<?xml version="1.0" encoding="utf-8" ?><rss version="2.0" xml:base="http://scrmblog.dumke.me/taxonomy/term/384/all" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:og="http://ogp.me/ns#" xmlns:article="http://ogp.me/ns/article#" xmlns:book="http://ogp.me/ns/book#" xmlns:profile="http://ogp.me/ns/profile#" xmlns:video="http://ogp.me/ns/video#" xmlns:product="http://ogp.me/ns/product#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:sioc="http://rdfs.org/sioc/ns#" xmlns:sioct="http://rdfs.org/sioc/types#" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#">
  <channel>
    <title>vulnerability</title>
    <link>http://scrmblog.dumke.me/taxonomy/term/384/all</link>
    <description></description>
    <language>en</language>
     <atom:link href="http://scrmblog.dumke.me/taxonomy/term/384/all/feed" rel="self" type="application/rss+xml" />
      <item>
    <title>An Empirical Investigation into Supply Chain Vulnerability</title>
    <link>http://scrmblog.dumke.me/review/an-empirical-investigation-into-supply-chain-vulnerability</link>
    <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;One basic assumption in risk-aware supply chain design is the notion that the design of the supply chain actually has an impact on the vulnerability of the supply chain.&lt;br /&gt;
This question has been analyzed about six years ago in a broad empirical study by Wagner and Bode.&lt;/p&gt;

	&lt;h5&gt;Method&lt;/h5&gt;

	&lt;p&gt;The authors use a rather large sample of companies in Germany. Overall nearly 5000 supply chain professionals were asked to participate and 760 actually took part in the study.&lt;br /&gt;
Most sample companies had an industrial focus (72% versus service (20%) and trade (9%)).&lt;br /&gt;
This study is founded on a similar sample as this &lt;a href=&quot;http://scrmblog.dumke.me/review/impact-of-risks-on-supply-chain-performance&quot; title=&quot;SCRM Blog: Impact of Risks on Supply Chain Performance&quot;&gt;other study by Wagner and Bode&lt;/a&gt; analyzing the impact of risks on supply chain performance.&lt;/p&gt;

	&lt;h5&gt;Model&lt;/h5&gt;

	&lt;p&gt;The author focus on some supply chain design variables, which supposedly increase supply chain vulnerabilities. Figure 1 shows the assumed relationship between those drivers of supply chain vulnerability and three supply chain risk categories.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/wagner_risk_concept.png&quot; title=&quot;The relationship between drivers of supply chain vulnerability and supply chain risk&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/wagner_risk_concept-500x130.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;The relationship between drivers of supply chain vulnerability and supply chain risk&quot; alt=&quot;The relationship between drivers of supply chain vulnerability and supply chain risk&quot; width=&quot;500&quot; height=&quot;130&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;image_comment&quot;&gt;Figure 1: Concept: Relationship between Design and Risk&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;The authors propose the following hypothesis, which are then tested using the empirical data:&lt;br /&gt;
&lt;blockquote&gt;
	&lt;ul&gt;
		&lt;li&gt;H1: The higher the drivers of supply chain vulnerability, the higher the level of demand side risk a firm faces.&lt;/li&gt;
		&lt;li&gt;H2: The higher the drivers of supply chain vulnerability, the higher the level of supply side risk a firm faces.&lt;/li&gt;
		&lt;li&gt;H3: The higher the drivers of supply chain vulnerability, the higher the level of catastrophic side risk a firm faces.&lt;br /&gt;
&lt;/blockquote&gt;&lt;/li&gt;
	&lt;/ul&gt;&lt;/p&gt;

	&lt;h5&gt;Results&lt;/h5&gt;

	&lt;p&gt;The results show that all hypothesis are supported by the findings of the authors. However the design factors/vulnerabilities only explain part of the observed supply chain risks (7% for H1, 13% for H2, 3% for H3).&lt;br /&gt;
Demand side risk was influenced by strong customer dependence and strong supplier dependence.&lt;br /&gt;
Supply side risk was influenced by supplier dependence, single sourcing and global sourcing.&lt;br /&gt;
Lastly, catastrophic risk was impacted by the degree of global sourcing.&lt;/p&gt;

