Full Terms & Conditions of access and use can be found at
http://www.tandfonline.com/action/journalInformation?journalCode=tprs20
Download by: [Embry-Riddle Aeronautical University] Date: 27 March 2016, At: 12:29
International Journal of Production Research
ISSN: 0020-7543 (Print) 1366-588X (Online) Journal homepage: http://www.tandfonline.com/loi/tprs20
Supply chain risk management: a literature review
William Ho, Tian Zheng, Hakan Yildiz & Srinivas Talluri
To cite this article: William Ho, Tian Zheng, Hakan Yildiz & Srinivas Talluri (2015) Supply chain
risk management: a literature review, International Journal of Production Research, 53:16,
5031-5069, DOI: 10.1080/00207543.2015.1030467
To link to this article: http://dx.doi.org/10.1080/00207543.2015.1030467
Published online: 15 Apr 2015.
Submit your article to this journal
Article views: 2556
View related articles
View Crossmark data
Citing articles: 5 View citing articles
http://www.tandfonline.com/action/journalInformation?journalCode=tprs20
http://www.tandfonline.com/loi/tprs20
http://www.tandfonline.com/action/showCitFormats?doi=10.1080/00207543.2015.1030467
http://dx.doi.org/10.1080/00207543.2015.1030467
http://www.tandfonline.com/action/authorSubmission?journalCode=tprs20&page=instructions
http://www.tandfonline.com/action/authorSubmission?journalCode=tprs20&page=instructions
http://www.tandfonline.com/doi/mlt/10.1080/00207543.2015.1030467
http://www.tandfonline.com/doi/mlt/10.1080/00207543.2015.1030467
http://crossmark.crossref.org/dialog/?doi=10.1080/00207543.2015.1030467&domain=pdf&date_stamp=2015-04-15
http://crossmark.crossref.org/dialog/?doi=10.1080/00207543.2015.1030467&domain=pdf&date_stamp=2015-04-15
http://www.tandfonline.com/doi/citedby/10.1080/00207543.2015.1030467#tabModule
http://www.tandfonline.com/doi/citedby/10.1080/00207543.2015.1030467#tabModule
Supply chain risk management: a literature review
William Hoa, Tian Zhengb, Hakan Yildizc and Srinivas Talluric*
aDepartment of Management and Marketing, The University of Melbourne, Carlton, Australia; b
Solution
Department, China
Merchants Loscam (Shenzhen) Investment Holding Co., Ltd, Shenzhen, China; cDepartment of Supply Chain Management, Eli Broad
Graduate School of Management, Michigan State University, East Lansing, MI, USA
(Received 18 March 2014; accepted 28 February 2015)
Risk management plays a vital role in effectively operating supply chains in the presence of a variety of uncertainties.
Over the years, many researchers have focused on supply chain risk management (SCRM) by contributing in the areas
of defining, operationalising and mitigating risks. In this paper, we review and synthesise the extant literature in SCRM
in the past decade in a comprehensive manner. The purpose of this paper is threefold. First, we present and categorise
SCRM research appearing between 2003 and 2013. Second, we undertake a detailed review associated with research
developments in supply chain risk definit ...
This document discusses how technology is changing work and organizations. It reviews the evolution of technology from the agricultural era to the industrial era to today's digital era. It describes how information and communication technologies have progressed through four stages: enterprise computing, end-user computing, strategic computing, and the emerging stage of ubiquitous computing. Ubiquitous computing aims to directly link the physical world with the digital world, creating an optimized space. The document examines how ubiquitous computing has the potential to disrupt work through its proliferation of computing devices everywhere.
This document summarizes a research study that assessed risk management practices in the logistics and construction industries regarding human safety. The study found that worker training was the most critical factor for improving safety based on a survey of employees. Ensuring safety compliance and adequate communication about safety procedures were also important. The study recommends that companies provide regular safety training and incentives, maintain accident records, and compensate workers for injuries to improve safety culture. Overall, the research indicates a relationship between worker safety initiatives like training and better safety management practices in these high-risk industries.
The document summarizes a review of 42 peer-reviewed studies on the causes of construction injuries. The studies were conducted in various countries between 2006-2019 and used a variety of research designs and analytical methods. The key findings were categorized into four major factors: 1) management commitment factors such as lack of training and safety policies, 2) behavioral factors like negligence and risk-taking, 3) psychological factors including stress and attitudes, and 4) demographic factors such as age, experience, and drug/alcohol use. The review found that management commitment and behavioral factors were the primary causes of construction injuries. It recommends further research to better understand the relationship between empirical findings and accident causation theories to improve safety policies and practices.
Traditionally, the performance of critical infrastructure
(e.g., power grid, telecommunication or water supply
systems) has been analysed by classical risk assessment
methods for their safe and reliable design and operation
(Linkov et al., 2014). This approach allows responding
adequately to known and credible hazards and threats.
However, more recently it has become apparent that
additional efforts and considerations are needed beyond
the well-established state-of-the-art to ensure efficient
recovery from low-probability high-impact disruptive
events (Panteli & Mancarella, 2015). As a consequence,
increased attention is given worldwide to the resilience
of infrastructure systems, which is considered a key
property to adequately deal with disruptions, i.e., natural
and man-made disasters (i.e., technical, human and
organizational factors and intentional attacks) (Jackson,
2015). This view is strongly supported by the notion that
not all hazards and threats can be averted (Cimellaro,
2016), as major disasters repeatedly demonstrated in the
past decades (Garrick, 2008; Zio & Aven, 2013). Wellknown
examples include the September 11 terrorist
attacks in 2001, hurricane Katrina in 2005, the blackouts
in North America (2003) (Andersson et al., 2005), India
(2012) (Tang et al., 2012), and Turkey (2015) (European
2To ADD names From ADD name Date ADD date Subject ADD ti.docxnovabroom
2
To: ADD names From: ADD name Date: ADD date Subject: ADD title
Introduction
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum et nisl ante. Etiam pulvinar fringilla ipsum facilisis efficitur. Maecenas volutpat risus dignissim dui euismod auctor. Nulla facilisi. Mauris euismod tellus malesuada dolor egestas, ac vulputate odio suscipit.
Sed pellentesque sagittis diam, sit amet faucibus diam lobortis quis. Sed mattis turpis ligula, in accumsan ante pellentesque eu. Quisque ut nisl leo. Nullam ipsum odio, eleifend non orcinon, volutpat sollicitudin lacus (Cuddy, 2002). Identify Changes
Donec tincidunt ligula eget sollicitudin vehicula. Proin pharetra tellus id lectus mollis sollicitudin. Etiam auctor ligula a nulla posuere, consequat feugiat ex lobortis. Duis eu cursus arcu, congue luctus turpis. Sed dapibus turpis ac diam viverra consectetur. Aliquam placerat molestie eros vel posuere.
This Photo by Unknown Author is licensed under CC BY-SA
Figure 1. Title (Source: www.source-of-graphic.edu )Product Offerings
Sed facilisis, lacus vel accumsan convallis, massa est ullamcorper mauris, quis feugiat eros ligula eget est. Vivamus nunc turpis, lobortis et magna a, convallis aliquam diam. Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Figure 2. Title (Source of data citation)
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum et nisl ante. Etiam pulvinar fringilla ipsum facilisis efficitur. Maecenas volutpat risus dignissim dui euismod auctor. Nulla facilisi. Mauris euismod tellus malesuada dolor egestas, ac vulputate odio suscipit. Capabilities
Donec tincidunt ligula eget sollicitudin vehicula. Proin pharetra tellus id lectus mollis sollicitudin. Etiam auctor ligula a nulla posuere, consequat feugiat ex lobortis. Duis eu cursus arcu, congue luctus turpis. Sed dapibus turpis ac diam viverra consectetur.
References
Basu, K. K. (2015). The Leader's Role in Managing Change: Five Cases of Technology-Enabled Business Transformation. Global Business & Organizational Excellence, 34(3), 28-42. doi:10.1002/joe.21602.
Connelly, B., Dalton, T., Murphy, D., Rosales, D., Sudlow, D., & Havelka, D. (2016). Too Much of a Good Thing: User Leadership at TPAC. Information Systems Education Journal, 14(2), 34-42.
Rouse, M. (2018). Changed Block Tracking. Retrieved from Techtarget Network: https://searchvmware.techtarget.com/definition/Changed-Block-Tracking-CBT
Change the Chart Title to Fit Your Needs
Series 1 Category 1 Category 2 Category 3 Category 4 4.3 2.5 3.5 4.5 Series 2 Category 1 Category 2 Category 3 Category 4 2.4 4.4000000000000004 1.8 2.8 Series 3 Category 1 Category 2 Category 3 Category 4 2 2 3 5
Assessing Similarities and Differences in Self-Control
between Police Officers and Offenders
Ryan C. Meldrum1 & Christopher M. Donner2 & Shawna Cleary3 &
Andy Hochstetler4 & Matt DeLisi4
Received: 2 August 2019 /Accepted: 21 October 2019 /
Published online: 2 December 2019
# Southern Criminal.
2To ADD names From ADD name Date ADD date Subject ADD ti.docxjesusamckone
2
To: ADD names From: ADD name Date: ADD date Subject: ADD title
Introduction
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum et nisl ante. Etiam pulvinar fringilla ipsum facilisis efficitur. Maecenas volutpat risus dignissim dui euismod auctor. Nulla facilisi. Mauris euismod tellus malesuada dolor egestas, ac vulputate odio suscipit.
Sed pellentesque sagittis diam, sit amet faucibus diam lobortis quis. Sed mattis turpis ligula, in accumsan ante pellentesque eu. Quisque ut nisl leo. Nullam ipsum odio, eleifend non orcinon, volutpat sollicitudin lacus (Cuddy, 2002). Identify Changes
Donec tincidunt ligula eget sollicitudin vehicula. Proin pharetra tellus id lectus mollis sollicitudin. Etiam auctor ligula a nulla posuere, consequat feugiat ex lobortis. Duis eu cursus arcu, congue luctus turpis. Sed dapibus turpis ac diam viverra consectetur. Aliquam placerat molestie eros vel posuere.
This Photo by Unknown Author is licensed under CC BY-SA
Figure 1. Title (Source: www.source-of-graphic.edu )Product Offerings
Sed facilisis, lacus vel accumsan convallis, massa est ullamcorper mauris, quis feugiat eros ligula eget est. Vivamus nunc turpis, lobortis et magna a, convallis aliquam diam. Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Figure 2. Title (Source of data citation)
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum et nisl ante. Etiam pulvinar fringilla ipsum facilisis efficitur. Maecenas volutpat risus dignissim dui euismod auctor. Nulla facilisi. Mauris euismod tellus malesuada dolor egestas, ac vulputate odio suscipit. Capabilities
Donec tincidunt ligula eget sollicitudin vehicula. Proin pharetra tellus id lectus mollis sollicitudin. Etiam auctor ligula a nulla posuere, consequat feugiat ex lobortis. Duis eu cursus arcu, congue luctus turpis. Sed dapibus turpis ac diam viverra consectetur.
References
Basu, K. K. (2015). The Leader's Role in Managing Change: Five Cases of Technology-Enabled Business Transformation. Global Business & Organizational Excellence, 34(3), 28-42. doi:10.1002/joe.21602.
Connelly, B., Dalton, T., Murphy, D., Rosales, D., Sudlow, D., & Havelka, D. (2016). Too Much of a Good Thing: User Leadership at TPAC. Information Systems Education Journal, 14(2), 34-42.
Rouse, M. (2018). Changed Block Tracking. Retrieved from Techtarget Network: https://searchvmware.techtarget.com/definition/Changed-Block-Tracking-CBT
Change the Chart Title to Fit Your Needs
Series 1 Category 1 Category 2 Category 3 Category 4 4.3 2.5 3.5 4.5 Series 2 Category 1 Category 2 Category 3 Category 4 2.4 4.4000000000000004 1.8 2.8 Series 3 Category 1 Category 2 Category 3 Category 4 2 2 3 5
Assessing Similarities and Differences in Self-Control
between Police Officers and Offenders
Ryan C. Meldrum1 & Christopher M. Donner2 & Shawna Cleary3 &
Andy Hochstetler4 & Matt DeLisi4
Received: 2 August 2019 /Accepted: 21 October 2019 /
Published online: 2 December 2019
# Southern Criminal.
This document describes a study that aims to model the risks in a food supply chain. The researchers identify risks through a literature review and industry expert consultation. They cluster risks into categories and develop a model of risk interactions using Interpretive Structural Modeling. The model is validated through a case study of a food manufacturing firm. The goal is to help managers understand high-impact risks and their relationships to facilitate risk mitigation.
This study systematically reviewed 56 papers published between 1995 and 2013 to identify critical failure factors of Lean Six Sigma (LSS). The review found 34 common failure factors cited in the literature, including a lack of top management commitment and involvement, lack of communication, lack of training and education, and limited resources. Many gaps and limitations in the current research on LSS failures were also identified. This is one of the first systematic reviews to explore and discuss critical LSS failure factors from different perspectives such as countries' evolution with LSS, organizations' size, and industry type. The review provides valuable insights into areas that must be addressed to avoid LSS implementation failures.
This document discusses how technology is changing work and organizations. It reviews the evolution of technology from the agricultural era to the industrial era to today's digital era. It describes how information and communication technologies have progressed through four stages: enterprise computing, end-user computing, strategic computing, and the emerging stage of ubiquitous computing. Ubiquitous computing aims to directly link the physical world with the digital world, creating an optimized space. The document examines how ubiquitous computing has the potential to disrupt work through its proliferation of computing devices everywhere.
This document summarizes a research study that assessed risk management practices in the logistics and construction industries regarding human safety. The study found that worker training was the most critical factor for improving safety based on a survey of employees. Ensuring safety compliance and adequate communication about safety procedures were also important. The study recommends that companies provide regular safety training and incentives, maintain accident records, and compensate workers for injuries to improve safety culture. Overall, the research indicates a relationship between worker safety initiatives like training and better safety management practices in these high-risk industries.
The document summarizes a review of 42 peer-reviewed studies on the causes of construction injuries. The studies were conducted in various countries between 2006-2019 and used a variety of research designs and analytical methods. The key findings were categorized into four major factors: 1) management commitment factors such as lack of training and safety policies, 2) behavioral factors like negligence and risk-taking, 3) psychological factors including stress and attitudes, and 4) demographic factors such as age, experience, and drug/alcohol use. The review found that management commitment and behavioral factors were the primary causes of construction injuries. It recommends further research to better understand the relationship between empirical findings and accident causation theories to improve safety policies and practices.
Traditionally, the performance of critical infrastructure
(e.g., power grid, telecommunication or water supply
systems) has been analysed by classical risk assessment
methods for their safe and reliable design and operation
(Linkov et al., 2014). This approach allows responding
adequately to known and credible hazards and threats.
However, more recently it has become apparent that
additional efforts and considerations are needed beyond
the well-established state-of-the-art to ensure efficient
recovery from low-probability high-impact disruptive
events (Panteli & Mancarella, 2015). As a consequence,
increased attention is given worldwide to the resilience
of infrastructure systems, which is considered a key
property to adequately deal with disruptions, i.e., natural
and man-made disasters (i.e., technical, human and
organizational factors and intentional attacks) (Jackson,
2015). This view is strongly supported by the notion that
not all hazards and threats can be averted (Cimellaro,
2016), as major disasters repeatedly demonstrated in the
past decades (Garrick, 2008; Zio & Aven, 2013). Wellknown
examples include the September 11 terrorist
attacks in 2001, hurricane Katrina in 2005, the blackouts
in North America (2003) (Andersson et al., 2005), India
(2012) (Tang et al., 2012), and Turkey (2015) (European
2To ADD names From ADD name Date ADD date Subject ADD ti.docxnovabroom
2
To: ADD names From: ADD name Date: ADD date Subject: ADD title
Introduction
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum et nisl ante. Etiam pulvinar fringilla ipsum facilisis efficitur. Maecenas volutpat risus dignissim dui euismod auctor. Nulla facilisi. Mauris euismod tellus malesuada dolor egestas, ac vulputate odio suscipit.
Sed pellentesque sagittis diam, sit amet faucibus diam lobortis quis. Sed mattis turpis ligula, in accumsan ante pellentesque eu. Quisque ut nisl leo. Nullam ipsum odio, eleifend non orcinon, volutpat sollicitudin lacus (Cuddy, 2002). Identify Changes
Donec tincidunt ligula eget sollicitudin vehicula. Proin pharetra tellus id lectus mollis sollicitudin. Etiam auctor ligula a nulla posuere, consequat feugiat ex lobortis. Duis eu cursus arcu, congue luctus turpis. Sed dapibus turpis ac diam viverra consectetur. Aliquam placerat molestie eros vel posuere.
This Photo by Unknown Author is licensed under CC BY-SA
Figure 1. Title (Source: www.source-of-graphic.edu )Product Offerings
Sed facilisis, lacus vel accumsan convallis, massa est ullamcorper mauris, quis feugiat eros ligula eget est. Vivamus nunc turpis, lobortis et magna a, convallis aliquam diam. Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Figure 2. Title (Source of data citation)
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum et nisl ante. Etiam pulvinar fringilla ipsum facilisis efficitur. Maecenas volutpat risus dignissim dui euismod auctor. Nulla facilisi. Mauris euismod tellus malesuada dolor egestas, ac vulputate odio suscipit. Capabilities
Donec tincidunt ligula eget sollicitudin vehicula. Proin pharetra tellus id lectus mollis sollicitudin. Etiam auctor ligula a nulla posuere, consequat feugiat ex lobortis. Duis eu cursus arcu, congue luctus turpis. Sed dapibus turpis ac diam viverra consectetur.
References
Basu, K. K. (2015). The Leader's Role in Managing Change: Five Cases of Technology-Enabled Business Transformation. Global Business & Organizational Excellence, 34(3), 28-42. doi:10.1002/joe.21602.
Connelly, B., Dalton, T., Murphy, D., Rosales, D., Sudlow, D., & Havelka, D. (2016). Too Much of a Good Thing: User Leadership at TPAC. Information Systems Education Journal, 14(2), 34-42.
