<?xml version="1.0" encoding="utf-8" ?><rss version="2.0" xml:base="http://scrmblog.dumke.me/taxonomy/term/310/all" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:og="http://ogp.me/ns#" xmlns:article="http://ogp.me/ns/article#" xmlns:book="http://ogp.me/ns/book#" xmlns:profile="http://ogp.me/ns/profile#" xmlns:video="http://ogp.me/ns/video#" xmlns:product="http://ogp.me/ns/product#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:sioc="http://rdfs.org/sioc/ns#" xmlns:sioct="http://rdfs.org/sioc/types#" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#">
  <channel>
    <title>Helen Peck</title>
    <link>http://scrmblog.dumke.me/taxonomy/term/310/all</link>
    <description></description>
    <language>en</language>
     <atom:link href="http://scrmblog.dumke.me/taxonomy/term/310/all/feed" rel="self" type="application/rss+xml" />
      <item>
    <title>Management of Vulnerabilities in the UK Aerospace Industry</title>
    <link>http://scrmblog.dumke.me/review/management-of-vulnerabilities-in-the-uk-aerospace-industry</link>
    <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/review/supply-chain-risk-management-for-smes-in-automotive-scs&quot; title=&quot;SCRM Blog: Supply Chain Risk Management for SMEs in Automotive SCs&quot;&gt;Just recently&lt;/a&gt; I took a closer look at some aspects of supply chain risk management in the automotive supply chain. Within limits insights gained from this industry could also be transferred to other examples.&lt;/p&gt;

	&lt;p&gt;Today I review an early work focussing on another manufacturing industry: the UK aerospace manufacturers.&lt;/p&gt;

	&lt;h5&gt;Method&lt;/h5&gt;

	&lt;p&gt;In 2003 Haywood and Peck published their findings of a case study. These covered the foundations of how the companies understand of supply chain risk management. They also reported on some of the risk measures used by the participating companies.&lt;/p&gt;

	&lt;p&gt;All in all 47 semi-structured interviews were conducted with managers of differing levels in the aerospace supply chain.&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;This purposive sampling allowed multiple levels of the supply chain networks to be included in the study, ranging from the focal firm’s customer (purchasing organisations for the armed forces of national governments), through two tiers of suppliers above the Prime. In addition, input came from two industry bodies representing small and medium enterprises (&lt;span class=&quot;caps&quot;&gt;SME&lt;/span&gt;s) nestling in the higher reaches of the supply networks. It was clear however that at least six or seven tiers existed upstream of the Prime Contractor and downstream the final consumers (pilots and other users) remained unvisited.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;As you can see the authors were quite blunt about the limitations of their endeavor to analyze the complete network. Though this constraint should not be taken too seriously, since this study aimed for a preliminary sketch of the status quo only.&lt;/p&gt;

	&lt;h5&gt;Key findings: Risk sources&lt;/h5&gt;

	&lt;p&gt;The first findings come from the assessment of the risk sources faced by the interviewees.&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;First, the respondents did not deal with either the precise geographical location of a problem or on the impact of other ‘external’ sources of risks. [&amp;#8230;]&lt;br /&gt;
In fact several of the managers interviewed related the sources of risk directly back to the Critical Success Factors (&lt;span class=&quot;caps&quot;&gt;CSF&lt;/span&gt;s) for the focal firm’s Strategic Supplier and Commodity Management processes: Cost Focussed Decisions; Extreme Quality/Performance Requirements; Delivery Schedule Adherence; Customer-Supplier Relationships. [&amp;#8230;]&lt;br /&gt;
Nevertheless, the examples put forward by interviewees highlighted tensions between them. The link between interviewees’ perceptions of ‘sources of risk’ and process &lt;span class=&quot;caps&quot;&gt;CSF&lt;/span&gt;s was upheld by members of the industry focus groups involved in the validation exercise. [&amp;#8230;]&lt;br /&gt;
The second theme to emerge was that managers frequently defined a source of risk with reference to acknowledged or perceived constraints imposed by the nature of the product and the structure of the industry.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;Furthermore, many interviewees acknowledged that their supply chain is most vulnerable during times of change, but also that change is a constant state in their supply chain activities. &lt;/p&gt;

	&lt;h5&gt;Key findings: Tools&lt;/h5&gt;

