Sunteți pe pagina 1din 313

E-Supply Chain

Technologies
and Management
Qingyu Zhang
Arkansas State University, USA

InformatIon scIence reference


Hershey London Melbourne Singapore
Acquisitions Editor: Kristin Klinger
Development Editor: Kristin Roth
Senior Managing Editor: Jennifer Neidig
Managing Editor: Sara Reed
Assistant Managing Editor: Sharon Berger
Copy Editor: Maria Boyer
Typesetter: Michael Brehm
Cover Design: Lisa Tosheff
Printed at: Yurchak Printing Inc.

Published in the United States of America by


Information Science Reference (an imprint of IGI Global)
701 E. Chocolate Avenue, Suite 200
Hershey PA 17033
Tel: 717-533-8845
Fax: 717-533-8661
E-mail: cust@idea-group.com
Web site: http://www.idea-group-ref.com

and in the United Kingdom by


Information Science Reference (an imprint of IGI Global)
3 Henrietta Street
Covent Garden
London WC2E 8LU
Tel: 44 20 7240 0856
Fax: 44 20 7379 0609
Web site: http://www.eurospanonline.com

Copyright 2007 by Idea Group Inc. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by any
means, electronic or mechanical, including photocopying, without written permission from the publisher.
Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a
claim of ownership by IGI of the trademark or registered trademark.

Library of Congress Cataloging-in-Publication Data

E-supply chain technologies and management / Qingyu Zhang, editor.

p. cm.

Summary: "This book explores concepts, models, and IT infrastructures of the e-supply chain, and develops a broad understanding of issues
pertaining to the use of emerging technologies and their impact on supply chain flexibility and management. It provides key ideas, concepts and
applications suited to guide efforts in transforming current business processes to adapt to the digital age"--Provided by publisher.

Includes bibliographical references and index.

ISBN 978-1-59904-255-8 (hardcover) -- ISBN 978-1-59904-257-2 (ebook)

1. Business logistics--Technological innovations. 2. Information technology. I. Zhang, Qingyu, 1970-

HD38.5.E18 2007

658.70285'4678--dc22

2006033760

British Cataloguing in Publication Data


A Cataloguing in Publication record for this book is available from the British Library.

All work contributed to this book set is new, previously-unpublished material. The views expressed in this book are those of the authors, but not neces-
sarily of the publisher.
Table of Contents

Detailed Table of Contents .................................................................................................................. v


Preface .................................................................................................................................................. ix
Acknowledgments ............................................................................................................................. xiv

Section I
Concepts and Modeling of E-Supply Chain

Chapter I
Procedure for Modelling and Improving E-SCM Processes / Patcharee Boonyathan
and Latif Al-Hakim ............................................................................................................................ 1

Chapter II
Dynamic Transshipment in the Digital Age / Shilei Yang, Bintong Chen, and Charles L. Munson ..... 22

Chapter III
E-Com Supply Chain and SMEs / Ron Craig....................................................................................... 34

Chapter IV
Building and Managing Modern E-Services / John Hamilton.............................................................. 54

Chapter V
Service Value Networks: Delivering Competitive E-Services / John Hamilton................................... 80

Section II
E-Supply Chain Technologies and Infrastructure

Chapter VI
Automated Data Capture Technologies: RFID / Vidyasagar Potdar, Chen Wu,
and Elizabeth Chang ...................................................................................................................... 112

Chapter VII
Information Security Risk in the E-Supply Chain / Wade H. Baker, Gregory E. Smith,
and Kevin James Watson................................................................................................................ 142
Chapter VIII
The Use of Collaboration Tools in Supply Chain: Implications and Challenges / Ozlem Bak ........... 162

Chapter IX
Negotiation, Trust, and Experience Management in E-Supply Chains /
Gavin Finnie and Zhaohao Sun ..................................................................................................... 172

Chapter X
Trading E-Coalition Modeling for Supply Chain / Pierre F. Tiako .................................................... 194

Section III
Best Practices and Performance Management

Chapter XI
E-Supply Chain System at Valvex and Its Integration with ERP Systems / Raktim Pal, Indranil Bose,
and Alex Ye ..................................................................................................................................... 208

Chapter XII
Coordination of a Supply Chain with Satisficing Objectives Using Contracts / Chunming (Victor) Shi
and Bintong Chen .......................................................................................................................... 232

Chapter XIII
Information Feedback Approach for Maintaining Service Quality in Supply Chain Management /
R. Manjunath.................................................................................................................................. 252

Chapter XIV
Performance Management / Srikanth Srinivas ................................................................................... 261

About the Authors ............................................................................................................................ 283


Index ................................................................................................................................................... 288
Detailed Table of Contents

Preface .................................................................................................................................................. ix
Acknowledgments ............................................................................................................................. xiv

Section I
Concepts and Modeling of E-Supply Chain

Chapter I
Procedure for Modelling and Improving E-SCM Processes / Patcharee Boonyathan
and Latif Al-Hakim ............................................................................................................................ 1

The chapter develops a procedure, eSCM-I, to improve the supply chain business process. It is based
on the supply chain operations reference (SCOR) model and IDEF0 technique. A four-step procedure
is proposed: (1) process standardization, (2) business process modeling, (3) benchmarking of best prac-
tices, and (4) gap determination. The procedure identifies process interdependencies and coordinates
supply chain activities.

Chapter II
Dynamic Transshipment in the Digital Age / Shilei Yang, Bintong Chen, and Charles L. Munson ..... 22

The chapter models transshipments in the supply chain and particularly explores the shipments among
distribution centers in a geographically dispersed network. The authors investigate transshipment strate-
gies in a continuous review system under dynamic demand. They propose three heuristic decision rules
for making transshipment decisions. By using numerical experiments and simulation analysis, the authors
identify a best heuristic rule to determine effective transshipment policies.

Chapter III
E-Com Supply Chain and SMEs / Ron Craig....................................................................................... 34

The chapter deals with the issues for small and medium-sized enterprises (SMEs) in supply chains. It
provides an overview of literature on the role of SMEs in economy, supply chain management (SCM),
information and communication technologies (ICTs), and e-business. The author discusses both oppor-
tunities and challenges for supply chains in general and also SMEs in particular.
Chapter IV
Building and Managing Modern E-Services / John Hamilton.............................................................. 54

The chapter addresses the development cycles of e-services. The service cycles progress from supply
and demand chains, to value chains, to service value chains, and finally to service value networks. The
service cycles enable service businesses to develop competitive business solutions over time. The chapter
also offers a balanced scorecard mechanism to manage e-services.

Chapter V
Service Value Networks: Delivering Competitive E-Services / John Hamilton................................... 80

The chapter defines service value networks as flexible delivery arrangements of services and/or products
by a firm and its supply chains such that target-specific and value-adding services can be effectively and
efficiently delivered to the individualized customers. The author regards service value networks as a key
to establishing and maintaining a strong competitive position. The author also describes a procedure to
develop a service value network.

Section II
E-Supply Chain Technologies and Infrastructure

Chapter VI
Automated Data Capture Technologies: RFID / Vidyasagar Potdar, Chen Wu,
and Elizabeth Chang ...................................................................................................................... 112

The chapter introduces the main components of RFID technology that includes transponders, readers,
middleware, and labels. The authors discuss applications and benefits of RFID and its adoption chal-
lenges such as security, privacy, cost, scalability, and deployment. Some successful RFID deployment
case studies are described. A comprehensive list of RFID vendors and in-depth technical details of RFID
technologies are also provided.

Chapter VII
Information Security Risk in the E-Supply Chain / Wade H. Baker, Gregory E. Smith,
and Kevin James Watson................................................................................................................ 142

The chapter identifies and categorizes the sources of IT threats in supply chains through a large-scale
survey of companies across various supply chain functions. The authors argue that the integration of
information flows facilitates supply chain collaboration and also increases supply chain risks. The au-
thors suggest that in order for supply chain collaboration to succeed, the benefits of IT integration must
exceed the increase in supply chain risk affected by IT.
Chapter VIII
The Use of Collaboration Tools in Supply Chain: Implications and Challenges / Ozlem Bak ........... 162

The chapter addresses supply chain integration by the use of collaboration tools. The author explains
the concept of collaboration tools and its importance in the supply chain integration, evaluates the re-
quirements for supply chain management, and emphasizes the collaborative problem areas within the
supply chain. A case study for an application of collaboration tools is presented. The author argues that
supply chain collaboration is effective only if the collaboration tools are integrated and used jointly by
supply chain partners.

Chapter IX
Negotiation, Trust, and Experience Management in E-Supply Chains /
Gavin Finnie and Zhaohao Sun ..................................................................................................... 172

The chapter introduces the concept of experience management in multi-agent systems for supply chain
management. The authors argue that agents in the supply chain must be capable of dynamically adapt-
ing their behavior. The chapter discusses issues in agent negotiation and cooperation, and provides
an example of multi-agent architecture. The role of trust and deception in supply chains for real-time
enterprises is also discussed.

Chapter X
Trading E-Coalition Modeling for Supply Chain / Pierre F. Tiako .................................................... 194

The chapter proposes an infrastructure for modeling and coordinating e-business processes using e-
coalitions (i.e., support for collaborations with supply chain partners over the Internet). It discusses
traditional EDI systems and modern EDI systems over the Internet. It also describes a typical scenario
where e-coalitions involve a travel agency and its partners for supplying flight tickets. The open software
infrastructure for supporting supply chain and e-commerce includes CORBA, DCOM, and JVM.

Section III
Best Practices and Performance Management

Chapter XI
E-Supply Chain System at Valvex and Its Integration with ERP Systems / Raktim Pal, Indranil Bose,
and Alex Ye ..................................................................................................................................... 208

The chapter presents a case study on a leading Chinese manufacturer of industrial valves that successfully
integrated ERP and SCM systems. The integration of ERP and SCM improved the companys opera-
tions and resulted in many benefits. The process of implementation and integration also poses many
challenges, some of which are unique to a Chinese manufacturing organization. The authors conclude
with several lessons learned from the companys experience.
Chapter XII
Coordination of a Supply Chain with Satisficing Objectives Using Contracts / Chunming (Victor) Shi
and Bintong Chen .......................................................................................................................... 232

The chapter studies a supply chain consisting of one supplier and one retailer with satisficing objectives
for each player. The authors examine the supply chain under three types of contracts: wholesale price,
buy back, and quantity flexibility contracts. They show that under the satisficing objectives, wholesale
price contracts can coordinate the supply chain, whereas buy back contracts cannot. In addition, quantity
flexibility contracts must degenerate into wholesale price contracts to coordinate the supply chain. The
authors also discuss possible extensions to their model.

Chapter XIII
Information Feedback Approach for Maintaining Service Quality in Supply Chain Management /
R. Manjunath.................................................................................................................................. 252

The chapter discusses a feedback mechanism that conveys the information of the supply chain starting
from the end customer with the pre-specified service quality. The chapter suggests using a predicted
and shifted slippage or loss rate as being the feedback signal. Based upon the feedback, the upstream
players are expected to change the transfer rate of materials over the supply chain. Thus the resources
will be effectively utilized and the service quality will be improved.

Chapter XIV
Performance Management / Srikanth Srinivas ................................................................................... 261

The chapter develops a performance management framework that helps firms choose and implement
e-supply chain technologies. The author organizes the framework using a balanced scorecard revolv-
ing around the five critical variables of value, variety, velocity, variability, and visibility. The maturity
level of each of these critical variables is classified using a capability maturity continuum of ignorance,
awareness, understanding, approach, action, and culture. The framework can help firms identify their
performance gaps.

About the Authors ............................................................................................................................ 283


Index ................................................................................................................................................... 288
ix

Preface

As information and communication technologies (ICTs) radically facilitate the convergence of data,
voice, and video; support real-time transactions and interactivity; and enhance access and connectivity,
we are confronted with new challenges for designing and building an e-supply chain. An e-supply chain
is the use of information technology (IT), electronic means, or cyberspace to bring together widely dis-
persed suppliers and buyers, to enhance coordination and knowledge sharing, and to manage upstream
and downstream value chain channels spanning from the suppliers supplier to the customers customer.
E-supply chain enables firms to improve flexibility and move toward real-time operations by sharing
information and collaborating dynamically among partners.
E-supply chain activities include plan, source, make, deliver, and return. IT links the separated sup-
ply chain activities into an integrated, coordinated system that is fast, responsive, flexible, and efficient.
For example, EDI, teleconferencing, and e-mail systems reduce the cycle time in communication. Bar
coding, radio frequency identification, and material handling technologies are used for efficient distribu-
tion and inventory management. E-supply chain portals and ERP systems enable real-time end-to-end
information sharing and real-time decision making. Supply chain technologies will ultimately enable
more flexible and agile business practices. They will help companies come together and form virtual
organizations to co-create value.
However, issues related to technologies, standards, costs, and management have hindered the creation
of a true e-supply chain that seamlessly incorporates all partners. Many challenges need to be addressed
to gain a deeper understanding of how to effectively apply and manage these technologies.
The objective of the book is to explore the concepts, modeling, technologies, IT infrastructures, and
performance management of the e-supply chain and develop a broad understanding of issues pertaining
to the use of emerging information technologies and their impacts on e-supply chain management. The
book aims to highlight e-supply chain technologies and their effective management and guide efforts in
transforming current business processes to adapt to the digital age.
This book is designed to cover a broad range of topics in the field of e-supply chains in 14 chapters.
It is primarily intended for professionals, researchers, and practitioners who want to explore/understand
the concepts and principles of the e-supply chain and want to apply various e-supply chain models and
systems to solve business problems. Each chapter is designed to be stand-alone, and thus readers can
focus on their interested topics.

Section i

Section I consists of five chapters on the concepts and modeling of e-supply chain. Chapters I and II deal
with the modeling of e-supply chain management. Chapter III discusses the concepts of e-supply chain
and SME. Chapters IV and V present the concepts of e-services and service value network.
x

Chapter I

Procedure for Modeling and Improving E-SCM Processes by Patcharee Boonyathan and Latif Al-Hakim,
develops a procedure referred to as eSCM-I to improve the supply chain business processes, taking into con-
sideration the Internet and e-business communication technologies. It is based on the supply chain operations
reference (SCOR) model for process standardization and the IDEF0 technique (i.e., a graphical method designed
to model the activities, actions, and decisions of an organization or system) for process mapping. The four-step
procedure is proposed to improve competitive advantage and customer satisfaction: process standardization,
business process modeling, benchmarking and identification of best practices, and gap determination. The pro-
cedure identifies process interdependencies and manages supply chain coordination.

Chapter II

Dynamic Transshipment in the Digital Age by Shilei Yang, Bintong Chen, and Charles L. Munson, explores
how to handle transshipment among distribution centers in a geographically dispersed network. They investigate
transshipment strategies in a continuous review system with dynamic demand and present a dynamic program
that identifies the optimal transshipment rule. Since the dynamic program presented is time consuming and dif-
ficult for practitioners to implement, they propose three distinct heuristic decision rules for making transshipment
decisions. After numerical experiments and simulation analysis based on various combinations of demand rates
and delivery costs, they identify a good heuristic rule, which can be conveniently implemented in practice to
determine effective transshipment policies.

Chapter III

E-Com Supply Chain and SMEs by Ron Craig, takes the perspective of small and medium-sized enterprises
(SMEs) in supply chains. It reviews the important role of SMEs in national and world economies. The chapter
provides an extensive overview of literature on supply chain management (SCM), information and communication
technologies (ICTs), and e-business. Both opportunities and challenges for supply chains in general and SMEs
in particular are considered. The future direction for researchers and practitioners are pointed out.

Chapter IV

Building and Managing Modern E-Services by John Hamilton, addresses the development cycle of an e-ser-
vices model. Services as a value creation process progress from supply and demand chains, to value chains, to
service value chains, and finally to service value networks. This progression pathway develops over time and
enables service businesses to develop competitive business solutions. Service value networks, as an advanced
value creation structure, house fully integrated e-demand and e-supply chains, working in harmony to deliver
flexible business solutions to customer requests. This chapter also offers managers a balanced scorecard structural
mechanism through which management controls e-services.

Chapter V

Service Value Networks: Delivering Competitive E-Services by John Hamilton, addresses service value
networks as a key pathway to establishing and likely retaining future strong competitive positioning within a
service industry sector. He defines service value network as the flexible delivery of a service, and/or product, by
a business and its networked, coordinated value chains such that a value-adding and target-specific service and/or
product solution is effectively and efficiently delivered to the individual customer. The procedure to research
and develop a service value network is described.
xi

Section ii

Section II consists of five chapters on e-supply chain technologies and IT infrastructure such as radio frequency
identification (RFID), security, collaboration tools, software agents, and EDI. Chapter VI deals with automated
data capture technologiesRFID. Chapter VII discusses infrastructure security. Chapter VIII handles collabora-
tion tools. Chapter IX presents software agents in the supply chain. Chapter X deals with EDI and e-coalition.

Chapter VI

Automated Data Capture Technologies: RFID by Vidyasagar Potdar, Chen Wu, and Elizabeth Chang, provides
an introduction to RFID technology. The authors discuss the main components of the RFID technology, which
includes RFID transponders, RFID readers, RFID middleware, and RFID labels. A detailed classification and
explanation of these components is provided, followed by the benefits and applications that can be achieved by
adopting this technology. They also depict the adoption challenges such as security, privacy, cost, scalability,
resilience, and deployment. They describe some successful RFID deployment case studies on the adoption of
RFID technology. For business executives and consultants, they provide a comprehensive list of RFID vendors
across the globe. For researchers, they list some open issues on adoption challenges. For advanced users, in-depth
technical details are provided about security and privacy enhancing protocols.

Chapter VII

Information Security Risk in the E-Supply Chain by Wade H. Baker, Gregory E. Smith, and Kevin James
Watson, identifies the sources of IT threats in the supply chain, categorizes those threats, and validates them
through a survey of 188 companies representing a range of supply chain functions. They argue that the integra-
tion of information flows facilitate collaboration between supply chain partners; however, the interconnectivity
also increases supply chain risks. The increased use of information technology has removed an organizations
internal and external protective barriers, and thus supply chains are more vulnerable to IT-specific risks. Through
analysis, they suggest that supply chain risk is affected by IT threats, and thus the benefits of collaboration fa-
cilitated by IT integration must exceed the increase in risk.

Chapter VIII

The Use of Collaboration Tools in Supply Chain: Implications and Challenges by Ozlem Bak, addresses
supply chain integration by the use of collaboration tools, including inter- and intra-enterprise applications such
as customer relationship management, supplier relationship management, e-business and employee-business
integration, e-supply chain management, Web-enabled services, wireless applications, and software applica-
tions. The chapter explains the concept of collaboration tools and its importance in the supply chain integration,
evaluates the requirements for supply chain management (SCM), and emphasizes the collaborative problem
areas within supplier and SCM relations. A case study of an application of collaboration tools is presented. He
argues that collaboration in supply chain is effective only if the collaboration tools are integrated or used jointly
by supply chain partners.

Chapter IX

Negotiation, Trust, and Experience Management in E-Supply Chains by Gavin Finnie and Zhaohao Sun,
introduces the concept of experience management in multi-agent systems for supply chain management and
develops a unified model for cooperation, negotiation, trust, and deception. They argue that agents in the supply
chain must be capable of dynamically adapting their behavior, and the experience management paradigm offers
a new approach to automated learning. The chapter discusses issues in agent negotiation and cooperation, and
xii

provides an example of multi-agent architecture. The role of trust and deception in supply chains for real-time
enterprises is also discussed. Some new areas of research are highlighted.

Chapter X

Trading E-Coalition Modeling for Supply Chain by Pierre F. Tiako, proposes an appropriate infrastructure for
modeling and coordinating e-business processes using e-coalitions (i.e., support for collaborations with supply
chain partners over the Internet). It discusses EDI systems and EDI over the Internet. It also describes a typical
scenario where e-coalitions involve a travel agency and its partners for supplying flight tickets. The idea combines
support for modeling and coordinating relationships among e-coalition components located in different places
with an architecture for their distribution. The open software infrastructure for supporting supply chain and e-
commerce includes CORBA, distributed component object model (DCOM), and Java Virtual Machine (JVM).

Section iii

Section III consists of four chapters on best practices and performance management of e-supply chain. Chapter
XI deals with practices of ERP and SCM integration. Chapter XII discusses satisficing performance targets.
Chapter XIII presents an information feedback approach to maintaining service quality. Chapter XIV deals with
performance management.

Chapter XI

E-Supply Chain System at Valvex and Its Integration with ERP Systems by Raktim Pal, Indranil Bose, and
Alex Ye, presents a case study on a leading Chinese manufacturer of industrial valves that successfully integrated
the ERP systems from Entreplan and an SCM system from Excelvision. This chapter describes the implementa-
tion of the e-SCM system at Valvex and its integration with the existing ERP system. The integration of ERP and
SCM improved the operations at Valvex and resulted in many benefits. The authors point out that the process of
implementation and integration poses many challenges, and some of them are unique to a Chinese manufactur-
ing organization. They conclude with several lessons learned from the experience of Valvex that may be useful
for organizations that plan to undertake similar projects.

Chapter XII

Coordination of a Supply Chain with Satisficing Objectives Using Contracts by Chunming (Victor) Shi
and Bintong Chen, studies a decentralized supply chain consisting of a supplier and a retailer, both with the
satisficing objective or performance targets. They examine the supply chain under three types of commonly
used contracts: wholesale price, buy back, and quantity flexibility contracts. They identify the Pareto-optimal
contract(s) for each contractual form and the contractual forms, which are capable of supply chain coordination
with the satisficing objectives. They show that wholesale price contracts can coordinate the supply chain with
the satisficing objectives, whereas buy back contracts cannot. Furthermore, quantity flexibility contracts must
degenerate into wholesale price contracts to coordinate the supply chain. This provides an important justification
for the popularity of wholesale price contracts. The authors also discuss possible extensions to their model.

Chapter XIII

Information Feedback Approach for Maintaining Service Quality in Supply Chain Management by R.
Manjunath, considers a feedback mechanism that conveys the status of the supply chain, starting from the tail
end with the pre-specified service quality as seen by the end user of the supply chain. Maintaining the service
xiii

quality in a supply chain has become a challenging task with increased complexity and number of players down
the chain. The chapter highlights the advantages of using a predicted and shifted slippage or loss rate as the
feedback signal. Based on the feedback, the source is expected to change the rate of transfer of the commodity
over the supply chain. Thus the resources would get utilized effectively, reducing the stranded time of the com-
modity down the chain and the service quality gets improved.

Chapter XIV

Performance Management by Srikanth Srinivas, designs a performance management framework that helps
firms choose, implement, and get significant benefits from e-supply chain technologies. The framework combines
critical variables, balanced scorecard, and capability maturity. He organizes the framework using a balanced
scorecard revolving around five critical variables of value, variety, velocity, variability. and visibility. The maturity
level of each of these critical variables is classified using a six-level capability maturity continuumignorance,
awareness, understanding, approach, action, and culture. The framework helps managers identify where the gaps
are and thus leverage technologies to bridge those gaps.

All chapters have gone through a rigorous, double-blind review process before acceptance. It is hoped that the
readers will find these chapters informative, enlightening, and helpful.
xiv

Acknowledgments

Publishing a scholarly book is a collective effort and involves many people. I wish to thank all involved
in the collation and review process of the book, without whose support the book could not have been
completed.
Special appreciation and gratitude go to the publishing team at IGI, in particular to Kristin Roth, Jan
Travers, and Medhi Khosrow-Pour, whose contributions throughout the process of the book publication
have been invaluable.
I want to thank all the authors for their excellent contributions to this book. Im also grateful to all the
reviewers, including most of the contributing authors, who served as referees for chapters written by other
authors, and provided constructive and comprehensive reviews in the double-blind review process.
Last but not least, I thank my wife, Mei, and my parents for their love, encouragement, and unfailing
support throughout this project.

Qingyu Zhang, PhD, CFPIM, MCSD, MCSE, MCDBA


Arkansas State University, USA
August 2006
xv

Section I
Concepts and Modeling of
E-Supply Chain
xvi


Chapter I
Procedure for Modeling and
Improving E-SCM Processes
Patcharee Boonyathan
University of Melbourne, Australia

Latif Al-Hakim
University of Southern Queensland, Australia

ABSTRACT

Todays managers are turning to the functions of the supply chain to improve margins and gain competitive
advantage. The explosion of the Internet and other e-business technologies has made real-time, online
communication throughout the entire supply chain a reality. Electronic supply chain management (e-
SCM) is a reference to the supply chain that is structured via electronic technology-enabled relationships.
This chapter concentrates on the development of a procedure referred to as eSCM-I for e-SCM process
improvement. The procedure focuses on process mapping and relies on principles of coordination theory.
It is based on SCOR to standardize the process and take advantage of this technique of benchmarking/best
practices potential. The procedure employs IDEF0 technique for mapping the processes.

INTRODUCTION all strategies, decisions, and measurements are


made considering their effect on the entire supply
Supply chain management (SCM) is a network of chain, not just individual functions or organiza-
entities that encompasses every effort involved tions (Towill, 1996).
in producing and delivering a final product, The association of supply chain manage-
from the suppliers supplier to the customers ment with e-business offers new challenges for
customer (Supply Chain Council, 1997, in Lum- marketing. The explosion of the Internet and
mus & Vokurka, 1999). A key principle is that other telecommunication technology has made

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Procedure for Modeling and Improving E-SCM Processes

real-time, online communication throughout the (1995) and Meade and Sarkis (1999) for agile
entire supply chain a reality. The Internet allows manufacturing, Figure 1 models the dimensions of
companies to interact with customers, and col- an e-SCM environment within the context of the
lect enormous volumes of data and manipulate IDEF0 process mapping modeling technique.
it in many different ways to bring out otherwise Murillo (2001) and Helms, Ettkin, and Chap-
unforeseen areas of knowledge (Abbott, 2001). man (2000) indicate that the problem in pursuing
Poirier and Bauer (2000) refer to the term elec- supply chain construction efforts is not a lack of
tronic supply chain management as a reference ideas about what to do, but instead about how
for the natural combining of supply chain and to coordinate the efforts throughout the supply
e-commerce. Electronic supply chain manage- network. It was drawn by Peppard (1995) that a
ment (e-SCM) is a concept introduced to the need business process approach can act as a catalyst for
of adaptability and flexibility in a highly dynamic bringing together the various things that have been
e-business environment which focuses on network occurring in the organization and management
integration. E-SCM refers to the supply chain that areas over the past decade. He further suggests
is built via electronic linkages and structurally that a process focus can provide an integrative
based on technology-enabled relationships (Wil- mechanism. Process management involves plan-
liams, Esper, & Ozment, 2002). ning and administering the activities necessary to
Poirier and Bauer (2000) highlight three achieve a high level of performance in a process,
constituents in the preparation and execution of and identifying opportunities for improving qual-
e-SCM: ity and operational performance. Ultimately it
includes translating customer requirements into
1. E-network: Business networks should sat- product and service design requirements (Evans
isfy customer demands through a seamless & Lindsay, 2002).
(fully connected end-to-end) supply chain Goldman et al. (1995) recognize the signifi-
to serve the end consumer (see also Towill, cance of employees as a company asset and em-
1997). phasize the importance of leveraging the impact
2. Responses: Customer responses form the of people and information for an agile enterprise.
central theme of the supply chain strategy. Evans and Lindsay (2002) show direct correlation
The market value of the supply chain can be between employees (people) satisfaction and
dramatically enhanced by jointly creating customer satisfaction, and argue that people
profitable revenue growth through integrated are the only organization asset that competitors
inter-enterprise solutions and responses. cannot copy; and the only one that can synergize,
3. Technology: Each of the above constitu- that is, produce output whose value is greater than
ents can achieve the purposes and goal of the sum of its parts. Evans and Lindsay (2002)
the supply chain by being supported with also emphasize that the two key components of
leading-edge technology, particularly e- service system quality are employees and in-
commerce. formation technology. Meade and Sarkis (1999)
state that people and information are the most
The three constituentse-network, customer valued resources. It follows that the mechanism
responses, and technologycould be seen as the that converts the input of the e-SCM environment
input into e-SCM working together to achieve to its output (i.e., customer satisfaction) includes
the ultimate aim (output) of the supply chainthat three constituents: process, people, and informa-
is, customer satisfaction. In synergy with the tion sharing. In an analogy with agile enterprise
model developed by Goldman, Nagel, and Preiss dimensions (Goldman et al., 1995; Meade &


Procedure for Modeling and Improving E-SCM Processes

Figure 1. E-SCM general representation: Input, output, mechanism, and control


Process
Mapping
Improvement
Standardisation
& Learning

E-Netw ork
Customer
Responses eSCM Satisfaction
Technology

Process Information People


Sharing
Leveraging the impact of Process,
People and Information

Sarkis, 1999), the leading mechanism for e-SCM for achieving or enhancing competitiveness
is leveraging the impact of process, people, and without the ability to convert the knowledge,
information for the entire supply chain. skills, and information embodied in its personnel
A key factor for the successful construction into solution products for the individual custom-
of e-network is that each organization in the sup- ers (Meade & Sarkis, 1999, p. 243). Ability to
ply chain looks beyond the basic function within convert is what e-SCM is really relying on to
the business and synchronizes its processes with achieve customer satisfaction (Al-Hakim, 2003).
the entire supply chain. Based on this concept, The mechanism of e-SCMthat is, leveraging
the network construction may not achieve the processes, information, and peoplecannot be
required result without mapping the process and achieved without the improvement of the processes
considering the capacities of the other processes and enhancing the learning of employees through-
of the entire chain (Al-Hakim, 2003). Standard- out the entire supply chain. This in turn requires
ization of business processes is necessary to al- process mapping and standardizing the supply
low the communication and integration between chain processes. These three elementsprocess
business partners of the supply network since mapping, standardization, and improvement and
the complexity of processes in the supply chain learningform the control part of e-SCM that is
has grown exponentially (Gunasekaran, Patel, & capable of leveraging the supply chain process,
Tirtiroglu, 2001). information, and people in order to convert the
The SCOR process reference model was es- input into e-SCM ultimate output: the customer
tablished by the Supply Chain Council (SCC) in satisfaction, as shown in Figure 1.
1996 for standardization purposes. The model This research concentrates on the development
describes, characterizes, and evaluates a complex of a procedure for e-SCM process improvement.
management process. Such a model builds on The procedure focuses on process mapping and
the concepts of business process reengineering relies on principles of coordination theory. It is
(BPR), benchmarking, and process measurement based on SCOR to standardize the process and take
by integrating these techniques into a cross-func- advantage of this technique of benchmarking/best
tional framework. practices potential. The procedure employs IDEF0
In an agile environment, employees skill, technique for mapping the processes.
knowledge, and information are no longer enough


Procedure for Modeling and Improving E-SCM Processes

PROCeSS MAPPINg 1. Standardization of processes throughout the


network
Process mapping is a technique used to detail 2. Reengineering processes and benchmarking
business processes by focusing on the important practices
elements that influence their behavior (Soli- 3. Realization of mechanism and the control
man, 1998). It consists of constructing a model activities by which each process converts
that shows the relationships between activities, input into output
people, information, and objects involved in the 4. Coordination of the supply chain interdepen-
production of a specified output (Biazzo, 2002). dencies throughout the entire e-network
The fundamental concept of business process 5. Achievement of the level of security desig-
mapping is based on the depiction of the relation- nated by the elements of e-network
ships among its elements: activities, resources,
information, and objects involved in the produc- The first two conditions can be achieved by
tion of a specified output (Biazzo, 2002; Hunt, employing the SCOR reference model. IDEF0
1996). The concept is focusing on the important technique is an ideal technique for the third con-
elements that influence their actual behaviors. The dition. By integrating SCOR with IDEF0, it is
level of mapping varies from an overview map possible to model the interdependencies between
macro-map to a very detailed map micro-map activities of e-SCM. The procedure developed by
(Soliman, 1998). Soliman (1998) argues that the Al-Hakim (2003) can be used to accommodate the
more levels of mapping (micro-levels), the more level of security required by e-network entities.
useful the information, but also more cost occurs. The following two sections outline the SCOR
However, the fewer levels of process mapping model and IDEF0 techniques.
could result in a poorly designed process, and
hence higher skilled operators would be required SCOR Reference Model
to understand and operate it. So, the number of
process mapping level depends on how much The supply chain operations reference (SCOR)
information is needed. The key idea to business model is an industry standard approach to define,
process mapping is that the representative must design, and improve supply chains (Stewart, 1997).
be able to facilitate the process analysis when the The Supply Chain Council has developed and
conditions and sequence of activities change (El endorsed the SCOR model as the cross-industry
Sawy, 2001; Hunt, 1996). For e-SCM, the business standard for supply chain management.
process mapping for the supply chain should take The latest version of the SCOR model, version
full advantage and be managed via e-network. 6.0, is the sixth major revision since the model
Entities of e-network are linked by Internet-based was introduced in 1996. Revisions of the model
technologies, and accordingly, any developed are made when it is determined by council mem-
procedure for the process mapping of e-SCM bers that changes should be made to facilitate
processes should be realized by the same technol- the use of the model in practice. Version 4.0 of
ogy. The process mapping realized by Internet SCOR had a focus on physical product, while
technology is referred to as e-process mapping. version 5.0 was expanded to incorporate both
The e-process mapping procedure for e-SCM service transaction and post-delivery customer
should satisfy five necessary conditions: support. In version 6.0, there is the expansion of


Procedure for Modeling and Improving E-SCM Processes

Figure 2. Integrated concepts for process reference model (Source: Supply Chain Council, 2003)
Business Process Best Practices Process Reference
Benchm arking
Reengineering Analysis Model

Capt ur e t he " as- is" Capt ur e t he " as- is"


st at e o f a pr o c ess and st at e o f a pr o c ess and
der iv e t he desir ed " t o - der iv e t he desir ed " t o -
be" f ut ur e st at e be" f ut ur e st at e

Q uant if y t he o per at io nal Q uant if y t he o per at io nal


per f o r manc e o f similar per f o r manc e o f similar
c o mpanies and c o mpanies and
est ablish int er nal t ar get s est ablish int er nal t ar get s
based o n " best - in- based o n " best - in-
c lass" r esult s c lass" r esult s

Char ac t er ize t he Char ac t er ize t he


management pr ac t ic es management pr ac t ic es
and so f t war e so lut io ns and so f t war e so lut io ns
t hat r esult in " best - in- t hat r esult in " best - in-
c lass" per f o r manc e c lass" per f o r manc e

delivery and return process. The update of best framework as shown in Figure 2. Once a complex
practices for e-business has been included in the management process has been captured in a process
model (Supply Chain Council, 2003). This updated reference model, it can be described unambigu-
feature of version 6.0 makes SCOR suitable for ously, communicated consistently, and redesigned
modeling e-SCM. to achieve competitive advantage. In addition,
The SCOR model tries to capture end-to-end given the use of standard measurement for process
business operation processes, including (Supply elements and activities, the process itself can be
Chain Council, 2003): measured, managed, and controlled, and it may be
refined to meet a specific purpose.
All customer interactions, from order entry SCOR focuses on five basic management
through paid invoice processes in the supply chain as illustrated in
All product (physical material and service) Figure 3. These processes are plan, source, make,
transactions, from your suppliers supplier to deliver, and return.
your customers customer, including equip- There are four levels of details in SCOR
ment, suppliers, spare parts, bulk product, (Figure 4).
software, and so forth
All market interactions, from the under- Level 1: Provides a broad definition of the
standing of aggregate demand to the fulfill- plan, source, make, delivery, and return
ment of each order process types, and is the point at which a
company establishes its supply chain com-
However, SCOR does not attempt to describe petitive objectives.
every business process or activity, including: sales Level 2: Defines 26 core process categories
and marketing (demand generation), research and that are possible components of a supply
technology development, product development, and chain. A company can configure both its
some elements of post-delivery customer support. actual and ideal supply chain by selecting
The model is built on the concepts of BPR, from these core processes.
benchmarking, and process measurement. It in- Level 3: Provides a company with the
tegrates these techniques into a cross-functional information it needs to plan and set goals


Procedure for Modeling and Improving E-SCM Processes

Figure 3. SCOR generic framework

Plan
PPl anSuppl y Chai n

P Pl asnSour ce P Pl anM ake P Pl anDel i ver PPl anRet ur n

Customers
Source Make Deliver
Suppliers

SSour ceSt ocked M M ake-t o- DDel i ver St ocked


Pr oduct St ock Pr oduct Pr oduct

S Sour ceM ake- M  M ake-t o- D Del i ver M ake-


t o-Or der Pr oduct Or der Pr oduct t o-Or der Pr oduct

S Sour ce M  Engi neer -t o- D Del i ver


Engi neer -t o-Or der Or der Pr oduct Engi neer -t o-Or der

Enable P lan So ur c e M ak e Deliv er Return


. Est abl i shand M anageRul es
. Assess Per f or mance RRet ur n
. M anageDat a Pr oduct
. M anageInvent or y
. M anageCapi t al Asset s
. M anageTr anspor t at i on
. M anageSuppl y Chai nConf i gur at i on
. M anageRegul at or y Compl i ance
. Pr ocess Speci f i c Eel ment s Al i gnSC f i nanci l as Suppl i er Agr eement s M anageRet ur n

Figure 4. Four levels of SCOR business process (Source: Supply Chain Council, 2003)

Level

Description Shematic


P lan
Top Lev el
So ur c e M ak e Deliv er
(Process Ty pes)
Ret ur n Ret ur n
Supply Chain Operation Reference Model

Configuration Lev el
(Process Categories)

Process Element Lev el



(Decompose
Processes)

P . 

P .  P . 

P . 

 Implementation Lev el
Not in
(Decompose Process
scope
Elements)


Procedure for Modeling and Improving E-SCM Processes

successfully for its supply chain improve- Figure 5. IDEF0 elements: Inputs, outputs, con-
ments through detailed practices, and trols, and mechanisms
system software capabilities to enable best Controls
practices.
Level 4: Focuses on implementation, when
companies put specific supply chain im- Activity
(Process, Execution,
provements into play. Since changes at level Transformation, Value
4 are unique to each company, the specific Inputs Outputs
Added)
elements of the level are not defined within
the industry standard model.
Mechanisms

IDeF0
Input: Data or materials that are consumed
to produce an output of an activity.
IDEF0 is one of the most widely known tools for
Control: Data that constrain or regulate
process mapping. It was originally developed to
the activity and hence the transformation
describe, specify, and model manufacturing sys-
of inputs into outputs.
tems in a structured graphical form for the United
Output: Data or materials produced by or
States Air Force, Department of Defense (DOD)
resulting from the activity. It must include
organizations as part of the Corporate Information
the input data in some form.
Management Initiative (Fulscher & Powell, 1999;
Mechanism: Resources (usually people,
Lin, Yang, & Pai, 2002; Plaia & Carrie, 1995).
machines, or systems) that provide energy
IDEF0 is designed to model the decisions, actions,
to, or carry out, the activity.
and activities of an organization or system (Lin
et al., 2002). IDEF0 models contain information
If we call both the information and the objects
describing how an organization executes its busi-
involved in the description data, then we can
ness processes. The purpose of IDEF0 models
say that input arrows show the data needed to
is to enable process analysis and identification
perform the activity, while output arrows show
of business process improvement opportunities
the data created when the activity is performed.
(Kappes, 1997). IDEF0 methods are centered on
Control arrows describe the conditions or circum-
the concept of mapping the functional processes
stances which govern the transformation, while
of an organization.
mechanism arrows represent people or devices
The IDEF0 technique follows a rigorous
that carry out the activity (Fulscher & Powell,
methodology with definite rules that must be fol-
1999; Plaia & Carrie, 1995).
lowed to generate a valid model (Kappes, 1997).
IDEF0 describes a business process as a series
of linked activities; each activity is specified
IDEF0 Mapping Procedure
by four elements: inputs, controls, outputs, and
In the mapping procedure, IDEF0 allows a hierarchi-
mechanisms. These elements are referred to as
cal or top-down decomposition approach to analyze
ICOMs (Fulscher & Powell, 1999; Lin et al., 2002).
processes at multiple levels of abstraction (Fulscher
Figure 5 illustrates generically how IDEF0 is used
& Powell, 1999; Kappes, 1997; Plaia & Carrie,
to depict activities, inputs, outputs, controls, and
1995). The essence of hierarchical decomposition
mechanisms.
approaches to business process mapping, in which
A brief description of each ICOM follows:
a basic, single-activity description of the process is


Procedure for Modeling and Improving E-SCM Processes

Table 1. Type of interdependencies within and between organizations

Author Focus Types of Interdependency

Company business Time dependency


Svensson, 2002 activities in marketing Relationship dependency
channels Functional dependency

Activities (input/output)
Crowston, 1997 Process redesign
Resources (actors, equipment, time)

Flow interdependencies
Nassimbeni, Inter-organizational Process interdependencies
1998 relationship Scale interdependencies
Social relationship interdependencies

Task/task interdependency
Order prerequisite interdependency
Demand interdependency
Task/resource interdependency
Order/organization interdependency
Supply chain com-
Li et al., 2002 Order/inventory interdependency
plexities Order/capacity interdependency
Resource/resource interdependency
Supply interdependency
Inventory interdependency
Capacity/capacity interdependency

Medcof, 2001 R&D (technology) Resource dependency


Mattsson, 2000 Market dependence
Operationalization
(see Svensson, 2002) IT dependence

decomposed step-by-step into its constituent activi- required level of detail is obtained. Each activity
ties to whatever level of detail, is appropriate for is given a unique node number depending on its
the mapping purposes (Fulscher & Powell, 1999). level in the model. The top-level activity which
This hierarchical decomposition of activities helps represents the subject of the model is always given
to organize the development of IDEF0 models and the number A0. The IDEF0 hierarchical decompo-
proved critical in keeping the group focused on its sition fits exactly the hierarchical decomposition
task of abstracting the essence of the process itself of the SCOR model. IDEF0 is an ideal technique
from the details of current practice (Fulscher & for mapping supply chain processes based on the
Powell, 1999; Plaia & Carrie, 1995). SCOR environment. In addition, IDEF0 allows
Kappes (1997) explained that the IDEF0 decom- users to describe what an organization does, but it
position first breaks the highest level activity into does not specify the logic in sequencing activities
lesser level activities. Then each of these activi- (Lin et al., 2002; Plaia & Carrie, 1995). SCOR can
ties is broken into one or more activities until the be used to fill this gap.


Procedure for Modeling and Improving E-SCM Processes

Table 2. Supply chain coordination mechanism

Author Focus Coordination Mechanism


Lummus &
Vokurka, 1999; Tracey SC integration/collaboration
Interdependency in
& Smith-Doerflein, SC inter-organization col-
supply chain
2001; laboration
Kerrin, 2002
E-business solutionstan-
Interdependency in dard business process model
Lewis, 2000
supply chain using XML language to SC
optimization
Interdependency
Forza & Venelli, Quick response/ integration
of activities/works in
1997 requirement
supply chain
Coordination approach to
process description, analy-
Process dependen-
Crowston, 1997 sis, and redesign using two
cies
general heuristics rule for
identifying dependencies
Representing the interdepen-
Interdependency in dencies using supply chain
Li et al., 2002
supply chain modeling mathematical ap-
proach

Neuman & Samuel, Integration across and


1996; Interdependency in between interfaces using
Hoek, 1998; supply chain performance measurement
Hoek et al., 2001 approach to control SC
Input/output standardization,
Process interde-
Nassimbeni, 1998 process standardization and
pendencies
skill standardization

Supply Chain Interdependencies Horizontal inter-dependencies arise between


partners who exchange knowledge or resources
Supply chain is seen as a complex network of orga- to develop new products or new technologies, or
nizations with complex activities. SCM comprises to promote and distribute their products (Nas-
different kinds of dependencies in, between, and simbeni, 1998). These interdependencies within
across organizations (Li, Kumar, & Lim, 2002; and between organizations are identified in a
Svensson, 2002). Inside a network, firms enter number of literatures shown in Table 1. In order
into a complex set of interdependencies with to achieve efficient network, interdependencies
other firms, both vertical and horizontal. Verti- require effective coordination efforts (Li et al.,
cal inter-dependencies arise among collaborating 2002; Nassimbeni, 1998; Svensson, 2002).
partners who complement each other in producing The dependency between business activities
or commercializing the product (Svensson, 2002). in supply chains leads to the necessity for coop-


Procedure for Modeling and Improving E-SCM Processes

eration and coordination between companies in Even so, rationale for the use of the mechanism
order to achieve the ultimate goals of business is not yet provided.
operations (Crowston, 1997; Svensson, 2002). Crowston (1997) proposed two general heu-
Malone and Crowston (1994) initiate the coor- ristics for identifying dependencies. These are
dination theory and define the coordination as a (1) dependency-focused analysis and (2) activ-
process for managing interdependencies between ity-focused analysis.
activities. Identifying the relationships between Dependency-focused analysis identifies depen-
the interdependencies is a vital process for achiev- dencies, then searches for coordination mecha-
ing the coordination. It is stated that the success of nisms. It examines the activities and the resources
SCM depends on the management of coordination they use, and determines possible dependencies
processes (Biazzo, 2002; Li et al., 2002). by considering which resources are used by more
Several studies have dealt with coordination than one activity. By asking the questions such
aspects in recent years. A number of supply chain as what are the inputs, outputs, and resources of
coordination mechanisms have been proposed by process, and checking whether these are used
many researchers to manage the supply chain inter- by other processes, the interdependencies can
dependencies; these are illustrated in Table 2. be identified.
To deal with identifying interdependencies The activity-focused analysis identifies co-
in the supply chain, Li et al. (2002) proposed the ordination mechanisms, then searches for de-
supply chain modeling approach to describe the pendencies. Activity-focused analysis searches
complexities of supply chains. The approach aims directly for coordination activities and for actors
to capture the complexities and interdependencies or resources that coordinate with them.
in the supply chain by representing the interdepen- Despite the fact that these methods provide
dency of task and resource using a mathematical advantages in identifying interdependencies in
model. The work of Li et al. (2002) contributes to process networks, they mainly focus on a com-
the identification of supply chain interdependencies, mon-sense approach. They do not address the
however they mainly focus on using a mathematical typical problem with a very highly complex set
approach to capture these interdependencies, which of business processes. Hence it gives limited
have a very limited use where the high-complexi- emphasis to identification of supply chain interde-
ties level of relationships exist. pendencies and supply chain network integration
Nassimbeni (1998) nominates the use of input/ for the purpose of supply chain improvement.
output standardization, process standardization, Because of the size and complexity of the sup-
and skills standardization as the coordination ply chain network structure, the representations
mechanism to process interdependencies by fo- of inter-organization relationships and interde-
cusing on the type of inter-organization network pendencies between them are necessary. As the
structures in the existing literature and analyz- patterns between partners might be different,
ing the main forms of interdependency in the the process of producing comprehensive maps
networks. Four types of interdependencies are of the network to identify the interdependencies
defined, including flow interdependencies, scale is essentially required. The next section outlines
interdependencies, process interdependencies, a business process improvement procedure for
and social relationship interdependencies. Nas- e-SCM and identifies some interdependencies
simbeni (1998) applies the main coordination existing between supply chain processes.
mechanism concepts to these interdependencies.

0
Procedure for Modeling and Improving E-SCM Processes

Figure 6. Overview of eSCM-I procedure

Start

Standardization

Business Process
Modelling

Benchmarking

Identify Best
Practices

Gap
Small Gap Performing best practices
Determination

CPI (Continuous
Process Wide Gap
Stop
Improvement)

Apply BPR

e-SCM IMPROVeMeNT PROCeDURe up the next step of the new procedure. The final
step is gap determination and selecting BPR or
This research develops an e-SCM business pro- CPI approach for improvement.
cesses improvement (eSCM-I) procedure of four
steps (see Figure 6): Step 1: Standardization of Business
Process
Step 1: Standardization
Step 2: Business Process Modeling The first step of the eSCM-I procedure is the
Step 3: Benchmarking and Identification of standardization of business process using the
Best Practices SCOR model. Mintzberg (1983) suggests the
Step 4: Gap Determination use of standardization as the coordination
mechanism for managing interdependencies in
The eSCM-I procedure adopts the concept of business processes. Standardization is the use
standardization by using the SCOR model at the of standard procedures, processes, materials,
first step of the procedure presented in step 1. The and/or parts for designing, manufacturing, and
second step is the use of the IDEF0 technique for distributing a product. Nassimbeni (1998) claims
business process modeling. Benchmarking and that standardization can involve inputs, outputs,
selecting best practices based on SCOR make processes, and skills.


Procedure for Modeling and Improving E-SCM Processes

This step proposes the use of the SCOR model cesses to the level of detail required by business
for standardization. The SCOR model provides users (Li et al., 2002). The approach to modeling in
standardization of three key categories: Process this step has been based on a structured graphical
Types, Basic Management Processes, and Process presentation of the IDEF0 technique.
Level in the process reference model format. The Considering the principal idea of coordination
model also contributes standard definitions for and management of interdependencies in supply
processes and sub-processes. This standardiza- chain business process, the use of the IDEF0
tion allows organizations to capture the com- structured process modeling method to SCOR is
plexities, describe unambiguously, communicate proposed in this step of the SC_BPI procedure.
consistently, and redesign to achieve competitive This step of implementing IDEF0 in SCOR
advantage in relation to supply chain processes. In provides five main contributions to supply chain
addition, given the standard measurement metrics improvement, including structured presentation
for process elements and activities, the process of processes, identification of organizational
itself can be measured, managed, and controlled, interdependencies, decomposition structure of
and ultimately it may be refined to meet a specific organizational interdependencies, identification
purpose for improvement. of inter-organizational interdependencies, and
In summary, the primary purpose of using the decomposition structure of inter-organizational
SCOR model in the first step of the SC_BPI proce- interdependencies.
dure is to take advantage of process standardization.
When all supply chain participants standardize Structured Presentation of Processes
their processes using SCOR, they can manage
the communication between them which leads to As its first contribution, IDEF0 provides a good
improved coordination of the entire chain. overview of the input, output, control, and mecha-
However, level 1-3 SCOR processes are still ge- nism objects within the supply chain operation
neric for all types of industries (Al-Hakim, 2003). aspect (see Figure 7). Using IDEF0, a process
Implementing the model, as we discuss in the is presented to show what data or materials are
following sections, involves conceptually linking consumed, what data or materials are produced,
or mapping it to all product and information flows data that constrain or regulate the process, and
for all enterprise-specific supply chain processes also the resources (people, machines or systems)
(step 2), collecting and evaluating performance that carry out the process.
data for gap analysis (step 3), and launching pro-
cess improvement approaches (step 4).

Step 2: Business Process Modeling Figure 7. IDEF0 structured presentation of process

Mapping the processes for the supply chain is pro-


Control
posed as the second step of the eSCM-I procedure
after standardization because companies have an Input Output
Process A
overwhelming number of processes that require
integration. The purpose of business process
modeling is also to analyze processes, manage Resource
supply chain interdependencies, and define the
functionality and behavior of supply chain pro-


Procedure for Modeling and Improving E-SCM Processes

Figure 8. Interdependencies from the relationship Interdependencies from the Relationship


linked by inputs Linked by Input and Output Objects
Once the data or materials are consumed to
Input a process, they transform into outputs. These
Process A
outputs are needed by another process, which
causes the interdependencies in a range of ways,
Process A
as presented in Figure 9.

Interdependencies from the Relationship


Identification of Organizational Linked by Output and Control
Interdependencies Data and information that form an output of a
process can also become a constraint or control of
IDEF0 technique gives not only a good overview other processes. These transformations of outputs
of input, output, control, and mechanism for into control factors result in the output-control
each entity of the process, but also overviews interdependencies between processes, as shown
the relationship between each entity linked by in Figure 10.
these objects. The relationships created by these
links assist companies in identifying four types
of interdependencies, which are listed below. Figure 10. Interdependencies from the relationship
linked by output and control
Interdependencies from the Relationship
Linked by Inputs Input Output
These interdependencies occur when the same Process A
Control
data, materials, or any other inputs that are con-
sumed to produce an output of a process are needed Process A

by different processes (see Figure 8).

Figure 9. Interdependencies from the relationship linked by input and output

A Input Output
Process A

Process A
Input

B Input Output
Process A

Process A

Process A
Input

Input Process A
C
Output
Process A


Procedure for Modeling and Improving E-SCM Processes

Figure 11. Interdependencies from the relationship level supply chain processes based on the SCOR
linked by resources model divided into: plan, source, make, deliver,
and return. Each of these processes has its own
Process A input, output, control, and mechanism involved in
the processes. The relationships linked by connec-
Process A tion of the input, output, control, and mechanism
create the interdependencies within the entity of
the supply chain.
Resources The identification of these organizational
interdependencies helps companies to avoid and
Figure 12. Organizational interdependencies reduce dependencies when they analyze and
using IDEF0 design processes. Companies can also manage
those interdependencies that cannot be avoided
for better coordination in their organization.
Supplier
Oi+1
Controls
Decomposition Structure of
Inputs
Organizational Interdependencies
Outputs
Com pany
Oi
The third contribution of IDEF0 is based on the
Resources
decomposition structure of IDEF0. IDEF0 allows
Custom er
Oi-1
the decomposition of process into various hierar-
chical detailed levels. This feature makes IDEF0
an ideal technique for modeling processes based
on the SCOR four-level procedure.
Interdependencies from the Relationship Figure 13 shows the decomposition of organi-
Linked by Resources zation Oi from organization level to top level and
Organization entities in the supply chain network level 1, respectively. From this decomposition, the
are interconnected to exchange critical resources, detail of interdependencies can be more specifi-
such as raw materials, labor, access to markets, cally observed at the extended level; for example,
specialized skills, and knowledge (Tillquist, level 1 extends to level 2, and level 2 extends to
2002). The resource interdependencies in the sup- level 3 of the SCOR model.
ply chain process occur when different processes
need to use or share the same resources (including Identification of Inter-Organizational
information), as shown in Figure 11. Managing Interdependencies
these inter-organizational dependencies requires
the use of information technology (IT) to tightly Identification of inter-organizational interde-
integrate partner relations by binding operational pendencies is the extended scope of the second
functions, processes, strategic plans, and knowl- contribution of IDEF0 (identification of organi-
edge (Tillquist, 2002). zational interdependencies). At the organizational
An example of organizational process in- level, IDEF0 identifies the relationship of input,
terdependencies including input, input-output, output, control, and resources between processes
output-control, and resources interdependencies within the company. Utilizing a combination of
is exhibited in Figure 12. The company (denoted SCOR and IDEF0 at the inter-organizational level
as organization Oi in Figure 11) performs the top- helps organizations identify and manage interde-


Procedure for Modeling and Improving E-SCM Processes

Figure 13. Decomposition of organizational business process

S upplie r
O i+1
Controls

Inputs Company Outputs


Oi

Resources
C us t o m e r
O i- 1

Aut hor: Dat e: Working READER Dat e Cont ext


Used at : Project : Rev: Draf t
Recommended
Not es:          0 Time:
Publicat ion

Government Regulations
Tariffs and Duties
Inventory Level
Routing Guide
Deliver Contract Terms

Customer Requirements Finished Product Release


Customer Order Inventory Availability
Customer Inquiry Product Location Information
Supplier Inventory Avilability SCOR: Supply Replenishment Signal
Chain Management
Customer Replenishment Signal Shipping Documents
Delivered End Items
Shipments
A0

Staff
Budget
Systems
Supplier
Customer

Node: A0 Tit le: Supply Chain Operat ion Number:

Aut hor: Dat e: Working READER Dat e Cont ext


Used at : Project : Rev: Draf t
Recommended
Not es:          0 Time:
Publicat ion
C C C C C
Government Regulations Tariffs and Duties Inventory Level Routing Guide Warranty Data
WIP Location Rules Rated Carrier Data Manage Regulatory Return Policy
Deliver Contract Terms
Customer Requirements Equipment and Facilities Schedules and Plans Capacity Requirements
I
Customer Replenishment Signal Return Plans
I
Supplier Inventory Avilability Delivery Plans
I
P: Plan Production Requirements
Production Plans
Supply Chain Plans
Sourcing Plans
A

Supplier Agreement
S: Source

A
Production Schedule
Finished Product Release
O
M: Make Product Release
Inventory Availability
O
Product Location Information
A O

Validated Order
Payment
Shipments
O
Customer Inquiry D: Deliver Delivered End Items
I O
Customer Order Shipping Documents
I O
Replenishment Signal
O
A

Return Product Authorization


Product Replacement Data
R: Return
Return Shipment
Receipt Transaction
A

Budget
Customer
Systems
Staff Supplier
M M M M M

Node: A0 Tit le: Supply Chain Operat ion Number:

Aut hor: Dat e: Working READER Dat e Cont ext


Used at : Project : Rev: Draf t
Recommended
Not es:          0 Time:
Publicat ion

C
Inventory Strategies Routings
Government Regulations Service Levels
Planning Decision Policies

Order Backlog, Shipments Establish and Communicate Supply Chain Plans


Supplier Inventory Avilability P: Plan Supply Capacity Requirements
I O
Customer Replenishment Signal Chain Supply Chain Plans
I O
Customer Requirements
I A
Sourcing Plans
O
P: Plan
Source

A
Production Plans
O

P: Plan Make

Inventory Availability
A
Stocking Requirements
Delivery Plans
O

P: Plan Deliver

Point of Sale Data (daily)


Vendor Lead Time/ Transit Time
A

Return Plans
O
Return Plan Schedule
P: Plan Return
Production Requirements
O
Staff Source Requirements
A
Supplier
Systems
Budget
Customer
M M M M

Node: A Tit le: Supply Chain Operat ion Number:


Procedure for Modeling and Improving E-SCM Processes

pendencies occurring in and between processes. Decomposition Structure of


This ultimately leads to coordination of the entire Inter-Organizational Interdependencies
supply chain. The example of identifying interde-
pendencies between organizations based on SCOR The fifth contribution of IDEF0, decomposition of
and IDEF0 is exhibited in Figure 14. structure of inter-organizational interdependen-
Organizational interdependencies identifica- cies, is based on the combination of process decom-
tion results in the recognition of interdependen- position and inter-organization interdependencies
cies within organizations. Inter-organizational relationship presentation. The decomposition of
interdependencies identification, in advance, helps process to the detailed level between organizations
companies to recognize the links and relationships allows companies to enter into the consideration
between organizations. This eventually consti- level of interdependencies identification between
tutes supply chain integration and coordination. them. This will also facilitate companies to keep

Figure 14. Detailed inter-organization using IDEF0 technique

Supplier
Oi+1
Controls

Inputs Company Outputs


Oi

Resources
Customer
Oi-1

Working READER Context


Author: Date:
Draft
Used at: Project: Rev:
Recommended
Notes: 1 2 3 4 5 6 7 8 9 10 Time:
Publication

Company Inventory Level Customer Inventory Level Customer's Customer Inventory Level
Routing Guide
Government Regulations

Supplier's Replenishment Signal


Supplier Shipping Document
SCOR Supplier Supply Chain Plan
(Oi+1):supplier Supplier Shipment
Supplier's Finished Product Release
Supplier Inventory Availability
A1
Company Supply Chain Plan
Company Shipping Document
Company Shipment
SCOR Company Inventory Availability
(Oi):company
Company Requirements
Company Replenishment Signal
Company's Order
A2

Customer's Inventory Availability


Customer Shipment
SCOR Customer Shipping Document
(Oi-1):customer Customer Replenishment Signal
Customer Requirements
Customer's Order
A3

Systems
Budgets
Customer
Company Supplier Customer's Customer
Supplier's Supplier

Node: A0 Title: Supply Chain Operation Number:


Procedure for Modeling and Improving E-SCM Processes

Figure 15. Decomposition structure of inter-organizational interdependencies

Author: Working READER Context


Used at: Date: Draft
Project: Recommended
Publication
R
Company Inventory Level Customer Inventory Level Customer's Customer Inventory Level
Routing Guide
Government Regulations

Supplier's Replenishment Signal


Supplier Shipping Document
SCOR Supplier Supply Chain Plan
(Oi+):supplier Supplier Shipment
Supplier's Finished Product Release
Supplier Inventory Availability
A
Company Supply Chain Plan
Company Shipping Document
Company Shipment
SCOR Company Inventory Availability
(Oi):company
Company Requirements
Company Replenishment Signal
Company's Order
A

Customer's Inventory Availability


Customer Shipment
SCOR Customer Shipping Document
(Oi-):customer Customer Replenishment Signal
Customer Requirements
Customer's Order
A

Systems
Budgets
Customer
Company Supplier Customer's Customer
Supplier's Supplier

Inter-organisation
Node: A0 Title: Supply Chain Operation Number:
Level

Autho r: Date: Wo rking READER Date Contex Author : Date: Wor ki ng READER Date Con t ext

Used at : Dr af t
Rev: Draft
Pr oject: Rev:
Used at: Project: Notes:          0 Time:
Recommended
No tes:         0 Reco mmended Publi cati on
Publicatio n
Ti C
Government Regulations
C
Tariffs and Duties
C
Inventory Level
WIP Location Rules
C C
Routing Guide
Rated Carrier Data
Warranty Data
Manage Regulatory Return Policy
Deliver Contract Terms
Customer Requirements Equipment and Facilities Schedules and Plans Capacity Requirements
C C C C C I
Customer Replenishment Signal Return Plans
I
Government Regulations Tariffs and Duties Inventory Level Routing Guide Warranty Data I
Supplier Inventory Avilability Delivery Plans
P: Plan Production Requirements
WIP Location Rules Rated Carrier Data Manage Regulatory Return Policy Production Plans
Deliver Contract Terms Supply Chain Plans
Equipment and Facilities Schedules and Plans Sourcing Plans
A
Customer Requirements Capacity Requirements
I
Customer Replenishment Signal Return Plans Supplier Agreement
I
Supplier Inventory Avilability Delivery Plans S: Source
I
P: Plan Production Requirements A
Production Plans Production Schedule
Supply Chain Plans Finished Product Release
O
Sourcing Plans M: Make Product Release
A Inventory Availability
O
Product Location Information
A O
Supplier Agreement
S: Source Validated Order
Payment
Shipments
O
A Customer Inquiry D: Deliver Delivered End Items
I O
Customer Order Shipping Documents
I O
Replenishment Signal
Production Schedule O
A
Finished Product Release
O
M: Make Product Release Return Product Authorization
Inventory Availability Product Replacement Data
O R: Return
Return Shipment
Product Location Information
A O A
Receipt Transaction

