Assessing The Vulnerability of Supply Chains
Assessing The Vulnerability of Supply Chains
net/publication/329784019
CITATION READS
1 136
2 authors:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Sigurd Solheim Pettersen on 08 January 2019.
Abstract
Vulnerability assessments focus on extended sets of hazards and threats, and seek to ensure that
adequate resources exist to restore system functionality to a stable level within a reasonable amount
of time. Multiple frameworks for vulnerability assessments in supply chains report on tools that
can support this analysis. The purpose of this chapter is to inform supply chain researchers and
practitioners of emerging trends and advances from engineering design that can benefit supply
chain risk management, and set these in the context of a previously published methodology
(Asbjørnslett 2009) for vulnerability assessment in the supply chain.
Specific advances that will be addressed, include:
• Epoch-era analysis for structuring event taxonomies and scenarios.
• Failure mode thinking for low frequency, high impact (LFHI) events.
• Design structure matrices and axiomatic design principles for function-form mapping in
the supply chain as a tool for ensuring adequate levels of redundancy, flexibility, and
identification of latent functionality.
1. Introduction
1.1. Background
Modern, global supply chains are characterized by complex networked structures. Companies
interact to produce complex products through manufacturing processes that rely on thousands of
suppliers in multiple layers with limited knowledge of each other. As supply chains are becoming
longer and more complex, resulting from changes in the global marketplace, companies become
vulnerable to disruptions at seemingly peripheral nodes. Minor incidents spiral out of control,
exposing weaknesses beyond those captured by traditional risk analyses. Hence, there is a need for
vulnerability assessments that consider a wider set of threats and weaknesses, as well as the
resources to recover supply chain functioning.
Over the last twenty years, there has been an immense growth in literature that documents
vulnerability assessments for supply chains (Asbjørnslett and Rausand 1999; Peck 2005; Svensson
2000). This literature has grown to include the application of methodology from system safety
(Adhitya et al. 2009; Asbjørnslett 2009; Berle, Asbjørnslett, et al. 2011). Recently, there has also
been a strong trend towards including socio-technical aspects more strongly in system design,
connecting the design, management and operation of increasingly complex engineering systems.
Engineering systems have been characterized as engineered systems with a high degree of social
and economic intricacy, meaning that these systems are partially designed, and partially evolve
through their use (de Weck et al. 2011). This is similar to the view of supply chains as complex
adaptive systems (Choi et al. 2001), which cannot merely be seen as designed systems as they
continuously evolve. Together, these trends have led to the development of tools that may be
valuable additions to the toolbox available to supply chain practitioners and researchers. For
thorough reviews on the recent advances on methodologies for supply chain risk management, we
refer to Tang and Musa (2011) and Heckmann et al. (2015).
Tools from engineering systems, including reliability engineering, system dynamics, and
operations research have significantly improved the state of, and opportunities for vulnerability
assessment in supply chains. Still, a number of promising concepts and perspectives that have been
influential in the design of engineering systems deserve to be introduced to the supply chain context
as these have potential to improve the state of vulnerability assessment.
1.2. Objectives
The main objective of this chapter is to update a generic framework for supply chain vulnerability
assessment with tools that have been developed for the design and management of engineering
systems. This chapter introduces tools that originate from systems engineering and engineering
design into the supply chain risk management context. The authors believe that these recommended
tools and methods from the engineering systems domain will inspire practitioners and academics
interested in supply chain management to apply them, hence improving on the practice of
vulnerability assessment in supply chain risk management.
Figure 1: Performance profile for a resilient system (Asbjørnslett and Rausand 1999).
The framework for vulnerability assessment presented by Asbjørnslett (2009) aims to:
• Provide insight into the threat and risk picture of the given supply chain in its context, and
develop a taxonomy of system characteristics contributing to vulnerability.
• Analyze scenarios of how vulnerabilities evolve, and rank the scenarios according to
criticality, within the relevant supply chain management context.
• Enable decision-making regarding acceptance of vulnerabilities by assessing alternative
strategies for reducing the likelihood or consequences of analyzed scenarios.
The framework consists of the following seven steps, which are briefly explained here. See
Asbjørnslett (2009) for a more comprehensive run-through.
1. Definition of scope of work:
We define the frame and targets for analysis. This includes setting the objectives,
determining the unit of analysis and setting the system boundaries. An important element
of this is to determine acceptance criteria for vulnerabilities.
2. Description of SC/SCM context:
We describe the context within which the supply chain system operates. A generic
description of context will capture all exogenous factors that have the ability to influence
the supply chain performance.