	&lt;p&gt;The second stream of findings analyzes the tools and techniques, which were employed by the companies.&lt;br /&gt;
The authors therefore divide the realm of supply chain management into three tool categories: Supply Chain Planning, Supply Chain Management and Supply Chain Change Management (figure 1).&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/haywood_categories.png&quot; title=&quot;The Spectrum of Supply Chain Management Activity&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/haywood_categories-500x111.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;The Spectrum of Supply Chain Management Activity&quot; alt=&quot;The Spectrum of Supply Chain Management Activity&quot; width=&quot;500&quot; height=&quot;111&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;image_comment&quot;&gt;Figure 1: Continuum of Supply Chain Management Activities (From Strategic to Operational; Haywood and Peck, 2003)&lt;/span&gt;&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;The extreme left of the spectrum is occupied by pure supply chain planning, which in an ‘ideal world’ would be unencumbered by the legacy commitments of existing production facilities or supplier contracts. The right by pure supply chain management actives. These are the day-to-day activities undertaken in the management of a mature established supply chain.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;Figure 2 summarizes the tools used by or considered useful (marked in italics), by the interviewed managers.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/haywood_measures.png&quot; title=&quot;Summary of Tools and Techniques&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/haywood_measures-500x725.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Summary of Tools and Techniques&quot; alt=&quot;Summary of Tools and Techniques&quot; width=&quot;500&quot; height=&quot;725&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;image_comment&quot;&gt;Figure 2: Selected Measures to mitigate Supply Chain Risks (Haywood and Peck, 2003; click to zoom)&lt;/span&gt;&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;However, it is important to recognise that Figure 2 represents only a summary of what is or could be in use somewhere in the network.&lt;br /&gt;
[Also it should be recognized, that] other tools and mitigation techniques again suggest contradictory requirements. For example, to mitigate cost-related risks, lean manufacturing techniques were being used (Set 5), while elsewhere someone is using inventory, capacity and capability buffers on a regular or temporary basis to mitigate delivery or schedule adherence problems (Set 7 and 11).&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;h5&gt;Key findings: Implementation&lt;/h5&gt;

	&lt;p&gt;Lastly, the authors took a look at the obstacles preventing implementation of the tools.&lt;br /&gt;
Three key factors were unveiled.&lt;/p&gt;

	&lt;p&gt;&lt;blockquote&gt;
	&lt;ul&gt;
		&lt;li&gt;The first was staff training, there was quite a widespread recognition that existing tools could be much more effective if implemented correctly.&lt;/li&gt;
		&lt;li&gt;The second was widespread confusion over terminology.&lt;br /&gt;
The research revealed that there was absence of a common understanding of the scope or extent of supply chain risk management, muc h of it relating to confusing and contradictory interpretations of ‘supply chain’.&lt;/li&gt;
		&lt;li&gt;The third issue was visibility.&lt;br /&gt;
&lt;/blockquote&gt;&lt;/li&gt;
	&lt;/ul&gt;&lt;/p&gt;

	&lt;p&gt;Based on the findings the authors developed three methods to help improve implementation.&lt;br /&gt;
&lt;blockquote&gt;
	&lt;ul&gt;
		&lt;li&gt;Method 1, a ‘go it alone’ option was motivated by the possibility of achieving competitive advantage over rival organisations through exclusive or advanced identification of sources of risk. For example, if the consequences of an anticipated event were expected to disrupt others in the same industry sector, an organisation might gain advantage by simply improving its tolerance relative to its competitors.&lt;/li&gt;
		&lt;li&gt;The second method tabled was a more limited audit encompassing the focal firm, its immediate customers and suppliers. The method involves organisations acting collaboratively, in interlocking risk management relationships to produce overlapping information flows all along the supply chains. Such an approach would allow organisations to identify relevant sources of risk within their locus of control or immediate supply chain vicinity and enjoy the confidence that others were doing the same.&lt;/li&gt;
		&lt;li&gt;Method 3 was an extension of Method 2, based on interviewees’ suggestions that the effectiveness of their current management tools would be improved by the introduction of a shared data environment. It was felt that this would significantly reduce the commercial risks attached to sub-optimal supply chain performance. The majority of interviewees considered Method 3 to be sound in principle. It reflected the frequently expressed view that improved sharing of data would lead to consequential improvements in profitability and facilitate the continuous improvement practices that contribute to longer term supply chain health. &lt;br /&gt;
&lt;/blockquote&gt;&lt;/li&gt;
	&lt;/ul&gt;&lt;/p&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;This research gives an glimpse into the early stages of risk management in supply chains in the UK around the turn of the millennium.&lt;br /&gt;
For many companies and supply chains the detected problems still exist.&lt;br /&gt;
Two tasks still remain: First, opening the eyes of decision makers to include a trans-corporate view on risks and embrace supply chain strategies to battle supply chain risks. Ergo, applying holistic system thinking to system problems.&lt;/p&gt;