Validated Order Budget


Customer
Payment
Systems
Shipments
O Staff Supplier
Customer Inquiry D: Deliver Delivered End Items
I O M M M M M
Customer Order Shipping Documents
I O
Replenishment Signal
O
A
No de: A0 Title: Supply Chain Operation Number:
Return Product Authorization
Product Replacement Data
R: Return
Return Shipment
Receipt Transaction
A

Budget
Customer
Systems
Staff Supplier
M MM M M

Organizational Level:
Node: A 0 Title: Supply Chain Operatio n Number:
Top Level (Level 1)

Autho r: Date: Wo rking REA DER Date Contex


Used at: Project: Rev: Draft
No tes:         0 Reco mmended
Ti
Publicatio n Organizational Level:
C
Inventory Strategies
Government Regulations
Routings
Service Levels
Top Level (Level 2)
Planning Decision Policies

Order Backlog, Shipments Establish and Communicate Supply Chain Plans


Supplier Inventory Avilability P: Plan Supply Capacity Requirements
I O
Customer Replenishment Signal Chain Supply Chain Plans
I O
Customer Requirements
I A
Sourcing Plans
O
P: Plan
Source

A
Production Plans
O

P: Plan Make

Inventory Availability

A
Stocking Requirements
Delivery Plans
O

P: Plan Deliver

Point of Sale Data (daily)


Vendor Lead Time/ Transit Time
A

Return Plans
O
Return Plan Schedule
P: Plan Return
Production Requirements
O
Staff Source Requirements
A
Supplier
Systems
Budget
Customer
MMM M

Node: A  Title: Supply Chain Operatio n Number:


Procedure for Modeling and Improving E-SCM Processes

Figure 16. Gap determination for selecting BPI approaches


Applying BPR Applying CPI Applying CPI

Best Practices
Company (Oi)

Customer (Oi-1)

: GAP
Supplier (Oi+1)

these interdependencies at a manageable level for stage and certain process in an organization may
the goals of supply chain improvement. not necessarily have the same effect on other
Figure 15 displays the example of decompo- processes of the supply chain. Thus, in selecting
sition at two organizations, a company (Oi) and a best practice to improve the entire supply chain,
its customer (Oi-1). The figure illustrates that, the entire flow of process linked to the partners
at the inter-organizational level, there are many should be considered. For this purpose, the first
interdependencies occurring. One is caused by level of the Web-based system introduced by Al-
the input-output relationship. The figure shows Hakim (2003) plays a major role.
that one input customer replenishment signal The first level of the Web-based system allows
of company (Oi) is derived from the output that an individual partner of an e-network to analyze,
was created by customer (Oi-1). With decomposi- compare, and evaluate their practices with the
tion to level 1, it can be found that the customer practices of other partners of the e-network. The
replenishment signal is actually produced from feature allows e-network partners or e-SCM ex-
deliver process in customer organization, and it perts to simulate the effect of practices along the
goes to plan process in the company organization. supply chain and to select practices that achieve the
If the company further decomposes its plan pro- best flow of material along the supply chain.
cess to level 2, it can be found that this customer
replenishment signal is needed as an input to Step 4: gap Determination
all processes in the level including: plan supply
chain, plan source, plan make, plan deliver, and After selection of best practices which need to be
plan return. applied from the previous step, a gap analysis is
used to measure the current performance of each
Step 3: Benchmarking e-network partner with those targets desired to
and Identifying Best Practices be achieved and then to define the change that is
needed to be made to the process. Applying the
Business process benchmarking and the selec- alternative business improvement approaches
tion of best practices are identified as the tools with the aim of improving supply chain in this
for supply chain improvement. The SCOR model procedure is based on performance strategies. The
provides a list of best-in-class practices for each business process reengineering (BPR) approach
process element. However, SCOR best-in-class primarily aims to gain dramatic improvements,
practices are generic lists. A best practice that has while the continuous process improvement (CPI)
a significant effect on the performance of a certain approach comprises improvements that are


Procedure for Modeling and Improving E-SCM Processes

individually small, confined within functional useful for effective modeling and management of
boundaries. The CPI approach therefore focuses the supply chain coordination.
on improving the existing system by closing small The SCOR model provides a list of best-in-
performance gaps. class practices and features for each process ele-
Therefore, as depicted in Figure 16, if the ment which allows individual trading partners to
performance gap is wide, substantial improve- analyze, compare, and apply the best practices.
ment and a high degree of change is needed at a However, there is no indication of how to select
specific stage. Dramatic process transformation and apply the various alternative best practices
is required for breakthrough performance change. at the microanalysis level. This research suggests
In contrast, if the performance gap and degrees the suitability of using the traditional flowcharting
of change are small, incremental improvement is method for selecting best practices in the SCOR
needed to achieve small but meaningful improve- environment using a gap analysis approach.
ment in business results. Again, the Web-based By identifying the gap between existing
system (in Al-Hakim, 2003) allows e-SCM experts practices and best practice, the final step of the
to evaluate the action required for each e-network eSCM-I procedure provides an introduction to
partner to take. improvement approaches such as business pro-
cess reengineering (BPR) or continuous process
improvement (CPI) from the holistic viewpoint.
CONCLUSION Ultimately, the SCOR-based eSCM-I procedure
introduced in this chapter provided five main
This research attempts to develop a procedure contributions to supply chain improvement,
referred to as eSCM-I to improve supply chain including structured presentation of processes,
business processes, taking into consideration identification of organizational interdependencies,
the Internet and e-business communication decomposition structure of organizational interde-
technologies. The procedure identifies process pendencies, identification of inter-organizational
interdependencies and managing supply chain interdependencies, and decomposition structure
coordination. of inter-organizational interdependencies.
The eSCM-I procedure uses the SCOR model
for purposes of process standardization. This
standardization step plays an essential role as a ReFeReNCeS
coordination mechanism to manage interdepen-
dencies within a supply chain network. Abbott, J. (2001). Data data everywhereand
IDEF0 was selected to model SCOR business not a byte of use? Qualitative Market Research:
processes. The IDEF0 technique has been found An International Journal, 4(3), 182-192.
suitable for the purpose of describing SCOR
Al-Hakim, L. (2003). Web-based supply chain
processes in general when the flow of informa-
integration model. In J. Mariga (Ed.), Managing
tion and the independency relationships are to be
e-commerce and mobile computing technologies
considered. The IDEF0 method has the potential
(pp. 183-207). Melbourne: IRM Press.
to contribute additional aspects that are not repre-
sented in the current SCOR models, resulting in Biazzo, S. (2002). Process mapping techniques
a more comprehensive representation of supply and organizational analysis: Lessons from so-
chain processes. IDEF0 identifies the interde- ciotechnical system theory. Business Process
pendency relationships in terms of input, output, Management Journal, 8(1), 42-52.
control, and mechanism. This identification is very


Procedure for Modeling and Improving E-SCM Processes

Crowston, K. (1997). A coordination theory ap- Lummus, R.R., & Vokurka, R.J. (1999). Defining
proach to organizational process design. Orga- supply chain management: A historical perspec-
nization Science, 8(2), 157-175. tive and practical guidelines. Industrial Manage-
ment & Data Systems Journal, 99(1), 11-17.
El Sawy, O.A. (2001). Redesigning enterprise pro-
cesses for e-business. Sydney: McGraw-Hill. Malone, T.W., & Crowston, K. (1994). Interdisci-
plinary study of coordination. ACM Computing
Evans, J.R., & Lindsay, W.M. (2002). The man-
Survey, 26(1), 87-119.
agement and control of quality (5th ed.). Mason,
Oh: South-Western. Meade, L.M., & Sarkis, J. (1999). Analyzing
organizational project alternatives for agile
Fulscher, J., & Powell, S.G. (1999). Anatomy of
manufacturing processes: An analytical network
a process mapping workshop. Business Process
approach. International Journal of Production
Management Journal, 5(3), 208-237.
Research, 37(2), 241-261.
Goldman, S.L., Nagel, R.N., & Preiss, K. (1995).
Medcof, J.W. (2001). Resource-based strategy and
Agile competitors and virtual organizations:
managerial power in networks of internationally
Strategies for enriching the customer. New York:
dispersed technology units. Strategic Manage-
Van Nostrand Reinhold.
ment Journal, 22(11), 999-1012.
Gunasekaran, A., Patel, C., & Tirtiroglu, E.
Murillo, L. (2001). Supply chain management and
(2001). Performance measures and metrics in a
the international dissemination of e-commerce.
supply chain environment. International Jour-
Industrial Management & Data Systems, 101(7),
nal of Operations & Production Management,
370-377.
21(1/2), 71-87.
Nassimbeni, G. (1998). Network structures and
Helms, M.M., Ettkin, L.P., & Chapman., S. (2000).
coordination mechanisms: A taxonomy. Inter-
Supply chain forecastingcollaborative forecast-
national Journal of Operations & Production
ing supports supply chain management. Business
Management, 18(6), 538-554.
Process Management Journal, 6(5), 392-407.
Peppard, J. (1995). Broadening visions of BPR:
Hunt, D.V. (1996). Process mapping: How to
The imperative of strategic integration. In Work-
reengineer your business processes. Brisbane:
ing Paper Series 11/95. Cranfield UK: Cranfield
John Wiley & Sons.
School of Management.
Kappes, S. (1997). Putting your IDEF0 model to
Plaia, A., & Carrie, A. (1995). Application and
work. Business Process Management Journal,
assessment of IDEF3process flow description
3(2), 151-161.
capture method. International Journal of Opera-
Li, Z., Kumar, A., & Lim, Y.G. (2002). Supply tions & Production Management, 15(1), 63-73.
chain modelinga coordination approach. Inte-
Poirier, C.C., & Bauer, M.J. (2000). E-supply
grated Manufacturing Systems, 13(8), 551-561.
chain: Using the Internet to revolutionize you
Lin, F., Yang, M., & Pai, Y. (2002). A generic business. San Francisco: Berrett-Koehler.
structure for business process modeling. Business
Soliman, F. (1998). Optimum level of process
Process Management Journal, 8(1), 19-41.
mapping and least-cost business process re-engi-

0
Procedure for Modeling and Improving E-SCM Processes

neering. International Journal of Operations & Tillquist, J. (2002). Strategic connectivity in ex-
Production Management, 18(9/10), 810-816. tended enterprise networks. Journal of Electronic
Commerce Research, 3(2), 77-85.
Stewart, G. (1997). Supply-chain operations ref-
erence model (SCOR): The first cross-industry Towill, D.R. (1996). Industrial dynamics modeling
framework for integrated supply-chain manage- of supply chains. International Journal of Physical
ment. Logistics Information Management Jour- Distribution & Logistics Management.
nal, 10(2), 62-67.
Towill, D.R. (1997). The seamless supply chain: The
Supply Chain Council. (2003). Supply-chain opera- predators strategic advantage. International Jour-
tions reference model version 6.0. Retrieved August nal of Technology Management, 13(1), 37-56.
8, 2003, from http://www.supply-chain.org
Williams, L.R., Esper, T.L., & Ozment, J.
Svensson, G. (2002). A typology of vulnerability (2002). The electronic supply chain: Its impact
scenarios towards suppliers and customers in on the current and future structure of strategic
supply chains based upon perceived time and alliances, partnerships and logistics leadership.
relationship dependencies. International Journal International Journal of Physical Distribution &
of Physical Distribution & Logistics Management, Logistics Management, 32(8), 703-719.
32(3/4), 168-187.




Chapter II
Dynamic Transshipment
in the Digital Age
Shilei Yang
Washington State University, USA

Bintong Chen
Washington State University, USA

Charles L. Munson
Washington State University, USA

ABStRAct

In recent years, e-retailing has become the growth engine for the retailing industry. A large online retailer
usually has multiple distribution centers serving different geographical regions. This chapter explores
how to handle transshipment among distribution centers in a geographically dispersed network. We
investigate transshipment strategies in a continuous review system with dynamic demand. We present a
dynamic program that identifies the optimal transshipment rule. However, the dynamic program is time
consuming and might be difficult for practitioners to implement. Therefore, we propose three distinct
heuristic decision rules for making transshipment decisions. By employing numerical experiments, we
analyze simulated results through various combinations of demand rates and delivery costs. We provide
comments and suggestions based on the comparative results generated from different decision rules. As
a result, we identify a good heuristic rule, which can be conveniently implemented and used in practice
to determine effective transshipment policies.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Dynamic Transshipment in the Digital Age

intRoDUction Amazon.com, one of the most successful pure


Internet retailers, has grown from a book reseller
Nearly two-thirds of all North American house- to a retailing giant on the Internet. Amazon.com
holds have purchased online. Although the ma- reported its net profit in 2005 as $359 million on
jority of retail sales still take place at traditional $8.49 billion in net sales (Finfacts Team, 2006).
brick-and-mortar stores, online sales over the next From its humble beginnings using one distribution
five years are expected to grow at a compounded center in Seattle, Amazon.com has expanded to
annual growth rate of 14% (Forrester, 2005). The seven distribution centers across the United States
fast growth rate of Internet retailing provides new as listed in Table 1.
challenges for management. Although there are a total of seven DCs, two of
Online customers need not to care from where them are located in the same state. So according
their orders are physically shipped. Consequently, to their physical locations, we can roughly divide
many Internet retailers can improve service and the continental U.S. into six different service
reduce expected delivery cost by transshipping regions (Figure 1).
between distribution centers. Especially for large Suppose that a customer from Atlanta places
online retailers with extensively dispersed networks, an order at Amazon.com; however, the local DC
the use of transshipments has a significant benefit at McDonough, Georgia, is already out of stock.
by redistributing inventories among multiple distri- Apparently, this customer demand cannot be
bution centers (DCs) (Maltz, Rabinovich, & Sinha, directly satisfied from the local DC. Now the
2004). However, such a practice will incur additional question arises: how should the Amazon.com DC
transportation cost in comparison to shipping from operations manager transship the productship it
its local DC. On the other hand, issuing transship- out from Kansas, Kentucky, or even from Seattle?
ment will also reduce the ability of the source DC The naive solution adopted by most practitioners
to meet its own local customer demand. In the would be to transship that item from the nearest
following, we will use Amazon.com to illustrate a DC. However, our analysis shows that under some
transshipment scenario. circumstances, this frequently used technique

Table 1. Physical location of Amazons DCs

DC Locations DC Targeting Region Market Number

(1) Seattle, Washington Northwestern U.S. 1

(2) New Castle, Delaware Northeastern U.S. 2

(3) Fernley, Nevada Western U.S. 3

(4) Coffeyville, Kansas Midwest and Southwest U.S. 4

(5) Campbellsville, Kentucky Midwestern U.S. 5

(6) Lexington, Kentucky Midwestern U.S. 5

(7) McDonough, Georgia Southeastern U.S. 6


Dynamic Transshipment in the Digital Age

Figure 1. The Amazon distribution network

4 5
3

may not be the most efficient way to reduce the papers (Lee, 1987; Axsater, 1990; Alfredsson &
overall delivery cost. Verrijdt, 1999) tend to study low-demand service
The rest of this chapter is organized as fol- parts or repairable items in continuous review
lows. In the next section, we provide the relevant systems. They all assume that demand will first
literature review. We then outline the notation be filled from stock on hand and any remaining
and basic assumptions of our model and develop will be supplied by an emergency lateral transship-
a dynamic program with the aim of minimizing ment. In contrast, some researchers (Das, 1975;
the total expected delivery cost. Next, we propose Robinson, 1990; Archibald, Sassen, & Thomas,
three heuristic decision rules, which we evaluate 1997) extend the emergency transshipment to
by numerical simulation. We wrap up the chapter non-emergency transshipment. Instead of a con-
with a summary of our main results and some tinuous review system, they use a periodic one, in
ideas for future research. which transshipments can occur regularly. Both
papers assume zero lead times for ordering and
LiteRAtURe ReVieW transshipment. Tagaras and Cohen (1992) evaluate
different pooling rules for lateral transshipment,
Literature examining transshipment models can but with non-negligible lead times. Herer and
be classified by several major characteristics: Tzur (2001) use a shortest path network method
emergency situations or non-emergency situa- to search for optimal transshipment solutions.
tions, one-period or multiple-period, two-location Grahovac and Chakravarty (2001) use a triggering
or multiple-location, periodic review system or level to differentiate the regular order and emer-
continuous review system, and static demand or gency orderthat is, emergency transshipments
dynamic demand. will only occur if the inventory level reaches a
Many earlier papers focusing on transshipment predetermined level.
deal with emergency lateral transshipment. Such


Dynamic Transshipment in the Digital Age

Two recent papers (Minner, Silver, & Robb, a large geographic market divided into a number
2003; Axsater, 2003) relax most of the restrictions of regional markets according to the locations of
described previously. Under a special assumption its DCs. We first assume that the arrival rates of
that no further transshipments will take place, order requests from each market are independently
they use a decision technique based on full sys- Poisson distributed. At the start of the period, we
tem information that maximizes the savings via assume that all DCs are replenished at the same
a single one-time transshipment. This heuristic time (from a supplier whose concerns are exog-
rule can be used repeatedly as an approxima- enous to this model). No replenishment is allowed
tion. Rudi, Kapor, and Pyke (2001) take a new within the period, implying that only within-DC
approach, which analyzes the transshipments transshipment is allowed for satisfying demand
under a decentralized system rather than using when stocks run out at any DCs. The inventory
traditional centralized coordination. With the position of each DC is reviewed continuously for
localized setting, they use a Nash equilibrium to the purpose of regular transshipment. Customers
coordinate transshipment prices that lead to joint can place orders online as long as the system has
profit maximization. Related models studying stock remaining. However, once the system inven-
dynamic environment with transshipment can tory reaches zero, the current selling period ends
be found in Herer and Rashit (1999), Robinson and no more online ordering is allowed.
(1996), and Lin et al. (2004). When a demand is realized online from a
In the digital age, communications between market, an order fulfillment request is generated.
different DCs are almost instantaneous, and thus If the product is available at the local DC, the item
inventory sharing is relatively easier. Transship- is shipped out from the local DC to the customer.
ment occurs more often with online stores than If there are no units available at the local DC,
with traditional brick-and-mortar stores because transshipment is requested to other DCs with
customers do not need to take actual possession stock on hand. Unlike the traditional inventory-
of the product at the virtual stores (Harrington, sharing of offline stores, the transshipped item
1999). In this chapter we specifically target this is shipped out directly to the customer from the
prominent issue faced by e-retailers serving selected DC. Our goal is to minimize the total
geographically dispersed markets. In a complex expected delivery cost in this uncertain demand
decision situation, it is mathematically difficult environment.
to find theoretical results for transshipment. Box 1 describes the model notation. For
Heuristic decision rules with predefined condi- simplicity, we aggregate all customers from one
tions represent the most common technique to regional market into one customer located at the
approach the transshipment problem. By compar- DC in that market, which implies no distance
ing different heuristic rules based on expected difference among customers in the same mar-
optimal cost, we illustrate that a commonly used ket. Thus, we can assume a zero local shipment
practice is not cost efficient and then identify an costthat is, Cii = 0. The delivery cost matrix
appropriate one that can be implemented easily should be symmetric as seen in Figure 2. For
by practitioners. any given symmetric delivery cost matrix, we
introduce a new term. If delivery costs follow the
basic geometric axiomthat is, Cij + Cjk Cik for
MoDeL DeScRiPtion any i, j, and k, we refer to this type of delivery
cost matrix as a realistic matrix, otherwise we
We model a single-product system for one-period call it a nonrealistic matrix.
analysis. We consider a centralized e-retailer with


Dynamic Transshipment in the Digital Age

Box 1. Notation 3. The DCs located at the same regional market


are considered as one, which implies that the
n = number of distribution centers in the system
number of DCs is the same as the number
Si = current inventory position at DC i (i=1, 2,, n) of markets.
4. Orders are filled on a first-come, first-served
j = expected periodic demand rate at market j (j=1, 2,, n) basis.

Cij = unit transshipment cost from DC i to market j


oPtiMAL tRAnSShiPMent RULe
Dj = expected remaining demand within the current period
from market j In this section we present a dynamic program
to find the optimal dynamic transshipment
strategy.
For any given inventory positions S1, S2,, Sn, let
Figure 2. Symmetrical delivery cost matrix T(S1, S2,, Sn) denote the minimum cost to deliver
all units until the selling period ends. Although
0 C12 C1n the market demand is dynamic and uncertain, it

n
C 0 C2 n follows a Poisson distribution with rate = i=1
12
j. So the probability that the next unit demand
comes from market j is j /. Hence, we can build
C1n C2 n 0
the following dynamic program (Figure 3).
The boundary conditions are T(0, 0,..., 0)=0
It is easy to show that when operating under and T(S1, S2,..., Sn) = if any Sj < 0. The complex-
conditions of a realistic cost matrix, customer de- ity is approximately n2 S1 S2 ... Sn. With this
mand should be fulfilled by its local DC whenever dynamic program, we can recursively solve any
possible. Indeed, without loss of generality, we T(S1, S2,, Sn). Suppose when a demand is real-
suppose that there are only two units in system ized in market k, Sk = 0 and Sp > 0 for any p P,
inventory (one in DC i and the other in DC j). Now where P is the set of all DCs with stock on hand.
when a demand is realized at market j, we trans- Based on the dynamic programming results, the
ship one unit from DC i to market j, which incurs optimal strategy would be transshipment from
a delivery cost Cij. Next demand can be from any DC p with min {Cpk + T(S1,..., Sp -1,..., Sn)}. In the
pP
market k(k = 1, 2,, n), then the delivery cost must rest of the chapter, we will refer to this optimal
be Cjk. So the total cost is Cij+ Cjk in this scenario. If strategy as the optimal rule.
transshipment only happens when the local DC is For example, consider a simple case with three
out of stock, the total cost should be Cjj + Cik = 0 + DCs, where 1 = 1, 2 = 2, 3 = 3 and a triangular
Cik = Cik. We know Cij + Cjk Cik, so our observation delivery cost matrix (Figure 4).
is always true under a realistic cost matrix.
We shall state the following additional as-
sumptions: Figure 4. Triangular delivery cost matrix

1. The initial inventory position of each DC at


the beginning of the period is known. C11 C12 C13 0 1 1
2. The delivery cost already considers the issue C
21 C22 C23 = 1 0 1
of delivery timethat is, longer delivery
time requires higher delivery cost. C31 C32 C33 1 1 0


Dynamic Transshipment in the Digital Age

Figure 3. Dynamic program

T (S1, S2,..., Sn)=

1
min {C11 + T (S1 - 1, S2,..., Sn), C21 + T(S1, S2 - 1,..., Sn),..., Cn1 = T(S1, S2,..., Sn -1)}

2
+ min {C12 + T (S1 - 1, S2,..., Sn), C22 + T(S1, S2 - 1,..., Sn),..., Cn2 = T(S1, S2,..., Sn -1)}

+ ...

n
+ min {C1n + T (S1 - 1, S2,..., Sn), C2n + T(S1, S2 - 1,..., Sn),..., Cnn = T(S1, S2,..., Sn -1)}

Table 2 shows the results using initial inventory Table 2. Optimal costs under a triangular matrix
positions (3, 3, 3). Suppose that current inven-
tory positions are (3, 3, 0), and a customer from S1 S2 S3 T(S1,S2,S3)
market 3 places an order. From Table 2, since c13 3 3 3 2.33
+ T(2,3,0) = 1 + 2.78 < c23+ T(3,2,0) = 1 + 2.88, 3 3 2 2.57
we need to make a transshipment from DC 1 to 3 3 1 2.90
market 3. We will illustrate how to compute T (S1, 3 3 0 3.32
3 2 3 2.21
S2, S3) after describing heuristic rule 3.
3 2 2 2.33
Even though the results from Table 2 were
3 2 1 2.56
derived from a simple setting, some observa-
3 2 0 2.88
tions become evident. The optimal system cost
3 1 3 2.30
does not necessarily decrease with the reduction
3 1 2 2.28
of inventory positions, which seems counter-in-
3 1 1 2.37
tuitive. It is explainable because we assume that 3 1 0 2.58
the local shipment cost is zero. Thus, the more 3 0 3 2.61
balanced the inventory positions, the lower the 3 0 2 2.46
probability of a transshipmenthence the smaller 3 0 1 2.42
the optimal cost. 3 0 0 2.50
We can attain the optimal transshipment 2 3 3 1.84
policy using the dynamic program. However, the 2 3 2 2.03
calculation of dynamic program is time costly 2 3 1 2.36
and difficult to implement. Since the transship- 2 3 0 2.78
ment decision has to be decided upon frequently 2 2 3 1.67
in the digital age, in the next section we propose 2 2 2 1.73
three heuristic decision rules that can be easily 2 2 1 1.94
implemented by practitioners. 2 2 0 2.28
...
0 0 1 0.5
0 0 0 0


Dynamic Transshipment in the Digital Age

Figure 6. Ratio rule

Cpk i =1 Si
n
Dp p p
min Cpk = min i =1 Si
n
= min Cpk
pP
S p pP
S p pP
S p

heURiStic tRAnSShiPMent higher probability of stocking out. So transship-


RULeS ping from a DC with a high market demand may
not be wise, even if this DC has available stock.
To the extent that shipping cost is roughly pro- Considering this, our second rule incorporates
portional to distance, it appears reasonable to the possibility of stock outs.
transship from the closest DC with stock on
hand. This intuitive approach is widely adopted Ratio Rule
in practice. We name the first decision rule as the
Nearest Rule. Transshipment should be from the DC with:
D p
nearest Rule min C pk ,
pP S
p

Transshipment should be from the DC with the where Dp is the expected remaining demand within
minimum unit transshipment cost: min{Cpk}, the period from market p.
pP
where k is the DC already out of stock and P is With current inventory positions S1, S2,,


n
the set of all DCs with stock on hand. Sn, we have Dp = S where j / is the
p

i=1 i
Now, consider a online retailer with three probability that the next unit demand comes from

n
DCs, given 1 = 1 , 2 = 2 , 3 = 3, and a triangular market j and S is the remaining system
i=1 i
delivery cost matrix (Figure 5). inventory. It can be simplified as Figure 6.
Suppose that current inventory positions are (2,
p
0, 3), and a customer from market 2 places an Hence we only need to compute min Cpk .
order. According to the Nearest Rule, the retailer
pP
Sp
needs to make a transshipment from DC 3 since
C12 > C32. Using the same example described above,
Unfortunately, this myopic Nearest Rule only according to the Ratio Rule, the retailer needs to
considers the one-time delivery cost. It does not make a transshipment from DC 1 because:
take into account that transshipment will reduce
the source DCs ability to meet its own future 1 3
1 3
demand. A higher future demand rate implies a C12 = 3 < 2 = C 32 .
S1 2 3 S3
In the third heuristic rule, we take a classical ap-
Figure 5. Triangular delivery cost matrix proach to minimizing the total delivery cost by
assuming a once-for-all transshipment based on
C11 C12 C13 0 3 1 expected future demand.
C C23 = 3 0 2
21 C22
C31 C32 C33 1 2 0


Dynamic Transshipment in the Digital Age

Figure 7. Linear program nUMeRicAL eVALUAtionS

minimize Z = i =1 j =1 CijYij
n n
In order to compare these three different rules,
we set up a simulation experiment. Starting

n
j =1
Yij =Xi i with a 3-DC system with initial inventory (3, 3,
j 3), different configurations can be explored by
i =1 Xi
n n
s.t. Yij =Dj = j
i =1
combining the demand rate and delivery cost.
Yij 0 i,j To determine their effects, three values of each
were examined: j {1,2,3} and Cij = Cji {1,2,3}
i j. After eliminating two exact duplications,
we have 22 realistic matrices and 3 nonrealistic
LP Rule matrices with 25 combinations of demand rates.
So there are (22 + 3) 25 = 625 different trials.
Transshipment should be from the DC with: Table 4 shows the simulation results of 25 trials
under a triangular cost matrix. We compare the

n n
min{C pk + min Cij Yij } , relative performance of the heuristic rules to the
pP i =1 j =1
optimal rule.
As seen from Table 4, apparently the Ratio
where Yij is the expected quantity of units shipped Rule and the LP Rule perform much better than
from DC i to market j. the Nearest Rule. In addition, the relative perfor-
Given current inventory positions S1, S2,, mance of the heuristic rules seems insensitive to
Sn, first let Xp = Sp -1 and Xi = Si for any i p. We the variation of demand rate, although the sys-
analyze the impact on the future if transshipment tem delivery cost does increase as the variation
occurs from DC p to market k. Mathematically, this increases. In other words, demand variation will
can be formulated as a linear program (Figure 7.) cause delivery costs to increase, but it will not
After adding unit transshipment cost Cpk to necessarily cause poor transshipment decisions.
Zmin, the DC with minimum sum-up value should Hence, our two new proposed heuristic rules
be our choice. appear robust.
Continuing to use the same example above, Table 3 shows the average cost penalty of 550
according to the LP Rule, suppose one unit trans- trials based on the realistic cost matrices.
shipment is from DC 1, we get Zmin = 3 by solving Table 5 shows the average cost penalty of 75
the LP; suppose one unit transshipment is from trials based on the nonrealistic cost matrices.
DC 3, we get Zmin = 4. Since C12 + 3 = C32 + 4 =
6, the transshipment can be either from DC 1 or
Table 3. Average penalty under realistic cost
DC 3. As we can see, transshipping decisions
matrices
from three heuristic rules are different under the
described example. Nearest Rule Ratio Rule LP Rule
To illustrate the procedure of calculating the 3% 0.51% 1.18%
expected total system delivery cost T(S1,S2,..., Sn),
the following numerical example is presented
Table 5. Average penalty under nonrealistic cost
when using the Ratio Rule. The procedures for the
matrices
Nearest Rule and the LP Rule are similar except
that we need to adopt different decision polices Nearest Rule Ratio Rule LP Rule
when determining the source DC (Box 2). 8.11% 5.59% 4.92%


Dynamic Transshipment in the Digital Age

Box 2. Example of cost calculation when using the Ratio Rule

3-DC system: n = 3

Initial Inventory: S1 = S2 = S3 = 3

Demand Rate: 1 = 1, 2 = 2, 3 = 3
C11 C12 C13 0 1 1

Delivery Cost Matrix: C21 C22 C23 = 1 0 1
C31 C32 C33 1 1 0

With boundary condition T(0,0,0)=0, we have


1 2 3 1 2 3
T (0, 0,1) = (C 31 + T (0, 0, 0)) + (C 32 + T (0, 0, 0)) + (C 33 + T (0, 0, 0)) = 1 + 1 + 0 = 0.5
6 6 6
1 2 3 1 2 3
T (0,1, 0) = (C 21 + T (0, 0, 0)) + (C 22 + T (0, 0, 0)) + (C 23 + T (0, 0, 0)) = 1 + 0 + 1 = 0.67
6 6 6
2 3
Since C 21 < C 31, a unit transshipment should be requested from DC 2 to Market 1
S2 S3
1 2 3 1 2 3
T (0,1,1) = (C 21 + T (0, 0,1)) + (C 22 + T (0, 0,1)) + (C 33 + T (0,1, 0)) = 1.5 + 0.5 + 0.67 = 0.75
6 6 6
Continuing
So this
doing this way
way sequentially,
sequentially wewecna
canultimately
ultimatelyget
get

1 2 3 1 2 3
T (3,3,3) = (C11 + T (2,3,3)) + (C 22 + T (3, 2,3)) + (C 33 + T (3,3, 2)) = 1.84 + 2.21 + 2.57 = 2.33
6 6 6

From these two summaries, we can see that the a standard Pentium 4 PC. In addition, for a 3-DC
performances of heuristic rules degrade significantly system the Ratio Rule performs better than the
when the cost matrices are nonrealistic. Although LP Rule under realistic cost matrices; hence, we
the Ratio Rule and the LP Rule are comparable to only tested the performance of the Ratio Rule and
each other, we suggest using the Ratio Rule if the the Nearest Rule for a 4-DC system.
cost matrix is realistic; however, if the matrix is non- As seen from Table 6, the cost penalty using the
realistic, we suggest using the LP Rule. In general, Nearest Rule is more than twice as high as using
the Nearest Rule should be avoided. the Ratio Rule. Given a very low initial inventory
Under the same conditions, the extension to setting, this represents a significant improvement.
four DCs is straightforward. We keep the same Even though we only have the results of 3-DC
setting except excluding all nonrealistic cost matri- and 4-DC systems, we expect that benefits of
ces, which we would expect to occur infrequently using the Ratio Rule will increase when the DC
in practice. After adding one more DC, both time network continues to expand.
complexity and number of possible trials increase
dramatically. Because we used a Microsoft Excel
macro to simulate the LP Rule, it takes a much
Table 6. Average penalty in a 4-DC system
longer time for Solver to converge after the number
of DCs reaches four. The estimated CPU solution Nearest Rule Ratio Rule
time for 39,042 trials is more than 1,000 hours on 5.29% 1.65%

0
Dynamic Transshipment in the Digital Age

Table 4. Simulation results testing the accuracy of heuristic rules

Cost Penalty from Optimal


Demand Rate Total Delivery Cost T(3,3,3)
Value
1 2 3 Optimal Nearest Ratio LP Nearest Ratio LP

1 1 1 1.796 1.888 1.796 1.796 5.10% 0.00% 0.00%

1 1 2 2.212 2.369 2.212 2.227 7.10% 0.00% 0.70%

1 1 3 2.795 2.956 2.795 2.811 5.80% 0.00% 0.60%

1 2 1 2.212 2.337 2.214 2.223 5.70% 0.10% 0.50%

1 2 2 2.052 2.323 2.052 2.061 13.20% 0.00% 0.40%

1 2 3 2.325 2.648 2.325 2.379 13.90% 0.00% 2.30%

1 3 1 2.795 2.935 2.795 2.819 5.00% 0.00% 0.90%

1 3 2 2.325 2.642 2.325 2.353 13.60% 0.00% 1.20%

1 3 3 2.316 2.709 2.319 2.322 17.00% 0.10% 0.30%

2 1 1 2.212 2.304 2.215 2.222 4.20% 0.10% 0.50%

2 1 2 2.052 2.205 2.06 2.056 7.50% 0.40% 0.20%

2 1 3 2.325 2.463 2.342 2.327 5.90% 0.70% 0.10%

2 2 1 2.052 2.086 2.068 2.052 1.70% 0.80% 0.00%

2 2 3 1.932 2.073 1.932 1.932 7.30% 0.00% 0.00%

2 3 1 2.325 2.362 2.343 2.341 1.60% 0.80% 0.70%

2 3 2 1.932 2.042 1.932 1.932 5.70% 0.00% 0.00%

2 3 3 1.891 2.076 1.891 1.895 9.80% 0.00% 0.20%

3 1 1 2.795 2.914 2.796 2.809 4.30% 0.00% 0.50%

3 1 2 2.325 2.541 2.327 2.351 9.30% 0.10% 1.10%

3 1 3 2.316 2.519 2.323 2.319 8.80% 0.30% 0.10%

3 2 1 2.325 2.357 2.343 2.325 1.40% 0.80% 0.00%

3 2 2 1.932 2.011 1.933 1.932 4.10% 0.10% 0.00%

3 2 3 1.891 2.013 1.893 1.895 6.50% 0.10% 0.20%

3 3 1 2.316 2.328 2.326 2.316 0.50% 0.40% 0.00%

3 3 2 1.891 1.949 1.894 1.912 3.10% 0.20% 1.10%


Dynamic Transshipment in the Digital Age

concLUSion AnD DiScUSSion ReFeRenceS

In the digital age, dynamic transshipments occur Alfredsson, P., & Verrijdt, J. (1999). Modeling
frequently for online retailing. Large e-retailers emergency supply flexibility in a two-echelon
can save a lot on internal fulfillment costs if they inventory system. Management Science, 45(10),
adopt correct transshipping strategies. In this 1416-1431.
chapter, we have presented a one-period model
Archibald, T.W., Sassen, S.A.E., & Thomas, L.C.
where regular transshipments are allowed. Based
(1997). An optimal policy for a two depot inven-
on minimizing the total expected delivery cost,
tory problem with stock transfer. Management
the optimal transshipment policy can be obtained
Science, 43(2), 173-183.
from a dynamic program. A simple but effective
heuristic rule (Ratio Rule) is also provided for Axsater. S. (1990). Modeling emergency lateral
the practitioners to implement. transshipments in inventory systems. Manage-
We find that the Nearest Rule, which is widely ment Science, 36(11), 1329-1338.
used, is not a wise approach for transshipment
Axsater, S. (2003). A new decision rule for lateral
decision making. The LP Rule may be best for rare
transshipments in inventory systems. Manage-
nonrealistic cost matrices. The Ratio Rule as we
ment Science, 49(9), 1168-1179.
suggest is generally a much better substitute for
the Nearest Rule. In addition, the performance of Das, C. (1975). Supply and redistribution rules
the Ratio Rule is robust to demand variation. for two-location inventory systems: One-period
In this chapter, we assume unit-size transac- analysis. Management Science, 21(7), 765-776.
tions to simulate the model. Hopefully, future
Forrester. (2005). Online retail sales will hit
field research can validate our results on larger
$210 billion in 2010. Internet Retailer. Retrieved
transaction sizes. A possible approach may use a
November 10, 2005, from http://www.interne-
stuttering Poisson demand process (Ward, 1978)
tretailer.com
for simulation. Ours is a single-period model, so
there is no replenishment necessary. The exten- Finfacts Team. (2006). Finfacts business news cen-
sion to a system with replenishment is less than tre. Retrieved from http://www.finfacts.com/ireland-
straightforward because under a continuous re- businessnews/publish/article_10004757.shtml
view inventory system with dynamic demand, the
Grahovac, J., & Chakravarty, A. (2001). Shar-
determination of optimal reorder points and batch
ing and lateral transshipment of inventory in a
quantities can become quite complicated.
supply chain with expensive low-demand items.
Management Science, 47(4), 579-594.
AcKnoWLeDgMent Harrington, L. (1999). Digital-age warehousing.
Industry Week, 248(14), 52-58.
Bintong Chens research was partially supported
Herer, Y.T., & Tzur, M. (2001). The dynamic
by the National Natural Science Foundation of
transshipment problem. Naval Research Logistics,
China No. 70640420143.
48, 386-408.


Dynamic Transshipment in the Digital Age

Herer, Y.T., & Rashit, A. (1999). Lateral stock Robinson, E.P., & Gao, L. (1996). A dual ascent
transshipments in a two-location inventory system procedure for multiproduct dynamic demand
with fixed and joint replenishment costs. Naval coordinated replenishment with backlogging.
Research Logistics, 46, 525-547. Management Science, 42(11), 1556-1564.
Lee, H.L. (1987). A multi-echelon inventory Robinson, L.W. (1990). Optimal and approximate
model for repairable items with emergency lateral policies in multiperiod, multilocation inventory
transshipments. Management Science, 33(10), models with transshipments. Operations Re-
1302-1316. search, 38(2), 278-295.
Lin, K.Y., & Sibdari, S.Y. (2004). Dynamic price Rudi, N., Kapor, S., & Pyke, D.F. (2001). A two-
competition with discrete customer choices. location inventory model with transshipment and
Working Paper. Retrieved April 7, 2005, from local decision making. Management Science,
http://www.nps.navy.mil/Faculty/Lin 47(12), 1668-1680.
Maltz, A., Rabinovich, E., & Sinha, R. (2004). Tagaras, G., & Cohen, M.A. (1992). Pooling in
Logistics: The key to e-retail success. Supply two-location inventory systems with non-neg-
Chain Management Review, 8(3), 56-63. ligible replenishment lead times. Management
Science, 38(8), 1067-1083.
Minner, S., Silver, E.A., & Robb, D.J. (2003). An
improved heuristic for deciding on emergency Ward, J.B. (1978). Determining reorder points
transshipments. European Journal of Operational when demand is lumpy. Management Science,
Research, 148, 384-400. 24(6), 623-632.




Chapter III
E-Com Supply Chain
and SMEs
Ron Craig
Wilfrid Laurier University, Canada

ABStRAct

This chapter considers the perspective of small and medium-sized enterprises (SMEs) in supply chains. It
starts with an overview of the important role of SMEs in national and world economies. Following this is an
overview of supply chains, information and communication technologies, and e-business. Both opportuni-
ties and challenges for supply chains in general and SMEs in particular are considered, and conclusions
drawn. The major contribution of the chapter is in providing an extensive overview of the literature as it
relates to information and communication technologies, supply chain management, and SMEs, providing
researchers and practitioners with a starting point to look for further information as needed.

intRoDUction this coverage is fuller. Readers are encouraged to


go to the referenced articles for more information,
This chapter presents a modest overview of the and to future articles that cite these if the develop-
considerable literature covering supply chain ment of a particular area is of interest.
management (SCM), information and commu- Only in the past decade has the SME perspec-
nication technologies (ICTs), e-commerce, and tive of SCM been seriously considered, with both
small and medium-sized enterprises (SMEs). The theoretical and empirical research published. The
reviewed papers include the perspectives of all SME SCM empirical literature now covers many
sized firms. Since large firms have led in SCM, and individual countries, including Canada (Archer,
continue to do so, much can be learned from their Wang, & Kang, 2003; Canadian E-Business Initia-
experiences and their influence over other chain tive, 2004; Raymond, Bergeron, & Blili, 2005),
members. The literature on SCM is vast, so only Germany (Berlak & Weber, 2004), South Africa
a few representative papers are reviewed. There (Badenhorst-Weiss, Fourie, & Nel, 2004), Taiwan
is much less literature dealing with SMEs; hence (Chou, Hsu, Yeh, & Ho, 2005; Wang, Chang, &

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
E-Com Supply Chain and SMEs

Heng, 2004), the UK (Azumah, Koh, & Maguire, In Canada, small firms (those with fewer
2005; Levy & Powell, 2003; Tucker & Lafferty, than 100 employees) make up more than 97%
2004; Wynarczyk & Watson, 2005), and the United of goods-producing employer businesses and
States (Arend & Wisner, 2005; Levenburg, 2005). almost 98% of all service-producing employer
International comparisons have been completed businesses (Industry Canada, 2005). For the U.S.,
by a few researchers. Beck, Wigand, and Konig small firms represent about 99.7% of all employer
(2005) compared European countries (France, firms, employ half of the private workforce, have
Germany, Denmark) and the United States. generated 75% of the net new jobs added to the
Johnston and Wright (2004) compared Canada, U.S. economy, represent 97% of all U.S. export-
Mexico, China, and Japan. There is a slight bias ers, and create more than 50% of the non-farm,
in the literature towards manufacturing over private gross domestic product (U.S. Small Busi-
other sectors (such as retail/wholesale, finance, ness Administration, 2006). At the start of 2004,
service) because manufacturing has historically within the UK, 99.9% of all enterprises were
controlled many supply chains. Today this control small (0 to 49 employees) or medium (50 to 249
is shifting, with retailers (such as Wal-Mart) often employees), employing some 58.5% of the private
having greater chain influence. sector workforce (some 12 million people), and
This chapter starts with a review of the role contributing to more than 50% of the national GDP
of SMEs in national and world economies, and (Small Business Service, 2006). Within Europe
then considers SCM in business today, including (28 countries of the European Economic Area
the major improvements facilitated by ICTs. Fol- plus candidate countries to the European Union)
lowing this, opportunities and challenges at both in 2003 there were some 25.3 million non-primary
the general chain and SME levels are considered. private enterprises, of which 99.8% were craft or
Finally, conclusions are drawn and areas for future small and medium-sized (European Commission,
research suggested. 2006). In June 2004, 99 % of Australian employ-
ing businesses were SMEs (Australian Bureau of
SMes in national Statistics, 2004; their definition of a small business
and World economy is having less than 20 employees, with a medium-
sized one having fewer than 200). And in Latin
The definition of what constitutes a micro, small, America and Asia, as many as 99% of all firms
or medium-sized business varies from country are SMEs (Johnston & Wright, 2004).
to country, and even between government de- With such a large number of SMEs, there are
partments and programs within a country. One significant differences when one looks at things
common segmentation approach uses number like profitability, industry sector, size, adoption
of employeesmicro (or very small) businesses and use of ICTs, and so forth. Many studies look at
having less than five employees, small businesses SMEs as a group (sometimes segmenting by indus-
having 100 or fewer employees, and medium-sized try sector); this can mask significant underlying
firms having 101-499 employees. A variation on differences. Similarly, looking at acceptance and
this would have the employee limit set at 250 for use of new technology systems without consider-
small businesses. Another segmentation method ing innovators, early and late adaptors can result
uses sales volumes and is based on the type of firm in average results that do not reflect the full range
(such as manufacturing, wholesale, retail, service). of experiences. An exception to this approach is
In all cases, only independently owned and oper- Levenburg (2005), who compared IT adoption for
ated firms are included (i.e., small branches and micro, small, and medium-sized firms.
subsidiaries of large businesses are excluded).


E-Com Supply Chain and SMEs

Typical advantages attributed to SMEs include Extending supply chain considerations externally
being able to service small markets, having a quick to all the other firms in the entire network presents
reaction time to changes in market conditions a much more formidable challenge.
(both organizational and managerial flexibility), Supply chains are on the corporate agenda
innovativeness, closeness to their customers (with today. Sheffi and Michelman (2005) point out that
a trusting relationship), and a bias for action. On IBMs sale of its PC business to Lenovo and the
the negative side, SMEs usually are resource merger of Procter & Gamble with Gillette were
poor (in terms of finances, time, and expertise), driven to a great extent by the supply chain success
and generally lag in integration into the new of major competitors (Dell and Wal-Mart, respec-
e-economy. It is important to note that a small tively). They state, in an era of commoditized
business is not simply a scaled-down version of products, volatile markets, and expanding arenas
a large business. of competition, supply chains are becoming one
We see that SMEs are very important to local area where distinction is possible, powerful, and
and national economies, and hence to the world increasingly difficult to replicate.
economy. As SMEs provide employment, create Many SCM authors (including Harrison &
new jobs, and contribute to a countrys GDP, van Hoek, 2005; Lee & Wang, 2001; Patterson,
governments are naturally concerned about their Grimm, & Corsi, 2003; Taylor, 2004) identify
well-being and vitality. Various programs exist the forces contributing towards the surge in SCM
at national and local levels to support SMEs. interest. These forces include:
There are programs with the specific goal of
assisting SMEs to increase their use of e-com- Globalization
merce and/or supply chain initiatives; examples Technical innovation in ICTs
of these follow. External pressure from other supply chain
members, including higher expectations
Role of SCM in Business Today from customers
Outsourcing trends
Taylors (2004) supply chain management Pressures to reduce costs and increase profits
matrix, displayed in Figure 1, presents an illus-
tration of several components of SCM. Rows in The potential benefits of SCM and e-SCM are
this matrix correspond to three different levels of frequently stated (e.g., Beach, 2004; Davenport &
management (design, planning, operations), while Brooks, 2004; Serve et al., 2002; Taylor, 2004),
the columns list business processes concerned including:
with supply, production, and demand. This matrix
is for a single firm; inter-organizational networks Eliminate delays and errors associated with
are much more complex, as the matrix is repeated traditional paper-based systems
for each firm in the overall network (from tiers of Improve customer satisfaction (fewer stock-
upstream suppliers to the ultimate downstream outs, paperwork savings)
customer). Even at the firm level, SCM can be Reduce supply chain costs
very complex. Each of the component areas shown Improve record accuracy
in Figure 1 has a well-established tradition with Lower data entry costs (single point of entry)
standard procedures and best practice approaches. Reduce inventory holdings (shorter lead times)
SCM requires cooperation and coordination Increase inventory turns
between these componentssomething that is Increase quality
much more common today than a few decades ago.


E-Com Supply Chain and SMEs

Figure 1. Supply chain management matrix (Source:Taylor, 2004)

SUPPLY CHAIN MANAGEMENT MATRIX

Supply Production Demand

Product Design
Design

Supply Chain Design

Materials Distribution
Production
Planning

Planning Planning
Planning

Forecasting
Inventory Management
Operations

Purchasing Sales
Production
Control
Receiving Shipping

MIT has a Supply Chain 2020 project underway states, A supply chain that does not support the
(Lapide, 2005)a long-term research effort to organizations business strategy can never be
identify and analyze the factors that are critical excellent. And companies have to make adjust-
to the success of future supply chains. Initial re- ments to supply chains when strategy changes.
search has already identified four characteristics That SCM can be a powerful competitive weapon
of high-performing supply networks: is demonstrated by Amazon, Dell, Wal-Mart, and
other major firms.
1. They support, enhance, and are an integral SCM strategies and tactics continue to improve
part of a firms competitive business strategy as firms develop a better understanding of how
(alignment). to manage the entire chain. Whereas a few years
2. They leverage a distinctive supply chain op- ago a fast and cost-efficient chain provided con-
erating model to sustain competitiveness. siderable competitive advantage, this is changing
3. They execute well against a balanced set as more firms and chains master this. Lee (2004)
of operational performance objectives and points out that supply chains today need to be more
metrics (measurement and feedback). than simply fast and cost effective. They need to
4. They focus on a few business practices that be agile (responding quickly to sudden changes
reinforce one another to support the oper- in supply or demand), adaptable (evolving over
ating model and best achieve operational time as the environment and markets change), and
excellence. aligned (with all chain member interests).
Clearly SCM is of considerable interest to
Lapide points out that strategy and operations large firms. However, how well does SCM fit with
are closely linked and particularly important. He SMEs? Before considering this, we will first look


E-Com Supply Chain and SMEs

at the role of information and communication ment, warehousing and inventory management,
technologies in the supply chain. finished product distribution, and accounting/fi-
nance. SCM supports market demand, resource
icts, e-Business, and Supply chains and capacity constraints, and real-time schedul-
ing. Selling-Chain Management supports product
Information technology first took on a major role in customization, pricing and contract management,
manufacturing with the development of manufac- quote and proposal generation, commission man-
turing resource planning (MRP) systems several agement, and promotion management. Operating
decades ago. Progress continued with MRP-II, Resource Management supports office supplies
enterprise resource planning (ERP) systems (or procurement, service procurement, business
enterprise systemsESs), and advanced planning travel procurement, computer equipment/soft-
systems (APSs). With each advance there was ware/networking, and MRO (maintenance, repair
increasing automation of repetitive, time-consum- and overhaul) procurement. A key point made by
ing tasks and improved integration of data and Kalakota and Robinson (2000) is the integration
information used between functional areas of a of these various applications, both to streamline
department or organization, leading to first intra- operations and compete more effectively; this
and then inter-organizational data sharing. requires sharing of information between internal
ICTs continue to have a major impact on busi- and external applications, and internal and exter-
ness in general, and supply chains in particular. nal people. ICTs increasingly facilitate this. Many
Technology allows the reduction or elimination firms now have such an e-business system in place
of paperwork (with its attendant delays in trans- or are well along the road to full implementation.
mission/reception and possible data corruption This e-business model continues to evolve as
if information is re-entered). Both technologies more functionality is added to current applica-
and applications continue to evolve, with the tion clusters, new applications are developed, and
Internet now providing an efficient, effective more members of supply chain networks become
communication link for supply chain partners. integrated. Full integration among all members
The power of the Internet comes from its open of the supply chain is the ultimate goal, providing
standards and widespread availability, permitting an e-business network.
easy, universal, secure access to a wide audience Let us first consider the impact of ICT and e-
at very low cost. business on larger firms and their supply chains.
The term e-business has come into common After this, the research findings on SMEs will
use to cover the use of Internet-based ICTs within be considered. As well, government actions in
a company and between businesses, customers, support of SME e-business are reviewed.
and suppliers. The breadth of e-business is shown
in Figure 2. ict and ScM in general
Figure 2 shows various application clusters
(SCM being one) that are designed to support Figures 1 and 2 identify the major software appli-
and integrate various internal functions, and cations applied to SCM. The logistic, production,
interface appropriately with external customers and distribution components of a firms enterprise
and/or partners and their applications. CRM (ERP) system supports the components detailed in
(Customer Relationship Management) supports Figure 1. CRM systems are designed to integrate
customer-centric applications covering sales, all customer-contact activities, including sales,
service, and marketing. ERP supports forecasting service, and support. They have been available for
and planning, purchasing and material manage- several years now. Newer, are supplier relationship


E-Com Supply Chain and SMEs

Figure 2. E-business application architecture (Source: Kalakota & Robinson, 2000)

e-Business Application Architecture

Business Partners
Suppliers, Distributors, Resellers

Supply chain Management


Logistics

Production

Distribution

Finance / Accounting / Auditing


hRMS / oRMS / Purchasing

enteRPRiSe ReSoURce PLAnning


Administrative control

Management control

StAKehoLDeRS
eMPLoYeeS

enterprise
Knowledge-tone
Applications
Applications
integration

cUStoMeR ReLAtionShiP MAnAgeMent


Marketing

Customer
Service
Sales

Selling chain Management

Customers, Resellers
(Adapted from Kalakota & Robinson, 000 )

management (SRM) systems, which are a logi- chains. However, the pace is slow because link-
cal counterpart to CRM systems and directed to ing complex information systems and business
the upstream end of the supply network. Supply processes is difficult. The authors encourage a
chain visibility and event management software view of inter-enterprise integration that spans
is newer still and monitors supply chain activity, years and even decades.
allowing managers to focus attention on excep- While the Internet facilitates cooperation
tions rather than having to personally monitor the among members of a supply chain, it has also
entire chain on a continuing basis. introduced greater competition. Firms can more
Davenport and Brooks (2004) describe how easily communicate with geographically distant
enterprise systems in large firms have evolved to suppliers and search for better pricing. Online
support SCM and how the Internet has brought auctions, for example, have brought increasing
a revolution into supply chain thinking. The low pricing pressure on many suppliers. Garcia-Das-
cost, ease of use, and accessibility of the Internet tugue and Lambert (2003) classify Internet-en-
has facilitated growth in cross-organizational abled mechanisms as either market mechanisms


E-Com Supply Chain and SMEs

or coordination flows. Market mechanisms are front-end and back-end business processes, is
often used for one-time transactions and include a key enabler driving supply chain integration.
auctions, purchasing groups, electronic purchas- Their paper describes the impact of e-business
ing aids, and electronic agents. Coordination flows on four critical dimensions of supply chain inte-
are implemented for ongoing relationships, so a gration: information integration, synchronized
stable business relationship is required. planning, coordinated workflow, and new busi-
Patterson et al. (2004) investigated the diffu- ness models.
sion of supply chain intra- and inter-organizational
technologies and software applications. Their icts and ScM in SMes
study looked at 13 functional technologies (such
as bar coding, electronic commerce technology, While EDI was introduced some time ago by
and supply chain event management systems) and large firms, its cost made it difficult for even
two integrating technologies (ERP and supply medium-sized firms. Internet technology, with its
chain planning [SCP]). Data collection was dur- open system platform and lower cost, is proving
ing 2001/2002, and they found a sizeable portion to be of significant benefit for many SME SCM
of firms had adopted technologies to improve applications. Successful adoption and integration
functional activities but had not yet adopted in- of basic e-commerce, with its extensive use of
tegrating technologies. One would expect this to the Internet, can serve as a foundation to more
have changed in the intervening years. sophisticated solutions, such as e-SCM. Some of
Ranganathan, Dhaliwal, and Teo (2004) used a the SME research has focused on the broader area
structural equation modeling (SEM) approach to of e-business, including SCM applications (but not
empirically investigate Web technologies. They always explicitly stating so), while other research
considered three organizational environment has focused specifically on SCM applications.
factors (managerial IT knowledge, centralization, Raymond et al. (2005) point out that with the
and formalization of IT unit structure) as key advent of global competition and new organization
drivers of internal assimilation, and three external forms based on networks of cooperating firms, the
environment factors (supplier interdependence, successful assimilation of e-business is bound to
competitive intensity, and IT activity intensity) take added importance for many SMEs in terms
as the drivers of external diffusion. Their SEM of survival, growth, and competitiveness. Indeed,
approach highlighted many supply chain benefits lacking the ability to interface electronically with
from the deployment of Web technologies, includ- supply networks could shut SMEs out of future
ing improved customer service, better inventory business.
control, reduced operations costs, reduced cycle Levenburg (2005) is one of the few empiri-
time, better relationships with suppliers, and cal researchers to consider size (micro, small,
generation of competitive advantage. Their results and medium) within the SME segment and its
provide strong evidence that returns from SCM impact on IT adoption. She found increasing e-
Web applications will be positive, and firms can business technology use as firm size increased.
maximize these benefits by first assimilating More frequently, researchers compare SMEs as
such technologies with their internal processes a group against larger firms, finding larger firms
and then externally diffusing them into their (on average) lead in ICT adoption and use. How-
supply chains. ever, this masks the size/use relationship within
Lee and Whang (2001) show that e-business, the SME segment.
which they define as the use of Internet-based SCM portals have generally been successful,
computing and communications to execute both as those involved have significant incentives to

0
E-Com Supply Chain and SMEs

participate. Driven by large firms, and sometimes It is important to remember that as technol-
supported by government, SMEs are important ogy advances, what was once leading-edge ICT
participants. Chan and Chung (2002) report on becomes cheaper, easier to install and use, and
the example of Li and Fung Trading, the largest sometimes a necessity for business operation.
trading company in Hong Kong. With some 7,500 Moore (2002) illustrates this for e-commerce (Fig-
contract manufacturers in more than 26 countries, ure 3), showing that things which were once core
their average supplier has about 133 employees. (providing competitive advantage) have steadily
The challenge for Li and Fung is to create an moved into the context area (where outsourcing
optimized value chain for each order, and their becomes an option or even a necessity). The rise
portal facilitates this. of third-party logistic providers (3PLs) illustrates
Chou et al. (2005) propose a framework this in the supply chain. Indeed, the terms 4PL
for evaluating industry portals and apply it to and 5PL (for which there are currently various
Taiwan. In 2003 the Taiwan government Min- understandings) show the increasing role taken
istry of Economic Affairs, Small and Medium on by external specialists in supporting supply
Enterprises Administration (MOEASMEA) chains. Hence, possible choices for SMEs include
initiated an industry portal project. Initially 48 outsourcing some supply chain responsibilities,
industry portals were to be established, followed and following a lag approach to ICT, waiting
by 10 additional portals each new year. The main for the technology and infrastructure to mature
goals were to: (1) facilitate the network model and become mainstream.
for SMEs, (2) enhance associations functions to Many SME ICT and SCM empirical studies
construct SMEs industrial databases, (3) develop suffer from a significant time lag between data
the prototype SMEs electronic marketplace, and collection and journal publication (2-5 years).
(4) promote industry associations to become the Given the pace of technology, these current state
driving centers for SMEs e-business transforma- articles reflect the past, rather than the present.
tion. While this paper focuses on development Another option for understanding the current
and application of an assessment framework, it state is to look at industry association and trade
shows the importance of measuring portal perfor- publications. These are usually based on smaller
mance from a multiple stakeholder perspective, so samples, certainly do not have the rigor of aca-
feedback is obtained and acted upon. Such portals demic studies, and can misrepresent reality. Yet
could become a springboard for SMEs to form they are current, and hence potentially useful.
e-supply chains (as demonstrated in Germany by
Berlak & Weber, 2004).

