An integrated approach to supply chain risk analysis
Anna Corinna Cagliano*
Alberto De Marco
Sabrina Grimaldi
Carlo Rafele
Department of Production Systems and Business Economics
Politecnico di Torino
corso Duca degli Abruzzi 24
10129 Torino, Italy
* Corresponding author
Telephone: +39 0110907206
Fax: +39 0110907299
e-mail: anna.cagliano@polito.it
An integrated approach to supply chain risk analysis
Despite the increasing attention that supply chain risk management is receiving
by both researchers and practitioners, companies still lack a risk culture.
Moreover, risk management approaches either are too general or require pieces
of information not regularly recorded by organisations.
This work develops a risk identification and analysis methodology that
integrates widely adopted supply chain and risk management tools. In
particular, process analysis is performed by means of the standard framework
provided by the SCOR-Model, the risk identification and analysis tasks are
accomplished by applying the Risk Breakdown Structure and the Risk
Breakdown Matrix, and the effects of risk occurrence on activities are assessed
by indicators that are already measured by companies in order to monitor their
performances. In such a way, the framework contributes to increase
companies’ awareness and communication about risk, which are essential
components of the management of modern supply chains.
A base case has been developed by applying the proposed approach to a
hypothetical manufacturing supply chain.
An in-depth validation will be carried out to improve the methodology and
further demonstrate its benefits and limitations. Future research will extend the
framework to include the understanding of the multiple effects of risky events
on different processes.
Keywords: risk management; supply chain; performance measurement
1. Introduction
Risk management has been gaining considerable attention in the last ten years as an
autonomous subject in the field of supply chain management. The Supply Chain
Council defines supply chains as encompassing every effort involved in producing
and delivering a final product. Such efforts include managing supply and demand,
sourcing raw materials and parts, manufacturing and assembling, warehousing and
inventory tracking, order entry and order management, and distribution across all
channels and delivery to the customer (Lummus et al. 2001).
The relevance given to the risk topic is notably triggered by the frequency and
intensity of catastrophes, disasters, and crises that seem to have increased on a global
scale (Coleman 2006). Supply chains operate in an unpredictable environment and
several factors and trends contribute to the exposure to uncertainty. In recent years,
almost all industries have faced fiercer competition and accelerated market
globalisation resulting in the need for making intra-firm and inter-firm business
processes more efficient and responsive. This is the context that has spawned current
supply chain strategies such as outsourcing and offshoring large portions of
manufacturing and R&D activities, sourcing in low-cost countries, reducing
inventories, streamlining the supply base, and collaborating more intensively with
other supply chain partners (Hult et al. 2004). Similar policies produce stronger interfirm dependence together with longer and more complex supply chain setups and
globe-spanning operations, thus exacerbating the vulnerability of supply chains to
unexpected events (Tang 2006). The failure to effectively manage supply chain risk
may result in economic and financial losses, reductions in product quality, delivery
delays, and loss of reputation in the eyes of customers and suppliers (Hendricks and
Singhal 2003; Cousins et al. 2004). Therefore, risk management should be a core
issue in planning and control of any organisation (Finch 2004).
However, companies that understand the importance of supply chain risk often
do not know where to start in order to tackle it (Kiser and Cantrell 2006). With this
regard, literature takes a quite general perspective on supply chain uncertainties and
provides a limited support about how to deal with them from a practical point of view
(Blackhurst et al. 2005). General literature on risk presents a wide range of techniques
but they have been scarcely adapted to the needs of supply chain management (Khan
and Burnes 2007). Thus, tools to assess the exposure to supply chain risks as well as
to support the creation of awareness about this issue are needed (Zsidisin et al. 2005).
Contributing to this field, an approach for identifying and analysing supply
chain risk is developed. It integrates process mapping prepared through the Supply
Chain Operations Reference Model (SCOR-Model), key performance indicators
(KPIs) measuring the effects of the occurrence of risky events, and conventional risk
management tools such as the Risk Breakdown Structure and the Risk Breakdown
Matrix. Based on a standard process reference model and on KPIs commonly
measured by companies, our framework aims to provide a guideline to risk
management and, in this way, to promote companies’ interest in this crucial aspect of
supply chains.
The paper is organised as follows. Literature background for this work is
presented in Section 2. The developed method for supply chain risk identification and
analysis is detailed in Section 3 and its application to a base case is described in
Section 4. Finally, Section 5 discusses findings, limitations, and future research
directions.
2. Literature background
Risk is an issue that has been extensively discussed in the last decades and several
definitions have been put forward in literature, including both undesirable and
desirable unexpected outcomes. Basically, risk takes into account two aspects: the
uncertainty about and the severity of the consequences of an activity having a value
for human beings (Aven and Renn 2009).
In the context of supply chain, risk has been usually defined by taking a
negative perspective. Juttner (2005) addresses supply chain risk as anything that
presents an impediment or a hazard to information, material, and product flows from
original suppliers to the delivery of the final product to the ultimate end-users.
Supply chain risk management is the identification and management of risks
affecting a supply network through a coordinated effort among supply chain members
to reduce vulnerability as a whole (Christopher et al. 2002). Supply chain risk
management should be considered as a strategic activity because it impacts on
operational, market, and financial performances of a firm (Narasimhan and Talluri
2009).
Risk management is usually divided into a number of stages: risk
identification, risk analysis, and risk response and monitoring (Project Management
Institute 2008). Available literature in identification and analysis is reviewed below
for the purpose of this research.
There are basically two kinds of approaches to supply chain risk identification.
The first one relies on brainstorming. Hallikas and others (2002) apply the
brainstorming technique through in-depth interviews with a group of final assemblers
and some of their suppliers operating in the electronics and metal sectors. As a result
of this procedure, risks are divided into four groups: demand related factors and value
chain positioning, delivery performance ability, financial factors, and pricing.
Moreover, the relationships between their causes and effects are investigated. Sinha
and others (2004) conduct a brainstorming session for risk identification in a company
in the aerospace industry in order to generate a list of the possible risks that could be
encountered when dealing with vendors.
The second approach to supply chain risk identification is based on
taxonomies. Chopra and Sodhi (2004) classify supply chain risks into disruptions,
delays, systems, forecast, intellectual property, procurement, receivables, inventory,
and capacity. For each of these categories, risk sources are identified and they may
include natural disasters, labour disputes, supplier bankruptcies, and wars and
terrorism. Spekman and Davis (2004) relate supply chain risks to six areas: material
flows, information flows, cash flows, security, opportunistic behaviours, and social
responsibility. According to each area, risky events that may occur are analysed.
