IJPDLM
35,4 Drivers of supply chain
vulnerability: an integrated
framework
210
Helen Peck
The Resilience Centre, Cranfield University, Cranfield, UK, and
Received August 2003
Revised December 2004 The Royal Military College of Science, Shrivenham, UK
Accepted February 2005
Abstract
Purpose This paper aims to report on findings of a cross-sector empirical study of the sources and
drivers of supply chain vulnerability.
Design/methodology/approach The research was undertaken in accordance with the realist
tradition. It begins with a descriptive exploratory stage involving an in-depth exploratory case study
of aerospace industry supply chains, validated through in-depth interviews with managers
representing other critical sectors of the UK economy. This is followed by an explanatory theoretical
stage. The work is supported throughout with reference to relevant literature sources.
Findings The findings highlight the absence of any widespread understanding of the scope of and
dynamic nature of the problem, which should be considered from multiple perspectives and at four
levels of analysis: value stream/product or process; asset and infrastructure dependencies;
organisations and inter-organisational networks; and social and natural environment.
Research limitations/implications The paper is normative rather than positive, so focuses on
understanding why supply chains are vulnerable to disruption, rather than presenting itself as a
prescription for management. The paper does not investigate academic definitions or existing
taxonomies of risk.
Practical implications The work provides some useful insights for practising managers and
policy makers.
Originality/value The paper reports on empirical research, then draws as appropriate on network
theory and complex systems perspectives to produce a conceptual model of a supply chain as in
interactive adaptive system.
Keywords Supply chain management, Risk management, United Kingdom
Paper type Research paper
Introduction
Supply chain vulnerability is a relatively new and unexplored area of management
research, though one that is in the ascendancy (Svensson, 2002). In the UK, the economic
impact of fuel protests in 2000, followed by the outbreak of Foot and Mouth Disease
early the following year, focused the minds of policy makers on the need to understand
more about the vulnerability of commercial supply chains. As a result, the UK
Government commissioned a programme of research, sponsored by the Department for
International Journal of Physical Transport to investigate the phenomena. The ultimate aim of the research is to provide
Distribution & Logistics Management the insight by which to improve the resilience of the nations supply chain networks.
Vol. 35 No. 4, 2005
pp. 210-232 This paper draws on the findings of a significant portion of the work.
q Emerald Group Publishing Limited
0960-0035
The term supply chain can be interpreted in many ways, but is defined here in its
DOI 10.1108/09600030510599904 broadest sense, as the network of organisations that are involved, through upstream
and downstream linkages, in the different processes and activities that produce value Drivers of
in the form of products and services in the hands of the ultimate consumer supply chain
(Christopher, 1998). The work involves an exploratory, empirically grounded, study of
supply chain risk and resilience, so common usage dictionary-based definitions were vulnerability
adopted for other key terms. Academic definitions of risk and resilience were
purposefully avoided because grounded research of this sort necessarily begins with
lay definitions before moving to technical descriptions (Blaikie, 1993). The term risk 211
is therefore used here in the sense that something a product, process, organisation
etc. is at risk i.e. vulnerable; likely to be lost or damaged (Collins English
Dictionary, 2000). Resilience is defined as the ability of a system to return to its
original [or desired] state after being disturbed. The definition is rooted in ecology (the
study of the relationships between living organisms and their environment) and was
adopted because it sits comfortably with the view of supply chains as interacting
networks. The notion of flexibility is inherent in the definition and, given that the
desired state may be different from the original, adaptability is also implied.
Methodology
The research presented here was undertaken in accordance with the realist tradition
(Bhasker, 1979; Blaikie, 1993), beginning with a descriptive exploratory stage using
empirical data. This is followed by an explanatory theoretical stage involving the
construction of hypothetical models, to produce a rational explanation of the patterns
found in the empirical study. Further research is then advised to check critically what
is thought to be known. The intertwined literature review presented in this paper
represents part of this latter phase.
The core of the research was an in-depth exploratory case study of commercial
supply chains engaged in the manufacture and assembly of high performance military
aircraft (Haywood, 2002). The case method was used because it is recommended for
studies of contemporary phenomena in real-life contexts (Yin, 1989), and in particular
for exploratory research into industrial networks (Easton, 1995).
