Research note
Assessing and managing risks using the Supply
Chain Risk Management Process (SCRMP)
Rao Tummala
Computer Information Systems Department, College of Business, Eastern Michigan University, Ypsilanti, Michigan, USA, and
Tobias Schoenherr
Department of Supply Chain Management, The Eli Broad Graduate School of Management, Michigan State University, East Lansing,
Michigan, USA
Abstract
Purpose – The purpose of this paper is to propose a comprehensive and coherent approach for managing risks in supply chains.
Design/methodology/approach – Building on Tummala et al.’s Risk Management Process (RMP), this paper develops a structured and ready-to-use
approach for managers to assess and manage risks in supply chains.
Findings – Supply chain risks can be managed more effectively when applying the Supply Chain Risk Management Process (SCRMP). The structured
approach can be divided into the phases of risk identification, risk measurement and risk assessment; risk evaluation, and risk mitigation and
contingency plans; and risk control and monitoring via data management systems. Specific techniques for conducting this process are suggested.
Originality/value – While supply chain risk management is an emerging and important topic in our dynamic and interconnected world, conceptual
frameworks providing a clear meaning and normative guidance are scarce (Manuj and Mentzer, 2008). This paper presents such a framework, offering
structure and decision support for managers.
Keywords Supply chain management, Risk management process, Supply chain risk, Risk management
Paper type Research paper
1. Supply chain risk management
At a time when global competition is intensifying and supply
chains are becoming longer and more complex, the likelihood
of not achieving the desired supply chain (SC) performance
increases, mainly due to the risk of SC failures. It is therefore
essential that companies plan for disruptions and develop
contingency plans as they design or redesign their supply
chains. Firms need to understand supply chain
interdependencies, identify potential risk factors, their
likelihood, consequences and severities. Risk management
action plans can then be developed to preferably avoid the
identified risks, or if not possible, at least mitigate, contain
and control them. The risk involved in supply chains, as well
as the impact severity of supply chain failures, has been
demonstrated recently by the recalls and subsequent lawsuits
for toy cars (Story, 2007) and pet food (FDA, 2008). While
risk may be associated with unacceptable products delivered
from upstream, it can also involve risks associated with the
environment, such as the impact of hurricanes Katrina and
Rita (Devlin, 2005), or the current hijackings and robberies of
vessels by pirates off the coast of Somalia (Peats, 2008).
The purpose of this paper is to introduce a structured and
systematic approach to enumerate SC risks, and to assess
their severity and l.
Global supply chain riskmanagement strategiesIla Manuj.docxwhittemorelucilla
Global supply chain risk
management strategies
Ila Manuj
Department of Marketing and Logistics, University of North Texas, Denton,
Texas, USA, and
John T. Mentzer
The University of Tennessee, Knoxville, Tennessee, USA
Abstract
Purpose – Global supply chains are more risky than domestic supply chains due to numerous links
interconnecting a wide network of firms. These links are prone to disruptions, bankruptcies,
breakdowns, macroeconomic and political changes, and disasters leading to higher risks and making
risk management difficult. The purpose of this paper is to explore the phenomenon of risk
management and risk management strategies in global supply chains.
Design/methodology/approach – This paper is based on an extensive literature review and a
qualitative study comprising 14 in-depth interviews and a focus group meeting with senior supply
chain executives.
Findings – The study provides insights into the applicability of six risk management strategies with
respect to environmental conditions and the role of three moderators.
Research limitations/implications – The model is developed in a global manufacturing supply
chain context. It should be tested in other contexts and with other methods to provide generalizability.
The study takes a much needed step toward building a theory of risk management in global supply
chains, which opens important future research directions.
Practical implications – This research provides direction to managers for choosing risk
management strategies based on the global supply chain environment. Moderators have practical
implications for global supply chain managers.
Originality/value – The paper addresses an identified gap in the literature for selecting risk
management strategies in global supply chains. It employs grounded theory, a methodology
appropriate for theory-building, to explore a phenomenon with an inadequate theoretical base.
Keywords Risk management, Supply chain management, International business
Paper type Research paper
Introduction
Global supply chains are a source of competitive advantage. Global configurations of
firms provide access to cheap labor and raw materials, better financing opportunities,
larger product markets, arbitrage opportunities, and additional inducements offered by
host governments to attract foreign capital (AlHashim, 1980; Kogut and Kulatilaka,
1994). However, coupled with these benefits that entice firms to go global are the
uncertainties and consequent risks that managers face in global supply chains. As
Barry (2004) argues, “An enterprise may have lowest over-all costs in a stable world
environment, but may also have the highest level of risk – if any one of the multiple
gating factors kink up an elongated global supply chain!”
There is wide acknowledgement in the literature of the risks and uncertainties in
global supply chains. Although risk management in multinational enterprises has been
The current issue and full text archive of this journal is a ...
IHP 525 Milestone Five (Final) TemplateMOST OF THIS TEMPLATE S.docxwilcockiris
IHP 525 Milestone Five (Final) Template
MOST OF THIS TEMPLATE SHOULD BE COPIED AND PASTED FROM PRIOR MILESTONES IF YOU RECEIVED FULL CREDIT FOR THOSE ELEMENTS.
DO NOT DELETE ANYTHING IN THIS TEMPLATE.
Student Name:
State the question you will pursue. (This should be copied and pasted from the list of questions and should be the same question submitted in week 7 unless you have changed your question.)
Question of interest (Copy and Paste question here):
Restate this question in your own words:
Directions for following table:
· Fill out the table below for EACH variable of interest.
· Include ONLY the variables that are relevant to your question of interest. (If it’s not mentioned in your question directly, it’s not relevant.)
· Each variable should take up ONE row.
Variable name (one variable per row)
Note: gender is a variable, and 0 and 1 are values of the variable gender. Gender =0 and gender =1 are NOT two separate variables.
Variable type (categorical, ordinal, or quantitative, etc.)
Descriptive statistics
Include:
· the statistic names (the mean, median, range, and standard deviation, at minimum)
· final calculations (e.g., mean = 10)
· an explanation/definition of each statistic used (what each statistic SAYS about the data)
*Do not subdivide the data for the variable in each row based on any other variable. For example, do NOT find the mean length of stay separately for males and females.
**The above statistics can be found for binary variables. (For example, gender is coded as binary; therefore, the above descriptive statistics can be found for the variable gender.)
Key features
· Histogram symmetric?
· Histogram bell shaped?
· Any outliers?
· Skew?
· Unimodal?
· Any other special features?
DO NOT list or discuss descriptive statistics in this space. Use the table above, as directed.
Analyze the limitations of the data set you were provided and how those limitations might affect your findings.
Limit your response to the data relevant to your question of interest. (For example, only using two variables is NOT a limitation of the data in your question of interest. It may be a limitation of the study or question of interest, but it is NOT a limitation of the data you have been provided for your question of interest.)
Limitations:
Provide ONE graph that is useful in explaining your results.
You may copy and paste this from another program, take a screen shot, etc.
LABEL EVERYTHING!!!
Explain why you chose this graph above any others to explain the situation.
What test/analysis technique did you perform?
(It is highly recommended that you perform ONLY ONE test or technique. Some examples include a t-test, regression, etc.)
There is a hypothesis test associated with your test/technique (even if you are not doing a t-test).
What is your null hypothesis?
What is your alternative hypothesis?
Provide all relevant calculations for your hypothesis test/ statistical technique.
Make sure your final ans.
Global supply chain riskmanagement strategiesIla Manuj.docxwhittemorelucilla
Global supply chain risk
management strategies
Ila Manuj
Department of Marketing and Logistics, University of North Texas, Denton,
Texas, USA, and
John T. Mentzer
The University of Tennessee, Knoxville, Tennessee, USA
Abstract
Purpose – Global supply chains are more risky than domestic supply chains due to numerous links
interconnecting a wide network of firms. These links are prone to disruptions, bankruptcies,
breakdowns, macroeconomic and political changes, and disasters leading to higher risks and making
risk management difficult. The purpose of this paper is to explore the phenomenon of risk
management and risk management strategies in global supply chains.
Design/methodology/approach – This paper is based on an extensive literature review and a
qualitative study comprising 14 in-depth interviews and a focus group meeting with senior supply
chain executives.
Findings – The study provides insights into the applicability of six risk management strategies with
respect to environmental conditions and the role of three moderators.
Research limitations/implications – The model is developed in a global manufacturing supply
chain context. It should be tested in other contexts and with other methods to provide generalizability.
The study takes a much needed step toward building a theory of risk management in global supply
chains, which opens important future research directions.
Practical implications – This research provides direction to managers for choosing risk
management strategies based on the global supply chain environment. Moderators have practical
implications for global supply chain managers.
Originality/value – The paper addresses an identified gap in the literature for selecting risk
management strategies in global supply chains. It employs grounded theory, a methodology
appropriate for theory-building, to explore a phenomenon with an inadequate theoretical base.
Keywords Risk management, Supply chain management, International business
Paper type Research paper
Introduction
Global supply chains are a source of competitive advantage. Global configurations of
firms provide access to cheap labor and raw materials, better financing opportunities,
larger product markets, arbitrage opportunities, and additional inducements offered by
host governments to attract foreign capital (AlHashim, 1980; Kogut and Kulatilaka,
1994). However, coupled with these benefits that entice firms to go global are the
uncertainties and consequent risks that managers face in global supply chains. As
Barry (2004) argues, “An enterprise may have lowest over-all costs in a stable world
environment, but may also have the highest level of risk – if any one of the multiple
gating factors kink up an elongated global supply chain!”
There is wide acknowledgement in the literature of the risks and uncertainties in
global supply chains. Although risk management in multinational enterprises has been
The current issue and full text archive of this journal is a ...
IHP 525 Milestone Five (Final) TemplateMOST OF THIS TEMPLATE S.docxwilcockiris
IHP 525 Milestone Five (Final) Template
MOST OF THIS TEMPLATE SHOULD BE COPIED AND PASTED FROM PRIOR MILESTONES IF YOU RECEIVED FULL CREDIT FOR THOSE ELEMENTS.
DO NOT DELETE ANYTHING IN THIS TEMPLATE.
Student Name:
State the question you will pursue. (This should be copied and pasted from the list of questions and should be the same question submitted in week 7 unless you have changed your question.)
Question of interest (Copy and Paste question here):
Restate this question in your own words:
Directions for following table:
· Fill out the table below for EACH variable of interest.
· Include ONLY the variables that are relevant to your question of interest. (If it’s not mentioned in your question directly, it’s not relevant.)
· Each variable should take up ONE row.
Variable name (one variable per row)
Note: gender is a variable, and 0 and 1 are values of the variable gender. Gender =0 and gender =1 are NOT two separate variables.
Variable type (categorical, ordinal, or quantitative, etc.)
Descriptive statistics
Include:
· the statistic names (the mean, median, range, and standard deviation, at minimum)
· final calculations (e.g., mean = 10)
· an explanation/definition of each statistic used (what each statistic SAYS about the data)
*Do not subdivide the data for the variable in each row based on any other variable. For example, do NOT find the mean length of stay separately for males and females.
**The above statistics can be found for binary variables. (For example, gender is coded as binary; therefore, the above descriptive statistics can be found for the variable gender.)
Key features
· Histogram symmetric?
· Histogram bell shaped?
· Any outliers?
· Skew?
· Unimodal?
· Any other special features?
DO NOT list or discuss descriptive statistics in this space. Use the table above, as directed.
Analyze the limitations of the data set you were provided and how those limitations might affect your findings.
Limit your response to the data relevant to your question of interest. (For example, only using two variables is NOT a limitation of the data in your question of interest. It may be a limitation of the study or question of interest, but it is NOT a limitation of the data you have been provided for your question of interest.)
Limitations:
Provide ONE graph that is useful in explaining your results.
You may copy and paste this from another program, take a screen shot, etc.
LABEL EVERYTHING!!!
Explain why you chose this graph above any others to explain the situation.
What test/analysis technique did you perform?
(It is highly recommended that you perform ONLY ONE test or technique. Some examples include a t-test, regression, etc.)
There is a hypothesis test associated with your test/technique (even if you are not doing a t-test).
What is your null hypothesis?
What is your alternative hypothesis?
Provide all relevant calculations for your hypothesis test/ statistical technique.
Make sure your final ans.
The global population has increased rapidly in the past few decades, which can have a direct effect on increasing demands for food products since population growth can exert tremendous pressure on natural resources that contribute to global climate change and global warming.
Considering specific characteristics of food commodities such as perishability and its dynamic system, food supply chains (FSCs) are far more complex than other supply chains.
The food network have customers who have increasing demands for food safety and sustainable food products and have an intense concern regarding how food products are supplied.
One of the critical success elements for improving the food distribution system is selecting efficient logistical strategies and adopting appropriate technology.
Therefore, Food supply chain management is significant for the safety of our food.
Facilitating organisationaldecision making a change riska.docxssuser454af01
Facilitating organisational
decision making: a change risk
assessment model case study
Charalampos Apostolopoulos and George Halikias
School of Mathematics, Computer Science and Engineering,
City University London, London, UK
Krikor Maroukian
Department of Informatics, King’s College London, London, UK, and
Georgios Tsaramirsis
Department of Information Technology, King Abdulaziz University,
Jeddah, Saudi Arabia
Abstract
Purpose – This paper aims to take the challenge to propose a novel modelling approach named
Change Risk Assessment Model (CRAM), which will contribute significantly to the missing formality of
business models especially in the change risk assessment area and decision-making. Organisational
change risks are assessed with the aid of analytic hierarchy process (AHP) in an attempt to define the
internal dynamics of organisational change management within project management eliciting also risk
cause-and-effect relationships.
Design/methodology/approach – The study discusses interviews/survey/AHP.
Findings – The study presents the following findings. Change risk factors assessment (identification
and prioritisation) recommendations (see Case Study) integration of change management; project
management; risk management top four risk factors, namely, leadership, communication, project
management team and culture.
Research limitations/implications – As projects can be different in a variety of factors (quality,
scope), an exhaustive list of risk factors cannot be identified. There is a continuous risk identification
process throughout the projects’ life cycle. For example, many risks can be classified initially as
unknown and can be refined after the initiation phase of the project. AHP factors limitation (eight per
level) possible bias (survey analysis).
Practical implications – With the aid of modelling and especially CRAM, business change risks can
be assessed numerically and prioritised. Several risk factors and related attributes were identified and
categorised. This empowers project managers or other stakeholders to make proper decisions about
whether to take on or abandon respective organisational or project changes.
Social implications – One of the values of CRAM is that it can be regarded as a global change risk
assessment method that can be applied regardless of project type, size or organisation. Moreover, it has
the advantage that it can be used by any kind of project, as the method is designed to be tailored to
specific needs, taking significant environmental change risk factors into account. AHP has numerous
uses in operational research, in project management and in general in areas where decisions (evaluation
and selection) have to be made. The analysis of the case study presented, indicated that it is vital to
assess the degree (impact) that each risk attribute poses to address complex organisational decisions.
Originality/value – CRAM aims to bridge the gap between theoretical and applied work in the
integrated r ...
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Disruption/Risk Management in supply chains- a reviewBehzad Behdani
This paper describes an integrated framework for handling disruptions in supply chains. The integrated framework incorporates two main perspectives on managing disruptions, namely pre- and post-disruption perspectives, which are usually treated as separate in the existing frameworks. Next, the proposed integrated framework is used to review the literature in supply chain risk/disruption management. The review gives an overview of the key aspects and specific methods that can be used for each step in the framework. Based on the review, some main observations are also discussed. The first is that literature has not uniformly discussed different parts of the framework; pre-disruption steps, such as risk identification and risk treatment, have been explored extensively while post-disruption steps such as disruption detection and learning have been given far less attention. Secondly, there is a lack of quantitative (simulation and modeling) studies for handling supply chain disruptions. These two gaps, therefore, represent avenues for future research on supply chain risk/disruption management.
Data Management: Alternative Models for Source Data VerificationKCR
KCR's presentation on alternative models for Source Data Verification (SDV) Risk Based Monitoring (RBM) is evolving into a standard expectation for SDV and study management in general.
TRI was founded as a subsidiary of Triumph Consultancy Services in 2013, following 12 years of consulting to the clinical trial industry. TRI has been evaluating the specific challenges facing the industry when implementing a risk-based monitoring strategy and the various approaches and products being utilized by organizations as they move into the RBM arena. This paper aims to summarize our findings and provide guidance as to how the main challenges can be overcome.
Value Engineering. Measuring and managing risks in the wind energy industryStavros Thomas
As wind turbines number increased around the world, the number of hazardous accidents is also rising, causing critics to question overall safety. A recent study from Anemorphosis Research Group reveals how wind power professionals manage risk, from current areas of concern to anticipated challenges.
Running Head CURRENT TECHNIQUES IMPLEMENTED IN CONSTRUCTION INDUS.docxhealdkathaleen
Running Head: CURRENT TECHNIQUES IMPLEMENTED IN CONSTRUCTION INDUSTRY TO ELIMINATE SECURITY RISKS 2
CURRENT TECHNIQUES IMPLEMENTED IN CONSTRUCTION INDUSTRY TO ELIMINATE SECURITY RISKS 2
Current Techniques Implemented in the Construction Industry to Eliminate Security Risks
Group 4
Balaram Chekuri
Laxmi Sravani Vallurpallis
Mohan Kadali
Shivasai Pabba
Vaagdevi Jali
University of the Cumberlands
ITS835-41 Enterprise Risk Management
Residency Assignment Research Paper
Professor Dr. James C. Hyatt
10/20/2019
Statement of the Problem and it is Setting
Risk management has been one of the breakthroughs for the modern world, and at the same one of the intellectual achievements is the identification, transformation, or risk and going from a world that described risk as fate to a world that looks at risk as an area of study. Risk management is the utilization of risk analysis to come up with management strategies used to reduce risk. Whereby generally in project management there are the two techniques categories qualitative; that involves impact and probability assessment, expected value calculations and influence diagrams and quantitative; that typically focuses on the overall risk which is managed more with numerical approach, and has techniques such as decision trees, Monte Carlo analysis and sensitivity analysis (McNeil et al. 2015). In various fields, there is enormous risk faced, and at the same time, there is a corresponding quantitative technique that can be used to address the risk. The focus is on the quantitative risk management techniques; they are based on scientific, mathematical and statistical background, that promise to give thorough and detailed management and quantification of risk that is imperative for designing the response (Teixeira et al. 2015).
