Assessing the Vulnerability of Supply Chains: Advances from Engineering Systems
Vulnerability assessments focus on extended sets of hazards and threats, and seek to ensure that adequate resources exist to restore system functionality to a stable level within a reasonable amount of time. Multiple frameworks for vulnerability assessments in supply chains report on tools that can support this analysis. The purpose of this chapter is to inform supply chain researchers and practitioners of emerging trends and advances from engineering design that can benefit supply chain risk management, and set these in the context of a previously published methodology (Asbjørnslett 2009) for vulnerability assessment in the supply chain.
Specific advances that will be addressed include:
Epoch-era analysis for structuring event taxonomies and scenarios.
Failure mode thinking for low-frequency, high-impact (LFHI) events.
Design structure matrices and axiomatic design principles for function–form mapping in the supply chain as a tool for ensuring adequate levels of redundancy, flexibility, and identification of latent functionality.
- Asbjørnslett, B. E. (2009). Assessing the vulnerability of supply chains. In G. A. Zsidisin & B. Ritchie (Eds.), Supply chain risk—A handbook of assessment, management, and performance (pp. 15–33). New York, NY: Springer Science+Business Media.Google Scholar
- International Maritime Organization (2002). Guidelines for Formal Safety Assessment for use in the IMO rule-making process. London, UK.Google Scholar
- Kraljic, P. (1983). Purchasing must become supply management a strategy for supply. Harvard Business Review, 109–117.Google Scholar
- Merton, R. K. (1968). Social theory and social structure. New York, NY: Macmillan Publishing Co.Google Scholar
- Porter, M. E. (1979). How competitive forces shape strategy. Harvard Business Review, March–April, 137–145.Google Scholar
- Rausand, M., & Høyland, A. (2004). System reliability theory: Models, statistical methods and applications (2nd ed.). Hoboken, NJ: Wiley.Google Scholar
- Rice, J. B., Jr., & Caniato, F. (2003). Building a secure and resilient supply network. Supply Chain Management Review, 7(5), 22–30.Google Scholar
- Ross, A. M., & Rhodes, D. H. (2008). Using natural value-centric time scales for conceptualizing system timelines through epoch-era analysis. In: INCOSE International Symposium (Vol. 18, pp. 1186–1201). Utrecht, The Netherlands.Google Scholar
- Suh, N. P. (1990). The principles of design. New York, NY: Oxford University Press.Google Scholar
- Supply Chain Council. (2012). Supply chain operations reference model (11th ed.).Google Scholar