SlideShare a Scribd company logo
1 of 19
Download to read offline
The current issue and full text archive of this journal is available at
                                          www.emeraldinsight.com/1463-5771.htm




                                                                                                                         Benchmarking
       Benchmarking supplier risks                                                                                        supplier risks
        using Bayesian networks
                                     Archie Lockamy III
 Brock School of Business, Samford University, Birmingham, Alabama, USA                                                                      409
Abstract
Purpose – The purpose of this paper is to provide a methodology for benchmarking supplier risks
through the creation of Bayesian networks. The networks are used to determine a supplier’s external,
operational, and network risk probability to assess its potential impact on the buyer organization.
Design/methodology/approach – The research methodology includes the use of a risk assessment
model, surveys, data collection from internal and external sources, and the creation of Bayesian
networks used to create risk profiles for the study participants.
Findings – It is found that Bayesian networks can be used as an effective benchmarking tool to
assist managers in making decisions regarding current and prospective suppliers based upon their
potential impact on the buyer organization, as illustrated through their associated risk profiles.
Research limitations/implications – A potential limitation to the use of the methodology
presented in the study is the ability to acquire the necessary data from current and potential suppliers
needed to construct the Bayesian networks.
Practical implications – The methodology presented in this paper can be used by buyer
organizations to benchmark supplier risks in supply chain networks, which may lead to adjustments to
existing risk management strategies, policies, and tactics.
Originality/value – This paper provides practitioners with an additional tool for benchmarking
supplier risks. Additionally, it provides the foundation for future research studies in the use of Bayesian
networks for the examination of supplier risks.
Keywords Benchmarking, Suppliers, Risk management, Bayesian statistical decision theory
Paper type Research paper


1. Introduction
In order to mitigate the effects of increasing levels of global competition, demanding
customers and employees, shrinking product lifecycles, and decreasing acceptable
response times on success in the market place, many organizations have become
members of formalized extended enterprises known as supply chains. These structures
can be described as organizational networks designed to help firms achieve a competitive
advantage through improved market responsiveness and cost reductions. Additionally,
supply chains can provide organizations with a means for promoting business
innovation through the adoption of streamlined information flows, restructured business
processes, and enhanced collaboration among network members (Sawhney et al., 2006).
   As organizations increase their dependence on supply chain networks, they
become more susceptible to their suppliers’ risk profiles. Supplier risk profiles consist
of risk events that can have an adverse impact on buyer organizations. Risk events
are incidents whose occurrences result in the disruption of overall supply chain                                       Benchmarking: An International
performance. Although it is often not possible to precisely predict the occurrence of such                                                      Journal
                                                                                                                                    Vol. 18 No. 3, 2011
events, it is possible to evaluate the probability of their occurrence through the creation                                                 pp. 409-427
of supplier risk profiles. Therefore, it is essential that buyer organizations have the                              q Emerald Group Publishing Limited
                                                                                                                                             1463-5771
ability to internally benchmark the level of risk associated with suppliers currently                                  DOI 10.1108/14635771111137787
BIJ    contained in their networks. In addition, these organizations must possess the means to
18,3   assess risk levels associated with potential members of their supply networks.

       1.1 Purpose
       The purpose of this article is to provide a methodology for benchmarking supplier
       risks through the creation of Bayesian networks. These networks are used to determine
410    a supplier’s external, operational, and network risk probability for the creation of
       supplier risk profiles. These risk profiles can be used to assess a supplier’s potential
       impact on the buyer organization. Thus, the methodology is proposed as an analytical
       tool to assist organizations in benchmarking risk levels associated with current and
       prospective suppliers based upon their associated risk profiles.

       1.2 Organization
       The first section of the article provided its motivation and purpose. A review of the
       literature pertaining to benchmarking and supply chain risks is provided in Section 2
       to provide a theoretical basis for the proposed methodology. Section 3 contains an
       overview of the research methodology used in this study which includes a discussion
       on Bayesian networks and data collection procedures. Results and conclusions are
       then offered in Sections 4 and 5, respectively. Finally, Section 6 provides a discussion
       on implications regarding study limitations and directions for future research.

       2. Literature review
       Benchmarking can be described as a framework within which indicators and best
       practices are examined in order to determine potential areas of improvement for an
       organization (Tavana et al., 2009). In his taxonomy, Zairi (1994) identified the following
       types of benchmarking: internal, competitive, functional, and generic. O’Dell and
       Grayson (1998a, b) defined internal benchmarking as “the process of identifying,
       sharing, and using the knowledge and practices inside one’s own organization.”
       Christopher (1998) characterized supply chains as organizational networks linked
       through upstream and downstream processes and activities that produce value in the
       form of products and services delivered to the hands of the ultimate customer.
       A prerequisite to effective supply chain management is the alignment of functional and
       supply chain partner activities with firm strategies which are congruent with
       organizational structures, processes, cultures, incentives, and people (Abell, 1999). Thus,
       it is imperative that buyer organizations have the ability to internally benchmark the
       capabilities and performance of its suppliers within the supply chain network to ensure
       that supplier activities support the strategic and operational intent of the network.

       2.1 Supplier benchmarking
       Supplier benchmarking has been used in the selection of suppliers (Choy et al., 2003;
       Lau et al., 2006; Che and Wang, 2008), supply base reduction processes (Ogden and
       Carter, 2008), and in the assessment of supplier capabilities (Feeny et al., 2005) and
       performance (Forker and Mendez, 2001; Narasimhan et al., 2001; Bardy, 2010). Supplier
       benchmarking techniques employed by organizations include artificial intelligence tools
       (Lau et al., 2006), neural networks (Choy et al., 2003), mathematical models (Che and
       Wang, 2008), and other analytical techniques (Forker and Mendez, 2001; Farzippor Saen,
       2008). Owing to the integrative and collaborative nature of supply chain networks,
Gunasekaran et al. (2001) notes that internal benchmarking among supply chain                Benchmarking
members is necessary in order to monitor interactive performance drivers and to ensure
that the network is capability of achieving individual and shared performance targets.
                                                                                              supplier risks
    Soni and Kodali (2010) argue that the internal benchmarking of supply chains is
necessary to reduce performance variability among supply chains of the same focal
firm. However, given the dynamic nature of supply chains due to their compositional
changes over time along with environmental changes, it is equally important to                         411
internally benchmark collaborative as well as relative individual performance among
all chain members for effective supply chain management (Li and Dai, 2009). Such
activities facilitate improvements in information sharing, decision synchronization,
incentive alignment, and overall supply chain collaboration practices among its
membership (Simatupang and Sridharan, 2004).
    Supplier benchmarking can be used as a tool to reveal improvement opportunities
within a supply chain for increased supply chain management effectiveness (Esain,
2000). The benefits of effective supply chain management include enhanced customer
satisfaction and value, along with improved supply chain reactivity (Gaudenzi and
Borghesi, 2006). Supply chain reactivity refers to the network’s ability to compress
lead times, adapt to unanticipated changes in demand, and to cope with environmental
uncertainty in the market place. However, the interdependencies created among
participating organizations via integrated supply chain networks make them more
vulnerable to supply chain disruptions, thus increasing risks.
2.2 Supplier selection and evaluation
Foster and Whiteman (2006) note that there has been a trend towards developing closer
working relationships with fewer suppliers within supply chain networks, resulting
in improved supplier performance. Additionally, Choi and Kim (2008) suggest that
buyer organizations must be not only concerned with a supplier’s performance within
its immediate supply chain network, but also its performance within its own supply
network. Therefore, it is increasingly important for buyer organizations to develop the
capacity to systematically select suppliers as members of its network that are capable
of meeting or exceeding individual and shared performance objectives. In addition,
these organizations must possess the means to routinely evaluate the performance of
the members of their supply networks.
    There are a variety of supplier selection and evaluation methodologies offered in the
research literature, which include the use of the analytic hierarchy process (Routroy,
2008), data envelop analysis (Wu et al., 2007a; Wang et al., 2009), fuzzy systems
(Jain et al., 2007; Sen et al., 2010; Sevkli, 2010), multiple regression analysis (Lasch,
2005; Inemek, 2009), and process capability analysis (Chen and Chen, 2006; Wu et al.,
2007b). Recently, sustainability and environmental requirements have become a part of
the supplier selection and evaluation protocol for a growing number of organizations
(Jabbour and Jabbour, 2009). Finally, as organizations continue to increase their level of
risk via interdependencies created by integrated supply chain networks, researchers
have begun to develop risk-based analytical approaches to supplier selection and
evaluation (Guido, 2008; Lee, 2009; Ravindran et al., 2010).

2.3 Supply chain risks
Spekman and Davis (2004) define risk as the probability of variance in an expected
outcome. Therefore, it is possible to quantify risk since it is possible to assign
BIJ    probability estimates to these outcomes (Khan and Burnes, 2007). On the contrary,
18,3   uncertainty is not quantifiable and the probabilities of the possible outcomes are not
       known (Knight, 1921). A joint evaluation of risk and uncertainty conducted by Yates
       and Stone (1992) suggests that risk implies the existence of uncertainty associated with
       a given outcome, for if the probability of an outcome is known, there is no risk. Thus,
       uncertainty can be regarded as a key determinant of risk that may not be entirely
412    eradicated, but can be mitigated through the deployment of risk reduction action
       steps (Slack and Lewis, 2001). In business situations, managers are expected to reduce
       the organization’s exposure to uncertainty through the deployment of effective risk
       management strategies.
          Internal and external uncertainties both provide sources for supply chain risks
       (Cucchiella and Gastaldi, 2006). Changes in capacity availability, interruptions in
       information flows, and reductions in operational efficiencies are all possible sources of
       internal uncertainty. External sources of uncertainty leading to increased supply chain
       risks include the actions of competitors, price fluctuations, changes in the political
       environment, and variations in supplier quality. These sources of uncertainty can be
       considered “risk events” that can lead to supply chain disruptions which inhibit
       performance. Thus, it is necessary for managers to first understand the various
       categories of risks along with the events and conditions that drive them before they
       attempt to devise approaches to reduce supply chain risks (Chopra and Sodhi, 2004).
          The research literature offers a variety of approaches for categorizing risks in supply
       chain networks. For example, Treleven and Schweikhart (1988) have classified
       supply chain risk events based upon their association with the following: supply
       chain disruptions; price fluctuations; inventory and scheduling changes, technology
       advancements, and quality issues. Kleindorfer and Wassenhove (2003) designated
       supply chain co-ordination and supply disruptions as categories of supply chain risks,
       while Zsidisin et al. (2005) defined supply risk as the probability of an incident associated
       with inbound supply from individual supplier failures or the supply market occurring,
       in which its outcomes result in the inability of the purchasing firm to meet customer
       demand or cause threats to customer life and safety. Paulsson (2004) classified supply
       chain risks as operational disturbances, tactical disruptions, and strategic uncertainties.
       Giunipero and Eltantawy (2004) categorized these risks based upon conditions which
       result in their creation, such as political events, product availability, transportation
       distances, changes in technology and labor markets, financial instability, and
       management turnover. Supply chain disruptions, delays, systems, forecasts, intellectual
       property, procurement, receivables, inventory, and capacity are classifications for
       supply chain risks offered by Chopra and Sodhi (2004).
          Several researchers have chosen to categorize supply chain risks in the following
       manner: demand-side risks resulting from disruptions emerging from downstream supply
       chain operations (Suttner, 2005); supply-side risks residing in purchasing, supplier
       activities, and supplier relationships (Wu et al., 2006); and catastrophic risks that, when
       they materialize, have a severe impact in terms of magnitude in the area of their occurrence
       (Wagner and Bode, 2006). Nagurney et al. (2005) defined demand-side risk as the
       uncertainty surrounding the random demands that often occur at the retailer stage of the
       supply chain. Wu et al. (2006) states that inbound supply risk is defined as the potential
       occurrence of an incident associated with inbound supply from individual supplier failures
       or the supply market resulting in the inability of the purchasing firm to meet
customer demand, and as involving the potential occurrence of events associated with           Benchmarking
inbound supply that can have significant detrimental effects on the purchasing firm.              supplier risks
   Handfield and McCormack (2007) defined operational, network, and external factors
as categories of supply chain risks. Operational risk is defined as the risk of loss
resulting from inadequate or failed internal processes, people or systems. Quality,
delivery, and service problems are examples of operational risks. Network risk is defined
as risk resulting from the structure of the supplier network, such as ownership,                         413
individual supplier strategies, and supply network agreements. External risk is defined
as an event driven by external forces such as weather, earthquakes, political, regulatory,
and market forces. In addition, the authors offer three perspectives for the examination
of risks within supply chain networks. A supplier facing perspective examines the
network of suppliers, their markets and their relationship relative to the organization.
A customer facing perspective examines the network of customers and intermediaries,
their markets and their relationships also relative to the organization. Finally, an
internal facing perspective examines the company, their network of assets, processes,
products, systems, and people as well as the company’s markets. This research study
employs the risk categories offered by Handfield and McCormack along with the
supplier facing perspective in the analysis of supply chain risk.

3. Research methodology
The research methodology for this study includes the use of a risk assessment model,
surveys, data collection from internal and external company sources, and the creation
of Bayesian networks used to create risk profiles for the study participants. Following
is an overview of Bayesian networks, along with a discussion of the assessment model
and study sample collection procedures.

3.1 Bayesian networks
A Bayesian network is an annotated directed acyclic graph that encodes probabilistic
relationships among nodes of interest in an uncertain reasoning problem (Pai et al.,
2003). The representation describes these probabilistic relationships and includes a
qualitative structure that facilitates communication between a user and a system
incorporating a probabilistic model. Bayesian networks are based on the work of the
mathematician and theologian Rev. Thomas Bayes who worked with conditional
probability theory in the late 1700s to discover a basic law of probability which came to
be known as Bayes’ theorem. Bayes’ theorem states that:
                                           PðHjcÞ £ PðEjH; cÞ
                             PðHjE; cÞ ¼
                                                PðEjcÞ
The posterior probability is given by the left-hand term of the equation [P(HjE, c)].
It represents the probability of hypothesis H after considering the effect of evidence E on
past experience c. The term P(Hjc) is the a priori probability of H given c alone. Thus, the
a priori probability can be viewed as the subjective belief of occurrence of hypothesis
H based upon past experience. The likelihood, represented by the term P(EjH,c), gives the
probability of the evidence assuming the hypothesis H and the background information
c is true. The term P(Ejc) is independent of H and is regarded as a normalizing or scaling
factor (Niedermayer, 2003). Thus, Bayesian networks provide a methodology for
combining subjective beliefs with available evidence.
BIJ       Bayesian networks represent a special class of graphical models that may be used to
18,3   depict causal dependencies between random variables (Cowell et al., 2007). Graphical
       models use a combination of probability theory and graph theory in the statistical
       modeling of complex interactions between such variables. Bayesian networks have
       evolved as a useful tool in analyzing uncertainty. When Bayesian networks were first
       introduced, assigning the full probability distributions manually was time intensive.
414    Solving a Bayesian network with a considerable number of nodes is known to be a
       nondeterministic polynomial time hard [NP hard] problem (Dagum and Luby, 1993).
       However, significant advancements in computational capability along with the
       development of heuristic search techniques to find events with the highest probability
       have enhanced the development and understanding of Bayesian networks.
       Correspondingly, the Bayesian computational concept has become an emergent tool
       for a wide range of risk management applications (Cowell et al., 2007). The
       methodology has been shown to be especially useful when information about past
       and/or current situations is vague, incomplete, conflicting, and uncertain.

