Sunteți pe pagina 1din 27

1

Chapter 1
A Conceptual Framework
for Risk and Vulnerability in
Virtual Enterprise Networks
Jan Husdal
Molde Research Institute, Norway

ABSTRACT
Is managing risk in Virtual Enterprise Networks different from managing risk in supply chains? It is not
unusual for firms in a supply chain to come together and act as a virtual enterprise network (VEN) and
the supply chains of today’s globalized and outsourced business environment exhibit many VEN-like
features. Looking at VEN risk management from the perspective of supply chain risk management, cur-
rent ideas on VENs will serve as a base onto which ideas on supply chain risk will be transposed. Many
concepts related to supply chain risk will be explored and related to their possible VEN counterparts:
risk, vulnerability, robustness, flexibility, resilience and business continuity. Conceptual in its approach
and drawing from other areas of research, this chapter introduces four distinct groups of VENS, namely
Constrained, Directed, Limited and Free VEN, and concludes that VEN risk management can and should
learn from supply chain risk management.

INTRODUCTION to each other’s market. While this kind of business


formation is not without risks, managing risk in
Today’s unstable and highly competitive business VENs is a rather underexplored and unstructured
environment has created a shift in how enterprises scientific area.
are established and managed. Past “traditional” Driven by the advent of globally available skills
enterprises are increasingly replaced by new “vir- and operational excellence (Sengupta, 2008) it is not
tual” enterprises, forming temporary networks of unusual for firms in a supply chain to come together
independent companies or Virtual Enterprise Net- and act as a VEN, and it is from this perspective
works (VENs) that share skills, costs and access that the subject of risk management in a VEN will
be explored. The purpose of the chapter is to ap-
DOI: 10.4018/978-1-61520-607-0.ch001 proach the realm of VEN risk management from a

Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
A Conceptual Framework for Risk and Vulnerability in Virtual Enterprise Networks

supply chain risk management (SCRM) perspec- to quickly respond to a wide range of business op-
tive, where ideas from the current literature on portunities, 5) skills and competence – by gaining
supply chain risk, supply chain vulnerability and access to resources other than one’s own, and 6)
supply chain disruptions in traditional enterprises intelligence – by sharing market information.
will be linked to some of the prevailing ideas of Placing cooperative networks on a scale, going
how to ideally structure and organize a VEN. Es- from independent to integrated, Child et al., de-
sentially, current ideas on VENs, along the lines scribe five degrees of networks: 1) Equal-Partner
of Thompson (2008a), will serve as a base onto Network, 2) Unilateral Agreements, 3) Dominated
which traditional ideas on supply chain risk will Network, 4) Virtual Corporation, and 5) Strategic
be transposed. Alliance. The virtual corporation is described as “a
Thus, the idea of this chapter is to serve as a loosely coupled enterprise in which the parts are
descriptive rather than prescriptive concept or held together through the medium of sophisticated
framework for how a VEN is exposed to risk and information technology packages”. Interestingly,
furthermore to explore how a VEN can deal with they note that the virtual corporation may be “a
potential risks, using SCRM practices applied to transitional stage of company development on
a VEN environment. the path to complete hierarchy”, a statement that
is somewhat contradictory to Nolan & Croson
(1995), who foresaw networks emerging as the
BACKGROUND organizational forms of the future, replacing and
transforming the traditional pyramid-shaped hi-
It has been more than 15 years since the shape erarchical organization.
of today’s virtual enterprise networks began to
emerge when Snow, Miles, Coleman, & Henry The Concept of Virtual
(1992) identified 3 types of networks: 1) internal, Enterprises in the Past
2) stable and 3) dynamic, the latter composed of
“lead firms who identify new opportunities and In the late 1980s the term ‘virtual corporation’
then assemble a network of complementary firms began to appear for the first time. In the begin-
that meet the market needs” (Child, Faulkner, & ning, “virtual” referred to invisible or virtual links
Tallman, 2005a,). From this starting point, the between companies in the form of information and
definition of what constitutes a virtual enterprise communication technology, aka ICT or comput-
network, in literature, varies considerably. ers. Virtual corporations were technology-driven
corporations, using and sharing the same informa-
Virtual Enterprises: A Special tion systems:
Form of Cooperative Strategy
The virtual corporation is a temporary network
Traditional enterprises can enter into various of independent companies – suppliers, custom-
forms of cooperation without necessarily estab- ers, even erstwhile rivals – linked by information
lishing what is called a VEN. Child et al. (2005a) technology to share skills, costs, and access to
describe six reasons why firms seek to establish one another’s markets (Byrne, 1993).
cooperative networks: 1) certainty – by developing
relationships with mutual solidarity, 2) flexibil- Davidow and Malone (1993) describe virtual
ity – by being able to quickly allocate a range of corporations as being able to apprehend customer
resources, 3) capacity – by “outsourcing” work to needs and specifications and create new products
other network members, 4) speed – by being able instantaneously or on-the-fly, thus constantly re-

2
A Conceptual Framework for Risk and Vulnerability in Virtual Enterprise Networks

inventing themselves to accommodate or respond central corporation, with a centralized hierarchi-


to the market fluctuations: cal structure, 2) a cooperation among partners,
governed by a one corporation offering central
To the outside observer it will appear almost ed- services to its partners, but with the same equal
geless with permeable and constantly changing rights as the other partners, 3) a virtual corporation
interfaces between company, supplier and custom- with an independent coordinator, a so called third
ers […] with traditional offices, departments and party institution offering central services, and 4)
operating divisions constantly reforming accord- a virtual corporation with a common coordina-
ing to need. Job responsibilities will regularly tion of all partners, the idealistic type of a virtual
shift, as will lines of authority. (Davidow and corporation with no central control.
Malone, 1993). While Goranson (1993) is concerned with
the purpose of a VEN and differentiates them
Goranson (1993) describes a “virtual enter- accordingly, Bickhoff et al. (2003) seems more
prise (VE)” as “a temporary aggregation of core concerned with management and structure, similar
competencies and associated resources collabo- to the definition of a dynamic network in Snow et
rating to address a specific situation, presumed al. (1992). This distinction will become important
to be a business opportunity”. Goranson goes on later in this chapter.
to describe four different kinds of aggregations
or VEs: The Concept of Virtual
Enterprises Today
• An aggregation of firms formed in response
to an opportunity Although definitions and descriptions of virtual
• A pre-existing aggregation of core compe- enterprises vary, as noted by Cunha & Putnik,
tencies seeking new opportunities (2006), the intensive use of ICT is a common
• An existing supplier chain, responding to feature that goes further than other features in
market needs making a virtual enterprise different from a more
• A bidding consortium of conventional traditional cooperation between enterprises. As
businesses acting as one Child, Faulkner & Tallman (2005a) put it,

What these kinds of VEs have in common is The virtual corporation […] places its emphasis
that they are all designed for a certain purpose not primarily on how two or more firms can work
or certain business opportunity. The common together to their mutual advantage, but on how
denominator is the existence of a business one firm can be created with flexible boundaries
opportunity of mutual interest to all parties and ownership aided by the facilities provided
involved, or a business opportunity that cannot by electronic data exchange and communication
be realized without forming said aggregations. (Child et al., 2005a).
In some cases the collaboration will end when
the business opportunity has been fulfilled, in Thompson (2008a) employs a perhaps more
other cases it will continue. generalized view, where he sees the VEN as a busi-
Diverging from Goranson (1993), Bickhoff ness tool that can connect individual enterprises
et al. (2003) depict a different set of four basic into peer networks where appropriate collabora-
types of virtual corporations, all strongly linked tion practices and technologies enable them to have
by ICT in order to fulfill their business goals: the same capabilities and competitive advantage
1) a cooperation among partners, governed by a as large corporations, and his definition will be

3
A Conceptual Framework for Risk and Vulnerability in Virtual Enterprise Networks

used as the bedrock assumption for what a VEN the risks may change from project to project or
is for the remainder of this chapter: opportunity to opportunity.
While in a traditional enterprise setting the
A Virtual Enterprise Network (VEN) is a voluntary overall risk exposure may have a more static nature
and dynamic community of Small And Medium even in the most dynamic business environment,
Enterprises that commit to working together for a in a virtual enterprise network the risks themselves
set period of time, to collectively seek opportunities are highly dynamic because of the shifting play-
to participate in collaborative projects of mutual ers within the network. A VEN is often described
business interest. (Thompson, 2008a) as the best of everything, and consequently, the
VEN risk management must also be the best of
Thompson deviates thus from the focus on ICT everything, and in the case of this chapter, VEN
as the binding glue of a virtual corporation and risk management ought to be the best of everything
focuses on the organizational and co-operational supply chain risk management.
characteristics of a VEN; a VEN is thus a time- The question is, can traditional supply chain
limited and opportunity-limited construct for risk management assist in VEN risk manage-
individual firms to cooperate in. A VEN is a col- ment? In answering this, current ideas on how to
lection of smaller firms that outwardly act as one establish, assess and develop a VEN, as exempli-
while retaining their individual corporate identity. fied by Thompson and Goranson and others will
A VEN, as defined by Thompson, and as used in be used throughout this chapter as a backdrop
this chapter, is not a (primarily) vertically inte- for investigating risks in a VEN, as seen from a
grated supply chain in a distributed manufacturing supply chain perspective. How does traditional
or industrial environment, but rather a laterally supply chain risk management apply to a VEN,
integrated network of businesses. and how can VEN risk management be translated
Thompson even goes as far as saying that small into VEN management in general?
enterprises alone can only take on other small
enterprises; small enterprises in a VEN can take
on large corporations. What this means is that FUNDAMENTALS OF A VEN
small enterprises in a VEN can extend their market
reach beyond their individually reachable core A VEN is a network of a number of member
market; what this also means is that the VEN as enterprises and their individual competencies.
a whole is exposed to larger risks than each small These two dimensions, number of members, and
enterprise is exposed to individually. However, individual competencies or skills can be used to
as we shall see, the resources available to a VEN set up a classification scheme for VENs.
in managing those risks are greater than they are
for a large traditional enterprise. Four Basic Compositions of a VEN

