Tag Archives: supply chain vulnerability

SCRIM is the new SCRM

Does supply chain risk management SCRM need another model? Perhaps. That’s what a group of academics from Tunisia and France thought when they presented their conference paper this autumn. In it they suggest a new integrated conceptual model called “SCRIM”that incorporates the characteristics of the supply chain in the risk management process, thus allowing for a better understanding of the dynamics of different risk management strategies.

A tip-off

A couple of weeks I was given a heads-up by one of the authors that they had written a paper called Towards an Integrated Model of Supply Chain Risks: an Alignment between Supply Chain Characteristics and Risk Dimensions and would like my opinion on it. Written by Arij Lahmar, Francois Galasso, Habib Chabchoub and Jacques Lamothe, the paper turned out to be more interesting than I first thought, and the more I read it the more I liked it.

Virtual Enterprises revisited

What also intruiged me into taking a closer look at the paper was not so much the title, but the place where it was presented, namely the IFIP WG 5.5 Working Conference on Virtual Enterprises. Observant readers of this blog may remember that I 5 years ago wrote a book chapter titled A Conceptual Framework for Risk and Vulnerability in Virtual Enterprise Networks, where I extended Supply Chain Risk Management into the realm of Virtual Enterprise Networks. I’ve seen that chapter mentioned as a reference in some of the papers presented at IFIP conferences earlier, and I first thought this would be such an example, too. It was not; it was something quite different.

SCRM versus SCRIM

As the title implies, at the heart of the SCRIM model is the alignment of risk dimension with suply chain characteristics. Here risk specifics and supply chain specifics are used to develop key risk indicators that lead to the design of  a response that is specific to the supply chain and the risk in question. The possible response is then checked against capabilities to decide the best risk mitigation strategies and actions, in a sort of Plan-Do-Check-Act manner:

From my point of view this conceptual model appears sound. The left side is the traditional SCRM and ISO 31000 process, the right side is the new concept. The figure could have been a bit more descriptive, though, because the steps on the right side did not become fully clear to me until I saw the other figure in the paper. That figure  is a class model detailing the parameters identified through the literature:

However, agin, this figure too has a few shortcomings. While the model claims to be taken from an extensive literature review – and judging from the extensive reference list it indeed is – the paper does not explicitly state which references that have contributed to which part of the figure.

For one instance, as risk strategies they suggest the classic four: Reduce, Retain, Avoid and Transfer, but where does this idea come from? For another instance, capability is seen as important part of the risk treatment process, and I agree, but the concept of capability is poorly described in the paper.

Conclusion

Essentially this is a good paper that needs some revision of references and citations and consistent use of the terms involved. It also needs fuller definitions of the concepts that are introduced.

That said, this paper does develop a new conceptual model that brings SC in more direct contact with RM, and SCRIM is indeed a fitting name for the model. The model and parameter description is perhaps still not complete in all parts, but with some more refinement this could definitely bring SCRM a huge step forward.

Reference

Lahmar, A., Galasso, F., Chabchoub, H., Lamothe, J. (2015) Towards an Integrated Model of Supply Chain Risks: an Alignment between Supply Chain Characteristics and Risk Dimensions. In: L. Camarinha-Matos, F. Bénaben, W. Picard (Eds.) Risks and Resilience of Collaborative Networks, Proceedings of the 16th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2015, Albi, France, October 5-7, 2015 DOI: 10.1007/978-3-319-24141-8_1

Author links

Related posts

Creating the resilient supply chain

This blog is about supply chain risk, business continuity and transport vulnerability, and while I have blogged profusely about supply chain resilience in a vast number of posts over the last 3 1/2 years, citing journal articles, book, papers and research reports en masse, one major reference – perhaps the major reference – has so far been omitted:  Creating Resilient Supply Chains: A Practical Guide, published by the University of Cranfield in 2003. Commissioned by the UK Department of Transport, with Helen Peck as the principal researcher, the objective  of the report is to increase awareness, understanding and thus the ability of UK industry to cope with disruptions to its supply chains. To that end it provides insight and practical tools, which will assist managers in improving the resilience of their organisation’s supply chain networks.

Continue reading

Supply chain vulnerability and resilience

Today’s post is a review of a conference paper written by Francesco Longo and Tuncer Ören in 2008 and presented at a venue where I not would look for papers on supply chain risk: The  European Modeling & Simulation Symposium. The paper is titled Supply chain vulnerability and resilience: a state of the art overview, and  the main objective, obviously, is to provide the reader with a state of the art review current research on  supply chain resilience. And frankly, the paper falls a bit short of doing just that, but it’s nonetheless a paper worth downloading and reading and pondering for any researcher in supply chain risk.

