&amp;amp;rft.au=Liberatore%2C+F.&amp;amp;rft.au=Scaparra%2C+M.P.&amp;amp;rft.au=Daskin%2C+M.S.&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other%2CBusiness+Management%2C+Supply+Chain+Management&quot;&gt;Liberatore, F., Scaparra, M.P., &amp;amp; Daskin, M.S. (2012). Hedging against disruptions with ripple effects in location analysis &lt;span style=&quot;font-style: italic;&quot;&gt;Omega, 40&lt;/span&gt; (1), 21-30&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/15/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget--6&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--12&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give Hedging against Disruptions with ripple Effects 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give Hedging against Disruptions with ripple Effects 2/5&lt;/option&gt;&lt;option value=&quot;60&quot;&gt;Give Hedging against Disruptions with ripple Effects 3/5&lt;/option&gt;&lt;option value=&quot;80&quot; selected=&quot;selected&quot;&gt;Give Hedging against Disruptions with ripple Effects 4/5&lt;/option&gt;&lt;option value=&quot;100&quot;&gt;Give Hedging against Disruptions with ripple Effects 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit--6&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-HnF-6FuahpukI0UTLgN80KMnEn5mPniR3GLnDs0W2zk&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/case-study&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;case study&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/hospital&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;hospital&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/protection&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;protection&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/worst-case&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;worst case&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/disruptions&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;disruptions&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 02 Jan 2012 17:10:00 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1692 at http://scrmblog.dumke.me</guid>
  </item>
  <item>
    <title>Exception Handling for Robust Supply Chain Design</title>
    <link>http://scrmblog.dumke.me/review/exception-handling-for-robust-supply-chain-design</link>
    <description>&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/ProceeingsOfThe2003IeeeInternationalConferenceOnRobotics%26Automation2003GaonkarRobustSupplyChainDesignAStrategicApproachForExceptionHandling.png?itok=FhhpHyjk&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;This article considers the design of robust supply chains from the viewpoint of exception handling. Disruptions of the supply chain happen all the time. Smaller disruptions like quality issues are part of the daily business; but a look at the recent ten years shows that large disruptions, happen more often as well (think of terrorist attacks or earthquakes). &amp;#8220;Thus, exception management is an important issue in global supply chain networks.&amp;#8221;&lt;/p&gt;

	&lt;h5&gt;Basics and definition&lt;/h5&gt;

	&lt;p&gt;If one accepts the fact, that exception cannot be eliminated completely there are two ways to treat them: preventive and interceptive. Figure 1 shows different exception management strategies. &lt;/p&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;a class=&quot;scrm_image_link&quot; title=&quot;Exception Management Strategies&quot; href=&quot;http://scrmblog.dumke.me/sites/default/files/images/gaonkarexceptionhandlingstrategies.png&quot; onclick=&quot;F1 = window.open(&#039;http://scrmblog.dumke.me/sites/default/files/images/gaonkarexceptionhandlingstrategies.png&#039;,&#039;Zoom&#039;,&#039;height=714,width=894,top=370.5,left=840.5,toolbar=no,menubar=no,location=no,resize=1,resizable=1,scrollbars=yes&#039;); return false;&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;398&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/gaonkarexceptionhandlingstrategiessmall.png&quot; title=&quot;Exception Management Strategies&quot; alt=&quot;Exception Management Strategies&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 1: Exception Management Strategies (Gaonkar and Viswanadham, 2003; click to zoom)&lt;/div&gt;&lt;/div&gt;

	&lt;p&gt;The authors define a supply chain exception as the opposite to the classical seven-Rs of logistics:&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;We can use this description to define a supply chain failure or exception occurring whenever the supply chain deviates from any one of the [&amp;#8230;] required specifications &amp;#8211; either in terms of delivering the wrong product, in the wrong quantity, in the wrong condition, at the wrong place, at the wrong time, at the wrong cost and to the wrong customer. &lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;h5&gt;Exception management&lt;/h5&gt;

	&lt;p&gt;In this case exception management is addressed &amp;#8220;at the strategic level through the preventive selection of supply chain partners that mitigate risk in the network.&amp;#8221;&lt;/p&gt;

	&lt;p&gt;In the first step the consequences of a given exception (here: supplier non-performance) are analyzed. The authors use a Cause-Consequence-Diagram for this end (figure 2).&lt;/p&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;a class=&quot;scrm_image_link&quot; title=&quot;Cause and Consequence Diagram for one Example (Supplier Non-Performance)&quot; href=&quot;http://scrmblog.dumke.me/sites/default/files/images/gaonkarexceptionhandling.png&quot; onclick=&quot;F1 = window.open(&#039;http://scrmblog.dumke.me/sites/default/files/images/gaonkarexceptionhandling.png&#039;,&#039;Zoom&#039;,&#039;height=771,width=945,top=342,left=815,toolbar=no,menubar=no,location=no,resize=1,resizable=1,scrollbars=yes&#039;); return false;&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;406&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/gaonkarexceptionhandlingsmall.png&quot; title=&quot;Cause and Consequence Diagram for one Example (Supplier Non-Performance)&quot; alt=&quot;Cause Consequence Diagram for Supplier non-performance and the resulting outcome&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 2: Cause and Consequence Diagram for one Example (Supplier Non-Performance) (Gaonkar and Viswanadham, 2003; click to zoom)&lt;/div&gt;&lt;/div&gt;

	&lt;p&gt;Then, &amp;#8220;given the probability of occurrence of the initiating event, which is supplier non-performance, and the probabilities for the various intermedialy events, we can calculate the probability of occurrences for each of the end states or outcomes. Furthermore, each of these end states may result in different levels of supply shortfalls and financial cost. Hence, given the probability of each end state and the supply shortfall or financial cost for each end state, we can calculate the expected shortfall or financial risk for the non-performance of a given supplier.&amp;#8221;&lt;/p&gt;

	&lt;p&gt;If repeated for each supplier, the supplier with the least expected impact can be identified.&lt;/p&gt;

	&lt;h5&gt;Model&lt;/h5&gt;

	&lt;p&gt;To implement their approach the authors develop a small linear mixed-integer model.&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;The model was formulated in Microsoft Excel and solved using the Solver add-in. The model was solved for a problem with a single manufacturer (located in the US), dealing with 5 suppliers. The probabilities of supplier disruption for all the suppliers (individually and in various combination) were considered as given [the first part is shown in figure 3]. The relation cost was taken as $5000 and the quantity required by the manufacturer was 520 units.&lt;/p&gt;
	&lt;/blockquote&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;324&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/gaonkarmodel.png&quot; title=&quot;Scenario / Probability Table&quot; alt=&quot;Probabilities of various supply situations.&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 3: Scenario / Probability Table (Gaonkar and Viswanadham, 2003)&lt;/div&gt;&lt;/div&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;The presented approach makes it easy to include uncertainty into the supplier selection process. Considering the moderate efforts necessary for implementing the supplier assessment and implementing the model, I would like to read more about the effectiveness in a real business situation.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;	&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=Proceeings+of+the+2003+IEEE+International+Conference+on+Robotics+%26+Automation&amp;amp;rft_id=info%3A%2F&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=Robust+Supply+Chain+Design%3A+a+Strategic+Approach+for+Exception+Handling&amp;amp;rft.issn=&amp;amp;rft.date=2003&amp;amp;rft.volume=&amp;amp;rft.issue=&amp;amp;rft.spage=1762&amp;amp;rft.epage=1767&amp;amp;rft.artnum=http%3A%2F%2Fieeexplore.ieee.org%2Fstamp%2Fstamp.jsp%3Ftp%3D%26arnumber%3D1241849&amp;amp;rft.au=Gaonkar%2C+R.&amp;amp;rft.au=Viswanadham%2C+N.&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other%2CBusiness+Management%2C+Supply+Chain+Management&quot;&gt;Gaonkar, R., &amp;amp; Viswanadham, N. (2003). Robust Supply Chain Design: a Strategic Approach for Exception Handling &lt;span style=&quot;font-style: italic;&quot;&gt;Proceeings of the 2003 &lt;span class=&quot;caps&quot;&gt;IEEE&lt;/span&gt; International Conference on Robotics &amp;amp; Automation&lt;/span&gt;, 1762-1767&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/15/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget--7&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--14&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give Exception Handling for Robust Supply Chain Design 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give Exception Handling for Robust Supply Chain Design 2/5&lt;/option&gt;&lt;option value=&quot;60&quot;&gt;Give Exception Handling for Robust Supply Chain Design 3/5&lt;/option&gt;&lt;option value=&quot;80&quot;&gt;Give Exception Handling for Robust Supply Chain Design 4/5&lt;/option&gt;&lt;option value=&quot;100&quot;&gt;Give Exception Handling for Robust Supply Chain Design 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit--7&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form--3bRkYvEHchLLUIEF0SJuAn2Fd-1Cfu8fFmurgew7Po&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/design&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;design&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/exception&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;exception&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/robust&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;robust&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/supply-chain&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;supply chain&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/disruptions&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;disruptions&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Wed, 07 Dec 2011 18:33:00 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1689 at http://scrmblog.dumke.me</guid>
  </item>
  <item>
    <title>Predicting and Managing Supply Chain Risks</title>
    <link>http://scrmblog.dumke.me/review/predicting-and-managing-supply-chain-risks</link>
    <description>&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/2006DaniPredictingAndManagingSupplyChainRisks.png?itok=7h3_zRbK&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;I often recommend &lt;a href=&quot;https://www.amazon.com/gp/product/1441946454/ref=as_li_ss_tl?ie=UTF8&amp;amp;amp;tag=s05b5a-20&amp;amp;amp;linkCode=as2&amp;amp;amp;camp=217145&amp;amp;amp;creative=399369&amp;amp;amp;creativeASIN=1441946454&quot;&gt;Supply Chain Risk: A Handbook of Assessment, Management, and Performance&lt;/a&gt;&lt;img src=&quot;http://www.assoc-amazon.com/e/ir?t=s05b5a-20&amp;amp;l=as2&amp;amp;o=1&amp;amp;a=1441946454&amp;amp;camp=217145&amp;amp;creative=399369&quot; width=&quot;1&quot; height=&quot;1&quot; border=&quot;0&quot; alt=&quot;&quot; style=&quot;border:none !important; margin:0px !important;&quot; /&gt; as a good overview of supply chain risk management literature. In this article I summarize chapter four of the book on the problem and processes to predict supply chain risks.&lt;/p&gt;

