Global supply chain risk
management strategies
Ila Manuj
Department of Marketing and Logistics, University of North Texas, Denton,
Texas, USA, and
John T. Mentzer
The University of Tennessee, Knoxville, Tennessee, USA
Abstract
Purpose – Global supply chains are more risky than domestic supply chains due to numerous links
interconnecting a wide network of firms. These links are prone to disruptions, bankruptcies,
breakdowns, macroeconomic and political changes, and disasters leading to higher risks and making
risk management difficult. The purpose of this paper is to explore the phenomenon of risk
management and risk management strategies in global supply chains.
Design/methodology/approach – This paper is based on an extensive literature review and a
qualitative study comprising 14 in-depth interviews and a focus group meeting with senior supply
chain executives.
Findings – The study provides insights into the applicability of six risk management strategies with
respect to environmental conditions and the role of three moderators.
Research limitations/implications – The model is developed in a global manufacturing supply
chain context. It should be tested in other contexts and with other methods to provide generalizability.
The study takes a much needed step toward building a theory of risk management in global supply
chains, which opens important future research directions.
Practical implications – This research provides direction to managers for choosing risk
management strategies based on the global supply chain environment. Moderators have practical
implications for global supply chain managers.
Originality/value – The paper addresses an identified gap in the literature for selecting risk
management strategies in global supply chains. It employs grounded theory, a methodology
appropriate for theory-building, to explore a phenomenon with an inadequate theoretical base.
Keywords Risk management, Supply chain management, International business
Paper type Research paper
Introduction
Global supply chains are a source of competitive advantage. Global configurations of
firms provide access to cheap labor and raw materials, better financing opportunities,
larger product markets, arbitrage opportunities, and additional inducements offered by
host governments to attract foreign capital (AlHashim, 1980; Kogut and Kulatilaka,
1994). However, coupled with these benefits that entice firms to go global are the
uncertainties and consequent risks that managers face in global supply chains. As
Barry (2004) argues, “An enterprise may have lowest over-all costs in a stable world
environment, but may also have the highest level of risk – if any one of the multiple
gating factors kink up an elongated global supply chain!”
There is wide acknowledgement in the literature of the risks and uncertainties in
global supply chains. Although risk management in multinational enterprises has been
The current issue and full text archive of this journal is a ...
Supply chain managementtheory, practice and futurechall.docxpicklesvalery
Supply chain management:
theory, practice and future
challenges
John Storey and Caroline Emberson
The Open University Business School, Milton Keynes, UK, and
Janet Godsell and Alan Harrison
Cranfield School of Management, Cranfield, UK
Abstract
Purpose – The purpose of this paper is to critically assess current developments in the theory and
practice of supply management and through such an assessment to identify barriers, possibilities and
key trends.
Design/methodology/approach – The paper is based on a three-year detailed study of six supply
chains which encompassed 72 companies in Europe. The focal firms in each instance were
sophisticated, blue-chip corporations operating on an international scale. Managers across at least four
echelons of the supply chain were interviewed and the supply chains were traced and observed.
Findings – The paper reveals that supply management is, at best, still emergent in terms of both theory
and practice. Few practitioners were able – or even seriously aspired – to extend their reach across the
supply chain in the manner prescribed in much modern theory. The paper identifies the range of key
barriers and enablers to supply management and it concludes with an assessment of the main trends.
Research limitations/implications – The research presents a number of challenges to existing
thinking about supply strategy and supply chain management. It reveals the substantial gaps between
theory and practice. A number of trends are identified which it is argued may work in favour of better
prospects for SCM in the future and for the future of supply management as a discipline.
Practical implications – A central challenge concerns who could or should manage the supply
chain. Barriers to effective supply management are identified and some practical steps to surmount
them are suggested.
Originality/value – The paper is original in the way in which it draws on an extensive systematic
study to critically assess current theory and current developments. The paper points the way for
theorists and practitioners to meet future challenges.
Keywords Supply chain management, Suppliers, Strategic management
Paper type Research paper
Introduction
“Supply management” can be viewed as both an emergent field of practice and an
emerging academic domain. Neither perspective is fully mature but each has
considerable promise. The future progress of each will be enhanced and indeed is
ultimately dependent upon the other. Hence, the purpose of this paper is to take stock
of developments in theory and practice to date and to identify barriers and possibilities.
Moreover, given the off-remarked acknowledgement of the crucial importance of the
behavioural and people dimension but the relative neglect of this in any substantive
form, we give special attention to this aspect. Supply (chain) management is ultimately
about influencing behaviour in particular directions and in particular ways. The
underlying logics, drivers, enablers an ...
Research noteAssessing and managing risks using the Supply.docxverad6
Research note
Assessing and managing risks using the Supply
Chain Risk Management Process (SCRMP)
Rao Tummala
Computer Information Systems Department, College of Business, Eastern Michigan University, Ypsilanti, Michigan, USA, and
Tobias Schoenherr
Department of Supply Chain Management, The Eli Broad Graduate School of Management, Michigan State University, East Lansing,
Michigan, USA
Abstract
Purpose – The purpose of this paper is to propose a comprehensive and coherent approach for managing risks in supply chains.
Design/methodology/approach – Building on Tummala et al.’s Risk Management Process (RMP), this paper develops a structured and ready-to-use
approach for managers to assess and manage risks in supply chains.
Findings – Supply chain risks can be managed more effectively when applying the Supply Chain Risk Management Process (SCRMP). The structured
approach can be divided into the phases of risk identification, risk measurement and risk assessment; risk evaluation, and risk mitigation and
contingency plans; and risk control and monitoring via data management systems. Specific techniques for conducting this process are suggested.
Originality/value – While supply chain risk management is an emerging and important topic in our dynamic and interconnected world, conceptual
frameworks providing a clear meaning and normative guidance are scarce (Manuj and Mentzer, 2008). This paper presents such a framework, offering
structure and decision support for managers.
Keywords Supply chain management, Risk management process, Supply chain risk, Risk management
Paper type Research paper
1. Supply chain risk management
At a time when global competition is intensifying and supply
chains are becoming longer and more complex, the likelihood
of not achieving the desired supply chain (SC) performance
increases, mainly due to the risk of SC failures. It is therefore
essential that companies plan for disruptions and develop
contingency plans as they design or redesign their supply
chains. Firms need to understand supply chain
interdependencies, identify potential risk factors, their
likelihood, consequences and severities. Risk management
action plans can then be developed to preferably avoid the
identified risks, or if not possible, at least mitigate, contain
and control them. The risk involved in supply chains, as well
as the impact severity of supply chain failures, has been
demonstrated recently by the recalls and subsequent lawsuits
for toy cars (Story, 2007) and pet food (FDA, 2008). While
risk may be associated with unacceptable products delivered
from upstream, it can also involve risks associated with the
environment, such as the impact of hurricanes Katrina and
Rita (Devlin, 2005), or the current hijackings and robberies of
vessels by pirates off the coast of Somalia (Peats, 2008).
The purpose of this paper is to introduce a structured and
systematic approach to enumerate SC risks, and to assess
their severity and l.
Identifying Structures in Social Conversations in NSCLC Patients through the ...IJERA Editor
The exploration of social conversations for addressing patient’s needs is an important analytical task in which
many scholarly publications are contributing to fill the knowledge gap in this area. The main difficulty remains
the inability to turn such contributions into pragmatic processes the pharmaceutical industry can leverage in
order to generate insight from social media data, which can be considered as one of the most challenging source
of information available today due to its sheer volume and noise. This study is based on the work by Scott
Spangler and Jeffrey Kreulen and applies it to identify structure in social media through the extraction of a
topical taxonomy able to capture the latent knowledge in social conversations in health-related sites. The
mechanism for automatically identifying and generating a taxonomy from social conversations is developed and
pressured tested using public data from media sites focused on the needs of cancer patients and their families.
Moreover, a novel method for generating the category’s label and the determination of an optimal number of
categories is presented which extends Scott and Jeffrey’s research in a meaningful way. We assume the reader is
familiar with taxonomies, what they are and how they are used.
Identifying Structures in Social Conversations in NSCLC Patients through the ...IJERA Editor
The exploration of social conversations for addressing patient’s needs is an important analytical task in which
many scholarly publications are contributing to fill the knowledge gap in this area. The main difficulty remains
the inability to turn such contributions into pragmatic processes the pharmaceutical industry can leverage in
order to generate insight from social media data, which can be considered as one of the most challenging source
of information available today due to its sheer volume and noise. This study is based on the work by Scott
Spangler and Jeffrey Kreulen and applies it to identify structure in social media through the extraction of a
topical taxonomy able to capture the latent knowledge in social conversations in health-related sites. The
mechanism for automatically identifying and generating a taxonomy from social conversations is developed and
pressured tested using public data from media sites focused on the needs of cancer patients and their families.
Moreover, a novel method for generating the category’s label and the determination of an optimal number of
categories is presented which extends Scott and Jeffrey’s research in a meaningful way. We assume the reader is
familiar with taxonomies, what they are and how they are used.
Sustainable supply chain
management: evolution and
future directions
Craig R. Carter
Arizona State University, Tempe, Arizona, USA, and
P. Liane Easton
Center for Logistics Management, University of Nevada, Reno, Nevada, USA
Abstract
Purpose – The purpose of this paper is to conduct a systematic review of the sustainable supply
chain management (SSCM) literature in the principal logistics and supply chain management journals,
across a 20-year time frame.
Design/methodology/approach – The authors use a systematic literature review methodology.
This methodology allows for the minimization of researcher bias and the maximization of reliability
and replicability. The study’s empirical validity is further enhanced by demonstrating high levels of
inter-coder reliability across families of codes.
Findings – The field of SSCM has evolved from a perspective and investigation of standalone
research in social and environmental areas; through a corporate social responsibility perspective; to
the beginnings of the convergence of perspectives of sustainability as the triple bottom line and the
emergence of SSCM as a theoretical framework. While the SSCM research has become more
theoretically rich and methodologically rigorous, there are numerous opportunities for further
advancing theory, methodology, and the managerial relevance of future inquiries.
Research limitations/implications – The trends and gaps identified through our analysis allow
us to develop a cogent agenda to guide future SSCM research.
Practical implications – The current perspectives of SSCM hold important implications for
managers, by directing limited resources toward projects which intersect environmental and/or social
performance, and economic performance.
Originality/value – The paper provides a systematic, rigorous, and methodologically valid review
of the evolution of empirical SSCM research across a 20-year time period.
Keywords Supply chain management, Economic sustainability, Social responsibility,
Environmental management, Economic performance
Paper type Literature review
Introduction
Sustainability has become a huge buzzword, both in today’s business world and
within the broader facets of society. It is difficult, for example, to walk by a newsstand
without seeing at least one magazine cover featuring alternative sources of energy,
climate change issues, or the iconic polar bear floating on a thin sheet of ice. There are a
number of drivers for this rising prominence of sustainability, including supply and
demand characteristics surrounding energy consumption, an increased understanding
of the science relating to climate change, and greater transparency concerning both the
environmental and the social actions of organizations.
These issues are relevant to managers, because their stakeholders – customers,
regulatory bodies, non-governmental organizations, and even their own employees – are
The current issue and full text archive of this journal is available at
w.
Supply chain managementtheory, practice and futurechall.docxpicklesvalery
Supply chain management:
theory, practice and future
challenges
John Storey and Caroline Emberson
The Open University Business School, Milton Keynes, UK, and
Janet Godsell and Alan Harrison
Cranfield School of Management, Cranfield, UK
Abstract
Purpose – The purpose of this paper is to critically assess current developments in the theory and
practice of supply management and through such an assessment to identify barriers, possibilities and
key trends.
Design/methodology/approach – The paper is based on a three-year detailed study of six supply
chains which encompassed 72 companies in Europe. The focal firms in each instance were
sophisticated, blue-chip corporations operating on an international scale. Managers across at least four
echelons of the supply chain were interviewed and the supply chains were traced and observed.
Findings – The paper reveals that supply management is, at best, still emergent in terms of both theory
and practice. Few practitioners were able – or even seriously aspired – to extend their reach across the
supply chain in the manner prescribed in much modern theory. The paper identifies the range of key
barriers and enablers to supply management and it concludes with an assessment of the main trends.
Research limitations/implications – The research presents a number of challenges to existing
thinking about supply strategy and supply chain management. It reveals the substantial gaps between
theory and practice. A number of trends are identified which it is argued may work in favour of better
prospects for SCM in the future and for the future of supply management as a discipline.
Practical implications – A central challenge concerns who could or should manage the supply
chain. Barriers to effective supply management are identified and some practical steps to surmount
them are suggested.
Originality/value – The paper is original in the way in which it draws on an extensive systematic
study to critically assess current theory and current developments. The paper points the way for
theorists and practitioners to meet future challenges.
Keywords Supply chain management, Suppliers, Strategic management
Paper type Research paper
Introduction
“Supply management” can be viewed as both an emergent field of practice and an
emerging academic domain. Neither perspective is fully mature but each has
considerable promise. The future progress of each will be enhanced and indeed is
ultimately dependent upon the other. Hence, the purpose of this paper is to take stock
of developments in theory and practice to date and to identify barriers and possibilities.
Moreover, given the off-remarked acknowledgement of the crucial importance of the
behavioural and people dimension but the relative neglect of this in any substantive
form, we give special attention to this aspect. Supply (chain) management is ultimately
about influencing behaviour in particular directions and in particular ways. The
underlying logics, drivers, enablers an ...
Research noteAssessing and managing risks using the Supply.docxverad6
Research note
Assessing and managing risks using the Supply
Chain Risk Management Process (SCRMP)
Rao Tummala
Computer Information Systems Department, College of Business, Eastern Michigan University, Ypsilanti, Michigan, USA, and
Tobias Schoenherr
Department of Supply Chain Management, The Eli Broad Graduate School of Management, Michigan State University, East Lansing,
Michigan, USA
Abstract
Purpose – The purpose of this paper is to propose a comprehensive and coherent approach for managing risks in supply chains.
Design/methodology/approach – Building on Tummala et al.’s Risk Management Process (RMP), this paper develops a structured and ready-to-use
approach for managers to assess and manage risks in supply chains.
Findings – Supply chain risks can be managed more effectively when applying the Supply Chain Risk Management Process (SCRMP). The structured
approach can be divided into the phases of risk identification, risk measurement and risk assessment; risk evaluation, and risk mitigation and
contingency plans; and risk control and monitoring via data management systems. Specific techniques for conducting this process are suggested.
Originality/value – While supply chain risk management is an emerging and important topic in our dynamic and interconnected world, conceptual
frameworks providing a clear meaning and normative guidance are scarce (Manuj and Mentzer, 2008). This paper presents such a framework, offering
structure and decision support for managers.
Keywords Supply chain management, Risk management process, Supply chain risk, Risk management
Paper type Research paper
1. Supply chain risk management
At a time when global competition is intensifying and supply
chains are becoming longer and more complex, the likelihood
of not achieving the desired supply chain (SC) performance
increases, mainly due to the risk of SC failures. It is therefore
essential that companies plan for disruptions and develop
contingency plans as they design or redesign their supply
chains. Firms need to understand supply chain
interdependencies, identify potential risk factors, their
likelihood, consequences and severities. Risk management
action plans can then be developed to preferably avoid the
identified risks, or if not possible, at least mitigate, contain
and control them. The risk involved in supply chains, as well
as the impact severity of supply chain failures, has been
demonstrated recently by the recalls and subsequent lawsuits
for toy cars (Story, 2007) and pet food (FDA, 2008). While
risk may be associated with unacceptable products delivered
from upstream, it can also involve risks associated with the
environment, such as the impact of hurricanes Katrina and
Rita (Devlin, 2005), or the current hijackings and robberies of
vessels by pirates off the coast of Somalia (Peats, 2008).
The purpose of this paper is to introduce a structured and
systematic approach to enumerate SC risks, and to assess
their severity and l.
Identifying Structures in Social Conversations in NSCLC Patients through the ...IJERA Editor
The exploration of social conversations for addressing patient’s needs is an important analytical task in which
many scholarly publications are contributing to fill the knowledge gap in this area. The main difficulty remains
the inability to turn such contributions into pragmatic processes the pharmaceutical industry can leverage in
order to generate insight from social media data, which can be considered as one of the most challenging source
of information available today due to its sheer volume and noise. This study is based on the work by Scott
Spangler and Jeffrey Kreulen and applies it to identify structure in social media through the extraction of a
topical taxonomy able to capture the latent knowledge in social conversations in health-related sites. The
mechanism for automatically identifying and generating a taxonomy from social conversations is developed and
pressured tested using public data from media sites focused on the needs of cancer patients and their families.
Moreover, a novel method for generating the category’s label and the determination of an optimal number of
categories is presented which extends Scott and Jeffrey’s research in a meaningful way. We assume the reader is
familiar with taxonomies, what they are and how they are used.
Identifying Structures in Social Conversations in NSCLC Patients through the ...IJERA Editor
The exploration of social conversations for addressing patient’s needs is an important analytical task in which
many scholarly publications are contributing to fill the knowledge gap in this area. The main difficulty remains
the inability to turn such contributions into pragmatic processes the pharmaceutical industry can leverage in
order to generate insight from social media data, which can be considered as one of the most challenging source
of information available today due to its sheer volume and noise. This study is based on the work by Scott
Spangler and Jeffrey Kreulen and applies it to identify structure in social media through the extraction of a
topical taxonomy able to capture the latent knowledge in social conversations in health-related sites. The
mechanism for automatically identifying and generating a taxonomy from social conversations is developed and
pressured tested using public data from media sites focused on the needs of cancer patients and their families.
Moreover, a novel method for generating the category’s label and the determination of an optimal number of
categories is presented which extends Scott and Jeffrey’s research in a meaningful way. We assume the reader is
familiar with taxonomies, what they are and how they are used.