This paper, based on the construction industry, provides an overview of the analytic overview of different quantitative risk analysis techniques. There is a focus on building on the existing quantitative techniques that are best for the construction industry around the world when it comes to utilizing relevant techniques after a qualitative risk analysis. In addition to this, there is looking further into the techniques and their details.
Guiding Questions
· Does Your Risk Management Process Address Root Cause of Failure?
· Are there gaps in this field?
· What Does Your Business Performance Tell You About Risk?
· What Do Controls Tell You About Your Risks?
· The main focus is looking at the practitioners and researchers looking: at the reason why they should simplify the existing techniques?
· Which, at the same looks at the research gaps in this field and propose areas of further research for project risk management in construction, which will improve the existing techniques.
Assumptions
Project Risk manage ...
The usability of STAMP in drug development Arete-Zoe, LLC
Arete-Zoe in cooperation with Stuttgart University
Study authors: Veronika Valdova, Ronald L Sheckler, Asim Abdulkhaleq and Stefan Wagner (Jonathan M Fishbein)
Presentation of synopsis: Veronika Valdova
Presented at STAMP team meeting, PSCI, ACRES on February 26, 2016
Research Methods Spring 2020 – Research proposal Points 0.docxverad6
Research Methods Spring 2020 – Research proposal
Points:
0
1
2
3
Introduction
APA Format
Not APA format
Tried APA format
Mostly APA, some errors
Good APA format
Literature Review
No real review of the existing literature
Minimal review. It’s not clear how cited lit relates to your research
Decent review of the current literature on your topic. Have at least 3 references that directly relate to your research question
Good review of the current literature on your topic. Have at least 5 references that directly relate to your research question
Hypotheses
Hypotheses not mentioned or it’s not a testable hypothesis
Hypotheses stated at the end of intro. Hypotheses don’t really follow from literature or don’t entirely make sense
Hypotheses that follow from the literature. Hypotheses are testable and directional.
Well thought out and interesting hypotheses based on the literature – testable and directional.
Methods
Participants
Very little thought into participant selection
Clearly state how data will be collected – e.g. what’s the population. How would you obtain a sample from that population
Clearly state how data will be collected, state the population, include a sample size determination based on the literature
Well thought out sample size determination based on the literature – clearly state the population and a feasible method for collecting data from that population.
Procedure – research design
Little info about procedure
Not a clear procedure
Stated research design that tests the hypotheses
Procedure section clearly lays out research design. The research design provides a good test of the hypotheses
Procedure - Materials
No or little info about materials
Vague info about materials
Materials (e.g. measures, manipulations) make sense given the hypotheses and research design. Measures clearly labeled as independent or dependent variables.
Well thought out materials. Materials selected make sense given the hypotheses and research design and thought was put into controls variables and choosing measures that are well-established. Measures clearly labeled as independent or dependent variables.
Proposed analyses
No info about proposed analyses
Include proposed analyses, but they don’t make sense given the hypotheses
Proposed analyses make sense given the hypotheses.
Well thought out statistical analyses given hypotheses. Analyses take into consideration all measures and manipulations in the study.
Total (out of 21)
http://pss.sagepub.com/
Psychological Science
http://pss.sagepub.com/content/24/1/112
The online version of this article can be found at:
DOI: 10.1177/0956797612457392
2013 24: 112 originally published online 12 November 2012Psychological Science
David R. Kille, Amanda L. Forest and Joanne V. Wood
Tall, Dark, and Stable : Embodiment Motivates Mate Selection Preferences
Published by:
http://www.sagepublications.com
On behalf of:
Association for Psychological Science
can be found at:Psych.
Research Methods in Anthropology Part 1 Discuss the strengths .docxverad6
Research Methods in Anthropology
Part 1: Discuss the strengths and weaknesses of qualitative field research, highlighting the ethical issues involved in using these methods. Describe how reliability and validity relate to qualitative field research. Are focus groups relevant in field research? If yes, how?
Part 2: Describe and compare the 3 unobtrusive research designs: content analysis, analysis of existing statistics, and historical/comparative analysis. Outline the strengths and weaknesses of each and describe how reliability and validity relate to each.
Reading and Reference Links
In addition to the readings in Week 4 Learning Resources, read the following:
· Chapters 12 and 13 in the Social Science Research Methods e-Text
· For reference: Title: Research Methods in Anthropology: http://www.dphu.org/uploads/attachements/books/books_476_0.pdf (NOTE: This is a lengthy textbook and may take time to open.)
The article Participant Observation on the Wikipedia website is used under the terms of the Creative Commons Attribution-ShareAlike 3.0 Unported license.Participant observation
From Wikipedia, the free encyclopedia
Participant observation is one type of data collection method typically done in the qualitative research paradigm. It is a widely used methodology in many disciplines, particularly cultural anthropology, less so in sociology, communication studies, human geography and social psychology. Its aim is to gain a close and intimate familiarity with a given group of individuals (such as a religious, occupational, sub cultural group, or a particular community) and their practices through an intensive involvement with people in their cultural environment, usually over an extended period of time. The method originated in the field research of social anthropologists, especially Bronisław Malinowski in Britain, the students of Franz Boas in the United States, and in the later urban research of the Chicago School of sociology.
Contents
· 1 History and development
· 2 Method and practice
· 2.1 Types of participant observation
· 2.1.1 Impact of researcher involvement
· 3 Ethical concerns
· 4 See also
· 5 References
· 6 External links
History and development
Participant observation was used extensively by Frank Hamilton Cushing in his study of the Zuni Indians in the later part of the nineteenth century, followed by the studies of non-Western societies by people such as Bronisław Malinowski,[1]E.E. Evans-Pritchard,[2] and Margaret Mead[3] in the first half of the twentieth century. It emerged as the principal approach to ethnographicresearch by anthropologists and relied on the cultivation of personal relationships with local informants as a way of learning about a culture, involving both observing and participating in the social life of a group. By living with the cultures they studied, researchers were able to formulate first hand accounts of their lives and gain novel insights. This same method of study has also been applied to gro.
More Related Content
Similar to Research noteAssessing and managing risks using the Supply.docx
The global population has increased rapidly in the past few decades, which can have a direct effect on increasing demands for food products since population growth can exert tremendous pressure on natural resources that contribute to global climate change and global warming.
Considering specific characteristics of food commodities such as perishability and its dynamic system, food supply chains (FSCs) are far more complex than other supply chains.
The food network have customers who have increasing demands for food safety and sustainable food products and have an intense concern regarding how food products are supplied.
One of the critical success elements for improving the food distribution system is selecting efficient logistical strategies and adopting appropriate technology.
Therefore, Food supply chain management is significant for the safety of our food.
Facilitating organisationaldecision making a change riska.docxssuser454af01
Facilitating organisational
decision making: a change risk
assessment model case study
Charalampos Apostolopoulos and George Halikias
School of Mathematics, Computer Science and Engineering,
City University London, London, UK
Krikor Maroukian
Department of Informatics, King’s College London, London, UK, and
Georgios Tsaramirsis
Department of Information Technology, King Abdulaziz University,
Jeddah, Saudi Arabia
Abstract
Purpose – This paper aims to take the challenge to propose a novel modelling approach named
Change Risk Assessment Model (CRAM), which will contribute significantly to the missing formality of
business models especially in the change risk assessment area and decision-making. Organisational
change risks are assessed with the aid of analytic hierarchy process (AHP) in an attempt to define the
internal dynamics of organisational change management within project management eliciting also risk
cause-and-effect relationships.
Design/methodology/approach – The study discusses interviews/survey/AHP.
Findings – The study presents the following findings. Change risk factors assessment (identification
and prioritisation) recommendations (see Case Study) integration of change management; project
management; risk management top four risk factors, namely, leadership, communication, project
management team and culture.
Research limitations/implications – As projects can be different in a variety of factors (quality,
scope), an exhaustive list of risk factors cannot be identified. There is a continuous risk identification
process throughout the projects’ life cycle. For example, many risks can be classified initially as
unknown and can be refined after the initiation phase of the project. AHP factors limitation (eight per
level) possible bias (survey analysis).
Practical implications – With the aid of modelling and especially CRAM, business change risks can
be assessed numerically and prioritised. Several risk factors and related attributes were identified and
categorised. This empowers project managers or other stakeholders to make proper decisions about
whether to take on or abandon respective organisational or project changes.
Social implications – One of the values of CRAM is that it can be regarded as a global change risk
assessment method that can be applied regardless of project type, size or organisation. Moreover, it has
the advantage that it can be used by any kind of project, as the method is designed to be tailored to
specific needs, taking significant environmental change risk factors into account. AHP has numerous
uses in operational research, in project management and in general in areas where decisions (evaluation
and selection) have to be made. The analysis of the case study presented, indicated that it is vital to
assess the degree (impact) that each risk attribute poses to address complex organisational decisions.
Originality/value – CRAM aims to bridge the gap between theoretical and applied work in the
integrated r ...
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Disruption/Risk Management in supply chains- a reviewBehzad Behdani
This paper describes an integrated framework for handling disruptions in supply chains. The integrated framework incorporates two main perspectives on managing disruptions, namely pre- and post-disruption perspectives, which are usually treated as separate in the existing frameworks. Next, the proposed integrated framework is used to review the literature in supply chain risk/disruption management. The review gives an overview of the key aspects and specific methods that can be used for each step in the framework. Based on the review, some main observations are also discussed. The first is that literature has not uniformly discussed different parts of the framework; pre-disruption steps, such as risk identification and risk treatment, have been explored extensively while post-disruption steps such as disruption detection and learning have been given far less attention. Secondly, there is a lack of quantitative (simulation and modeling) studies for handling supply chain disruptions. These two gaps, therefore, represent avenues for future research on supply chain risk/disruption management.
Data Management: Alternative Models for Source Data VerificationKCR
KCR's presentation on alternative models for Source Data Verification (SDV) Risk Based Monitoring (RBM) is evolving into a standard expectation for SDV and study management in general.
TRI was founded as a subsidiary of Triumph Consultancy Services in 2013, following 12 years of consulting to the clinical trial industry. TRI has been evaluating the specific challenges facing the industry when implementing a risk-based monitoring strategy and the various approaches and products being utilized by organizations as they move into the RBM arena. This paper aims to summarize our findings and provide guidance as to how the main challenges can be overcome.
Value Engineering. Measuring and managing risks in the wind energy industryStavros Thomas
As wind turbines number increased around the world, the number of hazardous accidents is also rising, causing critics to question overall safety. A recent study from Anemorphosis Research Group reveals how wind power professionals manage risk, from current areas of concern to anticipated challenges.
Running Head CURRENT TECHNIQUES IMPLEMENTED IN CONSTRUCTION INDUS.docxhealdkathaleen
Running Head: CURRENT TECHNIQUES IMPLEMENTED IN CONSTRUCTION INDUSTRY TO ELIMINATE SECURITY RISKS 2
CURRENT TECHNIQUES IMPLEMENTED IN CONSTRUCTION INDUSTRY TO ELIMINATE SECURITY RISKS 2
Current Techniques Implemented in the Construction Industry to Eliminate Security Risks
Group 4
Balaram Chekuri
Laxmi Sravani Vallurpallis
Mohan Kadali
Shivasai Pabba
Vaagdevi Jali
University of the Cumberlands
ITS835-41 Enterprise Risk Management
Residency Assignment Research Paper
Professor Dr. James C. Hyatt
10/20/2019
Statement of the Problem and it is Setting
Risk management has been one of the breakthroughs for the modern world, and at the same one of the intellectual achievements is the identification, transformation, or risk and going from a world that described risk as fate to a world that looks at risk as an area of study. Risk management is the utilization of risk analysis to come up with management strategies used to reduce risk. Whereby generally in project management there are the two techniques categories qualitative; that involves impact and probability assessment, expected value calculations and influence diagrams and quantitative; that typically focuses on the overall risk which is managed more with numerical approach, and has techniques such as decision trees, Monte Carlo analysis and sensitivity analysis (McNeil et al. 2015). In various fields, there is enormous risk faced, and at the same time, there is a corresponding quantitative technique that can be used to address the risk. The focus is on the quantitative risk management techniques; they are based on scientific, mathematical and statistical background, that promise to give thorough and detailed management and quantification of risk that is imperative for designing the response (Teixeira et al. 2015).
This paper, based on the construction industry, provides an overview of the analytic overview of different quantitative risk analysis techniques. There is a focus on building on the existing quantitative techniques that are best for the construction industry around the world when it comes to utilizing relevant techniques after a qualitative risk analysis. In addition to this, there is looking further into the techniques and their details.
Guiding Questions
· Does Your Risk Management Process Address Root Cause of Failure?
· Are there gaps in this field?
· What Does Your Business Performance Tell You About Risk?
· What Do Controls Tell You About Your Risks?
· The main focus is looking at the practitioners and researchers looking: at the reason why they should simplify the existing techniques?
· Which, at the same looks at the research gaps in this field and propose areas of further research for project risk management in construction, which will improve the existing techniques.
Assumptions
Project Risk manage ...
The usability of STAMP in drug development Arete-Zoe, LLC
Arete-Zoe in cooperation with Stuttgart University
Study authors: Veronika Valdova, Ronald L Sheckler, Asim Abdulkhaleq and Stefan Wagner (Jonathan M Fishbein)
Presentation of synopsis: Veronika Valdova
Presented at STAMP team meeting, PSCI, ACRES on February 26, 2016
Research Methods Spring 2020 – Research proposal Points 0.docxverad6
Research Methods Spring 2020 – Research proposal
Points:
0
1
2
3
Introduction
APA Format
Not APA format
Tried APA format
Mostly APA, some errors
Good APA format
Literature Review
No real review of the existing literature
Minimal review. It’s not clear how cited lit relates to your research
Decent review of the current literature on your topic. Have at least 3 references that directly relate to your research question
Good review of the current literature on your topic. Have at least 5 references that directly relate to your research question
Hypotheses
Hypotheses not mentioned or it’s not a testable hypothesis
Hypotheses stated at the end of intro. Hypotheses don’t really follow from literature or don’t entirely make sense
Hypotheses that follow from the literature. Hypotheses are testable and directional.
Well thought out and interesting hypotheses based on the literature – testable and directional.
Methods
Participants
Very little thought into participant selection
Clearly state how data will be collected – e.g. what’s the population. How would you obtain a sample from that population
Clearly state how data will be collected, state the population, include a sample size determination based on the literature
Well thought out sample size determination based on the literature – clearly state the population and a feasible method for collecting data from that population.
Procedure – research design
Little info about procedure
Not a clear procedure
Stated research design that tests the hypotheses
Procedure section clearly lays out research design. The research design provides a good test of the hypotheses
Procedure - Materials
No or little info about materials
Vague info about materials
Materials (e.g. measures, manipulations) make sense given the hypotheses and research design. Measures clearly labeled as independent or dependent variables.
Well thought out materials. Materials selected make sense given the hypotheses and research design and thought was put into controls variables and choosing measures that are well-established. Measures clearly labeled as independent or dependent variables.
Proposed analyses
No info about proposed analyses
Include proposed analyses, but they don’t make sense given the hypotheses
Proposed analyses make sense given the hypotheses.
Well thought out statistical analyses given hypotheses. Analyses take into consideration all measures and manipulations in the study.
Total (out of 21)
http://pss.sagepub.com/
Psychological Science
http://pss.sagepub.com/content/24/1/112
The online version of this article can be found at:
DOI: 10.1177/0956797612457392
2013 24: 112 originally published online 12 November 2012Psychological Science
David R. Kille, Amanda L. Forest and Joanne V. Wood
Tall, Dark, and Stable : Embodiment Motivates Mate Selection Preferences
Published by:
http://www.sagepublications.com
On behalf of:
Association for Psychological Science
can be found at:Psych.
Research Methods in Anthropology Part 1 Discuss the strengths .docxverad6
Research Methods in Anthropology
Part 1: Discuss the strengths and weaknesses of qualitative field research, highlighting the ethical issues involved in using these methods. Describe how reliability and validity relate to qualitative field research. Are focus groups relevant in field research? If yes, how?
Part 2: Describe and compare the 3 unobtrusive research designs: content analysis, analysis of existing statistics, and historical/comparative analysis. Outline the strengths and weaknesses of each and describe how reliability and validity relate to each.
Reading and Reference Links
In addition to the readings in Week 4 Learning Resources, read the following:
· Chapters 12 and 13 in the Social Science Research Methods e-Text
· For reference: Title: Research Methods in Anthropology: http://www.dphu.org/uploads/attachements/books/books_476_0.pdf (NOTE: This is a lengthy textbook and may take time to open.)
The article Participant Observation on the Wikipedia website is used under the terms of the Creative Commons Attribution-ShareAlike 3.0 Unported license.Participant observation
From Wikipedia, the free encyclopedia
Participant observation is one type of data collection method typically done in the qualitative research paradigm. It is a widely used methodology in many disciplines, particularly cultural anthropology, less so in sociology, communication studies, human geography and social psychology. Its aim is to gain a close and intimate familiarity with a given group of individuals (such as a religious, occupational, sub cultural group, or a particular community) and their practices through an intensive involvement with people in their cultural environment, usually over an extended period of time. The method originated in the field research of social anthropologists, especially Bronisław Malinowski in Britain, the students of Franz Boas in the United States, and in the later urban research of the Chicago School of sociology.
Contents
· 1 History and development
· 2 Method and practice
· 2.1 Types of participant observation
· 2.1.1 Impact of researcher involvement
· 3 Ethical concerns
· 4 See also
· 5 References
· 6 External links
History and development
Participant observation was used extensively by Frank Hamilton Cushing in his study of the Zuni Indians in the later part of the nineteenth century, followed by the studies of non-Western societies by people such as Bronisław Malinowski,[1]E.E. Evans-Pritchard,[2] and Margaret Mead[3] in the first half of the twentieth century. It emerged as the principal approach to ethnographicresearch by anthropologists and relied on the cultivation of personal relationships with local informants as a way of learning about a culture, involving both observing and participating in the social life of a group. By living with the cultures they studied, researchers were able to formulate first hand accounts of their lives and gain novel insights. This same method of study has also been applied to gro.
Research MethodsTitle pageIntroduction - overview Lite.docxverad6
Research Methods
Title page
Introduction - overview
Literature Review - theories, research, data
Methods – what you did, collection,
Findings – what was found, analysis, observations
Discussion – pull everything together
References
Research Methods
Title page
Introduction - overview
Literature Review - theories, research, data
Methods – what you did, collection,
Findings – what was found, analysis, observations
Discussion – pull everything together
References
.