Rouse, M. (2018). Changed Block Tracking. Retrieved from Techtarget Network: https://searchvmware.techtarget.com/definition/Changed-Block-Tracking-CBT
Change the Chart Title to Fit Your Needs
Series 1 Category 1 Category 2 Category 3 Category 4 4.3 2.5 3.5 4.5 Series 2 Category 1 Category 2 Category 3 Category 4 2.4 4.4000000000000004 1.8 2.8 Series 3 Category 1 Category 2 Category 3 Category 4 2 2 3 5
Assessing Similarities and Differences in Self-Control
between Police Officers and Offenders
Ryan C. Meldrum1 & Christopher M. Donner2 & Shawna Cleary3 &
Andy Hochstetler4 & Matt DeLisi4
Received: 2 August 2019 /Accepted: 21 October 2019 /
Published online: 2 December 2019
# Southern Criminal.
2To ADD names From ADD name Date ADD date Subject ADD ti.docxjesusamckone
2
To: ADD names From: ADD name Date: ADD date Subject: ADD title
Introduction
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum et nisl ante. Etiam pulvinar fringilla ipsum facilisis efficitur. Maecenas volutpat risus dignissim dui euismod auctor. Nulla facilisi. Mauris euismod tellus malesuada dolor egestas, ac vulputate odio suscipit.
Sed pellentesque sagittis diam, sit amet faucibus diam lobortis quis. Sed mattis turpis ligula, in accumsan ante pellentesque eu. Quisque ut nisl leo. Nullam ipsum odio, eleifend non orcinon, volutpat sollicitudin lacus (Cuddy, 2002). Identify Changes
Donec tincidunt ligula eget sollicitudin vehicula. Proin pharetra tellus id lectus mollis sollicitudin. Etiam auctor ligula a nulla posuere, consequat feugiat ex lobortis. Duis eu cursus arcu, congue luctus turpis. Sed dapibus turpis ac diam viverra consectetur. Aliquam placerat molestie eros vel posuere.
This Photo by Unknown Author is licensed under CC BY-SA
Figure 1. Title (Source: www.source-of-graphic.edu )Product Offerings
Sed facilisis, lacus vel accumsan convallis, massa est ullamcorper mauris, quis feugiat eros ligula eget est. Vivamus nunc turpis, lobortis et magna a, convallis aliquam diam. Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Figure 2. Title (Source of data citation)
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum et nisl ante. Etiam pulvinar fringilla ipsum facilisis efficitur. Maecenas volutpat risus dignissim dui euismod auctor. Nulla facilisi. Mauris euismod tellus malesuada dolor egestas, ac vulputate odio suscipit. Capabilities
Donec tincidunt ligula eget sollicitudin vehicula. Proin pharetra tellus id lectus mollis sollicitudin. Etiam auctor ligula a nulla posuere, consequat feugiat ex lobortis. Duis eu cursus arcu, congue luctus turpis. Sed dapibus turpis ac diam viverra consectetur.
References
Basu, K. K. (2015). The Leader's Role in Managing Change: Five Cases of Technology-Enabled Business Transformation. Global Business & Organizational Excellence, 34(3), 28-42. doi:10.1002/joe.21602.
Connelly, B., Dalton, T., Murphy, D., Rosales, D., Sudlow, D., & Havelka, D. (2016). Too Much of a Good Thing: User Leadership at TPAC. Information Systems Education Journal, 14(2), 34-42.
Rouse, M. (2018). Changed Block Tracking. Retrieved from Techtarget Network: https://searchvmware.techtarget.com/definition/Changed-Block-Tracking-CBT
Change the Chart Title to Fit Your Needs
Series 1 Category 1 Category 2 Category 3 Category 4 4.3 2.5 3.5 4.5 Series 2 Category 1 Category 2 Category 3 Category 4 2.4 4.4000000000000004 1.8 2.8 Series 3 Category 1 Category 2 Category 3 Category 4 2 2 3 5
Assessing Similarities and Differences in Self-Control
between Police Officers and Offenders
Ryan C. Meldrum1 & Christopher M. Donner2 & Shawna Cleary3 &
Andy Hochstetler4 & Matt DeLisi4
Received: 2 August 2019 /Accepted: 21 October 2019 /
Published online: 2 December 2019
# Southern Criminal.
This document describes a study that aims to model the risks in a food supply chain. The researchers identify risks through a literature review and industry expert consultation. They cluster risks into categories and develop a model of risk interactions using Interpretive Structural Modeling. The model is validated through a case study of a food manufacturing firm. The goal is to help managers understand high-impact risks and their relationships to facilitate risk mitigation.
This study systematically reviewed 56 papers published between 1995 and 2013 to identify critical failure factors of Lean Six Sigma (LSS). The review found 34 common failure factors cited in the literature, including a lack of top management commitment and involvement, lack of communication, lack of training and education, and limited resources. Many gaps and limitations in the current research on LSS failures were also identified. This is one of the first systematic reviews to explore and discuss critical LSS failure factors from different perspectives such as countries' evolution with LSS, organizations' size, and industry type. The review provides valuable insights into areas that must be addressed to avoid LSS implementation failures.
The document discusses a study on corporate social responsibility (CSR) in the UK nanotechnology industry. It conducted an online survey of 78 nanotechnology companies on their CSR reporting and conducted 15 interviews with company representatives on their attitudes towards CSR. The study found that the general level of CSR reporting among nanotechnology companies is low, though companies demonstrated awareness of minimizing risks ("do no harm" model of CSR). For CSR to help build adaptive governance of nanotechnology, the study argues serious shortcomings need addressing to move companies closer to seeing CSR as creating positive social value. The conceptual framework examined continuous improvement in CSR and different "modes" of CSR (minimizing risks versus creating social value).
For this assignment, review the article abomhara, m., & koien,modi11
The authors investigated cyber security threats and vulnerabilities related to the Internet of Things. They aimed to classify threat types and analyze the characteristics of potential attackers or intruders. The paper reviewed key concepts in IoT like devices and services. It identified common security issues around data confidentiality, privacy, and trust. The authors concluded that understanding threats is important for developing robust security requirements to protect IoT infrastructure and ensure its safe development. However, more research is still needed to address open challenges from resource-constrained devices and evolving attack techniques.
IJPR (2014) Testing a Theoretical Model Underlying the ‘Toyota Way'Nicky Campbell-Allen
This article empirically tests a theoretical model of the "Toyota Way" based on survey data from Toyota's logistics, sales, and marketing functions across 27 countries. Using statistical analysis, the researchers found that the Toyota Way measures of "challenge, kaizen, genchi genbutsu, respect, and teamwork" define the two constructs of "process improvement" and "people development" underlying the Toyota Way. Process improvement was found to directly impact how the Toyota Way is implemented in business units, while people development was found to indirectly impact implementation through process improvement. The study provides quantitative evidence that both "hard" process improvements and "soft" people development aspects are important for fully implementing the Toyota Way and related Lean systems
University of PlymouthPEARL httpspearl.plymouth.ac.uk.docxouldparis
University of Plymouth
PEARL https://pearl.plymouth.ac.uk
Faculty of Arts and Humanities Plymouth Business School
2016-04
The impact of big data on world-class
sustainable manufacturing
Dubey, R
http://hdl.handle.net/10026.1/5175
10.1007/s00170-015-7674-1
The International Journal of Advanced Manufacturing Technology
All content in PEARL is protected by copyright law. Author manuscripts are made available in accordance with
publisher policies. Please cite only the published version using the details provided on the item record or
document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content
should be sought from the publisher or author.
1
The impact of Big Data on World Class Sustainable Manufacturing
Abstract
Big data (BD) has attracted increasing attention from both academics and
practitioners. This paper aims at illustrating the role of Big Data analytics in
supporting world-class sustainable manufacturing (WCSM). Using an extensive
literature review to identify different factors that enable the achievement of
WCSM through BD and 405 usable responses from senior managers gathered
through social networking sites (SNS), we propose a conceptual framework that
summarizes this role, test this framework using data which is heterogeneous,
diverse, voluminous, and possess high velocity, and highlight the importance
for academia and practice. Finally we conclude our research findings and
further outlined future research directions.
Key words: Big Data, World Class Sustainable Manufacturing, Social
Networking Site, Confirmatory factor Analysis, Sustainable Manufacturing.
1. Introduction
In recent years Big Data Analytics (BDA) has been an important subject of
debate among academics and practitioners. McKinsey Global Institute has
predicted that by 2018 the BDA needs for the United States alone will be more
than 1.5 million managers who need to possess skills in analyzing Big Data for
effective decision making. In developing countries, in the recent 13th
Confederation of Indian Industries manufacturing summit, BDA was at the
forefront of discussions among manufacturing professionals in India. The
Internet of things (IOT) and big data & predictive analytics are now within the
reach of the operations management community to begin to explore, with the
potential for measurable and meaningful impacts on the life of people in the
2
developing world (Accenture, 2013). On the other hand, thinkers such as
Professor Nassim Nicholas Taleb, in his interview in the Economic Times
highlighted the impacts of BD, but was skeptical about its success.
The literature on the role of BDA in Operations and Supply Chain Management
(OM/SCM) (for example Wamba et al., 2015) has argued for benefits from its
use, including, inter alia, 15-20% increase in ROI (Perrey et al., 2013),
productivity and competitiveness for companies and public se ...
Accident Analysis Models And Methods Guidance For Safety ProfessionalsLeslie Schulte
This document provides an overview of accident analysis models and methods. It discusses three categories of analysis techniques: sequential, epidemiological, and systemic. Sequential techniques view accidents as resulting from time-ordered causal events, but cannot adequately account for organizational and human factors. Epidemiological techniques were developed to consider organizational influences, and view accidents as stemming from latent failures within a system. More recently, systemic techniques have emerged that treat socio-technical systems holistically and focus on the interactions between system components. The document aims to inform readers on different analysis approaches and factors that influence model selection.
Publishing scientific research in journalsPeter Trkman
This document provides guidance on how to get rejected in good journals. It begins by discussing why the author is qualified to provide this advice, as they have been one of the most rejected authors and serve as a reviewer rejecting around 70-80% of submissions. The document then provides examples of real reviews and criticisms of the author's own published work. It discusses common weaknesses seen in submissions like lack of theoretical contribution, novelty, and careless writing. The author aims to help others learn from their mistakes by sharing their extensive experience as both an author and reviewer.
Approaches For Resilience And Antifragility In Collaborative Business EcosystemsTony Lisko
This document summarizes the findings of a literature review on approaches for resilience and antifragility in collaborative business ecosystems. It identifies strategies and capabilities for coping with disruptions at different phases. Contemporary business ecosystems face increasing disruptive events that challenge stability. While some organizations collapse, others overcome stresses better. The review aims to understand current approaches through a systematic analysis of literature from multiple knowledge areas. It identifies taxonomy of resilience and antifragility strategies linked to disruption phases, along with relevant capabilities. Examples of engineered systems applying promising approaches are also presented.
PAPERS20 April 2013 ■ Project Management Jou.docxdanhaley45372
P
A
P
E
R
S
20 April 2013 ■ Project Management Journal ■ DOI: 10.1002/pmj
INTRODUCTION ■
U
ncertainty is both a reality and great challenge for most projects
(Chapman & Ward, 2003; Hillson, 2010). The presence of risk creates
surprises throughout the project life cycle, affecting everything
from technical feasibility to cost, market timing, financial perform-
ance, and strategic objectives (Hillson, 1999; Loch, Solt, & Bailey, 2008;
Thieme, Song, & Shin, 2003). Yet, to succeed in today’s ultracompetitive envi-
ronment, management must deal with these risks effectively despite these
difficulties (Buchanan & O’Connell, 2006; Patil, Grantham, & Steele, 2012;
Shenhar, 2001; Shenhar, Milosevic, Dvir, & Thamhain, 2007; Srivannaboon &
Milosevic, 2006). This concerns executives, and it is not surprising that lead-
ers in virtually all organizations, from commerce to government, spend
much of their time and effort dealing with risk-related issues. Examples trace
back to ancient times that include huge infrastructure projects and military
campaigns. Writings by Sun Tzu articulated specific risks and suggested
mitigation methods 2,500 years ago (Hanzhang & Wilkinson, 1998). Risk
management is not a new idea. However, in today’s globally connected, fast-
changing business world with broad access to resources anywhere, and pres-
sures for quicker, cheaper, and smarter solutions, projects have become
highly complex and intricate. Many companies try to leverage their
resources and accelerate their schedules by forming alliances, consortia, and
partnerships with other firms, universities, and government agencies that
range from simple cooperative agreements to “open innovation,” a concept
of scouting for new product and service ideas anywhere in the world. In such
an increasingly complex and dynamic business environment, risks lurk in
many areas, not only associated with the technical part of the work, but also
including social, cultural, organizational, and technological dimensions. In
fact, research studies have suggested that much of the root cause of project-
related risks can be traced to the organizational dynamics and multidiscipli-
nary nature that characterizes today’s business environment, especially for
technology-based developments (R. Cooper, Edgett, & Kleinschmidt, 2001;
Torok, Nordman, & Lin, 2011). The involvement of many people, processes,
and technologies spanning different organizations, support groups, subcon-
tractors, vendors, government agencies, and customer communities com-
pounds the level of uncertainty and distributes risk over a wide area of the
enterprise and its partners (Thamhain, 2004; Thamhain & Wilemon, 1999),
often creating surprises with potentially devastating consequences. This
paradigm shift leads to changing criteria for risk management. To be effec-
tive in dealing with the broad spectrum of risk factors, project leaders must
go beyond the mechanics of analyzing the work a.
A Comprehensive Literature Review On Construction Project Risk AnalysisJim Webb
This document summarizes a literature review on risk analysis techniques for construction projects over the past 20 years. The review identified 93 relevant papers. The dominant risk assessment tools used were found to be statistical analysis and fuzzy expert systems. Construction projects face risks from factors like size, organizational complexity, and location that can lead to cost overruns and delays. Earlier studies from 1995-2005 mainly used expert opinions and statistical analysis for risk assessment. Later studies from 2005-2015 saw an increased use of advanced computational techniques like artificial neural networks and genetic algorithms. The literature review identifies gaps in existing risk analysis methods and opportunities for future research.
Understanding outsourcing contexts through information asymmetry and capabili...Ian McCarthy
Outsourcing is a strategic activity that has long been central to operations management research and practice. Yet, there are still many outsourcing management challenges that remain. In this article, we explore two of the outsourcing challenges that motivated this special issue and are central to the 10 articles included. To do this, we develop a theoretical model that examines how variations in capability fit and information asymmetry combine to present firms with four different outsourcing contexts. We then explain how each of the articles included in this special issue relate to our theoretical model and explore several avenues for future research.
Implementation of construction safety in reinforced concrete constructions ex...eSAT Journals
Abstract In order to achieve the purpose of this research, a special questionnaire were designed to fulfill the task of this research, exemplified the subject of safety where what is supposed to be present in the workplace and means of prevention that contribute to raising the safety and industrial security degree rate to the highest level, based on the regulations and safety standards followed in Saudi Arabia, compared to what is the case they have both in field sites or within constructions, the questionnaire has been distributed in some construction projects distributed in different places located in Kingdom of Saudi Arabia, and has been narrowed in the building and construction sector category, then study what came in its provisions, for the purpose of the process of analyzing, and to study the causes of accidents, in order to achieve the aim of this research. Keywords – Safety, Constructions and Safety, Minimizing Accident, Construction Management
This document discusses the health effects of hydraulic fracturing on employees, surrounding communities, and the environment. It examines relevant literature from the disciplines of human resource development and organizational leadership to understand how fracturing has impacted worker health and safety, and what industry leaders are doing to address issues. Studies have found harmful exposure to crystalline silica dust for certain job roles, increasing risks of lung diseases. Air emissions from sites also pose health risks to nearby residents. The document concludes that while fracturing provides benefits, more must be done to protect workers, communities, and the environment from its negative impacts.
IRJET- Deterrence Theory for Evaluating Information Security Factors in E-Hea...IRJET Journal
This document analyzes factors affecting the adoption of electronic health (e-health) systems using deterrence theory. It introduces e-health systems and proposes a theoretical model to test the impact of organizational factors like deterrent efforts, severity of consequences, and preventive efforts as well as individual factors like perceived security threats and awareness on intentions to proactively use e-health. An empirical study found that deterrent efforts and severity had no significant influence while preventive efforts were important. The document thus suggests organizations focus on preventive efforts like security solutions and awareness while reducing perceived threats.
Global supply chain riskmanagement strategiesIla Manuj.docxwhittemorelucilla
Global supply chain risk
management strategies
Ila Manuj
Department of Marketing and Logistics, University of North Texas, Denton,
Texas, USA, and
John T. Mentzer
The University of Tennessee, Knoxville, Tennessee, USA
Abstract
Purpose – Global supply chains are more risky than domestic supply chains due to numerous links
interconnecting a wide network of firms. These links are prone to disruptions, bankruptcies,
breakdowns, macroeconomic and political changes, and disasters leading to higher risks and making
risk management difficult. The purpose of this paper is to explore the phenomenon of risk
management and risk management strategies in global supply chains.
Design/methodology/approach – This paper is based on an extensive literature review and a
qualitative study comprising 14 in-depth interviews and a focus group meeting with senior supply
chain executives.
Findings – The study provides insights into the applicability of six risk management strategies with
respect to environmental conditions and the role of three moderators.
Research limitations/implications – The model is developed in a global manufacturing supply
chain context. It should be tested in other contexts and with other methods to provide generalizability.
The study takes a much needed step toward building a theory of risk management in global supply
chains, which opens important future research directions.
Practical implications – This research provides direction to managers for choosing risk
management strategies based on the global supply chain environment. Moderators have practical
implications for global supply chain managers.
Originality/value – The paper addresses an identified gap in the literature for selecting risk
management strategies in global supply chains. It employs grounded theory, a methodology
appropriate for theory-building, to explore a phenomenon with an inadequate theoretical base.
Keywords Risk management, Supply chain management, International business
Paper type Research paper
Introduction
Global supply chains are a source of competitive advantage. Global configurations of
firms provide access to cheap labor and raw materials, better financing opportunities,
larger product markets, arbitrage opportunities, and additional inducements offered by
host governments to attract foreign capital (AlHashim, 1980; Kogut and Kulatilaka,
1994). However, coupled with these benefits that entice firms to go global are the
uncertainties and consequent risks that managers face in global supply chains. As
Barry (2004) argues, “An enterprise may have lowest over-all costs in a stable world
environment, but may also have the highest level of risk – if any one of the multiple
gating factors kink up an elongated global supply chain!”
There is wide acknowledgement in the literature of the risks and uncertainties in
global supply chains. Although risk management in multinational enterprises has been
The current issue and full text archive of this journal is a ...
