Chapter 4 Predicting and Managing Supply Chain Risks
Chapter 4 Predicting and Managing Supply Chain Risks
Chapter 4 Predicting and Managing Supply Chain Risks
Chain Risks
Samir Dani
4.1 Introduction
Since the start of the new century the world at large has experienced escalating
uncertainty as a result of climate changes, epidemics, terrorist threats and an
increasing amount of economic upheaval. These uncertainties create risks for the
proper functioning of supply chains. This chapter provides an insight into deve-
loping a proactive approach to predict risks and manage uncertainties that may
potentially disrupt the supply chain.
The aim of the chapter is to present a holistic perspective regarding supply
chain risk management and incorporate a methodology to manage supply chain
risks proactively. When discussing supply chain risk issues with industry personnel
it was noticed that post 9/11, the issue of supply disruption had gained importance
within the industry. But the focus on managing these disruptions and sources of
these disruptions has been primarily reactive. Supply chain personnel in some
instances have remarked that they have in the past researched and presented to
their top management proactive risk management solutions which had been
subsequently rejected and no investment provided. There is now, however, an
increasing interest regarding proactive tools and hence this chapter seeks to
present a framework for implementing proactive risk management. The chapter
also suggests some tools which may prove useful in predicting supply chain risks.
The chapter begins by defining and discussing the concepts of Uncertainty and
Risk as suggested in the literature. A discussion regarding supply chain risks and
supply chain risk management leads on to the issues of proactive risk manage-
ment. The chapter then suggests the use of predictive methods for data gathering
54 Samir Dani
and analysis to aid the proactive management of supply chain risks. Such an
approach requires that a thorough understanding of the external and internal
sources of supply chain risks is gained and that systems are put in place in order to
counter these risks. A methodology encapsulating the predictive and proactive
approaches is presented, which will also prove useful for initiating further research
and applications regarding proactive supply chain risk management.
In today’s business world a supply chain may be stretched out across the globe in
order to provide the customer with the product at the lowest cost and highest
quality. The supply chains are thus exposed to a whole new set of factors, which
can create chaos and disruption. Local political turmoil, the ever increasing
complexity and uncertainty of weather conditions, terrorism, counterfeiting, and a
plethora of other such issues create external risks in the supply chain. But this
does not mean that the supply chain is devoid of any risks internally. Supplier
issues, strikes, quality problems, and logistics issues are more internal operational
risks, which need a different level of mitigation. Zsidisin (2003) suggested that
risk in a supply chain context can be defined as the potential occurrence of an
incidence associated with inbound supply in which the result is the inability of the
purchasing organization to meet customer demand.
Christopher and Peck (2003), taking inspiration from Mason-Jones and Towill
(1998), have categorised supply chain risk into five categories:
1. Internal to the firm: Process, Control
2. External to the firm but Internal to the Supply network: Demand, Supply
3. External to the network: Environmental
Peck (2005, 2006) suggests that the sources and drivers of supply chain risk
operate at several different levels. These are intricately linked as elements of a
system, and are described within four discrete levels of analysis:
1. Level 1 – value stream/product or process.
2. Level 2 – assets and infrastructure dependencies.
3. Level 3 – organisations and inter-organisational networks.
4. Level 4 – the environment.
Each level reflects quite different perspectives but together these levels cover
elements of a supply chain and the environment within which they are embedded
(Peck 2005). This has also been suggested by Faisal et al. (2006) that risk sources
are the environmental, organizational or supply chain related variables that cannot
be predicted with certainty and that affect the supply chain-outcome variables.