The context for the case procurement and production of military aircraft
represents an extreme risk environment, with national security as well as commercial
sensitivities, which pre-9/11 had been inaccessible to the research team. It is a
commercial environment characterised by extreme levels of technological, financial,
product safety and political risk. As such it met the criteria set by Yin for a single case
study i.e. it represented a unique, extreme or revelatory situation.
Few grounded studies of supply chain risk/vulnerability have been published to
date. Those that have tend to follow the design of more general supply chain
management research, constraining the scope of the problem by adopting either a
vertical or horizontal design. Horizontal studies usually examine a given issue either
within the bounds of a single firm or between a focal firm and adjacent organisations.
These would typically survey perceptions of supply chain related risk in an
organisations purchasing department or its first tier supplier base (e.g. Svensson,
2000, 2001, 2002). In contrast, vertical studies (e.g. Harland and Brenchley, 2001) are
likely to involve the mapping and analysis of one or more representative product
lines or value streams through a series of consecutive activities and/or organisations.
While both approaches have yielded useful insights, it was felt that there was a danger
that designs of this sort may reduce the scope of the research to the point where the
IJPDLM very phenomena that could be undermining resilience may be excluded. Consequently
35,4 this research used a design that was both horizontal and vertical in scope.
To guide the researcher and ensure the reliability of the research and its viability
as the basis for further work careful consideration was given to data collection
methods and handling procedures (see case study protocol in the Appendix, Figure A1).
Data collection involved semi-structured interviews with 47 managers, representing
212 five tiers of the network involved in the production of four distinct aircraft types.
Interviewees were selected using snowball sampling (Jankowicz, 1995). The managers
concerned performed a range of supply chain management related roles, as shown in
Table I. They were drawn from across the aircraft programs (product lines/families) of
the prime contractor (the assembler), its first- and second-tier suppliers, industry
associations including one representing small and medium sized enterprises and
customers in the UK Ministry of Defence.
Among the issues each manager was invited to discuss was: What are the sources
or consequences of risks affecting your supply chain?. Owing to commercial
sensitivities, interviews were conducted on a one-to-one basis with assurances given to
informants that their anonymity would be protected. Where possible the interviews
were supplemented by archival evidence and published sources. The conversations
were recorded with the interviewees permission. The tapes were later transcribed and
summarised for analysis using thematic coding. In many instances verbatim quotes
were retained to preserve their richness and meaning. The results of subsequent
analysis were validated through a return to the literature, academic peer and
practitioner reviews[1]. To ascertain whether the findings were transferable to other
contexts (Lincoln and Guba, 1985) or simply industry-specific, two-hour long
interviews were conducted with 27 senior supply chain managers. The interviewees
were drawn from leading companies or public sector agencies with manufacturing,
distribution or retailing expertise in critical sectors of the UK economy (see Table II).
The findings of this latter phase of the research provided the impetus for the
development of a multi-level framework, which allows managers and policy makers to
break out the issues of supply chain vulnerability in a relatively simple and structured
way. Given the desire to produce grounded research, an extensive literature review
followed rather than preceded the development of the framework. It draws on the
supply chain management literature and as Stock (1997) suggests, appropriate work
from related disciplines.
The usefulness and relevance of the framework has since been validated through focus
group discussions and workshops involving groups of practitioners drawn from the
defence industry, the armed forces, cross-sector commercial industry associations,
national emergency planning committees, and international humanitarian relief agencies.
The network relationship risks get worse where supplier loyalty is divided. For example,
were buying a piece of equipment from a major US organisation and we are actually a very
small part of that particular area of business they have some pretty big US aerospace
customers as well you see. Its clear that theyre not very interested in the relationship and
consequently were having issues with kit in the field. Theyre not investing in the software
changes that need to be done and when they do make software changes it encompasses lots of
other customers changes as well, which has a knock on effect on how the kit works on the
aircraft (Customer, UK Ministry of Defence).