	&lt;p&gt;The authors draw the following conclusions:&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;First, the supply chain vulnerability variables in our model explain a rather small portion of the variance in the risk arising from demand side risk sources. It is a low but not astonishing value since the majority of the vulnerability variables focuses on the upstream supply chain. However, the results reveal that customer dependence increases demand side risk. This finding indicates that firms that are dependent on some customers are exposed to a higher risk of suffering from the detrimental effects of demand volatility and poor downstream information. This could be because of order batching or limited possibilities of demand pooling. [&amp;#8230;] This leads to the hypothesis that, beyond the investigated variables, there are several additional aspects both internal and external to the supply chain that determine a firm&amp;#8217;s exposure to supply chain risk. &lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;blockquote&gt;
		&lt;p&gt;Second, risk derived from supply side risk sources is elevated by supplier dependence, single sourcing and global sourcing. Supplier dependence obviously amplifies the threat from poor quality, supply shortages, sudden demise of one of these suppliers, and poor logistics performance. Although this argumentation also applies to single sourcing, the single sourcing approach seems to be less hazardous than general dependence on some suppliers. This is because single sourcing is usually aligned with a closer relationship that might absorb some of the supply side risk.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;blockquote&gt;
		&lt;p&gt;Third, when it comes to risk from catastrophic risk sources it has to be taken into consideration that the sample data was collected in Germany which has been a very &amp;#8220;calm&amp;#8221; place with regard to disasters. Here, it is solely global sourcing that is a significant factor that exposes firms to higher risk from catastrophes. The implementation of a global sourcing strategy stretches the supply chain geographically which ultimately means more peril points for the information and material flow. The robustness and resilience of regional or national supply chains is usually higher. Surprisingly, the study shows that supplier dependence decreases the risk exposure to catastrophes. Again we would argue that this is because of lack in supply flexibility. Firefighting against the consequences of catastrophic events might be more successful with the ability to quickly adjust the supply.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;I would argue that it is always hard to measure risk consistently in a qualitative study. People are likely to evaluate the same risk quite differently, which might lead to unclear results.&lt;br /&gt;
Furthermore the low impact of these specific design variables emphasizes the view that there are many more factors (internal and external) that impact the exposure to supply chain risk.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/2006WagnerAnEmpiricalInvestigationIntoSuppyChainVulnerabilityExperiencedByGermanFirms.png?itok=71_aK0oX&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=Erich+Schmidt+Verlag&amp;amp;rft_id=info%3A%2F&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=An+Empirical+Investigation+into+Supply+Chain+Vulnerability+Experienced+by+German+Firms&amp;amp;rft.issn=&amp;amp;rft.date=2006&amp;amp;rft.volume=&amp;amp;rft.issue=&amp;amp;rft.spage=79&amp;amp;rft.epage=96&amp;amp;rft.artnum=&amp;amp;rft.au=Wagner%2C+S.M.&amp;amp;rft.au=Bode%2C+C.&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other%2CBusiness+Management%2C+Supply+Chain+Management&quot;&gt;Wagner, S.M., &amp;amp; Bode, C. (2006). An Empirical Investigation into Supply Chain Vulnerability Experienced by German Firms &lt;span style=&quot;font-style: italic;&quot;&gt;Erich Schmidt Verlag&lt;/span&gt;, 79-96&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/384/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--2&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give An Empirical Investigation into Supply Chain Vulnerability 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give An Empirical Investigation into Supply Chain Vulnerability 2/5&lt;/option&gt;&lt;option value=&quot;60&quot; selected=&quot;selected&quot;&gt;Give An Empirical Investigation into Supply Chain Vulnerability 3/5&lt;/option&gt;&lt;option value=&quot;80&quot;&gt;Give An Empirical Investigation into Supply Chain Vulnerability 4/5&lt;/option&gt;&lt;option value=&quot;100&quot;&gt;Give An Empirical Investigation into Supply Chain Vulnerability 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-JTeBowJCud-iGFN0_cJMRaSwyuH39QDXu-PDCposDUk&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/design&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;design&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/vulnerability&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;vulnerability&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/exposure&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;exposure&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-count-pixel field-type-text-long field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;&lt;img src=&quot;http://vg05.met.vgwort.de/na/0579c1efed844a4d850d077397ed6f30&quot; width=&quot;1&quot; height=&quot;1&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Tue, 05 Jun 2012 06:30:56 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1803 at http://scrmblog.dumke.me</guid>
  </item>
  <item>
    <title>Assessment of Supply Chain Vulnerabilities</title>
    <link>http://scrmblog.dumke.me/review/assessment-of-supply-chain-vulnerabilities</link>
    <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;This is a review of another chapter of the book by Zsidisin and Ritchie (Supply Chain Risk). The book can be bought at &lt;a href=&quot;https://www.amazon.com/Supply-Chain-Risk-Performance-International/dp/1441946454/189-2256215-6931423?ie=UTF8&amp;amp;amp;camp=1789&amp;amp;amp;creative=390957&amp;amp;amp;creativeASIN=1441946454&amp;amp;amp;linkCode=as2&amp;amp;amp;redirect=true&amp;amp;amp;ref_=as_li_ss_tl&amp;amp;amp;tag=s05b5a-20&quot;&gt;amazon.com&lt;/a&gt;, if you are interested in reading more.&lt;/p&gt;

	&lt;p&gt;I already reviewed chapter 15 on &lt;a href=&quot;http://scrmblog.dumke.me/review/behavioral-risks-in-supply-networks&quot; title=&quot;SCRM Blog: Behavioral Risks in Supply Networks&quot;&gt;Behavioral Risks in Supply Networks&lt;/a&gt;.&lt;/p&gt;