Lockamy III and McCormack (2010) look at the nature of risks and classify them into
operational, network, and external ones. Operational risks are related to inadequate or
failed internal processes, people, and systems as well as to external ones. Network
risks are due to the structure of the supplier network, and external risks are driven by
forces such as weather, earthquakes, political, regulatory, and market strategies.
As far as supply chain risk analysis is concerned, it is usually performed by
means of a number of qualitative, semi-quantitative, and quantitative methods.
Several models assess risky events by evaluating the probability of occurrence
and the severity of impact. Sheffi (2005) uses qualitative estimates for these two
dimensions. To be more precise, the probability of occurrence may assume two levels,
“high” and “low”, and, in a similar way, the severity of impact may be “severe” or
“light”. Norrman and Jansson (2004) present four level scales for evaluating the
probability of occurrence (“rare”, “unlikely”, “likely”, and “almost certain”) and the
severity of impact (“negligible”, “minor”, “major”, and “severe”). Such evaluations
contribute to estimate the degree of risk, which may be low, medium, high, and very
high. Sinha and others (2004) assess the severity of risk impacts by using three levels:
high, medium, and low. Hallikas and others (2002) define semi-quantitative scales:
values ranging from 1 to 4 for the probability of occurrence represent very unlikely,
improbable, probable, and very probable events respectively and values from 1 to 4
for the severity of impact represent insignificant, minor, serious, and catastrophic
influences of risky events respectively. Wu and others (2006) apply the Analytic
Hierarchy Process (AHP) to calculate the relative weight of each risk factor, which is
an indicator of how important a risk factor is. Finally, quantitative risk analysis
usually relies on simulation approaches such as Montecarlo technique, Petri Nets, and
fault and event trees (Kleindorfer and Saad 2005; Wu and Olson 2008; Tuncel and
Alpan 2010).
The literature review reveals that most of the approaches for supply chain risk
management either are limited to the identification of risk areas or face risk analysis
by requiring a careful recording of past events and data in order to evaluate the
probability of occurrence of risky events as well as the related impact. In addition, the
proliferation of risk management software packages, which use sophisticated
probabilistic methods to quantify uncertainty, does not encourage the development of
a deep understanding of the underlying structure constituting the inter-dependencies
between risk sources, risk occurrences, and effects (Tah and Carr 2001).
Therefore, there is a need for comprehensive methodologies that do not
require companies to invest in information systems and human resources to gather a
huge amount of additional historical data that are usually not available from
organisations but they are essential to perform supply chain risk management.
To this end, our work proposes a framework to integrate both risk
identification and analysis in well established supply chain management practices,
like process mapping and performance measurement. This is based on data currently
recorded by companies for purposes other than risk investigation. The data are set into
the SCOR-Model and then applied to risk analysis.
The implementation of a methodology that not only provides accurate
guidelines about how to deal with risk, but also builds on widely used tools stimulates
companies to acquire an adequate knowledge about causes and effects of supply chain
uncertainty.
3. A new framework for supply chain risk identification and analysis
3.1 Aim and steps of the framework
Our approach to supply chain risk management is intended to deal with the entire risk
escalation process (Hillson 2004; Hillson et al. 2006). Any risky event is triggered by
an internal or external source (step 1) and evolves through an occurrence affecting an
activity (step 2). A probability and an impact may be associated to such occurrence,
which in turn brings consequences (step 3) usually in terms of time, cost, and quality
variance against expected performance (Figure 1).
Figure 1. Risk escalation process (Adapted from Hillson 2004)
Based on the guidelines suggested by literature to manage the risk escalation process
(Hauser 2003; Norrman and Jansson 2004; Kiser and Cantrell 2006), the present
framework can be subsumed as composed of three steps:
Process mapping: processes are analysed in order to understand in what parts
of a supply chain risky events may occur. Such task is accomplished by
applying a breakdown of activities based on the SCOR-Model (Supply Chain
Council 2008). This model describes all the business activities associated with
satisfying customer demand, in order to address, improve, and communicate
supply chain management practices within and between partners, from the
supplier's supplier to the customer's customer. Process mapping according to
the SCOR-Model allows to understand those supply chain structures
responsible for risk occurrence and to relate sources of uncertainty, identified
through common tools for risk investigation, to the associated process
activities.
Risk identification: identification and classification of main sources of risk
(step 1 in Figure 1) for each SCOR process are performed using a standard
breakdown structure decomposed into main kinds of risk in a supply chain.
Risk sources are then linked to the activities where associated risky events
may occur and the nature of such events is identified.
Risk analysis: taking a broad perspective, risk may be seen as an uncertainty
that may be in turn either a threat or an opportunity, depending if it affects a
business either negatively or positively (Ward and Chapman 2003; Hillson
2004). In the risk analysis phase of our approach, performance indicators,
assessing the effects (step 3 in Figure 1) of risk occurrence (step 2 in Figure 1)
on activities, are selected according to the nature of the risky events identified
in the previous step. These performance indicators are measured and compared
against their associated target values. The analysis of discrepancies reveals
whether risky events that happened benefitted or harmed the investigated
processes, in order to set proper actions to either exploit or mitigate their
consequences. Such actions will become proactive measures in the next time
bucket, being supply chain activities repetitive in nature.
The following sections detail the steps along with the present framework unfolds as
well as the foundations on which it is based.
3.2 SCOR-Model as the foundation of the framework
Our approach uses the SCOR-Model version 9.0 as the fundamental supply chain
structure for the analysis of risk. The SCOR-Model is organised around the five main
supply chain processes, namely Plan, Source, Make, Deliver, and Return. Each of
these five processes (SCOR Level 1) is in turn decomposed into sub-processes (SCOR
Level 2) according to three process categories: Planning, Execution and Enable. Each
sub-process is divided into elementary activities (SCOR Level 3) for which inputs,
outputs, best practices, and performance indicators are defined. In particular, the
SCOR-Model provides a rich catalogue of key indicators to measure the performance
of supply chain operations.
The SCOR-Model version 9.0 also incorporates supply chain risk assessment,
tracking, and mitigation through the suggestion of risk management activities as well
as best practices and performance metrics.