Four-pagePaper on Historical FigureEvent in Public Relations .docxshericehewat
Four-page
Paper on Historical Figure/Event in Public Relations History
After watching "A Walk Through the 20th Century: The Image Makers"
Link: https://www.youtube.com/watch?v=XzQyoEphlXY video and reading Chapter 4 "Historical Origins and Evolution" “Effective Public Relations,” 11th edition, Glen M. Broom and Bey-Ling Sha please find an interesting public relations historic person, or event that has had a significant impact on the PR profession and write a detailed, four-page double-spaced paper about that person or event. Be sure to provide examples of the specific impacts this person has had on the PR industry and how they helped to influence the profession such as: started the first international PR agency, paved the way for women in the public relations field, promoted some of the biggest consumer brands in history such as Coca-Cola, etc.
Format your paper in AP, APA, or MLA format. Please include a separate Works Cited (References) page and include 3-5 professional sources. Citations should also be cited in the body of your paper. Professional sources for this assignment may include relevant industry trade publications such as PRWeek, The Hollywood Reporter, Variety, etc., as well as news publications such as The New York Times, CNN, The Washington Post, etc., in addition to scholarly journals. Wikipedia may be consulted, but it is not considered a professional source and should not be counted toward your 3-5 professional sources.
Please pay attention to spelling, grammar, and punctuation and have your paper proofread before submitting it. Points will be deducted for unprofessional work/typos.
Please address the following in your paper and section your paper with the following section headers:
1) Overview on this historical figure and/or event (who are they, who did they work for, what projects did they work on, what did they do?)
2) Why this person and/or event is interesting to you
3) What significance/impact does this person/event have on the field of public relations? (Why should we care about this person and/or event?)
Excellent Ratings:Met all criteria and exhibited comprehensive & thoughtful analysis.
For full points: Evaluation/Grading:
(Followed instructions, comprehensive and thoughtful analysis of the topic, no spelling, or grammatical errors).
JISTEM - Journal of Information Systems and Technology Management
Vol. 14, No. 1, Jan/Apr., 2017 pp. 21-38
ISSN online: 1807-1775
DOI: 10.4301/S1807-17752017000100002
JISTEM, Brazil Vol. 14, No. 1, Jan/Apr., 2017 pp. 21-38 www.jistem.fea.usp.br
THE LITERATURE REVIEW OF TECHNOLOGY ADOPTION MODELS
AND THEORIES FOR THE NOVELTY TECHNOLOGY
PC Lai
Help University, Malaysia
ABSTRACT
This paper contributes to the existing literature by comprehensively reviewing the concepts,
applications and development of technology adoption models and theories based on the literature
review with the focus on potential application for the nove ...
This document provides a literature review on global occupational safety and health practices and the severity of accidents. It discusses the following key points in 3 sentences:
The literature review identifies existing gaps in previous workplace safety and health management research and proposes areas for future study. Many studies have found that risks to occupational safety and health are increasing globally due to industrialization, but developing countries often overlook workplace safety in their economic policies. The review finds gaps in developing multilevel safety models, knowledge transfer mechanisms, and approaches that consider multiple health factors, and suggests these areas need further research to improve workplace safety and health management.
A LITERATURE REVIEW ON GLOBAL OCCUPATIONAL SAFETY AND HEALTH PRACTICE ACCID...Justin Knight
This document provides a literature review on global occupational safety and health practices and the severity of accidents. It discusses the following key points in 3 sentences:
The literature review identifies existing gaps in previous workplace safety and health management research and proposes areas for future study. Many studies have found that risks to occupational safety and health are increasing globally due to industrialization, but developing countries often overlook workplace safety in their economic policies. The review finds gaps in developing multilevel safety models, knowledge transfer mechanisms, and approaches that consider multiple health factors, and suggests these areas need further research to improve workplace safety and health management.
THE FRAMEWORK OF ARTIFICIAL INTELLIGENCE (FAI): DRIVING TRIGGERS, STATE OF TH...ijaia
The authors present a new Framework of Artificial Intelligence which analyzes the key elements of
transformational AI in industry. The State of the Art of Artificial Intelligence is gleaned from an
examination of what has been done in the past, presently in the last decade and what is predicted for future
decades. The paper will highlight the biggest changes in AI, important influencers to adoption/diffusion
and give examples of how these technologies have and will be applied in three key industrial sectors,
including agriculture, education and healthcare. Next the research examines seven driving triggers of cost,
speed, accuracy, diversity/inclusion, interdisciplinary research/collaboration and ethics/trustworthiness
that are accelerating AI development and concludes with a discussion of what are the critical success
factors for industry to be transformational in AI.
This document discusses the role of information technology and customer relationship management in supply chains. It begins with definitions of supply chain management, customer relationship management, and information technology. It then reviews related literature that has examined how information technology impacts supply chain capabilities and performance. The document outlines how customer relationship management plays a key role in satisfying customer demands, which is the main goal of supply chain activities. Finally, it describes how information technology supports cooperation and decision-making across the supply chain to help integrate organizations and meet customer needs more efficiently.
Rush University Medical Center historically did not engage in strategic planning or marketing, relying on its long history, which led it to fall from the top ranked medical center in consumer surveys. In response, the medical center recognized the need for strategic planning, marketing, and assessments to develop new business ideas and financial models to gain approval from administrators and the board for changes to the organization's approach. Comprehensive environmental scanning would help inform the strategic planning process to improve Rush's position in the competitive healthcare marketplace.
Explain how firms can benefit from forecastingexchange rates .docxhanneloremccaffery
Explain how firms can benefit from forecasting
exchange rates
Describe the common techniques used for
forecasting
Explain how forecasting performance can be
evaluated
explain how interval forecasts can be applied
APA format, minimum 3 sources
Paper will be a minimum of 650 and a maximum of 900 words.
(This includes title section, content, and references…in other
words the entire paper)
.
•POL201 •Discussions •Week 5 - DiscussionVoter and Voter Tu.docxhanneloremccaffery
• POL201 • Discussions • Week 5 - Discussion
Voter and Voter Turnout
Prepare: Prior to completing this discussion question, review Chapters 10, 11, and 12 in American Government and review Week Five Instructor Guidance. Also read the following articles: How Voter ID Laws Are Being Used to Disenfranchise Minorities and the Poor (Links to an external site.)Links to an external site., Fraught with Fraud (Links to an external site.)Links to an external site., and Proof at the Polls (Links to an external site.)Links to an external site.
Reflect: The U.S. has one of the lowest voter turnout rates among modern democratic political systems. One study ranks the U.S. 120th on a list of 169 nations compared on voter turnout (Pintor, Gratschew, & Sullivan, 2002). During the last decade, many initiatives have been undertaken to increase voter participation, yet concerns about the possibility of election fraud have also increased. Additionally, some political interests feel threatened by the increase in turnout among some traditionally low-turnout ethnic minorities. Several states have recently passed legislation imposing new registration and identification requirements. This has sparked debate about whether these are tactics intended to suppress turnout or to prevent fraud. Think about the media’s role in the election process and how both mass media and social media can impact the election process.
Write: In your initial post, summarize recent developments in several states enacting voter ID laws. Analyze and describe the pros and cons on both sides of the debate about these laws. Is voter fraud a major problem for our democracy or are some groups trying to make it harder for some segments of society to vote? What impact has the media (mass and social) had in influencing public opinion regarding voter ID laws? Draw your own conclusion about the debate over voter ID laws and justify your conclusions with facts and persuasive reasoning. Fully respond to all parts of the prompt and write your response in your own words. Your initial post must be at least 300 words. Support your position with at least two of the assigned resources required for this discussion, and/or peer reviewed scholarly sources obtained through the AU Library databases. Include APA in-text citations (Links to an external site.)Links to an external site. in the body of your post and full citations on the references list (Links to an external site.)Links to an external site. at the end. Support your position with APA citations from two or more of the assigned resources required for this discussion. Please be sure that you demonstrate understanding of these resources, integrate them into your argument, and cite them properly.
.
More Related Content
Similar to Full Terms & Conditions of access and use can be found athtt.docx
The document discusses a study on corporate social responsibility (CSR) in the UK nanotechnology industry. It conducted an online survey of 78 nanotechnology companies on their CSR reporting and conducted 15 interviews with company representatives on their attitudes towards CSR. The study found that the general level of CSR reporting among nanotechnology companies is low, though companies demonstrated awareness of minimizing risks ("do no harm" model of CSR). For CSR to help build adaptive governance of nanotechnology, the study argues serious shortcomings need addressing to move companies closer to seeing CSR as creating positive social value. The conceptual framework examined continuous improvement in CSR and different "modes" of CSR (minimizing risks versus creating social value).
For this assignment, review the article abomhara, m., & koien,modi11
The authors investigated cyber security threats and vulnerabilities related to the Internet of Things. They aimed to classify threat types and analyze the characteristics of potential attackers or intruders. The paper reviewed key concepts in IoT like devices and services. It identified common security issues around data confidentiality, privacy, and trust. The authors concluded that understanding threats is important for developing robust security requirements to protect IoT infrastructure and ensure its safe development. However, more research is still needed to address open challenges from resource-constrained devices and evolving attack techniques.
IJPR (2014) Testing a Theoretical Model Underlying the ‘Toyota Way'Nicky Campbell-Allen
This article empirically tests a theoretical model of the "Toyota Way" based on survey data from Toyota's logistics, sales, and marketing functions across 27 countries. Using statistical analysis, the researchers found that the Toyota Way measures of "challenge, kaizen, genchi genbutsu, respect, and teamwork" define the two constructs of "process improvement" and "people development" underlying the Toyota Way. Process improvement was found to directly impact how the Toyota Way is implemented in business units, while people development was found to indirectly impact implementation through process improvement. The study provides quantitative evidence that both "hard" process improvements and "soft" people development aspects are important for fully implementing the Toyota Way and related Lean systems
University of PlymouthPEARL httpspearl.plymouth.ac.uk.docxouldparis
University of Plymouth
PEARL https://pearl.plymouth.ac.uk
Faculty of Arts and Humanities Plymouth Business School
2016-04
The impact of big data on world-class
sustainable manufacturing
Dubey, R
http://hdl.handle.net/10026.1/5175
10.1007/s00170-015-7674-1
The International Journal of Advanced Manufacturing Technology
All content in PEARL is protected by copyright law. Author manuscripts are made available in accordance with
publisher policies. Please cite only the published version using the details provided on the item record or
document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content
should be sought from the publisher or author.
1
The impact of Big Data on World Class Sustainable Manufacturing
Abstract
Big data (BD) has attracted increasing attention from both academics and
practitioners. This paper aims at illustrating the role of Big Data analytics in
supporting world-class sustainable manufacturing (WCSM). Using an extensive
literature review to identify different factors that enable the achievement of
WCSM through BD and 405 usable responses from senior managers gathered
through social networking sites (SNS), we propose a conceptual framework that
summarizes this role, test this framework using data which is heterogeneous,
diverse, voluminous, and possess high velocity, and highlight the importance
for academia and practice. Finally we conclude our research findings and
further outlined future research directions.
Key words: Big Data, World Class Sustainable Manufacturing, Social
Networking Site, Confirmatory factor Analysis, Sustainable Manufacturing.
1. Introduction
In recent years Big Data Analytics (BDA) has been an important subject of
debate among academics and practitioners. McKinsey Global Institute has
predicted that by 2018 the BDA needs for the United States alone will be more
than 1.5 million managers who need to possess skills in analyzing Big Data for
effective decision making. In developing countries, in the recent 13th
Confederation of Indian Industries manufacturing summit, BDA was at the
forefront of discussions among manufacturing professionals in India. The
Internet of things (IOT) and big data & predictive analytics are now within the
reach of the operations management community to begin to explore, with the
potential for measurable and meaningful impacts on the life of people in the
2
developing world (Accenture, 2013). On the other hand, thinkers such as
Professor Nassim Nicholas Taleb, in his interview in the Economic Times
highlighted the impacts of BD, but was skeptical about its success.
The literature on the role of BDA in Operations and Supply Chain Management
(OM/SCM) (for example Wamba et al., 2015) has argued for benefits from its
use, including, inter alia, 15-20% increase in ROI (Perrey et al., 2013),
productivity and competitiveness for companies and public se ...
Accident Analysis Models And Methods Guidance For Safety ProfessionalsLeslie Schulte
This document provides an overview of accident analysis models and methods. It discusses three categories of analysis techniques: sequential, epidemiological, and systemic. Sequential techniques view accidents as resulting from time-ordered causal events, but cannot adequately account for organizational and human factors. Epidemiological techniques were developed to consider organizational influences, and view accidents as stemming from latent failures within a system. More recently, systemic techniques have emerged that treat socio-technical systems holistically and focus on the interactions between system components. The document aims to inform readers on different analysis approaches and factors that influence model selection.
Publishing scientific research in journalsPeter Trkman
This document provides guidance on how to get rejected in good journals. It begins by discussing why the author is qualified to provide this advice, as they have been one of the most rejected authors and serve as a reviewer rejecting around 70-80% of submissions. The document then provides examples of real reviews and criticisms of the author's own published work. It discusses common weaknesses seen in submissions like lack of theoretical contribution, novelty, and careless writing. The author aims to help others learn from their mistakes by sharing their extensive experience as both an author and reviewer.
Approaches For Resilience And Antifragility In Collaborative Business EcosystemsTony Lisko
This document summarizes the findings of a literature review on approaches for resilience and antifragility in collaborative business ecosystems. It identifies strategies and capabilities for coping with disruptions at different phases. Contemporary business ecosystems face increasing disruptive events that challenge stability. While some organizations collapse, others overcome stresses better. The review aims to understand current approaches through a systematic analysis of literature from multiple knowledge areas. It identifies taxonomy of resilience and antifragility strategies linked to disruption phases, along with relevant capabilities. Examples of engineered systems applying promising approaches are also presented.
PAPERS20 April 2013 ■ Project Management Jou.docxdanhaley45372
P
A
P
E
R
S
20 April 2013 ■ Project Management Journal ■ DOI: 10.1002/pmj
INTRODUCTION ■
U
ncertainty is both a reality and great challenge for most projects
(Chapman & Ward, 2003; Hillson, 2010). The presence of risk creates
surprises throughout the project life cycle, affecting everything
from technical feasibility to cost, market timing, financial perform-
ance, and strategic objectives (Hillson, 1999; Loch, Solt, & Bailey, 2008;
Thieme, Song, & Shin, 2003). Yet, to succeed in today’s ultracompetitive envi-
ronment, management must deal with these risks effectively despite these
difficulties (Buchanan & O’Connell, 2006; Patil, Grantham, & Steele, 2012;
Shenhar, 2001; Shenhar, Milosevic, Dvir, & Thamhain, 2007; Srivannaboon &
Milosevic, 2006). This concerns executives, and it is not surprising that lead-
ers in virtually all organizations, from commerce to government, spend
much of their time and effort dealing with risk-related issues. Examples trace
back to ancient times that include huge infrastructure projects and military
campaigns. Writings by Sun Tzu articulated specific risks and suggested
mitigation methods 2,500 years ago (Hanzhang & Wilkinson, 1998). Risk
management is not a new idea. However, in today’s globally connected, fast-
changing business world with broad access to resources anywhere, and pres-
sures for quicker, cheaper, and smarter solutions, projects have become
highly complex and intricate. Many companies try to leverage their
resources and accelerate their schedules by forming alliances, consortia, and
partnerships with other firms, universities, and government agencies that
range from simple cooperative agreements to “open innovation,” a concept
of scouting for new product and service ideas anywhere in the world. In such
an increasingly complex and dynamic business environment, risks lurk in
many areas, not only associated with the technical part of the work, but also
including social, cultural, organizational, and technological dimensions. In
fact, research studies have suggested that much of the root cause of project-
related risks can be traced to the organizational dynamics and multidiscipli-
nary nature that characterizes today’s business environment, especially for
technology-based developments (R. Cooper, Edgett, & Kleinschmidt, 2001;
Torok, Nordman, & Lin, 2011). The involvement of many people, processes,
and technologies spanning different organizations, support groups, subcon-
tractors, vendors, government agencies, and customer communities com-
pounds the level of uncertainty and distributes risk over a wide area of the
enterprise and its partners (Thamhain, 2004; Thamhain & Wilemon, 1999),
often creating surprises with potentially devastating consequences. This
paradigm shift leads to changing criteria for risk management. To be effec-
tive in dealing with the broad spectrum of risk factors, project leaders must
go beyond the mechanics of analyzing the work a.
A Comprehensive Literature Review On Construction Project Risk AnalysisJim Webb
This document summarizes a literature review on risk analysis techniques for construction projects over the past 20 years. The review identified 93 relevant papers. The dominant risk assessment tools used were found to be statistical analysis and fuzzy expert systems. Construction projects face risks from factors like size, organizational complexity, and location that can lead to cost overruns and delays. Earlier studies from 1995-2005 mainly used expert opinions and statistical analysis for risk assessment. Later studies from 2005-2015 saw an increased use of advanced computational techniques like artificial neural networks and genetic algorithms. The literature review identifies gaps in existing risk analysis methods and opportunities for future research.
Understanding outsourcing contexts through information asymmetry and capabili...Ian McCarthy
Outsourcing is a strategic activity that has long been central to operations management research and practice. Yet, there are still many outsourcing management challenges that remain. In this article, we explore two of the outsourcing challenges that motivated this special issue and are central to the 10 articles included. To do this, we develop a theoretical model that examines how variations in capability fit and information asymmetry combine to present firms with four different outsourcing contexts. We then explain how each of the articles included in this special issue relate to our theoretical model and explore several avenues for future research.
Implementation of construction safety in reinforced concrete constructions ex...eSAT Journals
Abstract In order to achieve the purpose of this research, a special questionnaire were designed to fulfill the task of this research, exemplified the subject of safety where what is supposed to be present in the workplace and means of prevention that contribute to raising the safety and industrial security degree rate to the highest level, based on the regulations and safety standards followed in Saudi Arabia, compared to what is the case they have both in field sites or within constructions, the questionnaire has been distributed in some construction projects distributed in different places located in Kingdom of Saudi Arabia, and has been narrowed in the building and construction sector category, then study what came in its provisions, for the purpose of the process of analyzing, and to study the causes of accidents, in order to achieve the aim of this research. Keywords – Safety, Constructions and Safety, Minimizing Accident, Construction Management
This document discusses the health effects of hydraulic fracturing on employees, surrounding communities, and the environment. It examines relevant literature from the disciplines of human resource development and organizational leadership to understand how fracturing has impacted worker health and safety, and what industry leaders are doing to address issues. Studies have found harmful exposure to crystalline silica dust for certain job roles, increasing risks of lung diseases. Air emissions from sites also pose health risks to nearby residents. The document concludes that while fracturing provides benefits, more must be done to protect workers, communities, and the environment from its negative impacts.