	&lt;p&gt;The title of this weeks article is &amp;#8220;Assessing the Vulnerability of Supply Chains&amp;#8221; and since the author works for a consulting firm you can expect a more practice oriented approach to risk analysis.&lt;/p&gt;

	&lt;h5&gt;Goals and definitions&lt;/h5&gt;

	&lt;p&gt;There are three main questions to be answered in this article:&lt;/p&gt;

	&lt;p&gt;&lt;blockquote&gt;&lt;/p&gt;

	&lt;ol&gt;
		&lt;li&gt;Understand the nature and types of factors that may pose threats and risks to the achievement of the supply chain system’s short and long term mission.&lt;/li&gt;
	&lt;/ol&gt;

	&lt;ol&gt;
		&lt;li&gt;Understand the scenarios (processes and mechanisms) through which these threats, risks and vulnerabilities may evolve.&lt;/li&gt;
	&lt;/ol&gt;

	&lt;ol&gt;
		&lt;li&gt;Understand how through the use of vulnerability scenarios, the likelihood and consequences of such threats may be reduced and managed in a cost- and service effective manner, whilst achieving an acceptable vulnerability level.&lt;/li&gt;
	&lt;/ol&gt;

	&lt;p&gt;&lt;/blockquote&gt;&lt;/p&gt;

	&lt;p&gt;A vulnerability of a supply chain in this context is defined as&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;the properties of a supply chain system; its premises, facilities, and equipment, including its human resources, human organization and all its software, hardware, and net-ware, that may weaken or limit its ability to endure threats and survive accidental events that originate both within and outside the system boundaries.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;Vulnerability analysis is seen as an extension to risk analysis.&lt;/p&gt;

	&lt;p&gt;&lt;blockquote&gt;&lt;/p&gt;

	&lt;p&gt;Risk analysis is focused towards the human, environmental and property impacts of an accidental event, while a vulnerability analysis is focused towards the system mission and the survivability of the system.&lt;/p&gt;

	&lt;p&gt;In a risk analysis three questions make up the basis of the analysis: (i) what can go wrong, (ii) how likely is it to happen, and (iii) what are the consequences.&lt;/p&gt;

	&lt;p&gt;A vulnerability analysis, on the other hand, focuses upon (a) an extended set of threats and consequences, (b) adequate resources to mitigate and bring the system back to new stability, and &amp;#169; the disruption time before new stability is established [figure 1].&lt;/p&gt;

	&lt;p&gt;&lt;/blockquote&gt;&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/asbjornslettdisruptionflow.png&quot; title=&quot;Regaining stability after an accidental event or disruption&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/asbjornslettdisruptionflow-500x209.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Regaining stability after an accidental event or disruption&quot; alt=&quot;Regaining stability after an accidental event or disruption&quot; width=&quot;500&quot; height=&quot;209&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 1: Disruption Sequence (Asbjornslett, 2009)&lt;/span&gt;&lt;/p&gt;

	&lt;h5&gt;Vulnerability Analysis&lt;/h5&gt;

	&lt;p&gt;Based on this definitions the author builds his approach on a generic approach for risk assessment. The flow chart in figure 2 highlights the seven steps.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/asbjornslettvilnerabilityanalysis.png&quot; title=&quot;Flow-sheet of the vulnerability analysis&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/asbjornslettvilnerabilityanalysis-500x340.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Flow-sheet of the vulnerability analysis&quot; alt=&quot;Flow-sheet of the vulnerability analysis&quot; width=&quot;500&quot; height=&quot;340&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 2: Vulnerability Analysis Process (Asbjornslett, 2009)&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;These steps fall into three categories: &lt;/p&gt;

	&lt;p&gt;&lt;blockquote&gt;&lt;/p&gt;

	&lt;ol&gt;
		&lt;li&gt;Understanding the context-specific threat and risk picture of the given supply chain and &lt;span class=&quot;caps&quot;&gt;SCM&lt;/span&gt; context, and structure this into a taxonomy of the vulnerability factors [steps 1 to 3].&lt;/li&gt;
	&lt;/ol&gt;

	&lt;ol&gt;
		&lt;li&gt;Analyse and rank the vulnerability scenarios, resulting in a criticality ranking of the scenarios [steps 4 and 5].&lt;/li&gt;
	&lt;/ol&gt;

	&lt;ol&gt;
		&lt;li&gt;Handling of the vulnerability through cost- or service-effective likelihood or consequence reducing measures, bringing the vulnerability down to an acceptable level [steps 6 and 7].&lt;/li&gt;
	&lt;/ol&gt;

	&lt;p&gt;&lt;/blockquote&gt;&lt;/p&gt;

	&lt;p&gt;The goal of the &lt;em&gt;first step&lt;/em&gt; is to have a common understanding of the specific objectives of the vulnerability analysis, the level of analysis and setting the levels of acceptable risk.&lt;/p&gt;