The SCOR-Model has been chosen as the foundation for the proposed risk
management framework because it is a widely applied supply chain management tool
(Stephens 2001; Huang et al. 2005). Moreover, the SCOR-Model has been recognised
as being a valuable means to provide incentive alignment and collaboration for risk
avoidance and reduction by promoting cooperation among supply chain partners
(Kleindorfer and Saad 2005; Srividhya and Jayaraman 2007). For example, the
SCOR-Model has been adopted in the aerospace industry to integrate planning
activities with the purpose of overcoming uncertainty and conflicting objectives and
stimulating coordination among supply chain members (Raj and Whitman 2004).
The three pillars of the SCOR-Model, namely process modelling, performance
measurement, and best practices, allow to take a systemic and effective perspective on
risk. First, the SCOR-Model provides a process modelling ensuring that all the
significant activities within a supply chain are identified, thus building a reliable basis
for a comprehensive definition of risks. The standard structure provided by the
SCOR-Model also makes all decision makers agree on processes and goals, which is
of paramount importance to the establishment of a risk measurement system
(Gaudenzi and Borghesi 2006). Second, the key performance indicators suggested by
the SCOR-Model enable to evaluate the behaviour of different supply chain activities
when exposed to risk. Third, the best practices presented by this model may support
the identification of successful actions to either exploit or mitigate the risks detected
by our approach.
3.3 Supply chain process mapping
To identify activities that might be affected by risk is the first step in every risk
management methodology. In fact, a coherent representation of the supply chain
structure is essential to express how different risks are related to the components of
this structure (Narasimhan and Talluri 2009). Moreover, it makes companies more
conscious of their business processes and assures proper actions to reduce the
exposure to vulnerability (Braunscheidel and Suresh 2009).
Our framework suggests using the Activity Breakdown Structure (ABS) to
map supply chain processes. The ABS comes from the Work Breakdown Structure
(WBS) (Project Management Institute 2001) and is a hierarchical grouping of
activities that organises and defines the scope of a process. Each descending level
constitutes a more detailed decomposition of process tasks.
The ABS has been selected because it does not only decompose activities in a
clear way but it is also able to properly represent the SCOR-Model structure. As a
matter of fact, the SCOR-Model provides a three-level hierarchical structure defining
the business activities associated with the fundamental supply chain processes, and
each descending level depicts an increasingly detailed description of such activities.
Taking advantage of such similarity between the ABS and the SCOR-Model,
our methodology performs risk identification by using ABSs based on the process
breakdown provided by the SCOR-Model. The bottom level ABS elements are
represented by SCOR third level elementary activities (Table A.1 in the Appendix).
3.4 Supply chain risk identification
To identify and classify risks according to their nature is an essential task before
performing risk analysis and developing control strategies (Narasimhan and Talluri
2009). An accurate understanding of types of supply chain risks enables tailoring risk
reduction approaches to the specific characteristics of each single organisation
(Chopra and Sodhi 2004).
In our framework, once the activities of a supply chain process have been
classified into an ABS, sources of risk for each lowest level activity should be
identified and arranged to provide a standard representation of risk exposure
facilitating understanding, communication, and management. This can be
accomplished by adopting the Risk Breakdown Structure (RBS). The RBS is a
hierarchical, source-oriented grouping of risks that organises and defines the total risk
exposure. Each descending level represents an increasingly detailed definition of
sources of risk (Hillson 2002). The RBS tool is chosen because it provides an
effective foundation for a stratified classification of risks and the associated
nomenclature (Tah and Carr 2001).
In our methodology, the RBS does not only serve as a framework for
organising selected risk sources, but also supports their identification. Main literature
about supply chain risk management is reviewed in order to build a general taxonomy
that can be customised according to the process at issue. The RBS levels are intended
to provide a prompt list of areas of risk affecting supply chain processes that guides
the identification of risk sources impacting on specific activities. Table 1 illustrates
the standard RBS structure; more levels may be added as needed.
Table 1. RBS frame for supply chain risk
Sources of supply chain risks are first categorised as external and internal ones
(Smallman 1996; Kiser and Cantrell 2006). External risk sources cannot be controlled
by a company, being exposed to its external environment. On the contrary, internal
risk sources can be better handled because they are associated with decisions made
and actions undertaken within the company. RBS Level 2 and Level 3 represent the
most common determinants of supply chain risk reported by literature. Internal risk
sources are structured according to the supply chain activity levels where risky events
may occur. To this end, the three levels defined by the Global Supply Chain Forum
(Lambert 2008), namely Strategic, Tactical, and Operational, are adopted. Detailed
internal risk sources (Level 3) cannot be defined in this general RBS because they
strongly depend on the specific kind of process under study.
The risk identification phase is completed by connecting detailed risk sources
for each supply chain process with the corresponding elementary activities (SCORModel Level 3). The joint analysis of supply chain activities and risk sources
increases risk visibility, which in turn may contribute to improve performance
(Narasimhan and Talluri 2009).
For this purpose, activities at the lowest ABS level are the rows of a matrix,
whose columns represent risk sources at the lowest RBS level. A Risk Breakdown
Matrix (RBM) (Hillson 2004; Hillson et al. 2006) is thus generated; its cells identify
the impacts of risk sources on activities. Figure 2 shows a RBM where the impacts of
risk sources on activities are represented by colouring the corresponding cells. For
example, in this RBM the risky events caused by the source R2.1 affect the activity
A1.1, therefore the cell at the intersection between the risk source R2.1 and the
activity A1.1 appears grey coloured.
Figure 2. Impacts of risk sources on activities in a RBM (Adapted from Hillson 2004)
After identification, it is necessary to investigate the nature of risk occurrence for each
RBM cell that was marked: what kind of risky events caused by a source may affect
the associated activity and what are the related effects, i.e. time delays, quality issues,
raw material shortages, etc. This knowledge will guide the selection of performance
indicators in the analysis phase of the framework. Such task is of paramount
importance for choosing KPIs able to reflect risk effects properly and requires the
understanding of supply chain processes provided by the first step of the approach.
3.5 Supply chain risk analysis
The risk analysis phase of the developed methodology focuses on the effects on
activities of the occurrence of risky events due to the identified sources and estimates
these effects through performance measurement.
In many companies, the availability of data about risk probabilities, impacts,
and effects is scarce and they do not appear to be collected systematically. In some
cases, managers estimate such quantities by means of subjective judgements, and this
task may be difficult especially when events have not occurred before (Harland et al.
2003). Therefore, the value of risk, obtained as a multiplication of probability and
impact, is not always easy to use and is not always understandable to business people
(Norrman and Jansson 2004).