Second, interviewees frequently described how efforts to improve performance against
one measure (e.g. cost or quality) often inadvertently reduced performance and
increased risk associated with one or more of the others (e.g. schedule adherence or
relationship management):
An aero engine manufacturer had a requirement for repair work to a very old engine. This
material had to conform to their quality approvals, as did the original melt source. We had to
buy 20,000 of raw material, the minimum order quantity for the mill, just so the company
could have 100 components from us. In the end we made 500 for them, but it took four to six
months to do it all. Although there was something similar in use by another aero engine
manufacturer, they werent completely sure it would be right and they couldnt take the risk.
So paying the 20,000 became cheaper than doing the research into the compatibility of this
alternative source (Tier 2 supplier).
The collective impact of all these factors irregular demand patterns, measures
introduced to reduce costs, changes and upgrades to product specifications, customer
determined network reconfigurations meant that even the supply chains for
established products were characterised by high levels of uncertainty and constant
change[2].
Findings from cross-sector validation Drivers of
Managers from the other sectors studied were invited to consider the same questions supply chain
regarding the vulnerabilities and sources (or drivers) of risk affecting their own supply
chains. These interviewees readily offered opinions on when and why their supply vulnerability
chains (as they understood them) were most vulnerable. They also highlighted
problems of conflicting performance measures. For example:
215
There is no common language other than cost . . . I see evidence of this at least once a week,
particularly with material brought in from the Far East. Purchasers go for the lower unit
costs, which usually mean bigger order quantities, longer lead times, lower responsiveness
and worse customer service (Automotive parts manufacturer and 4th party logistics
company).
The practitioners also confirmed that higher-level strategic choices and many of the
other extraneous factors previously identified by aerospace managers were present
within their own sectors. With the exception of one industry (oil refining), interviewees
reported that their own supply chains were longer than ever before. All were becoming
leaner.
Furthermore, managers from each sector echoed the beliefs of their aerospace
industry counterparts, who claimed that their supply chains never reached a balanced
stable steady state, where mature products and information flowed through
optimised channels, supported by reliable systems, allowing inputs to be balanced with
demand:
Issues of supply chain maturity are poorly understood. The supply chains we support rarely
get the chance to mature into a mid-lifecycle steady state . . . 15 years after the [food
retailers] last network reorganisation, suppliers are still shaking out problems and dealing
with the successive shock waves (Transport and 4th party logistics company).
Changes in product specifications, continuous improvement initiatives, outsourcing,
internal network redesigns, IT upgrades, changing process technology, supplier
rationalisations and industry consolidations all contributed to the uncertainty of
operations:
Its when the supply chain is supposed to be in the established steady state that it is most
vulnerable, because thats the point when its most susceptible to external effects. Thats
when most people are trying to optimise and reduce control limits to reduce the variability of
the process, but external risks may have changed the original scenario...The model of supply
chain management in academia is one that we need to get away from, we need to think about
fuzzy limited time interlocking networks (Consultant, electronics manufacturing).
Ongoing regulatory changes and the practicalities of managing across different legal,
cultural and environmental settings made supply chain management a far more
complex set of activities than some felt was recognised elsewhere within their own
organisations[3]. The complexity of the task also left managers struggling to find
appropriate ways to tackle supply chain risk management:
We know supply chain vulnerability is important, we know that, but its such an amorphous
mass that we dont know how to break it down . . . we have to break it down so we can start to
deal with it (Manager, food and personal care products manufacturer).
IJPDLM The remaining sections of this paper address the problem of breaking down supply
35,4 chain risk into its constituent parts, without losing the contextual dynamic of cause
and effect.
Figure 1.
An integrated model of a
supply chain as an
adaptive system
Each is discussed here with reference to relevant sources in the supply chain Drivers of
management literature. supply chain
Level 1 value stream/product or process
vulnerability
At level 1 supply chain vulnerability is examined from the prevailing process
engineering-based supply chain management perspective. It is a view that is in keeping
with lean manufacturing and demand-driven logistics concepts. The approach 219
aspires to a perfect flow of information and materials facilitated by all supply chain
partners thinking and acting as one (Geary et al., 2002). Supply chains are therefore
seen in terms of the contents of a logistics pipeline flowing through and between
organisations in the network. The emphasis is on the efficient, value-based, design and
management of processes relating to workflows and their accompanying information
(usually by product or product class). Supply chains carry one or more of these value
streams (Childerhouse and Towill, 2003).
