<?xml version="1.0" encoding="utf-8" ?><rss version="2.0" xml:base="http://scrmblog.dumke.me/taxonomy/term/665/all" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:og="http://ogp.me/ns#" xmlns:article="http://ogp.me/ns/article#" xmlns:book="http://ogp.me/ns/book#" xmlns:profile="http://ogp.me/ns/profile#" xmlns:video="http://ogp.me/ns/video#" xmlns:product="http://ogp.me/ns/product#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:sioc="http://rdfs.org/sioc/ns#" xmlns:sioct="http://rdfs.org/sioc/types#" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#">
  <channel>
    <title>Bjørn Egil Asbjørnslett</title>
    <link>http://scrmblog.dumke.me/taxonomy/term/665/all</link>
    <description></description>
    <language>en</language>
     <atom:link href="http://scrmblog.dumke.me/taxonomy/term/665/all/feed" rel="self" type="application/rss+xml" />
      <item>
    <title>Assessment of Supply Chain Vulnerabilities</title>
    <link>http://scrmblog.dumke.me/review/assessment-of-supply-chain-vulnerabilities</link>
    <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;This is a review of another chapter of the book by Zsidisin and Ritchie (Supply Chain Risk). The book can be bought at &lt;a href=&quot;https://www.amazon.com/Supply-Chain-Risk-Performance-International/dp/1441946454/189-2256215-6931423?ie=UTF8&amp;amp;amp;camp=1789&amp;amp;amp;creative=390957&amp;amp;amp;creativeASIN=1441946454&amp;amp;amp;linkCode=as2&amp;amp;amp;redirect=true&amp;amp;amp;ref_=as_li_ss_tl&amp;amp;amp;tag=s05b5a-20&quot;&gt;amazon.com&lt;/a&gt;, if you are interested in reading more.&lt;/p&gt;

	&lt;p&gt;I already reviewed chapter 15 on &lt;a href=&quot;http://scrmblog.dumke.me/review/behavioral-risks-in-supply-networks&quot; title=&quot;SCRM Blog: Behavioral Risks in Supply Networks&quot;&gt;Behavioral Risks in Supply Networks&lt;/a&gt;.&lt;/p&gt;

	&lt;p&gt;The title of this weeks article is &amp;#8220;Assessing the Vulnerability of Supply Chains&amp;#8221; and since the author works for a consulting firm you can expect a more practice oriented approach to risk analysis.&lt;/p&gt;

	&lt;h5&gt;Goals and definitions&lt;/h5&gt;

	&lt;p&gt;There are three main questions to be answered in this article:&lt;/p&gt;

	&lt;p&gt;&lt;blockquote&gt;&lt;/p&gt;

	&lt;ol&gt;
		&lt;li&gt;Understand the nature and types of factors that may pose threats and risks to the achievement of the supply chain system’s short and long term mission.&lt;/li&gt;
	&lt;/ol&gt;

	&lt;ol&gt;
		&lt;li&gt;Understand the scenarios (processes and mechanisms) through which these threats, risks and vulnerabilities may evolve.&lt;/li&gt;
	&lt;/ol&gt;

	&lt;ol&gt;
		&lt;li&gt;Understand how through the use of vulnerability scenarios, the likelihood and consequences of such threats may be reduced and managed in a cost- and service effective manner, whilst achieving an acceptable vulnerability level.&lt;/li&gt;
	&lt;/ol&gt;

	&lt;p&gt;&lt;/blockquote&gt;&lt;/p&gt;

	&lt;p&gt;A vulnerability of a supply chain in this context is defined as&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;the properties of a supply chain system; its premises, facilities, and equipment, including its human resources, human organization and all its software, hardware, and net-ware, that may weaken or limit its ability to endure threats and survive accidental events that originate both within and outside the system boundaries.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;Vulnerability analysis is seen as an extension to risk analysis.&lt;/p&gt;

	&lt;p&gt;&lt;blockquote&gt;&lt;/p&gt;

	&lt;p&gt;Risk analysis is focused towards the human, environmental and property impacts of an accidental event, while a vulnerability analysis is focused towards the system mission and the survivability of the system.&lt;/p&gt;

	&lt;p&gt;In a risk analysis three questions make up the basis of the analysis: (i) what can go wrong, (ii) how likely is it to happen, and (iii) what are the consequences.&lt;/p&gt;

	&lt;p&gt;A vulnerability analysis, on the other hand, focuses upon (a) an extended set of threats and consequences, (b) adequate resources to mitigate and bring the system back to new stability, and &amp;#169; the disruption time before new stability is established [figure 1].&lt;/p&gt;