To this end, performance indicators provide a reliable basis to estimate the
probability and the impact of risky events as well as their effects through quantities
that are specific to each organisation and can be easily controlled. Coupled with an
accurate monitoring process, they may control any deviation (bias) from foreseen
plans (Badr and Stephan 2007). Risk metrics may be either causal variables or proxies
for the risk drivers as well as the associated consequences. They may either be
monitored independently, in order to analyse single risks, or be considered as a
system, in order to have a picture of the overall risk exposure of the business
(Scandizzo 2005). The assessment of risk does not require a new set of KPIs, but
rather a risk-adjusted view of the performance metrics already in place (Hauser 2003).
In our methodology, the indicators that are most capable to reflect the effects
of risks (step 3 in Figure 1) are selected from companies’ dashboards, to form a
measurement system that aims to analyse the consequences of the occurrence of risky
events (step 2 in Figure 1) on supply chain activities, given their importance to
properly control disruptions and other kinds of uncertainty (Scandizzo 2005). These
consequences become manifest in supply chain outcome measures, such as those
related to cost or quality, and, in general, in all those variables expressing a variance
from expected performance. Literature provides comprehensive lists of such
measures, ranging from financial through reputational, to safety-related ones
(Goldberg et al. 1999; Harland and Brenchley 2001).
For each RBM cell where an impact of a risk source on an activity is defined,
the occurrence of a risky event due to the source changes the performance of the
activity in some way. Therefore, a KPI capturing such change is able to assess the
degree of the effect of the risk occurrence on the activity, and it indirectly gives a
knowledge about such occurrence that may be useful for future evaluations of the
existing risks for each activity. To this end, KPIs are selected according to the nature
of risky events and of their effects and placed into RBM cells.
The primary effects of risk on the processes where it occurs are assessed, thus
providing a good trade-off between accuracy and speed in the risk management
process (Zsidisin et al. 2004). As a matter of fact, performance indicators allow a
quick but clear understanding of what supply chain areas need more attention and
enable to prioritise those risks requiring a deeper investigation by acquiring additional
pieces of information.
The analysis of any discrepancy of the actual performance against the target
KPIs allows to investigate on either the negative or the positive nature of risky events
to activate subsequent actions directed to either mitigate the effects of a threat or
exploit the benefits of an opportunity.
4. Applying the framework to a manufacturing supply chain
The present section describes the application of the proposed framework for risk
identification and analysis to a hypothetical internal supply chain of a manufacturing
company.
In order to focus on a manageable case, we analysed the supply chain
activities included in the SCOR-Model part dealing with Make-to-Order products.
Moreover, risk sources are drawn from literature and performance metrics are selected
from the SCOR-Model catalogue giving particular attention to the two most important
aspects of customer requirements: timely delivery and product quality (Svensson
2004).
Source, Make, and Deliver processes of the SCOR-Model are studied. For
each of them, most relevant sub-processes belonging to all the three Level 2 process
categories are considered. In turn, most significant elementary activities for each of
these sub-processes are selected.
As an example, the ABS for the Source process is detailed in the Appendix
(Table A.1). P2 Plan Source, S2 Source Make-to-Order Product, and ES Enable
Source are the SCOR Level 2 sub-processes that are taken into account.
The RBS that identifies the risk sources impacting on the Source process is presented
in Table A.2 of the Appendix. It has been worked out by adapting the general RBS
frame presented in Table 1 to take into account Level 3 risk sources specific for the
process at issue. The last column of the RBS in Table A.2 reports literature sources
not included in the review presented in Table 1.
The RBSs classifying the risk sources affecting the Make and Deliver
processes have been defined in the same way as for the Source process, and are
presented in Table A.3 and Table A.4 of the Appendix respectively.
For the purpose of preparing the RBMs, ABSs for the Source, Make, and Deliver
processes are linked to associated RBSs. As an example, Table 2 presents the
complete RBM for the Source process with the identification of the impacts of risk
sources on activities (grey cells). All the RBMs for this case study, together with the
ABSs and the RBSs, are available from the authors (please visit link to the authors’
website, not reported in this version of the paper for blind review reasons).
The possible risk occurrences are investigated for each impact defined in the
RBM, together with the related effects on activities. According to the nature of both
the risky events that may happen and their effects, KPIs enabling to measure the
degree of such effects are selected. Performance indicators are coded according to the
activity they refer to and how many different metrics have been associated with this
activity. For example, the indicator SI2.4.1 defines the first KPI selected for the
Source activity S2.4.
The analysis of some of the RBM cells of the three supply chain processes
studied in this base case is presented below.
As far as the RBM for the Source process is concerned (Table 3), the risk
source IS.5 Machine performance during transiting of the sourced products impacts
on both the activity S2.2 Receive Product and the activity S2.4 Transfer Product. The
identified risk occurrence is an incorrect functioning of the material handling
equipment while either downloading the sourced products from trucks and moving
them to the incoming raw material area or transporting them from that area to the
manufacturing department. The main effects are delays in making such materials
available for undergoing the production process and physical damages to the
incoming products. On this basis, the effect on the activity S.2.2 is measured by the
KPI SI2.2 % Orders/lines received damage free, which assesses the number of orders
or lines that are received damage free divided by the total orders or lines received in
the measurement period. In this case, only damages due to the material handling
equipment used by the focus company are considered. The effect of risk occurrence
on the activity S2.4 is measured by the indicators SI2.4.1 %Product transferred ontime to demand requirement and SI2.4.2 % Product transferred damage free. The first
one evaluates the number of product orders or lines that are transferred to the
manufacturing department on time divided by the total orders or lines transferred in
the measurement period. The second one assesses the number of product orders or
lines that are transferred to the manufacturing department damage free divided by the
total orders or lines processed in the measurement period.
As far as the RBM for the Make process is concerned (Table 4), the risk
source IM.7 Machine performance impacts on both the activity M2.3 Produce and
Test and the activity M2.4 Package. In the first case, the identified risk occurrence is a
poor performance of the production lines that could give as effects either a total
manufacturing lead time longer than its standard value, because for example
workstations take longer to perform their operations, or an increase in the number of
defective products out of the line that have to be discarded. The following three
metrics have been chosen to evaluate these effects: MI.2.3.1 Scrap expense, MI2.3.2
Total build cycle time, and MI2.3.3 Yield. Scrap expense assesses the costs incurred in
the measurement period from finished products falling outside of specifications and
possessing characteristics that make rework impractical. Total build cycle time is
defined as the time necessary to transform raw materials into finished products. Yield
is the ratio of usable output from a production process to the amount of input in the
measurement period, as a result of the finished product quality test. In the second case
the risk occurrence is represented by a poor performance of the machines packaging
the finished products to be delivered. The effect is packages not compliant with set
quality standards and is measured by the KPI MI2.4 Scrap packaging expense, which
is defined as the costs incurred in the measurement period from dealing with packages
falling outside of specifications.