Figure 3. E-com escalator (Source: Moore, 2002)


E-COM ESCALATOR

Web-based marketplaces

Real-time upselling
e
or
C

Web access to order status/history


t
ex

Credit card order-processing


t
on
C

Customer support via the Web

Web site for marketing

Website for corporate communications


(Adapted from Moore, 00)


E-Com Supply Chain and SMEs

government involvement oPPoRtUnitieS

With high-growth SMEs making sizeable contri- There are many SCM opportunities today, and
butions to employment and economic expansion, firms continue to learn how to improve their
governments have promoted e-business as a means supply chains. This section starts with consid-
to sustain and increase this development. Yet, eration of major trends and opportunities that
while governments are eager to support SMEs in are particularly of interest to larger firms in the
moving to e-commerce, SMEs themselves seem chain. Then opportunities of interest to SMEs
rather ambivalent about government support are considered.
(Beck et al, 2005). Important drivers mentioned
by SMEs include such things as cost reduction, ScM in general
improving coordination with suppliers and cus-
tomers, and market expansion (Beck et al., 2005). Some of the important topics in SCM today are
Government support is rated very low. outsourcing, agility, RFID (radio frequency iden-
Typical of government concern, based on the tification), and pipeline design.
slowness of SMEs to adopt Internet business Outsourcing continues to grow, as firms look
solutions while larger firms move forward, is a to focus on core functions and outsource others
warning from the Canadian E-Business Initia- (context), as illustrated in Figure 3. For those
tive (2004): a lukewarm SME response to IBS firms taking on the outsourced work, this activity
adoption may weaken any national strategy to is their core, and their goal is to be excellent at
bolster Canadas international competitiveness. it. Outsourcing is an option for all sizes of firms.
In Australia, the federal governments Department For example, Malykhina (2004) describes how
of Communication, Information Technology and third-party logistics providers can be used by
the Arts supports ITOL (Information Technology SMEs. Consultants have coined the phrases 4PL
Online), a program designed to accelerate national (a trademark of Accenture) to denote a higher level
adoption of e-business solutions, particularly by of SC outsourcing. Accenture defines a 4PL as
SMEs. an integrator that assembles the resources, ca-
An example of government support in the SCM pabilities, and technology of its own organization
area is the joint initiative of Industry Canada, and and other organizations to design, build and run
Supply Chain and Logistics Canada (an industry comprehensive supply chain solutions.
association). Their study (Industry Canada, 2003) In some markets, it is difficult or even impos-
recommended, among other things, development sible to remove or ignore sources of turbulence
of fundamental guidelines for efficient supply and volatility. Such is the case with fashion goods,
chain technology implementation for SMEs. or high-tech products, where demand can be dif-
These guidelines were to focus on: supply chain ficult to forecast and best-case/worst-case sales
inventory visibility, demand planning, Web- scenarios can differ by orders of magnitude. Agile
based SCM, supplier relationship management, supply chains are a partial solution (White, Dan-
available to promise, and supply chain event iel, & Mohdzain, 2005). Lee (2002), in an article
management. focusing on aligning SC strategies with product


E-Com Supply Chain and SMEs

supply and demand uncertainties, shows that agile approach should not be applied to pipeline design,
chains are one of four strategy types (the others implementation, and control. They see matching
being efficient chains, risk-hedging chains, and the pipeline to the product as a key issue in the
responsive chains). Each of these SC strategies development of global supply chains. In particu-
maps to a particular quadrant of supply uncertainty lar, many firms are now looking at the tradeoffs
(lowstable process, highevolving process) between a lean chain and an agile chain.
and demand uncertainty (lowfunctional prod-
ucts, highinnovative products). SMes in Particular
Agility was first applied to flexible manufac-
turing systems, which stand in contrast to the While the greatest benefits (by magnitude) accrue
traditional manufacturing approach of assem- to the large players in the supply chain, there
bly lines, rationalization, standardization, and is ample evidence of opportunities for smaller
elimination of uncertainty. An agile system is members. Being a chain member does not bring
able to sense and respond to changes in varying automatic benefits, at least in the short term. On
customer demand. the other hand, not being a chain member locks
White et al. (2005) consider the trade-offs a firm out of any potential benefits.
between high levels of integration between chain Wynarczyk and Watson (2005) studied the
partners information systems, and flexibility to performance of a group of UK subcontractors to
frequently and rapidly make changes to trading evaluate whether differences in how they managed
relationships (a prerequisite to the agile paradigm). their supply chain relationships were associated
While their case study is of a very large firm (IBM), with differences in sales and employment growth
there are implications for SMEs. IBMs Integrated rates. They concluded, even after allowing for
Supply Chain Division (ISCD) uses E2Open, a sector, size, age and owner-manager motivations
third-party electronic hub between organizations and supply chain opportunities and constraints,
in the electronics industry that wish to achieve partnership firms achieved significantly higher
integration between their information systems. rates of growth. However, the results of work
Busschop, Mitchell, and Proud (2005) point out by Arend and Wisner (2005), reported in the
that RFID is much more than simply a technology next section, show this growth may come at the
to replace bar codes. While RFID has been in the expense of profitability.
news because of Wal-Marts requirement that sup- Levy and Powell (2003) found that some SMEs
pliers implement this new technology (an example see strategic potential in e-business and will invest
of coercion by the major chain member), it will in it. They suggest that owners recognition of
bring new levels of visibility, security, account- the business value of the Internet, combined with
ability, flexibility, and operating performance owner attitude towards business growth, are key
to supply chains. Davenport and Brooks (2004) factors determining Internet adoption strategies.
identify two current impediments to full RFID One would expect these two factors to apply to
deploymentthe cost of tags and incompatible e-SCM, as it is a form of e-business.
technology from various suppliersand expect Harding (2000) looked at SME network re-
these to be resolved soon. search and suggested an incremental networking
As our understanding of supply chains im- model that could be used to improve supply chain
proves, and experience provides useful feedback, relationships. Berlak and Weber (2004) describe
attention is turning to pipeline structures and how to configure, establish, and operate temporary
matching these to particular markets. Christopher supply chains via competence networks. They
and Towill (2002) point out that a onesize-fits-all report on a German SME initiative, whereby a


E-Com Supply Chain and SMEs

Web portal facilitates interaction between custom- SCM was part of the overall business strategy
ers and three competency networks: engineering (and hence a CEO-level agenda item), and where
services, rapid prototyping, and manufacturing. companies were willing to reorganize the supply
Participating SMEs benefit from cooperating chain itself when appropriate, rather than simply
with others in the network, as their combined making adjustments within the existing supply
competencies provide competitive advantage. chain structure (sometimes called breaking the
Harrison and van Hoek (2005) describe a district mould).
portal initiative which assists more than 100 small Muckstadt, Murray, Rappold, and Collins
companies in the Macerata shoe district of Italy (2001) looked at the challenges of supply chain
with B2B relationships and order management. collaboration, considering both design and
Just as the ASP approach in ERP provided a operation. They identified five impediments to
viable option for medium-sized firms to move constructing a competitive chain: (1) demand
to enterprise systems, on-demand supply chain uncertainty, which is inadequately addressed;
solutions are now becoming available for some (2) long and varied response time among chain
SMEs (Lewis, 2005). This approach shares members, resulting in an inability to respond to
SCM infrastructure (hardware, software, ap- environmental changes; (3) poor information in-
plications) across many companies, with access frastructures within firms; (4) business processes,
via the Internet. Over time, applications aimed both intra- and inter-organizational, that do not
at a variety of SMEs should become available at support evolving supply chain conditions; and (5)
reasonable cost. decision support systems and operating policies
that cannot contend with supply chain uncertainty.
In response to these challenges, they provide a
chALLengeS set of guiding principles for the effective design
and execution of supply chain systems.
ScM in general As Ranganathan et al. (2004) point out, the
success of e-SCM is largely contingent upon the
Supply chains are complex, and managing them is extent to which the system is assimilated inter-
not easy. Furthermore, the highest payoff supply nally within each firm and diffused throughout
chain projects tend to be the largest and riskiest. the entire supply chain network, with every firm
The trade press frequently reports on supply in the chain pulling in the same direction. End-
chain projects that have gone awry. In the follow- to-end visibility, facilitated by full information
ing section, some of the challenges identified by sharing, can mitigate supply chain risk and build
researchers are reviewed. These include aligning confidence among partners (Christopher & Lee,
the interests of chain members, project difficulty, 2004). Narayanan and Raman (2004) point out
taking on high rather than low payoff projects, that misaligned incentives can result in excess
dealing with abnormal events, and forecasting. inventory, stock-outs, incorrect forecasts, inad-
A Booz Allen survey, conducted in late 2002, equate sales efforts, and poor customer service.
found that overwhelmingly senior executives at They suggest three reasons why incentive-related
large companies worldwide believed SCM had issues arise in supply chains: (1) when companies
failed to live up to expectations (Heckerman et cannot observe other firms actions, they find it
al., 2003). Technology alone was not the solution, hard to persuade those firms to do their best for
with 45% of responding firms stating IT solu- the network; (2) it is difficult to align interests
tions had failed to live up to expectations. The when one company has information or knowledge
greatest benefits were obtained by firms where that others do not; and (3) incentive schemes


E-Com Supply Chain and SMEs

are often badly designed. The authors provide a of breaking the mould comes up more frequently
three-stage process for aligning incentives and now. Firms can live with their current supply chain,
building trust. working to incrementally improve it. Or they can
Major supply chain projects require great redesign the chain, which can involve relocat-
effort. Heckmann, Shorten, and Engel (2003) ing factories, outsourcing logistical and other
refer to Herculean SCM efforts, which are responsibilities, or other fundamental changes.
commensurately rewardedthey report that Experience shows the latter group obtains better
companies making the biggest commitment to results, compared to the former (Heckmann et
improving their SCM system outperform those al., 2003). Yet far greater resistance, both within
where the effort is no more than incremental. Yet the organization and from across firms within
such projects bring considerable risk and are not the chain, can be expected when this approach
easy to complete on time, on budget, and with is taken.
the desired functionality. Research attention is also being turned to
Hendricks and Singhal (2005) studied the cost abnormal events that can disrupt supply chains.
of SCM disruptions (project completion problems, Natural disasters (hurricane Katrina hitting the
mismatches between supply and demand, and so U.S. gulf coast in 2005), labor unrest, terrorism,
forth) by looking at public announcements and health scares, (SARS, BSE, bird flu), and more
share prices. They found a major negative impact mundane risks can seriously disrupt or delay the
(average abnormal stock returns of almost -40%), flow of material, information, and cash through
with much of the underperformance observable in an organizations supply chain. At the time
the year preceding and following the announce- this chapter was written, Danish dairy giant,
ment (so the investment community recognized Arla Foods, faced a total loss of demand within
SCM problems before the firm acknowledged Saudi Arabia because of outrage over cartoons
these). Further, most firms did not recover very published in a Danish newspaper. Annual sales
quickly from the negative effects of the disrup- for Arla within Saudi Arabia were estimated at
tions. Just as firms found ERP projects difficult, 268 million euros, and this dropped to nothing
so are they finding SCM projects. virtually overnight as consumers boycotted their
Pant, Sethi, and Bhandari (2003) present an products and supermarkets, and removed all Arla
implementation framework for e-SCM projects. products from shelves. Chopra and Sodhi (2004)
They point out that it is often overlooked that recommend a what if? team exercise called
creation and implementation of integrated supply stress testing to identify potential weak links
chains requires tremendous resources, a great in a firms supply chain.
deal of management time and energy, large orga- Forecasting demand is proving to be difficult
nization-wide changes, huge commitment from within many supply networks, with greater atten-
suppliers/partners, and sophisticated technical tion now being focused on this. Where possible,
infrastructure. They also caution that a standard actual final customer demand is far better than a
software package solution cannot fit all types of forecast, providing there is sufficient time for the
supply chains. As with ERP systems, firms can chain to produce the necessary goods/services.
go with the plain vanilla version (which means Some supply chains are now providing such
changing existing internal systems to match the information to major members. In the future, it
capabilities of the software) or customize the soft- will be easier for all chain members to have ac-
ware to support existing in-house systems. Either cess to this important information. The type of
approach has advantages and disadvantages. market demand experienced (volatile vs. stable,
Within the supply chain literature, the concept


E-Com Supply Chain and SMEs

predictable vs. unpredictable) has considerable ness by traditional means, no firms could yet be
impact on the accuracy of forecasting models. classified as e-organizations. Yet they see this
Progressive firms monitor the accuracy of their happening soon.
forecasting models and improve them based on Barnes, Hinton, and Mieczkowska (2004)
experience or modify them when the environment point out that progress in many e-businesses is
changes. However, some types of demand are hampered because of an apparent mismatch be-
not easily forecastable, and chain agility holds tween business and operations strategy. This can
promise here. happen in both larger and smaller firms and within
functional areas (such as marketing, finance, or
SMes in Particular human resources). Based on case studies, they
suggest that:
Resources (financial, people, knowledge, etc.),
and specifically the lack of them, are a major Operations must have technologies that
challenge for most SMEs. This reflects itself in are both adequate and appropriate for the
many areas, including ICT and SCM projects. required task.
Larger firms can spread the cost of ICT projects Changes to business strategy are likely to
over a much greater revenue base. Also, larger imply changes to e-operations strategy.
firms have internal ICT development and sup- Following general industry practice in the
port services, which make it easier for them to use of internet-based icts in operations
develop and maintain such systems as ERP and may avoid the company being left behind
SCM. In addition to limited resources, there are technologically, but of itself is not likely to
other challenges faced by SMEs. lead to a competitive advantage.
Some researchers have suggested the Internet Strategic use of e-operations relies on devel-
levels the playing field for SME involvement in e- oping an operations strategy that supports
commerce. However, Larson, Carr, and Dhariwal business strategy.
(2005) did not find support for this. Their study of It is possible to use e-operations to drive
various sized suppliers found that larger suppliers business strategy.
made greater use of Internet-supported technolo-
gies than smaller ones. While the potential is there A major Canadian survey of barriers to SME
to leverage the power of the Internet, many SMEs adoption of Internet solutions for procurement
have neither the desire nor ability to do this. and supply chain interactions (Archer et al., 2003)
The balance of power among a supply chains identified three main categories: (1) perceptions,
members plays a significant role in designing and (2) economic perceptions, and (3) perceived need
operating a supply chain. SMEs, as more minor to adopt. Perceptions of positive benefits included
members of the chain, often have little input. So if reinforcing long-term relationships, reinforcing
they want to be members of the chain, they must good procurement practice, developing trust with
accept what is imposed on them. trading partners, improving customer service,
Azumah et al. (2005) examined the drivers and sharing useful information with supply chain
that led SMEs to adopt Internet and communica- partners. Negative perceptions included seeing
tions technologies and the strategy formulation it as more difficult to procure major needs and
processes used to reach e-organizational goals. sell major products online, not knowing what
They found that while most SMEs (almost 80% type of e-business solution is appropriate, and
in their sample) made considerable use of the employees preferring the old ways of doing
Internet and only a minority managed their busi- business. Economic perceptions included: (1)


E-Com Supply Chain and SMEs

long-term benefits of network technology and supply chains. It simply means they will work
process investment are high, (2) e-business can with others, often taking on a minor role, such as
reduce transaction costs, and (3) e-business does implementing a system that was designed by the
not tend to reduce the price of products purchased. chain master. Another option is to take the A/B/C
This study found that Canadian SMEs generally approach used in inventory controllooking for
perceived a lack of need to adopt e-business. Major opportunities where management of a few major
reasons given included: little or no competitive supply chain areas will bring large benefits and
pressure; customers not particularly interested in applying efforts there.
online sales and supply chain interactions; most Arend and Wisner (2005) surprisingly found
businesses in the industry apparently did not use that SCM was negatively associated with SME
digital networks for procurement and supply chain performance, after controlling for self-selection
interactions; suppliers do not appear to promote bias. They state, It seems that although better
online procurement and supply chain interactions; performing SMEs may engage in SCM, SCM is
the company may be seen as too small to benefit; not a good fit for SMEs on several performance
the nature of the industry does not lend itself to measures. Several possible explanations for
e-business solutions; and some companies are this are given by these authors. Since their data
only interested in doing business locally, so they was collected in the late 1990s, a similar study
do not see e-business as helpful. today might find different results. However, with
A similar finding was reported for the UK by many major IT projects, firms often experience
Beach (2004), who states, a temporary decline in productivity until bugs
are worked out, users become comfortable with
The [SME] manufacturing sector is failing to the system, and the foundation is laid for further
adopt e-commerce because firms either do not improvements. Perhaps this was experienced by
recognize its potential or perceive the risk of firms in their study. It is also possible that major
changing their business model to utilize the new chain members extracted more than their fair share
technology to be greater than the benefits that of profits, leaving less for SME members.
might be derived. A comparison between European and Ameri-
can manufacturing SMEs found both country-
He concludes: specific and sector-specific differences between
factors driving and impeding e-commerce (Beck
Organizations must therefore view the adoption et al., 2005). SMEs in four countries (United
of Internet technology as a strategic rather than a States, Germany, France, and Denmark) and three
tactical issue and develop strategies that provide sectors (manufacturing, retail/wholesale, and
the resources to facilitate the transformation of banking/insurance) were studied. Nine drivers
the organizations business model whilst retaining and eight impediments were analyzed. The au-
the necessary flexibility to accommodate changes thors concluded, Although the nature of e-com-
in technology and market developments as they merce applications is more or less the same, each
occur. country is following its own diffusion pattern or
path, based on national differences recognizable
As references in the preceding section show, in competition, existing and emerging IT infra-
e-SCM projects can be massive, even for large structure, business concentration, governmental
firms. SMEs seldom have the resources or expe- regulations or even national mentality.
rience to take the lead on such an undertaking. Another international comparison (Johnston &
Yet this does not preclude them from joining Wright, 2004) found that Asian and Latin American


E-Com Supply Chain and SMEs

SMEs lagged North American SMEs in moving proactive or reactive stance.


business processes to the Internet or other computer- Portal opportunities exist, as shown by their
mediated network. While firms in these countries success in Germany (Berlak & Weber, 2004) and
typically have a significant cost advantage, they Taiwan (Chou et al., 2005). However, these op-
will need to become SCM enabled if they want portunities are limited and require a coordinated
to participate in global supply chains. There are approach by industry associations, governments,
certainly exceptions among firms in some of these and/or SME groups.
areas, as evidenced in the papers by Chang and The literature now includes a few models of
Chung (2002) and Chou et al. (2005). the influences on e-business and SCM adoption.
The Internet is a technology and only one These can be used for research purposes or applied
component supporting SMEs with e-SCM initia- to specific SME projectsidentifying potential
tives. Implementation challenges are faced by all gaps and impediments.
firms initiating Web projects. In the cross-coun- Johnston and Wright (2004), based on their
try commerce area, many other challenges and international study, propose a preliminary model
barriers can exist: language differences, borders of the many influences on an SMEs capabil-
and tariffs, taxation issues, government regula- ity to adopt supply chain-oriented networked
tions, physical delivery, legal systems, payment processes (see Figure 4). Their paper explains
systems, and so forth. in much greater depth the various components.
One possible influence missing from this model
is technology.
concLUSion Other models have been proposed for e-busi-
ness adoption. Raymond et al. (2005) studied
With the tremendous variation among SMEs e-business assimilation as a function of three
in terms of size, capabilities, market reach, and contexts (environmental, organizational, and
profitability, the role and importance of e-SCM technological). In their model, e-business assimi-
will vary considerably among firms. Many lation leads to growth and internationalization.
SMEs might have little or no need for concern, Vidgen, Francis, Powell, and Woerndl (2004)
particularly among micro-businesses and those used Venkatramans transformation model as the
in the service industry. Others will be driven by basis of their Web service business transformation
larger firms in the supply chains they belong to, framework. In this framework, the three drivers
so their stance will be a reactive one. For them, of Web service-enabled information systems are
the decision is whether or not the costs outweigh business (operational efficiencies, collaborative
the benefits; in some circumstances they may be commerce), technology (broadband Internet ac-
forced to accept lower margins and profits. This cess, standards), and information systems (pack-
approach has the advantage that the network co- aged software, IS outsourcing, open source, agile
ordinating firm takes the lead in developing the systems development). Wang et al. (2004) used a
complete system, ensuring both technology and research model of IT adoption in the supply chain,
applications work satisfactorily. Given the com- based on external drivers (market and customer,
plexity of many SCM projects, only larger firms product lifecycle, and network position of supply
can take them on. It certainly behooves SMEs to chain) and internal drivers (perceived benefits,
understand their position within existing supply firm size, and system support readiness). In their
chains, what the opportunities are for greater model, the level of IT adoption ranges from low
involvement, and what the costs and benefits will (essential functions) to high (B2B integration/
be. From this, a decision can be made to take a collaborative commerce).


E-Com Supply Chain and SMEs

Figure 4. Model of SME capability to adopt networked processes (Source: Johnson & Wright, 2004)

MoDeL oF SMe cAPABiLitY to ADoPt


netWoRKeD PRoceSSeS

external environment Perceptions


Infrastructure Perceived benefits
External pressures Perceived risks
National culture

SMe
cAPABiLitY

internal environment Attitudes


Size Trust
Availability of resources Relationship vs task
Organizational culture orientation
Trained labour

(Adapted from Johnson & Wright, 00)

Finally, again drawing upon the reviewed information system integration and flex-
papers, the following areas are suggested for ibility, (2) coordinating mechanisms for
future research: supply chains that periodically reconfigure,
(3) increased outsourcing, and (4) the ap-
Development of an escalator for e-SCM plication service provider (ASP) model.
(see Figure 3) by tracking empirical research
results over a period of time; this will require
obtaining the field work date, which is often ReFeRenceS
not reported.
Johnston and Wright (2004) see four areas
Archer, N., Wang, S., & Kang, C. (2003). Barriers
concerning international issues: (1) trust,
to Canadian SME adoption of Internet solutions
(2) cultural differences, (3) communication
for procurement and supply chain interactions.
modes, and (4) SME structure.
Working Paper MeRC #5. McMaster E-Business
White et al. (2005), based on their study of
Research Centre, Canada. Retrieved February 1,
agile supply chains and inter-organizational
2006, from http://cebi.ca/Public/Team1/Docs/bar-
information system integration, suggest four
riers_to_canadian_sme_adoption.pdf
areas for future research: (1) redefining the
relationship between inter-organizational


E-Com Supply Chain and SMEs

Arend, R.J., & Wisner, J.D. (2005). Small busi- Supply Chain Management Viewpoint. Retrieved
ness and supply chain management: Is there a fit? February 6, 2006, from http://www.accenture.
Journal of Business Venturing, 20(3), 403-436. com/Global/Research_and_Insights/By_Subject/
Supply_Chain_Mgmt/ThePlanning.htm
Australian Bureau of Statistics. (2004).
8161.0.55.001Australian Bureau of Statistics Canadian E-Business Initiative. (2004). Net
Business Register, counts of businessessum- impact study Canada: Strategies for increasing
mary tables, Jun 2004. Retrieved March 30, 2006 SME engagement in the e-economy. Retrieved
from http://www.abs.gov.au/AUSSTATS/abs@. February 1, 2006, from http://www.cebi.ca/Pub-
nsf/productsbytitle/B34A6C8A585479F0CA25 lic/Team1/Docs/net_impact_english.pdf
709200750356?OpenDocument
Chan, M.F.S, & Chung, W.W.C. (2002). A frame-
Azumah, G., Koh, S.C.L., & Maguire, S. (2005). work to develop an enterprise information portal
E-organization and its future implication for for contract manufacturing. International Journal
SMEs. Production Planning & Control, 16(6), of Production Economics, 75, 113-126.
555-562.
Chopra, S., & Sodhi, M.S. (2004). Managing risk
Barnes, D., Hinton, M., & Mieczkowska, S. to avoid supply-chain breakdown. Sloan Manage-
(2004). The strategic management of operations ment Review, 46(1), 53-61.
in e-business. Production Planning & Control,
Chou, T., Hsu, L., Yeh, Y., & Ho, C. (2005). To-
15(5), 484-494.
wards a framework of the performance evaluation
Badenhorst-Weiss, J.A., Fourie, I., & Nel, J.D. of SMEs industry portals. Industrial Manage-
(2004). The application of supply chain man- ment & Data Systems, 105(4), 527-544.
agement best practices by small business sup-
Christopher, M., & Lee, H. (2004). Mitigating
pliers. Proceedings of the 2004 ICSB World
supply chain risk through improved confidence.
Conference. Retrieved February 1, 2006, from
International Journal of Physical Distribution
http://www.sbaer.uca.edu/research/icsb/2004/
and Logistics Management, 34(5), 388-396.
Papers%20pdf/080.pdf
Christopher, M., & Towill, D.R. (2002). Develop-
Beach, R. (2004). Adopting Internet technology in
ing market specific supply chain strategies. The
manufacturing: A strategic perspective. Produc-
International Journal of Logistics Management,
tion Planning & Control, 15(1), 80-89.
13(1), 1-14.
Beck, R., Wigand, R.T., & Konig, W. (2005). The
Davenport, T., & Brooks, J. (2004). Enterprise
diffusion and efficient use of electronic commerce
systems and the supply chain. Journal of Enter-
among small and medium-sized enterprises: An
prise Information Management, 17(1), 8-19.
international three-industry survey. Electronic
Markets, 15(1), 38-52. European Commission. (2006). Craft and small
businesses. Retrieved March 30, 2006, from http://
Berlak, J., & Weber, V. (2004). How to make e-
ec.europa.eu/enterprise/entrepreneurship/craft/
procurement viable for SME suppliers. Production
Planning & Control, 15(7), 671-677. Frohlich, M.T. (2002). E-integration in the supply
chain: Barriers and performance. Decision Sci-
Busschop, K., Mitchell, K., & Proud, S. (2005). The
ences, 33(4), 537-555.
role of RFID in supply chain planning. Accenture

0
E-Com Supply Chain and SMEs

Garcia-Dastugue, S.J., & Lambert, D.M. (2003). Johnston, D.A., & Wright, L. (2004). The e-busi-
Internet-enabled coordination in the supply chain. In- ness capability of small and medium sized firms in
dustrial Marketing Management, 32(3), 251-263. international supply chains. Information Systems
and E-Business Management, 2(2-3), 223-240.
Harding, S. (2000). The development of a model to
describe the influence of networking on an SMEs Kalakota, R., & Robinson, M. (2000). E-busi-
ability to implement new processes. Retrieved Feb- ness 2.0: Roadmap for success (2nd ed.). Boston:
ruary 6, 2006 from http://kmc.tbs.uce.ac.uk/kmc- Addison-Wesley.
publications/Cardiff%20paper%20adobe.pdf
Lapide, L. (2005). The four habits of highly ef-
Harrison, A., & van Hoek, R. (2005). Logistics fective supply chains. Supply Chain Strategy
management and strategy (2nd ed.). Harlow, Essex: Newsletter. Retrieved February 1, 2006, from
Pearson Education. http://ctl.mit.edu/public/four_habits_lapide.pdf
Heckmann, P., Shorten, D., & Engel, H. (2003). Larson, P.D., Carr, P., & Dhariwal, K.S. (2005).
Supply chain management at 21: The hard road SCM involving small versus large suppliers: Re-
to adulthood. Retrieved February 6, 2006, from lational exchange and electronic communication
http://extfile.bah.com/livelink/livelink/133356/ media. Journal of Supply Chain Management,
?func=doc.Fetch&nodeid=133356 41(1), 18-28.
Hendricks, K.B., & Singhal, V.R. (2005). An Lee, H.L. (2004). The triple-a supply chain. Har-
empirical analysis of the effect of supply chain vard Business Review, 82(10), 102-113.
disruptions on long-run stock price performance
Lee, H.L. (2002). Aligning supply chain strategies
and equity risk of the firm. Production and Op-
with product uncertainties. California Manage-
erations Management, 14(1), 35-52.
ment Review, 44(3), 105-119.
Hong, I.B. (2002). A new framework for inter-
Lee, H.L., & Whang, S. (2001). E-business and sup-
organizational systems based on the linkage of
ply chain integration. In Stanford Global Supply
participants roles. Information & Management,
Chain Management Forum, W2-2001. Retrieved
25(3), 417-446.
February 1, 2006, from http://www.stanford.
Industry Canada. (2005). Key small business edu/group/scforum/Welcome/White%20Papers/
statisticsJanuary 2006. Retrieved March 30, EB_SCI.pdf
2006, from http://strategis.ic.gc.ca/epic/internet/
Legris, P., John, I., & Pierre, C. (2003). Why do
insbrp-rppe.nsf/en/rd01832e.html
people use information technology? A critical
Industry Canada. (2003). Lean logistics technol- review of the technology acceptance model. In-
ogy roadmap final report. Retrieved February 1, formation and Management, 40(3), 191-204.
2006, from http://strategis.ic.gc.ca/epic/internet/
Levenburg, N.M. (2005). Does size matter? Small
intrm-crt.nsf/en/rm00094e.html
firms use of e-business tools in the supply chain.
Jeffcoate, J., Chappell, C., & Feindt, S. (2004). Electronic Markets, 15(2), 94-105.
Assessing the impact of e-commerce on SMEs
Levy, M., & Powell, P. (2003). Exploring SME
in value chains: A qualitative approach. In N.A.Y.
Internet adoption: Towards a contingent model.
Al-Qirim (Ed.), Electronic commerce in small to
Electronic Markets, 13(2), 173-181.
medium-sized enterprises: Frameworks, issues
and implications (pp. 180-198). Hershey, PA: Idea Lewis, E. (2005). Now is SMEs time to compete.
Group Publishing. Industrial Distribution, 94(9), 28.


E-Com Supply Chain and SMEs

Lim, D., & Palvia, P.C. (2001). EDI in strategic commerce in small to medium-sized enterprises:
supply chain: Impact on customer service. Inter- Frameworks, issues and implications (pp. 69-85).
national Journal of Information Management, Hershey, PA: Idea Group Publishing.
21(3), 193-211.
Raymond, L., Bergeron, F., & Blili, S. (2005).
Malykhina, E. (2004, October 18). Small business The assimilation of e-business in manufacturing
big supply chains. Information Week, 90. SMEs: Determinants and effects on growth and
internationalization. Electronic Markets, 15(2),
McLaren, T., Head, M., & Yuan, Y. (2002). Supply
106-118.
chain collaboration alternatives: Understanding
the expected costs and benefits. Internet Research, Sahin, F., & Robinson, E.P. (2002). Flow coordi-
12(4), 348-364. nation and information sharing in supply chains:
Review, implications, and directions for future
Moore, G. (2002). Living on the fault line, revised
research. Decision Sciences, 33(4), 505-536.
edition: Managing for shareholder value in any
economy. New York: HarperCollins. Serve, M., & Yen, D.C. (2002). B2B-enhancd
supply chain process: Towards building virtual
Muckstadt, J.A., Murray, D.H., Rappold, J.A., &
enterprises. Business Process Management Jour-
Collins, D.E. (2001). Guidelines for collaborative
nal, 8(3), 245-253.
supply chain system design and operation. Infor-
mation Systems Frontiers, 3(4), 427-453. Sheffi, Y., & Michelman, P. (2005). The next killer
app? Its your supply chain. Supply Chain Strategy,
Narayanan, V.G., & Raman, A. (2004). Aligning
1(2), 3.
incentives in supply chains. Harvard Business
Review, 82(11), 94-103. Small Business Service. (2006). SME statistics
2004. Retrieved March 30, 2006, from http://www.
Pant, S., Sethi, R., & Bhandari, M. (2003). Making
sbs.gov.uk/SBS_Gov_files/researchandstats/
sense of the e-supply chain landscape: An imple-
SMEStats2004.pdf
mentation framework. International Journal of
Information Management, 23(3), 201-221. Subramani, M. (2004). How do suppliers benefit
from information technology use in supply chain
Patterson, K.A., Grimm, C.M., & Corsi, T.M.
relationships? MIS Quarterly, 28(1), 45-73.
(2004). Diffusion of supply chain technologies.
Transportation Journal, 43(3), 5-23. Taylor, D.A. (2004). Supply chains: A managers
guide. Boston: Addison-Wesley.
Ranganathan, C., Dhaliwal, J.S., & Teo, T.S.H.
(2004). Assimilation and diffusion of Web tech- U.S. Small Business Administration. (2006).
nologies in supply-chain management: An exami- Small business statistics. Retrieved March 30,
nation of key drivers and performance impacts. 2006, from http://www.sba.gov/aboutsba/sbastats.
International Journal of Electronic Commerce, html
9(1), 127-161.
Vakharia, A.J. (2002). E-business and supply
Ratanasingam, P. (2004). Perceived barriers and chain management. Decision Sciences, 33(4),
risks of e-commerce supply chain management 495-504.
network among SMEs in Australia and New
Zealand. In N.A.Y. Al-Qirim (Ed.), Electronic


E-Com Supply Chain and SMEs

Vidgen, R., Francis, D., Powell, P., & Woerndl, White, A., Daniel, E.M., & Mohdzain, M. (2005).
M. (2004). Web service business transformation: The role of emergent information technologies
Collaborative commerce opportunities in SMEs. and systems in enabling supply chain agility.
Journal of Enterprise Information Management, International Journal of Information Manage-
17(5), 372-381. ment, 25(5), 396-410.
Wang, Y.C.W., Chang, C., & Heng, M.S. (2004). Wynarczyk, P., & Watson, R. (2005). Firm growth
The levels of information technology adoption, and supply chain partnerships: An empirical
business network, and a strategic position model analysis of UK SME subcontractors. Small Busi-
for evaluating supply chain integration. Journal of ness Economics, 24(1), 39-51.
Electronic Commerce Research, 5(2), 85-98.




Chapter IV
Building and Managing
Modern E-Services
John Hamilton
James Cook University, Australia

ABStRAct

This chapter addresses the development cycle of recent services models. It considers that all products
involve services and consequently maybe be considered as service systems. First, the issue of services
is described; next, the enhancement of services via value creation is described, along with the progres-
sion from supply and demand chains, to value chains, to service value chains, and finally to service value
networks. This progression pathway has developed over time, and has enabled service and e-service
businesses to deliver and further develop competitive business solutions. The combinations of integrated,
highly competitive, e-supply chains delivering the final services suite to the frontline business seller
moves the e-supply chain model to a more advanced level.Today, the recent concept of utilizing service
value networks offers a key to future competitive solutions. Service value networks house fully integrated
e-demand and e-supply chains working in harmony to the deliver both services and e-services. They
are also highly agile and offer customer-induced flexible business solutions to customer requests. This
chapter highlights the progression to service value networks. In addition it also offers the manager a
balanced scorecard structural mechanism via which management controls over e-services and service
value networks may be developed and maintained.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Building and Managing Modern E-Services

DeFinition oF SeRViceS Russell (1990) and Quinn, Baruch, and Paquette


(1987) broadened existing services definitions to
Definitions of what constitutes a service have include all economic activities where output was
varied across the service sector. Clark (1940) not a physical product or construction, was usually
divided all economies into three sectors: pri- consumed when produced, and was delivered as
mary (agricultural), secondary (manufacturing), an intangible value-add (like travel comfort) to
and tertiary (services). The service sector used the customer. Thus the service definition moved
three partsdomestic related services (food and again. Zeithaml et al. (1988) believed services
lodging), business services, and others (includ- were intangibleslike deeds, processes, and
ing recreation, health care, and education)to performancesbut could also be tangible (e.g.,
focus on involvement and improvement of the health care). Czinkota, Ronkainen, and Moffett
customer relationship. The services industry (2005) split services into tangible areas involving
provides services, not goods (Hughes, Mitchell, people (fitness centers) or possession processing
& Ramson, 1993). (like freight transportation), and intangible areas
In 1870 the service sector employed slightly involving mental stimulus like (education and
more than 20% of the U.S. workforce, while by religion) and information processing (like bank-
2002 it employed in approximately of 82% of the ing and data processing).
U.S. workforce, and 81% of the private sector GDP Often services are integrally enmeshed with
(U.S. Bureau of Labor Statistics, 2002/2004). manufactured goods, or to the delivery (or en-
Services management is a trans-functional abling) of goods. Thus the distinction between
research area (Kamarkar, 2002). It covers areas goods and services is imprecise, and no clear
including service quality (Chase, Jacobs, & Aq- boundary between manufacturing and service
uilano, 1996), services encounters (Cook, Goh, firms exists (Berry & Parasuraman, 1991). Lev-
& Chung, 1999), and service execution (Nie & itt (1972) suggests: There is no such thing as a
Kellog, 1999). Services operations management service industry. There are only industries whose
and services marketing provide still other per- service components are greater or less than those
spectives to services. of other industries Everybody is in service.
Definitions of service have ranged from the Czinkota et al. (2005) also partially support this
narrow to the broad. In 1960 the Committee on approach. Thus it may be suggested that all manu-
Definitions of the American Marketing Association facturing is indeed a service, and that services
defined services as: Activities, benefits, or satisfac- may be considered from a range of viewpoints.
tions which are offered for sale, or are provided, in One approach to draw such diversities of opinion
connection with the sale of goods. (p.21) together is provided by Rust and Metters (1996).
Examples of a service include: accommoda- They use a topologies approach to group some
tion, banking, education, entertainment, finance, services complexities into models. Their topolo-
medical areas, real estate servicing, transporta- gies approach, built upon other recent service
tion, as well as the individual services provided industry models, may assist in the identification
by a barber shop, a piano tuner, a beautician, and of key knowledge and research gaps.
assistance areas like repair, maintenance, and As the service industry has continued to move
after-sales services, through to support services towards globalization (Kathawala & Abdou, 2003)
institutions like credit rating bureaus. and incorporate more electronically based delivery
Judd (1964) and Rathmell (1974) believed in systems, it has become possible to deliver a value
the service sector of the economy and emphasized chain, e-service operation. France, Da Rold, and
the true nature of services. Murdick, Render, and Young (2002) recognized the importance of the


Building and Managing Modern E-Services

Figure 1. Mathematical models of service (Source: Rust & Metters, 1996)

Customer Behaviour Models


Dynamic Models of Retention
Stochastic Models of Behaviour

External
Customer
Models

Service Quality Impact Models


Service Aggregate Models
models
Disaggregate Models

Internal
Service
Provider Normative Service Models
Models Marketing Models
Complaint Management
Customer Satisfaction
Quality-productivity trade-off
Operations Models

service value chain, stating that to satisfy client SeRVice MoDeLS


demands holistic solutions will require focused
providers cooperating along services value chains. Figure 1 presents Rust and Metters (1996) view of
Thus e-service value chains may offer a pathway services. They grouped service models as customer
to delivering enhanced customer value. models (external) or service provider models (in-
ternal). Each model was then segregated, as shown
in Figure 1, into two of the three models:
SeRVice tYPoLogieS
Customer behavior models, incorporat-
From an operations and marketing perspective, ing dynamic models of customer retention
topology schemes for services have generally (like loyalty), stochastic models of customer
lacked empirically tested works, but they offer behavior (like satisfaction), and customer be-
a useful mechanism to draw together the con- havior models (like churn rate or a customer
stituent components applicable to the delivery of lost through a single service encounter).
services. Empirical works (Verma & Boyer, 2000; Service Quality impact models, incorporat-
Akkermans & Vos, 2003; Chen & Paulraj, 2004) ing aggregate models (like customer satisfac-
offer some key exceptions, but overall empirical tion effects) and disaggregated models (like
services related research is in its infancy. A topolo- financial impacts of a service component).
gies approach, based on recent service industry Normative service models, housing orga-
models, identifies key knowledge gaps and estab- nizationally focused marketing models (like
lishes possible empirical research areas. incentive schemes and trade-offs between
satisfaction and productivity) and operations
models (like queuing).


Building and Managing Modern E-Services

Figure 2. Integrated schematic representation of services (Source: Cook et al., 1999)

Organizational Marketing Orientated


Ownership (7) Tangibility (2)
Differentiation (10)
Object of service(5)
People
For Profit Goods
Type of Customer (11)
Product Individual
Institutional
Commitment (8) Interaction and
integration
Services Private
Not-for-Profit
Customization
(9) Quality
Operations Orientated
Process Customer Contact (1)
Capital Intensity (4)
People-based
Public
Equipment based
Customer involvement (3)
Production Process (12)
Employee Directions (6)

Macro View Micro View

Socio Economic Environment

Figure 3. The service strategy triad (Source: Roth & Menor, 2003)

Target Market

Who are the right


Customers?

Service
Encounters
What happens
when service and
customer meet and
interact?

Service Concept Service Delivery


System Design
Choices
What is the product How will services
bundle offered? be delivered?


Building and Managing Modern E-Services

Figure 4. The service delivery systems architecture (Source: Roth & Menor, 2003)

Strategic Design Choices


Structural
Facilities and Layout
Technology and Equipment Renewal
Aggregate Capacity
Planning
Service Product-Process
Interfaces

Infrastructural Customer
People Realized Perceived
Execution
Policies Service Value of
Practices Delivery the Total
Processes System Service
Performance Systems
Concept

Integration
Operations Organizations &
Coordination
Service Supply Chains Assessment
Integration technologies of Gaps
Learning and Adaptive
Mechanisms

In 1999, Cook et al. developed the integrated performance standards, and to allow the business
schematic representation of services matrix. Figure to competitively align its chosen degree of cus-
2 displays this integrated services schematic. tomer targeting with its offered service products
Cook et al. (1999) recognized that services and delivery systems.
could be split into marketing (product) or opera- Roth and Menor (2003) operationally defined
tions (process) orientations. They believed that their service strategy triad into five elements:
in delivering a final customized solution, there
remained a need to integrate and interact with 1. Supporting facilities (physical and struc-
both orientations. They suggested research in the tural resources)
interaction and integration area may articulate 2. Facilitating goods (materials and supplies
strategies and tactics for improving services. that are consumed)
Roth and Menor (2003) delivered a further 3. Facilitating information (supporting the
addition to the services topologies. Their service explicit services)
strategy triad (displayed in Figure 3) separated 4. Explicit services (customer experiential
the what, the how, and the who of service en- and sensual benefits)
counters. It offered a new perspective to advance 5. Implicit services (psychological benefits)
an understanding of services operations manage-
ment. The who defines the right customers, They realized the total service concept by the
and not just a customer segment! These targeted customer may differ from the service offered by
customers could be defined by techniques like the service provider. To overcome this, a feedback
Forresters technographics, psychographics, loop (execution, assessment of gaps, renewal)
and psychographic profiling groups of custom- was proposed.
ers. The interpretation of such target markets The service delivery systems architecture
provided a means to enhance both service and model of Roth and Menor (2003), displayed in


Building and Managing Modern E-Services

Figure 4, allowed a framework to investigate three Results could then be compiled, and combined, to
interrelated and dynamic components of service gain further insights into services. Roth and Menor
delivery systems: (2003) proposed that business-customer service
encounters may be considered as combinations of
Strategic service design (portrayed as three functional areasthe customer, the service
structural, infrastructural, and integration, product, and the service delivery system. Hence,
and based on choices between time-phased enhanced business-customer service encounters
content portfolios of major supply). could possibly be induced when one or more of
Service delivery execution system (exem- these functional areas improved. In particular, an
plified by programs, policies, and behavioral improved business-customer service encounter
aspects delivering complimentary areas of may arise where the customer perceived improved
customer focus), possibly using balanced customer value with the services provided or in
scorecard approaches. the services package being delivered.
Customer perceived value of the total To deliver quality business-customer service
service concept (intangibles and other ef- encounters, the businesss supply chain became an
fectiveness aspects of the service). integral delivery tool for the final upstream service
provider. In addition this supply chain needed to
These downstream features, delivered up- be capable of delivering customer expectations.
stream through the external integration of the This required sound supply chain integration and
service supply chain, combined with the linked management, the integration of the above func-
internal integration of the operational functional tional areas, and quality communications channels
areas and the adaptive mechanisms available to throughout the supply chain network.
enhance the intellectual capabilities, may provide
new avenues to perceived customer value.
SUPPLY chAin MAnAgeMent

SeRVice MoDeLS AnALYSiS Management has sought to deliver improved


business-customer service encounters using a
The above models have moved the complex variety of approaches. The supply chain, and more
concept of services delivery beyond that of specifically service supply chain management,
the immediate services business. The models was and is a hot topic in business (Chase et
indicate that the delivery of services requires al., 2005). Supply chain management is defined
the business to adopt both an internal and an as the integration of business processes from
external perspective. Rust and Metters (2003) end-user through to original suppliers that pro-
showed services to be complex in nature. They vide products, services and information and add
showed that a variety of approaches had been value for customers (The International Center
adopted, leading to the development of three for Competitive Excellence, 1994). It is a tech-
key areascustomer behavior models, service nique for linking a manufacturers operations
quality impact models, and normative service with those of it strategic suppliers, and its key
models. Cook et al. (1999) showed services may intermediaries and customers. It seeks to inte-
be considered from a marketing or an operations grate the relationships, and operations, of both
focus. They suggested it may be possible to hold immediate, first-tier suppliers, and those several
the service product constant and investigate the tiers back in the supply chain and the goal of
effects of the service process (and vice-versa). supply chain management is to improve timing


Building and Managing Modern E-Services

and costs in manufacturing through strong vendor rapidly to the changing, diverse, and unpredict-
relationships (An & Fromm, 2005). able demands of the customer. Thus demand
Fisher (1977) developed a management frame- uncertainty and supply uncertainty remained a
work for product demand, and a supply chain framework for understanding both supply chain
that could best satisfy this demand. He identi- and e-supply chain strategies.
fied specific functional products like lifecycle, The agile supply chain model has typically
percentage contribution margin, percentage targeted the high-risk, customer-driven solutions,
product variations, average production forecast while minimizing the downstream risks of sup-
error, and make-to-order lead time. Products were ply disruptions. Hence, the strategic scope of the
categorized as primarily functional or primarily businesss supply chain now necessarily included
innovative. Each category required a different kind the internal integration within organizations, and
of supply chain, and mismatches between product also captured the external expansion throughout
type and supply chain could be identified. various supply chain links.
Lee (2002) further developed Fishers frame- From around 1994, when standard Internet
work, and suggested that uncertainties revolving browsers became available, the Internet has be-
around the supply side were important drivers come a vital strategic management tool. Using
for correct supply chain strategies. He argued the Internet, appropriately interconnected busi-
that functional products were more applicable to nesses, along with their Internet-connected supply
a more mature, and stable, supply process. Lee chain partners, have the capacity to freely share
defined the stable supply process, where manufac- information. This has allowed many competitive
turing process and technology were mature and improvements to develop. More accurate supply
stable, and the evolving supply process, where and component planning, improved supplier and
manufacturing and technology were in early business performance, less stock holdings, greater
stages of development and were rapidly chang- efficiencies, and faster response rates have all been
ing. From Lees perspective the market challenge recognized (Reid & Sanders, 2005).
for business was to operate a supply chain as a
responsive or an agile model.
Responsive supply chains, like fashion apparel the inteRnet
or popular music, operated in low-uncertainty,
stable markets and are highly innovative. They The Internet (encapsulating intranets [internal
targeted responsive, flexible, build-to-customer- networks] and extranets [external networks]),
order strategies, and followed the changing needs combined with sophisticated interconnected com-
of the customer. These responsive supply chains, puter networks, has delivered necessary and key
where demand and supply communications chan- enablers, to deliver responsive and agile supply
nels intertwine, deliver business-determined, chain strategies. This inter-business connectivity
information-based, customer-targeted outcomes allows for near instantaneous, enhanced informa-
that may be termed e-supply chains. tion flows (Turban, Rainer, & Potter, 2003). The
A business engaging an agile supply chain Internet has driven new supply chain solutions in
structurelike a telecom operating in an evolv- information storage and transmission, e-business,
ing, highly uncertain marketoften remains Web-based customer relationship management (e-
highly innovative. It employs highly responsive, CRM), and supply chain management (Lawrence,
agile supply chains, and remains flexible in its Newton, Corbitt, Braithwaite, & Parker, 2002).
service offerings. It attempts to engage specific, Dell (www.dell.com) and others have delivered
customer needs-focused strategies, and responds customized e-purchasing across their Web sites,

0
Building and Managing Modern E-Services

but the absolute one-on-one customerized and of customer loyalty (McAlexander, Kim, &
solution is still not a realistic solution for many Roberts, 2003).
businesses. The pressure to dynamically adjust, The demand chain has been a near mirror
and adapt, the businesses supply chain strategy image of the supply chain. It has been driven
to the demands of the customer remains great by a business competitive imperative aiming to
(Frohlich & Westbrook, 2002). constantly improve its supply chain efficiencies.
The demand chain must balance a globally diverse
mix of new customers (each with different needs
DeMAnD chAin MAnAgeMent and expectations), and it must also offer a degree
of uniqueness to the business (Barlow-Hills &
From the late 1990s onwards, there has been a Sarin, 2003).
distinct move from supply to demand chain man- Beech (1998) argued for an integration of the
agement (Heikkila, 2002). This change in focus supply and demand chains:
is driven by the desire to become both efficient
and effective (Hanson, 2000), thereby delivering This challenge could only be met by developing
customer satisfaction (Kuglin, 1998), along with a holistic strategic framework that leveraged the
the right mix(es) of services (Bowen & Shoe- generation and understanding of demand effec-
maker, 2003). Demand chain management aims tiveness with supply efficiency. First, organiza-
to serve customers individually with customized tions needed to develop a multi-enterprise view
bundles of goods and services, thereby delivering to their supply chains. They needed to be capable
high levels of customer satisfaction (Preis, 2003) of working cooperatively with other organizations

Figure 5. Demand and supply chain processes (Source: Beech, 1998)

Demand
Chain
Value Added Category
Distribution
Process
Selling Selection and
Management

Store
Marketing
Trade
Marketing Pre-Sales
Services

Suppliers Manufacturers Distributors Resellers End-Users Services

Post-
Sale
Procurement Store Services
Operations

Production Buying
Supply Warehousing and
Distribution
Chain
Process


Building and Managing Modern E-Services

in the chain, rather than seeking to outdo them. across the business supply chains (Stock, Greis,
Secondly, they needed to recognize the three key & Kasarda, 2000). They included transaction
distinct supply and demand processes that must be strategies, logistics, facilities, people, equipment,
integrated in order to gain the greatest value. production, services, and intangibles like internal
business processes, learning and growth, and the
He suggested these three key elements were: customer (Williamson, 1996).
From a technical viewpoint, demand chain
The core processes of the supply and demand management remained a set of applications, spe-
chains, as viewed from a broad cross-enter- cifically designed, to electronically automate and
prise vantage point, rather than as discrete optimize the business processes an enterprise
functions performed between its networks of customers
The integrating processes that created and selling partners. Working independently, or
the links between the supply and demand in conjunction with one another, demand chain
chains management applications were designed for easy
The supporting infrastructure that made customer use. These demand chain management
such integration possible applications enabled business-customer encoun-
ters, and did so at reduced servicing costs (Frohlich
Beechs model, displayed in Figure 5, portrayed & Westbrook, 2002).
the demand chain as a sequence of backward- A raft of business-specific, integrated demand
reaching processes, initiated by the end-customer, chain management frameworks emerged (Chil-
and enabling the business to anticipate customer derhouse, Aiken, & Towill, 2002). Demand chain
demand characteristics. The supply chain struc- management consultants like Comergent (www.
ture, responsible for moving products and services comergent.com) and IBM (www.ibm.com) focused
upstream to the customer, remained inexorably on the selling and ordering processes (Sarner &
linked to the demand chain. Desisto, 2004). Figure 6 highlights Comergents
However, across the virtual divide of the Inter- consultancy focus areas, which focused on
net, fundamental questions remained. Determin- external demand chain selling and ordering
ing what the customer really wanted, and what processes, as displayed in Figure 7.
services product variations the business could Comergent simplified the external sales
modify and/or deliver, remained as challenges. processes into five key areas:
The demand chain was really about the informed
customer, customers dictating what they wanted, Analytics and metrics, where the selling
where and why (Selen & Soliman, 2002). process data was collected for reporting,
Demand chain management remained stra- analysis, and business optimization
tegically embedded across the whole value Product information management, where
chain and the businesss logistics infrastructure the metrics to create, mange, and display
(Carothers & Adams, 1991; Shapiro, Singhal, & sales-related data were housed, thereby
Wagner, 1993). It moved the underdeveloped allowing the management analysis of cus-
supply chain (New, 1996) into a complex Web tomers, channel partners, sales/services, and
of customer-driven supply chain systems (Choi, relationships
Dooley, & Rangtusanatham, 2001). As the supply Pricing, configuration, and quoting,
chain strategy moved to customer driven, new where dynamic recommendations to cus-
demand chain capabilities emerged (Andersson tomers, partners, and sales and/or services
& Jockel, 2002), and these became coordinated representatives were delivered in real-time


Building and Managing Modern E-Services

Figure 6. Demand chain selling and ordering model (Source: Comergent, 2003)

Sourcing & Building Control & Reporting Selling & Ordering

Suppliers Enterprise Customers


Resource
Planning
(ERP)
Financials
Human resources
Supply Chain Demand Chain
Manufacturing
Management Management
Product info
Advanced
management
planning
Pricing,
Inventory
configuration &
management
Customer queuing
Logistics
Relationship Distributed order
Management management
(CRM)
Sales
compensation
Call centre Selling
Logistics
Providers Services & Field Partners
services

External Processes Internal Processes External Processes

Figure 7. The external sales process (Source: Comergent, 2003)

Demand Chain Management

Analytics & Metrics

Product Pricing Distributed


Information Configuration and Order
Management Management Management

Commercial Portal

Direct Sales Customers Partners


Building and Managing Modern E-Services

concerning the most appropriate products, and use, a product or service (such as price;
solutions, prices and options, and using sacrifices)
personalized messages and/or promotions
Distributed order management, where Value may also be loosely defined in terms of
customers were offered purchase choices business or customer perspective equations:
across a single interface, and where their
orders for processing and fulfillment were Business value = (Benefits of each deliv-
seamlessly distributed across the back-end ered value chain activity minus its cost) +
systems or selling partners systems. (Benefits of each service interface between
Commerce portal, where a single customer value chain activity minus its cost).
interface was offered for all applications. Customer value = (Benefits of each customer
service interface interaction) + (Benefits
Comergent then applied specific, demand chain of each added value business offering) +
management applications to some, or all, of the (Benefit perceived for the cost involved).
processes in these five key areas.
IBMs i2 demand chain management delivered In 1985 Porter promoted the notion of the value
similar collaborative solutions, aimed at maximiz- chain as a key activity by which a business could
ing profitability. It managed and shaped demand- manage and deliver added value to the customer.
based supply positions and delivered customers the Both internal and external value chains exist. The
product, price, and delivery time as coordinated internal value chain worked within the business
services, parts, people, budgets, and facilities, itself, while the external value chain involved
and targets that maximized customer loyalty activities performed by, or linked through, busi-
at minimal service delivery costs. IBM offered ness partners. The value chain approach sought
specialized business intelligence systems like: a to deliver improved efficiencies and/or greater
sales configurator, a sales pricer, demand fulfill- business effectiveness. It was possible to add
ment, demand fulfillment availability, markdown value to each customer by reducing cost (and/or
optimization, distributed order management, and adding value), either within each element of the
service parts planning. value chain (for example, more efficient supplier
arrangements) or at the interface between value
chain components (for example, the business
the VALUe chAin salescustomer interface).
Other early value creation measures arose
Definitions of value have varied (Zeithaml, 1988), from the supply chain (Houlihan, 1987) and the
but common themes have indicated customer customer chain (Schonberger, 1990). These in-
value as: volved a series of integrated, dependent processes,
whereby chosen specifications were transformed
Linked to the use of a product or service, to finished deliverables. Emphasis was placed on
thereby removing it from personal values the integration of activities, while also considering
Perceived by the customers, rather than increasing customer value. Rayport and Sviokla
objectively determined by the seller (1996) proposed that the Internet enabled value
Often traded between what the customer creation by gathering, organizing, selecting,
wants (including quality, benefits, worth), synthesizing, and distributing information. They
and what the customer gave up to acquire,


Building and Managing Modern E-Services

defined two value chains: the virtual value chain fered yet another strategic solution for the online
and the physical value chain. The virtual value business (Docherty, 2001).
chain was information technology based, and in- Chaffey, Mayer, Johnston, and Ellis-Chadwick
volved the delivering of e-business-to-e-business, (2004) and Deise, Nowikow, King, and Wright
and e-business-to-consumer solutions. In some (2000) suggested the modern value chain network
cases human decision making/control steps were may involve downstream value chain partners
maintained within the virtual environment, but (suppliers and buy-side intermediaries), working
today the approach is to use artificial intelligence directly to deliver core value chain activities to
software across such control points. the upstream value chain partners or sell-side
The value chain targeted the real-time environ- intermediaries. They suggested both strategic and
ment. Online promotions by leading e-tailers could non-strategic business partners may contribute
be monitored on an hourly basis to test customer to this value chain.
response and to review the competitors offers. Van Looy, Gemel, and Dierdonck (2003) con-
This allowed the business to adjust its targeting pri- sidered the value chain as a value constellation,
orities, offerings, and the like. In places where the and proposed a more holistic view of the way
delivery processes had become more responsive, in which the innovation process creates value for
the deliverability of products and services was the final customer. This value chain constellation
often improved. Thus, greater business-customer subsequently inspired innovation managers to
alignment between the value chain activities and fully understand and articulate how the products
the e-customer was possible. The value chain and services are developed by the organization, in
may deliver efficiencies, and e-sales, that may be interaction with other (complementary) products
controlled from either internal or external value and services, creating value for the customer
chain constituents or partners. leading to integration of activities across the
Kalakota and Robinson (2001) discussed value chains (rather than along the value chain)
disaggregation of the value chain as a means to into new product and service offerings.
streamline efficiencies. For example, logistics
outsourcing, and subsequent re-aggregation of
a supplier mix, may deliver new value chain VALUe chAin MAnAgeMent
components. Timmers (1999) noted that the
value chain may no longer be viewed as a series Beechs (1998) demand-supply chain model,
of discrete steps, and that technology was offer- along with Comergents (2003) demand chain
ing more possibilities for integrated solutions. model, have each progressed towards a value
For example, Dell has used online customized chain management model (Mudimigha, Zairi, &
ordering systems to reduce its time to market, Ahmed, 2004). Sampson (2000) demonstrated that
improved customer tracking and monitoring, service supply chains were bi-directional, and that
thereby reducing its customer response and de- communication between customers and suppliers,
livery times. It deployed considerable alliance and vice versa, must occur. Thus, a partnering
partner involvement, with its partners having between participants occurred (Vokurka, 1998).
instantaneous data access concerning customer Sampson also indicated bi-directional supply
purchasing and special requests. Vermijmeren chains were typically short lived, but had just-
(2003) suggested that flexible, intelligent supply in-time implications with inherent value-added
chain engines could drive these dynamic supply expectations. To measure such information, new
chains, delivering value in an efficient manner. metrics tools have been devised. New methods
Incorporating high-level logistics solutions of- to capture online measurement data (or Web


Building and Managing Modern E-Services

metrics) have delivered new management tools. Many refinements that pick up the number
Management has increasingly incorporated such of complex value chain relationships have since
tools to interpret their Web tracking data, and to been added to value chain activities (Slywotzky
apply these findings throughout the demand-sup- & Morrison, 1997). The link between strategy,
ply chain. Thus new levels of recording, under- management, investment, operations, market-
standing, and interpreting value-adding solutions ing, service, and the environment is displayed
have emerged (Sterne, 2002). These metrics tools in McLartys adaptation of Porters value chain
helped management to: (Chaffey et al., 2004; Deise et al., 2000). This is
displayed in Figure 9.
1. Convert and distribute information, prod- The link to the more complex value chain in-
ucts, and services tegrator (or aggregator) approach (Chaffey et al.,
2. Manage knowledge, quality, and connectivity 2004) is shown in Figure 10. Here, the downstream
3. Work with virtual partners and customers suppliers, the business value chain contribution
4. Deliver strategic information to management blocks, and the selling operations are integrally
linked, and all contribute to deliver an overall
The modern value chain management model business package that aims to ultimately deliver
has remained demand chain customer focused. customer value.
Slywotzky and Morrison (1997) presented the Low (2000) investigated ways of creating value
progression of the value chain model from its and of measuring intangible assets like services.
traditional form into a modern form. Their model He suggested a value creation index allowing
is displayed in Figure 8. This model commenced management to monitor their performance bet-
with the customer, and linked the customer back ter. He further suggested that such procedures
to management core competencies. must remain flexible so they may be capable of

Figure 8. Modern value chain (Source: Slywotzky & Morrison, 1997)

The Traditional Value Chain


Start with Assets, Core Competencies

Assets/ Core Inputs, Product /


Competencies Raw Service Channels The Customer
Material Offering

The Modern Value Chain


Start with Customer

Customer Product / Inputs, Assets / Core


Channels Service Raw
Priorities Offering Material Competencies


Building and Managing Modern E-Services

Figure 9. Revised value chain (Source: McLarty, 2003)

Environment Environment

The Three Support Activities

Ma
Entrepreneurial Drivers

rg
in
Management Capability
Resource Infrastructure

The Four Primary Activities

gin
Mission & Operational Marketing Service

r
Ma
Objectives Processes

Environment Environment

Figure 10. Value chain integrator (Source: Chaffey et al., 2004)

Inbound Manufacturing Product


Logistics Warehousing
Strategic core VC
partners

Value Chain Integrators

Upstream VC Downstream
partners VC partners

Suppliers Fulfillment

Core Value Chain


Activities

Buy side Sell Side


Intermediaries Intermediaries

Value Chain Integrators

Non-strategic
service partners
Finance Human Admin eg
Resources travel


Building and Managing Modern E-Services

constantly adapting to the changing nature of SeRVice VALUe chAinS to


businesses in the connected economy. Peters SeRVice VALUe netWoRKS
(1997) suggested customer segmentation issues
must be continually monitored, thereby allow- A more recent variant of the value chain is the
ing for successful business-customer exchange services value chain. Definitions vary, but in
mechanisms to be maintained. In 2001, Porter general they refer to optimizing after-sales ser-
outlined how the Internet has enabled, and driven, vice situationsright across the service supply
new business solutions, forcing lower cost options chain. The service supply chain was seen as one
and operational efficiencies across the supply that, over time, delivered the fully collaborative
side to be strategically investigated. Thus value state of low inventories, efficient planning, and
chain management has led to a raft of networked, high customer service levels. This may have
targeted, measurable, flexible, adaptable, supply- included all planning, movement, and repair of
side innovations, and has provided a focus for materials activities to enable after-sales support
customer-driven value chain strategies. Today, of products (de Waart & Kemper, 2004; de Waart,
business services solutions have become increas- 2003; Poole, 2003).
ingly complex, and often these can no longer be Beck (2002) suggested the service value
considered as simple lock-step value chains. chain, supported by consolidation and advances

Figure 11. Service value chain aggregator (Source: Beck, 2002)

The Builders: Roles


Business Strategy

Business Solution Aggregator Retains the relationship with


client organization and all
strategic business partners

Defines unique solutions for


Business Process
specific business process
Processes Architecture
within specific vertical sectors
Vertical Processes

Builds, integrates and


Business Application optimizes applications from
Applications Architecture components for the specific
business process

Infrastructure
Optimizes the environment
Infrastructure
to host the application for
Architecture
the highest performance
E-commerce / e-
Business Backbone
New Services Roles


Building and Managing Modern E-Services

in the information technology downstream supply- unclear, non-linear environment of incomplete


side sector, would drive change during the next understanding, the firm and its service value
five years. Becks model, displayed in Figure 11, chain(s) should develop high agility in their abil-
suggested groups of equal business partners would ity to respond to change (Kassim & Zain, 2004).
share their specific, market-leading competencies, Some trends have the potential to accelerate or
identify a group of similar buyers, and would inhibit the adoption of emerging service value
deliver the required vertical solution repeatedly, chains. For example, intelligent database-driven
reliably, and cost effectively. Beck suggested Web sites have great advantage over Web page
these consortiums of partners could specifically solutions, because they are capable of delivering
target the individual customer, deliver high client specifically sourced data direct to a standard
satisfaction, drive new levels of profitability, and template Web page structure.
achieve competitive advantage (Bowen, & Shoe- These service value chain approaches in-
maker, 2003; Tsikriktsis & Heineke, 2004). volve combinations of external supply chains,
France et al. (2002) predicted the service internal value integrators, and various strategic
value chain would be one of the most important approaches. This complex aggregated structure is
developments for the global maturation of the thus better termed a service value network.
services industry. A service value network may be defined as:
The service value chain can arise from sup-
ply chain aggregators (Zrimsek, 2002) working the flexible, dynamic delivery of a service, and/or
with other back-end providers to deliver partial, product, by a business and its networked, coor-
sophisticated solutions. These aggregators link the dinated value chains (supply chains and demand
business processes (operations, supply chain, cus- chains working in harmony); such that a value-
tomer relationship management, service activities, adding, and target specific service and/or product
finances, and others) with the business applications solution is effectively, and efficiently, delivered to
infrastructure backbone. These business units are the individual customer in a timely, physical, or
also linked vertically in line with the business virtual manner. (Hamilton, 2004)
strategy. The necessary business architecture
offers unique solutions to integrate and optimize Thus a thorough and comprehensive approach
components, their environments, movements, and to the understanding and delivery of service is
hosting systems. New modes of service delivery defined, and integrating the downstream sup-
are also delivered. Hence, the business aggregator plier businesses to the upstream sellers involves
solution delivers the optimized internal systems. combinations of multiple networksincluding
It optimizes the relationships between the inter- the businesss e-supply chain networked struc-
nal business and its external customer-strategic tures. Thus, service value networks interlink the
partners associates. understanding and deliverability of the businesss
Businesses today are both change agents, de- downstream business e-supply chain networks
livering new products and services that change the and its upstream customer service offerings.
lives of consumers, and change responders. For Measurement and strategic adjustment of
example, a firm has great difficulty in predicting the downstream e-supply chain network and
when and where a useful, additional service value the upstream service provider business remains
chain will emerge, and if it is the optimal solution vital to maintaining and improving competitive
(one that best meets the contingent trends of its positioning. The balanced scorecard offers such
service value chains; and of its buyers). In this measurement dimension.