       3.2 Assessment model
       The study participants are comprised of ten casting suppliers to a major US
       automotive company. An assessment model developed by Handfield and McCormack
       (2007) was used to evaluate the risk of each supplier. This model incorporates data
       from several sources to provide a 360 degree view of a supplier’s risk profile. The risk
       assessment model is shown in Figure 1.
           The risk assessment model identifies and quantifies the risk of a supply disruption
       using a framework that describes the attributes of suppliers, their relationships, and
       their interactions with the organization performing the assessment. The model consists
       of: relationship factors (influence, levels of cooperation, power, alignment of interests);
       past performance (quality, on-time delivery, shortages); human resource factors
       (unionization, relationship with employees, level of pay compared to the norm); supply
       chain disruptions history; environment (geographic, political, shipping distance and
       method, market dynamics); disaster history (hurricane, earthquake, tornado, flood);
       and financial factors (ownership, funding, payables, receivables).
           The assessment model uses a set of measures and scales that apply to each risk
       construct. The model was tested with several companies over a four year period, and
       validated through actual use in assessing supply risk events. The measures and scales
       are used to evaluate suppliers, and to provide a numerical score that reflects their
       individual risk of a disruptive event. A supplier risk profile is then created, expressed
       as a numerical score given as a result of applying the model and measures. The higher
       the risk profile score, the higher the supplier’s disruption potential to the supply chain.
       Appendix 1 contains the actual measures used in this study. In order to apply the risk
       results to potential events, the survey results were reorganized into operational,
       network and external risk-related measures, and the results were recalculated for each
       supplier. The reorganized measures are presented in Appendix 2.

       3.3 Study participants
       The study participants consist of ten automotive casting suppliers to a major
       automotive company in the US The sample data was collected by first interviewing the
       supplier’s account representative to discuss the study and the internet-based survey.
Interactions and              Benchmarking
                                                                     relationships
                                                                                                    supplier risks
                                                                       Performance
                                          S
                                                                       Relationship
                                                                                                                 415
                                                             The customer’s reputation with
                            S                                suppliers is also a critical factor
                                              S




                                  S                                       SC
                                                                       network
                                                                       organizer
                                              S
     Supplier
   environment

  Environmental                       S
                                                                 Supplier attributes
 Geographic, market,
 transportation, etc.                                             Human
                                                                 resources
                        S                                      Supply chain
                                                                disruption
                                                                                                               Figure 1.
                                                                 Financial
                                                                                                   Risk assessment model
                                                                  Health


Subsequently, the survey instrument web link was sent in an email to the supplier’s
account representative. The account representative completed the survey, supplier
historical performance data was evaluated, and an internal analyst conducted an
environmental analysis of the organization. All risk ratings were assessed using a
five-point Likert scale, and a risk index was calculated for each supplier. In addition,
each supplier provided a priori probabilities for 12 risk events identified in Appendix 2.
The a priori probabilities were determined by a team of company personnel familiar
with the identified risk events as they relate to the ten suppliers. By logically
examining the information, the team was able to estimate a priori probability values
pertaining to 12 risk events for each supplier. These probabilities provided the basis
for the construction of Bayesian networks used in the creation of supplier risk profiles.

4. Results
Bayesian networks were developed to examine the probability of a failure for ten
suppliers in the company’s casting supply chain. Network, operational, and external risk
levels were computed using the provided a priori probabilities for the identified risk
events. A depiction of the Bayesian networks used in this study is shown in Figure 2.
BIJ
18,3                         1       2        3        4        5       6         7       8        9       10         11    12




416



                                         Network                         Operational                       External
                                          risks                            risks                            risks




                                                                            Supplier
                                                                             failure



Figure 2.                 Notes: Network key: 1 = misalignment of interest; 2 =supplier financial stress; 3 = supplier leadership
Bayesian network          change; 4 = tier 2 stoppage; 5 = supplier network misalignment; 6 = quality problems; 7 = delivery
structure for suppliers   problems; 8 = service problems; 9 = supplier HRproblems; 10 = supplier locked; 11 = merger/divestiture;
                          12 = disasters


                          Nodes (circles) represent variables in the Bayesian network. Each node contains states,
                          or a set of probable values for each variable. The values “yes” and “no” represent the two
                          states in which the variables can exist in the network illustrated in Figure 2. Nodes are
                          connected to show causality with arrows known as “edges” which indicate the direction
                          of influence. When two nodes are joined by an edge, the causal node is referred to as the
                          parent of the influenced (child) node. Child nodes are conditionally dependent upon their
                          parent nodes. Thus, in Figure 2, the probability of suppliers experiencing network risks
                          is dependent on the a priori probabilities associated with the following variables:
                          misalignment of interest; supplier financial stress; supplier leadership change; tier
                          2 stoppage; and supplier network misalignment. The a priori probabilities associated
                          with the variables quality problems, delivery problems, service problems, and supplier
                          human resources (HR) problems directly influence operational risks. External risks are
                          dependent upon the following variables: supplier locked (i.e. company cannot easily
                          switch to another supplier), merger/divestitures, and disasters. The joint probabilities of
                          the computed network, operational, and external risks are then used to determine the
                          probability that a supplier will fail to achieve individual and shared performance
                          expectations.
The a priori probabilities for 12 supply chain risk events that affect network,            Benchmarking
operational, and external risks are presented in Table I for each supplier. These values        supplier risks
were used to generate a risk profile using Bayesian networks comprised of network,
operational and external risk probabilities along with the supplier’s probability of
failure to meet performance expectations. The supplier risk profiles are displayed
in Table II. The table reveals that Suppliers A, H, and J have the highest probability of
failure to meet performance expectations, while Supplier I has the lowest probability of                 417
failure. Computations illustrating the development of the risk profile for Supplier A are
presented in Appendix 3.
    Supplier rankings based upon their risk profiles are presented in Table III. An
examination of Table III reveals that Suppliers A and H have the highest network risk
rankings, while Supplier I has the lowest ranking in this category. In the category of
operational risk, Supplier A and J exhibit the highest rankings. Suppliers B, D, and E
exhibit the lowest rankings in the area of operational risk. The highest ranking in the
external risk category is held by Supplier H, while Supplier I holds the lowest external
risk ranking. Finally, based upon the risk profiles illustrated in Table II, Suppliers A, H,
and J have the highest probability of failure ranking among the study participants,
while Supplier I has the lowest ranking in this category.

5. Conclusions
The results of the study indicate that not only does Supplier I have the lowest network
and external risk rankings relative to other study participants, but also the lowest
ranking in the probability of failure category. Given this result, after considering both
the operational and external risks associated with Supplier I, the company may find it
prudent to apportion more of its business to this supplier in an effort to decrease risk in
the supply chain network. Supplier B exhibited the second lowest probability of failure
ranking and may also be a candidate for increased business as a means to reduce risk.
Finally, although Supplier D has a relatively high ranking in the external risk category,
it exhibited the third lowest ranking in the probability of failure category. Therefore, the
company may find it worthwhile to engage in cooperative activities with Supplier D to
help reduce the impact of external risk events. For example, the company may
participate with Supplier D in the development of a comprehensive plan for responding
to unforeseen disasters as a means of mitigating their effects on the supply chain
network.
    The results also reveal that Suppliers A, H, and J have unfavorable probability of
failure risk profiles relative to the other participants in the study. Supplier A has the
highest rankings in both the network and operational risk categories, while Supplier H
also holds a number one ranking in the categories of network and external risks.
Supplier J has the highest ranking in the category of operational risk. A further
examination of Table III reveals that these suppliers are ranked either first or second in
each of the four risk categories. This result suggests that the company should consider
several approaches for reducing its exposure to the risks associated with the
aforementioned suppliers. One approach would be for the company to allocate more of
its business to a supplier with a less risky profile, such as Supplier I. After considering
the suppliers’ network, operational and external risk factors, the company may consider
the joint development of an aggressive supply chain risk management program
which helps these suppliers achieve significant reductions in each risk category.
BIJ
                                                                                                                        18,3


                                                                                                           418




    Table I.

    risk event variables
    A priori probabilities for
                     Supplier Supplier            Supplier                              Supplier
        Misalignment financial leadership Tier 2   network     Quality Delivery Service     HR    Supplier Merger/
Supplier of interest  stress    change stoppage misalignment problems problems problems problems locked divestiture Disasters

A                                0.20   0.50   0.50   0.31   0.20   0.46   1.00   0.20     0.20     0.18         1.00   0.11
B                                0.17   0.23   0.23   0.13   0.20   0.23   0.46   0.10     0.12     0.06         1.00   0.08
C                                0.20   0.50   0.50   0.31   0.12   0.48   0.95   0.20     0.20     0.18         1.00   0.12
D                                0.16   0.33   0.23   0.16   0.17   0.21   0.52   0.11     0.09     0.09         1.00   0.10
E                                0.19   0.38   0.23   0.17   0.20   0.22   0.53   0.10     0.07     0.11         1.00   0.13
F                                0.14   0.46   0.27   0.18   0.14   0.33   0.65   0.09     0.13     0.15         1.00   0.13
G                                0.16   0.31   0.37   0.15   0.16   0.26   0.57   0.08     0.11     0.11         1.00   0.10
H                                0.21   0.50   0.50   0.32   0.16   0.47   0.96   0.20     0.20     0.19         1.00   0.16
I                                0.18   0.23   0.17   0.15   0.16   0.29   0.58   0.11     0.11     0.11         0.80   0.12
J                                0.20   0.50   0.50   0.31   0.16   0.50   0.96   0.20     0.20     0.18         1.00   0.11
Benchmarking
            Network risk        Operational risk       External risk
Supplier     probability          probability           probability     Probability of failure      supplier risks
A               0.34                  0.47                  0.43                0.41
B               0.19                  0.23                  0.38                0.27
C               0.33                  0.46                  0.43                0.40
D               0.21                  0.23                  0.39                0.28                              419
E               0.23                  0.23                  0.41                0.29
F               0.24                  0.30                  0.43                0.32
G               0.22                  0.27                  0.41                0.30
H               0.34                  0.46                  0.45                0.41
I               0.18                  0.27                  0.34                0.26                            Table II.
J               0.33                  0.47                  0.43                0.41                Supplier risk profiles



Supplier Network risk ranking Operational risk ranking External risk ranking Failure ranking

A                 1                          1                     2                   1
B                 7                          5                     5                   7
C                 2                          2                     2                   2
D                 6                          5                     4                   6
E                 4                          5                     3                   5
F                 3                          3                     2                   3
G                 5                          4                     3                   4
H                 1                          2                     1                   1                       Table III.
I                 8                          4                     6                   8         Supplier rankings based
J                 2                          1                     2                   1                  on risk profiles


Possible incentives that the company could offer the suppliers are incremental increases
in business based upon documented improvements in its supplier ranking based on its
risk profile. Finally, the company may choose to terminate its relationship with these
suppliers, and allocate its business among its remaining supplier base.

6. Implications
The methodology presented in this study can used to internally benchmark supplier
risks on a routine basis in supply chain networks. As part of a supply chain
governance agreement, suppliers could be required to periodically update of their risk
probability profiles for the risk events outlined in Appendix 2. These updates could be
applied to Bayesian networks to create new risk profiles and rankings for each
supplier. Adjustments to existing risk management strategies, policies, and tactics
could then be made to reflect the current risk realities associated with the supply chain
network. Thus, the methodology can provide a proactive means of managing supply
chain risks.
   The methodology can also be used by organizations to develop supplier risk profiles
to determine failure exposure levels. Organizations can then decide if it is in their best
interest to either assist a supplier in improving its risk profile, or to terminate the
relationship. Supplier risk profiles can be used to determine those risk events which
have the highest probability of occurrence, and the largest potential impact on the
supply chain network. Thus, this methodology can assist organizations along
BIJ    with their suppliers in developing comprehensive supplier risk management programs
18,3   designed to minimize the occurrence of network, operational, and external risk events.
          Finally, this methodology can be used as a tool to assist managers in evaluating
       current and potential suppliers. Suppliers who have been shown to improve their risk
       profiles over time may be rewarded by a buyer organization via the allotment of more
       business. Conversely, suppliers who have experienced increases in network, operational,
420    or external risk events over an extended period of time may be viewed as “at risk”
       suppliers whose relationship may require reassessment by the organization. The
       reassessment could result in removal from the supply network. Potential suppliers
       willing to provide information for the generation of their risk profiles may then become
       viable candidates for network inclusion.

       6.1 Implementation
       In order to successfully implement the methodology offered in this study, it will be
       necessary for organizations to engage in coordinated and collaborative information
       sharing activities. Fawcett et al. (2009) has developed a conceptual model for the
       development of enhanced supply chain information sharing over time. The primary
       components of the model are connectivity, information sharing capability, and
       willingness. Connectivity refers to an organization’s ability to collect, analyze, and
       disseminate the required information necessary to support sound decision making
       within the supply chain network. It is a necessary condition for the enhancement of
       information sharing capabilities among the members of the network. However,
       organizations must also be willing to share sensitive decision making information to
       achieve high levels of coordination and collaboration among network members. Thus,
       both technological and behavioral dimensions must be considered in implementing
       this methodology. Not only must organizations have the technological capability to
       capture, store, update, and disseminate information on the network, operational, and
       external risk measures outlined in Appendix 2, but also display the willingness to
       share this information with members of the supply chain network.