Risks are principally the financial or commercial consequences of inefficiencies or
sub-optimal supply chain performance, including the inability to react swiftly to
volatility in demand and the changing needs of the market place. Christopher and Lee
(2001) refer to the latter as market risk i.e. the risk of inertia. The agile paradigm,
with its roots in short-life cycle products has explicitly sought to address market risk
(Christopher and Towill, 2001).
The availability of credible and reliable information is central to this process
management perspective and is in turn dependent on the willingness of the parties to
share demand and process monitoring data. It is widely acknowledged that this
requires a high level of trust and cooperation between adjacent organisations; itself
evidence of a heightened sense of shared enterprise and shared risk.
Geary et al.s (2002) analogy of a supply chain as a perfect seamless logistics
pipeline represents the supply chain process management ideal. It is a useful
metaphor, but in the context of supply chain vulnerability it can be a deceptively
seductive one. It reinforces the notion of simplicity by promoting the vision of a stable,
controllable, linear, self-transporting flow, hermetically sealed from disruptive
environmental forces. In reality supply chains are rarely fixed, discrete,
self-propelling or self-protecting. Moreover, the adoption of lean and agile practices
(particularly JIT delivery) has made them increasingly reliant on the existence of a
reliable, secure and efficient communication, transport and distribution infrastructure.
Level 2 represents supply chains in terms of these asset and infrastructure
dependencies.
Notes
1. For additional examples of verbatim extracts from the interviews, along with further details
of the case methodology, including interviewee profiles, processes employed for data
collection, analysis and validation see Haywood (2002).
2. For further details and discussion of the issue of constant change in the aerospace networks
see Haywood (2002); or Haywood and Peck (2003)
3. Detailed summaries of the findings from each of the critical sectors, including examples of
supply chain failures are presented in Peck et al. (2003).
References
Aichlmayr, M. (2002), Mission critical: closing security gaps, Transportation and Distribution,
May, pp. 28-32.
Allen, P. (1997), Cities and Regions as Self-organizing Systems: Models of Complexity, Gordon &
Breach, London.
Anderson, D.L. and Delattre, A.J. (2002), Five predictions that will make you rethink your
supply chain, Supply Chain Management Review, September/October, pp. 25-30.
Arthur, W.B., Durlauf, S.N. and Lane, D. (1997), The Economy as an Evolving Complex System II,
Addison-Wesley, Reading, MA.
Axelsson, B. and Easton, G. (Eds) (1992), Industrial Networks: A New View of Reality, Gower,
London.
Bhasker, R. (1979), The Possibility of Naturalism, Harvester Press, Brighton.
Blaikie, N. (1993), Approaches to Social Enquiry, Polity Press, Cambridge.
Braithwaite, A. and Hall, D. (1999), Risky business? Critical decisions in supply chain
management: part 1, Supply Chain Practice, Vol. 1 No. 2, pp. 40-57.
Burtonshaw-Gunn, S.A. (2002), Examining risk and supply chain collaborative working in the
UK construction industry, Proceedings of 2nd International Research Seminar on Risk
and the Supply Chain, Lund Institute of Technology, Lund, 14-16 October.
Byrne, J.A., Brandt, R. and Port, O. (1993), The virtual corporation, Business Week, 8 February,
pp. 36-40.
Chartered Institute of Management (2002), Business continuity and supply chain management,
available at: www.inst-mgt.org.uk
Checkland, P. (1994), Systems theory and management thinking, American Behavioral
Scientist, Vol. 38 No. 1, September, pp. 75-91.
Childerhouse, P. and Towill, D.R. (2003), Simplified material flow holds the key to supply chain
integration, Omega, Vol. 31 No. 1, pp. 17-27.
Christopher, M. (1998), Logistics and Supply Chain Management, Pitman Publishing, London. Drivers of
Christopher, M. and Lee, H.L. (2001), Supply chain confidence: the key to effective supply chains supply chain
through improved visibility and reliability, Global Trade Management.