3. Taxonomy development:
We develop a structured set of vulnerabilities pertaining to the supply chain context defined
earlier. Setting up a taxonomy of factors that influence vulnerability allows efficient
collection of relevant knowledge for further analysis.
4. Scenario development:
We develop scenarios starting from the threats identified in the earlier steps of the analysis,
considering a scenario as a sequence of events through the bow-tie in Figure 2Figure 2, until the
system is in a stable, disrupted state. Hence, the scenario does not include the actions taken
to mitigate, restore, recover or restart.
5. Criticality ranking:
We rank the scenarios in accordance with their criticality, which in a risk assessment we
normally calculate as the product of likelihood and consequence (Rausand 2011). In a
vulnerability assessment, we need to extend the criticality estimate to include the
availability of resources we can use to bring the system back to a new stable level of
performance.
6. Scenarios of importance:
We visualize the output of the criticality assessment so far by plotting the scenarios in a
risk (likelihood/consequence) diagram with consequences on the x-axis, and likelihood
along the y-axis. The effect of actions to mitigate, recover, restore or restart can also be
plotted in the diagram.
7. Reducing likelihood and consequence:
We consider implementations of measures to reduce likelihood, or to reduce the
consequences of the scenarios, on the basis of the previous steps. More emphasis has
typically to be put on the reduction of likelihood, even though this should not overshadow
preparation to deal with consequences.
4. An updated toolbox
The tools presented herein fulfill three overall purposes in the context of vulnerability assessment.
First, epoch-era analysis can be applied to create contextual awareness by enabling evaluation of
supply chain performance in a wide set of circumstances that evolve through time. Second, “failure
mode thinking” focuses the treatment of specific accident scenarios on the impact on functionality,
implying that consequences are more important to get right than the probabilities of the accidental
event in vulnerability assessments. Third, methods from systems design are employed to enhance
the understanding of whether system components can cover a failure mode, caused by loss of
functionality in some other system component.
Figure 3Figure 3 illustrates the role of these tools in relation to the framework for vulnerability assessment.
The outer layer in the figure points out that epoch-era analysis provides structure to the context
definition. The intermediate layer points out that failure mode thinking will enable a focus on loss
of functionality as the primary method of vulnerability identification. The inner layer shows that
the functional view of vulnerabilities enables engineering design tools that map between function
and form to identify ways that functionality can be covered when failure modes are encountered.
Figure 3: New tools for vulnerability assessment
Figure 4: Mapping from a set of indirect factors (black box) to a set of epoch variables that directly affect company value. The
examples are meant to be illustrative only.
Figure 5: Relating supply chain operations reference model with functional structures for failure mode identification.
Berle, Rice Jr., and Asbjørnslett (2011) use the failure mode concept to identify vulnerabilities in
maritime supply chains. Their argument is that methods that focus on each scenario simplify the
difficulties in foreseeing the causal chain leading to the supply chain losing functionality. Very
infrequent events that deserve proper attention due to severe consequences, are not sufficiently
addressed when risk is defined as the product of likelihood and consequence. By devising an
approach to vulnerability assessment which mainly seeks to identify how functionality can be lost,
supply chain managers can turn to develop a business continuity plan for each failure mode.
Naturally, business continuity planning should seek to restore functionality at reasonably high
levels of fidelity in the functional hierarchy. In other words, to the focal company in Figure 4, the
best path forward from a disruption is not necessarily to restore the activity at the component that
previously experienced a failure. Rather, the company should seek to cope with the failure mode
by shifting its operations to components that retain the ability to function.
Starting from the failure mode perspective, Berle, Asbjørnslett, et al. (2011) base their approach to
vulnerability assessment in maritime transportation on the formal safety assessment (FSA)
framework developed by the International Maritime Organization (International Maritime
Organization 2002). Berle, Asbjørnslett, et al. (2011) propose that two distinct procedure for safety
assessment can be followed, based on the degree to which risks can be foreseen. Even if we
acknowledge that not all risks are known, we know what functions the system consists of, and
hence failure mode consequences can be taken into account. The proposed framework presents two
parallel tracks. A hazard-focused procedure is used for the known risks, while a mission-focused
procedure is suggested for the “unknown” risks where the failure mode approach offers the most
insight to what capabilities are lost. The framework used by Berle, Asbjørnslett, et al. (2011) is
presented in Table 1Table 1 for illustrative purposes only.
Table 1: Formal vulnerability assessment with a mission-based focus making use of failure modes (Berle, Asbjørnslett, et al. 2011).
