Supply chains and terrorism

نویسنده

  • Yossi Sheffi
چکیده

On the morning of September 11, 2001 the United States and the Western world entered a new era – one in which indiscriminate terrorist acts of all kinds must be expected. Many, if not most, of the expected consequences of the new era will be reflected in supply chain management challenges: relations with suppliers and customers, transportation difficulties and revised inventory management strategies. This article looks at the twin corporate challenges of preparing for new terrorist attacks, and of operating under heightened security resulting in less reliable lead times and less certain demand scenarios. In addition it looks at how companies should organize to meet those challenges efficiently and the new role that public-private partnerships are likely to play. To prepare for terrorist attacks, firms should revise their inventory management posture and keep strategic inventory on hand. This does not mean that they should abandon just-in-time principles since JIT brought about better quality, higher accountability and better productivity, in addition to reduction in inventory carrying cots. Instead, firms should manage the strategic inventory in a JIT fashion. Similarly, firms should not abandon offshore procurement. Instead, they should organize to run dual procurement systems where the bulk of the material is bought from inexpensive and innovative offshore suppliers, and at the same time, a portion of the business is given to a local supplier who can pick up the slack in case an attack disrupts transportation lanes. Both of these examples can be analyzed in the context of real options where the dual supplier or the extra inventory buys the firm the ability to continue manufacturing after an attack. To keep operating in an environment where security measures mean less reliable lead times, supply chain managers should focus on methods that they have always used to deal with uncertain supply chain. These include investments in better visibility measures, configuration of manufacturing systems for postponement and make -to-order, and the use of risk pooling strategies. In preparation for another attack and as part of the effort to foil it, companies should redesign their systems with security in mind. Thus this article calls for the establishment of a Chief Security Officer and for the creating of a security culture similar to the sales culture of the 1970-s and the quality culture of the 1980-s and 1990-s. In addition the article calls for a public-private partnership focused on sharing data and knowledge at all levels.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Applying Stackelberg Game to Find the Best Price and Delivery Time Policies in Competition between Two Supply Chains

In this paper, the competition between two supply chains and their elements is studied. Each chain consisted of a manufacturer and a distributor and the two chains compete in a market with single type of customer sensitive to price and delivery time. Therefore, this is a two-supply chain game and during the competition between two supply chains, elements of each supply chain (manufacturer and/o...

متن کامل

Developing a Model for Measuring Severity of Effects Caused by Interconnected Units in Electronic Supply Chains

For many electronic supply chain networks in the world that can comprise hundreds ofcompanies with several tiers of suppliers and intermediate customers, there are numerous presentingrisks to consider. In the electronic supply chain, the situation are even worse, for the characteristics ofthis supply chain: excessive lean management, global sourcing and the rather more uncertain marketdemand. E...

متن کامل

A Hybrid Dynamic Programming for Inventory Routing Problem in Collaborative Reverse Supply Chains

Inventory routing problems arise as simultaneous decisions in inventory and routing optimization. In the present study, vendor managed inventory is proposed as a collaborative model for reverse supply chains and the optimization problem is modeled in terms of an inventory routing problem. The studied reverse supply chains include several return generators and recovery centers and one collection...

متن کامل

VMI-type Supply Chains: a Brief Review

The primary purpose of this paper is to highlight for the research community and practitioners the various aspects of using VMI-type supply chains in today’s business environment as well as a number of directions for future studies. In this regard, fifty articles published in major international journals, beginning in 1995, which contribute to the VMI-type supply chains are reviewed via a syste...

متن کامل

Price Competition Between Two Leader-Follower Supply Chains, A Case Study

We model a real-world case problem as a price competition model between two leader-follower supply chains that each of them consists of one manufacturer and one retailer. T he manufacturer produces partially differentiated products and sells to market through his retailer. The retailer sells the products of manufacturer to market by adding some values to the product and gains margin as a fracti...

متن کامل

Fuzzy revenue efficiency in sustainable supply chains

The performance assessment of supply chains including sustainability dimensions of economic, environmental and social is a significant aspect for managers and decision makers. Furthermore, imprecise data are presented in many real world applications. Therefore, the current paper proposes an approach based on data envelopment analysis (DEA) to analyze the revenue efficiency of sustainable supply...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003