       6.2 Limitations
       This study provides an examination of network, operational, and external risk profiles
       associated with casting suppliers in the automotive industry. Therefore, the results are
       specific to the study participants. A potential limitation to the use of the methodology
       presented in this study is the ability to acquire the necessary data from suppliers
       needed for the construction of the Bayesian networks. There may be circumstances
       where some participants within a supply chain network are reluctant to share risk
       profile data with their customers. Moreover, suppliers must be willing to periodically
       update this data in order to construct risk profiles that are valid and reliable.
       A limitation to the use of Bayesian networks to model supply chain risks is the proper
       identification of risk event and risk categories that can impact a supply chain. Since
       there are a number of approaches available for categorizing supply chain risks, the
       inability to incorporate all relevant risks into the model could limit its effectiveness in
       representing a supplier’s true risk profile. Therefore, the data used in the construction
       of Bayesian networks must represent the supplier’s current risk realities within the
       supply chain network.
6.3 Future research                                                                                 Benchmarking
Research studies which explore the risk profiles for suppliers and supply chain                       supplier risks
networks in other industries should be examined using Bayesian networks to determine
if industry dynamics significantly influence supply chain risks. These studies could
explore the magnitude of network, operational, and external risk associated with
suppliers in specific industries. Results from such studies may be used to benchmark
supplier risk levels within a particular industry.                                                            421
    Future researchers may also investigate if it may be possible to develop benchmarks
representing the maximum risk levels for the variables contained in Appendix 2 in order
for a supplier or supplier group to maintain its affiliation with the supply chain. The
maximum risk levels may be based on the nature of the industry, or the commodity
provided by the supplier. Buyer organizations may choose to assist key suppliers who
exceed threshold levels in reducing risks, or discontinue their membership in the supply
chain network.
    Finally, future researchers may choose to incorporate financial data in ranking the
impact of a supplier’s network, operational, or external risks on supply chain networks.
The focus of such studies could be on the probability that a supplier will have an adverse
impact on the buyer organization’s revenue stream based upon its risk profile. Research
results from these studies could be used to benchmark the financial impact of supplier
failures on buyer organizations as well as the entire supply chain network.

References
Abell, D. (1999), “Competing today while preparing for tomorrow”, MIT Sloan Management
      Review, Vol. 40 No. 3, pp. 73-81.
Bardy, R. (2010), “Comparative supply chain performance: measuring cross-cultural effects.
      The example of the Bratislava regional automotive manufacturing”, Knowledge & Process
      Management, Vol. 17 No. 2, pp. 95-110.
Che, Z.H. and Wang, H.S. (2008), “Supplier selection and supply quantity allocation of common
      and non-common parts with multiple criteria under multiple products”, Computers &
      Industrial Engineering, Vol. 55 No. 1, pp. 110-33.
Chen, K.S. and Chen, K.L. (2006), “Supplier selection by testing the process incapability index”,
      International Journal of Production Research, Vol. 44 No. 3, pp. 589-600.
Chopra, S. and Sodhi, M.S. (2004), “Managing risk to avoid supply-chain breakdown”,
      Sloan Management Review, Vol. 46 No. 1, pp. 53-61.
Christopher, M. (1998), Logistics & Supply Chain Management: Strategies for Reducing Cost and
      Improving Services, 2nd ed., Financial Time Prentice-Hall, New York, NY.
Cowell, R.G., Verrall, R.J. and Yoon, Y.K. (2007), “Modeling operational risk with Bayesian
      networks”, Journal of Risk and Insurance, Vol. 74 No. 4, pp. 795-827.
Choi, T. and Kim, Y. (2008), “Structural embeddedness and supplier management: a network
      perspective”, Journal of Supply Chain Management: A Global Review of Purchasing &
      Supply, Vol. 44 No. 4, pp. 5-13.
Choy, K.L., Lee, W.B. and Lo, V. (2003), “An intelligent supplier relationship management system
      for selecting and benchmarking suppliers”, International Journal of Technology
      Management, Vol. 26 No. 7, pp. 717-42.
Cucchiella, F. and Gastaldi, M. (2006), “Risk management in supply chain: a real option
      approach”, Journal of Manufacturing Technology Management, Vol. 17 No. 6, pp. 700-20.
BIJ    Dagum, P. and Luby, M. (1993), “Approximating probabilistic inference in Bayesian belief
              networks is NP-Hard”, Artificial Intelligence, Vol. 60 No. 1, pp. 141-53.
18,3
       Esain, A. (2000), “Networks, benchmarking and development of the strategic supply base: a case
              study”, International Journal of Logistics: Research and Applications, Vol. 3 No. 2, pp. 157-71.
       Farzippor Saen, R. (2008), “Using super-efficiency analysis for ranking suppliers in the presence
              of volume discount offers”, International Journal of Physical Distribution & Logistics
422           Management, Vol. 38 No. 8, pp. 637-51.
       Fawcett, S.E., Wallin, C., Allred, C. and Magnan, G. (2009), “Supply chain information sharing:
              benchmarking a proven path”, Benchmarking: An International Journal, Vol. 16 No. 2, pp. 222-46.
       Feeny, D., Lacity, M. and Willcocks, L.P. (2005), “Taking the measure of outsourcing providers”,
              MIT Sloan Management Review, Vol. 46 No. 3, pp. 41-8.
       Forker, L.B. and Mendez, B.D. (2001), “An analytical method for benchmarking best peer
              suppliers”, International Journal of Operations & Production Management, Vol. 21 Nos 1/2,
              pp. 195-209.
       Foster, F.D. and Whiteman, C.H. (2006), “Bayesian prediction, entropy, and option pricing”,
              Australian Journal of Management, Vol. 31 No. 2, pp. 181-206.
       Gaudenzi, B. and Borghesi, A. (2006), “Managing risks in the supply chain using the AHP
              method”, The International Journal of Logistics Management, Vol. 17 No. 1, pp. 114-36.
       Giunipero, L.C. and Eltantawy, R.A. (2004), “Securing the upstream supply chain:
              a risk management approach”, International Journal of Physical Distribution & Logistics
              Management, Vol. 34 No. 9, pp. 698-713.
       Guido, M. (2008), “A decision-maker-centred supplier selection approach for critical supplies”,
              Management Decision, Vol. 46 No. 6, pp. 918-32.
       Gunasekaran, A., Patel, C. and Tirtiroglu, E. (2001), “Performance measurement and metrics in a
              supply chain environment”, International Journal of Operations & Production
              Management, Vol. 21 No. 1, pp. 71-87.
       Handfield, R. and McCormack, K. (2007), Supply Chain Risk Management: Minimizing
              Disruptions in Global Sourcing, Auberbach Publications, Boca Raton, FL.
       Inemek, A. (2009), “Global supplier selection strategies and implications for supplier
              performance: Turkish suppliers’ perception”, International Journal of Logistics: Research
              & Applications, Vol. 12 No. 5, pp. 381-406.
       Jabbour, A.B.L. and Jabbour, C.J. (2009), “Are supplier selection criteria going green? Case studies
              of companies in Brazil”, Industrial Management & Data Systems, Vol. 109 No. 4, pp. 477-95.
       Jain, V., Wadhwa, S. and Deshmukh, S.G. (2007), “Supplier selection using fuzzy association rules
              mining approach”, International Journal of Production Research, Vol. 45 No. 6, pp. 1323-53.
       Khan, O. and Burnes, B. (2007), “Risk and supply chain management: creating a research
              agenda”, International Journal of Logistics Management, Vol. 18 No. 2, pp. 197-216.
       Kleindorfer, P.R. and Wassenhove, L.K. (2003), “Managing risk in global supply chains”,
              Wharton Insurance and Risk Management Department Seminar, Wharton University,
              Philadelphia, PA.
       Knight, F.H. (1921), Risk, Uncertainty and Profit, Houghton Mifflin, Boston, MA.
       Lasch, R. (2005), “Supplier selection and controlling using multivariate analysis”, International
              Journal of Physical Distribution & Logistics Management, Vol. 35 No. 6, pp. 409-25.
       Lau, H.C.W., Lee, C.K.M., Ho, G.T.S., Pun, K.F. and Choy, K.L. (2006), “A performance
              benchmarking system to support supplier selection”, International Journal of Business
              Performance Management, Vol. 8 No. 2, pp. 132-51.
Lee, A.H. (2009), “A fuzzy AHP evaluation model for buyer-supplier relationships with the                Benchmarking
      consideration of benefits, opportunities, costs and risks”, International Journal of
      Production Research, Vol. 47 No. 15, pp. 4255-80.
                                                                                                          supplier risks
Li, D. and Dai, W. (2009), “Determining the optimal collaborative benchmarks in a supply chain”,
       International Journal of Production Research, Vol. 47 No. 16, pp. 4457-71.
Nagurney, A., Cruz, J., Dong, J. and Zhang, D. (2005), “Supply chain networks, electronic
     commerce, and supply side and demand side risk”, European Journal of Operational                              423
     Research, Vol. 164 No. 1, pp. 120-42.
Narasimhan, R., Talluri, S. and Mendez, D. (2001), “Supplier evaluation and rationalization
      via data envelopment analysis: an empirical examination”, Journal of Supply Chain
      Management: A Global Review of Purchasing & Supply, Vol. 37 No. 3, pp. 28-37.
Niedermayer, D. (2003), “An introduction to Bayesian networks and their contemporary
      applications”, available at: www.niedermayer.ca/papers/bayesian/bayes.html (accessed
      25 March 2010).
O’Dell, C. and Grayson, C.J. (1998a), “If only we knew what we know: identification and transfer
      of internal best practices”, California Management Review, Vol. 40 No. 3, pp. 154-74.
O’Dell, C. and Grayson, C.J. (1998b), If Only We Knew What We Know: The Transfer of Internal
      Knowledge and Best Practice, The Free Press, New York, NY.
Ogden, J.A. and Carter, P.L. (2008), “The supply base reduction process: an empirical
     investigation”, International Journal of Logistics Management, Vol. 19 No. 1, pp. 5-28.
Pai, R., Kallepalli, V., Caudill, R. and Zhou, M. (2003), “Methods toward supply chain risk analysis”,
       IEEE International Conference on Systems, Man and Cybernetics, Vol. 5 No. 1, pp. 4560-5.
Paulsson, U. (2004), “Supply chain risk management”, in Brindley, C. (Ed.), Supply Chain Risk
      Management, Ashgate, Aldershot.
Ravindran, A., Ufuk Bilsel, R. and Wadhwa, V. (2010), “Risk adjusted multicriteria supplier
     selection models with applications”, International Journal of Production Research, Vol. 48
     No. 2, pp. 405-24.
Routroy, S. (2008), “Decision framework for supplier evaluation and selection in supply chain”,
      The ICFAI University Journal of Supply Chain Management, Vol. 5 No. 3, pp. 19-32.
Sawhney, M., Wolcott, R.C. and Arroniz, I. (2006), “The 12 different ways for companies to
     innovate”, Sloan Management Review, Vol. 47 No. 3, pp. 75-81.
Sen, C.G., Sen, S. and Baslıgil, H. (2010), “Pre-selection of suppliers through an integrated fuzzy
      analytic hierarchy process and max-min methodology”, International Journal of
      Production Research, Vol. 48 No. 6, pp. 1603-25.
Sevkli, M. (2010), “An application of the fuzzy ELECTRE method for supplier selection”,
      International Journal of Production Research, Vol. 48 No. 12, pp. 3393-405.
Simatupang, T.M. and Sridharan, R. (2004), “Benchmarking supply chain collaboration:
     an empirical study”, Benchmarking: An International Journal, Vol. 11 No. 5, pp. 484-503.
Slack, N. and Lewis, M. (2001), Operations Strategy, 3rd ed., Prentice-Hall, Harlow.
Soni, G. and Kodali, R. (2010), “Internal benchmarking for assessment of supply chain
      performance”, Benchmarking: An International Journal, Vol. 17 No. 1, pp. 44-76.
Spekman, R.E. and Davis, E.W. (2004), “Risky business: expanding the discussion on risk and the
     extended enterprise”, International Journal of Physical Distribution & Logistics
     Management, Vol. 34 No. 5, pp. 414-33.
BIJ               Suttner, U. (2005), “Supply chain risk management: understanding the business requirements
                         from a practitioner perspective”, The International Journal of Logistics Management,
18,3                     Vol. 16 No. 1, pp. 120-41.
                  Tavana, M., Bourgeois, B.S. and Sodenkamp, M.A. (2009), “Fuzzy multiple criteria base
                         realignment and closure (BRAC) benchmarking system at the Department of Defense”,
                         Benchmarking: An International Journal, Vol. 16 No. 2, pp. 192-221.
424               Treleven, S. and Schweikhart, B. (1988), “A risk/benefit analysis of sourcing strategies: single vs.
                         multiple sourcing”, Journal of Operations Management, Vol. 7 No. 4, pp. 93-114.
                  Wagner, S.M. and Bode, C. (2006), “An empirical investigation into supply chain vulnerability”,
                         Journal of Purchasing & Supply Management, Vol. 12 No. 6, pp. 301-12.
                  Wang, Y.M., Chin, K.S. and Leung, J.P. (2009), “A note on the application of the data envelopment
                         analytic hierarchy process for supplier selection”, International Journal of Production
                         Research, Vol. 47 No. 11, pp. 3121-38.
                  Wu, T., Blackhurst, J. and Appalla, R. (2007a), “AIDEA: a methodology for supplier evaluation
                         and selection in a supplier-based manufacturing environment”, International Journal of
                         Manufacturing Technology & Management, Vol. 11 No. 2, pp. 174-92.
                  Wu, T., Blackhurst, J. and Chidambaram, V. (2006), “A model for inbound supply risk analysis”,
                         Computers in Industry, Vol. 57 No. 4, pp. 350-65.
                  Wu, C.W., Shu, M.H., Pearn, W.L. and Liu, K.H. (2007b), “Bootstrap approach for supplier
                         selection based on production yield”, International Journal of Production Research, Vol. 1
                         No. 20, pp. 1-20.
                  Yates, J.F. and Stone, E. (1992), “The risk construct”, in Yates, J.F. (Ed.), Risk-Taking Behaviour,
                         Wiley, Chichester.
                  Zairi, M. (1994), Measuring Performance for Business Results, Springer, New York, NY, pp. 62-3.
                  Zsidisin, G., Melnyk, S. and Ragatz, G. (2005), “An institutional theory perspective of business
                         continuity planning for purchasing and supply management”, International Journal of
                         Production Research, Vol. 43 No. 16, pp. 3401-20.
                  Appendix 1



                  Behaviors
                  Relationship                                               Supplier revenue from industry segment
                                                                             Influence of revenue from company
                                                                             Supplier/Company alignment
                                                                             Supplier/Company information sharing
                  Performance                                                Accreditation
                                                                             Engineering support
                                                                             Capacity utilization
                                                                             Capacity change
                                                                             Delivery flexibility
                                                                             Manufacturing employees
                                                                             Service promptness
                                                                             MRR
                                                                             Audit date
Table AI.                                                                    Audit score
Risk assessment                                                              On-time delivery
measures                                                                                                 (continued)
Human resources                                    Employee turnover                               Benchmarking
                                                   Senior staff turnover
                                                   Union issues
                                                                                                    supplier risks
                                                   Pay position
Structure
Supply chain disruption                            Market power
                                                   Tier II information sharing
                                                   Tier II performance monitoring                                 425
                                                   Disruption probability
                                                   Risk management system
                                                   Material sourcing base
Financial health                                   Market growth
                                                   Financial risk indicators
Environmental                                      Market dynamics
                                                   Merger and acquisition
                                                   Regulatory
                                                   Disaster
                                                   Transportation
Network                                            Supplier’s customers
                                                   Supplier customer relationships
                                                   Alignment
                                                   Supplier’s supplier
                                                   Supplier vendor relationships
                                                   Vendor concentration
                                                   Code of conduct                                            Table AI.


