<?xml version="1.0" encoding="utf-8" ?><rss version="2.0" xml:base="http://scrmblog.dumke.me/taxonomy/term/170/all" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:og="http://ogp.me/ns#" xmlns:article="http://ogp.me/ns/article#" xmlns:book="http://ogp.me/ns/book#" xmlns:profile="http://ogp.me/ns/profile#" xmlns:video="http://ogp.me/ns/video#" xmlns:product="http://ogp.me/ns/product#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:sioc="http://rdfs.org/sioc/ns#" xmlns:sioct="http://rdfs.org/sioc/types#" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#">
  <channel>
    <title>Ravi Shankar</title>
    <link>http://scrmblog.dumke.me/taxonomy/term/170/all</link>
    <description></description>
    <language>en</language>
     <atom:link href="http://scrmblog.dumke.me/taxonomy/term/170/all/feed" rel="self" type="application/rss+xml" />
      <item>
    <title>Enablers and Barriers to Risk Mitigation</title>
    <link>http://scrmblog.dumke.me/review/enablers-and-barriers-to-risk-mitigation</link>
    <description>&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/BusinessProcessManagementJournal2006FaisalSupplyChainRiskMitigationModelingTheEnablers.png?itok=_ohk2FzS&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;Everybody concerned with the task of developing risk mitigation strategies has a list in his mind of different factors influencing a company&amp;#8217;s exposure to risk and if you think about it: those factors are probably related.&lt;/p&gt;

	&lt;p&gt;Example: The number of suppliers for one component can have a huge impact on risk, but the necessity of a high number of (redundant) suppliers may itself be affected by the trust you built with your main supplier. Both trust and having multiple suppliers affect supply chain risk by themselves, but they are also related.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://faculty.qu.edu.qa/nishatf/research.aspx&quot; title=&quot;faculty.qu.edu.qa&quot;&gt;Faisal&lt;/a&gt; et al (2006) investigate these relations in a more in depth way.&lt;/p&gt;

	&lt;h5&gt;Results&lt;/h5&gt;

	&lt;p&gt;Their results are summarized in figure 1. Information sharing has the most driving capabilities and is therefore located on the bottom of the pyramid. Aligning incentives within the supply chain also drives SC risks but is itself dependent on the information sharing within the supply chain, and so on.&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;433&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/faisalmodel.png&quot; title=&quot;Supply Chain Risk Mitigation Hierarchy&quot; alt=&quot;Risk Mitigation Hierarchy for the Supply Chain Setting&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 1: Hierarchy based Model for Risk Mitigation in Supply Chains (Faisal et al., 2006)&lt;/div&gt;&lt;/div&gt;&lt;/p&gt;

	&lt;h5&gt;Methodology &lt;/h5&gt;

	&lt;p&gt;The authors used &lt;a href=&quot;https://en.wikipedia.org/wiki/OPMS&quot; title=&quot;en.wikipedia.org&quot;&gt;Interpretive Structural Modeling&lt;/a&gt; to come to these results. The goal is to transform a plain list of variables which are affecting a system into a hierarchy.&lt;/p&gt;

	&lt;p&gt;Steps:&lt;ol&gt;&lt;li&gt;Generate the relevant factors (eg. using  brain storming technique)&lt;/li&gt;&lt;li&gt;Transform the list into a matrix and mark dependencies using expert opinion (see figure 2)&lt;/li&gt;&lt;li&gt;Extend the matrix and calculate driving capabilities and dependence (last row / line, see figure 3)&lt;/li&gt;&lt;li&gt;Using these results build the model&lt;/li&gt;&lt;/ol&gt;&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;213&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/faisaldependencies.png&quot; title=&quot;Structural Self Interaction Matrix&quot; alt=&quot;Matrix showing the Interaction between the System-Affecting-Variables&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 2: Structural Self Interaction Matrix (V: Line influences row, A: row influences line, X: influence each other, O: no influence; Faisal et al., 2006)&lt;/div&gt;&lt;/div&gt;&lt;/p&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;227&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/faisalreachabilitymatrix.png&quot; title=&quot;Reachability Matrix showing dependent and driving Variables&quot; alt=&quot;Reachability Matrix showing dependent and driving Variables&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 3: Reachability Matrix (Faisal et al., 2006)&lt;/div&gt;&lt;/div&gt;

	&lt;h5&gt;Conclusion / Critique&lt;/h5&gt;

	&lt;p&gt;This model shows several important points: some factors are supposed to be drivers of risk mitigation, therefore influencing them will have a much wider positive effect then only locally. Risk managers should thus focus their time and money on these factors!&lt;/p&gt;

