Blog Archives

How to secure your supply chain – 5/7

Previously, I portrayed the different categories of buyer-supplier relationships, and how they influence supply chain disruptions. Today I will look at sourcing strategies and how to or may how not to source: double sourcing, dual sourcing, parallel sourcing, säkra företagets flöden, see-saw sourcing, single sourcing

Posted in ARTICLES and PAPERS
Tags: , , , , , , , ,

ARTICLES and PAPERS
Global Supply Chain Risk Management
Finally it appears that someone has developed an easy, hands-on, not-so-academic and straightforward[...]
Risky ramblings
Why such a title for today's post? The abstract of the 2004 article Risky business: Expanding the di[...]
BOOKS and BOOK CHAPTERS
Risk in Virtual Enterprise Networks
Done...I finally made it! Today I submitted my full chapter for the book on Managing Risk in Virtual[...]
Book review: Cost-Benefit Analysis: Theory and Application
I really enjoyed reading Cost-Benefit Analysis: Theory and Application by Tefvik Nas.  I used this b[...]
REPORTS and WHITEPAPERS
Highway Vulnerability and Criticality Assessment
Transportation vulnerability and resilience have been the focus of this blog for the past two days, [...]
Assess the vulnerability of your production system
So far I have reviewed "international" literature and web sites, and it is only fitting that now it [...]
from HERE and THERE
Why risk is the buzzword in supply chain management
A new field has emerged with the field of supply chain mangement. It's called supply chain risk. Wha[...]
Supply Chain Risk - Business Continuity Management
Supply Chain Risk Management (SCRM) has many similarities with Business Continuity Management (BCM).[...]