	&lt;p&gt;Second, finding ways to circumvent the implementation obstacles. How can risks be reduced without compromising the competitiveness and autonomy of the focal company?&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/2003HaywoodImprovingTheManagementOfSupplyChainVulnera-BilityInUkAerospaceManufacturing.png?itok=A-ysD7j0&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=Proceedings+of+the+first+EUROMA%2FPOMS+Conference&amp;amp;rft_id=info%3A%2F&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=Improving+the+Management+of+Supply+Chain+Vulnerability+in+UK+Aerospace+Manufacturing&amp;amp;rft.issn=&amp;amp;rft.date=2003&amp;amp;rft.volume=2&amp;amp;rft.issue=&amp;amp;rft.spage=121&amp;amp;rft.epage=130&amp;amp;rft.artnum=&amp;amp;rft.au=Haywood%2C+M.&amp;amp;rft.au=Peck%2C+H.&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other%2CBusiness+Management%2C+Supply+Chain+Management&quot;&gt;Haywood, M., &amp;amp; Peck, H. (2003). Improving the Management of Supply Chain Vulnerability in UK Aerospace Manufacturing &lt;span style=&quot;font-style: italic;&quot;&gt;Proceedings of the first EUROMA/POMS Conference, 2&lt;/span&gt;, 121-130&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/310/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--2&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give Management of Vulnerabilities in the UK Aerospace Industry 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give Management of Vulnerabilities in the UK Aerospace Industry 2/5&lt;/option&gt;&lt;option value=&quot;60&quot;&gt;Give Management of Vulnerabilities in the UK Aerospace Industry 3/5&lt;/option&gt;&lt;option value=&quot;80&quot; selected=&quot;selected&quot;&gt;Give Management of Vulnerabilities in the UK Aerospace Industry 4/5&lt;/option&gt;&lt;option value=&quot;100&quot;&gt;Give Management of Vulnerabilities in the UK Aerospace Industry 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-AD4CNHhJA1JDf0SaTMX1WcmIG7FzbldqBF62iVK34EE&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/aerospace&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;aerospace&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/case-study&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;case study&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/implementation&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;implementation&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-count-pixel field-type-text-long field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;&lt;img src=&quot;http://vg05.met.vgwort.de/na/8458bd40653d4f3fbc4c3cfa8795bada&quot; width=&quot;1&quot; height=&quot;1&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 14 May 2012 13:40:33 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1799 at http://scrmblog.dumke.me</guid>
  </item>
  <item>
    <title>From Supply Chain Vulnerabilities to Risk - Important Concepts in Supply Chain Risk Management</title>
    <link>http://scrmblog.dumke.me/review/from-supply-chain-vulnerabilities-to-risk-important-concepts-in-supply-chain-risk-management</link>
    <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;This blog may be a good starting point for supply chain risk management related research and literature, but even with more than 140 articles reviewed in the blog I still just touched the tip of the iceberg. There are still many basic articles left. Like this one by Helen Peck (2006): &amp;#8220;Reconciling supply chain vulnerability, risk and supply chain management&amp;#8221;&lt;/p&gt;

	&lt;h5&gt;Terms in &lt;span class=&quot;caps&quot;&gt;SCRM&lt;/span&gt;&lt;/h5&gt;

	&lt;p&gt;Today I have a look at, what is basically a literature review concerned with clarifying the confusion with the terms used when talking about risks in supply chains.&lt;/p&gt;

	&lt;p&gt;There are a wide range of different terms and concepts used in the wider field of supply chain risk management. How do the terms vulnerability and risk correlate and how are those embedded in supply chain management? On another level: How are  corporate governance, business continuity management and security and emergency planning relating to &lt;span class=&quot;caps&quot;&gt;SCRM&lt;/span&gt;?&lt;/p&gt;

	&lt;h5&gt;Supply Chain&lt;/h5&gt;

	&lt;p&gt;Starting from a &amp;#8220;standard&amp;#8221; supply chain definition as a system, comprising&amp;#8230;&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;&amp;#8230;flows of materials, goods and information (including money), which pass within and between organisations, linked by a range of tangible and intangible facilitators, including relationships processes, activities and integrated (information) systems.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;The first definitions for &amp;#8220;supply chain management&amp;#8221; came up in the early 1980s and developed from a very logistical view on a supply chain towards a network understanding, comprising aspects like marketing or product development as well. There also has to be a clear distinction between a strategic level tasks in &lt;span class=&quot;caps&quot;&gt;SCM&lt;/span&gt; and their functional execution.&lt;/p&gt;