	&lt;h5&gt;Structure and basics&lt;/h5&gt;

	&lt;p&gt;In first section the author starts by defining the basics of risk and uncertainty. The next section briefly introduces different categories for supply chain risks:&lt;br /&gt;
&lt;blockquote&gt;
	&lt;ol&gt;
		&lt;li&gt;Internal to the firm: Process, Control&lt;/li&gt;
		&lt;li&gt;External to the firm but Internal to the Supply network: Demand, Supply&lt;/li&gt;
		&lt;li&gt;External to the network: Environmental&lt;br /&gt;
&lt;/blockquote&gt;&lt;/li&gt;
	&lt;/ol&gt;&lt;/p&gt;

	&lt;p&gt;These risk can then impact the different dimensions of a supply chain:
	&lt;ol&gt;
		&lt;li&gt;Physical movement of goods&lt;/li&gt;
		&lt;li&gt;Flow of information&lt;/li&gt;
		&lt;li&gt;Flow of money&lt;/li&gt;
		&lt;li&gt;Security of the firm’s internal information systems&lt;/li&gt;
		&lt;li&gt;Relationship between supply chain partners&lt;/li&gt;
		&lt;li&gt;Corporate social responsibility and the effect on a firm’s reputation.&lt;/li&gt;
	&lt;/ol&gt;&lt;/p&gt;

	&lt;p&gt;The next section provides an overview on supply chain risk management, its steps and mitigation strategies.&lt;/p&gt;

	&lt;h5&gt;Predicting Supply Chain Risks&lt;/h5&gt;

	&lt;blockquote&gt;
		&lt;p&gt;One of the main requirements for an effective proactive risk management process is to obtain good estimates of the probability of the occurrence of any particular disruption and accurately measure the potential impact.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;So the estimation of probabilities and impacts, depending on the characteristics of the supply chain and the environment it might be harder to identify all risks and assess them.&lt;/p&gt;

	&lt;p&gt;The author describes two tools for the estimation of risks: Data Mining and Failure Mode Effect Analysis (&lt;span class=&quot;caps&quot;&gt;FMEA&lt;/span&gt;).&lt;/p&gt;

	&lt;p&gt;&lt;em&gt;Data Mining&lt;/em&gt;&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;The role of data mining is to analyse historical data, to improve prediction capability. Some of the common analytic approaches used by data miners are:
	&lt;ol&gt;
		&lt;li&gt;Estimation of the parameters of past performance: Means, Standard deviations, Correlations, and Associations for hypothesis testing&lt;/li&gt;
		&lt;li&gt;Classification: Segmentation, or Clustering of data units to facilitate the modelling process&lt;/li&gt;
		&lt;li&gt;Construction of a functional relationship: or model between responses and explanatory variables.&lt;/li&gt;
	&lt;/ol&gt;&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;The following tools should be used by a data miner:&lt;/p&gt;

	&lt;p&gt;&lt;blockquote&gt; 
	&lt;ul&gt;
		&lt;li&gt;Estimation: [&amp;#8230;] These tools will not lead to patterns but are more useful in analysing the data to identify the most relevant sets of data to concentrate further analysis.&lt;/li&gt;
		&lt;li&gt;Clustering/segmentation: This approach is used to logically group observations on the basis of similarity in their characteristics, reducing the level of heterogeneity in the data.&lt;/li&gt;
		&lt;li&gt;Classification/discrimination: The process of assigning observations to a predetermined number of classes.&lt;/li&gt;
		&lt;li&gt;Prediction: Formal mathematical models are built for the purpose of predicting the occurrence of the phenomenon.&lt;br /&gt;
&lt;/blockquote&gt;&lt;/li&gt;
	&lt;/ul&gt;&lt;/p&gt;

	&lt;p&gt;&lt;em&gt;Failure Mode Effect Analysis (&lt;span class=&quot;caps&quot;&gt;FMEA&lt;/span&gt;)&lt;/em&gt;&lt;/p&gt;

	&lt;p&gt;The goal of the &lt;span class=&quot;caps&quot;&gt;FMEA&lt;/span&gt; is to&lt;/p&gt;

	&lt;p&gt;&lt;blockquote&gt;
	&lt;ol&gt;
		&lt;li&gt;Recognise and evaluate the potential failures of a product or process and the effects of that failure.&lt;/li&gt;
		&lt;li&gt;Identify actions, which could eliminate or reduce the chance of the potential failure occurring.&lt;/li&gt;
		&lt;li&gt;Document the entire process.&lt;br /&gt;
&lt;/blockquote&gt;&lt;/li&gt;
	&lt;/ol&gt;&lt;/p&gt;

	&lt;p&gt;The author highlights ten steps of the process:&lt;/p&gt;

	&lt;p&gt;&lt;blockquote&gt;
	&lt;ol&gt;
		&lt;li&gt;Define scope, functional requirements, design parameters and process steps.&lt;/li&gt;
		&lt;li&gt;Identify potential failure modes: Failure modes indicate the loss of at least one functional requirement. It is the manner in which a failure occurs. This step in the process takes into account a foresight view (based on past experience and any new information) of what could cause a failure to the system or process.&lt;/li&gt;
		&lt;li&gt;Potential failure effect: This step investigates the effect the failure will have on other entities or processes.&lt;/li&gt;
		&lt;li&gt;Severity: “How bad” or “serious” the effect of the failure mode is. Usually severity is rated on a discrete scale from 1 (no effect) to 10 (hazardous effect). Severity ratings of 9 and 10 indicate a potential effect of high importance and this could typically be a safety or government regulation issue. Critical effects need deeper study for all causes to the lowest level, using a method of Fault Tree Analysis.&lt;/li&gt;
		&lt;li&gt;Potential causes: These are the causes of the failure. In this step, all causes that can be attributed to the failure occurring are investigated.&lt;/li&gt;
		&lt;li&gt;Occurrence:This is the likelihood of the event happening (i.e. failure in the system) on the basis that “the cause occurs”. &lt;span class=&quot;caps&quot;&gt;FMEA&lt;/span&gt; assumes that if the cause occurs, failure will occur too. The probability of occurrence is ranked from 1 to 10, where 1 signifies a remote probability of occurrence and 10 a very high probability of occurrence.&lt;/li&gt;
		&lt;li&gt;Current controls: The objective of the controls is to identify and detect the deficiencies and vulnerabilities as early as possible. This step looks at the current processes in place to mitigate the failures (if already known).&lt;/li&gt;
		&lt;li&gt;Detection: A subjective rating is assessed corresponding to the likelihood that the detection method will detect the first-level failure of a potential failure mode. This is ranked from 1 to 10, where 1 signifies that it is unlikely to detect and 10 signifies a very high detection potential.&lt;/li&gt;
		&lt;li&gt;Risk Priority Number (&lt;span class=&quot;caps&quot;&gt;RPN&lt;/span&gt;): These are used to prioritise the potential failures and are calculated as “Severity  Occurrence  Detection ranking”.&lt;/li&gt;
		&lt;li&gt;Actions Recommended: The team should then select and manage subsequent actions needed to locate and control the situation.&lt;br /&gt;
&lt;/blockquote&gt;&lt;/li&gt;
	&lt;/ol&gt;&lt;/p&gt;

	&lt;h5&gt;Predictive &amp;#8211; Proactive Methodology&lt;/h5&gt;