Risks in Virtual Enterprises One of the foremost abilities of a VEN is its abil-
ity to quickly react to change and adapt to new
What is clear from the aforementioned definitions opportunities. According to Goranson (1992), this
is that a VEN is a time-limited structure; it has ability to change works along two dimensions: 1)
a set life-cycle, i.e. the duration of a project or the number or “types of change” an organization
opportunity in which the participating enterprises is able to undergo and 2) the “degree of change”
partake. This life cycle perspective poses certain an organization is able to undergo. The former he
challenges in how to manage VEN risks, since calls “scope”, the latter he calls “robustness”. The

4
A Conceptual Framework for Risk and Vulnerability in Virtual Enterprise Networks

Figure 1. Categorization of VENs based on number of members and individual member skills

more robust an enterprise is, the more radical a higher importance than perhaps VEN members
change it can gracefully address. with marketing skills. However, a VEN member
In a VEN, each member brings with it the with marketing skills can be potentially beneficial
types of change and degree of change it can ad- in a later business opportunity or in a later stage
dress on its own, individually contributing to the of the aforementioned biomedical enterprise.
whole picture of overall business opportunities The notion of skills in the VEN versus number
a VEN can participate in. The composition of a of members in the VEN leads to the concept of
VEN as to types of change and degree of change four basic VEN compositions, as illustrated in
is a determining factor in whether it will be suc- Figure 1:
cessful or not; it is also a determining factor in
the VENs degree of risk exposure. • Constrained
A VEN consists of members and their indi- • Limited
vidual skills. Some VENs are formed in response • Directed
to a possible business opportunity, some may • Free
already exist as a result of a past business oppor-
tunity, some may be formed with the prospect of The concept is analogous to a similar con-
entering new opportunities, although no oppor- cept used by Husdal (2009), who employed it to
tunities may exist at the present. Even though a categorize supply chains based on the number of
VEN can have many members, there are maybe transportation modes and links within each mode.
few differences in individual skills, which in turn The more modes there are or the more links there
may not open up too many different business are, the more diverse a transportation network is.
opportunities. Conversely, a VEN can have few Similarly, a VEN’s outreach in terms of potential
members with many individual skills; this will business opportunities is determined by the num-
open up more diverse business opportunities, ber of members and number of individual skills
but potentially exhaust the VEN because of the or competencies for each member (or vice versa:
overall work strain that is put on the few VEN Number of member skills or competencies and
members that possess the required skills by this number of individual members that possess this
business opportunity. For example, if a VEN skill or competence)
wants to cater towards biomedical research, VEN In a constrained VEN there are only few
members that possess innovation and creativity, members with few skills which the VEN has
along with laboratory facilities will likely be of to depend on, it is therefore constrained in its

5
A Conceptual Framework for Risk and Vulnerability in Virtual Enterprise Networks

scope. A VEN with many members, but with a to opportunity for each VEN member individually,
small collective skill set can be seen as a limited and for the VEN as a whole.
VEN, because of the limited set of opportuni- In assessing the capabilities of a VEN, Thomp-
ties it can exploit despite the large number of its son (2008a) suggests what he calls the “Ven Capa-
members. A VEN with few members, but with a bility Heatmap Technique” in order to establish a
wide range of individual skills can be seen as a VEN’s collective capabilities vis-à-vis a business
directed VEN since it is highly dependent on or opportunity (pp. 142-144). This technique estab-
directed towards these members when seeking lishes a matrix of capability types and capability
business opportunities. The ideal or free VEN is areas, with “Hot”, “Warm”, “Cool” and “Ice”
a VEN that has many members with a wide range zones, depending on the collective sum of each
of collective skills. VEN member’s type and area of capabilities. The
A constrained VEN can be seen as a worst-case Heatmap aims to be a strategic discussion starter,
scenario for a VEN, while a free VEN can be seen identifying areas where the network is strong or
as the ideal scenario for a VEN. A constrained VEN weak, where it may need new members, and where
can grow in three directions, it can add members it needs to focus its efforts.
or add skills, or ideally, both. To some degree, Thompson’s zones correspond
Admittedly, this may be seem like a simplistic to quadrants of Figure 1 above, where the “Hot”
concept, and obviously not all skills are created zone can be compared to the “Free” quadrant and
equal; vis-à-vis a business opportunity some the “Ice” zone compares to the “Constrained”
skills will be of higher importance than others, quadrant.
and it is not so much the number of skills per se Although rather crude in differentiation, these
that counts. four different types of VENs possess different
Another note that must be made about Figure 1 qualities, and consequently, require different risk
is that, obviously, there is a lower and upper limit management strategies.
as to the number of VEN members. Thompson
(2009) advocates no less than 10 and no more Roles in a VEN
than 30 members for a VEN to function properly
and to gain any synergy. It is not simply adding In addition to satisfying skill requirements, VEN
members and skills; it is adding the right members members must also play specific organizational
with the right skills. The different skills will also roles. Thompson (2008a) describes three basic
determine the different roles of the VEN members, roles that VEN members can take vis-à-vis a busi-
as explained in the next section. ness opportunity: lead, (actively) participate or
A similar argument as in Figure 1 can be made in (passively) contribute (Thompson, 2008a). This
relation to Goranson’s definition of agility, and we is what Davidow and Malone (1993) mean when
can construct the same categorization using types of they say that “Job responsibilities will regularly
change and degrees of change, replacing member shift, as will lines of authority”. Figure 3 visual-
skills with degrees of change and the number of izes this concept. Here, ten VEN members out
VEN members with types of change. The underly- of 15 are part of three projects or business op-
ing assumption is that more members bring more portunities, with each member having same or
competencies into the VEN and thus, more types of different roles in the different projects, based on
change and different opportunities are possible to the individual set of skills a VEN member brings
the VEN. At the same time, each VEN member has into the VEN.
a certain set of competencies, which determine the In the example of Figure 2, the leader of
degree of change that is possible from opportunity Project 2 is also a participant in Project 1 and a

6
A Conceptual Framework for Risk and Vulnerability in Virtual Enterprise Networks

Figure 2. Roles in a VEN

contributor in Project 3. The success of a VEN (2004) provide an excellent example, where the
hinges on having enough VEN members that can experiences of a near-VEN supply-chain are dis-
play these roles in the various business opportuni- cussed with reference to the strategies, methods
ties the VEN may want to engage in. Not having and technologies of a traditional supply-chain, but
enough flexibility would already make this VEN they do not mention supply chain risks. Hence, a
a constrained VEN, or at best a directed VEN that new model is needed, and this chapter intends to
is highly dependent on few selected key members develop such a model.
to provide the main thrust in fulfilling the business A traditional supply chain in its simplest
opportunities. Although this may not be of much form consists of a manufacturer, a supplier, and
concern in the early stages of VEN formation, a customer. Mimicking the flow of goods and
such a directed or selected configuration of VEN materials through the chain when assessing dif-
members could potentially be detrimental to VEN ferent parts of the supply chain, the manufacturer
survival as time progresses. is often called the “focal” company, the supplier
or supply-side is often seen as being upstream,
while the customer or demand-side is seen as be-
FROM A SUPPLy CHAIN TO A VEN ing downstream. The suppliers and customers on
either side can be further structured into 1st, 2nd,
One way of looking at a VEN risk from a supply 3rd and so on tiers (Harrison & Hoek, 2008). This
chain risk perspective is to convert a traditional creates a linear structure or chain, although the
supply chain to a VEN. Gunasekaran & Ngai term supply network is probably more appropriate

Figure 3. A VEN seen from a traditional supply chain perspective

7
A Conceptual Framework for Risk and Vulnerability in Virtual Enterprise Networks

Figure 4. Four basic risk management strate-


pliers or business contacts or other potential but
gies
not yet accredited VEN members. The market or
demand side of the VEN is where we find other
potential customers or business opportunities not
yet realized.
The success of the VEN is tied to the ability of
“real” companies (VEN members) to form virtual
organizations rapidly to meet an emerging time-
based opportunity (Goldman, 1995, p. 220). It
must accommodate the likelihood that a company
will be member of several virtual organizations
(business opportunities) at the same time and will
have a broad range of current and future partners.
This implies that each VEN member will also be
than supply chain in most cases in today’s modern, exposed to a broad range of risks that may or may
globalized and interlinked business world. not change from project to project.
Harland, Brenchley & Walker (2003) describe
three different stages in the evolution of supply
chains, the In-house model of the 1980s, the Fo- FROM SUPPLy CHAIN
cused model of the 1990s, and the Virtual model RISK TO VEN RISK
of today, where many supply activities are now
completely outsourced and where the once core Risk is an ambiguous concept, therefore there are
activity of manufacturing has been outsourced to many definitions of risk, depending on their spe-
contract manufacturers. Albeit not a full VEN, cific application and on their situational context.
Harland’s virtual model bears many of a VEN’s One of the most common meanings is that of risk
hallmark signs, where supply networks become as a threat or danger. In addition, risk often implies
ever more complex, dynamic and fast-changing the probability of a negative outcome. Harland,
webs of relationships. Brenchley & Walker (2003) define risk (R) as the
The traditional linear chain is not easily product of the probability (P) of a loss (loss) and
converted to a VEN perspective; nonetheless, the significance or impact (I) of the loss, related
an attempt is made in Figure 4, where a supply to an event n (n):
chain perspective has been replaced by a VEN
perspective. The center of the VEN realm is made Rn = P(loss)n x I(loss)n
up of a VEN project or business opportunity, in
this case linking two VEN members with one Technically speaking though, risk per se has
VEN customer, the linkage illustrated as VEN neither a positive nor a negative value and is per-
operations or VEN processes. The VEN itself haps more related to uncertainty, where eventuali-
is formed as a way to approach a set of certain ties can be either beneficial or adverse. In order
business opportunities, here marked by a set of to understand risk in a VEN it is necessary to first
customers. Not all VEN members participate look at the basics of risk and risk management.
actively in the business opportunity; some may
be mere contributors as in Figure 3, or participat-
ing in other projects or not at all. Outside of the
VEN on the supply side are VEN member sup-