Research MethodsLaShanda McMahonUniversity o.docxverad6
Research Methods
LaShanda McMahon
University of Phoenix
Formulating the Problem Statement and the Purpose Statement
Over the past decade, there have been several changes in drug addiction treatment that has shown results that show reduced associated health and social costs by more than the cost of the treatments. It has been found that treatments cost much less that the alternatives, such as incarcerating people with addictions. There are many savings related to healthcare, which includes, total savings that can exceed costs with a ratio of 12 to 1. Major savings to the individual and to society also stems from fewer interpersonal conflicts; greater workplace productivity; and fewer drug-related accidents, including overdoses and deaths (Woody, M.D., 2018).
Problem Statement
A common misperception is detoxification cures the addiction, yet addiction is a chronic disorder requiring long term multimodal treatment (Korsmeyer et al., 2009. Long-term treatment for substance abuse and co-occurring disorders might reduce recidivism rates and lessen costs for rehabilitation. Goldstein, A. (1997). examined the benefits of long-term substance abuse and posited the benefits. Goldstein further suggested not treating addiction appropriately or at all contributes to the high costs associated with substance use in the United States.
Insurance companies are reluctant to support long term substance abuse treatment; however, Weisner, Ray, Mertens, Satre and Moore (2003) noted patients receiving a minimum of six months substance treatment abstained from drug and alcohol use at least five years after treatment yet abusers of alcohol were less likely to remain sober for lengthy periods of time after treatment (Weisner et al., 2003).
According to the National Drug Institute (2012), every dollar invested in substance abuse treatment yields a return of $5.50 in reduced drug-related crime, costs associated with criminal justice, and theft. Healthcare savings can exceed costs by a 12 to 1 ratio. Therefore, drug addiction treatment reduces costs associated with primary care and is less costly than incarceration. Addressing addiction also contributes to the more positive aspects of life, such as increase in work productivity, and fewer incidents related to drug use, fewer overdoses and deaths.
Purpose Statement
The purpose of this correlational study is to see if a relationship exists among periods of sobriety and four levels of substance abuse treatment. The research will examine substance abuse treatment throughout various levels of care: higher levels (detox, Inpatient (IP), and Residential (RTC) and lower levels (partial hospitalization (PHP), Intensive Outpatient (IOP), and routine Outpatient (OP). Current trends in substance abuse treatment provides evidence that length of treatment is inadequate contributing to more frequent relapses among substance abusers. Longer treatment options for addiction may reduce the number of relapses, reduce costs asso.
Research Mapp v. Ohio (1961), and then discuss what the police o.docxverad6
Research Mapp v. Ohio (1961), and then discuss what the police officers did or did not do that warranted the case decision. Discuss, the argument of the prosecution, and the argument of the defense or dissenting view. (3 - 4 pages, Time New Roman, 12-point font, double-spaced). Two scholarly journal articles should be included as references.
.
Research methods a critical review1AimsTo .docxverad6
Research
methods a critical review
1
Aims
To re-cap on learning to date
To explore in a little more depth some examples of methods
To review grounded theory
To explore ethnography
In-put around 3 actual research projects (PhD study)
So far….
We are aware that there are different research methodologies which lead to the use of different methods
There is a fundamental split based upon structure
determining whether a qualitative or quantitative approach is taken
This is influenced by researcher preferences and the area to be followed
Which methods is best?
Opinion is divided and this means there is no simple answer
Debate about which approach is superior ends in personal preference and that all methods have their own strengths
Yet there is a critical review of both methods and methodology
Important to engage with to understand bias and limitation
Method 1: Surveys
What? Gathers information / opinions / can describe a trend
Can be structured / semi-structured / sample or whole population
Usefulness / strengths: Provides a quantitative or numeric description of events
Limitations: Closed and encoded / lacks flexibility/ restricted information / researcher and tool are in control
Method 2: Interviews
What? ‘Conversation with a purpose’ / two way approach / Unstructured / semi-structured
Usefulness / strengths: Findings are created and recorded at the time / flexibility / allows for a reflexive approach
Limitations: Requires a skilled interviewer / side-lining can be a problem / personal disclosure / ethically challenging
Methods 3: Focus group
What? A group interview or discussion (Gill et al., 2008). Based upon interaction to create findings.
Usefulness / strengths: Less time required and rich qualitative data created / findings are co-constructed / potential for egalitarianism
Limitations: Requires careful facilitation / some participant may dominate / ethics / sensitivity need to be adhered to
E.G. Grounded Theory (GT)
A qualitative strategy were theory is derived from participants feedback (understand humans)
Data collection and analysis occur simultaneously
Social processes are discovered building ideas / theory from the ground up / avoiding pre-conceptions
Categories and analytic codes developed from data
Theoretical sampling used to refine categories
Analytical memos used between coding
and writing
Categories integrated into a theoretical
framework
Defining and evaluating…
“The spirit of grounded theory is open-ended and flexible, a form of research that seeks to understand individuals involved in social interactions of various types within various contexts” Gilgun (2010)
GT provides tools, which are flexible, reflexive and allowing ‘fresh ways’ to examine data
“ We begin by being open to what is happening in the studies scenes and interview statements so that we might learn about out research participants’ lives” Charmaz (2006)
Ethos / Guides for GT
Charmaz comments on the importance of .
Research Methods 1Draft 1Anton Kropotkin Banking system .docxverad6
Research Methods 1
Draft 1
Anton Kropotkin
Banking system and economy of Russia
1) Proposal
· Idea
Make a research of about banking system and economy of Russian Federation and connect it to small business, politics and corruption. Recognize week points, and establish possible solutions, that can improve economy of Russia.
· Introduction
The central Bank of Russia was created since 1990s and up to know days it is the bank of the first level, which is the main bank for holding federal funds of 475 billion dollars up to know. The central bank is the main one to issue banknotes and is acting as the main coordinating and regulatory body of the entire credit system of the country. Also it controls the activities of credit organizations, issues and withdraws licenses from them for banking operations, and credit organizations work with other legal entities and individuals. The economy of Russia is directly connected with Central bank and plays the biggest role. Currently the situation in our country is not the best, and the crisis is developing in bad way. Year by year people are living worse, mainly due to inflation, people who got the normal job, let’s say as a teacher have the same salary but the prices for the goods are growing dramatically. The bank and economy of Russia are seriously affected by prices for oil which now days jump a lot in prices, mainly due to geo politics of our country.
· What are the problem?
As in beginning my main objective was to study the bank system and the central bank of Russian Federation. But after analyzing data and thinking about all of those years, looking how the economy and our currency, falls in front of Dollar and Euro, which means the economy struggles and there are weak points in Russian economy.
· Topics to connect (problems to solutions)
1) Small business has two chooses or they fall as a bankruptcy or they don’t pay taxes.
Reasons: Low wages vs high prices for goods, high inflation, monopolization of a number of economic sectors and bureaucracy.
2) Politics
Reasons: Sanctions, geo politics, micro, and oil prices.
3) Corruption
Reasons: 52% of corruption, which means the government don’t get paid taxes. Government regulations
All of that plays a big role in economy of Russia, in which I want to study and make my research paper, I want to find solutions and how people in my country can live better.
· Structure
1) Introduction
2) Structure of central bank and system
3) Functions
4) Legal status
5) Goals of Central bank and growing economy
6) Problems
7)
Solution
s
8) Conclusion
· Conclusion of the proposal
After researching about this topic and thinking further, I can see that my country experiencing lack of attention in banking system, government regulations and political side, which are affecting the Russian economy dramatically, there are many reasons which I have proposed on up section, my objective will be to find solution to each one and see how they are all connected .
Research Journal Part 4Sheroda SpearmanMGT 498Febr.docxverad6
Research Journal Part 4
Sheroda Spearman
MGT 498
February 10, 2020
James Powell
Running head: RESEARCH JOURNAL PART 4
1
RESEARCH JOURNAL PART 4
2
Research Journal Part 4
In this week’s discussion about strategic planning, we discussed more corporate strategy. We learned that there are three scopes of corporate strategy which include vertical integration, diversification as well as geographic scope. We also learned the role of the company leaders in the strategic planning of the company. The discussion also touched on concepts such as tape, innovation integration global strategy and international strategy among many other concepts (Rothaermel, 2019). The main aim of these concepts is to help the company strategically plan for activities that will help the company grow. The concepts also help to align the company strategically with other companies. In this journal, I will discuss some of these concepts and how they apply to the company’s strategic planning.
Caterpillars Inc. short versus long term goals.
Caterpillars Inc. has created both short term and long-term goals to help grow the company. The short-term goals of the company are mainly key improvements in various areas are that enable the company to achieve its long-term goals. These short-term goals include improvements in renewable energy areas, water consumption intensity, reducing the number of recordable injuries, improving sales and revenues, and reducing the GHG emissions intensity in the next five years (Caterpillar Inc., 2019). The company also has long term goals that encompass the short term goals and this includes, reducing the energy intensity by 50 percent, reducing the emissions of the company by 50 percent, reducing the water consumption in the company by 50 percent and reducing the injury recorded rate in the company by 60 percent (Caterpillar Inc., 2019). All of these should be achieved in 5 years. The short term goals are the necessary steps that the company must take to achieve its long term goals. The main purpose of achieving the goals is to reduce the costs of operations, offer better products and reduce pollution to the environment.
Mergers and acquisitions contributed to the company’s performance.
The company has acquired three companies through mergers and acquisitions in the last 5 years. Two of the three companies acquired by caterpillar are from the private sector and have divested a total of 8 assets. These mergers and acquisitions have enabled caterpillar companies to increase their aggressiveness in the market place increasing its dominance in the global industrial market (Merger. 2019). It has helped the companies increase their value, improve their overall performance and has reached an increased growth in the regional and global market share and its products in the market. It has established a strategic market realignment in the company’s network helping it achieve more market shares and thrive well in the last 5 years.
The company’s global str.
Research involves measurement scales, of which there are four type.docxverad6
Research involves measurement scales, of which there are four types. In data collection, what sources of data would you use, and how would you establish reliability and validity? Why did you choose those specific data samples?
What types of data collection strategies and research design have you experienced—whether for work or through educational means?
.
Research information about different types of healthcare appeals.docxverad6
Research information about different types of healthcare appeals processes and the Medicare Appeals Process, and choose whether to focus on a hospital or a physician billing process.
You may choose to focus on the type of health care facility that interests them. Students should summarize the mainstream appeals process for insurance carriers and for the Medicare Appeals Process.
Possible topic approaches:
Facility Examples:
Physician Offices
Inpatient Hospital
Write a comparison report summarizing their findings on the Medicare Appeals Process and their chosen healthcare setting for the appeals process.
Papers should be:
1-2 pages
Include references
Include a cover page
.
Research InstructionsTo write your paper, you may .docxverad6
Research Instructions
To write your paper, you may use journal articles, textbook
material, case studies, and Web site information. The Web
site information must come from reputable and verifiable
sources, such as the United States Department of Health and
Human Services, the American Medical Association, professional
or business organizations, or articles published by
major news organizations.
To get started on finding a real-life case example that you’re
interested in, you can use an Internet search engine such as
Google. Try entering keywords such as “HIPAA violation”
under the “News” section. Or, go to your local library and
perform a search in the medical journals or professional
publications they have on file.
Writing Guidelines
1. Type your submission, double-spaced, in a standard
print font, size 12. Use a standard document format with
1-inch margins. (Do
not
use any fancy or cursive fonts.)
2. Read the assignment carefully, and follow the instructions.
3. Be sure to include the following information at the top of
your paper:
n
Your name
n
Your student number
n
The course title
(HIPAA Compliance)
n
Graded project number (46081100)
n
The date
4. Be specific. Limit your submission to the issues covered
by your chosen topic.
46
Graded Project
5. Include a reference page in either APA or MLA style. On
this page, list Web sites, books, journals, and all other
references used in preparing the submission.
6. Proofread your work carefully. Check for correct spelling,
grammar, punctuation, and capitalization.
Research papers should include an
introductory paragraph
to introduce the reader to
the topic of the paper. Even though your grader is aware of your topic, you must always
assume that the reader is not, thus the need for an introduction. You should also have a
concluding paragraph
which “wraps it all up.”
2.
You should not include the questions or any numbering to your answers
. Your
answers to the questions must be written using complete
(indented) paragraphs
. Each
paragraph should include an
introductory sentence
, which contains portions of the
actual question. The purpose of this introductory sentence is to make the reader aware of
what question you are answering, without actually including the question.
3.
Font style should be times new roman; size 10, 11, or 12.
Doubled spaced.
4.
To avoid risk of plagiarism
,
you must include a reference page. In addition to the
reference page, you also need to use in-text citations within the body of your
paper
.
5. Research papers should
6. include a concluding paragraph at the end of
7. your paper, which restates your purpose and
8. bring your paper to a close by providing a final
9. insight into your research or the significance of
10. your topic
11. Lastly, your referen.
Research information about current considerations and challenges rel.docxverad6
Research information about current considerations and challenges related to the financial and budgetary systems in health care organizations. Consider the use of data analytics and tools in the monitoring, assessing, and evaluating of the performance of health care organizations. Include a discussion of the importance and efficacy of financial statements used in the decision-making process of health care organizations.
Support your work with at least 4 academic or professional peer-reviewed sources published within the past 5 years.
.
Research information on a traumatic situation that has affected .docxverad6
Research information on a traumatic situation that has affected learner development and family involvement in education (ex: Sandy Hook, Columbine, 9/11, etc.) Develop a strategy that can support young children experiencing a traumatic situation. How can you support the social and emotional development of young children who are coming into your classroom?
.
Research in Social Psychology [WLOs 1, 3, 4, 5, 6] [CLOs 1, 2, 3.docxverad6
Research in Social Psychology [WLOs: 1, 3, 4, 5, 6] [CLOs: 1, 2, 3, 4, 5]
To prepare for this discussion, please read
Chapter 1: Studying Social Psychology
of your textbook and
Exploring the Ethics and Psychological Impact of Deception in Psychological Research
article.
In this discussion, you will consider principles of scientific research, including methodology and ethical considerations.
First, visit the
Online Social Psychology Studies (Links to an external site.)
web page and select any study from the list. (Note that some links may be broken; if you choose a study that is unavailable, simply pick another option.) Participate in the research by following the instructions. After you have completed the study, answer the following questions (see Chapter 1 and Boynton, Portnoy, & Johnson, 2013):
Indicate
the study you completed, including the web link.
Describe
the research that was conducted. What did you do? What type of method do you think the researcher was utilizing? Can you identify the hypothesis and/or theory?
Appraise
the study based on your understanding of research gained from the reading. What elements of the study “worked” and what would you suggest the researchers do to improve their study? Mention at least three specific elements.
Indicate
any relevant ethical concerns. Was deception utilized?
Identify
situational factors and/or social and cultural influences that may impact the phenomenon being studied.
Illustrate
how this insight may be relevant to your personal or professional life through specific examples.
To fully demonstrate content knowledge and critical thinking in your Research in Social Psychology discussion
Interpret
course concepts explicitly, applying them to your personal experiences/observations, and cite the required readings as appropriate.
Be thorough and specific
, structuring your work intentionally (with an introductory and concluding sentence or two), providing clear context, and concisely and precisely explaining relevant course concepts.
Use personal examples
to illustrate as appropriate, but do be sure to provide an objective analysis too,
referencing required materials
and using additional sources as needed to support your insight.
Use your own
Academic Voice
(Links to an external site.)
and apply in-text citations
appropriately throughout your post.
Review
APA: Citing Within Your Paper (Links to an external site.)
for more information.
Your original post should be a
minimum of 300 words
.
Social Thinking [WLOs: 1, 2, 3, 4, 5, 6] [CLOs: 1, 2, 3, 5]
To prepare for this discussion, please read
Chapter 4: Attitudes, Attributions, and Behaviors
;
Chapter 5: Making Judgments
; and
Chapter 6: Prejudice
of your textbook, and
Judgment Under Uncertainty: Heuristics and Biases
and
Intergroup Contact Theory
articles. In addition, watch
A Class Divided
.
In this discussion, you will consider theoretical perspectives on the formation, maintenance, .
Research for Human Services Michael R. Perkins, MSW, LCS.docxverad6
Research for Human Services
Michael R. Perkins, MSW, LCSW, Contributing Editor
This edition is adapted from a Psychology research text originally produced in 2010 by a publisher who has
requested that they not receive attribution, with some material from Principles of Sociological Inquiry –
Qualitative and Quantitative Methods by Amy Blackstone, University of Maine. Both published under this
license:
Conditions of Use
FIGURE 1 IS THE SYMBOL FOR CREATIVE COMMONS LICENSE THIS WORK IS RELEASED UNDER.
Attribution-NonCommercial-ShareAlike
CC BY-NC-SA
This work is a derivative that is also published under that license which states:
You are free to:
Share — copy and redistribute the material in any medium or format
Adapt — remix, transform, and build upon the material
The licensor cannot revoke these freedoms if you follow the license terms.
The terms of the license are:
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes
were made. You may do so in any reasonable manner, but not in any way that suggests the
licensor endorses you or your use.
NonCommercial — You may not use the material for commercial purposes.
ShareAlike — If you remix, transform, or build upon the material, you must distribute your
contributions under the same license as the original.
You may not apply legal terms or technological measures that restrict others from doing anything the
license permits.
Notices:
You do not have to comply with the license for elements of the material in the book which are in the public
domain or where your use is permitted by an applicable exception or limitation.
No warranties are given.
The license may not give you all of the permissions necessary for your intended use. For example, other
rights such as publicity, privacy, or moral rights may limit how you use the material.
http://creativecommons.org/licenses/
http://creativecommons.org/licenses/by-nc-sa/3.0/
http://creativecommons.org/licenses/by-nc-sa/3.0/
http://creativecommons.org/licenses/by-nc-sa/3.0/
http://creativecommons.org/licenses/by-nc-sa/3.0/
https://creativecommons.org/licenses/by-nc-sa/3.0/us/
http://creativecommons.org/licenses/by-nc-sa/3.0/
http://creativecommons.org/licenses/by-nc-sa/3.0/
http://creativecommons.org/licenses/by-nc-sa/3.0/
Forward
About This Book
I did not write this book. I did contribute, rewrote parts of it, created some original material, and added
sections. My role is rather amorphous. Such is the nature of an open source project like this. An open
source project such as this, (when it is done properly) takes on a life of its own - which is exactly what it is
supposed to do. I did adapt, edit, and transform the original works (primarily an introductory text on
research for Psychology students along with some material from an introductory text on research for
Sociology students) into a text for Human Services majors. This book is based on those .