	&lt;p&gt;Based on these methods the author suggests a predictive-proactive methodology (figure 1) to manage risks.&lt;br /&gt;
The two main steps are called predictive mode and proactive mode. In the predictive mode, the focus is on gathering of information on the potential risk sources. The proactive mode focusses on the identification of the risks within the supply chain and assessing the risk level and setting the strategic objectives of the company.&lt;/p&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;349&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/danimethodology.png&quot; title=&quot;Schematic Diagram of the Predictive-Proactive Approach Supply Chain Risk Management Approach&quot; alt=&quot;The “predictive-proactive” supply chain risk management methodology&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 1: Schematic Diagram of the Predictive-Proactive Approach Supply Chain Risk Management Approach (Dani, 2006)&lt;/div&gt;&lt;/div&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;I read the chapter with a focus on the description of the prediction tools. The model on the other hand is a nice add-on which could be used as food for thought. But I find it a little bit too simplistic and a little bit confusing. It describes a basically linear process (from a risk to the disruption), but why then did the author choose not to represent this in a linear way, but in a diagram with two main parts/frames instead of a clear process and why are there two different types of frames (dashed and solid)?&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=Supply+Chain+Risk+%28Ed.+Clare+Brindley%29&amp;amp;rft_id=info%3Adoi%2F10.1007%2F978-0-387-79934-6_4&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=Predicting+and+Managing+Supply+Chain+Risks&amp;amp;rft.issn=&amp;amp;rft.date=2006&amp;amp;rft.volume=&amp;amp;rft.issue=&amp;amp;rft.spage=53&amp;amp;rft.epage=66&amp;amp;rft.artnum=&amp;amp;rft.au=Dani%2C+S.&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other%2CBusiness+Management%2C+Supply+Chain+Management&quot;&gt;Dani, S. (2006). Predicting and Managing Supply Chain Risks &lt;span style=&quot;font-style: italic;&quot;&gt;Supply Chain Risk (Ed. Clare Brindley)&lt;/span&gt;, 53-66 DOI: &lt;a rev=&quot;review&quot; href=&quot;http://dx.doi.org/10.1007/978-0-387-79934-6_4&quot;&gt;10.1007/978-0-387-79934-6_4&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/15/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget--8&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--16&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give Predicting and Managing Supply Chain Risks 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give Predicting and Managing Supply Chain Risks 2/5&lt;/option&gt;&lt;option value=&quot;60&quot;&gt;Give Predicting and Managing Supply Chain Risks 3/5&lt;/option&gt;&lt;option value=&quot;80&quot; selected=&quot;selected&quot;&gt;Give Predicting and Managing Supply Chain Risks 4/5&lt;/option&gt;&lt;option value=&quot;100&quot;&gt;Give Predicting and Managing Supply Chain Risks 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit--8&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-xJswujwb9HAlBZgW4mRSbSqvwHVBimD8V3zB8OZ5r0M&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/forecast&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;forecast&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/risk&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;risk&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/disruptions&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;disruptions&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 21 Nov 2011 15:40:00 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1684 at http://scrmblog.dumke.me</guid>
  </item>
  <item>
    <title>Improving Supply Chain Performance and Managing Risk Under Weather-Related Demand Uncertainty</title>
    <link>http://scrmblog.dumke.me/review/improving-supply-chain-performance-and-managing-risk-under-weather-related-demand-uncertainty</link>
    <description>&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/ManagementScience2010ChenImprovingSupplyChainPerformanceAndManagingRiskUnderWeather-RelatedDemandUncertainty.png?itok=DDqba2oX&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;The demand of many products is connected to the weather patterns during and before the selling season. Ice cream can be best sold during warm summers, of course. But also other food products or  clothes exhibit weather dependent demand pattern.&lt;/p&gt;

	&lt;p&gt;This article by Chen and Yano (2010) has a look at improving contracting between a manufacturer of a product with weather dependent demand and its retailer. One is for sure: uncertain demand causes negative effects for the whole supply chain, and should be handled as such. The full paper can be downloaded &lt;a href=&quot;http://www.ecore.be/Papers/1242123019.pdf&quot; title=&quot;ECORE: Improving Supply Chain Performance and Managing Risk Under Weather-Related Demand Uncertainty&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

	&lt;h5&gt;Method&lt;/h5&gt;

	&lt;p&gt;The author utilize the classic news vendor setting with one manufacturer (M) and one retailer (R) to focus on the analysis of their relationship.&lt;/p&gt;

	&lt;p&gt;M is set as the focal company. Due to several reasons (e.g. long lead times, seasonal products) M wants to offer weather related rebates for the retailers.&lt;/p&gt;

	&lt;h5&gt;Model&lt;/h5&gt;

	&lt;p&gt;The sales process is modeled in three steps:&lt;/p&gt;

	&lt;ul&gt;
		&lt;li&gt;M designs the contract and offers it to R&lt;/li&gt;
	&lt;/ul&gt;

	&lt;ul&gt;
		&lt;li&gt;R decides on the ordering quantity&lt;/li&gt;
	&lt;/ul&gt;

	&lt;ul&gt;
		&lt;li&gt;Depending on the weather and the quantity ordered, payouts are made from M to R&lt;/li&gt;
	&lt;/ul&gt;

	&lt;blockquote&gt;
		&lt;p&gt;A weather rebate is an alternative to other supply contracts that manufacturers might use to induce retailers not just to order greater [&amp;#8230;] quantities, but also to order them well in advance of the selling season. Such inducements fall into two broad categories: (1) early-season incentives that reduce the retailer’s financial obligation for any given purchase or commitment level and (2) end-of-season concessions paid by manufacturers when demand is weak. &lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;In this case the authors only have a look at the second type.&lt;/p&gt;

	&lt;p&gt;Without loss of generality, the authors focus on the temperature as weather index and design the payoff depicted in figure 1, where t is the measured temperature, t* is the &amp;#8220;strike&amp;#8221;-temperature and K is the payoff.&lt;/p&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 303px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;303&quot; height=&quot;82&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/chenweatherrebate.png&quot; title=&quot;Suggested Contract for Weather Rebate&quot; alt=&quot;weather rebate contract&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 1: Suggested Contract for Weather Rebate (Chen and Yano, 2010)&lt;/div&gt;&lt;/div&gt;

	&lt;h5&gt;Results&lt;/h5&gt;

	&lt;p&gt;The results show how the effects of the demand risks for the manufacturer can be mitigated in such a setting:&lt;/p&gt;

	&lt;ul&gt;
		&lt;li&gt;&lt;em&gt;Choice of strike temperature (t*) and rebate function&lt;/em&gt;&lt;br /&gt;
t* has an huge effect on the risk sharing between the two parties. So in combination with adjusting the payoffs K, it is possible to cater to different degrees of risk aversion between the manufacturer and the retailer&lt;/li&gt;
	&lt;/ul&gt;

	&lt;ul&gt;
		&lt;li&gt;&lt;em&gt;Additionally risks can be hedged by using weather derivatives&lt;/em&gt;&lt;br /&gt;
Tapping the growing market of derivative products on weather allows to offset the risks of such a contract by buying a corresponding weather certificate.&lt;/li&gt;
	&lt;/ul&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;The authors suggest a very flexible contracting scheme to optimize the distribution of risks between a manufacturer and retailer.&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;[The authors also see] very significant side benefits that the weather rebate offers (e.g., no auditing of leftover inventory at the retailer that would be required in the case of buy-back contracts or markdown allowances).&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;But, on the other hand the authors admit that the difficulty of the negotiation process might be increased since many more parameters (rebate, weather indices,&amp;#8230;) have to be agreed upon.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=Management+Science&amp;amp;rft_id=info%3Adoi%2F10.1287%2Fmnsc.1100.1194&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=Improving+Supply+Chain+Performance+and+Managing+Risk+Under+Weather-Related+Demand+Uncertainty&amp;amp;rft.issn=0025-1909&amp;amp;rft.date=2010&amp;amp;rft.volume=56&amp;amp;rft.issue=8&amp;amp;rft.spage=1380&amp;amp;rft.epage=1397&amp;amp;rft.artnum=http%3A%2F%2Fmansci.journal.informs.org%2Fcgi%2Fdoi%2F10.1287%2Fmnsc.1100.1194&amp;amp;rft.au=Chen%2C+F.Y.&amp;amp;rft.au=Yano%2C+C.A.&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other%2CBusiness+Management%2C+Supply+Chain+Management&quot;&gt;Chen, F.Y., &amp;amp; Yano, C.A. (2010). Improving Supply Chain Performance and Managing Risk Under Weather-Related Demand Uncertainty &lt;span style=&quot;font-style: italic;&quot;&gt;Management Science, 56&lt;/span&gt; (8), 1380-1397 DOI: &lt;a rev=&quot;review&quot; href=&quot;http://dx.doi.org/10.1287/mnsc.1100.1194&quot;&gt;10.1287/mnsc.1100.1194&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/15/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget--9&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--18&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give Improving Supply Chain Performance and Managing Risk Under Weather-Related Demand Uncertainty 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give Improving Supply Chain Performance and Managing Risk Under Weather-Related Demand Uncertainty 2/5&lt;/option&gt;&lt;option value=&quot;60&quot;&gt;Give Improving Supply Chain Performance and Managing Risk Under Weather-Related Demand Uncertainty 3/5&lt;/option&gt;&lt;option value=&quot;80&quot;&gt;Give Improving Supply Chain Performance and Managing Risk Under Weather-Related Demand Uncertainty 4/5&lt;/option&gt;&lt;option value=&quot;100&quot;&gt;Give Improving Supply Chain Performance and Managing Risk Under Weather-Related Demand Uncertainty 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit--9&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-PDnYoSk3tb08kTyMu2n9fzgd7TqsTgC1jEUskdrMJUw&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/mitigation&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;mitigation&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/risk&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;risk&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/weather&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;weather&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/demand-side&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;demand side&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Wed, 09 Nov 2011 16:18:00 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1680 at http://scrmblog.dumke.me</guid>
  </item>
  <item>
    <title>Supply Chain Crisis and Disaster Pyramid</title>
    <link>http://scrmblog.dumke.me/review/supply-chain-crisis-and-disaster-pyramid</link>
    <description>&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/InternationalJournalOfPhysicalDistribution%26LogisticsManagement2009JrTheSupplyChainCrisisAndDisasterPyramidATheoreticalFrameworkForUnderstandingPreparednessAndRecovery.png?itok=ghU8wYEm&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;With this review I take a look at supply chain disruption management. There is a huge number of actual and potential crisis (&lt;a href=&quot;http://scrmblog.dumke.me/archives/310-CSCMP-conference-and-Thailand-This-Week-in-Supply-Chain-Management-41-2011.html&quot; title=&quot;SCRM Blog: CSCMP conference and Thailand - This Week in Supply Chain Management - 41 / 2011&quot;&gt;floods in Thailand&lt;/a&gt;, &lt;a href=&quot;http://scrmblog.dumke.me/archives/304-Thyphoon-and-Podcast-This-Week-in-Supply-Chain-Management-38-2011.html&quot; title=&quot;SCRM Blog: Thyphoon and Podcast - This Week in Supply Chain Management - 38 / 2011&quot;&gt;typhoons&lt;/a&gt; and risks of a &lt;a href=&quot;http://scrmblog.dumke.me/archives/305-Greek-Risks-This-Week-in-Supply-Chain-Management-39-2011.html&quot; title=&quot;SCRM Blog: Greek Risks - This Week in Supply Chain Management - 39 / 2011&quot;&gt;greek collapse&lt;/a&gt;).&lt;/p&gt;