Building and Managing Modern E-Services

the BALAnceD ScoRecARD: The high-level strategies are articulated into


BUiLDing SeRVice VALUe chAin specific, measurable performance parameters
netWoRKS (Kaplan & Norton, 1996; Rohm, 2002). The cus-
tomers must be targeted to receive their expected
Today, various virtual e-services and physical outcomes, the business block must develop its
services models may be developed, evaluated, skills (and knowledge) and provide improved
and monitored using a balanced scorecard ap- solutions. The internal processes must meet all
proach. The service value network concept also legislative and business-specific requirements
fits under this measured strategic decision-mak- (like dispensing provisions). Finally, a set of fi-
ing approach. Service value networks house fully nancial outcomes (tangible and intangible) must be
integrated e-demand and e-supply chains work- delivered. These financial outcomesif correctly
ing in harmony to the deliver both services and established, pursued, and deliveredallow the
e-services. They are also highly agile and offer service value network to develop as a viable solu-
customer-induced flexible business solutions to tion set. The business strategy subsets are broken
customer requests. down into objectives, measurements, targets, and
This analytic balanced scorecard framework, initiatives, as displayed in Figure 11. Their effect
originally developed by Kaplan and Norton (1992), on overall vision and strategy is monitored. If
is displayed in Figure 12. It delivers the enabling necessary, subset objective may also be further
basis from which business industry blocks, like teased down into objective components, and even
individual pharmacies, may be translated into finer sets of measures may be developed.
powerful e-service networks of many interlinked This model delivers performance measures, al-
data-sharing pharmacies. The business intelli- lows high growth rates to be defined and targeted,
gence delivered by such an e-service network and differentiates competitive advantage, and delivers
its value adding systems is considerable. considerable measurable financial rewards. The

Figure 12. Balanced scorecard model

Financial

Vision Internal
Customer and Business
Strategy Processes

Learning
and Growth

0
Building and Managing Modern E-Services

Figure 13. Balanced scorecardnine-step strategy development cycle model (Source: Rohm, 2002)

business model has been trialed in one Australian customer outcomes) is developed. These strategic
pharmacy, is being expanded to six pharmacies, objectives are then mapped. Using a learning
and is fully scalable and will eventually encom- curve position/movement and knowledge ap-
pass an Australia-wide network of pharmacies proach, the strategic objectives are quantified into
and e-pharmacies. Revenue savings, once fully performance-based measures. These measures,
operational and Australia-wide, is projected to be in-turn, are tapped to deliver new initiatives, such
over $150M per annum (physical delivery), and as targeting different customer groups, offering
over $100M per annum in Internet sales (virtual different products and services, increasing the
delivery). This saving in real costs to the consumer product and service relevance, and the like. The
translates into a net national economic benefit selected pharmacy product and services mixes
exceeding $900M per annum. (to be marketed) are automated by incorporating
An e-service network may be implemented us- an e-systems approach that allowed the efficient
ing a modified version of Rohms (2002) nine-step delivery of the internal processes (in a cascading
balanced scorecard strategy development cycle. series of process requirements). This ultimately
This model is displayed in Figure 13. It begins delivers efficient, productive outcomes. Such busi-
with the development of the visionary strategy, ness-related outcomes provide relevant financial
and delivers a global business perspective. This results including increased customer numbers and
visionary strategy is refined and developed, via new revenue streams; greater cultural understand-
a business plan, a vision/mission top-down ap- ing and improved community involvement; up-
proach, and is combined with the evaluation of skilling of the operational staff and the business
other competing or relevant business models. A itself; enhanced local, regional, and international
set of strategic objectives (focusing on delivering focus; and the like.


Building and Managing Modern E-Services

Figure 14. Balanced scorecardnine-step strategic learning spiral

Second Balanced Scorecard


Strategic Nine Step Learning
Cycle Spiral

Start for each


strategy initiative

Figure 15. Balanced scorecardstrategic services components

Is everyone doing things Is everyone doing the right


correctly to drive this strategy? things to drive this strategy?
inputs

Customers
BB & BC
e-Buyers

Process actions

Actions Results
Business e-
Supply Actions Actions Actions Output Outcome
Systems
Actions

Results
Process Measures
Information Measures
Systems &
Communic-
ations

Input
Measures
Performance Measures


Building and Managing Modern E-Services

Figure 16. Pharmacy network scorecard (from Hamilton, 2004a)

Strategy to How success Performance Key action program


be achieved, measured expectation required to achieve
and how? and traced? objectives

Objective Measure Target Initiatives


Financial Broaden the Revenue mix 65% Std Pharmacy Classifying target users
revenue mix 24% New products, Channel marketing measures
E-Pharmacy services & delivery Fuzzy logic/ Artificial Intelligence
option 4% Upskilled staff measures
Local delivery 6% E-services Targeted sales focus, layout,
1% Information sharing quality & learning curve effects

Customer Customer Customer 05/06 200% Intelligent integrated database


targeting evaluations 06/07 300% interpretation and support
(Local
Customer Niche growth Customer intelligence support
Persons) 07/08 1000%
recognition Knowledge and learning pathways
Customer value Service value network delivery
& performance Value adds and peripheral
Customer alliances
satisfaction 24hr customer service/ connection

Regional New products % revenue new 05/06 integrated R&D sourcing markets
and New services products & regional approach, lead Dynamic website
services pharmacies
Internal New access & Targeted mailing of doctors and
Business deliveries % uptake 06 additional other suppliers sourced
Differentiation % approval pharmacies added
Direct marketing

Learning New strategic Training delivered 100% to all pharmacies Customer ed. & training
and skills Understanding & Well informed - all Customer lifestyle support
Growth Learning curve knowledge participants and Customer expected benefits
growth leadership (100%) exceeded
Regional and national knowledge
library

When tangible (physical) and intangible Figure 15. Here specific performance measures may
(virtual) balanced scorecard measures are as- be identified and then tracked. For example, if the
sessed against previous strategies, new strategic objective is to broaden the pharmacy revenue mix,
improvements are often generated. For example, all inputs related to this objective are drawn together
joint cluster marketing, sharing of customer activi- into the required common process blocks that deliver
ties (and feedback), incremental improvements this desired outcome. The relevant measures are then
in processes, disruptive (total new pathways) determined, delivered, and monitored.
improvements in target marketing and approaches Figure 11 considers the case of a pharmacy
used, and new funding mechanisms may be op- solution. Here, the four balanced scorecard sec-
erationalized into the strategic model. tors as displayed in Figure 12 are linked within
A strategic, nine-step, learning spiral and the one scorecard. Using a procedure such as that
growth pattern emerges from the balanced outlined for Figure 13 above, and considering
scorecard nine-step model. The second learning the relevant measures as developed via a Figure
cycle builds on the first learning cycle as learning 15 approach, a series of achievable, measurable,
occurs, and over time, faster learning along with targeted, cost related initiatives can be developed
more complex, better targeted, multifaceted ap- to deliver this specific part of the business strategy
proaches to business intelligence and knowledge for the service value network.
capture arise. This growth and learning cycle is The balanced scorecard model is a highly
modeled in Figure 14. useful tool that can assist with the focusing,
The strategic components delivering the e-ser- targeting, and delivery of optimized growth
vices balanced scorecard outcomes are displayed in approaches for an industry block like the phar-


Building and Managing Modern E-Services

macy industry, the tourism industry, the financial value network. Industry-wide strategic manage-
sector, accounting services, and legal services. ment control and monitoring tools like the bal-
Figure 16 displays how this tool may be used to anced scorecard have ready application in such
tease out service strategies, e-service strategies, business network approaches.
or a combination of the two strategic blocks into The service value network integrates the sup-
a pharmacy network balanced scorecard model. ply-side alliance partners and their associated
This delivers strategies that may ensure necessary peripheral partners into a highly competitive
financial rewards and savings are deliverable to cohesive unit, striving to deliver operational and
an e-service industry. service innovation, cost savings, and value-add-
Modern business managers may use a balanced ing solutions to its diverse customer-demanded
scorecard approach to monitor their businesss business encounters, while the balanced scorecard
strategy. The manager may quantify each tangible delivers a set of strategic management control
and intangible business feature into a defined functions.
and quantifiable measure. Each measure can be
assessed, and specific target performance expecta-
tions can be developed, each linked to specific key concLUSion
outcome-related activities, and each delivering a
component of the desires strategy. All activities Today industry is seeking new pathways to com-
may be costed (allocated to cost centers and with petitive positioning and ways to driving business
economic values), and incorporated into one of models forward. Currently, many models exist,
four measurable strategic areasthe customer and new additions like the e-services built around
(including business and end user); the internal e-supply chain networks are increasingly target-
business processes (like the businesss e-supply ing meeting customer needs. These models still
chain networks); the financial area (including lack a customerization (one-on-one business-to-
income and expenditure); and the innovation, individual-customer relationship) approach, and
learning, and growth sectors (like research and consequently need further enhancements. Service
development). These four key balanced scorecard value networks offer a comprehensive pathway
business perspectives encapsulate deliverable towards enhanced competitiveness.
economic value, and each is normally directly tied To develop a service value network approach, a
into the businesss common strategic vision. Thus detailed understanding of business developments
the balanced scorecard remains a key strategic is required. Four strategic areas are requireda
management and monitoring tool for the man- tactical understanding of the external business
ager operating in the modern e-service business environment and its effectors on the business;
arena. It is also a useful strategic measurement a strategic, data-mined, intelligent understand-
tool in the building and maintenance of service ing of all internal and peripheral e-supply chain
value networks. networks and their information channels; an ac-
Thus, the progression towards highly efficient cessible business-customer interface that delivers
and agile e-services has been driven by businesses desired information across the network and up
constantly seeking new ways to improve their to the targeted customer; and an alert, customer-
performance, to deliver products and services in centric solution set delivering the required service
a more cost-effective and productive manner, and at an acceptable cost. The balanced scorecard
to deliver enhanced perceived customer value. offers a strategic measurement agenda allowing
This focus has driven the business beyond the management to monitor tangible and intangible
e-service model and into the realm of the service service factors across their sphere of influence.


Building and Managing Modern E-Services

The mechanisms underpinning these service their capabilities in this regard, and will form an
value networks and their strategic measurement integral part of service industry business solutions
areas allow the industry and its management to into the future.
cohesively move forward towards an enhanced
competitive position delivering a glocal
(global and local) solution. ReFeRenceS

Akkermans, H., & Vos, B. (2003). Amplification


the FUtURe in service supply chains: An exploratory case
study from the telecom industry. Production and
Within the services arena, a fully operationalized Operations Management, 12(2), 204-223.
e-supply chain network structure presents the
Al-Mudimigha, A., Zairi, M., & Ahmed, A.
participating business with an expanded array of
(2004). Extending the concept of supply chain:
competitive position tools. Strategic positioning
The effective management of value chains. In-
and extended customer value may be utilized
ternational Journal of Production Economics,
to develop measures and to frame new business
87, 309-320.
models (Hamilton & Selen, 2003a, 2003b, 2004).
Further tools like quality functional deployment An, C., & Fromm H. (Eds.). (2005). Supply chain man-
may be used to establish e-quality dimensions agement on demand. New York: Computer Books.
(Hamilton & Selen, 2002, 2004) and the suitability
Andersson, D., & Jockel, O. (2002). Logistics
of the customer directed e-service products, while
competence provided and required in third-party
strategic e-marketing may be used to develop stra-
logistics relationships. In M. Andersen & M.
tegic target market areas and measures (Gunesh
Marelli (Eds.), Business Logistics and Interor-
& Hamilton, 2003). Additional e-supply chain-
ganizational Electronic Networks, Proceedings
related areas including 4PL logistics solutions
of NOFOMA (pp. 569-587). Retrieved July 31,
(Hamilton, Hughes, & Selen, 2003; Gunesh &
2003, from http://inforge.unil.ch/cimre96/pa-
Hamilton, 2004a) and learning across e-demand
pers/paper.htm
chain systems (Hamilton & Selen, 2002a, 2002b)
may offer additional measurement tool features. Barlow-Hills, S., & Sarin, S. (2003). From market
Such areas, when incorporated into e-supply driven to market driving: An alternative paradigm
chain networks, move the basic e-supply chain for marketing in high technology industries.
solutions towards comprehensive, highly agile Journal of Marketing Theory and Practice,
service value networks industry-wide solutions. 11(3), 13-24.
The early stages of industry-wide service value
Beck, J. (2002). The services value chain provides
networks are emerging in tourism (built around lo-
framework for joint ventures. Gartner Group
cal-business to national-database systems). When
Research Note (AV16-2271).
built into an intelligently managed (by information
technology systemsincorporating fuzzy logic Beech, J. (1998). The supply demand nexus. In I.
and artificial intelligence) e-services industry and Gattorna (Ed.), Strategic supply chain alignment.
constructed as a global, dynamic, living business Aldershot, UK: Gower Press.
network, a high degree of customer targeting and
Berry, L., & Parasuraman, A. (1991). Marketing
resultant customer satisfaction is deliverable. E-
services: Competing through quality. New York:
supply chain networks will continue to improve
The Free Press.


Building and Managing Modern E-Services

Bowen, J., & Shoemaker, S. (2003). Loyalty: A Cook, D., Goh, C., & Chung, C. (1999). Service
strategic commitment. Cornell Hotel and Restau- topologies: A state of the art survey. Production
rant Administration Quarterly, 44(5/6), 31-46. and Operations Management, 8(3), 318-338.
Brown, S., & Vashistha, A. (2002). Igniting the ser- Czinkota, M., Ronkainen, I., & Moffett, M.
vices value chain. Services Marketing, 11(1), 12-13. (2005). International business (7th ed.). Mason,
OH: Thompson/South-Western.
Carothers, G., & Adams, M. (1991). Competitive
advantage through customer value: The role of de Waart, D. (2003, October 6). Service supply
value based strategies. In M. Stahl & G. Bounds chain management: A great untapped resource.
(Eds.), Competing globally through customer EBN, 21-23. Retrieved March 20, 2004 from
value (pp. 32-66). New York: Quorum Books. http://www.ebnonline.com
Chaffey, D., Mayer, R., Johnston, K., & Ellis- de Waart, D., & Kemper, S. (2004, January/Feb-
Chadwick, F. (2004). Internet marketing (2nd ed.). ruary). 5 steps to service supply chain excellence.
Essex, UK: Pearson Education. Supply Chain Management Review, 28-35.
Chase, R. (1996). The mail is my factory: Reflec- Deise, M., Nowikow, C., King, P., & Wright, A.
tions of a service junkie. Production and Opera- (2000). Executives guide to e-business. From tac-
tions Management, 5(4), 298-308. tics to strategy. New York: John Wiley & Sons.
Chase, R., Jacobs, R., & Aquilano, N. (2005). Docherty, M. (2001). Managing the supply
Operations management (10th ed.). New York: chain: i to I. Logistics Inc., (Newsletter No. 1),
McGraw-Hill/Irwin. 1-4. Retrieved June 10, 2003, from http://www.
ilogistics.com
Chen , I., & Paulraj, A. (2004). Towards a theory
of supply chain management: The constructs and Fisher, M. (1997). What is the right supply chain
measurements. Journal of Operations Manage- for your product? Harvard Business Review,
ment, 22, 119-150. 75(3), 105-116.
Childerhouse, P., Aiken, J., & Towill, D. (2002). France, N., Da Rold, C., & Young, A. (2002).
Analysis and design of focused demand chains. Services value chain reshapes IT services in-
Journal of Operations Management, 20, 675-689. dustry (pp. 1-4). Gartner Group Research Note,
(AV-21-3090).
Choi, T., Dooley, K., & Rangtusanatham, M. (2001).
Conceptual note: Supply networks and complex Frohlich, M., & Westbrook, R. (2002). Demand chain
adaptive systems: Control versus emergence. Jour- management in manufacturing and services: Web-
nal of Operations Management, 19, 351-366. based integration, drivers and performance. Journal
of Operations Management, 20, 729-745.
Clark, C. (1940). The conditions of economic
progress. London: Macmillan. Gunesh, K., & Hamilton, J. (2003a). Logisticsa
pathway towards sustainable competitive
Comergent. (2003). Demand chain management.
advantage for the multinational enterprise. In
Retrieved May 20, 2004, from www.comergent.
Proceedings of the 3rd International Conference
com/elibrary.cfm & http://www.comergent.com/
on Electronic Business, Singapore (Vol. 3, no. 1,
products/architecture.cfm
pp. 1-10, 597-599).
Committee on Definitions, American Marketing
Gunesh, R., & Hamilton, J. (2003). Incorporating
Association. (1960). Marketing definitions (p. 21).
customer interface marketing design elements to
Chicago: American Marketing Association.


Building and Managing Modern E-Services

leverage strategic positioning in the online real extended customer value proposition. In Spina,
estate industry. In Proceedings of the 3rd Inter- Vinelli, Cagliano, Kalchschmidt, Romano, &
national Conference on Business, Honolulu, HI Salvador (Eds.), One world? One view of OM?
(Vol. 3, no. 1, pp. 1-9). (pp. 903-912). Italy: SGE, Pavova.
Hamilton, J. (2004). Modeling, information flows, Hamilton, J., & Selen, W. (2003b). A strategic
performance, strategy and competitiveness across path to competitive advantage for the online,
the service value network. Journal of New Busi- small-to-medium enterprise within the service
ness Ideas and Trends, 2(2), 29-53. sector. Journal of New Business Ideas and Trends,
1(1), 20-37.
Hamilton, J. (2004a). Service value networks:
Value, performance and strategy for the services Hamilton, J., & Selen, W. (2004). Enabling real
industry. Journal of Systems Science and Systems estate service chain management through person-
Engineering, 13(4), 469-489. alized Web interfacing using QFD. International
Journal of Operations and Production Manage-
Hamilton, J., Hughes, K., & Selen, W. (2003).
ment, 24(3), 270-288.
E-business enabled networks and fourth party
logistics (4PL) providers: An overview. In Pro- Hanson, W. (2000). Principles of Internet market-
ceedings of the 3rd International Conference on ing. Cincinnati, OH: Thompson Learning.
Electronic Business, Singapore (Vol. 3, no. 1, pp.
Heikkila, J. (2002). From supply to demand chain
1-7, 331-333).
management: Efficiency and customer satisfaction.
Hamilton, J., & Selen, W. (2002). Integrating Journal of Operations Management, 20, 747-767.
Web site design features for one-on-one mar-
Houlihan, J. (1987). International supply chain man-
keting: A QFD framework. Proceedings of the
agement. International Journal of Physical Distribu-
7th International Conference on ISO9000 and
tion and Materials Management, 17(2), 51-66.
TQM, Melbourne, Australia (vol. 7, no. 1, pp.
1-8, 93-94). Hughes, J., Mitchell, P., & Ramson, W. (Eds.).
(1993). Australian concise Oxford dictionary.
Hamilton, J., & Selen, W. (2002a). The develop-
New York: Oxford University Press.
ment of the dynamic Web interface between the
online e-customer and the e-business. In Pro- Ismail, H., & Khatibi, A. (2004). Study of the
ceedings of the 6th ANZAM/IFSAM International relationship between perception of value and price
Conference, Gold Coast, Australia (pp. 1-12). and customer satisfaction: The case of Malaysian
telecommunications industry. Journal of Ameri-
Hamilton, J., & Selen, W. (2002b). Learning in a
can Academy of Business, 4(1/2), 309-313.
demand chain management framework: Direc-
tions for business education. In Proceedings of Judd, R. (1964). The case for redefining services.
the 33rd Decision Sciences Institute Conference, Journal of Marketing, 28(1), 58-59.
San Diego, CA (pp. 1-16).
Kalakota, R., & Robinson, M. (2001). E-business
Hamilton, J., & Selen, W. (2003). Development of 2.0: Roadmap for success. Upper Saddle River,
a strategic positioning matrix for the Internet-en- NJ: Addison-Wesley/Longman.
abled real estate industry: An Australian perspec-
Kamarkar, U. (2002). Integrative research in
tive. The E-Business Review, 3(1), 57-61.
marketing and operations management. Journal
Hamilton, J., & Selen, W. (2003a). Development of Marketing Research, 33(2), 125-133.
of a regional real estate portal exhibiting an


Building and Managing Modern E-Services

Kaplan, R., &. Norton, D. (1992). The balanced New, S. (1996). A framework for analyzing sup-
scorecardmeasures that drive performance. ply chain improvement. International Journal
Harvard Business Review, 70(1), 71-79. of Operations and Production Management,
16(4), 19-36.
Kaplan, R., &. Norton, D. (1996). The balanced
scorecard: Translating strategy into action. Bos- Nie, W., & Kellogg, D. (1999). How professors
ton: Harvard Business School Publishing. of operations management view service opera-
tions. Production and Operations Management,
Kassim, N., & Zain, M. (2004). Assessing and
8(3), 339-355.
measurement of organizational agility. Journal of
American Academy of Business, 4(1/2), 174-177. Peters, L. (1997). IT enabled marketing: A frame-
work for value creation in customer relationships.
Kathawala, Y., & Abdou, K. (2003). Supply chain
Journal of Marketing Practice, 3(4), 213-229.
evaluation in the services industry: A framework
development compared to manufacturing. Mana- Poole, K. (2003). Seizing the potential of the
gerial Accounting Journal, 18(1/2), 140-149. service supply chain. Supply Chain Management
Review, (July/August), 54-61.
Kuglin, F. (1998). Customer-centered supply chain
management. New York: American Management Porter, M. (1985). Competitive advantage: Creat-
Association, AMACOM. ing and sustaining superior performance. New
York: The Free Press.
Lawrence, E., Newton, S., Corbitt, B., Braithwaite,
R., & Parker, C. (2002). Technology of Internet Porter, M. (2001). Strategy and the Internet. Har-
business. New York: John Wiley & Sons. vard Business Review, 79(3), 63-78.
Lee, H. (2002). Aligning supply chain strategies Preis, M. (2003). The impact of interpersonal
with product uncertainties. California Manage- satisfaction on repurchase decisions. Journal of
ment Review, 44(3), 105-119. Supply Chain Management, 39(3), 30-38.
Levitt, T. (1972). Production line approach to Quinn, J., Baruch, J., & Paquette, P. (1987).
service. Harvard Business Review, 50(5), 41-52. Technology in services. Scientific American,
257(6), 50-58.
Low, J. (2000). The value creation index. Journal
of Intellectual Capital, 1(2), 252-262. Rathmell, J. (1974). Marketing in the service sec-
tor. Cambridge, MA: Winthrop Publishing.
McAlexander, J., Kim, S., & Roberts, S. (2003).
Loyalty: The influences of satisfaction and brand Rayport, J., & Sviokla, J. (1996). Exploiting the
community integration. Journal of Marketing virtual value chain. The McKinsey Quarterly,
Theory and Practice, 11(4), 1-11. 1, 20-37.
McLarty, R. (2003). The attitudes of British managers Reid, D., & Sanders, N. (2005). Operations manage-
in small and medium sized enterprises to the imple- ment (2nd ed.). Hoboken, NJ: John Wiley & Sons.
mentation of the value chain concept. International
Rohm, A., & Sultan, F. (2004 January/February).
Journal of Management, 20(4), 430-442.
The evolution of e-business. Marketing Manage-
Murdick, R., Render, B., & Russell, R. (1990). ment, 32-37.
Service operations management. Boston: Allyn
and Bacon.


Building and Managing Modern E-Services

Roth, A., & Menor, L. (2003). Insights into service Selen, W., & Soliman, F. (2002). Operations in todays
operations management: A research agenda. Jour- demand chain management framework. Journal of
nal of Operations Management, 12(2), 145-164. Operations Management, 20(6), 667-673.
Rust, R., & Metters, R. (1996). Mathematical Tsikriktsis, N., & Heineke, J. (2004). The impact
models of service. European Journal of Opera- of process variation on customer dissatisfaction:
tions Research, 91(3), 427-439. Evidence from the U.S. domestic airline industry.
Decision Sciences, 35(1), 129-142.
Sampson, S. (2000). Customer-supplier duality
and bidirectional supply chains in service organi- U.S. Bureau of Labor Statistics. (2002/2004). Re-
zations. International Journal of Service Industry trieved May 25, 2004, from http://www.bls.gov/
Management, 11(2), 348-364.
Verma, R., & Boyer, K. (2000). Service classi-
Sarner, A., & Desisto, P. (2004). MarketScope: fication and management challenges. Journal of
Sell-side electronic commerce, Gartner Group Business Strategies, 17(1), 5-24.
Research Note, (M21-9772), 1-4.
Zeithaml, A. (1988). Consumer perceptions of
Schonberger, R. (1990). Building a chain of cus- price, quality, and value: A means-end model
tomers. New York: The Free Press. and synthesis of evidence. Journal of Marketing,
52(3), 2-22.


0

Chapter V
Service Value Networks:
Delivering Competitive
E-Services

John Hamilton
James Cook University, Australia

ABStRAct

This chapter addresses service value networks as a key pathway to establishing and likely retaining
future strong competitive positioning within a service industry sector. A service value network may be
defined as the flexible, dynamic delivery of a service, and/or product, by a business and its networked,
coordinated value chains (supply chains and demand chains working in harmony); such that a value-
adding and target-specific service and/or product solution is effectively, and efficiently, delivered to the
individual customer in a timely, physical, or virtual manner. The service value network offers a future
pathway for a business to develop its e-supply chain systems. It captures the contacting customer, and
integrates the customers (virtual e-customer, virtual e-business customer, or physical customer) demands
via its virtual or Web site interface into its integrated downstream service networks, seeks solutions, and
delivers the appropriate business solutions back to the customer. Value-enhanced business encounter
solutions are readily deliverable for targeted customers. The procedure to research and develop a service
value network is described.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Service Value Networks

SeRVice VALUe netWoRKS The features from the previous chapters


models, when considered with other factors like
Service value networks offer a new business customer demand-driven needs, wants, desires,
model and a new paradigm to service delivery and price point; supply side service feeds; the effect
mechanisms. They reconcile two conflicting, but of the Internet, business strategic solutions; and
concurrent, requirements of customers, namely technology options, along with their interrelated
to leverage economies of scale (from a diverse and interconnected links, can be drawn into a
block of data storages), and to be able to deliver new topology model termed the Service Value
highly specific customized solutions (Brown & Network Framework Model.
Vashistha, 2002). This service value network
pathway is being driven by:
SeRVice VALUe netWoRK
Businessesnow requiring easy-to-imple- FRAMeWoRK
ment and value-proven vertical or pro-
cess-specific solutions, instead of generic The service value network framework offers a
capability-based, technical support. topology approach from which the operational,
The drive towards core competency and services, and customer strategies of the business
competitive advantage. are drawn together as interconnected data-shar-
The requirements for holistic solutions ing models delivering unique customer services
driving cooperation throughout the services encountersones aiming to exceed customer
value chains, and aiming to satisfy client expectations! This business system learns from
demands. its customer encounters (by storing and analyzing
The desire for long-term (or more sustain- customer information gathered), and improves its
able) competitive positioning. services database offerings by developing new, or

Figure 1. Service value network framework (Source: Hamilton, 2004a)

Customer
Targeted
Concept

External Physical
Customer Service Off-line
Related Encounter Customer
Concept Model

Services Service
Concept
On-line
Customer

On-line
Customer
Internal Virtual
Service Service On-line
Provision Encounter Customer
Concept Model
On-line
Customer
Operations
Hamilton, 2004
Concept On-line
Customer


Service Value Networks

improved, upstream supply-side customer-driven tion with developing Web measurement metrics,
solutions and housing these information sources computer-based fuzzy logic techniques (com-
ready for additional, or even more specific, customer puter-based data analysis and approximation
encounters. This model is displayed in Figure 1. techniques), and artificial intelligence tools (that
This framework meshes with: mine the business networks databases, and pro-
vide reasoned and added-value solutions to the
Earlier works above. customers business requests, interrogate the da-
Other works (Hoffman & Novak, 2000; Chen tabases, sort and interpret available information,
& Wells, 1999; Biocca, Li, & Daugherty, and deliver customized, or personalized solutions)
2002). that target perceived customer expectations. This
Commercial services business solutions renewal and learning networked system is very
providers (Gartner, 2002; Comergent Busi- different from normal Web site service offerings.
ness Strategies, 2003). It also incorporates issues related to failures and
Software developers, including SUN, Mi- recovery. The operations concept component de-
crosoft, and IBM. livers the how to the service value encounter.
The operational, services, and customer strate-
The external services component links the gies of the business are drawn together as inter-
environmental scanning for complementary ser- connected data sharing models, delivering unique
vices and added-value components, and are based customer services encountersones aiming to
on the customer-requested solution plotted. exceed customer expectations, and house much of
The internal services component delivers the businesss intellectual property. They remain
the integrated demand chain/supply chain, where integrally linked downstream with their relevant
value chain partners work together to deliver partners and ad hoc additional sources, seeking
maximum customer value in the most efficient to deliver dynamic service value chain network
and effective manner. Here, partners aim to de- responses for their virtual customers.
liver service quality and the service as a quality, The operational, services, and customer com-
financially accountable package. ponent areas are integrally connected in the mod-
The customer targeted component addresses ern service value chain network. Data is pooled,
the service being offered in terms of its efficiency, shared, exchanged, and cross-concept applied (be-
relevance, scope, and performance. In short, the tween customer servicing, operations, and busi-
customer targeted component delivers the back- ness strategies) to provide new learning and new
end activities or the when (content order), and customer solutions. The component areas come
appropriately targets these features to whom. together at the service encounter touch-point.
The service concept component integrates The customer receives the businesss demand-
both the operations concept component and the driven, appropriate, approximated, value-added
customer targeted component. It delivers multi- set of services. This mix is intelligently sourced
dimensional information through the business and and retrieved from its networked combinations
its value-adding internal and external partners, of databases.
and delivers a broader customer experience. In The service encounter is derived via one of
short, the services concept model delivers the two components (or a combination of both):
what to the service value encounter.
The operations concept component houses 1. The physical (tangible) encounter between
networked information systems, and extensive the customer and a business contact person
data storage and retrieval systems. In conjunc- or persons


Service Value Networks

2. The virtual (intangible) encounter with economy! At this time, 35% of Australian busi-
and electronic based structure, which is nesses purchased online, and 89% of Australian
often visually connected via its internal businesses were online. Australian businesses
or external business Web sitein both (with more than 10 employees) recorded near
cases information flows from customer to ubiquitous Internet adoption (Di Gregorio & De
business, and business responds sourcing Montis, 2003). The Internet has transformed many
relevant, allowable (non-sensitive), correct of Australias key business and agency functions,
information including services delivery, customer relationship
management, organizational administration, sup-
Business then delivers customer-requested, ply chain management, and knowledge (or data)
value-chain sourced information (in a timely management. In January 2004 over 46 million Web
flow), across the service encounter interface and servers worldwide were globally connected to the
through to the customer. Chinese University of Internet, with 96% connecting with the browser
Hong Kong and National Sun Yat-Sen University Internet Explorer. Thus, for many countries like
research (Draaijer, 1992; Liang, 2003) indicated Australia, the opportunity remains to deliver
customers in the United States buy using multiple high-value service offerings to virtual business
channelsincluding stores, catalogs, and online customers.
activities. The service value network operates
across both physical and information pathways
and networks. It is a key part of the operations ViRtUAL SeRVice VALUe
management equation. Such viewpoints support netWoRK FRAMeWoRK
the physical and virtual service value encounter
model. Sterne (2002), a world authority on Web The business Web site offers a range of customer
metrics, supports the notion that businesses of- touch-points. These customer encounter points
fering both the physical and virtual encounter have several performance and value-effector
options tend, in the current market to be more blocks. These are displayed in the virtual service
successful, but that both models may also operate value network framework, which is displayed in
independently. Figure 2.
Businesses today are increasingly developing This e-service encounter environment presents
extensively networked online offerings, combined several potential virtual customer services-re-
with high levels of interconnectivity between lated weaknesses and several points of research
partners, alliances, and associated value-adding including:
organizations. In addition, they are moving their
supply chains into high-tech, networked, intel- Amplification effects
ligent solutionstermed service value chains E-services
(Barlow-Hills & Sarin, 2003; Van Looey et al., The web interface
2003). These service value chains are networked, Value chain modeling
and thus the service value network is a better Customer targeting
terminology. Information communication technologies
In 2003, Australias business-to-business and Bottleneck effects
business-to-consumer e-commerce was valued Business strategies
at $11.3B (Di Gregorio & De Montis, 2003), and
it was growing rapidly. It ranked fifth in the These factors are elaborated as follows.
world regarding its potential to use the Internet


Service Value Networks

Figure 2. The virtual service value network framework (Source: Hamilton, 2004a)

Customer
Targeted
Concept
External
Customer
Related
Concept
On-line
Customer

On-line
Customer
Virtual
Virtual Service Service On-line
Services Concept Encounter Customer
Model
On-line
Customer

On-line
Customer
Internal
Service
Provision
Concept
Operations
Concept
Hamilton, 2004

Amplification Effects amplification (or bullwhip) effects may be reduced


where a Web site delivers more efficient, more
The bullwhip effect is defined as the phenom- direct, targeted, more uniform, information ac-
enon where orders to the suppliers tend to have cess pathways between the service value network
larger variances than sales to the buyer (demand and the customer. Improved information flows
distortion) and the distortion moves upstream in delivering manageable amounts of filtered, most
a amplified form (variance amplification) (For- relevant information to the customer may deliver
rester, 1961; Akkermans & Vos, 2003). Lee, Pad- one solution.
manabhan, and Whang (1997) consider customer
ordering as a lumpy occurrence to which the sup- e-Service effects
plier responds. Schmenner (1995) theorized that
fast, evenflow could explain productivity gains in Many market forces influence the development of
manufacturing settings, and that even flows were the service value networks. There is an ever-pres-
achievable when the variability in supply chain ent economic imperative to reduce IT costs, while
was reduced. He also noted that tight quality con- increasing both the business value and impact of
trol reduced negative amplification effects. Finch this IT suite. Many businesses cannot afford high
(2003) states: A key to eliminating the bullwhip degrees of IT customization, and indeed this may not
effect and a key to any supply chain management always be necessaryconsider a mass user situation
effort is an increase in information supplied by like online airline bookings. Hence size and capital
business to their suppliers. Thus the upstream remain limiting factors. Timelines to move to online
service value network solutions also vary.


Service Value Networks

A true service value network integrates Value chain Modeling effects


all aspects of its businesss service supply
chaininternal and external in an intelligent, co- Value chain modeling (Bagchi et al., 2003) has
ordinated manner. It then interrogates the relevant shown how changes in speed, responsiveness, and
data and delivers business-specific intelligence variability affect operational performance, and
that matches the demands of the customer, again may enable the business to perform a solutions
reducing inefficiencies. This area remains one with scenario like financial impact assessment, cost-
great scope for further research and development. benefit analysis, and sensitivity analysis.
Various third-party logistics solutions have been Vermijmeren (2003) suggests flexible, intel-
developed to integrate these areas with those of ligent supply chain engines may drive these
other businesses, delivering new strategies, solu- dynamic supply chains, delivering value, in an
tions, and competitive advantage. efficient manner. Various third-/fourth-party
logistics additions offer additional new strategic
Web Site effects solutions, scope for competitive advantage, and
scope for business development. The incorpora-
Incorporating software programs that query the tion of peripheral added-value options may further
available database information for apparently improve these offerings.
intelligent solutions to customer requests may
be offered. customer targeting effects
The intelligent Web site acts similarly to an
intelligent, inquisitive, reasoned, language-sensi- When a customer encounters any aspect of a busi-
tive search engine, capable of taking in customer ness, a moment of truth arises, and positive or
requests by voice, e-mail, image, search-for ... , negative impressions can be generated (Albrecht
and the like. Artificial intelligence, knowledge & Zemke, 1985). In highly customer-responsive
management, and fuzzy logic principles are then business systems, customer contact time may be
applied to determine efficient, appropriate busi- lessened and sales opportunities may be enhanced.
ness-specific solutions. The customer may be an internal customer (work-
The resulting intelligent Web site processes ing for the business, a participant in the upstream
may reduce the need to revisit and reinterrogate service value network, or an internal services
databases, and may reduce the non-productive, participant in an area such as data processing, en-
time-consuming, information-seeking workload gineering, maintenance, accounting, or after-sales
requirements on the service supply chains. Signifi- service (Davis, Dehning, & Stratopoulos, 2003;
cant, tangible, and intangible cost reductions (less Swanson & Davis, 2003), or an external customer
non-productive Web site activities) may be achiev- (a consumer or one who interacts with and adds
able. Less demands, per initiative, per customer, value to the business service value network). To
may reduce the information transmission strain service the virtual customer, complete, responsive,
across the global communications networks, and flexible, adaptive service value networks often
may reduce negative customer sentiment. Such offer the most desirable options.
solutions may require the flat Web site encounter Finch (2003) argues that delivering quality
to move to new three-dimensional approaches services involves assurance and empathy. How-
(Microsoft, 2004). ever to deliver service quality across a Web site


Service Value Networks

requires a broadening of the quality dimensions customerized and fully operational service value
to encapsulate product and service and product networks is not yet a reality.
dimensions. Thus the customer exhibits a mul-
tidimensional impact on the business Web site. Bottleneck effects
Hence, the business must maximize its virtual
touch-point appeal, and must develop its virtual Bottlenecks occur when a limiting resource affects
management tools (and strategic metrics) set. the output level of the entire system. The business-
customer Web site encounter as shown in Figure 6
communication and information is one such bottleneck! Here, multiple customers
technology effects search multiple supply chain data sources, for
their individual needs and business inefficiencies
In 2001, the five largest software providersHP, arise. Finch (2003) suggests bottlenecks may be
IBM, Microsoft, Oracle, and Sunalong with a few considered as business constraints.
new entrants, began promoting new standards, new In the services industry, information is the key
Web services platforms, and new activities environ- ingredient that moves. Some information may be
ments. Since 1998 the Internet Protocol version 6 physical in naturelike paperworkwhereas in
(IPv6) software has been encapsulated into operating the manufactured product situation, both informa-
systems platforms (Comer, 2003). If adopted, IPv6 tion and products move. In both cases information
will allow marketers to segment a businesss Web bottlenecks occur.
site customers using postcodes, geographical loca- Efficient design of the Web site (with the use
tion, and phone numbers. Mobile devices, watches, of appropriate technologies) may reduce customer
and clothing are now capable of housing customized cycle-time (customer Web site access time to
information solutions for business. source, retrieve, and absorb desired informa-
Third-party software operating on common tion) (Malcinski, Dominick, & Hartrick, 2001;
platforms like Microsofts .Net or IBMs Web- Cutler & Sterne, 2002), reduce bottlenecks, and
Sphere platforms may further enhance the virtual possibly improve Web site effectiveness. Thus
environment, delivering savings for business touch-point information trade-rates between
measured as per initiativelower human and the customer and the business service value net-
capital resource requirements. In addition, new work remain dependent variable areas that may
ways to interpret, interrogate, and deliver customer be improved.
requirements are unfolding, and highly intelligent,
responsive Web sites are emerging. New business Business Strategies effects
strategies, and the nuances of customer wants
and needs, are developing and will be incorpo- Businesses faced with tough competition are
rated into solutions. Working relationshipslike devoting greater resources to support their e-
e-customer relationship management, trust, business initiatives (Bowman, 2001). Using tools
loyalty, satisfaction, addressing the dynamics defined by IBM and others, these businesses can
of the industry structure, and cultural fit will prioritize their financial and operational perfor-
become just as important to the customer as the mances, and closely define their e-business and
providers portfolio. Currently, latest computer management strategies in multiple-customer
application tools deliver low-level solutions (not environments. These strategies involve the devel-
high levels of customization) and are best utilized opment of semi-intelligent Web sites, and target
for standard product type applications. Hence delivery in four key areas related to the physical
the development (and implementation) of highly and virtual service encounter model. These are:


Service Value Networks

Technical (operations model) factors: In- BUSineSS-cUStoMeR


cluding communication channels, software encoUnteR
and hardware, artificial intelligence, fuzzy
logic methodologies, natural language in- The business-customer encounter now defined
terpretations, Web metrics, Web site flows as a key to delivering individually required ser-
and information integration, presentation vices to the individual customer may be further
modes (3D screens), and telepresence. modeled by considering the information blocks
Business (service operations model) fac- contributing to actual encounter. Three main
tors: Including externals (supply chain service dimensional blocks exist within the
partners, peripheral partners, logistics) and virtual service value encounter. These are: the
internals (business, management, market- business-related upstream strategic dimensions,
ing, operations, and strategies). the performance encounter dimensions, and the
Customer (customer targeting model) downstream customer-demanded value dimen-
factors: Grouped initially in technographic sions. Each block comes under the influence of
segments, then cyber-segmented further to the fourth blockthe external environment. This
eventually allow individual targeting. model is displayed as Figure 3.
Revenue-generator factors: Including The close relation between the physical and
sales, fees, charges, advertising, partner- virtual business-customer encounters means that
ships, and franchises. service value networks have applications to the

Figure 3. Virtual service network encounter model (Source: Hamilton, 2004a)

1. Environmental
effects

Business
Investment
Off-line
External

Revenue 3. Physical
Service
Customer

Generation Encounter
Off-line
Model
Business
Customer
Customer
Targeting
2. Virtual
Service 4.
Encounter
Virtual Model On-line
Senior
Service (Performance External
Management
Strategy effects, value Customers
effects)
Competitive Customer
Positioning Targeted
E-Business
concept Customers
Service Service
Offerings concept
Operations
Concept
IT/Operations &
Communication


Service Value Networks

physical (tangible) bricks-and-mortar service Revenue Generation Dimensions


value network encounters and to the virtual (in-
tangible) online, e- or m-business applications. In The virtual service encounter generates its tan-
all cases (internal or external access), the busi- gible financial measures from a diverse range
ness-customer encounter utilizes the same service of strategies, including sales, fees, charges,
value network IT-connected Web site structures. advertising, partnerships, business-customer
To ensure value is created at the virtual customer connectivity, and the like. Intangible measures,
touch-point, the virtual service encounter (or like additional sales due to value-adds, add yet
Web interface) should be managed effectively another dimension.
and efficiently. Various managerial dimensions in
relation to this service encounter are defined from Customer Targeting Dimensions
the virtual service network encounter model.
Customer knowledge and data capture remains
the Strategy Dimensions crucial to delivering appropriate services. Site
personalization and high levels of recognition
The strategy of the business has a vital connection may enable the business to enlist its affiliates and
to the virtual service encounter. If the strategy is jointly target the customer. It may also identify
one of low service integration, then the business new markets. The service network customer
will not be delivering high levels of value-added encounter dimensions include the internal busi-
service, but rather will deliver more standard ness-to-business customers and the external
service offerings. business-to-end-users (or customers). Frohlich
and Westbrook (2002) have researched some
Investment Dimensions internal business-to-business customer effects,
but the business-to-consumer dyad has not been
The investment available may influence the degree empirically studied (Chen & Paulraj, 2004).
of service offered. For example, the business may
not be able to afford fully integrated services or Senior Management Dimensions
be able to accept multiple access modes from
mobile devices like phones and PDAs. The busi- The business may be an innovator (like eBay.
ness must determine tangibles like how much it com), an early adopter (like RealEstate.com), a
should invest; how it may optimize its financial follower (like Zuji.com), or even a bandwagon
benefits and minimize its costs; how it measures copier (like many government departments).
and values its information, and its customer ser- In todays highly competitive global environ-
vicing; what standard payment mechanisms it ment, many models exist, but the business must
will accept; and under what standardized system. maintain some points of difference, or risk being
Sterne (2002) suggests other intangible finance out-competed. The executive management team
measures must also be determined, including the must understand the business environment and
delivery of customer satisfaction, importance, suc- respond to its strategic imperatives. They set and
cess, speed of sourcing, trends, and best practice. manage framework(s), including time, flexibility,
Other core business finance strategy parameters service levels, investment levels, dependability,
like supplier base reduction, long-term relation- opportunity, long-term partnerships, and control
ships, communication channels, logistics, and systems, to ensure the operations of the business
supplier involvement remain embedded within remain competitive in the marketplace.
this dimension.


Service Value Networks

Figure 4. Customer performance via the service business Web site (Source: Hamilton, 2004b)

Disruptive transitions: SVN Business VSE Customer


Customer driven performance capabilities

Broad SVNs

DCN Business VSE Customer

Service Demand Chain Integration

Emerging technologies are often


disruptive, and inhibit the business
SCN Business VSE Customer moving readily from its existing
Service Supply Chain Integration model to the new model eg. Internet,
e-commerce, G, scram jets.
A major business re-design will likely
be required (Christensen, 00,
Evans, 00; 00)
Business VSE Customer

Low Service Integration


Hamilton, 00

website-linked
Degree of web site-linked integrated supply-demand networking
networking

Competitive Positioning Dimensions demand chain-driven operation, where customer


requests are evaluated, and where possible, a cus-
The business must be responsive to change (and tomized service solution is delivered. The fourth
to changes in the environment). This measure of strategy (broad service value networks) allows
business strategic positoning must cater for con- the service business to operate strategically as a
stant adjustments to the needs of its customers. full service value network level, delivering agile
The simplest strategy, shown in Figure 4, is of low responses to customer requestsvia information
service integration. Here, little or no Web-based sourcing across its business networks, and further
networked integration, upon request, delivers complementing these services with additional
standard service offerings from the business value-added solutions and appropriate, externally
across the Web site interface to the customer. The sourced options. This requires high levels of cus-
second strategy (service supply chain integration) tomer-targeted performance capabilities.
binds the virtual service business with its sup-
ply chain network, and delivers a higher level of Service Offerings Dimensions
virtual deliverymore targeted to the customer,
and performance related. Here, the networked The business may offer levels of service based
supply chain is capable of efficiently delivering its on low service integration, service supply chain
standard products, or a standard option variation, integration, service demand chain integration, or
to the customer, in a timely manner. broad service networks. The levels of networking,
The third strategy (service demand chain in- agility, flexibility, customer targeting, and busi-
tegration) further ties the virtual service business ness supply chain focusing used vary depending
with customer-generated requests, delivering a on the choice of strategy. Virtual service value


Service Value Networks

networks provide the most sophisticated customer add additional business performance measures
service/product encounter. including profitability, firm size, operational
management experience, information delivery
IT, Operations, and Communication rate, reputation, and agility to the equation.
Dimensions
Web Site IT/Communications/
The technical areas of software, knowledge man- Operations Dimensions
agement, business intelligence, and communica-
tions must be capable of delivering the demanded Where high levels of uniform IT systems, integra-
customer requests, of interpreting the request and tion, communication, performance, and sophis-
delivering sensible added value complementary ticated assessment and delivery exist across the
features to the customer. Peer-to-peer processing entire business and its partnering networks, the
may be involved. business may approximate, or achieve, a service
value chain network status.
The Virtual Service Encounter The operational IT constructs permeate every
Dimensions aspect of the supply chain, transforming it and the
way information exchange activities are delivered.
The strategy of the business has a vital connection Today, a lack of sophisticated computer applica-
to the virtual service encounter. If the strategy is tion tools limits the implementation of highly
one of low service integration, then the business customized solutions (approximating one-on-one
will not be delivering high levels of value-added customerization). In some cases highly networked
service, but rather will deliver more standard business partners with specialist intelligent
service offerings. The service value chain network analysis, interpretation, retrieval, and collation
virtual encounter dimensions house the Web site tools may approximate, or achieve, a service value
and its visible interface. This interface offers chain network status. Such networks may include
customer touch-points whereby the customer improved personalization, search, and browsing
may interact, and may seek (or demand) services capabilities; multimodal interfaces with speech
from the business. recognition, pen, and handwriting interfaces;
and powerful efficient processes and wireless
Web Site Performance and Value technologies (Fenn & Linden, 2002).
Dimensions
Web Site Service Dimensions
Many businesses Web site solutions deliver a
virtual global presence, but do not attempt to add The performance of the Web site to deliver the
value (Evans, 2002), nor do they recognize cus- desired levels of customer-required services may
tomer or customer group requirements (McQuee- be affected by:
ney, 2003). The modern business services Web
site is designed to offer a wide range of business The bullwhip effect, where orders to the
options and selected corporate information. Key suppliers tend to have larger variances than
business-driven performance measures included sales to the business (demand distortion),
volume flexibility, scheduling flexibility, on-time and the distortion moves back downstream
delivery, delivery reliability, quality, cost reduc- in an amplified form (variance amplification)
tions, communication, customer complaint han- (Forrester, 1961)
dling, and customer satisfaction. Other researchers

0
Service Value Networks

The bottleneck effect, where a limit- the customer


ing resource affects the output level of the
entire system (Finch, 2003). For a Web Within this virtual Web site environment, the
site, information flows may affect overall customer is seeking efficient, simple, effective,
performance, or the timeframe or capabil- timely interactions with the business environment.
ity to deliver the desired levels of customer Parasuraman et al. (1985) suggested consumers
required services. judged companies. Others are critical of this, but
reliability, responsiveness, assurance tangibles
Other measures include supplier number and empathy help provide a valuable focus, while
reduction, long-term relationships, levels of others add loyalty (and its dimensions).
inter-business partnering, communication, and Customer-perceived satisfaction levels are
supplier involvement. Performance measures often influenced by the businesss response(s).
within these areas include: speed flexibility, These may include: ease of use, degree of cus-
agility (variability), management of alliances tomization, intuitive pathways, allowable down-
and logistics (Foss & Stone, 2001), supply chain loads, value-add offerings, recognition, price,
efficiencies (including bottlenecks and bullwhip delivery, promotion, after-sales service, and the
effects), lifecycle and innovation decisions, de- like. The business is seeking to interpret customer
mand-driven activities, multiplicity of partners, requests, search its possibilities from its avail-
and dynamically configured integrated networks able sources, and deliver to the customer its best
(McCullough Johnston, 2001). possible solution(s) in an efficient, effective, and
timely manner.
Customer Targeted Concept The virtual service customers reside within
Dimensions two categoriesthe internal business-to-business
customer category, and the end-user external
When a customer interfaces with any aspect of business customer category (using the business
a business, a moment of truth arises, and posi- service offering to add value to its operation).
tive or negative impressions can be generated.
In highly customer responsive business systems, E-Business Customers
customer contact time may be lessened and sales
opportunities may be enhanced. The customer The e-business customer demands its product/ser-
may be an internal customer (working for the vice requests be delivered with short lead times,
business, a participant in the upstream service on time, and every time be consistently of high
value chain network, or an internal services quality (fault free), reliable, and supported through
participant in an area such as data processing, excellent channels and after-sales service.
engineering, maintenance, accounting, after-sales
service) or an external customer (a consumer or External End-User Customers
one who interacts with and adds value to the busi-
ness service value chain network). Parasuraman, The end-user external customer displays a
Zeithaml, and Berry (1985) suggest that delivering dynamic demand for a greater variety of reli-
quality services may involve both assurance and able products, delivered with short lead times
empathy. Sound Web site service quality should (Draaijer, 1992). Customer segmented solutions
encapsulate delivery of all aspects of the service are required that deliver quality, loyalty, satisfac-
dimensions requested. tion, individual solutions, and value adding, and


Service Value Networks

do so in simple, interactive, efficient, effective, SeRVice VALUe netWoRKS AnD


and timely ways. the PhARMAceUticAL inDUStRY

The Physical Service Encounter The virtual service value network model dis-
cussed above may now be constructed into an
The business front office or salesperson deals operational model for the pharmacy industry.
directly with a customeron a direct one-to-one We use the Australian pharmacy industry for the
relationship. The virtual service encounter should discussion below.
encapsulate Web browser technologies capable The service value network in an e-pharmacy
of delivering necessary information and other setting is hereby defined as a collaborative network
service-related documents to the business front of supply chain partners (such as pharmacists,
office or salesperson which may then be relayed drug companies, distributors, beauty care suppli-
to the customer. ers, health and natural product suppliers, medical
practitioners); sales channels (Web site e-sales,
the environment direct over-the-counter sales, and referrals); and
operational and network administration person-
The business is surrounded by and influenced by nel, working with and serving the needs of its
its environmental uncertainty. This uncertainty customers and its online e-customers.
arises from a range of areas including demand Figure 5 displays a global perspective of the
uncertainty, competitor irregularities and fore- industry and the capabilities required from a ser-
casting errors, bandwagon effects (follow the vice value network. Here a national data storage
leader), technology innovation and change, and solution is to be developed that may be accessed
the like. Internal business pressures arise from by individual stores, store groups, store chains,
supply uncertainty, production uncertainty, or e-pharmacies. Development of such a service
technical uncertainty, and new product/service value network solution requires industry-wide
uncertainty. information sharing, and will eventually lead

Figure 5. The service value networkglobal perspective (Adapted from Anwar & Hamilton, 2005a)
Human
Factors
Geopolitical Economic
Factors Factors
WORLD
SYSTEM
Interactions
between
factors
Technology Environmental
Factors Factors

Centralised National
Pharmacy Integrated
Pharmacy Operators Data Storage Virtual E-Pharmacy
Physical Pharmacy Repository Accessible Operations
Operation by all Alliance and
Peripheral Partners
Pharmacy Business E-Pharmacy Implant Cheap
Specific E-Pharmacy Houses Uploads Off-Shelf
Activities VR Tools

Physical Pharmacy Virtual E-Pharmacy


Customers Customers

SVNs Arena


Service Value Networks

towards cost savings and enhanced value proposi- network (via the pharmacys industry Web site), and
tions (Hamilton, 2004b, 2005b). may source/request annual tax return data, a doctors
The service value network is designed and surgery bookings, local hospital information, health
managed by a central coordinating group, which and pensioner claims, and the like.
in a pharmacy setting might be taken up by the In addition, business intelligence and knowl-
Pharmacy Guild of Australia. Another example edge/information from suppliers, research, and pe-
resides in the Australian Tourism Industry, where ripheral sources is stored on a centralized database,
the Australian Tourism Export Council is cur- and this is accessible by pharmacies. Such data
rently compiling a national database in prepara- collation allows the customer to access a variety
tion for linking up its industry partners under of pharmacy stores to obtain his or her prescrip-
a service value network-like framework. The tions and medications. In addition, as stock items
generic service value network model is detailed are consumed, or damaged, or have passed their
in the following section. use-by date, additional orders are logged with
suppliers and delivery systems are informed, so
that accurate planning, without bullwhip effects, is
BUiLDing SeRVice VALUe ensured. Pharmacy suppliers and logistics provid-
netWoRKS into the ers may access the service value network to facili-
PhARMAceUticAL inDUStRY tate production and direct shipping of products to
pharmacy sales outletscity based or regionally
The service value network for the pharmaceutical based. Thus supply-related efficiencies and net
industry comprises a service-related strategy that cost-of-delivery savings are generated. Finally,
drives the three dimensions of the virtual service the service value network is also interconnected
encounter: the services provision, customer target- into other medical serviceshospitals, doctors,
ing, and the underlying operational IT infrastruc- ambulance services, police, and the likethereby
tures. In turn, the virtual service encounter systems creating an efficient, better-informed, integrated
may interface with the physical encounter system. medical services information network. Under
For example, when a sales assistant accesses the agreement, peripheral partners including health
pharmacys databases to fill in the customer pre- and ambulance insurance funds, medical research-
scription details, the sales assistant may also access ers, and the like may share information across
additional specific drug informationlike the last some general data fields of the service value
time the customer used such a drug and if it was network. To build such a system requires a key
a successful treatment; safe drug dosages for the stating point, and in Australia this initiator is the
customers body weight; possible complications Pharmacy Guild of Australia. Research currently
if consumed with other drugs the customer has underway is seeking to align the industry with
purchased or used; alternative, cheaper generic its customers at both a global and a local level,
drug options; and the like. If appropriate, this infor- and to deliver increased performance and greater
mation may then be shared with the customer. To perceived customer value, and to do so in a more
further enhance the dialogue between the business cost-efficient manner.
and the customer service value network sourced, Interactions within the service value network
service-related value-adding options may include: can be viewed from an internal business perspec-
consumer allowable limits, claim options, delivery tive among supply chain partners in delivering
options, nearest doctor, hospital, medical insurance and fulfilling customer orders, for example, a
options, tax benefits, local preferences, and so forth. pharmacist replenishing out-of-stock items. On
The customer may directly access the service value the other hand, the service value network responds


Service Value Networks

Figure 6. Service value network (Adapted from Hamilton, 2005a)

Pharmacy Industry Service Encounter Off-line


External
(Performance effects, value effects) PI Physical
Customer
Customer Targeted concept Service
4
Service concept Encounter
Model Off-line
Operations Concept Business
Customer
4
3
PI Virtual
Service
Encounter
Services
Provision

1 On-line
PI Virtual External E-
Competitive PI Virtual Service Customers
Environment Service Encounter
Strategy Customer 4
Targeting

On-line
PI Virtual E-Business
2 Service Customers
Encounter
Strategic Service IT/Operations & IT and
Orientation/CT Offerings Communication Operations
Hamilton, 2005

to external customers such as a local nursing virtual network delivery on potential service
home initiating bulk drugs supply directly via the performance
service value network. Both internal and external The customer targeting employed by the
perspectives need to be considered separately, industry
as they need to be aligned in order to accurately
respond to customer needs. The Generic Service To empirically measure the necessary param-
Value Network Model is displayed in Figure 6. eters needed to develop a cohesive service value
network approach across the pharmacy industry,
these four dimensions require measures. Tables
SeRVice VALUe netWoRK 1-4 summarize the relevant measures.
DiMenSionS Table 1 captures the competitive environment,
as influenced by external forces. Strategic deci-
The various dimensions of the service value sions like becoming a first mover, differentiating,
network can be grouped as follows: focusing on specifically defined niches, being the
low-cost provider, or being the dominant player
The impact of competitive environment on interplay with this field. The industry needs to de-
the industry velop the agility to adapt quickly to governmental
The dimensions of it/communications and rule/regulation changes. In the pharmaceutical
operations, integrated customer targeting industry this may relate to, for example, new re-
systems, and service offerings in determining porting and prescription regulations. The service
an industry strategy as set (typically by the value network also needs to house a capability to
service value network coordinating group) respond to changes in levels of competition. In
Dimensions of the service delivery system Australia the introduction of pharmacies within
within a virtual network, and the impact of low-cost retail chain stores/supermarket chains is


Service Value Networks

Table 1. Competitive environment

Competitive Environment

Dimension Operational Characteristic


Political Speed to adopt governmental rule / regulation changes

Economic Capability to respond to competition changes; Efficient cost


conscious scaling of operations
Environment Respond to competitive changes; Respond to new
innovations
Cultural Cultural monitoring of Cultural targeting

Technology Industry wide; Networked solutions; Latest offerings; Quick


accurate responses

Table 2. Inputs to industry strategy

Inputs to Industry Strategy

Dimension Operational Characteristic

Corporate POS related Initiatives; Market positioning; Degree of


service networking
Competitive IT capability; Customer understanding; Range of service
offerings
Financial Networks; Customer knowledge; Services offerings

Customer Targeting Customer demands met; Communicate culturally;


Datamine stored information

Service Industry wide; Networked solutions; Latest offerings; Quick


accurate responses
Technology/IT Customer delivery; Customer analysis; Customer services

Environment Reactive to business changes; Reactive to customer


changes; Updating continuous


Service Value Networks

Table 3. Virtual network and service performance

Virtual Network and Service Performance

Dimension Operational Characteristic

Cost IT networking cost; Customer servicing cost

Quality Internal information sorting; External customer product


delivery
Dependability Reliable business networks, Reliable customer services

Flexibility / Agility Capability to change; Uniqueness capability

Response time Ability to service customer

Personalization Ability to individually target customer; Ability to individually


respond to a customer
Convenience Multiple customer access modes; Multiple customer
response modes
Style fashion Ability to deliver added value solutions

Ethics Security and privacy of business information; Security and


privacy of customer information
Technology Strategically operationalize latest technologies