Spekman and Davis (2004) suggested dimensions for understanding supply
chain risks incorporating:
1. Physical movement of goods
2. Flow of information
3. Flow of money
4. Security of the firm’s internal information systems
5. Relationship between supply chain partners
6. Corporate social responsibility and the effect on a firm’s reputation.
These dimensions were also resonated by Cavinato (2004) when identifying
risks and uncertainties in supply chains, focussing on five sub-chains/networks for
every supply chain:
56 Samir Dani
1. Physical network
2. Financial network
3. Informational network
4. Relational network
5. Innovational network
In LaFonde (2007 www.manufacturing.net) one of the respondents has
mentioned that “It really is almost impossible to predict when most emergencies
will happen... Many companies think, ‘It can’t happen here’ or ‘We would never
have that problem in our plant,’ but then when something does occur, they are
caught off-guard and not prepared ”. The concept of “resilience” is related to risk
and vulnerability in a perspective that not all “risks” (hazards or threats) can be
avoided, controlled, or eliminated. Instead, resilience focuses on the ability of the
system to return to its original or desired state after being disturbed, e.g., its ability
to absorb or mitigate the impact of the disturbance (Peck 2006).
tool “Ericsson risk management evaluation tool (ERMET)” and involving its
supply network in the risk management process.
One of the most important enablers for a proactive risk management strategy is
the presence of a culture and attitude that provides resources and motivates
employees to develop risk contingency plans. Smeltzer and Siferd (1998) suggested
that the formation of a risk management culture to encompass proactive risk
management is extremely necessary as:
1. Employees may feel that no steps are taken towards managing risks
identified and reported, but more is done after the impact,
2. Employees feel that top management would look upon them negatively if
they are involved in proactively identifying risks,
3. Depicting risks to shareholders may have an adverse effect on the value of
the firm.
One of the main requirements for an effective proactive risk management process
is to obtain good estimates of the probability of the occurrence of any particular
disruption and accurately measure the potential impact. Good estimates of
probabilities are obtained by risk prediction techniques. Predicting the occurrence
of the risk will vary according to the uncertainty and complexity. It may be
possible to predict an occurrence based on historical data but perhaps not possible
to predict a one-off environmental event. In supply chains, risk prediction and
identification is being helped by early warning systems or satellite tracking
systems, and smart containers, for example. Once a risk or a potential risk has
been identified it is necessary to do a cost-benefit analysis to ascertain the effect of
the risk. This will lead to the selection of the appropriate proactive methods for
mitigating the risk.
There are various tools for risk prediction, ranging from complex mathematical
models to a less complicated Event Tree Analysis. The following section provides
a description of two types of risk prediction tools: “Data Mining” and “Failure
Mode Effect Analysis (FMEA)”
the past capabilities of the system. Data mining is a process that has the ability to
use pertinent data to uncover sources of risk exposure that may otherwise remain
obscure or unnoticed before prior to the risk being realised. Haimowitz and Key
(2002) suggest that a proactive data miner will use their understanding of risk for
enterprise advantage through competitive gain or innovation (product, process or
service).
There are two dimensions of risk: frequency is the rate at which undesirable
events exhibit themselves, while severity is the magnitude of the loss, once
exhibited. According to Haimowitz and Key (2002), data mining generally applies
to risk problems in the high frequency and low severity scenario. Data mining can
help in making more severe risks less frequent and more frequent risks less severe.
The risk or severity is lessened by identifying controllable drivers of severity or
risk frequency.
The role of data mining is to analyse historical data, to improve prediction
capability. Some of the common analytic approaches used by data miners are:
1. Estimation of the parameters of past performance: Means, Standard deviations,
Correlations, and Associations for hypothesis testing
2. Classification: Segmentation, or Clustering of data units to facilitate the
modelling process
3. Construction of a functional relationship: or model between responses and
explanatory variables.
While the strategic goal of the data mining and modelling exercise is to predict
the key phenomenon, the operational goal is to gather and understand the relevant
data with the aim of discovering patterns to provide business intelligence. Berry
and Linoff (1997) have suggested some specific tools used by data miners for
analysis:
(a) Estimation: Tools useful for exploratory data analysis. These tools will
not lead to patterns but are more useful in analysing the data to identify
the most relevant sets of data to concentrate further analysis. These
include the use of statistical tools, Pareto analysis, and graphical analysis.
