StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Corporate Vulnerability In Supply Chains - Article Example

Cite this document
Summary
The aim of this paper is to examine the corporate vulnerability of supply chains, both in the upstream and the downstream sides. The authors argue that in almost all the industries, supply chain is quite dependent on the business activities in supply chain…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.3% of users find it useful
Corporate Vulnerability In Supply Chains
Read Text Preview

Extract of sample "Corporate Vulnerability In Supply Chains"

The Background The Doctoral study article; Key Areas, Causes, and Contingencies Planning of Corporate Vulnerability of Supply Chains, examine the corporate vulnerability in supply chains, both in the upstream and the downstream sides. The authors argue that in almost all the industries, supply chain is quite dependent on the business activities in supply chain. They also identifies that there is a challenge in learning the vulnerability construct since there is remarkably little past research done on the concept. The Doctoral Study Rubric describes that background information should consists of a brief overview of the context of the problem. The authors does an excellent job in setting a stage for a research by giving relevant and crucial background information about the supply chain vulnerability as well as other relevant and related aspects. He gives a thorough description of the contingency planning engaged in companies' business activities. This structure of the article is quite commendable in the sense that the authors starts by defining the topic and gets into the outlining its relevance in the corporate level (Brindley, 2004). The fact that he gives references of the past studies helps one to get a full glimpse of the topic at hand. The Problem Statement The author of the articles does a superb job to justify the need for research on the vulnerability of supply chain. He argues that the research is intended to study the time dependence, relational dependence, functional dependence in corporate’ supply chain. However, they fail to define the problem statement clearly in a distinct from the introduction. It seems he choose to illustrate this vital aspect together in the introduction section. It is also commendable that he has adequately provided citations that are within five years time scope. The general business problem is identified and is stated as the overall contingency planning. According to the Doctoral Study Rubric, a specific business problem should be provided in the research problem statement. This is also adequately provided as the vulnerability of supply chains in business activities. The Purpose Statement of the Study The authors of the article have also described the purpose statement of the study. The organization of this statement is admirable since all the relevant information required is sufficiently provided. It is a requirement that research variables be indicated here. The dependent and independent variables show the correlation that exists between the two sides. They show how the independent variables influence the dependent variables. The vulnerability of the supply chain is the dependent variable, which would adversely be impacted by changes in the categories and sources of disturbances of inbound logistics. Central Research Question In any research study, a research question is crucial to bringing out the actual concepts that are being studied. It is structured in a question format and in a way that the answers provided to the question would be the actual solution to the research problem. The article by Svensson and Goran fail to provide this essential element of the research study. It is also supposed to be a short statement of less than fifteen words. This should be included to make the general research objective clear to respondents and other stakeholders (Svensson, 2004). Conceptual /Theoretical Framework The article clearly brings out the variables of the conceptual framework. The authors describe it as consisting of inbound logistics that are explained in two dimensions. These describe the independent variables would affect on the vulnerability of the supply chain. The inbound logistics comprise of both the category and the source of disturbance in the supply chain (Svensson, 2004). The only missing aspect is to show the link between the dependent and independent variables. Overall Review Supply chain vulnerabilities of companies are examined for their primary areas, their causes, as well as contingency plans that are crafted and put in place to deal with those supply chain vulnerabilities. The focus is on perceptions relating to such vulnerabilities, in a study that has been deemed qualitative in nature. This qualitative approach differentiates the study in focus from previous other studies on supply chain vulnerabilities in firms, which have been, in contrast, largely quantitative. As noted in the study, the key findings, and insights relates to subcontractors working in the automotive industry, and its perception on supply chain vulnerabilities. The perceptions have been judged limited and narrow tends to myopia, and tends to be vertical in orientation, when it comes to viewing the primary areas of concern. The same holds for the same kinds of firms when it comes to viewing the causes of the supply chain vulnerabilities, as well as to making contingency plans to deal with the supply chain vulnerabilities as they are perceived in the supply chains, both downstream and upstream (Svensson, 2004, p. 728). The study notes that vulnerability arises out of the inevitable dependencies that are born out of companies' activities becoming interdependent in terms of relationships and functions. These in turn arise from radical business needs for efficiency, cost savings, and sustainable profitability. Where such concerns overwhelm companies along the supply chain, then it is inevitable that the dependencies multiply from the commencement point to the point of release of final output. There is a need to develop a construct for the vulnerability of the supply chain that takes into account