Supply Chain Security: A Dynamic Capabilities Approach
Throughout history, human civilizations have been afflicted by and have responded to large-scale destructive events, impacting both the individuals living within them and the overall social environment. Earlier occurrences such as the repeated pandemics of the bubonic plague, the eruption of Mount Vesuvius, the Irish potato famine, and the 1777 Lisbon Earthquake each dramatically impacted the way civilizations formed, grew, lived, and interacted. Despite the temporally increasing efforts of humans to prepare for such disasters, and although many of the most prominent and well known disasters affecting human societies occurred long ago, large scale catastrophes have remained to some extent a constant, impacting cultures around the world throughout history and up to the present day (Quinn 2003).
This chapter presents a framework documenting business continuity planning capabilities that are thought to engender firm-level benefits. The context is that of supply chain management. Thus, in this chapter, we seek to address the following question: What categories or types of capability development should businesses focus on in seeking to secure their supply chains, and thereby ensure continuity of operations?In order to answer this question, we first introduce the concepts surrounding the focal context – those of supply chain security and supply chain security management, and the development of firm-level capabilities. Then, a conceptual framework is introduced that integrates the technology, processes, and human resources needed to develop supply chain security management capabilities, and thereby support business continuity planning in future business operations.
KeywordsSupply Chain Dynamic Capability Total Quality Management Security Management Security Breach
Unable to display preview. Download preview PDF.
- Autry, C.W. and Bobbitt, L.M. (2007). Supply Chain Security Orientation: Conceptual Development and a Proposed Framework. Working paper.Google Scholar
- Closs, D.J. and McGarrell, E.F. (2004). Enhancing Security Throughout the Supply Chain, Special Report to the IBM Center for the Business of Government, Washington, DC.Google Scholar
- Elkin, D., Handfield, R.B., Blackhurst, J. and Christopher, W.C. (2005). Ways to Guard Against Disruption, Supply Chain Management Review 9: 46-53.Google Scholar
- Feitzinger, E. and Lee, H.L. (1997). Mass Customization at Hewlett-Packard: The Power of Postponement, Harvard Business Review 75: 116-121.Google Scholar
- Helferich, O.K. and Cook, R.L. (2002). Securing the Supply Chain, Council of Logistics Management: Oak Brook, IL.Google Scholar
- Lee, H.L. (2002). Intelligent Demand-Based Management, International Commerce Review: ECR Journal 2: 61-73.Google Scholar
- Lee, H.L. and Wolfe, M. (2003). Supply Chain Security Without Tears, Supply Chain Management Review 7: 12-20.Google Scholar
- Martha, J. and Subbakrishna S. (2002). Targeting a Just-in-Case Supply Chain for the Inevitable Next Disaster, Supply Chain Management Review 6: 56-66.Google Scholar
- Penrose, E.T. (1959). The Theory of the Growth of the Firm, Oxford University Press: UK.Google Scholar
- Porter, M.A. (1979). How Competitive Forces Shape Strategy, Harvard Business School Press: Cambridge, MA.Google Scholar
- Quinn, F.J. (2003). Security Matters, Supply Chain Management Review 7: 38-45.Google Scholar
- Sanders, N.R. (2006). Getting the Best Forecast by Combining Judgmental and Statistical Methods. APICS Magazine 3/6: 29-32.Google Scholar
- Sheffi, Y. (2005). The Resilient Enterprise, MIT Press: Cambridge, MA.Google Scholar
- US Dept. of Transportation (2002). Technology to Enhance Freight Transportation Security and Productivity. U.S. DOT FHWA (http://www.ops.fhwa.dot.gov/freight/transportation_ security.htm).
- Zsidisin, G.A., Ragatz, G.L. and Melnyk, S.A. (2005). The Dark Side of Supply Chain Management, Supply Chain Management Review 9: 46-52.Google Scholar