	&lt;p&gt;So it does make sense to think about preparation and recovery ahead of time.&lt;/p&gt;

	&lt;h5&gt;Method&lt;/h5&gt;

	&lt;p&gt;This article presents a new approach on how to improve preparedness and recovery after disaster strikes. It is built completely on a literature review of the resource, risk, crisis and disaster recovery, and preparedness literature. At its core this research is built on four different theories:&lt;/p&gt;

	&lt;ul&gt;
		&lt;li&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Resource-based_view&quot; title=&quot;Wikipedia: Resource based view&quot;&gt;resource-based view&lt;/a&gt; of the firm&lt;/li&gt;
	&lt;/ul&gt;

	&lt;ul&gt;
		&lt;li&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Communication_theory&quot; title=&quot;Wikipedia: Communication theory&quot;&gt;communication theory&lt;/a&gt;,&lt;/li&gt;
	&lt;/ul&gt;

	&lt;ul&gt;
		&lt;li&gt;competing values theory, and&lt;/li&gt;
	&lt;/ul&gt;

	&lt;ul&gt;
		&lt;li&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Relationship_management_theory&quot; title=&quot;Wikipedia: Relationship management theory&quot;&gt;relationship management theory&lt;/a&gt;.&lt;/li&gt;
	&lt;/ul&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;525&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/richeyframework.png&quot; title=&quot;Four Corners of the Supply Chain Disaster and Crisis Pyramid&quot; alt=&quot;The supply chain DCP&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 1: Four Corners of the Supply Chain Disaster and Crisis Pyramid (Richey, 2009)&lt;/div&gt;&lt;/div&gt;

	&lt;h5&gt;Disaster and Crisis Pyramid&lt;/h5&gt;

	&lt;p&gt;The four theories also form the pillars of the Disruption and Crisis Pyramid (&lt;span class=&quot;caps&quot;&gt;DCP&lt;/span&gt;; figure 1).&lt;/p&gt;

	&lt;p&gt;&lt;em&gt;Resource Management&lt;/em&gt;&lt;/p&gt;

	&lt;p&gt;The resources a company controls are an important factor in mitigating the effects of disasters. The authors summarize:&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;Still, given the prominence of resource management in the literature, and rightfully so, it seems logical that the &lt;span class=&quot;caps&quot;&gt;DCP&lt;/span&gt; would &amp;#8220;point&amp;#8221; to resource management. Human resources must be moved from crisis locations to safe locations or from traditional operations to crisis locations. Physical and technological resources must be allocated, moved, opened, cleared, and customized. Informational resources must be collected, cleaned, warehoused, and redistributed. Financial resources must be acquired, allocated, distributed, and governed. The activity component in &lt;span class=&quot;caps&quot;&gt;DCP&lt;/span&gt; research is huge and seems to thus be the consistent under current in the literature.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;&lt;em&gt;Collaboration: relationship management theory&lt;/em&gt;&lt;/p&gt;

	&lt;p&gt;The second element of the pyramid is the collaboration between the stakeholders in a disaster situation.&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;In crisis situations, collaboration will likely be the glue that holds organizations together. Additionally, Stewart et al. (2009) point out the broadness of the web that forms the extended supply chain in disaster and crisis situations. There is little doubt that such a tangled web will provide a huge opportunity for not only new research, but also to challenging the existing assumptions of relationship management logic.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;&lt;em&gt;Communication: communication theory&lt;/em&gt;&lt;/p&gt;

	&lt;p&gt;To achieve coordination and collaboration between all stakeholders, established and continued communication methods are essential.&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;Supply chain disaster and crisis situations demand effective communication. [&amp;#8230;] Examining issues such as bi-directionality, formality, modality, and frequency could be of serious importance as public and private entities attempt to understand what, when, and how much to communicate.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;&lt;em&gt;Contingency planning: competing values theory&lt;/em&gt;&lt;/p&gt;

	&lt;p&gt;A supply chain brings together a multitude of different companies. And usually instead of having on clear cut strategic goal, each company works for its own goals which also often are not properly aligned. &lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;Competing values theory provides grounding for future supply chain disaster and crisis research by suggesting that firms simultaneously pursue various different and often conflicting strategic goals regardless of the situation&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;All in all Richey&amp;#8217;s framework is aimed at providing a guideline for future researchers to find new insights into supply chain disaster management and how to improve supply chain reactions at the intersection of communication, collaboration, resources and values. And these four aspects should not only be considered by researchers, but also by supply chain professionals.&lt;/p&gt;

	&lt;p&gt;I especially liked the inclusion of the competing value theory, which might lead to a shift in research from the currently leading paradigm that goals of supply chain partners are always well aligned.&lt;/p&gt;

	&lt;p&gt;On the other hand, this framework could also be used beyond only disaster and crisis management, the aspects could perhaps prove influential in a larger number of supply chain related research fields and applications. &lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;	&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=International+Journal+of+Physical+Distribution+%26+Logistics+Management&amp;amp;rft_id=info%3Adoi%2F10.1108%2F09600030910996288&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=The+supply+chain+crisis+and+disaster+pyramid%3A+A+theoretical+framework+for+understanding+preparedness+and+recovery&amp;amp;rft.issn=0960-0035&amp;amp;rft.date=2009&amp;amp;rft.volume=39&amp;amp;rft.issue=7&amp;amp;rft.spage=619&amp;amp;rft.epage=628&amp;amp;rft.artnum=http%3A%2F%2Fwww.emeraldinsight.com%2F10.1108%2F09600030910996288&amp;amp;rft.au=Richey%2C+R.G.+Jr&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other%2CBusiness+Management%2C+Supply+Chain+Management&quot;&gt;Richey, R.G. Jr (2009). The supply chain crisis and disaster pyramid: A theoretical framework for understanding preparedness and recovery &lt;span style=&quot;font-style: italic;&quot;&gt;International Journal of Physical Distribution &amp;amp; Logistics Management, 39&lt;/span&gt; (7), 619-628 &lt;span class=&quot;caps&quot;&gt;DOI&lt;/span&gt;: &lt;a rev=&quot;review&quot; href=&quot;http://dx.doi.org/10.1108/09600030910996288&quot;&gt;10.1108/09600030910996288&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/15/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget--10&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--20&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot; selected=&quot;selected&quot;&gt;Give Supply Chain Crisis and Disaster Pyramid 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give Supply Chain Crisis and Disaster Pyramid 2/5&lt;/option&gt;&lt;option value=&quot;60&quot;&gt;Give Supply Chain Crisis and Disaster Pyramid 3/5&lt;/option&gt;&lt;option value=&quot;80&quot;&gt;Give Supply Chain Crisis and Disaster Pyramid 4/5&lt;/option&gt;&lt;option value=&quot;100&quot;&gt;Give Supply Chain Crisis and Disaster Pyramid 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit--10&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-RhK779vy4Za-9k0bxClOlV4IPQfA-TtvpUxE0BWYxPA&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/crisis&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;crisis&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/disaster&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;disaster&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/framework&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;framework&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Wed, 02 Nov 2011 15:43:00 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1679 at http://scrmblog.dumke.me</guid>
  </item>
  <item>
    <title>Ways to guard against Disruptions</title>
    <link>http://scrmblog.dumke.me/review/ways-to-guard-against-disruptions</link>
    <description>&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/2005Elkins18WaysToGuardAgainstDisruption.png?itok=jQTFjx8b&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;Today I review an article called &amp;#8220;18 Ways to Guard Against Disruption&amp;#8221;. It was published in the Supply Chain Management Review in 2005 by Elkins et al.&lt;/p&gt;

	&lt;h5&gt;Goal and method&lt;/h5&gt;

	&lt;p&gt;The goal of this study was to assess the current state of supply chain risk management capabilities across multiple industries. The authors describe the results of several interviews with companies from multiple industries, which have been conducted by the Supply Chain Resource Consortium (&lt;a href=&quot;http://scrc.ncsu.edu&quot; title=&quot;SCRC web site&quot;&gt;&lt;span class=&quot;caps&quot;&gt;SCRC&lt;/span&gt;&lt;/a&gt;, an university industry partnership for documenting supply chain management knowledge).&lt;/p&gt;

	&lt;h5&gt;Results&lt;/h5&gt;

	&lt;p&gt;Based on this study 18 best practices have been identified, which have been categorized according to their impact location (internal or external) and their time orientation (current business vs. future business).&lt;/p&gt;