	&lt;h5&gt;Vulnerability and resilience&lt;/h5&gt;

	&lt;blockquote&gt;
		&lt;p&gt;Within &lt;span class=&quot;caps&quot;&gt;SCM&lt;/span&gt; there is no clear consensus as to whether supply chain vulnerability is simply a symptom of poor &lt;span class=&quot;caps&quot;&gt;SCM&lt;/span&gt;—to be remedied with more effective &lt;span class=&quot;caps&quot;&gt;SCM&lt;/span&gt; and the wider adoption of a &lt;span class=&quot;caps&quot;&gt;SCO&lt;/span&gt;—or whether it is the unintended downside consequence of its successful application. Perhaps it should rightly be regarded as a combination of all of these.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;Supply chain vulnerability can be defined as an &amp;#8220;exposure to serious disturbance, arising from risks within the supply chain as well as risks external to the supply chain&amp;#8221; and as &amp;#8220;a condition that is caused by time and relationship dependencies in a company’s activities in a supply chain&amp;#8221;. Vulnerability is therefore seen as a combination of a disturbance and the resulting negative consequence.&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;The concept of “resilience” is related to risk and vulnerability in so far as it accepts that not all &amp;#8220;risks&amp;#8221; (hazards or threats) can be avoided, controlled, or eliminated. Instead, resilience focuses on the &amp;#8220;ability of the system to return to is original or desired state after being disturbed&amp;#8221;, i.e. its ability to absorb or mitigate the impact of the disturbance.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;h5&gt;Corporate risk management&lt;/h5&gt;

	&lt;p&gt;Supply chain (risk) management and its counterpart on a corporate level do not share the same origin. Where supply chain management stems from a more comprehensive view on operational management aspects like logistics and operations; corporate risk management originates in a strategic / macroeconomic view on the company.&lt;/p&gt;

	&lt;p&gt;These roots also lead to a different understanding for risk management. In a case where corporate risk management suggests outsourcing of non-core processes for risk reduction, a supply chain risk management view would imply a larger weight on the negative effects of the reduction in control.&lt;/p&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;Finally, Peck emphasizes the different aspects of risks in supply chains and highlights the distinctive factors:&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;Consequently, it is suggested that managerial views of supply chain risk, based on assumptions drawn principally from best practice in manufacturing enterprises, offer a familiar, convenient but incomplete picture of supply chain vulnerability. &lt;span class=&quot;caps&quot;&gt;SCM&lt;/span&gt; is an integrative, cross-functional discipline, so it must be recognised that supply chain vulnerability is also a concern for practitioners and academics in other disciplines, including &lt;span class=&quot;caps&quot;&gt;BCM&lt;/span&gt; and corporate risk management.&lt;/p&gt;
	&lt;/blockquote&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/InternationalJournalOfLogistics2006PeckReconcilingSupplyChainVulnerabilityRiskAndSupplyChainManagement.png?itok=Ws2WmOBQ&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;	&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=International+Journal+of+Logistics&amp;amp;rft_id=info%3Adoi%2F10.1080%2F13675560600673578&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=Reconciling+supply+chain+vulnerability%2C+risk+and+supply+chain+management&amp;amp;rft.issn=1367-5567&amp;amp;rft.date=2006&amp;amp;rft.volume=9&amp;amp;rft.issue=2&amp;amp;rft.spage=127&amp;amp;rft.epage=142&amp;amp;rft.artnum=http%3A%2F%2Fwww.informaworld.com%2Fopenurl%3Fgenre%3Darticle%26doi%3D10.1080%2F13675560600673578%26magic%3Dcrossref%7C%7CD404A21C5BB053405B1A640AFFD44AE3&amp;amp;rft.au=Peck%2C+H.&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other%2CBusiness+Management%2C+Supply+Chain+Management&quot;&gt;Peck, H. (2006). Reconciling supply chain vulnerability, risk and supply chain management &lt;span style=&quot;font-style: italic;&quot;&gt;International Journal of Logistics, 9&lt;/span&gt; (2), 127-142 &lt;span class=&quot;caps&quot;&gt;DOI&lt;/span&gt;: &lt;a rev=&quot;review&quot; href=&quot;http://dx.doi.org/10.1080/13675560600673578&quot;&gt;10.1080/13675560600673578&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/310/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget--2&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--4&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give From Supply Chain Vulnerabilities to Risk - Important Concepts in Supply Chain Risk Management 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give From Supply Chain Vulnerabilities to Risk - Important Concepts in Supply Chain Risk Management 2/5&lt;/option&gt;&lt;option value=&quot;60&quot;&gt;Give From Supply Chain Vulnerabilities to Risk - Important Concepts in Supply Chain Risk Management 3/5&lt;/option&gt;&lt;option value=&quot;80&quot; selected=&quot;selected&quot;&gt;Give From Supply Chain Vulnerabilities to Risk - Important Concepts in Supply Chain Risk Management 4/5&lt;/option&gt;&lt;option value=&quot;100&quot;&gt;Give From Supply Chain Vulnerabilities to Risk - Important Concepts in Supply Chain Risk Management 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit--2&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-_YBm3nc40byqwjCd5jcnPUwKxi51q_z5B6I3QCaaEds&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/definition&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;definition&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/resilience&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;resilience&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/risk&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;risk&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/vulnerability&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;vulnerability&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/definitions&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;definitions&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-count-pixel field-type-text-long field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 27 Jun 2011 13:43:00 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1639 at http://scrmblog.dumke.me</guid>
  </item>
  <item>
    <title>Supply Chain Risk Sources, Consequences, Drivers and Mitigation</title>
    <link>http://scrmblog.dumke.me/review/supply-chain-risk-sources-consequences-drivers-and-mitigation</link>
    <description>&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/InternationalJournalOfLogisticsResearchAndApplications2003J%C3%BCTtnerSupplyChainRiskManagementOutliningAnAgendaForFutureResearch.png?itok=5etmgIDj&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;I just stumbled upon one of the articles I already read about a year ago, shortly after I started my research. Beside indication of a future research agenda (see as well &lt;a href=&quot;http://scrmblog.dumke.me/review/research-agenda-for-scrm&quot; title=&quot;scrmblog.dumke.me&quot;&gt;here&lt;/a&gt;), Jüttner et al. (2003) also explain some fundamental concepts of supply chain risk management.&lt;/p&gt;