Appendix 2

Risk category       Risk event                   Risk measures

Network risks       Misalignment of interest     Influence of revenue from company
                                                 Supplier revenue from commodity category
                                                 Supplier/Company Alignment
                                                 Regulatory
                    Supplier financial stress     Customer portfolio
                                                 Business health indicators
                                                 Segment portfolio
                                                 Market growth
                                                 Financial data sharing
                    Supplier leadership change   Company ownership change likelihood
                                                 Merger and acquisition
                                                 Senior staff turnover
                    Tier 2 stoppage              Process change likelihood
                                                 Miscommunication between tiers
                                                 Material change/obsolesce likelihood
                                                 Risk management system
                                                 Material sourcing base
                                                 Market power
                                                 Regulatory
                                                 Regulatory change risk likelihood                            Table AII.
                                                 Inventory status sharing                       Network, operational, and
                                                                                  (continued)     external risk measures
BIJ          Risk category        Risk event                       Risk measures
18,3
                                                                   Tier II supplier information sharing
                                                                   Process/Material change notification
                                  Supplier network misalignment    Supplier customer alignment
                                                                   Vendor concentration
426          Operational risks    Quality problem                  Process change likelihood
                                                                   MRR (defects)
                                                                   Audit date
                                                                   Audit score
                                                                   Tier II performance monitoring
                                                                   Quality problems likelihood
                                                                   Manufacturing employees
                                                                   Accreditation
                                                                   Material change/obsolesce likelihood
                                                                   Process/Material change notification
                                  Delivery problem                 Performance data sharing
                                                                   On-time delivery
                                                                   Capacity utilization
                                                                   Tier II information sharing
                                                                   Delivery flexibility
                                                                   Capacity shortage likelihood
                                                                   Manufacturing employees
                                                                   Capacity change
                                                                   Inventory status sharing
                                                                   Order fulfillment information sharing
                                                                   Production schedule sharing
                                  Service problem                  Engineering support
                                                                   Service promptness
                                                                   Employee turnover
                                                                   Human resource issues likelihood
                                                                   New technology opportunity sharing
                                  Supplier HR problem              Union issues
                                                                   Employee turnover
                                                                   Pay position
             External risks       Supplier locked                  Accreditation information sharing
                                                                   EPA and FDA report sharing
                                                                   Regulatory
                                                                   Accreditation
                                  Merger/divestiture               Market dynamics
                                                                   Merger and acquisition
                                  Disasters                        Supplier is providing proof of insurance
                                                                   Disaster
Table AII.                                                         Transportation

             Appendix 3. Probability of failure Supplier A
             Given the risk event relationships exhibited in the Supplier Bayesian Network illustrated in
             Figure 2 along with the a priori probabilities for risk event variables contained in Table I, the
             following probability computations regarding network risks, operational risks, external risks,
             and failure for Supplier A are provided below:
                                  P
                                   ðProbability of Network Risk EventÞ £ ðProbability of Event OccurrenceÞ
             PðNetwork RisksÞ ¼                     P
                                                      ðProbability of Event OccurrenceÞ
½ð0:20Þ £ ð1ÞŠ þ ½ð0:50Þ £ ð1ÞŠ þ ½ð0:50Þ £ ð1ÞŠ þ ½ð0:31Þ £ ð1ÞŠ þ ½ð0:20Þ £ ð1ÞŠ   Benchmarking
PðNetwork RisksÞ ¼
                                                      1þ1þ1þ1þ1
                                                                                                            supplier risks
                                                         1:71
                                  PðNetwork RisksÞ ¼          ¼ 0:34
                                                           5
                         P
                          ðProbability of Operational Risk EventÞ £ ðProbability of Event OccurrenceÞ
PðOperational RisksÞ ¼                      P
                                               ðProbability of Event OccurrenceÞ                                     427
                            ½ð0:46Þ £ ð1ÞŠ þ ½ð1:00Þ £ ð1ÞŠ þ ½ð0:20Þ £ ð1ÞŠ þ ½ð0:20Þ £ ð1ÞŠ
     PðOperational RisksÞ ¼
                                                     1þ1þ1þ1
                                                      1:86
                            PðOperational RisksÞ ¼          ¼ 0:47
                                                        4
                      P
                       ðProbability of External Risk EventÞ £ ðProbability of Event OccurrenceÞ
PðExternal RisksÞ ¼                     P
                                           ðProbability of Event OccurrenceÞ

                                        ½ð0:18 £ ð1ÞŠ þ ½ð1:00Þ £ ð1ÞŠ þ ½ð0:11Þ £ ð1ÞŠ
                PðExternal RisksÞ ¼
                                                          1þ1þ1
                                                         1:29
                                  PðExternal RisksÞ ¼         ¼ 0:43
                                                           3
               P
                ½PðNRÞ £ PðOccurrenceÞŠ þ ½PðORÞ £ PðOccurrenceÞŠ þ ½PðERÞ £ PðOccurrenceÞŠ
PðFailureÞ ¼                       P
                                     ðProbability of Risk OccurrenceÞ

                                   ½ð0:34 £ ð1ÞŠ þ ½ð0:47Þ £ ð1ÞŠ þ ½ð0:43Þ £ ð1ÞŠ
                    PðFailureÞ ¼
                                                     1þ1þ1

                                                     1:24
                                      PðFailureÞ ¼        ¼ 0:41
                                                       3

About the author
Archie Lockamy III, PhD, Certified Fellow in Production and Inventory Management (CFPIM) is
the Margaret Gage Bush Professor of Business and Professor of Operations Management at
Samford University. Prior to his academic career, Dr Lockamy held various engineering and
managerial positions with Du Pont, Procter and Gamble, and TRW. Dr Lockamy has published
research articles in numerous academic journals, and co-authored the book Reengineering
Performance Measurement: How to Align Systems to Improve Processes, Products and Profits.
Dr Lockamy served on the 1997, 1998, 1999, 2000, 2001, and 2002 Board of Examiners for the
Malcolm Baldrige National Quality Award via appointment by the United States Department of
Commerce. He also served as Vice President of the Board of Directors of the American
Production and Inventory Control Society (APICS) Educational and Research Foundation.
Dr Lockamy is recognized as a CFPIM by APICS, and is certified as an Academic Jonah by the
Avraham Y. Goldratt Institute. Archie Lockamy III can be contacted at: aalockam@samford.edu




To purchase reprints of this article please e-mail: reprints@emeraldinsight.com
Or visit our web site for further details: www.emeraldinsight.com/reprints

More Related Content

What's hot

which supply chain strategies can guarantee higher manufacturer’s operational...
which supply chain strategies can guarantee higher manufacturer’s operational...which supply chain strategies can guarantee higher manufacturer’s operational...
which supply chain strategies can guarantee higher manufacturer’s operational...INFOGAIN PUBLICATION
 
Gartner the healthcare supply chain top 25 for 2014
Gartner the healthcare supply chain top 25 for 2014Gartner the healthcare supply chain top 25 for 2014
Gartner the healthcare supply chain top 25 for 2014Utkan Uluçay, MSc., CDDP
 
Collaborative performance
Collaborative performanceCollaborative performance
Collaborative performanceNeeraj Jaiswal
 
Beatson DDU Fragment Lbrary Design Poster
Beatson DDU Fragment Lbrary Design PosterBeatson DDU Fragment Lbrary Design Poster
Beatson DDU Fragment Lbrary Design PosterAngelo Pugliese
 
Mc kinsey- building new strenghts in healthcare supply chain
Mc kinsey- building new strenghts in healthcare supply chainMc kinsey- building new strenghts in healthcare supply chain
Mc kinsey- building new strenghts in healthcare supply chainUtkan Uluçay, MSc., CDDP
 
IRJET- A Survey on Recommender Systems used for User Service Rating in Social...
IRJET- A Survey on Recommender Systems used for User Service Rating in Social...IRJET- A Survey on Recommender Systems used for User Service Rating in Social...
IRJET- A Survey on Recommender Systems used for User Service Rating in Social...IRJET Journal
 

What's hot (8)

which supply chain strategies can guarantee higher manufacturer’s operational...
which supply chain strategies can guarantee higher manufacturer’s operational...which supply chain strategies can guarantee higher manufacturer’s operational...
which supply chain strategies can guarantee higher manufacturer’s operational...
 
Healthcare Performance Benchmarks
Healthcare Performance BenchmarksHealthcare Performance Benchmarks
Healthcare Performance Benchmarks
 
Gartner the healthcare supply chain top 25 for 2014
Gartner the healthcare supply chain top 25 for 2014Gartner the healthcare supply chain top 25 for 2014
Gartner the healthcare supply chain top 25 for 2014
 
Scm edit
Scm editScm edit
Scm edit
 
Collaborative performance
Collaborative performanceCollaborative performance
Collaborative performance
 
Beatson DDU Fragment Lbrary Design Poster
Beatson DDU Fragment Lbrary Design PosterBeatson DDU Fragment Lbrary Design Poster
Beatson DDU Fragment Lbrary Design Poster
 
Mc kinsey- building new strenghts in healthcare supply chain
Mc kinsey- building new strenghts in healthcare supply chainMc kinsey- building new strenghts in healthcare supply chain
Mc kinsey- building new strenghts in healthcare supply chain
 
IRJET- A Survey on Recommender Systems used for User Service Rating in Social...
IRJET- A Survey on Recommender Systems used for User Service Rating in Social...IRJET- A Survey on Recommender Systems used for User Service Rating in Social...
IRJET- A Survey on Recommender Systems used for User Service Rating in Social...
 

Viewers also liked

1.hedge your
1.hedge your1.hedge your
1.hedge yourlibfsb
 
6.applied qualimetry
6.applied qualimetry 6.applied qualimetry
6.applied qualimetry libfsb
 
4.easy ways
4.easy ways4.easy ways
4.easy wayslibfsb
 
3.directing the
3.directing the3.directing the
3.directing thelibfsb
 
5.terms of
5.terms of5.terms of
5.terms oflibfsb
 
5.benchmarking of
5.benchmarking of5.benchmarking of
5.benchmarking oflibfsb
 
5.an integrated
5.an integrated5.an integrated
5.an integratedlibfsb
 
7.a more
7.a more7.a more
7.a morelibfsb
 
1.benchmarking procurement
1.benchmarking procurement1.benchmarking procurement
1.benchmarking procurementlibfsb
 

Viewers also liked (10)

1.hedge your
1.hedge your1.hedge your
1.hedge your
 
6.applied qualimetry
6.applied qualimetry 6.applied qualimetry
6.applied qualimetry
 
4.easy ways
4.easy ways4.easy ways
4.easy ways
 
3.directing the
3.directing the3.directing the
3.directing the
 
5.terms of
5.terms of5.terms of
5.terms of
 
5.benchmarking of
5.benchmarking of5.benchmarking of
5.benchmarking of
 
5.an integrated
5.an integrated5.an integrated
5.an integrated
 
7.a more
7.a more7.a more
7.a more
 
1.benchmarking procurement
1.benchmarking procurement1.benchmarking procurement
1.benchmarking procurement
 
Benchmarking
BenchmarkingBenchmarking
Benchmarking
 

Similar to 5.benchmarking supplier

6.supply chain 2
6.supply chain 26.supply chain 2
6.supply chain 2libfsb
 
Relationships among Supplier Selection Criteria using Interpretive Structural...
Relationships among Supplier Selection Criteria using Interpretive Structural...Relationships among Supplier Selection Criteria using Interpretive Structural...
Relationships among Supplier Selection Criteria using Interpretive Structural...inventionjournals
 
Operation Management Strategies .docx
Operation Management Strategies                                   .docxOperation Management Strategies                                   .docx
Operation Management Strategies .docxhopeaustin33688
 
IRJET- Analysis of Rating Difference and User Interest
IRJET- Analysis of Rating Difference and User InterestIRJET- Analysis of Rating Difference and User Interest
IRJET- Analysis of Rating Difference and User InterestIRJET Journal
 
Managing Uncertainty in Fashion Supply Chains: An AI-Based Analysis of Demand...
Managing Uncertainty in Fashion Supply Chains: An AI-Based Analysis of Demand...Managing Uncertainty in Fashion Supply Chains: An AI-Based Analysis of Demand...
Managing Uncertainty in Fashion Supply Chains: An AI-Based Analysis of Demand...IRJET Journal
 
The Importance of Supply Network Development and Firm’s Capabilities in Build...
The Importance of Supply Network Development and Firm’s Capabilities in Build...The Importance of Supply Network Development and Firm’s Capabilities in Build...
The Importance of Supply Network Development and Firm’s Capabilities in Build...YogeshIJTSRD
 
A Review Of Multi-Criteria Decision Making Techniques For Supplier Evaluation...
A Review Of Multi-Criteria Decision Making Techniques For Supplier Evaluation...A Review Of Multi-Criteria Decision Making Techniques For Supplier Evaluation...
A Review Of Multi-Criteria Decision Making Techniques For Supplier Evaluation...Steven Wallach
 