Research IIChapter 7, pages 190-212Related Disabilities.docxverad6
Research II
Chapter 7, pages 190-212
Related Disabilities: ASD and ADHD, characteristics, treatments (medications), methods of teaching. Section 504 services.
Support your research with only one professional article. Submit article bibliography on the reference page after the textbook information.Overall there are 7 pages required for this assignment and only one supporting professional article.
Rubric for each research paper :
1.Cover page, .50 of point
2. Abstract , 1 point
3. Table of content ,.50 of a point
4. Three pages of accurate content information ,2.50 points
5. References: Textbook and one scholarly article on the topic,1 point
text book for reference
References
Lerner, J. W. (2014).
Learning disabilities and related disabilities: Characteristics and current directions
(13th Ed). Cengage Learning
.
RESEARCH II Grade Sheet Agency Assessment Paper Part I D.docxverad6
RESEARCH II Grade Sheet
Agency Assessment Paper Part I Description of the Program
Name of Student _________________________________________________
1.An overview of the program (Heading)
2. History of the organization?
3. Mission statement in the organization
4. Organization Structure
5. History of the program within the organization
6. Program’s rationale /
definition. General purpose of the program
7..Social problems addressed by the Program (Explain in full detail with statistics) (Heading)- 1pg.
8.Intervention Methods (Heading)
9. Methods proposed to achieve the
program’s results
10. Theories that underlie the proposed
Interventions
11.Logic within the program in using these
interventions to achieve its goals
12 Describe the length of services
13.Program Funding and Cost –cost per day in hospice in New Jersey.
(Subheadings)
14. Method for Program Funding
(Public, private, state, federal, or
Local money? Public or private
Organization/) This is a private company
15.Characteristics of the staff providing services –(Heading)
16.Professional and non-professional
staff Role and credentials
(What are professional and non-
professional staff background? Are
they trained in the type of
intervention being utilized by the
program? What are the
professionals’ perspectives on
the model of intervention being
utilized?
17.What standardized method is used to
evaluate the staff performance and
client satisfaction? (Provide
SAMPLEs)
Implementation issues –(Heading)
(Subheadings)
18. Successes and Challenges in the program?
19.Do the intervention methods seem
appropriate?
20. Are people coming for services?
21.Are they the types of clients expected to come?
22.Has the amount of outreach work been underestimated and has this delayed program implementation?
Conclusion: The students demonstrate knowledge and skills by writing a summary of the evaluation process. Describe the successes and limitations of the program and the difficulties you encountered in writing this paper? What do they think needs to be changed in order to enhance this program? How would implement these changes? How does this program evaluation paper relate to social work policy, practice and research?
What Constitutes Graduate Level Writing.pdf
slevin
Typewritten Text
slevin
Typewritten Text
slevin
Typewritten Text
slevin
Typewritten Text
Source: Unknown
slevin
Typewritten Text
slevin
Typewritten Text
slevin
Typewritten Text
slevin
Typewritten Text
slevin
Typewritten Text
slevin
Typewritten Text
slevin
Typewritten Text
slevin
Typewritten Text
slevin
Typewritten Text
slevin
Typewritten Text
slevin
Typewritten Text
slevin
Typewritten Text
slevin
Typewritten Text
slevin
Typewritten Text
slevin
Typewritten Text
slevin
Typewritten Text
slevin
Typewritten Text
slevin
Typewritten Text
slevin
Typewritten Text
slevin
Typewritten Text
slevin
Typewritten Text
Dy.
Research in how WANs and network applications are used in the ar.docxverad6
Research in how WANs and network applications are used in the areas of telecommunications.
Research into areas of how WANs and network applications are used in the areas of telecommunications answer the essay questions below in no less than
250
words each with the support overall of a minimum of “3” academic sources of research.
1. Discuss in scholarly detail why PSDN transport cores are drawn as a cloud?
2. Discuss in scholarly detail VoIP and its current uses along with any potential research on the future use of VoIP.
3. Discuss in scholarly detail why you think the explosion of applications and small mobile devices is a particular concern?
4. Discuss in scholarly detail whether or not you think that pure P2P architectures will be popular in the future?
5. Discuss in scholarly detail and come up with a list of roles that facilitating servers can play in P2P applications.
Paper Requirements:
Paper will need to include an
APA
cover page.
Paper will need to include a
100 to 150
word
abstract.
Paper will need to be a minimum of
2,000
words not including the cover page, abstract, and reference page.
Paper will need to be supported with a minimum of three academic resources.
Paper will need to follow all general formatting to meet
APA
standards of professional writing and research documentation including a complete reference page.
.
Research in psychology is a complex process that involves proper sci.docxverad6
Research in psychology is a complex process that involves proper scientific methodology. Describe how a researcher might use naturalistic observation, case studies, or survey research to investigate gender differences in aggressive behavior at the workplace. First, state a hypothesis and then describe your research approach. You should offer at least one citation to support your work.
This is a discussion post. It doesn't need to be long. 11/2 paragraph is fine and cite sources.
.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Research noteAssessing and managing risks using the Supply.docx
1. Research note
Assessing and managing risks using the Supply
Chain Risk Management Process (SCRMP)
Rao Tummala
Computer Information Systems Department, College of
Business, Eastern Michigan University, Ypsilanti, Michigan,
USA, and
Tobias Schoenherr
Department of Supply Chain Management, The Eli Broad
Graduate School of Management, Michigan State University,
East Lansing,
Michigan, USA
Abstract
Purpose – The purpose of this paper is to propose a
comprehensive and coherent approach for managing risks in
supply chains.
Design/methodology/approach – Building on Tummala et al.’s
Risk Management Process (RMP), this paper develops a
structured and ready-to-use
approach for managers to assess and manage risks in supply
chains.
Findings – Supply chain risks can be managed more effectively
when applying the Supply Chain Risk Management Process
(SCRMP). The structured
approach can be divided into the phases of risk identification,
risk measurement and risk assessment; risk evaluation, and risk
2. mitigation and
contingency plans; and risk control and monitoring via data
management systems. Specific techniques for conducting this
process are suggested.
Originality/value – While supply chain risk management is an
emerging and important topic in our dynamic and
interconnected world, conceptual
frameworks providing a clear meaning and normative guidance
are scarce (Manuj and Mentzer, 2008). This paper presents such
a framework, offering
structure and decision support for managers.
Keywords Supply chain management, Risk management process,
Supply chain risk, Risk management
Paper type Research paper
1. Supply chain risk management
At a time when global competition is intensifying and supply
chains are becoming longer and more complex, the likelihood
of not achieving the desired supply chain (SC) performance
increases, mainly due to the risk of SC failures. It is therefore
essential that companies plan for disruptions and develop
contingency plans as they design or redesign their supply
chains. Firms need to understand supply chain
interdependencies, identify potential risk factors, their
likelihood, consequences and severities. Risk management
3. action plans can then be developed to preferably avoid the
identified risks, or if not possible, at least mitigate, contain
and control them. The risk involved in supply chains, as well
as the impact severity of supply chain failures, has been
demonstrated recently by the recalls and subsequent lawsuits
for toy cars (Story, 2007) and pet food (FDA, 2008). While
risk may be associated with unacceptable products delivered
from upstream, it can also involve risks associated with the
environment, such as the impact of hurricanes Katrina and
Rita (Devlin, 2005), or the current hijackings and robberies of
vessels by pirates off the coast of Somalia (Peats, 2008).
The purpose of this paper is to introduce a structured and
systematic approach to enumerate SC risks, and to assess
their severity and likelihood, so that risk mitigation plans can
be developed and implemented. As such, this paper makes an
important contribution to the area of supply chain risk
management, and highlights an approach to manage these
risks. It continues the tradition of recent academic research
4. and industry reports, which have stressed the importance of
supply chain risk management, as well as the development of
approaches for its management (e.g. Blos et al., 2009; Manuj
and Mentzer, 2008; Shaer and Goedhart, 2009).
Risk can be defined as a “combination of probability or
frequency of occurrence of a defined hazard and magnitude of
the occurrence” (BS 4778, 1991). Building on several authors
that have defined supply chain risk (e.g. Choi and Krause,
2006; Zsidisin et al., 2000, 2004), we conceptualize supply
chain risk as an event that adversely affects supply chain
operations and hence its desired performance measures, such
as chain-wide service levels and responsiveness, as well as
cost. Regardless of the area of interest, risk is associated with
an undesirable loss, i.e. an unwanted negative consequence,
and uncertainty. Table I presents an illustrative list of supply
The current issue and full text archive of this journal is
available at
www.emeraldinsight.com/1359-8546.htm
Supply Chain Management: An International Journal
5. 16/6 (2011) 474–483
q Emerald Group Publishing Limited [ISSN 1359-8546]
[DOI 10.1108/13598541111171165]
The authors are grateful to Guest Editor Dr Charlene Xie and
two
anonymous reviewers for the valuable feedback and comments
received on
earlier versions of this paper.
474
chain risks, compiled from various prior studies, most notably
Chopra and Sodhi (2004) and Schoenherr et al. (2008).
Even though the assessment and management of risk in
supply chains is more of a recent phenomenon, studies exist
that explored risk management approaches from a variety of
angles (e.g. Charette, 1989; Hayes et al., 1986; Lowrance,
1976; Rowe, 1977; Starr and Whipple, 1980). Building on
these studies, Tummala et al. (1994), by following Raiffa
(1982) and Hertz and Thomas (1983), developed a
structured Risk Management Process (RMP) consisting of
the five phases risk identification, risk measurement, risk
assessment, risk evaluation, and risk control and monitoring.
This RMP framework has been successfully applied to
identify potential risk factors and to assess their likelihood of
occurrence. In addition, the seriousness of associated
consequences can be identified, and appropriate risk
6. mitigating strategies can be developed (Burchett and
Tummala, 1998). While the RMP has proven to be useful
when applied to such individual project decisions, for example
the risk involved in an extra high voltage transmission line
project (Tummala and Burchett, 1999), it has yet to be
applied to the much broader context of the supply chain.
Additional risk management approaches are included in the
works of, Blos et al. (2009), De Waart (2006), Kilgore (2004),
Kleindorfer and Saad (2005), Kleindorfer and Van
Wassenhove (2004), Manuj and Mentzer (2008), Sinha et al.
(2004) and Zsidisin and Ellram (2003).
However the process may look like, techniques need to be
in place for assessing the likelihood of occurrence of identified
risk factors, as well as the seriousness of associated
consequences. The present paper is based on and extends
above studies, primarily the work by Tummala and colleagues
(Tummala et al., 1994; Tummala and Mak, 2001), but also
research conducted by Ellegaard (2008), Finch (2004),
Manuj and Mentzer (2008), Schoenherr et al. (2008), and
proposes an approach consisting of a modified RMP to
identify, assess and manage supply chain risks. This modified
approach is referred to as the supply chain risk management
process (SCRMP). Techniques mentioned by Tummala and
colleagues (Tummala et al., 1994; Tummala and Mak, 2001),
as well as others, will be highlighted in subsequent sections
within the context of supply chain risk assessment. Overall,
the paper presents a conceptual framework and approach for
effective and efficient management of risks in supply chains,
and attempts to reduce to the current lack of conceptual
frameworks in SC risk management (Manuj and Mentzer,
7. 2008). While this work is a primary extension of Tummala
and colleagues’ (Tummala et al., 1994; Tummala and Mak,
2001) RMP, its application to supply chain management and
supply chain risks is novel and provides significant insight into
the management of such risks. The paper follows the tradition
of risk management within the supply chain (e.g. Harland
et al., 2003; Hauser, 2003; Paulsson, 2004).
2. The Supply Chain Risk Management Process
(SCRMP)
The complete SCRMP is depicted in Figure 1. While the
focus of this paper is on a detailed description of the three
phases, the other components, such as drivers, risk categories,
supplier/logistics evaluation criteria and performance
measures should not be neglected. Risk identification, risk
measurement and risk assessment comprise Phase I of the
Table I Supply chain risk categories and their triggers
Risk category Risk triggers
Demand risks Order fulfillment errors
Inaccurate forecasts due to longer lead times,
product variety, swing demands, seasonality, short
life cycles, and small customer base
Information distortion due to sales promotions and
incentives, lack of SC visibility, and exaggeration of
8. demand during product shortage
Delay risks Excessive handling due to border crossings or
change
in transportation mode
Port capacity and congestion
Custom clearances at ports
Transportation breakdowns
Disruption risks Natural disasters
Terrorism and wars
Labor disputes
Single source of supply
Capacity and responsiveness of alternate suppliers
Inventory risks Costs of holding inventories
Demand and supply uncertainty
Rate of product obsolescence
Supplier fulfillment
Manufacturing Poor quality (ANSI or other compliance
standards)
(process) Lower process yields
9. breakdown risks Higher product cost
Design changes
Physical plant Lack of capacity flexibility
(capacity) risks Cost of capacity
Supply
(procurement)
Quality of service, including responsiveness and
delivery performance
risks Supplier fulfillment errors
Selection of wrong partners
High capacity utilization supply source
Inflexibility of supply source
Poor quality or process yield at supply source
Supplier bankruptcy
Rate of exchange
Percentage of a key component or raw material
procured from a single source
System risks Information infrastructure breakdowns
10. Lack of effective system integration or extensive
system networking
Lack of compatibility in IT platforms among SC
partners
Sovereign risks Regional instability
Communication difficulties
Government regulations
Loss of control
Intellectual property breaches
Transportation Paperwork and scheduling
risks Port strikes
Delay at ports due to port capacity
Late deliveries
Higher costs of transportation
Depends on transportation mode chosen
Assessing and managing risks using the SCRMP
Rao Tummala and Tobias Schoenherr
Supply Chain Management: An International Journal
11. Volume 16 · Number 6 · 2011 · 474 – 483
475
SCRMP, which will be described in the next section. Input to
this first phase are internal and external drivers, such as those
illustrated in Figure 1.
2.1 Phase I of SCRMP
2.1.1 Risk identification
The first step of the first phase of the SCRMP is risk
identification (Figure 1). Risk identification involves a
comprehensive and structured determination of potential
SC risks associated with the given problem. Understanding
risks, related to such categories as highlighted in Table I, is
critical. These risk categories have also been included in our
overall framework (Figure 1). Rather than attempting to be
exhaustive, this list is illustrative of the multitude of risks that
may be present. Affected areas need to be clearly identified
and consequences need to be understood so that risk
mitigation strategies can be implemented. Care should be
taken since some strategies may adversely affect other risks
(Chopra and Sodhi, 2004). Understanding the variety and
12. interrelationships of SC risks is therefore important as well.
Such an understanding can be achieved by considering threats
and resources (Crockford, 1986). While threats refer to the
broad range of forces, which could produce adverse results,
resources refer to assets, people or earnings, which could be
affected by the threats. One can start by first enumerating all
possible threats that could produce adverse results for the
performance of the supply chain. Then, for each threat, one
needs to determine the resources of the organization that
could be affected. The following approaches can help in the
identification of potential SC risks: supply chain mapping,
checklists or checksheets, event tree analysis, fault tree
analysis, failure mode and effect analysis (FMEA) and
Ishikawa cause and effect analysis (CEA) (see Tummala et al.,
1994).
While it is beyond the scope of this paper to provide a
thorough overview of each of these suggested approaches,
they will be briefly defined and described in the following.
Illustrative references are provided to which the interested
reader is referred. First, supply chain mapping is an approach
in which the SC and its flow of goods, information and money
is visually depicted, from upstream suppliers, throughout the
13. focal firm, to downstream customers. A strategic supply chain
map is a tool to align supply chain strategy with corporate
strategy, and to help firms manage and modify the supply
chain (Gardner and Cooper, 2003). Once every detail of the
supply chain has been mapped, potential risks can be
identified better. Second, checklists or checksheets are
forms to record how often a failure was attributed to a
specific event. These forms are used to standardize data
collection and to create histograms (Chase et al., 2006).
Checklists could for example be used to record late deliveries
from suppliers, which can serve as information to rate their
reliability, i.e. the risk for not delivering on time. Third, event
tree or fault tree analyses are graphical representations of all
possible and subsequent outcomes triggered by an event
(Pate-Cornell, 1984), such as a supply chain failure. While
both types of trees may appear to look the same, there are
important differences, such as the presence of single or
multiple event paths in the diagram (Hollnagel, 2004). One
may for example map out the potential events and responses
that may be triggered by a supply chain failure to then plan for
alternatives. Fourth, failure mode and effect analysis (FMEA)
14. is a tool to identify “at the design stages potential risks during
the manufacture of a product and during its use by the end
customer” (Karim et al., 2008, p. 3,601). For an introduction
to FMEA please see McDermott et al. (1996). Before
committing to a supply chain one could conduct such an
analysis with this SC to analyze and assess what could go
wrong, as well as how severe the consequences would be. And
fifth, Ishikawa cause and effect analysis involves the
brainstorming and exploration of all possible relationships
between potential causes and failure events. Due to its
structure, CEA diagrams are also sometimes called fishbone
diagrams (Chase et al., 2006). Once a supply chain failure has
been identified, these diagrams could be used to discover the
true root cause of the incident.
2.1.2 Risk measurement
Risk measurement, the second step of the first phase
(Figure 1), involves the determination of the consequences
of all potential SC risks, together with their magnitudes of
impact. Consequences are defined as the manner in which or
the extent to which the threat manifests its effects upon the
15. resources (Crockford, 1986). Manifestations may include loss
of or damage to assets, loss of income, interruption of service
levels, cost overruns, schedule delays, poor process
performance, liabilities incurred, damage repair costs, or
injuries. Once a checklist, an event tree, a fault tree, an
FMEA, or even an Ishikawa CEA analysis is applied to
identify SC risks, corresponding consequences and their
severity levels can be assessed.
