The research on supply chains concerning disaster and crisis situations is in its infancy, but rapidly expanding on the backs of top researchers in the field. As with most young research streams there is very little theoretical grounding in extant studies. The purpose of this research is to integrate four prominent existing theoretical perspectives to provide a concise yet holistic framework fo…
Today’s supply chains face increasing vulnerabilities; effective management of disruptions is critical to an organization’s ability to weather disruptive events and remain competitive. Contingency planning is a method of risk management that promotes effective crisis management. This research tests proposed antecedents of contingency planning effectiveness in a supply chain setting.
Develops a new value stream or supply‐chain mapping typology. This seven‐map typology is based on the different wastes inherent in value streams. The use of the various tools, either singularly or in combination, is therefore driven by the types of waste to be removed. The tools themselves are drawn from a range of existing functional ghettos such as logistics, operations management and eng…
The article examines companies’ perception of corporate vulnerability in supply chains. The areas, the causes and the contingency planning of corporate vulnerability in upstream and downstream supply chains are examined. The study is based on qualitative data, and it differs from other studies on the vulnerability construct in supply chains in that most have been quantitative. An insight of t…
Presents a model that hypothesizes relationships between logistical complexity and both the importance of JIT manufacturing and the most appropriate organization structure for implementing JIT manufacturing. Logistical complexity can be defined in terms of the number of manufacturing steps or the number of different part numbers handled in a factory. Hypothesizes that the greater a factory′…
The end of the millennium may hold significant difficulties for any system dependent on computer dates. Computers which misinterpret the year 2000 and other significant dates may require considerable repair. There have been many methodologies developed to assist companies with the process of Y2K repair. These methodologies and additional considerations for approaching Y2K solutions are presente…