The Hazards of Sole Sourcing RelationshipsChallenges, Pract.docx
The Hazards of Sole Sourcing RelationshipsChallenges, Pract.docxThe Hazards of Sole Sourcing RelationshipsChallenges, Pract.docx
The Hazards of Sole Sourcing RelationshipsChallenges, Pract.docxarnoldmeredith47041
 
Vendor Governance - Alyne Operational & Cyber Resilience White Paper (part 2)
Vendor Governance  -  Alyne Operational & Cyber Resilience White Paper (part 2)Vendor Governance  -  Alyne Operational & Cyber Resilience White Paper (part 2)
Vendor Governance - Alyne Operational & Cyber Resilience White Paper (part 2)Richard Brooks
 
MOVIE RECOMMENDATION SYSTEM
MOVIE RECOMMENDATION SYSTEMMOVIE RECOMMENDATION SYSTEM
MOVIE RECOMMENDATION SYSTEMIRJET Journal
 
IRJET- E-commerce Recommendation System
IRJET- E-commerce Recommendation SystemIRJET- E-commerce Recommendation System
IRJET- E-commerce Recommendation SystemIRJET Journal
 
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docxRunning head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docxjeanettehully
 
worku ppt (proposal).pptx
worku ppt (proposal).pptxworku ppt (proposal).pptx
worku ppt (proposal).pptxBetshaTizazu
 
Concept of Semantic Information Pool for manufacturing supply networks
Concept of Semantic Information Pool for manufacturing supply networksConcept of Semantic Information Pool for manufacturing supply networks
Concept of Semantic Information Pool for manufacturing supply networksMilan Zdravković
 
Automatic Recommendation of Trustworthy Users in Online Product Rating Sites
Automatic Recommendation of Trustworthy Users in Online Product Rating SitesAutomatic Recommendation of Trustworthy Users in Online Product Rating Sites
Automatic Recommendation of Trustworthy Users in Online Product Rating SitesIRJET Journal
 
White paper rx-360 - all-around security for pharmaceutical supply chains (...
White paper   rx-360 - all-around security for pharmaceutical supply chains (...White paper   rx-360 - all-around security for pharmaceutical supply chains (...
White paper rx-360 - all-around security for pharmaceutical supply chains (...okkinga
 
Supply Chain and Production Cost of Brewing Plants in South East, Nigeria
Supply Chain and Production Cost of Brewing Plants in South East, NigeriaSupply Chain and Production Cost of Brewing Plants in South East, Nigeria
Supply Chain and Production Cost of Brewing Plants in South East, NigeriaYogeshIJTSRD
 

Similar to 5.benchmarking supplier (20)

6.supply chain 2
6.supply chain 26.supply chain 2
6.supply chain 2
 
Relationships among Supplier Selection Criteria using Interpretive Structural...
Relationships among Supplier Selection Criteria using Interpretive Structural...Relationships among Supplier Selection Criteria using Interpretive Structural...
Relationships among Supplier Selection Criteria using Interpretive Structural...
 
Operation Management Strategies .docx
Operation Management Strategies                                   .docxOperation Management Strategies                                   .docx
Operation Management Strategies .docx
 
Modeling Supply Chain
Modeling Supply ChainModeling Supply Chain
Modeling Supply Chain
 
IRJET- Analysis of Rating Difference and User Interest
IRJET- Analysis of Rating Difference and User InterestIRJET- Analysis of Rating Difference and User Interest
IRJET- Analysis of Rating Difference and User Interest
 
Evaluation and selection of supplier in supply chain with fuzzy analytical ne...
Evaluation and selection of supplier in supply chain with fuzzy analytical ne...Evaluation and selection of supplier in supply chain with fuzzy analytical ne...
Evaluation and selection of supplier in supply chain with fuzzy analytical ne...
 
Managing Uncertainty in Fashion Supply Chains: An AI-Based Analysis of Demand...
Managing Uncertainty in Fashion Supply Chains: An AI-Based Analysis of Demand...Managing Uncertainty in Fashion Supply Chains: An AI-Based Analysis of Demand...
Managing Uncertainty in Fashion Supply Chains: An AI-Based Analysis of Demand...
 
The Importance of Supply Network Development and Firm’s Capabilities in Build...
The Importance of Supply Network Development and Firm’s Capabilities in Build...The Importance of Supply Network Development and Firm’s Capabilities in Build...
The Importance of Supply Network Development and Firm’s Capabilities in Build...
 
A Review Of Multi-Criteria Decision Making Techniques For Supplier Evaluation...
A Review Of Multi-Criteria Decision Making Techniques For Supplier Evaluation...A Review Of Multi-Criteria Decision Making Techniques For Supplier Evaluation...
A Review Of Multi-Criteria Decision Making Techniques For Supplier Evaluation...
 
The Hazards of Sole Sourcing RelationshipsChallenges, Pract.docx
The Hazards of Sole Sourcing RelationshipsChallenges, Pract.docxThe Hazards of Sole Sourcing RelationshipsChallenges, Pract.docx
The Hazards of Sole Sourcing RelationshipsChallenges, Pract.docx
 
Vendor Governance - Alyne Operational & Cyber Resilience White Paper (part 2)
Vendor Governance  -  Alyne Operational & Cyber Resilience White Paper (part 2)Vendor Governance  -  Alyne Operational & Cyber Resilience White Paper (part 2)
Vendor Governance - Alyne Operational & Cyber Resilience White Paper (part 2)
 
MOVIE RECOMMENDATION SYSTEM
MOVIE RECOMMENDATION SYSTEMMOVIE RECOMMENDATION SYSTEM
MOVIE RECOMMENDATION SYSTEM
 
IRJET- E-commerce Recommendation System
IRJET- E-commerce Recommendation SystemIRJET- E-commerce Recommendation System
IRJET- E-commerce Recommendation System
 
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docxRunning head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
 
worku ppt (proposal).pptx
worku ppt (proposal).pptxworku ppt (proposal).pptx
worku ppt (proposal).pptx
 
Concept of Semantic Information Pool for manufacturing supply networks
Concept of Semantic Information Pool for manufacturing supply networksConcept of Semantic Information Pool for manufacturing supply networks
Concept of Semantic Information Pool for manufacturing supply networks
 
Automatic Recommendation of Trustworthy Users in Online Product Rating Sites
Automatic Recommendation of Trustworthy Users in Online Product Rating SitesAutomatic Recommendation of Trustworthy Users in Online Product Rating Sites
Automatic Recommendation of Trustworthy Users in Online Product Rating Sites
 
Sub1582
Sub1582Sub1582
Sub1582
 
White paper rx-360 - all-around security for pharmaceutical supply chains (...
White paper   rx-360 - all-around security for pharmaceutical supply chains (...White paper   rx-360 - all-around security for pharmaceutical supply chains (...
White paper rx-360 - all-around security for pharmaceutical supply chains (...
 
Supply Chain and Production Cost of Brewing Plants in South East, Nigeria
Supply Chain and Production Cost of Brewing Plants in South East, NigeriaSupply Chain and Production Cost of Brewing Plants in South East, Nigeria
Supply Chain and Production Cost of Brewing Plants in South East, Nigeria
 

More from libfsb

Principles of food beverage and labor cost controls
Principles of food  beverage  and labor cost controlsPrinciples of food  beverage  and labor cost controls
Principles of food beverage and labor cost controlslibfsb
 
Principles of food beverage and labor cost controls
Principles of food  beverage  and labor cost controlsPrinciples of food  beverage  and labor cost controls
Principles of food beverage and labor cost controlslibfsb
 
Foodbeverage
FoodbeverageFoodbeverage
Foodbeveragelibfsb
 
Food and beverage_operations
Food and beverage_operationsFood and beverage_operations
Food and beverage_operationslibfsb
 
Food safety basics a reference guide for foodservice operators
Food safety basics a reference guide for foodservice operatorsFood safety basics a reference guide for foodservice operators
Food safety basics a reference guide for foodservice operatorslibfsb
 
The bar & beverage book
The bar & beverage bookThe bar & beverage book
The bar & beverage booklibfsb
 
The bar & beverage book
The bar & beverage bookThe bar & beverage book
The bar & beverage booklibfsb
 
Introduction.to.management.in.the.hospitality.industry.10th.edition
Introduction.to.management.in.the.hospitality.industry.10th.editionIntroduction.to.management.in.the.hospitality.industry.10th.edition
Introduction.to.management.in.the.hospitality.industry.10th.editionlibfsb
 
Hotel front office management 3rd edition
Hotel front office management 3rd editionHotel front office management 3rd edition
Hotel front office management 3rd editionlibfsb
 
4.the singularity
4.the singularity4.the singularity
4.the singularitylibfsb
 
3.great profits
3.great profits3.great profits
3.great profitslibfsb
 
2.pleasing all
2.pleasing all2.pleasing all
2.pleasing alllibfsb
 
1.the recession,
1.the recession,1.the recession,
1.the recession,libfsb
 
9.greener library
9.greener library9.greener library
9.greener librarylibfsb
 
8.moving on
8.moving on 8.moving on
8.moving on libfsb
 
7.let them
7.let them7.let them
7.let themlibfsb
 
6.dealing with
6.dealing with6.dealing with
6.dealing withlibfsb
 
5.the management
5.the management5.the management
5.the managementlibfsb
 
4.making the
4.making the4.making the
4.making thelibfsb
 
2.free electronic
2.free electronic2.free electronic
2.free electroniclibfsb
 

More from libfsb (20)

Principles of food beverage and labor cost controls
Principles of food  beverage  and labor cost controlsPrinciples of food  beverage  and labor cost controls
Principles of food beverage and labor cost controls
 
Principles of food beverage and labor cost controls
Principles of food  beverage  and labor cost controlsPrinciples of food  beverage  and labor cost controls
Principles of food beverage and labor cost controls
 
Foodbeverage
FoodbeverageFoodbeverage
Foodbeverage
 
Food and beverage_operations
Food and beverage_operationsFood and beverage_operations
Food and beverage_operations
 
Food safety basics a reference guide for foodservice operators
Food safety basics a reference guide for foodservice operatorsFood safety basics a reference guide for foodservice operators
Food safety basics a reference guide for foodservice operators
 
The bar & beverage book
The bar & beverage bookThe bar & beverage book
The bar & beverage book
 
The bar & beverage book
The bar & beverage bookThe bar & beverage book
The bar & beverage book
 
Introduction.to.management.in.the.hospitality.industry.10th.edition
Introduction.to.management.in.the.hospitality.industry.10th.editionIntroduction.to.management.in.the.hospitality.industry.10th.edition
Introduction.to.management.in.the.hospitality.industry.10th.edition
 
Hotel front office management 3rd edition
Hotel front office management 3rd editionHotel front office management 3rd edition
Hotel front office management 3rd edition
 