IRJET- Deterrence Theory for Evaluating Information Security Factors in E-Hea...IRJET Journal
This document analyzes factors affecting the adoption of electronic health (e-health) systems using deterrence theory. It introduces e-health systems and proposes a theoretical model to test the impact of organizational factors like deterrent efforts, severity of consequences, and preventive efforts as well as individual factors like perceived security threats and awareness on intentions to proactively use e-health. An empirical study found that deterrent efforts and severity had no significant influence while preventive efforts were important. The document thus suggests organizations focus on preventive efforts like security solutions and awareness while reducing perceived threats.
Global supply chain riskmanagement strategiesIla Manuj.docxwhittemorelucilla
Global supply chain risk
management strategies
Ila Manuj
Department of Marketing and Logistics, University of North Texas, Denton,
Texas, USA, and
John T. Mentzer
The University of Tennessee, Knoxville, Tennessee, USA
Abstract
Purpose – Global supply chains are more risky than domestic supply chains due to numerous links
interconnecting a wide network of firms. These links are prone to disruptions, bankruptcies,
breakdowns, macroeconomic and political changes, and disasters leading to higher risks and making
risk management difficult. The purpose of this paper is to explore the phenomenon of risk
management and risk management strategies in global supply chains.
Design/methodology/approach – This paper is based on an extensive literature review and a
qualitative study comprising 14 in-depth interviews and a focus group meeting with senior supply
chain executives.
Findings – The study provides insights into the applicability of six risk management strategies with
respect to environmental conditions and the role of three moderators.
Research limitations/implications – The model is developed in a global manufacturing supply
chain context. It should be tested in other contexts and with other methods to provide generalizability.
The study takes a much needed step toward building a theory of risk management in global supply
chains, which opens important future research directions.
Practical implications – This research provides direction to managers for choosing risk
management strategies based on the global supply chain environment. Moderators have practical
implications for global supply chain managers.
Originality/value – The paper addresses an identified gap in the literature for selecting risk
management strategies in global supply chains. It employs grounded theory, a methodology
appropriate for theory-building, to explore a phenomenon with an inadequate theoretical base.
Keywords Risk management, Supply chain management, International business
Paper type Research paper
Introduction
Global supply chains are a source of competitive advantage. Global configurations of
firms provide access to cheap labor and raw materials, better financing opportunities,
larger product markets, arbitrage opportunities, and additional inducements offered by
host governments to attract foreign capital (AlHashim, 1980; Kogut and Kulatilaka,
1994). However, coupled with these benefits that entice firms to go global are the
uncertainties and consequent risks that managers face in global supply chains. As
Barry (2004) argues, “An enterprise may have lowest over-all costs in a stable world
environment, but may also have the highest level of risk – if any one of the multiple
gating factors kink up an elongated global supply chain!”
There is wide acknowledgement in the literature of the risks and uncertainties in
global supply chains. Although risk management in multinational enterprises has been
The current issue and full text archive of this journal is a ...
Four-pagePaper on Historical FigureEvent in Public Relations .docxshericehewat
Four-page
Paper on Historical Figure/Event in Public Relations History
After watching "A Walk Through the 20th Century: The Image Makers"
Link: https://www.youtube.com/watch?v=XzQyoEphlXY video and reading Chapter 4 "Historical Origins and Evolution" “Effective Public Relations,” 11th edition, Glen M. Broom and Bey-Ling Sha please find an interesting public relations historic person, or event that has had a significant impact on the PR profession and write a detailed, four-page double-spaced paper about that person or event. Be sure to provide examples of the specific impacts this person has had on the PR industry and how they helped to influence the profession such as: started the first international PR agency, paved the way for women in the public relations field, promoted some of the biggest consumer brands in history such as Coca-Cola, etc.
Format your paper in AP, APA, or MLA format. Please include a separate Works Cited (References) page and include 3-5 professional sources. Citations should also be cited in the body of your paper. Professional sources for this assignment may include relevant industry trade publications such as PRWeek, The Hollywood Reporter, Variety, etc., as well as news publications such as The New York Times, CNN, The Washington Post, etc., in addition to scholarly journals. Wikipedia may be consulted, but it is not considered a professional source and should not be counted toward your 3-5 professional sources.
Please pay attention to spelling, grammar, and punctuation and have your paper proofread before submitting it. Points will be deducted for unprofessional work/typos.
Please address the following in your paper and section your paper with the following section headers:
1) Overview on this historical figure and/or event (who are they, who did they work for, what projects did they work on, what did they do?)
2) Why this person and/or event is interesting to you
3) What significance/impact does this person/event have on the field of public relations? (Why should we care about this person and/or event?)
Excellent Ratings:Met all criteria and exhibited comprehensive & thoughtful analysis.
For full points: Evaluation/Grading:
(Followed instructions, comprehensive and thoughtful analysis of the topic, no spelling, or grammatical errors).
JISTEM - Journal of Information Systems and Technology Management
Vol. 14, No. 1, Jan/Apr., 2017 pp. 21-38
ISSN online: 1807-1775
DOI: 10.4301/S1807-17752017000100002
JISTEM, Brazil Vol. 14, No. 1, Jan/Apr., 2017 pp. 21-38 www.jistem.fea.usp.br
THE LITERATURE REVIEW OF TECHNOLOGY ADOPTION MODELS
AND THEORIES FOR THE NOVELTY TECHNOLOGY
PC Lai
Help University, Malaysia
ABSTRACT
This paper contributes to the existing literature by comprehensively reviewing the concepts,
applications and development of technology adoption models and theories based on the literature
review with the focus on potential application for the nove ...
This document provides a literature review on global occupational safety and health practices and the severity of accidents. It discusses the following key points in 3 sentences:
The literature review identifies existing gaps in previous workplace safety and health management research and proposes areas for future study. Many studies have found that risks to occupational safety and health are increasing globally due to industrialization, but developing countries often overlook workplace safety in their economic policies. The review finds gaps in developing multilevel safety models, knowledge transfer mechanisms, and approaches that consider multiple health factors, and suggests these areas need further research to improve workplace safety and health management.
A LITERATURE REVIEW ON GLOBAL OCCUPATIONAL SAFETY AND HEALTH PRACTICE ACCID...Justin Knight
This document provides a literature review on global occupational safety and health practices and the severity of accidents. It discusses the following key points in 3 sentences:
The literature review identifies existing gaps in previous workplace safety and health management research and proposes areas for future study. Many studies have found that risks to occupational safety and health are increasing globally due to industrialization, but developing countries often overlook workplace safety in their economic policies. The review finds gaps in developing multilevel safety models, knowledge transfer mechanisms, and approaches that consider multiple health factors, and suggests these areas need further research to improve workplace safety and health management.
THE FRAMEWORK OF ARTIFICIAL INTELLIGENCE (FAI): DRIVING TRIGGERS, STATE OF TH...ijaia
The authors present a new Framework of Artificial Intelligence which analyzes the key elements of
transformational AI in industry. The State of the Art of Artificial Intelligence is gleaned from an
examination of what has been done in the past, presently in the last decade and what is predicted for future
decades. The paper will highlight the biggest changes in AI, important influencers to adoption/diffusion
and give examples of how these technologies have and will be applied in three key industrial sectors,
including agriculture, education and healthcare. Next the research examines seven driving triggers of cost,
speed, accuracy, diversity/inclusion, interdisciplinary research/collaboration and ethics/trustworthiness
that are accelerating AI development and concludes with a discussion of what are the critical success
factors for industry to be transformational in AI.
This document discusses the role of information technology and customer relationship management in supply chains. It begins with definitions of supply chain management, customer relationship management, and information technology. It then reviews related literature that has examined how information technology impacts supply chain capabilities and performance. The document outlines how customer relationship management plays a key role in satisfying customer demands, which is the main goal of supply chain activities. Finally, it describes how information technology supports cooperation and decision-making across the supply chain to help integrate organizations and meet customer needs more efficiently.
Rush University Medical Center historically did not engage in strategic planning or marketing, relying on its long history, which led it to fall from the top ranked medical center in consumer surveys. In response, the medical center recognized the need for strategic planning, marketing, and assessments to develop new business ideas and financial models to gain approval from administrators and the board for changes to the organization's approach. Comprehensive environmental scanning would help inform the strategic planning process to improve Rush's position in the competitive healthcare marketplace.
Similar to Full Terms & Conditions of access and use can be found athtt.docx (20)
Explain how firms can benefit from forecastingexchange rates .docxhanneloremccaffery
Explain how firms can benefit from forecasting
exchange rates
Describe the common techniques used for
forecasting
Explain how forecasting performance can be
evaluated
explain how interval forecasts can be applied
APA format, minimum 3 sources
Paper will be a minimum of 650 and a maximum of 900 words.
(This includes title section, content, and references…in other
words the entire paper)
.
•POL201 •Discussions •Week 5 - DiscussionVoter and Voter Tu.docxhanneloremccaffery
• POL201 • Discussions • Week 5 - Discussion
Voter and Voter Turnout
Prepare: Prior to completing this discussion question, review Chapters 10, 11, and 12 in American Government and review Week Five Instructor Guidance. Also read the following articles: How Voter ID Laws Are Being Used to Disenfranchise Minorities and the Poor (Links to an external site.)Links to an external site., Fraught with Fraud (Links to an external site.)Links to an external site., and Proof at the Polls (Links to an external site.)Links to an external site.
Reflect: The U.S. has one of the lowest voter turnout rates among modern democratic political systems. One study ranks the U.S. 120th on a list of 169 nations compared on voter turnout (Pintor, Gratschew, & Sullivan, 2002). During the last decade, many initiatives have been undertaken to increase voter participation, yet concerns about the possibility of election fraud have also increased. Additionally, some political interests feel threatened by the increase in turnout among some traditionally low-turnout ethnic minorities. Several states have recently passed legislation imposing new registration and identification requirements. This has sparked debate about whether these are tactics intended to suppress turnout or to prevent fraud. Think about the media’s role in the election process and how both mass media and social media can impact the election process.
Write: In your initial post, summarize recent developments in several states enacting voter ID laws. Analyze and describe the pros and cons on both sides of the debate about these laws. Is voter fraud a major problem for our democracy or are some groups trying to make it harder for some segments of society to vote? What impact has the media (mass and social) had in influencing public opinion regarding voter ID laws? Draw your own conclusion about the debate over voter ID laws and justify your conclusions with facts and persuasive reasoning. Fully respond to all parts of the prompt and write your response in your own words. Your initial post must be at least 300 words. Support your position with at least two of the assigned resources required for this discussion, and/or peer reviewed scholarly sources obtained through the AU Library databases. Include APA in-text citations (Links to an external site.)Links to an external site. in the body of your post and full citations on the references list (Links to an external site.)Links to an external site. at the end. Support your position with APA citations from two or more of the assigned resources required for this discussion. Please be sure that you demonstrate understanding of these resources, integrate them into your argument, and cite them properly.
.
•No less than 4 pages causal argument researched essay •In.docxhanneloremccaffery
•
No less than 4 pages causal argument researched essay
•
Includes an interview with an expert from a university
•
Includes survey question with students concerning the topic
•
Includes arguments from official sources from the library
.
•Focus on two or three things in the Mesopotamian andor Ovids ac.docxhanneloremccaffery
•Focus on two or three things in the Mesopotamian and/or Ovid's account of creation that differ from Genesis. How do they differ? What is the significance of these differences?
•Focus on two or three things in the Mesopotamian and/or
Ovid's account of the flood that differ from Genesis. How do they differ? What is the significance of these differences
.
•Langbein, L. (2012). Public program evaluation A statistical guide.docxhanneloremccaffery
•Langbein, L. (2012). Public program evaluation: A statistical guide (2nd ed.). Armonk, NY: ME Sharpe. ◦Chapter 7, “Designing Useful Surveys for Evaluation” (pp. 209–238)
•McDavid, J. C., Huse, I., & Hawthorn, L. R. L. (2013). Program evaluation and performance measurement: An introduction to practice (2nd ed.). Thousand Oaks, CA: Sage. ◦Chapter 4, “Measurement for Program Evaluation and Performance Monitoring” (pp. 145–185)
•Geddes, B. (1990). How the cases you choose affect the answers you get: Selection bias in comparative politics. Political Analysis, 2(1), 131–150. Retrieved from http://www.uky.edu/~clthyn2/PS671/Geddes_1990PA.pdf
•Levitt, S., & List, J. (2009). Was there really a Hawthorne effect at the Hawthorne plant? An analysis of the original illumination experiments. Retrieved from http://www.nber.org/papers/w15016.pdf
•Urban Institute. (2014). Outcome indicators project. Retrieved from http://www.urban.org/center/cnp/projects/outcomeindicators.cfm
•Bamberger, M. (2010). Reconstructuring baseline data for impact evaluation and results measurement. Retrieved from http://siteresources.worldbank.org/INTPOVERTY/Resources/335642-1276521901256/premnoteME4.pdf
•Parnaby, P. (2006). Evaluation through surveys [Blog post]. Retrieved from http://www.idea.org/blog/2006/04/01/evaluation-through-surveys/
•Rutgers, New Jersey Agricultural Experiment Station. (2014). Developing a survey instrument. Retrieved from http://njaes.rutgers.edu/evaluation/resources/survey-instrument.asp
•MEASURE Evaluation. (n.d.). Secondary analysis of data. Retrieved February 24, 2015, from http://www.cpc.unc.edu/measure/our-work/secondary-analysis/secondary-analysis-of-data
•Zeitlin, A. (2014). Sampling and sample size [PowerPoint slides]. Retrieved from http://www.povertyactionlab.org/sites/default/files/2.%20Sampling%20and%20Sample%20Size_AFZ3.pdf
Now that you have thought through a logical model or framework for your Final Project, it is time to develop preliminary input, output, and outcome indicators. For this Assignment, use the guidelines from the Urban Institute resource and consult relevant Optional Resources from this week.
Submit a 2- to 3-page paper which describes your input, output, and outcome program indicators, including the following:
•Describe the variables and the data you will be using.
•Provide a realistic discussion of the availability of research data.
•Provide an analysis of intended data collection strategies.
◦If a sample or sample survey will be used, discuss the sampling frame or the sampling strategy you intend to use.
.
•Chapter 10 Do you think it is possible for an outsider to accura.docxhanneloremccaffery
•Chapter 10: Do you think it is possible for an outsider to accurately discern about the underlying cultural values of an organization by analyzing symbols, ceremonies, dress, or other observable aspects of culture in comparison to an insider with several years of work experience? Select a percentage (e.g., 10%, 70%, etc.) and explain your reasoning.
•Chapter 11: A noted organization theorist once said, "Pressure for change originates in the environment. Pressure for stability originates within the organization." Do you agree?
•Chapter 12: If managers frequently use experience and intuition to make complex, non-programmed decisions, how do they apply evidence-based management (which seems to suggest that managers should rely on facts and data)?
•Chapter 13: In a rapidly changing organization, are decisions more likely to be made using the rational or political model of organization?
•What biblical implications should be included/addressed?
•How can/should a biblical worldview be applied?
Group Discussion Board Forum Thread Grading Rubric
Criteria
Points Possible
Points Earned
Thread
0 to 30 points
All questions associated with Part 1 are provided in a thread.
At least 4 peer-reviewed references are included in the thread.
The thread is 1200 words.
The thread is posted by the stated deadline.
Spelling and grammar are correct.
Sentences are complete, clear, and concise.
Total
.
· Bakit Di gaanong kaganda ang pagturo sa UST sa panahon.docxhanneloremccaffery
·
Bakit
Di gaanong kaganda ang pagturo sa UST sa panahon ni Jose Rizal
·
bakit
Merong diskriminasyon; minamaliit ang mga Pilipinosa panahon ni Jose Rizal
·
bakit
Galit sa kay Jose Rizal ang mga Dominikano dahil sa pagtatatag ng Companerismo (Fraternity)
·
bakit
Gustong gamutin ni Jose Rizal ang ina niya
.
·YOUR INDIVIDUAL PAPER IS ARGUMENTATIVE OR POSITIONAL(Heal.docxhanneloremccaffery
·
YOUR INDIVIDUAL PAPER IS ARGUMENTATIVE OR POSITIONAL
(Healthcare Information Technology)
THIS is NOT and information paper so please read this carefully
Individual Writing Assignment
This Individual Writing Assignment is worth 20 points, and it is due at the end of Week 5.
The purposes of this assignment are to a) help you effectively use research resources through library data bases and search engines to complete course requirements; b) improve your critical thinking skills, and c) develop your effectiveness in writing about topics relevant to course objectives and healthcare information systems. The paper explores, in greater detail than the required readings and class discussion, any healthcare information system topic identified in the course text or syllabus. Your job is to select a current issue in healthcare information systems, provide the necessary background and your position, along with a conclusion and future direction. I encourage you to select a subject in which you have interest and approach this assignment as a potential publishable work.
Position Paper
Your final paper is 15 pages double-spaced (excluding the executive summary, footnotes, and references) with a 10 or 12 point font. Tables, graphics, and diagrams must be placed in the paper as attachments. They do not count in the page length. This is a guide to help you organize your content and what is expected in each section. The page counts are suggested, however, where they have a limit, that must be adhered to.
·
Cover Page:
APA Style (1 Page, not included in page count)
·
Table of Contents:
(not included in page count)
·
Executive Summary:
Bottom line up front (1 page, no more)
·
Introduction
: (1/2 to 1 page)
·
Background
: Information on the topic that provides context so readers can understand the background leading into your statement and analysis of the issue (up to 2 pages, no more)
·
Analysis of the issue
: This is the problem you see with the current state of your topic supported by evidence and literature that brings validity to the issue or problem you are stating exists. Then describe the factors contributing to the issue /problem broken down by (2-3 pages)
People
Processes
Technology
·
Position
: Now that the reader understands the problem broken down by people, process, and technology, provide a clear statement of what your position is on the issue and why. (1/2 to 1 page)
·
Rationale
: Now that the reader clearly understands your position and why you will detail your position with supporting evidence and literature to persuade the reader your position is the most valid. You should address opposing views with counter arguments here also. Your position should have evidence directly addressing the issues you stated above broken down by the same (3-4 pages)
People
Process
Technology
·
Recommendation
: Now that you have convinced the reader on your position being the best way forward, you need to provide 3-5 discrete recommen.