Risks can be classified in terms of four types of undesirable
consequences, with differing characteristics of frequency,
severity and predictability. A popular classification is provided
by Crockford (1986), who characterized consequences into
trivial, small, medium and large. As such, trivial consequences
occur with a very high frequency, have a very low severity, and
a very high predictability. Small consequences have a high
frequency, a low severity, and a reasonable predictability, with
however their occurrence being infrequent. Medium
consequences have a low frequency, a medium severity, and
also a reasonable predictability, with their occurrence being
16. frequent. Finally, large consequences can be characterized by
a very low frequency, a high severity, and a minimal
predictability. This framework can also be applied to our
context. “Trivial losses” are losses that are expected to occur
in any organization and can be met by normal operating
budgets (Crockford, 1986). “Small losses” may present little
problems, unless their frequency becomes so high that their
aggregate effect approaches that of a single “medium loss”.
Although not preferred, “medium losses” would not cause
the firm serious concern if they happened at regular intervals,
for then their cost could be expressed as an annual amount,
and provisions could be made. A “large loss” presents the
most serious problem. A loss of this kind happens very rarely,
but if it did occur, it could be catastrophic for the firm.
US Military Standard 882C can be used to assess
consequence severities qualitatively as described in Table II
below (Grose, 1987; Military Standard, MIL-STD-882C,
1993). This type of severity assessment is useful when
objective information is not available. Although the
17. descriptions of consequence severity categories in the
Military Standard are explained in terms of losses to
buildings, environment, people, illness, etc, they can be
adapted to our SC context, as illustrated in the example in
Table II in terms of delivery risk. Risk consequence indices
Assessing and managing risks using the SCRMP
Rao Tummala and Tobias Schoenherr
Supply Chain Management: An International Journal
Volume 16 · Number 6 · 2011 · 474 – 483
476
Figure 1 Supply Chain Risk Management Process (SCRMP)
Assessing and managing risks using the SCRMP
Rao Tummala and Tobias Schoenherr
Supply Chain Management: An International Journal
Volume 16 · Number 6 · 2011 · 474 – 483
477
18. can then describe the severities, with their descriptions
changed to suit a particular situation. We will use these index
numbers to derive the risk exposure values. Table II also
includes the corresponding HTP codes, which will be used in
a later section to integrate consequence severities with other
risk assessment aspects.
2.1.3 Risk assessment
Risk assessment, the third step of the first phase (Figure 1), is
synonymous with the assessment of uncertainties (Raiffa,
1982), and is concerned with the determination of the
likelihood of each risk factor. Uncertainties can be assessed by
objective information, and probability distributions for
relevant SC risks or consequences can be derived. If,
however, objective information is not available, subjective
information, beliefs and judgment can be used to approximate
distributions. Techniques such as the Delphi method or
expert focus groups can aid in the derivation of probabilities.
Other approaches include parameter estimation, five point
19. estimation, probability encoding, or Monte Carlo simulation
(see Tummala et al., 1994). Alternatively, probability
categories, as suggested in the US Military Standard 882C
(Grose, 1987; Military Standard, MIL-STD-882C, 1993)
can be applied (Table III). The adapted qualitative
descriptions can be changed to suit a given situation and
supply chain environment; we have adapted them in our
instance to the delivery risk example used above. The
occurrence probability of an event such as hurricane Katrina
could for example be classified as “rare” to “extremely rare”,
whereas the occurrence of a later delivery could be classified
as “often” to “infrequent”. Each risk probability category is
assigned a risk probability index, which will help in finding the
risk exposure values, as explained in a later section. Table III
also includes the corresponding HTP codes, which will be
used in a subsequent section to construct the Hazard Totem
Pole, a tool to integrate various risk characteristics.
2.2 Phase II of SCRMP
Phase II of the SCRMP includes the steps of risk evaluation
20. and risk mitigation and contingency plans. Both of these steps
drawn on evaluation criteria and performance measures for
suppliers and logistics, as indicated by the boxes on the right
hand side of Figure 1. While it is beyond the scope of the
present paper to discuss these criteria and measures, they are
an important input for the two steps described in the
following.
2.2.1 Risk evaluation
Risk evaluation is the first step in Phase II of the SCRMP
(Figure 1), and involves the sub-steps of risk ranking and risk
acceptance. These two sub-steps are practical particularly
when objective probability assessment is difficult or sufficient
data are not available to derive probabilities. These
components are discussed in the following.
2.2.1.1 Risk ranking. Risk ranking is based on the
determination of risk exposure values for each identified SC
risk, and is defined as
Risk Exposure Value of Risk Factor
¼ Risk Consequence Index £ Risk Probability Index
This equation uses the indices defined in Tables II-III above
(see Tummala and Mak, 2001; Ng et al., 2003). For example,
if the consequence severity of a SC risk is critical and the
21. corresponding probability category is often, then the risk
exposure value is 3 3 4 5 12. In this fashion we can find the
risk exposure values for each identified risk factor as
illustrated in Table IV.
For simplicity and parsimony, these risk exposure values
can be grouped into classes representing similar ranges of
exposure. For example, risks with values between 16 and 11
could be grouped in the most critical class. These could for
instance include the risk of the shipment being stolen or lost
during transfer, the risk of the only qualified supplier going
out of business, or the risk of the company’s warehouse
burning down. Risks between 10 and 6 could be categorized
in the next-most critical class. Risks in this category could
include the risk of temporary strikes at a supply chain or
logistics partner, delays at customs, or the breakdown of a
Table II Consequence severities and indexes
Consequence severity level Qualitative description
Risk Consequence
Index HTP Code
Catastrophic Plant shut down for more than a month due to lack
of components with
22. zero safety stock levels 4 A
Critical Slow down of process or plant shut down for one week
due to lack of
components with zero safety stock levels 3 B
Marginal Decreased service levels with depleting safety stocks
2 C
Negligible Service levels not impacted due to sufficient safety
stock levels 1 D
Table III Probability categories and indexes
Risk probability categories
Qualitative description
The identified risk factor could occur on an average of . . .
Probability Index HTP Code
Often . . . once per week 4 J
Infrequent . . . once per month 3 K
Rare . . . once per year 2 L
Extremely rare . . . once per decade 1 M
Assessing and managing risks using the SCRMP
Rao Tummala and Tobias Schoenherr
Supply Chain Management: An International Journal
23. Volume 16 · Number 6 · 2011 · 474 – 483
478
machine used by a supplier to provide products to the focal
company. Risks between 5 and 1 could then be classified in
the negligible class. These risks could involve late, incomplete
or defective deliveries of suppliers that do not necessarily
threaten the operations of the focal company, due to for
example sufficient safety stock of the supplies or the non-
critical nature of the items. Alternatively, the risk exposure
values may also be used to classify risks based on an 80-20
approach (Pareto analysis), i.e. the 20 percent of the risks
could be identified that are likely responsible for 80 percent of
the supply chain failures, and then these critical risks could be
mitigated.
2.2.1.2 Risk acceptance. Once the SC risks are classified,
acceptable levels of risk must be established. This is the
second sub-step of risk evaluation in Phase II (Figure 1). The
ALARP (as low as reasonably practicable) principle can be
24. used to classify SC risk as unacceptable, tolerable or
acceptable (Engineering Council, 1994). Cross-functional
teams, including senior management, must be involved, and
all available relevant information should be used in
establishing these criteria. Based on these guidelines the
demarcation between acceptable and unacceptable SC risks
can be defined, as illustrated in Figure 2 (Tummala and Mak,
2001; Ng et al., 2003). As risk-exposure values increase, they
are initially at a value below some level; at this stage risks are
considered to be so small that it is not advisable to spend time
and resources for their control. An example may include late
delivery of pencils to a manufacturing facility – pencils are
not necessarily critical for the proper operation of the plant,
and therefore expending resources to reduce the risk of late
delivery from office products suppliers may not be warranted.
As risks become elevated and their risk-exposure values
increase to unacceptable levels, appropriate response actions
must be taken for their containment. Unacceptable risks
usually have adverse effects on the proper operation of the
25. firm and can result in the shutdown of the assembly line,
when for example deliveries from an upstream supplier are
not received. The risks for which the risk-exposure values fall
between these two levels may be considered tolerable with no
immediate action required. However, they should be
monitored continuously and further improvement should be
sought if resources are available. Continuing with the example
from above, tolerable risks could be tardy deliveries from
suppliers that do not shut down the assembly line. While
certainly not desired, these late deliveries do not interrupt the
flow of products, but the potential for doing so may be
increased. Contracts developed between customers, suppliers,
logistics providers and manufacturers may aid in the
determination of these acceptability levels. Overall, mapping
risks along their magnitudes, as illustrated in Figure 2, can
provide a useful overview of all risks involved in a particular
supply chain, and can help determine on which risk-
preventive actions should be performed. The triangular
26. shape of Figure 2 implies that most risks will be acceptable
and tolerable, while only few risks will be completely
unacceptable, for which therefore mitigation strategies
should definitely be developed. The next section elaborates
on this aspect.
2.2.2 Risk mitigation and contingency plans
The risk mitigation and contingency plans component, which
is the second step of Phase II (Figure 1), involves the
development of risk response action plans to contain and
control the risks (risk planning). An evaluation technique, the
hazard totem pole (HTP) analysis, already applied by
Tummala and colleagues (Tummala et al., 1994; Tummala
and Mak, 2001), can be very helpful in this regard. This
technique, described next, is repeated here to stress its
applicability also within the supply chain context. It is a useful
technique since it integrates in a coherent fashion risk aspects
discussed in prior sections, specifically risk consequence
severity and probability.
2.2.2.1 Risk planning. Once risks have been identified, their
27. consequence severity has been assessed, and their probability
determined, risk mitigation action plans can be developed.
Since it is not feasible and practical to develop mitigation and
prevention strategies for every risk identified, risk-planning
begins with the examination of the costs required to
implement each preventive action to contain and manage
the identified SC risks. Supply chain risks can for example be
reduced by buffer inventories, information technologies,
effective relationships with suppliers and downstream
customers, involvement of alternative or multiple suppliers,
risk pooling, and the conduct of “what if’ analyses (Choi,
2007; Choi and Krause, 2006; Chopra and Sodhi, 2004;
Cook, 2007; Mentzer et al., 2006; Stalk, 2006; Swaminathan
and Tomlin, 2007). Findings from AMR Research’s recent
supply chain risk survey indicate that closer collaboration with
trading partners, the passing of cost increases to customers,
Table IV Risk exposure values
Probability
Severity Often (Index 5 4) Infrequent (Index 5 3) Rare (Index 5
28. 2) Extremely rare (Index 5 1)
Catastrophic (Index 5 4) 16 12 8 4
Critical (Index 5 3) 12 9 6 3
Marginal (Index 5 2) 8 6 4 2
Negligible (Index 5 1) 4 3 2 1
Figure 2 Acceptable, tolerable, and unacceptable risks
Assessing and managing risks using the SCRMP
Rao Tummala and Tobias Schoenherr
Supply Chain Management: An International Journal
Volume 16 · Number 6 · 2011 · 474 – 483
479
the use of dual/multi-sourcing strategies and redundant
suppliers, and performance-based contracts with suppliers
and service partners are the most successful methods most
often used to mitigate risks (Tohamy, 2009). These plans are
evaluated and the best course of action is selected. A four-
level cost-category system as shown in Table V (Tummala and
Mak, 2001; Ng et al., 2003) is adopted to facilitate the
selection of the best course of action. Each category is
associated with a cost index and an HTP code. Similar as
above in Tables II-III, specific cost values provided in Table V
can be adapted to the specific supply chain context (they here
refer again to the delivery risk example introduced above),
29. and are provided here merely for illustrative purposes. Risk
mitigation plans can also be evaluated based on their relative
cost to each other.
2.2.2.2 Hazard Totem Pole (HTP) analysis. The hazard totem
pole analysis provides a method for the systematic evaluation
of SC risks, integrating the risk evaluation aspects of their
severity, probability and cost, as described above in Table II,
Table III and Table V, respectively. The HTP diagram is
designed to combine these three risk dimensions, which
enables the determination of a singular ranking and the
integrated depiction in a single figure. Codes and numerical
values, as introduced above in Table II, Table III and Table V,
are now integrated and used to represent different category
levels.
Based on these three coding levels of severity, probability
and cost, each risk factor is assigned a three-letter code. For
example a risk factor with a code of AJP (or 4, 4, 4) possesses
a consequence severity of “catastrophic”, a probability of
occurrence of “often”, and has an implementation cost to
contain the identified risk factor of less than $1,000. The
corresponding total HTP risk index is then determined as
12ð¼ 4 þ 4 þ 4Þ. Similarly, a risk factor with a code of BJQ
(or 3, 4, 3), having a total risk index of 10, is associated with a
“critical” consequence severity and a likelihood of occurrence
of “often”, involving costs between $1,000 and $10,000 to
implement risk reduction action plans. In this fashion
respective risk codes and risk indices can be assigned to the
identified SC risks. Risks with a higher index number,
determined based on the risk’s severity, probability and
mitigation cost, should be first in line for management
consideration.
With this input the HTP diagram can be constructed
(Figure 3). First, all risks are ordered according to their total
30. HTP index value from highest to lowest. Second, the
corresponding three-letter risk factor code is added to each
line, to provide more information about the particular risk.
And third, additional columns can be created that denote the
cumulative risk factor count and the cumulative risk control
cost. The pyramidal HTP diagram lists the most significant
risks at the top (sharply pointed for immediate management
attention), and the less significant risks at the bottom (Grose,
1987).
The risk factors at the top of the HTP represent
catastrophic consequences that can be eliminated or
contained for a small amount of money. As we go down the
HTP, the impact of the ranked risk factors diminishes. Since
no firm can afford to eliminate every identified risk, one can
find a level in the HTP below which management accepts the
risks, instead of implementing risk response action plans for
their removal (similar to Figure 2 above, which is a pre-
version to the fully developed HTP here). Alternatively, a firm
may have a certain budget amount available to implement
mitigation strategies. Starting from the top, the firm could
then decide to implement all risk mitigation plans until the
cumulative risk control cost equals or exceeds the budget.
This cumulative cost is the cumulative sum of the risk
prevention costs, which are based on the values in Table V.
With this approach, the most critical risks can be addressed,
31. while at the same time being constrained by a limited amount
of resources. As a result, risk response actions can be selected
for implementation according to the priority and the available
resources. The cumulative risk factor count at that point
indicates how many risks (irrespective of their severity,
probability and prevention cost) could be eliminated. The
HTP analysis thus represents an effective decision tool for
integrating the severity of the consequence, the probability of
occurrence, and the implementation cost of a risk response
action plan for an identified SC risk.
While the HTP analysis just described can serve as a useful
decision aid, certain limitations must be noted which relate
mostly to assumptions and the subjective nature of the
rankings and evaluations. For example, the implementation
costs for risk mitigation action plans are assumed to be fixed.
However, after the resources have been expended, the risk
may not be completely eliminated; its severity may be merely
lowered, for instance from “catastrophic” to “severe.” Here,
the budget estimated was not sufficient to completely
eliminate the risk. The risk might also emerge in a modified
form, for which the implementation action plan may be not as
effective. The HTP analysis in Figure 3 can therefore only be
a decision aid, and not a tool that makes decisions for the
supply chain manager. It must be realized that almost all
32. evaluations are subjective, and that assumptions made today
may not be valid tomorrow any more. Modifications to
Figure 3 may therefore be necessary. Nevertheless,
considering these caveats, the suggested approach can help
conceptualize and understand the problem in a more
structured way.
2.3 Phase III of SCRMP
In the last phase of the SCRMP, risk control and monitoring,
one can examine the progress made regarding the
implemented risk response action plans; corrective actions
can be taken if deviations occur in achieving the desired SC
performance. This is Phase III in Figure 1. The process is a
means to determine possible preventive measures and to
provide guidelines for further improvement. Deviation from
desired outcomes, abnormal cases, and SC disruptions are
reported.
Data management systems can aid in this task, for example
by the following modular structure: a catalog of the identified
SC risk factors, consequence severity levels, risk probabilities,
hazard totem pole analysis, government regulations/policies,
Table V Implementation cost categories for risk-response
action-plans
Cost categories Implementation costs
33. Cost
Index
HTP
Code
Substantial More than $100,000 1 S
High Between $10,000 and $100,000 2 R
Low Between $1,000 and $10,000 3 Q
Trivial Less than $1,000 4 P
Assessing and managing risks using the SCRMP
Rao Tummala and Tobias Schoenherr
Supply Chain Management: An International Journal
Volume 16 · Number 6 · 2011 · 474 – 483
480
tariffs and customs policies, transport schedules, and SC risk
triggers. Related risk information can be stored and updated
as needed. It can be used not only for effective monitoring
and the taking of corrective actions, but also for continuous
34. improvement of risk assessment and management. While such
a system may be sufficient, there are also a number of
sophisticated supply chain risk management software provides
who offer commercial solutions, also on a Software as a
Service (SaaS) basis, for risk management.
Based on the conduct of these three phases, a supply chain
decision can be reached. However, as is the case with so many
business processes, the exercise does not stop here.
Management must continuously reiterate the SCRMP to
account for any changes having occurred in the environment.
Risk tolerances may also change, as may prevention costs and
severity levels. Therefore, a continuous monitoring and
assessment should be practiced.
3. Conclusion
The proposed supply chain risk management process is a tool
to provide management with useful and strategic information
concerning the SC risk profiles associated with a given
situation. This is in contrast to the traditional approach based
35. on single point estimates. The SCRMP ensures SC managers
adopt strategic thinking and strategic decision making in
evaluating options to improve supply chain performance. The
analysis can be used not only for evaluating progress but also
for selecting alternative courses of action, based on their
respective SC risk profiles. Ultimately the SCRMP provides
insight into how to make the most appropriate decision.
The SCRMP methodology proposed here is a
comprehensive and coherent approach for managing risks
and uncertainties associated with a given problem. The
SCRMP methodology is practitioner-oriented in evaluating
projects. Supply chain managers can apply it as an audit
framework, in much the same way as the ISO 9000 quality
system, in coping with risks and uncertainties, as well as in
accomplishing the desired supply chain performance. It is
important to recognize though that the approach cannot be
applied blindly. As noted above, the SCRMP is a suggested
aid that can help in making decisions, however, it does not
make the decisions for the supply chain manager. It can
36. merely serve as a tool to help in decision making. It is then
always the intuitive judgment, tacit knowledge, and the
unique situation that come into play and that must be
considered.