4.the singularity
4.the singularity4.the singularity
4.the singularity
 
3.great profits
3.great profits3.great profits
3.great profits
 
2.pleasing all
2.pleasing all2.pleasing all
2.pleasing all
 
1.the recession,
1.the recession,1.the recession,
1.the recession,
 
9.greener library
9.greener library9.greener library
9.greener library
 
8.moving on
8.moving on 8.moving on
8.moving on
 
7.let them
7.let them7.let them
7.let them
 
6.dealing with
6.dealing with6.dealing with
6.dealing with
 
5.the management
5.the management5.the management
5.the management
 
4.making the
4.making the4.making the
4.making the
 
2.free electronic
2.free electronic2.free electronic
2.free electronic
 

5.benchmarking supplier

  • 1. The current issue and full text archive of this journal is available at www.emeraldinsight.com/1463-5771.htm Benchmarking Benchmarking supplier risks supplier risks using Bayesian networks Archie Lockamy III Brock School of Business, Samford University, Birmingham, Alabama, USA 409 Abstract Purpose – The purpose of this paper is to provide a methodology for benchmarking supplier risks through the creation of Bayesian networks. The networks are used to determine a supplier’s external, operational, and network risk probability to assess its potential impact on the buyer organization. Design/methodology/approach – The research methodology includes the use of a risk assessment model, surveys, data collection from internal and external sources, and the creation of Bayesian networks used to create risk profiles for the study participants. Findings – It is found that Bayesian networks can be used as an effective benchmarking tool to assist managers in making decisions regarding current and prospective suppliers based upon their potential impact on the buyer organization, as illustrated through their associated risk profiles. Research limitations/implications – A potential limitation to the use of the methodology presented in the study is the ability to acquire the necessary data from current and potential suppliers needed to construct the Bayesian networks. Practical implications – The methodology presented in this paper can be used by buyer organizations to benchmark supplier risks in supply chain networks, which may lead to adjustments to existing risk management strategies, policies, and tactics. Originality/value – This paper provides practitioners with an additional tool for benchmarking supplier risks. Additionally, it provides the foundation for future research studies in the use of Bayesian networks for the examination of supplier risks. Keywords Benchmarking, Suppliers, Risk management, Bayesian statistical decision theory Paper type Research paper 1. Introduction In order to mitigate the effects of increasing levels of global competition, demanding customers and employees, shrinking product lifecycles, and decreasing acceptable response times on success in the market place, many organizations have become members of formalized extended enterprises known as supply chains. These structures can be described as organizational networks designed to help firms achieve a competitive advantage through improved market responsiveness and cost reductions. Additionally, supply chains can provide organizations with a means for promoting business innovation through the adoption of streamlined information flows, restructured business processes, and enhanced collaboration among network members (Sawhney et al., 2006). As organizations increase their dependence on supply chain networks, they become more susceptible to their suppliers’ risk profiles. Supplier risk profiles consist of risk events that can have an adverse impact on buyer organizations. Risk events are incidents whose occurrences result in the disruption of overall supply chain Benchmarking: An International performance. Although it is often not possible to precisely predict the occurrence of such Journal Vol. 18 No. 3, 2011 events, it is possible to evaluate the probability of their occurrence through the creation pp. 409-427 of supplier risk profiles. Therefore, it is essential that buyer organizations have the q Emerald Group Publishing Limited 1463-5771 ability to internally benchmark the level of risk associated with suppliers currently DOI 10.1108/14635771111137787
  • 2. BIJ contained in their networks. In addition, these organizations must possess the means to 18,3 assess risk levels associated with potential members of their supply networks. 1.1 Purpose The purpose of this article is to provide a methodology for benchmarking supplier risks through the creation of Bayesian networks. These networks are used to determine 410 a supplier’s external, operational, and network risk probability for the creation of supplier risk profiles. These risk profiles can be used to assess a supplier’s potential impact on the buyer organization. Thus, the methodology is proposed as an analytical tool to assist organizations in benchmarking risk levels associated with current and prospective suppliers based upon their associated risk profiles. 1.2 Organization The first section of the article provided its motivation and purpose. A review of the literature pertaining to benchmarking and supply chain risks is provided in Section 2 to provide a theoretical basis for the proposed methodology. Section 3 contains an overview of the research methodology used in this study which includes a discussion on Bayesian networks and data collection procedures. Results and conclusions are then offered in Sections 4 and 5, respectively. Finally, Section 6 provides a discussion on implications regarding study limitations and directions for future research. 2. Literature review Benchmarking can be described as a framework within which indicators and best practices are examined in order to determine potential areas of improvement for an organization (Tavana et al., 2009). In his taxonomy, Zairi (1994) identified the following types of benchmarking: internal, competitive, functional, and generic. O’Dell and Grayson (1998a, b) defined internal benchmarking as “the process of identifying, sharing, and using the knowledge and practices inside one’s own organization.” Christopher (1998) characterized supply chains as organizational networks linked through upstream and downstream processes and activities that produce value in the form of products and services delivered to the hands of the ultimate customer. A prerequisite to effective supply chain management is the alignment of functional and supply chain partner activities with firm strategies which are congruent with organizational structures, processes, cultures, incentives, and people (Abell, 1999). Thus, it is imperative that buyer organizations have the ability to internally benchmark the capabilities and performance of its suppliers within the supply chain network to ensure that supplier activities support the strategic and operational intent of the network. 2.1 Supplier benchmarking Supplier benchmarking has been used in the selection of suppliers (Choy et al., 2003; Lau et al., 2006; Che and Wang, 2008), supply base reduction processes (Ogden and Carter, 2008), and in the assessment of supplier capabilities (Feeny et al., 2005) and performance (Forker and Mendez, 2001; Narasimhan et al., 2001; Bardy, 2010). Supplier benchmarking techniques employed by organizations include artificial intelligence tools (Lau et al., 2006), neural networks (Choy et al., 2003), mathematical models (Che and Wang, 2008), and other analytical techniques (Forker and Mendez, 2001; Farzippor Saen, 2008). Owing to the integrative and collaborative nature of supply chain networks,
  • 3. Gunasekaran et al. (2001) notes that internal benchmarking among supply chain Benchmarking members is necessary in order to monitor interactive performance drivers and to ensure that the network is capability of achieving individual and shared performance targets. supplier risks Soni and Kodali (2010) argue that the internal benchmarking of supply chains is necessary to reduce performance variability among supply chains of the same focal firm. However, given the dynamic nature of supply chains due to their compositional changes over time along with environmental changes, it is equally important to 411 internally benchmark collaborative as well as relative individual performance among all chain members for effective supply chain management (Li and Dai, 2009). Such activities facilitate improvements in information sharing, decision synchronization, incentive alignment, and overall supply chain collaboration practices among its membership (Simatupang and Sridharan, 2004). Supplier benchmarking can be used as a tool to reveal improvement opportunities within a supply chain for increased supply chain management effectiveness (Esain, 2000). The benefits of effective supply chain management include enhanced customer satisfaction and value, along with improved supply chain reactivity (Gaudenzi and Borghesi, 2006). Supply chain reactivity refers to the network’s ability to compress lead times, adapt to unanticipated changes in demand, and to cope with environmental uncertainty in the market place. However, the interdependencies created among participating organizations via integrated supply chain networks make them more vulnerable to supply chain disruptions, thus increasing risks. 2.2 Supplier selection and evaluation Foster and Whiteman (2006) note that there has been a trend towards developing closer working relationships with fewer suppliers within supply chain networks, resulting in improved supplier performance. Additionally, Choi and Kim (2008) suggest that buyer organizations must be not only concerned with a supplier’s performance within its immediate supply chain network, but also its performance within its own supply network. Therefore, it is increasingly important for buyer organizations to develop the capacity to systematically select suppliers as members of its network that are capable of meeting or exceeding individual and shared performance objectives. In addition, these organizations must possess the means to routinely evaluate the performance of the members of their supply networks. There are a variety of supplier selection and evaluation methodologies offered in the research literature, which include the use of the analytic hierarchy process (Routroy, 2008), data envelop analysis (Wu et al., 2007a; Wang et al., 2009), fuzzy systems (Jain et al., 2007; Sen et al., 2010; Sevkli, 2010), multiple regression analysis (Lasch, 2005; Inemek, 2009), and process capability analysis (Chen and Chen, 2006; Wu et al., 2007b). Recently, sustainability and environmental requirements have become a part of the supplier selection and evaluation protocol for a growing number of organizations (Jabbour and Jabbour, 2009). Finally, as organizations continue to increase their level of risk via interdependencies created by integrated supply chain networks, researchers have begun to develop risk-based analytical approaches to supplier selection and evaluation (Guido, 2008; Lee, 2009; Ravindran et al., 2010). 2.3 Supply chain risks Spekman and Davis (2004) define risk as the probability of variance in an expected outcome. Therefore, it is possible to quantify risk since it is possible to assign
  • 4. BIJ probability estimates to these outcomes (Khan and Burnes, 2007). On the contrary, 18,3 uncertainty is not quantifiable and the probabilities of the possible outcomes are not known (Knight, 1921). A joint evaluation of risk and uncertainty conducted by Yates and Stone (1992) suggests that risk implies the existence of uncertainty associated with a given outcome, for if the probability of an outcome is known, there is no risk. Thus, uncertainty can be regarded as a key determinant of risk that may not be entirely 412 eradicated, but can be mitigated through the deployment of risk reduction action steps (Slack and Lewis, 2001). In business situations, managers are expected to reduce the organization’s exposure to uncertainty through the deployment of effective risk management strategies. Internal and external uncertainties both provide sources for supply chain risks (Cucchiella and Gastaldi, 2006). Changes in capacity availability, interruptions in information flows, and reductions in operational efficiencies are all possible sources of internal uncertainty. External sources of uncertainty leading to increased supply chain risks include the actions of competitors, price fluctuations, changes in the political environment, and variations in supplier quality. These sources of uncertainty can be considered “risk events” that can lead to supply chain disruptions which inhibit performance. Thus, it is necessary for managers to first understand the various categories of risks along with the events and conditions that drive them before they attempt to devise approaches to reduce supply chain risks (Chopra and Sodhi, 2004). The research literature offers a variety of approaches for categorizing risks in supply chain networks. For example, Treleven and Schweikhart (1988) have classified supply chain risk events based upon their association with the following: supply chain disruptions; price fluctuations; inventory and scheduling changes, technology advancements, and quality issues. Kleindorfer and Wassenhove (2003) designated supply chain co-ordination and supply disruptions as categories of supply chain risks, while Zsidisin et al. (2005) defined supply risk as the probability of an incident associated with inbound supply from individual supplier failures or the supply market occurring, in which its outcomes result in the inability of the purchasing firm to meet customer demand or cause threats to customer life and safety. Paulsson (2004) classified supply chain risks as operational disturbances, tactical disruptions, and strategic uncertainties. Giunipero and Eltantawy (2004) categorized these risks based upon conditions which result in their creation, such as political events, product availability, transportation distances, changes in technology and labor markets, financial instability, and management turnover. Supply chain disruptions, delays, systems, forecasts, intellectual property, procurement, receivables, inventory, and capacity are classifications for supply chain risks offered by Chopra and Sodhi (2004). Several researchers have chosen to categorize supply chain risks in the following manner: demand-side risks resulting from disruptions emerging from downstream supply chain operations (Suttner, 2005); supply-side risks residing in purchasing, supplier activities, and supplier relationships (Wu et al., 2006); and catastrophic risks that, when they materialize, have a severe impact in terms of magnitude in the area of their occurrence (Wagner and Bode, 2006). Nagurney et al. (2005) defined demand-side risk as the uncertainty surrounding the random demands that often occur at the retailer stage of the supply chain. Wu et al. (2006) states that inbound supply risk is defined as the potential occurrence of an incident associated with inbound supply from individual supplier failures or the supply market resulting in the inability of the purchasing firm to meet
  • 5. customer demand, and as involving the potential occurrence of events associated with Benchmarking inbound supply that can have significant detrimental effects on the purchasing firm. supplier risks Handfield and McCormack (2007) defined operational, network, and external factors as categories of supply chain risks. Operational risk is defined as the risk of loss resulting from inadequate or failed internal processes, people or systems. Quality, delivery, and service problems are examples of operational risks. Network risk is defined as risk resulting from the structure of the supplier network, such as ownership, 413 individual supplier strategies, and supply network agreements. External risk is defined as an event driven by external forces such as weather, earthquakes, political, regulatory, and market forces. In addition, the authors offer three perspectives for the examination of risks within supply chain networks. A supplier facing perspective examines the network of suppliers, their markets and their relationship relative to the organization. A customer facing perspective examines the network of customers and intermediaries, their markets and their relationships also relative to the organization. Finally, an internal facing perspective examines the company, their network of assets, processes, products, systems, and people as well as the company’s markets. This research study employs the risk categories offered by Handfield and McCormack along with the supplier facing perspective in the analysis of supply chain risk. 3. Research methodology The research methodology for this study includes the use of a risk assessment model, surveys, data collection from internal and external company sources, and the creation of Bayesian networks used to create risk profiles for the study participants. Following is an overview of Bayesian networks, along with a discussion of the assessment model and study sample collection procedures. 3.1 Bayesian networks A Bayesian network is an annotated directed acyclic graph that encodes probabilistic relationships among nodes of interest in an uncertain reasoning problem (Pai et al., 2003). The representation describes these probabilistic relationships and includes a qualitative structure that facilitates communication between a user and a system incorporating a probabilistic model. Bayesian networks are based on the work of the mathematician and theologian Rev. Thomas Bayes who worked with conditional probability theory in the late 1700s to discover a basic law of probability which came to be known as Bayes’ theorem. Bayes’ theorem states that: PðHjcÞ £ PðEjH; cÞ PðHjE; cÞ ¼ PðEjcÞ The posterior probability is given by the left-hand term of the equation [P(HjE, c)]. It represents the probability of hypothesis H after considering the effect of evidence E on past experience c. The term P(Hjc) is the a priori probability of H given c alone. Thus, the a priori probability can be viewed as the subjective belief of occurrence of hypothesis H based upon past experience. The likelihood, represented by the term P(EjH,c), gives the probability of the evidence assuming the hypothesis H and the background information c is true. The term P(Ejc) is independent of H and is regarded as a normalizing or scaling factor (Niedermayer, 2003). Thus, Bayesian networks provide a methodology for combining subjective beliefs with available evidence.