	&lt;h5&gt;How to get there?&lt;/h5&gt;

	&lt;p&gt;Jüttner et al. decided to conduct a exploratory study with practitioner interviews and compare these results with a literature review. Four basic concepts for Supply Chain Risk Management evolved from this, namely Risk Sources, Risk Consequences, Risk Drivers and Risk Mitigation Strategies.&lt;/p&gt;

	&lt;h5&gt;Risk Sources &lt;/h5&gt;

	&lt;p&gt;&lt;blockquote&gt;[are] environmental, organisational or supply chain-related variables which cannot be predicted with certainty and which impact on the supply chain outcome variables&lt;/blockquote&gt;            &lt;br /&gt;
So there are three categories for risk sources: Environmental, Network and Organization.
	&lt;ul&gt;
		&lt;li&gt;&lt;strong&gt;Environmental&lt;/strong&gt; risk sources may for example be the result of accidents (eg. fire), socio-political actions (eg. terrorist attacks) or force majeure (like hurricanes or earthquakes)&lt;/li&gt;
		&lt;li&gt;&lt;strong&gt;Network-related&lt;/strong&gt; risk sources unfold from interactions between organisations within the supply chain, examples are: &lt;u&gt;Lack of Ownership&lt;/u&gt; (unclear responsibilites between supply chain partners eg. due to increased concentration and outsourcing), &lt;u&gt;Chaos&lt;/u&gt; can result from missing trust or badly communicated information, finally &lt;u&gt;Inertia&lt;/u&gt; describes a lack of flexibility within the supply chain.&lt;br /&gt;
The interviews showed &lt;blockquote&gt;a consensus that network-related risks are an important and so far neglected source of risk.&lt;/blockquote&gt;&lt;/li&gt;
		&lt;li&gt;&lt;strong&gt;Organisational&lt;/strong&gt; risk sources can be found within one of the participants of the supply chain in focus and can be found within the production factors like labour (strikes), machines (failure), etc.&lt;/li&gt;
	&lt;/ul&gt;&lt;/p&gt;

	&lt;p&gt;To conclude: From the point of view of the links within the supply chain, environmental and organizational uncertainties can be seen as risks &amp;#8220;to&amp;#8221; the links in the supply chain whereas network-related uncertainties are risk sources &amp;#8220;of&amp;#8221; the links.&lt;/p&gt;

