Supply Chain Security: A Classification of Practices and an Empirical Study of Differential Effects and Complementarity

Supply chain security (SCS) breaches (a form of supply chain risk) are distressing supply chains and they have the potential to engender acute pain on the society at large. To counteract such breaches, international bodies, nations, societies, industries, and firms have instituted several countermeasures in the form of standards and respective practices. Given that not all incidences/breaches can be averted, the risk management literature advocates that firms should adopt practices that can thwart incidences/breaches and practices that can provide a swift response once an incident/breach is detected in order to contain damages, ease the pain, and restore operations. Resting on the risk management literature and interactions with professionals, we classify SCS management practices into four categories based on their intent (i.e., detection, prevention, response, and mitigation) and operationalize each via multiple indicators. We then test the relative efficacy of these practices to explain SCS performance using responses from 462 firms operating in the United States and Italy.

[1]  Daniel R. Krause The antecedents of buying firms' efforts to improve suppliers , 1999 .

[2]  R. Eltantawy,et al.  Securing the upstream supply chain: a risk management approach , 2004 .

[3]  Lawrence M Wein,et al.  Analyzing a bioterror attack on the food supply: the case of botulinum toxin in milk. , 2005, Proceedings of the National Academy of Sciences of the United States of America.

[4]  Uma Kumar,et al.  Relationship between quality management practices and innovation , 2012 .

[5]  M. Lindell,et al.  Accounting for common method variance in cross-sectional research designs. , 2001, The Journal of applied psychology.

[6]  D. Towill The impact of business policy on bullwhip induced risk in supply chain management , 2005 .

[7]  Christopher S. Tang Robust strategies for mitigating supply chain disruptions , 2006 .

[8]  Keely L. Croxton,et al.  ENSURING SUPPLY CHAIN RESILIENCE: DEVELOPMENT OF A CONCEPTUAL FRAMEWORK , 2010 .

[9]  Hau L. Lee,et al.  Higher supply chain security with lower cost: Lessons from total quality management , 2005 .

[10]  Terry S. Overton,et al.  Estimating Nonresponse Bias in Mail Surveys , 1977 .

[11]  William J. Ritchie,et al.  Why be first if it doesn’t pay? The case of early adopters of C-TPAT supply chain security certification , 2016 .

[12]  J. Hartley,et al.  Exploring quality management practices and high tech firm performance , 2005 .

[13]  C. Blome,et al.  Supply Chain Risk Management in Financial Crises – A Multiple Case-Study Approach , 2011 .

[14]  Corinna Seith Security Matters , 2001 .

[15]  N. Venkatraman Performance Implications Of Strategic Coalignment: A Methodological Perspective , 1990 .

[16]  Chad W. Autry,et al.  . Supply Chain Security Culture: Measure Development and Validation , 2009 .

[17]  Christopher S. Tang,et al.  Researchers' Perspectives on Supply Chain Risk Management , 2011 .

[18]  D. Coutu How resilience works. , 2002, Harvard business review.

[19]  J. Mentzer,et al.  GLOBAL SUPPLY CHAIN RISK MANAGEMENT , 2008 .

[20]  Y. Sheffi Supply Chain Management Under The Threat Of International Terrorism , 2001 .

[21]  William Ho,et al.  Supply chain risk management: a literature review , 2015 .

[22]  George A. Marcoulides,et al.  Product development practices and performance: A structural equation modeling-based multi-group analysis , 2006 .

[23]  Marcia J. Simmering,et al.  A Tale of Three Perspectives , 2009 .

[24]  D. Champion,et al.  Basic Statistics for Social Research.@@@Readings in Statistics.@@@Social Research. , 1971 .

[25]  Michael J. Braunscheidel,et al.  The organizational antecedents of a firm’s supply chain agility for risk mitigation and response , 2009 .

[26]  Daniel Ekwall The displacement effect in cargo theft , 2009 .

[27]  K. Eisenhardt Building theories from case study research , 1989, STUDI ORGANIZZATIVI.

[28]  R. Schroeder,et al.  A THEORY OF QUALITY MANAGEMENT UNDERLYING THE DEMING MANAGEMENT METHOD , 1994 .

[29]  F. Caniato,et al.  BUILDING A SECURE AND RESILIENT SUPPLY NETWORK. , 2003 .

[30]  E. Hartmann,et al.  Supply risk management: model development and empirical analysis , 2012 .

[31]  Judith M. Whipple,et al.  Global supply chain design considerations: Mitigating product safety and security risks , 2011 .

[32]  L. V. Wassenhove,et al.  Introduction to the Special Issue on Humanitarian Operations and Crisis Management , 2014 .

[33]  Jesús Perdomo-Ortiz,et al.  Total quality management as a forerunner of business innovation capability , 2006 .

[34]  Y. Sheffi,et al.  Supply Chain Response to Global Terrorism: a Situation Scan , 2003 .

[35]  Jason E. Lueg,et al.  Supply chain security: an overview and research agenda , 2008 .

[36]  Jennifer Blackhurst,et al.  The Severity of Supply Chain Disruptions: Design Characteristics and Mitigation Capabilities , 2007, Decis. Sci..

[37]  Edward P. Halibozek,et al.  Introduction to Security , 1975 .

[38]  Yossi Sheffi,et al.  The Resilient Enterprise: Overcoming Vulnerability for Competitive Advantage , 2005 .

[39]  S. Chopra,et al.  Managing Risk To Avoid Supply-Chain Breakdown , 2004 .

[40]  Emma Rothschild,et al.  What is Security , 1995 .

[41]  Ravi Sarathy,et al.  Security and the Global Supply Chain , 2006, Transportation Journal.

[42]  Brian Tomlin,et al.  On the Value of Mitigation and Contingency Strategies for Managing Supply Chain Disruption Risks , 2006, Manag. Sci..

[43]  Ching-Chiao Yang,et al.  The effect of supply chain security management on security performance in container shipping operations , 2013 .

[44]  Juha Hintsa,et al.  VOLUNTARY SUPPLY CHAIN SECURITY PROGRAMS: A SYSTEMATIC COMPARISON , 2006 .

[45]  M. Christopher,et al.  Supply chain risk management: outlining an agenda for future research , 2003 .

[46]  Germaine H. Saad,et al.  Managing Disruption Risks in Supply Chains , 2005 .

[47]  X. Koufteros,et al.  Adopting Security Practices for Transport Logistics: Institutional Effects and Performance Drivers , 2013 .

[48]  Chad W. Autry,et al.  Supply chain security orientation: conceptual development and a proposed framework , 2008 .

[49]  George Koroneos Securing the supply chain with RFID , 2005 .

[50]  Robert Lorin Cook,et al.  Understanding supply chain security strategy , 2012 .

[51]  Roger G. Schroeder,et al.  The Impact of Quality Management Practices on Performance and Competitive Advantage , 1995 .

[52]  Heiko A. Gracht,et al.  A Delphi-based risk analysis — Identifying and assessing future challenges for supply chain security in a multi-stakeholder environment , 2013 .

[53]  Edmund F. McGarrell,et al.  Enhancing Security Throughout the Supply Chain , 2004 .

[54]  M. C. Holcomb,et al.  Understanding the concept of supply chain resilience , 2009 .

[55]  W. Zinn,et al.  Proactive planning for catastrophic events in supply chains , 2009 .

[56]  Scott J. Grawe,et al.  Firm's resilience to supply chain disruptions: Scale development and empirical examination , 2015 .