Advertisement

Assessing the Vulnerability of Supply Chains

  • Bjørn Egil Asbjørnslett
Part of the International Series in Operations Research & Management Science book series (ISOR, volume 124)

Supply chain systems are becoming increasingly lengthy and complex, reflecting the dynamic and global marketplace. Adopting a more proactive approach to dealing with new and changing risks and vulnerabilities emerging within or influencing the system may be a wise action to secure the mission of the supply chain system.

In this chapter, an approach to analysing vulnerability in a supply chain system is presented as a means to reduce risk, to become better prepared to manage the system’s vulnerabilities and to improve the system’s resilience. The analysis establishes the relationship between relevant threats and risks, and the potential scenarios and consequences that determine the vulnerability of the supply chain system. This is designed to generate a deliberate and conscious management process, seeking to establish an acceptable degree of vulnerability and risk within the supply chain system.

Keywords

Supply Chain Federal Emergency Management Agency Vulnerability Analysis Supply Chain System Stable Situation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. FEMA, US Federal Emergency Management Agency, www.fema.gov.
  2. Foster H.D. (1993) Resilience theory and system evaluation. In J.A. Wise, V.D. Hopkin and P. Stager (eds.) Verification and Validation of Complex Systems: Human Factors Issues. NATO Advances Science Institute, Serie F: Computers and System Sciences, Vol. 100, Springer, Berlin.Google Scholar
  3. Hollnagel E. (2004) Barriers and Accident Prevention. Ashgate Publishing Ltd., Aldershot.Google Scholar
  4. Hollnagel E. Woods D. and Leveson N. (eds.) (2006) Resilience Engineering. Ashgate Publishing Group.Google Scholar
  5. ICAO (2005) ICAO Safety Management Manual. Doc 9859, AN/460, 2005.Google Scholar
  6. IEC 300-3-9 (1995) Dependability management - Part 3: application guide - Section 9: risk analysis of technological systems. International Electrotechnical Commission, Geneva.Google Scholar
  7. Kaplan S. (1996) An Introduction to TRIZ The Russian Theory of Inventive Problem Solving. Ideation International Inc.Google Scholar
  8. Kaplan S. (1997) The Words of Risk Analysis. Risk Analysis, Vol. 17, No. 4, pp. 407-417. Kraljic P. (1983) Purchasing must become supply management. In Harvard Business Review, September/October, pp. 109-117.Google Scholar
  9. Meister D. (1991) Psychology of System Design. Elsevier, New York.Google Scholar
  10. Norrmann, A. and Lindroth R. (2004) Categorization of Supply Chain Risk and Risk Management. In C. Brindley (ed.), Supply Chain Risk, Ashgate Publishing Ltd., Aldershot.Google Scholar
  11. Norwegian Petroleum Directorate (1990) Regulations Concerning Implementation and Use of Risk Analyses in thePpetroleum Activities withGguidelines. Norwegian Petroleum Directorate, Stavanger, Norway.Google Scholar
  12. Perrow, C. (1984/1999) Normal Accidents: Living with High-risk Technologies. Basic Books, New York.Google Scholar
  13. Reason, J. (1990) Human Error. Cambridge University Press, Cambridge.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  • Bjørn Egil Asbjørnslett
    • 1
  1. 1.MARINTEK SolutionsNorway

Personalised recommendations