8
A Conceptual Framework for Risk and Vulnerability in Virtual Enterprise Networks

The Risk Concept staff failing to perform. Commercial Risk is the


risk of business relationships failing. Technical
One of the more interesting and also commonly risk is the risk of physical assets failing or being
used risk definitions is the one found in Kaplan damaged. This grouping of risks implies that
(1997), later championed by Paulsson (2007). risks have a long-term, forward-looking element
This definition splits the concept of risk into (strategic risk) as well as a short-term, immediate
three different elements, together called a triplet. element (operational risk).
Each triplet identifies a risk scenario, involving While the above approach views risks from
a source, a likelihood and an impact: the point of business operations perspective, a
different view is employed by Christopher &
• What can happen and what is the cause? Peck (2004), building on Mason-Jones & Towill
• How likely is it that it will happen? (1998), who summarize enterprise-wide risk into
• If it does happen, what are the three groups, looking at where the risk source
consequences? resides:

A risk can be seen as incompletely described • Externally-driven or environmental risk


unless all three elements are in place. An untrained • Internally-driven or process risk
individual or business entity often stops short after • Decision-driven or information risk
the first, or maybe the second question, without
fully considering the third. In risk management, Externally-driven or environmental risks are
addressing the impacts is an important issue, which related to external factors that can affect a firm’s
is why the consequences need to be considered performance, such as competitors, customers,
along with the likelihood and source of risk. and regulations and technological advances.
Internally-driven or process risks are related to
Business Risks manufacturing or production, operations and
processing. Decision-driven or information risks
Business risks, by their own nature, are as diverse are related to insufficient or erroneous decision
as businesses are diverse and can arise from a support, along with contractual or legal issues.
number of external and internal sources. O’Hehir
(2007), identifies five core groups of risks that a Basic Risk Management
business has to face, while underlining that risks
are dynamic and not mutually exclusive; there is Risk reflects both the range of possible outcomes
no crisp borderline between the risk groups: and the probabilities for each of the outcomes.
Christopher (2005) advocates establishing a risk
• Strategic profile, with the purpose to establish where the
• Financial greatest vulnerabilities lie and where the “great-
• Operational est” risks are, based on the view that risk is the
• Commercial product of probability and impact.
• Technical A commonly used method for risk analysis
is to plot unforeseen or unwanted events in a so-
Strategic Risk is related to the uncertainty of called risk matrix. The matrix axes can be divided
plans failing or succeeding. Financial Risk is the qualitatively, where probabilities and impacts are
uncertainty of financial controls failing or succeed- subjective values, e.g. low/high and minor/major,
ing, Operational Risk is the risk of human error or or quantitatively, where probabilities and impacts

9
A Conceptual Framework for Risk and Vulnerability in Virtual Enterprise Networks

are objective values, e.g. incident frequency and develop different classifications or taxonomies of
cost in monetary units. risk. In a review of 208 journal articles on supply
The simplest form of risk management then chain risk management published from 2000 to
uses this matrix to discern four possible manage- 2007, Vanany, Zailani & Pujawan (2009) classi-
ment strategies (DeLoach, 2000), which can be fied the articles according to 15 industry sectors,
illustrated using Figure 4. 5 units of analysis, 3 types of risks and 4 stages
of risk management, and unsurprisingly, did not
• Avoid, in case of high probability/high find a consistent definition of supply chain risk.
impact What this classification indicates, then, is that
• Transfer, in case of high probability/low depending on your angle of approach, you are
impact likely to come up with very different definitions
• Reduce, in case of low probability/high of supply chain risk. Looking at VEN risk from
impact the viewpoint of supply chain risk it seems clear
• Accept or Retain, in case of low probabil- that VEN risk too will not have one definition,
ity/low impact but will depend on the individual VEN itself and
the different VEN business opportunities that are
Avoid-risks are risks that no business can explored in the VEN.
survive in the long run, if left unattended. That is A business is exposed to risk by a potentially
why these risks need to be avoided. Transfer-risks unlimited number of factors, which is perhaps
are not as critical as the aforementioned, but still one of the reasons why the supply chain risk lit-
warrant attention due to their potential disastrous erature seems inconsistent (Vanany et al.,2009).
impacts. Transfer means pooling or sharing risks, However, not all factors may have a significant
and insurance is one central element here, since impact, and the term risk driver is often used to
this transfers the risk to the insurer. Reduce-risks distinguish important factors or risk sources from
often relate to day-to-day issues and minor opera- unimportant factors or sources (Jütner, Peck &
tional events, and although perhaps insignificant Christopher, 2003). The notion of risk sources
on their own, the aggregate impact of these risks and drivers, as with risk itself, may depend on the
can eventually compromise overall operational user and the context. While the interest rate may
efficiency. Thus, the best way to deal with such be a driving factor vis-à-vis financial risk (risk
risks is to reduce their likelihood, usually by means source), a company’s loan exposure could be a
of “inspect and correct” (DeLoach, 2000). driving factor vis-à-vis changes in interest rate
(risk source). Nonetheless, it is important to keep
Supply Chain Risk these two terms, sources and drivers, separated.
Jütner et al. (2003) describe supply chain risk as
Supply Chain Management has always perceived a 4-fold construct:
risk and uncertainty as important issues, although it
is particularly in recent years that supply chain risk • Risk sources
management has gained an increasing popularity • Consequences of the risk sources
as a separate field of study, even outside academic • Risk drivers that turn risks into
journals, as seen in Sheffi (2005), Christopher consequences
(2005) and Walters (2007). • Strategies to address the risks
However, despite the growing interest, or
maybe because of it, different authors tend to In addressing the risk, they identify four
address different types of supply chain risks and separate risk mitigating strategies: 1) Avoidance,

10
A Conceptual Framework for Risk and Vulnerability in Virtual Enterprise Networks

Figure 5. Risk management strategies need to be mitigative and contingent

2) Control, 3) Co-Operation and 4) Flexibility. sources. Here the network risk sources also contain
Following the view of Asbjørnslett (2008), flex- the organizational risks related to each member in
ibility can be both mitigative and contingent, the supply chain or network. Both views (Jütner
although, the latter form of flexibility is what et al., 2003; Christopher & Peck, 2004) are sum-
Goranson (1993) prefers to call agility rather marized in Table 1.
than flexibility. Risk addressing strategies ought It is noteworthy that the supply chain council
to be differentiated into mitigative strategies (risk (SCC), a global non-profit consortium, now has
exposure reducing) and contingent strategies (risk implemented supply chain risk into their SCOR
impact reducing). Figure 5 illustrates this concept, model (Morrow, Wilkerson, & Davey, 2009).
where mitigative strategies address drivers, while The SCOR reference model is a widely accepted
contingent strategies address impacts. framework for evaluating and comparing sup-
Christopher & Peck (2004) distinguish between ply chain activities and their performance, and
three risk perspectives and five risk types, namely the SCOR supply chain risk framework uses
1) Internal to the focal firm: a) Process risk and the same four perspectives that are found in
b) Control risk, 2) External to the focal firm: c) Jütner et al. (2003) and Christopher and Peck
Supply risk and d) Demand risk, and 3) External (2004), slightly renamed: 1) Internal-facing, 2)
to the supply chain: e) Environmental risks. Pro- Customer-facing and 3) Supply-facing and 4)
cess risks relate to operations and manufacturing, Environment-facing.
while control risks relate to rules and systems
governing the organization. Supply risks relate VEN Risk
to the upstream flow of incoming supplies, while
demand risks relate to downstream disruptions One could argue that it is possible to transfer the
in outgoing product flows or incoming financial views of Christopher & Peck (2004) into a VEN
flows. Environmental risks relate to the outside context by replacing focal firm with VEN member
world, regulatory or political changes, natural and supply chain with VEN business opportunity.
hazards or other disasters. Still, obstacles do exist especially due to the fact
Actually, there is a fourth perspective, where that that a supply chain, seen as one entity, is a
both firm-internal and firm-external risks are vertically integrated system, while a VEN as an
contained: Internal to the supply chain (Process, entity is a laterally integrated system.
Control, Supply and Demand). This is picked up The three-division perspective employed by
by Jütner et al. (2003), where risks are divided Jütner et al. (2003) is probably the one best trans-
into three groups: 1) Organizational Risk Sources, ferrable to a VEN setting, and the three supply
2) Network Risk Sources, and 3) Environmental chain risk sources can be translated into VEN risk

