Sie sind auf Seite 1von 21

The current issue and full text archive of this journal is available at

www.emeraldinsight.com/0960-0035.htm

Interpretive structural modeling


of supply chain risks

ISM of supply
chain risks

Hans-Christian Pfohl, Philipp Gallus and David Thomas


Technische Universitat Darmstadt, Darmstadt, Germany

839

Abstract
Purpose The aim of this paper is the structural analysis of potential supply chain risks. It will
demonstrate how interpretive structural modeling (ISM) supports risk managers in identifying and
understanding interdependencies among supply chain risks on different levels (e.g. 3PL, first-tier
supplier, focal company, etc.). Interdependencies among risks will be derived and structured into a
hierarchy in order to derive subsystems of interdependent elements with corresponding driving power
and dependency.
Design/methodology/approach ISM was used to identify inter-relationships among supply
chain risks and to classify the risks according to their driving and dependence power. The theoretical
findings of the modeling and the applicability for practical use has been tested in two case studies with
two German industry and trade companies.
Findings ISM was proven as a useful methodology to structure supply chain risks in an easy and
distributed approach that can also be carried out in a step-by-step process on several manufacturing
stages. The input to the algorithm has to be well-defined to give the user an exact understanding of all
risks that have to be assessed, i.e. the better the input to ISM is prepared the better the outcome and
representation will be. Finally, when applying the method, a moderated process proved to be more
reliable than an assessment based on paper questionnaires only.
Originality/value This models insight would assist supply chain (risk) managers in the effective
allocation of risk management resources in the subsequent risk management phases.
Keywords Germany, Supply chain management, Risk management, Decision making,
Cause-effect relations, Interpretive structural modeling, MICMAC
Paper type Research paper

1. Research objective
Growing competition demands industry to widen the concentration on core
competencies and the reduction of the vertical range of manufacture, leading to a new
dimension of cooperation of numerous companies in form of value-added chains (supply
chains). Todays supply chains are very complex inter-dependable structures, due to the
multitude of (partly globally) participating suppliers, service providers and customers.
Understanding and managing risk shifting around supply chains is an important issue
in business and a complex problem. Identification of supply chain risks is the first step in
the risk management process. But transparency across the risk potential along the
supply chain is not the only prerequisite for a successful (in the sense of effective) risk
management. The selection of appropriate (mitigation or prevention) measures builds on
the structural assessment and the impact area of the various types of risks (Chopra and
Shodhi, 2004). Even though there is a rich stream of (empirical) literature that deals
with supply chain risks and their management (Svensson, 2000; Juttner et al., 2003;
Zsidisin et al., 2004; Pfohl et al., 2008b), and conceptual literature dealing with the new
concept of supply chain risk management (SCRM) (Hauser, 2003; Norrman and Lindroth,
2004; Juttner, 2005; Faisal et al., 2007; Franck, 2007; Pfohl et al., 2008a), there has been
little research about the interconnectedness of supply chain risks.

International Journal of Physical


Distribution & Logistics Management
Vol. 41 No. 9, 2011
pp. 839-859
q Emerald Group Publishing Limited
0960-0035
DOI 10.1108/09600031111175816

IJPDLM
41,9

840

This papers objective is the structural analysis of potential supply chain risks by
applying interpretive structural modeling (ISM). It will demonstrate how ISM supports
risk managers in identifying and understanding interdependencies among supply chain
risks on different levels (e.g. 3PL, first-tier supplier, focal company, etc.).
Interdependencies among risks will be derived and structured into a hierarchy in order
to derive subsystems of interdependent elements with corresponding driving power and
dependency. The point for departure for ISM methodology is the identification of relevant
elements, in our case supply chain risks. The remainder of this paper is organised as
follows. The paper sets out to discuss definitions and classifications of supply chain risks
in Section 2. Next, the concept of SCRM is emphasized and the elements to be modelled are
identified. Section 3 contains the methodology and provides the results of the ISM,
followed by a concluding Section 4 of the major findings. Section 5 contains the description
and results from two case studies conducted for testing the theoretical findings and the
practical applicability of the methodology. Section 6 highlights the practical use of the
methodology. Finally, further research questions are provided in Section 7.
2. SCRM and identification of elements
Generally, each business activity is connected with risks. The focus on just-in-time
production, lean manufacturing, single sourcing and offshoring implies a certain
vulnerability of supply chains (Peck, 2006). Similarly, outsourcing and offshoring result
in geographically more diverse supply chains, which are therefore exposed to all sorts of
risks. To minimize potential negative effects or even avoid them, a systematic and
comprehensive risk management process is essential. An SCRM approach for the
identification, assessment, treatment/control and monitoring of supply chain risks has
gained in importance over the past few years (Hauser, 2003; Norrman and Lindroth,
2004; Juttner, 2005; Faisal et al., 2007; Franck, 2007; Straube and Pfohl, 2008). The focus
of SCRM is broader than normal risk management. The unit of analysis represents a
dyadic relationship (buyer-seller) or a supply chain of three or more companies. Owing to
the high interconnectedness of todays supply chains, supply chain risks can be
manifold, may be difficult to identify and could consist of difficult to analyze cause-effect
relations. A structured and detailed collection of all risk potentials including their
interdependencies is of crucial importance for the subsequent phases. Identifying
cause-effect correlations between individual risks is important, because hidden
influences of a certain risk in connection with other risk(s) may cause substantial
damages (Chopra and Shodhi, 2004).
The literature offers most different definitions as to what is to be understood by
supply chain risks (Ziegenbein, 2007; Li and Hong, 2007; Kajuter, 2007). This paper is
based on the following definition:
Supply chain risks cover risks that are related to disturbances and interruptions of the flows
within the goods-, information- and financial network as well as the social and institutional
networks and may negatively effect the objective accomplishment of the individual company,
respectively, the entire supply chain, in regards of end-user advantage, costs, time or quality.