·Write a 750- to 1,Write a 750- to 1,200-word paper that.docxhanneloremccaffery
·
Write
a 750- to 1,
Write
a 750- to 1,200-word paper that addresses the following:
Define religion.
Describe the theory of animism.
Explain the influence of religion on cultures.
Identify the seven major religions of the world.
Describe any four types of theism.
Format
your paper consistent with APA guidelines.
Include
a minimum of five references.
Limit
direct quotes to less than 10% of the total manuscript.
Criteria for grading
·
Introduction provides sufficient background on the topic and previews major points
·
Define religion
·
Describe the theory of animism
·
Explain the influence of religion on cultures (e.g., architecture, art, politics, social norms, etc.)
·
Identify the seven major religions of the world and provide one or two sentences about each
·
Describe any four types of theism (e.g., atheism, monotheism, ditheism, polytheism, pantheism, etc.) and provide an example of each
·
Conclusion
.
[Type here]Ok. This school makes me confused. The summary of t.docxhanneloremccaffery
[Type here]
Ok. This school makes me confused. The summary of this week they posted like this:
SUMMARY:
This week introduced you to grand theories and middle-range theories that serve to articulate the voice of nursing within healthcare.
Here are the key points covered:
Grand theories are comparatively more abstract than middle-range theories since they are at a higher level of abstraction. Compared to grand theories, middle-range theories are made up of limited number of concepts that lend themselves to empirical testing. All theories help to explain human health behavior.
· Sister Callista Royï's adaptive model theory is built on the conceptual foundation of adaptation. It identifies the positive role that nursing plays in the promotion and enhancement of client adaptation to environments that facilitate the healing process.
· Leiningerï's culture care theory is pertinent in the current multicultural healthcare environment where nurses are exposed to diverse cultures.
· Penderï's health promotion and disease prevention theory can be called as a "direction setting exercise" for nursing professionals. It believes in fostering the spirit of health promotion and disease and risk reduction.
From the chapter, Models and Theories Focused on Nursing Goals and Functions, read the following:The Health Promotion Model: Nola J. Pender
From the chapter, Models and Theories Focused on a Systems Approach, read the following:
The Roy Adaptation Model
From the chapter, Models and Theories Focused on Culture, read the following:
Leininger's Cultural Care Diversity and Universality Theory and Model
SO, THAT IS WHY I ASSUMED THAT HAS TO BE ONE OF THEM (Pender, Roy Adaptaion or Leininger)
ANYWAY, I AM PUTTING INFORMATION TOGETHER.
Week 4 Chapter 17
Models and Theories Focused on Nursing Goals and Functions
The Health Promotion Model: Nola J. Pender
Background
Nola J. Pender was born in 1941 in Lansing, Michigan. She graduated in 1962 with a diploma in nursing. In 1964, Pender completed a bachelor’s of science in nursing at Michigan State University. By 1969, she had completed a doctor of philosophy in psychology and education. During this time in her career, Pender began looking at health and nursing in a broad way, including defining the goal of nursing care as optimal health.
In 1975, Pender published a model for preventive health behavior; her health promotion model first appeared in the first edition of the text Health Promotion in Nursing Practice in 1982. Pender’s health promotion model has its foundation in Albert Bandura’s (1977) social learning theory (which postulates that cognitive processes affect behavior change) and is influenced by Fishbein’s (1967) theory of reasoned action (which asserts that personal attitudes and social norms affect behavior).
Pender’s Health Promotion Model
McCullagh (2009) labeled Pender’s health promotion model as a middle-range integrative theory, and rightly so. Fawcett (2005) decisively presented the differenc.
{
Discrimination
*
GENERAL DISCRIMINATION
+
RACIAL DISCRIMINATION
RELIGIOUS DISCRIMINATION
(on freedom of religion)
DISCRIMINATION ON SEXUAL ORIENTATION
(still weak protection)
GENDER DISCRIMINATION
(CEDAW)
TYPES OF DISCRIMINATION
NON-DISCRIMINATION in INT’L LAW
A. GENERAL DISCRIMINATION
Arts 1 & 2 Universal Declaration on Human Rights
Arts. 2 & 26 ICCPR
Art. 14 ECHR & Add. Protocol 12
B. RACIAL DISCRIMINATION
Int’l Convention against All Forms of Racial Discrimination (ICERD)
Art . 2: (1). Each State Party to the present Covenant undertakes to respect and to ensure to all individuals within its territory and subject to its jurisdiction the rights recognized in the present Covenant, without distinction of any kind, such as race, colour, sex, language, religion, political or other opinion, national or social origin, property, birth or other status.
(2). States to take the necessary steps to adopt laws and measures to give effect to art. 2;
(3). States to ensure effective remedy, determined by competent judicial, administrative or legislative authorities, or by any other competent authority and enforce such remedies.
Art. 26: non-discrimination before the law and equal protection by the law
ICCPR
*
Justification for differential treatment
General Comment 18 HRC
Not every differentiation of treatment will constitute discrimination:
if the criteria are reasonable and objective
and the aim is to achieve the purpose which is legitimate
ICCPR cont.
*
“Racial discrimination" shall mean any distinction, exclusion, restriction or preference based on race, colour, descent, or national or ethnic origin which has the purpose or effect of nullifying or impairing the recognition, enjoyment or exercise, on an equal footing, of human rights and fundamental freedoms in the political, economic, social, cultural or any other field of public life (art. 1)
States Parties particularly condemn racial segregation and apartheid and undertake to prevent, prohibit and eradicate all practices of this nature in territories under their jurisdiction (art. 3)
RACIAL DISCRIMINATION-
International Convention on the Elimination of All Forms of Racial Discrimination
Direct discrimination: Indirect discrimination
Formal equality: Substantive equality
Discrimination in law: Discrimination in practice
Non-discrimination: negative protection
Equality: positive obligations -> special measures
Is there a hierarchy in the protection of discrimination?
Racial Discrimination (prohibition Jus Cogens);
gender based discrimination?
Religious-based discrimination??
Discrimination based on sexual orientation???
Discrimination (forms & grounds)
= Affirmative action/ positive action
Article 1.4 of ICERD:
Special measures taken for the sole purpose of securing adequate advancement of certain racial or ethnic groups or individuals requiring such protection as may be necessary in order to ensure such groups or in.
`HISTORY 252AEarly Modern Europe from 1500 to 1815Dr. Burton .docxhanneloremccaffery
`HISTORY 252A
Early Modern Europe from 1500 to 1815
Dr. Burton Van Name Edwards (Van)
Tuesday – Thursday 3:30-4:45
Unistructure 247
Third Paper Assignment
Due Tuesday, December 13th
The third paper will be based on a book in the list at the end of the syllabus. These works are generally works of literature, with some concerned with philosophy or politics. The student’s task will be to show how the chosen work reflects or shows the influence of conditions and events in Europe that were operating at the time of the writing of the work. This is not a book report. I am not interested in plots or descriptions of the general argument of a given work. Instead, I am looking for an analysis of specific sections of the chosen work that may illuminate social and economic attitudes or contemporaneous conditions.
The paper should be 7-8 pages long.
You will be expected to give a 5-10 minute oral report based on your finding in the third paper. This oral report will be a significant part of your class participation grade.
.
^ Acadumy of Management Journal2001. Vol. 44. No. 2. 219-237.docxhanneloremccaffery
^ Acadumy of Management Journal
2001. Vol. 44. No. 2. 219-237.
A SOCIAL CAPITAL THEORY OF CAREER SUCCESS
SCOTT E. SEIBERT
MARIA L. KRAIMER
•̂ ' ' ' Cleveland State University
ROBERT C. LIDEN
University of Illinois at Chicago
A model integrating competing theories of social capital with research on career
success was developed and tested in a sample of 448 employees with various occupa-
tions and organizations. Social capital was conceptualized in terms of network struc-
ture and social resources. Results of structural equation modeling showed that net-
work structure was related to social resources and that the effects of social resources
on career success were hilly mediated by three network benelits: access to information,
access to resources, and career sponsorship.
Organizational researchers have begun to de-
velop increasingly comprehensive models of career
success using demographic, human capital, work-
family, motivational, organizational, and industry
variables (e.g., Dreher & Ash, 1990; Judge & Bretz,
1994: Judge, Cable. Boudreau, & Bretz. 1995; Kirch-
meyer, 1998). Although this work has provided
considerable evidence regarding the determinants
of career outcomes, the roles of informal interper-
sonal behaviors have not been fully explored (Judge
& Bretz, 1994; Pfeffer, 1989). Popular advice for
getting ahead in one's career rarely fails to mention
the importance of networking for the achievement
of career goals (e.g., Bolles, 1992; Kanter, 1977).
Indeed, Luthans, Hodgetts, and Rosenkrantz (1988)
found that the most successful managers in their
study spent 70 percent more time engaged in net-
working activities and 10 percent more time en-
gaged in routine communication activities than
their less successful counterparts. Recent advances
in social capital theory (Coleman, 1990) have begun
to provide a finer-grained analysis of the ways in-
dividuals' social networks affect their careers in
organizations (Burt, 1992, 1997; Ibarra, 1995;
Podolny & Baron, 1997; Sparrowe & Popielarz,
1995). This theoretical perspective has the poten-
Data were collected and the manuscript was submitted
and processed while Scott E. Seibert was in the Manage-
ment Department at the University of Notre Dame and
Maria L. Kraimer was a graduate student at the Univer-
sity of Illinois at Chicago. Support for this project was
provided by the Management Department at the Univer-
sity of Notre Dame and the Alumni Office of the Univer-
sity of Notre Dame. The current investigation is part of a
larger study of career success.
tial to considerably enhance scholars' knowledge of
the role of social processes in career success.
The first purpose of the current study was to
integrate the current conceptualizations of social
capital as they pertain to career success. Tbree dif-
ferent theoretical approaches—weak tie theory
(Granovetter, 1973), structural hole theory (Burt,
1992), and social resource theory (Lin, 1990)—
focus on different network properties as r.
`
Inclusiveness. The main difference that can distinguish a happy employee from disgruntled employee. As with all decisions that are made, there is always an audience that the decision will affect. When employees are privy and organizational decisions are inclusive to employees this can greatly increase their level of fulfillment. Whether or not the end user of the decision will be content with the outcome or not, there will always be critics. Which leads us to discuss key characteristics and the importance of involving employees in relative organizational decision making.
It is not uncommon to find that during strategic organizational planning that top-level management will include their employees to engage and provide their input on complex processes. Human capital, whether the organization is large or small, corporate ran or small business managed is key to an organization’s success. Employee satisfaction level drives productivity and is what increases revenue for the company. Happy employees equal happy customers.
What does it take to keep employees motivated? A critical and important element for employers to keep their employees happy and content is clear communication. It is critical that an organization’s objective and vision for future growth is communicated clearly throughout all levels. Top-level management must be skilled at delivering the company’s mission and values to every tier within their organization. Each tier within the organization with healthy communication should be able to open-mindedly accept the message and freely provide any feedback positive or negative without fear of repercussion. Keeping an open line of communication within an organization is key to building the foundation for success.
As we move away from the golden days of traditional office operations consisting of fax machines, telephones, paper, pencils, etc. and move towards a more technologically repertoire, we lose the personable face to face interaction with one another. We spend most of the day behind our computer screen at our desk. The need to sustain job satisfaction amongst employees could not be ever more present than now. To maintain the morale amongst employees, organizations should be able to keep them challenged and motivated. Take technology for example. If the increase of new technology isn’t daunting enough, consider the challenge to remain current with technology all the while maintaining a competitive advantage in the industry? Reach internally to our internal resource, human capital. Employees must be given the opportunity to share their knowledge, skills, and abilities. When empowered to provide input concerning highly visible organizational decisions, employee morale is boosted. Not only is this beneficial for employees but also the employer as they receive ideas and input that could possibly lead to the solution. Employee engagement boosts the overall welfare of the organization.
According to.
__MACOSX/Sujan Poster/._CNA320 Poster Presentation rubric.pdf
__MACOSX/Sujan Poster/._CNA320+Poster+Template (1).ppt
__MACOSX/Sujan Poster/._Helpful Hints for the Poster Presentation.docx
Sujan Poster/Poster Abstract - Aspiration pneumonia (1).docx
Title: Aspiration pneumonia: Best practice to avoid complications
Background
Aspiration pneumonia is a lung infection due to inhaled contents; this is a relevant topic because aspiration pneumonia is prevalent and accounts for up to 15% of all pneumonia cases and is particularly common in older people, and thus it is important for nurses to be aware of how to manage the condition particularly as the population is ageing so this will be of more concern (Kwong, Howden & Charles 2011).
Target Audience
The target audience for this presentation is experienced Registered Nurses and thus the presentation has been designed for this group.
Main Findings
Aspiration pneumonia is an infection within the lungs that occurs after a person aspirates either liquid, vomit or food into the larynx and lower respiratory tract; this can occur when an individual inhales their gastric or oral contents. Patients at risk include individuals who are elderly or those who have a marked disturbance of consciousness such as that resulting from a drug overdose, seizures, a massive cerebrospinal accident, dysphagia or dysphasia (Kwong, Howden & Charles 2011). Aspiration pneumonia can quickly develop into respiratory failure, abscess and empyema and this requires supportive care, which is the main form of therapy, however prophylactic antimicrobial therapy is also often prescribed (Joundi, Wong & Leis 2015). Best practice suggests suctioning, supplemental oxygen to keep O2 above 90%, septic shock therapy, management of hypotension and antibiotic therapy for 7-10 days. Sputum cultures should be taken so that antibiotics can be tailored appropriately (McAdams-Jones & Sundar 2012).
Implications for Practice
These findings are important for registered nurses to be aware of so that aspiration pneumonia can be managed appropriately and complications can be avoided, which could cause increased hospital stay and costs. Nurses need to be aware of the best practice recommendations such as oxygen supplementation, sit up while eating, provide thickened foods and drinks, dental care and about taking sputum cultures when managing aspiration pneumonia so that treatment can be tailored appropriately and recovery can occur quickly.
Feedback from marker (Teacher)
Thank you for your abstract.
You have just managed a pass grade, your work is very basic and you will need to engage with the basic practice literature to ensure you have a comprehensive understanding of this topic in your poster.
I am also unclear on your focus, is this about prevention of aspiration or management once it has occurred or both?
Kind regards Andrea
Sources of Evidence
Joundi, R, Wong, B & Leis, J 2015, "Antibiotics “Just-In-Ca.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Assessment and Planning in Educational technology.pptxKavitha Krishnan
In an education system, it is understood that assessment is only for the students, but on the other hand, the Assessment of teachers is also an important aspect of the education system that ensures teachers are providing high-quality instruction to students. The assessment process can be used to provide feedback and support for professional development, to inform decisions about teacher retention or promotion, or to evaluate teacher effectiveness for accountability purposes.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Physiology and chemistry of skin and pigmentation, hairs, scalp, lips and nail, Cleansing cream, Lotions, Face powders, Face packs, Lipsticks, Bath products, soaps and baby product,
Preparation and standardization of the following : Tonic, Bleaches, Dentifrices and Mouth washes & Tooth Pastes, Cosmetics for Nails.
Full Terms & Conditions of access and use can be found athtt.docx
1. Full Terms & Conditions of access and use can be found at
http://www.tandfonline.com/action/journalInformation?journalC
ode=tprs20
Download by: [Embry-Riddle Aeronautical University] Date: 27
March 2016, At: 12:29
International Journal of Production Research
ISSN: 0020-7543 (Print) 1366-588X (Online) Journal
homepage: http://www.tandfonline.com/loi/tprs20
Supply chain risk management: a literature review
William Ho, Tian Zheng, Hakan Yildiz & Srinivas Talluri
To cite this article: William Ho, Tian Zheng, Hakan Yildiz &
Srinivas Talluri (2015) Supply chain
risk management: a literature review, International Journal of
Production Research, 53:16,
5031-5069, DOI: 10.1080/00207543.2015.1030467
To link to this article:
http://dx.doi.org/10.1080/00207543.2015.1030467
Published online: 15 Apr 2015.
Submit your article to this journal
Article views: 2556
View related articles
2. View Crossmark data
Citing articles: 5 View citing articles
http://www.tandfonline.com/action/journalInformation?journalC
ode=tprs20
http://www.tandfonline.com/loi/tprs20
http://www.tandfonline.com/action/showCitFormats?doi=10.108
0/00207543.2015.1030467
http://dx.doi.org/10.1080/00207543.2015.1030467
http://www.tandfonline.com/action/authorSubmission?journalCo
de=tprs20&page=instructions
http://www.tandfonline.com/action/authorSubmission?journalCo
de=tprs20&page=instructions
http://www.tandfonline.com/doi/mlt/10.1080/00207543.2015.10
30467
http://www.tandfonline.com/doi/mlt/10.1080/00207543.2015.10
30467
http://crossmark.crossref.org/dialog/?doi=10.1080/00207543.20
15.1030467&domain=pdf&date_stamp=2015-04-15
http://crossmark.crossref.org/dialog/?doi=10.1080/00207543.20
15.1030467&domain=pdf&date_stamp=2015-04-15
http://www.tandfonline.com/doi/citedby/10.1080/00207543.201
5.1030467#tabModule
http://www.tandfonline.com/doi/citedby/10.1080/00207543.201
5.1030467#tabModule
Supply chain risk management: a literature review
William Hoa, Tian Zhengb, Hakan Yildizc and Srinivas
Talluric*
aDepartment of Management and Marketing, The University of
Melbourne, Carlton, Australia; b
3. Solution
Department, China
Merchants Loscam (Shenzhen) Investment Holding Co., Ltd,
Shenzhen, China; cDepartment of Supply Chain Management,
Eli Broad
Graduate School of Management, Michigan State University,
East Lansing, MI, USA
(Received 18 March 2014; accepted 28 February 2015)
Risk management plays a vital role in effectively operating
supply chains in the presence of a variety of uncertainties.
Over the years, many researchers have focused on supply chain
risk management (SCRM) by contributing in the areas
of defining, operationalising and mitigating risks. In this paper,
we review and synthesise the extant literature in SCRM
in the past decade in a comprehensive manner. The purpose of
this paper is threefold. First, we present and categorise
SCRM research appearing between 2003 and 2013. Second, we
undertake a detailed review associated with research
developments in supply chain risk definitions, risk types, risk
4. factors and risk management/mitigation strategies. Third,
we analyse the SCRM literature in exploring potential gaps.