	&lt;p&gt;&lt;strong&gt;External orientation / future business (&amp;#8220;Strategic sourcing &amp;amp; advanced procurement&amp;#8221;)&lt;/strong&gt;
	&lt;ol&gt;
		&lt;li&gt;&amp;#8220;Screen and regularly monitor current and potential suppliers for possible supply chain risks.&lt;/li&gt;
		&lt;li&gt;Require critical suppliers to produce a detailed disruption-awareness plan and/or business-continuity plan.&lt;/li&gt;
		&lt;li&gt;Include the expected costs of disruptions and operational problem resolution in the sourcing total-cost equation.&lt;/li&gt;
		&lt;li&gt;Require suppliers to be prepared to provide timely information and visibility of material flows that can be electronically shared with your organization.&amp;#8221;&lt;/li&gt;
	&lt;/ol&gt;&lt;/p&gt;

	&lt;p&gt;&lt;strong&gt;External orientation / current business (&amp;#8220;Supply-base management&amp;#8221;)&lt;/strong&gt;
	&lt;ol&gt;
		&lt;li&gt;Conduct frequent teleconferences with critical suppliers to identify issues that may disrupt daily operations and discuss tactics to minimize these issues.&lt;/li&gt;
		&lt;li&gt;Seek security enhancements that comply with the Customs-Trade Partnership Against Terrorism (C-&lt;span class=&quot;caps&quot;&gt;TPAT&lt;/span&gt;), Container Security Initiative (&lt;span class=&quot;caps&quot;&gt;CSI&lt;/span&gt;), and similar initiatives.&lt;/li&gt;
		&lt;li&gt;Test and implement technologies to track containers.&lt;/li&gt;
		&lt;li&gt;Conduct a detailed incident report and analysis following a major disruption.&lt;/li&gt;
		&lt;li&gt;Create exception-detection/early-warning systems to discover critical logistics events that exceed normal planning parameters.&lt;/li&gt;
		&lt;li&gt;Gather supply chain intelligence and monitor critical supply-base locations.&lt;/li&gt;
	&lt;/ol&gt;&lt;/p&gt;

	&lt;p&gt;&lt;strong&gt;Internal orientation / current business (&amp;#8220;Real time operations management&amp;#8221;)&lt;/strong&gt;
	&lt;ol&gt;
		&lt;li&gt;Improve visibility of inventory buffers in domestic distribution channels at the part level.&lt;/li&gt;
		&lt;li&gt;Classify buffered material by its level of criticality.&lt;/li&gt;
		&lt;li&gt;Train key employees and groups to improve real-time decision-making capabilities.&lt;/li&gt;
		&lt;li&gt;Develop decision-support tools that enable the company to reconfigure the supply chain in real time.&lt;/li&gt;
	&lt;/ol&gt;&lt;/p&gt;

	&lt;p&gt;&lt;strong&gt;Internal orientation / future business (&amp;#8220;Strategic supply chain design&amp;#8221;)&lt;/strong&gt;
	&lt;ol&gt;
		&lt;li&gt;Develop predictive analysis systems that incorporate intelligent search agents and dynamic risk indices.&lt;/li&gt;
		&lt;li&gt;Construct damage-control plans for likely disruption scenarios.&lt;/li&gt;
		&lt;li&gt;Understand the cost trade-offs for different risk-mitigation strategies.&lt;/li&gt;
		&lt;li&gt;Enhance systemwide visibility and supply chain intelligence by using improved near-real-time databases.&amp;#8221;&lt;/li&gt;
	&lt;/ol&gt;&lt;/p&gt;

	&lt;p&gt;The authors note that none of the companies had implemented all of the identified measures at the same time and they suggest:&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;Companies may want to use the best-practices list as a thought-starter to help them prioritize which supply chain risk management elements to adopt. For example, companies could develop an internal survey, based on the best-practice list, which would assess their supply chain risk management capabilities.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;This article closes a gap at the &lt;span class=&quot;caps&quot;&gt;SCRM&lt;/span&gt; Blog of some early exploratory research on how supply chain risk management is done in practice. Even though the description of the methodology lacks several important facts, e.g. how many companies have been interviewed and how were the interviews conducted, the results still show an interesting direction.&lt;br /&gt;
The next obvious questions, which to my knowledge have not been pursued in an systematic manner, would be:
	&lt;ol&gt;
		&lt;li&gt;Which of the strategies is best used in what setting?&lt;/li&gt;
		&lt;li&gt;How should a company prioritize their efforts, if they wanted to invest in supply chain risk management?&lt;/li&gt;
	&lt;/ol&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;	&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=Supply+Chain+Management+Review&amp;amp;rft_id=info%3A%2F&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=18+Ways+to+Guard+Against+Disruption&amp;amp;rft.issn=&amp;amp;rft.date=2005&amp;amp;rft.volume=&amp;amp;rft.issue=&amp;amp;rft.spage=&amp;amp;rft.epage=&amp;amp;rft.artnum=&amp;amp;rft.au=Elkins%2C+D&amp;amp;rft.au=Handfield%2C+R.B.&amp;amp;rft.au=Blackhurst%2C+J.&amp;amp;rft.au=Craighead%2C+C.W.&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other%2CBusiness+Management%2C+Supply+Chain+Management&quot;&gt;Elkins, D, Handfield, R.B., Blackhurst, J., &amp;amp; Craighead, C.W. (2005). 18 Ways to Guard Against Disruption &lt;span style=&quot;font-style: italic;&quot;&gt;Supply Chain Management Review&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/15/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget--11&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--22&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give Ways to guard against Disruptions 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give Ways to guard against Disruptions 2/5&lt;/option&gt;&lt;option value=&quot;60&quot;&gt;Give Ways to guard against Disruptions 3/5&lt;/option&gt;&lt;option value=&quot;80&quot;&gt;Give Ways to guard against Disruptions 4/5&lt;/option&gt;&lt;option value=&quot;100&quot;&gt;Give Ways to guard against Disruptions 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit--11&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-XsfBbZ2APNmodKdfxjs4xvA-0zHf2vQxEmtNyRiVgyw&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/disruptions&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;disruptions&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/mitigation&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;mitigation&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/risk-management&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;risk management&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 17 Oct 2011 17:49:00 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1674 at http://scrmblog.dumke.me</guid>
  </item>
  <item>
    <title>Assessing Vulnerability of a Supply Chain</title>
    <link>http://scrmblog.dumke.me/review/assessing-vulnerability-of-a-supply-chain</link>
    <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;At this year&amp;#8217;s &lt;a href=&quot;http://www.hicl.org&quot; title=&quot;Hamburg International Conference of Logistics&quot;&gt;&lt;span class=&quot;caps&quot;&gt;HICL&lt;/span&gt; conference&lt;/a&gt; in Hamburg, I was able to present some of my own research. In the follow-up discussions several points were highlighted, especially focussing on the viability of supply chain wide cooperation and collaboration efforts and on the difficulties of doing a realistic quantification of supply chain risks.&lt;/p&gt;

	&lt;p&gt;I already read a great paper on this topic some time ago: &amp;#8220;Assessing the vulnerability of supply chains using graph theory&amp;#8221; by Stephan M. Wagner and Nikrouz Neshat (2010), which I present you today.&lt;/p&gt;

	&lt;h5&gt;Disruptions and vulnerabilities&lt;/h5&gt;

	&lt;p&gt;Several authors argue that several factors help increase the vulnerabilities of today&amp;#8217;s supply chains. When supply chain complexity increases (e.g. supply chain length, higher division of labor, &amp;#8230;), the vulnerabilities also rise. Furthermore there is evidence that natural and man-made disasters are on the rise as well (figure 1).&lt;/p&gt;

	&lt;p&gt;&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;178&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/neshathistorydisasters.png&quot; title=&quot;History of Disasters&quot; alt=&quot;Distribution of natural and man-made over time. (Source: Centre for Research on the Epidemiology of Disasters, 2004.)&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 1: History of Disasters (Wagner and Neshat, 2010)&lt;/div&gt;&lt;/div&gt;Figure 2 shows the links between supply chain vulnerability drivers and disruptions.&lt;br /&gt;
So, since natural- and man-made-disaster most often cannot be influenced directly, the authors argue that the focus has to be on reducing the vulnerabilities themselves.&lt;/p&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;250&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/neshatinfluencerisks.png&quot; title=&quot;Connections between Vulnerabilities, Disruptions and Risks&quot; alt=&quot;Supply chain vulnerability and disruption&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 2: Connections between Vulnerabilities, Disruptions and Risks (Wagner and Neshat, 2010)&lt;/div&gt;&lt;/div&gt;

	&lt;h5&gt;Assessment of vulnerabilities&lt;/h5&gt;

	&lt;p&gt;Wagner and Neshat suggest a four step algorithm based on graph theory, which is used to calculate a &lt;em&gt;Supply Chain Vulnerability Index&lt;/em&gt; (&lt;span class=&quot;caps&quot;&gt;SCVI&lt;/span&gt;). The algorithm is based on &lt;a href=&quot;http://en.wikipedia.org/wiki/Graph_theory&quot; title=&quot;Wikipedia: Graph Theory&quot;&gt;graph theory&lt;/a&gt; (which has been part of another study &lt;a href=&quot;http://scrmblog.dumke.me/archives/184-Managing-Information-Risks.html&quot; title=&quot;SCRM Blog: Managing Information Risks&quot;&gt;here&lt;/a&gt;). Key to the understanding of the &lt;span class=&quot;caps&quot;&gt;SCVI&lt;/span&gt; is the risk driver mentioned above. Figure 3 shows an abstract example with three vulnerability drivers (D1 to D3) and their links.&lt;/p&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;241&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/neshatexample.png&quot; title=&quot;Vulnerability Drivers and their Links with the corresponding Matrix&quot; alt=&quot;Example of vulnerability digraph representation and its adjacency matrix&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 3: Vulnerability Drivers and their Links with the corresponding Matrix (Wagner and Neshat, 2010)&lt;/div&gt;&lt;/div&gt;