Sustainable supply chain
management: evolution and
future directions
Craig R. Carter
Arizona State University, Tempe, Arizona, USA, and
P. Liane Easton
Center for Logistics Management, University of Nevada, Reno, Nevada, USA
Abstract
Purpose – The purpose of this paper is to conduct a systematic review of the sustainable supply
chain management (SSCM) literature in the principal logistics and supply chain management journals,
across a 20-year time frame.
Design/methodology/approach – The authors use a systematic literature review methodology.
This methodology allows for the minimization of researcher bias and the maximization of reliability
and replicability. The study’s empirical validity is further enhanced by demonstrating high levels of
inter-coder reliability across families of codes.
Findings – The field of SSCM has evolved from a perspective and investigation of standalone
research in social and environmental areas; through a corporate social responsibility perspective; to
the beginnings of the convergence of perspectives of sustainability as the triple bottom line and the
emergence of SSCM as a theoretical framework. While the SSCM research has become more
theoretically rich and methodologically rigorous, there are numerous opportunities for further
advancing theory, methodology, and the managerial relevance of future inquiries.
Research limitations/implications – The trends and gaps identified through our analysis allow
us to develop a cogent agenda to guide future SSCM research.
Practical implications – The current perspectives of SSCM hold important implications for
managers, by directing limited resources toward projects which intersect environmental and/or social
performance, and economic performance.
Originality/value – The paper provides a systematic, rigorous, and methodologically valid review
of the evolution of empirical SSCM research across a 20-year time period.
Keywords Supply chain management, Economic sustainability, Social responsibility,
Environmental management, Economic performance
Paper type Literature review
Introduction
Sustainability has become a huge buzzword, both in today’s business world and
within the broader facets of society. It is difficult, for example, to walk by a newsstand
without seeing at least one magazine cover featuring alternative sources of energy,
climate change issues, or the iconic polar bear floating on a thin sheet of ice. There are a
number of drivers for this rising prominence of sustainability, including supply and
demand characteristics surrounding energy consumption, an increased understanding
of the science relating to climate change, and greater transparency concerning both the
environmental and the social actions of organizations.
These issues are relevant to managers, because their stakeholders – customers,
regulatory bodies, non-governmental organizations, and even their own employees – are
The current issue and full text archive of this journal is available at
w.
Operation Management Strategies 1
LITERATURE REVIEW 7
Literature Reviewin Operation Management Strategies
Qualitative cases in operation management
The study inspects the condition of subjective research endeavors in operation administration. Five fundamental operation administration diaries are incorporated for their effect on the field. The subjective detailed analyzes picked were distributed somewhere around 1993 and 2008. With an expanding pattern to utilizing more subjective research endeavors, there have been significant and huge commitments to the operation administration department, particularly in the territory of hypothesis building.
In a significant number of the subjective detailed analyzes they explored, sufficient points of interest in research outline, information accumulation, and information investigation were absent. For example, there are studies that don't offer examining rationale or a portrayal of the investigation through which research draws results. Further, researches conventions for doing inductive detailed analyze are much better created contrasted with the research conventions for doing deductive careful investigations. Thusly, there is an absence of reliability in how the case technique has been connected. As subjective researchers, they offer recommendations on how we can enhance what have been done and raise the level of thoroughness and consistency (Mei, 2011).
Buyer perceptions of supply disruption risk
Scott argues that as supply chains get to be more minds boggling, firms face expanding dangers of supply interruptions. The process through which purchasers settle on decisions notwithstanding these dangers, nonetheless, has not been investigated. In spite of research highlighting the criticalness of behavioral methodologies to risk, there is restricted research that applies these perspectives of danger in the supply chain writing. This paper addresses this crevice by drawing on behavioral danger hypothesis to examine the causal connections among circumstance, representations of danger, and choice making inside the buying area.
They investigate the relationship between greatness of supply disturbance, likelihood of supply interruption, and general supply disturbance risk. Furthermore, they attract on trade hypotheses to distinguish item and business sector figures that effect purchasers' impression of the likelihood and extent of supply interruption. At last, they take a gander at how representations of danger influence the choice to look for options wellsprings of supply. The model was tested utilizing information gathered from 223 obtaining administrators and purchasers of immediate materials. The results demonstrate that both the likelihood and the size of supply disturbance are paramount to purchasers' general view of supply interruption risk (Ellis, 2010).
Examining supply chain relationships
Gilbert finds out that firm.
IHP 525 Milestone Five (Final) TemplateMOST OF THIS TEMPLATE S.docxwilcockiris
IHP 525 Milestone Five (Final) Template
MOST OF THIS TEMPLATE SHOULD BE COPIED AND PASTED FROM PRIOR MILESTONES IF YOU RECEIVED FULL CREDIT FOR THOSE ELEMENTS.
DO NOT DELETE ANYTHING IN THIS TEMPLATE.
Student Name:
State the question you will pursue. (This should be copied and pasted from the list of questions and should be the same question submitted in week 7 unless you have changed your question.)
Question of interest (Copy and Paste question here):
Restate this question in your own words:
Directions for following table:
· Fill out the table below for EACH variable of interest.
· Include ONLY the variables that are relevant to your question of interest. (If it’s not mentioned in your question directly, it’s not relevant.)
· Each variable should take up ONE row.
Variable name (one variable per row)
Note: gender is a variable, and 0 and 1 are values of the variable gender. Gender =0 and gender =1 are NOT two separate variables.
Variable type (categorical, ordinal, or quantitative, etc.)
Descriptive statistics
Include:
· the statistic names (the mean, median, range, and standard deviation, at minimum)
· final calculations (e.g., mean = 10)
· an explanation/definition of each statistic used (what each statistic SAYS about the data)
*Do not subdivide the data for the variable in each row based on any other variable. For example, do NOT find the mean length of stay separately for males and females.
**The above statistics can be found for binary variables. (For example, gender is coded as binary; therefore, the above descriptive statistics can be found for the variable gender.)
Key features
· Histogram symmetric?
· Histogram bell shaped?
· Any outliers?
· Skew?
· Unimodal?
· Any other special features?
DO NOT list or discuss descriptive statistics in this space. Use the table above, as directed.
Analyze the limitations of the data set you were provided and how those limitations might affect your findings.
Limit your response to the data relevant to your question of interest. (For example, only using two variables is NOT a limitation of the data in your question of interest. It may be a limitation of the study or question of interest, but it is NOT a limitation of the data you have been provided for your question of interest.)
Limitations:
Provide ONE graph that is useful in explaining your results.
You may copy and paste this from another program, take a screen shot, etc.
LABEL EVERYTHING!!!
Explain why you chose this graph above any others to explain the situation.
What test/analysis technique did you perform?
(It is highly recommended that you perform ONLY ONE test or technique. Some examples include a t-test, regression, etc.)
There is a hypothesis test associated with your test/technique (even if you are not doing a t-test).
What is your null hypothesis?
What is your alternative hypothesis?
Provide all relevant calculations for your hypothesis test/ statistical technique.
Make sure your final ans.
Relationships among Supplier Selection Criteria using Interpretive Structural...inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Week 6 - Final Project Psychological Treatment Plan It is reco.docxcockekeshia
Week 6 - Final Project
Psychological Treatment Plan
It is recommended that students review the e-book The Complete Adult Psychotherapy Treatment Planner (Jongsma, Peterson, & Bruce, 2014) for additional assistance in completing this assignment.
Clinical and counseling psychologists utilize treatment plans to document a client’s progress toward short- and long-term goals. The content within psychological treatment plans varies depending on the clinical setting. The clinician’s theoretical orientation, evidenced-based practices, and the client’s needs are taken into account when developing and implementing a treatment plan. Typically, the client’s presenting problem(s), behaviorally defined symptom(s), goals, objectives, and interventions determined by the clinician are included within a treatment plan.
To understand the treatment planning process, students will assume the role of a clinical or counseling psychologist and develop a comprehensive treatment plan based on the same case study utilized for the Psychiatric Diagnosis assignment in PSY645. A minimum of five peer-reviewed resources must be used to support the recommendations made within the plan. The Psychological Treatment Plan must include the headings and content outlined below.
Behaviorally Defined Symptoms
· Define the client’s presenting problem(s) and provide a diagnostic impression.
· Identify how the problem(s) is/are evidenced in the client’s behavior.
· List the client’s cognitive and behavioral symptoms.
Long-Term Goal
· Generate a long-term treatment goal that represents the desired outcome for the client.
· This goal should be broad and does not need to be measurable.
Short-Term Objectives
· Generate a minimum of three short-term objectives for attaining the long-term goal.
· Each objective should be stated in behaviorally measurable language. Subjective or vague objectives are not acceptable. For example, it should be stated that the objective will be accomplished by a specific date or that a specific symptom will be reduced by a certain percentage.
Interventions
· Identify at least one intervention for achieving each of the short-term objectives.
· Compare a minimum of three evidence-based theoretical orientations from which appropriate interventions can be selected for the client.
· Explain the connection between the theoretical orientation and corresponding intervention selected.
· Provide a rationale for the integration of multiple theoretical orientations within this treatment plan.
· Identify two to three treatment modalities (e.g., individual, couple, family, group, etc.) that would be appropriate for use with the client.
It is a best practice to include outside providers (e.g., psychiatrists, medical doctors, nutritionists, social workers, holistic practitioners, etc.) in the intervention planning process to build a support network that will assist the client in the achievement of treatment goals.
Evaluation
· List the anticipated outcomes of each proposed t.
This methodological guidance article discusses the elements of a high-quality meta-analysis that is conducted within the context of a systematic review.
Meta-analysis, a set of statistical techniques for synthesizing the results of
multiple studies, is used when the guiding research question focuses on a
quantitative summary of study results. In this guidance article, we discuss the
systematic review methods that support high-quality meta-analyses and outline best practice meta-analysis methods for describing the distribution of
effect sizes in a set of eligible studies. We also provide suggestions for transparently reporting the methods and results of meta-analyses to influence
practice and policy. Given the increasing use of meta-analysis for important
policy decisions, the methods and results of meta-analysis should be both
transparent and reproducible.
Keywords: meta-analysis, systematic review
Fuzzy AHP and Fuzzy TOPSIS as an effective and powerful Multi-Criteria Decisi...nitinrane33
This research suggests a robust and effective selection process that involves subjective judgments by applying two fuzzy-based multi-criteria decision-making methods, namely the Fuzzy Analytic Hierarchy Process (Fuzzy AHP) and the Fuzzy Technique for Order Preference by Similarity to Ideal Solution (Fuzzy TOPSIS). These methods incorporate fuzzy set theory into traditional AHP and TOPSIS methods to handle uncertain criteria weights and evaluation scores. The Fuzzy AHP and Fuzzy TOPSIS techniques are particularly appropriate for selection processes that involve subjective evaluations and uncertainty. These methods are well-equipped to handle imprecise and uncertain information and can effectively deal with the complexity of multi-criteria decision-making problems. One of the significant advantages of these methods is their capacity to address both quantitative and qualitative criteria. By utilizing fuzzy set theory, these methods can integrate subjective criteria and expert judgments that may not be expressed in numerical values. Additionally, the Fuzzy AHP and Fuzzy TOPSIS approaches provide a methodical and structured approach to decision-making that guarantees consistency and transparency. This article offers a comprehensive theoretical framework of the Fuzzy AHP and Fuzzy TOPSIS methods and presents their application in selecting the best candidate for a job position. The findings indicate that this approach is valuable in handling subjective judgments and produces consistent and dependable outcomes. The article concludes by discussing the method's benefits and drawbacks and highlighting areas for future research.
Making the Business & Economic Case for Safer ChemistrySustainable Brands
The American Sustainable Business Council (ASBC) and the Green Chemistry & Commerce Council (GC3) engaged Trucost to evaluate the potential business
and economic value of “safer chemistry”—which can include reducing the use and generation of hazardous substances, reducing the human health and
environmental impacts of processes and products, and creating safer products. The research included interviews with 17 industry experts, as well as a review
of literature and available data on the business and economic opportunities achievable through safer chemistry and the business and economic value at risk
from not adopting safer chemistry.
Compared with general commercial reverse logistics operators, the recovery and treatment of expired drugs and medical waste is a complex and highly technically difficult project. The qualifications required by the relevant service providers are also more stringent. For medical institutions, the selection of reverse logistics operators is always a critical issue. On the perspective of sustainability, this paper aims to investigate and explore the critical factors of selecting a medical reverse logistics service provider. Through the process of the Delphi method, the experts’ assessments were collected, and 24 factors affecting the selection of medical reverse logistics service provider were screened and summarized. Then, Decision-Making Trial and Evaluation Laboratory (DEMATEL) was employed to calculate the total influence values and net influence values between factors that could be used to draw the visual causal map. Referring the causal map, “Green process operation level” and “Recycling process greening degree” are significantly higher than other factors in terms of total influence value and net influence value. Therefore, they can be regarded as crucial factors. This finding implies that medical reverse logistics providers must have the ability to improve the greening of facilities, as well as equipment, integrating existing processes to make it greener and environmentally friendly.
Database reports provide us with the ability to further analyze ou.docxwhittemorelucilla
Database reports provide us with the ability to further analyze our data, and provide it in a format that can be used to make business decisions. Discuss the steps that you would take to ensure that we create an effective report. What questions would you ask of the users?
Data presentation should be designed to display correct conclusions. What issues should we think about as we prepare data for presentation? Discuss the different methods that we can use to present data in a report. What role does the audience play in selecting how we present the data?
1 PAGE AND A HALF
.
DataInformationKnowledge1. Discuss the relationship between.docxwhittemorelucilla
Data/Information/Knowledge
1. Discuss the relationship between data, information, and knowledge. Support your discussion with at least 3 academically reviewed articles.
2. Why do organization have information deficiency problem? Suggest ways on how to overcome information deficiency problem.
.
More Related Content
Similar to Global supply chain riskmanagement strategiesIla Manuj.docx
Operation Management Strategies 1
LITERATURE REVIEW 7
Literature Reviewin Operation Management Strategies
Qualitative cases in operation management
The study inspects the condition of subjective research endeavors in operation administration. Five fundamental operation administration diaries are incorporated for their effect on the field. The subjective detailed analyzes picked were distributed somewhere around 1993 and 2008. With an expanding pattern to utilizing more subjective research endeavors, there have been significant and huge commitments to the operation administration department, particularly in the territory of hypothesis building.
In a significant number of the subjective detailed analyzes they explored, sufficient points of interest in research outline, information accumulation, and information investigation were absent. For example, there are studies that don't offer examining rationale or a portrayal of the investigation through which research draws results. Further, researches conventions for doing inductive detailed analyze are much better created contrasted with the research conventions for doing deductive careful investigations. Thusly, there is an absence of reliability in how the case technique has been connected. As subjective researchers, they offer recommendations on how we can enhance what have been done and raise the level of thoroughness and consistency (Mei, 2011).
Buyer perceptions of supply disruption risk
Scott argues that as supply chains get to be more minds boggling, firms face expanding dangers of supply interruptions. The process through which purchasers settle on decisions notwithstanding these dangers, nonetheless, has not been investigated. In spite of research highlighting the criticalness of behavioral methodologies to risk, there is restricted research that applies these perspectives of danger in the supply chain writing. This paper addresses this crevice by drawing on behavioral danger hypothesis to examine the causal connections among circumstance, representations of danger, and choice making inside the buying area.
They investigate the relationship between greatness of supply disturbance, likelihood of supply interruption, and general supply disturbance risk. Furthermore, they attract on trade hypotheses to distinguish item and business sector figures that effect purchasers' impression of the likelihood and extent of supply interruption. At last, they take a gander at how representations of danger influence the choice to look for options wellsprings of supply. The model was tested utilizing information gathered from 223 obtaining administrators and purchasers of immediate materials. The results demonstrate that both the likelihood and the size of supply disturbance are paramount to purchasers' general view of supply interruption risk (Ellis, 2010).
Examining supply chain relationships
Gilbert finds out that firm.
IHP 525 Milestone Five (Final) TemplateMOST OF THIS TEMPLATE S.docxwilcockiris
IHP 525 Milestone Five (Final) Template
MOST OF THIS TEMPLATE SHOULD BE COPIED AND PASTED FROM PRIOR MILESTONES IF YOU RECEIVED FULL CREDIT FOR THOSE ELEMENTS.
DO NOT DELETE ANYTHING IN THIS TEMPLATE.
Student Name:
State the question you will pursue. (This should be copied and pasted from the list of questions and should be the same question submitted in week 7 unless you have changed your question.)
Question of interest (Copy and Paste question here):
Restate this question in your own words:
Directions for following table:
· Fill out the table below for EACH variable of interest.
· Include ONLY the variables that are relevant to your question of interest. (If it’s not mentioned in your question directly, it’s not relevant.)
· Each variable should take up ONE row.
Variable name (one variable per row)
Note: gender is a variable, and 0 and 1 are values of the variable gender. Gender =0 and gender =1 are NOT two separate variables.
Variable type (categorical, ordinal, or quantitative, etc.)
Descriptive statistics
Include:
· the statistic names (the mean, median, range, and standard deviation, at minimum)
· final calculations (e.g., mean = 10)
· an explanation/definition of each statistic used (what each statistic SAYS about the data)
*Do not subdivide the data for the variable in each row based on any other variable. For example, do NOT find the mean length of stay separately for males and females.
**The above statistics can be found for binary variables. (For example, gender is coded as binary; therefore, the above descriptive statistics can be found for the variable gender.)
Key features
· Histogram symmetric?
· Histogram bell shaped?
· Any outliers?
· Skew?
· Unimodal?
· Any other special features?
DO NOT list or discuss descriptive statistics in this space. Use the table above, as directed.
Analyze the limitations of the data set you were provided and how those limitations might affect your findings.