The reliance on design matrices is similar to the use of design structure matrices for visualization
of complex project development processes (Steward 1981), that has also been applied to managing
the function-form mapping in system design (Eppinger and Browning 2012). Common applications
of design structure matrices include sequencing of processes in project management, and clustering
analyses to modularize product architectures by encapsulating components performing related
functions within modules in accordance with axiomatic design principles.
Pahl and Beitz (1996) suggest that design processes should consist of task clarification, conceptual
design, embodiment design, and detail design. Once desired functionalities are defined through the
task clarification, the conceptual design process can commence by developing functional structures
and using design catalogues to find physical solutions that can provide the physical effects meeting
the desired functionality. Finding a solution then becomes a question of combining the solutions
that are found from the catalogue into a design that meets the overall needs. Design catalogues
enable quick, problem-oriented access to proven solution principles for the functions, and often
contain accumulated knowledge from earlier design processes. A notional design catalogue for use
in a supply chain risk management setting is shown in Table 2Table 2.
Table 2: Notional design catalogue for use in function-form mapping for the supply chain.
The literature referenced above signifies that the mapping between function and form is essential
in system design. However, it does not distinguish sufficiently between those capabilities that a
designed system is intended to have, and those that it actually possesses. Axiomatic design points
to the intentional function-form mapping using design matrices that map between these domains,
while catalogue design provides a comprehensive guide to alternative solutions for meeting these
functions so that designers can combine solutions in the synthesis.
4.3.2. Considering latent functions and functional redundancies
The understanding that complex systems can produce behaviors and provide functionality
exceeding what was expected is also found in the social sciences. Merton (1968) describes latent
functions as the functions that are neither intended nor recognized, as opposed to manifest functions
which are intended and recognized. The primary purpose of this framework is to analyze the effects
of policy, understanding that social planning has unforeseen consequences. Latent functions have
been discussed in the context of functional modelling for complex engineering systems by Crilly
(2010) who points out that the functionality that carries a value, depends on the context, the
stakeholders, and evolves through time. Crilly (2015) points to the need for viewing system
functioning both in relation with the supersystem in which the system is a part, and in relation to
the context the system works in. Pettersen et al. (2017) show that exploiting latent capabilities
benefits resilience, while breaking with the design axioms of Suh (1990). They suggest how latent
capabilities can be identified and implemented into the function-form mapping to enable recovery
from a failure mode. The manifest functions, and the latent functions are distinguished in Figure 6,
where latent functions are activated to recover from the failure mode. Recovery is here enabled by
latent capabilities, as 𝐷𝑃2 has the ability, without intent or recognition during design, to perform
𝐹𝑅1 . An advantage of applying latent capabilities compared with other means to recover, is that
we utilize existing resources in a new way, and hence functionality can be restored swiftly.
Figure 6: Functional and physical system structures. State A indicates system as designed. State B indicates system operational
using latent capabilities (Pettersen et al. 2017).
Erden et al. (2008) review functional modelling in the system design and artificial intelligence
literature, and state that when meeting disruptions due to failure, “another component, rather than
the faulty one, can perform the function, perhaps in a less efficient way”. They point to the
similarity of this concept to that of functional redundancy, which is commonly cited as a design
principle to achieve system resilience (Jackson and Ferris 2013; Rice Jr. and Caniato 2003; Uday
and Marais 2015). The main difference is perhaps that functional redundancies are something that
are designed with intent, while latent capabilities emerge from observed behaviors that were not
thought of beforehand. Functional redundancies are favored over physical redundancies, based on
adding redundant components to the design, as it does not change the “physical form” of the
system, and does not come at an additional investment cost (Erden et al. 2008; Jackson and Ferris
2013). In supply chain systems that evolve outside the control of a single stakeholder, system
components will likely possess latent functions that can be taken advantage of to reduce the impact
of disruption. We now show how these capabilities can be exploited to reduce vulnerability.
The following example differentiates what the system is intended to do, from what the system can
do: Consider a situation where Team A has been assigned to Process A, while Team B has been
assigned to Process B. However, if both teams are able to perform both tasks, the intended function-
form mapping derived through a design synthesis does not capture all capabilities. An additional
step of analysis may be needed to understand the full spectrum of capabilities, after the design
process. The resulting differences between the intended organizational capabilities and the overall
potential capabilities of the same organization are shown in Figure 7Figure 7.
Figure 7: Comparing the intended capabilities (left) of a system as assigned, with the complete available capabilities (right) of the
system.
Hence, capabilities beyond the intended can be taken advantage of, for example to provide
functional redundancy, should hazards materialize and cause functional failure in the supply chain.