Not only the definition of supply chain risks turns out to be difficult, but their
categorization proves difficult as well. Potential risks in the supply chain are categorized
in different ways in the literature ( Juttner et al., 2003; Spekman and Davis, 2004; Gotze
and Mikus, 2007). Based on the cause-oriented risk categorization, risks can be divided

into three areas related to their point of origin (Gotze and Mikus, 2007; Juttner et al., 2003):
risks within a focal company, risks outside of this company and within the supply chain
as well as risks outside the supply chain (Figure 1).
Risks originating within a focal company can be differentiated between process and
control risks. Process risks describe disruptions within the value-increasing activities of
a company, like production delay or loss of operating resources. Control risks include
disturbances of the management systems as well as imprecise and wrong decision
guidelines, with which the company co-ordinates its own processes and those of the
suppliers and customers. These include, e.g. wrongly planned lot sizes or even missing
and/or not practicable instructions for the co-workers. Additionally, risks rooting
outside of a company but within the supply chain and with an impact on the focal
company are differentiated according to their effective direction, namely into supply and
demand risks (Juttner, 2005). Supply risks are based on disturbances, respectively, loss
of key suppliers, whereas demand risks are mostly related to the customer, and exhibited
in fashionable or seasonal demand fluctuation. Risks outside the supply chain are
so-called external or environmental risks and are exemplified by natural disasters,
terrorist attacks and/or changes in federal guidelines (Kersten et al., 2006).
This paper uses the results of a study of German logistics service providers and
industrial and commercial companies supply chain risks (Straube and Pfohl, 2008;
Pfohl et al., 2008b), to show the utility of ISM to structure risks and highlight
interdependencies between them. To remain within the scope of this paper, the relevant
part of the survey, which pertains to the ranking of the most important supply chain
risks, has been used in this paper. The showcase underlying this research uses a
virtual supply chain consisting of a focal industrial company, its first-tier supplier and
the first-tier suppliers 3PL which is responsible for the transportation on the first-tiers
supply side. Only downstream risks will be considered.

ISM of supply
chain risks

841

Risks in the focal companys sphere


According to the risk categories and the virtual supply chain, the relevant risks are process
and control risks as well as supply risks. Within the company, long-term production
downtimes (1), IT breakdowns (2) and short-term production downtimes (3) are critical
risks. Long-term production downtimes last longer than three days whereas short-term
downtimes are everything between a couple of hours to three days. On the supply side, the
company is facing primarily capacity variances/bottlenecks on the supply market (4),
dependency on suppliers (5) and delayed deliveries (6). Dependencies on suppliers can be
caused by single sourcing as well as by a lack of alternative suppliers (e.g. monopolies).
Risks in the first-tier suppliers sphere
Along the lines of the virtual supply chain, the first-tier supplier is exposed to mainly the
same process and control risks as the focal company, namely long-term production
Supply Chain Risks
Supplier

3 PL

Focal Company

3 PL

Customer

Process risks
Control risks
Supply risks

Demand risks
External risks

Figure 1.
Supply chain risk
categorization

IJPDLM
41,9

downtimes (7), IT breakdown (8) and short-term production downtimes (9), respectively.
On the supply side, the relevant risks are different which we call logistics risks. As
regards the relationship to its 3PL, the first-tier supplier is facing primarily theft (10),
poor delivery quality (11) and a lack of sufficient equipment, staff or
transport/warehouse capacity (12). In contrast to delayed deliveries, poor delivery
quality means deviance in quantity, sort and condition.

842
Risks in the 3PLs sphere
Process and control risks within the 3PLs company are hauling claim (13), unqualified
staff (14) and IT breakdown (15). Unqualified staff is a potential risk to the 3PLs
operations. The supply risks could in this case also be called resource risks and are
primarily poor performance of subcontractors (16), lack of transport capacities (17) and
a general shortage of staff (18). Poor performance of subcontractors is a relevant risk
because 3PL regularly source certain services, e.g. from carriers.
External risks from outside of the supply chain
Besides the above-described risks, a potential danger arises from external risks such as
terrorist attacks (19), natural disasters (20) or employee strikes (21). Theses risks have
a direct impact on all stakeholders in the virtual supply chain and can cause severe
disruptions.
3. ISM methodology and model development
ISM is a qualitative and interpretive method which generates solutions for complex
problems through discourses based on the structural mapping of complex
interconnections of elements (Malone, 1975; Watson, 1978). A structure of the
elements results within the context of the ISM depending on a certain relation type which
describes the connections of the elements to each other (Warfield, 1994). The method
supports the identification and order of the complex relations between the elements of a
system so that the influence can be analysed between the elements. ISM has been applied
to various problems (Saxena and Sushil, 1990; Mandal and Deshmukh, 1994; Singh et al.,
2003; Jharkharia and Shankar, 2005; Thakkar et al., 2005).
Figure 2 shows the basic logic of the ISM. A complex problem or the dependencies
between elements to be examined are interpreted as a (badly or not at all structured)
complex system (object system) (Szyperski and Eul-Bischoff, 1983). The modeling
converts the object system into a well-defined and representative system consisting
of directed graphs (digraph). An interpretation of the object system as regards content
is also carried out besides the structural one, i.e. the digraphs are completed with
context (information). The object system mapped as digraphs becomes the basic
structural model. The expansion with content finally leads to an interpretive
structural model.
The ISM is described as interpretive since a group discussion is deciding, whether
and how the elements are related. Thus, the methodology is appropriate for use by
experts who are knowledgeable of the problems context. The method is structuring
since it produces (on the basis of the relations) a comprehensive structure of all
the complex elements by considering all possible pairwise interactions of the
elements. The method is modeling since the complete structure and the individual
relations of the elements are illustrated in digraphs (Agarwal et al., 2007).

ISM of supply
chain risks
Set of Elements
Complex
problem

Basic Structural
Model

Interpretive
Structural Model

843

Context Relations

Structure and
Content
Object System

Structure

Structure and
Content

Representative Model

Note: Possible iterations are shown as dashed lines


Source: With kind permission from Springer Science + Business Media: ISM-Logik
(Szyperski and Eul-Bischoff (1983))

Primarily, in complex systems, indirect relations are of great importance, which at times,
greatly influence the system under consideration.
3.1 Steps involved in ISM methodology
The various steps involved in ISM technique are as follows:
(1) Selection of elements relevant to the problem. Starting point is the identification of
elements relevant to the problem. This can be done by secondary research (desk
research) or primary research techniques (survey, group problem solving).
(2) Establishing contextual relation type. Next, the contextual relation must be
cogently stated as a possible statement of relationship among the elements. Relations
may be of several types like comparative, influence, neutral or temporal relations
(Austin and Burns, 1985; Warfield, 1994).
(3) Construction of structural self-interaction matrix (SSIM) by pairwise comparison.
Phase (3) of ISM is the most tedious and demanding. During this phase, the participants
must decide upon the pairwise relationship between the elements. Keeping in mind the
contextual relationship for each element, the existence of a relation between any two
sub-elements (i and j) and the associated direction of the relation is questioned. Four
symbols are used to denote the direction of the relationship between the elements i and j:
V for the relation from i to j but not in both directions;
A for the relation from j to i but not in both directions;
X for both direction relations from i to j and j to i; and
O if the relation between the elements does not appear to be valid.
(4) Developing a reachability matrix from the SSIM and checking for transitivity. Phase
(4) is concerned with the construction of the reachability matrix M. It is a binary matrix
since the entry V, A, X and O of the SSIM are converted into 1 and 0 as per the
following rules:

Figure 2.
ISM-logic

IJPDLM
41,9

844

If the (i, j) entry in the SSIM is V, then the (i, j) entry in the reachability matrix
becomes 1 and the ( j, i ) entry becomes 0.
If the (i, j) entry in the SSIM is A, then the (i, j) entry in the reachability matrix
becomes 0 and the ( j, i ) entry becomes 1.
If the (i, j) entry in the SSIM is X, then both the (i, j) and ( j, i ) entries of the
reachability matrix become 1.
If the (i, j) entry of the SSIM is O, then both the (i, j) and ( j, i ) entries of the
reachability matrix become 0.