11
A Conceptual Framework for Risk and Vulnerability in Virtual Enterprise Networks

Table 1. Risk perspectives, risk types and risk sources

Perspective Type Source


Internal to the focal firm Process risk Organizational risk
Control risk
External to the focal firm Supply risk
Demand risk
(Environmental risk)
Internal to the supply chain Process risk Network risk
Control risk
Supply risk
Demand risk
External to the supply chain Environmental risk Environmental risk
Source: Jütner et al. (2003), Christopher & Peck (2005)

sources as follows: 1) Organizational risks that Supply Chain Vulnerability


are internal to the VEN members and the custom- and VEN Vulnerability
ers in the business opportunity, 2) Network risks
that relate to the overall processes in the business Supply chain vulnerability is a concept that will
opportunity, starting with the VEN members and help understand the analogous concept of VEN
ending with the customer, and 3) Environmental vulnerability. Starting with the Oxford Advanced
risks outside of the structure of VEN – Customer Learner’s Dictionary, “vulnerable is defined as
– Business Opportunity. “weak and easily hurt physically or emotionally”.
There are other views and other differentiations What is weak or easily hurt when it comes to a
of supply chain risks, many of which are interest- VEN?
ing per se, but perhaps not so applicable to VENs. In terms of supply chains, Christopher (2005)
Worthwhile mentioning are Goshal (1987) and defines vulnerability as “an exposure to serious
Manuj & Mentzer (2008). Further literature can disturbance”, arising from internal as well as
also be found in the additional reading section at external risks. This extends the definition of vul-
the end of this chapter. nerability to its causes, the risks, and its impact,
Finally, there is the issue of whether we should a serious disturbance, but seems to omit the part
view a VEN as one entity or as a set of individual of how easily hurt the supply chain is.
members. In a supply chain all members work That perspective is provided by McManus,
towards the same goal, in a VEN not all members Seville, Brunsdon & Vargo, J. (2007) in the New
are engaged in the same business opportunities at Zealand research project “Resilient Organisa-
the same time, and thus, there will be an array of tions”, who established a vulnerability matrix
temporary “supply chains” or “networks” criss- for evaluating and improving organizational
crossing a VEN at any time. This makes VEN risk resilience. Here, vulnerability is the product of
management a complex process where oversight criticality and preparedness. Criticality describes
is imperative. how severe the impact of a disruption is, should a
Applying the risk understanding used in Jütner given component of a system fail, and prepared-
et al. (2003) to a VEN, VEN risks are the collective ness describes how well the organization can
sum of internal and external circumstances that function, despite the failed component, e.g. a
may influence the execution of VEN business op- breakdown of ICT, which in most VENs would
portunities and the operation of the VEN itself. be nothing short of a disaster, while other failures

12
A Conceptual Framework for Risk and Vulnerability in Virtual Enterprise Networks

may have lesser overall impacts. This definition control of the company, but must be dealt with
of vulnerability contains the element of easily accordingly, should they occur.
hurt, implying that a well-prepared organization The 4-level model employed by Peck is easily
can still function, and is not vulnerable, while an transferable to a VEN environment and is an ex-
ill-prepared organization is likely to fail and is, cellent tool for explaining the scope and dynamic
thus, vulnerable. It is the preparedness then that nature of supply chain risk. It emphasizes that a
determines the actual impact of disruptions. resilient network involves much more than the
Applied to a VEN environment, this perspec- design and management of robust supply chain
tive allows for the evaluation of critical VEN processes. It is also important to recognize that by
members or member skills and competencies, for taking actions to reduce risk at one point within
every individual business opportunity as well as the four levels, at the same time the risk profile
the VEN entity as a whole. for the other levels is changed, including players
and stakeholders not thought of in the initial risk
Supply Chain Networks assessment.
vis-à-vis VENs The 4-level model is also an excellent tool
for seeing the difference between a VEN and a
The view of a supply chain network that perhaps supply chain. On level 1 and 2 we find the flows
comes closest to a VEN is that of Peck (2005), of inventory and information, and the fixed and
where the “chain” is not a chain, but a complex mobile assets of manufacturing and distribution.
web or network of interlinked businesses. Here, On level 3 and 4 we find the inter-organizational
this network is seen as operating on four levels, network and relationships and the wider envi-
where the links within one level may not match ronment (Ekwall, 2009). It can be argued that a
the links within the other levels. supply chain in the traditional sense is primarily
At level 1, the supply chain is seen as a logis- concerned with level 1 and 2, while a VEN, seen
tics pipeline, where the focus on lean and agile as one entity, is perhaps more concerned with
practices have made supply chain performance level 3, and maybe, level 4. One implication that
the overall goal but at the same time it has also can be drawn from this argument is that VEN risk
exposed the supply chain to many risks. At level management is essentially different from supply
2 the focus is on the supply chain as a carrier chain risk management, and that while supply
of goods and information from the source to chain risk management often focuses on opera-
the end customer. Supply chain vulnerability is tions risks, VEN risk management should perhaps
determined by the intertwined connections in focus on relationship and network risks.
the transportation and communication networks
that link production sites, distribution centers,
warehouses, and retailers. At level 3 the view is STRATEGIES FOR
further afield, looking at the supply chain from MANAGING VEN RISKS
a strategic and management perspective, where
organizational management, power-sharing, col- In the recent literature, several “buzzwords” have
laboration and competition become important been linked to supply chain risk and disruption
factors in evaluating vulnerability. At level 4 management in various ways, among which are
the view is a broad macroeconomic perspective, robustness, flexibility, agility and resilience.
political, economic, social, legal and technologi- These concepts need to be explained both from
cal factors, and disruptions or sudden changes in a supply chain perspective as well as a VEN
these factors are more often than not beyond the perspective.

13
A Conceptual Framework for Risk and Vulnerability in Virtual Enterprise Networks

Robustness, flexibility, agility and resilience ity to modify a current direction to accommodate
stand out as four strategies or approaches towards and successfully adapt to changes in the environ-
supply chain disruptions. These four terms are ment, whereas robustness refers to the ability to
distinctively different and which strategy works endure such changes without adapting. Resilience
best would depend not only on the supply chain is the ability to survive despite withstanding a
in question as a whole, but also on the part of severe and enduring impact.
the supply chain that may be vulnerable. A best- Lee (2004) introduces the “Triple-A” supply
practice supply chain is likely to encompass all chain with the keywords agility, adaptability and
four, making it robust, flexible, agile and resilient alignment. Agility means to respond quickly to
at the same time. changes (and disruptions) in supply and demand,
In Rice & Canatio (2003) the focus is on adaptability means to adjust to shifting markets
security and resilience by upholding flexibility and alignment implies an equitable sharing of
and redundancy as two methods with the greatest costs, gains, risks, knowledge and information
potential to create resilience. Flexibility can here across the whole supply chain.
be seen as a contingency action (actions taken in Christopher & Peck (2004) reason that re-
the event of a disruption) and redundancy can silience implies agility, and define supply chain
be seen as a mitigation action (actions taken in agility as the ability to quickly respond to unpre-
advance of a disruption, hence incurring a cost dictable changes in demand and supply. They also
regardless of disruption), akin to the distinction underline that the key to an agile and responsive
between contingency and mitigation in Tomlin supply chain is a presence of agile partners up-
(2006), who also identified a third action: Pas- stream and downstream of the focal firm.
sively accept (or willingly ignore) the disruption The concepts of flexibility as a cross-enterprise
risk and the disruption itself. According to Tomlin undertaking is highlighted in Lummus, Duclos
this, more often than not, appears to be the default & Vokurka (2003) and later elaborated upon
strategy, even when it is not appropriate. in Duclos, Vokurka & Lummus (2004). Here,
Goranson (1992) differentiates between agility cross-enterprise flexibility must be present in 6
and flexibility. Flexibility is scheduled or planned components: 1) operations – the ability to config-
adaption to unforeseen yet expected external cir- ure assets and operations according to customer
cumstances. Agility is unplanned and unscheduled trends, 2) market – the ability to customize design
adaption to unforeseen and unexpected external and build close relationship with customers, 3)
circumstances. Interestingly, Sheffi (2005) em- logistics – the ability to receive and deliver ac-
ploys flexibility as a means to achieve resilience, cording to changes in supply and demand, 4) sup-
stating that “instead of relying solely on supply ply – the ability to reconfigure the supply chain,
chain redundancy, a well-managed firm should 5) organization – the ability to align labor force
develop resilience, by building flexibility that can skills with customer or demand requirements
be used to ‘bounce back’from disruptions.”(Sheffi, and 6) information systems – the ability to match
2005). information systems architectures with changing
The difference between robustness, flexibility, information needs.
agility and resilience is illustrated in Figure 6, It can be argued that this view on flexibility
adapted from Husdal (2008). is already present in a VEN, since it consists of
Flexibility or agility, robustness and resilience many small units which are inherently more able
are different sides of the same coin, yet at the same to respond quickly to changes than a larger static
time distinctively different animals (Asbjørnslett, organization. VENs are, by their own nature,
2008). Flexibility or agility is the inherent capabil- robust, flexible, agile and resilient.