the three dependencies of time, relations, and functions. This study tackles the need, by constructing the framework with which one can assess how vulnerable supply chains are based on the level of dependencies along those three categories are for different firms. The reference frame for the task is the core foundations of Supply Chain Management or SCM as a discipline and body of knowledge (Svensson, 2004, pp. 728-733). The primary data collection method is essentially the administering of a survey consisting of six questions, and focusing on the vulnerabilities of the downstream and upstream supply chains of firms with one question each relating to the respondents' qualitative perceptions of the key areas, the causes, and the corporate planning in place to deal with the supply chain vulnerabilities. The chosen industry was subcontractors in the automobile industry in Sweden, with a sample size of 229 firms, and a total respondent base of double that, at 458 respondents, two executives per company. This statement has two significant implications. One is that the study proponents as well as the respondents have a meeting of minds with regard to what vulnerabilities are and how they relate to the dependencies along the dimensions discussed in the study, and summarized above. Two, is that the respondents have an adequate grasp of those vulnerabilities to be able to give informed, “accurate” subjective assessments as far as the vulnerabilities are concerned. Taking a step back, the key issue is whether a subjective research undertaking can yield meaningful and accurate results in this case, where the objective is to gauge the level of vulnerabilities from a perceptual point of view. In gauging perceptions, what kinds of insights are possible, and how are such insights and study results limited by the relative lack of objective data against which the results can be measured? Existing literature on qualitative research indicates that while respondents are subjective in their responses, there are ways to vet the rigor and the validity of the data and findings. In this case, sans the application of rigor in the constructing of the survey questions as well as in the administering and the collection of the data, one can say that the methods are open to criticism, and so are the general study results (Svensson, 2004, pp. 729-746; Marshall and Rossman, 1999, pp. 21-54; Mays and Pope, 2000, pp. 50-52). With regard to the additional items relating to the data collection strategies, the author arguably could have said that data and findings need to be complemented by data and findings from quantitative research, or aspects of research that deal with the quantitative aspects of the respondents' assessment. Moreover, there needed to have been more structure and rigor in the data collection methods too, as the survey questions seemed open-ended for the kind of direct gauging of perceptions that they were used. Again, quantitative data collection modes, and qualitative modes that add rigor to the questions, such as the addition of scaled responses, could have improved the data collection and the subsequent analysis (Svensson, 2004, pp. 729-746; Marshall and Rossman, 1999, pp. 21-54; Mays and Pope, 2000, pp. 50-52). C. Evaluation Based on the Rubric 1. Background: Met 2. Problem statement: Hook- Not met; Anchor- met; General business problem- met; Specific business problem- met 3. Purpose of the study: Research method- met; research design- met; population- met; location- met'; impact on business practice- not met 4. Central research question: research question- met; survey questions- met (Svensson, 2004, pp. 729-746) Research Analysis and Presentation Finding the most appropriate way of analyzing and representing data is not easy for most qualitative researchers owing to the fact that this kind of data is more complicated compared to qualitative data. In addition to this, different researchers use a varied number of procedures when analyzing data and present it according to their audience’s preferences. Data analysis procedures include collecting, preparing, and organizing the data, which is then analyzed before coding the data. According to Creswell (2007), these procedures can be presented in a spiral where the researcher is allowed to use his own intuition and evolve a data analysis method fit for his or her own use. This is meant to make a researcher come up with a simpler way of data analysis without following the rigid linear method. A major problem existed when it came to coding and five major approaches were unearthed for the purpose of data analysis as discussed below. Narrative Research Analysis and Presentation For the purposes of chronology, the steps involved in this case is organizing data files, creation of initial codes, description, interpretation and presentation of this data. As such, this method can be said to be used appropriately for qualitative research. However all aspects of the data analysis methods were not justified clearly as shown by Cresswell (2007). Grounded Theory Analysis and Presentation The grounded theory also known as constant equation theory (Miles & Huberman 2008) whose stages are more detailed and include; organizing the data, getting to know the data, open coding, axial coding and checking the results of the analysis. This method has been effectively used to study recovery from child abuse according to the text thus; it has been used appropriately for research analysis. Creswell (2007) clearly gives a step-to-step process before a hypothesis is made. However, the results of the analysis were not presented in the study above and thus not all processes were justified. The best way to correct this according to Miles and Huberman (2008) would be to present sub stages in the presentation of analysis. Phenomenological Analysis and Presentation Used successfully for analyzing personal experiences, the structured steps include; description of the experience, stating significant statements, grouping significant statements, answering the questions what and how and lastly writing a description of the phenomenon. Creswell (2007) feels that this produces a simpler way of presenting data because just