Table 4. Dimensions influencing elevated service delivery

Virtual Network and Service Performance

Dimension Operational Characteristic

Cost 22.IT and operational networking cost; 23.Customer


servicing cost;
Quality 24.Internal information sorting; 25.External customer
product delivery
Dependability 27.Reliable business operational networks, 28.Reliable
customer services
Flexibility / Agility 29.Capability to change; 30.Uniqueness capability

Response time 31.Ability to service customer

Personalization Ability to individually target customer; 32.Ability to


individually respond to a customer
Convenience 33.Multiple customer access modes; 34.Multiple customer
response modes
Style fashion 35.Ability to deliver added value solutions

Ethics 36.Security and privacy of business information; Security


and privacy of customer information
Technology 37.Strategically operationalize latest technologies


Service Value Networks

imminent. In addition, the service value network a home-delivery service; a doctorpharmacy


requires the ability to create and work in supplier direct link so that your prescription could be
partnerships to either capture particular capabili- ready when you arrive, or be home delivered; or
ties or to benefit from operational scale effects. As a database list of localities of nearby doctors and
the health care market is growing rapidly because their current available appointment times. Other
of an aging population, scale effects may become customer-specific attributes/knowledge bases of a
increasingly important. An example is the integra- pharmaceutical service value network also apply
tion of specific health insurance coverage informa- to Table 4, for example: linking of secured aspects
tion with pharmaceutical prescriptions. Finally, of individual customer personal information to
latest technological evolutions must build align- medical, hospital, ambulance, tax, insurance, and
ment with each customer and with the competi- banking information to enable a full emergency
tive requirements, and must respond to customer response service related to a car accident injury
demands through its various response channels. that required hospital intervention.; allowing
Table 2 houses the three major classes of direct computer access by local doctors, thereby
inputs to the service strategy: the underlying IT guaranteeing prescription communication ac-
and operations/communications infrastructure, curacy and delivery or delivering personal pre-
the customer targeting system, and the service scription information (or a purchase); offering
offerings to be delivered. new knowledge to the customer about a purchase;
Table 3 displays the dimensions of the virtual and performing all levels of related interactions
network and its service performance. The network including drug recognition, reaction time, insur-
dimension of the embedded connectivity of SC ance ramifications, deals, or best price.
partners through varying sales channels implies These measures are then teased out into two
that delays, incorrect information, and/or security relevant questionnaire sets, each of approximately
breaches can have a leveraged negative effect on 100 questions and requiring approximately 10 to
the overall service experience. Alternatively, a 15 minutes to complete. These survey questions
synchronous delivery by all partners involved are blocked to determine business-customer
may create a unique competitive edge through alignment, business performance, and customer
elevated service offerings. The quality dimension value effects.
of providing relevant and targeted information,
dependability of the service offering by each SC
partner, flexibility to incorporate new updates PhARMAcY inDUStRY: SeRVice
from suppliers (like product information), agility VALUe netWoRK DeVeLoPMent
to deploy new hardware/software applications,
quick response time to information requests, ease Thus, major dimensions of a generic service
of access, security with built-in privacy protec- value network approach to an e-pharmacy-based
tion levelsthese are all factors that enable or services support strategy are identifiable (Ham-
impair service delivery in a service value network ilton, 2004a, 2004b, 2005a; Hamilton & Selen,
framework. 2005).
Table 4 houses the resulting service offerings. Identified service value network dimensions
These may include: contacting an online phar- may be utilized to research and deliver a new
macist via a video phone or videoconference or approach to developing industry-wide solutions
teleconference, a personal chat room, e-mail, or within the services industries. The pharmacy
SMS; an evaluation of medical and cost alterna- industry in Australia has been used as the test
tives to a prescription; a side-effects report; bed for this service value network theoretical


Service Value Networks

approach. Here, the entire industry was analyzed accountability, strategic connection, change readi-
from both the business and customer perspec- ness, and clarity of response as key measures.
tive. Answers to performance, alignment, and Chang Lee, Lee, and Kang (2005) consider
customer value were derived. Key investigative knowledge utilization, accumulation, internal-
blocks, house resource-based, and superior- ization, sharing, creation, understanding, and
performance strategic areas enable competitive information to be important. Mayer and Davis
resource-based advantages to be reconstructed (1999) consider trust to be another vital ingredi-
into efficient and/or effective market customer ent. Greenwald and Kahn (2005) consider all
segment offerings (Hunt & Morgan, 1996). Where strategy must be drawn down to a local level.
these resources were deemed valuable, hard to Swaminthan and Tayur (2003) believe decision
imitate, and not easily substituted, sustainable technologies and bundling of resources can deliver
competitive advantage was more likely (Barney, competitive advantage. Chenhall (2005) believes
1991), and hence was deemed important to this strategic priorities must be delivered to custom-
industrys strategic solutions set. ers offering high-quality, low-price, uniqueness,
Some Australian pharmacies have approached customerized, fast, and dependable service;
their intangible resources as a means to deliver effective availability and service; and meeting
long-term or sustainable competitive advantage. the customers needs. He believes integrative
Lumpkin and Dess (1996) suggest an entrepre- strategic performance, strategic alignment, and
neurial approach may deliver competitive advan- organizational information and knowledge are
tage, and suggest this entrepreneurial approach all key business factors that must be developed.
is an appropriate strategy in todays business Abdinnour-Helm, Chaparro, and Farmer (2005)
environment. They use innovativeness, proactive- consider Web sites and their servicing to custom-
ness, autonomy, competitive aggressiveness, risk ers. They develop Web site customer satisfaction
taking, and employee motivation to capture such measures that also warrant consideration. Piccoli,
intangibles. Escrig-Tena and Bou-Liusar (2005) Brohman, Watson, and Parasuraman (2004) also
suggest a competency-based approach guides the consider factors influencing business service
development of competitive advantage, but ac- dimensions and customer needs.
knowledge that the unobservables (or intangibles) Supply chain integration also delivers market
affect such empirical research. Grant (1996) adopts and product/services strategies that affect busi-
a knowledge-based approach to deliver business ness performance (Narasimhan & Kim, 2005).
uniqueness. Still others argue an evolutionary Diversification is suggested as one means to
process exists where the business adapts to the deliver performance. Other researchers (Ham-
environment, and changes via a stochastic pro- ilton, 2004a, 2005a; Hamilton & Selen, 2005)
cess of searching for new and more beneficial have considered services, operations, IT business
routines (Winter, 1995). Jambulingam, Kathuria, intelligence and knowledge provision systems,
and Doucette (2005) use various within-industry customer target marketing, and environmental
clusters to classify these pharmacy sectors and test considerations as vital feeds into the business-
the entrepreneurial orientation of these sectors. customer encounter.
They consider the environment, organizational
factors, and performance outcomes within this Mapping Business and customer
framework. Wright and Taylor (2003) consider contact Parameters
inter-organizational knowledge as important and
define innovative culture, information quality, The above factors may be drafted into a possible
initial pharmacy business competitive require-


Service Value Networks

ments questionnaire set that encapsulated the An independent or owner operator pharmacy
relative level(s) of service integration offered. A (max of 3 pharmacies)
customer requirements questionnaire is developed A member of a small pharmacy chain (3 to
to determine the customers needs, wants, and 10 pharmacies)
economic value requirements, and tested using A member of a large pharmacy chain (>10
a pre-pilot sample of pharmacies and custom- pharmacies; typically 100-350 stores)
ers. Aligned question blocks mapping business A mass merchandiser pharmacylike
deliverables to customer perceived needs, wants, priceline with diverse ranges of cosmetics,
desires, and economically acceptable price tags giftware, and food items in conjunction with
may be used to develop suitable industry-wide a pharmacy dispensary
questionnaires. After pilot testing in the market- A fully online pharmacy modellike e-
place, survey validation and reliability tests, and pharmacy
final survey instrument refinement, the business A hospital pharmaceutical outpatient dis-
perspectives (business performance and customer pensary
perceived value), and business-customer dyad A large 600m2 plus, price leader pharmacy
perspectives, may be tested across the industry warehouse
according to the measures outlined in Table 5. A pharmacy prescriptions outlet attached
to a medical center
Business Perspectives
Each model offers points-of-difference,
Existing pharmacy models may be analyzed to ranging from independence to degrees of group
determine relative points of synergy and key purchasing and delivery, to bricks-and-clicks
points of difference. Existing pharmacy models pharmacy/online operations, through to pure
include: online-type operations. These various models

Table 5. Aligned survey instrument questionnaire blocks

Table 5a - Business Performance Value Perspectives


Business Analysis Fields Customer Analysis Fields
1. Competitive positioning: industry, innova- 1. Competitive positioning: industry, manage-
tive/entrepreneurial, positioning, risk/re- ment, strategy, innovation
sponse
2. Customer targeting: recognition, guarantees, 2. Customer targeting: cost, quality, delivery/
customerization, accessibility, feel availability by industry
3. Services/products offered: brands/generics, 3. Services/products: reliability, range/knowl-
value additions, comparisons, information/ edge offered by industry
training, latest alternatives
4. IT deliverables: degree of complete network- 4. IT used: Industry Web site /browser access,
ing, data analysis, logistics/shipping, website, business-information /purchase option
interactivity/recognition
5. Operational delivery: supply networks, 5. Services/products delivery: fast, accurate,
products/services / after sales services, Web consistent, responsive, empathetic, quality as-
site, distributed databases access/mined infor- sured, technically supported, trained delivers,
mation, staff, values additions/fee-for-service low cost
activities


Service Value Networks

Table 5. continued

Table 5b - Business-Customer Dyad Perspectives


Business Analysis Fields Customer Analysis Fields
1. Customer monitoring: visitors/purchasers, 1. Customer satisfaction: services offered,
sales-per-day, prescriptions-per-day, loyalty, product ranges, IT information, expectations,
perceived value, revenue-per-sale innovativeness, new ideas
2. Web site usage: ordering/purchasing, infor- 2. Web site access/usage options: accredited,
mation, communications; time, reliability, save time, source contacts, product knowledge/
accuracy and effectiveness information, order/purchase, check delivery,
retrieve personal data
3. Innovation offered: advice sessions/customer 3. Innovation: information, new fields, services/
reports (tax, expenses, drug consumption/side support /follow-ups, hazards, evaluations
effects, risks, health), remote access, peripheral
services, health management
4. Value to customer: needs met, wants met, 4. Customer value: convenience, experienced
customer importance level, added value efficient consultation, payments, service,
feedback, additional information information and access, relationship strength,
safeguards, personalization
5. Economic value: market share, value-per 5. Economic value: scaled quality, scaled reli-
customer, visits-per time, net earnings ability, scaled servicing skills, scaled servicing
time, scaled accessibility, scaled pricing

may house synergies, including shared marketing, The sourcing of new opportunities in re-
group innovations, and joint Australian Pharmacy sponse to challenging market conditions
Guild research activities. The direct response to the competitive ma-
Investigation of the eight active pharmacy neuvers of rivals
models highlights business-customer perceived The new business opportunities identified
relative industry competitive positioning. This by employees
survey approach captures innovative/entrepre-
neurial approaches, competitive positioning Australian pharmacies operate in a competitive
strategies, and relative risk/response strategies. world, and this affects their delivered business
Jambulingham et al. (2005) use risk tak- model and strategies. This environment should
ing, innovativeness, proactiveness, competitive also be captured locally (Greenwald & Kahn,
aggressiveness, and autonomy as a key part of 2005). Immediate degree of competition, growth
their pharmacy industry competitiveness scaling prospects, and competitor analysis provide such
classification. These strategic components are a framework. These measures are included as
captured as follows: follows:

The tendency to take risks The degree of local market competition


The experimentation with new services between pharmacies
The approach to challenges The prospects for business growth in the
current business environment

00
Service Value Networks

The projected market growth for local com- The delivery of customer service requests
peting pharmacies within timeframe(s) specified
The lowest cost provider
The degree of responsiveness to changes in the The convenience of 24-hours-a-day, 7-days-
competitive environment is tested in the pharmacy a-week, 365-days-a-year service
situation using correctness, completion, adaptiv-
ity, and management (Jambulingam et al., 2005). The services and products offered are mea-
These are measured using: sured using brands/generics, value additions,
comparisons, information/training, and latest
The degree of emphasis to follow formal alternatives. These are mapped against the
procedures and rules customers services and product requirements
The degree of emphasis to get things done of reliability, range, and explanatory information
The ability to adapt to changes in the busi- (knowledge) offered by industry. These important
ness environment services and products are captured by:
The accepted management style in handling
ambiguous situations. The medical and health product range of-
fered to meet customer needs
These measurement tools, along with the The general product range offered to cus-
demographic measuresage group; respondent tomersincluding generic (low-cost) solu-
role/occupation; country where live; pharmacy tions
access days and time; annual turnover; gender; and The specific, product-related customer in-
pharmacy postcode, locality, and population center formation offered
size servedare used to analyze the respondent The formal annual staff training
business surveys and its customer surveys. The supply chain networks for medical and
The business surveys capture detailed stra- health products
tegic, competitive, performance, and customer
alignment information (Hamilton, 2004a, 2004b, The IT deliverables and information flows are
2005a, 2005b; Hamilton & Selen, 2005). Target- captured by the degree of complete networking,
ing strategies deliver business points of competi- data analysis, logistics and shipping, Web site
tiveness (Hamilton, 2005a). These competitive interactivity, and IT recognition IT software
strategies require the business components of used (Narasimhan & Kim, 2002; Swaminthan
recognition, guarantees, customerization, acces- & Tayur, 2003). These are mapped against cus-
sibility, and feel to be aligned with those of the tomer industry Web site/browser access, busi-
customercost, quality, delivery/availability by ness-information, and purchase options, and are
industry. Such customer targeting strategies are measured by:
captured by:
The software programs used to operational-
The customer responseboth needs and wants ize in-store network services
The offer of guaranteed, high-quality brands The standardized network software pro-
The offer of cheaper generic alternatives to grams used to connect to our pharmacy
guaranteed, high-quality brands groups computer networks
The delivery of individual attention The national networked pharmacy group
The recognition of a customers name, and the database measures collected and shared
offer of personalized value-adding service(s) with the group to develop better solutions
and cost savings

0
Service Value Networks

The degree of integrated networking with The prescriptions issued per hour, day, or
key suppliers, facilitating reduced stocking month
levels, automatic reordering, and shipping The loyalty measures like the number of re-
The web site delivering extended customer visits (or sales) to a customer per unit time
services and sales The customer perceived value in purchases
The pharmacy operating as an e-business Customer satisfaction measures
model operation The revenue amount per sale

The industry operational delivery systems Considering Web site usage, the additional
of supply networks, products/services/after- dyad business measures of ordering and pur-
sales services, partnering Web sites, distributed chasing, information, communications, time,
databases, stored and mined business informa- reliability, accuracy, and effectiveness are studied
tion, staff, value additions, and fee-for-service in conjunction with customer-related views of
activities are matched against customer-related business accreditation, time savings, sourcing
requirements concerning services and/or product contacts, product knowledge/information acces-
delivery. Fast, accurate, consistent, responsive, sibility, simple ordering and purchasing, delivery
empathetic, quality-assured, technically sup- process monitoring, and personal data retrieval
ported, trained delivers, and low-cost options (Abdinnour-Helm et al., 2005). Business Web site
are included. operational areas include:

Business-customer Online business offerings to customers via


Dyad Perspectives an interactive e-pharmacist web site
Online customer purchases and ordering of
The business-customer dyad encompasses the government-allowed items
vital delivery of services from business to cus- Greater information and knowledge deliver-
tomers and vice-versa (Frohlich & Westbrook, ables throughout the pharmacy group, suppli-
2002; Chen & Paulraj, 2004; Jambulingam et al., ers, and in response to customer searches
2005; Chenhall, 2005). This encounter has been Effective and efficient retrieval of individual
rarely quantitatively investigated. This extensive customer pharmacy purchase history.
study seeks to open new understandings of this
vital business alignment. The business presents various innovations
The business monitors its customer encounters including advice, sessions and customer reports
using visitors and their purchasers, sales-per-day, (like tax, expenses, drug consumption/side ef-
prescriptions-per-day, loyalty, perceived value, fects, risks, health), remote access, peripheral
and revenue-per-sale. These features are mapped services, and health management (Wright &
against the customer satisfaction indicators of ser- Taylor, 2003; Narasimhan & Kim, 2002). From
vices offered, product ranges available (Chang Lee the customer perspective, information, new fields,
et al., 2005), IT information accessible, customer services/support /follow-ups, hazards, and evalua-
expectations, perceived innovativeness, and new tions/feedback are measured. Innovative business
ideas. Business pharmacy monitors include: options may include:

The pharmacy visitor numbers Additional support documentation to a


The number of sales per day customer purchase
The information requests per day or per month Prescription records management

0
Service Value Networks

Health information for patients Anticipating and responding to our customers


Tax return pharmacy medical purchase history evolving new wants (or new expectations)
Asthma and/or diabetes care management Giving the latest information and solutions
In-pharmacy immunization to every customer enquiry prescription, or
Patient consulting and compliance programs possible purchase
Blood testing
Talk to the doctor/pharmacist online The business measures its economic value via
Phone calls to patients to monitor pharma- market share, value per customer, visits per time,
cotherapy and reminder scripts and net earnings (Jambulingham et al., 2005).
Database connections to local doctor and From the customer perspective, economic value
local health options delivers quality, reliability, servicing skills, time
Remote pharmacist advice via phone, com- efficiency, accessibility, and acceptable pricing.
puter, pda, or mobile connections Business measures include monitoring.
Drug side-effects reports
Home delivery services Improvements in market share
Formal evaluation of patients health risks The growth in the value of each customers
Fees for specialist pharmacy services advice total purchase value per visit
Prospective drug utilization reviews Employee sales per day and per month
Daily drug lot packaging Improvements in earnings

The business targets delivering value to its Two survey data sets (business and customer)
customers by meeting their collective needs and analyzed predominantly by factor analysis and
wants; it prioritizes customers via their importance structured equation modeling show relative de-
level, offers added-value feedback, and additional grees of alignment. Business performance and
supporting information. customer value may thus be modeled, and resultant
statistical equations may be interpreted and used
customer-Related Perspectives to build customer-targeting business solutions.
Hence the industry may utilize such measurements
The customers perceived value is seen as consul- to optimize its customer-delivered performance
tation advice, online or in-store payments, suitable relative to its service offerings, operations, mar-
access to their desired service(s), the strength keting and sales, IT/communications, positioning,
of their relationship, safeguards regarding their and value-adding offerings.
personal information, and the way the service Such solutions allow the pharmacy indus-
delivery is personalized and customerized (or try business models to reassess and map new
individually targeted) (Hamilton, 2004a). The customer-targeted pathways towards enhanced
business determines its customers importance competitive positions. Data analysis to date indi-
by measuring their success in: cates that an industry-wide service value network
approach is capable of delivering the necessary
Meeting the needs of our customers connectivity, storage, and retrieval infrastructure
Adding its database product knowledge requirements to ensure this industry remains
and customer details to each customer highly competitive, and a build solution is cur-
purchase rently being mapped, with business intelligence
Ensuring its customers desires always come tools already under development.
first, ahead of the pharmacys

0
Service Value Networks

This industry-wide analysis shows that the network pharmacy model involving high levels
pharmacy industry in Australia currently oper- of business-customer interactivity.
ates across multiple business performance levels, The service value network is a smart business
typified by degrees of technological use and network solution for the pharmacy industry. It
service encounter. The lowest level of service delivers a dynamic, highly competitive, agile
encounter is typified by a busy individual store set of solutions, which are projected to keep its
with little or no computerized operations, and business members in a strong position regarding
constitutes the oldest and least-value-adding its key potential domestic competitors like super-
model. The next level of customer interactivity markets, hospital chains, and medical services.
captures those pharmacies with degrees of supply These business sectors are all keen to enter the
chain inter-connectivity, and some computerized pharmacy marketspace, but they currently lack
operations that engage aspects of their supply government approval and the market intelligence
chain and logistics systems. The third level of to compete directly.
service encounter is exemplified by pharmacy Thus an industry-wide business and customer
groups like e-Pharmacy. This operation offers research process sets the framework and knowl-
a bricks-and-clicks solution (order online or edge-base from which the pharmacy industry may
off-line and have non-prescription requirements plan its own unique forward-looking competitive
home delivered with prescriptions available at pathways. It delivers industry-specific knowledge
the nearest e-Pharmacy store). The e-Pharmacy concerning competitiveness and future competi-
solution offers a targeted customer response to a tiveness, strategic alignment, higher industry per-
business service request. It utilizes sophisticated, formance capabilities, and their delivery; a deep
well-integrated information systems. This model understanding of value-adding solutions and their
updates and data mines its customer databases, relevance, customer satisfaction measures, and
and delivers focused responses to individual customer perceived value measures; and finally,
customer demands. The fourth level of service is delivers the ingredients from which an aligned,
the industry-wide service value network. Here, high performance service value network may be
fully integrated computerized solutions are constructedone that is capable of delivering
intelligently delivered to the customer, via the the needs, wants, desires, and value for money
serving staff, the pharmacist, or via direct online solutions the customer desires.
customer engagement. The service value network
is continually mined via its business intelligence
tools to deliver the most appropriate customer- FUtURe tRenDS in SeRVice
ized (one-on-one) business-customer solutions VALUe netWoRKS
possible from its systems. It also delivers elevated
customer services incorporating additional value This service industry, research-based, indus-
solutions like medicine side effects information, try-wide approach to enhancing business per-
suggested dosage procedures, and the like. The formance, business-customer alignment, and
service value network model is a complex solution, customer value is directly applicable to other
and requires substantial industry-wide knowledge service-based industries like the financial services
sharing and reengineering. It also involves making sector, the real estate sector, the medical sector, the
a disruptive business transition from the simpler, education sectors, the accountancy sector, and the
less complex service models (Christensen, 2004; like. With further refinement, this model is also
Evans, 2002) to a new dynamic service value predicted to also be applicable to service industries

0
Service Value Networks

in other countries, and possibly to polycentric or These two real estate sectors display different
geocentric service companies. linkages into the financial services sector. For
example, corporate real estate transaction deci-
example of an Australian Future sion making often involves detailed risk-related
Service Value network assessments to improve strategically aligned deci-
sion making and potential asset sales, while retail
The financial services sector in Australia is closely real estate transactions are more likely to pursue
allied with many industries, including the real the best interest rate and repayment schedules,
estate industry. Currently, linkages between the along with personalized needs-based, value-add-
financial services sector and real estate industry ing product solutions. Hence a dual development
are largely informal, and beyond the control of e-strategy (or service value networks strategy)
the financial services sector industry. approach may be adopted.
The existing online real estate model is ex- Once basic dual-segment, high-level, research-
pensive and outdated. It houses all the off-line based deliverables have been deduced and evalu-
costs and numerous inefficient small-scale real ated, relationships determined, models built, and
estate solutions. In addition, two real estate sec- pilots tested, incorporating approaches similar to
tors existthe corporate and the retail sectors. those of the pharmacy industry, then a financial
It is possible to merge the corporate real estate services sectorreal estate service value network
market (focusing on its business-to-business gateway (or alliance portal) is deliverable. This
customers) and the retail real estate market (fo- relationship is outlined in Figure 8. Information
cusing on its business-to customer markets) under aspects tracked and/or developed specifically for
a financial services sectorreal estate service the corporate real estate one-stop-shop model
value network gateway. This model is displayed or for the retail real estate supermarket model,
in Figure 7.

Figure 7. The financial services sectorreal estate service value network gateway

Financial Services
Sector

Financial - Real
Estate Service
Value Network
Gateway

Corporate Real Retail Real Estate


Estate Sector Sector
One-Stop-Shop Supermarket
B2B Model B2C Model

0
Service Value Networks

in some cases, may be of practical use (possibly Provided it operates under a new Service value
incorporating deliverable variations) to the other network business model similar to the concept
real estate system. Such developments may then of a supermarket, and based on an expanded
be intelligently data-mined and incorporated into service concept and offering lower cost struc-
the financial services sectorreal estate service tures to that existing in retail real estate, greater
value network gateway. transaction efficiencies, scalability, and increased
Retail real estate is a buyer-seller service with effectiveness will likely emerge. In addition
clear intrinsic links to the financial services sec- customer satisfaction is enhanced via additional
tor (consider mortgage, tax consulting, and risk and customized solutions like conveyancing,
management). Currently the retail real estate financing, and the like. Finally this service value
sector operates in an outdated corner store network model also allows the financial services
business model, based on fairly fixed commis- sector (via its gateway) to compete on cost, given
sion schemes and undifferentiated roles of retail the greater efficiencies and collaborate network
real estate agents as intermediaries. The corner of alliance partners. Such a supermarket retail
store model translates to retail real estate agents real estate model may be facilitated through the
operating quasi-independently, each with their development of a category killer retail real estate
geographically constrained portfolio and unable to portal platform. By leveraging its capabilities and
compete on cost, given the size of the market and targeting new business/customer value proposi-
their fixed cost structures. The online equivalent tions, the Australian financial services sector may
is merely all these small agents placing their offer- transform its corporate real estate activities into a
ings on a real estate portal, with sales transactions smart, risk-aware, networked, highly competitive,
completed at a retail real estate agents office and on-demand, one-stop-shop model.
all existing cost structures maintained. Galloway and Adam (2000) believe real estate
Corporate real estate is differentiated from portal models in Australia deliver early produc-
retail real estate in that it encompasses all real tivity increases, and also may gain competitive
estate assetsowned, under purchase, or leased advantage by lower operating costs. A financial
by a business (which is not primarily engaged in services sectorreal estate service value net-
real estate transactions). The corporate real estate work gateway is readily capable of substantially
market offers new scope for the financial services lower transaction costs. In addition, while some
sector with its links to corporate real estate manage- portals adopt a revenue growth model, the finan-
ment. To date, carefully derived corporate real es- cial services sectorreal estate service value
tate business solutions (offering research-derived, network gateway delivers gains from productivity
time-scoped, environmentally matched, service- increases and service augmentation, and not from
analyzed, strategically planned, and financially an expanded geographic market or from a growing
sound solutions) are rarely available. Unleashing local market. Reduction of intermediaries, along
such information to corporations may project the with associated savings on property search and
corporate real estate market closer to the financial consultancy fees, sales commissions, and loan
services sector, and may move significant revenue and insurance commissions, are also deliverable
streams from real estate agents and intermediaries under such a service value network. In effect the
directly to the financial services sector. Thus cor- financial services sectorreal estate service value
porate real estate customers would likely benefit, network gateway offers a category killer real es-
experiencing significant transaction savings. tate portal with content, software, mined financial
The Australian financial services sector is cur- solutions, and risk analysis, along with significant
rently in a position to enter this real estate market. cost efficiencies. This solution is distinctly dif-

0
Service Value Networks

ferent from those offered by current major retail concLUSion


real estate portals (like realestate.com.au) in that
the underlying financial services sector business The service value networks approach draws
model does not feed back into a traditional retail e-supply chains into a total business solution.
real estate commission-based business model, but It offers a new customer-driven perspective for
rather facilitates an end-to-end, on-demand solu- business. It provides the framework from which
tion with which financial service organizations strategic positioning of an industry or corpora-
may diversify their service portfolio and compete tion may be secured. It targets delivering longer
successfully with the real estate sector at large. term, more sustainable, agile, and competitive
Retail real estate portals target their value-add- solutions for the industry or corporation and its
ing activities towards effective Web presence and partnering businesses. A knowledge-sharing ap-
virtual searching facilities. A Service Value Net- proach incorporating business intelligence tools
works Financial Services Sector Gateway offers an (which sometimes incorporate approximation or
end-to-end and highly customized solution set to fuzzy logic techniques) is used to tap into linked
a captive primary business and end-user customer databases across the partnering network and sup-
base. In addition the financial imperative to enter ply chains. Information requested by customers
this arena is substantial. is sieved, and the allowed best solutions available
In the 2002-2003 financial year, Australian across the service value network are then delivered
Bureau of Statistics data show retail real estate to the customereither via online feedback or
transactions exceeded A$7.524 billion (ABS Data), via industry-based customer service personnel
and retail commissions generated in excess of A$188 delivering direct customer feedback. Customer
million. The industry operated from 11,722 offices needs, wants, desires, and economic value are gen-
and employed around 76,599 persons. Reported erally targeted. Service value networks are under
corporate real estate sales in the 2002-2003 finan- development in several places and are perceived as
cial year were low at A$523 million. However, this one pathway towards future competitiveness. This
figure does not accurately represent corporate real model has direct application within the services
estate sales, as many are reported under different industry, and aspects of it are in development (or
categories as partial asset sales, company asset in operation) in the real estate, tourism, educa-
transfers, special lease back formats, and the like. tion, pharmacy, and airline industries. E-supply
In 2006 one corporate asset sale (Woolworths 11 chainsconnecting both direct and indirect (or
distribution centers) totaled A$846 million. Thus peripheral) partnersdeliver much of the back-
very large revenue streams are possible when build- end to service value networks, provided their
ing such an industry-wide Financial Services Sec- connected business information systems allow
torReal Estate Service Value Networks Gateway. for detailed sharing and mining of information
Real estate industries in several other countries are back down, up, and across the fully networked
also in need of major updates in their approaches to e-supply chains.
corporate and retail customer deliverables, charges, To develop a service value network for any
and value adds. This requires e-supply chains ef- industry, a detailed knowledge base must be es-
fectively networkedas a service value network, tablished. This involves business and customer
sharing their information and being collectively research, alignment assessments, strategic part-
mined to deliver specific best business and cus- nering, and building correct, complex, and largely
tomer-focused solutions. non-replicable networked solutions that ensure
the industry has a greater chance of retaining
its competitiveness in the global business arena

0
Service Value Networks

of tomorrow. The evolution to an industry-wide attitude, and purchase intention: The mediating
service value network approach delivers improved role of presence. Journal of Advertising, 1-42.
performance and customer value, incorporating
B ow m a n , R . (2 0 01, O c t o b e r). Fa s t
close business-customer alignment. In addition, its
deploymentquick return help sell IT in a slow
research-based solution set also incorporates key
economy. Global Logistics and Supply Chain
business-customer elevated service offerings.
Strategies.
Briggs, R., & Hollis, N. (1997). Advertising on
ReFeRenceS the Web: Is there a response before click-through?
Journal of Advertising Research, 37(2), 33.
Abdinnour-Helm, S., Chaparro, B., & Farmer, S.
Brown, S., & Vashistha, A. (2002). Igniting the
(2005). Using end-user computing satisfaction
services value chain. Journal of Marketing Man-
(EUCS) instrument to measure satisfaction with
agement, 11(1), 12-13.
a Web site. Decision Sciences, 36(2), 341-364.
Chang Lee, K., Lee, S., & Kang, I. (2005). KMPI:
Akkermans, H., & Vos, B. (2003). Amplification in
Measuring knowledge management performance.
service supply chains: An exploratory case study
Information and Management, 42, 469-482.
from the telecom industry. Journal of Production
and Operations Management, 12(2), 204 -223. Chen, I., & Paulraj, A. (2004). Towards a theory
of supply chain management: The constructs and
Albrecht, K., & Zemke, R. (1985). Service
measurements. Journal of Operations Manage-
America! Doing business in the new economy.
ment, 22, 119-150.
Homewood, H: Dow Jones-Irwin.
Chen, Q., & Wells, W. (1999). Attitude toward the site.
Anwar, S., & Hamilton, J. (2020). Tourism into
Journal of Advertising Research, 39(5), 27-38.
the futuretowards 2020, and beyond. Tourism
Recreation Research Journal, 30(3), 77-87. Chenhall, R. (2005). Integrative strategic perfor-
mance measurement systems, strategic alliance of
Bagchi, S., Gallego, G., Grey, W., Katircioglu,
manufacturing, learning and strategic outcomes:
K., Seybold, D., Shi, D., & Stefanis, S. (2003).
An exploratory study. Journal of Accounting,
An analytical approach for quantifying the value
Organizations and Society, 30, 395-422.
of e-business initiatives. IBM Systems Journal,
42(3), 484-497. Comer, D. (1995). Internetworking with TCP/IP
volume 1: Principles, protocols, and architecture.
Barlow-Hills, S., & Sarin, S., (2003). From market
Englewood Cliffs, NJ: Prentice-Hall.
driven to market driving: An alternative paradigm
for marketing in high technology industries. Comergent Business Strategies. (2003). Retrieved
Journal of Marketing Theory and Practice, April 10, 2004, from http://www.comergent.com/
11(3), 13-24. products/valuepropositions.cfm.
Barney, J. (1991). Firm resources and sustained Cutler, M., & Sterne, J. (2002). E-metrics (pp.
competitive advantage. Journal of Management, 1-62). Cambridge, MA: NetGenesis Corp.
17, 99-120.
Davis, L., Dehning, B., & Stratopoulos, T. (2003).
Biocca, F., Li, H., & Daugherty, T. (2002). Impact Does the market recognize IT enabled competitive
of 3-D advertising on product knowledge, brand advantage? Journal of Information and Manage-
ment, 40(7), 705-716.

0
Service Value Networks

Di Gregorio, J., & De Montis, F. (2004). NOIE Gartner. (2002). Gartner dataquest services files
information economy index 2003 (pp. 1-50). Re- 2004. Retrieved May 10, 2004, from http:// www.
trieved March 12, 2004, from http://www2.dcita. Gartner.com
gov.au/_data/assets/file/12294/NOIE_Index.pdf
Grant, R. (1996). Towards knowledge-based
Draaijer, D. (1992). Market orientedness of im- theory of the firm. Strategic Management Jour-
provement programs in manufacturing: Results nal, 17, 109-122.
from field study research. International Journal
Greenwald, B., & Kahn, J. (2005). All strategy is
of Operations and Production Management,
local. Harvard Business Review, 83(8), 1-11.
12(7), 24-40.
Hamilton, J., & Selen. W. (2005, December). An
Escrig-Tena, A., & Bou-Liusar, J. (2005). A model
e-enabled service value network for the phar-
for evaluating organizational competencies: An
maceutical industry. In Proceedings of the 5th
application in the context of a quality management
International Conference on Electronic Business
initiative. Decision Sciences, 36(2), 221-257.
(ICE2005), Hong Kong. (pp. 1-9).
Evans, N. (2002). Business agility: Strategies for
Hamilton, J. (2004a). Modeling, information
gaining competitive advantage through mobile
flows, performance, strategy and competitiveness
business solutions. Upper Saddle River, NJ:
across the service value network. Journal of New
Prentice-Hall.
Business Ideas and Trends, 2(2), 29-53.
Fenn, J., & Linden, A. (2002). Key technology
Hamilton, J. (2004b). Service value networks:
advances from 2003 to 2012: Disruptive advances
Value, performance and strategy for the services
in physical and logical connectivity, and in smart,
industry. Journal of Systems Science and Systems
embedded chips, will transform key business
Engineering, 13(4), 469-489.
functions in the next decade, No. AV-18-8822
(pp. 1-5). Gartner Research. Hamilton, J. (2005a). Service value networks: A
new approach to performance and the delivery of
Finch, B. (2003). OperationsNow.com. New York:
services. The E-Business Review, 5(1), 66-71.
McGraw-Hill/Irwin.
Ham ilton, J. (20 05b, July). Pha r macy
Forrester, J. (1961). Industrial dynamics. Cam-
industryservice value networks research.
bridge, MA: MIT Press.
Australian Pharmacy Guild, 1-8.
Foss, B., & Stone, M. (2001). Business to business:
Hoffman, D., & Novak, T. (2000). How to acquir-
Lessons on segmentation and other issues from
ing customers on the Web. Harvard Business
financial services markets. Journal of Financial
Review, 78(3), 179-188.
Services Marketing, 9(4), 306-313.
Hunt, S., & Morgan, R. (1996). The resource-
Frohlich, M., & Westbrook, R.(2002). Demand
advantage theory of competition: Dynamics,
chain management in manufacturing and ser-
path dependencies, and evolutionary dimensions.
vices: Web-based integration, drivers, and per-
Journal of Marketing, 60(3), 107-114.
formance. Journal of Operations Management,
20, 729-745. Jambulingam, T., Kathuria, R., & Doucette, W.
(2005). Entrepreneurial orientation as a basis for
Galloway, J., & Adam, S. (2000). Online property
classification within a service industry: The case
markets in Australia: Industry value transforma-
of retail pharmacy industry. Journal of Operations
tion. Retrieved April 25, 2006, from http://ausweb.
Management, 23, 23-42.
scu.edu.au/aw2k/papers/galloway/paper.html

0
Service Value Networks

Lee, H., Padmanabhan, V., & Whang, S. (1997). Piccoli, G., Brohman, K., Watson, R., & Para-
The bullwhip effect in supply chains. Sloan Man- suraman, A. (2004). Net based customer service
agement Review, 38(3), 93-102. systems: Evolution and revolution in Web site func-
tionalities. Decision Sciences, 35(3), 423-455.
Liang, T. (2003). The second wave of e-com-
merce: Successful transformation and business Schmenner, R. (1995). How can services busi-
models. In Proceedings of the 3rd International nesses survive and prosper? Sloan Management
Conference on Electronic Business (ICEB2003), Review, 27(3), 21-32.
Singapore.
Siegel, M. (2002). Seizing the opportunity: Exploit-
Lumpkin, T., & Dess, G. (1996). Clarifying the ing Web aggregation, White Paper No. 330 (pp.
entrepreneurial orientation construct and link- 1-14). Center for Information Systems Research,
ing it to performance. Academy of Management Sloan School of Management, USA.
Review, 21(1) 135-172.
Sterne, J. (2002). E-metricsbusiness metrics for the
Malcinski, A., Dominick, S., & Hartrick, T. new economy. Cambridge, MA: NetGenesis Corp.
(2001). Getting to know your audience is the key
Swaminthan, J., & Tayur, S. (2003). Models for
to online successmaking the numbers work for
supply chains in e-business. Management Science,
you (IBM white paper, pp. 1-11). Retrieved May
49(10), 1387-1406.
1, 2004, from http://www-106.ibm.com/devel-
operworks/web/library/wa-mwtl/ Swanson, R., & Davis, J. (2003). The relation-
ship of differential loci with perceived quality
Mayer, R., & Davis, J. (1999). The effect of the
and behavioral intentions. Journal of Services
performance appraisal system on trust for man-
Marketing, 17(2), 202-219.
agement: A field quasi-experiment. Journal of
Applied Psychology, 84(1), 123-136. Van Looy, B., Gemel, P., & Van Dierdonck, R.
(2003). Services management (2nd ed.). Upper
McCullough-Johnston, K. (2001). Why e-business
Saddle River, NJ: Pearson Education.
must evolve beyond market orientation: Applying
human interaction models to computer-mediated Vermijmeren, M. (2003). Software architecture
corporate communications. Internet Research: in supply chain management. Computers in In-
Electronic Networking Applications and Policy, dustry, 53, 165-178.
11(3), 213-225.
Winter, S. (1995). Four Rs of profitability: Rents,
McQueeney, D. (2003). IBMs evolving strategy. resources, routines, and replication. In C.A. Mont-
Research Technology Management, 46(4), 20-27. gomery (Ed.), Resource-based and evolutionary
theories of the firm: Towards a synthesis (pp.
Narasimhan, R., & Kim, S. (2002). Effect of sup-
147-178). Boston: Kluwer Academic.
ply chain integration on the relationship between
diversification and performance: Evidence from Wright, G., & Taylor, A. (2003). Strategic knowl-
Japanese and Korean firms. Journal of Operations edge sharing for improved public service delivery:
Management, 20, 303-323. Managing an innovative culture for effective
partnerships. In E.A. Coakes. (Ed.), Knowledge
Parasuraman, A., Zeithaml, V., & Berry, L.
management: Current issues and challenges (pp.
(1985). A conceptual model of service quality
187-211). London: IRM Press.
and its implications for future research. Journal
of Marketing, 49, 41-50.

0


Section II

E-Supply Chain Technologies


and Infrastructure


Chapter VI
Automated Data Capture
Technologies:
RFID

Vidyasagar Potdar
Curtin University of Technology, Australia

Chen Wu
Curtin University of Technology, Australia

Elizabeth Chang
Curtin University of Technology, Australia

ABStRAct

In this chapter we provide an introduction to RFID technology. We discuss the main components of the
RFID technology, which includes RFID transponders, RFID readers, RFID middleware, and RFID
labels. A detailed classification and explanation for each of these components is provided, followed by
the benefits and applications that can be achieved by adopting this technology. After discussing all pos-
sible applications, we describe the business benefits and how stakeholders can benefit. This is followed
by a detailed outline of the adoption challenges, where we discuss issues like the security, privacy, cost,
scalability, resilience, and deployment and some existing solutions. Once the issues are discussed, we
divert our attention to some successful RFID deployment case studies to describe the adoption of RFID
technology that has already begun and how many big organizations across the world are showing interest
in this technology. Since this chapter takes into consideration a variety of audiences like researchers,
business executives, business consultants, hobbyists, and general readers, we tried to cover material
relevant to each target audience. For business executives and consultants interested in knowing who can
offer complete RFID solutions, we allocated a dedicated section for RFID vendors where we provide
a comprehensive list of RFID vendors across the globe. For researchers, we listed some open issues in
the section of adoption challenges. For advanced users, in-depth technical details are provided in the
section where we discuss security and privacy enhancing protocols.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Automated Data Capture Technologies

intRoDUction RFID interrogator (reader). The RFID transponder


or the RFID tag (which is how it is often called)
Automated data capture is an important aspect is a microchip connected to an antenna. This tag
in supply chain management and logistics. In the can be attached to an object, which needs to be
last decade, automated identification and data uniquely identified, for example, it can be used in
capture (AIDC) has revolutionized the overall a warehouse to track the entry and exit of goods.
supply chain management process. AIDC includes This tag contains information similar to the bar-
technology to identify objects, and automatically code, which stores the unique properties of the
collects data about them and updates the data into object to which it is attached. An RFID reader
software systems without human intervention. can access this information. The RFID reader
Some examples of AIDC technologies include communicates with the RFID tag using radio
bar codes, RFID, smart cards, voice and facial waves. The radio waves activate the RFID tag to
recognition, and so forth. broadcast the information it contains. Depending
An automated inventory control systems on the type of tag used, the information transmit-
(AICS), which forms the backbone of the modern ted could be merely a number or detailed profile
supply chain, is a software application used in a of the object. The data fetched from the reader
warehouse to monitor the quantity, location, and can then be integrated with the backend ERP or
status of inventory. Modern AICS heavily relies SCM or WMS systems (Tecstra, n.d.).
upon barcodes, for automated data capture. There are two fundamental differences be-
A barcode basically is a machine-readable tween the conventional barcodes and the contem-
visual representation of information printed on porary RFIDs. First, RFIDs do not require line
the surface of objects. There are several different of sightthat is, objects tagged with RFID can
kinds of barcodes, for example, barcodes which be sensed in a wide area, and there is no need
store data in the widths and spacing of printed to individually scan all the objects in front of an
parallel lines, and those that store data within the optical scanner. Second, RFIDs offer item-level
patterns of dots, or concentric circles, or even taggingthat is, each item within a product range
hidden within images. This encoded data on the can be uniquely identified (e.g., 109839 is a bottle
barcodes is read by barcode readers, which up- of orange juice manufactured by ABC Company).
date the backend ERP, SCM, or WMS systems. However barcodes do not identify individual items;
However there are some inherent issues with they can only identify that this is a bottle of orange
using a barcode, for instance, barcodes become juice manufactured by ABC Company.
ineffective in rain, fog, snow, dirt and grime, Some other points could also be considered.
and so forth (Tecstra, n.d.). Since barcodes rely RFID has a longer read range compared to bar-
on optical sensors, any minor change on the bar- codes. The amount of data stored on barcodes is
code print can make it difficult to read. This can limited and often cannot be updated once it is
be commonly seen at point of sale (POS) in the printed. In comparison, RFID tags offer a con-
supermarkets, where the POS operator scans the siderably large amount of data storage capacity as
barcode several times because it is either wet or well as reprogramming capabilities, which means
not aligned properly. the data on the tag can be updated effortlessly.
To overcome these issues the industry is now These changes can be done without physically
looking at the possibility of using new genera- identifying the tag because the RFID reader can
tion AIDC technology like the RFID. A radio uniquely query the desired RFID tag and make
frequency identifier (RFID) system is basically the changes. From the security perspective RFID
composed of an RFID transponder (tag) and an tags can be placed inside the objects, however


Automated Data Capture Technologies

barcodes have to be printed outside. Another issue challenges for RFID adoption which include
with barcodes is the printing quality; substandard cost, security, and privacy. We then provide
printing can result in reading errors (Gloeckler, a road map for RFID adoption where we
n.d.; Tecstra, n.d.). provide a detailed deployment strategy for
There are several inherent advantages with RFID adoption in a business environment.
RFID technology; however to achieve widespread This can facilitate consultants, CEOs, and
adoption of RFID, issues like security, privacy, and CIOs to make informed decisions.
cost should be addressed first. In this chapter we 4. To explain benefits of adopting RFID
provide a detailed insight into RFID. The rest of solutions to business executives using real-
the chapter is organized in the following manner. world proven case studies. We do this by
The next section introduces the RFID technol- highlighting the benefits that RFID offers
ogy. We discuss RFID tags, RFID readers, and to different stakeholders, and later in the
RFID middleware. We then discuss the benefits chapter relating that to five successful RFID
that stakeholders can achieve by adopting RFID deployment case studies from supply chain
technology and provide an RFID Deployment domains. All these case studies provide an
Roadmap. In this section we also describe the insight into how RFIDs can facilitate busi-
steps that an organization should consider prior to nesses across multiple domains.
adopting RFID to streamline its business process.
The fifth section discusses the RFID adoption
challenges where we outline the existing issues, technoLogY oVeRVieW
which are the major obstacles in widespread adop-
tion. These issues are security, privacy, and cost. An RFID system is composed of three main ele-
Finally, before concluding the chapter, we discuss ments: an RFID tag (inlay), which contains data
three case studies in the supply chain domain that that uniquely identifies an object; an RFID reader,
have adopted RFID to enhance their business which writes this unique data on the tags and,
process and gain a competitive advantage. when requested, can read this unique identifier;
The main objectives of this chapter are: and an RFID middleware, which processes the
data acquired from the reader and then updates
1. To provide RFID novices with an introduc- it to the backend database or ERP systems (Weis,
tory illustration of the contemporary data Sarma, Rivest, & Engels, 2004).
capture technologyRFID. This is covered A typical RFID system is shown in Figure 1.
in the next section of this chapter. When the RFID tag comes in the range of the RFID
2. To offer RFID advanced users a comprehen- reader, the reader activates the tag to transmit its
sive survey of RFID technology from both unique information. This unique information is
technical and business perspectives. This is propagated to the RFID middleware, which ap-
covered in detail in the following sub-sec- propriately processes the gathered information
tions where we give an in-depth explanation and then updates the backend database.
of the different types of RFID tags, RFID
readers, and RFID middleware. RFiD tags
3. To illustrate the well-identified RFID adop-
tion challenges and their corresponding An RFID tag is a microchip attached with an
deployment strategies for business consul- antenna to a product that needs to be tracked. The
tants. This is covered later in the chapter, tag picks up signals from the reader and reflects
where we begin by highlighting the main back the information to the reader. The tag usu-


Automated Data Capture Technologies

Figure 1. RFID architecture (Source: Potdar, Wu, & Chang, 2005)

ally contains a unique serial number, which may have a read range of several 100 meters and
represent information, such as a customers name, are very expensive (more than US$20), and
address, and so forth (RFID Journal, 2006a). A hence are used for tracking expensive items;
detailed classification is discussed next. for example, the U.S. military uses these
tags to track supplies at ports (Lyngsoe,
Classification n.d.; RFID Journal, 2006a).
Semi-active tags (or semi-passive or bat-
RFID tags can be classified using three schemes. tery-assisted) also contain a battery, which
First, the tags can be classified based on their is used to run the circuitry on the microchip,
ability to perform radio communicationactive, however it still relies on the readers mag-
semi-active (semi-passive), and passive tags. netic field to transmit the radio signal (i.e.,
Second, the tags can be classified based upon information). These tags have a larger range
their memoryread-only, read-write or write- because all the energy supplied by the reader
once, and read-many. Finally, the tags can also be can be reflected back to the reader (RFID
classified based on the frequency in which they Journal, 2006a), which means it can work at
operateLF, HF or UHF. low-power signal levels as well. These tags
have a read range up to 100 meters and may
Active vs. Semi-Active cost a dollar or more (Lyngsoe, n.d.; RFID
(or Semi-Passive) vs. Passive RFID Journal, 2006a). Some of these tags often
Tags are dormantthat is, they are activated by
the presence of a readers magnetic field.
Active tags have a battery that provides Once activated, the battery runs the circuitry
necessary energy to the microchip for trans- and responds back to the reader. This is a
mitting a radio signal to the reader. These mechanism to save the battery power (RFID
tags generate the RF energy and apply it Journal, 2006a).
to the antennae and transmit to the reader Passive tags completely rely on the energy
instead of reflecting back a signal from the provided by the readers magnetic field to
reader (Lyngsoe, n.d.). These batteries need transmit the radio signal to and from the
to be recharged or replaced once they are reader. It does not have a battery. As a result,
discharged. Some tags have to be disposed the read range varies depending upon the
off when the batteries run out of power reader used (Lyngsoe, n.d.). A maximum
(Gloeckler, n.d.; Tecstra, n.d.). These tags


Automated Data Capture Technologies

distance of 15 meters (or 50 feet) can be frequency spectrum (Beherrschen, n.d.).


achieved with a strong reader antennae and RFID systems operate in four frequency
RF-friendly environment (Sweeney, 2005). bands: LF, HF, UHF, and Microwave. The RFID
tags designed to operate in this frequency have
Read-Write vs. Read-Only RFID Tags special characteristics. We now discuss each of
these kinds of RFID tags in detail.
Read-only tags: The reader can only read
data stored on such tags. The data cannot be Low Frequency (LF)
modified in any manner. The tag manufacturer In LF range, RFID tags operate at 125 kHz or
programs the data on the tag. Such tags are 134.2 kHz frequency (Lyngsoe, n.d.; RFID Jour-
comparatively very cheap (Tecstra, n.d.). nal, 2006a; RMOROZ, 2004). Some important
Write-once read-many (WORM): The characteristics of these tags are as follows:
owner of the tag can program the data by
writing the content on the tag. Data stored on Tags in this range are not affected by me-
this tag can be written only once, however tallic surroundings and hence are ideal for
it can be read many times (Sweeney, 2005; identifying metal objects like vehicles, tools,
Tecstra, n.d.). containers, and metallic equipments.
Read-write tags: Data stored on such tags The reading range varies from a few centi-
can be easily edited when the tag is within meters to a meter depending upon the size
the range of the reader. Such tags are more of the antennae and the reader used (RFID
expensive and are not often used for com- Journal, 2006a; RMOROZ, 2004).
modity tracking. These tags are reusable; These tags can also penetrate through water
hence they can be reused within an organi- and body tissues, and hence often used for
zation (Tecstra, n.d.). animal identification (RMOROZ, 2004).
These are often used at places where tagged
LF vs. HF vs. UHF vs. Microwave objects are moving at a lower speed and
Frequency RFID Tags very few objects are scanned per second
(Lyngsoe, n.d.).
RFID systems are classified as radio systems Most car immobilizers rely on LF tags. The tag is
because they generate and radiate electromag- embedded in the key while the reader is mounted
netic waves. Hence the RFID systems should in the ignition area (RMOROZ, 2004).
operate within certain frequency limits like the Data transfer rate is low, for example, 70ms
LF, HF, or UHF. Since some of the frequencies for read operation. This is because at low
are already in use by police, security services, frequency the communication is slower.
industry, medical, or scientific operations, there In an industrial setting, electric motors
is a limited number of frequencies available for can interfere with LF RFID operation
RFID systems to operate. Figure 2 shows the radio (RMOROZ, 2004).

Figure 2. Radio frequency spectrum (Adapted from http://en.wikipedia.org/wiki/Super_high_frequency)

Radio spectrum
ELF SLF ULF VLF LF MF HF VHF UHF SHF EHF
3 Hz 30 Hz 300 Hz 3 kHz 30 kHz 300 kHz 3 MHz 30 MHz 300 MHz 3 GHz 30 GHz
30 Hz 300 Hz 3 kHz 30 kHz 300 kHz 3 MHz 30 MHz 300 MHz 3 GHz 30 GHz 300 GHz


Automated Data Capture Technologies

Most LF-based systems can only read one HF tags normally work best when they are in
tag at a timethat is, they do not sup- close range with the reader (around 90cm).
port reading multiple tags simultaneously Secondly the orientation of the tags with
(RMOROZ, 2004). respect to the reader plays a major role. For
These tags are more expensive ($2 or more) to optimum communication range, the tag and the
manufacture than the HF tags because of the reader should be parallel. If however they are
size of the antennae (RMOROZ, 2004). perpendicular, the communication range may
This frequency is used worldwide without reduce dramatically (RMOROZ, 2004).
any restrictions. In Canada, Shell uses HF RFID for its Easy
Pay customer convenience program. In Hong
High Frequency (HF) Kong Octopus card is used in public transit
In the HF range, RFID tags operate at 13.56 MHz service. In the Netherlands, the Trans Link
(Lyngsoe, n.d.; RFID Journal, 2006a; RMOROZ, System uses contact-less smart cards to offer
2004). Some important characteristics of these contact-less ticket solutions. The World Cup
tags are as follows: in Germany used tickets embedded with HF
tags (RMOROZ, 2004).
HF tags can penetrate through most materials This frequency is used globally without any
including water and body tissues, however restrictions. However in certain countries
they are affected by metal surroundings the power of the reader is restricted.
(Gloeckler, n.d.; RMOROZ, 2004). Global standard: ISO 15693, 14442, 18000-3.
The thickness of the tag is typically less than
0.1mm and comes with variable antennae Ultra High Frequency (UHF)
sizes. Bigger antennae offer more commu- In the UHF range, RFID tags operate at 433 MHz,
nication distance. 860-956 MHz, and 2.45 GHz (Lyngsoe, n.d.; RFID
The reading range is normally less than a Journal, 2006a; RMOROZ, 2004). Most research
meter (100cm). work is dedicated to RFID in the frequency range
HF tags are comparatively cheaper (less of 860-956 MHz. Some important characteristics
than $1) than the LF tags. of these tags are as follows:
The data transfer rate is higher compared to
LF tags, for example, 20ms for read opera- Multiple tags can be read simultaneously,
tion. This is because at high frequency the for example, at least 200 tags (theoretically
communication is faster. 800 possible) (RMOROZ, 2004).
In an industrial setting, electric motors UHF tags operating at 860-956 MHz fre-
do not interfere with HF RFID operation quencies offer better read range by using
(RMOROZ, 2004). short antennas.
The reader can read multiple tags simultane- The reading range is normally 3-6 meters
ously. This is termed as anti-collision. There (RMOROZ, 2004).
are many anti-collision protocols to prevent UHF tags are normally less expensive than HF
the reader from reading the same tag more tags because of low memory capacity and simple
than once. Depending upon the reader used, manufacturing process (RMOROZ, 2004).
at least 50 tags can be read simultaneously Such tags are commonly used on objects that
(RMOROZ, 2004). are moving at a very high speed, and a large
number of tags are scanned per second in
the business contexts such as supply chain,


Automated Data Capture Technologies

warehouse, and logistics. These devices container, its destination or origin, and so forth
may have a range of 7.5metres (or 25 feet) (Sweeney, 2005; Tecstra, n.d.).
or more (Lyngsoe, n.d.; Tecstra, n.d.).
UHF tags do not work well in liquid and in Antennae
metal surroundings.
Larger read range limits their use to banking The tag antenna is the conductive element that
and access control applications, because the enables the transmission of data between the tag
access card may be scanned from a longer and the reader (RFidGazzete, n.d.). Antennae
distance and some unauthorized person play a major role in deciding the communication
might gain entry in restricted premises on distance; normally a larger antenna offers more
your behalf. area to capture electromagnetic energy from the
One major hindrance for widespread adoption reader and hence provides a greater communica-
of UHF RFID is lack of globally accepted tion distance. There are several kinds of antennae,
regulations. For example, in Australia UHF like the rectangular planar spiral antenna, fractal
operates in the 918-926 MHz range, in North antennas,1 and microstrip patch antenna (mono-
America UHF operates at 902-928 MHz, in pole, dipole). Different types of tags have different
Europe it operates at 860-868 MHz, while kinds of antennas, for example, low-frequency
in Japan it operates at 950-956 MHz. and high-frequency tags usually have a coiled
Secondly, it operates in a highly crowded antenna that couples with the coiled antenna of
frequency range because most of the ISM the reader to form a magnetic field (RFidGazzete,
(industrial, scientific, and medical) applica- n.d.). UHF tag antennas look more like old radio
tions operate in the same range. or television antennas because UHF frequency is
more electric in nature (Sweeney, 2005).
components Recent advances in technology have even
facilitated the deployment of printed antennas to
There are four main components of a RFID tag: achieve similar functionality like the traditional
microchip, antennae, substrate, and in some cases antennas. One possible way of printing antennas is
an additional battery. to use silver conductive inks on plastic substrates
or papers (Tecstra, n.d.). The main advantage of
Microchip printed antennas is that they are cheap.

An RFID tag contains a small microchip, which Substrate


has some computing capabilities limited to simple
logical operations and is also used for storage. The This is a chemical (or material) that holds the an-
storage can be read-only, read-write, write-once tennae and the microchip together. It is something
read-many (WORM), or any other combination. like a plastic film (Sweeney, 2005).
The storage memory is used to hold a unique
identification number that can identify each tag Battery
uniquely. Current generation passive tags have a
memory capacity of 96 bits (characters). Passive Unlike passive tags, active RFID tags contain a
tags have enough space to hold the identification battery to power the circuitry, and generate and
number, however the active tags can have some transmit radio signals to the reader. Onboard
additional information like the content of the power supply can enable long-distance communi-


Automated Data Capture Technologies

cation, as long as 1 kilometer (Sweeney, 2005). Base Material

Attributes This is the material used to join the antennae with


the microchip. Normally Polyethylenetherephta-
RFID tags can be differentiated based on several late is used as a substrate.
attributes. In this section we discuss seven main
attributes, which should be considered when Operating Temperature
selecting RIFD tags.
This attribute describes the range in which the
Operating Frequency tag can operate, for example, RI-I16-114A-01
operates within -25C to +70C.
This describes at what frequency the tag is de-
signed to operate. As discussed earlier RFID tags RFiD Readers
can either operate in LF, HF, or UHF range of the
radio spectrum. RFID readers send radio waves to the RFID tags
to enquire about their data contents. The tags then
Data Retention Time respond by sending back the requested data. The
readers may have some processing and storage
This attribute describes the time for which the capabilities. The reader is linked via the RFID
data can be retained on the tag, for example, RI- middleware with the backend database to do any
I16-114A-01 from Texas Instruments has a data other computationally intensive data processing.
retention time of more than 10 years. There are two different types of RFID readers
(Gloeckler, n.d.).
Memory
Classification
This attribute describes the available memory on
the tag. It can be classified as factory-programmed RFID readers can be classified using two different
read-only memory and user-programmable schemes. First, the readers can be classified based
memory. on their location as handheld readers and fixed
readers. Second, the tags can be classified based
Programming Cycles upon the frequency in which they operatesingle
frequency and multi-frequency.
This attribute defines the number of times the tag
can be reprogrammed. This programming cycle Fixed Readers vs. Handheld Readers
is normally measured at a standard temperature
(25 degrees). Fixed RFID Readers are fixed at one loca-
tion (e.g., choke point). In a supply chain and
Antennae Size warehouse scenario, the preferred location
of a reader can be along the conveyor belt,
This attributes defines the size of the tag antennae, dock door antennae or portals, depalletiza-
for example, RI-I16-114A-01 has an antennae of tion stations, or any other mobile location.
the following dimensions: 24.2 mm +0.1mm/-
0.2mm.


Automated Data Capture Technologies

Portable or Handheld RFID Readers are protocol. Mostly all the readers possess a serial
designed for Mobile Mount Applications, for port for programming and data transfer. The
example, vehicles in a warehouse or to be manufacturer of RFID readers normally supplies
carried by inventory personnel, and so forth. the controllers. These controllers typically operate
on 120V AC or 24V DC current.
Single Frequency vs. Multi-Frequency
Attributes
Single-frequency operation readers oper-
ate in one frequency zone, either in LF, HF, RFID readers can be differentiated based on
or UHF. Such readers become inconvenient several attributes. In this section we discuss 12
if tags in a warehouse are operating in dif- main attributes that should be considered when
ferent frequencies. selecting RIFD readers.
Multi-frequency operation readers can
operate in multiple frequencies. Such readers Weight
can conveniently read tags, which operate in
different frequencies (i.e., LF, HF, or UHF). Weight of the reader is an important factor if the
Hence these are more useful from a practical reader is mobile or handheld because it should
perspective, however such readers come at be handy and should not cause inconvenience
a premium price. for its user.

components Communication Interface

There are two main components in a RFID reader: Every reader has a communication interface
antennae and the input/output (I/O) controller. (e.g., RS232 or Ethernet 10/100BaseT or Wireless
802.11g or infrared data connection) to transfer
Antennae the data gathered from the RFID tags.

Every RFID reader is equipped with one or more Integrated Filtering Component
antennas. These antennas generate the required
electromagnetic field to sense the RFID tags. The need to filter RFID tag information is vital
There are many different kinds of antennas like and usually can be done using a separate server
linearly polarized, circularly polarized, or ferrite in the RFID middleware or at the place where the
stick antennas. reader is mounted. However in order to increase
efficiency, reduce cost, and decrease potential
I/O Controller points of failure in the network, it would be
desirable if the reader itself is equipped with
The data that the reader collects needs to be sent some computing power to facilitate information
to the organizations information system like ERP filtering before propagating an excessive large
or WMS. Such a communication can be achieved amount of data to RFID middleware or backend
by using RS-232,2 RS-485, or Ethernet. Some new systems (e.g., ERP). New generation readers do
generation readers also provide the Power over offer such a facility like the IF5 Intellitag Fixed
Ethernet (PoE) and 802.11 wireless connectivity Reader, which is built on Linux platform, which

0
Automated Data Capture Technologies

runs IBMs WebSphere Everyplace Micro


Environment (WEME) (Intermec, 2006a). Some Volatile Memory
handheld readers are equipped with 700 Series
Color mobile computers to do a similar job (In- Some readers have inbuilt volatile memory to
termec, 2006b). retain a certain number of tag IDs.