	&lt;p&gt;In the &lt;em&gt;second step&lt;/em&gt; the processes and infrastructure has to be mapped. Flows of money, information and goods are highlighted. Here, &amp;#8220;it is recommended not to make the context description too fine-grained, but rather make notes of how the context could further be detailed if required.&amp;#8221;&lt;/p&gt;

	&lt;p&gt;In the &lt;em&gt;third step&lt;/em&gt; factors which lead to vulnerabilities are collected in a structured manner. Figure 3 shows a fishbone diagram with several different categories which can lead to vulnerabilities.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/asbjornslettcontributingfactors.png&quot; title=&quot;Fishbone diagram of internal and external factors contributing to vulnerability&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/asbjornslettcontributingfactors-500x265.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Fishbone diagram of internal and external factors contributing to vulnerability&quot; alt=&quot;Fishbone diagram of internal and external factors contributing to vulnerability&quot; width=&quot;500&quot; height=&quot;265&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 3: Example of Factors Contributing to Vulnerabilities (Asbjornslett, 2009)&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;Based on these vulnerabilities adverse scenarios are developed in the &lt;em&gt;next step&lt;/em&gt;.&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;A scenario is a sequence of possible events, originating from an accidental event, where the events may be separated in time and space, and where barriers to prevent the sequence are part of the scenario.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;In the &lt;em&gt;next step&lt;/em&gt; the mentioned scenarios have to be documented. The author suggests the worksheet in figure 4.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/asbjornslettvulnerabilityscenarios.png&quot; title=&quot;documenting vulnerability scenarios&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/asbjornslettvulnerabilityscenarios-500x82.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;documenting vulnerability scenarios&quot; alt=&quot;documenting vulnerability scenarios&quot; width=&quot;500&quot; height=&quot;82&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 4: Template for Scenario Documentation (Asbjornslett, 2009)&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;To get a better grasp of the actual criticality of the revealed vulnerabilities, each scenario has to be evaluated according to its likelihood and consequences (&lt;em&gt;step 5&lt;/em&gt;). Figure 5 has a sample sheet.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/asbjornslettcriticalityranking.png&quot; title=&quot;ranking criticality of scenarios&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/asbjornslettcriticalityranking-500x138.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;ranking criticality of scenarios&quot; alt=&quot;ranking criticality of scenarios&quot; width=&quot;500&quot; height=&quot;138&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 5: Assessment of the Scenario&amp;#8217;s Criticality (Asbjornslett, 2009)&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;&lt;em&gt;Step 6&lt;/em&gt; is about ranking the different vulnerabilities to best align risk mitigation efforts (figure 6).&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/asbjornslettlikelihoodconsequencediagram.png&quot; title=&quot;Presenting scenarios of importance in a likelihood/consequence diagram&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/asbjornslettlikelihoodconsequencediagram-500x172.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Presenting scenarios of importance in a likelihood/consequence diagram&quot; alt=&quot;Presenting scenarios of importance in a likelihood/consequence diagram&quot; width=&quot;500&quot; height=&quot;172&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 6: Likelihood/Consequence Diagramm (Asbjornslett, 2009)&lt;/span&gt;&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;As such we have ‘low-criticality’ scenarios in the lower left corner (white), and ‘high-criticality’ scenarios in the upper right corner (dark grey shading). The ‘criticality areas’ should be based on the acceptance criteria developed in step one, both for the un-mitigated and the mitigated consequences.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;The &lt;em&gt;last step&lt;/em&gt; deals with finding mitigation strategies for selected scenarios. Figure 7 shows the template.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/asbjornslettevaluatemeasures.png&quot; title=&quot;evaluating measures with potential to reduce likelihood and consequence&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/asbjornslettevaluatemeasures-500x143.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;evaluating measures with potential to reduce likelihood and consequence&quot; alt=&quot;evaluating measures with potential to reduce likelihood and consequence&quot; width=&quot;500&quot; height=&quot;143&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 6: Mitigation Activities to Reduce Likelihood or Consequences of a Vulnerability (Asbjornslett, 2009)&lt;/span&gt;&lt;/p&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;This article presented a really business oriented approach to vulnerability analysis. In a similar manner how it could be found in a presentation of a business consultant.&lt;/p&gt;

	&lt;p&gt;This business orientation can be also seen in the structure of the article: A conclusive derivation of the process is missing completely at least the definitions are mentioned.&lt;/p&gt;

	&lt;p&gt;Nonetheless, from experience I can tell that this process contains several important steps which are also known from scientific literature. And it really is immediately applicable.&lt;/p&gt;

	&lt;p&gt;Why not include some of the insights and steps presented here in your next risk-management-meeting?&lt;/p&gt;