(b) Clustering/segmentation: This approach is used to logically group
observations on the basis of similarity in their characteristics, reducing
the level of heterogeneity in the data. These are a precursor to the
modelling phase, such as K-means and Distance matrices (Euclidean/
non-Euclidean).
(c) Classification/discrimination: The process of assigning observations to a
predetermined number of classes. This is performed by dividing the
dataset into mutually exclusive groups such that the members of each
group are as “close” as possible to one another, and different groups are
as “far” as possible from one another. The distance between the groups is
measured with respect to specific variable(s) required for prediction such
as chi-squared automatic induction, classification and regression trees
(Breiman et al. 1993), regression analysis, discriminant analysis, and rule
induction.
Chapter 4: Predicting and Managing Supply Chain Risks 61
(d) Prediction: Formal mathematical models are built for the purpose of
predicting the occurrence of the phenomenon. Techniques used for this
purpose are: Linear/nonlinear regression, Classification and Regression
trees (Breiman et al. 1993), Multiple adapted regression splines, artificial
neural nets, genetic algorithms, time – series regression models, and
stochastic models.
Data mining activities are generally divided into two main types: Predictive
data mining and Descriptive data mining. Prediction involves using attributes of
the data to predict unknown future values of the dependent variables. Operational
data in its raw form is of limited business value when it is mainly used for
reporting what has happened. However, if this data is analysed and modelled using
Predictive data mining tools it can transform the data into actionable decisions.
Predictive data mining is a powerful tool for recognizing patterns and proacti-
vely predicting what will happen. Descriptive data mining, however, focuses on
trying to obtain insight into the data by finding patterns before trying to predict.
Both methods use some of the following core data mining tasks: Classification,
Regression, Clustering, Summarization, Dependency, Modelling, Link analysis and
Sequence analysis. To conduct a data mining process effectively it is important to
ascertain:
1. The fit between the data mining technique and the task, and
2. Conditions under which the identified relationships are valid
Proactive Mode: Once the data is analysed in the predictive mode, this data is
fed into the proactive phase of the risk management process to enable the
identification and quantification (effect) of the risk scenarios. As seen in Fig. 4.1,
“strategic objectives” or objectives for the supply chain are at the centre of
the process and form the most important part of the complete risk management
process. This depicts that the strategic objectives will control the risk management
process and will also influence the solutions that will be developed for mitigating
the risk. Referring to Fig. 4.1, the event or the performance of the mitigating
solution has an impact on the strategic objective for further scenarios of risk
management and will also influence the information that the risk management
team has regarding sources of risk. This process is an iterative process as the cycle
will repeat by studying new issues and risks identified after the analysis of the
event. The new data will then be analysed using tools identified in the predictive
mode.
In a proactive mode, there are two options for working with a supply chain:
(i) Designing a new supply chain,
(ii) Updating an existing supply chain
When designing a new supply chain or updating an existing one, the proactive
mode will benefit in managing risks associated with the new situation. The predic-
tive mode will provide sufficient analysis for identifying risks and quantifying
their probability of occurrence and the impact. Also, information regarding the
external and internal sources of risk in the form of security issues related to supply
Predictive mode
Gather and Discover relationship Create
understand Data patterns Intelligence
Risk Identification
Sources of Strategic Objectives and
risk Quantification
External Risk Reduction
and
Internal Risk Level
Management
tools
Fig. 4.1 The “predictive-proactive” supply chain risk management methodology © Samir
Dani, 2007
64 Samir Dani
chain members, risk profiles for countries in which the chain operates, and risk
profiles for individual members in the supply chain will be considered. These sets
of information will then be used to determine the strategic objectives for the chain
and risk reduction and mitigation plans will be put together to meet these
objectives. This, however, does not limit the existence of uncertainty and there
will be cases in which the mitigation plan will not be as efficient as required, or
that a completely different scenario has materialised. Hence, it is necessary to
update the strategic objectives and the data set of risk sources in line with the
unexpected event or performance of the mitigation/risk reduction plan.
4.8 Conclusion
References
Adams, T. J., Austin, S. P., Soprano, R S. and Stiene, L. M. (2002). “Assessing the
transition to production risk”, Program Manager, September, pp. 10–21.