Antennae (Type and Number) Frequency Range

Several antennas can connect a single reader at This term is used to describe the readers capa-
the same time. There are different kinds of anten- bility to read tags in different frequencies. Some
nas that are equipped with standard readers, for readers only operate in the UHF frequency (In-
example, the IP3 Intellitag Portable Reader (UHF) termec, 2006b), while others operate in the LF
(Intermec, 2006b) comes with integrated circular or HF range.
polarized antennas. The advantage of such anten-
nas is that it can read tags in any orientation. Operating Temperature

Software Depending upon the application, the operating


temperature of the reader should be considered.
Most of the industry standard-compliant RFID For example, if you are going to deploy an RFID
readers are equipped with software to setup and reader in the desert, it should function properly
re-configure the reader to enhance the resilience in the extreme temperature. On the other hand,
of the RFID systems. if it is to be deployed in extreme freezing condi-
tions, the same should also be considered. Many
Time for Identifying Tags industry standard readers operate within the
range of -40C to 50C. Apart from the operating
This refers to the time that is necessary to identify condition the storage conditions should also be
tags. The number of tags identified per second considered. Normally the storage temperate has
varies with the type of readers, for example, IP3 a bit higher range.
Intellitag Portable Reader (UHF) (Intermec,
2006b) can identity six tags per second. Miscellaneous Factors

Read Rate & Write Rate Similar to temperature, humidity is also a factor
that should be considered when selecting a proper
This term usually describes the number of tags reader. Many readers can operate in 10% to 90%
that can be read within a given period of time. humidity levels (Intermec, 2006c).
It can also represent the maximum rate at which
data can be read from a tag. The unit of mea- Shock Resistance
surement is in bits or bytes per second (RFID
Journal, 2006b). Write rate usually describes In an industrial setting, shocks are almost in-
the rate at which information is transferred to a evitable. Hence the reader should be resistant
tag, written into the tags memory and verified as against these conditions as well. Likewise, fre-
being correct (RFID Journal, 2006b). The unit of quent vibrations in the industry setting give rise
measurement is in number of bits or bytes written to vibration-resistant readers.
per second per tag.


Automated Data Capture Technologies

Legal Restrictions (e.g., asynchronous subscription) and an active


context-ware strategy to sense the reader. The
Some countries have restrictions on using some data management layer mainly deals with filtering
frequencies because they may be allocated to ISM redundant data, aggregating duplicate data, and
applications, hence before buying a reader, the routing data to appropriate destination based on
countrys legal restrictions should be checked. the content. The integration layer provides data
connectivity to legacy data source and supporting
RFiD Middleware systems at different integration levels and thus
can be further divided into three sub-layers as
In a general, the RFID middleware manages the specified in Leaver (2005): application integra-
readers and extracts electronic product code (EPC) tion, partner integration, and process integration.
data from the readers; performs tag data filtering, The application integration provides varieties of
aggregating, and counting; and sends the data to reliable connection mechanisms (e.g., messaging,
the enterprise warehouse management systems adaptor, or the driver) that connect the RFID data
(WMSs), backend database, and information with existing enterprise systems such as ERP or
exchange broker. Figure 1 shows the relationship WMS. The partner integration enables the RFID
between tag, reader, RFID middleware, and back- middleware to share the RFID data with other
end database. An RFID middleware works within RFID systems via other system communication
the organization, moving information (i.e., EPC components (e.g., the Data Exchange Broker in
data) from the RFID tag to the integration point Figure 3). The process integration provides capa-
of high-level supply-chain management systems bility to orchestrate the RFID-enabled business
through a series of data-related services. From process. The security layer obtains input data
the architectural perspective, RFID middleware from the data management layer, and detects data
has four layers of functionality: reader API, data tampering which might occur either in the tag by
management, security, and integration manage- a wicked RFID reader during the transportation
ment. The reader API provides the upper layer of or in the backend internal database by malicious
the interface interacting with the reader. Mean- attacks. The overall architecture of RFID middle-
while, it supports flexible interaction patterns ware and its related information systems in an

Figure 3. RFID middleware architecture

RFID Middleware


Automated Data Capture Technologies

organization are depicted in Figure 3. In this section, we summarize these benefits


The backend DB component stores the com- and categorize them based on different potential
plete record of RFID items. It maintains the supply chain stakeholders (as shown in Figure
detailed item information as well as tag data, 4) who would benefit from deploying the RFID
which has to be coherent with those read from technology. After reading this section, readers
the RFID. It is worth noting that the backend are able to foresee several major advantages from
database is one of the data-tampering sources their own perspectives.
where malicious attacks might occur to change
the nature of RFID item data by circumventing Benefits to Manufacturers
the protection of an organizations firewall. The
WMS integrates mechanical and human activities For manufacturers, RFID is able to support quality
with an information system to effectively manage control by querying components and subassem-
warehouse business processes and direct ware- blies as they enter the facility. For example, it can
house activities. The WMS automates receiving, ensure that the correct components are included
put-away, picking, and shipping in warehouses, in an assembled item by automatically checking
and prompts workers to do inventory cycle counts. that all items from the Bill of Material are in place.
The RFID middleware employs the integration Moreover, if used with appropriate modeling
layer to allow real-time data transfer towards the tools, it can help to predict the demand and sup-
WMS. The data exchange broker is employed in ply for the products, which in turn determines the
this architecture to share, query, and update the manufacturing plan, which is an essential input
public data structure and schema of RFID tag data for the modern ERP and MRP systems.
by exchanging XML documents. Any update of
the data structure will be reflected and propagate Benefits to Distribution Centers
to all involved RFID data items stored in the
backend database. From the standardization view, For distribution centers (DCs), RFID can improve
it enables users to exchange RFID-related data its reception processthat is, a guard confirms
with trading partners through the Internet. From the trucks appointment time, barcodes the trailer,
the implementation angle, it might be a virtual and assigns a parking spot or dock. In particu-
Web services consumer and provider running as lar, such an improvement is achieved by: (a) the
peers in the distributed logistics network. RFID reader, which confirms the arrival of the
truck, trailer, and all the items, eliminating the
need to check the drivers Bill of Loading; (b)
BeneFitS to SUPPLY chAin the RFID reader can query (scan) the contents
StAKehoLDeRS much quicker than barcoding the trailer manually;
(c) the RFID system can enable the DC gate to
The main benefits for stakeholders of adopting communicate with the warehouse management
RFID in their business processes are manifold. system in a timely manner, thus attaining the

Figure 4. The stakeholders in the supply chain

Manufacturer Distribution Warehouse Logistics Retailer


Center Company


Automated Data Capture Technologies

steady information synchrony. In doing so, the strategy. This is achieved by employing the RFID
productivity of DC is undoubtedly enhanced. The readers that capture precise information on how
RFID solution is also seen to be beneficial when much product was sold from each location by
managing claims and deductions occurring at the placing different RFID readers in different selling
DCs (Symbol Technologies, 2004). place (e.g., point-of-sale machines). Next, RFID
can improve customer satisfaction since it provides
Benefits to Warehouses the right information at the right time and in the
right format. For instance, DHL and FedEx each
For warehouses, RFID can first improve the use an RFID-enabled tracking service, which
product flow by: (a) increasing the Putaway helps the customer to monitor its own consign-
Accuracythe measurement of the accuracy of ment. Customer satisfaction is further improved
the process that physically places inventory prod- when the RFID allows retailers to know exactly
ucts into storage; and (b) removing the need for what products are available in stock and in what
additional barcodes on the pallet. Furthermore, the capacity, which prevents the customers from
RFID system can improve the temporary storage. being disappointed under the circumstance that
For example, with the support of RFID, inventory their desired products are out of stock.
items can be scanned wherever they are placed,
which enables a more flexible storage environ- Benefits to the Whole Supply Chain
ment. The RFID reader can help to identify any
potential inventory compatibility problems for the For SCM strategists, RFID facilitates detailed
large warehouse and DC, which typically handle data collection and statistical analysis, from gross
inventory for all industry sectors. For instance, to very fine-grained levels. For instance, RFID
an industry dealing with perishables definitely readers in a retailers store can capture data on
needs special inventory facilities. Last, from the product arrival, placement, and movement, which
cost angle, deploying RFID can reduce the cost by can present the cyclical patterns. This key capabil-
maintaining a reduced level of inventory, waste, ity of RFID allows the executives to link the date
manual checks, and other miscellaneous inventory received with the date sold. Moreover, it can help
handling and management costs. to identify possible points of information leakage
throughout the entire supply chain. As a result,
Benefits to Logistics Company RFID increases the visibility in the supply chain,
Administration which can be used to make strategic decisions to
further increase competitive advantage.
For company executives, RFID can improve
administrative laboring. For example, RFID
enables the fine-grained laboring productivity ADoPtion StRAtegY
measurement by timing the uploading of the
goods for particular workers. Moreover, RFID In this section, we discuss the RFID adoption
helps to avoid employee theft during the outbound strategy, which facilitates the ultimate successful
shipping by identifying the nature of the items RFID deployment. In general, an adoption strategy
(goods or company property). provides a roadmap to implement the technology
in a way that is consistent with an organizations
Benefits to Retailers strategic vision and goal. It is our belief that such
a road map comprises four essential fundamental
For retailers, RFID can help to make the price


Automated Data Capture Technologies

principles for RFID to be thoroughly adopted in These scenarios must contribute to achieving the
the organization. We formulate them as follows organizations business goals. They can be sub-
to guide the RFID adoption strategy. stantiated by collecting and investigating all the
operational and technical requirements in the or-
Shared Understanding ganization. Moreover, a cost-benefit analysis (e.g.,
ROI estimation) to suffice the financial concern
In an organization, each decision maker or poten- will significantly increase the possibility of RFID
tial stakeholder of the RFID adoption may have a being accepted by those hesitant stakeholders.
considerably different understanding from his or Last, potential challenges and issues during and
her own perspective towards RFID. The likelihood after deploying RFID have to be clearly identi-
of successful adoption of RFID in effect hinges fied at the early stage. Each challenge should be
on the capability of the organization to enforce addressed by possible solutions submitted to all
a broader shared understanding. This calls for a involved stakeholders.
harmonious integration of each individuals opin-
ion in a manner that benefits the organizations Planning and Approaching
core competency and strategic goal, rather than
that focuses on isolated areas of benefits. Hence, Before starting the implementation, it is very
in the early stage, the main aim is to ensure that important to define a detailed deployment plan
such a shared understanding is permeated at each with thorough consideration to various factors like
level of the executive management and general schedule, impact, and usability. This facilitates a
administrative members of the organization. positive and quicker realization of the technology
outcomes. A good project plan includes evaluation
goal Setting of technology option, standard-based deployment
approach, measurements and optimization tech-
No technology deployments can be successful niques, and a continuous improvement roadmap.
unless the goals of the deployment program are During the implementation, an incremental ap-
aligned with the business goals. Hence, at the proach shall be taken. Thus pilot tests and mile-
beginning of RFID adoption, the organization stones can be used for checking the progress of the
has to set a very clear unambiguous goal for implementation and ensuring the desired outcome
RFID adoption. This goal is to be aligned with is achieved through the delta part implemented
the organizations existing business goal. With the in the current adoption iteration.
goal, important stakeholders can thus be explicitly Based on these aforementioned principles, we
(rather than implicitly or potentially) identified. A then present a refined strategic step flow for the
definitive goal also helps to find the buy-in among RFID adoption strategy. This is shown in Figure
all the stakeholders of the RFID technologya 5, where the elaborated steps (rectangles) of the
key component in achieving organization change roadmap are outlined one after another and are
successfully due to the fact that support from connected by directed edges and condition check
senior management is exceptionally critical. (triangles). We explore each step one by one as
follows.
Justification
Core Competency Reaffirmation
It is well recognized that, in order to justify a
new technology, a number of convincing busi- The core competency (CC) is defined as one thing
ness scenarios are of paramount importance. that an organization can do better than its com-


Automated Data Capture Technologies

Figure 5. RFID adoption roadmap

Reaffirm the Core P1


Prioritized P2
P1
Competency (CC)
of the business Scenario List

For each candidate scenario

RFID is aligned
Justification
with CC?
Review

Yes
No
Feasibility analysis Justified?
1. Information Sys.
2. Funding
3. Personnel
4. Time to deploy Adoption Issue
Analysis

Feasible?
Pilot Test and
Yes Result Analysis

Identify current
candidate scenarios Yes
that might benefit Negative
from deploying Impact?
RFID
No Continue

Prioritize all the identified


candidate scenarios against Implement this candidate scenario
the estimated volume and rate
of the return from RFID.
Milestone 1 Milestone 2 Milestone n


Prioritize candidate scenarios


Automated Data Capture Technologies

petitors, and is crucial to its success. Before the It is very important to estimate the capability
organization adopts any candidate technologies, of existing information systems. Since RFID
it has to assess them against the core competency. will dramatically increase the amount of the
For example, if a new technology enables the data captured from instance level tags, the
organization to maintain its CC and even gain information systems have to capture, pro-
more CC (i.e., CC-aligned), then this technology cess, and analyze such a huge amount of data
is favorable to the organization and should be efficiently. Any insufficiency of information
given further adequate consideration. Otherwise, systems will definitely hinder the RFID
such a technology needs more evaluation under technology to realize its full potential.
current business contexts even if it appears very RFID solutions could be quite costly; hence
promising from the technical perspectives or from continuous and dedicated RFID funding
other organizations angles. It is highly desirable support is essential.
that the CC-aligned technology, once validated Personnel preparation is another feasibility
within the organization, receives unanimous issue needing consideration. Once imple-
support from senior management to the general mented, the RFID might change the business
staff. This undoubtedly paves the way for easier process as well as fundamental information
adoption that is less likely to be tangled with in- systems operations, which incur substantial
ternal politics, funding difficulties, and some of IT training and adaptation study. The learn-
the execution delays. For example, when retailer ing capability of involved working staff also
giant Wal-Mart realizes that the core competence determines the success of RFID adoption.
lies in its dominant distribution channels, which Lastly, the organization has to choose the
can greatly benefit from RFID technology (as appropriate time to deploy RFID. Early
discussed above), it demands all of its top 100 sup- adoption of RFID has advantages as well as
pliers to attach RFID tags onto their goods. On the risks. The feasibility of time should study
contrary, if a company XYZs CC is manufactur- whether the company is ready for RFID at
ing high-quality automobile engine assemblies, it that particular time, and moreover can bear
should be very cautious in adopting RFID unless the risk associated, even if the prerequisite
its primary retailers at the downstream urge it to conditions are all met.
do so, because the distribution is not XYZs core
competencies and doing so will only distract itself Candidate Scenarios
from doing what they are good at. Therefore, in
general, an organization should be wary of taking The next step is to identify candidate scenarios
aggressive steps in implementing RFID solutions that would benefit from RFID and to measure
before the core competence has been thoroughly the potential benefit in a self-defined scale. For
reaffirmed and evaluated. example, for manufacturing units, RFID can
be used to support quality control by querying
Feasibility Analysis components and subassemblies as they enter
the facility. This is a typical candidate scenario
If the RFID technology is being considered to be that can be identified. It is recommended for the
aligned with the CC, it is time for the organization organization to enumerate all the potential RFID-
to perform the feasibility analysis, which deals involved candidate scenarios that can impact an
with four major aspects: organizations core competences. One efficient
way to accomplish such an enumeration would
be to define several business areas based on the


Automated Data Capture Technologies

Table 1. A sample of candidate scenario


Scenario Name: Shipment Status Query
1. A consignee, or third-party logistics firm, or shipper
Involved Stakeholders: 2. Consolidators, or warehousing entities, or freight forwarders, documenta-
tion personnel, carriers or custom clearing personnel

This scenario states a third-party logistics firm or shipper to query for the status
Scenario Description: of one or more shipments and a transport service provider to respond to the
query.

Identifies the shipment for which status information is needed. The Shippers
and Carriers Reference Numbers identify a particular shipment. Communicates
the status of a shipment. The Shippers and Carriers Reference Numbers
Detail Activities:
identify a particular shipment. The response references geographical location,
time, and customers entry number; it may include information about delivery
exceptions. It does, if RFID technology is adopted, include order-level detail.

Increasing the shipping data accuracy:


The transport service providers detailed shipping manifest ensures that
the right number of cases is en route, thereby improving customer (e.g.,
consignee) service levels.
CC Impacts from RFID: The transport service provider reduces load times by eliminating manual
order auditing.
There are fewer discrepancies between shipments and invoices, because
the shipping manifest can automatically generate an invoice that includes
case EPCs.
Business Process:


Automated Data Capture Technologies

beneficiary summarized above (e.g., the manu- 5. Calculating the overall weight for each sce-
facturing, distribution, warehouse management, nario allowing for all criteria with different
etc.). For each business area, one representative preferences
candidate scenario is selected according to its 6. Ranking the scenario list against the weight
relevance to the organizations CC. Also, it is a value generated in #5, with the biggest weight
good idea to break down a large scenario into a value being positioned in the first rank. This
couple of smaller scenarios, and only one of which step eventually generates a prioritized sce-
is chosen based on the stakeholders preferences nario list for further justification review.
(e.g., the one that promises the most effective
impact towards the CC). In other words, as an Justification Review
emerging technology, RFID must be adopted in
a selective and iterative manner so that the risk, In this step, for each candidate scenario in the
cost, and organization changes can be controlled Prioritized Scenario List, the organization con-
at the minimum level, whereas the positive im- ducts the justification review, a static analysis of
pact to CC is pursued at the maximum level. A RFID deployment only related to that particular
formal description is necessary to state the basic candidate scenario. Readers are advised that
characteristics of each scenario. A typical tabular several justification methods can be applied. For
description of a sample candidate scenario (based example, traditional ROI (return on investment)
on RosettaNet, 2001) is presented in Table 1. methods can be utilized to examine whether RFID
technology should be deployed in this candidate
Scenario Prioritization scenario. However, they seem inadequate as RFID
so far has a high level of uncertainty (e.g., tag
The previous step produces a list of candidate prices, standards), and existing stories (eWeek.
scenarios, each of which represents one particular com) show that a number of possible applications
business area in this organization. (Readers shall are unfairly treated by existing ROI methods and
recall that one business area comprises a set of tools. The appropriate justification tools are thus
scenarios. For each iteration, we only choose one highly desirable and become a promising future
scenario from this set in each business area). In this research direction. For each candidate scenario,
step, we need to prioritize this list against a set of if the justification review produces negative re-
criteria such as estimated impacts to CC, the ROI, sults, it is removed from the prioritized scenario
the cost, and so forth. Such a prioritizing process list, and the next scenario will be considered to
also needs to consider the preference from differ- perform the justification review. Otherwise, this
ent RFID stakeholders. This is achieved by: scenario will be subsequently chosen for the fol-
lowing pilot test.
1. Organizing the criteria set into a hierarchical
structure Adoption Issues
2. Performing the pair-wise comparison be-
tween any two candidate scenarios against Before the pilot test, a clear consensus of issues
one specific criterion and their solutions is necessary among all the
3. Providing the pair-wise comparison between stakeholders. Hence in this step, the stakeholders
any two criteria for each rfid stakeholder need to unanimously identify adoption challenges
4. Computing the stakeholders-aggregated specific to this scenario. The next section of this
preferences for each criteria chapter will provide a comprehensive issue list


Automated Data Capture Technologies

that the organization should consider. However, ers to gain experience with RFID. Furthermore,
we believe each scenario has its own unique set such a pilot is to produce the impact analysis for
of adoption issues. Even for the same issue, it this candidate scenario. As many impacts can be
has different impact on various scenarios. It is associated with the RFID deployment, some of
suggested that the organization itemizes all the them are beneficial to some shareholders, while
possible problems that it might encounter during some are negative to other shareholders. Hence
the pilot test. More importantly, the solutions that the pilot implementation can estimate such im-
address these challenges should be proposed and pacts brought by RFID deployment. If most of
planned in this step. This ensures the smooth the results tend to be negative, the likelihood
progress of the pilot test. Moreover, the solutions that the RFID to be implemented in this scenario
can also be validated and modified during the appears to be very low. The organization might
pilot test. need to consider the next candidate scenario
along the Prioritized Scenario List. In contrast,
Pilot Test positive pilot test results with the pilot feedback
suggest the start of the RFID implementation in
Once the justification review is confirmed posi- this candidate scenario.
tively, the pilot implementation can be carried
out in an experimental environment. It can be an Implementation
RFID prototype in a smaller scope or scale of this
candidate scenario. For example, a pilot deploy- Once the pilot test is passed, the formal imple-
ment in one or two locations allows evaluation mentation can be carried out in an incremental
of RFID vendors, equipment, and software, and manner through a set of iterations with a couple of
provides the opportunity for different stakehold- milestones, which ensure that the implementation

Table 2. Sequential tasks within one milestone

The architecture can follow some RFID reference model and must be
Architecture Design extensible so that new architectural elements or scenarios can be added in
the next milestones.

Assemble the RFID edge solution from selected vendors based on the
Edge Deployment drafted architecture rather than from one particular RFID system or
product.

Verification and Validation Measure the system performance and business impact.

Scale Deployment Consider adding additional locations in terms of geography or business


unit for next milestone.

Add the RFID data-integration middleware to enable the data sharing


Integration Deployment with other information systems, or even other partners. Consider adding
business process integration infrastructure for the next milestone.

Considering the adaptability of this milestone to ensure that it can expand


Evolve and Expand and evolve to meet the changing needs of the business in the following
milestones.

0
Automated Data Capture Technologies

cost and risk can be controlled and mitigated to there is a cost associated to ensure that the tags
the minimal level. Each milestone has different are functioning properly. Finally there is cost as-
focuses. Table 2 lists possible sequential tasks sociated with replacing the defective tags (RFID
within one milestone. Particular attention is given Journal, 2006c).
for fostering the transition between milestones.
RFID Printers

RFiD ADoPtion chALLengeS An RFID label has a similar functionality as


an RFID tag. However it can be stuck on like a
Several key adoption issues will be discussed in label. The RFID label can be printed using RFID
this section. The main issues that we address in this printers. Hence if you are planning to use RFID
section are cost associated with the deployment labels, the cost of the RFID printer should be
of RFID system, security and privacy concerns, considered. In some applications RFID labels
and finally more technical issues in deployment are much more preferred because of the environ-
of an RFID system. ment and the products. For example applications
like express parcel delivery, library book/video
cost checkout, sensitive document tracking, ticketing
(sports, concerts, ski lifts, etc.), and pharmaceu-
A cost-estimation model for a full-fledged deploy- ticals prefer RFID labels (Zebra, 2006).
ment of an RFID system in a supply chain environ-
ment should consider the following factors. RFID Readers

RFID Tags When deploying an RFID system, one should


consider the cost of buying RFID readers. The
When deploying an RFID system, one should fixed readers are normally cheaper than the por-
consider the cost of buying RFID tags. It is a table readers. It is normally in the range of $500
good idea to consider renewable tags (if possible) to $5,000 depending on the features built into
as a means to reduce cost. Normally the cost of the reader (RFID Journal, 2006c). Dumb read-
active tags is more than the passive tags. The ers are usually cheaper, as they do not have any
active tags are in the range of US$20 to $50 per computing capability. On the other hand intelligent
tag (Lyngsoe, n.d.; RFID Journal, 2006a, 2006c) readers offer computing capability to filter data,
. The cost of the passive tags depends upon the store information, and execute commands. Agile
frequency. Normally the LF tags are more expen- readers can communicate with tags using a vari-
sive than HF or UHF because of the size of the ety of protocols, while multi-frequency readers
antennae (RMOROZ, 2004). It normally costs can read tags using different frequencies (RFID
more than $2 and goes as high as $10. The HF Journal, 2006c). All these features contribute to
tags are cheaper than the LF tags and normally the cost of readers, and the organization should
cost less than a dollar. select a proper reader based on its application
Apart from the cost of the tags, companies requirements.
should also consider the cost of testing the pas-
sive tags. The failure rate for the UHF EPC tags RFID Antennas
ranged from 0-20% in the year 2004. This might
drop down once manufacturers start using so- Almost all the readers are equipped with one or
phisticated manufacturing techniques, however more antennas. However in some cases the need for


Automated Data Capture Technologies

additional high-power antennas cannot be ruled out, to install, as there are several factors that can af-
and hence this additional cost should be considered fect the optimum performance of such a system.
before deciding to deploy an RFID system. Hence a major portion of RFID investment has
to be targeted to this area.
RFID Middleware
Other Miscellaneous Costs
RFID middleware contributes a major portion of
RFID investment. Many vendors supply RFID The miscellaneous costs might include regular
middleware, and the cost can vary depending maintenance of the RFID readers or replacement
upon the capabilities of the middleware. Usually of damaged tags or antennas.
factors that contribute to cost include complexity
of the application and the number of places the Cost Estimation for RFID Deployment
middleware would be installed. Apart from the in Supply Chain Tracking
middleware, the companies should also consider
the cost of edge servers, which are normally de- When deploying an RFID system for inventory
ployed in the warehouse, distribution center, or management and control in a supply chain, all
production facility. The edge servers are simple the above-mentioned costs should be considered.
servers, which are connected to the RFID reader According to Forrester Research, the estimated
using a universal serial bus (USB) port. cost of middleware is around $183,000 for a $12
billion manufacturer looking to meet the RFID
Training Existing Staff tagging requirements of a major retailer (RFID
Journal, 2006c). In the same manner the estimated
Introducing new technology in an organization price of $128,000 could be spent for consulting
introduces costs associated with training the and integration, $315,000 for the time of the
concerned staff. For example an organization internal project team, and $80,000 for tag and
will need to train its employees, particularly reader testing (RFID Journal, 2006c). A simple
engineering staff who will manage readers in estimate is provided in Table 3.
manufacturing and warehouse facilities, and IT On the lower end an estimated cost of around
staff who will work on the systems that manage $3 million should be invested in an RFID project
RFID data (RFID Journal, 2006c). for inventory tracking and management if a total
of 10 million items are tagged. The number of
Hiring Technology Expertise readers, printers, and edge servers would vary
depending upon the number of distribution centers
Most of the companies, as of now, would not have and warehouses in use. Here we assumed 100
the expertise to deploy a complete RFID system. readers and printers, and 50 edge servers. These
This is partly attributed to the fact that RFID is a numbers are used just as an example; it can vary
relatively new technology. Hence an organization depending upon each company.
would need to outsource this task to a third party
who knows how to install the readers, decide Read-Rate Accuracy
the appropriate location for fixing the tag on the
products, ascertain that the data gathered by the Achieving 100% read-rate accuracy is a major
reader is properly propagated to the middleware in adoption challenge with RFID deployment. Sup-
the right format, and so on. This is quite important ply chains and warehouse management solutions
because RFID systems can be sometimes difficult based on RFID are highly vulnerable to read-rate


Automated Data Capture Technologies

Table 3. Simple cost estimate

Investment Area No. of Units Cost Per Unit (USD) Total Cost (USD)

RFID Tags 10,000,000 $ 0.15 $ 1,500,000.00


RFID Readers (Handheld, Fixed, Forklift) 100 $ 8,000.00 $ 800,000.00
RFID Printers 100 $ 3,000.00 $ 300,000.00
Edge Servers 50 $ 2,500.00 $ 125,000.00
RFID Middleware N.A. $ 200,000.00
RFID Consulting N.A. $ 128,000.00
RFID Training N.A. Variable Cost
Tag Validation N.A. $ 80,000.00
Total Cost $ 3,133,000.00

inaccuracy because of the number of RFID-tagged are RF friendly, while others are RF absorbent
items that need to be scanned every second. or RF opaque. A reader configured to read tags
Consider the scenario when a palette contain- from RF-friendly material would definitely fail
ing 1,000 RFID-tagged items is scanned at the to give 100% read-rate accuracy if used to track
warehouse exit. There is a high probability that RF-absorbent or RF-opaque items.
the reader would not scan a few tags. It is difficult
to list the main reasons that result in inaccurate Preplanned Object Movement
readings because there are too many ifs and
buts. Accuracy is dependent on so many unre- To assure good read rates, it is advised to move the
lated variables that it is difficult to list the main tagged objects on a predefined route (or pattern).
factors behind the cause. However we attempt to You cannot expect good rates if the cartons are
outline some basic parameters, which results in moved through a forklift, people, metals trolleys,
inaccurate readings. Some of the main reasons for plastic trolleys, and so forth. There should be just
inaccurate readings include the environment in one or two modes of transport well tested for
which RFID system works, material of the item 100% read-rate accuracy.
being tracked, reader configuration, reader and
tag placements, tag orientation, and so forth. To Tags from Different Vendors
successfully deploy an RFID system, some key
parameters should be considered to achieve ac- Read rate is also affected if tags are used from
curate readings. different vendors because the performance of
such tags varies significantly. Another reason is
Tagged Material the use of different standard-compliant tags (like
EPC Gen1 & EPC Gen2). It is also difficult to
Maintain some consistency when tracking ma- configure the reader power level at an optimum
terials. It is not a good idea to standardize the level where it supports all different tags with
reader configuration to track cartons, trolleys, 100% read rate. Ideally one should try to use
pallets, glass materials, documents, or metal or a single standard and single vendor tag in one
plastic bins. This is because different materials ecosystem. Nevertheless this may change as the
behave differently to RF energy; some materials standards improve.


Automated Data Capture Technologies

Tag Orientation from Orange to Apple, then a palette containing


apples might be shipped when the intention was
Orientation is one of the big factors for providing to ship oranges. Data tampering (or integrity)
good read rates. Even though dual dipole tags can raise issues like quality of service and trust
perform much better in all orientations, it is still in logistics and supply chain, and hence needs
advised to follow a policy on tag placement and to be addressed thoroughly. Similarly, malicious
tag orientation (TPTO). A standard policy on entities can employ an active jamming approach
TPTO across an organization would definitely to launch denial of service attacks, which would
improve the read-rate accuracy. make the RFID network unavailable. In such an
attack the RFID reader cannot query the tags, and
Security hence the warehouse management system can
stop working or real-time status of the warehouse
Security of RFID solutions in supply chain man- cannot be made available (Engberg, Harning, &
agement is a major issue. Automated warehouse Jensen, 2004; Menezes, Van Oorschot, & Van-
management and supply chain solutions based on stone, 1996).
RFID should leave no room for security loopholes. In this section we discuss solutions from litera-
Security properties like confidentiality3, integ- ture which can address these security issues. The
rity4, availability5, authentication6, and anonymity7 details discussed in this section are explained from
need to be considered for the successful RFID a security experts perspective. Hence if the reader
adoption. Consider the warehouse management is a business executive or management strategist,
scenario: if a malicious reader can eavesdrop (spy) they may skip this section. All they need to know
on the communication between the tags and the is that there are some security mechanisms in
readers, confidentiality and anonymity in such place (as shown in Figure 7) which can be used
communication is lost. A malicious reader may to guarantee security in communication between
be placed by a competing organization to study the tag and the reader. These security mechanisms
the goods movement in your warehouse. Such are based on the assumption that expensive Gen-2
tactics for gathering business intelligence can be RFID tags are used.
addressed if security mechanisms are in place.
Secondly, information stored on the RFID tag Access Control and Authentications
could also be tampered with by malicious readers,
which could result in wrong items being loaded Several approaches to access control and authen-
from the warehouse. For example, if the malicious tication are proposed in the literature. We will
reader changes the information on RFID tag discuss some in greater detail in this section.

Figure 6. Major security issues with RFID adoption

Security Properties

Confidentiality Availability Authenticity Anonymity Integrity


Automated Data Capture Technologies

Figure 7. Security solutions to address security issues with RFID adoption

Security Mechanisms

Access Control Tag Encryption and Tamper


and Authentication Message Detection
Authentication Authentication

Exclusive-OR Approach for Authentication Tag Authentication


A simple authentication scheme based on chal-
lenge-response protocol is presented in Juels, Tag authentication is another security mechanism
Rivest, and Szydlo (2003). It uses only simple that authenticates the tag to the reader and pro-
bitwise exclusive-OR operations and no other tects against tag counterfeiting. There are several
complicated cryptographic primitives, hence it is protocols proposed for this purpose. For example,
suitable for RFIDs. However, the main issue with Vajda and Buttyan (2003) propose and analyze
this approach, as pointed out by Dimitriou (2005), several lightweight tag authentication protocols.
is that it involves the communication of four mes- Similarly, Feldhofer (2004) proposes the simple
sages and frequent updates which would increase authentication and security layer (SASL) protocol
unnecessary traffic between the reader and the tag with AES encryption and analyzes the hardware
(Dimitriou, 2005; Wong & Phan, 2006). Feldhofer requirements (Feldhofer, 2004; Knospe & Pohl,
(2004) demonstrated that it is possible to achieve 2004; Wong & Phan, 2006).
authentication without making use of computa-
tionally intensive public-key cryptography, but Encryption and Message Authentication
instead used the advanced encryption standard
(AES), which is a symmetric-key technique for Next-generation RFID systems like the ISO 14443
encryption (Stallings, 1999; Vajda & Buttyan, or MIFARE offer encryption and authentication
2003; Wong & Phan, 2006). capability for data which is exchanged between
the readers and the tags. In RFID systems the
Hash-based Approaches for Access Control UID is the most important data, and this can be
A hash-based access control protocol is discussed secured by encrypting the memory blocks at the
in Weis (2003). Here the tag is first in a locked application layer. The UID is usually read-only,
state. When the tag moves to the unlocked state, and many RFID tags provide a permanent write
the reader can access the tags details. In order lock of memory blocks. This can ensure data in-
to change the state, the tag first transmits a meta tegrity, but of course, not message authentication
ID, which is the hash value of a key. An autho- (Knospe & Pohl, 2004; Wong & Phan, 2006).
rized reader looks up the corresponding key in a
backend system and sends it to the tag. The tag Tamper Detection
verifies the key by hashing it to return the clear
text ID and remains only for a short time in an RFID tags carry data that represent the unique
unlocked state which provides time for reader item identifier (UID) as well as product details to
authentication and offers a modest level of ac- which it is attached. This data is very significant
cess security (Knospe & Pohl, 2004; Wong & and, if tampered with, can have severe conse-
Phan, 2006).


Automated Data Capture Technologies

Figure 8. Major privacy concerns with RFID adoption

Privacy Concerns

Analysing Cradle to Grave Discrimination Terrorist Hidden


Consumer Surveillance Activities Surveillance
Behaviour

quences. For example if data representing the If RFID is deployed in a full scale, it may
nature of good is changed, it can have severe result in many privacy concerns because RFID
implicationthat is, instead of Lethal Weapons, can be used to track consumer behavior, which
the RFID could be modified to represent that the can further be used to analyze consumer habits.
consignment carries Oranges. Such data tamper- It can even be used for hidden surveillance, for
ing needs to be detected, as it can be a threat to example, deploying secret RFIDs for tracking.
national security. Potdar et al. (2005) presented a With the size of RFIDs reducing day by day, it
solution to address this security issue. They pro- has now become possible to hide them within
posed a tamper-detection mechanism for low-cost products without the owners consent. For ex-
RFID tags. The proposed algorithms for tamper ample, RFID tags have already been hidden in
detection works by embedding secret information packaging (Hennig, Ladkin, & Siker, 2005). A
(like a pattern) in the RFID tags. The pattern is scenario of hidden RFID testing was discovered
embedded by manipulating the unique identifier in a Wal-Mart store in Broken Arrow, Oklahoma,
in such a way that even after embedding the pat- where secret RFID readers tracked customer ac-
tern, each RFID tag can be uniquely identified. To tion (Caspian, 2003). If RFIDs are embedded in
detect tampering, a tamper-detection component money, it could result in discrimination. Consider
is introduced in the RFID middleware, which this scenario: whenever a customer enters a shop
detects the embedded pattern. If the pattern is not equipped with RFID readers, they would easily
present, it indicates data tampering, in which case know the purchasing power of the customer and
the data from the RFID is quarantined and later can automatically manipulate pricing information
processed appropriately (Potdar et al., 2005). to the customers credit worthiness. This results in
automated prejudices (Hennig et al., 2005). Using
Privacy RFIDs could even trigger anti-social activities.
Criminals with RFID readers can look for people
The deployment of RFID in day-to-day life can carrying valuable items and can launch selective
raise several privacy concerns. The major concerns attacks (Hennig et al., 2005). However most of
originate because of the inherent ability of RFID to these issues can be tackled by privacy enforce-
track people who are using products that have RFID ment laws, which can be incorporated into the
tags. Privacy experts say that marketers and retail- nations legal framework. All these privacy issues
ers can gather detailed customer profiles, based have created a lot of fear in the consumer com-
on their transactions with that individual (Juels munity. In order to address these issues, several
et al., 2003; Kumar, n.d.) . The privacy concern approaches are proposed in the literature. We will
originating by the use of RFID can be categorized discuss each of these techniques and then list the
into five areas as shown in Figure 8. pros and cons of each approach.


Automated Data Capture Technologies

Kill Tag Approach then using foil-lined wallets can guarantee


privacy (Kumar, n.d.). This approach has
This is one of the simplest approaches to protect limited application because a faraday cage
consumer privacy. According to this approach cannot shield all items (mobile phones,
all the RFID tags would be killed or deactivated clothing, etc).
once they are sold to the customerthat is, when
the products with the RFID tags pass through the Active Jamming Approach: According to
checkout lane. Once a tag is killed, it can never this approach the consumer can carry a radio
be activated or used again. A password-protected device that would keep broadcasting radio
destroy command can also be integrated into signals in order to disrupt the normal opera-
the electronic product code (EPC) specifications, tion of nearby RFID readers. Although this
which would kill the tag permanently (Knospe & approach offers a way to protect privacy, it
Pohl, 2004). However according to some privacy may be illegal in some countries. Broadcast-
gurus, simple use of kill tag is sometimes inad- ing unnecessary radio signals can disrupt
equate. There are situations where the consumer the operation of legitimate RFID readers
would prefer the RFID tag to remain active even where privacy is not concerned.
when the product is sold. For example, it would
be wise to embed a tag in an airline ticket to allow Smart Tag Approach
simpler tracking of passengers within an airport.
Consider embedding a tag in invoices, coupons, This approach suggests making the RFID tags
or return envelopes mailed to consumers; this can smarter so that they can manage the privacy
be used for ease of sorting upon return. Another concerns in much better manner. Adding extra
example would be microwave ovens that read functionality like introducing cryptographic ca-
cooking instructions from food packages with pabilities would enable the tags to communicate
embedded RFID tags (Kumar, n.d.). At the first in a secure environment and can increase the
instance, it seems that the kill tag approach would smartness of the tag. Many techniques to achieve
handle most of the privacy concerns, however privacy protection based on cryptographic proto-
as discussed above, in some situations it would cols are proposed in the literature; some of these
be sensible to keep the tag active even after the were already covered earlier in this chapter.
product is sold. Hence this approach does not
offer a satisfactory solution.
cASe StUDieS
Physical Approach
In this section we list a few RFID case studies
There are two basic approaches to achieve privacy from the supply chain and logistics domain.
protection using physical techniques. They are:
Moraitis Fresh
Faraday Cage Approach: A Faraday cage
is an enclosure designed to exclude electro- Moraitis supplies fresh fruits and vegetables to
magnetic fields. As a result certain radio major supermarkets in Australia. The shelf life of
frequencies cannot penetrate through the such products is one or two weeks, which means
enclosure area. It can address some privacy the produce must be moved from the field to the
concerns, for example, if high-value cur- supermarket within two to five days. Moraitis
rency notes start embedding a RFID tag, was looking at ways to boost the efficiency of


Automated Data Capture Technologies

its supply chain. IBM Business Consulting Ser- tracking to help forecast when shipments arrive
vices proposed an RFID solution for the above at their destinations, and to ensure that material
problem. Moraitis realized that RFID tags could is accurately and efficiently ordered. Savi Tech-
offer a cost-effective solution to streamline sup- nology deployed the RFID system, with an initial
ply chain functions, and help reduce the time and contract of US$10.1. The ADF deployed Savis
labor required. The technology was provided by SmartChain Consignment Management Solution
Magellans StackTag technology, which can read (CMS), which is a suite of hardware and software
and write to multiple tags moving on high-speed components that uses barcode and RFID. ADF will
conveyors in any orientationeven when tags are now be able to make its logistics network more
overlapping or touching. The initial investment visible by using an in-transit visibility system
was around A$ 100,000. Automated inventory (ITV) (OConnor, 2005).
tracking improved the accuracy of Moraitis in-
ventory management decisions (IBM, n.d.).
concLUSion
Australia Post
Automated identification and data capture (AIDC)
Australia Post, the postal service in Australia, is a crucial technology in supply chain manage-
was looking at ways to improve its operational ment as it forms the backbone of the modern
efficiency, focusing on a mail sorting problem. supply chain. RFID, the emerging wireless
Lyngsoe Systems was approached to offer a AIDC technology, first appeared in tracking and
solution. Australia Post has deployed Lyngsoes access applications during the 1980s. It allowed
AMQM mail-quality measurement system, which for non-contact reading, and is very effective in
contained more than 12,500 active tags (operat- manufacturing and other hostile environments
ing at 433.92 MHz frequency) and 400 RFID where bar code labels could not survive. As a
readers (Lyngsoes RD21 readers supporting 15 result the industry has looked into the possibility
antennas) at several mail sorting and distribution of embracing such a promising AIDC technol-
locations. QSM software, which is an integral ogy in a massive scale. Therefore, this chapter
part of the AMQM system, is used to analyze provided a comprehensive introduction to RFID
RFID-generated mail-tracking data. The RFID technology and its application in supply chain
readers will automatically read the tagged test management from multi-level perspectives for
envelopes as they pass through key sorting points various readersRFID novices, RFID advanced
in the network, and update the backend system users, business consultants, business executives,
(Collins, 2005). scholars, and students. In particular, we first
discussed fundamental RFID elements governed
Australian Military by specific RFID standards, which are further
elaborated in detail. Having such basic knowledge,
The Australian Defense Force (ADF) had de- we identified RFID adoption challengesmainly
ployed an active RFID system for supply chain cost, security, and privacywhich have become
the biggest concern for those early RFID adopters.
Bearing these big challenges in mind, company


Automated Data Capture Technologies

executives and management are seeking the road- Feldhofer, M. (2004). A proposal for authentica-
map of RFID deployment, which we offered as a tion protocol in a security layer for RFID smart
dedicated section in this chapter. Before making tags. In Proceedings of the 12th IEEE Mediterra-
substantial investment in RFID solutions, man- nean Electrotechnical Conference (MELECON),
agement would be interested in knowing existing Dubrovnik.
successful case studies. We thus provided five
Gloeckler, D. (n.d.). What is RFID? Retrieved
RFID case studies to supplement this chapter for
September 1, 2005, from http://www.controlelec-
further references. All of these case studies are
tric.com/RFID/What_is_RFID.html
centered on logistics and supply chain domain,
taking into consideration the overall theme of Hennig, J.E., Ladkin, P.B., & Siker, B. (2005).
the book. Privacy enhancing technology concepts for RFID
technology scrutinized. (Research Report # RVS-
RR-04-02) Bielefield: University of Bielefield.
ReFeRenceS
IBM. (n.d.). Moraitis fresh slices supply chain
costs with IBM RFID solution. Retrieved January
Beherrschen, V. M. (n.d.). Frequency ranges.
8, 2006, from www.ibm.com/industries/wire-
Retrieved February 2, 2006, from http://www.
less/pdfs/moratis_final.pdf
rfid-handbook.de/rfid/frequencies.html
Intermec. (2006a). IF5 IntellliTag fixed reader.
Caspian. (2003). Scandal: Wal-Mart, P&G in-
Retrieved June 14, 2006, from http://www.poin-
volved in secret RFID testing. Retrieved June
tofsaleinc.com/pdf/Intermec/if5.pdf
13, 2006 from http://www.spychips.com/press-
releases/broken-arrow.html. Intermec. (2006b). IP3 IntellliTag portable reader
(UHF). Retrieved June 14, 2006, from http://www.
Collins, J. (2005). Aussie track mail via RFID.
pointofsaleinc.com/pdf/Intermec/ip3.pdf
Retrieved January 4, 2006, from http://www.
rfidjournal.com/article/articleview/2014/1/1/ Intermec. (2006c). IV7 IntelliTag vehicle mount
RFID reader. Retrieved June 14, 2006, from http://
Dimitriou, T. (2005). A lightweight RFID protocol
www.pointofsaleinc.com/pdf/Intermec/iv7.pdf
to protect against traceability and cloning attacks.
In Proceedings of the Conference on Security & Juels, A., Rivest, R.L., & Szydlo, M. (2003). The
Privacy for Emerging Areas in Communication blocker tag: Selective blocking of RFID tags for
Networks. consumer privacy. In Proceedings of the 10th ACM
Conference on Computer and Communications
Engberg, S.J., Harning, M.B., & Jensen, C.D.
Security, Washington, DC.
(2004). Zero-knowledge device authentication:
Privacy and security enhanced RFID preserv- Knospe, H., & Pohl, H. (2004). RFID security
ing business value and consumer convenience. information security technical report. Elsevier,
In Proceedings of the Conference on Privacy, 9(4), 30-41.
Security & Trust (PST04), Canada.
Kumar, R. (n.d.). Interaction of RFID technology
eWeek.com. (n.d.). For many, RFID ROI still a and public policy. Retrieved June 14, 2006, from
dream. Retrieved June 10, 2006, from http://www. http://www.wipro.com/distribution
eweek.com/article2/0,1895,1756872,00.asp


Automated Data Capture Technologies

Leaver, S. (2005). Evaluating RFID middle- RosettaNet. (2001). PIP specification PIP3B4:
ware. Retrieved August 7, 2005, from http:// Query shipment status. Retrieved June 14, 2006,
www.forrester.com/Research/Document/Ex- from http://www.rosettanet.org
cerpt/0,7211,34390,00.html
Stallings, W. (1999). Cryptography and network
Lyngsoe. (n.d.) Retrieved June 14, 2006, from security. Englewood Cliffs, NJ: Prentice-Hall.
http://www.lyngsoesystems.com
Sweeney, P.J. (2005). RFID for dummies. India-
Menezes, A., Van Oorschot, P., & Vanstone, napolis, IN: Wiley Publishing.
S. (1996). Handbook of applied cryptography.
Symbol Technologies. (2004). Business benefits
London: CRC Press.
from radio frequency identification (RFID). Re-
OConnor, M.C. (2005). Australias military to trieved June 14, 2006, from http://www.symbol.
track supplies. Retrieved January 8, 2006, from com/products/rfid/rfid.html
http://www.rfidjournal.com/article/articlev-
Tecstra. (n.d.) RFID. Retrieved September 1, 2005,
iew/1838/1/1/
from http://glossary.ippaper.com/
Potdar, V., Wu, C., & Chang, E. (2005, Decem-
Vajda, I., & Buttyan, L. (2003). Lightweight
ber 15-19). Tamper detection for ubiquitous
authentication protocols for low-cost RFID tags.
RFID-enabled supply chain. In Proceedings of
In Proceedings of the 2nd Workshop on Security
the International Conference on Computational
in Ubiquitous Computing (Ubicomp), Seattle,
Intelligence and Security, Xian, China.
WA.
RFidGazzete. (n.d.). Tag shapes. Retrieved
Weis, S.A. (2003). Security and privacy in ra-
June 14, 2006, from http://www.rfidgazette.
dio-frequency identification devices. Boston:
org/2005/10/tag_shapes.html
Massachusetts Institute of Technology.
RFID Journal. (2006a). Retrieved June 14,
Weis, S.A., Sarma, S.E., Rivest, R.L., & Engels,
2006, from http://www.rfidjournal.com/article/
D.W. (2004). Security and privacy aspects of
articleview/208#Anchor-scanners-5989
low-cost radio frequency identification systems.
RFID Journal. (2006b). Glossary results M-S. In Proceedings of Security in Pervasive Comput-
Retrieved June 14, 2006, from http://www.rfid- ing 2003.
journal.com/article/glossary/3
Wong, D.M.-L., & Phan, R.C.-W. (2006). RFID
RFID Journal. (2006c). RFID system compo- systems: Applications versus security & privacy
nents and costs. Retrieved February 13, 2006, implications. In G. Radhamani, & G.S.V. Radha
from http://www.rfidjournal.com/article/articlev- Krishna Rao (Eds.), Web services security and e-
iew/1336/2/129/ business. Hershey, PA: Idea Group Publishing.
RMOROZ. (2004). Understanding radio fre- Zebra. (2006). 13.56 MHz HF Zebra R-2844Z.
quency identification (RFID): Passive RFID. Retrieved February 13, 2006, from http://www.
Retrieved June 14, 2006, from http://www.rmoroz. zebra.com/id/zebra/na/en/index/products/print-
com/rfid.html ers/rfid.html

0
Automated Data Capture Technologies

enDnoteS 4
Integrity refers to the reliability of the in-
formation on the RFID tag.
1
http://www.rfid-handbook.de/forum/read. 5
The RFID systems (in the UHF) work in a
php?f=4&i=81&t=81 very congested frequency range; frequency
2
RS-232 is a protocol for wired communica- jamming can easily attack such systems.
tion. Readers are connected using cables Hence the availability of an RFID network
(max 30m) and the data transmission rate is a security property which needs to be
is very low. RS-485 is an improvement to considered.
RS-232, which still used cables, but can be 6
One major security issue with the RFID tag
large sized (1200m) and the data transmis- is authentication. The data on the RFID tag
sion rate is higher (2.5Mb per sec). like the unique identifier (UID) can be easily
3
Confidentiality refers to the confidentiality manipulated or spoofed, as these tags are not
in communication between the tag and the tamper resistant (Knospe & Pohl, 2004).
reader. 7
Anonymity to undesired and anonymous
scanning of items or people.




Chapter VII
Information Security Risk
in the E-Supply Chain
Wade H. Baker
Virginia Tech, USA

Gregory E. Smith
Xavier University, USA

Kevin James Watson


University of New Orleans, USA

ABStRAct

Collaboration between supply chain partners, facilitated by integration of information flows, has created
more efficient and effective networks. However, the benefits of interconnectivity are not gained without
risk. Though essential to support collaboration, increased use of information technology has removed
internal and external protective barriers around an organizations assets and processes. Thus, supply
chains are better able to satisfy the needs of customers while more vulnerable to an array of IT-specific
risks. This chapter identifies the sources of IT threats in the supply chain, categorizes those threats, and
validates them by means of a survey of 188 companies representing a range of supply chain functions.
Analysis suggests that supply chain risk is affected by IT threats, and therefore the benefits of collabora-
tion facilitated by IT integration must exceed the increase in risk due to IT security threats.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Information Security Risk in the E-Supply Chain

intRoDUction supply chains. The following addresses this issue


by identifying, categorizing, and validating the
Supply chain management attempts to coordinate sources of information security risk within the
and combine all value chain activities into a single extended supply chain. To do so, several recent
seamless process by emphasizing collaboration empirical studies, as well as a multi-company
and integration across functions and between survey representing a broad range of supply chain
organizations. Collaboration and integration are functions, are examined and discussed. The intent
increasingly seen as necessary to improve effi- is to establish a foundational conceptualization
ciency and effectiveness across a supply chain that of information security risk within the overall
has grown in both scope and complexity in recent supply chain, and to provide managers and
years. The strategic importance of supply chain academicians with a better understanding of the
management has changed the nature of competition, relationship between supply chain and informa-
in that contemporary views of competitive rivalry tion risk. While beyond the scope of the chapter,
increasingly see competition between supply chains it is hoped that by defining IT risk in the context
rather than between firms. Facilitating supply of the supply chain, management will be able to
chain managements development is information identify previously unrecognized or undervalued
technology (IT), which has enabled integration of sources of threats and design improved mitigation
information flows between channel participants strategies for dealing with them.
thereby reducing uncertainty and risk. As the primary goal of this chapter is to estab-
Supply chain management is essentially in- lish a foundation from which information security
formation driven; supply chains that share infor- can be studied within the context of supply chain
mation for coordinated decision making achieve management, the chapter begins with a discussion
maximum efficiency for all channel members. of the role of collaboration and information tech-
However, by eliminating traditional layers of nology in improving supply chain performance.
internal and external separation, which once This is followed by a short discussion regarding
formed protective barriers around organizational how IT security events can create problems that
assets and processes, IT-facilitated collaboration ripple throughout the supply chain. A review of
has simultaneously improved the supply chains select supply chain and IT risk models is then
ability to satisfy customer needs while making it presented, the review of IT risk factors including
more vulnerable to an array of IT-specific threats. a categorization of IT threats. These models are
This realization identifies two underappreciated then merged into a single framework capable of
aspects of current SCM. First, there is a lack of establishing point of origin, threat type, and type
understanding as to the extent to which IT-spe- of risk to the supply chain caused by IT-specific
cific threats affect the overall risk within supply threats. To assist in further developing the current
chains. Second, while members within highly reality and validate the proposed mode, results
interconnected supply chains would appear to and analysis of a large-scale survey conducted
achieve the greatest benefits, they also appear to in conjunction with a world-leading IT-security
be especially vulnerable to IT hazards. services company are presented. The remainder
While supply chain risk and information of the chapter contains general recommendations
technology risk have been studied in isolation, as to how companies may mitigate risk when es-
little has been done to define the impact of infor- tablishing or operating collaborative partnerships
mation security threats within highly integrated and concluding comments.


Information Security Risk in the E-Supply Chain

coLLABoRAtion AnD it Partners may not have a clear vision of the


supply chain and maintain a silo view of the
The core tenet in developing flexible supply organizational structure.
chains is the practice of collaboration. Supply Partners may not buy in and fully invest
chain collaboration is the confluence of all par- in the collaboration effort.
ties in the supply chain acting in unison towards Partners may not sufficiently communicate
common objectives. Collaborative partners share with one another, leading to potentially
information, knowledge, risk, and profits (Men- damaging effects.
tzer et al., 2000) based on a foundation of trust Partners may betray one another for selfish
and commitment to one another. Ultimately, as gains rather than stay steadfast to the goal
organizations move beyond mere operational-level of collective gains.
exchanges toward collaboration, supply chains
become more competitive (McLaren, Head, & Ultimately, when obstacles are overcome and
Yuan, 2002). Supply chain collaboration does not enablers are in place, a supply chain can garner
happen on its own, Mentzer et al. (2000) found significant benefits. The benefits can be broadly
that certain conditions or enablers must be in categorized into two groups: financial and non-
place for partners to forge a collaborative union financial. The financial benefits arising from
and share in the benefits of the effort. Specifically, collaboration arise from reduction in inventory
the authors found that collaborative relationship holding costs and greater efficiency of productive
required partners in supply chains to: resources (Cachon & Fisher, 2000).
The effects of the financial benefits are rever-
Share the responsibility of the cooperative berated throughout the supply chain and easily
outcome to foster continued commitment measurable. They receive significant attention
Candidly discuss their operations and because of their impact, but remain only one
practices including information that might part of the benefits received. The impact of the
otherwise be deemed proprietary non-financial benefits, though more subtle and
Trust and respect the judgments and sug- often difficult to measure, are just as important,
gestions of their fellow collaborators as they drive revenue growth. Non-financial
Have clear expectations of one another gains include:
Solve problems in a unified effort which
focuses on solutions, not blame Faster speed to market of new products
Engage in implementing advanced informa- Stronger focus on core competencies
tion technology and commit to sustaining Enhanced public image
this practice Greater trust and interdependence
Increased sharing of information, ideas, and
Engaging in these practices improves part- technology
ners ability to overcome certain obstacles that Stronger emphasis on the supply chain as a
could doom supply chain collaboration. Further, whole
Mentzer et al. (2000) identified several practices Improved shareholder value
that might impede collaboration: Competitive advantage over other supply
chains (mentzer, 2001)
Partners could resist change and discard
collaborative practices by insisting on doing The overall impact that collaboration can have
things the old way. on a companys bottom line can be staggering.


Information Security Risk in the E-Supply Chain

Based on the extent of collaboration, a company it SecURitY:


can add as much as three points to its profit margin A SUPPLY chAin iSSUe
(Wise & Fahrenwald, 2001).
Unfortunately, assessing the level of collabora- With varying levels of relationships and informa-
tion has proved a difficult measure. A number of tion sharing within supply chains, especially at
researchers have attempted to score or assign levels the strategic level, greater importance must be
of collaboration to enterprises and assess supply placed on information security. It has been sug-
chain performance (Mentzer, Min & Zacharia, gested (Lee & Whang, 2000; Kolluru & Meredith,
2000; Barratt & Oliveira, 2001; Simatupang & 2001; Spekman & Davis, 2004) that securing
Sridharan, 2005). To this end, Kolluru and Mer- information in the supply chain demands more
edith (2001) developed a series of levels between attention than it currently receives. In fact, Lee and
partners based on the degree of collaboration. At Whang (2000) consider identifying the amount
the lowest level, partners engage in minimal arms- of information that can be exchanged between
length relationships typified by asynchronous supply chain partners without increasing the risk
one-way data push communication mechanisms. of exploitation to be one of the most challenging
Information sharing at this level is typified by and frequently asked questions of the day.
the seven rudimentary information types identi- The impact of IT security incidents to IT-
fied by Lee, Padmanabhan, and Whang (1997) enabled supply chains became evident as we
which are necessary for operation of a supply analyzed the results of several industry surveys
chain: inventory level, sales data, order status for conducted to assess the impact of worldwide com-
tracking and tracing, sales forecasts, production puter virus events over the past two years. The
and delivery schedules, performance metrics, and studies, done in cooperation with Cybertrust, the
capacity. The highest level exists at a strategic level largest managed security services company in the
of collaboration across the extended enterprise world, were conducted to analyze the impact of
facilitated by peer-to-peer client-server communi- large-scale virus events and included thousands
cation. At this level, information sharing exceeds of organizations worldwide. Although the scope
rudimentary requirements, expanding to include of these instruments did not specifically address
product, customer, supplier, process, competitive, the source of infection, numerous respondents
and marketing information (Handfield & Nichols, pointed to their partners as a source of infection
1999). It appears that the degree of relationship in open response questions. We also noticed a
dictates the type of information shared and the number of organizations specifically commented
means by which it is transmitted. on various impacts to their supply chain operations
Advances in IT have enabled integration and after partners were infected. Several examples of
information sharing, and thus become a key driver participant comments following four well-known
of supply chain collaboration (Bowersox, 1990; viruses are included in Table 1.
Huang & Gangopadhyay, 2004). In fact, it has Intrigued by these comments and desiring to
been argued that it is impossible to achieve an further investigate the difficulties presented by
efficient, competitive, and collaborative supply IT security within supply chains, we cooperated
chain without IT (Gunasekaran & Ngai, 2004). with Cybertrust to conduct a large-scale industry
Though the supply chain literature frequently survey to determine the scope and nature of IT
proclaims the virtues of information sharing, risk to supply chain management. As will be
it is not void of warnings concerning potential shown throughout the remainder of this chapter,
drawbacks.


Information Security Risk in the E-Supply Chain

Table 1. Comments from survey participants relating to the impact of recent worldwide virus
events

SQL Slammer, January 2003


The worm took down two of our data exchange partners.
A large part of the impact for us was related to the loss of access to our external trade partners/
customers.
Although we were not infected by Slammer, many of our partners were. This severely interfered
with our work.
We were cut off from partner sites when they went down.
Blaster, August 2003
We were infected when a vendor hooked up his laptop to our network.
We were infected by a 3rd party on our network.
We got the worm through unpatched customer PCs.
Blaster got in through a trusted partner network.
We were infected because partners are not keeping their machines up to date with anti-virus and OS
patches. This is a real problemour IT department doesnt have control over what they do yet we
suffer the consequences of their poor practices.
Our suppliers could not confirm orders.
We had numerous infected partnersthis interfered with our work and productivity.
MyDoom, January 2004
Our customers and suppliers sent it to us.
It originally came in from a partner who we have a direct connection with.

The major problems have been with our trading partners who have stopped allowing any outside
e-mails to enter their system in an attempt to stop the worms spread. In addition, some are restricting
anything with an attachment. For our business, 99% of all our e-mail traffic includes attachments of
one type or another and so our operations have basically been shut down.

Several of our partners were infected causing numerous operational difficulties.


Sasser, May 2004
17% of participants infected reported a disruption of customer computing functions (order
processing, sales, marketing, etc.).
16% of participants infected reported a disruption of key corporate computing functions (payroll,
inventory, manufacturing, etc.).
14% of participants infected reported a disruption of partner network connectivity.