Keywords: supply chain risk management; risk types; risk
factors; risk management methods; literature review
1. Introduction
In recent years, supply chain disruptions have impacted the
performance of companies. The case of Ericsson is well
known in this domain. Due to a fire at a Phillips semiconductor
plant in 2000, the production was disrupted, which
eventually led to Ericsson’s $400 million loss (Chopra and
Sodhi 2004). The earthquake, tsunami and the subsequent
nuclear crisis that occurred in Japan in 2011 caused Toyota’s
production to drop by 40,000 vehicles, costing $72 million
in profits per day (Pettit, Croxton, and Fiksel 2013). The
catastrophic Thailand flooding of October 2011 affected the
supply chains of computer manufacturers dependent on hard
discs, and also disrupted the supply chains of Japanese
automotive companies with plants in Thailand (Chopra and
Sodhi 2014). In order to control and mitigate the negative
effects caused by such risks, a significant amount of work in the
area of supply chain risk management (SCRM) is
undertaken in both academia and practitioner circles.
5. In the last decade, five journal articles reviewing the literature
in SCRM have been published. Tang (2006a)
reviewed more than 200 journal articles that applied
quantitative models that are published between 1964 and 2005.
He
classified the articles into four categories, i.e. supply
management, demand management, product management and
information management for managing supply chain risks. Rao
and Goldsby (2009) reviewed 55 journal articles pub-
lished between 1998 and 2008, and synthesised the diverse
literature into a typology of risk factors, including environ-
mental, industrial, organisational, problem-specific and
decision-maker related factors. Tang and Musa (2011) adopted
the literature citation analysis on 138 journal articles published
between 1995 and first half of 2008, and identified and
classified potential risks associated with material flow,
financial flow and information flow. Colicchia and Strozzi
(2012)
also applied the citation network analysis on 55 journal articles
published between 1994 and 2010, and identified the
evolutionary patterns and emerging trends in SCRM. Sodhi,
Son, and Tang (2012) reviewed 31 journal articles pub-
lished between 1998 and 2010 to formulate their own perception
of diversity in SCRM. They also conducted open-
51. illustrated in Table 1, the articles published between 2003
and 2013 applying qualitative risk management methods were
never reviewed. Besides, certain topics in particular years
were also not covered as represented by the shaded cells in
Table 1. In addition, none of these review articles are recent
enough to cover many new studies published after 2010. More
specifically, 170 out of 224 journal articles reviewed in
this paper were not studied in extant review articles, including
93 journal articles published after 2010 plus 77 journal
articles published between 2003 and 2010. Finally, all but two
of these papers reviewed only a relatively small number
of articles. More specifically, Sodhi, Son, and Tang (2012)
reviewed 31 articles, and Rao and Goldsby (2009) and
Colicchia and Strozzi (2012) reviewed 55 articles given the
focal area of interest. In order to fill these gaps, this paper
presents a comprehensive review of all relevant journal articles
in the area of SCRM appearing between 2003 and 2013,
and undertakes an effective classification scheme. Our work
also proposes a new definition for SCRM by classifying
supply chain risk types, risk factors and risk management
methods. Finally, we analyse the literature in exploring poten-
tial gaps contributing towards risk management in supply
chains.
The remainder of this paper is organised as follows. Section 2
52. provides an introduction to the research methodology
and develops a conceptual framework for classifying the supply
chain risks. Section 3 summarises the existing defini-
tions of supply chain risks and SCRM, and proposes new
definitions. Sections 4, 5 and 6 present supply chain risk
types, risk factors and risk management methods, respectively.
Section 7 discusses the research analyses and observa-
tions. Section 8 identifies gaps in the area of SCRM and
recommends future research directions, and finally, Section 9
concludes the paper.
2. Research methodology
There is a continuous growth in the number of articles focusing
on SCRM in the past few years as seen in Figure 1. In
view of this, we reviewed the journal articles published between
2003 and 2013. The research methodology, as illus-
trated in Figure 2, is as follows. First, the search terms were
defined. The keywords used in the search process were
‘supply chain’ and ‘risk’. Second, various academic databases
were utilised to identify the journal articles including
EBSCOhost, Emerald, IEEExplore, Ingenta, Metapress,
ProQuest, ScienceDirect, Springer, Taylor and Francis, and
Wiley. To achieve the highest level of relevance, only peer-
reviewed articles written in English and published in Interna-
53. tional Journals were selected, whereas conference papers,
master and doctoral dissertations, textbooks, book chapters
and notes were excluded in this review. As opposed to Tang and
Musa (2011), we have not imposed a restriction on the
list of journals to ensure that we capture every relevant study
regardless of the journal it was published in. Third,
several criteria were determined and used to filter the articles.
With respect to the criteria, abstracts of articles were
examined to check if they cover one or more of the SCRM
topics, including supply chain risk types, risk factors, risk
management methods and research gaps identification. The
articles were excluded if they do not meet one of these filtra-
tion criteria. Fourth, the reference lists of the shortlisted
articles were also carefully evaluated to ensure that there were
no other articles of relevance which were omitted in the search.
Finally, the content of each article was thoroughly
reviewed to ensure that the article fits into the context of SCRM
and studies at least one of the SCRM topics. This
analysis resulted in 224 journal articles.
Figure 1. Distribution of number of journal articles over the last
11 years.
International Journal of Production Research 5033
56. 27
M
ar
ch
2
01
6
In order to classify and analyse these articles, we develop a
conceptual framework of supply chain risks as shown in
Figure 3. In synthesising various points of views from the
literature, we discover that supply chain risks can be divided
into
two categories – macro-risks and micro-risks (referred as
catastrophic and operational by Sodhi, Son, and Tang (2012);
Define the search terms
Identify the databases
57. Determine and apply
criteria for inclusion
and exclusion
Refer to the reference
list s of the shortlisted
articles
Ensure that the
resulting articles are
representative
Figure 2. Flowchart of the research methodology.
Figure 3. Conceptual framework of supply chain risks.
5034 W. Ho et al.
60. 27
M
ar
ch
2
01
6
disruption and operational by Tang (2006a)). Macro-risks refer
to adverse and relatively rare external events or situations
which might have negative impact on companies. Macro-risks
consist of natural risks (e.g. earthquakes and weather-related
disasters) and man-made risks (e.g. war and terrorism and
political instability). On the other hand, micro-risks refer to
relatively recurrent events originated directly from internal
activities of companies and/or relationships within partners in
the entire supply chain. Generally, macro-risks have much
greater negative impact on companies in relation to micro-risks.
Furthermore, micro-risks can be divided into four
61. subcategories: demand risk, manufacturing risk, supply risk and
infras-
tructural risk. Manufacturing risk refers to adverse events or
situations within the firms that affect their internal ability to
produce goods and services, quality and timeliness of
production, and profitability (Wu, Blackhurst, and
Chidambaram
2006). Demand and supply risks refer to adverse events at the
downstream and upstream partners of a firm, respectively
(Zsidisin 2003; Wagner and Bode 2008). In order to ensure the
healthy functioning of a supply chain, information technol-
ogy (Chopra and Sodhi 2004), transportation (Wu, Blackhurst,
and Chidambaram 2006) and financial systems (Chopra and
Sodhi 2004; Wu, Blackhurst, and Chidambaram 2006), are also
of critical importance. Any disruptions in these systems
can also lead to serious problems in a supply chain. Therefore,
we classify the risks relating to these three systems as
infrastructural risk.
3. Definitions
There is no consensus on the definition of ‘supply chain risk’
and ‘SCRM’ (Sodhi, Son, and Tang 2012; Diehl and
Spinler 2013). Without a common understanding and clear
definition, researchers would find it difficult to communicate
62. with practitioners and gain access to industry to carry empirical
studies. Moreover, a consistent definition helps research-
ers identify and measure the likelihood and impact of the entire
set of supply chain risks, and evaluate the effectiveness
of SCRM methodologies. Therefore, it is imperative to obtain a
clear definition of these terms (Sodhi, Son, and Tang
2012; Diehl and Spinler 2013). Sections 3.1 and 3.2 summarise
the existing definitions of supply chain risk and SCRM,
and also propose new definitions.
3.1 Supply chain risk
Several researchers provided different definitions for supply
risk (Zsidisin 2003; Ellis, Henry, and Shockley 2010) and
supply chain risk (Jüttner, Peck, and Christopher 2003; Wagner
and Bode 2006; Bogataj and Bogataj 2007) as sum-
marised in Table 2. Although these definitions have
applicability in specific domains, such as supply risk (Zsidisin
2003; Ellis, Henry, and Shockley 2010), information flow risk,
material flow risk and product flow risk (Jüttner, Peck,
and Christopher 2003), they focus on a specific function or a
part of a supply chain, and do not span across the entire
chain. Given this, and according to the conceptual framework in
Figure 3, we define supply chain risk as: ‘the likeli-
hood and impact of unexpected macro and/or micro level events
63. or conditions that adversely influence any part of a
supply chain leading to operational, tactical, or strategic level
failures or irregularities’.
Table 2. Definitions of supply chain risk given by researchers.
Authors Definitions of supply chain risk Scopes
Zsidisin (2003, 222) The probability of an incident associated
with inbound supply from individual
supplier failures or the supply market occurring, in which its
outcomes result in
the inability of the purchasing firm to meet customer demand or
cause threats to
customer life and safety
Supply risk only
Jüttner, Peck, and
Christopher (2003,
200)
Any risks for the information, material and product flows from
original
suppliers to the delivery of the final product for the end user
64. Information, material and
product flow risks
Wagner and Bode (2006,
303)
The negative deviation from the expected value of a certain
performance
measure, resulting in negative consequences for the focal firm
General risks
Bogataj and Bogataj
(2007, 291)
The potential variation of outcomes that influence the decrease
of value added
at any activity cell in a chain
General risks
Ellis, Henry, and
Shockley (2010, 36)
65. An individual’s perception of the total potential loss associated
with the
disruption of supply of a particular purchased item from a
particular supplier
Supply risk only
International Journal of Production Research 5035
D
ow
nl
oa
de
d
by
[
E
m
br
68. Several researchers provided definitions for SCRM, which are
summarised in Table 3. While all these definitions have
emphasised collaboration with supply chain partners, some of
the limitations are related to their focus on specific ele-
ments of SCRM and their lack of spanning the SCRM processes
in their entirety, type of SCRM methods and types of
events. Given this, and based on the conceptual framework in
Figure 3, we define SCRM as: ‘an inter-organisational
collaborative endeavour utilising quantitative and qualitative
risk management methodologies to identify, evaluate,
mitigate and monitor unexpected macro and micro level events
or conditions, which might adversely impact any part of
a supply chain’.
4. Supply chain risk types
Among the 224 reviewed journal articles, 20 articles discussed
supply chain risk types as presented in Table 4. Eleven of
these articles simply identified the risk types without
classification (Harland, Brenchley, and Walker 2003; Cavinato
2004; Chopra and Sodhi 2004; Bogataj and Bogataj 2007;
Blackhurst, Scheibe, and Johnson 2008; Manuj and Mentzer
2008; Tang and Tomlin 2008; Wagner and Bode 2008; Tang and
Musa 2011; Tummala and Schoenherr 2011; Samvedi,
Jain, and Chan 2013). Six of these articles classified the risk
69. types into two categories, such as internal and external (Wu,
Blackhurst, and Chidambaram 2006; Trkman and McCormack
2009; Kumar, Tiwari, and Babiceanu 2010; Olson and Wu
2010), or operational and disruption (Tang 2006a; Ravindran et
al. 2010). In addition, three of these articles divided sup-
ply chain risk types into three categories with a similar idea but
used different terms (Jüttner, Peck, and Christopher
2003; Christopher and Peck 2004; Lin and Zhou 2011). The
three categories are organisational risk or internal risk (e.g.
process and control risks), network-related risk or risk within
the supply chain (e.g. demand and supply risks), and envi-
ronmental risk or risk in the external environment (e.g. natural
disasters, war and terrorism and political instability).
Among the 20 articles discussed above, only two articles
classified the supply chain risk types according to the degree
of the negative impact on companies (Tang 2006a; Ravindran et
al. 2010). Note that macro-risks, discussed in Section 2,
are akin to disruption risks (Tang 2006a) and value-at-risk
(VaR) (Ravindran et al. 2010), whereas micro-risks are similar
to operational risks (Tang 2006a) and miss-the-target
(Ravindran et al. 2010). Besides, some micro-risks (demand,
manufacturing and supply risks) have been extensively proposed
and studied. Comparatively, other risks (information,
transportation and financial risks) have been paid much less
70. attention. Most importantly, our conceptual framework for
the supply chain risk classification, illustrated in Figure 3, is
believed to be unique and more comprehensive given that it
considers a holistic set of risk types with various degrees of
impact (macro- and micro-risks), in both external and internal
supply chain (demand, manufacturing and supply risks) and
different types of flow (information, transportation and
financial risks). This holistic risk classification has not been
proposed by the previous studies.
5. Supply chain risk factors
Among the 224 reviewed journal articles, 14 articles discussed
supply chain risk factors. Risk factors are various events
and situations that drive a specific risk type. The first group of
scholars (8 out of 14 articles) identified risk factors of
Table 3. Definitions of SCRM given by researchers.
Authors Definitions of SCRM Scopes
Jüttner, Peck, and Christopher
(2003) and Jüttner (2005, 124)
The identification and management of risks for the supply
71. chain, through a
coordinated approach amongst supply chain members, to reduce
supply
chain vulnerability as a whole
Identification and
management processes
Norrman and Jansson (2004, 436) To collaborate with partners
in a supply chain apply risk management
process tools to deal with risks and uncertainties caused by, or
impacting
on, logistics related activities or resources
Generic processes
Tang (2006a, 453) The management of supply chain risks
through coordination or
collaboration among the supply chain partners so as to ensure
profitability
and continuity
Generic processes
Goh, Lim, and Meng (2007,
72. 164–165)
The identification and management of risks within the supply
network and
externally through a coordinated approach amongst supply chain
members
to reduce supply chain vulnerability as a whole
Identification and
management processes
Thun and Hoenig (2011, 243) Characterised by a cross-company
orientation aiming at the identification
and reduction of risks not only at the company level, but rather
focusing
on the entire supply chain
Identification and
mitigation processes
5036 W. Ho et al.
D
ow
75. ar
ch
2
01
6
multiple risk types (Chopra and Sodhi 2004; Cucchiella and
Gastaldi 2006; Wu, Blackhurst, and Chidambaram 2006;
Manuj and Mentzer 2008; Tuncel and Alpan 2010; Wagner and
Neshat 2010; Tummala and Schoenherr 2011; Samvedi,
Jain, and Chan 2013). For example, Chopra and Sodhi (2004)
explored several risk factors, as shown in Table 5, for
various risk types as shown in Table 4. The second group of
scholars (3 out of 14 articles) explored factors of specific
risk types. For example, Zsidisin and Ellram (2003) considered
five supply risk factors. Kull and Talluri (2008) also
focused on supply risk, and considered somewhat similar
factors. Tsai (2008) focused on time-related factors imposing
significant influences on the cash flow risk. The last group of
scholars (3 out of 14 articles) merely showed a list of
76. potential risk factors without classification (Gaudenzi and
Borghesi 2006; Schoenherr, Tummala, and Harrison 2008;
Hahn and Kuhn 2012a).
Majority of the risk factors discussed in these 14 articles can be
classified into five categories according to our con-
ceptual framework, as shown in Table 5, including macro,
demand, manufacturing, supply and infrastructural (informa-
tion, transportation and financial) factors. First, we found that
some of the identified risk factors are vague, and it is
Table 4. Supply chain risk types identified by researchers.
Authors Risk types
Harland, Brenchley, and Walker
(2003)
Strategic, operations, supply, customer, asset impairment,
competitive, reputation, financial, fiscal,
regulatory and legal risks
Jüttner, Peck, and Christopher
(2003)
77. • Environmental risk
• Network-related risk
• Organisational risk
Cavinato (2004) Physical, financial, informational, relational
and innovational risks
Chopra and Sodhi (2004) Disruptions, delays, systems, forecast,
intellectual property, procurement, receivables, inventory and
capacity risks
Christopher and Peck (2004) • External to the network:
environmental risk
• External to the firm but internal to the supply chain network:
demand and supply risks
• Internal to the firm: process and control risks
Tang (2006a) • Operational risks: uncertain customer demand,
uncertain supply and uncertain cost
• Disruption risks: earthquakes, floods, hurricanes, terrorist
attacks, economics crises
Wu, Blackhurst, and
Chidambaram (2006)
78. • Internal risks: internal controllable, internal partially
controllable, internal uncontrollable
• External risks: external controllable, external partially
controllable, external uncontrollable
Bogataj and Bogataj (2007) Supply, process (production or
distribution), demand, control and environmental risks
Blackhurst, Scheibe, and
Johnson (2008)
Disruptions/disasters, logistics, supplier dependence, quality,
information systems, forecast, legal,
intellectual property, procurement, receivables (accounting),
inventory, capacity, management and
security risks
Manuj and Mentzer (2008) Supply, demand, operational and
other risks
Tang and Tomlin (2008) Supply, process, demand, intellectual
property, behavioural and political/social risks
Wagner and Bode (2008) Demand side, supply side, regulatory
and legal, infrastructure risk and catastrophic risks
Trkman and McCormack (2009) • Endogenous risks: market and
technology turbulence
79. • Exogenous risks: discrete events (e.g. terrorist attacks,
contagious diseases, workers’ strikes) and
continuous risks (e.g. inflation rate, consumer price index
changes)
Kumar, Tiwari, and Babiceanu
(2010)
• Internal operational risks: demand, production and
distribution, supply risks
• External operational risks: terrorist attacks, natural disasters,
exchange rate fluctuations
Olson and Wu (2010) • Internal risks: available capacity,
internal operation, information system risks
• External risks: nature, political system, competitor and market
risks
Ravindran et al. (2010) • Value-at-risk (VaR): labour strike,
terrorist attack, natural disaster
• Miss-the-target (MtT): late delivery, missing quality
requirements
Lin and Zhou (2011) • Risk in the external environment
• Risk within the supply chain
80. • Internal risk
Tang and Musa (2011) Material flow, financial flow and
information flow risks
Tummala and Schoenherr
(2011)
Demand, delay, disruption, inventory, manufacturing (process)
breakdown, physical plant (capacity),
supply (procurement), system, sovereign and transportation
risks
Samvedi, Jain, and Chan (2013) Supply, demand, process and
environmental risks
International Journal of Production Research 5037
D
ow
nl
oa
de
d
83. 01
6
more appropriate to consider them as risk types rather than risk
factors, e.g. risks affecting suppliers and risks affecting
customers (Manuj and Mentzer 2008); demand risk, logistics
risk, supplier risk and transportation risk (Schoenherr,
Tummala, and Harrison 2008). We excluded such risk factors in
Table 5, and only included the relevant factors. Second,
consistent with the findings in Section 4, demand,
manufacturing and supply risks have attracted the most
attention.