Transitivity is a basic assumption in ISM that leads to the final reachability matrix.
It states that if element A is related to B and B is related to C, it may be inferred that
A is related to C. If element (i, j) of the final reachability matrix is zero, there will not be
any direct as well as indirect relationships from element i to element j. The initial
reachability matrix may not have this characteristic because when there is no direct
but an indirect relationship from element i to j, entry (i, j) is also zero. Indirect
relationships can be found by raising the initial reachability matrix (with diagonal
entries set to 1) to successive powers until no new entries are obtained (Malone, 1975).
That is until the steady-state condition is reached such that Mn2 1 , Mn Mn 1.
(5) Level partitioning of reachability matrix. The fifth phase involves extraction of a
hierarchical ordering from the reachability matrix by level partitioning (Warfield,
1977). The purpose of this phase is to facilitate the construction of the digraph from the
reachability matrix. The level partition makes use of sets associated with each element
sj in s. The reachability set R(si) consists of the element itself and other elements which
are reachable from si. Similarly, there may be some elements which can reach the
element si constituting the antecedent set A(si). Thereafter, an intersection of the
reachability set and antecedent set (R(si) > A(si)), i.e. the common elements in both
sets, is derived for each element. The element for which R(si) R(si) > A(si) is the
top-level element in the ISM hierarchy. The top-level element has no relation to any
other elements above their own level. Once top-level elements are identified, they are
separated out from the other elements. Then, the same process undergoes iterations till
the level of all elements is achieved. These identified levels help in building the digraph
and final ISM model.
(6) Drawing of digraph with removed transitivity links. An initial digraph including
transitivity links is obtained from the conical form of the reachability matrix. The
conical matrix is achieved from the partitioned reachability matrix by rearranging the
elements according to their level, which means all the elements having the same level
are pooled, i.e. with most zero (0) elements in the upper diagonal half of the matrix and
most unitary (1) elements in the lower half. For the sake of simplicity, transitivity links
are removed to obtain the final digraph. If there is a relationship between risk i and j,
this is shown by an arrow which points from i to j.
(7) Conversion of digraph into an ISM and checking of conceptual inconsistency. The
resultant digraph from step (6) is converted into an ISM by replacing element nodes
with statements. Finally, the ISM model is reviewed to check for incompatibilities.
3.2 Formation of the SSIM
The relevant elements have already been discussed in Section 2. A contextual relation
of affects type is chosen, meaning that one risk affects another risk. For example,

capacity variances/bottlenecks on the supply market will have a (negative) effect on


the focal companies production resulting in short-term production downtimes.
Keeping in mind the contextual relationship for each risk, the existence of a relation
between any two sub-risks (i and j) and the associated direction of the relation is
questioned. The inter-relationships are analysed based on group discussions between
the authors and fellow researchers. Table I describes the pairwise relationship existing
between two sub-elements.
3.3 Reachability matrix and level partitioning
The SSIM is transformed into a reachability matrix as described in step (4) of the ISM
methodology. After incorporating the transitivities, the final reachability matrix is
achieved which is presented in Table II (1 * denotes transitivity).
The final reachability matrix depicts the driving and dependence power of each risk.
Driving power of each risk is the total number of risks (including itself) which it affects,
i.e. the sum of interactions in the rows. Conversely, dependence power of each risk is the
total number of risks (including itself) by which it is affected, i.e. the sum of interactions
in the columns. Depending on their driving and dependence power, the risks will later be
classified into autonomous, dependent, linkage and independent risks.
The final reachability matrix leads to the reachability and antecedent set for each
risk. The reachability set R(si) of the element si is the set of elements defined in the
columns that contain 1 in row si. Similarly, the antecedent set A(si) of the element si is
the set of elements defined in the rows which contain 1 in the column si. In the present
case, the risks along with their reachability, antecedent and intersection set as well as
resulting levels are shown in Table III. The process (as described in step (4) of ISM
methodology) is completed in ten iterations.
3.4 Development of digraph and formation of ISM
Based on the reachability matrix, a conical matrix (lower triangular format) is
developed by arranging the elements according to their levels (Table IV).
Based on the conical reachability matrix, the initial digraph including transitive
links is obtained. After removing indirect links, the final digraph is obtained. Next,
the elements descriptions are written in the digraph to call it the ISM (Figure 3).
The developed ISM has no cycles or feedbacks. Elements are related in pure
hierarchical pattern.
3.5 MICMAC analysis
Identification and classification of the various supply chain risks are essential to develop
the ISM under study. Comparing the hierarchy of risks in the various classifications
(direct, indirect, potential) leads to rich source of information. MICMAC is an indirect
classification method to critically analyze the scope of each element. The objective of the
MICMAC analysis is to assess the driving power and dependence of supply chain risks
(Mandal and Deshmukh, 1994; Saxena and Sushil, 1990). In Table II, the sum along the
rows and the columns indicates the driving power and dependence, respectively.
All elements are divided into four groups of risks (autonomous, dependent, linkage
and independent). Group I includes autonomous elements that have weak driver power
and weak dependence. Group II consists of dependent elements that have weak driver
power and strong dependence. The third group includes linkage elements that have

ISM of supply
chain risks

845

Table I.
Structural self-interaction
matrix
A
A
A
A
A
A
A
A
A
A
O
A
A
O
A
A
A
O
O

A
O
A
A
O
A
A
O
A
A
O
A
O
O
O
A
A
X
O
O

20

O
O
A
O
A
O

A
A
A
A
O
A
A
A
A
O
O
A

19

O
O
O
A
A

O
O
O
O
O
O
O
O
O
O
A
A

18

O
O
O
A

O
O
O
O
O
O
O
O
O
O
A
A

17

A
O
O

O
O
O
O
O
O
O
O
O
O
A
A

16

A
V

O
O
O
O
O
O
O
X
O
A
A
A

15

O
O
O
O
O
O
O
O
A
O
A
O

14
O
O
O
O
O
O
O
O
A
O
O
O

13
O
O
O
A
O
A
O
O
A
A
A

12
O
O
O
O
O
A
O
O
A
V

11
O
O
O
O
O
A
O
O
A

10
O
O
O
A
O
A
O
V

9
O
X
O
A
O
A
A

O
O
O
A
O
A

O
V
O
A
O

846

1. Long-term production downtimes


2. IT breakdown
3. Short-term production downtimes
4. Capacity variances/bottlenecks on the supply market
5. Dependency on supplier (i.e. oligopoly)
6. Delay in delivery
7. Long-term production downtimes
8. IT breakdown
9. Short-term production downtimes
10. Theft
11. Poor delivery quality
12. Lack of sufficient equipment, staff, transport/
warehouse capacity
13. Hauling claim
14. Poor quality of staff
15. IT breakdown
16. Poor performance of subcontractors
17. Lack of sufficient transport capacities
18. General staff shortage
19. Terrorist attacks
20. Natural disasters
21. Employee strikes