Finally, the RBM for the Deliver process (Table 5) defines an impact of the
risk source EXD.1 Nature disasters on the activity D2.12 Ship Product and an impact
of the same source on the activity D2.13 Receive and Verify Product by Customer. In
both the cases the risk occurrence is represented by natural events such as floods and
hurricanes. On the one hand, the main effect of these risky events on the activity
D2.12 is a delay in delivering the finished products to the customer. Thus, the KPI
DI2.12 Delivery performance to customer commit date is chosen to measure such
effect. This metric assesses the percentage of orders in the measurement period that
are fulfilled on or before the original scheduled date. On the other hand, the effect of
natural events on the activity D2.13 is receiving a relevant quantity of products that
have been damaged during the transportation, and the KPI DI2.13 Perfect order
fulfilment is selected to measure this effect. Here the Perfect order fulfilment
evaluates the consignment compliance to the committed quality.
Table 2. Complete RBM for the Source process
Table 3. Portion of RBM for the Source process
Table 4. Portion of RBM for the Make process
Table 5. Portion of RBM for the Deliver process
The defined performance indicators should be then evaluated and compared
with the associated target values in order to assess the degree of the effects of the
occurrence of risky events on supply chain activities. Threats and benefits originated
by these events should be identified with the aim of supporting appropriate decision
making.
5. Discussion
The developed framework for risk identification and analysis is grounded on the
standard categorisation of supply chain processes offered by the SCOR-Model, thus
making clear “what” risk management is applied to.
Risk identification is not completely left to the experience and knowledge of
process experts, but it is guided by a standard RBS frame that presents a
comprehensive, literature driven list of possible risk sources affecting supply chain
operations. Such list ensures that any possible gaps or blind spots in risk identification
are avoided, and all potential sources of risk are considered.
In addition, the Risk Breakdown Structure and the Risk Breakdown Matrix are
simple but powerful risk management tools because they allow a systemic
representation of both risk sources and their impacts on activities. The systemic
perspective is also guaranteed by the fact that our framework analyses both positive
and negative outcomes of risk occurrence and covers all the phases of the risk
escalation process. In fact, sources of risk are identified by means of the RBS, risk
occurrence is investigated by the RBM for each supply chain activity, and effect
analysis is performed by evaluating KPIs (Figure 3).
Figure 3. Mapping the framework on the risk escalation process
The developed framework is also extremely flexible because it may be applied to
various levels of organisational complexity, in order to analyse just one supply chain
process or to understand risks affecting all the main processes of a company,
according to the amount of information that is available. Moreover, different
breakdowns of supply chain processes may be used as an alternative to the one
suggested by the SCOR-Model.
A key point of our approach is that risk effect estimate by means of
performance measurement, a well-established management practice among both
Small and Medium Enterprises (SMEs) and large companies, enables to quantify risk
without recording a great amount of additional historical data. Furthermore, the
developed methodology enhances the value of performance measurement because it
associates KPIs not only with activities but also with related risk sources.
Therefore, the integration among process and risk management tools already
existing in literature and implemented in practice facilitates a constant and purposeful
application of the methodology by a large variety of industries.
Also, the use of the SCOR-Model, the RBS, the RBM and KPIs enhances the
value of the Supply Chain Council model by supporting the implementation of the
actions the SCOR-Model recommends for dealing with supply chain risk.
The value of this framework is that it increases communication about supply
chain risk, a field where responsibilities are interdependent and there must be a
regular, cross-functional and multidirectional information sharing among people, who
are the most important enabler of an effective risk management system (Elkins et al.
2005). In such a way, the proposed methodology contributes to promote a culture of
risk awareness by providing management and employees with a detailed procedure to
handle uncertainty. When the level of maturity towards risk is high enough to enable a
systematic tracking of risk data, the framework developed in this work may also
replace performance indicators with accurate numerical values of risk exposure.
5.1 Limitations and future research
The proposed methodology is mainly focused on observing the consequences of risks
and does not quantify the probabilities of occurrence and the impacts.
Furthermore, it does not analyse whether the risk occurrence has secondary
effects on multiple processes.
Finally, an extensive validation of the approach by applying it to multiple
supply chain settings is required in order to uncover its potential weaknesses and
foster refinements.
These limitations bring two future research lines. First, the methodology could
be extended to analyse risk not only after its occurrence but also before it, by
calculating probabilities of occurrence and impacts of risky events.
Second, the investigation of the cause and effect relationships among the
monitored KPIs could be integrated in our framework as a way to trace how the
effects of risk occurrence spread through multiple activities and processes, for
instance from the Source process through the Deliver one.
6. Conclusions
This work presents a risk identification and analysis methodology that integrates well
established supply chain and risk management tools, such as the SCOR-Model, the
Risk Breakdown Structure, the Risk Breakdown Matrix, and performance indicators.
The main purpose of the framework is increasing companies’ awareness about supply
chain risk by providing a structured approach to identify, assess, and communicate
sources and consequences of risky events. A base case has been developed by
applying the proposed approach to a hypothetical manufacturing supply chain.
Acknowledgements
The authors are grateful to Lisha Chen, M.Sc. in Management Engineering at Politecnico di
Torino, for her active involvement in the research.
References
Aven, T., and O. Renn. 2009. On risk defined as an event where the outcome is
uncertaint, Journal of Risk Research 12, no. 1: 1–11.
Badr, Y., and J. Stephan. 2007. Security and Risk Management in Supply Chain,
Journal of Information Insurance and Security 2: 288–296.
Blackhurst, J., C.W. Craighead, D. Elkins, and R.B. Handfield. 2005. An empirically
derived agenda of critical research issues for managing supply-chain
disruptions. International Journal of Production Research 43, no.19: 4067–
4081.
Braunscheidel, M.J., and N.C. Suresh. 2009. The organizational antecedents of a firms
supply chain agility for risk mitigation and response. Journal of Operations
Management 27: 119–140.
Chakraborty, T., B.C. Giri, and K.S. Chaudhuri. 2009. Production lot sizing with
process deterioration and machine breakdown under inspection schedule.