Christopher, M. and Towill, D.R. (2001), An integrated model for the design of agile supply
vulnerability
chains, International Journal of Physical Distribution & Logistics Management, Vol. 31
No. 4, pp. 235-46.
Christopher, M. et al. (2002), Supply Chain Vulnerability, final report on behalf of DTLR, DTi and 227
Home Office, Cranfield University, Cranfield.
Collins English Dictionary (2000), HarperCollins, Glasgow.
Cook, N. (2001), Lower-tier suppliers in the front line, Interavia, Vol. 56 No. 658, November,
pp. 21-2.
Demchak, C. (1996), Tailored precision armies in fully networked battlespace: high reliability
organizational dilemmas in the information age, Journal of Contingencies and Crisis
Management, Vol. 4 No. 2, pp. 93-103.
Easton, G. (1995), Case research as a methodology for industrial networks: a realist approach,
Interaction, Relationships and Networks: Proceedings of the 11th International Conference
of the IMP Group, Vol. 1, 7-9 September, pp. 369-88.
Geary, S., Childerhouse, P. and Towill, D. (2002), Uncertainty and the seamless supply chain,
Supply Chain Management Review, July/August, pp. 52-61.
George, M.L. (2002), Lean Six Sigma: Combining Six Sigma Quality with Lean Production Speed,
McGraw-Hill, New York, NY.
Hakansson, H. and Snehota, I. (1989), No business is an island: the network concept of business
strategy, Scandinavian Journal of Management, Vol. 5 No. 3, pp. 187-200.
Harland, C. and Brenchley, R. (2001), Risk in supply networks, Proceedings of the 8th
International Conference of the European Operations Management Association, Vol. 1,
Bath, pp. 306-7.
Harrington, L.H. (2003), Welcome to the front line, Transportation and Distribution, January,
p. 4.
Haywood, M. (2002), An investigation into supply chain vulnerability management within UK
aerospace manufacturing supply chains, MSc thesis, Cranfield Centre for Logistics and
Supply Chain Management, Cranfield University, Cranfield.
Haywood, M. and Peck, H. (2003), An investigation into the management of supply chain
vulnerability in UK aerospace manufacturing, Proceedings of the EUROMA/POMS
Conference, Vol. 2, Cernobbio, Lake Como, 16-18 June, pp. 121-30.
Helferich, O.K. and Cook, R.L. (2002), Securing the Supply Chain, Council of Logistics
Management, Oak Brook, IL.
Houghton, T., Markham, B. and Tevelson, B. (2003), Thinking strategically about supply
management, Supply Chain Management Review, September/October, pp. 32-8.
Jankowicz, A.D. (1995), Business Research Projects, 2nd ed., Chapman & Hall, London.
Juttner, U., Peck, H. and Christopher, M. (2003), Supply chain risk management: outlining an
agenda for future research, International Journal of Logistics: Research and Applications,
Vol. 6 No. 4, pp. 199-213.
Latour, A. (2001), Was SISU the difference?, Wall Street Journal, 29 January.
Lincoln, Y.S. and Guba, E. (1985), Naturalistic Inquiry, Sage, Beverly Hills, CA.
Lonsdale, C. (2001), Locked-in to supplier dominance: on the dangers of asset specificity for the
outsourcing decision, Journal of Supply Chain Management, Vol. 7 No. 2, Spring, pp. 22-7.
IJPDLM McGillivray, G. (2000), Commercial risk under JIT, Canadian Underwriter, Vol. 67 No. 1,
January, pp. 26-30.
35,4
McKinnon, A. (2004), Life without Lorries: The Impact of a Temporary Disruption of Road
Freight Transport in the UK, report prepared for Commercial Motors, Logistics Research
Centre, Heriot-Watt University, Edinburgh.
Miles, R. and Snow, C. (1986), Organizations: new concepts for new forms, California
228 Management Review, Vol. 28 No. 3, pp. 62-73.
Moller, K. and Halinen, A. (1999), Business relationships and networks: managerial challenge of
network era, Industrial Marketing Management, Vol. 28 No. 5, pp. 413-27.