Berry, M. J. A. and Linoff, G. (1997) Data Mining Techniques for Marketing, Sales and
Customer Support, Wiley, New York.
Breiman, L., Friedman, J. H., Olshen, R. A. and C. J. Stone (1984) Classification and
regression trees, Wadsworth Inc., Monterey, CA, USA.
Cavinato, J.L. (2004) “Supply chain logistics risks”, International Journal of Physical
Distribution & Logistics Management, Vol. 34, No. 5, pp. 383–388.
Chapter 4: Predicting and Managing Supply Chain Risks 65
Chapell, A. and Peck, H. (2005) The application of a six sigma methodology to military
supply chain processes, in Operations and Global Competitiveness: Proceedings of the
Euroma Conference, pp. 809–818.
Chiles, T. H. and McMackin, J. F. (1996) “Integrating variable risk preferences, trust, and
transaction cost economics”, Academy of Management Review, Vol. 21, No. 1, pp. 73–99.
Christopher, M. and Peck, H. (2003) “Building the Resilient Chain”, The International
Journal of Logistics Management, Vol. 15, No. 2.
Christopher, M. and Rutherford, C. (2004) Creating Supply Chain Resilience Through
Agile Six Sigma. Critical Eye, Jun–Aug, pp. 24–28.
Christopher, M. and Lee, H. L. (2001) “Supply chain confidence: the key to effective
supply chains through improved visibility and reliability”, Global Trade Management,
November, pp. 1–10.
Deloach, J. W. (2000) Enterprise-Wide Risk Management: Strategies for Linking Risk and
Opportunity, Financial Times Prentice Hall, 284pp.
Eckes, G. (2001) Six Sigma Revolution, Wiley, New York, pp. 29–41.
Faisal, M. N., Banwet, D. K. and Shankar R. (2006) “Supply chain risk mitigation:
modelling the enablers”, Business Process Management Journal, Vol. 12, No. 4, pp.
535–552.
Finch, P. (2004) “Supply chain risk management”, Supply Chain Management: An
International Journal, Vol. 9 No. 2, pp. 183–196.
Gaudenzi, B. and Borghesi, A. (2006) “Managing risks in the supply chain using the AHP
method”, The International Journal of Logistics Management, Vol. 17, No. 1, pp. 114–136.
Haimowitz, I. J. and Keyes, T. K. (2002) “Risk Analysis”, Handbook of Data Mining and
Knowledge Discovery, Klösgen, W. and ĩytkow, J.M. (eds.), Oxford University Press.
Halman, J. M. and Keizer, J. A. (1994) “Diagnosing risks in product-innovation project”,
International Journal of Project Management, Vol. 12, No. 2, pp. 75–81.
Holton, G. A. (2004) “Defining risk”, Financial Analysts Journal, Vol. 60, No. 6, CFA
Institute.
Juttner, U., Peck, H. and Christopher, M. (2003) “Supply chain risk management: outlining
an agenda for future research”, International Journal of Logistics: Research and
Applications, Vol. 6, No. 4, pp. 199–213.
Kleindorfer, P. and Saad, G. (2005) “Managing disruption risks in supply chains”,
Production and Operations Management, Vol. 14, pp. 53–68.
Knight, F. (1965) Risk, Uncertainty and Profit. Harper & Row, New York (first published
1921).
LaFonde, A. (2007) “Coping with Disaster,”Manufacturing.net, Advantage Business
Media, January 30, viewed 14 September 2007, http://www.manufacturing.net/article.
aspx?id=138176&terms=coping%20with%20disaster
Lee, H. and Whang, S. (2003) “Higher supply chain security with lower cost: lessons from
total quality management”, Working paper, Graduate School of Business, Stanford
University.