14
A Conceptual Framework for Risk and Vulnerability in Virtual Enterprise Networks

Figure 6. The concepts of robustness, flexibility/


The notion that supply chain characteristics
agility and resilience
play a major role in supply chain disruptions is
greatly underscored in Craighead, Blackhurst,
Rungtusanatham & Handfield (2007), where the
severity of supply chain disruptions is related to
supply chain design characteristics (supply chain
density, supply chain complexity and node criti-
cality) and supply chain mitigation capabilities
(recovery capability and warning capability). In
brief: supply chain structure and supply chain
organization. It is argued that supply chain disrup-
tions and the associated operational and financial
costs should be viewed as a normal more than an
abnormal occurrence. However, there are specific
factors that contribute to or dampen the severity
of such disruptions.
These factors are presented in the form of 6
McManus et al. (2007) view resilience as
propositions: Firstly, propositions 1 to 3: an un-
a 3-fold construct, working in a complex, dy-
planned event that disrupts a supply chain is more
namic and interconnected fashion depending
likely to have a severe impact if the supply chain
on 1) keystone vulnerabilities, criticality and
structure is 1) dense or 2) complex or 3) contains
preparedness, which has already been covered
critical nodes or bottlenecks. Secondly, proposi-
in a previous section of this chapter, 2) situa-
tion 4 and 5: an unplanned event that disrupts a
tion awareness, stemming from an assessment
supply chain is less likely to have a severe impact
of the keystone vulnerabilities, and 3) adaptive
if the supply chain 4) has proactive or reactive
capacity, which is nothing other than flexibility
recovery capabilities or 5) warning capabilities,
and agility. Resilience, in essence, is the ability
as in detection and dissemination of critical
to survive disruptive changes despite severe
information. Thirdly, proposition 6, combining
impact.
the previous 5 propositions: an unplanned event
There is a distinct notion of different severity
disrupting a supply chain that is dense, complex
in these definitions, and in a business setting, the
and with many critical nodes is less likely to be
ability to survive (resilience) is likely to be much
severe if there is a capability to quickly detect
more important than the ability to quickly regain
and disseminate information about the event
stability (robustness) or the ability to divert (flex-
and thus respond and correct in a proactive or
ibility or agility).
reactive manner.
In a VEN context, proposition 1-2-3 can be
seen as a related to the number of members and
VEN CHARACTERISTICS AS
their skills and competencies, creating a situation
DISRUPTION IMPACT PARAMETERS
similar to Figure 1. Proposition 4 and5 can be seen
as related to situation awareness and preparedness,
Supply chain or VEN resilience is not only a
along the lines of McManus et al. (2007).
function of organizational preparedness and adapt-
Propositions 1-2-3 will differ from VEN to
ability; it is also a function of characteristics such
VEN. One could think of cases where the structure
as structure and design.
or design of the VEN is already pre-determined,

15
A Conceptual Framework for Risk and Vulnerability in Virtual Enterprise Networks

with no room for maneuvering or adding new management and information technology as the
members or skills. In other words, proposition 1-3 binding force between structure and organization.
stand, leaving proposition 4-5-6 as the key attack These two elements, structure and organization,
points for lessening the impact of disruptions on determine the degree of adaptability or the capacity
a VEN. Due to a VENs collective and collabora- the VEN possesses for dealing with or handling
tive structure, propositions 4 and5 are likely to disruptions that might occur.
be inherent to most VENs, and VENs should On the organizational side the individual mem-
fare better vis-à-vis disruptions than traditional bers within the VEN may or may not be equipped
supply chains. with situation awareness, adaptive capacity and
VEN vulnerability, then, is the susceptibility preparedness (McManus et al., 2007), on the
to harm arising from impacts of internal and ex- structural side, the VEN may be unequipped in
ternal risk sources and is determined by the VENs terms of skills and inadequate in member num-
structural and organizational deficiencies, which bers. The organization holds the preparedness,
may lead to an inadequate handling of aforesaid while the structure holds the skills, the agility
impacts. and the robustness. The warning capabilities are
determined by the established protocol of system
wide sharing of information on events relating
A CONCEPTUAL FRAMEwORK FOR to or important to the VEN, serving as a facilita-
VEN RISK AND VULNERABILITy tor towards how disruptions are handled. VEN
skills and competencies and VEN preparedness
Going back to the description of a VEN in Figure thus become two important factors in addressing
3, and taking into account the views of Christopher VEN disruptions.
and Peck (2004) and McManus et al. (2007), a Although in most cases the structure and
conceptual framework for risk and vulnerability organization of a VEN are not haphazardly put
in VENs is proposed as illustrated in Figure 7. together, the degree of order and focus in struc-
This Figure depicts how the vulnerability of a ture and organization will vary from company to
VEN is determined by its structural and organi- company within the VEN. It can be said that the
zational characteristics, and is analogous to the level of structural or organizational disorder that
framework used in Husdal (2009), proposing a is present in a VEN equals the cost the company
similar arrangement for risk and vulnerability in is willing to face vis-à-vis potential disruptions,
supply chains. while the level of organizational or structural order
On one side, the VEN is subject to certain is the premium the VEN is willing to pay to insure
potential impacts, here termed “disruptions”, itself against potential disruptions.
coming from a set of risk sources. On the other
side, the VEN has certain characteristics, which
make up the VEN vulnerability. VEN RISK MANAGEMENT
The risk side is divided into four risk catego- VIS-à-VIS BUSINESS
ries: 1) supply-side risk, 2) operational risks, CONTINUITy MANAGEMENT
3) demand-side risks and 4) external risks. The
vulnerability side is divided into two: 1) structural In today’s global and interwoven business en-
and 2) organizational characteristics. The term vironment, where supply chain disruptions can
structural refers first and foremost to the four occur more or less frequently, the subsequent
categories of VEN, while the term organizational failure of one contributing participant in the sup-
refers to the VEN-internal preparedness, with ply network (or chain) can potentially lead to the

16
A Conceptual Framework for Risk and Vulnerability in Virtual Enterprise Networks

Figure 7. VEN risks and VEN vulnerability: A conceptual framework

collapse of the whole network (or chain), since with their own interests in mind, they are basically
the individual members of the supply chain act undermining the VEN, and eventually this may
in their own interest only. The untimely “death” bring on its demise. Consequently, if there can be
of one member of the supply chain can lead to only win-win or lose-lose, the term business con-
an unexpected growth or windfall for a different tinuity management, or maybe more appropriately,
member of the supply chain and vice versa. It is VEN continuity management (VCM) should be an
a win-lose situation. integral part of VEN management.
A VEN, as defined earlier in this chapter, us- BCM, or Business Continuity Management
ing Thompson (2008), is a collaboration structure (Cornish, 2007), sometimes seen as a part of
rather than a competition one, a collective effort risk management, and sometimes vice versa,
rather than a set of individual efforts. The under- includes “the actions to be taken, resources
lying idea of a VEN is that the individual VEN required, and procedures to be followed to
members act with the collective interest in mind, ensure the continued availability of essential
thus ensuring that the success of any business services, programs and operations in the event
opportunity does not hinge on the efforts of an of unexpected interruptions” (Normann &
individual member alone, but hinges on all col- Lindroth, 2004). The main reason why supply
lectively supporting each other. The reason for this chain risk management should be implemented
is that in a VEN there is no win-lose, only win-win with BCM in mind, is the fact that businesses
or lose-lose relationship. Thompson’s emphasis are increasingly interconnected due the current
on collaboration and mutual interest is important trend towards outsourcing, globalization and
here; should the individual VEN members decide consolidation (Christopher, 2005), and more
to fight for positions or contracts or work solely often than not in the world of business these

17
A Conceptual Framework for Risk and Vulnerability in Virtual Enterprise Networks

interconnections exist unknowingly and unin- VEN MANAGEMENT


tentionally to the players involved.
In consequence, this may leave businesses VEN management involves both strategic and
without control of disruption sources, and only operational processes (Walters, 2004). Is it pos-
in control of disruption impacts. It follows then sible to separate VEN risk management from
that supply chain risk management must turn into VEN management itself? If we consider DeLo-
enterprise risk management, in line with DeLoach ach (2000) it is not: In order to align business
(2000), where the enterprise risk management is opportunities with strategy, processes, people,
seen as a natural evolution of operational risk man- technology and knowledge, risk management
agement into a strategic process, with clear linkage needs to be an enterprise-wide undertaking, not
to business opportunities, and with the purpose to discrete sets of actions in separate business areas.
align strategy, processes, people, technology and VEN risk management, thus, is an integral part of
knowledge on an enterprise-wide basis (DeLoach, VEN management and VEN leadership.
2000). If supply chain risks are considered to be
of a strategic nature, a well-handled supply chain VEN Leadership Roles
disruption can translate into business continuity,
while an ill-handled supply chain disruption can A VEN is a network of equal partners that will
translate into business dis-continuity. This is il- have different roles in different projects. While
lustrated no better than in the now classical, or Thompson (2008a) uses three basic roles, this may
rather infamous example of how to and how not not be enough for a VEN to fully function.
to handle supply chain disruptions, in the Nokia Katzy & Dissel (2001) describe six roles that
versus Ericsson battle in the Albuquerque plant are necessary for a virtual enterprise network to
fire (Normann & Jansson, 2004), where Nokia function: 1) Broker, 2) Competence Manager, 3)
through a proactive approach and a supply chain In/Outsourcing Manager, 4) Network Coach, 5)
that was flexible and agile enough managed to Project Manager and 6) Auditor. The broker’s
minimize the disruption impacts, whereas Erics- responsibility is to market the network vis-à-vis
son had a more reactive approach that eventually potential customers, while the competence man-
led to a disastrous financial loss. ager oversees available technologies within the
A VEN is an interconnected enterprise in itself, network on a general scale. The project manager
but due to its set of members and skills, it has an supervises operations of the virtual enterprise in
inherent flexibility and redundancy should one or a certain business opportunity, assisted by the in/
more of its members fail to fulfill their missions in outsourcing manager, who interacts with the indi-
the pursuit of a business opportunity. Thus, it may vidual network partners on a more detailed level
seem unlikely that a disruption within the VEN than the competence manager, handling the actual
will cause the entire VEN collapse and result in a resources needed for a given business opportunity.
VEN discontinuity or even business opportunity The last two roles are more independent of the
discontinuity as in the example in the previous actual business opportunity: The auditor provides
paragraph, Nonetheless, it is important to realize financial oversight and control, while the network
that managing supply chain disruptions in a VEN coach assists in creating the necessary cooperative
needs to take on a VEN-wide perspective, rather culture by setting business rules and routines and
than focusing on the supply chain of a given busi- by managing conflicts within the network. If we
ness opportunity alone. take the six roles of Katzy & Dissel (2001) and
align them with the flexibility components of
Duclos et al. (2003) we could say that the broker