21

A
O
A
O

O
O
A

O
V

IJPDLM
41,9

Elements

4 5 6

Driving
9 10 11 12 13 14 15 16 17 18 19 20 21 power

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
Dependence

1
1
0
0
1
0
0
1*
0
0
0
0
0
1*
1*
0
0
1*
1
1
1
10

0
1
0
0
0
0
0
1
0
0
0
0
0
1*
1*
0
0
0
1
1
0
6

0
1
1
1
1
1*
1*
1*
1*
1*
1*
1*
1*
1*
1*
1*
1*
1*
1
1
1
20

0
1*
0
1
0
1
1
1
1
1*
1*
1
1*
1*
1*
1*
1*
1*
1
1
1
18

0
1*
0
0
0
0
1
1
0
0
0
0
0
1*
1*
1
0
1*
1
1
1
9

0
1
0
0
0
0
0
1
0
0
0
0
0
1*
1
0
0
0
1
1
0
6

0
1*
0
0
0
0
0
1
1
1
1
1
1
1
1*
1*
1*
1*
1
1
1
15

0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
2

0
1
0
0
0
1
1
1
1
1
1
1
1*
1*
1*
1*
1*
1*
1
1
1
17

0
1*
0
0
0
0
0
1*
0
1
0
1
0
1*
1
1*
1*
1*
1*
1
1
12

0
1*
0
0
0
0
0
1*
0
1
1
1
0
1
1
1
1
1
1*
1*
1*
13

0
1*
0
0
0
0
0
1*
0
0
0
1
0
1*
1
1
1
1
1
1
1
11

0
1*
0
0
0
0
0
1*
0
0
0
0
1
1
1
1
1*
1*
1*
1
1*
11

0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
1

0
1*
0
0
0
0
0
1
0
0
0
0
0
1
1
0
0
0
1
1
0
6

0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
1
1
1*
1
1
6

0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
1
1
1
1
5

0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
1
2

0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
1

0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
1

0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
1
2

1
13
1
2
3
3
4
13
4
6
5
7
5
14
13
9
10
14
16
17
14

both strong driving and dependence power. In group IV, all independent elements are
clustered that have strong driving power, but poor dependence power. Figure 4 shows
the classification of the analysed risks based on their driving power and dependence.
3.6 Fuzzy MICMAC analysis
The analysis can be further improved by considering the strength of relationships
instead of the mere consideration of relationships so far. By strength of relationship, we
mean the strength of risk is impact (given its occurrence) on risk js probability of
occurrence. This strength of impact can be defined by qualitative consideration on a
0-1 scale, as shown in Table V.
These values are superimposed on the initial reachability matrix from step (4) in
ISM methodology. The resulting fuzzy direct relationship matrix is shown in Table VI.
According to Zimmermann (1991), there are three types of fuzzy compositions in
order to determine the strength of the fuzzy indirect relation from element i to j:
max-min, max-product and max-average. In the context of this research, the max-min
composition is the most suitable, since the fuzzy relations represent the strength of
relations. That means, that the minimal strength has to be the maximum of all possible
minimal impacts from i to j. If the fuzzy relations represent the probability of relations,
the max-product approach seems to be the most suitable. In order to obtain indirect
relationships, the fuzzy direct relationship matrix is modified based on the
computational steps given in Yenradee and Dangton (2000). The resulting direct and
indirect fuzzy relationship matrix with driving power and dependence is given in
Table VII.

ISM of supply
chain risks

847

Table II.
Final reachability
matrix with driving
and dependence power

IJPDLM
41,9

Elements
1
2
3

848

4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20

Table III.
Levels of supply chain
risks

21

Reachability set R(si)


1
1, 2, 3, 4, 6, 7, 8, 9, 10, 11, 12, 13,
14, 15
1, 2, 3, 4, 6, 7, 8, 9, 10, 11, 12, 13,
15
3

Antecendent set A(si)

Intersection Level

1, 2, 5, 8, 14, 15, 18, 19, 20, 21


14

1
14

I
VIII

2, 8, 14, 15, 19, 20

2, 8, 15

II

II

5
6

III
IV

2, 8, 15

VIII

7
12
10

IV
VI
V

13
11

VII
V

2, 8, 15

IX

16
17
9

VIII
VIII
IX

18, 21

19

20

18, 21

2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14,


15, 16, 17, 18, 19, 20, 21
3, 4
2, 4, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15,
16, 17, 18, 19, 20, 21
1, 3, 5
5, 20
3, 4, 6
2, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16,
17, 18, 19, 20, 21
1, 2, 3, 4, 6, 7, 8, 9, 10, 11, 12, 13, 2, 8, 14, 15, 19, 20
15
3, 4, 6, 7
2, 7, 8, 14, 15, 18, 19, 20, 21
3, 4, 6, 9, 10, 11, 12
2, 8, 12, 14, 15, 16, 17, 18, 19, 20, 21
3, 4, 6, 9, 10, 11
2, 8, 10, 12, 14, 15, 16, 17, 18, 19, 20,
21
3, 4, 6, 9, 13
2, 8, 13, 14, 15, 16, 17, 18, 19, 20, 21
3, 4, 6, 9, 11
2, 8, 10, 11, 12, 14, 15, 16, 17, 18, 19,
20, 21
1, 2, 3, 4, 6, 7, 8, 9, 10, 11, 12, 13, 2, 8, 14, 15, 19, 20
15
3, 4, 6, 9, 10, 11, 12, 13, 16
16, 17, 18, 19, 20, 21
3, 4, 6, 9, 10, 11, 12, 13, 16, 17
17, 18, 19, 20, 21
3, 4, 6, 9
2, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17,
18, 19, 20, 21
1, 3, 4, 6, 7, 9, 10, 11, 12, 13, 16, 17, 18, 21
18, 21
1, 2, 3, 4, 6, 7, 8, 9, 10, 11, 12, 13, 19
15, 16, 17, 19
1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 20
15, 16, 17, 20
1, 3, 4, 6, 7, 9, 10, 11, 12, 13, 16, 17, 18, 21
18, 21

4. Discussion and conclusion


Figure 4 clearly shows that the highest driving power lies with terrorist attacks (20),
natural disasters (19) and employee strike (21), which all fall in the category of external
risks. The occurrence of external risk cannot be influenced by risk management, which
makes it even more important to asses the relationship of those risks to other supply
chain risks. Short-term production downtimes at own facilities (3), capacity
variances/bottlenecks on the supply market (4) and delay in delivery (6) were
classified as highly dependent risks followed by short-term production downtimes of
supplier (9). The operating levels of the focal company depend on these risks
substantially. They have minor driving power and are at the top of the ISM hierarchy.
Besides, assigning high priority to these risks, the management should understand the
dependence of these risks on lower level risks, in achieving the SCRM goals and
objectives. But that means, putting high priority to the linkage risks (group III), too.