We consider the example of a supply chain which can be described as a mapping between function
and form, as shown in Figure 8Figure 8. Here, a set of functional requirements{𝐹𝑅𝐴 , 𝐹𝑅𝐵 , 𝐹𝑅𝐶 , 𝐹𝑅𝐷 , 𝐹𝑅𝐸 }
is to be met. We accept that the supply chain is a complex adaptive system, and hence it does not
adhere to the design axioms. We then investigate whether 𝐷𝑃𝐵 can meet any other function, finding
that it can meet 𝐹𝑅𝐸 . If we have access to a design catalogue that describes every solution that can
be used to provide 𝐹𝑅𝐸 , we find that one such solution is 𝐷𝑃𝐵 . Due to this, 𝐷𝑃𝐵 can provide
functional redundancy should 𝐷𝑃𝐸 fail to meet 𝐹𝑅𝐸 .
Figure 9: The toolbox set in context with central worksheets for the vulnerability assessment framework.
Table 3: Worksheet #1; documentation of scenarios (Asbjørnslett 2009), with examples of possible methods that can be used.
Figure 10: Risk matrix representation for the scenarios of importance (Asbjørnslett 2009).
Naturally, based on the risk matrix in Figure 10Figure 10, it is important to attend to the scenarios
of higher criticality, and emphasize particularly those scenarios that are very critical, with no
known recourse to mitigation, restoration, or rebuilding resources. Measures to reduce the
consequences are shown as arrows. For example, we can consider Scenario 2, and Scenario 4. We
see that both these fall within the “high critical” area. An important difference is that some
consequence-reducing measures have been identified for Scenario 2, while none such measures
exist for Scenario 4. This means that Scenario 4 should be prioritized before addressing Scenario
2. Determining scenarios of importance thereby results in a list of prioritized scenarios to follow
up on, either to understand the causal links leading up to scenarios to enable prevention of causes
and interactions, or to improve impact reducing measures.
5.7. Step 7: Reducing likelihood and consequence
The final step of the framework establishes how actions can be made to reduce the likelihood and
consequences of the scenarios, and focuses on vulnerability reduction through decision-making on
the levels of supply chain design and operation. Table 5Table 5 shows a worksheet example for this step.
Table 5: Worksheet #3; evaluating measures with potential to reduce likelihood and consequence (Asbjørnslett 2009).
Normally, it is desirable to avoid disruptions altogether, hence first, we should consider means to
avoid or reduce the threats (i), and means to reduce the probability of accidental events (ii). Next,
measures to reduce consequences should be introduced. These include designing passive barriers
into the supply chain (iii), like redundancies and margins. Redundant functionality can be found
by using design catalogues. Further, we consider measures related to operations and active barriers
(iv). Last, we seek means for mitigating, restoring and rebuilding the supply chain capabilities after
the scenario has materialized (v). For the measures to reduce consequences, there is room for basing
contingency plans on measures that involve latent capabilities.
6. Summary
This chapter has introduced a number of novel tools for use in vulnerability assessment for supply
chains. The presented tools originate in research fields unfamiliar to most practitioners and
researchers of supply chain management. These tools have been set into the context of a framework
for vulnerability assessment presented in an earlier book chapter (Asbjørnslett 2009). The main
advantages of applying the new tools, are:
• An improved understanding of how alternative context and needs affect supply chain
vulnerability through epoch-era analysis.
• An improved understanding of how functional modelling via the failure mode approach can
be used to address low frequency, high impact supply chain disruptions.
• An introduction to the latent capabilities concept, which enables identification of new ways
to restore lost functionality. We suggest that latent functions are identified by use of design
catalogues.
We believe that use of these methods will improve supply chain resilience and provide a
competitive advantage to firms that learn to consciously apply these concepts and tools in their
supply chain management philosophy.
References
Adhitya, A., Srinivasan, R., & Karimi, I. A. (2009). Supply Chain Risk Identification Using a HAZOP-Based
Approach. AIChE Journal, 55(6), 1447–1463.
Asbjørnslett, B. E. (2009). Assessing the Vulnerability of Supply Chains. In G. A. Zsidisin & B. Ritchie (Eds.), Supply
Chain Risk - A Handbook of Assessment, Management, and Performance (pp. 15–33). New York, NY: Springer
Science+Business Media.
Asbjørnslett, B. E., & Rausand, M. (1999). Assess the vulnerability of your production system. Production Planning
& Control, 10(3), 219–229.
Berle, Ø., Rice Jr., J. B., & Asbjørnslett, B. E. (2011). Failure modes in the maritime transportation system: a functional
approach to throughput vulnerability. Maritime Policy & Management, 38(6), 605–632.