Limit your response to the data relevant to your question of interest. (For example, only using two variables is NOT a limitation of the data in your question of interest. It may be a limitation of the study or question of interest, but it is NOT a limitation of the data you have been provided for your question of interest.)
Limitations:
Provide ONE graph that is useful in explaining your results.
You may copy and paste this from another program, take a screen shot, etc.
LABEL EVERYTHING!!!
Explain why you chose this graph above any others to explain the situation.
What test/analysis technique did you perform?
(It is highly recommended that you perform ONLY ONE test or technique. Some examples include a t-test, regression, etc.)
There is a hypothesis test associated with your test/technique (even if you are not doing a t-test).
What is your null hypothesis?
What is your alternative hypothesis?
Provide all relevant calculations for your hypothesis test/ statistical technique.
Make sure your final ans.
Relationships among Supplier Selection Criteria using Interpretive Structural...inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Week 6 - Final Project Psychological Treatment Plan It is reco.docxcockekeshia
Week 6 - Final Project
Psychological Treatment Plan
It is recommended that students review the e-book The Complete Adult Psychotherapy Treatment Planner (Jongsma, Peterson, & Bruce, 2014) for additional assistance in completing this assignment.
Clinical and counseling psychologists utilize treatment plans to document a client’s progress toward short- and long-term goals. The content within psychological treatment plans varies depending on the clinical setting. The clinician’s theoretical orientation, evidenced-based practices, and the client’s needs are taken into account when developing and implementing a treatment plan. Typically, the client’s presenting problem(s), behaviorally defined symptom(s), goals, objectives, and interventions determined by the clinician are included within a treatment plan.
To understand the treatment planning process, students will assume the role of a clinical or counseling psychologist and develop a comprehensive treatment plan based on the same case study utilized for the Psychiatric Diagnosis assignment in PSY645. A minimum of five peer-reviewed resources must be used to support the recommendations made within the plan. The Psychological Treatment Plan must include the headings and content outlined below.
Behaviorally Defined Symptoms
· Define the client’s presenting problem(s) and provide a diagnostic impression.
· Identify how the problem(s) is/are evidenced in the client’s behavior.
· List the client’s cognitive and behavioral symptoms.
Long-Term Goal
· Generate a long-term treatment goal that represents the desired outcome for the client.
· This goal should be broad and does not need to be measurable.
Short-Term Objectives
· Generate a minimum of three short-term objectives for attaining the long-term goal.
· Each objective should be stated in behaviorally measurable language. Subjective or vague objectives are not acceptable. For example, it should be stated that the objective will be accomplished by a specific date or that a specific symptom will be reduced by a certain percentage.
Interventions
· Identify at least one intervention for achieving each of the short-term objectives.
· Compare a minimum of three evidence-based theoretical orientations from which appropriate interventions can be selected for the client.
· Explain the connection between the theoretical orientation and corresponding intervention selected.
· Provide a rationale for the integration of multiple theoretical orientations within this treatment plan.
· Identify two to three treatment modalities (e.g., individual, couple, family, group, etc.) that would be appropriate for use with the client.
It is a best practice to include outside providers (e.g., psychiatrists, medical doctors, nutritionists, social workers, holistic practitioners, etc.) in the intervention planning process to build a support network that will assist the client in the achievement of treatment goals.
Evaluation
· List the anticipated outcomes of each proposed t.
This methodological guidance article discusses the elements of a high-quality meta-analysis that is conducted within the context of a systematic review.
Meta-analysis, a set of statistical techniques for synthesizing the results of
multiple studies, is used when the guiding research question focuses on a
quantitative summary of study results. In this guidance article, we discuss the
systematic review methods that support high-quality meta-analyses and outline best practice meta-analysis methods for describing the distribution of
effect sizes in a set of eligible studies. We also provide suggestions for transparently reporting the methods and results of meta-analyses to influence
practice and policy. Given the increasing use of meta-analysis for important
policy decisions, the methods and results of meta-analysis should be both
transparent and reproducible.
Keywords: meta-analysis, systematic review
Fuzzy AHP and Fuzzy TOPSIS as an effective and powerful Multi-Criteria Decisi...nitinrane33
This research suggests a robust and effective selection process that involves subjective judgments by applying two fuzzy-based multi-criteria decision-making methods, namely the Fuzzy Analytic Hierarchy Process (Fuzzy AHP) and the Fuzzy Technique for Order Preference by Similarity to Ideal Solution (Fuzzy TOPSIS). These methods incorporate fuzzy set theory into traditional AHP and TOPSIS methods to handle uncertain criteria weights and evaluation scores. The Fuzzy AHP and Fuzzy TOPSIS techniques are particularly appropriate for selection processes that involve subjective evaluations and uncertainty. These methods are well-equipped to handle imprecise and uncertain information and can effectively deal with the complexity of multi-criteria decision-making problems. One of the significant advantages of these methods is their capacity to address both quantitative and qualitative criteria. By utilizing fuzzy set theory, these methods can integrate subjective criteria and expert judgments that may not be expressed in numerical values. Additionally, the Fuzzy AHP and Fuzzy TOPSIS approaches provide a methodical and structured approach to decision-making that guarantees consistency and transparency. This article offers a comprehensive theoretical framework of the Fuzzy AHP and Fuzzy TOPSIS methods and presents their application in selecting the best candidate for a job position. The findings indicate that this approach is valuable in handling subjective judgments and produces consistent and dependable outcomes. The article concludes by discussing the method's benefits and drawbacks and highlighting areas for future research.
Making the Business & Economic Case for Safer ChemistrySustainable Brands
The American Sustainable Business Council (ASBC) and the Green Chemistry & Commerce Council (GC3) engaged Trucost to evaluate the potential business
and economic value of “safer chemistry”—which can include reducing the use and generation of hazardous substances, reducing the human health and
environmental impacts of processes and products, and creating safer products. The research included interviews with 17 industry experts, as well as a review
of literature and available data on the business and economic opportunities achievable through safer chemistry and the business and economic value at risk
from not adopting safer chemistry.
Compared with general commercial reverse logistics operators, the recovery and treatment of expired drugs and medical waste is a complex and highly technically difficult project. The qualifications required by the relevant service providers are also more stringent. For medical institutions, the selection of reverse logistics operators is always a critical issue. On the perspective of sustainability, this paper aims to investigate and explore the critical factors of selecting a medical reverse logistics service provider. Through the process of the Delphi method, the experts’ assessments were collected, and 24 factors affecting the selection of medical reverse logistics service provider were screened and summarized. Then, Decision-Making Trial and Evaluation Laboratory (DEMATEL) was employed to calculate the total influence values and net influence values between factors that could be used to draw the visual causal map. Referring the causal map, “Green process operation level” and “Recycling process greening degree” are significantly higher than other factors in terms of total influence value and net influence value. Therefore, they can be regarded as crucial factors. This finding implies that medical reverse logistics providers must have the ability to improve the greening of facilities, as well as equipment, integrating existing processes to make it greener and environmentally friendly.
Database reports provide us with the ability to further analyze ou.docxwhittemorelucilla
Database reports provide us with the ability to further analyze our data, and provide it in a format that can be used to make business decisions. Discuss the steps that you would take to ensure that we create an effective report. What questions would you ask of the users?
Data presentation should be designed to display correct conclusions. What issues should we think about as we prepare data for presentation? Discuss the different methods that we can use to present data in a report. What role does the audience play in selecting how we present the data?
1 PAGE AND A HALF
.
DataInformationKnowledge1. Discuss the relationship between.docxwhittemorelucilla
Data/Information/Knowledge
1. Discuss the relationship between data, information, and knowledge. Support your discussion with at least 3 academically reviewed articles.
2. Why do organization have information deficiency problem? Suggest ways on how to overcome information deficiency problem.
.
DataHole 12 Score67575554555554555757756555656565556556565565666434686664656566664555575656546555557554556655655465555565546555655467555646457664545665556555644554585456546654565546664566665566666675675665665656766555565486555567676645645575555575665455554655556556575555555455654555655666667665654655556657656558536666536755465655455755755666665545656565655555545545666564656443545655646445567547565654565545565676456544455446455755645655665567565554465466665
State Legislatures
(Part I)
POLS 2212
Legislatures, Policy-Making, and Political Science
• Legislative process is only one part of policy-making
• States are better venue for understanding policy-making
process overall
• Interactions between components are more transparent
• Less ‘political theater’ than national level
• More cases, more variation, more data
• What role do legislatures play in the overall policy-making
process??
• How do legislative-executive relations affect policy outcomes??
Agenda Setting
Formulation /
Negotiation
Adoption /
Enactment
Implementation
Evaluation
Revision /
Termination
• Public attention is focused on an issue
• Collective recognition of problem
Agenda Setting
• Potential solutions are offered
• Some public discourse over options
Formulation / Negotiation
•
Solution
is agreed upon and made into official policy /
law
Adoption / Enactment
• Policy is converted into actionable rules
Implementation
• Fairness, effectiveness, efficiency of policy and rules are
evaluated
Evaluation
• Improvements or changes to policy are made
Revision / Termination
Agenda Setting
• Parties
• Public opinion
• Advocacy groups /
entrepreneurs
Formulation /
Negotiation
• Party leadership
• Interest groups
• Legislature type
• Legislative-executive
relations
Adoption / Enactment
• Legislative-executive
relations
Implementation
• Type of executive
• Bureaucracy
Evaluation
• Social scientists
• Advocacy groups
• Legislative
committees
• State courts
Revision / Termination
• State courts
• Federal courts
‘Professional’
Model
‘Citizen-
Legislator’
Model
Work Load
Nearly full-
time
Part-time
Session
Year-round,
annual
Short-term,
possibly
biannual
Compensation
Medium-high
(over median
for state
employees)
Fairly low
Staff
Large, semi-
permanent
Small, likely
shared
Conceptualizing State Legislatures
Professional Hybrid / Mixture Citizen
State Legislatures
• GA Legislature
• $17k base +per
diem
• $22k – $24k total
Discussion Question
• What are some of the potential benefits /
drawbacks of each of these two models??
State Legislatures and Political Careers (Peverill Squire)
• ‘Career’ Legislatures (Congress)
• Sufficiently high pay
• Minimal incentive to ‘move up’
• Expectation of long tenure
• Heavy time commitment
• ‘Springboard’ Legislatures
• Other positions have higher pay, more prestige
• Expectation of limited tenure
• May be term lim.
DataIDSalaryCompa-ratioMidpoint AgePerformance RatingServiceGenderRaiseDegreeGender1GradeDo not manipuilate Data set on this page, copy to another page to make changes154.50.956573485805.70METhe ongoing question that the weekly assignments will focus on is: Are males and females paid the same for equal work (under the Equal Pay Act)? 228.30.913315280703.90MBNote: to simplfy the analysis, we will assume that jobs within each grade comprise equal work.334.11.100313075513.61FB460.91.06857421001605.51METhe column labels in the table mean:549.21.0254836901605.71MDID – Employee sample number Salary – Salary in thousands 674.11.1066736701204.51MFAge – Age in yearsPerformance Rating - Appraisal rating (employee evaluation score)741.41.0344032100815.71FCService – Years of service (rounded)Gender – 0 = male, 1 = female 822.80.992233290915.81FAMidpoint – salary grade midpoint Raise – percent of last raise9731.089674910010041MFGrade – job/pay gradeDegree (0= BS\BA 1 = MS)1023.31.014233080714.71FAGender1 (Male or Female)Compa-ratio - salary divided by midpoint1124.31.05723411001914.81FA1259.71.0475752952204.50ME1341.81.0444030100214.70FC14251.08523329012161FA1522.60.983233280814.91FA1648.51.213404490405.70MC1763.11.1075727553131FE1836.21.1673131801115.60FB1923.91.039233285104.61MA2035.51.1443144701614.80FB2178.91.1786743951306.31MF2257.61.199484865613.81FD2322.20.964233665613.30FA2453.41.112483075913.80FD2523.61.0282341704040MA2622.30.971232295216.20FA2746.21.156403580703.91MC2874.41.111674495914.40FF2975.61.129675295505.40MF3047.50.9894845901804.30MD3122.90.995232960413.91FA3228.10.906312595405.60MB3363.71.117573590905.51ME3426.90.869312680204.91MB3522.70.987232390415.30FA3624.41.059232775314.30FA3723.81.034232295216.20FA3864.61.1335745951104.50ME3937.31.202312790615.50FB4023.71.031232490206.30MA4140.31.008402580504.30MC4224.41.0592332100815.71FA4372.31.0796742952015.50FF4465.91.1565745901605.21ME4549.91.040483695815.21FD4657.41.0075739752003.91ME47560.982573795505.51ME4868.11.1955734901115.31FE4966.21.1615741952106.60ME5061.71.0835738801204.60ME
Week 1Week 1: Descriptive Statistics, including ProbabilityWhile the lectures will examine our equal pay question from the compa-ratio viewpoint, our weekly assignments will focus onexamining the issue using the salary measure.The purpose of this assignmnent is two fold:1. Demonstrate mastery with Excel tools.2. Develop descriptive statistics to help examine the question.3. Interpret descriptive outcomesThe first issue in examining salary data to determine if we - as a company - are paying males and females equally for doing equal work is to develop somedescriptive statistics to give us something to make a preliminary decision on whether we have an issue or not.1Descriptive Statistics: Develop basic descriptive statistics for SalaryThe first step in analyzing data sets is to find some summary descriptive statistics for key variables. Suggestion: Copy the gender1 and salary columns from the Data tab t.
DataClientRoom QualityFood QualityService Quality1GPG2GGG3GGG4GPG5GGG6PGG7GGG8GPG9PGP10GGG11GGG12PPP13GGG14GGG15GGP16PPP17GGG18GGG19PGP20PGP21GGG22PGP23PPP24GGG25GGG26GPP27GPG28GGG29PPP30PGG31GGG32PPP33PGG34PGP35GGG36PGP37GGG38PGP39GGG40GPG41GPG42GGG43GGP44PGP45PGG46PGG47GPP48GGG49GPP50PPP51GGG52PPG53PPP54GGG55GGG56GGG57GGP58GGG59GPP60PGP61GPP62GGG63GPG64GGG65PPP66GPG67GGG68GGG69GGG70GGP71GGG72GGG73GGG74GGP75GGP76PPP77GGG78GGG79GGP80GGG81GGG82GGG83PGG84GGG85GGG86GPP87GGG88PPP89GGG90PGP91GGG92GGG93GPG94GGG95GPP96PPP97PPP98GPG99PGG100PPP101GPP102PGP103PPG104GPG105GPG106GGG107PGG108PPP109GGG110GGG111GGG112GGG113GGG114GGG115GGG116GGG117GGG118PPP119PPG120GGG121GGG122PPP123GGG124GGG125GGG126GGG127GGG128GGG129PPP130GGG131GGP132PPP133GGG134GGG135GGG136GGG137GGG138GPG139PPP140GGG141PPP142GGG143GGG144PPP145GGG146GGG147GGG148GGG149GGG150GGP151GGG152GGG153GGG154GGG155GGG156GGG157PPP158GPG159GGG160GGG161GGG162PPG163GGP164GGG165PGP166GPG167GGP168PGG169GGG170GGP171GGG172PPP173GGG174GGG175GPG176GGG177GGG178PPG179GGG180GGP181GGG182GGG183GGG184GGG185GPP186GGG187GGG188GGG189GGG190GGG191GGG192GGG193GGG194GGG195GGP196GGG197GGG198GGG199GPP200GGG
Sheet1Room QualityFood QualityService QualityMeanMedianRangeSTDCoefficientVariationComparision
Corporal Punishment: Legal Reform as a Route to Changing
Norms
Jo Becker
Social Research: An International Quarterly, Volume 85, Number 1, Spring
2018, pp. 255-271 (Article)
Published by Johns Hopkins University Press
For additional information about this article
Access provided by Ebsco Publishing (8 May 2018 07:55 GMT)
https://muse.jhu.edu/article/692752
https://muse.jhu.edu/article/692752
social research Vol. 85 : No. 1 : Spring 2018 255
Jo Becker
Corporal Punishment:
Legal Reform as a Route
to Changing Norms
THE TERM “HARMFUL TRADITIONAL PRACTICES” TYPICALLY BRINGS TO MIND CHILD
marriage, female genital mutilation/cutting, and so-called “honor kill-
ings,” but rarely corporal punishment. Yet corporal punishment is
arguably the most pervasive harmful traditional practice children expe-
rience today. In nearly every part of the world, parents use physical
punishment to “discipline” their children. Such corporal punishment
typically takes the form of hitting a child with a bare hand or an object
such as a stick or paddle. A 2014 survey found that four of every five
children between the ages of two and 14—an estimated 1 billion glob-
ally—experience physical punishment in their home on a regular basis
(UNICEF 2014, 96).
The practice of corporal punishment is rooted in both cultural
norms and religious belief. Parents often believe that corporal pun-
ishment will teach children good behavior. They hit their children be-
cause it is socially accepted and because they themselves often were
hit growing up. Some religious teachings appear to justify the prac-
tice.1 The adage “spare the rod, spoil the child,” rooted in the Old Tes-
tament Book of Proverbs, suggests not only that corporal pun.
Database Project Charter/Business Case
Khalia Hart
University of Maryland Global Campus
February 21, 2020
Introduction
A database is an electronic collection of data that is built by a user so that they can access, update particular information in the database coherently or rapidly. Today firms employ integrated technology to increase their capacity to serve more clients, keep information well or effectively, organize activities according to the urgency or priorities, accounting records (Tüttelmann F, 2015). Most of the integrated technology depends on multiple databases that supply information relevant in making the decision. Since the business started using databases, their performance increase because the business decisions they make are sound and practical.