Elements

11

13

10

12

15

16

14

17

18

19

20

21

1
3
4
5
6
7
9
11
13
10
12
2
8
15
16
14
17
18
19
20
21

1
0
0
1
0
0
0
0
0
0
0
1
1
1
0
1
0
1
1
1
1

0
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1

0
0
1
0
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1

0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0

0
0
0
0
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1

0
0
0
0
0
1
0
0
0
0
0
1
1
1
0
1
0
1
1
1
1

0
0
0
0
0
0
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1

0
0
0
0
0
0
0
1
0
1
1
1
1
1
1
1
1
1
1
1
1

0
0
0
0
0
0
0
0
1
0
0
1
1
1
1
1
1
1
1
1
1

0
0
0
0
0
0
0
0
0
1
1
1
1
1
1
1
1
1
1
1
1

0
0
0
0
0
0
0
0
0
0
1
1
1
1
1
1
1
1
1
1
1

0
0
0
0
0
0
0
0
0
0
0
1
1
1
0
1
0
0
1
1
0

0
0
0
0
0
0
0
0
0
0
0
1
1
1
0
1
0
0
1
1
0

0
0
0
0
0
0
0
0
0
0
0
1
1
1
0
1
0
0
1
1
0

0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
1
1
1
1
1

0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0

0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
1
1
1
1

0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
1

0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0

0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0

0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
1

The MICMAC analysis indicates that these are IT-related risks (2), (8) and (15),
respectively, poor performance of subcontractors (16) and lack of transport capacities
(17) which both originate from 3PL provider and finally theft (10), poor delivery quality
(11), lack of sufficient equipment, staff or transport/warehouse capacity (12) and
hauling claim (13) which are in the first-tier suppliers sphere. These linkage risks have
relatively strong driving power as well as strong dependence. Therefore, these form the
middle level of the model. Though the lower level risks induce or affect these risks,
these also have significant driver power to influence some other risks, which are at the
top of the model.
Another insight from driver power and dependence figure is that dependency on
suppliers (5) is the only autonomous risk. Autonomous risks are weak drivers and
weak dependents and do not have much influence on the system.
Further insights can be gained from the ISM model shown. First of all, the graph
depicts the risks and their dependencies. In this configuration, the ISM model,
in contrast to the digraph built from the initial reachability matrix, is clearly arranged
but still contains all dependencies. The initial reachability matrix indicates only the
direct relationships between any two elements. By building the ISM model, plenty of
these edges can be removed while the information is still represented by a set of
indirect dependencies. Thereby, the complexity of the visualization is reduced. So this
mapping of inter-relationships is a useful method for supply chain risk managers to
evaluate supply chain risks and learn about the impact chains of these risks. It can also
be used to communicate and explain these dependencies within the company and
within the supply chain, to enable an effective management which deals with the most
important risks, not only from a company perspective, but primarily from an overall
supply chain perspective.

ISM of supply
chain risks

849

Table IV.
Conical form of
reachability matrix

IJPDLM
41,9

Short term
production downtimes
(focal company)

Long term
production downtimes
(focal company)

Capacity
variances/bottlenecks on
the supply market

850

Dependency on supplier
(i.e. oligopoly)

Delay in delivery

Long term production


downtimes
(1st-tier supplier)

Short term production


downtimes
(1st-tier supplier)

Poor delivery quality


(1st-tier supplier)

Hauling claim
(3 PL)

Theft
(1st-tier supplier)
Lack of sufficient
equipment, staff,
transport/warehouse
capacity
(1st-tier supplier)

IT breakdown
(focal company)

IT breakdown
(1st-tier supplier)

Poor quality of staff


(3 PL)

Figure 3.
ISM-based model

Employee strikes
(external)

Poor performance of
subcontractors
(3 PL)

IT breakdown
(3 PL)

Terrorist attacks
(external)

Lack of sufficient transport


capacities
(3 PL)

Natural desasters
(external)

General staff
shortage
(3 PL)

Besides the potential as a structured and simple communication tool among supply
chain risk managers, the ISM model also supports the chosen risk categorization shown
in Figure 1. With an exception of the IT risks (2), (8) and (15), the resulting structure
illustrates the same hierarchy of categories. On level I are only the focal companys
process and control risks, followed by its supply risks (4)-(6). On level IV are the first-tier

Driving power

1 2 3
22
Group IV
21
20
19
18
17 20
16 19
15
21
14 14 18
13
12
11
10
9
8
7
6
5
4
5
3
Group I
2
1
1 2 3
Dependence

Strength of impact
Numerical value

10 11 12 13 14 15 16 17 18 19 20 21 22
Group III

8 15
2

17
16
12
10
13

11

9
6
Group II

4
1
3
10 11 12 13 14 15 16 17 18 19 20 21 22

22
21
20
19
18
17
16
15
14
13
12
11
10
9
8
7
6
5
4
3
2
1

No

Weak

Medium

Strong

Very strong

0.25

0.5

0.75

suppliers process and control risks (7) and (9), followed by its supply risks (10)-(12).
Finally, on level V and below are the 3PLs risks (13) and (14), followed by its resource
risks (16)-(18). The external risks, which have a direct impact on all players, are at the
bottom of this digraph. Risks (2), (8) and (15), i.e. IT breakdown on all levels (focal
company, first-tier supplier, 3PL), are exceptions because these risks have an influence
both on risks on higher levels (upwards the supply chain) as well as on lower levels
within the hierarchy. Risk management should carefully assess the causes behind those
risks which could be either technical or relationship related. The former involves
interruptions in data communication. The latter deals with risks of not getting relevant
information about the development within the partners company (e.g. forecast of
volume changes, availability of transport capacities).
Although these results provide a lot of information about the dependencies between
supply chain risks, the ISM model cannot be used to identify a direct (critical) link
between two risks, that, when eliminated, would have no longer any effect. The resulting
ISM model shows overall impact chains but removes links, if the information is still
contained, to keep track of the dependencies at the expense of detailed information about
all direct links. Furthermore, the ISM model shows only that there is a connection
between two risks without any information if the impact of this connection is significant