Omega 37, no. 2: 257–271.
Chopra, S., and P. Meindl. 2004. Supply chain management. 2nd ed. Upper Saddle
River (NJ): Pearson Education, Inc.
Chopra, S., and M. S. Sodhi. 2004. Managing risk to avoid supply-chain breakdown.
MIT Sloan Management Review 46, no.1: 53–62.
Christopher, M., A. McKinnon, J. Sharp, R. Wilding, H. Peck, P. Chapman, U.
Juttner, and Y. Bolumole. 2002. Supply Chain Vulnerability. Cranfield, UK:
Cranfield University.
Coleman, L. 2006. Frequency of man-made disasters in the 20th century. Journal of
Contingencies and Crisis Management 14, no.1: 3–11.
Cousins, P., R.C. Lamming, and F. Bowen. 2004. The role of risk in environmentrelated initiatives. International Journal of Operations & Production
Management 24, no.6: 554 – 565.
Elkins, D., R.B. Handfield, J. Blackhurst, and C. W. Craighead. 2005. 18 Ways to
Guard against Disruption. Supply Chain Management Review,
Janaury/February 2005: 46 – 53.
Faisal, M. N., D. K. Banwet, and R.Shankar. 2006. Mapping supply chains on risk
and customer sensitivity dimensions. Industrial Management & Data System
106, no.6: 878–895.
Finch, P. 2004. Supply Chain Risk Management. Supply Chain Management: An
International Journal 9, no2: 183–196.
Gaudenzi, B., and A. Borghesi. 2006. Managing risks in the supply chain using the
AHP method. The International Journal of Logistics Management 17, no.1:
114 –136.
Goh, M., Y.S. Lim, and F. Meng. 2007. A stochastic model for risk management in
global supply chain networks. European Journal of Operational Research
182: 164–173.
Goldberg, S., S. Davis, and A. Pegalis.1999. Y2K Risk Management. New York:
Wiley.
Hallikas, J., V.-M. Virolainen, and M. Tuominen. 2002. Risk analysis and assessment
in network environments: A dyadic case study. International Journal of
Production Economics 78, no. 1: 45–55.
Harland, C., and R. Brenchley. 2001. Risk in Supply Networks. Paper presented at the
European Operations Management Association 8th Annual Conference, June
3–5, in Bath, UK.
Harland , C., R. Brenchley, and H. Walker. 2003. Risk in supply networks. Journal of
Purchasing & Supply Management 9: 51–62.
Hauser, L. M. 2003. Risk – adjusted Supply Chain Management. Supply Chain
Management Review, November/December 2003: 64–71.
Hendricks, K.B., and V.R. Singhal. 2003. The effects of supply chain glitches on
shareholder value. Journal of Operations Management 21, no.5: 501–522.
Hillson, D. A. 2002. The Risk Breakdown Structure (RBS) as an aid to effective risk
management. Paper presented at the Fifth Project Management Conference
PMI Europe 2002, June 19-20, in Cannes, France.
Hillson, D. A. 2004. Effective Opportunity Management for Projects. Exploiting
Positive Risk. New York: Dekker.
Hillson, D., S. Grimaldi, and C. Rafele. 2006. Managing Project Risks Using a Cross
Risk Breakdown Matrix. Risk Management 8: 61–76.
Huang, S.H., S.K. Sheoran, and H. Keskar. 2005. Computer-assisted supply chain
configuration based on supply chain operations reference (SCOR) model.
Computers&Industrial Engineering 48: 377–394 .
Hult, G.T.M., D.J Ketchen Jr., and S.F. Slater. 2004. Information processing,
knowledge development and strategic supply chain performance. Academy of
Management Journal 47, no. 2: 241–253.
Ji, G., and C. Zhu. 2008. Study on supply chain disruption risk management strategies
and model. Paper presented at the IEEE 2008 International Conference on
Service Systems and Service Management, June 30-July 2, in Melbourne,
Australia.
John, G. 1984. An empirical investigation of some antecedents of opportunism in a
marketing Channel. Journal of Marketing Research 21, no. 3: 278 – 289.
Juttner, U. 2005. Supply chain risk management: Understanding the business
requirements from a practitioner perspective. The International Journal of
Logistics Management 16, no. 1: 120–141.
Khan, O., and B. Burnes. 2007. Risk and supply chain management: creating a
research agenda. The International Journal of Logistics Management 18, no.
2: 197–216.
Kiser, J., and G. Cantrell. 2006. Six steps to managing risk. Supply Chain
Management Review 10, no. 3: 12–17.
Kleindorfer, P.R., and G.H. Saad. 2005. Managing Disruption Risks in Supply
Chains. Production and Operations Management 14, no.1: 53 – 68.
Lambert, D. M. 2008. Supply Chain Management: Processes, Partnerships,
Performance. 3rd ed. Sarasota, FL: Supply chain management institute.
Lee, H.L., V. Padmanabhan, and S. Whang. 1997. The bullwhip effect in supply
chains. Sloan Management Review 43, no. 4: 93–102.
Lockamy III, A., and K. McCormack. 2010. Analysing risks in supply networks to
facilitate outsourcing decisions. International Journal of Production Research
48, no. 2: 593–611.
Lummus, R. R., D. W. Krumwiede, and R.J. Vokurka. 2001.The relationship of
logistics to supply chain management: developing a common industry
definition. Industrial Management & Data Systems 101, no. 8: 426–431.
Manuj, I., and J. T. Mentzer. 2008. Global supply chain risk management strategies.
International Journal of Physical Distribution & Logistics Management 38,
no. 3: 192–223.
Martha, J. 2002. Just-In-Case Operations. Warehousing Forum 17, no. 2,
http://www.warehousing-forum.com/news/2002_01.pdf (accessed December
1, 2010).
Narasimhan, R., and S. Talluri. 2009. Perspectives on risk management in supply
chain. Journal of Operations Management, no. 27: 114–118.
Norrman, A., and U. Jansson. 2004. Ericsson’s proactive supply chain risk
management approach after a serious sub-supplier accident. International
Journal of Physical Distribution & Logistics Management 34, no.5: 434 – 456.
Oke, A., and M. Gopalakrishnan. 2009. Managing disruptions in supply chains: A
case study of a retail supply chain. International Journal of Production
Economics 118: 168–174.
Project Management Institute. 2001. Practice Standard for Work Breakdown
Structures. Philadelphia (PA): Project Management Institute.