Business Problem
The supply chain management is one of the most complicated processes in the business and often at times due to need of detail it gets hard for the supply chain manager to keep the record of the work covered effectively, have enough data to make the decision and also have enough data to monitor the chain of operation (William, 2019). The supply chain has been so crucial for the business because it determines the performance of the company in the industry by assessing the quality of the product produced in the organization, cost of production, the time and effectiveness of distribution network, and overall production operation of the organization.
Operation management has been named as the leading cause of business failure caused by a lack of a system, which the manager or the supervisor can use to monitor the whole system. This is the problem to solve using the database (William, 2019). Using a database, the manager can observe or watch the entire chain from their office, make better decisions by fore- planning approach of the database also make changes within the system when there is the need to cut costs or making the process effective.
Project Scope
Most business organizations are spread in operation, and this is the challenge that makes the supply chain management complex (Tüttelmann F, 2015). This is because the chain is in different localities, and therefore, coordination of operation among the user or the workers becomes a challenge. Through the database system, the business will enjoy proper coordination using the wide Area Network (LAN). Through the LAN network, the company can link computers and cost-effectively share data and communication. Through this system, the company will have a connection and coordination of the processes within the organization. The number of connected devices will range from 10 to 1000, depending on the type of tools and system that is set to facilitate this connection.
Goals and objectives of the system
The purpose of the system that I want to install in the supply chain management is to;
· Monitoring of the supply chain- the system will enable the manager to monitor the system and every process in the order (Gattor.
Databases selected Multiple databases...Full Text (1223 .docxwhittemorelucilla
Databases selected: Multiple databases...
Full Text (1223 words)
Kraft Reformulates Oreo, Scores in China
Julie Jargon. Wall Street Journal. (Eastern edition). New York, N.Y.: May 1, 2008. pg. B.1
Abstract (Summary)
Kraft, the world's second largest food company by revenue, reported a 13% drop in first-quarter net income Wednesday
because of high commodity costs and increased spending on product research and marketing. Television commercials
showed kids twisting apart Oreo cookies, licking the cream center and dipping the chocolate cookie halves into glasses of
milk.
(c) 2008 Dow Jones & Company, Inc. Reproduced with permission of copyright owner. Further reproduction or distribution
is prohibited without permission.
Unlike its iconic American counterpart, the Oreo sold in China is frequently long, thin, four-layered and coated in chocolate. But
both kinds of cookies have one important thing in common: They are now best sellers.
The Oreo has long been the top-selling cookie in the U.S. market. But Kraft Foods Inc. had to reinvent the Oreo to make it sell
well in the world's most populous nation. While Chinese Oreo sales represent a tiny fraction of Kraft's $37.2 billion in annual
revenue, the cookie's journey in China exemplifies the kind of entrepreneurial transformation that Chief Executive Irene
Rosenfeld is trying to spread throughout the food giant.
Kraft, the world's second largest food company by revenue, reported a 13% drop in first-quarter net income Wednesday
because of high commodity costs and increased spending on product research and marketing. Its international business,
which now represents 40% of Kraft's revenue thanks to the company's recent acquisition of Groupe Danone's biscuits
business, was a bright spot in the quarter, aided by the weak dollar. Kraft's profit in the European Union rose 48%, excluding
special charges, and its profit in developing markets rose 57%.
To try to increase growth at the company, Ms. Rosenfeld has been putting more power in the hands of Kraft's various
business units around the globe, telling employees that decisions about Kraft products shouldn't all be made by people at the
Northfield, Ill., headquarters.
To take advantage of the European preference for dark chocolate, Kraft is introducing dark chocolate in Germany under its
Milka brand. Research in Russia showed that consumers there like premium instant coffee, so Kraft is positioning its Carte
Noire freeze-dried coffee as upscale by placing it at film festivals, fashion shows and operas. And in the Philippines, where
iced tea is popular, Kraft last year launched iced-tea-flavored Tang. Ms. Rosenfeld has also been encouraging marketers to
"reframe" product categories, no longer thinking, for example, that an Oreo has to be a round sandwich cookie.
Oreos were first introduced in 1912 in the U.S., but it wasn't until 1996 that Kraft introduced Oreos to Chinese consumers.
Nine years later, a makeover began. Shawn Warren, a 37-year-old .
DATABASE SYSTEMS DEVELOPMENT & IMPLEMENTATION PLAN1DATABASE SYS.docxwhittemorelucilla
DATABASE SYSTEMS DEVELOPMENT & IMPLEMENTATION PLAN 1
DATABASE SYSTEMS DEVELOPMENT & IMPLEMENTATION PLAN 19
Table of Contents
1. Database System Overview 3
1.1 Business Environment 3
1.2 Database system goals and objective 4
2. Entity Relationship Model 7
2.1 Proposed entities 7
2.2 Business rules 8
2.3 Entity–Relationship Model 9
2.3.1 Relationship Types 9
2.3.2 Normalization form 12
2.3.3 Benefit of using database design 14
3. Structured Query Language (SQL) Scripts 15
3.1 Data definition language (DDL) 15
3.2 Data manipulation language (DML) 16
3.3 SQL report 17
3.4 Benefit of using database queries 19
4. Database Administration Plan 20
5. Future Database System Implementation Plan 21
6. References 22
1.
Database System Overview
1.1 Business Environment
Office Depot, Inc is an American retail store company founded in 1986 and headquartered in Florida, United States. The company provides office and school supplies with 1400 retail stores and e-commerce sites. The supply includes everything to their customer like latest technology, core school and office supplies, printing and documenting service, furniture and other services like cell phone repair, tech and marketing service etc.
Recently there were too many complaints from existing and new customer that the online site is super glitch and lagging. Another customer posted that the delivery did not come on the scheduled day. And they cannot track down the order because the website does not have tracking information. Also when the website is down, customer service cannot help to see the order details either and therefore, they feel it’s frustrating to order online and therefore want to cancel the order. One other customer posted in the website grievance section that the “label maker” showed available in the stock even though it was out of stock when verified with the customer service representative. With every product not in stock, we lose opportunity of sale which costs the store. This not only affect customer but also affect company. We are so dependent on the data, most of the time staff has to correct accounting report, sales estimates and invoice customer manually which is very time-consuming in an excel sheet.
In order to solve above issues and avoid sales loss, Office Depot must have a database to store and maintain correct count of the products. This database will help inventory management i.e. tracking products, update inventory, find popular or less popular item, loss prevention, track inventory status and perform data mining. The staff can access this database via a computerized database. (Gerald H., Importance of inventory database retail)1.2 Database system goals and objective
The mission of the company is to become number one retail company by creating inclusive environment and great shopping experience where both customer and employees are respected and valued. To achieve the retail store mission, we are committed to provide secure and robust data base system for ou.
Database Security Assessment Transcript You are a contracting office.docxwhittemorelucilla
Database Security Assessment Transcript You are a contracting officer's technical representative, a Security System Engineer, at a military hospital. Your department's leaders are adopting a new medical health care database management system. And they've tasked you to create a request for proposal for which different vendors will compete to build and provide to the hospital. A Request For Proposal, or RFP, is when an organization sends out a request for estimates on performing a function, delivering a technology, or providing a service or augmenting staff. RFPs are tailored to each endeavor but have common components and are important in the world of IT contracting and for procurement and acquisitions. To complete the RFP, you must determine the technical and security specifications for the system. You'll write the requirements for the overall system and also provide evaluation standards that will be used in rating the vendor's performance. Your learning will help you determine your system's requirements. As you discover methods of attack, you'll write prevention and remediation requirements for the vendor to perform. You must identify the different vulnerabilities the database should be hardened against.
Modern healthcare systems incorporate databases for effective and efficient management of patient healthcare. Databases are vulnerable to cyberattacks and must be designed and built with security controls from the beginning of the life cycle. Although hardening the database early in the life cycle is better, security is often incorporated after deployment, forcing hospital and healthcare IT professionals to play catch-up. Database security requirements should be defined at the requirements stage of acquisition and procurement.
System security engineers and other acquisition personnel can effectively assist vendors in building better healthcare database systems by specifying security requirements up front within the request for proposal (RFP). In this project, you will be developing an RFP for a new medical healthcare database management system.
Parts of your deliverables will be developed through your learning lab. You will submit the following deliverables for this project:
Deliverables
• An RFP, about 10 to 12 pages, in the form of a double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations. There is no penalty for using additional pages. Include a minimum of six references. Include a reference list with the report.
• An MS-Excel spreadsheet with lab results.
There are 11 steps in this project. You will begin with the workplace scenario and continue with Step 1: "Provide an Overview for Vendors."
Step 1: Provide an Overview for Vendors
As the contracting officer's technical representative (COTR), you are the liaison between your hospital and potential vendors. It is your duty to provide vendors with an overview of your organization. To do so, identify infor.
Database Design Mid Term ExamSpring 2020Name ________________.docxwhittemorelucilla
Database Design Mid Term Exam
Spring 2020
Name: ____________________________
1. What is a data model?
A. method of storing files on a disk drive
B. simple representation of complex real-world data structures
C. name of system for designing software
D. method of designing invoices for customers
2. A Relationship Database system consists of 3 parts: a client front end for sending information to a command processor, a middle tier that interprets user commands, and a management frame work for storing, organizing and securing data.
a. True
b. False
3. What are the 3 components of a table:
A. Row, column, value
B. Row, top, bottom
C. Column, row, top
D. Top, middle, end
4. What does the column represent in a table?
a. Attribute of the table records
b. A complete record in the table
c. The system log from the database
d. A list of database tables
5. What does a row in the table represent?
a. A complete data record
b. List of system logs
c. A list of file systems on database server
d. The primary keys from all the tables.
6. Which of the following is an example of data definition language (DDL)?
a. UPDATE
b. V$SYSLOG
c. CREATE
d. DETAIN
7 . Which of the following is an example of data manipulation language (DML)?
A. SELECT
B. ABORT
C. GRANT
D. REVOKE
8. A _______ key is an attribute that uniquely identifies a record in a table.
9. A _______ key is an attribute that is a primary key in one table and is used as a reference in a second table to establish a relationship between the two tables.
10. When running a ‘SELECT’ join, what is returned from the table:
A. ROW
B. Column
C. single attribute
D. all tables in the database
11. When running a ‘PROJECT’ join, what is returned from the table:
A. COLUMN
B. ROW
C. Single Attribute
D. a list of tables in the database
12. What are the 3 types of relationships commonly shown on an entity relationship diagram?
A. 1 to 1
B. 1 to Many
C. Many to Many
D. All the above
E. None of the above
13. What is an entity relationship diagram (ERD)?
A. graphical representation of all entities in a database and how the entities are related
b. list of the log files in the database.
C. list of all the tablespace names in a database
D. A diagram that shows how data is written to a physical disk drive.
14. The definition of an attribute in a table that has no value is:
A. ZERO
b. NULL
c. ZILTCH
D. NONE
15. A ____________ attribute can either be stored on retrieve on an ad hoc basis.
16. Briefly describe the advantages and disadvantages of storing a derived attribute?
17. A database can process many types of data classifications. Which of the following is not a data classification or architecture that databases can process:
A. Structured
B. Semi-structured
C. undelimited
D. Unstructured
18. The process by which functional/partial dependency and transitive dependency is removed from a database table is called:
a. sharding
b. normalization
c. defragmentation
d. reallocation
.
Database Justification MemoCreate a 1-page memo for the .docxwhittemorelucilla
Database Justification Memo
C
reate
a
1-page
memo for the project stakeholder
explaining
why they should migrate towards a database driven application system
rather
than a static website.
Discuss
the benefits and drawbacks of the proposed changes
AND
Web Services Memo
Create
a 1-page memo to the project stakeholder on the importance of web services including security considerations, scalability, and compatibility.
.
Database Dump Script(Details of project in file)Mac1) O.docxwhittemorelucilla
Database Dump Script
(Details of project in file)
Mac:
1) Open up the terminal, or if already in MySQL, get out by typing "exit" and pressing enter.
2) Type:
/usr/local/mysql/bin/mysqldump -u root -p [database name] > /tmp/filename.txt
...where [database name] is the name of the database you want to export. When prompted, type the password. Check the /tmp file for your output.
.
Database Design 1. What is a data model A. method of sto.docxwhittemorelucilla
Database Design
1. What is a data model?
A. method of storing files on a disk drive
B. simple representation of complex real-world data structures
C. name of system for designing software
D. method of designing invoices for customers
2. Which of the following are the most important elements of a security program for databases:
a. Integrity, referential index, user rights
b. Confidentiality. Integrity and Availability
c. Availability, multi-master replication, high-bandwidth
d. DBA, System Admin, and PMO
3. Suppose that you have a table with a number of product sales. The product code may repeat in the table as it is likely the same product could be sold multiple times. If you want to produce a list of the unique products that are sold, you could use which of the following keywords in the SELECT statement:
A. LIKE
B. ORDERED BY
C. DISTINCT
D. DIFFERENT
4. What does the column represent in a table?
a. Attribute of the table records
b. A complete record in the table
c. The system log from the database
d. A list of database tables
5. What does a row in the table represent?
a. A complete data record
b. List of system logs
c. A list of file systems on database server
d. The primary keys from all the tables.
6. Which of the following is an example of data definition language (DDL)?
a. UPDATE
b. V$SYSLOG
c. CREATE
d. DETAIN
7 . Which of the following is an example of data manipulation language (DML)?
A. SELECT
B. ABORT
C. GRANT
D. REVOKE
8. A _____________ key is an attribute that uniquely identifies a record in a table.
9. A _____________ key is an attribute that is a primary key in one table and is used as a reference in a second table to establish a relationship between the two tables.
10. When running a ‘SELECT’ join, what is returned from the table:
A. ROW
B. Column
C. single attribute
D. all tables in the database
11. When running a ‘PROJECT’ join, what is returned from the table:
A. COLUMN
B. ROW
C. Single Attribute
D. a list of tables in the database
12. What are the 3 types of relationships commonly shown on an entity relationship diagram?
A. 1 to 1
B. 1 to Many
C. Many to Many
D. All the above
E. None of the above
13. What is an entity relationship diagram (ERD)?
A. graphical representation of all entities in a database and how the entities are related
b. list of the log files in the database.
C. list of all the tablespace names in a database
D. A diagram that shows how data is written to a physical disk drive.
14. The definition of an attribute in a table that has no value is:
A. ZERO
b. NULL
c. ZILTCH
D. NONE
15. A __________ attribute can either be stored on retrieve on an ad hoc basis.
16. Which of the following is not considered a characteristic of distributed management systems:
a. Concurrency Control
b. Business intelligence
c. Transaction management
d. query optimization
17. A database can process many types of data classifications. Which of the following is not a data class.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Global supply chain riskmanagement strategiesIla Manuj.docx
1. Global supply chain risk
management strategies
Ila Manuj
Department of Marketing and Logistics, University of North
Texas, Denton,
Texas, USA, and
John T. Mentzer
The University of Tennessee, Knoxville, Tennessee, USA
Abstract
Purpose – Global supply chains are more risky than domestic
supply chains due to numerous links
interconnecting a wide network of firms. These links are prone
to disruptions, bankruptcies,
breakdowns, macroeconomic and political changes, and
disasters leading to higher risks and making
risk management difficult. The purpose of this paper is to
explore the phenomenon of risk
management and risk management strategies in global supply
chains.
Design/methodology/approach – This paper is based on an
extensive literature review and a
qualitative study comprising 14 in-depth interviews and a focus
group meeting with senior supply
chain executives.
Findings – The study provides insights into the applicability of
2. six risk management strategies with
respect to environmental conditions and the role of three
moderators.
Research limitations/implications – The model is developed in a
global manufacturing supply
chain context. It should be tested in other contexts and with
other methods to provide generalizability.
The study takes a much needed step toward building a theory of
risk management in global supply
chains, which opens important future research directions.
Practical implications – This research provides direction to
managers for choosing risk
management strategies based on the global supply chain
environment. Moderators have practical
implications for global supply chain managers.
Originality/value – The paper addresses an identified gap in the
literature for selecting risk
management strategies in global supply chains. It employs
grounded theory, a methodology
appropriate for theory-building, to explore a phenomenon with
an inadequate theoretical base.
Keywords Risk management, Supply chain management,
International business
Paper type Research paper
Introduction
Global supply chains are a source of competitive advantage.
Global configurations of
firms provide access to cheap labor and raw materials, better
financing opportunities,
larger product markets, arbitrage opportunities, and additional
3. inducements offered by
host governments to attract foreign capital (AlHashim, 1980;
Kogut and Kulatilaka,
1994). However, coupled with these benefits that entice firms to
go global are the
uncertainties and consequent risks that managers face in global
supply chains. As
Barry (2004) argues, “An enterprise may have lowest over-all
costs in a stable world
environment, but may also have the highest level of risk – if any
one of the multiple
gating factors kink up an elongated global supply chain!”
There is wide acknowledgement in the literature of the risks and
uncertainties in
global supply chains. Although risk management in
multinational enterprises has been
The current issue and full text archive of this journal is
available at
www.emeraldinsight.com/0960-0035.htm
IJPDLM
38,3
192
Received 6 August 2007
Revised 7 January 2008
Accepted 28 January 2008
International Journal of Physical
Distribution & Logistics Management
Vol. 38 No. 3, 2008
pp. 192-223
4. q Emerald Group Publishing Limited
0960-0035
DOI 10.1108/09600030810866986
examined (Baird and Thomas, 1985; Baird and Thomas, 1991;
Carter and Vickery,
1989; Ghoshal, 1987; Kogut, 1985; Lessard and Lightstone,
1986; Miller, 1992), risk
management was relegated to the background until recently
when several researchers
(Barry, 2004; Cavinato, 2004; Christopher and Lee, 2004;
Giunipero and Eltantawy,
2004; Jüttner, 2005; Manuj and Mentzer, 2008; Norrman and
Jansson, 2004; Spekman
and Davis, 2004; Zsidisin, 2003a; Zsidisin et al., 2004) revived
an interest in risk
management, particularly in global supply chains. Chopra and
Sodhi (2004) contend
that most companies develop plans to protect against recurrent
low-impact risks in
their supply chains. Many, however, ignore high-impact, low-
likelihood risks. By
understanding the variety and interconnectedness of supply
chain risks, managers can
tailor balanced, effective risk-reduction strategies for their
companies. Hauser (2003)
suggests that in today’s increasingly complex environment, risk
adjusted supply chain
management can translate into improved financial performance
and competitive
advantage. In sum, understanding global supply chain risk
management is important
and a top priority for both academics and practitioners.