ISM of supply
chain risks

851

Figure 4.
Driving power and
dependence diagram

Table V.
Fuzzy scales of impact

1
0.75
0
0
0.5
0
0
0
0
0
0
0
0
0
0
0
0
0
0.75
0.75
0.75

0
1
0
0
0
0
0
0.25
0
0
0
0
0
0
0
0
0
0
0.25
0.75
0

0
1
1
0.75
0.75
0
0
0
0
0
0
0
0
0
0
0
0
0
0.75
1
1

3
0
0
0
1
0
0.5
0.5
0.25
0.25
0
0
0.5
0
0
0
0
0
0
0.5
0.75
0.25

4
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0.5
0

5
0
0.5
0
0
0
1
1
1
0.75
0.5
1
0.75
0
0
0
0
0
0
0.5
1
0.5

6
0
0
0
0
0
0
1
0.75
0
0
0
0
0
0
0
0
0
0
0.75
0.75
0.75

7
0
0.25
0
0
0
0
0
1
0
0
0
0
0
0
0.25
0
0
0
0.25
0.75
0

8
0
0
0
0
0
0
0
1
1
0.5
0.75
0.75
0.75
0.25
0
0
0
0
0.75
1
1

9
0
0
0
0
0
0
0
0
0
1
0
0.25
0
0
0.25
0
0
0
0
0.25
0.25

10
0
0
0
0
0
0
0
0
0
0.25
1
1
0
0.5
0.5
0.25
1
0.25
0
0
0

11
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0.25
0.25
1
1
0.25
0.5
0.25

12
0
0
0
0
0
0
0
0
0
0
0
0
1
0.75
0.25
0.5
0
0
0
0.25
0

13
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0

14
0
0
0
0
0
0
0
0.5
0
0
0
0
0
0.5
1
0
0
0
0.25
0.75
0

15

0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0.5
1
0
0.25
0.25

16

0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
1
0.25
0.25
1

17

0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
1

Table VI.
Initial fuzzy direct
relationship matrix

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21

18

852

Elements

0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0

19

0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0

20

0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0.25
0
0
1

21

IJPDLM
41,9

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
Dependence

Elements

1
0.75
0
0
0.5
0
0
0.25
0
0
0
0
0
0.25
0.25
0
0
0.25
0.75
0.75
0.75
5.5

0
0
1
1
0
1
0
0.75
0
0.75
0
0.5
0
0.5
0.25 0.5
0
0.5
0
0.5
0
0.5
0
0.5
0
0.5
0.25 0.5
0.25 0.5
0
0.5
0
0.5
0
0.5
0.25 0.75
0.75 1
0
1
2.75 12.75

2
0
0.5
0
1
0
0.5
0.5
0.5
0.5
0.5
0.5
0.5
0.5
0.5
0.5
0.5
0.5
0.5
0.5
0.75
0.5
9.75

0
0
0
0.5
0
0
0
0
1
0
0
1
0
1
0
1
0
0.75
0
0.5
0
1
0
1
0
0.75
0
0.75
0
0.5
0
0.5
0
1
0
1
0
0.75
0.5 1
0
1
1.5 14

5
0
0.25
0
0
0
0
1
0.75
0
0
0
0
0
0.25
0.25
0
0
0.25
0.75
0.75
0.75
5

0
0
0.25 0.25
0
0
0
0
0
0
0
0
0
0
1
1
0
1
0
0.5
0
0.75
0
0.75
0
0.75
0.25 0.75
0.25 0.5
0
0.5
0
0.75
0
0.75
0.25 0.75
0.75 1
0
1
2.75 11

8
0
0.25
0
0
0
0
0
0.25
0
1
0
0.25
0
0.25
0.25
0.25
0.25
0.25
0.25
0.25
0.25
3.75

10
0
0.25
0
0
0
0
0
0.5
0
0.25
1
1
0
0.5
0.5
0.25
1
1
0.25
0.5
1
8

11
0
0.25
0
0
0
0
0
0.25
0
0
0
1
0
0.25
0.25
0.25
1
1
0.25
0.5
1
6

12
0
0.25
0
0
0
0
0
0.25
0
0
0
0
1
0.75
0.25
0.5
0.5
0.5
0.25
0.25
0.5
5

13
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
1

14
0
0.25
0
0
0
0
0
0.5
0
0
0
0
0
0.5
1
0
0
0
0.25
0.75
0
3.25

15
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0.5
1
0.25
0.25
1
4

16
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
1
0.25
0.25
1
3.5

17
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
1
2

0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
1

0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
1

18 19 20

Driving power
1
5.75
1
1.75
2.25
2
3
7
2.75
3.25
3.75
5
3.5
6.75
5.25
4.25
7
9.25
7.5
11
11.75

21
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0.25
0
0
1
1.25

ISM of supply
chain risks

853

Table VII.
Final fuzzy relationship
matrix

IJPDLM
41,9

or negligible. To get more detailed information about the strength of the relation
between risks, fuzzy ISM has been applied and subsequently, driver power and
dependencies were derived. The main advantage of the fuzzy digraph is its clustering of
the edges. The scale used is shown in Table V. In Figure 5, the fuzzy digraph contains all
edges, the direct and indirect dependencies, which have a very strong impact of 1.

854
3

11

13

10

12

14

Figure 5.
Digraph based on
reachability matrix with
relation strength 1

17

19
18

16

15

20
21

The less significant edges are hidden to reduce the complexity. In this diagram, a supply
chain risk manager can point out directly, which risks have significant impact on other
risks and yet he can identify which linkage risks should be managed first to reduce a
potential series of impacts on other, mostly downstream, risks. After having dealt with
the most significant dependencies in a next step, the edges with a relation strength of 1
will be hidden and those with a strength of 0.75 will be shown. This approach ensures a
structured treatment of the risks depending on the strength of impact on other risks
while keeping the complexity in the diagram on a manageable level. This research
contributes to the field of managerial decision-making literature as it emphasizes the
usefulness of integrating ISM in the identification phase of SCRM.
5. Case study
To test the above theoretical findings and ISMs applicability for practical use, two case
studies with a German industry and a trade company, respectively, were conducted. The
conclusions in the previous chapter were drawn from results of group discussions
between fellow researchers in the field of logistics and supply chain management. The
two case studies aimed to show the methodologys ability to structure supply chain risks
that originate within a real company or from one of this companys suppliers. On this
account, a questionnaire with preselected process, control, supply and environmental
risks was handed to executives and senior managers with the two companies to collect
their assessment of the risks dependencies.
In the first case study (company A), the ISM evaluation was conducted in a
well-guided process, i.e. the participants had the opportunity to clarify the meaning of
every risk during the assessment process and they were reminded by the moderator to
concentrate on the direct linkages between each pair of risks. As a result of the case
study A, the analysis gave the participants a hierarchy as well as a digraph that
showed the risk paths and their interdependencies. To conclude whether the
ascertained results showed practical use and were representative for company As risk
situation, the digraph was discussed with the participants in a second round during
which the supply chain experts were asked to interpret the linkages and importance of
all risks from the questionnaire and draw a risk map based on their experience. The
results of the second discussion with the supply chain experts (A) were positive and
showed great similarity between the risk map of the total risk situation based on expert
judgement and the outcome of the ISM algorithm.
The second case study (company B) was less guided with the participants
answering the questionnaire after a brief instruction without any further support.
Thus, the outcome of this second case study was less positive and showed several
cycles in risk linkages. Also the comparison with risk maps based on the experts
experience showed far less similarities than in case study A. A subsequent analysis of
this result with the participants showed two reasons why the risk map and the digraph
had less in common than in the first case:
(1) the assessment of the dependencies between the risks did not focus solely on
bidirectional linkages but also included knowledge of transitive connections;
and
(2) the risks were described less specifically in their definitions without the
possibility to clarify the exact meanings during the evaluation process.