Continue reading

Supply Chain Risk and Vulnerability in Indonesia

Indonesia. 17000 islands spread over a distance of 6000 kilometres. Mega-cities and remote desolate villages side by side. Congested freeways and dirt roads just a short distance apart. Home to frequent earthquakes and volcano eruptions, mudslides and flooding in the rainy season. A logistical challenge for any supply chain, if not a logistical nightmare, and thus prone to supply chain disruptions. One would think that supply chain risk management would find fertile soil here, but does it? According to what Rofyanto Kurniawan and Suhaiza Zailani wrote in Supply Chain Vulnerability and Mitigation Strategy of the Manufacturing Firms in Indonesia: Manager’s Perspectives, Indonesia still has a long way to go.

Continue reading

Security, visibility and resilience

The numerous possibilities of disruptions and disturbances in the supply chain demand a supply chain that is responsive to a variety of threats. A non-responsive and hence unreliable supply chain is by definition a vulnerable supply chain, and the keys or tools to mitigating supply chain vulnerability are security, visibility and resilience. So said Theodore Glickman and Susan White in 2006, when they published Security, visibility and resilience: the keys to mitigating supply chain vulnerabilities. Here they present a framework for how these three tools interact with seven basic supply chain concerns, and combined make up 21 considerations for improving supply chain reliability.

Continue reading

Mitigating Supply Chain Vulnerability

I’m a quantitative researcher, so I usually shy away from journal articles with too many equations and complicated calculations. This one, however, I can not avoid mentioning, because it is brilliantly simple, despite its seemingly complicated looks. In their article, aptly titled Mitigating Supply Chain Vulnerability, Brian D Neureuther and George Kenyon develop a risk assessment index that can be used to measure the vulnerability of different supply chain structures. While it is apparently straightforward to calculate this risk index, it is subject to a number of assumptions that are not equally straightforward to quantify. Is it still worth reading and using?

Continue reading

Risk and Vulnerability in Virtual Enterprise Networks

A month ago I posted on my first publication, a book chapter on A Conceptual Framework for Risk and Vulnerability in Virtual Enterprise Networks in Managing Risk in Virtual Enterprise Networks: Implementing Supply Chain Principles, edited by Stavros Ponis from NTUA in Athens, Greece, and published by IGI Global. A month ago, the book was merely announced on the publisher’s website, now it is fully present. Not only do I have the honor of opening the book by being the first chapter, but  – as I just found out – I also have the honor of having the free sample chapter for download…making my thoughts available for criticism for the whole Internet world, not just the inquisitive  reader who stumbles upon this book in the university library and decides to read it.

Continue reading

What goes into resilience?

 Resilience. That seems to be the buzzword these days. It seems to be making its way not only around the blogosphere, like on Ken Simpson’s blog, but also in the supply chain and logistics literature. In Ensuring supply chain resilience: Development of a conceptual framework, just out in the Journal of Business Logistics, Timothy J Pettit, Joseph Fiksel and Keely L Croxton develop a concept of supply chain resilience based on an extensive literature search and a focus group study. And quite frankly, this is one of the the better and most comprehensive frameworks for understanding resilience that I have seen, drawing on the quintessence of many years of supply chain risk research. Resilience, in essence, is bridging vulnerabilities by honing capabilities.

Continue reading

Supply chain vulnerability: Mitigation strategies

A new outlet for articles on supply chain vulnerability? Perhaps. And actually, it’s not that new, since the journal has been in existence for some 16 years, but I haven’t come across the Journal of Marketing Channels as a source for papers on supply chain disruption before. That is why I was so surprised to find Sources of Supply Chain Disruptions, Factors That Breed Vulnerability, and Mitigating Strategies by Karen E Stecke and Sanjay Kumar. Here they develop a classification framework for supply chain catastrophes and the appropriate mitigation strategies for the various types of smaller and bigger supply chain disasters that can occur.

Continue reading

Vulnerable or valuable supply chain?

More than a year old now, but still holding not so few words of wisdom is the Pricewaterhouse Coopers report on supply chain integrity: From vulnerable to valuable. Their analysis shows that moving away from the typical business mindset of supply chain improvements only in terms of cost reductions is well worth the effort. Companies must invest in enhancing the integrity of their supply chains, in a manner which balances operational objectives with reputational risks. This requires developing “leading risk indicators” in addition to the typical Key Performance Indicators, in order to measure supply chain performance.