5. An initial review of the literature on risk management in supply
chains led to the
identification of three major gaps. First, no definition exists
that adequately takes into
account the unique dimensions of risk and risk management in a
global supply chain.
Rather, there are a multitude of definitions and
conceptualizations, and therefore,
confusion between terms such as risks, uncertainties,
vulnerabilities, and sources of
risks. Second, strategies to address risks warrant more attention
( Jüttner, 2005).
Although several studies provide a list of risk management
strategies ( Jüttner et al.,
2003), these studies do not address how managers select among
them, i.e. the
antecedents to global supply chain risk management strategies,
and their
consequences. Jüttner et al. (2003) suggest investigating risk
management in
different supply chains and developing strategies based on their
environments. Third,
there is limited research on moderators of the risk management
process (Manuj and
Mentzer, 2008).
In light of these gaps, the purpose of this paper is to take a step
toward building a
theory of global supply chain risk management strategies. A
qualitative research
design was chosen, as not much is known about the
phenomenon. Based on the
analysis of in-depth qualitative interviews using grounded
theory methodology, a
model of risk management strategies in global supply chains is
developed. It is
6. important to mention that the context in this qualitative study
was manufacturing
firms. Manufacturing firms can be considered the focus of
product supply chains, and
thus, a good starting point for initial development of supply
chain theory. Expanding
the theory to other contexts (such as other levels in the supply
chain or for service
providers) is left to future research.
This research makes three major contributions. A definition of
supply chain risk is
developed and four types of global supply chain risks are
defined. In addition, the
interaction of different risks in the global environment is
explored. Second, a definition
of risk management in a global supply chain context is
developed. Rich descriptions of
risk management strategies are provided and important
antecedents to strategy
selection are discussed. Third, three moderators in the process
of risk management are
explored, namely team composition, supply chain complexity
management, and
inter-organizational learning.
Supply chain
risk management
strategies
193
Methodology
7. The nature of the research problem should drive the choice of
research strategy
(Creswell, 1998; Denzin and Lincoln, 1998). Consistent with
this philosophy and
because of the lack of extant knowledge on the phenomenon, we
employed grounded
theory methodology. Grounded theory is a qualitative research
methodology that
allows the exploration of concepts, identification of
relationships in raw data, and
organization of concepts and the relationships into a theoretical
scheme (Strauss and
Corbin, 1998). Another advantage of grounded theory is the
ability to handle complex
phenomenon such as risk management because the methodology
emphasizes the need
for developing multiple concepts and their linkages in order to
capture the central
phenomenon. Insights from the grounded theory study and
existing literature were
used to develop the model presented in this paper.
Selecting participants who can provide meaningful data on
multiple incidents is
critical for grounded theory. To maximize the variations in the
phenomenon, we
interviewed managers involved in making and executing global
supply chain decisions
from a variety of manufacturing companies, including home
appliances, electronic
component suppliers, pharmaceuticals and over-the-counter
products, office products,
heavy equipment, and consumer goods. A varied group of
managers holding different
positions from different industries and firms with different sizes
were recruited to look
8. for similar incidents across multiple contexts. We included
managers who had worked
in several different companies and industries, as well as those
who had worked with
one organization over an extended period of time and witnessed
the company move
through several transformations.
The data in this paper come primarily from fourteen in-depth
qualitative interviews
with senior supply chain executives across eight companies.
Apart from the
interviews, we also conducted a focus group meeting involving
seven senior executives
of a global manufacturing firm. Five of these seven executives
were later interviewed
separately for this study and are a part of the 14 in-depth
interviews. In total, the study
had 16 unique participants.
The number and content of in-depth interviews was based on the
concept of
“theoretical sampling,” i.e. successive respondents were chosen
based on the emerging
theory. The initial participant sample was based on a
participant’s interest in and
experience with the phenomenon, job profiles, articulation
skills, and willingness to
participate in the research. Theoretical sampling ensures
adequate representation of
important themes. It is a process of data collection for
generating theory whereby the
analyst jointly collects, codes, and analyzes the data and
decides what data to collect
next and where to find them, in order to develop the theory as it
emerges (Glaser, 1978).
9. We started with broad open-ended questions which were
followed by focused and
directed questions as the interviews progressed within
interviews and between
successive interviews (Morrison et al., 2002; Strauss and
Corbin, 1998).
Interviews continued until “theoretical saturation” was reached
– i.e. further
interviews did not reveal any new information related to
antecedents, risk
management strategies, dimensions of risk, or moderators in the
risk management
process. In theory building, the objective is deep understanding
from a few key
informants (McCracken, 1988). Generalizing the findings is the
purpose of
theory-testing research (Mentzer and Flint, 1997), such as
surveys, experiments,
or simulation. Fourteen interviews are in line with the
qualitative research
IJPDLM
38,3
194
guidelines that eight or fewer informants often provide
theoretical saturation
(McCracken, 1988; Strauss and Corbin, 1998). We reached
theoretical saturation in
the 13th interview, which did not reveal anything significantly
new. We conducted
one more interview to confirm theoretical saturation. We found
10. that the 13th and
14th interviews did not add much to our understanding of the
phenomenon though
the interviews did provide additional support for our constructs.
Discovering
commonalties between different respondents helped in getting
to the core of
the phenomenon. The constructs included in the model were
discussed by multiple
interviewees. Also, as suggested by the concept of “fit” (Table
I), only those
concepts mentioned by a participant were included that fit with
the substantive area
under investigation (Strauss and Corbin, 1990). All constructs
included in the model
were deliberated by the authors following repeated readings of
the transcripts.
Furthermore, the feedback from respondents on summaries of
their interviews
provided insights into whether a construct should be included.
All interviews but one were recorded and transcribed verbatim.
Detailed notes
were taken for one interview participant who refused recording
his/her interview.
The interview transcriptions were analyzed using the ATLAS.Ti
software. The
grounded theory methodology of systematic organization and
constant comparison
of data within and between interviews using open, axial,
selective coding was
followed.
In view of the fact that the authors have a good understanding
of the extant
literature on risk management, a conscious attempt was made to
11. keep this knowledge
away from the ongoing research to prevent the interference of
this knowledge.
The primary researchers wrote down all they knew or believed
to be true about
the phenomenon of risk management. This made the researchers
aware of their
Criteria (and explanation) Step(s) taken
Credibility (extent to which the results appear to
be acceptable representations of the data)
Participants reviewed the findings and provided
feedback
Transferability (extent to which the findings
from one study in one context will apply to other
contexts)
Participants chosen based on theoretical
sampling
Diverse sample representing variations in type of
industry, responsibilities, position level, and
company size
Dependability (extent to which the findings are
unique to time and place; the stability or
consistency of explanations)
Participants reflected as far back as 15-20 years
Core categories existed across industries
Confirmability (extent to which interpretations
are the result of the participants and the
phenomenon as opposed to researcher biases)
12. Documenting all personal knowledge of
phenomenon to keep presuppositions away and
journal-keeping to record personal viewpoints
Findings supported by quotes
All findings reviewed by both researchers
Integrity (extent to which interpretations are
influenced by misinformation or evasions by
participants)
Confidentiality assurance to participants
Non-threatening interviews by researcher trained
in qualitative research
Sources: Adapted from Flint and Mentzer (2000) and Flint et al.
(2002)
Table I.
Evaluation criteria
Supply chain
risk management
strategies
195
preconceived theoretical notions about the phenomena. This list
was used during the
drafting of the interview protocol to make sure the
presuppositions were not forced into
the interview questions. This list was also referred to repeatedly
during data analysis
13. to ensure that insights were coming from the data and not
artifacts of preconceived
notions. Wherever appropriate, Glaser’s (1978) advice was
followed to use the literature
as another source of data and was incorporated into the findings
from the qualitative
study.
The interview protocol is presented in the Appendix. A list of
criteria for
evaluating qualitative research and our efforts to maintain rigor
are presented in
Table I. The criterion for “credibility” needs particular mention.
Each interviewee
was provided a copy of the transcript of his/her interview. All
significant comments
from the interviewees were incorporated into the data analysis.
At the end of each
interview, the interviewer summarized the major points from the
interview and gave
the interviewee an opportunity to provide feedback. All
interviewees had some
comments at this stage that were duly noted/recorded and
incorporated during data
analysis. Lastly, all interviewees received a summary of the
overall findings across
all interviews and provided feedback. This feedback was used to
fine-tune the
findings.
Refining the concept of risk
The interviews revealed multiple interpretations of risk. One
senior executive in a
leading home appliance manufacturing firm said:
Risks are all those things that keep you away from the perfect
14. path and perfect outcomes and
(you) got to be able to translate (risks) into dollars somehow.
Another manager remarked, “Unintended outcomes, you know,
is the risk.” These and
several other definitions provided by supply chain managers are
consistent with the
literature that suggests two components of risk:
(1) potential losses (if the risk is realized, what losses will
result and what is the
significance of the consequences of the losses (Harland et al.,
2003; Manuj and
Mentzer, 2008; Mitchell, 1995)); and
(2) likelihood of those losses (the probability of the occurrence
of an event that
leads to realization of the risk).
Therefore, risk is the expected outcome of an uncertain event,
i.e. uncertain events lead
to the existence of risks. We call these uncertain events “risk
events.” While probability
and impact of losses are the most commonly discussed
dimensions of risk, two
more risk dimensions (speed and frequency) are important in
global supply chains.
The quote below illustrates the consequences of slow discovery
of a risk event
(defective capacitors) coupled with a three-month pipeline:
We’re three levels down into the supply chain here and we
design the (circuit) board, we get it
contract manufactured (in China), and sometimes we’re buying
the components, sometimes
the contract manufacturer is buying the components. But a
15. component supplier, their process
for making capacitors went out of control. Capacitors got
integrated into our boards and you
know, months later, unfortunately, in this case, you’re finding
field failures because, it wasn’t
immediate failure, it was a failure over time. So, even though
all the reliability work had been
IJPDLM
38,3
196
done on this and it was in the field and working great, now you
get three months of supply all
of a sudden, which is a huge number, in the field, where now we
have problems.
Speed of risk can be divided into the rate at which the event
leading to loss happens,
the rate at which losses happen, and how quickly the risk event
is discovered. Coupled
with increased lead times, lead time variability, physical
distances from sources of risk,
and lesser control over the supply chain, speed increases the
magnitude of global
supply chains problems.
Frequency is a measure of how often a similar kind of risk event
happens. The
following manager speculates on high frequency (too much) of
an actual risk event:
What if you had something that was a functional failure? I mean
16. if you made a mistake so
that it (the product) could catch fire and burn down a house, and
that’s happened. So it could
put an entire company at risk for survival if too much of that
happened.
Similarly, another manager suggested a one-time big-volume
loss due to a quality
defect may be tolerable and correctable, but frequent small-
volume quality defects
leading to higher supply and demand risks can lead to a
company losing its reputation
and even going out of business.
Literature on quality control suggests two categories of factors
affecting the
adoption of quality tools: internal factors such as user-
friendliness, usefulness, time,
monetary cost, flexibility and popularity of the tools, and
external factors such as
project nature, organization, industries and culture (Thia et al.,
2005). Introduction and
development of a formal process for quality improvement may
be hindered by a failure
to plan effectively, failure to establish objectives for quality
improvement activities,
inadequate internal and external measurement criteria, lack of
thought given to the
analysis and presentation of quality improvement progress, and
workforce resistance
to some of the measurements (Newall and Dale, 1991). Speed
and frequency together
determine the losses that happen per unit of time. This
conceptualization is similar to
failure mode and effects analysis, often used in engineering
design analysis to identify
17. and rank potential failure modes of a design or manufacturing
process, and to
determine its effect on other components of the product or
process in order to document
and prioritize improvement actions (Sankar and Prabhu, 2001).
Thus, risk in a global
supply chain context is defined as the distribution of
performance outcomes of interest
expressed in terms of losses, probability, speed of event, speed
of losses, the time for
detection of the events, and frequency. The distribution of
outcomes results from risk
events. If there were no risk events, the exact outcome rather
than a distribution would
be known a priori. A manager said, “Risk would be those
factors which, I would say,
impair your ability to be successful.” In terms of the definition
of risk presented above,
these factors are “adverse events” and not being successful
refers to not being able to
closely match desired outcomes.
Risks in global supply chains
The literature suggests four categories of risks: supply, demand,
operational, and
security risks (Christopher and Peck, 2004; Manuj and Mentzer,
2008). Borrowing from
the definition of supply risk provided by Zsidisin (2003b) and
building upon it using
the definition of risk developed above and insights from the
interviews, supply risk is the
distribution of outcomes related to adverse events in inbound
supply that affect the
ability of the focal firm to meet customer demand (in terms of
both quantity and quality)
18. Supply chain
risk management
strategies
197
within anticipated costs and time, or causes threats to customer
life and safety.
Operations risk is the distribution of outcomes related to
adverse events within the firm
that affect a firm’s internal ability to produce goods and
services, quality and timeliness
of production, and/or profitability. Demand risk is the
distribution of outcomes related to
adverse events in the outbound flows that affect the likelihood
of customers placing
orders with the focal firm, and/or variance in the volume and
assortment desired by the
customer. Security risk is the distribution of outcomes related to
adverse events that
threaten human resources, operations integrity, and information
systems; and may lead
to outcomes such as freight breaches, stolen data or proprietary
knowledge, vandalism,
crime, and sabotage.
In another widely used classification, Ghoshal (1987) classifies
risks as:
. macroeconomic risks associated with significant economic
shifts in wage rates,
interest rates, exchange rates, and prices;
. policy risks associated with unexpected actions of national
19. governments;
. competitive risks associated with uncertainty about competitor
activities in
foreign markets; and
. resource risks associated with unanticipated differences in
resource
requirements in foreign markets.
The risk events most salient to the global supply chain
managers interviewed were
currency, transit time variability, forecasts, quality, safety,
business disruption,
survival, inventory (and tools) ownership, culture, dependency
and opportunism, oil
price fluctuation, and risk events affecting suppliers and
customers. All these risk
events have supply chain research support (Birou and Fawcett,
1993; Cho and Kang,
2001; Chopra and Sodhi, 2004; Fisher, 1997; Hult, 1997;
Johnson, 2001; Spekman and
Davis, 2004; Zsidisin, 2003a; Zsidisin and Ellram, 2003). Table
II presents the
definitions of risk events, along with supporting interview
quotes.
An interesting insight from the study was that different risk
events in global supply
chains are linked to each other in complex patterns with one
risk leading to another, or
influencing the outcome of other risks. Although such inter-
linkages are also present in
domestic supply chains, their unpredictability and impact
increases in global supply
chains. The quote below – where the manager compares
20. domestic versus China
sourcing – illustrates the linkages between risk events related to
transit time, cycle
time, and forecasting:
So there’s the forecast error issue, too, over a long lead times.
And the forecast error multiplies
exponentially as you extend the lead time. I mean you’re trying
to forecast, it’s like trying to
forecast the weather tomorrow versus next month. You can do it
tomorrow. You have no idea
what’s going to happen next month. That’s the situation here,
too. So you have this huge risk
of forecasting incorrectly and it happens over and over. So what
happens is companies tend to
overreact. They run into a supply shortage and they add in a
whole bunch of inventory so it
won’t happen to them again, and then they realize, oh my gosh,
I’ve got a year’s supply here
of product. Now we need to shut down the factory. By the time
they shut it down they’re in a
shortage again. So they go through this big pendulum swing
between shortage and out of
stock versus excessive inventory.
The above quote also reflects the challenge of determining
optimal order quantities,
optimal production quantities, safety stock levels, and other
inventory policies that
IJPDLM
38,3
198
112. terms of costs and
profitability. There is a rich stream of literature that includes a
variety of models for
effectively managing inventories under various conditions
(Talluri et al., 2004;
Simchi-Levi and Zhao, 2005; Wang and Hill, 2006). Another
manager also discussed the
interconnectivity of risks:
Costs are going up; booking ships is becoming more and more
difficult. There are delays at
the Port of sometimes two or three weeks. That in turn is
driving up safety stock, and fuel
surcharges are driving up transportation costs.
Figure 1 graphically shows the interactions between different
types of risks, along with
risk event examples. Supply, operational, and demand risks
affect each other and are
embedded in the context of “other risks.” The risk events listed
under each heading
are not exhaustive but only representative of each category.
“Other” risks are beyond
the direct control of any entity in the supply chain, aggravate
the impact of other risk
events, and include currency fluctuations, wage rate shifts, and
events that
compromise the security of the supply chain. It is also important
to note that an
outcome for one firm in the supply chain may be a “risk event”
for another firm. For
example, a supplier going out of business is an outcome for the
supplier and a risk
event for the customer firm.
A model of global supply chain risk management strategies
113. Based on the interviews, we developed a model of global supply
chain risk
management strategies (Figure 2). We propose that three factors
affect the selection of
Figure 1.
Risks in global supply
chains
Operational Risks
Inventory Ownership
Asset and tools
ownership
Product quality and
safety
Demand Risks
Demand Variability
Forecast errors
Competitor moves
Risks affecting
customers
Supply Risks
Supplier Opportunism
Inbound product quality
Transit time variability
Risks affecting suppliers
114. Other Risks
Currency
Security
Supply chain
risk management
strategies
201
a risk management strategy, namely temporal focus, supply
chain flexibility, and
supply chain environment. The links between the antecedents
and strategy selection
are moderated by team composition. The selected strategy
affects the risk management
outcomes, and two factors – complexity of the supply chain and
extent of
inter-organizational learning – moderate this link.