	&lt;h5&gt;Risk Consequences&lt;/h5&gt;

	&lt;p&gt;Risk can have consequences can be measured ex post by the performance indicators used. Ex ante they are contained within the variances of the indicators. Three different consequences can be named:
	&lt;ul&gt;
		&lt;li&gt;Financial consequences&lt;/li&gt;
		&lt;li&gt;Reputation damage&lt;/li&gt;
		&lt;li&gt;Health and safety concerns&lt;/li&gt;
	&lt;/ul&gt;&lt;/p&gt;

	&lt;h5&gt;Risk Drivers&lt;/h5&gt;

	&lt;p&gt;Risk drivers further increase the risk experienced by the supply chain participants (examples: competition increases the risk indirectly, outsourcing (increased complexity) has a direct effect on risks)&lt;/p&gt;

	&lt;p&gt;The major drivers for risk are: focus on &lt;strong&gt;efficiency&lt;/strong&gt; rather than effectiveness, &lt;strong&gt;globalization&lt;/strong&gt; of supply chains, &lt;strong&gt;focussed factories&lt;/strong&gt; and centralized distribution, the trend to &lt;strong&gt;outsourcing&lt;/strong&gt; and the reduction of the &lt;strong&gt;supplier base&lt;/strong&gt;.&lt;/p&gt;

	&lt;h5&gt;Risk Mitigating Strategies&lt;/h5&gt;

	&lt;p&gt;&amp;#8230; can be defined as &lt;blockquote&gt;strategic moves organisations deliberately undertake to mitigate the uncertainties identified from the various risk sources (Miller, 1992)&lt;/blockquote&gt;&lt;/p&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;The results of this article experienced a widespread use and are accepted by many researchers. The definitions mentioned can be used as basis for further research in the supply chain risk management field.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;	&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=International+Journal+of+Logistics+Research+and+Applications&amp;amp;rft_id=info%3Adoi%2F10.1080%2F13675560310001627016&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=Supply+Chain+Risk+Management%3A+Outlining+an+Agenda+for+Future+Research&amp;amp;rft.issn=1367-5567&amp;amp;rft.date=2003&amp;amp;rft.volume=6&amp;amp;rft.issue=4&amp;amp;rft.spage=197&amp;amp;rft.epage=210&amp;amp;rft.artnum=http%3A%2F%2Fwww.informaworld.com%2Fopenurl%3Fgenre%3Darticle%26doi%3D10.1080%2F13675560310001627016%26magic%3Dcrossref%7C%7CD404A21C5BB053405B1A640AFFD44AE3&amp;amp;rft.au=Juttner%2C+U.&amp;amp;rft.au=Peck%2C+H.&amp;amp;rft.au=Christopher%2C+M.&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other%2CBusiness+Management&quot;&gt;Juttner, U., Peck, H., &amp;amp; Christopher, M. (2003). Supply Chain Risk Management: Outlining an Agenda for Future Research &lt;span style=&quot;font-style: italic;&quot;&gt;International Journal of Logistics Research and Applications, 6&lt;/span&gt; (4), 197-210 &lt;span class=&quot;caps&quot;&gt;DOI&lt;/span&gt;: &lt;a rev=&quot;review&quot; href=&quot;http://dx.doi.org/10.1080/13675560310001627016&quot;&gt;10.1080/13675560310001627016&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/310/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget--3&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--6&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give Supply Chain Risk Sources, Consequences, Drivers and Mitigation 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give Supply Chain Risk Sources, Consequences, Drivers and Mitigation 2/5&lt;/option&gt;&lt;option value=&quot;60&quot;&gt;Give Supply Chain Risk Sources, Consequences, Drivers and Mitigation 3/5&lt;/option&gt;&lt;option value=&quot;80&quot;&gt;Give Supply Chain Risk Sources, Consequences, Drivers and Mitigation 4/5&lt;/option&gt;&lt;option value=&quot;100&quot;&gt;Give Supply Chain Risk Sources, Consequences, Drivers and Mitigation 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit--3&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-4HQ-pGy965hAb1c9loQtH2SfPTYbQawjIPLw7lfVPlQ&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/definition&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;definition&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/risk&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;risk&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/definitions&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;definitions&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Wed, 23 Feb 2011 09:35:00 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1609 at http://scrmblog.dumke.me</guid>
  </item>
  </channel>
</rss>