  • 6. BIJ Bayesian networks represent a special class of graphical models that may be used to 18,3 depict causal dependencies between random variables (Cowell et al., 2007). Graphical models use a combination of probability theory and graph theory in the statistical modeling of complex interactions between such variables. Bayesian networks have evolved as a useful tool in analyzing uncertainty. When Bayesian networks were first introduced, assigning the full probability distributions manually was time intensive. 414 Solving a Bayesian network with a considerable number of nodes is known to be a nondeterministic polynomial time hard [NP hard] problem (Dagum and Luby, 1993). However, significant advancements in computational capability along with the development of heuristic search techniques to find events with the highest probability have enhanced the development and understanding of Bayesian networks. Correspondingly, the Bayesian computational concept has become an emergent tool for a wide range of risk management applications (Cowell et al., 2007). The methodology has been shown to be especially useful when information about past and/or current situations is vague, incomplete, conflicting, and uncertain. 3.2 Assessment model The study participants are comprised of ten casting suppliers to a major US automotive company. An assessment model developed by Handfield and McCormack (2007) was used to evaluate the risk of each supplier. This model incorporates data from several sources to provide a 360 degree view of a supplier’s risk profile. The risk assessment model is shown in Figure 1. The risk assessment model identifies and quantifies the risk of a supply disruption using a framework that describes the attributes of suppliers, their relationships, and their interactions with the organization performing the assessment. The model consists of: relationship factors (influence, levels of cooperation, power, alignment of interests); past performance (quality, on-time delivery, shortages); human resource factors (unionization, relationship with employees, level of pay compared to the norm); supply chain disruptions history; environment (geographic, political, shipping distance and method, market dynamics); disaster history (hurricane, earthquake, tornado, flood); and financial factors (ownership, funding, payables, receivables). The assessment model uses a set of measures and scales that apply to each risk construct. The model was tested with several companies over a four year period, and validated through actual use in assessing supply risk events. The measures and scales are used to evaluate suppliers, and to provide a numerical score that reflects their individual risk of a disruptive event. A supplier risk profile is then created, expressed as a numerical score given as a result of applying the model and measures. The higher the risk profile score, the higher the supplier’s disruption potential to the supply chain. Appendix 1 contains the actual measures used in this study. In order to apply the risk results to potential events, the survey results were reorganized into operational, network and external risk-related measures, and the results were recalculated for each supplier. The reorganized measures are presented in Appendix 2. 3.3 Study participants The study participants consist of ten automotive casting suppliers to a major automotive company in the US The sample data was collected by first interviewing the supplier’s account representative to discuss the study and the internet-based survey.
  • 7. Interactions and Benchmarking relationships supplier risks Performance S Relationship 415 The customer’s reputation with S suppliers is also a critical factor S S SC network organizer S Supplier environment Environmental S Supplier attributes Geographic, market, transportation, etc. Human resources S Supply chain disruption Figure 1. Financial Risk assessment model Health Subsequently, the survey instrument web link was sent in an email to the supplier’s account representative. The account representative completed the survey, supplier historical performance data was evaluated, and an internal analyst conducted an environmental analysis of the organization. All risk ratings were assessed using a five-point Likert scale, and a risk index was calculated for each supplier. In addition, each supplier provided a priori probabilities for 12 risk events identified in Appendix 2. The a priori probabilities were determined by a team of company personnel familiar with the identified risk events as they relate to the ten suppliers. By logically examining the information, the team was able to estimate a priori probability values pertaining to 12 risk events for each supplier. These probabilities provided the basis for the construction of Bayesian networks used in the creation of supplier risk profiles. 4. Results Bayesian networks were developed to examine the probability of a failure for ten suppliers in the company’s casting supply chain. Network, operational, and external risk levels were computed using the provided a priori probabilities for the identified risk events. A depiction of the Bayesian networks used in this study is shown in Figure 2.
  • 8. BIJ 18,3 1 2 3 4 5 6 7 8 9 10 11 12 416 Network Operational External risks risks risks Supplier failure Figure 2. Notes: Network key: 1 = misalignment of interest; 2 =supplier financial stress; 3 = supplier leadership Bayesian network change; 4 = tier 2 stoppage; 5 = supplier network misalignment; 6 = quality problems; 7 = delivery structure for suppliers problems; 8 = service problems; 9 = supplier HRproblems; 10 = supplier locked; 11 = merger/divestiture; 12 = disasters Nodes (circles) represent variables in the Bayesian network. Each node contains states, or a set of probable values for each variable. The values “yes” and “no” represent the two states in which the variables can exist in the network illustrated in Figure 2. Nodes are connected to show causality with arrows known as “edges” which indicate the direction of influence. When two nodes are joined by an edge, the causal node is referred to as the parent of the influenced (child) node. Child nodes are conditionally dependent upon their parent nodes. Thus, in Figure 2, the probability of suppliers experiencing network risks is dependent on the a priori probabilities associated with the following variables: misalignment of interest; supplier financial stress; supplier leadership change; tier 2 stoppage; and supplier network misalignment. The a priori probabilities associated with the variables quality problems, delivery problems, service problems, and supplier human resources (HR) problems directly influence operational risks. External risks are dependent upon the following variables: supplier locked (i.e. company cannot easily switch to another supplier), merger/divestitures, and disasters. The joint probabilities of the computed network, operational, and external risks are then used to determine the probability that a supplier will fail to achieve individual and shared performance expectations.
  • 9. The a priori probabilities for 12 supply chain risk events that affect network, Benchmarking operational, and external risks are presented in Table I for each supplier. These values supplier risks were used to generate a risk profile using Bayesian networks comprised of network, operational and external risk probabilities along with the supplier’s probability of failure to meet performance expectations. The supplier risk profiles are displayed in Table II. The table reveals that Suppliers A, H, and J have the highest probability of failure to meet performance expectations, while Supplier I has the lowest probability of 417 failure. Computations illustrating the development of the risk profile for Supplier A are presented in Appendix 3. Supplier rankings based upon their risk profiles are presented in Table III. An examination of Table III reveals that Suppliers A and H have the highest network risk rankings, while Supplier I has the lowest ranking in this category. In the category of operational risk, Supplier A and J exhibit the highest rankings. Suppliers B, D, and E exhibit the lowest rankings in the area of operational risk. The highest ranking in the external risk category is held by Supplier H, while Supplier I holds the lowest external risk ranking. Finally, based upon the risk profiles illustrated in Table II, Suppliers A, H, and J have the highest probability of failure ranking among the study participants, while Supplier I has the lowest ranking in this category. 5. Conclusions The results of the study indicate that not only does Supplier I have the lowest network and external risk rankings relative to other study participants, but also the lowest ranking in the probability of failure category. Given this result, after considering both the operational and external risks associated with Supplier I, the company may find it prudent to apportion more of its business to this supplier in an effort to decrease risk in the supply chain network. Supplier B exhibited the second lowest probability of failure ranking and may also be a candidate for increased business as a means to reduce risk. Finally, although Supplier D has a relatively high ranking in the external risk category, it exhibited the third lowest ranking in the probability of failure category. Therefore, the company may find it worthwhile to engage in cooperative activities with Supplier D to help reduce the impact of external risk events. For example, the company may participate with Supplier D in the development of a comprehensive plan for responding to unforeseen disasters as a means of mitigating their effects on the supply chain network. The results also reveal that Suppliers A, H, and J have unfavorable probability of failure risk profiles relative to the other participants in the study. Supplier A has the highest rankings in both the network and operational risk categories, while Supplier H also holds a number one ranking in the categories of network and external risks. Supplier J has the highest ranking in the category of operational risk. A further examination of Table III reveals that these suppliers are ranked either first or second in each of the four risk categories. This result suggests that the company should consider several approaches for reducing its exposure to the risks associated with the aforementioned suppliers. One approach would be for the company to allocate more of its business to a supplier with a less risky profile, such as Supplier I. After considering the suppliers’ network, operational and external risk factors, the company may consider the joint development of an aggressive supply chain risk management program which helps these suppliers achieve significant reductions in each risk category.
  • 10. BIJ 18,3 418 Table I. risk event variables A priori probabilities for Supplier Supplier Supplier Supplier Misalignment financial leadership Tier 2 network Quality Delivery Service HR Supplier Merger/ Supplier of interest stress change stoppage misalignment problems problems problems problems locked divestiture Disasters A 0.20 0.50 0.50 0.31 0.20 0.46 1.00 0.20 0.20 0.18 1.00 0.11 B 0.17 0.23 0.23 0.13 0.20 0.23 0.46 0.10 0.12 0.06 1.00 0.08 C 0.20 0.50 0.50 0.31 0.12 0.48 0.95 0.20 0.20 0.18 1.00 0.12 D 0.16 0.33 0.23 0.16 0.17 0.21 0.52 0.11 0.09 0.09 1.00 0.10 E 0.19 0.38 0.23 0.17 0.20 0.22 0.53 0.10 0.07 0.11 1.00 0.13 F 0.14 0.46 0.27 0.18 0.14 0.33 0.65 0.09 0.13 0.15 1.00 0.13 G 0.16 0.31 0.37 0.15 0.16 0.26 0.57 0.08 0.11 0.11 1.00 0.10 H 0.21 0.50 0.50 0.32 0.16 0.47 0.96 0.20 0.20 0.19 1.00 0.16 I 0.18 0.23 0.17 0.15 0.16 0.29 0.58 0.11 0.11 0.11 0.80 0.12 J 0.20 0.50 0.50 0.31 0.16 0.50 0.96 0.20 0.20 0.18 1.00 0.11
  • 11. Benchmarking Network risk Operational risk External risk Supplier probability probability probability Probability of failure supplier risks A 0.34 0.47 0.43 0.41 B 0.19 0.23 0.38 0.27 C 0.33 0.46 0.43 0.40 D 0.21 0.23 0.39 0.28 419 E 0.23 0.23 0.41 0.29 F 0.24 0.30 0.43 0.32 G 0.22 0.27 0.41 0.30 H 0.34 0.46 0.45 0.41 I 0.18 0.27 0.34 0.26 Table II. J 0.33 0.47 0.43 0.41 Supplier risk profiles Supplier Network risk ranking Operational risk ranking External risk ranking Failure ranking A 1 1 2 1 B 7 5 5 7 C 2 2 2 2 D 6 5 4 6 E 4 5 3 5 F 3 3 2 3 G 5 4 3 4 H 1 2 1 1 Table III. I 8 4 6 8 Supplier rankings based J 2 1 2 1 on risk profiles Possible incentives that the company could offer the suppliers are incremental increases in business based upon documented improvements in its supplier ranking based on its risk profile. Finally, the company may choose to terminate its relationship with these suppliers, and allocate its business among its remaining supplier base. 6. Implications The methodology presented in this study can used to internally benchmark supplier risks on a routine basis in supply chain networks. As part of a supply chain governance agreement, suppliers could be required to periodically update of their risk probability profiles for the risk events outlined in Appendix 2. These updates could be applied to Bayesian networks to create new risk profiles and rankings for each supplier. Adjustments to existing risk management strategies, policies, and tactics could then be made to reflect the current risk realities associated with the supply chain network. Thus, the methodology can provide a proactive means of managing supply chain risks. The methodology can also be used by organizations to develop supplier risk profiles to determine failure exposure levels. Organizations can then decide if it is in their best interest to either assist a supplier in improving its risk profile, or to terminate the relationship. Supplier risk profiles can be used to determine those risk events which have the highest probability of occurrence, and the largest potential impact on the supply chain network. Thus, this methodology can assist organizations along
  • 12. BIJ with their suppliers in developing comprehensive supplier risk management programs 18,3 designed to minimize the occurrence of network, operational, and external risk events. Finally, this methodology can be used as a tool to assist managers in evaluating current and potential suppliers. Suppliers who have been shown to improve their risk profiles over time may be rewarded by a buyer organization via the allotment of more business. Conversely, suppliers who have experienced increases in network, operational, 420 or external risk events over an extended period of time may be viewed as “at risk” suppliers whose relationship may require reassessment by the organization. The reassessment could result in removal from the supply network. Potential suppliers willing to provide information for the generation of their risk profiles may then become viable candidates for network inclusion. 6.1 Implementation In order to successfully implement the methodology offered in this study, it will be necessary for organizations to engage in coordinated and collaborative information sharing activities. Fawcett et al. (2009) has developed a conceptual model for the development of enhanced supply chain information sharing over time. The primary components of the model are connectivity, information sharing capability, and willingness. Connectivity refers to an organization’s ability to collect, analyze, and disseminate the required information necessary to support sound decision making within the supply chain network. It is a necessary condition for the enhancement of information sharing capabilities among the members of the network. However, organizations must also be willing to share sensitive decision making information to achieve high levels of coordination and collaboration among network members. Thus, both technological and behavioral dimensions must be considered in implementing this methodology. Not only must organizations have the technological capability to capture, store, update, and disseminate information on the network, operational, and external risk measures outlined in Appendix 2, but also display the willingness to share this information with members of the supply chain network. 6.2 Limitations This study provides an examination of network, operational, and external risk profiles associated with casting suppliers in the automotive industry. Therefore, the results are specific to the study participants. A potential limitation to the use of the methodology presented in this study is the ability to acquire the necessary data from suppliers needed for the construction of the Bayesian networks. There may be circumstances where some participants within a supply chain network are reluctant to share risk profile data with their customers. Moreover, suppliers must be willing to periodically update this data in order to construct risk profiles that are valid and reliable. A limitation to the use of Bayesian networks to model supply chain risks is the proper identification of risk event and risk categories that can impact a supply chain. Since there are a number of approaches available for categorizing supply chain risks, the inability to incorporate all relevant risks into the model could limit its effectiveness in representing a supplier’s true risk profile. Therefore, the data used in the construction of Bayesian networks must represent the supplier’s current risk realities within the supply chain network.