	&lt;p&gt;The method used has also its drawbacks. First, The results presented by Faisal et al. (2006) are aimed on a very high abstraction level, starting with the initial list, which is the foundation of the whole hierarchy. Since there is no iteration process to enhance this initial list again, it is of utmost importance to be very sure about it. Second, there are also no recursive relations between variable, for example one could think that agility in the supply chain (high dependence index) might influence the trust among the supply chain partners (very high driving index) due to a more customer oriented performance. Third, the resulting list is heavily dependent on the expert opinion, which transforms the variable listing into the dependence matrix.&lt;/p&gt;

	&lt;p&gt;Those caveats have to be considered before using the resulting hierarchy; for most practitioners looking for such a listing, the best way to proceed would be to recreate it with variables specific to the context of the company.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;	&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=Business+Process+Management+Journal&amp;amp;rft_id=info%3A%2F&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=Supply+Chain+Risk+Mitigation%3A%0D%0AModeling+the+Enablers&amp;amp;rft.issn=&amp;amp;rft.date=2006&amp;amp;rft.volume=12&amp;amp;rft.issue=4&amp;amp;rft.spage=535&amp;amp;rft.epage=552&amp;amp;rft.artnum=&amp;amp;rft.au=Faisal%2C+M.+N.&amp;amp;rft.au=Banwet%2C+D.K.&amp;amp;rft.au=Shankar%2C+R.&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other%2CBusiness+Management&quot;&gt;Faisal, M. N., Banwet, D.K., &amp;amp; Shankar, R. (2006). Supply Chain Risk Mitigation:&amp;#13;&lt;br /&gt;
Modeling the Enablers &lt;span style=&quot;font-style: italic;&quot;&gt;Business Process Management Journal, 12&lt;/span&gt; (4), 535-552&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/170/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--2&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give Enablers and Barriers to Risk Mitigation 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give Enablers and Barriers to Risk Mitigation 2/5&lt;/option&gt;&lt;option value=&quot;60&quot;&gt;Give Enablers and Barriers to Risk Mitigation 3/5&lt;/option&gt;&lt;option value=&quot;80&quot; selected=&quot;selected&quot;&gt;Give Enablers and Barriers to Risk Mitigation 4/5&lt;/option&gt;&lt;option value=&quot;100&quot;&gt;Give Enablers and Barriers to Risk Mitigation 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-cw6O3vT0IsKkbAzSfLUMywEEuYxQxlCGFDG5S6E1das&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/mitigation&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;mitigation&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/risk&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;risk&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/framework&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;framework&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 13 Dec 2010 10:14:00 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1550 at http://scrmblog.dumke.me</guid>
  </item>
  <item>
    <title>Managing Information Risks</title>
    <link>http://scrmblog.dumke.me/review/managing-information-risks</link>
    <description>&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/JournalOfEnterpriseInformationManagement2007FaisalInformationRisksManagementInSupplyChainsAnAssessmentAndMitigationFramework.png?itok=0zZ1S6H8&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;At the moment I am looking for gaps in my reading up to now and I found that I have not read much about information risks. It also seems that those risks are not (yet?) in focus, neither in research nor business. So I was happy to find &amp;#8220;Information risks management in supply chains: an assessment and mitigation framework&amp;#8221; by &lt;a href=&quot;http://faculty.qu.edu.qa/nishatf/&quot; title=&quot;faculty.qu.edu.qa&quot;&gt;Faisal&lt;/a&gt;, &lt;a href=&quot;http://dms.iitd.ac.in/?option=com_content&amp;amp;amp;view=article&amp;amp;amp;id=90&amp;amp;amp;Itemid=152&quot; title=&quot;dmsiitd.org&quot;&gt;Banwet&lt;/a&gt; and Shankar.&lt;/p&gt;

	&lt;h5&gt;Topic / Methodology&lt;/h5&gt;

	&lt;p&gt;The purpose of the paper is to provide a framework for the management of information risks, and to device a way to measure them. The authors therefore use &lt;a href=&quot;https://en.wikipedia.org/wiki/Graph_theory&quot; title=&quot;en.wikipedia.org&quot;&gt;graph theory&lt;/a&gt; and &lt;a href=&quot;https://en.wikipedia.org/wiki/OPMS&quot; title=&quot;en.wikipedia.org&quot;&gt;interpretive structural modeling&lt;/a&gt; to model the interrelations between risks and their drivers and develop a framework for mitigating the risks. They start categorizing information risks as follows:&lt;ul&gt;&lt;li&gt;Information security / breakdown risks (I1)&lt;/li&gt;&lt;li&gt;forecast risks (I2)&lt;/li&gt;&lt;li&gt;intellectual property rights risks (I3)&lt;/li&gt;&lt;li&gt;IT/IS outsourcing risks (I4)&lt;/li&gt;&lt;/ul&gt;&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;292&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/faisalinformationframework.png&quot; title=&quot;Framework for Mitigating Information Risks in Supply Chains&quot; alt=&quot;Risk Mitigation Model for Information Risks&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 1: Model for Information Risk Mitigation in a Supply Chain (Faisal et al. 2007)&lt;/div&gt;&lt;/div&gt;&lt;/p&gt;