Antecedents
Appropriate strategies are contextual and structured based on
the characteristics of
the situation. This entails recognizing the factors motivating the
choice of a
particular strategy for a given situation. Three factors affect the
selection of a risk
management strategy: temporal focus, supply chain flexibility,
and supply chain
environment.
Temporal focus. A short-term focus leads to adoption of
strategies that provide
115. immediate results and involve lower investments, and vice
versa. Risk management is
a continual process that involves long-term dedication of supply
chain members
(Giunipero and Eltantawy, 2004). Our findings suggest that a
short-term focus does not
necessarily suggest an absence of risk management, but a
significantly lower
importance to managing risks.
Consistent with the literature, the qualitative study suggests that
performance
metrics are an important determinant of the temporal
perspective of managers
(Mentzer and Firman, 1994):
[. . .] it’s not that they (supply chain managers) don’t want to
(include risks in analyses). It’s
not that they don’t know they should look at risk. But I think
they don’t because of the
pressures they’re under, the goals that they have to meet for the
year. They probably figure,
hey look, it’s a low probability, probably won’t happen and,
frankly, my boss isn’t asking me
to look at it. So, why should I be a hero and miss my
objectives? It’s the right thing to do but
they aren’t rewarded for doing it. Maybe that’s at the heart of
this, is no one is compensated or
incented in their day to day job to look at and evaluate the risks
properly.
As the above quote suggests, if the reward system rewards only
those who achieve
their objectives irrespective of due attention to risks, then
managers will strive to
116. Figure 2.
A model of global supply
chain risk management
strategies
Antecedents
Temporal Focus
SC Flexibility
SC Environment
- SLDL
- SHDL
- SLDH
- SHDH
Strategy(s) Selection
Postponement
Speculation
Hedging
Control/Share/Transfer
Security
Avoidance
Team Composition
Supply Chain Complexity
Inter-organizational Learning
Risk Management Outcomes
Total and Per Unit Cost
Total and Per Unit Profit
Average Inventory
Disruptions
Total Inbound Lead Time
Delays to Customers
Stock-outs
117. Fill Rate
Premium Freight Usage
Cash-to-cash cycle time
Exposure
IJPDLM
38,3
202
achieve objectives at the cost of disproportionate risks. For
example, in one company in
the qualitative study, the major objectives are cutting costs,
cutting inventory, and
improving in-stock product availability. Risk management is
perceived as something
that slows down the process of achieving these company
objectives. A typical off-shore
target is to achieve X million dollars of component off-shoring
in Y years. The
managers of this firm inevitably compromise on risk issues. For
the procurement team
in this company, the proper supplier selection process is
expected to take two years,
whereas, usually the company starts sourcing from a new
supplier within six months.
The pressure to quickly start off-shoring, primarily due to short-
term focus of bonus
incentives, led to inadequate quality check of second tier
suppliers. One such supplier
supplied defective wires to the contract manufacturer and the
wire got integrated into a
range of appliances. The defective wire caused the appliances to
malfunction. The cost
118. to fix this quality lapse included replacement of defective
appliances, including
installation costs, reworking the existing appliances stocked at
different levels in the
supply chain, and reworking the goods in the three-week long
(ocean) pipeline as they
arrived. The losses amounted to about 15 percent of the
company’s bottom-line profit
and equal to the anticipated savings from off-shore production
for three years.
Although the development of specific performance metrics is
beyond the scope of this
paper, it is certainly an area ripe for future research.
Flexibility. Upton (1994) defines flexibility as “the ability to
change or react with
little penalty in time, effort, cost or performance.” In uncertain
supply and demand
markets, a more flexible supply chain can exercise its options
faster than its
competitors:
[. . .] you need to have the flexibility to do whatever operations
you need to do, wherever you
need to do them and source whatever you need from wherever
you can get it best. In the
model that we apply today, we literally kind of pick up and
move operations. It’s a very
inflexible move. We kind of replicate the same highly
integrated, supply base and
manufacturing process, just in a lower wage, lower supply base
cost location. So wherever
our competition follows us, there is no advantage. And, if there
are currency fluctuations or
wage increases, we’re stuck. There’s nowhere to go because
we’re in the same (inflexible)
119. model that we were in before.
Flexibility is important in global supply chains because it plays
a facilitating role in the
coordination process and provides a unique ability to help firms
manage the high levels
of environmental and operating uncertainty inherent in global
operations. Firms that
achieve higher levels of flexibility significantly outperform
their less flexible
counterparts (Fawcett et al., 1996). Flexibility positively
impacts not only the firm’s
ability to extend its global reach but also its ability to enhance
comparative performance
relative to leading industry competitors. In sum, supply chain
flexibility provides an
inherent capacity to respond to emerging circumstances that
cannot be fully anticipated
in the planning cycle (Welch and Welch, 1996). For example, a
global firm chose to
assemble and sell air conditioners in India rather than
manufacture them in India. They
kit them in another country, and then ship the kits to India. The
reason – different states
in India have different tax advantages for business operations.
So, one year, it might be
most advantageous to assemble air conditioners in one state,
and the next year it might
be better to assemble in another state.
However, there is a caveat. Flexibility comes at a cost, is not
necessarily useful in all
cases, and thus, should be determined by the level of risks faced
by the supply chain.
Supply chain
120. risk management
strategies
203
Nembhard et al. (2005) developed a supply chain model in
which a manufacturing firm
can have the flexibility to select different suppliers, plant
locations, and market
regions. Using a real options approach, they estimate the value
of flexibility and
determine the optimum strategy to manage flexibility under
currency exchange rate
uncertainty. They show that if the time lag between the decision
and option
implementation is not considered, the value of the operational
flexibility can be
significantly overestimated. More flexible firms have more
strategic risk management
options available to them. In sum, since flexibility helps a firm
reallocate resources
quickly and smoothly in response to change (Buckley and
Casson, 1998), it is valuable
for supply chains that face high demand or supply risks.
Supply chain environment. The qualitative study revealed that
supply chain
managers are typically concerned with risks on the supply and
demand sides of the
supply chain. It is not that they ignore operations risk, but (as
the quote below
illustrates) typically operations risk management resides in
other departments such as
121. corporate risk or finance, and is “covered” by buying insurance
or hedging foreign
exchange exposure. This study, therefore, focuses on supply and
demand risks:
I’m the Assistant Treasurer of Risk Management and I have a
small staff of four. And, one of
our principle products and services is the insurance procurement
that we buy for our global
operations.
The qualitative study revealed that managers identified supply
and demand risks they
faced and linked strategies to these risks. It is interesting to
note that although
managers were aware of appropriate strategies for an
environment, the most
appropriate strategies were not always adopted because of
factors such as performance
metrics, supply chain flexibility, and team composition
(discussed later). However, the
general theme was that a supply chain that adopts and invests in
strategies for
managing the types of risks it faces should do better than supply
chains that mismatch
the type of risks faced and the risk management strategy
selected.
This notion of matching strategies to the environment is similar
to the concept of fit
in the strategy literature, which suggests that a resource’s
capacity to generate profits
or to prevent losses depends, to a large extent, on the fit of a
given strategy to the
external environment (Amit and Schoemaker, 1993; Porter,
1991; Wernerfelt and
122. Karnani, 1987). This is similar to suggestions of matching the
type of supply chain to
demand uncertainties faced by the supply chain (Fisher, 1997).
Based on our qualitative study, we adopt the classification
developed by Lee (2002)
to develop a 2 £ 2 matrix of supply chain environment, based
upon supply and
demand risks. Table III cells denote the environments facing
supply chains in terms
of the levels of supply and demand risks. “SLDL” denotes low
supply and low demand
Supply risks
Demand risks Low High
Low SLDL SHDL
High SLDH SHDH
Source: Lee (2002)
Table III.
Types of supply chain
environments
IJPDLM
38,3
204
risks, “SLDH” denotes low supply and high demand risks,
“SHDL” denotes high supply
and low demand risks, and “SHDH” denotes high supply and
high demand risks.
123. Although we found evidence of importance of all antecedents,
the environment
facing the supply chain emerged as most important, primarily
because supply and
demand risks are outside the scope of the firm and require
supply-chain wide attention.
Therefore, in this paper we focus on the effects of supply chain
environment on
strategy selection. Further exploration of temporal focus and
flexibility is left to future
research.
Risk management strategies
Based upon the definition of risk developed above, in-depth
interviews, and building
upon the existing literature (Norrman and Jansson, 2004; Jüttner
et al., 2003), the
following definition of global supply chain risk management
was developed:
Global supply chain risk management is the identification and
evaluation of risks and
consequent losses in the global supply chain, and
implementation of appropriate strategies
through a coordinated approach among supply chain members
with the objective of reducing
one or more of the following – losses, probability, speed of
event, speed of losses, the time for
detection of the events, frequency, or exposure – for supply
chain outcomes that in turn lead
to close matching of actual cost savings and profitability with
those desired.
An interesting addition in this definition, which had been
missing in the existing
124. definitions, is “matching of actual cost savings and profitability
targets with those
desired.” As the quote below suggests, it may be possible to
reduce adverse risk event
outcomes in the short run but the long run cost is critical to the
profitability of global
supply chain ventures:
Well I think the number one thing people would do is just put
inventory in the system. So
that’s one, one almost no-brain approach to dealing with risk,
just have a layer of inventory
on the system. Add 60 days more to inventory to deal with
globally outsourced product. But,
sixty days is enormous. I guess I have to do that in the short-
term but in the long run my only
hope is to try to get faster and more efficient [. . .] and the
companies that are the fastest are
going to really win because the others are going to be
paralyzed.
Everything else remaining the same, faster (shorter cycle time)
and higher efficiency
should lead to higher profits. Another manager discussed the
cost focus in his
company in terms of profits:
Probably one of the biggest difference between the company I
came from and this company.
And I don’t think it’s unique to this company. The focus on cost
is just unremarkable. We
have, in a sense, in our industry, cost reduced ourselves to
profitability over time.
Several outcomes are of interest in global supply chain risk
management. Foremost,
125. risk management should lead to closely matching the desired
cost savings and
profitability targets. Therefore, total supply chain cost and
profit that account for both
benefits and costs of risk management strategies are important
outcomes that need to
be measured to ascertain the effectiveness of a risk management
strategy (Beamon,
1998). However, other measures of supply chain performance
that are most likely to be
impacted by global supply and demand uncertainties should also
be included to
evaluate a risk management strategy holistically. On the supply
side, two outcomes of
interest in global supply chains emphasized in the literature as
well as by participants
Supply chain
risk management
strategies
205
in the qualitative study include supply disruptions (Chopra and
Sodhi, 2004), and
total inbound lead time (Fagan, 1991). On the demand side, the
outcomes most
emphasized include stock-outs (Chopra and Sodhi, 2004; Fisher,
1997), fill rates
(Beamon, 1998; Chang and Makatsoris, 2001), lead times, and
delays to customers
(Chopra and Sodhi, 2004). Operational outcomes of interest in
global supply
126. chains include average inventory (Cho and Kang, 2001; Min and
Zhou, 2002; Van der
Zee and Van der Vorst, 2005; Zsidisin, 2003a), premium freight
usage on both the
inbound and outbound side, cash-to-cash cycle time (Min and
Zhou, 2002), and
exposure (Miller, 1992). While other outcomes are self-
explanatory, exposure has been
defined as the number of different types of risk events that
occur in a given time period.
All risk-related outcomes are of interest in global supply chains.
However, the
propositions offered in this study are based on total net profit as
it encompasses
several other outcomes such as total cost (which in turn
includes inventory costs, cost
of delays to customers, stock-out costs, transportation cost), and
total revenue.
We found evidence of six risk management strategies in the
qualitative study also
supported by the literature: postponement (Bucklin, 1965; Chiou
et al., 2002; Zinn and
Bowersox, 1988), speculation (Bucklin, 1965), hedging,
control/share/transfer (Achrol
et al., 1983; Agrawal and Seshadri, 2000; Cachon, 2004),
security (Downey, 2004), and
avoidance (Miller, 1992). Although explored in literature, they
have not been explicitly
linked to risk management in global supply chains. Using
insights from the interviews,
the following discussion provides descriptions of the six risk
management strategies,
and develops propositions on the appropriateness of each
strategy under differing
levels of global supply and demand risks.
127. Postponement. Postponement entails delaying the actual
commitment of resources
to maintain flexibility and delay incurring costs (Bucklin,
1965). Form postponement
includes labeling, packaging, assembly, and manufacturing.
Time postponement refers
to the movement of goods from manufacturing plants only after
customer orders are
received (Zinn and Bowersox, 1988). The extent of form
postponement depends on
demand customization, component costs, product life cycle, and
product modularity
(Chiou et al., 2002). The following quote illustrates the
usefulness of postponement
strategy:
Let’s just say you architect your product into modules [...] and
what it does, it separates the
module production from the assembly of the product. Right
now, we’re highly integrated.
Greasing the parts and building the product all happen at the
same time. If you separate those
through your architecture, you have tremendous flexibility. You
can keep a factory open,
because it is not really necessarily a factory anymore, to do
assembly of your product close to
where you need it, at your distribution center, that makes sense
for how you distribute into
the marketplace. But you can do module production, literally,
anywhere. So you can now have
the right partnerships, you can have a technology partnership,
you can have a cost focus on
pieces that make sense, modules that make sense to have a cost
focus on. You can move
assembly from location to location. You can move modules
128. more easily because you
understand how they’re going to interact in the system as
opposed to our interactions. We
approach architecture in an integrated fashion today, the
interactions are not always
very clear.
A major problem faced by supply chains is how to justify the
cost of form
postponement. Form postponement requires a substantial
investment in understanding
product design (Van Hoek, 2001) and more effort as modular
products are more difficult
IJPDLM
38,3
206
to design than comparable interconnected systems (Baldwin and
Clark, 1997). The
existence of common or overlapping suppliers and customers in
different supply chains
may affect a firm’s ability to invest in the postponement related
facilities and training
programs (Yang et al., 2004). Any investment may provide a
benefit for competitors, i.e.
a source of opportunism, and hence increase transaction costs.
With increasing interest
in postponement (Yang et al., 2004), measures have been
developed to improve
coordination through behavioral interdependence, and reduction
in autonomy of
coordinating organizations and thereby reducing behavioral
129. uncertainty (Appelqvist
and Gubi, 2005). Building on Perry (1991), who suggests the
potential benefits of
postponement depend on the uncertainty projected in the
operating environment, it is
argued that supply chains facing low demand uncertainty will
not benefit as much from
form postponement as supply chains facing high demand
uncertainty. Therefore:
P1. Supply chains facing SLDH and SHDH environments are
more likely to adopt
form postponement strategies than those facing SLDL and
SHDL
environments.
We did not find evidence of time postponement strategies in our
interviews. This is
probably because distance and logistics constraints (e.g.
availability of transportation
options and delays at ports) make time postponement an
expensive strategy in a global
supply chain context. At most, a few executives mentioned the
use of air to expedite
freight. This was driven more as a fall-back option for
contingencies than a
well thought out postponement strategy. However, based on the
literature, it is
expected that flexible supply chains operating in high demand
risk environments are
more likely to adopt time postponement strategies.
An interesting observation in the qualitative study was a general
sense of
enthusiasm towards form postponement strategy. It appeared
that an increasing trend
130. toward off-shoring provided a motivation for form
postponement. Yang et al. (2004)
also argue that with increasing attention to mass customization,
agile operations, and
e-business strategies, there should be more interest in
postponement; however, there
has been an absence of empirical research supporting this
implication. Since global
supply chains face high risks, postponement becomes
increasingly valuable as the
proportion of off-shore components in the final product
increases. Therefore, as a
preliminary observation, we believe that as the proportion of
off-shore components in
the final product increases, the likelihood of a supply chain
considering investment in
form postponement will increase.
Speculation. Speculation (also called selective risk taking) is a
demand-side risk
management strategy that is the opposite of postponement
(Bucklin, 1965). Bucklin
(1965, p. 27), mentions that “the principle of speculation holds
that changes in form, and
the movement of goods to forward inventories, should be made
at the earliest possible
time in the marketing flow in order to reduce the costs of the
marketing system.” It
includes such actions as forward placement of inventory in
country markets, forward
buying of finished goods or raw material inventory, and early
commitment to the form
of a product, all in anticipation of future demand. In the
interviews, speculation
emerged as the most commonly used strategy to address
uncertainty in the business
131. environment:
The total amount of initiatives (e.g. products, product lines, and
markets) that you could
potentially work on would far exceed that number (of initiatives
that are realistically possible
Supply chain
risk management
strategies
207
because of resource constraints). So the difficult decisions were
really to place your bets, so to
speak, on the right horses. In other words, try to make sure you
worked on the things that
were really going to deliver the year end objectives because if
they didn’t it reflected on all of
our evaluations, which is as a matter of fact reflected in our
compensation.
In speculation, decisions are made on anticipated customer
demand. The resources in
the supply chain need to be directed to those specific products
and customers that
provide the firm with a competitive advantage (Perry, 1991). By
fixing the form of the
finished goods at the earliest point, it is possible to gain
economies of scale in
production, procurement, and transportation, as well as lead to
reduction in sorting
costs. However, to ascertain the form of finished goods is more
132. useful in low demand
risk conditions. That is, speculation requires high-quality
estimates of demand, which
is possible under low demand uncertainty. An example of
speculation is, in case of
limited market research resources, to serve customers with
similar demographics in
culturally-similar countries rather than developing customized
products for new
markets. In speculating about cost-risk trade-offs, managers
should typically be aware
of the supply-demand and/or operating trade-offs associated
with the options and
choose to avoid unattractive options. Supply chains facing low
demand uncertainty are
better suited to achieve the benefits of speculation. Therefore:
P2. Supply chains facing SLDL and SHDL environments are
more likely to adopt a
speculation strategy than supply chains facing SLDH and SHDH
environments.