Continue reading

Humanitarian aid is better when decentralized

Humanitarian operations rely heavily on logistics in uncertain, risky, and urgent contexts, making them a very different field of application for supply chain management principles than that of traditional businesses. Decentralization, pre-positioning and pooling of relief items are key success factors for dramatic improvements in humanitarian operations  performance in disaster response and recovery. So say Aline Gatignon, Luk N van Wassenhove and Aurelie Charles in their newest article, The Yogyakarta earthquake: Humanitarian relief through IFRC’s decentralized supply chain. I believe they are right.

Continue reading

Security and continuity of supply

Aah…the intricacies of the English language. Not supply (chain) security, but the security of supply, as in the continuity of supply. Do you see the difference? This conference paper comes from three Finnish researchers, working with VTT Technical Research Centre of Finland and was presented at ESREL 2007, a conference that will spark many posts on this blog. Today’s paper describes how Finland views logistics and supply as important to national security and how the LOGHU project was created to develop a framework for identification and ranking of threats and corresponding countermeasures. While the paper clearly shows that the project is still a work in progress, much wisdom and food for thought can be drawn from it.

Continue reading

Risk & Vulnerability

Supply chains are increasingly becoming complex webs and networks and are no longer straightforward chains with just a few links between supplier and customer.  Supply chains have indeed become complex systems, and the system thinking that pervades Einarsson and Rausand (1997) An Approach to Vulnerability Analysis of Complex Industrial Systems is perhaps applicable to supply chains? Why?  Perhaps because, really, there is little difference between vulnerability in supply chains and vulnerability in complex industrial systems.

Continue reading

Book Review: Managing Supply Chain Risk and Vulnerability

Another book by someone from the ISCRiM group? No, not this time, or perhaps, yes, after all. Managing Supply Chain Risk and Vulnerability: Tools and Methods for Supply Chain Decision Makers by Teresa Wu and Jennifer Blackhurst sounds like ISCRiM, but it’s not. If it were, it should have been noted in the ISCRiM Newsletter, but it wasn’t. Nonetheless, several of the ISCRiM members have contributed to the chapters in this book, which is well worth taking a closer look at, particularly if risk modeling and decision-making is your field.

Continue reading

Graph Theory to the rescue

Graph Theory. In Supply Chain Management? It’s probably 10 years ago since last time I looked at Graph Theory. That was when I was writing my thesis for my MSc in GIS on Network Analysis in Raster GIS, and while I know that Graph Theory has many applications, I never expected to see it in Supply Chain Management. Now, Stephan M. Wagner and Nikrouz Neshat are using it in their 2009 paper Assessing the vulnerability of supply chains using graph theory. That is a novel approach, but does it work?

Continue reading

Bad locations = bad logistics?

How are companies located in sparse transport networks affected by supply chain disruptions? This article develops a new framework for the categorization of supply chains, and introduces the notion of the constrained supply chain. Within the constrained supply chain framework, a company can address its locational disadvantage by either redesigning the supply chain towards a better structure, in order to gain better location, or by redesigning the supply chain towards a better organization, in order to gain better preparedness.

Continue reading

Sheffi’s Resilient Enterprise and supply chain risk

It is unfortunate that many companies still leave risk management and business continuity to security professionals, business continuity planners or insurance professionals. So say Yossi Sheffi and James B Rice in their 2005 article A Supply Chain View of the Resilient Enterprise. It is unfortunate that it is this way, because building a resilient enterprise is an enterprise-wide undertaking  that is about  so much more than simply preparing a company for disruptions.

Continue reading

Corporate vulnerability

Göran Svensson is one of the leading key figures in supply chain vulnerability research and his concepts and models of supply chain vulnerability are usually well thought-out and easy to understand. So is Key areas, causes and contingency planning of corporate vulnerability in supply chains: A qualitative approach. Here Svensson builds the construct of supply chain vulnerability around three components: time dependence, functional dependence and relational dependence.

Continue reading

Risk Management: Contingent versus Mitigative

The risk management literature separates between mitigative actions or strategies and contingent actions or strategies. It is important to keep these two perspectives apart. Why? Because risk management needs to address both sides of the risk: what lies behind the risk (source) and what lies in front of it (consequences). Here is my attempt at defining these two terms and explaining the differences, at least the way I see it, based on Asbjørnslett (2008), Tomlin (2006) and Jüttner et al. (2003).

 

Continue reading

Supply Chain Risk Management – as seen from Space

Is it possible to reconcile supply chain vulnerability, risk and supply chain management with corporate governance, business continuity, national security and emergency planning? In a 2006 article, Reconciling supply chain vulnerability, risk and supply chain management, by Helen Peck, she attempts to do just that, hence my analogy of looking down at supply chains from Space – in order to really see the big picture. Because, as far as supply chain risk goes, some, if not all, stakeholders are found far beyond the individual supply chain and Helen Peck does an excellent  job at explaining why.

Continue reading