Information Security Risk in the E-Supply Chain

our findings imply that security incidents pose a ures or the supply market, in which its outcomes
legitimate threat to supply chain operations and result in the inability of the purchasing organiza-
call for an in-depth analysis of risk relating to the tion to meet customer demand or cause threats
extensive usage of IT in modern supply chains. to customer life and safety. The key elements of
this definition are the identification of sources of
SUPPLY chAin RiSK risk and their associated threats. Christopher and
Peck (2004) identify five areas that are potentially
Christopher and Peck (2004) speak to the dif- vulnerable in supply chains: processes, controls,
ficulty in defining risk, identifying two primary demand, supply, and environment. These vulner-
schools of thought: variance-based definitions abilities fall within three risk categories: organi-
from classical decision theory and hazard-focused zational, network, and environmental (Juttner,
definitions common to risk management. Defining Peck, & Christopher, 2003).
the nature of and quantifying exposure to risk Organizational risks are those found entirely
is often seen as the first step toward improving within the boundaries of an organization; these
decision making. The Royal Society (1992) ad- risks include labor, production, and IT system
dresses this problem by defining risk in terms uncertainties (Juttner et al., 2003). The most
of an expected value measurement when they common types of organizational risks are process
defined risk as a combination of probability, and control risks. Processes including produc-
or frequency, of occurrence of a defined hazard tion, sourcing, warehousing, transportation, and
and the magnitude of the consequences of the planning and scheduling are the activities that
occurrence. However, risk measurements are add value to an organization. Disruption to the
often performed qualitatively. Qualitative risk execution of these processes is known as process
measurement evaluates descriptive variables risk. Controls are the assumptions, rules, systems,
categorically, instead of numerically, to arrive and procedures that govern how organizations
at a pragmatic solution. Categorical evaluation exert control over processes. Misapplication or
makes the task of quantitative risk measurement misuse of these controls is known as control risk.
non-trivial. In either case, risk measures are Cooperation between an organizations process
fundamental to decision making and dependent and control mechanism is an essential supply
on the identification of threats. chain strategy (Christopher, Peck, Wilding, &
Spekman and Davis (2004) stated that risk is Chapman, 2002).
context specific, where different types of risk affect Network risks occur due to interactions be-
enterprises differently. From a business context, tween organizations linked in a supply chain.
DeLoach (2000) identified risk as the level of Organizations must procure materials from up-
exposure to uncertainties that the enterprise must stream suppliers and sell finished goods through
understand and effectively manage as it executes a distribution network. However, there are risks
its strategies to achieve its business objectives and associated with interactions between supply chain
create value. Within this context, the definition of participants. Unexpected events may occur dur-
risk is clear yet broad, as business risk may refer ing acquisition, transportation, and employment
to many functions of an enterprise. To hone the of goods and services that negatively affect an
definition to apply to supply chain risk, it must be organizations ability to serve its customers. Sup-
refined to emphasize supply and demand. ply risk and demand risk, which comprise network-
Zsidisin (2003) states that supply chain risk is related risks, are defined by their role relative to the
the potential occurrence of an incident associated organization. Supply risk is the probability that an
with inbound supply from individual supplier fail- unexpected event occurs upstream in the supply


Information Security Risk in the E-Supply Chain

chain, resulting in a negative consequence to the These uncertainties and conflicts exist be-
organization obtaining the goods and services. cause little has been done in the way of a unify-
Similarly, Christopher and Peck (2004) identified ing framework between IT security and supply
demand risk as the potential for or actual disrup- chain risk. Given the growing importance of IT
tions of product or information flows that exist in SCM and the rise in IT security incidents in
between an organization and customers. Demand recent years, resolving this dilemma is critical
risk is dependent on organizational level mecha- to a resilient modern supply chain. In pursuit of
nisms (and their associated risks) of adjacent and such a framework, a fundamental understand-
downstream organizations. ing of IT security risk is essential. Therefore, an
Environmental risks, the most encompassing overview of IT security risk factors is supplied
category, can affect the four prior sources of risk in the following section.
within their root categories. They are any uncer-
tainties that occur as a result of an interaction
between supply chain participants and the envi- it SecURitY RiSK FActoRS
ronment. Environmental risks could result from
socio-political actions, accidents, or acts of God Many consider IT security to be relatively new,
(Christopher & Peck 2004). These events may be arising in conjunction with the increase in e-
far removed from an organization, but their effect commerce since the mid-1990s. However, IT
could be passed to other network organizations security can be traced back to the 1960s when
or associated supply chains. employees of different organizations shared then
An appropriate line of inquiry at this juncture scarce computer resources (Wilkes, 1991). This
concerns the relationship of IT security to the situation necessitated a means to control access to
supply chain risk categories above. Unfortunately, mutually accessible files, and the practice of com-
no clear and concise answer presents itself within puter security was born. Since that time, securing
the literature. IT system failureswhich are often computing and IT systems within organizations
caused by security incidentsare considered to and the interconnections between them has been
be an organizational risk (Juttner et al., 2003). a persistent and increasingly difficult challenge,
Yet disruptions to information flows are certainly necessitating the development of formal programs
within the domain of IT security, and Christopher to manage IT-related risk.
and Peck (2004) identified these events as a type Management of risk related to IT systems
of network-related supply chain risk. Many IT within a single organization has been exten-
security threats, such as worms and hackers, sively discussed in academic, professional, and
originate outside an organization and its network governmental arenas, while the interconnections
of partners. These could be included among between organizations have received somewhat
environmental risk sources in the supply chain. less attention. The National Institute of Standards
Based on the comments in Table 1, it is obvious and Technology (NIST) defines three basic com-
that worms and viruses must be considered a ponents of an IT system interconnection: two IT
network risk as well due to their tendency to systems and an interconnecting pipe through
propagate along the IT system interconnections which information is made available (Grance,
among supply chain partners. Alternatively, others Hash, Peck, Smith, & Korow-Diks, 2002). These
have classified the security of a firms IT systems components are depicted in Figure 1. Similar
as its own dimension of supply chain risk (Spek- to the quantitative definition of risk previously
man & Davis, 2004). discussed, most sources define IT risk as the
product of the frequency of potential threats, the


Information Security Risk in the E-Supply Chain

Figure 1. Components of interconnected IT systems literature as to potential threats contained within


(Adapted from NIST, 1997) each. It is important to note that we are not claim-
ing this list is exhaustive or descriptive, rather we
consider it to be a high-level categorical repre-
sentation of a large spectrum of specific threats
to IT systems and interconnections. An equally
important factor in our efforts was a desire to
separate threats from impacts. Taxonomies often
fail to make this distinction, treating causes (or
threats) and effects (or impacts) interchangeably.
For instance, we view various kinds of electronic
likelihood of their success, and their impacts to theft listed by Kolluru and Meredith (2001) and
the organization (Baker & Rees, 2006). Spekman and Davis (2004) as an impact associ-
ated with a successful threatsuch as a network
it Security threats intrusion attempt or one of the many varieties
of fraud and deception on the Internet. Physical
It is beneficial to an initial investigation of IT se- theft of data or equipment is treated as a physical
curity to define a rational categorization of threats and environmental hazard. Separating threats
to establish a proper foundation and facilitate and impacts in this manner becomes extremely
understanding. Hence, numerous taxonomies important when attempting to measure risk.
have been proposed in years past to classify and Malicious code and programs are written to
systematize common IT security threats. Such infect IT systems and then multiply, propagate,
efforts tend to vary greatly depending on their modify programs, steal information, and generally
intended use and scope (i.e., threats identified act egregiously. This category of threat is diverse
for management attention will likely be fewer in and inescapable for organizations connected to
number and less specific than those used by IT the Internet. Viruses, worms, Trojans, spyware,
security professionals). In identifying threat cat- and keyloggers are all examples of malicious code
egories for this study, we draw from professional and programs. Hacking and intrusion attempts
experience, relevant literature, and numerous include any effort to gain unauthorized access to or
industry and government sources. As our chief alter the normal operation of IT systems. Threats
purpose to discuss IT security in the context of of this type (denial of service, buffer overflow,
the supply chain, we include threats identified and man-in-the-middle attacks) enable cyber
in previous SCM literature (Warren & Hutchin- criminals to take control of a system, allowing
son, 2000; Kolluru & Meredith, 2001; Spekman a range of options extending from shutting the
& Davis, 2004) as well as from traditional IT system down to defacing Web pages to stealing
sources (Smith, 1989; Loch & Carr, 1992; Ches- information. Fraud and deception is any attempt
wick & Bellovin, 1994; Icove, Seger, VonStorch, at misrepresentation of identity to deceive and
& NetLibrary, 1995; Cohen, 1997; NIST, 1997; exploit. Fraud is often accomplished through
Whitman, 2003; Gordon, Loeb, Lucyshyn, & non-technical means, but may take on electronic
Richardson, 2004). forms like phishing (a type of e-mail fraud),
Categorizing IT threats from both the IT and hoaxes, or credit card theft. Misuse and sabotage
SCM literature resulted in the selection of six gen- contain a diverse and particularly worrisome set
eral IT security threat categories. Table 2 displays of threats because persons entrusted with access
these categories and provides examples from the to organization resources have a unique oppor-


Information Security Risk in the E-Supply Chain

Table 2. Categories of potential threats to IT resources

Malicious Code and Programs

Malicious Code/Programs (Amoroso, 1994; NIST, 1997; CyberProtect, 1999; NSW Guideline, 2003)
Viruses and Worm (Loch & Carr, 1992; Landwehr et al., 1994; Icove et al., 1995; Cohen, 1997; CyberProtect,
1999; Whitman, 2003; Gordon et al., 2004)
Trojan Horse (Landwehr et al., 1994; Icove et al., 1995; Cohen, 1997; CyberProtect, 1999)
Logic/Time Bombs (Landwehr et al., 1994; Icove et al., 1995; CyberProtect, 1999)

Malicious Hacking & Intrusion Attempts

Hacking (Loch & Carr, 1992; NIST, 1997; CyberProtect, 1999; Spekman & Davis, 2004)
Unauthorized Access/System Penetration (Loch & Carr, 1992; Warren & Hutchinson, 2000; NSW Guideline,
2003; Whitman, 2003; Gordon et al., 2004; Spekman & Davis, 2004)
Denial of Service Attacks (Loch & Carr, 1992; Cheswick & Bellovin, 1994; Icove et al., 1995; NIST, 1997; Cyber-
Protect, 1999; Warren & Hutchinson, 2000; NSW Guideline, 2003; Whitman, 2003; Spekman & Davis, 2004)
Password Sniffing/Cracking Software (Amoroso, 1994; Icove et al., 1995; Cohen, 1997; CyberProtect, 1999; War-
ren & Hutchinson, 2000)
Industrial/Government Espionage (NIST, 1997; NSW Guideline, 2003; Whitman, 2003)
Eavesdropping (Amoroso, 1994; Icove et al., 1995; CyberProtect, 1999; NSW Guideline, 2003)
Web Site Intrusion/Defacement (NSW Guideline, 2003; Gordon et al., 2004; Spekman & Davis, 2004)
Trap Doors (Landwehr et al., 1994; Icove et al., 1995)

Fraud and Deception

Fraud (NIST, 1997; NSW Guideline, 2003; Gordon et al., 2004; Spekman & Davis, 2004)
Spoofing (Icove et al., 1995; Cohen, 1997; CyberProtect, 1999; Warren & Hutchinson, 2000)
Masquerading (Amoroso, 1994; Icove et al., 1995; Cohen, 1997; NSW Guideline, 2003)
Social Engineering (Cheswick & Bellovin, 1994; Cohen, 1997; NSW Guideline, 2003)
Salami Attacks (Icove et al., 1995; Cohen, 1997)
Privacy/Identity Threats (NIST, 1997)

Misuse and Sabotage

Deliberate Acts of Sabotage or Vandalism (Loch & Carr, 1992; NIST, 1997; NSW Guideline, 2003; Whitman,
2003; Gordon et al., 2004)
Abuse/Misuse of Resources (Amoroso, 1994; Icove et al., 1995; Cohen, 1997; Kolluru & Meredith, 2001; NSW
Guideline, 2003; Gordon et al., 2004)
Abuse/Misuse of Privileges (Amoroso, 1994; Icove et al., 1995; Cohen, 1997)
Insider Crime (Cohen, 1997; CyberProtect, 1999)
Unauthorized Software Changes (Cohen, 1997; NSW Guideline, 2003)

0
Information Security Risk in the E-Supply Chain

Table 2. continued

Errors and Omissions

Human Error (Cohen, 1997; NIST, 1997; NSW Guideline, 2003; Whitman, 2003)
Software/Programming Errors (Loch & Carr, 1992; Cheswick & Bellovin, 1994; Cohen, 1997; NSW Guideline,
2003; Whitman, 2003)
Accidental Entry/Destruction of Data by Employees (Loch & Carr, 1992)
Protocol/Routing/Transmission Errors (Cheswick & Bellovin, 1994; Cohen, 1997; NSW Guideline, 2003)

Physical and Environmental Hazards

Forces of Nature (fire, flood, earthquake, etc.) (Loch & Carr, 1992; NSW Guideline, 2003; Whitman, 2003)
Service Disruptions from Third-Party Provider (power, WAN, etc.) (Loch & Carr, 1992; Icove et al., 1995; Co-
hen, 1997; NIST, 1997; NSW Guideline, 2003; Whitman, 2003)
Weak, Ineffective, Inadequate Physical Control (Loch & Carr, 1992; Cohen, 1997)
Physical Data/Equipment Theft (Loch & Carr, 1992; Amoroso, 1994; Cohen, 1997; NIST, 1997; Kolluru & Mer-
edith, 2001; Gordon et al., 2004; Spekman & Davis, 2004)
Dumpster Diving (Icove et al., 1995; Cohen, 1997; CyberProtect, 1999)

tunity to misuse them. An employee, partner, or it Security Vulnerabilities


contractor that abuses the access and privileges
he/she has been granted within a company for ma- The likelihood that any threat will be success-
levolent purposes would fall under this category. ful is largely dependent on the vulnerability of
These threats manifest themselves in the form of an organizations IT assets, including systems,
embezzlement, inappropriate use of an Internet software, information, personnel, and equipment.
connection or e-mail, sabotage, or using systems A vulnerability is a condition or weakness that
or IT resources for anything other than intended could be accidentally or intentionally exercised
purposes. Errors and omissions are unintentional by a threat (Stoneburner, Goguen, & Feringa,
and unavoidable. They include minor nuisances 2002). If no vulnerabilities are present, the likeli-
like coffee on keyboards, to programming errors, hood of a threats success is zero and thus IT risk
to major catastrophes such as stumbling into a is eliminated. Unfortunately, it is difficult and
rack of online sales servers. Finally, physical cost-prohibitive, if not impossible, to eliminate
and environmental hazards include equipment an organizations vulnerability to all IT threats.
failures, power outages, natural disasters, and Therefore, the aim of IT risk management is to
physical theft of property or data. Though typi- minimize vulnerability by implementing mana-
cally rare and often outside the realm of control, gerial, operational, and technical controls in an
an organization failing to take appropriate action efficient and effective manner and, in the event that
will incur high downtime and equipment replace- IT security control measures are not effective, to
ment losses due to threats in this category. mitigate the negative consequences to the firm.


Information Security Risk in the E-Supply Chain

it Security impacts it SecURitY AnD SUPPLY chAin


RiSK
The third requirement of a realistic model of IT
security risk must account for potential impacts Because modern supply chains are founded
to IT assets. The practice of IT risk management upon a series of interconnected IT systems, it
has traditionally classified these impacts in terms is logical that they are subject to all the risks
of loss or degradation of any of the following heretofore discussed as being inherent to these
primary security goals: confidentiality, integrity, systems. Once an IT threat has materialized, the
and availability (Stoneburner et al., 2002). Confi- impact from such an incident may range from
dentiality requires that information be secure from inconvenient to catastrophic and permeate all
unauthorized disclosure, while integrity refers levels of the supply chain. Consequently, we now
to its reliability and protection from improper focus on the nature of the relationship between
modification. The goal of availability mandates these two areas of risk and in so doing, seek a
that IT systems, interconnections, and information foundational model for IT security risk within the
remain accessibly and uninterrupted. With these context of overall supply chain risk. In an effort
IT system impacts come numerous secondary and to build an enveloping structure of sources by
downstream consequences that ripple not only category, information flows between and within
through the organization in which they originate organizations, along with essential supply chain
but the entire supply chain. component representations, must be identified.

Figure 2. Model of supply chain information security risk

Physical Transformation Physical Physical Transformation Physical Physical Transformation Physical


Supply Process Distribution Supply Process Distribution Supply Process Distribution

Control Control Control

ENVIRONMENT PROCESS

NETWORK PHYSICAL FLOW OF PRODUCT

ORGANIZATION INFORMATION LINKAGE


Information Security Risk in the E-Supply Chain

Smith, Watson, Baker, and Pokorski (2006) the respondent comments included in Table 1.
incorporated these informational linkages and Additionally, malicious code can be written and
establish a full categorical identification of supply released by an organizations own employees,
chain risk sources (see Figure 2). In keeping with making this type of threat an organizational risk
the model proposed by Juttner et al. (2003), the as well. Although we have used malicious code to
authors have identified the three major sources show that IT security and supply chain risk share
of risk originating from organizational, network, common sources, it should be understood that most
and environmental sources. Similar to the model IT threats span multiple sources as well.
proposed by Christopher and Peck (2004), the From our previous discussion of IT security
authors identified five areas vulnerable to informa- threats, it is obvious there is a myriad of vastly
tion distortions within the supply chain: physical different methods, channels, vulnerabilities, and
supply, the transformation process, physical dis- actors that can potentially disrupt information
tribution, control processes, and the information flows in the supply chain. For instance, intrusion
linkages between organizations. The information attempts can be separated into virtual and physi-
linkages and the information flowing across them cal. Obviously, the steps required to gain access
are subject to compromise due to organizational, to an IT system via a network are not the same
network, or environmental factorsincluding, of as those used to gain physical access. Even when
course, those related to IT security. isolating virtual intrusion attempts, techniques
To understand how these information linkages and possibilities abound. Though seemingly
are at risk, it is paramount at this point to revisit elementary, characteristics such as these are
the notion of IT security risk factorsnamely critical to calculating risk and selecting proper
threats, vulnerabilities, and impacts. Though we mitigation strategies.
have provided the six high-level categories of IT Figure 3 builds on our previous discussion
threats in Table 2 above for pedagogical reasons, of IT system impact, illustrating breaches to
we agree with Howard and Longstaff (1998) that confidentiality, integrity, and availability as they
categorical representations alone are insufficient specifically relate to interconnected IT systems
to provide clarity, accuracy, and measurability that comprise e-supply chains.
of risk associated with IT security incidents. A Once the technical impacts to IT systems
more realistic model of how IT security incidents are clearly defined and understood, it becomes
affect risk in the supply chain should at minimum possible to draw connections to affiliated con-
account for: (1) threat source, (2) threat character- sequences within the supply chain. Previous
istics, (3) IT system vulnerabilities, (4) potential supply chain literature is beneficial to this pur-
impact to IT assets, and (5) consequences to the suit. Li (2002) speaks to the need to guard the
supply chain. confidentiality of information flows between
As depicted in Figure 2, at a broad level, IT supply chain partners from either direct or inad-
security and the supply chain share the same vertent disclosure. Findings suggest that there is
sources of risk: organizational, network, or en- a disincentive to share data due to information
vironmental. Viruses and malicious programs, leakage and resulting strategic actions by com-
for instance, often stem from environmental risk petitors. A recent example of how such leakage
from the far reaches of the Internet; however, may occur and the consequence was reported
because supply chain partners typically maintain in The New York Times (Greenhouse, 2005): a
high interconnectivity to support collaboration, supplier lost its entire Costco account when a
we have found malicious code to be a substantial Wal-Mart invoice was inadvertently routed to
network risk as well. This was apparent from Costco showing a lower price for items stocked


Information Security Risk in the E-Supply Chain

Figure 3. Impacts of IT incidents on interconnected systems

by both companies. While this disclosure was retailer that audited inventory on hand at a new
accidental, the same type of disclosure could store, finding inaccuracies in 29% of SKUs. Many
result from the unauthorized access of company of these inaccuracies can be attributed to incor-
data due to any number of IT threats and could rect receiving practices or incorrectly scanning
be used not only for competitive purposes, but products at the point of sale. A second retailer
to blackmail a company whose vulnerabilities found 16% of stock outs were falsely reported to
have been exploited. To improve trust and spur customers, reducing company profitability by an
increases in information sharing, three electron- estimated 25%. Beyond these, transmission errors
ics trade associations proposed guidelines for the between channel partners or between systems
treatment of confidential information between may result in an incorrect product being ordered
supply chain partners (Jorgensen, 1998). or an incorrect quantity of the correct product
One of the most important factors for imple- being delivered. For example, NIKE blamed i2
mentation of IT systems to facilitate coordination Technologies for an estimated $80-100 million
of the supply chain is data integrity. Data accuracy shortfall in quarterly revenues when a glitch in a
has been found to be a critical success factor for new order processing system intended to match
implementation of material requirements planning forecasts with demand created inefficiencies in
(Petroni, 2002; Ismail, 2005) and enterprise re- its supply chain (Anonymous, 2001).
source planning (Nelson, 2002; Xu, Nord, Brown, Any number of threats can create disruptions
& Nord, 2002) systems. Data integrity is not just and degrade an IT systems availability. Regardless
an issue for implementation, but extends to the of the vulnerability, disruptions to the informa-
operation of the supply chain. Raman, DeHora- tion infrastructure create serious consequences
tius, and Ton (2001) point to the experience of a not only within a firm but also, by contributing


Information Security Risk in the E-Supply Chain

to bullwhip and schedule nervousness, to those are often reluctant to divulge information about
outside the originating organization. Chopra security practices and problems to outside par-
and Sodhi (2004) provide the example of the ties. Prior research has, however, suggested that
Love Bug virus to illustrate consequences of partnering with a trusted entity (i.e., government
information disruptions on the supply chain. In body or independent security company) when
2000, the Love Bug virus shut down many gov- conducting information security research encour-
ernment and industry e-mail servers, including ages participation and improves results (Kotulic
that of the Pentagon and Ford Motors, causing an & Clack, 2004). For this reason, the survey was
estimated billion dollars in damages worldwide. again developed and conducted in cooperation
Two common threats to system availability, vi- with Cybertrust, the worlds largest information
rus and denial-of-service attacks, accounted for security services company.
more than 55% of the estimated total losses in Due to the nature of the survey, the authors
2004 (Gordon et al., 2004). It is clear that as our felt that the ideal target sample was individuals
reliance on IT to help manage the supply chain with knowledge or responsibility for IT, security,
increases, so does the seriousness of these types and operational functions within the firm. Such
of attacks on the economy. individuals likely have an intimate and realistic
knowledge of IT in their firms, and the techno-
logical risks associated with collaboration and
ReSULtS AnD AnALYSiS integration with supply chain partners. Individuals
fitting this description were randomly selected
Validation of Supply chain it from a proprietary list of firms maintained by a
Security Risk third-party organization and invited to participate
via e-mail. Because the survey involved highly
To validate our proposition that IT incidents affect sensitive information, it was conducted anony-
firms in the manner discussed above, we surveyed mously to promote trust and honest responses.
a cross-section of production, distribution, and As an incentive, participants were offered a full
support functions. For obvious reasons, firms report of results. Two rounds of follow-up e-mails

Figure 4. The effect of supply chain partnerships on information security risk

how do supply chain partnerships affect the level of risk


related to information security in your organization?

Risk is greatly increased


Risk is moderately increased
Risk is slightly increased
No change
Risk is slilghtly lowered
Risk is moderately lowered
Risk is greatly lowered
Not sure

0% % 0% % 0% % 0% %


Information Security Risk in the E-Supply Chain

Figure 5. Preparedness of firms to mitigate IT presented simplified combinations from each of


security incidents relating to supply chain op- the six threat categories presented in Table 2, as
erations well as impacts from Figure 3. Results showing
the percent of companies reporting IT incidents
How would you rate your firm's IT security
practices pertaining to its supply chain operations?
for each of the six threat categories are shown
5% 1% 4% in Table 3. From these results, it is evident that
7%
Non-existent incidents occurred representing each of the supply
Poor chain risk sources (environmental, network, and
29% 18% Below average organizational). It is also clear that a significant
Average percentage of companies reported at least one
Above average security incident in each of the six threat catego-
Excellent ries of interest in the survey. Finally, note that
Not sure several examples of confidentiality, integrity, and
availability impacts are also attributed to these
36%
incidents and confirmed by the respondents.

were sent to non-respondents to further encourage the effect of collaboration on


participation. In total, 188 companies represent- Supply chain it Security Risk
ing a cross-section of supply chain functions and
including firms ranging in size from fewer than Toward the beginning of this chapter, we discussed
50 to greater than 100,000 employees provided different levels of collaboration that exist among
responses to the survey instrument. supply chain partners. During this discussion, it
Respondents were asked about their attitudes, was shown that the benefits of collaboration are
opinions, frustrations, and experiences of how tied to the number of collaborating partners, the
supply chain partnerships affect the level of in- amount and type of information exchanged, and
formation risk to their firms. As seen in Figure 4, the level of IT system integration. In light of subject
nearly three-quarters of respondents felt that their matter presented in this chapter, it is appropriate
supply chain partnerships increased information for one to question whether a relationship might
risk in their organization. Research toward an exist between these collaborative activities and IT
understanding of this interplay is clearly a rel- security risk. Due to the nature of these activities
evant and important venture. When asked about and their dependency on IT, one could logically
the most worrisome risks associated with their postulate that increased collaboration leads to
partners, participants listed unauthorized network increased levels of IT security risk.
access (67%), data theft (63%), and malicious code To examine this hypothesis, we asked the
infections (48%) at the top of the list. Addition- 188 firms taking part in our study to indicate
ally, respondents did not seem overwhelmingly their level of various collaborative activities as
confident in their firms ability to mitigate these being very low, low, moderate, high, or very
risks. Roughly two-thirds described their security high. Among these activities are those mentioned
posture concerning supply chain operations as abovenumber of collaborating partners, the
average or worse (see Figure 5). amount and type of information exchanged, and
Because the chief purpose of this survey was the level of IT system integration. Next, survey
to validate the concept supply chain information respondents were asked whether their organization
security risk concept, survey respondents were had experienced an IT security incident directly
traceable to supply chain partners. The percentage


Information Security Risk in the E-Supply Chain

Table 3. Survey respondents reporting IT security incidents

%Reporting at
Threat Category Type of Security Incident
Least One Incident

Malicious Code & Programs Malicious code or program infection 70.9%

Loss of availability of IT assets due to malicious hacking 29.1%

Malicious Hacking & Intrusion


Successful network intrusion from external environment 19.0%
Attempts

Successful network intrusion from within the supply


44.9%
network or organization

Fraud & Deception Reports of fraud and social engineering 24.1%

Misuse and Sabotage Employee abuse and misuse 74.1%

Errors and Omissions Employee errors and omissions 91.1%

Loss of availability of IT assets due to physical and


75.3%
Physical & Environmental environmental hazards
Hazards Loss of confidentiality of IT assets due to successful
10.1%
physical intrusion of premises

of respondents that reported IT security incidents geneRAL RecoMMenDAtionS


of this type is depicted in Figure 6. The pattern
is clear and the implications significant to sup- Over the years, numerous volumes and docu-
ply chain management: as collaboration among ments have been written about managing IT
partners rises, so too does IT security risk. Highly security. The scope of these materials is vast,
collaborative firms in our study were more than covering low-level technical minutia all the way
three times as likely to suffer a security incident to higher-level business strategies. Furthermore,
involving their supply chain partners. Due to this a sizeable portion of IT security practices is
finding, it is vital that IT security be included in specific to the information systems and business
the scope of e-supply chain management rather activities of individual organizations. It would be
than relegated as a mainly techie problem. Most near impossible to extend this work with the few
importantly, the benefits of collaboration within lines devoted to recommendations in this chapter.
the e-supply chain facilitated by IT integration Because of this, the recommendations offered here
must be greater than the increase in risk due to are of a general nature, applicable and serviceable
IT security threats. to most firms operating in a modern IT-enabled
supply chain.


Information Security Risk in the E-Supply Chain

Figure 6. The effect of supply chain collaboration Have a detailed contract (as opposed to just
on IT security incidents a policy) that clearly spells out the duties
partners owe one another. These duties in-
the effect of supply chain collaboration on it security
incidents
clude personnel responsibilities and account-
abilities, corrective action plans, enforceable
provisions for restitution, and so forth. Only
%
Percentage reporting it security

0%

18% of our sample reported having a formal


incidents from partners

%
0%
% contract relating to IT security and supply
0%
%
chain partners.
0% Exposing assets to a trusted partner often
%
0% means exposing them to your partners
Very Low Low Moderate High Very High
partners. Trust is extremely critical within
Level of collaboration w ith supply chain partners
the supply chain, and it should not be a
transferable property. Make ardent strides to
The open and seamless lines of commu- limit the downstream exposure of sensitive
nication that often exist between supply assets and systems.
chain partners tend to have a leveling effect Trust is a two-way street. Secure collabora-
on the IT security posture of all involved. tion involves not only protecting your firm
Just because your firm takes information from supply chain partners, but also protect-
security seriously, it should not be assumed ing those partners from your firm.
that partners do the same. Twelve percent Architectural maturity is a critical factor
of the respondents in our study reported and classic problem when dealing with in-
terminating a relationship with a supply terconnected IT systems. Strive toward the
chain partner over security concerns. Treat use of safe(r) architectures, applications, and
interconnected IT systems as a special case protocols. The IT department may resist this
of the untrusted network. Audit and protect because it takes effort and resources, but no
it accordingly. one ever said security was easy.
Although there is much pressure for firms to Do not fixate solely on threats entering
integrate IT systems and begin collaborat- the organization via IT interconnections.
ing, this should not be done flippantly. Plan Partners visit, attend meetings, handle and
diligently and only share the minimum assets transport data, make blunders, and have ac-
necessary to achieve a goal. The philosophy cess to physical resources like backup tapes
of opening all doors and figuring out which and network infrastructure. Do not neglect
ones can be closed while still making it work the physical, human, and social dimensions
has gotten many firms into trouble. of risk.
Audit supply chain partners before, dur-
ing, and after establishing a collaborative
relationship. Amazingly, many firms link concLUSion
themselves to partners without knowing
anything about their security posture or prac- As IT increasingly becomes the medium of
tices. Thirty-seven percent of firms never business functionality, a reliance on secure and
audited their supply chain partners, and continued operations has redefined corporate risk
only 23% of the firms in our study audited (Loch & Carr, 1992). In the new e-supply chain,
prior, during, and after a partnership. information sharing and partner relationships


Information Security Risk in the E-Supply Chain

are emphasized to drive down supply chain risk Bowersox, D.J. (1990). The strategic benefits of
(Christopher & Peck, 2004). As the usage of IT logistics alliances. Harvard Business Review,
becomes ubiquitous within single organizations 68(4), 36.
and supply networks, its pure strategic value
Cachon, G.P., & Fisher, M. (2000). Supply chain
diminishes and the risks it creates threaten to
inventory management and the value of shared
become more important than the advantages
information. Management Science, 46(8), 1032-
it provides (Carr, 2003). Therefore, protecting
1048.
these systems without overspending now poses
the greatest difficulty. Carr, N.G. (2003). IT doesnt matter. Harvard
This chapter has presented a preliminary yet Business Review, 81(5), 41.
thorough discussion of the relationship between
Cheswick, W.R., & Bellovin, S.M. (1994). Fire-
supply chain and IT security risk. This relationship
walls and Internet security: Repelling the wily
has received little previous investigation, yet we
hacker. Reading, MA: Addison-Wesley.
hope that our analysis and the results presented
within this chapter will foster future research. Chopra, S., & Sodhi, M.S. (2004). Managing risk
The findings of our study of 188 firms show to avoid supply-chain breakdown. MIT Sloan
that IT threats are real and that they are producing Management Review, 46(1), 53.
tangible impacts within the supply chain. Ad-
Christopher, M., & Peck, H. (2004). Building the
ditional investigation is necessary to adequately
resilient supply chain. International Journal of
quantify this risk. Most importantly, our research
Logistics Management, 15(2), 1.
has established a positive correlation between col-
laboration and IT security incidents. To improve Christopher, M., Peck, H., Wilding, R., & Chap-
decision making and SCM, this relationship must man, P. (2002). Supply chain vulnerabilities.
be further studied and accurately modeled. Re- Cranfield, UK: Department of Transport, Local
search toward this end is critical for SCM to ensure Government and the Regions, Home Office, De-
that proper consideration is given to IT security partment of Trade and Industry.
as firms seek to maximize the vast benefits of
Cohen, F. (1997). Information system attacks: A
collaboration within the e-supply chain.
preliminary classification scheme. Computers &
Security, 16(1), 29.
ReFeRenceS DeLoach, J.W. (2000). Enterprise-wide risk man-
agement: Strategies for linking risk and opportu-
Anonymous. (2001). JUST blame the software nity. London: Financial Times/Prentice Hall.
guys. Business 2.0, 6(8), 25.
Gordon, L.A., Loeb, M., Lucyshyn, W., & Rich-
Baker, W.H., & Rees, L.P. (2006). Necessary ardson, R. (2004). Ninth annual CSI/FBI com-
measures: Metric-driven information security puter crime and security survey. San Francisco,
risk assessment and decision-making. Commu- Computer Security Institute.
nications of the ACM, (forthcoming).
Grance, T., Hash, J., Peck, S., Smith, J., & Ko-
Barratt, M., & Oliveira, A. (2001). Exploring the row-Diks, K (2002). Security guide for intercon-
experiences of collaborative planning initiatives. necting information technology systems (p. 58).
International Journal of Physical Distribution & Gaithersburg, MD: National Institute of Standards
Logistics Management, 31(4), 266-289. and Technology.


Information Security Risk in the E-Supply Chain

Greenhouse, S. (2005, July 17). How Costco be- Lee, H.L., & Whang, S. (2000). Information
came the anti-Wal-Mart. The New York Times. sharing in a supply chain. International Journal
of Technology Management, 20(3/4), 373.
Gunasekaran, A., & Ngai, E.W.T. (2004). E.W.T.
information systems in supply chain integration Li, L. (2002). Information sharing in a supply
and management. European Journal of Opera- chain with horizontal competition. Management
tional Research, 159(2), 269. Science, 48(9), 1196.
Handfield, R.B., & Nichols, E.L. (1999). Introduc- Loch, K.D., & Carr, H.H. (1992). Threats to in-
tion to supply chain management. Upper Saddle formation systems: Todays reality, yesterdays
River, NJ: Prentice-Hall. understanding. MIS Quarterly, 16(2), 173.
Howard, J.D., & Longstaff, T.A. (1998). A com- McLaren, T., Head, M., & Yuan, Y. (2002). Sup-
mon language for computer security incidents. ply chain collaboration alternatives. Internet
Albuquerque, NM: U.S. Department of Energy, Research: Electronic Network Applications and
Sandia National Laboratories. Policy, 12(4), 348-364.
Huang, Z., & Gangopadhyay, A.A. (2004). Simula- Mentzer, J.T. (2001). Managing supply chain col-
tion study of supply chain management to measure laboration. In Supply chain management, (pp.
the impact of information sharing. Information 83-84). Thousand Oaks, CA: Sage Publications
Resources Management Journal, 17(3), 20.
Mentzer, J.T., Foggin, J.H., & Golicic, S.L. (2000,
Icove, D.J., Seger, K.A., VonStorch, W., & NetLibrary. September/October). Collaboration: The enablers,
(1995). Computer crime: A crimefighters hand- impediments, and benefits. Supply Chain Man-
book. Sebastopol, CA: OReilly & Associates. agement Review, 42-46.
Ismail, S. (2005). An investigation of MRP benefit- Mentzer, J.T., Min, S., & Zacharia, Z.G. (2000).
determinant relationships: ACE model. Problems The nature of interfirm partnering in supply chain
& Perspectives in Management, (2), 80-98. management. Journal of Retailing, 76(4), 549.
Jorgensen, B. (1998). Confidentiality guidelines Nelson, K. (2002). Bad data plagues ERP. Bank
set. Electronic Buyers News, (1134), 36. Systems & Technology, 39(3), 12.
Juttner, U., Peck, H., & Christopher, M. (2003). Sup- NIST. (1997). An introduction to computer secu-
ply chain risk management: Outlining an agenda for rity: The NIST handbook. Gaithersburg, MD: U.S.
future research. International Journal of Logistics: Department of Commerce, National Institute of
Research & Applications, 6(4), 197. Standards and Technology.
Kolluru, R., & Meredith, P.H. (2001). Security Petroni, A. (2002). Critical factors of MRP
and trust management in supply chains. Informa- implementation in small and medium-sized firms.
tion Management & Computer Security, 9(5), International Journal of Operations & Production
233-236. Management, 22(3), 329.
Kotulic, A.G., & Clack, J.G. (2004). Why arent Raman, A., DeHoratius, N., & Ton, Z. (2001).
there more information security research studies? The Achilles heel of supply chain management.
Information & Management, 41, 597-607. Harvard Business Review, 79(5), 25.
Lee, H.L., Padmanabhan, V., & Whang, W. (1997). Risk Analysis. (1992). Perception and manage-
Information distortion in a supply chain: The bull- ment. London: Royal Society.
whip effect. Management Science, 43(4), 546.

0
Information Security Risk in the E-Supply Chain

Simatupang, T.M., & Sridharan, R. (2005). The Warren, M., & Hutchinson, W. (2000). Cyber attacks
collaboration index: A measure for supply chain against supply chain management systems: A short
collaboration. International Journal of Physical note. International Journal of Physical Distribution
Distribution & Logistics Management, 35(1), 44. & Logistics Management, 30(7/8), 710.
Smith, G., Watson, K., Baker, W., & Pokorski, J. Whitman, M.E. (2003). Enemy at the gate: Threats
(forthcoming). A critical balance: Collaboration and to information security. Communications of the
security in the IT-enabled supply chain. Interna- ACM, 46(8), 91.
tional Journal of Production Research, 45(7).
Wilkes, M.V. (1991). Revisiting computer security
Smith, M. (1989). Computer securitythreats, in the business world. Communications of the
vulnerabilities, and countermeasures. Information ACM, 34(8), 19.
Age, 11(4), 205-210.
Wise, D., & Fahrenwald, B. (2001, May 6). Supply
Spekman, R.E., & Davis, E.W. (2004). Risky chain collaboration: Close encounters of the best
business: Expanding the discussion on risk and kind. Businessweek.
the extended enterprise. International Journal of
Xu, H., Nord, J.H., Brown, N., & Nord, G.D.
Physical Distribution & Logistics Management,
(2002). Data quality issues in implementing an
34(5), 414.
ERP. Industrial Management & Data Systems,
Stoneburner, G., Goguen, A., & Feringa, A. 102(1/2), 47.
(2002). Risk management guide for information
Zsidisin, G.A. (2003). A grounded definition of
technology systems (p. 55). Gaithersburg, MD:
supply risk. Journal of Purchasing & Supply
U.S. Department of Commerce, National Institute
Management, 9(5/6), 217.
of Standards and Technology.




Chapter VIII
The Use of Collaboration Tools
in Supply Chain:
Implications and Challenges

Ozlem Bak
University of Greenwich, UK

ABStRAct

The supply chain environment today is a collaborative business environment in which the members of
supply chains are interlinked with each other. Hence the collaboration extends in supply chains to in-
ter- and intra-enterprise applications, the so-called collaboration tools, such as customer relationship
management, supplier relationship management, e-business and employee-business integration. In order
to achieve this collaboration, supply chains also realize the need to implement integrated collaboration
tools, which integrate tightly their intra- and inter-supply chain processes. With new technologies like
Web-enabled services, wireless applications, and software applications, the supply chain today needs
frameworks that consider the requirements of collaborative supply chain scenarios. This chapter thus
will introduce a framework to ensure that collaboration at all supply chain levels is considered at a
very early stage of the project so that the integrated supply chain collaboration can be designed and
implemented. A case study of an application of collaboration tools is presented. This framework was
used successfully to design and implement a collaborative integrated-enterprise system for a manu-
facturing enterprise. However, collaboration in supply chain is only effective if the collaboration tools
are integrated or used jointly by supply chain and their collaborative partners. Therefore, this chapter
first explains the concept of collaboration tools and its importance in the supply chain, evaluates the
requirements for supply chain management (SCM), and tries to ascertain the collaborative problem
areas specifically within supplier and SCM relations.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
The Use of Collaboration Tools in Supply Chain

intRoDUction refers mainly to exchanging information for mu-


tual benefit, coordination in this respect includes
This chapter will examine issues relating to e- networking and goes a step further by including
business technologies coordination and control the alteration of activities in order to achieve a
between the head offices of multi-national automo- common purpose, and cooperation steps further in
tive corporations supply chains (SCM) and their that it shares the resources. Collaboration in this
suppliers. The e-business technologies facilitate context can be seen as an overarching term that
the information and communication transfer in encapsulates and enhances the capacity of another
different domains without the limitation of place. organization and vice versa (see Figure 1).
E-business technologies such as business-to-busi- Collaboration in e-business literature enables
ness (B2B), customer relationship management the electronic interaction between business part-
(CRM), enterprise resource planning (ERP), ners (Wigand, Picot, & Reichwald, 1997). The
electronic data interchange (EDI), advance plan- execution of collaboration processes requires an
ning systems (APS), and supplier relationship information infrastructure to link the partners in a
management (SRM) provide real-time access to supply chain. From an economic perspective two
demand, inventory, price, sourcing, and produc- characteristics apply to the collaboration in SCM:
tion data to be shared by manufacturers and their first, SCM and its members are jointly responsible
suppliers spanning the boundaries of the supply for the creation of a product or service. They have
chains. The use of e-business technologies in SCM a mutual objective and a common value creation
propelled companies towards collaboration and aim, which is coordinated by legal terms as well as
converted the way companies are conventionally bona-fide agreements. Second, SCM also includes
organized (Bak, 2003). legally and economically independent entities,
In the literature the e-business technologies where the economic independence is based on
have been seen as a source of networking, co- the reality that SCM members or entities also can
ordination, and cooperation which are linked to belong to other SCM or on the contrary operate
collaboration, and differ in scope. The term col- alone in the market. These independencies are
laboration encapsulates a platform that provides characterized by the fact that each enterprise
cooperation processes based on agreements on use accepts the individual risks, where it defines its
of common applications, data, and information own collaboration boundaries and own goals and
technology available to the participants (Fleisch, plans independently or jointly under collaborative
2001). The scoping in this chapter is similar to benefits and risks. There are examples of possible
Mason and Lefrere (2003), wherein networking applications for solutions such as integrated ERP
system, electronic marketplaces which can consist
of bilateral system links, hub and spoke architec-
tures, and of Web service architectures.
Figure 1. Collaboration as an umbrella term1 The need for collaboration tools in SCM is of
high importance as the competitive advantage
remains in linking all trading partners to ensure
Coordination Collaboration the timely delivery of goods and services to the
-Alteration of Activities
-Common purpose Cooporation
Enhances the
final consumer efficiently and effectively. To un-
Share of
Resources capacity of each derstand these issues, the research on supply chain
Networking participating
-Information exchange entity management distinguishes between strategic,
-Mutual benefits
tactical, and operational level decision making
in which the strategic level is concerned with


The Use of Collaboration Tools in Supply Chain

supplier, formation of collaborations (Gadde & IT management in SCM will need to bridge the
Hakansson, 1994); at the tactical level, the empha- technological and organizational gaps between its
sis lies on supplier assessment, supplier selection, participants. This development in return would
and resource planning; and at the operational level, ease the IT and information transfer and its dis-
it focuses on the tasks related to order fulfillment semination. Therefore collaboration amongst
and inventory management (Kumaraswamy & supply chain units plays a much more central
Palaneeswaran, 2000). On each of these levels, role in the operation of the whole organization,
several researchers have identified measures for and its extensive and intensive global networks
successful collaborations based on behavioral of coordinated production and distribution.
changes; increase in long-term financial success;
economic value, shareholder value, and organiza-
tional capacity; increase in performance levels; the RoLe oF e-BUSineSS
and on how well collaborations across organiza- technoLogieS in
tions are managed and monitored. With any of coLLABoRAtion AMong ScM
these collaborative success measures, companies AnD itS BUSineSS UnitS
might differsome may prefer to choose market
share, whereas others might choose quality or in- The increasing collaboration internationally and
novation. Thus, collaborations can be successful domestically and especially within SCM business
on any of these levels depending on the common units which once were opposed profit centers have
strategic aim of the collaboration. The aim of shown greater willingness to collaborate. However
this chapter is not to elaborate on the success the difference within/between SCM is related to
measures, but rather to ascertain the problem the nature of inter-organizational relationships.
areas of e-business collaborations and its impact The underlying relationships can be attained from
on supply chain. mutually defined goals and interests, again unlike
When considering collaboration problem traditional collaborations of supply chains which
areas and their impact, it is likely that there are mainly driven by market access motivations.
will be a number of heterogeneous IT systems The new forms of collaborations are a response
within the multiple independent/interdependent to global competition and the strategic need of
organizational units of SCMparticularly such supply chains to combine resources to be com-
as companies, divisions, or departmentswith petitive. Therefore we can summarize the ability
different databases (Garita, Afsarmanesh, & to generate collaboration through the use of the
Hertzberger, 2002). These existing systems will following characteristics:
require interfaces to various databases and file
systems to access data, to store information, and to Systems and channel integration, which
establish e-business technologies in/between the leads to the empowerment of supply chain
interdependent and independent organizational participants as they can use a common data-
units of the supply chain. We may also like to bear base that is available to larger constituencies.
in mind that despite the creation of such interfaces, Thus, this can enable the compression of
distorted information still can be experienced time-to-market, while enhancing the speed
unless collaboration tools are integrated or used of response to the final customer (McIvor,
jointly by the partners. This information distortion Humphreys, & McCurry, 2003).
can occur due to knowledge sharing, resistance Openness and transparency, which can
to change, and trust between supply chains and be achieved through low-cost connectiv-
its entities. Therefore, collaboration tools used for ity between the supply chain participants.


The Use of Collaboration Tools in Supply Chain

Infrastructures without expensive invest- that are linked through collaboration tools. The
ments such as the use of Internet-mediated linkage and use of the collaboration tools have not
applications lead to use of collaboration been considered in the literature, hence the aim
tools. However, the initial investments to of this chapter is to create a tentative framework
upgrade the systems and learning activities, that can enhance the understanding in supply
and resistance to change towards the new chain collaboration. Therefore, the author has
application became main problems at the depicted the impact of the use of collaboration
initial stage of implementation. tools at three levels:
Explicit cooperation between wealth-cre-
ating agentsThe supply chain members, Level 1 SCM: At this level collaboration be-
shareholders, employees, and external tween and within the SCM takes place. SCM
publics need to contribute resources to the headquarters receives real-time updates
successful running of the business over a on day-to-day cross-functional operations.
longer term. This information can be distorted unless
Learning process and effort is needed to there is an integrated system between the
assimilate and/or internalize the transferred participants and common strategic intent
knowledge through collaborations (Lin, between its entities.
2003). Learning also includes the sharing Level 2 SCM strategic business unit (SBU):
of knowledge, which is linked to embrace a At this level the knowledge is incorporated
collaborative relationship built on trust. This into an organizations business unit by inte-
constituted a problem as after many years grating across functional departments. The
of operating in a system in which trust was focus is on continually using technology
the last thing that they expected (McIvor to improve efficiency and support existing
et al., 2003). business processes. Competitive advantage
Knowledge transfer needs to be considered is achieved through the integrated links with
in some cases of collaboration wherein the suppliers and customers in the logistics and
knowledge is not easily replicable and trans- purchasing functions. According to McIvor
ferable (Kessler et al., 2000). The sticki- et al. (2003), this was lacking between the
ness nature of the valuable knowledge departments, wherein different functions and
demands time, effort, and cost to transfer. departments possessed different and often
incompatible systems with incompatible
Collaborations offer many value-added capa- objectives. The compatibility of collabora-
bilities to the supply chain. In a perfect world, the tion here stems from the close relationship
borders of the SCM between/within its entities between the cross-functional departments.
would blur through the use of collaboration tools. Level 3 individual employee level: At this
The collaboration tools were designed originally to level the individual employees or members
coordinate, integrate, and restrict the information save time through the use of collaboration
flows across several functions in the supply chain, tools when transferring and transmitting
however manufacturers began to incorporate information and associated knowledge.
components that extended the supply and delivery As the information can be easily attained
end of partner organizations supply chains as well through the collaboration tools, the em-
(Corroon, 1998), so that each supply chain had ployees or members can react and respond
its collaboration under a network of component to an incident quickly and independently, as
suppliers, distributors, and contract manufacturers the system can give the information and the


The Use of Collaboration Tools in Supply Chain

Table 1. Levels of collaboration2

Level 2
Level 1 Level 3
Strategic
Supply Chain Individual
Business Unit
- Cross functional
- Involvement, - Function orientation
Scope - Departmental
- SCM-wide inter-linkage - Task dominated
participation
- Enables real-time - Supports the - Supports empowerment
Focus information sharing within strategic business unit of employees within the
and between SCM members strategy business unit
- Processes, - People, intellectual
Levers - Technological infrastructure
workflows capital, and relationships
- Revenue, customer service, - Strategic business - Depending upon
Enhancements and existing business unit coordination individual employee and
enhancement support tasks

employees or members do not need to wait This procurement collaboration stems from two
for other individuals to complete the task main stages. The first stage involved the instal-
at hand; unless the individual knowledge lation and updating of the current equipment
has been considered as a tool for achieving and software for the local company to facilitate
competitive advantage at an individual level, its operation. The second stage incorporated the
the knowledge sharing becomes bounded to training of the employees of the suppliers. The
a particular individual. Therefore, the issues data was collected through a variety of methods,
of trust and empowerment have become the which included four-and-a-half months of par-
key components of collaboration. Table 1 ticipant observation over two projects, 10 hours
indicates the levels and to what extent col- of semi-structured interviews, 30 individually
laboration tools play a role. taken and official meeting notes, and document
analysis. The formal semi-structured interviews
were carried out with eight interviewees and
cASe StUDY DeScRiPtion lasted for between one and two hours. These in-
terviews were taped and transcribed, then entered
This case study was embedded as part of a research into N6 software for analysis. These interviews
setting wherein the impact of two collaboration were conducted during and after the participant
tools/e-business applicationsnamely extranet observation, in order to ascertain that the issues
and B2Bin an automotive SCM strategic were covered adequately.
business unit was examined. The sample of the These various techniques of data collection are
SCM consisted of an independently owned local beneficial in theory generation, as they provide
company which operated as a supplier but was multiple perspectives on an issue, supply more
restricted in its operations to the southern part information on emerging concepts, and allow for
of Germany. This collaboration was studied cross-checking and triangulation (Orlikowski,
retrospectively as the collaboration took place 1993; Glaser & Strauss, 1967). Therefore, similar
between the SCM and its 123 national suppliers. to McPherson et al. (1993) and Sherif and Vinze


The Use of Collaboration Tools in Supply Chain

(2003), a case study research method with ground- 4. Retention of a single control-point through
ed theory approach was used. The key research licensing and regulation of collaboration
question explored is the set of reasons behind the systems
emergence of collaborations in the automotive
sector, and in particular, the motivations behind The above-mentioned goals have had some
the receptiveness of the supplier and original contradictory and similar responses from the
equipment manufacturer (OEM) towards invest- suppliers side. The respondents, especially
ments in collaborative tools. What has persuaded representatives from the suppliers, emphasized
the supplier to use the collaborative tools? In what the importance of the SCM taking the coordina-
respect do the new forms of partnerships reflect tion role, however the coordination role did not
the concept of collaboration? What are the key succeed as planned, as the development plans
benefits and limitations to collaboration? were made considering mainly the coordination
SCM headquarters has concluded after con- aspect, rather that the capability, competencies,
sultation that the investment for collaboration and resources gap. The suppliers felt that the
tools was essential for its business units future implementation, such as sending the employees
competitiveness. The initial research indicated for training to the headquarters, allowing the
that some of the suppliers/distributors would computers to be updated to a certain level to enable
need to upgrade their system and thus needed the configuration, interfered with the suppliers
funding. In particular it was estimated that an daily work routine. The resistance to change grew
initial start-up sum would be needed annually as the benefits resulting from the collaboration
over a period of five years to improve services in were more dominantly based on SCM quartile,
order to establish collaboration. This could not whereas the suppliers also had to deal with other
be provided by the distributors and suppliers, as customers (from SME to SCM). The balancing act
they were unwilling to make additional invest- between the advantages and disadvantages came
ments on collaborative tools. In line with the IT to a halt when the license agreement entailed a
infrastructure changes, the SCM launched the conflict over financial commitment of suppliers.
collaborative development program in order to This was rather ironic since supplier-buyer col-
increase the density of distributor and supplier laborations are based on the need to emphasize
network services in the country by subsidizing long-term relationship building rather than mere
either through financial assistance, training, or financial/market transactions.
technological infrastructure help in order to cre-
ate a network. The main policy objectives of the
program were formulated with the assistance of DiScUSSion
the SCM, consultants, and other stakeholders,
with the following goals: From the perspective of SCM, a significant bar-
rier to the collaborations relates to the degree
1. Creation of a network with distributors/sup- of commitment and reliability of partners. In
pliers with an interlinked and improved the case study of collaborations with suppliers,
collaborative network infrastructure it appears that a change in SCM means change
2. Extension of the existing coverage of mobile inter-relationships, whereas a true collaboration
services enabling overall control from sup- should be able to withstand such events. These
pliers to the headquarters developments are inimical to the attainment of
3. Enhancement of competitive advantage collaboration, which in turn could motivate SCM
through the promotion of high-quality com-
munication services to businesses


The Use of Collaboration Tools in Supply Chain

to take a short-term perspective on relationships established successfully, it does not negate the
with the suppliers/distributors. Other collabora- success as a time-consuming learning process,
tion problems confronting the multi-national and effort is needed to assimilate and/or internal-
companies relate to the limited financial strength ize the transferred IT (Lin, 2003; Clark , 1995;
of partners and power/trust-related issues. These Gomory, 1995).
problems once again support the general observa- McIvor et al. (2003) emphasized in their
tion that the nature of SCM small/medium-size research the differences of electronic links with
suppliers hinders genuine collaboration. These the supplier in relevance to size and level of
problems are important because of the evidence sophistication. We can examine a similar pat-
that a disproportionate contribution from one of tern in the particular case study of the multina-
the collaboration partners can affect the success tional corporation supply chain (SCM), where
of other collaboration partners. Thus the differ- members often embed their knowledge not only
ences at each level can also cause distortion at in documents or repositories, but also in their
collaboration levels. Similarly this conflict was organizational routines, processes, practices,
found on the statements of SCM employees (see and norms. Therefore, the role of collaboration
Table 2): systems used in SCM cannot be seen solely as a
data distribution tool that is completely separated
One of the limitation was the technical from the e-business technologies concept. The
restructuring of our existing relationships interdependency and independencies of entities
with suppliers/distributors. call each member of the supply chain to protect
Suppliers who participated in this network their e-business technologies that exert an influ-
needed also new investment. ence on their competitiveness. Also reflecting
The setting up of a new collaboration tool on practitioners day-to-day operations in which
created a need for standardization of work- they have to keep the information which makes
flow, structure. them valuable to the organization (distinctive
The change happened at supply chain level, knowledge) would add value to the employees
meaning from the initial supplier to initial within and/or outside their organizations.
customer. Similarly, Combs and Hull (1995) note that
Each employee needed to acquire new resting on a backbone of IT and telecommuni-
skills, knowledge. cations infrastructures, organizations should
be able to shorten chains of command and thus
The main difference between these is that enhance collaboration. They also suggest that
information exists without a dependency on its external pressures, unpredictable internal con-
owner and is easily transferable, whereas on the flict, and unforeseen circumstances can arise,
contrary, knowledge is formed and shared in/ particularly in the case of changes related to IT.
between minds through experiences, successes, The complexity is partly attributed to the Internet
failures, learning over time, and therefore, the through its more recent business acceptance and
stickiness of the IT demands time, effort, and commercial use (Hardaker & Graham, 2000).
cost to transfer (Tiwana, 2001, p. 37; Kessler et Because businesses and supply chains operate in
al., 2000). The transferability consists of both real-time, it only makes sense to utilize technology
parts: one portion that is readily transferable and that does the same. In fact it can be argued that
the other portion which is not easily transferable. the collaboration through the use of the e-busi-
Even though the collaboration tool has been ness applications were mainly based on demand


The Use of Collaboration Tools in Supply Chain

Table 2. Summary of aggravating issues on e-business applications and differences of their impact on
three levels (results of the case study, authors own presentation)

Collaboration Issues at Level 1 Collaboration Issues at Level 2 Collaboration Issues at Level 3


Multinational Corporation (SCM) Strategic Business Unit (SBU) Individual

An integrated supply chain, The interdependency resulted Function orientation rather


meaning from initial sup- in the bargaining power of SCM than individual capabili-
plier to the final customer, creating complications in areas of ties and learning capabili-
Scope was introduced as the vision trust, commitment to change ties assessment
What does it of the SCM Cross-functional department Gaps are defined by SCM
include? The involvement of SCM participation and SBU level rather than
as coordinator role at individual level
Control mechanism was at Difference in strategic
SCM level goal attainment

Enables real-time informa- Supports the strategic business Suppliers, employees in


tion sharing within and unit strategy the process are overloaded
between SCM members Additional resources and compe- with work, resulting in
Focus Reduces t he cont rol tencies needed (i.e., the employ- high pressure
What is the main points ees in some instances needed to Transferability problems:
purpose of the Condenses the time-to- fulfill two job descriptions for a it is not possible to transfer
collaboration? market period smooth change process) different tasks to different
E-business applications have employees, as this would
been used as a backbone for require additional time,
collaborative planning training, and investment

Technological infrastructure Change of internal workflows and People, distinctive knowl-


Organizational infrastructure sub-processes edge sharing limits to a
New ways of operating/in- New job descriptions and tasks certain employee or group
Levers troducing product/service to Different level of impact on dif- of employees
What is the extent market ferent departments depending Confidentiality, how to
of the impact of this on the need for sophistication of create transparency with-
collaboration? e-business applications out losing the competi-
tive edgein line with
intellectual capital and
relationships

Revenue, customer service, Strategic business unit coordina- Depending upon individ-
and existing business enhance- tion support ual employee and tasks
ment SBU can also control and su- Employees are empowered
Overall attainment of control pervise the supplier/distributor through the visibility and
Enhancements throughout the supply chain base attainability of the data and
What are the related information when-
benefits of this ever needed
collaboration? Enhancement at individual
level depends on the in-
dividual employee and
his/her capabilities and
learning capacity


The Use of Collaboration Tools in Supply Chain

prediction, standardization of product/service, different levels (SCM wide, SBU wide, and indi-
efficient procurement, execution and harnessing vidual). This study also indicates that individual
organizational expertise (Ash & Burn, 2003). attitudes at level three toward collaboration may
turn more positive as some of the leading supply
chains start to gain advantage through their em-
concLUSion ployee empowerment enabled through collabora-
tive services. While there are no clear borders,
Through the use of collaboration tools, the ques- different models might be necessary for different
tions of how to create a win-win situation between companies and for different types of inter-com-
suppliers, distributors, the supply chain members, pany collaborations and interactions.
and to what extent collaboration tools are used
become a concern for supply chains. Littler, Lev-
erick, & Bruce (1995) questioned the suitability of ReFeRenceS
supplier collaboration; maybe his question needs
to be further extended, and it should be worded Ash, C.G., & Burn, J.M. (2003). A strategic frame-
as to what extent/level supply chain collaboration work for management of ERP enabled e-busi-
is considered to be beneficial? ness change. European Journal of Operational
The aim of this study has been to demonstrate Research, 146, 374-387.
factors and individual levels that are critical to
Bak, O. (2003). A framework for transforma-
the outcome of relationships where supply chain
tion of supply chain management: A just in time
members are involved in collaboration. The case
investigation in organisations. In K.S. Pawar
study in this collaboration enabled an in-depth in-
& M. Muffatto (Eds.), Proceedings of the 8th
sight into its characteristics, such as technological
International Symposium on Logistics (pp. 59-
capability and competence of supplier, suppliers
63). Notthingham, UK: Centre for Concurrent
level of independency or interdependency, and
Enterprise, University of Notthingham.
openness of processes in line with confidential-
ity. The case study also introduced a three-stage Clark, K.B. (1995). What strategy can do for tech-
approach, wherein to achieve a smooth transi- nology. In K.B. Clark & S.C. Wheelwright (Eds.),
tion towards collaboration, the transition should The product development challenge: Computing
include the three levels from the SCM level to through speed, quality and creativity. Boston:
SBU level to individual level and strive to create Harvard Business School Press.
a common aim /strategic goal at each level.
Gadde, L., & Hakansson, H. (1994). The changing
role of purchasing: Reconsidering three strategic
issues. European Journal of Purchasing and Sup-
FURtheR ReSeARch
ply Management, 1(1), 27-35.
The results of this research introduced supply- Gomory, R.E. (1995). From the ladder of science
chain-wide views on collaboration. Supply chains to the product development cycle. In K.B. Clark
are trying to come to terms with the threats and & S.C. Wheelwright (Eds.), The product devel-
opportunities posed by these new collaborative opment challenge: Computing through speed,
intermediaries. The preferences for collaborative quality and creativity. Boston: Harvard Business
tools expressed in this study are applied at three School Press.

0
The Use of Collaboration Tools in Supply Chain

Durlacher. (2000). B2B e-commerce. Durlacher McIvor, R., Humphreys, P., & McCurry, L. (2003).
Research. Electronic commerce: Supporting collaboration in
the supply chain? Journal of Materials Processing
Garita, C., Afsarmanesh, H., & Hertzberger, L.
Technology, 139, 147-152.
O. (2002). A survey of distributed information
management approaches for virtual enterprise MacPherson, S.J., Kelly. J.R., & Webb, R.S. (1993).
infrastructure. In U. Franke (Ed.), Managing How designs develop: Insights from case studies
virtual Web organisations in the 21st century: in building engineering services. Construction
Issues and challenges. London. Management and Economics, 11, 475-485.
Glaser, B.G., & Strauss, A.L. (1967). The discovery Orlikowski, W.J. (1993). CASE tools as organi-
of grounded theory. Chicago: Aldine Press. zational change: Investigating incremental and
radical changes in systems development. MIS
Graham, G., & Hardaker, G. (2000). Supply-chain
Quarterly, 17(3), 309-340.
management across the Internet. International
Journal of Physical Distribution and Logistics Perraton, J., Goldblatt, D., Held, D., and McGrew,
Management, 30(3/4), 286-295. A. (1998). The globalization of economic activity.
New Political Economy, 2(2), 257-277.
Mason, J., & Lefrere, P. (2003). Trust, collabo-
ration, e-learning and organisational transfor- Sherif, K., & Vinze, A. (2003). Barriers to adoption
mation. International Journal of Training and of software reuse: A qualitative study. Information
Development, 7(4), 259-270. and Management, 41, 159-175.
Kumaraswamy, M., & Palaneeswaran, E. (2000). Tiwana, A. (2001). The essential guide to knowl-
Selection mattersin construction supply chain edge management. London: Prentice-Hall.
optimisation. International Journal of Physical
Wigand, R.T., Picot, A., & Reichwald, R. (1997).
Distribution & Logistics Management, 30(7/8),
Information, organization and management.
661-680.
Chichester, UK: John Wiley & Sons.
Lin, B.-W. (2003). Technology transfer as tech-
nological learning: A source of competitive ad-
vantage for firms with limited R&D resources.
enDnoteS
R&D Management, 33(3), 327-341.
Littler, D., Leverick, F., & Bruce, M. (1995). Fac- 1
Authors presentation of overlapping defini-
tors affecting the process of collaborative product tions
development: A study of UK manufacturers of 2
Authors presentation of levels of SC
information and communications technology 3
In order to guard the confidentiality of the
products. Journal of Product Innovation Man- supplier and SCM, the number and some de-
agement, 12, 16-32. tails of the companies have been changed.




