Vulnerability in business relationships

Today’s journal article review is an article by professor Göran Svensson from Halmstad University in Sweden. He is one of the first academic contributors to the field of supply chain risk, beginning around 1999. Vulnerability in business relationships was published in 2004, and it came to my attention because a lot of the literature on managaging an mitigating supply chain risk focuses on building relationships with suppliers. Trust and dependence are major components of a dyadic business relationship and therefore, important to discuss.

The vulnerability gap

What Svensson postulates is that the the perceived trust and the perceived dependence in business relationships influence the perceived vulnerability. The higher the perceived dependence, the higher the perceived vulnerability. The higher the perceived trust, the lower the perceived vulnerability. Trust and dependence interact with vulnerability such that imbalances on either side can be countered by adding to the other side, like a see-saw. In a relationship with low trust, the degree of dependence should be lowered, in a relationship with high dependence, the degree of trust should be increased.

Trust and dependence

According to Svensson, and based on Swan, a trust relationship is



  • Dependable
  • Honest
  • Competent
  • Professional
  • Friendly

Based on Hammerkvist, Svensson finds that a dependency relationship has these 5 components

  • Technical dependence
  • Time (workflow) dependence
  • Knowledge dependence
  • Social (relationships) dependence
  • Economic or judicial dependence

In addition, Svensson brings in two more dependencies in his research:

  • Market dependence
  • IT dependence

Trust-dependence matrices

Based on a survey among some 100 companies in Sweden Svensson constructs trust-dependence matrices, linking each dependence item with each trust item, for ingoing and outgoing flows.

There are differences between the correlations of individual trust-dependence items, but the overall picture shows a clear linkage between trust and dependence.

Conclusion

Based on his research, Svensson concludes that a favorable vulnerability scenario is indicated by a high level of trust and dependence in both directions. A convenient vulnerability scenario is indicated by a high level of trust towards suppliers and a low level of dependence towards customers. A high level of dependence towards suppliers and a low level of trust towards suppliers would constitute a troublesome vulnerability scenario. A low level of trust and dependence in either direction is seen as a neglectable vulnerability scenario.

Reference

Svensson, G. (2004). Vulnerability in business relationships: the gap between dependence and trust Journal of Business & Industrial Marketing, 19 (7), 469-483 DOI: 10.1108/08858620410564418

Links

Related

Posted in ARTICLES and PAPERS
Tags: , , , , , , ,

ARTICLES and PAPERS
Supply Chain Risk Management - as seen from Space
Is it possible to reconcile supply chain vulnerability, risk and supply chain management with corpor[...]
How to secure your supply chain
"Secure the company's flows" or "Säkra företagets flöden" in the original Swedish language is the ti[...]
BOOKS and BOOK CHAPTERS
Book Review: This is where raster GIS started...
...well not really, but Geographic Information Systems and Cartographic Modeling by Dana Tomlin spar[...]
Published. Not perished.
Publish or perish? Publish. It has taken its time, but finally it is there, the book that has my cha[...]
REPORTS and WHITEPAPERS
Assess the vulnerability of your production system
So far I have reviewed "international" literature and web sites, and it is only fitting that now it [...]
Supply chain vulnerability: an invisible global risk?
Supply chain disruption - a global issue? All companies and governments dependent on external suppli[...]