	&lt;p&gt;If you want to have a more scientific view on vulnerability analysis have a look at &lt;a href=&quot;http://scrmblog.dumke.me/review/assessing-vulnerability-of-a-supply-chain&quot; title=&quot;SCRM Blog: Assessing Vulnerability of a Supply Chain&quot;&gt;this article&lt;/a&gt;.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/2009AsbjornslettAssessingTheVulnerabilityOfSupplyChains.png?itok=O8fHBBXe&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=Supply+Chain+Risk+-+A+Handbook+of+Assessment%2C+Management%2C+and+Performance&amp;amp;rft_id=info%3Adoi%2F10.1007%2F978-0-387-79934-6_2&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=Assessing+the+Vulnerability+of+Supply+Chains&amp;amp;rft.issn=&amp;amp;rft.date=2009&amp;amp;rft.volume=&amp;amp;rft.issue=&amp;amp;rft.spage=15&amp;amp;rft.epage=33&amp;amp;rft.artnum=&amp;amp;rft.au=Asbjornslet%2C+B.+E.&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other%2CBusiness+Management%2C+Supply+Chain+Management&quot;&gt;Asbjornslet, B. E. (2009). Assessing the Vulnerability of Supply Chains &lt;span style=&quot;font-style: italic;&quot;&gt;Supply Chain Risk - A Handbook of Assessment, Management, and Performance&lt;/span&gt;, 15-33 DOI: &lt;a rev=&quot;review&quot; href=&quot;http://dx.doi.org/10.1007/978-0-387-79934-6_2&quot;&gt;10.1007/978-0-387-79934-6_2&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/384/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget--2&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--4&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give Assessment of Supply Chain Vulnerabilities 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give Assessment of Supply Chain Vulnerabilities 2/5&lt;/option&gt;&lt;option value=&quot;60&quot;&gt;Give Assessment of Supply Chain Vulnerabilities 3/5&lt;/option&gt;&lt;option value=&quot;80&quot;&gt;Give Assessment of Supply Chain Vulnerabilities 4/5&lt;/option&gt;&lt;option value=&quot;100&quot; selected=&quot;selected&quot;&gt;Give Assessment of Supply Chain Vulnerabilities 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit--2&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-Dt-gPTRBHrpm7xa_4kLh5Dliytb017XkQJlpDA5vqs4&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/vulnerability&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;vulnerability&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/analysis&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;analysis&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-count-pixel field-type-text-long field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;&lt;img src=&quot;http://vg05.met.vgwort.de/na/50b7c288cb4c428c853780f337d70ae5&quot; width=&quot;1&quot; height=&quot;1&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 02 Apr 2012 14:34:31 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1788 at http://scrmblog.dumke.me</guid>
  </item>
  <item>
    <title>Assessing Vulnerability of a Supply Chain</title>
    <link>http://scrmblog.dumke.me/review/assessing-vulnerability-of-a-supply-chain</link>
    <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;At this year&amp;#8217;s &lt;a href=&quot;http://www.hicl.org&quot; title=&quot;Hamburg International Conference of Logistics&quot;&gt;&lt;span class=&quot;caps&quot;&gt;HICL&lt;/span&gt; conference&lt;/a&gt; in Hamburg, I was able to present some of my own research. In the follow-up discussions several points were highlighted, especially focussing on the viability of supply chain wide cooperation and collaboration efforts and on the difficulties of doing a realistic quantification of supply chain risks.&lt;/p&gt;

	&lt;p&gt;I already read a great paper on this topic some time ago: &amp;#8220;Assessing the vulnerability of supply chains using graph theory&amp;#8221; by Stephan M. Wagner and Nikrouz Neshat (2010), which I present you today.&lt;/p&gt;

	&lt;h5&gt;Disruptions and vulnerabilities&lt;/h5&gt;

	&lt;p&gt;Several authors argue that several factors help increase the vulnerabilities of today&amp;#8217;s supply chains. When supply chain complexity increases (e.g. supply chain length, higher division of labor, &amp;#8230;), the vulnerabilities also rise. Furthermore there is evidence that natural and man-made disasters are on the rise as well (figure 1).&lt;/p&gt;

	&lt;p&gt;&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;178&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/neshathistorydisasters.png&quot; title=&quot;History of Disasters&quot; alt=&quot;Distribution of natural and man-made over time. (Source: Centre for Research on the Epidemiology of Disasters, 2004.)&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 1: History of Disasters (Wagner and Neshat, 2010)&lt;/div&gt;&lt;/div&gt;Figure 2 shows the links between supply chain vulnerability drivers and disruptions.&lt;br /&gt;
So, since natural- and man-made-disaster most often cannot be influenced directly, the authors argue that the focus has to be on reducing the vulnerabilities themselves.&lt;/p&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;250&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/neshatinfluencerisks.png&quot; title=&quot;Connections between Vulnerabilities, Disruptions and Risks&quot; alt=&quot;Supply chain vulnerability and disruption&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 2: Connections between Vulnerabilities, Disruptions and Risks (Wagner and Neshat, 2010)&lt;/div&gt;&lt;/div&gt;

	&lt;h5&gt;Assessment of vulnerabilities&lt;/h5&gt;