Morel, B. and Ramanujam, R. (1999), Through the looking-glass of complexity: the dynamics of
organizations as adaptive and evolving systems, Organization Science, Vol. 10 No. 3,
May-June, pp. 278-93.
Naim, M.N., Holweg, M. and Towill, D. (2003), On systems thinking, engineering and dynamics
their influence on modern logistics management, Logistics and Networked Organisations:
Proceedings of the 8th International Symposium on Logistics, University of Sevilla, Sevilla,
6-8 July, pp. 549-64.
New, S. (2003), There may be troubles, Supply Management, 2 January, pp. 16-19.
Peck, H. and Juttner, U. (2002), Risk management in the supply chain, Logistics and Transport
Focus, Vol. 4 No. 11, December, pp. 17-22.
Peck, H., Christopher, M., Rutherford, C., Abley, J. and Saw, R. (2003), Supply Chain Resilience,
final report on behalf of the Department for Transport, Cranfield University, Cranfield.
Rittel, H.W. and Webber, M.M. (1973), Dilemmas in a general theory of planning, Policy
Sciences, Vol. 4 No. 2, pp. 155-69.
Robinson, C.P., Woodard, J.B. and Varnado, S.G. (1998), Critical infrastructure: interlinked and
vulnerable, Issues in Science and Technology Online, No. Fall.
Sheffi, Y. (2001), Supply chain management under threat of international terrorism,
International Journal of Logistics Management, Vol. 12 No. 2, pp. 1-11.
Simons, R. (1999), How risky is your company?, Harvard Business Review, Vol. 77 No. 3,
pp. 85-94.
Starr, R., Newfrock, J. and Delurey, M. (2003), Enterprise resilience: managing risk in the
networked economy, Strategy and Business, Vol. 30.
Stock, J.R. (1997), Applying theories from other disciplines to logistics, International Journal of
Physical Distribution & Logistics Management, Vol. 37 No. 9/10, pp. 515-39.
Svensson, G. (2000), A conceptual framework for the analysis of vulnerability in supply chains,
International Journal of Physical Distribution & Logistics Management, Vol. 30 No. 9,
pp. 731-49.
Svensson, G. (2001), A conceptual framework of vulnerability in firms inbound and outbound
logistics flows, International Journal of Physical Distribution & Logistics Management,
Vol. 32 No. 2, pp. 110-34.
Svensson, G. (2002), Vulnerability scenarios in marketing channels, Supply Chain
Management: An International Journal, Vol. 7 No. 5, pp. 322-33.
Thorelli, H.B. (1986), Networks: between markets and hierarchies, Strategic Management
Journal, Vol. 7 No. 1, pp. 27-31.
Towill, D.R. (1999), Simplicity wins: 12 rules for designing effective supply chains, Control,
Vol. 25 No. 2, pp. 9-13.
von Bertalanffy, L. (1973), General Systems Theory Foundations, Development, Applications, Drivers of
Penguin Books, Harmondsworth.
(The) White House (1998), Presidential Decision Directive/NDC-63 Subject: Critical Infrastructure
supply chain
Directive, The White House, Washington, DC, 22 May. vulnerability
Williamson, O.E. (1985), The Economic Institutions of Capitalism: Firms, Markets, Relational
Contracting, The Free Press, New York, NY.
Yin, R.K. (1989), Case Study Research, Sage, Beverly Hills, CA. 229
Zsidisin, G.A. (2003), Managerial perceptions of risk, Journal of Supply Chain Management,
Vol. 39 No. 1, pp. 14-25.
Further reading
Fink, A. (1998), Conducting Research Literature Reviews, Sage, Thousand Oaks, CA.
Iansiti, M. and Levien, R. (2004), Strategy as ecology, Harvard Business Review, March,
pp. 69-78.
Lee, H.L. and Wolfe, M. (2003), Supply chain security without tears, Supply Chain Management
Review, January/February, pp. 12-20.
Martha, J. and Subbakrishna, S. (2002), Targeting a just-in-case supply chain for the inevitable
next disaster, Supply Chain Management Review, September/October, pp. 18-24.
230
Figure A1.
Drivers of
supply chain
vulnerability
231
Figure A1.
IJPDLM
35,4
232
Figure A1.