	&lt;p&gt;To calculate the &lt;span class=&quot;caps&quot;&gt;SCVI&lt;/span&gt; the supply chain risk manager has to create a map / graph of the current risk drivers (step 1), find the corresponding relations between the risk drivers (step 2), calculate the &amp;#8220;influence matrix&amp;#8221; (step 3) and deduce the &lt;span class=&quot;caps&quot;&gt;SCVI&lt;/span&gt;. As a forth step &lt;span class=&quot;caps&quot;&gt;SCVI&lt;/span&gt;s of different companies can be compared to gain further insights for optimization and risk reduction.&lt;/p&gt;

	&lt;p&gt;Figure 4 shows the main drivers of supply chain vulnerability. &lt;/p&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;283&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/neshatdrivers.png&quot; title=&quot;Selection of Vulnerability Drivers in Structure, Demand and Supply&quot; alt=&quot;Supply chain vulnerability drivers&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 4: Selection of Vulnerability Drivers in Structure, Demand and Supply (Wagner and Neshat, 2010)&lt;/div&gt;&lt;/div&gt;

	&lt;p&gt;Using graph theory makes it possible for the risk manager to get an overview of the influencing factors of supply chain risks. It also enables him to act on this knowledge. Figure 5 shows a possible simplification / vulnerability reduction.&lt;/p&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;246&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/neshatmitigation.png&quot; title=&quot;Reduction of Supply Chain Vulnerability Drivers leads to a Simplification of the respective Graphs&quot; alt=&quot;Vulnerability graph, before and after applying SCRM.&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 5: Reduction of Supply Chain Vulnerability Drivers leads to a Simplification of the respective Graphs (Wagner and Neshat, 2010)&lt;/div&gt;&lt;/div&gt;

	&lt;p&gt;D3 in figure 5 &amp;#8220;is called a &amp;#8216;sink&amp;#8217; &amp;#8211; which means that D3 can only be influenced by three other drivers and cannot influence others. Considering the graph nodes and edges, supply chain managers can apply risk management methods and implement mitigation strategies to omit or alleviate some of the vulnerability drivers. Figure 5 shows the graph after D3 has been omitted. As one can see, the resulting graph contains less vulnerability than it did prior to implementing the measures.&amp;#8221;&lt;/p&gt;

	&lt;h5&gt;Empirical data for the &lt;span class=&quot;caps&quot;&gt;SCVI&lt;/span&gt;&lt;/h5&gt;

	&lt;p&gt;The authors also conduct a survey with over 700 participants from different industries. Based on their feedback the authors assess the Supply Chain Vulnerability Index for eight different industries. The results are summarized in figure 5. And give support to the hypothesis that the automotive industry has one of the highest risk levels. &lt;/p&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;316&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/neshatsurveyresults.png&quot; title=&quot;Supply Chain Vulnerability within several Industries compared&quot; alt=&quot;Supply chain vulnerability indices (SCVIs) for different industries&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 6: Supply Chain Vulnerability within several Industries compared (Wagner and Neshat, 2010)&lt;/div&gt;&lt;/div&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;I really like the graph approach to assessing supply chain vulnerabilities. And I think it is a great method to support the understanding of a complex system like the supply chain. The article combines two very interesting aspects of it: the practical implementation and the assessment of supply chain vulnerability and a survey to compare different vulnerability levels across industries. The complete article, where you find more details on the survey results and the algorithm for calculating the index, can be downloaded &lt;a href=&quot;http://www.scm.ethz.ch/publications/Academic_publications/Wagner_Neshat_2010_Assessing_the_vulnerability_of_supply_chains_using_graph_theory.pdf&quot; title=&quot;ETH Zürich: Assessing the vulnerability of supply chains using graph theory&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;
From a business and research point of view this article should direct the supply chain risk management efforts especially in the industries with the highest risk levels, Automotive and &lt;span class=&quot;caps&quot;&gt;ICT&lt;/span&gt;.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/InternationalJournalOfProductionEconomics2010WagnerAssessingTheVulnerabilityOfSupplyChainsUsingGraphTheory.png?itok=28QMZy-5&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;	&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=International+Journal+of+Production+Economics&amp;amp;rft_id=info%3A%2F&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=Assessing+the+vulnerability+of+supply+chains+using+graph+theory&amp;amp;rft.issn=&amp;amp;rft.date=2010&amp;amp;rft.volume=126&amp;amp;rft.issue=&amp;amp;rft.spage=121&amp;amp;rft.epage=129&amp;amp;rft.artnum=&amp;amp;rft.au=Wagner%2C+S.M.&amp;amp;rft.au=Neshat%2C+N.&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other%2CBusiness+Management%2C+Supply+Chain+Management&quot;&gt;Wagner, S.M., &amp;amp; Neshat, N. (2010). Assessing the vulnerability of supply chains using graph theory &lt;span style=&quot;font-style: italic;&quot;&gt;International Journal of Production Economics, 126&lt;/span&gt;, 121-129&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/15/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget--12&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--24&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give Assessing Vulnerability of a Supply Chain 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give Assessing Vulnerability of a Supply Chain 2/5&lt;/option&gt;&lt;option value=&quot;60&quot;&gt;Give Assessing Vulnerability of a Supply Chain 3/5&lt;/option&gt;&lt;option value=&quot;80&quot;&gt;Give Assessing Vulnerability of a Supply Chain 4/5&lt;/option&gt;&lt;option value=&quot;100&quot;&gt;Give Assessing Vulnerability of a Supply Chain 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit--12&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-deczHioF5DWTqxhjgvaoia5pbgm0NnfqlpVtdSAytSM&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/graph-theory&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;graph theory&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/index&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;index&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/survey&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;survey&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/vulnerability&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;vulnerability&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/framework&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;framework&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-count-pixel field-type-text-long field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 10 Oct 2011 14:42:00 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1671 at http://scrmblog.dumke.me</guid>
  </item>
  <item>
    <title>Evaluation of a Firm&#039;s Supply Chain Strategy</title>
    <link>http://scrmblog.dumke.me/review/evaluation-of-a-firms-supply-chain-strategy</link>
    <description>&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/2011Perez-FrancoAnApproachToEvaluateAFirmSSupplyChainStrategyAsAConceptualSystem.png?itok=T_sZ94J5&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;Today&amp;#8217;s paper is brand new and based on the dissertation works of Roberto Perez-Franco. It can be considered as a summary of the current state of the art in supply chain strategy and extends knowledge in the field of strategy evaluation. It can be downloaded for example from Yossi Sheffi&amp;#8217;s &lt;a href=&quot;http://web.mit.edu/sheffi/www/Robertopaper23-14-11.pdf&quot; title=&quot;MIT: Yossi Sheffi&quot;&gt;homepage at the &lt;span class=&quot;caps&quot;&gt;MIT&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt;

	&lt;h5&gt;Foundation&lt;/h5&gt;

	&lt;p&gt;The authors founded the following findings on two &lt;a href=&quot;http://en.wikipedia.org/wiki/Action_research&quot; title=&quot;Wikipedia: Action Research&quot;&gt;action research&lt;/a&gt; project with Saflex and a health care company. Several dozen interviews were conducted on different levels within the companies.&lt;/p&gt;

	&lt;p&gt;For the further research the authors define the major terms used: supply chain strategy and the difference between the supply chain and the supply chain strategy:&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;For the purpose of this paper, the supply chain strategy of a firm is understood as the set of ideas behind the activities, decisions and choices of that firm‟s supply chain, which serve as logical bridge between the supply chain operations in the field and the business strategy.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;blockquote&gt;
		&lt;p&gt;The difference between a supply chain and a supply chain strategy is the difference between a set of physical entities and a set of ideas. So, for example, when &lt;span class=&quot;caps&quot;&gt;AMR&lt;/span&gt; Research publishes its &amp;#8220;Supply Chain Top 25&amp;#8221; list, what they are ranking are supply chains, not supply chain strategies.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;h5&gt; Functional Strategy Map (&lt;span class=&quot;caps&quot;&gt;FSM&lt;/span&gt;)&lt;/h5&gt;

	&lt;p&gt;The authors introduce a Functional Strategy Map which &amp;#8220;is a conceptual representation of the supply chain strategy as a bridge between operations and business strategy&amp;#8221;. Three layers are aggregated in the &lt;span class=&quot;caps&quot;&gt;FSM&lt;/span&gt;: strategic, functional and operational (figure 1).&lt;/p&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;118&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/perez-francostrategylayers.png&quot; title=&quot;Elements of a Functional Strategy&quot; alt=&quot;Middle layers of a FSM&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 1: Elements of a Functional Strategy Map (Perez-Franco et al., 2011)&lt;/div&gt;&lt;/div&gt;

	&lt;p&gt;A company&amp;#8217;s supply chain is then evaluated based on the this concept using the criteria mentioned below.&lt;/p&gt;