ISM of supply
chain risks

855

IJPDLM
41,9

856

Hence, the findings of the case studies can be summarised as described below:
.
First, ISM was proven as a useful methodology to structure supply chain risks in
an easy and distributed approach that can also be carried out in a step-by-step
process on several manufacturing stages.
.
Second, the input to the algorithm (risks) has to be well-defined to give the
participants an exact understanding of all risks that have to be assessed, i.e. the
better the input to ISM is prepared the better the outcome and representation
will be.
.
Third, the participating experts have to be instructed to focus solely on
bidirectional linkages between two risks. There must not be any transitive
dependencies considered when the linkage between two risks is assessed.
Otherwise, the algorithm will produce too many cycles and therefore will not
derive a hierarchy based on the input.
.
In addition, a moderated process proved to be more reliable than an assessment
based on paper questionnaires only. Thus, a possibility for all participants to
post questions and clarify their understanding of the risks has to be considered
in any application.
6. Practical use of ISM in SCRM
In this paper, an attempt has been made to apply ISM to uncover interdependencies of
supply chain risks. The ISM creates conditions for rational decision making in that
complex issues are structured. The pairwise analysis of risks in a group of experts
from different functional areas encourages contributions from those who understand
the issues being discussed, but may not understand all issues related to the overall risk
management process. Thus, the present model will help to increase the awareness of
decision makers, whilst assisting them to better understand the mutual influence
among different supply chain risks and the consequences this implies for decisions
about risk mitigation strategies. Substantial discussion of the identified risks among
the experts lead to significant learning about the inter-relationship and total risk
exposure of the company or supply chain under study.
The ISM steps could be implemented in software. Input to this software would be
the list of identified risks. The decision about the pairwise relationship between the
risks (step 2) can be done by using a voting screen (interface) that displays every
relationship between risks upon the users have to vote. Use of such software will help
to keep track of all the relationships and to ensure that all necessary comparisons are
made, which form the basis for the SSIM. The following steps will be calculated and
the final graph will be drawn automatically. Furthermore, it reduces the chance of
human errors and shortens the overall process considerably. We propose to use such
an ISM software as a complementary tool with other risk management (identification)
tools. Moreover, the software could also be used in a collaborative environment with
suppliers and customers to share risk information across company boundaries.
7. Future orientation
The application of ISM showed its practicability as an analysis and decision-support
tool in order to facilitate thorough understanding of a complex problem. The complex
problem studied was the inter-relationship of supply chain risks. The process

of building an ISM develops subject matter knowledge throughout the discussion and
analysis. In the present work, only 21 risks have been used for modeling. More risks
can be identified to develop ISM. In addition to the identification of critical risks with
high driver and dependence power (linkage risks) and chains of dependent events in
terms of the consequences, it is important to consider the probability. Using this
approach, the first risk to manage would be the one with the highest probable impact
onto the supply chain. Future research should integrate the probability in the model
and combine it with the results derived from fuzzy MICMAC in order to provide
decision makers with a more precise basis for the effective allocation of risk
management resources. Moreover, the model has not been statistically validated.
Testing of the validity of this model can be another area of future research. Structural
equation modeling has the capability of testing the validity of an already developed
theoretical model.
References
Agarwal, A., Shankar, R. and Tiwari, M.K. (2007), Modeling agility of supply chain,
Industrial Marketing Management, Vol. 36 No. 4, pp. 443-57.
Austin, L.M. and Burns, J.R. (1985), Management Science: An Aid for Managerial Decision
Making, Macmillan, New York, NY.
Chopra, S. and Shodi, M.S. (2004), Managing risk to avoid supply-chain breakdown, MIT Sloan
Management Review, Vol. 46 No. 1, pp. 53-61.
Faisal, M.N., Banwet, D.K. and Shankar, R. (2007), Management of risk in supply chains, SCOR
approach and analytic network process, Supply Chain Forum: An International Journal,
Vol. 8 No. 2, pp. 66-79.
Franck, C. (2007), Framework for supply chain risk management, Supply Chain Forum:
An International Journal, Vol. 8 No. 2, pp. 2-13.

Gotze, U. and Mikus, B. (2007), Der Prozess des Risikomanagement in supply chains,
in Vahrenkamp, R. and Siepermann, C. (Eds), Risikomanagement in Supply Chains
Gefahren Abwehren, Chancen Nutzen, Erfolg Generieren, Erich Schmidt, Berlin, pp. 13-28.
Hauser, L.M. (2003), Risk-adjusted supply chain management, Supply Chain Management
Review, Vol. 7 No. 6, pp. 64-71.
Jharkharia, S. and Shankar, R. (2005), IT-enablement of supply chains: understanding the
barriers, The Journal of Enterprise Information Management, Vol. 18 No. 1, pp. 11-27.
Juttner, U. (2005), Supply chain risk management: understanding the business requirements
from a practitioner perspective, The International Journal of Logistics Management,
Vol. 16 No. 1, pp. 120-41.
Juttner, U., Peck, H. and Christopher, M. (2003), Supply chain risk management: outlining an
agenda for future research, International Journal of Logistics: Research and Applications,
Vol. 6 No. 4, pp. 197-210.
Kajuter, P. (2007), Risikomanagement in der Supply Chain: Okonomische, regulatorische und
koneptionelle Grundlagen, in Vahrenkamp, R. and Siepermann, C. (Eds),
Risikomanagement in Supply Chains Gefahren abwehren, Chancen nutzen, Erfolg
generieren, Erich Schmidt, Berlin, pp. 13-28.
Kersten, W., Boger, M., Hohrath, P. and Spath, H. (2006), Supply chain risk management:
development of a theoretical and empirical framework, in Kersten, W. and Blecker, T. (Eds),
Managing Risks in Supply Chains: How to Build Reliable Collaboration in Logistics,
Erich Schmidt, Berlin, pp. 3-18.