Berle, Ø., Asbjørnslett, B. E., & Rice Jr., J. B. (2011). Formal Vulnerability Assessment of a maritime transportation
system. Reliability Engineering and System Safety, 96(6), 696–705.
Choi, T. Y., Dooley, K. J., & Rungtusanatham, M. (2001). Supply networks and complex adaptive systems: control
versus emergence. Journal of Operations Management, 19, 351–366.
Crilly, N. (2010). The roles that artefacts play: Technical, social and aesthetic functions. Design Studies, 31(4), 311–
344.
Crilly, N. (2015). The proliferation of functions: Multiple systems playing multiple roles in multiple supersystems.
Artificial Intelligence for Engineering Design, Analysis and Manufacturing, 29, 83–92.
de Weck, O. L., Roos, D., & Magee, C. L. (2011). Engineering Systems: Meeting Human Needs in a Complex
Technological World. Cambridge, MA: The MIT Press.
Eppinger, S. D., & Browning, T. R. (2012). Design Structure Matrix: Methods and Applications. Cambridge, MA:
The MIT Press.
Erden, M. S., Komoto, H., van Beek, T. J., D’Amelio, V., Echavarria, E., & Tomiyama, T. (2008). A review of function
modeling: Approaches and applications. Artificial Intelligence for Engineering Design, Analysis and
Manufacturing, 22(2), 147–169.
Heckmann, I., Comes, T., & Nickel, S. (2015). A critical review on supply chain risk – Definition, measure and
modeling. Omega, 52, 119–132.
International Maritime Organization. Guidelines for Formal Safety Assessment for use in the IMO rule-making process
(2002). London, UK.
Jackson, S., & Ferris, T. L. J. (2013). Resilience Principles for Engineered Systems. Systems Engineering, 16(2), 152–
164.
Kaplan, S., & Garrick, J. B. (1981). On The Quantitative Definition of Risk. Risk Analysis, 1(1), 11–27.
Kraljic, P. (1983). Purchasing must become supply management a strategy for supply. Harvard Business Review, 109–
117.
Merton, R. K. (1968). Social Theory and Social Structure. New York, NY: MacMillan Publishing Co.
Pahl, G., & Beitz, W. (1996). Engineering Design (2nd ed.). London, UK: Springer.
Peck, H. (2005). Drivers of supply chain vulnerability: an integrated framework. International Journal of Physical
Distribution & Logistics Management, 35(3/4), 210–232.
Pettersen, S. S., Erikstad, S. O., & Asbjørnslett, B. E. (2017). Exploiting latent functional capabilities for resilience in
design of engineering systems. Research in Engineering Design, 1–15.
Porter, M. E. (1979). How competitive forces shape strategy. Harvard Business Review, March-Apri, 137–145.
Rausand, M. (2011). Risk Assessment: Theory, Methods, and Applications (1st ed.). Hoboken, NJ: John Wiley & Sons,
Inc.
Rausand, M., & Høyland, A. (2004). System Reliability Theory: Models, Statistical Methods and Applications (2nd
ed.). Hoboken, NJ: John Wiley & Sons, Inc.
Rice Jr., J. B., & Caniato, F. (2003). Building a secure and resilient supply network. Supply Chain Management Review,
7(5), 22–30.
Ross, A. M., Hastings, D. E., Warmkessel, J. M., & Diller, N. P. (2004). Multi-Attribute Tradespace Exploration as
Front End for Effective Space System Design. Journal of Spacecraft and Rockets, 41(1), 20–28.
Ross, A. M., & Rhodes, D. H. (2008). Using Natural Value-Centric Time Scales for Conceptualizing System Timelines
through Epoch-Era Analysis. In INCOSE International Symposium (Vol. 18, pp. 1186–1201). Utrecht, the
Netherlands.
Steward, D. V. (1981). The design structure system: A method for managing the design of complex systems. IEEE
Transactions on Engineering Management, EM-28(3), 71–74.
Suh, N. P. (1990). The Principles of Design. New York, NY: Oxford University Press.
Supply Chain Council. (2012). Supply Chain Operations Reference Model (11th ed.).
Svensson, G. (2000). A conceptual framework for the analysis of vulnerability in supply chains. International Journal
of Physical Distribution & Logistics Management, 30(9), 731–750.
Tang, O., & Musa, S. N. (2011). Identifying risk issues and research advancements in supply chain risk management.
International Journal of Production Economics, 133(1), 25–34.
Uday, P., & Marais, K. (2015). Designing Resilient Systems-of-Systems: A Survey of Metrics, Methods, and
Challenges. Systems Engineering, 18(5), 491–510.