	&lt;p&gt;Wagner and Neshat suggest a four step algorithm based on graph theory, which is used to calculate a &lt;em&gt;Supply Chain Vulnerability Index&lt;/em&gt; (&lt;span class=&quot;caps&quot;&gt;SCVI&lt;/span&gt;). The algorithm is based on &lt;a href=&quot;http://en.wikipedia.org/wiki/Graph_theory&quot; title=&quot;Wikipedia: Graph Theory&quot;&gt;graph theory&lt;/a&gt; (which has been part of another study &lt;a href=&quot;http://scrmblog.dumke.me/archives/184-Managing-Information-Risks.html&quot; title=&quot;SCRM Blog: Managing Information Risks&quot;&gt;here&lt;/a&gt;). Key to the understanding of the &lt;span class=&quot;caps&quot;&gt;SCVI&lt;/span&gt; is the risk driver mentioned above. Figure 3 shows an abstract example with three vulnerability drivers (D1 to D3) and their links.&lt;/p&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;241&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/neshatexample.png&quot; title=&quot;Vulnerability Drivers and their Links with the corresponding Matrix&quot; alt=&quot;Example of vulnerability digraph representation and its adjacency matrix&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 3: Vulnerability Drivers and their Links with the corresponding Matrix (Wagner and Neshat, 2010)&lt;/div&gt;&lt;/div&gt;

	&lt;p&gt;To calculate the &lt;span class=&quot;caps&quot;&gt;SCVI&lt;/span&gt; the supply chain risk manager has to create a map / graph of the current risk drivers (step 1), find the corresponding relations between the risk drivers (step 2), calculate the &amp;#8220;influence matrix&amp;#8221; (step 3) and deduce the &lt;span class=&quot;caps&quot;&gt;SCVI&lt;/span&gt;. As a forth step &lt;span class=&quot;caps&quot;&gt;SCVI&lt;/span&gt;s of different companies can be compared to gain further insights for optimization and risk reduction.&lt;/p&gt;

	&lt;p&gt;Figure 4 shows the main drivers of supply chain vulnerability. &lt;/p&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;283&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/neshatdrivers.png&quot; title=&quot;Selection of Vulnerability Drivers in Structure, Demand and Supply&quot; alt=&quot;Supply chain vulnerability drivers&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 4: Selection of Vulnerability Drivers in Structure, Demand and Supply (Wagner and Neshat, 2010)&lt;/div&gt;&lt;/div&gt;

	&lt;p&gt;Using graph theory makes it possible for the risk manager to get an overview of the influencing factors of supply chain risks. It also enables him to act on this knowledge. Figure 5 shows a possible simplification / vulnerability reduction.&lt;/p&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;246&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/neshatmitigation.png&quot; title=&quot;Reduction of Supply Chain Vulnerability Drivers leads to a Simplification of the respective Graphs&quot; alt=&quot;Vulnerability graph, before and after applying SCRM.&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 5: Reduction of Supply Chain Vulnerability Drivers leads to a Simplification of the respective Graphs (Wagner and Neshat, 2010)&lt;/div&gt;&lt;/div&gt;

	&lt;p&gt;D3 in figure 5 &amp;#8220;is called a &amp;#8216;sink&amp;#8217; &amp;#8211; which means that D3 can only be influenced by three other drivers and cannot influence others. Considering the graph nodes and edges, supply chain managers can apply risk management methods and implement mitigation strategies to omit or alleviate some of the vulnerability drivers. Figure 5 shows the graph after D3 has been omitted. As one can see, the resulting graph contains less vulnerability than it did prior to implementing the measures.&amp;#8221;&lt;/p&gt;

	&lt;h5&gt;Empirical data for the &lt;span class=&quot;caps&quot;&gt;SCVI&lt;/span&gt;&lt;/h5&gt;

