<?xml version="1.0" encoding="utf-8" ?><rss version="2.0" xml:base="http://scrmblog.dumke.me/taxonomy/term/690/all" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:og="http://ogp.me/ns#" xmlns:article="http://ogp.me/ns/article#" xmlns:book="http://ogp.me/ns/book#" xmlns:profile="http://ogp.me/ns/profile#" xmlns:video="http://ogp.me/ns/video#" xmlns:product="http://ogp.me/ns/product#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:sioc="http://rdfs.org/sioc/ns#" xmlns:sioct="http://rdfs.org/sioc/types#" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#">
  <channel>
    <title>exposure</title>
    <link>http://scrmblog.dumke.me/taxonomy/term/690/all</link>
    <description></description>
    <language>en</language>
     <atom:link href="http://scrmblog.dumke.me/taxonomy/term/690/all/feed" rel="self" type="application/rss+xml" />
      <item>
    <title>An Empirical Investigation into Supply Chain Vulnerability</title>
    <link>http://scrmblog.dumke.me/review/an-empirical-investigation-into-supply-chain-vulnerability</link>
    <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;One basic assumption in risk-aware supply chain design is the notion that the design of the supply chain actually has an impact on the vulnerability of the supply chain.&lt;br /&gt;
This question has been analyzed about six years ago in a broad empirical study by Wagner and Bode.&lt;/p&gt;

	&lt;h5&gt;Method&lt;/h5&gt;

	&lt;p&gt;The authors use a rather large sample of companies in Germany. Overall nearly 5000 supply chain professionals were asked to participate and 760 actually took part in the study.&lt;br /&gt;
Most sample companies had an industrial focus (72% versus service (20%) and trade (9%)).&lt;br /&gt;
This study is founded on a similar sample as this &lt;a href=&quot;http://scrmblog.dumke.me/review/impact-of-risks-on-supply-chain-performance&quot; title=&quot;SCRM Blog: Impact of Risks on Supply Chain Performance&quot;&gt;other study by Wagner and Bode&lt;/a&gt; analyzing the impact of risks on supply chain performance.&lt;/p&gt;

	&lt;h5&gt;Model&lt;/h5&gt;

	&lt;p&gt;The author focus on some supply chain design variables, which supposedly increase supply chain vulnerabilities. Figure 1 shows the assumed relationship between those drivers of supply chain vulnerability and three supply chain risk categories.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/wagner_risk_concept.png&quot; title=&quot;The relationship between drivers of supply chain vulnerability and supply chain risk&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/wagner_risk_concept-500x130.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;The relationship between drivers of supply chain vulnerability and supply chain risk&quot; alt=&quot;The relationship between drivers of supply chain vulnerability and supply chain risk&quot; width=&quot;500&quot; height=&quot;130&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;image_comment&quot;&gt;Figure 1: Concept: Relationship between Design and Risk&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;The authors propose the following hypothesis, which are then tested using the empirical data:&lt;br /&gt;
&lt;blockquote&gt;
	&lt;ul&gt;
		&lt;li&gt;H1: The higher the drivers of supply chain vulnerability, the higher the level of demand side risk a firm faces.&lt;/li&gt;
		&lt;li&gt;H2: The higher the drivers of supply chain vulnerability, the higher the level of supply side risk a firm faces.&lt;/li&gt;
		&lt;li&gt;H3: The higher the drivers of supply chain vulnerability, the higher the level of catastrophic side risk a firm faces.&lt;br /&gt;
&lt;/blockquote&gt;&lt;/li&gt;
	&lt;/ul&gt;&lt;/p&gt;

	&lt;h5&gt;Results&lt;/h5&gt;

	&lt;p&gt;The results show that all hypothesis are supported by the findings of the authors. However the design factors/vulnerabilities only explain part of the observed supply chain risks (7% for H1, 13% for H2, 3% for H3).&lt;br /&gt;
Demand side risk was influenced by strong customer dependence and strong supplier dependence.&lt;br /&gt;
Supply side risk was influenced by supplier dependence, single sourcing and global sourcing.&lt;br /&gt;
Lastly, catastrophic risk was impacted by the degree of global sourcing.&lt;/p&gt;