From an academic research perspective, the paper
contributes a conceptual risk assessment framework. As was
noted in Manuj and Mentzer (2008, p. 133), “there is a lack
of conceptual frameworks and empirical findings to provide
clear meaning and normative guidance on the phenomenon of
global supply chain risk management.” While we have
responded to the first observation by the development of the
SCRMP, empirical testing of this model is warranted. Future
research is encouraged to test the SCRMP at a range of
company and to report the findings. Based on the results, the
SCRMP can be refined and modified. Furthermore, different
versions of the SCRMP can be developed depending on the
company’s context and environment, for example of whether
sourcing is done domestically or internationally. Insightful will
37. then also be the classification of companies into risk profile
groups, based on their application of the SCRMP. What
makes some companies more or less risk averse than others,
and what is the subsequent impact on performance? These
are just some of the questions pressing for answers.
In addition, while the focus of this paper was on a detailed
description of the three phases, the other components of
Figure 1, such as drivers, risk categories, supplier/logistics
evaluation criteria and performance measures should not be
neglected. These issues can impact the level or risk
significantly. Future research is encouraged to investigate
these components in greater detail, and integrate them with
the SCRMP. The cohesive framework presented herein
provides structure and guidance for such further
investigations of supply chain risk management. As such,
Figure 1 stakes out the research landscape of supply chain risk
management. More fine-grained research looking at the
individual phases of the SCRMP is also needed. Right now,
evaluations are based on subjective judgments, and inherently
38. include some error. Therefore, more quantitative approaches
of risk management are called for. Sensitivity analyses could
for example be conducted by simulating a range of feasible
values and investigating their impact on both cost and risk.
Going even a step deeper, future research should investigate
how data available on company internal systems can be
leveraged to determine these values. Based on the results, an
optimal solution could then ideally be determined.
Figure 3 Hazard Totem Pole (HTP)
Assessing and managing risks using the SCRMP
Rao Tummala and Tobias Schoenherr
Supply Chain Management: An International Journal
Volume 16 · Number 6 · 2011 · 474 – 483
481
References
Blos, M.F., Quaddus, M., Wee, H.M. and Watanabe, K.
(2009), “Supply chain risk management (SCRM): a case
39. study on the automotive and electronic industries in
Brazil”, Supply Chain Management: An International
Journal, Vol. 14 No. 4, pp. 247-52.
BS 4778 (1991), Quality Vocabulary, British Standards
Institute.
Burchett, J.F. and Tummala, V.M.R. (1998), “An application
of the risk management process (RMP) in capital
investment decisions for an EHV transmission line
construction project”, Construction Management and
Economics, Vol. 16 No. 2, pp. 235-44.
Charette, R.N. (1989), Software Engineering Risk Analysis and
Management, McGraw-Hill, New York, NY.
Chase, R.B., Jacobs, F.R. and Aquilano, N.J. (2006),
Operations Management for Competitive Advantage,
McGraw-Hill Irwin, New York, NY.
Choi, T.Y. (2007), “Supplier-supplier relationships: why they
matter”, Supply Chain Management Review, Vol. 11 No. 5,
pp. 51-6.
Choi, T.Y. and Krause, D.R. (2006), “The supply base and its
complexity: implications for transaction costs, risks,
responsiveness, and innovation”, Journal of Operations
40. Management, Vol. 24 No. 5, pp. 637-52.
Chopra, S. and Sodhi, M.S. (2004), “Managing risk to avoid
supply-chain breakdown”, Sloan Management Review,
Vol. 46 No. 1, pp. 53-61.
Cook, T.A. (2007), Global Sourcing Logistics: How to Manage
Risk and Gain Competitive Advantage in a Worldwide Market
Place, AMACOM, American Management Association,
New York, NY.
Crockford, N. (1986), An Introduction to Risk Management,
2nd ed., Woodhead-Faulkner.
De Waart, D. (2006), “Getting smart about risk
management”, Supply Chain Management Review, Vol. 10
No. 8, pp. 27-34.
Devlin, M. (2005), “Functional matters: Hurricane Katrina
and the supply chain”, ThomasNet, Industrial Market
Trends, available at: http://news.thomasnet.com/IMT/ar
chives/2005/09/functional_matt.html (accessed July 6,
2009).
Ellegaard, C. (2008), “Supply risk management in a small
company perspective”, Supply Chain Management:
An International Journal, Vol. 13 No. 6, pp. 425-34.
41. Engineering Council (1994), Guidelines and Risk Issues,
Lloyd’s Register, London.
FDA (2008), “Pet foods recall (melamine)/tainted animal
feed”, US Food and Drug Administration, updated
February 6, 2008, available at: www.fda.gov/oc/opacom/ho
ttopics/petfood.html (accessed December 8, 2008).
Finch, P. (2004), “Supply chain risk management”, Supply
Chain Management: An International Journal, Vol. 9 No. 2,
pp. 183-96.
Gardner, J.T. and Cooper, M.C. (2003), “Strategic supply
chain mapping approaches”, Journal of Business Logistics,
Vol. 24 No. 2, pp. 37-64.
Grose, V.L. (1987), Managing Risk: Systematic Loss Prevention
for Executives, Prentice-Hall, Englewood Cliffs, NJ.
Harland, C., Brenchley, R. and Walker, H. (2003), “Risk in
supply networks”, Journal of Purchasing and Supply
Management, Vol. 9 No. 2, pp. 51-62.
Hauser, L.M. (2003), “Risk-adjusted supply chain
management”, Supply Chain Management Review, Vol. 7
No. 6, pp. 64-71.
Hayes, R.W., Perry, J.G., Nompson, P.A. and Willmer, G.
(1986), Risk Management in Engineering Construction,
Implications for Project Managers, Thomas Telford,
42. Westminster, London.
Hertz, D.B. and Thomas, H. (1983), Risk Analysis and Its
Applications, John Wiley & Sons, Chichester.
Hollnagel, E. (2004), Barriers and Accident Prevention,
Ashgate Publishing, Farnham.
Karim, M.A., Smith, A.J.R. and Halgamuge, S. (2008),
“Empirical relationships between some manufacturing
practices and performance”, International Journal of
Production Research, Vol. 46 No. 13, pp. 3583-613.
Kilgore, J.M. (2004), “Mitigating supply chain risks”, 89th
Annual International Supply Management Conference,
April 2004.
Kleindorfer, P.R. and Saad, G.H. (2005), “Managing
disruption risks supply chains”, Production and Operations
Management, Vol. 14 No. 1, pp. 53-68.
Kleindorfer, P.R. and Van Wassenhove, L.K. (2004), “Risk
management for global supply chains: an overview”,
in Gatignan, H. and Kimberly, J. (Eds), The Alliances on
Globalizing, Cambridge University Press, Cambridge, MA,
Ch. 12.
Lowrance, W.W. (1976), Of Acceptable Risk, Science and the
Determination of Safety, William Kaufmann, Los Altos, CA.
McDermott, R.E., Mikulak, R.J. and Beauregard, M.R.
(1996), The Basics of FMEA, Productivity Inc, Portland,
OR.
Manuj, I. and Mentzer, J.T. (2008), “Global supply chain risk
management”, Journal of Business Logistics, Vol. 29 No. 1,
43. pp. 133-55.
Mentzer, J.T., Myers, M.B. and Stank, T.P. (2006), Handbook
of Global Supply Chain Management, Sage Publications,
Thousand Oaks, CA.
Military Standard, MIL-STD-882C (1993), System Hazard
Analysis, System Safety Program Requirements, United States
Department of Defense, January 1993, pp. A4-A6.
Ng, M.F., Tummala, V.M.R. and Yam, C.Y. (2003), “A risk
based maintenance management model for toll road/tunnel
operations”, Construction Management and Economics,
Vol. 21 No. 5, pp. 495-510.
Pate-Cornell, M.E. (1984), “Fault tree vs event trees in
reliability analysis”, Risk Analysis, Vol. 4 No. 3, pp. 177-86.
Paulsson, U. (2004), “Supply chain risk management”,
in Brindley, C. (Ed.), Supply Chain Risk, Ashgate
Publishing, Aldershot.
Peats, B. (2008), “How to stop the pirates?”, New Statesman,
December 5, 2008, available at: www.newstatesman.com/a
frica/2008/12/merchant-ships-pirates-piracy (accessed
July 6, 2009).
Raiffa, H. (1982), “Science and policy: their separation and
integration in risk analysis”, The American Statistician,
Vol. 36 Nos 3, Part 2, pp. 225-37.
Rowe, W.D. (1977), An Anatomy of Risk, John Wiley & Sons,
New York, NY.
Schoenherr, T., Tummala, V.M.R. and Harrison, T. (2008),
“Assessing supply chain risks with the analytic hierarchy
44. process: providing decision support for the offshoring
decision by a US manufacturing company”, Journal of
Purchasing and Supply Management, Vol. 14 No. 2,
pp. 100-11.
Assessing and managing risks using the SCRMP
Rao Tummala and Tobias Schoenherr
Supply Chain Management: An International Journal
Volume 16 · Number 6 · 2011 · 474 – 483
482
Shaer, S. and Goedhart, J. (2009), “Risk and the consolidated
supply chain: rethinking established best practices”, APICS
Magazine, July/August, pp. 41-3.
Sinha, P.R., Whitman, L.E. and Malzahn, D. (2004),
“Methodology to mitigate supplier risk in an aerospace
supply chain”, Supply Chain Management: An International
Journal, Vol. 9 No. 2, pp. 154-68.
Stalk, G. Jr (2006), “Surviving the China riptide”, Supply
Chain Management Review, Vol. 10 No. 4, pp. 19-26.
Starr, C. and Whipple, C. (1980), “Risks of risk decisions”,
Science, Vol. 208 No. 6, pp. 1114-9.
Story, L. (2007), “Lead paint prompts Mattel to recall
967,000 toys”, The New York Times, August 2, 2007,
available at: www.nytimes.com/2007/08/02/business/02toy.
html (accessed December 8, 2008).
45. Swaminathan, J.M. and Tomlin, B. (2007), “How to avoid
the risk management pitfalls”, Supply Chain Management
Review, Vol. 11 No. 5, pp. 34-42.
Tohamy, N. (2009), “Can Indian parlay its IT services
success into manufacturing outsourcing?”, Supply Chain
Technologies and Services, AMR Research, Boston, MA.
Tummala, V.M.R. and Burchett, J.F. (1999), “Applying a risk
management process to manage cost risk for an EHV
transmission line project”, International Journal of Project
Management, Vol. 17 No. 4, pp. 223-35.
Tummala, V.M.R. and Mak, C.L. (2001), “A risk
management model for improving operation and
maintenance activities in electricity transmission
networks”, Journal of the Operational Research Society,
Vol. 52 No. 2, pp. 125-34.
Tummala, V.M.R., Nkasu, M.M. and Chuah, K.B. (1994),
“A framework for project risk management”, ME Research
Bulletin, Vol. 2, pp. 145-71.
Zsidisin, G.A. and Ellram, L.M. (2003), “An agency theory
investigation of supply risk management”, The Journal of
Supply Chain Management, Vol. 39 No. 3, pp. 15-27.
Zsidisin, G.A., Panelli, A. and Upton, R. (2000), “Purchasing
organization involvement in risk assessments, contingency
plans, and risk management: an exploratory study”, Supply
Chain Management: An International Journal, Vol. 5 No. 4,
pp. 187-97.
Zsidisin, G.A., Ellram, L.M., Carter, J.R. and Cavinato, J.L.
(2004), “An analysis of supply risk assessment techniques”,
46. International Journal of Physical Distribution & Logistics
Management, Vol. 34 No. 5, pp. 397-409.
Further reading
Tummala, V.M.R. and Lo, C.K. (2004), “Risk management
model for improving electricity supply reliability”,
International Journal of Business & Economics, Vol. 3 No. 1,
pp. 43-55.
About the authors
Rao Tummala is Professor of Operations and Supply Chain
Management in the College of Business, Eastern Michigan
University, Ypsilanti, MI, USA. Professor Tummala is widely
recognized for his scholarly contributions in Project Risk
Management, Quality Management, Supply Chain
Management, Bayesian Decision Theory, and Analytic
Hierarchy Process. Some of the journals in which he has
published papers include Supply Chain Management – An
International Journal, Quality Management Journal, OMEGA –
The International Journal of Management Science, Journal of
Operational Research Society, The Journal of Supply Chain
47. Management, International Journal of Project Management,
Construction Management and Economics and PRACTIX.
Tobias Schoenherr is Assistant Professor of Supply Chain
Management at the Eli Broad Graduate School of
Management at Michigan State Michigan University, East
Lansing, MI, USA. He holds a PhD in Operations
Management and Decision Sciences from Indiana
University, Bloomington. Dr Schoenherr’s research focuses
on strategic supply chain management, including strategic
sourcing, (global) operations strategy, use of technology in
SCM, and outsourcing. His work has appeared or is
forthcoming in the Journal of Operations Management,
Production and Operations Management, Management Science,
the Journal of Supply Chain Management, the International
Journal of Production Research, the International Journal of
Operations and Production Management, OMEGA – The
Inter national Journal of Management Science, Business
Horizons, the Journal of Purchasing and Supply Management,
48. and others. For recent publications, please visit: http://broad.
msu.edu/supplychain/faculty/member?id ¼ 748. Tobias
Schoenherr is the corresponding author and can be
contacted at: [email protected]
Assessing and managing risks using the SCRMP
Rao Tummala and Tobias Schoenherr
Supply Chain Management: An International Journal
Volume 16 · Number 6 · 2011 · 474 – 483
483
To purchase reprints of this article please e-mail:
[email protected]
Or visit our web site for further details:
www.emeraldinsight.com/reprints
Reproduced with permission of the copyright owner. Further
reproduction prohibited without permission.
Supply Chain Integration and the SCOR Model
Honggeng Zhou
1
, W. C. Benton, Jr.
49. 2
, David A. Schilling
2
, and Glenn W. Milligan
2
1
University of New Hampshire
2
The Ohio State University
The Supply Chain Operations Reference (SCOR) model has
been widely adopted in many companies. Anecdotal evidence
and tradejournals have reported significant improvements after
firms have adopted the SCOR model. Although practitioners
have been
enthusiastic about implementing and using the SCOR model in
their operations, the SCOR model has not been empirically
validated.
The purpose of this study is to empirically validate the SCOR
model (i.e., test the structure of the SCOR model). Data from
125 North
American manufacturing firms were collected. The results show
that the relationships among the supply chain processes in the
SCOR
model are generally supported. The Plan process has significant
positive influence on the Source, Make, and Deliver processes.
The
Source process has significant positive influence on the Make
process and the Make process has significant positive influence
on the
Deliver process. The Source process mediates the impact of the
Plan process on the Make process and the Make process
50. mediates the
impact of the Plan process on the Deliver process. The findings
provide managers with empirical evidence that the SCOR model
is in
fact valid.
Keywords: Supply Chain Operations Reference (SCOR) model;
supply chain management; business strategy
INTRODUCTION
The Supply Chain Operations Reference (SCOR) model was
developed by the Supply Chain Council in 1996. The SCOR
model focuses on the supply chain management function
from an operational process perspective and includes cus-
tomer interactions, physical transactions, and market interac-
tions. In the past decade, the SCOR model has been widely
adopted by many companies including Intel, General Electric
(GE), Airbus, DuPont, and IBM. According to the Supply
Chain Council’s (2010) website, ‘‘While remarkably simple, it
[the SCOR model] has proven to be a powerful and robust
tool set for describing, analyzing, and improving the supply
chain.’’ In the literature, several recent studies have reviewed
the SCOR model (Huang et al. 2004, 2005). Many other
studies (McCormack 1998; Lockamy and McCormack 2004;
Supply Chain Council 2010) have attempted to measure the
SCOR model’s impact on business performance. Trade jour-
nals have also reported the benefits of using SCOR model
(Davies 2004; Malin 2006).
To date, the SCOR model has been used by companies
throughout the world. Intel is one of the first major U.S.
corporations to adopt the SCOR model (Supply Chain
Council 2010). In 1999, Intel started its first SCOR project
for its Resellers Product Division. Later, they expanded the
SCOR model implementation to the Systems Manufacturing
51. Division. Several other SCOR projects were conducted
afterward. The benefits of implementing the SCOR model
included faster cycle times, less inventories, improved visibil-
ity of the supply chain, and access to important customer
information in a timely fashion. GE implemented the SCOR
model in its Transportation Systems unit, which reported
sales of $2.6 billion in year 2001. The use of the SCOR
model streamlined the purchasing process with its suppliers,
which led to shorter purchasing cycle time and lower cost.
Davies (2004) report that since 1999 Philips Lighting has
used the SCOR model in its overall business framework,
which directly resulted in improved customer service and
reduced inventories. In Europe, Degussa (a German chemical
company) used the SCOR model to streamline its newly
merged businesses. Specifically, Degussa set up a team of
cross-functional employees to implement the SCOR project.
After a three-week pilot project, the SCOR team found
opportunities in the existing supply chain processes. It was
reported that the SCOR project was expected to save the
firm millions of euros.
The SCOR model is used not only in manufacturing oper-
ations, but also in service operations. As Malin (2006)
reports, a New York hospital used the SCOR model to
define, measure, and improve supply chains. The first phase
of the project led to 2% reduction in overall drug inventory
the first year. The hospital reported an 8–10% reduction in
excess and obsolete inventory during the next two years.
Meanwhile, the improved visibility and planning generated
21% capacity increase and an 8% increase in demand. The
prep times for key procedures were reduced by as much as
40%, which resulted in reduced labor costs.
Although the SCOR model has been widely practiced by
many companies in different processes of supply chains and
52. anecdotal evidences have shown the value of adopting the
SCOR model, no large-scale empirical research has been
conducted to systematically examine the relationships among
the supply chain processes as suggested by the SCOR model.
Thus, the purpose of this study is to empirically validate the
SCOR model (i.e., to confirm the structure of the SCOR
model).
The results of this study show that the relationships
among the supply chain processes in the SCOR model are
generally supported. The Plan process has significant positive
Corresponding author:
W. C. Benton, Jr., Department of Management Sciences, Fisher
College of Business, The Ohio State University, 2100 Neil Ave-
nue, Columbus, OH 43210, USA; E-mail: [email protected]
Journal of Business Logistics, 2011, 32(4): 332–344
� Council of Supply Chain Management Professionals
influence on the Source, Make, and Deliver processes. The
Source process has significant positive influence on the Make
process and the Make process has significant positive influ-
ence on the Deliver process. Among the four supply chain
processes, the Plan process has received the least attention
from the implementation firms. The findings from this study
provide practitioners statistical confidence in the implementa-
tion and use of the SCOR model.
