Verified Document

Globalization Of The Supply Chains Term Paper

The Helferich analysis also supports the findings of other researchers as well in the area of supply chain risk management and security. It has been found that the supply chain design characteristics of complexity of logistics and information sharing, node criticality, density of supply chain partnerships geographically and from a product perspective all influence the capacity for risk mitigation and minimization (Craighead, Blackhurst, Rungtusanatham, Handfield, 2007). Simply put the greater the complexity of a supply chain and its logistics and collaboration functions the greater the need to have an agile, parallel-based supply chain and sourcing strategy in place (Stecke, Kumar, 2009). The need for an integrated framework is crucial if supply chains are able to anticipate and react quickly to disruptions, whether they are from natural disasters or acts of terrorism (Peck, 2005). The need then is for a framework that put agility ahead of formality and response times ahead of overt and exceptionally tight controls. The response of Wal-Mart and other mass merchandisers to the needs of residents in New Orleans after Hurricane Katrina is a vivid reminder of just how critical having an agile supply chain is (Horwitz, 2009). As has been mentioned in the Helferich's Securing the Supply Chain analysis, supply chain security needs to take into account four dimensions and also have role-based access and security privileges by each functional area of supply chain management. These four dimensions include the security of the product or service, security of information flows, security of payments and financial transactions, and security of logistics systems (Pope, 2008). As the Helferich has also pointed out, there needs to be a security structure in place that validates access to each of these four systems and process areas throughout a supply chain. To the extent a supply chain has been able to manage these specific vulnerability areas is the extent to which they can withstand natural disasters and the potential interruptions from terrorist acts and other disasters. The need for an agile, secure and scalable supply chain network to overcome the risks and vulnerabilities mentioned in Helferich's analysis is key. The bottom line is that supply chains are the most critical link...

Ruark, & et al. (2004). Accelerating the Profitability of Hewlett-Packard's Supply Chains. Interfaces, 34(1), 59-72.
Karen Butner. (2010). The smarter supply chain of the future. Strategy & Leadership, 38(1), 22-31.

Chris W. Craighead, Jennifer Blackhurst, M JohnRungtusanatham, & Robert Handfield (2007). The Severity of Supply Chain Disruptions: Design Characteristics and Mitigation Capabilities. Decision Sciences, 38(1), 131-156.

Gunasekaran, a., & Ngai, E.. (2009). Modeling and analysis of build-to-order supply chains. European Journal of Operational Research, 195(2), 319.

Hopkins, M.. (2010). Your Next Supply Chain. MIT Sloan Management Review, 51(2), 17-24.

Horwitz, S.. (2009). Wal-Mart to the Rescue: Private Enterprise's Response to Hurricane Katrina. The Independent Review, 13(4), 511-528.

Paul Kunert. (2005, October). WEEE enforcement could spark price hike. MicroScope,3.

Kwok Hung Lau, & Yiming Wang. (2009). Reverse logistics in the electronic industry of China: a case study. Supply Chain Management, 14(6), 447-465.

Lee, H.. (2008). Embedding sustainability: lessons from the front line. International Commerce Review: ECR Journal, 8(1), 10-20.

Neureuther, B., & Kenyon, G.. (2009). Mitigating Supply Chain Vulnerability. Journal of Marketing Channels, 16(3), 245.

Helen Peck. (2005). Drivers of supply chain vulnerability: an integrated framework. International Journal of Physical Distribution & Logistics Management, 35(3/4), 210-232.

Pope, J.. (2008). Dimensions of Supply Chain Security. Southern Business Review, 33(2), 21-27.

Doug Smock. (2004, June). HP takes the lead on social responsibility. Purchasing, 133(11), 36.

Stecke, K., & Kumar, S.. (2009). Sources of Supply Chain Disruptions, Factors That Breed Vulnerability, and Mitigating Strategies. Journal of Marketing Channels, 16(3), 193.

Tsai, W., &…

Sources used in this document:
References

Corey Billington, Gianpaolo Callioni, Barrett Crane, John D. Ruark, & et al. (2004). Accelerating the Profitability of Hewlett-Packard's Supply Chains. Interfaces, 34(1), 59-72.

Karen Butner. (2010). The smarter supply chain of the future. Strategy & Leadership, 38(1), 22-31.

Chris W. Craighead, Jennifer Blackhurst, M JohnRungtusanatham, & Robert Handfield (2007). The Severity of Supply Chain Disruptions: Design Characteristics and Mitigation Capabilities. Decision Sciences, 38(1), 131-156.

Gunasekaran, a., & Ngai, E.. (2009). Modeling and analysis of build-to-order supply chains. European Journal of Operational Research, 195(2), 319.
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now