	&lt;p&gt;&lt;/blockquote&gt;&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/asbjornslettdisruptionflow.png&quot; title=&quot;Regaining stability after an accidental event or disruption&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/asbjornslettdisruptionflow-500x209.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Regaining stability after an accidental event or disruption&quot; alt=&quot;Regaining stability after an accidental event or disruption&quot; width=&quot;500&quot; height=&quot;209&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 1: Disruption Sequence (Asbjornslett, 2009)&lt;/span&gt;&lt;/p&gt;

	&lt;h5&gt;Vulnerability Analysis&lt;/h5&gt;

	&lt;p&gt;Based on this definitions the author builds his approach on a generic approach for risk assessment. The flow chart in figure 2 highlights the seven steps.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/asbjornslettvilnerabilityanalysis.png&quot; title=&quot;Flow-sheet of the vulnerability analysis&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/asbjornslettvilnerabilityanalysis-500x340.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Flow-sheet of the vulnerability analysis&quot; alt=&quot;Flow-sheet of the vulnerability analysis&quot; width=&quot;500&quot; height=&quot;340&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 2: Vulnerability Analysis Process (Asbjornslett, 2009)&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;These steps fall into three categories: &lt;/p&gt;

	&lt;p&gt;&lt;blockquote&gt;&lt;/p&gt;

	&lt;ol&gt;
		&lt;li&gt;Understanding the context-specific threat and risk picture of the given supply chain and &lt;span class=&quot;caps&quot;&gt;SCM&lt;/span&gt; context, and structure this into a taxonomy of the vulnerability factors [steps 1 to 3].&lt;/li&gt;
	&lt;/ol&gt;

	&lt;ol&gt;
		&lt;li&gt;Analyse and rank the vulnerability scenarios, resulting in a criticality ranking of the scenarios [steps 4 and 5].&lt;/li&gt;
	&lt;/ol&gt;

	&lt;ol&gt;
		&lt;li&gt;Handling of the vulnerability through cost- or service-effective likelihood or consequence reducing measures, bringing the vulnerability down to an acceptable level [steps 6 and 7].&lt;/li&gt;
	&lt;/ol&gt;

	&lt;p&gt;&lt;/blockquote&gt;&lt;/p&gt;

	&lt;p&gt;The goal of the &lt;em&gt;first step&lt;/em&gt; is to have a common understanding of the specific objectives of the vulnerability analysis, the level of analysis and setting the levels of acceptable risk.&lt;/p&gt;

	&lt;p&gt;In the &lt;em&gt;second step&lt;/em&gt; the processes and infrastructure has to be mapped. Flows of money, information and goods are highlighted. Here, &amp;#8220;it is recommended not to make the context description too fine-grained, but rather make notes of how the context could further be detailed if required.&amp;#8221;&lt;/p&gt;

	&lt;p&gt;In the &lt;em&gt;third step&lt;/em&gt; factors which lead to vulnerabilities are collected in a structured manner. Figure 3 shows a fishbone diagram with several different categories which can lead to vulnerabilities.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/asbjornslettcontributingfactors.png&quot; title=&quot;Fishbone diagram of internal and external factors contributing to vulnerability&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/asbjornslettcontributingfactors-500x265.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Fishbone diagram of internal and external factors contributing to vulnerability&quot; alt=&quot;Fishbone diagram of internal and external factors contributing to vulnerability&quot; width=&quot;500&quot; height=&quot;265&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 3: Example of Factors Contributing to Vulnerabilities (Asbjornslett, 2009)&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;Based on these vulnerabilities adverse scenarios are developed in the &lt;em&gt;next step&lt;/em&gt;.&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;A scenario is a sequence of possible events, originating from an accidental event, where the events may be separated in time and space, and where barriers to prevent the sequence are part of the scenario.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;In the &lt;em&gt;next step&lt;/em&gt; the mentioned scenarios have to be documented. The author suggests the worksheet in figure 4.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/asbjornslettvulnerabilityscenarios.png&quot; title=&quot;documenting vulnerability scenarios&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/asbjornslettvulnerabilityscenarios-500x82.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;documenting vulnerability scenarios&quot; alt=&quot;documenting vulnerability scenarios&quot; width=&quot;500&quot; height=&quot;82&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 4: Template for Scenario Documentation (Asbjornslett, 2009)&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;To get a better grasp of the actual criticality of the revealed vulnerabilities, each scenario has to be evaluated according to its likelihood and consequences (&lt;em&gt;step 5&lt;/em&gt;). Figure 5 has a sample sheet.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/asbjornslettcriticalityranking.png&quot; title=&quot;ranking criticality of scenarios&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/asbjornslettcriticalityranking-500x138.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;ranking criticality of scenarios&quot; alt=&quot;ranking criticality of scenarios&quot; width=&quot;500&quot; height=&quot;138&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 5: Assessment of the Scenario&amp;#8217;s Criticality (Asbjornslett, 2009)&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;&lt;em&gt;Step 6&lt;/em&gt; is about ranking the different vulnerabilities to best align risk mitigation efforts (figure 6).&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/asbjornslettlikelihoodconsequencediagram.png&quot; title=&quot;Presenting scenarios of importance in a likelihood/consequence diagram&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/asbjornslettlikelihoodconsequencediagram-500x172.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Presenting scenarios of importance in a likelihood/consequence diagram&quot; alt=&quot;Presenting scenarios of importance in a likelihood/consequence diagram&quot; width=&quot;500&quot; height=&quot;172&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 6: Likelihood/Consequence Diagramm (Asbjornslett, 2009)&lt;/span&gt;&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;As such we have ‘low-criticality’ scenarios in the lower left corner (white), and ‘high-criticality’ scenarios in the upper right corner (dark grey shading). The ‘criticality areas’ should be based on the acceptance criteria developed in step one, both for the un-mitigated and the mitigated consequences.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;The &lt;em&gt;last step&lt;/em&gt; deals with finding mitigation strategies for selected scenarios. Figure 7 shows the template.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/asbjornslettevaluatemeasures.png&quot; title=&quot;evaluating measures with potential to reduce likelihood and consequence&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/asbjornslettevaluatemeasures-500x143.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;evaluating measures with potential to reduce likelihood and consequence&quot; alt=&quot;evaluating measures with potential to reduce likelihood and consequence&quot; width=&quot;500&quot; height=&quot;143&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 6: Mitigation Activities to Reduce Likelihood or Consequences of a Vulnerability (Asbjornslett, 2009)&lt;/span&gt;&lt;/p&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;This article presented a really business oriented approach to vulnerability analysis. In a similar manner how it could be found in a presentation of a business consultant.&lt;/p&gt;