  • 13. 6.3 Future research Benchmarking Research studies which explore the risk profiles for suppliers and supply chain supplier risks networks in other industries should be examined using Bayesian networks to determine if industry dynamics significantly influence supply chain risks. These studies could explore the magnitude of network, operational, and external risk associated with suppliers in specific industries. Results from such studies may be used to benchmark supplier risk levels within a particular industry. 421 Future researchers may also investigate if it may be possible to develop benchmarks representing the maximum risk levels for the variables contained in Appendix 2 in order for a supplier or supplier group to maintain its affiliation with the supply chain. The maximum risk levels may be based on the nature of the industry, or the commodity provided by the supplier. Buyer organizations may choose to assist key suppliers who exceed threshold levels in reducing risks, or discontinue their membership in the supply chain network. Finally, future researchers may choose to incorporate financial data in ranking the impact of a supplier’s network, operational, or external risks on supply chain networks. The focus of such studies could be on the probability that a supplier will have an adverse impact on the buyer organization’s revenue stream based upon its risk profile. Research results from these studies could be used to benchmark the financial impact of supplier failures on buyer organizations as well as the entire supply chain network. References Abell, D. (1999), “Competing today while preparing for tomorrow”, MIT Sloan Management Review, Vol. 40 No. 3, pp. 73-81. Bardy, R. (2010), “Comparative supply chain performance: measuring cross-cultural effects. The example of the Bratislava regional automotive manufacturing”, Knowledge & Process Management, Vol. 17 No. 2, pp. 95-110. Che, Z.H. and Wang, H.S. (2008), “Supplier selection and supply quantity allocation of common and non-common parts with multiple criteria under multiple products”, Computers & Industrial Engineering, Vol. 55 No. 1, pp. 110-33. Chen, K.S. and Chen, K.L. (2006), “Supplier selection by testing the process incapability index”, International Journal of Production Research, Vol. 44 No. 3, pp. 589-600. Chopra, S. and Sodhi, M.S. (2004), “Managing risk to avoid supply-chain breakdown”, Sloan Management Review, Vol. 46 No. 1, pp. 53-61. Christopher, M. (1998), Logistics & Supply Chain Management: Strategies for Reducing Cost and Improving Services, 2nd ed., Financial Time Prentice-Hall, New York, NY. Cowell, R.G., Verrall, R.J. and Yoon, Y.K. (2007), “Modeling operational risk with Bayesian networks”, Journal of Risk and Insurance, Vol. 74 No. 4, pp. 795-827. Choi, T. and Kim, Y. (2008), “Structural embeddedness and supplier management: a network perspective”, Journal of Supply Chain Management: A Global Review of Purchasing & Supply, Vol. 44 No. 4, pp. 5-13. Choy, K.L., Lee, W.B. and Lo, V. (2003), “An intelligent supplier relationship management system for selecting and benchmarking suppliers”, International Journal of Technology Management, Vol. 26 No. 7, pp. 717-42. Cucchiella, F. and Gastaldi, M. (2006), “Risk management in supply chain: a real option approach”, Journal of Manufacturing Technology Management, Vol. 17 No. 6, pp. 700-20.
  • 14. BIJ Dagum, P. and Luby, M. (1993), “Approximating probabilistic inference in Bayesian belief networks is NP-Hard”, Artificial Intelligence, Vol. 60 No. 1, pp. 141-53. 18,3 Esain, A. (2000), “Networks, benchmarking and development of the strategic supply base: a case study”, International Journal of Logistics: Research and Applications, Vol. 3 No. 2, pp. 157-71. Farzippor Saen, R. (2008), “Using super-efficiency analysis for ranking suppliers in the presence of volume discount offers”, International Journal of Physical Distribution & Logistics 422 Management, Vol. 38 No. 8, pp. 637-51. Fawcett, S.E., Wallin, C., Allred, C. and Magnan, G. (2009), “Supply chain information sharing: benchmarking a proven path”, Benchmarking: An International Journal, Vol. 16 No. 2, pp. 222-46. Feeny, D., Lacity, M. and Willcocks, L.P. (2005), “Taking the measure of outsourcing providers”, MIT Sloan Management Review, Vol. 46 No. 3, pp. 41-8. Forker, L.B. and Mendez, B.D. (2001), “An analytical method for benchmarking best peer suppliers”, International Journal of Operations & Production Management, Vol. 21 Nos 1/2, pp. 195-209. Foster, F.D. and Whiteman, C.H. (2006), “Bayesian prediction, entropy, and option pricing”, Australian Journal of Management, Vol. 31 No. 2, pp. 181-206. Gaudenzi, B. and Borghesi, A. (2006), “Managing risks in the supply chain using the AHP method”, The International Journal of Logistics Management, Vol. 17 No. 1, pp. 114-36. Giunipero, L.C. and Eltantawy, R.A. (2004), “Securing the upstream supply chain: a risk management approach”, International Journal of Physical Distribution & Logistics Management, Vol. 34 No. 9, pp. 698-713. Guido, M. (2008), “A decision-maker-centred supplier selection approach for critical supplies”, Management Decision, Vol. 46 No. 6, pp. 918-32. Gunasekaran, A., Patel, C. and Tirtiroglu, E. (2001), “Performance measurement and metrics in a supply chain environment”, International Journal of Operations & Production Management, Vol. 21 No. 1, pp. 71-87. Handfield, R. and McCormack, K. (2007), Supply Chain Risk Management: Minimizing Disruptions in Global Sourcing, Auberbach Publications, Boca Raton, FL. Inemek, A. (2009), “Global supplier selection strategies and implications for supplier performance: Turkish suppliers’ perception”, International Journal of Logistics: Research & Applications, Vol. 12 No. 5, pp. 381-406. Jabbour, A.B.L. and Jabbour, C.J. (2009), “Are supplier selection criteria going green? Case studies of companies in Brazil”, Industrial Management & Data Systems, Vol. 109 No. 4, pp. 477-95. Jain, V., Wadhwa, S. and Deshmukh, S.G. (2007), “Supplier selection using fuzzy association rules mining approach”, International Journal of Production Research, Vol. 45 No. 6, pp. 1323-53. Khan, O. and Burnes, B. (2007), “Risk and supply chain management: creating a research agenda”, International Journal of Logistics Management, Vol. 18 No. 2, pp. 197-216. Kleindorfer, P.R. and Wassenhove, L.K. (2003), “Managing risk in global supply chains”, Wharton Insurance and Risk Management Department Seminar, Wharton University, Philadelphia, PA. Knight, F.H. (1921), Risk, Uncertainty and Profit, Houghton Mifflin, Boston, MA. Lasch, R. (2005), “Supplier selection and controlling using multivariate analysis”, International Journal of Physical Distribution & Logistics Management, Vol. 35 No. 6, pp. 409-25. Lau, H.C.W., Lee, C.K.M., Ho, G.T.S., Pun, K.F. and Choy, K.L. (2006), “A performance benchmarking system to support supplier selection”, International Journal of Business Performance Management, Vol. 8 No. 2, pp. 132-51.
  • 15. Lee, A.H. (2009), “A fuzzy AHP evaluation model for buyer-supplier relationships with the Benchmarking consideration of benefits, opportunities, costs and risks”, International Journal of Production Research, Vol. 47 No. 15, pp. 4255-80. supplier risks Li, D. and Dai, W. (2009), “Determining the optimal collaborative benchmarks in a supply chain”, International Journal of Production Research, Vol. 47 No. 16, pp. 4457-71. Nagurney, A., Cruz, J., Dong, J. and Zhang, D. (2005), “Supply chain networks, electronic commerce, and supply side and demand side risk”, European Journal of Operational 423 Research, Vol. 164 No. 1, pp. 120-42. Narasimhan, R., Talluri, S. and Mendez, D. (2001), “Supplier evaluation and rationalization via data envelopment analysis: an empirical examination”, Journal of Supply Chain Management: A Global Review of Purchasing & Supply, Vol. 37 No. 3, pp. 28-37. Niedermayer, D. (2003), “An introduction to Bayesian networks and their contemporary applications”, available at: www.niedermayer.ca/papers/bayesian/bayes.html (accessed 25 March 2010). O’Dell, C. and Grayson, C.J. (1998a), “If only we knew what we know: identification and transfer of internal best practices”, California Management Review, Vol. 40 No. 3, pp. 154-74. O’Dell, C. and Grayson, C.J. (1998b), If Only We Knew What We Know: The Transfer of Internal Knowledge and Best Practice, The Free Press, New York, NY. Ogden, J.A. and Carter, P.L. (2008), “The supply base reduction process: an empirical investigation”, International Journal of Logistics Management, Vol. 19 No. 1, pp. 5-28. Pai, R., Kallepalli, V., Caudill, R. and Zhou, M. (2003), “Methods toward supply chain risk analysis”, IEEE International Conference on Systems, Man and Cybernetics, Vol. 5 No. 1, pp. 4560-5. Paulsson, U. (2004), “Supply chain risk management”, in Brindley, C. (Ed.), Supply Chain Risk Management, Ashgate, Aldershot. Ravindran, A., Ufuk Bilsel, R. and Wadhwa, V. (2010), “Risk adjusted multicriteria supplier selection models with applications”, International Journal of Production Research, Vol. 48 No. 2, pp. 405-24. Routroy, S. (2008), “Decision framework for supplier evaluation and selection in supply chain”, The ICFAI University Journal of Supply Chain Management, Vol. 5 No. 3, pp. 19-32. Sawhney, M., Wolcott, R.C. and Arroniz, I. (2006), “The 12 different ways for companies to innovate”, Sloan Management Review, Vol. 47 No. 3, pp. 75-81. Sen, C.G., Sen, S. and Baslıgil, H. (2010), “Pre-selection of suppliers through an integrated fuzzy analytic hierarchy process and max-min methodology”, International Journal of Production Research, Vol. 48 No. 6, pp. 1603-25. Sevkli, M. (2010), “An application of the fuzzy ELECTRE method for supplier selection”, International Journal of Production Research, Vol. 48 No. 12, pp. 3393-405. Simatupang, T.M. and Sridharan, R. (2004), “Benchmarking supply chain collaboration: an empirical study”, Benchmarking: An International Journal, Vol. 11 No. 5, pp. 484-503. Slack, N. and Lewis, M. (2001), Operations Strategy, 3rd ed., Prentice-Hall, Harlow. Soni, G. and Kodali, R. (2010), “Internal benchmarking for assessment of supply chain performance”, Benchmarking: An International Journal, Vol. 17 No. 1, pp. 44-76. Spekman, R.E. and Davis, E.W. (2004), “Risky business: expanding the discussion on risk and the extended enterprise”, International Journal of Physical Distribution & Logistics Management, Vol. 34 No. 5, pp. 414-33.
  • 16. BIJ Suttner, U. (2005), “Supply chain risk management: understanding the business requirements from a practitioner perspective”, The International Journal of Logistics Management, 18,3 Vol. 16 No. 1, pp. 120-41. Tavana, M., Bourgeois, B.S. and Sodenkamp, M.A. (2009), “Fuzzy multiple criteria base realignment and closure (BRAC) benchmarking system at the Department of Defense”, Benchmarking: An International Journal, Vol. 16 No. 2, pp. 192-221. 424 Treleven, S. and Schweikhart, B. (1988), “A risk/benefit analysis of sourcing strategies: single vs. multiple sourcing”, Journal of Operations Management, Vol. 7 No. 4, pp. 93-114. Wagner, S.M. and Bode, C. (2006), “An empirical investigation into supply chain vulnerability”, Journal of Purchasing & Supply Management, Vol. 12 No. 6, pp. 301-12. Wang, Y.M., Chin, K.S. and Leung, J.P. (2009), “A note on the application of the data envelopment analytic hierarchy process for supplier selection”, International Journal of Production Research, Vol. 47 No. 11, pp. 3121-38. Wu, T., Blackhurst, J. and Appalla, R. (2007a), “AIDEA: a methodology for supplier evaluation and selection in a supplier-based manufacturing environment”, International Journal of Manufacturing Technology & Management, Vol. 11 No. 2, pp. 174-92. Wu, T., Blackhurst, J. and Chidambaram, V. (2006), “A model for inbound supply risk analysis”, Computers in Industry, Vol. 57 No. 4, pp. 350-65. Wu, C.W., Shu, M.H., Pearn, W.L. and Liu, K.H. (2007b), “Bootstrap approach for supplier selection based on production yield”, International Journal of Production Research, Vol. 1 No. 20, pp. 1-20. Yates, J.F. and Stone, E. (1992), “The risk construct”, in Yates, J.F. (Ed.), Risk-Taking Behaviour, Wiley, Chichester. Zairi, M. (1994), Measuring Performance for Business Results, Springer, New York, NY, pp. 62-3. Zsidisin, G., Melnyk, S. and Ragatz, G. (2005), “An institutional theory perspective of business continuity planning for purchasing and supply management”, International Journal of Production Research, Vol. 43 No. 16, pp. 3401-20. Appendix 1 Behaviors Relationship Supplier revenue from industry segment Influence of revenue from company Supplier/Company alignment Supplier/Company information sharing Performance Accreditation Engineering support Capacity utilization Capacity change Delivery flexibility Manufacturing employees Service promptness MRR Audit date Table AI. Audit score Risk assessment On-time delivery measures (continued)
  • 17. Human resources Employee turnover Benchmarking Senior staff turnover Union issues supplier risks Pay position Structure Supply chain disruption Market power Tier II information sharing Tier II performance monitoring 425 Disruption probability Risk management system Material sourcing base Financial health Market growth Financial risk indicators Environmental Market dynamics Merger and acquisition Regulatory Disaster Transportation Network Supplier’s customers Supplier customer relationships Alignment Supplier’s supplier Supplier vendor relationships Vendor concentration Code of conduct Table AI. Appendix 2 Risk category Risk event Risk measures Network risks Misalignment of interest Influence of revenue from company Supplier revenue from commodity category Supplier/Company Alignment Regulatory Supplier financial stress Customer portfolio Business health indicators Segment portfolio Market growth Financial data sharing Supplier leadership change Company ownership change likelihood Merger and acquisition Senior staff turnover Tier 2 stoppage Process change likelihood Miscommunication between tiers Material change/obsolesce likelihood Risk management system Material sourcing base Market power Regulatory Regulatory change risk likelihood Table AII. Inventory status sharing Network, operational, and (continued) external risk measures
  • 18. BIJ Risk category Risk event Risk measures 18,3 Tier II supplier information sharing Process/Material change notification Supplier network misalignment Supplier customer alignment Vendor concentration 426 Operational risks Quality problem Process change likelihood MRR (defects) Audit date Audit score Tier II performance monitoring Quality problems likelihood Manufacturing employees Accreditation Material change/obsolesce likelihood Process/Material change notification Delivery problem Performance data sharing On-time delivery Capacity utilization Tier II information sharing Delivery flexibility Capacity shortage likelihood Manufacturing employees Capacity change Inventory status sharing Order fulfillment information sharing Production schedule sharing Service problem Engineering support Service promptness Employee turnover Human resource issues likelihood New technology opportunity sharing Supplier HR problem Union issues Employee turnover Pay position External risks Supplier locked Accreditation information sharing EPA and FDA report sharing Regulatory Accreditation Merger/divestiture Market dynamics Merger and acquisition Disasters Supplier is providing proof of insurance Disaster Table AII. Transportation Appendix 3. Probability of failure Supplier A Given the risk event relationships exhibited in the Supplier Bayesian Network illustrated in Figure 2 along with the a priori probabilities for risk event variables contained in Table I, the following probability computations regarding network risks, operational risks, external risks, and failure for Supplier A are provided below: P ðProbability of Network Risk EventÞ £ ðProbability of Event OccurrenceÞ PðNetwork RisksÞ ¼ P ðProbability of Event OccurrenceÞ
  • 19. ½ð0:20Þ £ ð1ÞŠ þ ½ð0:50Þ £ ð1ÞŠ þ ½ð0:50Þ £ ð1ÞŠ þ ½ð0:31Þ £ ð1ÞŠ þ ½ð0:20Þ £ ð1ÞŠ Benchmarking PðNetwork RisksÞ ¼ 1þ1þ1þ1þ1 supplier risks 1:71 PðNetwork RisksÞ ¼ ¼ 0:34 5 P ðProbability of Operational Risk EventÞ £ ðProbability of Event OccurrenceÞ PðOperational RisksÞ ¼ P ðProbability of Event OccurrenceÞ 427 ½ð0:46Þ £ ð1ÞŠ þ ½ð1:00Þ £ ð1ÞŠ þ ½ð0:20Þ £ ð1ÞŠ þ ½ð0:20Þ £ ð1ÞŠ PðOperational RisksÞ ¼ 1þ1þ1þ1 1:86 PðOperational RisksÞ ¼ ¼ 0:47 4 P ðProbability of External Risk EventÞ £ ðProbability of Event OccurrenceÞ PðExternal RisksÞ ¼ P ðProbability of Event OccurrenceÞ ½ð0:18 £ ð1ÞŠ þ ½ð1:00Þ £ ð1ÞŠ þ ½ð0:11Þ £ ð1ÞŠ PðExternal RisksÞ ¼ 1þ1þ1 1:29 PðExternal RisksÞ ¼ ¼ 0:43 3 P ½PðNRÞ £ PðOccurrenceÞŠ þ ½PðORÞ £ PðOccurrenceÞŠ þ ½PðERÞ £ PðOccurrenceÞŠ PðFailureÞ ¼ P ðProbability of Risk OccurrenceÞ ½ð0:34 £ ð1ÞŠ þ ½ð0:47Þ £ ð1ÞŠ þ ½ð0:43Þ £ ð1ÞŠ PðFailureÞ ¼ 1þ1þ1 1:24 PðFailureÞ ¼ ¼ 0:41 3 About the author Archie Lockamy III, PhD, Certified Fellow in Production and Inventory Management (CFPIM) is the Margaret Gage Bush Professor of Business and Professor of Operations Management at Samford University. Prior to his academic career, Dr Lockamy held various engineering and managerial positions with Du Pont, Procter and Gamble, and TRW. Dr Lockamy has published research articles in numerous academic journals, and co-authored the book Reengineering Performance Measurement: How to Align Systems to Improve Processes, Products and Profits. Dr Lockamy served on the 1997, 1998, 1999, 2000, 2001, and 2002 Board of Examiners for the Malcolm Baldrige National Quality Award via appointment by the United States Department of Commerce. He also served as Vice President of the Board of Directors of the American Production and Inventory Control Society (APICS) Educational and Research Foundation. Dr Lockamy is recognized as a CFPIM by APICS, and is certified as an Academic Jonah by the Avraham Y. Goldratt Institute. Archie Lockamy III can be contacted at: aalockam@samford.edu To purchase reprints of this article please e-mail: reprints@emeraldinsight.com Or visit our web site for further details: www.emeraldinsight.com/reprints