18
A Conceptual Framework for Risk and Vulnerability in Virtual Enterprise Networks

oversees the market flexibility, the competence needed or obsolete, and deals with how to retire,
manager oversees information and organization replace or deplete the system.
flexibility, the project manager oversees opera- In a collaborative paper, Deng, Solvang &
tions flexibility, and the in/outsourcing manager Solvang (2000) identify 5 phases in the supply
oversees supply and logistics flexibility. chain life cycle: 1) identification of business
Child et al. (2005b) go further than simply opportunity, 2) selection of business partner, 3)
dividing roles in a VEN. For a virtual organization formation of the supply chain, 4) operation of
also requires strategic direction. They state that the supply chain, and 5) reconfiguration of the
a virtual corporation “needs a brain and a central supply chain. This is a repetitive cycle. For every
nervous system”. Its main task is to ensure the new business opportunity or product line these
coordination, communication, knowledge man- phases spring into action, thus creating a living
agement and governance among the partners. and dynamic supply chain.
The third party institutions’ core competence is A supply chain life cycle, and likewise, a
the management and government of the virtual VEN life cycle can thus be separated into three
corporation, particularly process and project man- basic stages: 1) formation, 2) operation and 3)
agement. Kupke & Lattemann (2007) agree in extinction. Each step is critical to the next step,
such a strict separation of the virtual corporation’s even extinction is critical to the next formation
value chain in primary and supporting functions, and the overall success for the supply chain and
where the third party acts as another partner in the the overall continuity of the business, akin to
network who is specialized on supporting func- Schumpeter’s “creative destruction” (Nolan &
tions, whereas the other partners are specialized Croson, 1995).
on specific primary functions. They call this “the In a VEN, this life cycle repeats itself for every
Strategic Virtual Corporation”. new business opportunity and can be a source of
risk that is often overlooked: the lacking transfer
VEN Life Cycle Challenges of knowledge.

A VEN is a time-limited structure; it has a set Knowledge Gap


life cycle. Thompson (2008b) describes VENs as
bioteams or groups that exhibit the characteristics One of the changes a VEN will face is termination
of a living system. Using an ant colony as example, or “death” (Thompson, 2008b) and this life cycle
Thompson contends that bioteams have four phase poses certain challenges. Although a VEN
stages: 1) Founding Stage, 2) Ergonomic Stage, may not disband entirely upon the realization and
3) Reproductive Stage, and 4) Terminal Stage. fulfillment of a business opportunity, some of its
This way of thinking is not completely new. members may leave, possibly seeking other VENs,
Looking at supply chains from a systems perspec- or possibly going back to stand on their own.
tive in her PhD thesis, Solvang (2001) describes Unlike a supply chain, a VEN is more loosely
a supply chain as having a life cycle with three coupled and terminations of individual members
stages: initiation, operation and cessation. The may and will occur more frequently than in a
first part brings the system into being and deals traditional supply chain. With members leaving
with questions of how to design, structure, and or not participating again in future projects, skills
develop the system. The second stage deals with and competencies acquired during a business
operational issues, how to manage, maintain, opportunity are not transferred from project to
support and upgrade the system, and so on. The project. In O’Hehir’s risk classification this would
third part steps in when the system is no longer be termed commercial risk.

19
A Conceptual Framework for Risk and Vulnerability in Virtual Enterprise Networks

Members who leave a VEN may create a it is exposed to. Since a limited VEN has many
knowledge gap (Kupke & Lattemann, 2007). If this members, risks can be pooled or shared, hence
missing knowledge is an important prerequisite for Transfer. Finally, the directed VEN, as mentioned
the next business opportunity, the VEN may lose in the beginning of this chapter, channels much
its competitive advantage, and miss out on poten- of its resources towards few selected members,
tial new business opportunities. Thus, knowledge and we need to Reduce the individual risk each
management (Buzon, Bouras, & Ouzrout, 2004; member is exposed to.
Simões & Soares, 2004) becomes an important Approaching to a conclusion, a definition
issue in VEN risk management. of VEN risk management is in place. Follow-
Here, the “competence” manager (Katzy & ing Paulsson (2004) and Kajüter (2003), supply
Dissel, 2001) holds a crucial role in keeping track chain risk management can be described as the
of which knowledge is lost or not and how it can intersection of supply chain management and risk
be replaced. The flexibility, agility, robustness and management. It has a collaborative and structured
resilience of a VEN lies perhaps not so much in approach, and is included in the planning and
its structure or size, but in its reservoir of knowl- control processes of the supply chain, to handle
edge, skills and competencies. A potential loss risks which might affect the achievement of the
of knowledge from one business opportunity to supply chain goals.
the other is probably one of the most challenging Based on the above, the following definition
vulnerabilities a VEN must address in order to can be set up for VEN risk management: VEN risk
stay competitive. management is the intersection of VEN manage-
ment and risk management. It has a collaborative
VEN Risk Management and structured approach, and is included in the
planning and control processes of the VEN, to
It is possible to take the four basic risk manage- handle risks which might affect the achievement
ment strategies, namely Avoid, Reduce, Transfer of the VEN goals, collectively for the VEN as a
and Retain and apply them to the four VEN types whole, or individually for the ongoing projects or
that were discussed earlier. By switching the business opportunities within the VEN.
placement of Retain and Avoid, and overlaying A VEN, like any other business, is exposed to
the risk management strategies matrix onto the risk similar to supply chains. VEN risk manage-
VEN category matrix, this results in the following ment however, appears to have less in common
VEN risk management strategies: with supply chain risk management and more
in common with enterprise risk management or
• Constrained VEN – Avoid business continuity. It follows from the arguments
• Directed VEN – Reduce made in this chapter that the third party mentioned
• Limited VEN – Transfer in Kupke & Lattemann (2007) also ought to have
• Free VEN – Retain the role of risk manager, providing strategic and
operational insights for VEN risk management.
The constrained VEN is a situation that was
earlier described as a worst-case scenario, and
in terms of VEN risk management it definitely FUTURE RESEARCH DIRECTIONS
is an Avoid scenario. Conversely, a free VEN
falls into the Retain or Accept category, since Abrahamson (2008) describes logistics as having
we can assume that such a VEN possesses the evolved from transaction-based logistics to value-
necessary resources to address the various risks based logistics in four stages: 1) optimization of

20
A Conceptual Framework for Risk and Vulnerability in Virtual Enterprise Networks

flows and specialization of tasks, 2) economies of This is particularly the case when it comes to the
scale with centralization of tasks, 3) economies of communication of tacit knowledge, where there is
scope with flexibility in tasks, and 4) economies a need for industry standards and where the growth
of integration with tasks interfacing directly with potential lies in extending existing markets rather
the end customer. This, he says, has readied the than exploring new markets. However, in markets
ground for an agile and “opportunity-driven” with considerable turbulence, where there is a
supply-chain. An opportunity-driven supply chain need for response and flexibility across a global
is only a small step away from a VEN, and it ap- perspective, a single firm may not have the required
pears that the supply chain of the future will share resources, and that is when virtual corporations
many characteristics with a VEN. The congruence come into play. Virtual and integrated corporations
of virtual enterprise networks and supply chains or are likely to exist side-by-side, with one becoming
networks means that supply chain risks and VEN the selected winner in certain markets, but not in
risks are likely to share much common research others. Somewhat outside the risk-related scope
ground in the future. of this chapter, but one possible research alley
The division of VENs into four distinct groups would be to define these markets and why there is
based on number of members and number of less risk for a virtual enterprise network in some
skills and competencies is of course a rough markets as opposed to other markets.
differentiation, and more refinement is required. Following up on Kupke and Lattemann (2007),
What is needed is to collect relevant examples the problem of the experience gap due to the fre-
of “real” companies that may be associated with quent reconfiguration and retirement of partners
the categorization presented in Figure 1, and poses a serious risk to VEN continuity. A VEN
subsequently, it would be interesting to verify is a knowledge-driven undertaking and further
if the same companies fit the four risk strategies work should concentrate on empirical analysis of
proposed above. This, in turn will help in further this experience gap and – to rephrase Kupke and
exploring the framework for risk and vulnerabil- Lattemann (2007) – the concept of the Strategic
ity (see Figure 7), particularly as to how the four Virtual Enterprise Network.
categories influence the vulnerability of a VEN
and how VEN preparedness plays a role in risk
management. CONCLUSION
Zsidisin (2003) suggests that managerial
approach to risk from different perspectives is This chapter has attempted to interface sup-
an area for future research in supply chain risk. ply chain perspectives with VEN perspectives,
This is not less important in a VEN. It is indeed showing how risk management practices and
important to understand what different people in approaches in supply chains can apply to risk man-
an organization or across different organizations agement in VENs. The discussion has been kept
within a VEN perceive about VEN risks. Different at an executive level, and in a pondering manner
perception about risks among the different VEN sought to give strategic advice on the intersection
members could pose a conflict in deciding what of two much related research areas.
actions to choose in a time of need. In conclusion it must be said that a VEN is a
In their appraisal of the virtual corporation, business entity, not a supply chain. Not necessar-
Child et al. (2005b) do not see the virtual corpora- ily not, one should add, since all businesses one
tion as the ultimate type of business cooperation. way or the other and to a varying degree possess
In most circumstances, so they say, the integrated linkages to their suppliers and customers, which
corporation outperforms the virtual corporation. implies that all business opportunities in a VEN,