Project Management Institute 2008. A Guide to the Project Management Body of
Knowledge (PMBOK Guide). 4rd ed. Newtown Square (PA): Project
Management Institute.
Raj, P., and L.Whitman. 2004. Methodology to mitigate supplier risk in an aerospace
supply chain. Supply Chain Management: An International Journal 9, no.2:
154 – 168.
Ritchie, B., and C. Brindley. 2007. Supply chain risk management and performance:
A guiding framework for future development. International Journal of
Operations & Production Management 27, no. 3: 303–322.
Scandizzo, S. 2005. Risk Mapping and Key Indicators in Operational Risk
Management. Economic Notes 34, no. 2: 231–256.
Sheffi, Y. 2005. The Resilient Enterprise: Overcoming Vulnerability for Competitive
Advantage. Cambridge, MA: The MIT Press.
Sheffi,Y., and J.B. Rice. 2005. A supply chain view of the resilient enterprise. Sloan
Management Review 47, no.1: 41–48.
Sinha, P. R., L. E. Whitman, and D. Malzahn. 2004. Methodology to mitigate supplier
risk in an aerospace supply chain. Supply Chain Management: An
International Journal 9, no. 2: 154 – 168.
Smallman, C. 1996. Risk and organisational behaviour: a research model. Disaster
Prevention and Management 5, no. 2: 12–26.
Spekman, R. E., and E. W. Davis. 2004. Risky business: expanding the discussion on
risk and the extended enterprise. International Journal of Physical
Distribution & Logistics Management 34, no. 5: 414–433.
Srividhya, V.S., and R. Jayaraman. 2007. Management of Supplier Risks in Global
Supply Chains. SETLabs Briefings 5, no.3: 1–12.
Stephens, S. 2001. Supply Chain Operations Reference Model Version 5.0: A New
Tool to Improve Supply Chain Efficiency and Achieve Best Practice.
Information Systems Frontiers 3, no.4: 471–476.
Supply Chain Council. 2008. Supply-Chain Operations Reference-Model. Version
9.0. Pittsburgh (PA): Supply-Chain Council.
Svensson, G. 2004. Key areas, causes and contingency planning of corporate
vulnerability in supply chains: A qualitative approach. International Journal
of Physical Distribution & Logistics Management 34, no. 9: 728–748.
Tah,, J. H. M., and V. Carr. 2001. Towards a framework for project risk knowledge
management in the construction supply chain. Advances in Engineering
Software 32: 835–846 .
Tang, C.S. 2006. Review Perspectives in supply chain risk management. International
Journal of Production Economics 103: 451–488.
Tuncel, G., and G. Alpan. 2010. Risk assessment and management for supply chain
networks: A case study. Computers in Industry 61, no.3: 250-259.
Wagner, S.M., and C. Bode. 2006. An empirical investigation into supply chain
vulnerability. Journal of Purchasing & Supply Management 12: 301–312.
Ward, S. and Chapman, C. 2003. Transforming project risk management into project
uncertainty management. International Journal of Project Management 21:
97–105.
Wu, D., and D.L. Olson. 2008. Supply chain risk, simulation, and vendor selection.
International Journal of Production Economics 114: 646–655.
Wu, T., J. Blackhurst, and V. Chidambaram. 2006. A model for inbound supply risk
analysis. Computers in Industry 57: 350–365.
Yigitbasioglu, O. 2004. Upstream Information Flow in the Supply Chain: The Case of
Finnish Manufacturers. M.Sc. diss., The Swedish School of Economics and
Business Administration.
Zsidisin, G.A., L.M. Ellram, J.R. Carter, and J.L. Cavinato. 2004. An analysis of
supply risk assessment techniques. International Journal of Physical
Distribution & Logistics Management 34, no.5: 397–413.
Zsidisin, G.A., S.A. Melnyk, and G.L. Ragatz. 2005. An institutional theory
perspective of business continuity planning for purchasing and supply
management. International Journal of Production Research 43, no.16: 3401–
3420.
Appendix
Table A.1. ABS for the Source Process
Table A.2. RBS for the Source Process
Table A.3. RBS for the Make process
Table A.4. RBS for the Deliver process
Causes/Sources
Occurrence
Effect analysis
Occurrence
Origin
Transition
Consequence
Risk Factor
INT.
EXT.
.
Risk effects
Process Risk
Probability X%
step 1
step 2
Impact
step 3
Figure 2
RBS
RBM
Causes/Sources
Occurrence
KPIs
Effect analysis
Table 1. RBS frame for supply chain risk
Level 0
Level 1
Level 2
Level 3
Literature Source
Nature disasters
Kleindorfer and Saad 2005; Faisal et
al. 2006; Kiser and Cantrell 2006;
Catastrophic
Man-made
Goh et al. 2007; Khan and Burnes
accidents
2007
Political
Changes in
Kleindorfer and Saad 2005; Sheffi
government
and Rice 2005; Khan and Burnes
policies
2007
Fuel price
fluctuation
Exchange rate
Wagner and Bode 2006; Ritchie and
Economic
fluctuation
Brindley 2007; Ji and Zhu 2008
Standard
Changes in the
RBS for
economic
supply
situation
chain
Labour strikes
processes
Changes in the
External
network of
transportation
Juttner 2005; Tang 2006;
hubs
Braunscheidel and Suresh 2009
Social
IT system
functioning
Changes in
import/export
Zsidisin et al. 2000; Kiser and
regulations
Cantrell 2006
Legal
Tariff changes
Cultural
Different culture
Wu et al. 2006; Manuj and Mentzer
2008
Market price of
resources changes
Production
Industrial
technological
Oke and Gopalakrishnan 2009
changes
Product design
changes
Events related to
Zsidisin et al. 2000; Chopra and
suppliers,
Partner
Sodhi 2004; Spekman and Davis
customers or
2004
retailers
Strategic
Tactical
Depending on the
Internal
Lambert 2008
process at issue
Operational
Table 2. Complete RBM for the Source process
Risk sources (RBS)
EXS
EXS
EXS.
EXS.
EXS
EXS
EXS
EXS.
EXS.
EXS.
EXS.
EXS.
EXS.
EXS.
EXS.
EXS.
EXS.