Hedging. Hedging is a supply side risk management strategy. In
a global supply-chain
context, hedging is undertaken by having a globally dispersed
portfolio of suppliers
and facilities such that a single event (like currency fluctuations
or a natural disaster)
will not affect all the entities at the same time and/or in the
same magnitude. Managers
in the study mentioned having “qualified back-up” suppliers in
the USA because their
supply chains are not in a position to accommodate even short-
term disruptions. An
example quote illustrates the impact of absence of a hedging
strategy:
133. Company X got burned a number of times with currency
fluctuations due to outsourced
product. Euro has been strengthening, (and had) a dramatic
impact on X’s profitability; The
import of that European product was very profitable, but a lot of
profitability got wiped out
due to the currency issues. I think there’s a huge risk we face
right now as they outsource
more and more stuff to China, that the Yuan or the RMB, it’s
likely that’s going to strengthen I
would think. And that could wipe out a good chunk of the
savings.
Hedging is an expensive strategy because it involves creating
multiple options for
decision variables. For example, dual sourcing can be used as a
hedge against risks of
quality, quantity, disruption, price, variability in performance,
and opportunism
(Berger et al., 2004), but dual sourcing requires more
investment than single sourcing.
Another consideration in hedging is the requirement of similar
levels of output in terms
of quality and service across multiple facilities or supply chain
partners. Hence,
hedging yields maximum benefits where strong quality and
process controls are in
place. In sum, hedging requires high levels of investment,
which is justified and more
valuable only if a supply chain faces high supply risks.
Therefore:
P3. Supply chains facing SHDL and SHDH environments are
more likely to adopt
hedging as compared to supply chains facing SLDL and SLDH
134. environments.
IJPDLM
38,3
208
Control/share/transfer. The interviews suggest that control,
share, or transfer of risks
take the form of vertical integration, contracts, and agreements.
Vertical integration
increases the ability of a member of a supply chain to control
processes, systems,
methods, and decisions. Vertical integration may take the form
of forward
(downstream) or backward (upstream) integration, and is
therefore, both a supply
side and demand side risk management strategy. The literature
suggests that
integration may also be used to create entry or mobility barriers
(Bucklin, 1965).
Desirability of control and hence the level of integration also
depend on the commitment
of the focal firm to the target market. Vertical integration may
increase control and
reduce risks in a supply chain, but it changes variable costs into
fixed costs.
Need for greater control leads to higher demand side integration
(Anderson and
Gatignon, 1986). Innovative products, such as proprietary
products and high service
requirement products, are more likely to be sold through
forward integrated supply
135. chains (Boedecker and Morgan, 1980). An example is
biotechnology companies
involved in drug discovery. These companies overcome the
uncertainty and need for
technology integration through acquisition and partnering
strategies. Such strategies
help biotechnology companies apply their technologies across a
broad range of
applications within the drug discovery supply chain to maximize
opportunities for
product development, thereby delivering competitive advantage
through better speed,
cost, quality and direction (Amir-Aslani and Negassi, 2006).
Another example is that of
banks and insurance companies that create innovative
partnerships, buying stakes in
other companies and forming strategic alliances to sell an
increasingly wider and
complex portfolio of financial products (Schroeder, 1998). On
the supply side, some of
the risks that provide incentive for backward integration are
opportunism and asset
specificity by the supplier, capacity constraints, and the
supplier-buyer power balance
(Achrol et al., 1983; Ellram and Siferd, 1998; Williamson,
1979).
However, vertical integration ties up capital and reduces the
flexibility of the supply
chain to react to environmental changes. There is a growing
trend toward supply and
demand side disintegration, with firms focusing more on core
competencies, and
outsourcing non-critical activities. For example, in the global
semiconductor industry,
there is vertical separation of design, manufacture, equipment
136. production and process
development (Macher et al., 2002). Several companies in our
sample are engaged in
manufacturing electronic components and products and
electrical appliances are
increasingly outsourcing and off-shoring manufacturing
activities. An interesting
example is one company in our sample that started as an
electronic and electrical
components and product manufacturing company. Today, it
earns substantial revenue
from managing the product-design and development process
with completely
outsourced contract manufacturing.
In such fragmented supply chains, benefits of control can also
be obtained through
virtual supply chain integration and supply chain collaboration.
Writing specific
contracts to share and transfer risks can be employed as an
alternative to vertical
integration. Sharing or transferring risks takes place through
outsourcing and/or
writing flexible contracts with clauses that account for possible
changes in the
environment and associated risks (Macneil, 1978). Sharing and
transferring risk may
take place in supply chains with either a short-term or a long-
term focus.
Supply chain
risk management
strategies
209
137. We found no strong link between environment and the types and
extent of control
strategies. Therefore, an interesting research direction is to
explore this link further. In
terms of vertical integration only, we propose:
P4. Supply chains facing SHDL environment are more likely to
adopt backward
integration, supply chains facing SLDH environments are more
likely to adopt
forward integration, and supply chains facing SHDH
environments are more
likely to adopt both backward and forward integration.
Security. Global supply chain security encompasses information
systems security,
freight breaches, terrorism, vandalism, crime, and sabotage.
Security strategy is aimed
at increasing a supply chain’s ability to sort out what is moving,
and identify unusual
or suspicious elements. Security strategy also encompasses
working closely with
government and port officials to proactively comply with
regulations and avoid
unnecessary delays at border-crossing points. Several
government efforts such as the
Container Security Initiative, the Customs Trade Partnership
Against Terrorism
(CTPAT), and the overarching operation safe commerce
initiative provide directions to
gradually enhance the security of global commerce (Downey,
2004).
138. Our study revealed that the direction for pursuing security
strategies and several
government guidelines (such as security criteria for Long Haul
Highway Carriers in
Mexico) are based on CTPAT. The US Customs and Border
Protection web site
(www.cbp.gov) provides several documents with guidelines to
enhance the safety of
the cargo entering the USA. The International Ship and Port
Facility Code,
introduced by the International Maritime Organization, came
into effect in July 2004.
It is a code agreed between the signatories on minimum security
arrangements for
ships, ports and coast guard agencies.
Many companies go beyond the statutory regulations to secure
their supply chains.
Almost all managers in the qualitative study reported concern
for supply chain
security and that they are taking proactive actions to secure
their supply chains.
Private initiatives mentioned by our participants included
tracking and monitoring the
integrity of cargo containers using RFID and GPS, usage of
temper-proof seals, and
working with port officials to understand and implement
CTPAT guidelines.
Managers facing all varieties of the supply and demand risks
reported having more
security checks in place because of going global and
increasingly stringent regulations.
Therefore, we propose:
P5. All types of supply chains will increase the use of security
strategies.
139. An important implication of this proposition is that supply chain
managers need to
include the costs of implementing security strategies with all
other risk management
strategies. Some strategies, such as vertical integration and
avoidance, may reduce
security strategy costs while others, such as transferring risks,
may increase the cost of
implementing security strategies.
Avoidance. The qualitative study pointed to the existence of
two types of avoidance
strategies. Avoidance strategy Type 1 is used when the risks
associated with operating
in a given product or geographical market, or working with
particular suppliers or
customers, is considered unacceptable. Miller (1992) suggests
that avoidance takes the
form of exiting through divestment of specialized assets, delay
of entry into a market
IJPDLM
38,3
210
or market segment, or participating only in low uncertainty
markets. The following
quote illustrates:
If it was all easy, then there’s not much reward in assuming the
risk. It is a risk/benefit trade
off. We get benefit from moving to China through costs and we
140. can quantify how much we
think we can save by moving product to China, for example. But
if that probability of risk
times impact is greater than the benefit, then you make a
conscious decision that that’s
probably not a good idea.
Avoidance strategy Type 1 is geared toward driving overall
probabilities associated
with risk events of a decision to zero by ensuring that the risk
does not exist. In
avoiding risks, managers are aware of the supply-demand and/or
operating trade-offs
associated with the options and choose to avoid or drop some of
these risks.
Avoidance strategy Type 2 takes the form of preempting
adverse events. For
example, in our interviews, we found that avoidance strategy for
off-shoring quality
issues consists of site audit and approval, and product audit and
approval. Managers
ensure that all participants are on a quality base line so that
quality problems are
avoided. However, they understand that although quality is a
given, there are
variations across people (including those who do the audits) and
suppliers.
The following quote is illustrative:
[. . .] make sure that you understand what all the risks are and
the people are picking up on
them and addressing them. Before we produce product in this
facility it has to pass our audits
and be approved and then you have to get the product approved
there as well. So they have to
141. build some sample product and send it to us and have some
testing done, and approve it from
that standpoint. So there’s a site approval and a product
approval that we go through before
we fully approve any specific product out of a specific site.
In avoidance strategy Type 2, reducing the frequency and
probability of a risk event is
of concern. This usually arises when managers have no option
but to venture into high
uncertainty demand or supply markets. A review of the
literature suggests that quality
costs can primarily be divided into prevention, appraisal, and
failure. Our participants
suggested that quality-related costs for off-shore manufacturing
can add up to
a substantial part of a company’s costs. Giakatis et al. (2001)
provide a good review of
the stream of literature focused on understanding the cost of
quality. This literature
stream can provide valuable guidance for managers seeking to
better understand and
apply quality control frameworks in a global manufacturing
context.
Our interviews revealed that supply chains operating in all types
of environments
attempt to avoid risks within the constraints of acceptable
returns such as revenue and
profit targets. If a supply chain has an option to not enter a
SHDH environment but still
meet targets, then it is more likely to adopt a Type 1 avoidance
strategy. However, if a
supply chain has no choice but to enter a SHDH environment to
achieve its targets, then
it is more likely to adopt a Type 2 avoidance strategy. All types
142. of supply chains adopt
avoidance strategies to varying degrees, driven by the
availability or non-availability
of options. Therefore:
P6. Supply chains operating in all types of environment adopt
avoidance
strategies. Type 1 avoidance strategy is adopted when a supply
chain has an
option not to enter a high demand or supply risk environment.
Type 2
avoidance strategy is adopted when a supply chain has no option
but to enter
a high demand and/or supply risk environment.
Supply chain
risk management
strategies
211
The moderating role of team composition
The first step in identifying risk typically starts when an
opportunity to reduce costs or
to increase revenues is recognized by a firm in the supply chain.
This opportunity may
be realized by sourcing from, producing in, or selling across the
domestic market
borders. Such decisions may be capital intensive and have major
cost or strategic
implications. This is because operational decisions related to
inventory policies and
levels, transportation contracts, and warehouse capacity and
143. locations have to be
linked with sourcing and marketing decisions to optimize supply
chain operations.
Therefore, such decisions cannot be easily reversed in the short
run. The interviews
support the contention that such decisions tend to be team-
based:
One person might make the wrong decision four times out of a
hundred. But a collaborative
team will always make the right one [. . .] So the positive side
is it allows executing at a high
level. The negative side is that it takes time, more time than we
would like. So if we’re making
a supply chain decision to make something in Mexico or in Asia
or in Europe, it takes more
people to be involved in making the right decision than if we’re
deciding to make it in Los
Angeles, California.
Team members bring different perspectives to solving a
problem. Hence, team
composition becomes an important determinant of the quality of
risk identification and
management. However, for the team to effectively and
efficiently reach a decision, it is
important to understand the trade-offs and counteractive forces
that may exist in a
group. The following quote from a senior supply chain
executive provides an example:
[. . .] in addition to supply chain we had procurement
involvement, legal, customs, material
control involved in decision making for off-shore procurement.
Factory material control was a
key player in this. They’re the ones that are impacted. They’re
144. sitting there running the
factories and if they don’t have the parts they’re the ones who
feel the pain when the parts
aren’t there so they had a vested interest in doing everything
they could to stop this project.
The interviews suggested the following important trade-offs and
counteractive forces
should be considered when determining the team composition
for a global supply chain
decision:
. members with stakes for and against the decision in question;
. members with risk-averse versus risk-taking attitudes;
. trade-offs between inclusion of members outside the
organization, and the time
and cost of such an effort. For example, involving supply chain
members may
pay off in the long run but may involve significant investment
by the focal
firm; and
. getting the most functionally proficient managers versus
managers with
long-term vision.
Because of the above factors, given the same antecedent
conditions, the strategy
selected will differ with different team composition. Therefore:
P7. Team composition affects the relationship between the
antecedents and the
strategy selected.
145. An important implication of this proposition is that who gets
involved in decision
making should depend on the kind of change. Three types of
changes may accompany
IJPDLM
38,3
212
global supply chain decisions that may affect the supply chain
risks: consumer facing
changes, changes in the source of components that provide the
same functionality, and
changes that affect operational capabilities. An example
provided by a participant in
the study illustrates. If a company changes the supplier of
printed circuit boards (PCB)
from a domestic supplier to an off-shore supplier, as long as the
functionality is the
same as before, marketing may not need to get involved. Hence,
in this case, supply
risks can be adequately handled by logistics and quality
auditors. However, for these
same PCBs, deciding on how to protect the proprietary software
in the PCBs requires
active involvement of product design specialists. Therefore, a
different team
composition is required for security risks.
Another example from the qualitative study is that of worldwide
procurement of
stainless steel that goes into home appliances. The refrigerator
cannot look different
146. than the dishwasher or stovetop in terms of finish and color. In
this case, the marketing
department is expected to be a part of the decision and to agree
that the color and finish
match to avert demand risks. Depending on the type of decision,
the team composition
most appropriate to reach effective decisions varies. Exploring
team compositions for
different types of global supply chain decisions is an interesting
future research
direction.
Supply chain performance
Given the definition of risk management in global supply
chains, risk management
strategies should lead to reduction in loss, probability, speed,
frequency, and/or
exposure of risk events and thereby improve the supply chain
outcomes listed in
Figure 2. Per the concept of fit discussed earlier, adopting a
strategy that fits the
propositions above should lead to better performance.
Moderators to risk management outcomes
The qualitative research suggests that complexity of the supply
chain and the degree
of inter-organizational learning in the supply chain moderate
the relationship between
the risk management strategies selected and risk management
outcomes.
Supply chain complexity. Supply chains are composed of
elements that have
intricate, counterintuitive, and nonlinear links, and as a
consequence, are both complex
and adaptive (Choi and Hong, 2002). Supply chain complexity
147. is an aggregate measure
of the structure, type, and volume of interdependent activities,
transactions, and
processes in the supply chain. It also includes the information,
constraints, and
uncertainties under which these activities, transactions, and
processes take place
(Manuj and Sahin, 2005). The dimensions of complexity
identified in literature include
levels and tiers in a system (Choi and Hong, 2002); form of
technology and nature of
information processing (Vachon and Klassen, 2002); and
volume and variety of
logistics transactions, stock keeping units, number of supplying
and distribution
partners, number of countries involved, and origin-destination
pair permutations (Rao
and Young, 1994).
A manager suggested, “as you move internationally, the
complexity goes up
considerably.” Global supply chains drive up the level of
complexity, which drives up
the level of risks. When the level of complexity is uncontrolled,
the system is less
predictable. Therefore, reducing complexity should be a
strategic goal for operations
(Frizelle and Woodcock, 1995). There is evidence in the
literature that less complex
Supply chain
risk management
strategies
213
148. supply chains are better able to manage supply risks (Wilding,
1998) and improve
performance (Vachon and Klassen, 2002). Furthermore, lower
complexity leads to
better implementation of strategies by reducing issues such as
confusion about
ownership of inventory, bullwhip effect, and inertia (Wilding,
1998) and increases the
predictability of the outcomes. Therefore:
P8. Greater supply chain complexity lessens the relationship
between supply
chain risk strategies and risk-related outcomes.
Inter-organizational learning. Organizational learning helps a
firm develop its
knowledge base (Holmqvist, 2003; Huber, 1991), and provides
fresh insights into
strategies, markets, and relationships (Hult et al., 2000).
Learning can also provide a
platform for building dynamic capabilities (Teece et al., 1997).
However, in the current
age of increasing fragmentation, it is not a single organization
that implements a
strategy but a set of institutions, agencies, and establishments
that reside in multiple
countries and are often independently owned. Therefore, the
focus of learning shifts
from within-organizations to between-organizations – i.e. inter-
organizational
learning. Inter-organizational learning is a process by which
supply chain partners
share and combine information and knowledge in creative ways
149. that lead to enhanced
supply chain outcomes:
There’s value in institutional knowledge of a supplier that they
have with us, we have with
them, their technical capabilities, their quality systems. We like
it best when the supplier
stays with us but is competitive. If the question was how do you
get them (suppliers) to move
their assets (from Mexico to China), you really don’t. But
marketplace gets them to move their
assets. They’ve got to make decision, do they make investments
to be a global player or not.
There is great value in that institutional knowledge. So that is
really what we like to
have happen.
Inter-organizational learning positively affects several
performance measures in
supply chains, such as reduction in cycle time (Hult et al., 2002;
Hult et al., 2003), higher
resilience (Comfort, 1994), higher levels of relationship
commitment (Hult et al., 2003),
and increased flexibility, which consequently lead to a larger
set of strategies from
which to choose, as well as better implementation of selected
strategies:
P9. Greater inter-organizational learning strengthens the
relationship between
supply chain risk strategies and risk management outcomes.
Implications
Although important, risk management has not received enough
attention ( Jüttner et al.,
2003). Several strategies have been suggested, but there is little
150. knowledge about the
antecedents that lead to their adoption. This paper addresses
this gap and presents a
model of risk management strategies based on a qualitative
study and weaves it into
the existing literature. It is important to reassert here that, since
the qualitative study
was based on global manufacturing firms, the propositions
developed in this paper
hold only for participants of global manufacturing, and similar,
supply chains. As
mentioned earlier, the intent of qualitative study is to explore
concepts based on
thorough understanding of a few key informants (McCraken,
1988). The goal is not to
generalize but to explore the full breadth of the phenomenon
(Strauss and Corbin,
1998). Several research and managerial implications result from
this effort.