Lövkvist-Andersen, A., Olsson, R., Ritchey, T. and Maria Stenström, M. (2004)
Developing a Generic Design Basis (GDB) Model for Extraordinary Societal Events
using Computer-Aided Morphological Analysis, presented in SRA (Society for Risk
Analysis) Conference in Paris 15–17 November, available from http://www.swemorph.
com
Malykhina, E. (2005) “The real time imperative”, Information Week, 3 January 2005, pp.
1020, 43.
Mason-Jones, R. and Towill, D. R. (1998) “Shrinking the supply chain uncertainty circle”,
Control, pp. 17–22.
66 Samir Dani
Meulbroek, L. (2002), “The promise and challenge of integrated risk management”, Risk
Management and Insurance Review, Vol. 5, No. 1.
Moore, K. G. (2002) “Six sigma: driving supply at Ford”, Supply Chain Management
Review, July/August, pp. 38–43.
Niemeyer, A., Pak, M. and Ramaswamy, S. (2003) Smart tags for your supply chain.
McKinsey Q., Vol. 4. Available online at: http://premium.mckinseyquarterly.com
Norrman, A. and Jansson, U. (2004) “Ericsson’s proactive supply chain risk management
approach after a serious sub-supplier accident”, International Journal of Physical
Distribution & Logistics Management, Vol. 34, No. 5, pp. 434–456.
O’Rourke, M. (2004) “Protecting your reputation”, Risk Management, April.
Peck, H. (2006) “Reconciling supply chain vulnerability, risk and supply chain
management”, International Journal of Logistics: Research and Applications, Vol. 9,
No. 2, pp. 127–142.
Peck, H. (2005) “Drivers of supply chain vulnerability: an integrated framework”,
International Journal of Physical Distribution and Logistics Management, Vol. 35, pp.
210–232.
Ramgopal, M. (2003) “Project uncertainty management”, Cost Engineering, Vol. 45, No.
12, pp. 21–24.
Rice, J. and Caniato, F. (2003) “Building a secure and resilient supply network”. Supply
Chain Management review, Vol. 7, pp. 22–30.
Rowbottom, U. (2004) “Managing risk in global supply chains”, Supply Chain Practice,
Vol. 6, No. 2, pp. 16–23.
Royal Society (1992) Risk Analysis, Perception and Management, 1992 (Royal Society:
London).
Sheffi, Y. (2001) “Supply chain management under the threat of international terrorism”
International Journal of Logistics Management, Vol. 12, No. 2, pp. 1–11.
Sheffi, Y. (2005) The Resilient Enterprise: Overcoming Vulnerability for Competitive
Advantage, The MIT Press, 2007
Smeltzer, L. R. and Siferd, S.P. (1998) “Proactive supply management: the management of
risk”, International Journal of Purchasing and Materials Management, Vol. 34, No. 1,
pp. 38–45.
Smith, P. G., Merritt G. M. (2002) Proactive Risk Management, Productivity Press, New
York, USA
Spekman, R. E. and Davis, E. W. (2004) “Risky business: expanding the discussion on risk
and the extended enterprise”, International Journal of Physical Distribution & Logistics
Management, Vol. 34, No. 5, pp. 414–433.
Svensson, G. (2002) “A conceptual framework of vulnerability in firms’ inbound and
outbound logistics flows”, International Journal of Physical Distribution & Logistics
Management, Vol. 32, pp. 110–134.
van Hoek, R. (2003) “Are you ready? Risk readiness tactics for the supply chain”, Logistics
Research Network, Institute of Logistics and Transport, London.
Zsidisin, G. (2003) “Managerial perceptions of risk”, Journal of Supply Chain
Management, Vol. 39, pp. 14–25.
Zsidisin, G. A., Ellram, L. M., Carter, J. R. and Cavinato, J. L. (2004) “An Analysis of
Supply Risk Assessment Techniques”, International Journal of Physical Distribution
and Logistics Management, Vol. 34, No. 5, pp. 397–413.
Zsidisin, G. A., Panelli, A. and Upton, R. (2000) “Purchasing organization involvement in
risk assessments, contingency plans, and risk management: an exploratory study”,
Supply Chain Management, Vol. 5, No. 4, p. 187.