	&lt;h5&gt;Framework &lt;/h5&gt;

	&lt;p&gt;The authors next developed the variables which help to reduce information risks using brainstorming sessions. This resulted in 12 variables which where then analyzed using above mentioned methods.&lt;/p&gt;

	&lt;p&gt;Figure 1 shows the resulting framework. I found it especially interesting that a &amp;#8220;soft factor&amp;#8221; like management commitment had such an integral role in this framework, pointing the finger on something that business often neglects when managing risks.&lt;/p&gt;

	&lt;h5&gt;Risk Measurement&lt;/h5&gt;

	&lt;p&gt;The framework implies a focal role of measuring the impacts of different risks. The authors conclude: &lt;blockquote&gt;Measurement of information risks is important to understand their contribution to overall risk susceptibility of the supply chain, and also to determine the impact of the efforts to mitigate them.&lt;/blockquote&gt;&lt;/p&gt;

	&lt;p&gt;With this in mind the authors first determine the interrelationships between the above mentioned risks and then suggest the formula of their &amp;#8220;information risk index&amp;#8221;.&lt;/p&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;310&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/faisalinformationrisks.png&quot; title=&quot;Influence Diagram on the four Information Risks&quot; alt=&quot;Interrelations between Information Risks&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 2: Representation of the four Information Risk Variables (Faisal et al. 2007)&lt;/div&gt;&lt;/div&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;116&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/faisalinfoformula.png&quot; title=&quot;Aggregating the Information Risks into one Index&quot; alt=&quot;Risk Index for Information Risks&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 3: Information Risk Index of the Supply Chain (Faisal et al. 2007)&lt;/div&gt;&lt;/div&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;I liked reading this article and I agree with the conclusions. When analyzing the results, you also have to keep in mind that this work has not been based on a widespread consensus or even tested empirically.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;	&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=Journal+of+Enterprise+Information+Management&amp;amp;rft_id=info%3Adoi%2F10.1108%2F17410390710830727&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=Information+risks+management+in+supply+chains%3A+an+assessment+and+mitigation+framework&amp;amp;rft.issn=1741-0398&amp;amp;rft.date=2007&amp;amp;rft.volume=20&amp;amp;rft.issue=6&amp;amp;rft.spage=677&amp;amp;rft.epage=699&amp;amp;rft.artnum=http%3A%2F%2Fwww.emeraldinsight.com%2F10.1108%2F17410390710830727&amp;amp;rft.au=Faisal%2C+M.&amp;amp;rft.au=Banwet%2C+D.&amp;amp;rft.au=Shankar%2C+R.&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other%2CBusiness+Management&quot;&gt;Faisal, M., Banwet, D., &amp;amp; Shankar, R. (2007). Information risks management in supply chains: an assessment and mitigation framework &lt;span style=&quot;font-style: italic;&quot;&gt;Journal of Enterprise Information Management, 20&lt;/span&gt; (6), 677-699 &lt;span class=&quot;caps&quot;&gt;DOI&lt;/span&gt;: &lt;a rev=&quot;review&quot; href=&quot;http://dx.doi.org/10.1108/17410390710830727&quot;&gt;10.1108/17410390710830727&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/170/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget--2&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--4&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give Managing Information Risks 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give Managing Information Risks 2/5&lt;/option&gt;&lt;option value=&quot;60&quot;&gt;Give Managing Information Risks 3/5&lt;/option&gt;&lt;option value=&quot;80&quot;&gt;Give Managing Information Risks 4/5&lt;/option&gt;&lt;option value=&quot;100&quot;&gt;Give Managing Information Risks 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit--2&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-nV6M5NSxdM77S2Q6mbjifg83oeUm-vOrgPB2HpLXoFY&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/information&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;information&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/measuring&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;measuring&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/risk&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;risk&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/framework&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;framework&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Wed, 17 Nov 2010 12:32:00 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1597 at http://scrmblog.dumke.me</guid>
  </item>
  </channel>
</rss>
