Blog Archives

Inbound and outbound vulnerability

In ‘A conceptual framework of vulnerability in firms’ inbound and outbound logistics flows.’, Göran Svensson separates inbound and outbound flows, adds 2 categories of disturbance (quantitative and qualitative), and also adds 2 sources of disturbance (atomistic and holistic) create 4 vulnerability scenarios.

Posted in ARTICLES and PAPERS
Tags: , , , ,

A conceptual framework for supply chain vulnerability

Separating the chaff from the wheat and diving straight into the essence of the paper, Svensson aligns his framework along two dimensions, categories of disturbance and sources of disturbance. He then divides the categories into either quantitative or qualitative disturbances. Sources of disturbance are either atomistic (direct) or holistic (indirect).

Posted in ARTICLES and PAPERS
Tags: , , , ,

ARTICLES and PAPERS
Sustainable supply chains
Sustainability has become a huge buzzword, both in today's business world and within the broader fac[...]
Road Vulnerability
Today we are going back in time, to one of the seminal articles in road vulnerability. Katja Berdica[...]
BOOKS and BOOK CHAPTERS
Book Review: Supply Chain Risk
A comment on a a previous book review - Supply Chain Risk Managament by Donald Waters - prompted me [...]
Book Review: This is where raster GIS started...
...well not really, but Geographic Information Systems and Cartographic Modeling by Dana Tomlin spar[...]
REPORTS and WHITEPAPERS
Risk management - Vocabulary
What is risk management in supply chains? The more I study supply chain risk management, the more co[...]
Hiperos - the Integrated View of Supplier Risk
Supply chains have gone global. No longer are they a point-to-chain of goods flowing from a source t[...]
from HERE and THERE
The 2009 Nordic Business Continuity Symposium
I guess this will be THE gathering of who's who in the Nordic Business Continuity commuity, and I wi[...]
Sustainability means less vulnerability?
Does sustainability improve a a company’s resilience towards supply chain vulnerabilities? Recently,[...]