In the next section, literature review and research hypothe-
ses will be presented. The theoretical underpinnings for the
research hypotheses are also discussed in the second section.
In the third section, the research methodology and measure-
ment scale development are presented. In the fourth section,
the analysis results are given. The research findings and man-
53. agerial implications are discussed in the fifth section. Finally,
concluding comments and future research directions are pre-
sented in the concluding section.
LITERATURE REVIEW AND RESEARCH
HYPOTHESES
In this section, we review the literature of the SCOR model.
Based on the literature review, the research hypotheses are
proposed. The literature review provides the theoretical foun-
dation for this research. The theoretical foundation is
reflected in the literature taxonomy given in Table 1.
As the SCOR model is the main framework in this study,
a brief introduction of the SCOR model is necessary. The
SCOR model diagram is given in Figure 1. Level 1 consists
of five supply chain processes: Plan, Source, Make, Deliver,
and Return. As the Return process was not in the first four
versions of the SCOR model and is not as mature as the
other four processes, this study focuses on the other four
processes (Plan, Source, Make, and Deliver), which have
been widely adopted by practitioners. Level 2 of the SCOR
model describes core processes. Level 3 of the SCOR model
specifies the best practices of each process. According to the
definition in the SCOR model, Plan includes the processes
that balance aggregate demand and supply to develop a
course of action which best meets sourcing, production, and
delivery requirements. Source includes the processes that pro-
cure goods and services to meet planned or actual demand.
Make is comprised of the processes that transform product
to a finished state to meet planned or actual demand. Deliv-
ery includes all processes which provide finished goods and
services to meet planned or actual demand (Supply Chain
Council 2010). The following subsections review the litera-
ture of the four processes and develop the research hypothe-
54. ses.
Plan (planning)
Supply chain planning process uses information from exter-
nal and internal operations to balance aggregate demand
and supply. The SCOR model suggests that the capability to
run ‘‘simulated’’ full stream supply ⁄ demand balancing for
‘‘what–if’’ scenarios is important for supply chain planning.
‘‘What–if’’ analysis helps firms to perform sensitivity analysis
for various possible scenarios. Another important ability is
to get real-time information and rebalance supply chains
using updated information. Information sharing in supply
chains can lead to improved performance (Fawcett et al.
2011). According to Narasimhan and Kim (2001), the use of
information systems can improve supply chain integration.
From the process perspective, it is important to have a desig-
Table 1: Literature review taxonomy
Authors
Supply chain practice
Plan Source Make Deliver
Ahmad and Schroeder (2001) *
Benton and Shin (1998) *
Blackburn (1991) *
Chen and Paulraj (2004) *
Carr and Pearson (1999) *
Choi and Hartley (1996) *
Cua et al. (2001) *
Dong and Xu (2002) * *
Ferrari (2001) * *
55. Flynn et al. (1999) *
Fullerton and McWatters (2001) *
Fullerton et al. (2003) *
Garcia et al. (2004) * *
Giffi et al. (1990) * *
Goldsby and Stank (2000) *
Gurin (2000) *
Ha et al. (2003) *
Hahn et al. (1983) *
Hausman et al. (2002) * *
Hayes and Wheelwright (1984) * *
Henig and Levin (1992) * *
Hill (1994) * * *
Hines (1996) * *
Kaynak and Hartley (2008) *
Lee et al. (1997) * *
Li et al. (2005) *
Lockamy and McCormack (2004) * * *
MacDuffie et al. (1996) *
Makatsoris and Chang (2004) * *
McKone and Schroeder (2001) *
Nakajima (1988) *
Nair (2006) *
Pande et al. (2000) *
Powell (1995) *
Prahinski and Benton (2004) *
Rungtusanatham et al. (1997) *
Samson and Terziovski (1999) *
Schonberger (1990) *
Shah and Ward (2003) *
Shah and Ward (2007) *
Stalk et al. (1992) * *
Supply Chain Council (2010) * * *
Wemmerlov and Hyer (1989) *
Womack et al. (1990) *
56. Supply Chain Integration and SCOR Model 333
nated supply chain planning team. Womack et al. (1990) find
that one primary reason that Japanese automobile firms have
an advantage over traditional U.S. automobile firms is that
they used designated planning teams to coordinate different
functions. Furthermore, the literature suggests that interfunc-
tional coordination within a firm is critical for supply chain
planning because the alignment between the functions is nec-
essary to achieve a firm’s strategic goals (Supply Chain
Council 2010). For example, many studies (Hill 1994; Haus-
man et al. 2002) have found the importance of aligning mar-
keting and manufacturing operations to improve
performance.
Source (buyer–supplier relationship)
Sourcing practice connects manufacturers with suppliers and
is critical for manufacturing firms. The academic literature
and the SCOR model have identified several sourcing
practices as best practices (Carr and Pearson 1999; Chen and
Paulraj 2004; Prahinski and Benton 2004; Li et al. 2005;
Benton 2010). Establishing long-term supplier–buyer rela-
tionship and reducing the supplier base are good sourcing
practices. The role of key suppliers in a supply chain should
be assured through long-term relationship (Treleven 1987;
Benton 2010). Hahn et al. (1983) show that companies’ bene-
fits gained by giving larger volume of business to fewer sup-
pliers using long-term contracts outweigh the costs. Just-in-
time (JIT) delivery from suppliers is also considered a good
sourcing practice. The benefits of JIT delivery have been
widely documented (Benton and Shin 1998; Ahmad and Sch-
roeder 2001; Dong et al., 2001). Furthermore, providing
57. feedback about suppliers’ performance evaluations is a good
sourcing practice. According to Carr and Pearson (1999),
supplier evaluation systems have a direct positive impact on
buyer–supplier relationship, and an indirect impact on firm
financial performance. More recently, Prahinski and Benton
(2004) studied the role of communication in supply chain
management. They found that executives at buying firms
need to incorporate indirect influence strategy, formality,
and feedback into supplier development programs.
Make (transformation process)
The Make process includes the practices that efficiently
transform raw materials into finished goods to meet supply
chain demand in a timely manner. Both academic literature
Return
Level
Descrip on Schematic Comments
Top Level
(Process
Types)
Level 1 defines the scope and content
for the Supply Chain Operations
Reference-model. Here basis of
competition performance targets are
set.
Source MakeDeliver
Plan
1
58. #
Configuration
Level (Process
Categories)
A company’s supply chain can be
“configured-to-order” at Level 2 from
core “process categories.” Companies
implement their operations strategy
through the configuration they choose
for their supply chain.
2
Process
Element Level
(Decompose
Processes)
Level 3 defines a company’s ability to
compete successfully in its chosen
markets, and consists of:
• Process element definitions
• Process element information
inputs, and outputs
• Process performance metrics
• Best practices, where
applicable
3
59. P1.1
Identify, Prioritize, and
Aggregate Supply-Chain
Requirements
P1.2
Identify, Assess, and
Aggregate Supply-Chain
Requirements
P1.3
Balance Production
Resources with Supply-
Chain Requirements
P1.4
Establish and
Communicate
Supply-Chain Plans
Companies implement specific
supply-chain management practices at
this level. Level 4 defines practices to
achieve competitive advantage and to
adapt to changing business conditions.
Implementation
Level (Decompose
Process Elements)
4
61. Figure 1: Supply Chain Operations Reference (SCOR) model.
334 H. Zhou et al.
(Shah and Ward 2007; Benton 2011b) and the SCOR model
include four groups of practices for the Make process: JIT
production, total preventive maintenance (TPM), total qual-
ity management (TQM), and human resource management
(HRM). JIT production includes several practices: pull sys-
tem, cellular manufacturing, cycle time reduction, agile man-
ufacturing strategy, and bottleneck removal (Wemmerlov
and Hyer 1989; Blackburn 1991; Powell 1995; MacDuffie
et al. 1996; Benton and Shin 1998; Flynn et al. 1999; Fuller-
ton and McWatters 2001; Fullerton et al. 2003; Benton
2011a). The review of quality management literature has led
to the identification of good quality management practices:
TQM, statistical process control (SPC), continuous improve-
ment program, and six-sigma techniques (Benton 1991; Pow-
ell 1995; Rungtusanatham et al. 1997; Pande et al. 2000; Cua
et al. 2001; Nair 2006; Kaynak and Hartley 2008). TPM is a
manufacturing program that primarily maximizes equipment
effectiveness throughout its entire life (Nakajima 1988; Cua
et al. 2001). Several studies have explored the good practices
of TPM and their positive relationship with business perfor-
mance (Cua et al. 2001). The literature review led to the
identification of the following effective TPM practices: pre-
ventive maintenance; safety improvement program; planning
and scheduling strategies; and maintenance optimization.
The HRM practices emphasize employee team work and
workforce capabilities. Employee team work is important for
improving production, because frontline employees working
as a team can leverage the experience of all employees and
greatly contribute to process and product improvement
(Hayes and Wheelwright 1984). Workforce capability is
62. another important measurement for workforce management
(Giffi et al. 1990; Schonberger 1990).
Deliver (outbound logistics)
The extant literature and anecdotal evidence show that deliv-
ery has become a critical link in supply chain management
(Gurin 2000; Ha et al. 2003). Goldsby and Stank (2000)
review the world class logistics competencies and capabilities.
One capability is sharing real-time information with supply
chain partners, which increases the real-time visibility of
order tracking. Agility is also an important competence of
world class logistics. Gurin (2000) describes how Ford part-
nered with the United Parcel Service to develop and imple-
ment an Internet-based delivery process, significantly
improving Ford’s delivery performance. An Internet-based
delivery system can significantly enhance the real-time order
tracking capability. Other best delivery practices identified
by the SCOR model include a single contact point for all
order inquiries, order consolidation, and the use of auto-
matic identification. The bar code technology significantly
improves the relationship between suppliers and buyers and
allows some emerging inventory management programs such
as vendor-managed inventory program. Ahmad and Schroe-
der (2001) identify several factors that affect delivery perfor-
mance. The factors include JIT management, quality
management, production instability, and so on. However,
Ahmad and Schroeder (2001) do not use a scale to measure
the good practices in delivery process.
Relationships of the four supply chain processes in the SCOR
model
Both the SCOR model and the literature suggest the relation-
ship among the four supply chain processes as illustrated in
63. Figure 2. First, effective supply chain planning practices are
expected to influence the implementation of effective sourc-
ing, production, and delivery practices (Lockamy and Mc-
Cormack 2004). The planning process is expected to balance
the aggregate supply chain demand and supply. The ability
to balance demand and supply in real time can enhance a
long-term relationship with suppliers who can better respond
to the demand ⁄ supply changes (Ferrari 2001). It also sup-
ports the implementation of an effective production system,
which includes practices such as JIT, TPM, TQM, and
HRM. For example, without a good planning process, a JIT
production would be impossible. The interfunctional coordi-
nation such as the alignment between marketing and manu-
facturing is important for an effective JIT production.
Effective supply chain planning also drives effective delivery
process. To respond to customer demand changes quickly,
firms need the ability to track the order delivery status in real
time (Makatsoris and Chang 2004). Based on the SCOR
model and the literature, the hypotheses are proposed as fol-
lows.
H1: Plan process positively influences Source process.
H2: Plan process positively influences Make process.
H3: Plan process positively influences Deliver process.
Second, sourcing process positively influences the use of
Make process (St. John and Young 1991; Hines 1996; Ben-
ton 2010). A good long-term relationship with suppliers can
help firms implement JIT production. Without a good JIT
delivery from suppliers, a JIT production system would be
Plan
Source
Make
64. Deliver
H1
H2
H3
H4
H5
Figure 2: Supply Chain Operations Reference (SCOR)
model.
Source: Supply Chain Operations Reference Model, Supply
Chain Council (2010).
Supply Chain Integration and SCOR Model 335
impossible. A good relationship with suppliers also helps
control the quality of the inputs, which helps the use of
TQM program. For example, a major automobile manufac-
turer does not examine the quality of some incoming compo-
nents, because it has a good relationship with its suppliers
and has enough confidence on its supplier’s quality. Finally,
a good delivery from suppliers allows manufacturers to sche-
dule preventive maintenance in an effective way. Therefore,
the following hypothesis is proposed.
H4: Source process positively influences Make process.
Third, the Make process positively influences the delivery
65. process (Henig and Levin 1992; Garcia et al. 2004). A good
JIT production system produces products in a timely manner
according to customer needs, which is essential to the
implantation of JIT delivery. A good TQM program and
knowledgeable employees are also necessary to facilitate the
use of JIT delivery. In addition, an effective production sys-
tem can help increase the visibility of order tracking
throughout the whole supply chain system. Therefore, the
following hypothesis is proposed.
H5: Make process positively influences Deliver process.
Although H1–H5 are directly from the SCOR model, the
empirical validation of the SCOR model contributes to the
academic literature and provides value to the practitioners.
Taken together, H1, H2, and H4 suggest that Source process
mediates the influence of Plan process on the Make process.
The mediation effect suggests that the Plan process drives
better Make process at least partially because good supply
chain planning practices have positive influence on sourcing
practices. Similarly, H2, H3, and H5 together suggest that
Make process mediates the influence of Plan process on the
Deliver process. Thus, this study will use Sobel tests to
directly examine these two mediation effects.
H6: The influence of Plan process on Make process is medi-
ated by Source process.
H7: The influence of Plan process on Deliver process is
mediated by Make process.
RESEARCH METHOD
Sample
The research objectives were achieved by obtaining responses
66. from manufacturing professionals holding senior-level posi-
tions. Contact information for qualified informants was iden-
tified with the assistance of the Supply Chain Council (2010).
The surveyed firms include Xerox Corp., Dow Corning
Corp., Owens Corning, Nachi Robotic Systems, Windsor
Mold Inc., and Minntech Corporation. The respondents
were senior executives and held titles such as CEO, Presi-
dent, Vice President, and Director. The average number of
employees in the respondents’ firms was about 5,000. Eight
companies had more than 10,000 employees. The median
annual sales value, as reported by the respondents, was
between $100 million and $500 million. Five companies had
annual sales of more than $5 billion. Four academic experts
and three industry experts were asked to review the survey
instrument (questionnaire) to ensure the relevance and clarity
of the survey instrument. The industry experts who reviewed
the questionnaire also provided insights as to the type of job
titles that may reflect probable knowledge of the SCOR
model. Utilizing this guidance, the sample was selected based
upon job titles and job descriptions available. Employing the
multiple contact strategy as suggested by Dillman (2007), a
total of 745 manufacturing professionals were invited to par-
ticipate in the study.
Four contacts were made with the selected informants.
The purpose of the initial postcard contact was to verify the
accuracy of the mailing address and make the selected
respondents aware of the forthcoming questionnaire. Two
weeks after the initial postcard was mailed, the first round
survey packages were mailed. According to Dillman (2007),
at least two weeks are needed between contacts to allow
enough time for the postcards with wrong addresses to be
returned to us. The survey packages contained three items:
the personalized letter of introduction about the importance
of the study, an eight-page booklet of the survey question-
67. naire, and a prepaid business reply envelope. The third con-
tact, mailed one week after the first round survey packages,
were reminder postcards. The postcards were used to thank
those who had returned the questionnaire and remind those
who had not returned the questionnaire. Two weeks after
sending the reminder postcards, the second round question-
naires were mailed to the informants who had not replied.
As before, the survey package included: a personalized letter,
the questionnaire, and the prepaid business reply envelope.
Two weeks after the second round questionnaires were
mailed, those companies who had not replied were contacted
by telephone. Several insights were gained from the success-
ful telephone conversation. First, respondents in many of the
companies, the informant forwarded the questionnaires to
others within the company to complete. However, if the
respondent who received the questionnaire could not respond
to certain questions, the respondent would most likely for-
ward the questionnaire to another person who can answer
the questionnaire. It is expected that if the questionnaire was
forwarded, the return rate is greatly reduced. This process
also resulted in significantly longer cycle times (Dillman
2007). Second, many respondents who were interested in the
study could not locate the questionnaire that was sent to
them. Thus, a replacement survey package was sent to them.
Third, we found that it is important to have direct contact
with the executives who had the authority to decide whether
to participate in the study. Finally, many companies could
not participate in the study because of company policies.
Measurement scales
The survey questions and the descriptive statistics for each
measurement scale are in Table 2. The Make process has
four indicators (JIT, TQM, TPM, and HRM). This section
336 H. Zhou et al.
68. first describes the multiple criteria that are used to validate
the measurement scales. Then, the final results of the scale
analysis are presented.