	&lt;p&gt;A example of the &lt;span class=&quot;caps&quot;&gt;FSM&lt;/span&gt; might look like that from Saflex in figure 2.&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;a class=&quot;scrm_image_link&quot; title=&quot;Example of a Functional Strategy Map (Saflex)&quot; href=&quot;http://scrmblog.dumke.me/sites/default/files/images/perez-francoexamplestrategy.png&quot; onclick=&quot;F1 = window.open(&#039;http://scrmblog.dumke.me/sites/default/files/images/perez-francoexamplestrategy.png&#039;,&#039;Zoom&#039;,&#039;height=1212,width=911,top=-198.5,left=192,toolbar=no,menubar=no,location=no,resize=1,resizable=1,scrollbars=yes&#039;); return false;&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;668&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/perez-francoexamplestrategysmall.png&quot; title=&quot;Example of a Functional Strategy Map (Saflex)&quot; alt=&quot;FSM from Saflex (middle layers)&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 2: Example of a Functional Strategy Map (Perez-Franco et al., 2011; click to enlarge)&lt;/div&gt;&lt;/div&gt;&lt;/p&gt;

	&lt;h5&gt;Evaluation criteria&lt;/h5&gt;

	&lt;p&gt;The evaluation criteria were agreed upon before the first action research, but were adapted due to the new findings from the first and second action research.&lt;/p&gt;

	&lt;p&gt;The final suggested criteria are:&lt;/p&gt;

	&lt;ol&gt;
		&lt;li&gt;&amp;#8220;Support: activities should support the goals of the supply chain strategy&amp;#8221;&lt;/li&gt;
	&lt;/ol&gt;

	&lt;ol&gt;
		&lt;li&gt;&amp;#8220;Consistency: components of the supply chain strategy should be compatible&amp;#8221;&lt;/li&gt;
	&lt;/ol&gt;

	&lt;ol&gt;
		&lt;li&gt;&amp;#8220;Coverage: the supply chain strategy should address all important areas&amp;#8221;&lt;/li&gt;
	&lt;/ol&gt;

	&lt;ol&gt;
		&lt;li&gt;&amp;#8220;Sufficiency: the goals should be fully satisfied by the supply chain strategy&amp;#8221;&lt;/li&gt;
	&lt;/ol&gt;

	&lt;p&gt;Figure 3 illustrates the criteria.&lt;/p&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;512&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/perez-francorelationships.png&quot; title=&quot;Evaluation Critera&quot; alt=&quot;Proposed evaluation criteria&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 3: Evaluation Criteria (Perez-Franco et al., 2011)&lt;/div&gt;&lt;/div&gt;

	&lt;blockquote&gt;
		&lt;p&gt;(1) Functional support: the functional themes are expected to support the strategic themes. (3) Strategic consistency: the strategic themes are expected to be compatible among themselves. (7) Functional coverage: the functional themes are expected to address all the areas of interest to the functions. (10) Functional sufficiency: The functional themes should be satisfied by the operational themes.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;The authors also defined methods to evaluate these criteria within a company. I highlight the results of the consistency check here and refer you to the full paper if you are interested in more about the methods used here.&lt;/p&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;a class=&quot;scrm_image_link&quot; title=&quot;Incompatibility Matrix for the Functional Layer&quot; href=&quot;http://scrmblog.dumke.me/sites/default/files/images/perez-francoincompatibilitymatrix.png&quot; onclick=&quot;F1 = window.open(&#039;http://scrmblog.dumke.me/sites/default/files/images/perez-francoincompatibilitymatrix.png&#039;,&#039;Zoom&#039;,&#039;height=939,width=998,top=-62,left=148.5,toolbar=no,menubar=no,location=no,resize=1,resizable=1,scrollbars=yes&#039;); return false;&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;470&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/perez-francoincompatibilitymatrixsmall.png&quot; title=&quot;Incompatibility Matrix for the Functional Layer&quot; alt=&quot;Libica&amp;#039;s FT-FT Matrix showing the &amp;#039;Incompatible&amp;#039; values&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 4: Incompatibility Matrix for the Functional Layer (Perez-Franco et al., 2011; click to enlarge)&lt;/div&gt;&lt;/div&gt;

	&lt;p&gt;Figure 4 shows the incompatibility matrix for the second company. Each axis contains the functional goals of the company and the percentages indicate the incompatibility between the ideas as given by the interviewees (lower means more compatible).&lt;/p&gt;

	&lt;p&gt;Thus this graph gives an good overview of strategic incompatibilities and clashes.&lt;/p&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;Thats already it. Of course the other criteria have to be evaluated as well and the authors have several of their questionnaires in the appendix.&lt;/p&gt;

	&lt;p&gt;The topic indeed is cutting edge, since there is not yet any literature on supply chain strategy evaluation.&lt;/p&gt;

	&lt;p&gt;Maybe the authors also already gave the reason for this lack of literature: Several studies already found that only less than 50% of the companies actually have a supply chain strategy.&lt;/p&gt;

	&lt;p&gt;But using this concept and these methods is a great way to make the supply chain strategy explicit and documented and evaluate it in the process as well!&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;	&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=International+Journal+of+Production+Economics&amp;amp;rft_id=info%3A%2F&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=An+approach+to+evaluate+a+firm%27s+supply+chain+strategy+as+a+conceptual+system&amp;amp;rft.issn=&amp;amp;rft.date=2011&amp;amp;rft.volume=&amp;amp;rft.issue=&amp;amp;rft.spage=&amp;amp;rft.epage=&amp;amp;rft.artnum=&amp;amp;rft.au=Perez-Franco%2C+R.&amp;amp;rft.au=Singh%2C+M.&amp;amp;rft.au=Sheffi%2C+Y.&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other%2CBusiness+Management%2C+Supply+Chain+Management&quot;&gt;Perez-Franco, R., Singh, M., &amp;amp; Sheffi, Y. (2011). An approach to evaluate a firm&amp;#8217;s supply chain strategy as a conceptual system &lt;span style=&quot;font-style: italic;&quot;&gt;International Journal of Production Economics&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/15/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget--13&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--26&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give Evaluation of a Firm&amp;amp;#039;s Supply Chain Strategy 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give Evaluation of a Firm&amp;amp;#039;s Supply Chain Strategy 2/5&lt;/option&gt;&lt;option value=&quot;60&quot;&gt;Give Evaluation of a Firm&amp;amp;#039;s Supply Chain Strategy 3/5&lt;/option&gt;&lt;option value=&quot;80&quot; selected=&quot;selected&quot;&gt;Give Evaluation of a Firm&amp;amp;#039;s Supply Chain Strategy 4/5&lt;/option&gt;&lt;option value=&quot;100&quot;&gt;Give Evaluation of a Firm&amp;amp;#039;s Supply Chain Strategy 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit--13&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-Fwat4EhMBYAjeQCsrqFHFlOE7aKVyFQA4DgIUPrqvik&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/evaluation&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;evaluation&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/strategy&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;strategy&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/supply-chain&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;supply chain&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/framework&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;framework&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Wed, 05 Oct 2011 12:10:00 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1670 at http://scrmblog.dumke.me</guid>
  </item>
  <item>
    <title>Diversification under Yield Randomness in Inventory Models</title>
    <link>http://scrmblog.dumke.me/review/diversification-under-yield-randomness-in-inventory-models</link>
    <description>&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/EuropeanJournalOfOperationalResearch1993ParlarDiversificationUnderYieldRandomnessInInventoryModels.png?itok=XmKrMPXs&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;I haven&amp;#8217;t really touched on the early research on risks in supply chain management. One major stream is on random yields. Parlar and Wang (1993) were one of the firsts to extend the classic &lt;a href=&quot;http://en.wikipedia.org/wiki/Newsvendor_model&quot; title=&quot;Wikipedia: Newsvendor Model&quot;&gt;Newsboy&lt;/a&gt; and &lt;a href=&quot;http://en.wikipedia.org/wiki/Economic_order_quantity&quot; title=&quot;Wikipedia: Economic Order Quantity&quot;&gt;&lt;span class=&quot;caps&quot;&gt;EOQ&lt;/span&gt;&lt;/a&gt; (Economic Order Quantity) models to include uncertainty.&lt;/p&gt;

	&lt;h5&gt;Models&lt;/h5&gt;

	&lt;p&gt;Both models calculate the optimal inventory while including different cost factors (like setup cost for ordering, inventory holding cost) and decision variables (order volume and order timing). &lt;br /&gt;
As an extension the Newsboy problem also includes random demand.&lt;/p&gt;

	&lt;p&gt;Parlar and Wang now extended these models by a second raw material source and making the availability random of both sources. In this case the yield of the supplier is represented by a exponential distribution with two independent expected yield and standard deviation for both suppliers.&lt;/p&gt;

	&lt;h5&gt;Results&lt;/h5&gt;

	&lt;p&gt;An example of some numerical calculations done on the &lt;span class=&quot;caps&quot;&gt;EOQ&lt;/span&gt; model is represented in figure 1.&lt;br /&gt;
&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;497&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/parlargraph.png&quot; title=&quot;Cost Function depending on the Quantities ordered&quot; alt=&quot;Non-convex objective function of the EOQ model&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 1: Cost Function depending on the Quantities ordered (Parlar and Wang, 1993)&lt;/div&gt;&lt;/div&gt;&lt;/p&gt;