EXS
.1
.2
3
4
.5
.6
.7
8
9
10
11
12
13
14
15
16
17
.18
IS.1
P2.1
P2.2
P2.3
P2.4
S2.2
S2.3
S2.4
Activities
ES.2
(ABS)
ES.3
ES.4
ES.5
ES.6
ES.7
ES.8
ES.10
IS.2
IS.3
IS.4
IS.5
IS.6
Table 3. Portion of RBM for the Source process
Source RBM
RBS
Internal
Operational
ABS
IS.5 Machine performance
IS.6 Operator’s operations
during transiting of the
during transiting of the sourced
sourced products
products
SI2.2 % Orders / lines
SI2.2 % Orders / lines received
received damage free
damage free
SI2.4.1 % Product transferred
SI2.4.1 % Product transferred
on-time to demand
on-time to demand requirement
requirement
SI2.4.2 % Product transferred
SI2.4.2 % Product
damage free
S2: Source Make-toOrder Product
S2.2 Receive Product
S2.3 Verify Product
S2.4 Transfer Product
transferred damage free
Table 4. Portion of RBM for the Make process
Make RBM
RBS
Internal
Operational
ABS
IM.6 Production
IM.7 Machine
IM.8 Operator’s
IM.9 Production
scheduling
performance
operations
process
MI2.3.1 Scrap expense
MI2.3.1 Scrap expense
MI2.3.1 Scrap expense
MI2.3.2 Total build
MI2.3.2 Total build
MI2.3.2 Total build
cycle time
cycle time
cycle time
MI2.3.3 Yield
MI2.3.3 Yield
MI2.3.3 Yield
MI2.4 Scrap packaging
MI2.4 Scrap packaging
MI2.4 Scrap packaging
M2: Make-to-Order
M2.2 Issue Product
MI2.2 Inventory
accuracy
M2.3 Produce and Test
M2.4 Package
expense
M2.5 Stage Product
M2.6 Release Finished
Product to Deliver
expense
expense
Table 5. Portion of RBM for the Deliver process
Deliver RBM
RBS
External
Catastrophic
ABS
EXD.1 Nature disasters
EXD.2 Man-made
accidents
D2:Deliver Make-toOrder Product
D2.5 Build Loads
D2.6 Route Shipments
D2.7 Select Carriers
and Rate Shipments
D2.11 Load Product
and Generate Shipping
Docs
D2.12 Ship Product
DI2.12 Delivery
DI2.12 Delivery
performance to customer
performance to customer
commit date
commit date
D2.13 Receive and
DI2.13 Perfect order
DI2.13 Perfect order
Verify Product by
fulfilment
fulfilment
Customer
D2.15 Invoice
Table A.1. ABS for the Source Process
Level 0
Level 1
Level 2
P2 Plan Source
P2.1 Identify, Prioritize, and Aggregate
Product Requirements
P2.2 Identify, Asses, and Aggregate Product
Resources
P2.3 Balance Product Resources with
Product Requirements
P2.4 Establish Sourcing Plans
S2 Source Make-to-
S2.2 Receive Product
Order Product
S2.3 Verify Product
Source Process
S2.4 Transfer Product
ES Enable Source
ES.2 Assess Supplier Performance
ES.3 Maintain Source Data
ES.4 Manage Product Inventory
ES.5 Manage Capital Assets
ES.6 Manage Incoming Product
ES.7 Manage Supplier Network
ES.8 Manage Import/Export Requirements
ES.10 Manage Supplier Agreements
Table A.2. RBS for the Source Process
Level 0
Level 1
Level 2
Level 3
Literature
Source
External
Catastrophic
EXS.1 Nature disasters
EXS.2 Man-made accidents
Economic
EXS.3 Fuel price fluctuation
EXS.4 Exchange rate
fluctuation
EXS.5 Changes in the
economic situation
Social
EXS.6 Labour strikes
EXS.7 Changes in the network
of transportation hubs
EXS.8 IT system functioning
See Table 1
Legal
EXS.9 Changes in
import/export regulations
Source
EXS.10 Tariff changes
process
Industrial
EXS.11
Market price of resources
changes
EXS.12 Production
technological changes
EXS.13 Product design
changes
Partner
EXS.14 Supplier business
Chopra and
Sodhi 2004
EXS.15 Supplier product
Zsidisin et al.
quality
2000
EXS.16 Supplier capacity
Lee et al. 1997
constraints
Internal
Strategic
EXS.17 Supplier behaviour
John 1984
EXS.18 Supplier production
Wagner and
continuity
Bode 2006
IS.1 Attitude about
Yigitbasioglu
information sharing
2004
IS.2 Investment on
information system
Tactical
IS.3 Supplier assessment
Chopra and
criteria
Meindl 2004
IS.4 Inventory policy
Operational
IS.5 Machine performance
during
transiting of the sourced
products
IS.6 Operator’s operations
during transiting of the
sourced products
Table A.3. RBS for the Make process
Level 0
Level 1
Level 2
Level 3
Literature
Source
External
Catastrophic
EXM.1 Nature disasters
See Table 1
EXM.2 Man-made accidents
Social
EXM.3 Labour strikes
EXM.4 IT system functioning
Internal
Legal
EXM.5 Tariff changes
Strategic
IM.1 Capacity management
Spekman and
IM.2 Information system
Davis 2004
Make
IM.3 Attitude about information
process
sharing
Tactical
IM.4 Inventory replenishment model
Martha 2002
IM.5 Internal transportation path
decisions
Operational
IM.6 Production scheduling
Chakraborty
IM.7 Machine performance
et al. 2009
IM.8 Operator’s operations
IM.9 Production process
Table A.4. RBS for the Deliver process
Level 0
Level 1
Level 2
Level 3
Literature
Source
External
Catastrophic
EXD.1 Nature disasters
EXD.2 Man-made accidents
Economic
EXD.3 Fuel price fluctuation
EXD.4 Exchange rate fluctuation
EXD.5 Changes in the economic
situation
Social
EXD.6 Labour strikes
EXD.7 Changes in the network of
See Table 1
transportation hubs
EXD.8 IT system functioning
Legal
EXD.9 Changes in import/export
Deliver
regulations
process
EXD.10 Tariff changes
Partner
EXD.11 Financial health of the
customers
EXD.12 Behaviour of the
intermediaries
Internal
Strategic
Tactical
ID.1 Warehouse network design
ID.2 Information technology
Chopra and
infrastructure
Meindl 2004;
ID.3 Attitude about information
Chopra and
sharing
Sodhi 2004
ID.4 Inventory decisions
ID.5 Transportation strategy
Operational
ID.6 Planning of shipment
transfers between different modes
ID.7 Operator’s operations while
handling finished goods
ID.8 Machine performance during
transiting of the finished goods