IJPDLM
38,3
214
Research implications
The first theoretical implication is the identification of
antecedents to supply chain risk
management strategies. Although the literature identifies
several strategies for
managing supply chain risks, it falls short in identifying when
to use each strategy.
This paper addresses the gap by identifying the most important
antecedents to
151. selection of risk management strategies and linking the
antecedents to appropriate
strategies. Future research should quantitatively explore the
strength of these
relationships and qualitatively explore whether more
antecedents exist and their
complex nature.
A second contribution is the exploration of the concept of risk
in a global supply
chain context. Several new dimensions of risk, namely speed
and frequency, other than
the popular dimensions of probability and losses have been
identified and explored to
explicate the concept of risk in global supply chains. Speed and
frequency coupled with
increased lead times, lead time variability, physical distances
from sources of risk, and
lesser control over the supply chain increase the magnitude of
problems manifold in
global supply chains as compared to domestic supply chains.
These dimensions should
serve the body of knowledge well in helping practitioners frame
their global supply
chain management risk strategies, and in helping future
researchers better understand
the nuances of global supply chain risk management.
An important insight is the moderating effect of team
composition on the
relationship between the selection of risk management strategies
and its antecedents.
Little work has been done to explain the nature of team
composition in supply chains
and, as such, this is a contribution to the body of knowledge.
Moreover, how the
152. various risk management strategies and their relationship with
temporal focus and
supply chain characteristics is affected by team composition
suggests a whole program
of research to examine the impact of team composition on
various supply chain
decisions.
We also identify and elaborate on two moderators of the
strategy
implementation-performance relationship – complexity and
inter-organizational
learning. The literature does not sufficiently address
implementation issues after
strategy selection, and this is a contribution of this paper. Many
strategies fail in the
implementation phase. For risk management strategies,
managing complexity and
leveraging inter-organizational learning can lead to better
supply chain performance.
Some complexity reduction measures mentioned by our
particpants in conjunction
with risk management included stock keeping units
rationalization, serving varied
customers such as contract and retail stores through one
integrated supply chain, and
reducing number of suppliers. The other moderator is inter-
organizational learning
which can lead to faster and better implementation of a selected
strategy. In addition,
learning leads to increased flexibility that leads to more
strategic options. Developing a
step-by-step strategy implementation protocol is not the focus
of this paper, but we
describe two broad areas of focus in supply chains that
moderate strategy
153. implementation, which should help future researchers develop
such a step-by-step
protocol.
A limitation of this study is the sample consists exclusively of
managers involved in
making and executing supply chain decisions for their firms,
with the exception of one
manager who is involved with both in-house supply chain
planning and for external
clients. Although we reached theoretical saturation in our
sample, very rich data were
Supply chain
risk management
strategies
215
provided by the manager who is involved with external clients.
We believe that
in-depth interviews with managers in 3PL firms, and those
providing global supply
chain solutions to external clients would provide additional
insights, particularly
concerning additional strategies for managing risks. Future
research may also focus on
linking the strategies to outcomes, i.e. if a particular risk
management strategy is
adopted, what outcomes are influenced the most.
An interesting research direction follows from a major concern
expressed by several
154. manages in our study. As discussed earlier, it is challenging to
determine optimal order
quantities, optimal production quantities, safety stock levels,
and other inventory
policies in global supply chains. A future research direction is
to comparatively
investigate multiple inventory policies in terms of cost and
profitability.
Future research should also focus on refining and testing the
model with qualitative
and quantitative data across different industries and companies,
including tier one or
tier two suppliers, retail chains, and 3PL service providers.
Further qualitative and
quantitative empirical testing should reveal variations, if any,
across multiple firms in
a supply chain, industries, and cultures. On the quantitative
side, survey research is
appropriate as it emphasizes representative sampling, and seeks
to maximize
population generalizability thereby enhancing the external
validity of research.
The size, complexity, and stochastic nature of global supply
chains also make
computer-based simulation a useful methodology for future
research.
Managerial implications
Although the lack of quantitative testing of the model at this
point limits the
managerial implications, there are still several implications for
managers. First,
managers should fully understand, at a minimum, the six risk
management strategies
discussed in this paper, namely postponement, speculation,
155. hedging,
control/share/transfer, security, and avoidance. No company or
supply chain can
afford to adopt one of these strategies for all global supply
chains. Different global
supply chain conditions (moderated by team composition) affect
the appropriateness of
the various strategies. Managers must understand the advantages
and disadvantages
of the various risk management strategies, and when they are
appropriate.
Managers should also consider the composition of risk
management teams, in terms
of functions and orientations represented, to assess and manage
the myriad of global
supply chain risks.
In light of heightened concerns for global supply chain safety
and security,
managers need to consider the costs of securing global supply
chains in their decisions.
Documenting the security strategies developed by managers is
another useful and
timely area of further research.
The risk management outcomes discussed in this paper also
provide direction to
managers in the performance metrics that should be developed
to assess the success or
failure of global supply chain risk management. It is certainly
axiomatic that what is
not measured cannot be managed. Further, what is measured
incorrectly or
under-measured will be mismanaged (Mentzer and Firman,
1994). Developing metrics
that accurately and fully tap the impact of effectively managing
156. risks in global supply
chains will drive managers to take appropriate, well managed
risks. This development
is beyond the scope of this paper, but certainly holds
considerable opportunities for
managers and future research.
IJPDLM
38,3
216
Finally, it is important for global supply chain managers to
consider the degree of
complexity in their various global supply chains, and the ability
of their organizations
to partially ameliorate this complexity by adopting inter-
organizational learning
processes. Although the exact nature of the impact of
complexity and learning on
performance outcomes still needs further research, managers
can begin to adopt the
strategies discussed and cited here.
Managers in our study repeatedly made comments about the fact
that growth in
outsourcing and off-shoring, increasingly demanding customers,
geographical
dispersion of supply chain, access to markets in emerging
economies, and
unanticipated events such as terrorist acts and natural disasters
will lead to
increased complexity, risks, and opportunities in global supply
chains. Thus, this
157. paper is an important initial step in developing models of global
supply chain risk
management strategies. The area is ripe with opportunity, both
for future research and
competitive advantage.
References
Achrol, R.S., Reve, T. and Stern, L.W. (1983), “The
environment of marketing channel dyads: a
framework for comparative analysis”, Journal of Marketing,
Vol. 47 No. 4, pp. 55-67.
Agrawal, V. and Seshadri, S. (2000), “Risk intermediation in
supply chains”, IIE Transactions,
Vol. 32 No. 9, pp. 819-31.
AlHashim, D.D. (1980), “Internal performance evaluation in
American multinational enterprises”,
Management International Review, Vol. 20 No. 3, pp. 33-9.
Amir-Aslani, A. and Negassi, S. (2006), “Is technology
integration the solution to
biotechnology’s low research and development productivity?”,
Technovation, Vol. 26
Nos 5/6, pp. 573-82.
Amit, R. and Schoemaker, P.J.H. (1993), “Strategic assets and
organizational rent”, Strategic
Management Journal, Vol. 14 No. 1, pp. 33-46.
Anderson, E. and Gatignon, H. (1986), “Models of foreign
entry: a transaction cost analysis and
propositions”, Journal of International Business Studies, Vol.
17 No. 3, pp. 1-26.
158. Appelqvist, P. and Gubi, E. (2005), “Postponed variety creation:
case study in consumer
electronics retail”, International Journal of Retail &
Distribution Management, Vol. 33
No. 10, pp. 734-48.
Baird, I.S. and Thomas, H. (1985), “Toward a contingency
model of strategic risk taking”,
Academy of Management Review, Vol. 10 No. 2, pp. 230-43.
Baird, I.S. and Thomas, H. (1991), “What is risk anyway? Using
and measuring risk in strategic
management”, in Bettis, R.A. and Thomas, H. (Eds), Risk,
Strategy and Management,
JAI Press, Greenwich, CT.
Baldwin, C.Y. and Clark, K.B. (1997), “Managing in an age of
modularity”, Harvard Business
review, Vol. 75 No. 5, pp. 84-93.
Barry, J. (2004), “Perspectives: supply chain risk in an
uncertain global supply chain
environment”, International Journal of Physical Distribution &
Logistics Management,
Vol. 34 No. 9, pp. 695-7.
Beamon, M. (1998), “Supply chain design and analysis: models
and methods”, International
Journal of Production Economics, Vol. 55 No. 3, pp. 281-94.
Supply chain
risk management
strategies
217
159. Berger, P.D., Gerstenfeld, A. and Zeng, A.Z. (2004), “How
many suppliers are best?
A decision-analysis approach”, Omega (Oxford), Vol. 32 No. 1,
pp. 9-15.
Birou, L.M. and Fawcett, S.E. (1993), “International
purchasing: benefits, requirements, and
challenges”, International Journal of Purchasing & Materials
Management, Vol. 29 No. 2,
pp. 28-37.
Boedecker, K.A. and Morgan, F.W. (1980), “The channel
implications of product liability
developments”, Journal of Retailing, Vol. 56 No. 4, p. 59.
Buckley, P.J. and Casson, M.C. (1998), “Models of the
multinational enterprise”, Journal of
International Business Studies, Vol. 29 No. 1, pp. 21-44.
Bucklin, L.P. (1965), “Postponement, speculation and the
structure of distribution channels”,
Journal of Marketing Research, Vol. 2 No. 1, pp. 26-31.
Cachon, G.P. (2004), “The allocation of inventory risk in a
supply chain: push, pull, and
advance-purchase discount contracts”, Management Science,
Vol. 50 No. 2, pp. 222-38.
Carter, J.R. and Vickery, S.K. (1989), “Currency exchange
rates: their impact on global sourcing”,
Journal of Purchasing & Materials Management, Vol. 25 No. 3,
pp. 19-25.
160. Cavinato, J.L. (2004), “Supply chain logistics risks: from the
back room to the board room”,
International Journal of Physical Distribution & Logistics
Management, Vol. 34 No. 5,
pp. 383-7.
Chang, Y. and Makatsoris, H. (2001), “Supply chain modeling
using simulation”, International
Journal of Simulation, Vol. 2 No. 1, pp. 24-30.
Chiou, J-S., Wu, L-Y. and Hsu, J.C. (2002), “The adoption of
form postponement strategy in a
global logistics system: the case of Taiwanese information
technology industry”, Journal
of Business Logistics, Vol. 23 No. 1, pp. 107-24.
Cho, J. and Kang, J. (2001), “Benefits and challenges of global
sourcing: perceptions of US apparel
retail firms”, International Marketing Review, Vol. 18 No. 5,
pp. 542-61.
Choi, T.Y. and Hong, Y. (2002), “Unveiling the structure of
supply networks: case studies in
Honda, Acura, and DaimlerChrysler”, Journal of Operations
Management, Vol. 20 No. 5,
pp. 469-93.
Chopra, S. and Sodhi, M.S. (2004), “Managing risk to avoid
supply-chain breakdown”, MIT Sloan
Management Review, Vol. 46 No. 1, pp. 53-62.
Christopher, M. and Lee, H. (2004), “Mitigating supply chain
risk through improved confidence”,
International Journal of Physical Distribution & Logistics
Management, Vol. 34 No. 5,
pp. 388-96.
161. Christopher, M. and Peck, H. (2004), “Building the resilient
supply chain”, International Journal of
Logistics Management, Vol. 15 No. 2, pp. 1-13.
Comfort, L.K. (1994), “Risk and resilience: inter-organizational
learning following the Northridge
earthquake of 17 January 1994”, Journal of Contingencies &
Crisis Management, Vol. 2
No. 3, p. 157.
Creswell, J.W. (1998), Qualitative Inquiry and Research
Design: Choosing among Five Traditions,
Sage, Thousand Oaks, CA.
Denzin, N.K. and Lincoln, Y.S. (1998), Introduction: Entering
the Field of Qualitative Research,
Sage, Thousand Oaks, CA.
Downey, M.L. (2004), “The challenge of transportation
security”, Supply Chain Management
Review, Vol. 8 No. 2, pp. 9-10.
Ellram, L.M. and Siferd, S.P. (1998), “Total cost of ownership:
a key concept in strategic cost
management decisions”, Journal of Business Logistics, Vol. 19
No. 1, pp. 55-84.
IJPDLM
38,3
218
Fagan, M.L. (1991), “A guide to global sourcing”, The Journal
162. of Business Strategy, Vol. 12 No. 2,
pp. 21-5.
Fawcett, S.E., Calantone, R. and Sheldon, S.R. (1996), “An
investigation of the impact of flexibility
on global reach and firm performance”, Journal of Business
Logistics, Vol. 17 No. 2,
pp. 167-96.
Fisher, M.L. (1997), “What is the right supply chain for your
product?”, Harvard Business Review,
Vol. 75 No. 2, pp. 105-16.
Flint, D.J. and Mentzer, J.T. (2000), “Logisticians as marketers:
their role when customers’ desired
value changes”, Journal of Business Logistics, Vol. 21 No. 2,
pp. 19-45.
Flint, D.J., Woodruff, R.B. and Gardial, S.F. (2002), “Exploring
the phenomenon of customers’
desired value change in a business-to-business context”, Journal
of Marketing, Vol. 66
No. 4, pp. 102-17.
Frizelle, G. and Woodcock, E. (1995), “Measuring complexity
as an aid to developing operational
strategy”, International Journal of Operations & Production
Management, Vol. 15 No. 5,
pp. 26-39.
Ghoshal, S. (1987), “Global strategy: an organizing
framework”, Strategic Management Journal,
Vol. 8 No. 5, pp. 425-40.
Giakatis, G., Enkawa, T. and Washitani, K. (2001), “Hidden
quality costs and the distinction
163. between quality cost and quality loss”, Total Quality
Management, Vol. 12 No. 2,
pp. 179-90.
Giunipero, L.C. and Eltantawy, R.A. (2004), “Securing the
upstream supply chain: a risk
management approach”, International Journal of Physical
Distribution & Logistics
Management, Vol. 34 No. 9, pp. 698-713.
Glaser, B.G. (1978), Theoretical Sensitivity, The Sociology
Press, Mill Valley, CA.
Harland, C., Brenchley, R. and Walker, H. (2003), “Risk in
supply networks”, Journal of
Purchasing & Supply Management, Vol. 9 No. 2, pp. 51-62.
Hauser, L.M. (2003), “Risk-adjusted supply chain
management”, Supply Chain Management
Review, Vol. 7 No. 6, pp. 64-71.
Holmqvist, M. (2003), “A dynamic model of intra- and inter-
organizational learning”,
Organization Studies, Vol. 24 No. 1, pp. 95-123.
Huber, G.P. (1991), “Organizational learning: the contributing
processes and the literatures”,
Organization Science: A Journal of the Institute of Management
Sciences, Vol. 2 No. 1,
pp. 88-115.
Hult, G.T.M. (1997), “Measuring cycle time of the global
procurement process”, Industrial
Marketing Management, Vol. 26 No. 5, pp. 403-12.
Hult, G.T.M., Ferrell, O.C. and Hurley, R.F. (2002), “Global
164. organizational learning effects on
cycle time performance”, Journal of Business Research, Vol. 55
No. 5, pp. 377-87.
Hult, G.T.M., Ketchen, D.J. Jr and Nichols, E.L. Jr (2003),
“Organizational learning as a strategic
resource in supply management”, Journal of Operations
Management, Vol. 21 No. 5,
pp. 541-56.
Hult, G.T.M., Hurley, R.F., Giunipero, L.C. and Nichols, E.L.
Jr (2000), “Organizational learning in
global purchasing: a model and test of internal users and
corporate buyers”, Decision
Sciences, Vol. 31 No. 2, pp. 293-325.
Johnson, M.E. (2001), “Learning from toys: lessons in
managing supply chain risk from the toy
industry”, California Management Review, Vol. 43 No. 3, pp.
106-24.
Supply chain
risk management
strategies
219
Jüttner, U. (2005), “Supply chain risk management”,
International Journal of Logistics
Management, Vol. 16 No. 1, pp. 120-41.
Jüttner, U., Peck, H. and Christopher, M. (2003), “Supply chain
risk management: outlining an
165. agenda for future research”, International Journal of Logistics:
Research & Applications,
Vol. 6 No. 4, pp. 197-210.
Kogut, B. (1985), “Designing global strategies: profiting from
operational flexibility”, Sloan
Management Review, Vol. 27 No. 1, pp. 27-38.
Kogut, B. and Kulatilaka, N. (1994), “Operating flexibility,
global manufacturing, and the option
value of a multinational network”, Management Science, Vol.
40 No. 1, pp. 123-39.
Lee, H.L. (2002), “Aligning supply chain strategies with
product uncertainties”, California
Management Review, Vol. 44 No. 3, pp. 105-19.
Lessard, D.R. and Lightstone, J.B. (1986), “Volatile exchange
rates can put operations at risk”,
Harvard Business Review, Vol. 64 No. 4, pp. 107-14.
McCracken, G. (1988), The Long Interview, Sage, Newbury
Park, CA.
Macher, J.T., Mowery, D.C. and Simcoe, T.S. (2002), “E-
business and disintegration of the
semiconductor industry value chain”, Industry & Innovation,
Vol. 9 No. 3, pp. 155-81.
Macneil, I.R. (1978), “Contracts: adjustment of long-term
economic relations under classical,
neoclassical, and relational contract law”, Northwestern
University Law Review, Vol. 72
No. 6, pp. 854-905.
Manuj, I. and Mentzer, J.T. (2008), “Global supply chain risk