	&lt;p&gt;For both problems the authors find ways to calculate the optimal order decisions (figure 2, for the &lt;span class=&quot;caps&quot;&gt;EOQ&lt;/span&gt; model). But they also admit that solving the newsboy problem required some extra effort and any addition to the model (like a third supplier) would make it even harder to solve.&lt;/p&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/parlarformula.png&quot; title=&quot;Optimal Order Quantities for EOQ Model&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;71&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/parlarformula-500x71.png&quot; title=&quot;Optimal Order Quantities for EOQ Model&quot; alt=&quot;optimal order quantities&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 2: Optimal Order Quantities for &lt;span class=&quot;caps&quot;&gt;EOQ&lt;/span&gt; Model (Parlar and Wang, 1993)&lt;/div&gt;&lt;/div&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;These are operational models and they can and should be applied for operational decisions in inventory management and purchasing. But on the other hand they are also very abstract leaving many parameters out and (according to the authors) being hard to extend.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=European+Journal+of+Operational+Research&amp;amp;rft_id=info%3Adoi%2F10.1016%2F0377-2217%2893%2990205-2&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=Diversification+under+yield+randomness+in+inventory+models&amp;amp;rft.issn=03772217&amp;amp;rft.date=1993&amp;amp;rft.volume=66&amp;amp;rft.issue=1&amp;amp;rft.spage=52&amp;amp;rft.epage=64&amp;amp;rft.artnum=http%3A%2F%2Flinkinghub.elsevier.com%2Fretrieve%2Fpii%2F0377221793902052&amp;amp;rft.au=Parlar%2C+M.&amp;amp;rft.au=Wang%2C+D.&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other%2CBusiness+Management%2C+Supply+Chain+Management&quot;&gt;Parlar, M., &amp;amp; Wang, D. (1993). Diversification under yield randomness in inventory models &lt;span style=&quot;font-style: italic;&quot;&gt;European Journal of Operational Research, 66&lt;/span&gt; (1), 52-64 DOI: &lt;a rev=&quot;review&quot; href=&quot;http://dx.doi.org/10.1016/0377-2217(93)90205-2&quot;&gt;10.1016/0377-2217(93)90205-2&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/15/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget--14&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--28&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give Diversification under Yield Randomness in Inventory Models 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give Diversification under Yield Randomness in Inventory Models 2/5&lt;/option&gt;&lt;option value=&quot;60&quot;&gt;Give Diversification under Yield Randomness in Inventory Models 3/5&lt;/option&gt;&lt;option value=&quot;80&quot;&gt;Give Diversification under Yield Randomness in Inventory Models 4/5&lt;/option&gt;&lt;option value=&quot;100&quot;&gt;Give Diversification under Yield Randomness in Inventory Models 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit--14&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-Fcr3Mc0o_8Esb8fq9iTsEyT0E949_3XG67JgyjiUIDU&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/diversification&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;diversification&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/eoq&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;eoq&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/newsboy&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;newsboy&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/risk&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;risk&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/framework&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;framework&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 03 Oct 2011 10:20:00 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1669 at http://scrmblog.dumke.me</guid>
  </item>
  <item>
    <title>Managing Disruption Risks using Real Options (SCRM Thesis)</title>
    <link>http://scrmblog.dumke.me/review/managing-disruption-risks-using-real-options-scrm-thesis</link>
    <description>&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/2003PochardManagingRisksOfSupply-ChainDisruptionsDualSourcingAsARealOption.png?itok=njJfkBwp&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;This is the seventh contribution to my series on doctoral and master dissertations on Supply Chain Risk Management. This again is a master thesis from the &lt;span class=&quot;caps&quot;&gt;MIT&lt;/span&gt;. An immense effort and dedication is spent on these works only to find the results hidden in the libraries. So the goal is raise interest in the research of my peers.&lt;/p&gt;

	&lt;h5&gt;Author / Topic&lt;/h5&gt;

	&lt;p&gt;This thesis was written by Sophie Pochard already in 2003 as her master thesis at the Massachusetts Institute of Technology, Cambridge, &lt;span class=&quot;caps&quot;&gt;USA&lt;/span&gt;. It can be downloaded here directly at the &lt;a href=&quot;http://ardent.mit.edu/real_options/Real_opts_papers/Master_Thesis-Sophie.pdf&quot; title=&quot;ardent.mit.edu&quot;&gt;&lt;span class=&quot;caps&quot;&gt;MIT&lt;/span&gt;s web site&lt;/a&gt;. It has been supervised by &lt;a href=&quot;http://esd.mit.edu/Faculty_Pages/deneufville/deneufville.htm&quot; title=&quot;esd.mit.edu&quot;&gt;Richard de Neufville&lt;/a&gt;, Professor of Engineering Systems and Civil and Environmental Engineering. The title is: &lt;strong&gt;Managing Risks of Supply-Chain Disruptions: Dual Sourcing as a Real Option&lt;/strong&gt;.&lt;/p&gt;

	&lt;h5&gt;Summary&lt;/h5&gt;

	&lt;p&gt;In her thesis Pochard focussed on multi-sourcing as sole risk mitigation strategy. But first the author elaborates on how resilience in a company can be achieved and more interestingly some limitations to resilience with a focus on dual sourcing, which are:
	&lt;ul&gt;
		&lt;li&gt;Complexitiy, increasing resilience often also increases the complexity of the supply chain (eg. dual sourcing).&lt;/li&gt;
		&lt;li&gt;Risk trade offs, having only a single supplier can also reduce risks (eg. protection of intellectual properties).&lt;/li&gt;
		&lt;li&gt;Cost issues, resilience often increases cost.&lt;/li&gt;
	&lt;/ul&gt;&lt;/p&gt;

	&lt;p&gt;To analyze multiple sourcing strategies Pochard then introduces real options, where the definition is similar to that of a financial option contract:&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;Call options give to their holder the right to undertake an investment, at a cost that is fixed in advance (the exercise price), at or before a given date (the maturity). For example keeping unexploited leases can be assimilated to a call option. Oil companies do not sell or exploit these leases as they want to keep the right to develop them later on; they may, for example, decide to use this right if ever new drilling and production technologies allow to increase recoverable reserve. This is a call option since the exploitation makes it possible to get the income of the underlying. Its exercise price is the investment cost to initiate the production, and the maturity is simply the date until which firms have the authorization to exploit.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;So as the next step dual sourcing is modeled as a real option. And the author presents her results in several diagrams where I show three here in the blog (figures 1 and 2).&lt;/p&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;380&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/pochardresultfrequency.png&quot; title=&quot;Strategy Selection depending on Disruption Frequency&quot; alt=&quot;Optimal Sourcing Strategy According to Disruption Frequency&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 1: Strategy Selection depending on Disruption Frequency (Pochard, 2003)&lt;/div&gt;&lt;/div&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;383&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/pochardresultslocalprice.png&quot; title=&quot;Sensitivity Analysis based on the Price of the local Supplier&quot; alt=&quot;Variation in value according to the changes in price from the local supplier&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 2: Sensitivity Analysis based on the Price of the local Supplier (Pochard, 2003)&lt;/div&gt;&lt;/div&gt;

	&lt;p&gt;Both independent variables (disruption frequency and cost of local supplier in case of disruption) seem to have a major impact towards the selected strategy. Pochard concludes that the real options can be a valid method to analyze the benefits of different strategies.&lt;/p&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;I think that her thesis can be used as a basis for a variety of topics. She writes about disruption risks, resilience and risk mitigation strategies, of course the definition of real options and how to develop and deploy a corresponding model. &lt;br /&gt;
I also think that this variety is also the major weakness of this work. Compared to my last &lt;span class=&quot;caps&quot;&gt;MIT&lt;/span&gt; master thesis (&lt;a href=&quot;http://scrmblog.dumke.me/review/Supply-Chain-Risk-Management-Thesis-Impact-of-demographics-on-supply-chain-risk-management&quot; title=&quot;SCRM Blog: Impact of demographics on supply chain risk management practices&quot;&gt;Impact of demographics on supply chain risk management practices&lt;/a&gt;) Pochard takes a very long time to get to the real topic and browses a long time through other connected fields.&lt;br /&gt;
Nonetheless the results are very interesting and seem to be comparable to other (later) papers.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;	&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=Massachusetts+Institute+of+Technology%2C+Master+Thesis+&amp;amp;rft_id=info%3A%2F&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=Managing+Risks+of+Supply-Chain+Disruptions%3A+Dual+Sourcing+as+a+Real+Option&amp;amp;rft.issn=&amp;amp;rft.date=2003&amp;amp;rft.volume=&amp;amp;rft.issue=&amp;amp;rft.spage=&amp;amp;rft.epage=&amp;amp;rft.artnum=&amp;amp;rft.au=Pochard%2C+S.&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other%2CBusiness+Management%2C+Supply+Chain+Management&quot;&gt;Pochard, S. (2003). Managing Risks of Supply-Chain Disruptions: Dual Sourcing as a Real Option &lt;span style=&quot;font-style: italic;&quot;&gt;Massachusetts Institute of Technology, Master Thesis &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/15/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget--15&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--30&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give Managing Disruption Risks using Real Options (SCRM Thesis) 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give Managing Disruption Risks using Real Options (SCRM Thesis) 2/5&lt;/option&gt;&lt;option value=&quot;60&quot;&gt;Give Managing Disruption Risks using Real Options (SCRM Thesis) 3/5&lt;/option&gt;&lt;option value=&quot;80&quot;&gt;Give Managing Disruption Risks using Real Options (SCRM Thesis) 4/5&lt;/option&gt;&lt;option value=&quot;100&quot; selected=&quot;selected&quot;&gt;Give Managing Disruption Risks using Real Options (SCRM Thesis) 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit--15&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-n4AmPD_iDeb2Lh05owxSHEvj86koV9i60qFVztd3Zg0&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/disruptions&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;disruptions&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/option-theory&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;option theory&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/phd&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;phd&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/thesis&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;thesis&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 26 Sep 2011 13:17:00 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1667 at http://scrmblog.dumke.me</guid>
  </item>
  </channel>
</rss>