There exists an abundant set of factors, which would give rise
to demand, manufacturing and supply risks. Compara-
tively, there are less factors suggested for information,
transportation, financial, and micro-risks. Third, according to
our
definition of supply chain risk in Section 3.1, different supply
chain risk types would have different levels of negative
impact and would lead to operational-, tactical-, or strategic-
level failures. Similarly, different risk factors within the
same risk type would also have different levels of negative
84. impact. Nevertheless, these articles simply identified and/or
classified the potential risk factors without quantifying and
assessing the degrees of negative impact.
Table 5 shows the risk factors proposed by particular authors
(i.e. which articles proposed which risk factors). As
there are many duplicated factors in Table 5, it is synthesised
into Table 6 so as to help readers identify factors of par-
ticular risk types efficiently, and differentiate between macro-
and micro-risk factors more easily. Note that some of
these risk factors are associated with generic risk types, such as
inbound supply risk (Wu, Blackhurst, and Chidambaram
2006), while some others are factors of specific risk types, such
as cash flow risk (Tsai 2008). Before incorporating such
risk factors listed in Table 6 into a particular supply chain,
industrial characteristics and features of supply chain should
be taken into account.
6. SCRM methods
In the past decade, a number of qualitative and quantitative
methods and tools have been developed and applied to man-
age supply chain risks. Section 6.1 presents the research
studying specific or individual SCRM process, such as risk
identification, risk assessment, risk mitigation and risk
85. monitoring. Section 6.2 discusses other research focusing on
more than one process or integrated management. Note that
some sections are relatively lengthy, because those areas
have attracted more attention, whereas some other sections are
relatively concise, which means that they have been
under-researched. The following subsections help in
understanding whether individual or integrated management
process
has attracted more attention, and which SCRM process has been
the most prevalently studied.
6.1 Individual SCRM process
6.1.1 Risk identification
Risk identification is the first step in the SCRM process. It
involves the identification of risk types, factors or both. The
first group of researchers developed qualitative or quantitative
methods for identifying potential supply chain risks, such
as the analytic hierarchy process (AHP) method (Tsai, Liao, and
Han 2008), a supply chain vulnerability map (Blos
et al. 2009) and a conceptual model (Trkman and McCormack
2009). Another group of researchers focused on risk
factor identification using the AHP (Gaudenzi and Borghesi
2006), and the hazard and operability analysis method
86. (Adhitya, Srinivasan, and Karimi 2009). Some other scholars
proposed qualitative tools to identify both risk types and
risk factors, such as a qualitative value-focused process
engineering methodology (Neiger, Rotaru, and Churilov 2009)
and a supply chain risk identification system, based on
knowledge-based system approach (Kayis and Karningsih 2012).
Most of the above articles applied qualitative methods for risk
identification (Adhitya, Srinivasan, and Karimi 2009;
Blos et al. 2009; Neiger, Rotaru, and Churilov 2009; Trkman
and McCormack 2009; Kayis and Karningsih 2012). They
did not prioritise nor quantify the negative impact of neither
risk types nor risk factors.
6.1.2 Risk assessment
Risk assessment is associated with the probability of an event
occurring and the significance of the consequences
(Harland, Brenchley, and Walker 2003). In the past decade, a
number of risk assessment methods have emerged, espe-
cially for supply risk assessment. Owing to the abundant
published articles in this area, we classify them according to
the risk types studied in the conceptual framework, including
macro- and micro-risk assessments.
87. 6.1.2.1 Macro risk assessment. Ji and Zhu (2012) evaluated the
salvable degrees of the affected areas in a destructive
earthquake by the extension technique. They developed a bi-
objective optimisation model with the urgent relief demand
time-varying fill rate maximisation and distribution time-
varying window minimisation to distribute supplies to the
identified affected area sets. The methodology was illustrated
with a hypothetical numerical example.
5038 W. Ho et al.
D
ow
nl
oa
de
d
by
[
E
m
391. 27
M
ar
ch
2
01
6
6.1.2.2 Demand risk assessment. A number of researchers
analysed the impact of demand volatility on inventory man-
agement (Ballou and Burnetas 2003; Cachon 2004; Talluri,
Cetin, and Gardner 2004; Betts and Johnston 2005; Sodhi
2005; Xiao and Yang 2008; Radke and Tseng 2012). Some of
them provided useful insights on safety stock reduction.
Ballou and Burnetas (2003) compared a traditional inventory
planning approach with one that is based on filling cus-
tomer demand from any one of several stocking locations,
referred to as cross filling, while considering the dispersion
of demand among stocking locations. It was revealed that cross
392. filling can help reducing safety stocks. Talluri, Cetin,
and Gardner (2004) developed a safety stock model and
benchmarked it with existing models for managing make-to-s-
tock inventories under demand and supply variations. Based on
a case study at an over-the-counter pharmaceutical com-
pany, the proposed safety stock model performed well in terms
of cost savings. Betts and Johnston (2005) presented the
multi-item constrained inventory model to compare just-in-time
(JIT) replenishment with component substitution under
stochastic demand. The analysis showed that JIT replenishment
is more effective than component substitution because
of less investment in safety stock.
Some other scholars analysed the impact of demand visibility
and bullwhip effect on supply chain performance.
Smaros et al. (2003) used a discrete-event simulation model to
show that a partial improvement of demand visibility
can improve production and inventory control efficiency. Reiner
and Fichtinger (2009) developed a dynamic model to
evaluate supply chain process improvements under
consideration of different forecast methods. They pointed out
that
dampening of the order variability decreases the bullwhip effect
and the average on-hand inventory but with the prob-
lem of a decreasing service level. Sucky (2009) suggested that
393. the variability of orders increases as they move up the
supply chain from retailers to wholesalers to manufacturers to
suppliers. He concluded that the bullwhip effect is over-
estimated if a simple supply chain is assumed and risk pooling
effects are present.
A common limitation of the above articles is that most of the
proposed methods were not implemented in real indus-
trial cases (Ballou and Burnetas 2003; Smaros et al. 2003;
Cachon 2004; Betts and Johnston 2005; Sodhi 2005; Xiao
and Yang 2008; Reiner and Fichtinger 2009; Sucky 2009; Radke
and Tseng 2012). Lack of actual implementation and
verification would make the potential users doubtful about the
effectiveness and efficiency of the proposed methods.
Besides, several of the above articles simplified the studied
problems with stylised supply chains (Ballou and Burnetas
2003; Smaros et al. 2003; Cachon 2004).
6.1.2.3 Manufacturing risk assessment. There exist three
research studies on manufacturing risk assessment. They
applied different methods to assess different manufacturing
risks in different supply chains. Cigolini and Rossi (2010)
proposed the fault tree approach to analyse and assess the
operational risk at the drilling, primary transport and refining
stages of an oil supply chain. They concluded that different
394. stages are affected by various operational risks according to
the differences in plants. Therefore, each plant should be
provided with a specifically conceived risk management pro-
cess. Dietrich and Cudney (2011) applied a Pugh method
adaption to assess risk coupled with manufacturing readiness
level for emerging technologies in a global aerospace supply
chain. They revealed that executive management can
evaluate the entire emerging technology portfolio more
effectively with the proposed methodology. Tse and Tan (2011)
constructed a product quality risk and visibility assessment
framework using the margin incremental analysis for a toy
manufacturing company. They argued that better visibility of
risk in supply tiers could minimise the quality risk.
There exist limitations in the above articles. Cigolini and Rossi
(2010) only focused on three stages of an oil supply
chain, while ignoring operational risk assessment at some other
crucial stages (e.g. design, construction and
outsourcing). The risk assessment matrix proposed by Dietrich
and Cudney (2011) is fairly simplistic as it is based on
only three levels (i.e. ‘green’, ‘yellow’ and ‘red’). Tse and Tan
(2011) neither quantified risks and their factors, nor
proposed any mitigating actions for the identified
manufacturing risk.
395. 6.1.2.4 Supply risk assessment. Supply risk assessment has
attracted much attention. Most of the articles studied the
supplier evaluation and selection problem while considering a
variety of supply risks, such as poor quality (Talluri and
Narasimhan 2003; Talluri, Narasimhan, and Nair 2006), late
delivery (Talluri and Narasimhan 2003; Talluri,
Narasimhan, and Nair 2006), uncertain capacity (Kumar, Vrat,
and Shankar 2006; Viswanadham and Samvedi 2013),
dispersed geographical location (Chan and Kumar 2007),
supplier failure (Kull and Talluri 2008; Ravindran et al. 2010;
Ruiz-Torres, Mahmoodi, and Zeng 2013), supplier’s financial
stress (Lockamy and McCormack 2010), supply disruption
(Wu and Olson 2010; Meena, Sarmah, and Sarkar 2011), poor
supplier service (Wu et al. 2010; Chen and Wu 2013),
suppliers’ risk management ability and experience (Ho, Dey,
and Lockström 2011) and lack of supplier involvement
(Chaudhuri, Mohanty, and Singh 2013). A wide range of
quantitative methods have been proposed to deal with this
problem, including mathematical programming and data
envelopment analysis (DEA) approaches (Talluri and
Narasimhan 2003; Kumar, Vrat, and Shankar 2006; Talluri,
Narasimhan, and Nair 2006; Ravindran et al. 2010; Wu and
Olson 2010; Wu et al. 2010; Meena, Sarmah, and Sarkar 2011),
multicriteria decision-making and AHP approaches
398. :2
9
27
M
ar
ch
2
01
6
(Chan and Kumar 2007; Blackhurst, Scheibe, and Johnson 2008;
Kull and Talluri 2008; Ho, Dey, and Lockström 2011;
Chen and Wu 2013; Viswanadham and Samvedi 2013), Bayesian
networks (Lockamy and McCormack 2010), decision
tree approach (Ruiz-Torres, Mahmoodi, and Zeng 2013) and
fuzzy-based failure mode and effect analysis (FMEA) with
ordered weighted averaging approach (Chaudhuri, Mohanty, and
Singh 2013).
399. In addition to the above supply risks, some other supply risks
have also been analysed and assessed, such as sec-
ond-tier supply failure (Kull and Closs 2008), offshore sourcing
risk (Schoenherr, Tummala, and Harrison 2008), unreli-
able dual sourcing network (Iakovou, Vlachos, and
Xanthopoulos 2010), supplier non-conformance risk
(Wiengarten,
Pagell, and Fynes 2013), supplier incapability (Johnson, Elliott,
and Drake 2013) and supplier unreliability (Cheong and
Song 2013).
Different from the above approaches focusing on the assessment
of supply risks, the following articles studied sup-
ply risk assessment methods and models. Zsidisin et al. (2004)
examined tools and techniques that purchasing organisa-
tions implement for assessing supply risk within an agency
theory context. They indicated that purchasing organisations
can assess supply risk with techniques that focus on addressing
supplier quality issues, improving supplier processes
and reducing the likelihood of supply disruptions. Ellegaard
(2008) applied a case-based methodology to analyse the
supply risk management practices of 11 small company owners
(SCOs). They confirmed that the 11 studied SCOs
applied almost the same supply risk management practices,
which can be characterised as defensive. Wu and Olson
400. (2008) used simulated data to compare three types of risk
evaluation models: chance-constrained programming, DEA
and multi-objective programming models. Results from three
models are consistent with each other in selecting pre-
ferred suppliers. Azadeh and Alem (2010) benchmarked three
types of supplier selection models under certainty, uncer-
tainty and probabilistic conditions, including DEA, Fuzzy DEA
and chance-constrained DEA. Results from three
models are also consistent with each other with respect to the
worst suppliers.
Supplier evaluation and selection has attracted the most
attention is this category. Many of these articles focused on
conceptual model development and demonstration using
simulated data (Chan and Kumar 2007; Ravindran et al. 2010;
Wu and Olson 2010; Wu et al. 2010; Meena, Sarmah, and Sarkar
2011; Viswanadham and Samvedi 2013; Ruiz-Torres,
Mahmoodi, and Zeng 2013). Thus, the use of real data to test
the efficacy of these methods is still missing. Moreover,
some of these articles have other technical limitations. For
example, Talluri and Narasimhan (2003) and Talluri,
Narasimhan, and Nair (2006) only utilised a single input
measure in the DEA analyses. Kull and Talluri (2008) assumed
current supplier capabilities will remain unchanged into the
future. Lockamy and McCormack (2010) assumed that all
401. suppliers are willing to share their accurate and reliable risk
profile data with their customers. Ruiz-Torres, Mahmoodi,
and Zeng (2013) assumed all the input parameters and supplier
characteristics to be deterministic.
6.1.2.5 Financial risk assessment. There are four research
studies on financial risk assessment. Two of them focused on
specific financial risks. Tsai (2008) modelled the supply-chain-
related cash flow risks by the standard deviations of cash
inflows, outflows and net flows of each period in a planning
horizon. They recommended the best policy of using asset-
backed securities to finance accounts receivable as a means to
shorten the cash conversion cycle and lower the cash inflow
risk. Liu and Nagurney (2011) developed a variational
inequality model to study the impact of foreign exchange risk
and
competition intensity on supply chain companies that are
involved in offshore-outsourcing activities. Their simulation
results indicated that in general the risk-averse firm has lower
profitability and lower risk than the risk-neutral firm.
On the other hand, two of the studies focused on generic
financial risk. Franca et al. (2010) formulated a multi-
objective programming model with the Six Sigma concepts to
evaluate financial risk. They showed that the financial
402. risk decreases as the sigma level increases. Liu and Cruz (2012)
studied the impact of corporate financial risk and eco-
nomic uncertainty on the values, profits and decisions of supply
chains. They found that suppliers are willing to sacrifice
some profit margins to gain more businesses from
manufacturers with lower financial risk and with lower
sensitivity to
economic uncertainty. A common drawback with these
approaches is that they focused on simulated data instead of
using real case data.
6.1.2.6 Information risk assessment. Durowoju, Chan, and Wang
(2012) used discrete-event simulation to investigate
the impact of disruption in the flow of critical information
needed in manufacturing operations on collaborating mem-
bers. They revealed that the retailer experiences the most
uncertainty in the supply chain, while the holding cost consti-
tutes the most unpredictable cost measure when a system failure
breach occurs. In their study, a generic information
technology risk was studied and no risk factors were identified
nor quantified.
6.1.2.7 General risk assessment. Articles that do not assess
specific risk types are described in this section. The topics
of these articles are diversified and there are four major
403. categories. First, a number of researchers attempted to evaluate,
assess and quantify generic supply chain risks. Brun et al.
(2006) developed a so-called supply network opportunity
5046 W. Ho et al.
D
ow
nl
oa
de
d
by
[
E
m
br
y-
R
405. t
12
:2
9
27
M
ar
ch
2
01
6
assessment package methodology to evaluate advanced planning
and scheduling and supply chain management imple-
mentation projects with risk analysis. Bogataj and Bogataj
(2007) used parametric linear programming model to measure
the costs of risk based on the net present value of activities.
406. Wu, Blackhurst, and O’grady (2007) proposed a disruption
analysis network approach to determine how changes or
disruptions propagate in supply chains and calculated their
impact on the supply chain system. Kumar, Tiwari, and
Babiceanu (2010) applied the artificial bee colony technique,
genetic algorithms and particle swarm optimisation to identify
operational risk factors, their expected value and probabil-
ity of occurrence, and associated additional cost. Khilwani,
Tiwari, and Sabuncuoglu (2011) proposed the hybrid
Petri-net approach for modelling, performance evaluation and
risk assessment of a supply chain. Olson and Wu (2011)
used DEA and the Monte Carlo simulation to identify various
risk performance measures for outsourcing, and compared
expected performance of vendors under risk and uncertainty in a
supply chain. Wang et al. (2012) applied fuzzy AHP
to assess risk of implementing various green initiatives in the
fashion industry. Samvedi, Jain, and Chan (2013) applied
fuzzy AHP and fuzzy TOPSIS approaches to quantify the risks
in a supply chain, and aggregated the values into a com-
prehensive risk index.
The second category is concerned with the assessment of
relationship between supply chain risks and strategies.
Craighead et al. (2007) suggested that the best practices in
purchasing, including supply base reduction, global sourcing
407. and sourcing from supply clusters might have negative impact
on the severity of supply chain disruptions. Laeequddin
et al. (2009) suggested that the supply chain members should
strive to reduce the membership risk levels to build trust
rather than striving to build trust to reduce the risk. Tomlin
(2009) found that contingent sourcing is preferred to sup-
plier diversification as the supply risk increases, while
diversification is preferred to contingent sourcing as the
demand
risk increases. Hult, Craighead, and Ketchen (2010) studied
supply chain investment decisions when facing high levels of
risk uncertainty. They extended real options theory to the
supply chain context by examining how different types of
options are approached relative to supply chain project
investments. Wang, Gilland, and Tomlin (2011) applied the
unconstrained and constrained mathematical programming
models to assess the relationship between various supply
chain strategies and the regulatory trade risk. They established
that the direct and split strategy profits increase in the
non-tariff barriers price variance but decrease in the mean price.
Third, Jüttner and Maklan (2011) and Pettit, Croxton, and
Fiksel (2013) both evaluated the supply chain resilience.
Jüttner and Maklan (2011) revealed that knowledge management
seems to enhance the supply chain resilience by
408. improving flexibility, visibility, velocity and collaboration
capabilities of the supply chain. Pettit, Croxton, and Fiksel
(2013) suggested a correlation between increased resilience and
improved supply chain performance.
Fourth, Wagner and Neshat (2010) and Berle, Norstad, and
Asbjørnslett (2013) both assessed supply chain vulnera-
bility. Wagner and Neshat (2010) concluded that if supply chain
managers were more capable of measuring and manag-
ing supply chain vulnerability, they could reduce the number of
disruptions and their impact. Berle, Norstad, and
Asbjørnslett (2013) argued identifying the ‘vulnerability
inducing bottlenecks’ of transportation systems allows for
realising more robust versions of these systems in a cost-
effective manner.
While the above-mentioned methods addressed a variety of
issues, they are not devoid of limitations. Brun et al.