ISM of supply
chain risks

857

IJPDLM
41,9

858

Li, J. and Hong, S. (2007), Towards a new model of supply chain risk management:
the cross-functional process mapping approach, International Journal of Electronic
Customer Relationship Management, Vol. 1 No. 1, pp. 91-107.
Malone, D.W. (1975), An introduction to the application of interpretive structural modeling,
Proceedings of the IEEE, Vol. 63 No. 3, pp. 397-404.
Mandal, A. and Deshmukh, S.G. (1994), Vendor selection using interpretive structural modeling
(ISM), International Journal of Operations & Production Management, Vol. 14 No. 6,
pp. 52-9.
Norrman, A. and Lindroth, R. (2004), Categorization of supply chain risk and risk management,
in Brindley, C. (Ed.), Supply Chain Risk, Ashgate, Aldershot, pp. 14-27.
Peck, H. (2006), Reconciling supply chain vulnerability, risk and supply chain management,
International Journal of Logistics: Research and Applications, Vol. 9 No. 2, pp. 127-42.
Pfohl, H.-C., Gallus, P. and Ko hler, H. (2008a), Konzeption des Supply Chain
Risikomanagements, in Pfohl, H.-C. (Ed.), Sicherheit und Risikomanagement in der
Supply Chain. Gestaltungsansatze und praktische Umsetzung, Deutscher Verkehrs,
Hamburg, pp. 7-94.
Pfohl, H.-C., Gallus, P. and Kohler, H. (2008b), Risikomanagement in der Supply Chain Status
Quo und Herausforderungen aus Industrie-, Handels- und Dienstleisterperspektive,
in Pfohl, H.-C. (Ed.), Sicherheit und Risikomanagement in der Supply Chain.
Gestaltungsansatze und praktische Umsetzung, Deutscher Verkehrs, Hamburg, pp. 95-147.
Saxena, J.P. and Sushil, V.P. (1990), Impact of indirect relationships in classification of
variables a MICMAC analysis for energy conservation, Systems Research, Vol. 7 No. 4,
pp. 245-53.
Singh, M.D., Shankar, R., Narain, R. and Agarwal, A. (2003), An interpretive structural modeling
of knowledge management in engineering industries, Journal of Advances in
Management Research, Vol. 1 No. 1, pp. 7-39.
Spekman, R.E. and Davis, E.W. (2004), Risky business: expanding the discussion on risk and the
extended enterprise, International Journal of Physical Distribution & Logistics
Management, Vol. 34 No. 5, pp. 414-33.
Straube, F. and Pfohl, H.-C. (2008), Trends und Strategien in der Logistik Globale Netzwerke im
Wandel Umwelt, Sicherheit, Internationalisierung, Methoden, Deutscher Verkehrs,
Hamburg.
Svensson, G. (2000), A conceptual framework for the analysis of vulnerability in supply chains,
International Journal of Physical Distribution & Logistics Management, Vol. 30 No. 9,
pp. 731-49.
Szyperski, N. and Eul-Bischoff, M. (1983), Interpretative Strukturmodellierung (ISM): Stand der
Forschung und Entwicklungsmoglichkeiten, Vieweg, Braunschweig, p. 19.
Thakkar, J., Deshmukh, S.G., Gupta, A.D. and Shankar, R. (2005), Selection of
third-party-logistics (3PL): a hybrid approach using interpretive strucutral modeling
(ISM) and analytic network process (ANP), Supply Chain Forum: An International
Journal, Vol. 6 No. 1, pp. 32-46.
Warfield, J.N. (1977), Societal Systems: Planning, Policy, and Complexity, Wiley, New York, NY.
Warfield, J.N. (1994), A Science of Generic Design: Managing Complexity through Systems Design,
2nd ed., Iowa State University Press, Ames, IA.
Watson, R.H. (1978), Interpretive structural modeling a useful tool for technology
assessment?, Technological Forecasting and Social Change, Vol. 11 No. 2, pp. 165-85.

Yenradee, P. and Dangton, R. (2000), Implementation sequence of engineering and management


techniques for enhancing the effectiveness of production and inventory control systems,
International Journal of Production Research, Vol. 38 No. 12, pp. 2689-707.
Ziegenbein, A. (2007), Supply Chain Risiken: Identifikation, Bewertung und Steuerung,
Vdf Hochschulverlag, Zurich.
Zimmermann, H.J. (1991), Fuzzy Set Theory and Its Applications, 2nd ed., Kluwer Academic,
Boston, MA.
Zsidisin, G., Ellram, L.M., Carter, J.R. and Cavinato, J.L. (2004), An analysis of supply risk
assessment techniques, International Journal of Physical Distribution & Logistics
Management, Vol. 34 No. 5, pp. 397-413.
Further reading
Christopher, M. and Lee, H. (2004), Mitigating supply chain risk through improved confidence,
International Journal of Physical Distribution & Logistics Management, Vol. 34 No. 5,
pp. 388-96.
About the authors
Hans-Christian Pfohl studied Industrial Management and Engineering from 1962 to 1968 at the
Technische Universitat (TU) Darmstadt where he graduated as Dr rer. pol. From 1975 to 1982, he
held the Chair of Business Administration with responsibility for Organization and Planning,
at the University of Essen. From 1982 until 2010, he held the Chair in Management & Logistics at
the TU Darmstadt. In 1996, he received an honorary doctorate degree from the University of
Veszprem, Hungary. Besides general management, logistics is Professor Pfohls main research
interest. He contributes very actively through his basic research activities to new developments
in general management and to the development of the logistics concept.
Philipp Gallus is a Research Associate and Doctoral student at the Chair of Management &
Logistics. He studied Industrial Management and Engineering from 1999 to 2006 at the TU
Darmstadt, where he graduated as Diplom-Wirtschaftsingenieur. He also holds a Masters degree
in Manufacturing Management from Linkopings Universitet in Sweden. His main research areas
are supply chain risk management, logistics and transportation.
David Thomas is a Research Associate and Doctoral student in the Supply Chain and Network
Management Group at the TU Darmstadt. He studied Economics and Computer Sciences from
2001 to 2008 at TU Darmstadt, where he graduated as Diplom-Wirtschaftsinformatiker. His main
research areas are supply chain risk management and business intelligence.

To purchase reprints of this article please e-mail: reprints@emeraldinsight.com


Or visit our web site for further details: www.emeraldinsight.com/reprints

ISM of supply
chain risks

859

Das könnte Ihnen auch gefallen