	&lt;p&gt;This business orientation can be also seen in the structure of the article: A conclusive derivation of the process is missing completely at least the definitions are mentioned.&lt;/p&gt;

	&lt;p&gt;Nonetheless, from experience I can tell that this process contains several important steps which are also known from scientific literature. And it really is immediately applicable.&lt;/p&gt;

	&lt;p&gt;Why not include some of the insights and steps presented here in your next risk-management-meeting?&lt;/p&gt;

	&lt;p&gt;If you want to have a more scientific view on vulnerability analysis have a look at &lt;a href=&quot;http://scrmblog.dumke.me/review/assessing-vulnerability-of-a-supply-chain&quot; title=&quot;SCRM Blog: Assessing Vulnerability of a Supply Chain&quot;&gt;this article&lt;/a&gt;.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/2009AsbjornslettAssessingTheVulnerabilityOfSupplyChains.png?itok=O8fHBBXe&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=Supply+Chain+Risk+-+A+Handbook+of+Assessment%2C+Management%2C+and+Performance&amp;amp;rft_id=info%3Adoi%2F10.1007%2F978-0-387-79934-6_2&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=Assessing+the+Vulnerability+of+Supply+Chains&amp;amp;rft.issn=&amp;amp;rft.date=2009&amp;amp;rft.volume=&amp;amp;rft.issue=&amp;amp;rft.spage=15&amp;amp;rft.epage=33&amp;amp;rft.artnum=&amp;amp;rft.au=Asbjornslet%2C+B.+E.&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other%2CBusiness+Management%2C+Supply+Chain+Management&quot;&gt;Asbjornslet, B. E. (2009). Assessing the Vulnerability of Supply Chains &lt;span style=&quot;font-style: italic;&quot;&gt;Supply Chain Risk - A Handbook of Assessment, Management, and Performance&lt;/span&gt;, 15-33 DOI: &lt;a rev=&quot;review&quot; href=&quot;http://dx.doi.org/10.1007/978-0-387-79934-6_2&quot;&gt;10.1007/978-0-387-79934-6_2&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/665/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--2&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give Assessment of Supply Chain Vulnerabilities 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give Assessment of Supply Chain Vulnerabilities 2/5&lt;/option&gt;&lt;option value=&quot;60&quot;&gt;Give Assessment of Supply Chain Vulnerabilities 3/5&lt;/option&gt;&lt;option value=&quot;80&quot;&gt;Give Assessment of Supply Chain Vulnerabilities 4/5&lt;/option&gt;&lt;option value=&quot;100&quot; selected=&quot;selected&quot;&gt;Give Assessment of Supply Chain Vulnerabilities 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-ziC1yqBEE03pwWxODTXDKTVJtpy-CAondeFKBz-fsZ0&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/vulnerability&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;vulnerability&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/analysis&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;analysis&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-count-pixel field-type-text-long field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;&lt;img src=&quot;http://vg05.met.vgwort.de/na/50b7c288cb4c428c853780f337d70ae5&quot; width=&quot;1&quot; height=&quot;1&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 02 Apr 2012 14:34:31 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1788 at http://scrmblog.dumke.me</guid>
  </item>
  </channel>
</rss>