	&lt;p&gt;The authors draw the following conclusions:&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;First, the supply chain vulnerability variables in our model explain a rather small portion of the variance in the risk arising from demand side risk sources. It is a low but not astonishing value since the majority of the vulnerability variables focuses on the upstream supply chain. However, the results reveal that customer dependence increases demand side risk. This finding indicates that firms that are dependent on some customers are exposed to a higher risk of suffering from the detrimental effects of demand volatility and poor downstream information. This could be because of order batching or limited possibilities of demand pooling. [&amp;#8230;] This leads to the hypothesis that, beyond the investigated variables, there are several additional aspects both internal and external to the supply chain that determine a firm&amp;#8217;s exposure to supply chain risk. &lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;blockquote&gt;
		&lt;p&gt;Second, risk derived from supply side risk sources is elevated by supplier dependence, single sourcing and global sourcing. Supplier dependence obviously amplifies the threat from poor quality, supply shortages, sudden demise of one of these suppliers, and poor logistics performance. Although this argumentation also applies to single sourcing, the single sourcing approach seems to be less hazardous than general dependence on some suppliers. This is because single sourcing is usually aligned with a closer relationship that might absorb some of the supply side risk.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;blockquote&gt;
		&lt;p&gt;Third, when it comes to risk from catastrophic risk sources it has to be taken into consideration that the sample data was collected in Germany which has been a very &amp;#8220;calm&amp;#8221; place with regard to disasters. Here, it is solely global sourcing that is a significant factor that exposes firms to higher risk from catastrophes. The implementation of a global sourcing strategy stretches the supply chain geographically which ultimately means more peril points for the information and material flow. The robustness and resilience of regional or national supply chains is usually higher. Surprisingly, the study shows that supplier dependence decreases the risk exposure to catastrophes. Again we would argue that this is because of lack in supply flexibility. Firefighting against the consequences of catastrophic events might be more successful with the ability to quickly adjust the supply.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;I would argue that it is always hard to measure risk consistently in a qualitative study. People are likely to evaluate the same risk quite differently, which might lead to unclear results.&lt;br /&gt;
Furthermore the low impact of these specific design variables emphasizes the view that there are many more factors (internal and external) that impact the exposure to supply chain risk.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/2006WagnerAnEmpiricalInvestigationIntoSuppyChainVulnerabilityExperiencedByGermanFirms.png?itok=71_aK0oX&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=Erich+Schmidt+Verlag&amp;amp;rft_id=info%3A%2F&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=An+Empirical+Investigation+into+Supply+Chain+Vulnerability+Experienced+by+German+Firms&amp;amp;rft.issn=&amp;amp;rft.date=2006&amp;amp;rft.volume=&amp;amp;rft.issue=&amp;amp;rft.spage=79&amp;amp;rft.epage=96&amp;amp;rft.artnum=&amp;amp;rft.au=Wagner%2C+S.M.&amp;amp;rft.au=Bode%2C+C.&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other%2CBusiness+Management%2C+Supply+Chain+Management&quot;&gt;Wagner, S.M., &amp;amp; Bode, C. (2006). An Empirical Investigation into Supply Chain Vulnerability Experienced by German Firms &lt;span style=&quot;font-style: italic;&quot;&gt;Erich Schmidt Verlag&lt;/span&gt;, 79-96&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/690/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--2&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give An Empirical Investigation into Supply Chain Vulnerability 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give An Empirical Investigation into Supply Chain Vulnerability 2/5&lt;/option&gt;&lt;option value=&quot;60&quot; selected=&quot;selected&quot;&gt;Give An Empirical Investigation into Supply Chain Vulnerability 3/5&lt;/option&gt;&lt;option value=&quot;80&quot;&gt;Give An Empirical Investigation into Supply Chain Vulnerability 4/5&lt;/option&gt;&lt;option value=&quot;100&quot;&gt;Give An Empirical Investigation into Supply Chain Vulnerability 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-u0DiS_8pDS31MNYYrGDz8tLeYC0BzeOFtnVHdV4IlUw&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/design&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;design&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/vulnerability&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;vulnerability&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/exposure&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;exposure&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-count-pixel field-type-text-long field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;&lt;img src=&quot;http://vg05.met.vgwort.de/na/0579c1efed844a4d850d077397ed6f30&quot; width=&quot;1&quot; height=&quot;1&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Tue, 05 Jun 2012 06:30:56 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1803 at http://scrmblog.dumke.me</guid>
  </item>
  </channel>
</rss>
