Security, visibility and resilience: the keys to mitigating supply chain vulnerabilities Online publication date: Fri, 21-Apr-2006
by Theodore S. Glickman, Susan C. White
International Journal of Logistics Systems and Management (IJLSM), Vol. 2, No. 2, 2006
Abstract: Outsourcing of key processes and/or capabilities that are not considered core is increasing. Technology allows this transformation as falling information processing costs and increasing global connectivity allow firms to collaborate more easily. This shift has led to an increased reliance on efficient, well coordinated supply chains. As operations become more dependent upon responsive supply chains, the likelihood that disruptions or disturbances in the supply chain will result in adverse consequences increases. In stunning fashion, the tragic events of 9/11 highlighted some of the risks associated with the dependence on supply chains to move products and information continuously. The risk that a firm will be adversely affected by a significant disruption or disturbance is called a supply chain vulnerability. The keys to mitigating such vulnerabilities are presented and the interrelationships between them are explored herein. To minimise these vulnerabilities, firms should ensure security visibility and resilience throughout their supply chain networks.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Logistics Systems and Management (IJLSM):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com