21
A Conceptual Framework for Risk and Vulnerability in Virtual Enterprise Networks

like it or not, constitute some form of supply chain Child, J., Faulkner, D., & Tallman, S. B. (2005a).
or supply network. With this in mind, ideas from Networks. In Cooperative Strategy (pp. 145–163).
supply chain risk management can very well aid in Oxford, UK: Oxford University Press.
a fruitful discussion of VEN risk management.
Child, J., Faulkner, D., & Tallman, S. B. (2005b).
Approaching VENs from a supply chain
The Virtual Corporation. In Cooperative Strategy
perspective can assist in defining the risks and
(pp. 164–189). Oxford, UK: Oxford University
challenges a VEN faces and how to manage them,
Press.
particularly since many of the traditional supply
chain risks stem from a lack of collaboration Christopher, M. (2005). Managing risk in the
and visibility, the hallmarks of VENs, making a supply chain. In Logistics and Supply Chain
VEN perhaps the ideal setup for supply chains Management (3rd ed., pp. 231–258). Harlow,
and making supply chain risk management prac- UK: Prentice Hall.
tices a fertile ground for researching VEN risk
Christopher, M., & Peck, H. (2004). Build-
management.
ing the resilient supply chain. International
Journal of Logistics Management, 15(2).
doi:10.1108/09574090410700275
REFERENCES
Cornish, M. (2007). The business continuity
Abrahamson, M. (2008). The Role of Logistics in planning methodology. In Hiles, A. (Ed.), The
Corporate Strategy. In Arlbjørn, J. S., Halldorson, Definitive Handbook of Business Continuity
A., Jahre, M., & Spens, K. (Eds.), Northern Lights Management (pp. 105–118). Chichester, UK:
in Logistics & Supply Chain Management (pp. John Wiley & Sons.
49–63). Copenhagen, Denmark: CBS Press.
Craighead, C. W., Blackhurst, J., Rungtusanatham,
Asbjørnslett, B. (2008). Assessing the Vulner- M. J., & Handfield, R. B. (2007). The Severity
ability of Supply Chains. In Zsidisin, G. A., & of Supply Chain Disruptions: Design Charac-
Ritchie, B. (Eds.), Supply Chain Risk: A Handbook teristics and Mitigation Capabilities. Decision
of Assessment, Management and Performance. Sciences, 38(1), 131–156. doi:10.1111/j.1540-
New York: Springer. 5915.2007.00151.x
Bickhoff, N., Böhmer, C., Eilenberger, G., Han- Cunha, M. M., & Putnik, G. (2006). Agile Virtual
smann, K.-W., Niggemann, M., & Ringle, C. Enterprises: Implementation and Management
(2003). Mit Virtuellen Unternhemen zum Erfolg Support. Hershey, PA: Idea Group Publishing.
- Ein Quick-Check für Manager. Berlin, Germany:
Springer. Dawidow, W. H., & Malone, M. S. (1993). The Vir-
tual Corporation. New York: HarperBusiness.
Buzon, L., Bouras, A., & Ouzrout, Y. (2004).
Knowledge Exchange in a Supply Chain Con- De Loach, J. W. (2000). Enterprise-wide Risk
text. In Camarinha-Matos, L. M. (Ed.), Virtual Management: Strategies for linking risk and
Enterprises and Collaborative Networks (pp. opportunity. London: Financial Times/Prentice
145–152). Boston: Springer. doi:10.1007/1-4020- Hall.
8139-1_16 Deng, Z., Solvang, B., & Solvang, W. D. (2000).
Byrne, J. A. (1993, February 8). The Virtual Cor- Collaboration and Co-ordination of Virtual Supply
poration. Business Week. Chain via Electronic Networking. Paper presented
at The 16h IFIP World Computer Congress, Bei-
jing, China.

22
A Conceptual Framework for Risk and Vulnerability in Virtual Enterprise Networks

Duclos, L. K., Vokurka, R. J., & Lummus, Kajüter, P. (2003). Risk Management in Supply
R. R. (2003). A conceptual model of sup- Chains. In Seuring, S., Müller, M., Goldbach,
ply chain flexibility. Industrial Manage- M., & Schneidewind, U. (Eds.), Strategy and
ment & Data Systems, 103(5/6), 446–456. Organization in Supply Chains. Heidelberg,
doi:10.1108/02635570310480015 Germany: Physica.
Ekwall, D. (2009). Managing the Risk for An- Kaplan, S. (1997). The words of risk
tagonistic Threats against the Transport Network. analysis. Risk Analysis, 17(4), 407–417.
Unpublished PhD thesis, University of Borås, doi:10.1111/j.1539-6924.1997.tb00881.x
Sweden.
Katzy, B. R., & Dissel, M. (2001). A toolset
Goldman, S. L., Nagel, R. N., & Preis, K. (1995). for building the virtual enterprise. Journal of
Agile Competitors and Virtual Organizations - Intelligent Manufacturing, 12(2), 121–131.
Strategies for Enriching the Customer. New York: doi:10.1023/A:1011248409830
Van Nostrand Reinhold.
Kupke, S., & Lattemann, C. (2007). The strategic
Goranson, T. (1999). The Agile Virtual Enterprise. virtual corporation: bridging the experience gap.
Westport, CT: Quorum Books. International Journal of Web Based Communities,
3(1), 4–15. doi:10.1504/IJWBC.2007.013770
Gunasekaran, A., & Ngai, E. W. T. (2004). Virtual
supply-chain management. Production Planning Lee, H. L. (2004). The Triple-A Supply Chain.
and Control, 15(6), 584–595. doi:10.1080/09537 Harvard Business Review, 82(10), 102–112.
280412331283955
Lummus, R. R., Duclos, L. K., & Vokurka, R.
Harland, C., Brenchley, R., & Walker, H. (2003). J. (2003). Supply Chain Flexibility: Building a
Risk in supply networks. Journal of Purchas- New Model. Global Journal of Flexible Systems
ing and Supply Management, 9(2), 51–62. Management, 4(4), 1–13.
doi:10.1016/S1478-4092(03)00004-9
Mason-Jones, R., & Towill, D. R. (1998). Shrink-
Harrison, A., & van Hoek, R. (2008). Logistics ing the supply chain uncertainty circle. IOM
Management and Strategy: Competing Through Control, 24(7), 17–22.
The Supply Chain. London: Prentice Hall.
Mc Manus, S., Seville, E., Brunsdon, D., & Vargo,
Husdal, J. (2008). Does location matter? Paper J. (2007). Resilience Management: A Framework
presented at the International Conference on for Assessing and Improving the Resilience of
Flexible Supply Chains in a Global Economy, Organisations (No. 2007/01). Christchurch, New
Molde, Norway. Zealand: Resilient Organisations.
Husdal, J. (2009). Does location matter? Sup- Morrow, D., Wilkerson, T., & Davey, M. (2009).
ply chain disruptions in sparse transportation SCOR for Supply Chain Risk Management.
networks. Paper presented at the TRB Annual Retrieved March 14, 2009, from http://www.
Meeting, Washington, DC. supply-chain.org/
Jütner, U., Peck, H., & Christopher, M. (2003). Nolan, R. L., & Croson, D. C. (1995). Creative
Supply Chain Risk Management: Outlining Destruction: A Six-Stage Process for Transform-
an Agenda for Future Research. International ing the Organization. Boston: Harvard Business
Journal of Logistics: Research and Applications, School Publishing.
6(4), 197–210.

23
A Conceptual Framework for Risk and Vulnerability in Virtual Enterprise Networks

Norman, A., & Lindroth, R. (2004). Categorization Simões, D., & Soares, A. L. (2004). The Formation
of Supply Chain Risk and Risk Management. In and Dissolution of Organizational Networks: A
Brindley, C. (Ed.), Supply Chain Risk (pp. 14–27). Knowledge Management Perspective. In Cama-
Aldershot, UK: Ashgate. rinha-Matos, L. M. (Ed.), Virtual Enterprises and
Collaborative Networks (pp. 301–310). Boston:
Norrman, A., & Jansson, U. (2004). Erics-
Springer. doi:10.1007/1-4020-8139-1_32
son’s proactive supply chain risk management
approach after a serious sun-supplier event. Snow, C. S., Miles, R. E., Coleman, H. J., & Henry,
International Journal of Physical Distribution H. J. (1992). Managing 21st Century Network
& Logistics Management, 34(5), 434–456. Organizations. Organizational Dynamics, 20(3),
doi:10.1108/09600030410545463 5–21. doi:10.1016/0090-2616(92)90021-E
O’Hehir, M. (2007). What is business continuity Solvang, W. D. (2001). Architecture for supply
planning (BCP) stratetgy? In Hiles, A. (Ed.), chain analysis and methodology for quantitative
The Definitive Handbook of Business Continuity measurement of supply chain flexibility. Unpub-
Management (pp. 27–46). Chichester, UK: John lished PhD dissertation, NTNU, Trondheim,
Wiley & Sons. Norway.
Paulsson, U. (2004). Supply Chain Risk Manage- Thompson, K. (2008). The Networked Enterprise.
ment. In Brindley, C. (Ed.), Supply Chain Risk. Tampa, FL: Meghan-Kiffer Press.
London: Ashgate.
Thompson, K. (2008b). Bioteams. Tampa, FL:
Paulsson, U. (2007). On Managing Disruption Meghan-Kiffer Press.
Risks in the Supply Chain - the DRISC Model.
Thompson. (2009, March). Collaborating for
Unpublished PhD dissertation, Lund University,
New Business. Presented at Connecting Inno-
Lund, Sweden.
vation, Brighton, UK. Retrieved June 29, from
Peck, H. (2005). Drivers of supply chain bioteams.com/2009/05/20/the_networked_en-
vulnerability: an integrated framework. In- terprise.html
ternational Journal of Physical Distribution
Tomlin, B. (2006). On the value of Mitigation
& Logistics Management, 35(3/4), 210–229.
and Contingency Strategies for Managing Supply
doi:10.1108/09600030510599904
Chain Disruption Risks. Management Science,
Rice, J. B., & Caniato, F. (2003). Building a se- 52(5), 639–657. doi:10.1287/mnsc.1060.0515
cure and resilient supply network. Supply Chain
Vanany, I., Zailani, S., & Pujawan, I. N. (2009).
Management Review, 7(5), 22–30.
Supply Chain Risk Management: Literature Re-
Sengupta, S. (2008). A Plan for Building a New view and Future Research. International Journal
Supply Chain. Supply Chain Management Review, of Information Systems and Supply Chain Man-
12(1), 46–52. agement, 2(1), 16–33.
Sheffi, Y. (2005). The Resilient Enterprise - Over- Walters, D. (2004). A Business Model for Manag-
coming Vulnerability for Competitive Advantage. ing the Virtual Enterprise. In Camarinha-Matos,
Cambridge, MA: MIT Press. L. M. (Ed.), Virtual Enterprises and Collabora-
tive Networks (pp. 273–280). Boston: Springer.
doi:10.1007/1-4020-8139-1_29

