logo

Help | Advanced Search

Home  »  Project Overview
Project Overview Image

'Supply Chain Response to Disruption' Project Overview

Project Homepage

BACKGROUND

On the morning of September 11th, 2001, the United States and the Western World have entered a new era - one in which indiscriminate terrorist acts of all kinds are to be expected. Many if not most of the expected impacts of the new era will affect the supply of goods and services in ways we currently do not understand. Interestingly, many of the negative outcomes can be expected to be due to the government response to the threat, as happened after 9-11-01. This research will examine the challenges of preparing the supply chains of manufacturers, retailers and distributors in the Western World for new attacks as well as new methods of ensuring security within the transportation system.

CURRENT

The research group has addresses many of these issues and is currently working on various aspects of applying resilience to supply chains, to the maritime transportation system, and developing secure supply chains.

PROJECT FOUNDATION AND PREVIOUS WORKPLAN

Previous work in transportation and logistics security has focused on the prevention of theft. Relatively little published research exists on transportation security in relation to the global threat of terrorism that the world is now facing. Further, there is little published on the criteria needed for good transportation security solutions. With both the public good and private business interests to consider, it is likely that any solution for transportation and logistics security will need to meet multiple criteria for a successful outcome. The study of supply chains security represents a new area of research and this work will make an important initial contribution to the field.

As suggested in Prof. Sheffi's award-winning article "Supply Chain Management under the Threat of International Terrorism" published in the International Journal of Logistics Management (v12, no. 2, 2001), we have entered a new era for supply chains. The assumptions underlying current systems analysis and design have changed, necessitating a re-assessment of transportation systems design in light of vulnerability to external disruptions. Given this, the research initiative's contributions are expected in the following areas:

· Threat assessment. An estimate of possible threats

· Scope of possible impacts. An estimate of the possible impact on corporations, of each one of the threats.

· Corporate response:

o Rethinking inventory policies.
o Rethinking procurement policies.
o Rethinking customer service commitments.
o Reorganizing to meet the challenge.
o Dealing with the cost of extra security, including insurance.
o Deciding how much security is "enough."
o Strategic Thinking and organizational restructuring
o Designing a secure IT infrastructure for global supply chain management

· Collateral benefits. As companies look at instituting new security measures and paying for them, the researchers will look at "collateral benefits." Clearly strategies designed to deal with greater uncertainty will influence positively supply chain operation in general as these are faced with mounting uncertainty even without considering the impact of terrorism. In addition, tighter controls can lead to reduced theft and better relationships with suppliers, customers and the government.

In looking at the business response, the research addresses some of the critical trade-offs that businesses are facing:

· Efficiency vs. redundancy. Clearly part of the response is to build redundancy into business. Such redundancy may involve extra inventory, extra capacity, dual sourcing for components, etc. After two decade of focusing on "lean operations' business are faced with the challenge of not losing the benefits of lean operations (such as Just-in-Time manufacturing), including low costs and high quality, while building some redundancy in anticipation of disruptions.

· Collaboration vs. secrecy. One of the ways businesses can tackle the threat is to collaborate with each other (creating better transparency in the movement of goods) and collaborate with government, both local and national. Such openness, however, involves its own hazards - for example, required placards on each hazardous cargo give the information about the content. Terrorists can naturally also use such information.

· Centralization vs. dispersion. One of the ways to counter increased uncertainty is through 'risk pooling." When applied to inventory management such strategy may call for central inventory location. A central facility, however, leaves the enterprise more vulnerable to a physical attack. Distributing inventory and other operations, however, may mean that the enterprise is more vulnerable to an information technology attack.

· Lowest bidder vs. known supplier. In the ever-continuing quest for cost reductions many enterprises have opted to use internet-based auctions and other means to get new low cost suppliers. On the other hand known suppliers may mean that security risks are lower. Thus companies may need to factor in new considerations in bidding for raw material, components and services.

· Security vs. privacy. As companies are tightening their security procedures they will be faced with many of the issues facing society in general such as the legal limitations of profiling, hiring of people with certain backgrounds, etc.

The research group has addresses many of these issues and is currently working on various aspects of applying resilience to supply chains, to the maritime transportation system, and developing secure supply chains.

 

 

Copyright© 2000 Massachusetts Institute of Technology
Comments and questions to Christopher A. Barajas