	&lt;p&gt;The authors also conduct a survey with over 700 participants from different industries. Based on their feedback the authors assess the Supply Chain Vulnerability Index for eight different industries. The results are summarized in figure 5. And give support to the hypothesis that the automotive industry has one of the highest risk levels. &lt;/p&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;316&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/neshatsurveyresults.png&quot; title=&quot;Supply Chain Vulnerability within several Industries compared&quot; alt=&quot;Supply chain vulnerability indices (SCVIs) for different industries&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 6: Supply Chain Vulnerability within several Industries compared (Wagner and Neshat, 2010)&lt;/div&gt;&lt;/div&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;I really like the graph approach to assessing supply chain vulnerabilities. And I think it is a great method to support the understanding of a complex system like the supply chain. The article combines two very interesting aspects of it: the practical implementation and the assessment of supply chain vulnerability and a survey to compare different vulnerability levels across industries. The complete article, where you find more details on the survey results and the algorithm for calculating the index, can be downloaded &lt;a href=&quot;http://www.scm.ethz.ch/publications/Academic_publications/Wagner_Neshat_2010_Assessing_the_vulnerability_of_supply_chains_using_graph_theory.pdf&quot; title=&quot;ETH Zürich: Assessing the vulnerability of supply chains using graph theory&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;
From a business and research point of view this article should direct the supply chain risk management efforts especially in the industries with the highest risk levels, Automotive and &lt;span class=&quot;caps&quot;&gt;ICT&lt;/span&gt;.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/InternationalJournalOfProductionEconomics2010WagnerAssessingTheVulnerabilityOfSupplyChainsUsingGraphTheory.png?itok=28QMZy-5&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;	&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=International+Journal+of+Production+Economics&amp;amp;rft_id=info%3A%2F&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=Assessing+the+vulnerability+of+supply+chains+using+graph+theory&amp;amp;rft.issn=&amp;amp;rft.date=2010&amp;amp;rft.volume=126&amp;amp;rft.issue=&amp;amp;rft.spage=121&amp;amp;rft.epage=129&amp;amp;rft.artnum=&amp;amp;rft.au=Wagner%2C+S.M.&amp;amp;rft.au=Neshat%2C+N.&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other%2CBusiness+Management%2C+Supply+Chain+Management&quot;&gt;Wagner, S.M., &amp;amp; Neshat, N. (2010). Assessing the vulnerability of supply chains using graph theory &lt;span style=&quot;font-style: italic;&quot;&gt;International Journal of Production Economics, 126&lt;/span&gt;, 121-129&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/384/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget--3&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--6&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give Assessing Vulnerability of a Supply Chain 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give Assessing Vulnerability of a Supply Chain 2/5&lt;/option&gt;&lt;option value=&quot;60&quot;&gt;Give Assessing Vulnerability of a Supply Chain 3/5&lt;/option&gt;&lt;option value=&quot;80&quot;&gt;Give Assessing Vulnerability of a Supply Chain 4/5&lt;/option&gt;&lt;option value=&quot;100&quot;&gt;Give Assessing Vulnerability of a Supply Chain 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit--3&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-pBJ1EefraHkf0ojVJQq-BIry3bHZCsGpClP2-bzQ7nY&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/graph-theory&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;graph theory&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/index&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;index&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/survey&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;survey&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/vulnerability&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;vulnerability&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/framework&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;framework&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-count-pixel field-type-text-long field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 10 Oct 2011 14:42:00 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1671 at http://scrmblog.dumke.me</guid>
  </item>
  <item>
    <title>From Supply Chain Vulnerabilities to Risk - Important Concepts in Supply Chain Risk Management</title>
    <link>http://scrmblog.dumke.me/review/from-supply-chain-vulnerabilities-to-risk-important-concepts-in-supply-chain-risk-management</link>
    <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;This blog may be a good starting point for supply chain risk management related research and literature, but even with more than 140 articles reviewed in the blog I still just touched the tip of the iceberg. There are still many basic articles left. Like this one by Helen Peck (2006): &amp;#8220;Reconciling supply chain vulnerability, risk and supply chain management&amp;#8221;&lt;/p&gt;

	&lt;h5&gt;Terms in &lt;span class=&quot;caps&quot;&gt;SCRM&lt;/span&gt;&lt;/h5&gt;

	&lt;p&gt;Today I have a look at, what is basically a literature review concerned with clarifying the confusion with the terms used when talking about risks in supply chains.&lt;/p&gt;

	&lt;p&gt;There are a wide range of different terms and concepts used in the wider field of supply chain risk management. How do the terms vulnerability and risk correlate and how are those embedded in supply chain management? On another level: How are  corporate governance, business continuity management and security and emergency planning relating to &lt;span class=&quot;caps&quot;&gt;SCRM&lt;/span&gt;?&lt;/p&gt;

	&lt;h5&gt;Supply Chain&lt;/h5&gt;

	&lt;p&gt;Starting from a &amp;#8220;standard&amp;#8221; supply chain definition as a system, comprising&amp;#8230;&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;&amp;#8230;flows of materials, goods and information (including money), which pass within and between organisations, linked by a range of tangible and intangible facilitators, including relationships processes, activities and integrated (information) systems.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;The first definitions for &amp;#8220;supply chain management&amp;#8221; came up in the early 1980s and developed from a very logistical view on a supply chain towards a network understanding, comprising aspects like marketing or product development as well. There also has to be a clear distinction between a strategic level tasks in &lt;span class=&quot;caps&quot;&gt;SCM&lt;/span&gt; and their functional execution.&lt;/p&gt;

	&lt;h5&gt;Vulnerability and resilience&lt;/h5&gt;