Scale validity and reliability
The measurement scale development process supports the
validity and reliability of the measurement scales. First,
exploratory factor analysis was performed. Then, confirma-
tory factor analysis (CFA) was performed. The content
validity of the scales was established by the literature. In
addition, both academicians and practicing managers
assessed the survey questionnaire content validity before the
surveys were distributed. Construct validity ensures that the
conceptual constructs are operationalized in the appropriate
way. To ensure construct validity, exploratory factor analysis
with principal component method is used. According to Hair
et al. (1998) and Carmines and Zeller (1979), the factor load-
ings need to be at least .3. Only one factor in each construct
can have an eigenvalue that is larger than 1.00 and the vari-
ance explained by the first factor in each construct is at least
40%. Reliability is defined as the extent to which the mea-
sures can yield same results on other replication studies. The
internal consistency measured by Cronbach’s alpha is used
to measure the construct reliability in this study. The lower
Table 2: Survey questions and descriptive statistics
Survey question Mean SD
To what extent have the following planning practices been
implemented in your company
[1 = not implemented, 7 = extensively implemented]
69. Plan1. ‘‘What–if’’ analysis has been implemented for supply ⁄
demand balancing 3.41 1.98
Plan2. A change in the demand information instantaneously
‘‘reconfigures’’ the
production and supply plans
3.21 2.18
Plan3. Online visibility of supply chain demand requirements
3.35 2.05
Plan4. The designation of a supply chain planning team 3.65
2.15
Plan5. Both marketing and manufacturing functions are
involved in supply chain
planning process
3.70 2.08
To what extent have the following sourcing practices been
implemented in your company
[1 = not implemented, 7 = extensively implemented]
Source1. Long-term relationships with strategic suppliers 5.51
1.52
Source2. Reduction in the number of suppliers 4.69 1.87
Source3. Just-in-time delivery from suppliers 4.29 1.92
Source4. Frequent measurement of suppliers’ performance 4.75
1.83
Source5. Frequent performance feedback to suppliers 4.44 1.94
To what extent have the following production practices been
implemented in your company
[1 = not implemented, 7 = extensively implemented]
JIT1. Pull system 3.97 2.11
JIT2. Cellular manufacturing 3.42 2.25
JIT3. Cycle time reduction 4.40 1.96
JIT4. Agile manufacturing strategy 3.10 2.04
70. JIT5. Bottleneck ⁄ constraint removal 4.02 1.83
TPM1. Preventive maintenance 4.98 1.75
TPM2. Maintenance optimization 4.08 2.00
TPM3. Safety improvement programs 5.57 1.65
TPM4. Planning and scheduling strategies 5.02 1.50
TQM1. Total quality management 4.88 1.84
TQM2. Statistical process control 4.19 2.16
TQM3. Formal continuous improvement program 4.75 2.06
TQM4. Six-sigma techniques 3.36 2.20
HRM1. Self-directed work teams 3.69 1.93
HRM2. We use knowledge, skill, and capabilities as criteria to
select employees 5.14 1.60
HRM3. Direct labor technical capabilities are acknowledged
4.67 1.72
HRM4. Employee cross-training program 4.76 1.51
To what extent have the following delivery practices been
practiced in your company
[1 = not practiced, 7 = extensively practiced]
Deliver1. We have a single point of contact for all order
inquiries 5.12 1.82
Deliver2. We have real-time visibilities of order tracking 4.41
2.17
Deliver3. We consolidate orders by customers, sources, carriers,
etc. 4.59 2.03
Deliver4. We use automatic identification during the delivery
process to track order status 3.26 2.19
Supply Chain Integration and SCOR Model 337
limit of .7 is considered acceptable (Nunnally and Bernstein
1994; Hair et al. 1998). The results in Table 3 show that all
factor loadings meet the criterion of larger than .3. The fac-
71. tor analysis results from Table 3 also show that all con-
structs satisfy the unidimensionality requirement. For all
scales except Deliver process, only one eigenvalue is larger
Table 3: Final results of measurement validation
Scale name Variable name Factor loading Scale statistics
Plan Plan1 .75 Cronbach’s alpha: .80
Largest eigenvalue (variance explained): 2.80 (56%)
Second largest eigenvalue (variance explained): .77 (15%)
Average variance extracted: .46
Reliability, q: .81
Average variance shared, c2: .34
Plan2 .72
Plan3 .74
Plan4 .80
Plan5 .75
Source Source1 .59 Cronbach’s alpha: .76
Largest eigenvalue (variance explained): 2.62 (52%)
Second largest eigenvalue (variance explained): .82 (16%)
Average variance extracted: .44
Reliability, q: .78
Average variance shared, c2: .39
Source2 .58
Source3 .66
Source4 .87
Source5 .87
Make
JIT JIT1 .57 Cronbach’s alpha: .82
Largest eigenvalue (variance explained): 2.99 (60%)
72. Second largest eigenvalue (variance explained): .87 (17%)
JIT2 .79
JIT3 .86
JIT4 .77
JIT5 .84
TPM TPM1 .90 Cronbach’s alpha: .89
Largest eigenvalue (variance explained): 2.70 (68%)
Second largest eigenvalue (variance explained): .67 (17%)
TPM2 .79
TPM3 .83
TPM4 .77
TQM TQM1 .79 Cronbach’s alpha: .86
Largest eigenvalue (variance explained): 2.83 (71%)
Second largest eigenvalue (variance explained): .50 (12%)
TQM2 .85
TQM3 .89
TQM4 .84
HRM HRM1 .68 Cronbach’s alpha: .77
Largest eigenvalue (variance explained): 2.40 (60%)
Second largest eigenvalue (variance explained): .70 (18%)
HRM2 .78
HRM3 .88
HRM4 .75
Deliver Deliver1 .68 Cronbach’s alpha: .73
Largest eigenvalue (variance explained): 2.22 (56%)
Second largest eigenvalue (variance explained): 1.01 (25%)
Average variance extracted: .61
Reliability, q: .86
73. Average variance shared, c2: .45
Deliver2 .83
Deliver3 .78
Deliver4 .68
Make JIT .79 Cronbach’s alpha: .86
Largest eigenvalue (variance explained): 2.81 (70%)
Second largest eigenvalue (variance explained): .52 (13%)
Average variance extracted: .42
Reliability, q: .74
Average variance shared, c2: .40
TPM .87
TQM .87
HRM .82
Degree of freedom 130
Chi-squared statistics 267
Normed chi-square 2.06
Nonnormed fit index (NNFI) .91
Comparative fit index (CFI) .93
Incremental fit index (IFI) .93
Root mean square error of approximation (RMSEA) .09
All loadings significant at p < .05
338 H. Zhou et al.
than 1.00 and the variance explained by the largest eigen-
value is larger than 40%. For the Deliver process, the second
largest eigenvalue is slightly larger than 1.00. The scree test
suggests that one factor is the most appropriate for this set
of items. Thus, the Deliver process is determined to be unidi-
mensional. For the reliability, Table 3 shows that all scales
74. have Cronbach’s alpha values of .7 or higher. Thus, it is con-
cluded that all measurement scales are reliable.
After performing the exploratory factor analysis, CFA
was performed to confirm the measurement model of the
structural equation model. As Table 3 shows, reliability rho
scores for all constructs exceed the threshold of .7 (Fornell
and Larcker 1981). For each construct, the average shared
variance is smaller than the average variance extracted.
Moreover, the overall CFA model statistics (comparative fit
index [CFI] = .93, incremental fit index [IFI] = .93, non-
normed fit index [NNFI] = .91, and root mean square error
of approximation [RMSEA] = .09) suggest that the pro-
posed construct structure has a reasonably good fit. It is to
be noted that JIT, TPM, TQM, and HRM do not have the
three CFA-related measures (i.e., average variance extracted,
shared variance, and reliability rho) because they are the
measurement items for the latent variable Make in the CFA
model. For example, JIT value in the CFA model is the
average of the five JIT items (i.e., JIT1, JIT2, JIT3, JIT4,
and JIT5) in Table 3.
As we used a single informant to answer all questions,
potential common method bias is checked. The items com-
prising the scales of planning, sourcing, JIT, TPM, TQM,
HRM, and delivery were not highly similar in content. The
respondents are familiar with the constructs. Harman’s one-
factor test of common method bias (Podsakoff and Organ
1986; Podsakoff et al. 2003; Hochwarter et al. 2004) found
several distinct factors for the variables, which suggested that
common method variance bias was not a problem.
Summary of research methodology
This study used a survey research method. The analysis was
based on 125 useable responses from U.S. manufacturing
75. firms. The survey followed the standard process suggested by
Dillman (2007) to ensure that a good and representative
sample was obtained. After the sample was obtained, the sta-
tistical analysis has been performed to ensure that the mea-
surement scales are valid and reliable before the
measurement scales have been used in further statistical anal-
ysis such as structural equation model. Other measurement
concerns such as common method bias have been addressed
in this research methodology stage.
ANALYSIS RESULTS
Descriptive statistics
The descriptive statistics in Table 2 show that the mean of
the supply chain planning and JIT practices are relatively
low compared with the practices of the Source, TPM, TQM,
HRM, and Deliver processes. The means of the planning
and JIT practices are 3.46 and 3.78, respectively, while the
means of the Source, TPM, TQM, HRM, and Deliver prac-
tices are 4.74, 4.91, 4.30, 4.57, and 4.34, respectively. For the
five planning practices, all of them are below 4.00. In con-
trast to that, all five sourcing practices have scores above
4.00. In the Make process, it is quite surprising to see that
the mean of the pull system, cellular manufacturing, agile
manufacturing strategy, six-sigma techniques, and self-direc-
ted work teams are below 4.00, since the lean manufacturing
has been introduced to North America for more than
20 years and many studies have reported extensive imple-
mentation of lean practices in North American firms (Powell
1995; Flynn et al. 1999; Shah and Ward 2003). It seems that
the firms are doing well in the TPM area and most aspects
of TQM and HRM. The factor analysis for the four indica-
tors (JIT, TPM, TQM, and HRM) of the Make process sup-
ports the idea of lean manufacturing bundles in Shah and
76. Ward (2003). Regarding the delivery process, the firms are
doing well on all practices except automatic identification. In
sum, the descriptive statistics suggest that firms are doing
well overall in sourcing, delivery, TPM, TQM, and HRM,
the means of which are above 4.00. But the firms are not
doing as well on supply chain planning and JIT production,
the means of which are below 4.00.
Structural equation model
We use the structural equation model method to test the
hypotheses H1–H5 about the relationships among the four
supply chain processes and the results are shown in Figure 3.
The results are summarized in Tables 3 and 4. Then we use
Sobel tests to test the two mediation effects hypothesized in
H6 and H7. The results are shown in Table 5.
Before running the structural equation model, the score
for JIT, TPQ, TQM, and HRM were calculated according to
the average of the items with related factor. Therefore, JIT,
TQM, TPM, and HRM are considered as indicators for
Make construct. A number of fit statistics were used to eval-
uate the models because no single measure was adequate
(Bollen and Long 1993). A normed chi-square below one
indicates that the model is overfitted (Joreskog 1969), while
a value larger than 3.0 (Carmines and McIver 1981) to 5.0
(Wheaton et al. 1977) indicates that a model does not ade-
quately fit the data. The normed chi-square adjusts the sam-
ple discrepancy function by the degree of freedom. Hair
et al. (1998) provide guidelines for interpreting the RMSEA
Table 4: Results of hypotheses tests
Path in the structural
model
77. Path coefficient
estimate (t-value) Outcome
Plan fi Source (H1) .46* (3.27) Supported
Plan fi Make (H2) .31* (3.35) Supported
Plan fi Deliver (H3) .44* (3.13) Supported
Source fi Make (H4) .63* (3.71) Supported
Make fi Deliver (H5) .38* (2.80) Supported
Note:
*
Significant at p < .05.
Supply Chain Integration and SCOR Model 339
as follows: RMSEA < .05, good model fit; .05 <
RMSEA < .10, reasonable model fit; RMSEA > .10, poor
model fit. Hair et al. (1998) also suggest that the model fit is
good if NNFI and CFI are above .9. Both NNFI and CFI
adjust the sample discrepancy function by the degree of free-
dom. The IFI is similar to NFI but it has a correction in the
denominator to decrease the sample size effect (Bollen 1989).
It is desirable to have IFI no less than .9. As shown in the
bottom of Table 3, the fit indices of our model were:
v2 = 267 with df = 130 (i.e., the normed chi-square is 2.06),
NNFI = .91, CFI = .93, IFI = .93, and RMSEA = .09.
All fit statistics fell in the desirable ranges and suggested that
the model had a reasonably good fit. Based on the structural
equation model, the results of the five hypotheses are shown
in Figure 3 and Table 4. According to the t-values in
Table 4, all five hypotheses were supported at the .05 signifi-
cance level. In addition to a good fit of the structural model,
78. a good structural equation model needs to have a good mea-
surement model (i.e., the path coefficients of all indicators to
the related latent variables are significant at the .05 level).
According to the SEM results, all path coefficients are signif-
icant at the .05 level and the t-values are larger than 2.0.
Mediation effect
To test the two mediation effects, the Sobel tests are used.
For each mediation test, three regressions are required. Take
the mediation effect of Source process as an example (see
Table 5). First, Plan process must have significant influence
on Make process. Second, Plan process must have significant
influence on Source process. Third, the influence of Plan pro-
cess on Make process must change significantly when Source
process is entered into the regression model. Then a Sobel
test is performed to test the significance of the mediation
effect (Venkatraman 1989).
Model 1 in Table 5 shows that the Plan process has a sig-
nificant influence on Make process. The regression coefficient
is .405, which is significant at the 5% level. Model 2 shows
that the Plan process has a significant influence on the
Source process. The coefficient is .392, which is significant at
the 5% level. Model 3 shows that the coefficient of the Plan
process on the Make process is reduced to .212 when Source
process is entered into regression together with the Plan pro-
cess. To test whether this reduction is significant, a Sobel test
is performed. The calculation of the Sobel test statistics is
shown in Table 5. The result shows that the Sobel test statis-
tic is 4.5. The p-value of this Sobel test is smaller than .05.
This means that the Source process significantly mediates the
influence of the Plan process on the Make process. Similar
regression analysis is performed for the mediation effect of
the Make process. The results are summarized in Table 5.
79. The Sobel test statistic is 3.5. The p-value of this Sobel test
is smaller than .05 as well. Thus, we conclude that the Make
process significantly mediates the influence of the Plan process
on the Deliver process.
Summary of analysis
This analysis section first provides the descriptive statistics of
all measurement items, which gives the readers an overall
picture of the data set. Using the measurement scales vali-
dated in the third section, the structural equation modeling
analysis tests the relationships among the four processes in
Plan
Source
Make
Deliver
H1: γ1=.46*
H2: γ2=.31*
H3: γ3=.44*
H4: β1=.63*
H5: β2=.38*
Note: * Indicates significance at p < .05
Figure 3: Supply Chain Operations Reference (SCOR) model
with results.
80. Table 5: Mediation test for Source and Make processes
Tests for Source process Tests for Make process
Variable Plan Source Variable Plan Make
Model 1 (dependent variable: Make) .405* (.062) Model 1
(dependent variable: Deliver) .504* (.075)
Model 2 (dependent variable: Source) .392* (.067) Model 2
(dependent variable: Make) .405* (.062)
Model 3 (dependent variable: Make) .212* (.059) .493* (.071)
Model 3 (dependent variable: Deliver) .334* (.103) .419* (.103)
Sobel test statistics is: .493 · .392 ⁄ sqrt (.4932 · .0672 + .3922 ·
.071
2
) = 4.5
Sobel test statistics is: .419 · .405 ⁄ sqrt (.4192 · .0622 + .4052 ·
.103
2
) = 3.5
Notes: The numbers within parentheses are the standard errors
of the coefficients.
*Significant at p < .05.
340 H. Zhou et al.
the SCOR model. The statistics in Tables 3 and 4 generally
support the relationships proposed in the SCOR model.
81. Finally, regression analysis is used to test the mediation role
of the Make process and the Source process in the SCOR
model.
RESULTS AND DISCUSSION
This study marks the first empirical study that tests the valid-
ity of the relationships among the supply chain processes in
the SCOR model. According to the results in Figure 3 and
Table 4, the relationships of the supply chain processes in
the SCOR model are supported as expected (Supply Chain
Council 2010). The Plan process has significant positive influ-
ence on Source, Make, and Deliver processes. Source process
has significant positive influence on Make process while
Make process has significant positive influence on Deliver
process. The strongest link is from the Source process to the
Make process while the weakest link is from the Plan process
to the Make process.
The relatively weak link from the Plan process to the
Make process reveals some issues in the SCOR model. While
the Make process in the SCOR model does include the
HRM and TPM practices, the Plan process of the SCOR
model does not cover the planning about HRM and TPM
(Supply Chain Council 2010). The Plan process primarily
focuses on sourcing, JIT production, and delivery practices.
In the future, the SCOR model might need to include the
planning activities for HRM (leadership) and TPM to keep
the SCOR model consistent with itself.
The results in Table 5 support the hypotheses that (1)
Source process mediates the influence of Plan process on
Make process, and (2) Make process mediates the influence
of Plan process on Deliver process. The significant mediation
effect suggests that an effective Source process plays a critical
role in the relationship between Plan process and Make pro-
82. cess and an effective Make process plays a critical role in the
relationship between Plan and Deliver processes. According
to Table 5, the indirect influence that Plan process has on
the Make process through the Source process is
.392 · .493 = .193 (.392 from Model 2 and .493 from Model
3). The direct influence that Plan process has on the Make
process is .212 (from Model 3). The total influence (direct
influence + indirect influence) that Plan process has on the
Make process is .193 + .212 = .405. Table 5 shows that
about 34% (1 ) .334 ⁄ .504 = .34) of the total influence that
Plan process has on the Deliver process is the indirect influ-
ence through the Make process when Make process is
entered into the regression.
To our best knowledge, this is the first study that
empirically tests the relationships among all four supply
chain processes in the SCOR model. Very few studies
(Lockamy and McCormack 2004; Huang et al. 2005) con-
ceptually discussed the SCOR model. To date, this is the
only study that has comprehensively addressed the rela-
tionships among all four supply chain processes. This
study contributes to the literature by providing a holistic
view of the supply chain management from the process
perspective and offers an integrative analysis of the supply
chain processes.
For practitioners, the findings provide rigorous empirical
evidence in support of the SCOR model. The finding gives
practitioners statistical confidence in the implementation and
use of the SCOR model. For example, this study reveals the
firms’ insufficiency in the supply chain planning practices,
although the Plan process is shown to be important for all
other three processes. This study identifies the quantitative
relationships among the four supply chain processes, which
can help firms assess their supply chain strengths and
83. weaknesses. The descriptive statistics can also help firms to
benchmark themselves with other firms.
CONCLUSION AND FUTURE RESEARCH
This study marks the first empirical effort to examine the
validity of the SCOR model. It has been shown that the rela-
tionships among the supply chain processes in the SCOR
model are generally supported. With data from 125 North
America manufacturing companies, the Plan process has sig-
nificant positive influence on the Source, Make, and Deliver
processes. The Source process has significant positive influ-
ence on the Make process and the Make process has signifi-
cant positive influence on the Deliver process. The Source
process mediates the impact of the Plan process on the Make
process and the Make process mediates the impact of the
Plan process on the Deliver process. Among the four supply
chain processes, it appears that the Plan process has received
the least attention from the firms so far, although it does
have significant influence on all the other three processes.
This study contributes to both academic literature and
practitioners. Several recent studies have addressed the issue
of supply chain integration and governance (Chen et al.
2009a,b; Richey et al. 2010). As Chen et al. (2009b) men-
tioned, the SCOR model is an illustration of the process
approach to supply chain integration. This study provides a
holistic view of supply chain integration from an empirical
survey research methodology perspective. It reveals the
quantitative relationships among the four components of the
SCOR model. Richey et al. (2010) suggested that the supply
chain governance which balances the self-interest and inter-
dependency in supply chains can help improve performance.
Through the Source and Deliver components of the SCOR
model, this study enhances our understanding of the impor-
tance of working with suppliers and customers in supply