Contemporary Business Studies - Academy of Knowledge Process ...

Contemporary Business Studies - Academy of Knowledge Process ... Contemporary Business Studies - Academy of Knowledge Process ...

akpinsight.ijcbs.webs.com
from akpinsight.ijcbs.webs.com More from this publisher
30.12.2014 Views

International Journal of Contemporary Business Studies Vol: 3, No: 1. January, 2012 ISSN 2156-7506 Available online at http://www.akpinsight.webs.com As mentioned previously, Suppliers 1 and 5 exhibited the smallest potential percentage increase in VAR during the sensitivity analysis. However, Supplier 4 displays the largest potential decrease and increase in VAR. Thus, after considering the supplier’s operational and external risk factors, the company may consider the development of an aggressive supply chain risk management program that helps move Supplier 4 towards the accomplishment of these reductions. The program would also reduce the potential for Supplier 4 to incur a network risk event that has a high probability of VAR impact. Possible incentives that the company could offer the supplier are incremental increases in business based upon documented improvements in its network risk profile. As in the cases of Suppliers 1 and 2, this supplier has a high probability (82 percent) of experiencing a delivery problem risk event. Immediate actions should be taken to minimize the effects of such an event on company revenues. Moreover, given the high probability of delivery problems associated with all of the study participants, the company should institute a comprehensive supply chain risk management program designed to discover and eliminate the causes of this issue among its suppliers. 7. CONCLUSIONS The methodology presented in this study can be used to monitor network risks in supply chain networks. As part of a supply chain governance agreement, suppliers could be required to periodically update their risk probability profiles for the risk events outlined in Appendix 1. These updates could be applied to Bayesian networks to create new risk profiles for each supplier. Adjustments to existing risk management strategies, policies, and tactics could then be made to reflect the current risk realities associated with the supply network. Thus, the methodology can provide a proactive means of managing network risks as well as other categories of supply chain risks. The methodology can also be used by organizations to develop supplier network risk profiles to determine revenue risk exposure levels. Organizations can then decide if it is in their best interest to either assist a supplier in improving its network risk profile or to terminate the relationship. Supplier network risk profiles can be used to determine those network risk events that have the highest probability of occurrence and the largest potential revenue impact. Thus, this methodology can assist organizations along with their suppliers in developing comprehensive supplier risk management programs designed to minimize the occurrence of network and other risk events. Finally, this methodology can be used as a tool to assist managers in evaluating current and potential suppliers. Suppliers who have been shown to improve their network risk profiles over time may be rewarded by an organization with more business. Conversely, suppliers who have experienced increases in network risk events over an extended period of time may be viewed as ‘at risk’ suppliers whose relationship may require reassessment by the organization. The reassessment could result in removal from the supply network. Potential suppliers willing to provide information for the generation of their risk profiles may then become viable candidates for network inclusion. 8. LIMITATIONS This study provides an examination of network risk profiles associated with casting suppliers in the automotive industry. Therefore, the results are specific to the study participants. A potential limitation to the use of the methodology presented in this study is the ability to acquire the necessary data from suppliers needed for the construction of the Bayesian networks. There may be circumstances in which some participants within a supply chain network are reluctant to share risk profile data with their customers. The reluctance to share such information may be due to mistrust among network members. Inaccurate or misleading information acquired from suppliers may also limit the effectiveness of Bayesian networks as a tool for monitoring network risks in supply chains. Such information can result in the creation of flawed profiles that fail to reflect the true risk associated with a particular supplier. Moreover, 16 Copyright © 2012. Academy of Knowledge Process

International Journal of Contemporary Business Studies Vol: 3, No: 1. January, 2012 ISSN 2156-7506 Available online at http://www.akpinsight.webs.com suppliers must be willing to periodically update this data in order to construct risk profiles that are current, valid, and reliable. A limitation of the use of Bayesian networks to model supply chain risks is the proper identification of risk events and risk categories that can affect a supply chain. Because there are a number of approaches available for categorizing supply chain risks, the inability to incorporate all relevant risks into the model could limit its effectiveness in representing a supplier’s true risk profile. Therefore, the data used in the construction of Bayesian networks must represent the supplier’s current risk realities within the supply chain network. 9. FUTURE RESEARCH Research studies that explore the risk profiles of suppliers and supply networks in other industries should be examined using Bayesian networks to determine if industry dynamics significantly influence supply chain risks. Future researchers may also investigate how network risks can be lessened by reducing the level of network risk events associated with individual or groups of suppliers. For example, it may be possible to determine the maximum risk levels for these variables in order for a supplier or supplier group to maintain its affiliation with the supply chain. Finally, given the number of supply chain disruptions due to natural disasters in recent years, future researchers may choose to solely focus on the impact of external risks on supply networks. REFERENCES Abell, D. (1999). Competing today while preparing for tomorrow. MIT Sloan Management Review, 40(3), 73-81. Chen, L., & Kang, F. (2007). Integrated vendor-buyer cooperative inventory models with variant permissible delay in payments. European Journal of Operational Research, 183(2), 658-673. Chen, M., Yusen Xia, Y., & Wang, X. (2010). Managing supply uncertainties through Bayesian information update. IEEE Transactions on Automation Science & Engineering, 7(1), 24-36. Christopher, M. (1998). Logistics & Supply Chain Management: Strategies for Reducing Cost Improving Services (2nd edition). New York, NY: Financial Time Prentice-Hall. and Chopra, S. & Sodhi, M. S. (2004). Managing risk to avoid supply-chain breakdown. Sloan Management Review, 46(1), 53-61. Cooper, M., Lambert, D. & Pagh, J. (1997). Supply chain management: more than a new name for logistics. The International Journal of Logistics Management, 8(1), 1-14. Cowell, R. G., Verrall, R. J., & Yoon, Y. K. (2007). Modeling operational risk with Bayesian networks. Journal of Risk and Insurance, 74(4), 795-827. Croxton, K., Lambert, D., Garcia-Dastugue, S., & Rogers, D. (2002). The demand management process. International Journal of Logistics Management, 13(2), 51-66. Cucchiella, F. & Gastaldi, M. (2006). Risk management in supply chain: a real option approach. Journal of Manufacturing Technology Management, 17(6), 700-720. Dagum, P. & Luby, M. (1993). Approximating probabilistic inference in Bayesian belief networks is NP-hard. Artificial Intelligence, 60(1), 141-153. 17 Copyright © 2012. Academy of Knowledge Process