24
A Conceptual Framework for Risk and Vulnerability in Virtual Enterprise Networks

Walters, D. (2007). Supply Chain Risk Manage- Dorfman, M. S. (2002). Risk Management. In
ment: Vulnerability and Resilience in Logistics. Introduction to Risk Management and Insurance
London: Kogan Page. (pp. 43–61). Upper Saddle River, NJ: Prentice
Hall.
Zsidisin, G. A. (2003). Managerial perceptions of
supply risk. Journal of Supply Chain Management, Gerber, A., Althaus, K., Dietzsch, M., Weidlich, D.,
39(1), 14–25. doi:10.1111/j.1745-493X.2003. & Steiner, R. (2004). Risk-Management of Prod-
tb00146.x uct Development in Non-Hierarchical Regional
Production Networks. In Camarinha-Matos, L.
M. (Ed.), Virtual Enterprises and Collabora-
tive Networks (pp. 509–516). Boston: Springer.
ADDITIONAL READINGS
doi:10.1007/1-4020-8139-1_54
Blecker, T., Kersten, W., Späth, H., & Koeppen, Ghoshal, S. (1987). Global Strategy: An Organiz-
B. (2007). Supply Chain Risk Management: A ing Framework. Strategic Management Journal,
Game Theoretic Analysis. In Wang, W. Y. C., 8(5), 425–440.
Heng, M. S. H., & Chau, P. Y. K. (Eds.), Supply
Chain Management: Issues in the New Era of Giertz, E. (1999). Säkra företagets flöden. Stock-
Collaboration and Competition (pp. 355–386). holm, Sweden: Silfgruppen.
Hershey, PA: Idea Group Publishing. Holling, C. S., Berkes, F., & Folke, C. (2008).
Cooper, M. C., Ellram, L. M., Gardner, J. T., & Science, sustainability, and resource management.
Hanks, A. M. (1997). Meshing multiple alliances. In Berkes, F., & Folke, C. (Eds.), Linking Social
Journal of Business Logistics, 18(1), 67–89. and Ecological Systems: Management Practices
and Social Mechanisms for Building Resilience.
Cousins, P. (2002). A conceptual model for Cambridge, UK: Cambridge University Press.
managing long-term inter-organisational rela-
tionships. European Journal of Purchasing & Husdal, J. (2008b). Supply Chain Risk: The dark
Supply Management, 8(2), 71–82. doi:10.1016/ side of Supply Chain Management. Unpublished
S0969-7012(01)00006-5 guest lecture. Molde University College. Re-
trieved February 28, 2009, from http://husdal.
Crossman, A., & Lee-Kelly, L. (2004). Trust, com- com/2008/11/12/supply-chain-risk/
mittment and team working: the paradox of virtual
organizations. Global Networks, 4(4), 375–390. IRM. (2002). A Risk Management Standard.
doi:10.1111/j.1471-0374.2004.00099.x Retrieved March 16, 2009, from http://www.
theirm.org/publications/documents/Risk_Man-
Cueni, T., & Seiz, M. (1999). Virtual organizations agement_Standard_030820.pdf
– the next Economic Revolution? Unpublished
paper. Swiss Federal Institute of Technology, Kaplan, S., & Garrick, B. J. (1981). On the quanti-
EPFL, Lausanne, Switzerland. Retrieved June tative definition of risk. Risk Analysis, 1(1), 11–27.
29, from www.nubix.ch/vo/virtual.pdf doi:10.1111/j.1539-6924.1981.tb01350.x

Das, T., & Teng, B. (2001). Trust, Control, and Kasper-Fuehrer, E. C., & Ashkanasy, N. M. (2001).
Risk in Strategic Alliances: An Integrated Frame- Communicating trustworthiness and building trust
work. Organization Studies, 22(2), 251–283. in inter-organizational virtual organizations. Jour-
doi:10.1177/0170840601222004 nal of Management, 27(3), 235–254. doi:10.1016/
S0149-2063(01)00090-3

25
A Conceptual Framework for Risk and Vulnerability in Virtual Enterprise Networks

Kaye, D. (2008). Managing Risk and Resilience Nemiro, J., Beyerlein, M., Bradley, L., &
in the Supply Chain. London: BSI. Beyerlein, S. (2008). The Handbook of High-
Performance Virtual Teams. San Francisco: John
Kleindorfer, P. R., & Wassenhove, V. L. N. (2004).
Wiley & Sons.
Managing risk in global supply chains. In Gati-
gnon, H., & Kimberly, J. R. (Eds.), The INSEAD- Peck, H. (2006). Reconciling supply chain vul-
Wharton Alliance on Globalizing - Strategies nerability, risk and supply chain management.
for Building Successful Global Businesses (pp. International Journal of Logistics: Research and
288–305). Cambridge, UK: Cambridge Univer- Applications, 9(2), 127–142.
sity Press.
Porter, M. E. (1985). Competitive Advantage:
Koubatis, A., & Schönberger, J. Y. (2005). Risk creating and sustaining superior performance.
management of complex critical systems. Interna- New York: Free Press.
tional Journal of Critical Infrastructures, 1(2/3),
Ritchie, B., & Brindley, C. (2007). Supply
195–215. doi:10.1504/IJCIS.2005.006119
chain risk management and performance.
Lau, H. C. W., Chin, K. S., Pun, K. F., & Ning, International Journal of Operations &
A. (2000). Decision supporting functionality in Production Management, 27(3), 303–322.
a virtual enterprise network. Expert Systems with doi:10.1108/01443570710725563
Applications, 19(4), 261–270. doi:10.1016/S0957-
Sabbaghi, A., & Vaidyanathan, G. (2007). Integra-
4174(00)00038-5
tion of Global Supply Chain Management with
Lau, H. C. W., Wong, C. W. Y., Ngai, E. W. T., & Small and Medium Suppliers. In Wang, W. Y. C.,
Hiu, I. K. (2003). Quality management framework Heng, M. S. H., & Chau, P. Y. K. (Eds.), Supply
for a virtual enterprise network: a multi-agent Chain Management: Issues in the New Era of
approach. Managing Service Quality, 13(4), Collaboration and Competition (pp. 127–164).
300–309. doi:10.1108/09604520310484716 Hershey, PA: Idea Group Publishing.
Lin, A., & Patterson, D. (2007). An Investigation Svensson, G. (2000). A conceptual framework
into the Barriers to Introducing Virtual Enterprise for the analysis of vulnerability in supply chains.
Networks. In Wang, W. Y. C., Heng, M. S. H., International Journal of Physical Distribution
& Chau, P. Y. K. (Eds.), Supply Chain Manage- & Logistics Management, 30(9), 731–749.
ment: Issues in the New Era of Collaboration doi:10.1108/09600030010351444
and Competition (pp. 23–44). Hershey, PA: Idea
Svensson, G. (2004). Key areas, causes and con-
Group Publishing.
tingency planning of corporate vulnerability in
Manuj, I., & Mentzer, J. T. (2008). Global Supply supply chains. International Journal of Physical
Chain Risk Management. Journal of Business Distribution & Logistics Management, 34(9),
Logistics, 29(1), 133–155. 728–748. doi:10.1108/09600030410567496
Markus, M. L., Manville, B., & Agres, C. E. (2000). Tang, C. S. (2006). Perspectives in supply
What makes a Virtual Organization Work? MIT chain risk management. Journal of Production
Sloan Management Review, 42(1), 13–26. Economics, 103(2), 451–488. doi:10.1016/j.
ijpe.2005.12.006
Moshowitz, A. (1994). Virtual Organization: A
Vison of Mangement in the Information Age. The
Information Society, 10(4), 267–288.

26
A Conceptual Framework for Risk and Vulnerability in Virtual Enterprise Networks

Wagner, S., & Bode, C. (2008). An empirical Zsidisin, G. A., & Ellram, L. M. (2003). An Agency
examination of supply chain performance along Theory Investigation of Supply Risk Manage-
several dimensions of risk. Journal of Business ment. Journal of Supply Chain Management,
Logistics, 29(1), 307–325. 39(3), 15–27. doi:10.1111/j.1745-493X.2003.
tb00156.x

27

S-ar putea să vă placă și