Blog Archives

Posts inspired by academic articles I have read

Inbound and outbound vulnerability

In ‘A conceptual framework of vulnerability in firms’ inbound and outbound logistics flows.’, Göran Svensson separates inbound and outbound flows, adds 2 categories of disturbance (quantitative and qualitative), and also adds 2 sources of disturbance (atomistic and holistic) create 4 vulnerability scenarios.

Posted in ARTICLES and PAPERS
Tags: , , , ,

A conceptual framework for supply chain vulnerability

Separating the chaff from the wheat and diving straight into the essence of the paper, Svensson aligns his framework along two dimensions, categories of disturbance and sources of disturbance. He then divides the categories into either quantitative or qualitative disturbances. Sources of disturbance are either atomistic (direct) or holistic (indirect).

Posted in ARTICLES and PAPERS
Tags: , , , ,

Drivers of supply chain vulnerability

In her article Drivers of supply chain vulnerability: an integrated framework, Helen Peck identifies four drivers of supply chain vulnerability:Value stream, product or processes,Assets and infrastructure dependencies,Organizations and inter-organizational networks,The Environment.

Posted in ARTICLES and PAPERS
Tags: , , , ,

Finding the right location – minimizing disruption costs

Classical facility location models assume that once optimally located and set up, facilities will operate as planned, smoothly, and without interruption. In reality, though, operations seldom go as planned; interruptions, unscheduled downtime and failures occur every once in a while, with unplanned and unbudgeted disruption costs as a consequence.

Posted in ARTICLES and PAPERS
Tags: , , , , , , , ,

From the back room to the board room

Supply chain management used to be relegated to the logistics department of businesses and hardly thought of as matters concerning the top-level management. In his 2004 paper, Joseph L. Cavinato points out five sub-networs within the supply chain that need special attention:Physical – the actual movement of goods, shipping and warehousing
Finance, Information, Relations, Innovation.

Posted in ARTICLES and PAPERS
Tags: , , ,

Accessibility Index – Transport Network Vulnerability

The starting point for this paper is the question of how to define and find critical locations in a transport network. A network node is vulnerable if loss or degradation of a small number of links diminishes the accessibility of the node. A network link is critical if loss or degradation of the links diminishes the accessibility of the network or of particular nodes

Posted in ARTICLES and PAPERS
Tags: , , , , , , , , ,

How to Design Mitigation Capabilities

The severity of supply chain disruptions stems from supply chain design characteristics and supply chain mitigation capabilities: Supply Chain Design: supply chain density,supply chain complexity, node criticality. Supply Chain Mitigation Capability: recovery capability, warning capability.

Posted in ARTICLES and PAPERS
Tags: , , , , , , , , , , ,

Categorization of Supply Chain Risk

Supply chain risks can include a number of different issues, and the article structures these issues along three dimensions: 1) the Supply Chain itself, 2) Risk Management processes and 3) Types of Risk.

Posted in ARTICLES and PAPERS
Tags: , , , ,

The difference between legal and illegal supply chains

Daniel Ekwall’s thesis combines theories from criminology with theories from logistics and supply chain management to examine cross-over points or antagonistic gateways between the legal and illegal logistics system from a supply chain perspective.

Posted in ARTICLES and PAPERS
Tags: , , , ,

An empirical investigation into supply chain vulnerability

Drivers of supply chain vulnerability are 1) supply-side risk 2) demand-side risk, 3) catastrophic risk. Sources of risk are a) customer dependence and b) supplier dependence, d) supplier concentration and d) single sourcing and e) global sourcing.

Posted in ARTICLES and PAPERS
Tags: , , , , ,

Managing risk in global supply chains

The book Strategies for Building Successful Global Businesses, by the INSEAD-Wharton Alliance on Globalizing, contains 6 articles on managing risk and uncertainty. Today I will look at one of these articles that deserves further mentioning.

Posted in ARTICLES and PAPERS
Tags: , , , ,

Building a secure and resilient supply chain

Are you gambling with your supply network? You should be aware that the supply network is inherently vulnerable to disruption and the failure of any one element in it could cause the whole network to fail. Actions to improve security can be classified into three categories: Physical security, Information security, Freight security. Actions to improve resilience can be be divided into: Flexibility, Redundancy.

Posted in ARTICLES and PAPERS
Tags: , , , , , , ,

Supply Chain Risk Management: A Neural Network Approach

Supply chain event management (abbreviated as SCEM) is a consideration of all possible occurring events and factors that can cause a disruption in a supply chain.

Posted in ARTICLES and PAPERS
Tags: , , , ,

Corridor Analysis – A timeline of evolutionary development

corridor-modellingLocating a right-of-way for a linear facility such as a pipeline, a transmission line, a railway or a roadway can be a complex problem. Locating a corridor connecting an origin and a destination on a landscape is analogous to identifying a route that traverses a continuous landscape. Thus, corridor analysis is closely linked to shortest-path finding and network analysis in raster GIS, and has evolved along with it. Corridor analysis is essentially a variant of surface analysis, but can also be viewed as a site selection problem where an optimal contiguous and elongated site is sought.

My PhD?

On a sidenote, I should mention that since this post was first published,

Read more

Posted in ARTICLES and PAPERS
Tags: , , , , , ,

ARTICLES and PAPERS
Resilience X 10
Transport network resilience has 10 properties. So says Pamela Murray-Tuite in her 2006 article A Co[...]
Biting the hand that feeds. All firms are snakes.
'All firms are snakes'. So says Paul D. Cousins in A conceptual model for managing long-term inter-o[...]
BOOKS and BOOK CHAPTERS
Supply Chain Continuity
Many business owners will have come across the term business continuity, and many supply chain owner[...]
Book Review: Research Methodologies in SCM
Is there something like the right research design for supply chain studies? I believe there is, and [...]
REPORTS and WHITEPAPERS
A Decade of Living Dangerously
Do you remember the movie The Year of Living Dangerously with Mel Gibson? Topically unrelated maybe,[...]
When disaster strikes...
...how does the transportation network recover? And why are transportation networks so essential to [...]
from HERE and THERE
International Transport Economics Conference 2009
If you haven't already done so, make sure to bookmark this conference in your calendar. The Internat[...]
Norwegian roads are slooooow...
In a previous post, a while I ago, I stated that Nowegian roads are dangerous...well, not only that,[...]