Blog Archives

SCRIM is the new SCRM

This paper develops a new conceptual model that brings SC in more direct contact with RM, by incorporating vulnerability to develop the key risk indicators,thus linking potential risk with actual risk.

Posted in ARTICLES and PAPERS
Tags: , , , , , ,

Creating the resilient supply chain

Creating Resilient Supply Chains: A Practical Guide, published by the University of Cranfield in 2003, almost a decade ago, is now perhaps the standard reference for research in risk, vulnerability and resilience in supply chains, and it belongs in every literature review on those subjects.

Posted in REPORTS and WHITEPAPERS
Tags: , ,

Supply chain vulnerability and resilience

This paper presents a state of the art review current research on supply chain resilience and comes up with two different frameworks for categorizing supply chain risks and highlights the importance of information sharing and visibility along the supply chain.

Posted in ARTICLES and PAPERS
Tags: , , ,

Supply Chain Risk and Vulnerability in Indonesia

Indonesia. A logistical challenge for any supply chain, if not a logistical nightmare, and thus prone to supply chain disruptions. One would think that supply chain risk management would find fertile soil here, but does it?

Posted in ARTICLES and PAPERS
Tags: , , , , ,

Security, visibility and resilience

The numerous possibilities of disruptions and disturbances in the supply chain demand a supply chain that is responsive to a variety of threats, and the keys or tools to mitigating supply chain vulnerability are security, visibility and resilience.

Posted in ARTICLES and PAPERS
Tags: , , , , ,

Mitigating Supply Chain Vulnerability

Here is a risk assessment index that can be used to measure the vulnerability of different supply chain structures. While it is apparently straightforward to calculate this risk index, it is subject to a number of assumptions that are not equally straightforward to quantify.

Posted in ARTICLES and PAPERS
Tags: , , , ,

Risk and Vulnerability in Virtual Enterprise Networks

Conceptual in its approach and drawing from other areas of research, this chapter introduces four distinct groups of VENS, namely Constrained, Directed, Limited and Free VEN, and concludes that VEN risk management can and should learn from supply chain risk management.

Posted in my PUBLIC PRESENCE
Tags: , , , ,

What goes into resilience?

Resilience, in essence, is bridging vulnerabilities by honing capabilities. Seldom have I seen such a comprehensive yet to the point article on supply chain resilience that satisfies both academia and the industry at the same time.

Posted in ARTICLES and PAPERS
Tags: , , , , , , ,

Supply chain vulnerability: Mitigation strategies

Which mitigation strategy that works best when faced with which supply chain catastrophe? This is a paper that every supply chain manager should read, at least once.

Posted in ARTICLES and PAPERS
Tags: , , , , , , ,

Vulnerable or valuable supply chain?

Supply chain integrity must encompass both operational and reputational dimensions. Companies must invest in enhancing the integrity of their supply chains, in a manner which balances operational objectives with reputational risks.

Posted in REPORTS and WHITEPAPERS
Tags: , , , ,

Humanitarian aid is better when decentralized

Decentralization, pre-positioning and pooling of relief items are key success factors for dramatic improvements in humanitarian operations performance in disaster response and recovery.

Posted in ARTICLES and PAPERS
Tags: , , , , , , , , , , ,

Security and continuity of supply

Today’s paper describes how Finland views logistics and supply as important to national security and how the LOGHU project was created to develop a framework for identification and ranking of threats and corresponding countermeasures.

Posted in BOOKS and BOOK CHAPTERS
Tags: , , , , , , , , , , ,

Risk & Vulnerability

Supply chains are increasingly becoming complex webs and networks and are no longer straightforward chains with just a few links between supplier and customer.

Posted in ARTICLES and PAPERS
Tags: , , , , , , , ,

Book Review: Managing Supply Chain Risk and Vulnerability

Another book by someone from the ISCRIM gang? No, not this time, or perhaps, yes, after all, since several of the ISCRIM members have contributed to it. The book serves a twofold purpose: 1) Understanding and assessing risk in the supply chain, and 2) Decision making and risk mitigation in the supply chain.

Posted in BOOKS and BOOK CHAPTERS
Tags: , , , , , , , ,

Graph Theory to the rescue

While I know that Graph Theory has many applications, I never expected to see it in Supply Chain Management.

Posted in ARTICLES and PAPERS
Tags: , , , , ,

Bad locations = bad logistics?

How are companies located in sparse transport networks affected by supply chain disruptions? This article develops a new framework for the categorization of supply chains, and introduces the notion of the constrained supply chain.

Posted in THIS and THAT
Tags: , , , , , , ,

Sheffi’s Resilient Enterprise and supply chain risk

Building a resilient enterprise is an enterprise-wide undertaking that is about so much more than simply preparing a company for disruptions.

Posted in ARTICLES and PAPERS
Tags: , , , , , , , , ,

Corporate vulnerability

In this study, Svensson investigates the areas, the causes and the contingency planning of corporate vulnerability in upstream and downstream supply chains.Corporate vulnerability in supply chains stems from time dependence, functional dependence and relational dependence.

Posted in ARTICLES and PAPERS
Tags: , , , , , , ,

Risk Management: Contingent versus Mitigative

Risk management needs to address both sides of the risk: what lies behind the risk (source) and what lies in front of it (consequences).

Posted in ARTICLES and PAPERS
Tags: , , , , , , , , ,

Supply Chain Risk Management – as seen from Space

Is it possible to reconcile supply chain vulnerability, risk and supply chain management with corporate governance, business continuity, national security and emergency planning?

Posted in ARTICLES and PAPERS
Tags: , , , , , ,

ARTICLES and PAPERS
A-maze-ing discoveries
Today's post is on how looking up new articles from reference lists can lead to amazing discoveries,[...]
Control or laissez-faire?
Maintaining a company's competitive advantage depends on managing and controlling a global supply ch[...]
BOOKS and BOOK CHAPTERS
Book Review: Operations Rules
Operations Rules by David Simchi-Levi comes with an ambiguous title. You can read this two ways: 1) [...]
The Definition of Agility
Although getting close to 20 years old now, The Agile Virtual Enterprise: Cases, Metrics, Tools, wri[...]
REPORTS and WHITEPAPERS
The Benefits of Investing in Supply Chain Security
With the memory of attacks by Somali pirates still fresh in mind, supply chain security has come to [...]
Saving Norway's crumbling infrastructure
NTP 2010-2019
Following up my post this morning called "D-Day for Norway's Transport Infrastructure", the numbers [...]
from HERE and THERE
Why risk is the buzzword in supply chain management
A new field has emerged with the field of supply chain mangement. It's called supply chain risk. Wha[...]
MITIP 2010 – Call for Papers
For several years, when it comes to ICT-driven innovation and production, the MITIP conferences have[...]