one paragraph can tell what the data involves. The processes were evidently expressed and were successfully used in the Riemann study. Ethnographic Analysis and Presentation According to Creswell (2007) the best place to begin when dealing with the ethnographic approach is to describe the culture before any organizing and interpretation is done. The steps are clearly described and used for data analysis. The data researched in this case would have however been more effective if a more meticulous method such as the case study or phenomenological method was used. The reason for this is that both methods would have easily gotten significant statements from the data. Case Study Analysis and Presentation After collection of the data, the researcher can use direct interpretation, categorical aggregation, naturalistic generalizations, and establishment of patterns (Creswell 2007. The steps were clearly described and justified in addition to the description of the data. The method could have been more effective if there is standard way of coming up with the varied generalizations. Personal bias may interfere without any standard. Methods of establishing quality are some of the most important aspects of research. They are normally viewed integral to the validity of a research project and, they help to prove that whoever carried out the research took time to plan and implement (Creswell, 2007). In this paper, we will focus on a particular study (a doctoral study) and examine whether the person who conducted the study made good use of the various methods that can be used to establish quality in any work of research. In order to do this, we will employ the use of three different but very crucial evaluation criteria. These include whether the methods of establishing quality were appropriately used, whether all aspects of the methods for establishing quality were described or justified sufficiently, and whether the author should have used additional methods to establish quality. Evaluation a) Were the methods for establishing quality used appropriately for the qualitative tradition or research design (e.g., case study, ethnography, grounded theory, etc.)? Why or why not? After reading the article keenly and going through each detail, I am convinced that the methods of establishing quality were used appropriately in this qualitative research paper. For instance, there is evidence in the article that the author has employed a survey in order to collect data and to validate claims when carrying out the research. In order to validate this claim, I looked at the paper carefully, and in the methodology section, it is clear that a survey is being used. For example, at the beginning of the methodology section it is said that the study was performed as a survey containing six formulated questions about the key areas, the causes and the CP of corporate vulnerability in companies’ upstream and downstream supply chains (Svensson, 2004). a) Were all aspects of the methods for establishing quality described or justified sufficiently? If not, what could have the author said and why? If sufficient, explain why you think so. I think that all aspects of the methods for establishing quality were described or justified sufficiently. This is because all the aspects of surveys (the method used in this case) have been elaborated on in detail. For instance, the author has covered the research (survey) questions, content analysis, and a discussion of the empirical findings. All these have been accompanied by well-elaborated and illustrated examples. b) Do you think the author should have used additional methods to establish quality? If so, what other methods would you recommend and specifically why should they have been used in this particular study? If not, why not? This includes the methods of establishing quality as well as how they were conducted or implemented. I am of the view that the author should not have used additional methods to establish quality. This is because he has picked just one method and effectively used it to establish sufficient quality in his paper. I think that the degree of effectiveness achieved with one method does not warrant any other(s). References Creswell, J. (2007). Qualitative Inquiry and Research Design: Choosing Among Five Approache, 2nd ED. New York: Sage Publishers. Emerald Svensson, G. (2004). “Key areas, causes and contingency planning of corporate vulnerability in supply chains: a qualitative approach”, International Journal of Physical Distribution and Logistics Management, 34 (9) 728-748. Marshall, C., and Rossman, G. (1999). Designing Qualitative Research 3rd Edition. Sage Publishing. Retrieved from http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CCEQFjAA&url=http%3A%2F%2Fdepts.washington.edu%2Fmethods%2Freadings%2Fcom501_marshal_the_what_of_study.pdf&ei=D-NVUISDLcaGrAfLr4HAAw&usg=AFQjCNH8RnWLKYOwAE66eN_QTeX0L8wWxw Mays, N. & Pope, C. (2000). Assessing quality in qualitative research. BMJ 320 (7226)/NCBI. Retrieved from http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1117321/ Miles, M. B., & Huberman, A, M. (2008). Qualitative Data Analysis. Thousand Oaks, CA: Sage Publishers Svensson, G. (2004). “Key areas, causes, and contingency planning of corporate vulnerability in Supply chains: a qualitative approach”, International Journal of Physical Distribution and Logistics Management, Vol.34 No.9, pp.728-748. Vensson, G. (2004). Key areas, causes, and contingency planning of corporate vulnerability in supply chains- a qualitative approach. International Journal of Physical Distribution & Logistics Management 34 (9). Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Corporate Vulnerability In Supply Chains Article”, n.d.)
Corporate Vulnerability In Supply Chains Article. Retrieved from https://studentshare.org/business/1784350-an-evaluation-of-a-doctoral-study
(Corporate Vulnerability In Supply Chains Article)
Corporate Vulnerability In Supply Chains Article. https://studentshare.org/business/1784350-an-evaluation-of-a-doctoral-study.
“Corporate Vulnerability In Supply Chains Article”, n.d. https://studentshare.org/business/1784350-an-evaluation-of-a-doctoral-study.
  • Cited: 0 times