(2006) considered the deterministic characteristics of projects in
their risk analysis. Kumar, Tiwari, and Babiceanu
(2010) focused on a single-product supply chain network.
Wagner and Neshat (2010) claimed that the applicability of
their proposed approach heavily depends on the availability of
data that quantifies the factors of supply chain vulnerabil-
ity. Khilwani, Tiwari, and Sabuncuoglu (2011) indicated that
409. the proposed method is incapable of modelling the changes
performed in the network during the risk management process.
Wang et al. (2012) pointed out that the functionality of
their model is heavily dependent on the knowledge, expertise
and communication skills of assessors. Berle, Norstad,
and Asbjørnslett (2013) studied a simplified version of a real
transportation system. Samvedi, Jain, and Chan (2013)
emphasised that their risk index is simply generic rather than
industry-specific.
6.1.3 Risk mitigation
In this section, we classify risk mitigation methods in a similar
manner as the risk assessment methods are discussed in
Section 6.1.2.
6.1.3.1 Macro-risk mitigation. Hale and Moberg (2005) used a
five-stage disaster management framework for secure
site location selection. The framework consists of planning,
mitigation, detection, response and recovery. However, the
proposed set covering location model minimises the number of
secure site locations rather than the level of risk expo-
sure. In order to help firms succeed before, during and after a
major disruption, Tang (2006b) presented nine strategies
to manage the inherent fluctuations efficiently and make the
410. supply chains more resilient. The strategies are postpone-
ment, strategic stock, flexible supply base, make-and-buy,
economic supply incentives, flexible transportation, revenue
International Journal of Production Research 5047
D
ow
nl
oa
de
d
by
[
E
m
br
y-
R
413. 6.1.3.2 Demand risk mitigation. Significant number of
researches focused on demand risk mitigation and supply chain
decision-making under stochastic demand. The first group of
researchers determined the optimal-order placement and
replenishment plan in order to minimise the impact of demand
uncertainty. Various methodologies have been developed
and applied, including automatic pipeline inventory and order-
based production control system algorithm (Towill 2005),
two-period financial model (Aggarwal and Ganeshan 2007),
buyer’s risk adjustment model (Shin and Benton 2007),
multiple regression model (Hung and Ryu 2008), simulation
model (Schmitt and Singh 2012), newsvendor model
(Arcelus, Kumar, and Srinivasan 2012; Tang, Musa, and Li
2012) and mathematical programming, such as stochastic
integer linear programming model (Snyder, Daskin, and Teo
2007), mixed-integer stochastic programming model
(Lejeune 2008), stochastic linear programming model (Sodhi
and Tang 2009) and mixed integer nonlinear programming
model (Kang and Kim 2012).
The second group of researchers analysed the forecasting
techniques to minimise demand risk. Guo, Fang, and
Whinston (2006) constructed a macro-prediction market model,
which can aggregate information about demand risk
to achieve accurate demand forecast sharing in the supply chain.
414. Datta et al. (2007) modified the forecasting tech-
nique called Generalised Autoregressive Conditional
Heteroskedasticity to model demand volatility and better man-
age risk. Crnkovic, Tayi, and Ballou (2008) presented a
simulation-based decision support framework to evaluate
and select alternative forecasting methods in uncertain demand
environments. Sayed, Gabbar, and Miyazaki (2009)
presented an improved genetic algorithm to choose the best
weights among the statistical methods and to optimise
the forecasted activities combinations that maximise profit,
which in turn, balance risk of overstocking and
stockouts.
The third group of researchers proposed the risk-sharing
contracts to minimise the loss due to uncertain demand.
Chen, Chen, and Chen (2006), Xiao and Yang (2009) and Chen
and Yano (2010) focused on two-tier supply chains,
and proposed risk-sharing contracts to minimise the loss of
manufacturer (e.g. overproduction) and the loss of retailers
(e.g. overstocking) under demand uncertainty (Chen, Chen, and
Chen 2006; Xiao and Yang 2009) or weather-sensitive
demand (Chen and Yano 2010). Different from the above, Kim
(2013) studied a four-tier supply chain under dynamic
market demands, and proposed the bilateral contracts with order
quantity flexibility. It was revealed that demand
415. fluctuation can be effectively absorbed by the contract scheme,
which enables better inventory management and
customer service.
The following articles also focus on demand risk mitigation but
do not fall into the aforementioned subcategories.
Rao, Swaminathan, and Zhang (2005) showed that a firm can
optimise expected profits by quoting a uniform guaranteed
maximum lead time to all customers under demand uncertainty.
Huang, Chou, and Chang (2009) presented a dynamic
system model of manufacturing supply chains, which can
proactively manage disruptive events and absorb the demand
shock. Ben-Tal et al. (2011) applied a multiperiod deterministic
linear programming to generate a robust logistics plan
that can mitigate demand uncertainty in humanitarian relief
supply chains.
There are limitations associated with some of the above articles.
For example, Rao, Swaminathan, and Zhang (2005)
assumed the lead time to all customers for all products are the
same. Chen, Chen, and Chen (2006) and Guo, Fang, and
Whinston (2006) assumed that retail prices are exogenously set
and are the same for all retailers. Snyder, Daskin, and
Teo (2007) assumed demand parameters are known with
certainty. Shin and Benton (2007) did not consider all inven-
416. tory variables, such as safety stock, service level and reorder
point. Hung and Ryu (2008) used students as surrogates
for the actual purchasing and supply chain managers in a supply
chain experiment. Lei, Li, and Liu (2012) assumed the
relationship between demand and price is linear.
6.1.3.3 Manufacturing risk mitigation. The following articles
focused on mitigation of various manufacturing risk
factors, including quality risk (Kaya and Özer 2009; Hung 2011;
Sun, Matsui, and Yin 2012), lead time uncertainty
(Li 2007), random yield risk (He and Zhang 2008), non-
conforming product design (Khan, Christopher, and Burnes
2008), capacity inflexibility (Hung 2011) and machine failures
(Kenné, Dejax, and Gharbi 2012). The methods used are
longitudinal case study (Khan, Christopher, and Burnes 2008),
newsvendor model (Li 2007), linear programming model
(Kaya and Özer 2009), stochastic dynamic model (Kenné,
Dejax, and Gharbi 2012), P-chart solution model (Sun,
Matsui, and Yin 2012), unconstrained and constrained
mathematical programming models (He and Zhang 2008) and
integrated methodology, combining analytic network process
(ANP), fuzzy GP, five forces analysis and VaR (Hung
2011).
5048 W. Ho et al.
419. 9
27
M
ar
ch
2
01
6
There are limitations associated with some of the above articles.
Li (2007) and Kenné, Dejax, and Gharbi (2012)
considered only one type of products in their models. He and
Zhang (2008) and Sun, Matsui, and Yin (2012) considered
one supplier and one retailer in their analyses. Kaya and Özer
(2009) assumed the demand function to be linear.
6.1.3.4 Supply risk mitigation. A significant amount of work is
related to supply risk mitigation. Earlier studies in the
review period carried out empirical studies, which showed that
420. supply risk can be mitigated by implementing
behaviour-based management techniques (Zsidisin and Ellram
2003), by building strategic supplier relationships
(Giunipero and Eltantawy 2004; Hallikas et al. 2005), through
early supplier involvement (Zsidisin and Smith 2005), by
adopting business continuity planning as a formal risk
management technique (Zsidisin, Melnyk, and Ragatz 2005) and
by reducing supply base complexity (Choi and Krause 2006).
Most of the attention has been confined to the sourcing
decisions. First, some scholars determined the optimal num-
ber of suppliers in the presence of catastrophic risks (Berger,
Gerstenfeld, and Zeng 2004) or supplier failure risks
(Ruiz-Torres and Mahmoodi 2007). It was found that additional
suppliers are needed when the disaster loss increases
significantly (Berger, Gerstenfeld, and Zeng 2004) or the
suppliers become less reliable (Ruiz-Torres and Mahmoodi
2007). Second, some scholars evaluated single-, dual- or
multiple-sourcing strategies. There is a consensus that a dual-
sourcing strategy outperforms a single-sourcing one in the
presence of a supply disruption (Yu, Zeng, and Zhao 2009;
Li, Wang, and Cheng 2010; Xanthopoulos, Vlachos, and
Iakovou 2012). However, the benefits of multiple-sourcing
strategies are not significant. Costantino and Pellegrino (2010)
identified the probabilistic benefits of adopting the multi-
421. ple sourcing strategies in risky environments for a specific case.
Fang et al. (2013) demonstrated that the addition of a
third or more suppliers brings much less marginal benefits.
Third, a number of scholars determined the supplier selection
and order allocation to minimise supply risk using quantitative
methods, such as fuzzy multicriteria decision-making
model (Haleh and Hamidi 2011), newsvendor model (Giri
2011), unconstrained and constrained mathematical program-
ming models (Chopra, Reinhardt, and Mohan 2007; Gümüş,
Ray, and Gurnani 2012), stochastic linear programming
model (Keren 2009), multistage stochastic programming model
(Shi et al. 2011), mixed integer nonlinear programming
model (Meena and Sarmah 2013), stochastic mixed integer
programming approach (Sawik 2013a), mixed integer pro-
gramming model (Sawik 2013b) and fuzzy stochastic multi-
objective programming model (Wu et al. 2013). It was
found that the suppliers with high disruption probability or with
high prices are allocated the lowest fractions of the total
demand or are not selected at all (Sawik 2013a). Besides, the
cost of supplier has more influence on order allocation
than supplier’s failure probability (Meena and Sarmah 2013).
The following articles also focus on supply risk mitigation but
do not fall into the aforementioned subcategories,
such as evaluation and selection of the optimal disruption
422. management strategy (Tomlin 2006; Yang et al. 2009;
Colicchia, Dallari, and Melacini 2010; Schmitt 2011),
determination of the optimal inventory level or policies
(Schmitt,
Snyder, and Shen 2010; Glock and Ries 2013; Son and Orchard
2013), investigation of how managers mitigate global
sourcing risks (Christopher et al. 2011; Vedel. and Ellegaard
2013), risk and quality control of a supplier (Tapiero
2007), allocation of supplier development investments among
multiple suppliers (Talluri, Narasimhan, and Chung 2010),
analysis of the impact of strategic information acquisition and
sharing on supply risk mitigation (Wakolbinger and Cruz
2011), examination of the effectiveness of hybrid push–pull
strategy for supply risk mitigation (Kim et al. 2012) and
exploration of actions to proactively mitigate supplier
insolvency risk (Grötsch, Blome, and Schleper 2013).
There are limitations associated with some of the above articles.
Berger, Gerstenfeld, and Zeng (2004) assumed that
the probability of the unique event that brings down a particular
supplier is the same for all suppliers. Zsidisin and
Smith (2005) only conducted a single case study. Ruiz- Keren
(2009) studied a simple supply chain with two tiers in a
single period environment. Yang et al. (2009), Schmitt (2011),
Meena and Sarmah (2013) and Son and Orchard (2013)
423. assumed the demand to be deterministic. Yu, Zeng, and Zhao
(2009) assumed the supplier’s capacity to be infinite.
Talluri, Narasimhan, and Chung (2010) suggested that their
model is inappropriate for selecting new candidate suppliers
for supplier development. Christopher et al. (2011) only
considered the perspectives of the buying firm. Giri (2011) and
Xanthopoulos, Vlachos, and Iakovou (2012) considered a single
period and a single product in their studies. Glock and
Ries (2013) focused on homogeneous suppliers, which restricts
its applicability to industries with homogeneous mass
products. Grötsch, Blome, and Schleper (2013) conducted a
survey with comparatively small sample size. Sawik
(2013a) did not consider the quality of supplied parts. Vedel.
and Ellegaard (2013) analysed a limited set of in-depth
interviews in one industry.
6.1.3.5 Transportation risk mitigation. There is only one study
that we identified that relates to transportation risk mit-
igation. Hishamuddin, Sarker, and Essam (2013) formulated an
integer nonlinear programming model to determine the
optimal production and ordering quantities for the supplier and
retailer, as well as the duration for recovery subject to
transportation disruption, which yields the minimum relevant
costs of the system. Their results showed that the optimal
426. :2
9
27
M
ar
ch
2
01
6
recovery schedule is highly dependent on the relationship
between the backorder cost and the lost sales cost parameters.
They studied a simple two-tier supply chain with one supplier
and one retailer, and assumed the demand to be
deterministic.
6.1.3.6 Financial risk mitigation. Hofmann (2011) discussed the
concept of natural hedging in supply chains. They
found that natural hedging of currency and commodity price
427. fluctuations can reduce supply chain vulnerability.
Raghavan and Mishra (2011) constructed a nonlinear
programming model to show that if one of the firms in the
supply
chain has sufficiently low cash, a joint decision on the loan
amount is beneficial for the lender and the borrowing firms
than an independent decision. Lundin (2012) applied the
network flow modelling to mitigate the financial risks in the
cash supply chains. Their results showed that centralisation
from two to one central bank storage facilities led to unin-
tended increases in transportation costs and financial risk.
There are limitations associated with the above articles.
Hofmann (2011) used a brief literature review and a concep-
tual research design in their study. Raghavan and Mishra (2011)
considered a simple two-tier supply chain with one
manufacturer and one retailer. Lundin (2012) only considered
transportation and cash opportunity costs, while neglecting
production and warehousing costs.
6.1.3.7 Information risk mitigation. Du, Lee, and Chen (2003)
suggested companies to construct attribute correspon-
dence matrices for databases so that they can share data with
both upstream and downstream supply chain partners with-
out leaking information to competitors. They only considered
428. the vertical relationships of companies, while neglecting
the horizontal relationships of new partners. Le et al. (2013)
examined how data sharing has the potential to create risk
for enterprises in retail supply chain collaboration, and
proposed an association rule hiding algorithm to remove sensi-
tive knowledge from the released database, and minimise the
data distortion.
6.1.3.8 General risk mitigation. There exists a broad range of
researches focusing on general risk mitigation, and there
are two major categories. First, a number of scholars conducted
empirical research or developed quantitative methods to
investigate the effective ways of minimising supply chain risks.
Their results showed that supply chain risks can be
mitigated by increasing flexibility (Tang and Tomlin 2008;
Manuj and Mentzer 2008; Skipper and Hanna 2009; Yang
and Yang 2010; Chiu, Choi, and Li 2011; Talluri et al. 2013),
building collaborative relationships among supply chain
members (Faisal, Banwet, and Shankar 2006; Lavastre,
Gunasekaran, and Spalanzani 2012; Leat and Revoredo-Giha
2013; He 2013; Chen, Sohal, and Prajogo 2013), sharing
information in the supply chain (Christopher and Lee 2004;
Faisal, Banwet, and Shankar 2006), managing suppliers (Xia,
Ramachandran, and Gurnani 2011; Wagner and
Silveira-Camargos 2012), adopting co-opetition (Bakshi and
429. Kleindorfer 2009), increasing agility (Braunscheidel and
Suresh 2009), implementing corporate social responsibility
activities (Cruz 2009, 2013), understanding diverse organisa-
tion cultures (Dowty and Wallace 2010) and applying a new pull
system called the multi Kanban system for disassem-
bly (Nakashima and Gupta 2012).
Second, several scholars developed quantitative models or
framework to mitigate supply chain risks, such as a
so-called super network model that integrates global supply
chain networks with social networks (Cruz, Nagurney, and
Wakolbinger 2006), the Supply Chain Risk Structure Model and
the Supply Chain Risk Dynamics Model (Oehmen
et al. 2009), the house of risk that combines the QFD and FMEA
(Pujawan and Geraldin 2009), and a two-stage
stochastic integer programming model (Hahn and Kuhn 2012b).
There are limitations associated with some of the above articles
as well. Cruz, Nagurney, and Wakolbinger (2006)
assumed that the manufacturers are involved in the production
of a homogeneous product. Manuj and Mentzer (2008)
focused on internal stakeholders only. Tang and Tomlin (2006)
did not examine the benefits of a combination of
different flexibility strategies. Bakshi and Kleindorfer (2009)
and Chiu, Choi, and Li (2011) studied simple supply
430. chains with only one supplier and one retailer. Braunscheidel
and Suresh (2009) and Skipper and Hanna (2009) sur-
veyed a limited range of respondents. Xia, Ramachandran, and
Gurnani (2011) assumed exogenous wholesale prices.
Lavastre, Gunasekaran, and Spalanzani (2012) used simple
statistical tools (average and standard deviation). He (2013)
used the additive demand function instead of the multiplicative
demand model.
6.1.4 Risk monitoring
Comparatively, risk monitoring has attracted less attention in
the literature. Zhang et al. (2011) developed an integrated
abnormality diagnosis model, combining the fuzzy set theory
and the radial base function neural network, to provide
pre-warning signals of production quality in the food production
supply chain. Their simulation results showed that the
proposed pre-warning system can effectively identify abnormal
data types, and accurately determine whether a warning
5050 W. Ho et al.
D
ow
433. ar
ch
2
01
6
should be issued. The limitations are that the model was not
verified using real data and only quality risk was
considered.
6.2 Integrated SCRM processes
In addition to the research discussed in Section 6.1, several
researchers focused and studied integrated SCRM processes.
6.2.1 SCRM conceptual frameworks
A wide variety of qualitative and quantitative-based conceptual
frameworks have been proposed to deal with more than
one process of SCRM. Majority of these studies focused on two
434. SCRM processes, such as risk identification and assess-
ment (Peck 2005; Smith et al. 2007; Cheng and Kam 2008;
Wagner and Bode 2008), risk identification and mitigation
(Christopher and Peck 2004; Oke and Gopalakrishnan 2009) and
risk assessment and mitigation (Kleindorfer and Saad
2005; Blome and Schoenherr 2011; Giannakis and Louis 2011;
Speier et al. 2011; Hahn and Kuhn 2012a; Kumar and
Havey 2013).
Kern et al. (2012) found that superior risk identification
supports the subsequent risk assessment and this in turn
leads to better risk mitigation. As there is a significant
relationship between these three SCRM processes, more focus
should be confined to three instead of two processes. Some
researchers developed conceptual framework for the risk
identification, assessment and mitigation processes (Ritchie and
Brindley 2007; Foerstl et al. 2010; Bandaly et al. 2012;
Kern et al. 2012; Ghadge et al. 2013). The five major
components in their framework are risk identification, risk
assess-
ment, risk consequences, risk management response and risk
performance outcomes.
A common drawback of the above articles is due to the
conceptualisation of their frameworks. The frameworks were