International Journal <strong>of</strong> <strong>Contemporary</strong> <strong>Business</strong> <strong>Studies</strong><br />

Vol: 3, No: 1. January, 2012 ISSN 2156-7506<br />

Available online at http://www.akpinsight.webs.com<br />

As mentioned previously, Suppliers 1 and 5 exhibited the smallest potential percentage increase in VAR<br />

during the sensitivity analysis. However, Supplier 4 displays the largest potential decrease and increase in<br />

VAR. Thus, after considering the supplier’s operational and external risk factors, the company may<br />

consider the development <strong>of</strong> an aggressive supply chain risk management program that helps move<br />

Supplier 4 towards the accomplishment <strong>of</strong> these reductions. The program would also reduce the potential<br />

for Supplier 4 to incur a network risk event that has a high probability <strong>of</strong> VAR impact. Possible<br />

incentives that the company could <strong>of</strong>fer the supplier are incremental increases in business based upon<br />

documented improvements in its network risk pr<strong>of</strong>ile. As in the cases <strong>of</strong> Suppliers 1 and 2, this supplier<br />

has a high probability (82 percent) <strong>of</strong> experiencing a delivery problem risk event. Immediate actions<br />

should be taken to minimize the effects <strong>of</strong> such an event on company revenues. Moreover, given the high<br />

probability <strong>of</strong> delivery problems associated with all <strong>of</strong> the study participants, the company should institute<br />

a comprehensive supply chain risk management program designed to discover and eliminate the causes <strong>of</strong><br />

this issue among its suppliers.<br />

7. CONCLUSIONS<br />

The methodology presented in this study can be used to monitor network risks in supply chain networks.<br />

As part <strong>of</strong> a supply chain governance agreement, suppliers could be required to periodically update their<br />

risk probability pr<strong>of</strong>iles for the risk events outlined in Appendix 1. These updates could be applied to<br />

Bayesian networks to create new risk pr<strong>of</strong>iles for each supplier. Adjustments to existing risk management<br />

strategies, policies, and tactics could then be made to reflect the current risk realities associated with the<br />

supply network. Thus, the methodology can provide a proactive means <strong>of</strong> managing network risks as well<br />

as other categories <strong>of</strong> supply chain risks.<br />

The methodology can also be used by organizations to develop supplier network risk pr<strong>of</strong>iles to determine<br />

revenue risk exposure levels. Organizations can then decide if it is in their best interest to either assist a<br />

supplier in improving its network risk pr<strong>of</strong>ile or to terminate the relationship. Supplier network risk<br />

pr<strong>of</strong>iles can be used to determine those network risk events that have the highest probability <strong>of</strong> occurrence<br />

and the largest potential revenue impact. Thus, this methodology can assist organizations along with their<br />

suppliers in developing comprehensive supplier risk management programs designed to minimize the<br />

occurrence <strong>of</strong> network and other risk events.<br />

Finally, this methodology can be used as a tool to assist managers in evaluating current and potential<br />

suppliers. Suppliers who have been shown to improve their network risk pr<strong>of</strong>iles over time may be<br />

rewarded by an organization with more business. Conversely, suppliers who have experienced increases<br />

in network risk events over an extended period <strong>of</strong> time may be viewed as ‘at risk’ suppliers whose<br />

relationship may require reassessment by the organization. The reassessment could result in removal from<br />

the supply network. Potential suppliers willing to provide information for the generation <strong>of</strong> their risk<br />

pr<strong>of</strong>iles may then become viable candidates for network inclusion.<br />

8. LIMITATIONS<br />

This study provides an examination <strong>of</strong> network risk pr<strong>of</strong>iles associated with casting suppliers in the<br />

automotive industry. Therefore, the results are specific to the study participants. A potential limitation to<br />

the use <strong>of</strong> the methodology presented in this study is the ability to acquire the necessary data from<br />

suppliers needed for the construction <strong>of</strong> the Bayesian networks. There may be circumstances in which<br />

some participants within a supply chain network are reluctant to share risk pr<strong>of</strong>ile data with their<br />

customers. The reluctance to share such information may be due to mistrust among network members.<br />

Inaccurate or misleading information acquired from suppliers may also limit the effectiveness <strong>of</strong> Bayesian<br />

networks as a tool for monitoring network risks in supply chains. Such information can result in the<br />

creation <strong>of</strong> flawed pr<strong>of</strong>iles that fail to reflect the true risk associated with a particular supplier. Moreover,<br />

16<br />

Copyright © 2012. <strong>Academy</strong> <strong>of</strong> <strong>Knowledge</strong> <strong>Process</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!