CHECK THESE SAMPLES OF Corporate Vulnerability In Supply Chains

Starting a Business Online, Part 1

Poor customer relations leading to poor customer loyalty corporate vulnerability due to the availability of details and catalogs as well as information regarding the business to the competitors (Olsen, 2010) Electronic commerce faces various issues as it is considered an international commerce regardless of size.... E-commerce is associated with technologies like supply chain management, electronic transfer of funds, online transaction processing, internet marketing, inventory management systems, electronic data interchange, and data collection automated systems....
3 Pages (750 words) Assignment

Sunflower Incorporated.International Business

Factors that stimulate economic growth are namely, healthy competition within the market place, innovations in technology, increases in labor supply, and expansion in value and extent of the resources available such as land.... The central bank stimulates strong economic growth by conducting monetary policy that controls the money supply in the economy and hence generates more production and high living standards.... This vulnerability though short-lived can produce risks that are highly unexpected for investors....
5 Pages (1250 words) Assignment

E-Supply Chain Management

More and more firms accelerate to implement their supply chains in a web-based manner in an effort to lower their operating costs and attain a fast response to the market condition changes.... A supply chain refers to a chain which links elements of the manufacturing and supplying processes from raw materials to the end customers.... The supply chain typically crosses organizational boundaries.... Recently, supply chain has been defined more practically as a connected network with organizations, resources, and activities of creating and delivering various values in the form of both finished products and services. ...
24 Pages (6000 words) Essay

Strategy Memorandum

One of the suppliers in China has some production issues and unable to supply the Strategy Issue C: “The British toy maker Hornby ………strategy to reverse its fortunes.... One of the suppliers in China has some production issues and unable to supply the goods in time.... Most of the supply of the toys in the Europe comes from China.... n order to ensure uninterrupted supply, suppliers' evaluation and selection process needs to be done most meticulously (Sollish & Semanik, 2011) and therefore an effective and flaw-less sourcing strategy needs to be at place....
2 Pages (500 words) Essay

Sustainability in Supply Chains

Also known as a demand chain or a value chain, a supply chain refers to the sequenced network of facilities and activities that are leveraged for the production and delivery of goods and services (Janvier-James 2012, p....
9 Pages (2250 words) Essay

Strengths and Weaknesses of Different Analytical Frameworks to Global Supply Chains

This research is being carried out to evaluate and present strengths and weaknesses of different analytical frameworks to global supply chains: supply chain management (SCM), global commodity chains (GCCs)and global production networks (GPNs).... Global supply chains mainly focus on global business and there are different analytic frameworks that support the process.... There is the operational and strategic way of thinking about supply chains so as to identify the appropriate mechanism in a particular context....
6 Pages (1500 words) Essay

Tesco Supermarket Supply Chain

nbsp;… As the report discusses the long supply chains that characterize many of the contemporary global supply chains have resulted in a number of obstacles some of which include increased risks of procurement frauds, lack of effective monitoring systems and difficulty in tracking the supplies to authenticate their transparency.... This paper stresses that the resilience of the global supply chains and their ability to overcome obstacles continually deliver their core values in the face of disruptions is currently one of the most important concerns in supply chain management....
13 Pages (3250 words) Essay

Evaluating Methods used for Establishing Quality

For example, at the beginning of the methodology section it is said that the study was performed as a survey containing six formulated questions about the key areas, the causes and the CP of corporate vulnerability in companies' upstream and downstream supply chains (Svensson, 2004).... “Key areas, causes and contingency planning of corporate vulnerability in supply chains: a qualitative approach”, International Journal of Physical Distribution and Logistics Management, Vol....
2 Pages (500 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us