	&lt;blockquote&gt;
		&lt;p&gt;Within &lt;span class=&quot;caps&quot;&gt;SCM&lt;/span&gt; there is no clear consensus as to whether supply chain vulnerability is simply a symptom of poor &lt;span class=&quot;caps&quot;&gt;SCM&lt;/span&gt;—to be remedied with more effective &lt;span class=&quot;caps&quot;&gt;SCM&lt;/span&gt; and the wider adoption of a &lt;span class=&quot;caps&quot;&gt;SCO&lt;/span&gt;—or whether it is the unintended downside consequence of its successful application. Perhaps it should rightly be regarded as a combination of all of these.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;Supply chain vulnerability can be defined as an &amp;#8220;exposure to serious disturbance, arising from risks within the supply chain as well as risks external to the supply chain&amp;#8221; and as &amp;#8220;a condition that is caused by time and relationship dependencies in a company’s activities in a supply chain&amp;#8221;. Vulnerability is therefore seen as a combination of a disturbance and the resulting negative consequence.&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;The concept of “resilience” is related to risk and vulnerability in so far as it accepts that not all &amp;#8220;risks&amp;#8221; (hazards or threats) can be avoided, controlled, or eliminated. Instead, resilience focuses on the &amp;#8220;ability of the system to return to is original or desired state after being disturbed&amp;#8221;, i.e. its ability to absorb or mitigate the impact of the disturbance.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;h5&gt;Corporate risk management&lt;/h5&gt;

	&lt;p&gt;Supply chain (risk) management and its counterpart on a corporate level do not share the same origin. Where supply chain management stems from a more comprehensive view on operational management aspects like logistics and operations; corporate risk management originates in a strategic / macroeconomic view on the company.&lt;/p&gt;

	&lt;p&gt;These roots also lead to a different understanding for risk management. In a case where corporate risk management suggests outsourcing of non-core processes for risk reduction, a supply chain risk management view would imply a larger weight on the negative effects of the reduction in control.&lt;/p&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;Finally, Peck emphasizes the different aspects of risks in supply chains and highlights the distinctive factors:&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;Consequently, it is suggested that managerial views of supply chain risk, based on assumptions drawn principally from best practice in manufacturing enterprises, offer a familiar, convenient but incomplete picture of supply chain vulnerability. &lt;span class=&quot;caps&quot;&gt;SCM&lt;/span&gt; is an integrative, cross-functional discipline, so it must be recognised that supply chain vulnerability is also a concern for practitioners and academics in other disciplines, including &lt;span class=&quot;caps&quot;&gt;BCM&lt;/span&gt; and corporate risk management.&lt;/p&gt;
	&lt;/blockquote&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/InternationalJournalOfLogistics2006PeckReconcilingSupplyChainVulnerabilityRiskAndSupplyChainManagement.png?itok=Ws2WmOBQ&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;	&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=International+Journal+of+Logistics&amp;amp;rft_id=info%3Adoi%2F10.1080%2F13675560600673578&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=Reconciling+supply+chain+vulnerability%2C+risk+and+supply+chain+management&amp;amp;rft.issn=1367-5567&amp;amp;rft.date=2006&amp;amp;rft.volume=9&amp;amp;rft.issue=2&amp;amp;rft.spage=127&amp;amp;rft.epage=142&amp;amp;rft.artnum=http%3A%2F%2Fwww.informaworld.com%2Fopenurl%3Fgenre%3Darticle%26doi%3D10.1080%2F13675560600673578%26magic%3Dcrossref%7C%7CD404A21C5BB053405B1A640AFFD44AE3&amp;amp;rft.au=Peck%2C+H.&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other%2CBusiness+Management%2C+Supply+Chain+Management&quot;&gt;Peck, H. (2006). Reconciling supply chain vulnerability, risk and supply chain management &lt;span style=&quot;font-style: italic;&quot;&gt;International Journal of Logistics, 9&lt;/span&gt; (2), 127-142 &lt;span class=&quot;caps&quot;&gt;DOI&lt;/span&gt;: &lt;a rev=&quot;review&quot; href=&quot;http://dx.doi.org/10.1080/13675560600673578&quot;&gt;10.1080/13675560600673578&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/384/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget--4&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--8&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give From Supply Chain Vulnerabilities to Risk - Important Concepts in Supply Chain Risk Management 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give From Supply Chain Vulnerabilities to Risk - Important Concepts in Supply Chain Risk Management 2/5&lt;/option&gt;&lt;option value=&quot;60&quot;&gt;Give From Supply Chain Vulnerabilities to Risk - Important Concepts in Supply Chain Risk Management 3/5&lt;/option&gt;&lt;option value=&quot;80&quot; selected=&quot;selected&quot;&gt;Give From Supply Chain Vulnerabilities to Risk - Important Concepts in Supply Chain Risk Management 4/5&lt;/option&gt;&lt;option value=&quot;100&quot;&gt;Give From Supply Chain Vulnerabilities to Risk - Important Concepts in Supply Chain Risk Management 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit--4&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-_VIzL7OiWA4T3BSm0YNKdK9nz3fvXYB1Koimk6p0ZS8&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/definition&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;definition&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/resilience&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;resilience&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/risk&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;risk&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/vulnerability&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;vulnerability&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/definitions&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;definitions&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-count-pixel field-type-text-long field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 27 Jun 2011 13:43:00 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1639 at http://scrmblog.dumke.me</guid>
  </item>
  </channel>
</rss>