Chapter IX
Negotiation, Trust, and
Experience Management
in E-Supply Chains
Gavin Finnie
Bond University, Australia

Zhaohao Sun
Heibei Normal University, China

ABStRAct

This chapter reviews fundamentals of e-supplhy chain management and examines the transformation
from the traditional supply chains to the e-supply chains (e-SC). This chapter applies experience man-
agement (EM) and experience-based reasoning (EBR) to intellegent agents in the e-SC and explores how
to use experience in extablishing trust in other agents. The role of trust and deception in supply chains
for real-time enterprises is discussed, and a logical framework for fraud and deception is explained in
this chapter. EBR is considered as a way to manage trust in the supply network. This chapter explores
cooperation and negotiation, trust and deception in e-supply chains by providing methodologies and
intelligent techniques for multiagent trust, negotiation, and deception in an e-SC. Finally, a unified
model is developed for integrating cooperation and negotiation, trust and deception in e-supply chains.
Although primarily theoretical, the chapter highlights new areas of research which will impact supply
chain management.
Negotiation, Trust, and Experience Management in E-Supply Chains

intRoDUction sidered an advanced form of knowledge-based


reasoning (Sun & Finnie, 2005a). This chapter
Current supply chain management (SCM) is will develop the concept of EM and EBR, and
largely based on older information retrieval apply them to intelligent agents in the e-SC. In
methods. It generally has not taken advantage of particular the use of experience in establishing
the dynamic information that is now available trust in other agents will be explored. Any orga-
due to developments in information and com- nization will have some history of dealing with
munication technology (ICT) and knowledge problems relating to orders and perturbations in
management (KM). The focus of SCM has also the network and the solutions applied, as well as
changed from a supply-side view of optimizing some formal processes for dealing with these. To
production efficiency to a demand-side view of respond automatically, software must be capable
consumers driving the process. Supply chains of reacting, as one would expect a human agent
(SCs) are developing into demand networks that to do. The information available to the agent
adapt to consumer demand in almost real time can come from a variety of sources, including
(Silisque, Brito, Almirall, & Corts, 2003). With analysis of historical information/experience at
moving towards real-time enterprises, there is an the informational/planning level.
imperative need for rapid automated and intelligent Multi-agent systems technology has been suc-
response in the supply network. As discussed in cessfully applied in many fields such as e-com-
this chapter, an e-SC can be considered as a form merce (Sun & Finnie, 2004a) and supply chain
of agent society, with trust and negotiation between management (Finnie, Barker, & Sun, 2004). The
the intelligent agents as a significant issue. trend for the future will be to increasingly autono-
Experience of suppliers and customers plays mous behavior of agents. However, it is impera-
an important role in an SC. In particular, customer tive that management considering relinquishing
experience management (CEM) will become control of key aspects of the business to software
a major issue in e-SC because the latter is a systems be aware of the issues involved, in terms
customer-centered service in the Internet world of how agents will need to operate and negoti-
(Sun & Lau, 2006). Further customer experience ate, as well as the potential for misuse of trust
is a prerequisite for customer satisfaction in SC, with adverse economic results. The increasing
which is highly dependent on the flexibility of importance of strong IT governance and control
the SC, such as its ability to respond to changes procedures, and the possible criminal implications
in demand. Because the selection and interac- for failing to implement these, makes it essential
tion space of customers in e-SC is theoretically that management be aware of developments in this
infinite, how to manage customer experience in area. The major contribution of this chapter is in
e-SC also becomes a significant issue for any establishing a basis for understanding the new
e-SC providers. field of experience management and the role it
Experience management (EM) is a new con- may play in the new supply chain environment. In
cept in information systems (IS) and informa- addition the issue of trust and the role of experi-
tion technology (IT), although KM has become ence in automating trust development should be
well-established in business management and appreciated. This chapter will resolve these issues
artificial intelligence (AI). However, experience by providing some methodology and intelligent
has always played a similar rule to knowledge techniques for multi-agent trust and negotiation
for organizations. Experience-based reasoning in an e-SC based on EM. These include the use
(EBR) is a reasoning paradigm using prior ex- of EM to enable agents in an e-SC to learn from
periences to solve problems, and could be con- prior experience in dealing with suppliers and


Negotiation, Trust, and Experience Management in E-Supply Chains

customers, and issues relating to trust and decep- in Figure 1. The output degree of the root of this
tion in the agent world of the e-SC. tree (supply flow) should be as large as possible
The rest of this chapter is organized as fol- from a supplier viewpoint in order to obtain the
lows: the next section examines fundamentals of most number of orders from the SC. From an end
e-SC management. We then review the concept customer viewpoint, the SC is also a tree, and the
of experience management, explore cooperation root of the tree is the customer. We call this tree
and negotiation in e-supply chains, and discuss a customer-centered source tree with respect to
trust and deception in e-supply chains. Finally this the SC. The input degree of the root of the cus-
chapter proposes a unified model of integrating tomer-centered source tree should be as large as
cooperation and negotiation, trust, and deception possible, in order to obtain the most satisfactory
in e-supply chains, and the chapter ends with some information and source from the SC. From an
concluding remarks. intermediary viewpoint, the SC is a double tree
uniquely bridged by the intermediary. On the one
side, the tree is the customer-centered source tree
FUnDAMentALS oF e-SUPPLY with its root being the intermediary, because it is
chAin MAnAgeMent the customer of the upper level supplier. On the
other side, the tree is a supply-centered supply
A supply chain can be broken into three parts: an tree, also with its root being the intermediary,
upstream part, an internal part, and a downstream because it is the source and information supplier
part (Turban, King, Viehland, & Lee, 2006). of the lower level customer. These three different
The upstream part encompasses all the activities trees co-influence the performance of the SC. In
involved in material and service inputs from sup- particular, the intermediary plays a vital role in any
pliers, the internal part involves the manufacturing SC, because any inefficiency of the intermediary
and packaging of products, and the downstream might lead to the breakdown of the SC.
part involves the distribution and sale of goods The supply network integrates the value chain
to distributors and customers. and the agent chain, and extends them into a
There are three different viewpoints for an complete graph-formed value-supply network
SC: supplier viewpoint, intermediary viewpoint, (Sun & Finnie, 2004a). With the development of
and end-customer viewpoint. From a supplier the Internet/Web technology, the traditional SC is
viewpoint, the SC is a tree, the root of which is being transformed into the e-SC. The e-SC brings
the supplier. We can consider this tree as a sup- together widely dispersed suppliers and customers
plier-centered supply tree of the SC, as shown to enhance coordination and knowledge sharing,

Figure 1. A supplier-centered supply tree

Supplier

Maker 1 ... Maker m

Distributor 1 Distributor k
...

Retailer 1 Retailer p
...


Negotiation, Trust, and Experience Management in E-Supply Chains

and to manage upstream and downstream value e-SC becomes a significant issue. This is because
chain channels (Poirier & Mauer 2001; Ross, the trust and negotiation in the e-SC are based on
2003). e-SC enables firms to improve flexibility interaction and communication between human
and move toward real-time operations by sharing suppliers and customers, between human suppli-
information and collaborating dynamically among ers (or customers) and their intelligent agents, and
partners. e-SC management (e-SCM) can increase between intelligent supplier agents and intelligent
revenues or decrease costs by eliminating time- buyer agents (Sun & Finnie, 2004). Experience
consuming steps throughout the online order and management is also required for these activities
delivery process. It can also improve customer in the e-SC.
satisfaction by enabling customers to view detailed
information on delivery dates and order status. As
an example, a mid-sized manufacturer of small exPeRience MAnAgeMent
loaders was reviewed. Materials management
for loader assembly is extremely complex, with Experience is wealth for any individual or orga-
any shortage of required parts (e.g., pumps or nization. Generally, experience can be taken as
engine blocks leading to significant additional previous knowledge or skill obtained in everyday
costs in terms of unused labor, late delivery, pos- life (Sun & Finnie, 2004a, p. 13). Experience man-
sible disassembly of other components, etc.). By agement (EM) has drawn increasing attention in
making the demand for specific types of loaders IS and AI in the past few years (Bergmann, 2002;
more visible to suppliers in an electronic form, Sun & Finnie, 2005). This section will examine
it becomes increasingly efficient for suppliers to EM in some detail as it applies to intelligent agents
time the delivery of components when they are in the e-SC. Although many managers are aware
required. In addition, the manufacturer can look of the development in significance of knowledge
for alternatives if supply is impeded. management over the last few years, the role of
E-SCM has been a hot term for the past few experience management is still very new. Manag-
years, but linking many business partners has ers will be faced with a plethora of buzzwords
been extremely difficult. Everyone from the raw in this area, and an intended contribution of this
material supplier to the ultimate seller in the chapter will be to make managers aware both
chain must be able to get accurate information of experience management as a concept as well
quickly and easily about orders, shipping, and as its role in SCM. An example of experience
customer responses to products and services. in an organization may be in company buyers,
Business partners must decide which areas they for example, in retail who deal with a number
will try to link first. Each partner then focuses of suppliers. Over time a buyer will learn from
on key internal groups that have the most to gain experience which suppliers are more reliable.
by adopting e-commerce. This experience may be shared with other buy-
Suppliers and customers in the traditional SC ers, particularly inexperienced employees. In an
have been transformed into intelligent agents of automated environment in which suppliers and
suppliers or customers in the e-SC so that an e- buyers are agents, the recording, management, and
SC can be considered as a form of agent society. sharing of experience must also be automated.
Papazoglu (2001) provides a good typology of Experience can be considered as a special case
agents in such an e-business environment. Un- of knowledge. Methodologies, techniques, and
der this new situation, how to manage trust and tools for knowledge management (KM) can be
negotiation between the intelligent agents within directly reused for EM, because EM is a special


Negotiation, Trust, and Experience Management in E-Supply Chains

kind of KM that is restricted to the management Organization and control of experience


of experience. On the other hand, experience has Experience processing or management task
some special features and requires special methods assignment to specific person or teams
different from that of knowledge, just as a subclass
Y of its superclass X usually possesses more special In the above experience processing stages,
attributes and operations. Therefore, the following maintain experience includes updating the
two issues are very important for EM: available experience regularly, while invalid or
outdated experience must be identified, removed,
What features of EM are different from or updated (Sun, 2004). Transforming experience
those of KM? into knowledge is an important process stage
Which special process stages does EM for EM, which is the unique feature of EM that
require? is different from those of KM. In the history of
human beings, all invaluable experience is gradu-
In what follows, we will try to resolve these two ally transformed into knowledge, which then is
issues. First of all, we define EM as a discipline spread widely in the form of books, journals, and
that focuses on experience processing and its cor- other means such as multimedia.
responding management (Sun, 2004), as shown in It should be noted that discovery of experience
Figure 2. The experience processing mainly con- from a collection of knowledge or social practice
sists of the following process stages (Bergmann, is a significant issue for EM, just as knowledge
2002, pp. 1-14; Sun & Finnie, 2005): discovery from a very large database (Sun & Fin-
nie, 2005). Further, the processing of experience
Discover experience requires an experience base, where experience
Capture, gain, and collect experience processing will be conducted.
Model experience EM research is providing a new way of look-
Store experience ing at data, knowledge, experience, and its man-
Evaluate experience agement for organizations and e-services (Sun
Adapt experience & Finnie, 2005). This will include experience
Reuse experience retrieval, experience similarity, and experience
Transform experience into knowledge processing. Successful solution of these problems
Use experience-based reasoning could provide the basis for new advances in both
Maintain experience EM and e-SC.
As an application of EM, customer experience
Where management has permeated each of management (CEM) has been studied in business
above-mentioned process stages. and commerce (Schmitt, 2003) and e-services
It is significant to separate management func- (Sun & Lau, 2006).
tions from experience processing functions and Generally, CEM is the process of strategically
then integrate them in EM (Sun, 2004). managing a customers entire experience with a
The management of experience processing product or a company (Schmitt, 2003, pp. 17-18).
for each process stage includes analysis, plan- In this way, CEM changes traditional customer
ning, organization, support, collaboration (Sun satisfaction from outcome oriented to process
& Finnie, 2005), coordination, and possible oriented. CEM also extends traditional CRM from
negotiation (Sun, 2004). Generally, management recording transactions to building rich relations
issues related to each or some of the experience with customers and understanding the experien-
processing stages include: tial world of customers, because it is imperative


Negotiation, Trust, and Experience Management in E-Supply Chains

that organizations understand their customers Furthermore, humanizing and harmonizing


past experiences, current behaviors, preferences, the customer experience are important compo-
and future needs (Brohman, Watson, Piccoli, & nents for CEM. Humanizing the customer expe-
Parasuraman, 2003). rience requires communicating with customers
Schmitt proposes a framework to manage according to humanity rather than technology
customer experience (Schmitt, 2003, p. 25) which (Schmitt, 2003, p. 92). This is because the customer
targets the business managers or consultants. This in e-SC hopes to experience a friendly human
framework consists of the following five steps: community in the virtual society such as the
environment of e-SC. Harmonizing the customer
1. analyzing the experiential world of the experience allows the customers to increase their
customer confidence in receiving the services or products
2. building the experiential platform from a company.
3. designing the brand experience It should be noted that Schmidts discussion of
4. structuring the customer interface CEM is essentially based on his business consul-
5. engaging in continuous innovation tation experience, in particular, in the traditional
business sectors, without regards to any intelligent
The customer interface is one of the key techniques. Sun and Lau (2006) argue that intel-
implementation strategies for managing customer ligent techniques can improve management of
experience in e-SC, because it affects retention customer experience in e-services, just as had been
through the exchanges and interactions which done in other fields such as e-commerce. In the fol-
further determine whether the customers are lowing sections we will argue that EM can facilitate
satisfied with the e-SC and whether they will cooperation, negotiation, and trust in e-SC.
buy the services again. Most CRM solutions
merely record what can be easily tracked: the
history and transactions of customer-company cooPeRAtion AnD negotiAtion
contracts (Schmitt, 2003, p. 141). However, this in the e-SUPPLY chAin
is not enough for managing customer experience
in e-SC because the customer in e-SC believes Coordination among agents within e-SC has
that the interface of the e-SC is the agent of the raised considerable interest, because coopera-
e-SC, and s/he is communicating face to face tion across different entities is a central issue of
with this agent. This is a new world, because the SCM (Homburg & Schneeweiss, 2000). This is
interaction between the customer and the agent of also because an agent cannot by itself just make
the e-SC is different from traditional face-to-face a locally optimal decision, but must determine
interaction or communication in traditional busi- the effect its decisions will have on other agents
ness or service. However, in such an interaction, and coordinate with others to choose and execute
the customer will still try to obtain human-like an alternative that is optimal over the entire SC
interaction with the interface agent in the e-SC. (Fox, Barbuceanu, & Teigen, 2000). Therefore,
Fig. 2. EM as an integration of experience processing and management

Experience Management

Experience Processing Management


Negotiation, Trust, and Experience Management in E-Supply Chains

agents within an e-SC should cooperate with other ers. Cooperation and negotiation are thus routine
agents in finding a schedule or plan or a solution activities in the e-SC. Furthermore, in recent
to a problem. A large number of tools facilitate years, cooperation and negotiation with suppli-
collaboration and communication between two ers have become increasing important in order to
parties and among members of small as well as establish an effective and efficient supply network
large groups (Turban et al., 2006, p. 283). (Schneider & Perry, 2001). However, delegating
Negotiations within the SC have also drawn these responsibilities to an agent requires a great
increasing attention in e-SCM. For example, deal of autonomy and intelligence.
Homburg and Schneeweiss (2000) propose a Any organization has some history of dealing
structure for a cooperative contract negotiation with problems relating to orders and perturba-
between the supplier and the retailer. Barker and tions in the supply network and the solutions
Finnie (2004) examine cooperation and nego- applied, as well as some formal processes for
tiation in supply networks based on multi-agent dealing with these. In order to automate the re-
technology. Logistics agents will negotiate over sponse to any stochastic event, the e-SC system
contracts with the available contractors. In this must be capable of reacting as one would expect
case, several rounds of offers and counteroffers a human agent to do. In many cases, a human
should be proposed before reaching an agree- agent responds by working from and possibly
ment (Fox et al., 2000). As an example, factors adapting solutions to previously encountered
that might be traded off would be price, delivery situations similar to the present problemthat
times, quality, delivery costs, order quantities and is, a process of reasoning from experience using
discounts, and so forth. prior cases such as case-based reasoning (CBR)
The negotiation process might be affected (Finnie & Sun, 2003) or experience-based rea-
by uncertain events. For example, failures in soning (EBR) (Sun & Finnie, 2005).
agents and communication channels can occur
during negotiation (Walsh & Wellman, 1999). Multi-Agent e-Supply chain Systems
To optimize the performance, the agents within
the e-SC should work in a coordinated manner. Multi-agent systems (MASs) for e-commerce
However, the dynamics of the enterprise, the probably had their origins in the pioneering
market, and agents makes this difficult (Fox et work of the Autonomous Agents group of the
al., 2000): materials do not arrive on time, or MIT Media Lab which resulted in the Kasbah
customers change or cancel orders and negotia- and Market Maker (Chavez & Maes, 1996).
tion between intermediaries fails. Therefore, trust Other simple online shopping agents followed,
and deception have become an increasing issue for example, shopping bots like Ask Jeeves.
in e-SC. Finnie, Sun, and Barker (2005) explore Applying multi-agent technology to e-SC has
trust and deception in multi-agent trading systems also been drawing attention since the end of the
including supply chains. Trust among the trading last century. Nissen and Mehra (1999) use ADE
partners can generate speed, agility, and lower to develop a MAS for government supply chains.
cost (Turban et al., 2006, p. 281). ADE is an integrated development environment
In an e-SC there is a continuous process of to design, develop, debug, and deploy agents.
planning, scheduling, and management of sup- Walsh and Wellman (1999) discuss some issues
ply and demand which requires cooperation, of using MAS to model supply chain formation,
coordination, and negotiation by human manag- which is the process of bottom-up assembly of


Negotiation, Trust, and Experience Management in E-Supply Chains

complex production and exchange relationships. A cooperation mode establishes how two agents
However, agent interaction during SC forma- must behave to accomplish a particular task.
tion might be complex, because agents do not Two cooperation modes between CBR agents
generally have the incentive to truthfully reveal are proposed in that research: Distributed CBR
information. Papazoglu (2001) provides a good (DistCBR) and Collective CBR (ColCBR). The
framework for intelligent agents in e-business. DistCBR cooperation mode is a class of coopera-
Singh, Salam, and Iyer (2005) describe an agent tion protocols where a CBR agent is able to ask one
architecture for infomediary e-marketplaces or several other CBR agents to solve a problem on
which facilitates the flow of information among its behalf, and the ColCBR cooperation mode is a
e-SC participants. The same group (Iyer, Singh, class of cooperation protocols where a CBR agent
& Salam, 2005) further develop the concept of is able to send a specific CBR method to one or
information exchange by agents to support col- several CBR agents that are capable of using that
laborative business functions, using the concept method with their case base to solve the task at
of an agent-managed knowledge repository to hand (Plaza, Arcos, & Martin, 1997). Therefore,
maintain domain knowledge. This may include the DistCBR cooperation mode enables an agent
historical information on buyer experiences, in- to share experiential knowledge acquired by an
cluding the reliability and trustworthiness of the acquaintance by means of particular problem-
supplier. From a multi-agent viewpoint, an e-SC solving methods, while the ColCBR cooperation
is composed of a set of intelligent agents, each mode allows a couple of CBR agents to share
responsible for one or more activities in the SC experiential knowledge.
and each interacting with other agents in planning,
bargaining, and executing their responsibilities cBR-Based negotiation in e-Supply
(Fox et al., 2000). An agent is an autonomous, chain
goal-oriented intelligent subsystem that operates
asynchronously, communicating and coordinating Negotiation in e-SC is a process where two parties
with other agents as needed. (customers and suppliers) bargain resources for
More and more multi-agent e-SC systems an intended gain. In order to adequately support
(MESC) are being developed in order to realize customers, an e-SC system should possess negotia-
the transformation from conventional SC to e-SC, tion capability. However, automated negotiation
taking advantage of the Internet and e-commerce has had relatively little support to date because
technology. of the complexity of the negotiation process,
which depends on the complexity of the product
cBR-Based cooperation in e-Supply or service being negotiated.
chain The approaches to negotiation in e-SC can be
classified into two classes: a cooperative approach
Cooperation is an important characteristic of and a competitive approach (Guttman, Moukas, &
e-SC (Schneider & Perry, 2001). An agent with Maes, 1998). Competitive negotiation takes place
perfect knowledge and complete capabilities if there is at least a conflict of interest between
for a given task has no need to require the coop- the buyer and seller/supplier. Consequently, there
eration of other agents. However, normal agents will be the minimum collaboration necessary
do not have perfect knowledge and complete between buyer and supplier to solve the negotia-
capabilities for a given task. tion problem, while cooperative negotiation tries
One approach to CBR-based cooperation is to get as much collaboration as possible between
described by Martn, Plaza, and Arcos (1999). the two parties. A competitive negotiation arises


Negotiation, Trust, and Experience Management in E-Supply Chains

when an agent attempts to get the best deal pos- negotiate; that is, they assess the similarity of the
sible, for example, to get goods at the lowest price. current negotiation to previous negotiation cases
An example of cooperative negotiation between in their negotiation case base. Once a negotiation
agents is in real-time load balancing of mobile cel- case is selected as the most relevant to the current
lular networksall agents benefit from efficient negotiation, the agent might revise or adapt this
network operation. In a supply chain environment, case in order to meet any counter offer from the
agents could cooperate in managing delivery counterpart. Successful negotiation cases are kept
across several companies to optimize utilization in the case base for reuse in later negotiation case
of trucks and so forth. However, both approaches retrieval. These agents can use fuzzy rule-based
present two extremes on a continuum of possible adaptation to adapt the most similar negotiation
underlying problems. In practice, a negotiation case to the current negotiation situation (Sun &
usually lies between cooperative negotiation and Finnie, 2004a, p. 207).
competitive negotiation (Sun & Finnie, 2004a).
In the automated e-SC system, buyer agents
search for a product that meets their demands. A MULti-Agent ARchitectURe
The goal of a CBR-based negotiation system is FoR cooPeRAtion AnD
to identify these demands in cooperation with the negotiAtion in An e-SUPPLY
supplier agents and to find a product that fulfils chAin
them (Sun & Finnie, 2004a, p. 186). During
negotiation, the CBR-based negotiation system Based on the above discussion, we proposed a
might suggest or even add some new demands or multi-agent architecture for cooperation and nego-
modify some weak demands for the purpose of tiation in e-SC, shown in Figure 3, in which Si are
finding an appropriate product. For configurable supplier agents, SMi are supplier manager agents,
products, it is also possible for the CBR-based Bi are buyer agents, and BMi is a buyer manager
negotiation system to modify existing products agent. The architecture is called MCNES (Multi-
during product adaptation to meet the customers agent system for Cooperation and Negotiation in
demands. Therefore, the task for the CBR-based E-SC). In MCNES, CBR is used for intelligence
negotiation system during the negotiation process at the buyer/supplier junctions within a specific
is the combination of iterative demand adapta- supply network. A number of buyer agents con-
tion and iterative supply (product) adaptation. trol the interface between an organization and
The former is realized by making proposals for its suppliers, with each of the buyer agents using
adjusting the demands from the buyer agent, while CBR to provide intelligent processing of supply
the latter is done by supply/product adaptation needs on the basis of prior experience.
with the goal of finding an agreement point in the A buyer manager (control agent) coordinates
multidimensional demand/product space. During and controls the activation and operation of the
the negotiation, the agent or the CBR-based ne- buyer agents utilizing CBR. It also uses CBR to
gotiation system is allowed to modify customer select a suitable strategy for finding all components
demands. If products in the product case base are required for a particular product.
configurable, it might also be possible to modify A seller (supplier) agent is at the supplier in-
the products during negotiation. terface and is responsible for each product type.
An intelligent agent should be able to negotiate A request to purchase from an organization may
with the customer agents and to assist them during itself trigger adaptations in the internal schedule
the search for an appropriate product in the e-SC. for that organization and in turn cause its buyer
The buyer and supplier manager agents use CBR to agents to negotiate with its suppliers. To coor-

0
Negotiation, Trust, and Experience Management in E-Supply Chains

Figure 3. MCNES: Multi-agent cooperation and negotiation in an E-SC

S1

Supplier
SM1 B1
Sn

Si
Supplier SM2 BM1 B2 Buyer

Si + 1
B3
Supplier SM3

dinate the actions of supplier agents, there is a An agent in MCNES must be capable of
supplier manager agent for each supplier which reasoning and learning. The CBR approach is
has responsibility for checking whether the prod- capable of reasoning and learning dynamically;
uct can be supplied. Each order processed for a for example, as new experience is gained, it will
specific customer forms part of the case base for be added to the case base for that specific product
that customer and provides a historical portrait in a specific company.
of the relationship with the customer.
Each buyer agent has a local case (experi- Agent interaction in McneS
ence) base. Buyer and seller manager agents need
more intelligence and have their own company As noted above, interaction between buyers and
case base. The supplier agents will check on the suppliers occurs at two levels in MCNES. At the
impact of an order which may in turn generate buyer agent and supplier agent level (Bi, Si), the
a procurement need. Agents will also need to interaction is product based with the focus on lo-
have fallback positionsthat is, if there is no gistics/manufacturing. Buyer agents need to keep
suitable information in the case base, there must their production optimal while supplier agents
still be a response, either by appealing for human need to determine the impact of re-scheduling.
intervention or going to other forms of reasoning At the supplier and buyer manager agent level
(e.g., rule based). (BMi, SMi), the interaction is inter-enterprise with
MCNES provides two levels of agent op- the focus at the trading level. Both buyer manager
eration: the buyer/supplier manager agents at the agents and supplier manager agents are concerned
enterprise level and the buyer/supplier agents at with maintaining a good trading relationship to
the logistics level. At the enterprise level, the mutual benefit. For the buyer manager agent,
agents are middle agents (Decker, Sycara, this may mean retaining a range of alternative
& Williamson, 1997) who support the flow of suppliers. For the supplier manager agent, this is
information in e-commerce, assisting in locating customer relationship management (CRM). The
and connecting the ultimate information provider supplier agent needs to have information on the
with the ultimate information requester. At the likely impact of re-scheduling which it can feed
logistics level, the supplier manager agents and into the CRM process so that any negative effects
buyer manager agents deal with product transfer on a customer are minimized. In essence, this is
and require learning cost-effective buyer/supplier using dynamic information for real-time CRM.
dealings for specific products. Obviously in many situations this will only be


Negotiation, Trust, and Experience Management in E-Supply Chains

part of the total picture and for some time to come tRUSt AnD DecePtion
will probably still require human intervention if in e-SUPPLY chAinS
any concerns are flagged. However, the need to
incorporate the capability to gather and process Trust and deception have been of concern to
dynamic information is obviously an issue that researchers since the earliest research into multi-
will need to be part of CRM, particularly in a agent e-SC (MESC). Although much of the re-
virtual enterprise environment. Each order that search in MESC assumes inherent benevolence,
is processed for a specific customer forms part in practice a completely open agent society must
of the case base for that customer and provides allow for the possibility of malevolent behavior.
a historical portrait of the relationship with the In an open trading environment, trust can be
customer. A key part of the knowledge capture re- established by external mechanisms (e.g., using
lates to the formation of trust between a buyer and secret keys or digital signatures) or by internal
seller. As more experience is gained of a specific mechanisms (e.g., learning and reasoning from
supplier or buyer, the more trust (or otherwise) experience). As noted by Ramchurn, Huynh,
can be established in the relationship. and Jennings (2004), many current computer
applications are following a distributed model
Summary with components available through a network
like the semantic Web, Web services, and grid
The multi-agent system approach proposed in computing. The open multi-agent system with
this section provides a suitable architecture for autonomous agents has been suggested as the
rapid and agile response to any event. MCNES is logical computational model for such applications
scalable, as there is no overall controllereach (Jennings, 2001). As a result, the implications of
organization in the chain or network will have its trust and deception have broader relevance than
own agent management structure. just e-SC systems.
The MCNES system requires further de- This section will discuss MESC systems,
velopment and testing both in simulated and explore how deceptions change the reasoning
real environments. Although initial results are required in an MESC system/environment, and
encouraging for the determination of a suitable will illustrate several forms of logical reasoning
supplier (Barker & Finnie 2004), the structure of that involve trust and deception in an MESC. It
supplier agents, their relationship to CRM, the use looks at a systematic classification of reasoning
of profiling, and the development of negotiating techniques which can be applied between buyers
capability needs to be explored. and sellers. As noted earlier, it is important that
It is to be noted that in current society, nego- management understands the issues involved in
tiation between the retailer and the end-customer autonomous agent systems. If agents have local
is not common, in particular in the supermarket. control and act on behalf of the organization, then
However, negotiation between business and the need to understand and implement controls
business still exists. In the MCNES, the negotia- against deception is a management imperative.
tion usually occurs between supplier agent and
manufacturer agent or retailer agent. For example, trust and Deception in MeSc
Homburg and Schneeweiss (2000) discuss a model
for automated negotiation between a supplier and As in any other form of society, agents can exhibit
its retailer with supply chains. malevolent behavior in the MESC environment.
With the focus moving to the distributed systems
paradigm and the multi-agent programming


Negotiation, Trust, and Experience Management in E-Supply Chains

model, the study of trust and deception in agent their owners from fraudulent or malevolent
interaction has significant implications for the acts? In traditional SC systems, caveat emptor
operation of these systems. or let the buyer beware is a well-known trading
Ramchurn et al. (2004) provide an extensive rule of thumb. Humans expect the possibility of
review of research into trust in multi-agent sys- fraud and deception in trades and accordingly
tems. They define trust as follows: Trust is a take whatever precautions are possible. Less well
belief an agent has that the other party will do known is the Latin maxim caveat mercator or
what it says it will (being honest and reliable) or let the merchant beware. The latter is particularly
reciprocate (being reciprocative for the common relevant with the increase in Internet fraud, with
good of both), given an opportunity to defect to online merchants carrying the cost of fraudulent
get higher payoffs. The authors conceptualize transactions. If this is the norm in conventional
trust as (a) individual-level trust (agent believes trading systems, why should it be any different
in honesty or reciprocation of interaction part- in multi-agent systems?
ners) and (b) system-level trust (the agents are In business and social activities, fraud depends
forced to be trustworthy by the system). They on deception, while deception is realized through
further characterize individual-level trust models fraud. Further, the aim of both fraud and decep-
as learning (evolution) based, reputation based, tion is to get an advantage in an environment with
or socio-cognitive based. Learning models are conflicts of interest. Therefore, in what follows,
based on interactions with other agents. Reputa- we only refer to deception, rather than fraud and
tion-based models work by asking other agents of deception, if necessary.
their opinion of potential partners, often based on With the development of the Internet, we find
some form of social network (Sabater & Sierra, ourselves in hybrid artificial societies, where
2002). Rather than relying on interaction with real-world assumptions and the whole range of
other agents, socio-cognitive models operate on possible behaviors including deception must
subjective perceptions of opponents. Wong and be taken into account (Ramchurn et al., 2004;
Sycara (1999) address two forms of trust: trust that Wooldridge & Jennings, 1994). From an e-com-
agents will not misbehave and trust that agents merce viewpoint, there are three different kinds of
are really delegates of whom they claim to be. deception in a hybrid artificial society: deception
Vassileva, Breban, and Horsch (2002) consider between humans, deception between humans and
the formation of long-term coalitions of customer intelligent agents, and deception between agents
and vendor agents using an agent trust model. in multi-agent societies such as MESC (Sun &
Others have done research on agent learning in Finnie, 2004b). In what follows, we focus on
an untrustworthy environmentthat is, agents deception in MESC.
who will attempt to deceive each other in trading. There are many agents operating in the
For example, Wu, Kimbrough, and Zhong (2002) MESC. Some agents are generally trustworthy,
show that trust can be established if agents learn for example, market coordinators, search agents,
which other agents exhibit poor behavior and transaction agents, and payment agents. All these
hence which agents not to trust. agents are working as a lubricant for a healthy
Trust and deception are twins in MESC. Trust MESC. These agents work for buyer agents, seller
in MESC can be sustained only if we can under- agents, and others such as brokers and bidders in a
stand how agents commit fraud and deception in an neutral way in order to maintain the market trading
MESC. Furthermore, how will agents in an MESC order. However, the buyer agents, seller agents,
operate autonomously in such an environment, and and brokers may not be trustworthy. These agents
what precautions will they need to take to protect may deceive other agents in the MESC in order to


Negotiation, Trust, and Experience Management in E-Supply Chains

obtain the maximum advantage or profit, just as is based on an inference rule or a couple of infer-
buyers, sellers, and brokers may use deception in ence rules (Sun & Finnie, 2004b). For example,
a traditional house market, where the first house modus ponens and modus tollens are central to
buyer is usually deceived to some extent by the deductive reasoning. Sun and Finnie (2004, 2005)
real estate agent on behalf of the seller. have proposed eight basic inference rules for
Furthermore, Internet technology provides performing experience-based reasoning (EBR)
new opportunities and ways to deceive, because which are summarized in Table 1. These cover
intelligent agents will also participate in deception, all possible EBRs and constitute the fundamental
and agents are and will be designed, selected, or for all natural reasoning paradigms at the first
trained to deceive in MESC, and people will be level. The eight inference rules are listed in the
also deceived by intelligent agents (Sun & Fin- first row, and their corresponding general forms
nie, 2004b). For example, e-sellers might use all are shown in the second row respectively.
the tricks to sell something and introduce new Four of them, modus ponens (MP), modus
forms of deceptive advertising. Deception in the tollens (MT), abduction, and modus ponens with
MESC can take a variety of forms, for example, trick (MPT) are well known in AI and computer
pretending to be someone else, offering goods for science, but the other four need some clarification.
sale which they do not have, and so forth. This is First of all, we illustrate modus tollens with trick
one of the reasons why some businesses fear us- with an example. We may know that:
ing an e-SC. However, we would not stop driving
because we saw a fatal car accident. Similarly, we 1. If Socrates is human, then Socrates is
cannot stop developing e-SC or MESC, although mortal.
we find some cases of deception in them. The 2. Socrates is immortal.
most important issue for us is recognizing and
preventing fraud and deception in MESC. To this What we wish is to prove is Socrates is hu-
end, it is necessary to answer the question: What man. In order to do so:
is the logical foundation of fraud and deception?
The essence of fraud and deception depends on Let PQ: If Socrates is human, then Socrates
its logical foundation. is mortal.
Finally, to detect and defeat fraud and deception
requires a theory of deceptive communication, P: Socrates is human.
attitudes, and behavior (Castelfranchi & Tan, Q: Socrates is mortal.
2001). In what follows, we address this issue from
a logical viewpoint. Therefore, we have P: Socrates is human, based
on modus tollens with trick, and the knowledge in
A Logical Foundation for Fraud and the knowledge base (KB) (note that Q: Socrates
Deception in MeSc is not mortal). From this example, we can see that
modus tollens with trick is a kind of EBR.
This subsection will examine a logical foundation Abduction with trick can be considered as
for fraud and deception, and then look at how the a dual form of abduction, which is also the
agents commit fraud and deception in the MESC summary of a kind of EBR. Abduction can be
from a logical viewpoint. used to explain that the symptoms of the patients
Inference rules play a fundamental role in result from specific diseases, while abduction
any reasoning paradigm, because any reasoning with trick can be used to exclude some possibili-


Negotiation, Trust, and Experience Management in E-Supply Chains

Table 1. Experience-based reasoning: Eight inference rules

MP MT Abduction MTT AT MPT IMP IMPT

P Q Q Q Q P P P
PQ PQ PQ PQ PQ PQ PQ PQ
Q P P P P Q Q Q

ties of the diseases of the patient (Sun & Finnie, These eight inference rules provide a logical
2004b). Therefore, abduction with trick is an foundation for any EBR paradigms at the funda-
important complementary part for performing mental (or atomic) level, so that they can be applied
system diagnosis and medical diagnosis based to both benevolent and deceptive agent societies.
on abduction. In what follows, we give several examples to il-
It should be noted that if one does not like to use lustrate this view (Finnie & Sun, 2005).
trick or deception, he can use exception instead. We assume that in the MESC, the seller agent
The essence is that such kinds of inferences have S will offer goods at a specific price, while the
not yet been examined in computer science and buyer agent B will agree to purchase a specific
AI, although they are necessary for EBR. volume at a specific price. If the MESC provides a
Inverse modus ponens (IMP) is also an infer- trustworthy trading environment, we can assume
ence rule in EBR. The inverse in the definition is that conventional reasoning appliesthat is,
motivated by the fact that the inverse is defined modus ponens, modus tollens, and possible abduc-
in logic: if p then q, provided that if p then tion are used in the agents in MESC to conduct
q is given (Sun & Finnie, 2004b). Based on this any trading activities. For the buyer agent B, his
definition, the inverse of PQ is PQ, and trustworthy reasoning could be as follows:
then from P, PQ, we have Q using modus If a seller offers goods at a price, then those
ponens. Because PQ and PQ are not logi- goods will be available at that price. We assume
cally equivalent, the argument based on inverse that G and D are propositions: G = goods of-
modus ponens is not valid in mathematical logic. fered at known price, D = goods are available
However, the EBR based on inverse modus ponens for delivery.
is a kind of common sense reasoning, because Modus ponens is what the buyer agent or seller
there are many cases that follow inverse modus agent normally uses in the trading activities: bid-
ponens. For example, if John has enough money, ding, brokering, and negotiation, because they
then John will fly to China. Now John does not believe that If G, GD Then D. They also use
have sufficient money, then we can conclude that modus tollens in the trading activitiesthat is,
John will not fly to China. if goods are not available, then they will not be
The last inference rule for EBR is inverse offered for sale by an agent.
modus ponens with trick (IMPT). The difference If Not D (i.e., goods are not available), Then
between IMPT and inverse modus ponens is Not G (i.e., goods will not be offered for sale).
again with trick; this is because the reasoning Abduction is another common sense inference
performer tries to use the trick of make a feint to rule underpinning the marketplace: if a seller
the east and attack in the westthat is, he gets agent S has goods available for delivery D, s/he
Q rather than Q in the inverse modus ponens. will make them available for sale. That is:


Negotiation, Trust, and Experience Management in E-Supply Chains

D (Goods are available and will be delivered) 2. A second form of deception could arise in
GD the MESC, if a seller agent does not offer
goods at a price but the goods are in fact
Therefore, we have G (goods will be offered available at that price. This could arise if
at a known price). there are limited goods available and a seller
However, the environment provided by the wishes to preference another buyer (agent).
MESC is not always trustworthy, because some This is referred to as inverse modus ponens
agents (e.g., buyer agents, seller agents, bankers, with trick and takes the form:
solicitors, and brokers) may have a conflict of
interests so that they will try to deceive their trad- Not G (not offer goods at a price)
ing partners. In what follows, we look at several GD
scenarios in the simple buyer/seller context where
deception or fraud could apply and consider the Therefore, D (goods are in fact available at
variations on traditional logic, which could pro- that price).
vide a logical basis for the deceptive reasoning.
A number of scenarios will be proposed where 3. We could also have the situation where
the buyer agent is misled in their dealings with goods are not available but are offered at
the seller agent in the MESC. a specific price. This varies slightly from
case (1) above in that the starting point is
1. A seller agent may offer goods at a price that the goods are not available. This could,
G, but those goods are not available, which for example, be a negotiating tactic if goods
case is an obvious fraud. An example could will be available within a short time. This
be malevolent or fraudulent behavior by is called modus tollens with trick and takes
a competitor of the buyer company, for the form:
example, to delay production by ensuring
that materials in the SC are not delivered. Not D (goods are not available),
This could also apply to competitors of the GD
supplier, for example, to reduce the chances
that a competitor does not achieve the deal Therefore, G (goods are offered at a specific
by offering goods at a lower price. This sce- price).
nario could be described as modus ponens
with trick (MPT) (see Table 1 ). It takes the 4. We could have the situation where goods
form: are available for delivery but not at that
price. This could be used to fool the buyer
G (goods at known price), into intending to make a purchaseagain
GD as a possible negotiating tactic or delaying
Therefore, Not D (goods are not available tactic. This could be termed abduction with
for delivery). trick and takes the form:

The essence behind this fraudulent behav- D (goods are available for delivery)
ior is that the seller agent has used MPT to GD
deceive the buyer agent.


Negotiation, Trust, and Experience Management in E-Supply Chains

Therefore, Not G (goods are not offered at to creating and manage an experience repository
that price). (Bergmann, 2002). All dealings with specific
organizations would be recorded. These could
There are also a number of scenarios of de- then be analyzed over time to identify whether
ceiving the seller or seller agent in the MESC. a partner is meeting the conditions of being a
As above, the seller assumes that if goods are trustworthy collaborator.
purchased at a specific price, the seller will re- From a buying viewpoint, buying a product in
ceive the amount in full. The most usual form of a marketplace, electronic or otherwise, can be an
fraud and deception would be where goods are iterative bargaining process between an agent S
purchased, but the seller does not receive the full acting on behalf of the seller and a buyer B initially.
amount (or anything) (Finnie & Sun, 2005). This But it is not the only negotiation. It may also start
is theft or fraud and can be represented as modus an iterative bargaining process between B and
ponens with trick. Other forms of inference rules bankers, delivery contractors, and so forth with the
do not apply easily to deceive the seller. Inverse progress of the purchasing, as shown in Figure 4.
modus ponens with trick or abduction with trick First of all, B asks his informant (Internet agents,
suggest that goods are not purchased at a specific newspapers, acquaintances, and so forth) to search
price, but that the seller receives the full amount, for the products for which he intends to buy. Then
which might be good for the seller but not that he will negotiate over the selling price with S for
likely in practice. selling each of the products. This is also a trust
and deception process between S and B, because
eBR for Dealing with trust S hopes to obtain the best interest by maximiz-
in the e-Supply chain ing the price of the selling, while B also tries to
obtain the best interest by minimizing the offer
In conventional business practice, experience price to S. With the progress of the negotiation,
plays a key role in the selection of trading partners. the degree of deception of S to B becomes less,
We talk of learning from bitter experience when while the degree of trust of B in S becomes higher.
a disastrous mistake is made. Learning means that If the deception degree of S and the trust degree
some record of past transactions together with of B can reach an equilibrium (like break-even
success or failure must be made. As discussed point), as shown in Figure 5, then the price for the
earlier, CBR and EBR provide a practical approach purchase will be fixed. Otherwise, the negotia-

Figure 4. Bargaining process in marketplace

Contractor Contractor

S-Informant Seller S B B-Banker

S-Banker B-Informant


Negotiation, Trust, and Experience Management in E-Supply Chains

Figure 5. Trust and deception in negotiation Summary

deception In the e-supply chain (e-SC), most agent models


and systems assume secure and reliable commu-
nication exists between them. This ideal situation
may not hold in reality. This section examined
trust agent behaviors, in particular trustworthy behav-
iors, and fraud and deception behaviors of agents
in the MESC. Fraud and deception are an unavoid-
able phenomenon for engineering MESC. Failure
tion will be broken off and B will negotiate with to understand deception will lose the biological
another seller agent. balance in MESC. Benevolent agent societies
After the purchase price is fixed, B may ask assume a fundamental basis of the conventional
his informant (Internet agents, newspapers, ac- forms of reasoning (i.e., modus ponens). In situ-
quaintances, etc.) to search for suitable delivery ations with malevolent or fraudulent agents, it is
contractors and then he will negotiate with each useful to consider other forms of reasoning to
of these over the delivery price. However, B still better model the processes involved. Although
uses negotiation to increase his trust in one of the heuristic techniques have been applied to learn
contractors based on the knowledge and experi- which agents could be deceptive, this section
ence from his informant. looked at the underlying models of reasoning
Although identifying partners who are not which might apply with such agents.
making the grade can be based on historical Recognition of deception in e-SC remains a
transactions, it would be preferable to be able to big issue, because wherever negotiation exists,
detect untrustworthy organizations fairly early there are issues of deception, and any bargaining
in the trading relationship. One approach here in negotiation implies some justifiable conceal-
relies on using data mining techniques to identify ment and deception. IT can weaken trust relation-
patterns of behavior which indicate possible dif- ships already holding in human organizations
ficulties. As one company on its own is usually and relations, and aggravate problems of fraud
unlikely to have sufficient data for effective data and deception (Castelfranchi & Tan, 2001). The
mining, it is possible that some form of industry- e-medium could make matters worse by weaken-
level repository could be developed (e.g., in an ing the usual bonds in social control. The habit or
industry marketplace) which could be used for disposition to deceive will grow stronger, because
analysis. Although collaborative filtering tech- the Internet is an anonymous medium. Agents in
niques could possibly be used to directly identify the e-SC will deceive the users or their delegated
possible problem partners, it is likely that legal agents, for example, we have agents that bid on our
issues would limit the application of these tech- behalf from a self-interested perspective. When
niques. However, an industry repository based our agent is bidding on something in an auction,
on cleaned and anonymized information might we do not want it to honestly bid our reservation
provide a good basis for learning key features price for the good, if it could possibly get that
for identifying trustworthy partners. Manage- good for less money.
ment needs to be aware of the potential role of Many techniques have been used over time to
industry marketplaces in establishing suitable detect and prevent fraud and deception in human
trust repositories. communications and e-SC, for example, increas-


Negotiation, Trust, and Experience Management in E-Supply Chains

ing security by security protocols, authentication, The first case sometimes results in the bankruptcy
cryptography, central control, and rigid rules. of the lower level companies in the chain, because of
All these are useful and needed, but a technical delay of the materials arrival to the company. Risk
solution to protect against deception and fraud management can be used to avoid the occurrence of
in e-SC is unrealistic. Fraud and deception was a this case (Turban et al., 2006, p. 286).
problem 2,000 years ago, it is a problem in e-SC The second case results from inefficiency of
today, and it will be a problem in another 100 years delivery of materials in the corresponding supply
time. It is a game of chase, catch up, run ahead, chain. The final results will affect the end prod-
and chase all over again. Therefore, exploration ucts to end customers and negatively influence
of the essence of fraud and deception is at least customer satisfaction.
also crucial to solve these problems. In what follows, we will propose a unified
model of cooperation, negotiation, trust, and
deception in e-supply chains, as shown in Figure
A UniFieD MoDeL oF 6, in order to explore the above-mentioned inter-
cooPeRAtion, negotiAtion, relationships.
tRUSt, AnD DecePtion in In the e-SC, an agent first communicates with
e-SUPPLY chAinS its adjacent agents. However, communication be-
tween agents is normally not transitive, because
So far, we have explored cooperation and nego- indirect communication between some agents
tiation, trust, and deception in e-SC respectively. (e.g, the buyer and the sellers solicitor) is illegal
These issues have drawn attention in multi-agent or unethical. However, the communication is fun-
systems, e-commerce, and virtual society. Kraus damental for any activities such as collaboration,
(1997) explores cooperation and negotiation in cooperation, and coordination in the e-SC.
multi-agent environments based on an interme- Agents have to coordinate their activities and
disciplinary approach. Sun and Finnie (2004a, cooperate based on collaboration, coordination,
2004b) examine cooperation, negotiation, and and cooperation protocols (3C) in order to make
deception in e-commerce. Weigand and van den materials and information flow in the e-SC effec-
Heuvel (2001) discuss trust, fraud, and deception tively and efficiently. For example, product design
in e-commerce. Castelfranchi and Tan (2001) and demand forecasting can be based on 3C among
investigate trust and deception in artificial agents the business agents. The general case of these col-
and societies. However, no studies have been at- laborations among the business partners constitutes
tempted to explore the interrelationships between collaborative commerce, which implies commu-
communication, cooperation and negotiation, nication, information sharing, and collaborative
trust, and deception among the agents within the planning done electronically through tools such
e-SC in a unified way. Without such attempts it is as groupware and specially designed collaboration
easy for the SC to be broken down by failures in tools (Turban et al., 2006, p. 286).
agents, failure in communications, and intentional Basically, agents work trustfully in order
deception (Walsh & Wellman, 1999): to form coalitions, collaborate, and cooperate
with other agents. This is the reason why in the
1. At least a link in an e-SC is broken or it is majority of cases, both traditional SC and e-SC
breakdown. run well. Sometimes, however, the coalition,
2. One part of an e-SC where many business collaboration, and cooperation might terminate
partners involved is so weak that it is ig- because one agent breaks the relevant protocols.
nored. Such a termination might lead to economic risk or


Negotiation, Trust, and Experience Management in E-Supply Chains

Figure 6. 3C, trust, and deception in e-supply chains

Communication

Coalition Collaboration Cooperation

Negotiation

Deception Trust

breakdown of the e-SC. In this case, a negotiation deception chain, negotiation chain, or trust chain) in
mechanism has to be activated, in order to main- the e-SC. In this subchain, any change in an entity
tain effective communication, collaboration, and will affect the activities of other items. Negotiation
cooperation with the related agents. Negotiation is plays a pivotal role in this subchain, because it
a bargaining process between two or more agents can improve the trustworthiness of other entities.
over prices or service items within the e-SC. In Deception is a unavoidable part in this subchain. It
order to obtain the maximum benefit, one party can reduce the trustworthiness, coalition, coopera-
in the negotiation usually hides some truths so tion, and coordination among the agents. However,
that there are deceptions in any negotiation. Every removal of deception through negotiation can im-
party makes sufficient use of their knowledge and prove the trustworthiness, cooperation, coalition,
experience to avoid any possible deception in the and coordination among the agents.
negotiation. Any loss of benefit in the negotiation
can be considered as a result of being deceived
(Sun & Finnie, 2004b). Sometimes, negotiation concLUSion
is also a process of improving trust among the
parties. The successful negotiation can bring new This chapter first examined the transformation
coalition, collaboration, and cooperation based on from the traditional SC to the e-SC and experi-
new 3C protocols with improved levels of trust. In ence management. Then it explored multi-agent
other cases, the negotiation does not improve the cooperation and negotiation, trust, and deception
trust among the parties, or create new coalitions, in e-SCs respectively. It also proposed a unified
collaboration, and cooperation among them. One model of cooperation, negotiation, trust, and
of the reasons is that at least one party has not deception in e-supply chains. The approach will
shown sufficient compromise in the negotiation facilitate research and development of negotia-
so that its deception strategy has not been suc- tion, trust, and planning in e-supply chains and
cessful. In this case, the negotiation is broken and multi-agent systems. The trend to the future
the e-SC has to be relinked. will definitely lead to increasing autonomy for
Coalition, collaboration and cooperation, trust, agents in the electronic supply chain. With such
and deception comprise a dynamic process in the autonomy comes an increasing requirement for
e-SC. They can be considered as a subchain (i.e., management to take responsibility for the actions

0
Negotiation, Trust, and Experience Management in E-Supply Chains

of agents working on their behalf. Managers must Conference on System Sciences. Retrieved Janu-
be aware of the potential for fraud and deception ary 16, 2006, from http://csdl.computer.org/comp/
in the supply chain and of research in this field. proceedings/hicss/2001/0981/07/
Experience management is still a new concept
Chavez, A., & Maes, P. (1996). Kasbah: An agent
for e-supply chains. How to manage experience
marketplace for buying and selling goods. In Pro-
of agents within the e-supply chain in order
ceedings of the 1st International Conference on
to improve cooperation, negotiation, and trust
the Practical Application of Intelligent Agents and
among agents, and to control deception, remains
Multi-Agent Technology, London. (pp. 75-90).
a significant issue in e-supply chains and one
that decision makers in organizations need to be Decker, K., Sycara, K., & Williamson, M. (1997).
aware of. Experience management is currently Middle-agents for the Internet. In Proceedings
where knowledge management was some five of the 15th International Joint Conference on
to ten years ago. A contribution of this chapter Artificial Intelligence (pp. 578-583).
is to raise awareness of this developing field. In
Finnie, G., & Sun, Z. (2003, February 12-14).
future work, we will develop algorithms and
A knowledge-based model of multi-agent CBR
mechanisms of integrating cooperation, negotia-
systems. In Proceedings of the International Con-
tion, and trust, taking into account deception in
ference on Intelligent Agents, Web Technologies,
e-supply chains.
and Internet Commerce (IAWTIC2003), Vienna,
Austria (pp. 494-503).
ReFeRenceS Finnie, G., Barker, J., & Sun, Z. (2004). A multi-
agent model for cooperation and negotiation in sup-
Barker, J., & Finnie, G. (2004, August 5-8). A ply networks. In Proceedings of the 10th Americas
model for global material management using Conference on Information Systems (pp. 2650-2657).
dynamic information. In Proceedings of the 10th New York: Association for Information Systems.
Americas Conference on Information Systems,
Finnie, G., & Barker, J. (2004). Adaptive agents
New York.
for supply networks. In Proceedings of the 6th In-
Barker, J., & Finnie, G. (2004). Evolving platforms ternational Conference on Enterprise Information
for process integration in supply networks. In Systems (ICEIS 2004), Porto, Portugal.
Proceedings of the 12th CollECTeR Workshop on
Finnie, G., Sun, Z., & Barker, J. (2005). Trust
eCommerce, Adelaide, South Australia.
and deception in multi-agent trading systems:
Bergmann, R. (2002). Experience management: A logical viewpoint. In N.C. Romano Jr. (Ed.),
Foundations, development methodology and Proceedings of the 11th Americas Information
Internet-based applications. Berlin: Springer Systems (AMCIS2005) (pp. 1020-1026). Omaha,
(LNAI 2432). NE: Association for Information Systems.
Brohman, M.K., Watson, R.T., Piccoli, G., & Para- Fox, M.S., Barbuceanu, M., & Teigen, R. (2000).
suraman, A.A. (2003). Data completeness: A key Agent-oriented supply-chain management. In-
to effective Net-based customer service systems. ternational Journal of Flexible Manufacturing
Communications of the ACM, 46(6), 47-51. Systems, 12, 165-188.
Castelfranchi, C., & Tan, Y.H. (2001). The role Gates, B. (1999). Business @ the speed of thought:
of trust and deception in virtual societies. In Using a digital nervous system. New York: War-
Proceedings of the 34th Hawaii International ner Books.


Negotiation, Trust, and Experience Management in E-Supply Chains

Guttman, R.H., Moukas, A.G., & Maes, P. (1998). Rea, T. (2001). Engineering trust in electronic
Agent-mediated electronic commerce: A survey. environments: Role for a trusted third party. In
Knowledge Engineering Review, 13(2), 147-159. C. Castelfranchi & Y.H. Tan (Eds.), Trust and
deception in virtual societies (pp. 221-236). Dor-
Homburg, C., & Schneeweiss, C. (2000). Nego-
drecht/Boston: Kluwer Academic.
tiations within supply chains. Computational &
Mathematical Organization Theory, 6, 47-59. Ross, D.F. (2003). Introduction to e-supply chain
management: Engaging technology to build mar-
Iyer, L., Singh, R., & Salam, A.F. (2005). Intelligent
ket-winning business partnerships. Boca Raton,
agents to support information sharing in B2B e-
FL: St. Lucie Press.
marketplaces. Information Systems Management,
22(3), 37-49. Sabater, J., & Sierra, C. (2002). Reputation and
social network analysis in multi-agent systems.
Jennings, N.R. (2001). An agent-based approach
In Proceedings of the 1st International Joint Con-
for building complex software systems. Com-
ference on Autonomous Agents and Multi-Agent
munications of the ACM, 44(4), 35-41.
Systems, Bologna, Italy.
Kraus, S. (1997). Negotiation and cooperation in
Schillo, M., Rovatsos, M., & Funk, P. (2000). Us-
multi-agent environments. Artificial Intelligence,
ing trust for detecting deceitful agents in artificial
(1-2), 79-98.
societies. Applied Artificial Intelligence Journal,
Martn, F.J., Plaza, E., & Arcos, J.L. (1999). 14(8), 825-848.
Knowledge and experience reuse through com-
Schmitt, B.H. (2003). Customer experience
munication among competent (peer) agents.
management: A revolutionary approach to con-
International Journal of Software Engineering
necting with your customers. Hoboken, NJ: John
and Knowledge Engineering, 9(3), 319-341.
Wiley & Sons.
Nissen, M.E., & Mehra, A. (1999). Some intelligent
Silisque, A., Brito, I., Almirall, E., & Corts, U.
software supply chain agents. In Proceedings of
(2003). From supply chains to demand networks.
Autonomous Agents 99, Seattle, WA.
Agents in Retailing. The Electrical Bazaar Artificial
Papazoglu, M.P. (2001). Agent-oriented technol- Intelligence Research Report, LSI-03-41-R.
ogy in support of e-business. Communications
Singh, R., Salam, A.F., & Iyer, L. (2005). Agents
of the ACM, 44(4).
in supply chains. Communications of the ACM,
Plaza, E., Arcos, J.L., & Martin, F. (1997). Co- 48(6), 108-115.
operative case-based reasoning. In Distributed
Sun, Z., & Finnie, G. (2004a). Intelligent techniques
artificial intelligence meets machine learning (pp.
in e-commerce: A case-based reasoning perspec-
180-220). Berlin: Springer (LNAI 1221).
tive. Heidelberg/Berlin: Springer-Verlag.
Poirier, C.C., & Bauer, M.J. (2001). E-supply
Sun, Z., & Finnie, G. (2004b, December 6-8). Ex-
chain: Using the Internet to revolutionize your
perience-based reasoning for recognizing fraud and
business: How market leaders focus their entire
deception. In Proceedings of the International Con-
organization on driving value to customers. San
ference on Hybrid Intelligent Systems (HIS 2004),
Francisco: Berrett-Koehler.
Kitakyushu, Japan (pp. 80-85). IEEE Press.
Ramchurn, S.D., Huynh, D., & Jennings, N.R.
Sun, Z., & Finnie, G. (2005a) MEBRS: A multi-
(2004). Trust in multi-agent systems. Knowledge
agent architecture for an experience-based
Engineering Review, 19(1), 1-25.


Negotiation, Trust, and Experience Management in E-Supply Chains

reasoning system. In R. Khosla, R.J. Howlett, Walsh, W.E., & Wellman, M.P. (1999). Modeling
& L.C. Jain (Eds.), Knowledge-based intelligent supply chain formation in multi-agent systems.
information and engineering system (LNAI 3681) In Proceedings of the IJCAI-99 Workshop on
(pp. 972-978). Berlin: Springer-Verlag. Agent-Mediated Electronic Commerce.
Sun, Z., & Finnie, G. (2005b). Experience manage- Weigand, H., & van den Heuvel, W.-J. (2001).
ment in knowledge management. In R. Khosla, Trust in e-commerce: A language/action perspec-
R.J., Howlett, & L.C. Jain (Eds.), Knowledge- tive. In C. Castelfranchi & Y.H. Tan (Eds.), Trust
based intelligent information and engineering and deception in virtual societies (pp. 221-237).
systems (pp. 979-986). Berlin: Springer-Verlag Dordrecht/Boston: Kluwer Academic.
(LNAI 3681).
Wheeler, R., & Aitken, S. (2000). Multiple al-
Sun, Z., & Lau, S.K. (2007). Customer experience gorithms for fraud detection. Knowledge-Based
management in e-services. In J. Lu, D. Run, & G. Systems, 13(2-3), 93-99.
Zhang (Eds.), E-service intelligence (pp. 365-388).
Wong, H.C., & Sycara, K. (1999). Adding security
Berlin: Springer-Verlag.
and trust to multi-agent systems. In Proceed-
Trepper, C. (2000). E-commerce strategies. Red- ings of the Autonomous Agents '99 Workshop on
mond, WA: Microsoft Press. Deception, Fraud, and Trust in Agent Societies
(pp. 149-161).
Turban, E., King, D., Viehland, D., & Lee, J. (2006).
Electronic commerce, a managerial perspective. Wooldridge, M., & Jennings, N.R. (1994). Agent
Upper Saddle River, NJ: Prentice-Hall. theories, architectures, and languages: A survey.
In M.J. Wooldridge & N.R. Jennings (Eds.),
Swaminathan, J., Smith, S.F., & Sadeh, N. (1998).
Proceedings of the Intelligent Agents ECAI-94
Modeling supply chain dynamics: A multi-agent
Workshop on Agent Theories, Architectures, and
approach. Retrieved January 2006 from http://inter-
Languages (pp. 1-39). Berlin: Springer-Verlag.
active.wiwi.uni-frankfurt.de/ldb/articlesearch.php
Wu, D.J., Kimbrough, S., & Zhong, F. (2002).
Vassileva, J., Breban, S., & Horsch, M.C. (2002).
Artificial agents play the mad mex trust game: A
Agent reasoning mechanism for long-term coali-
computational approach. In R.H. Sprague (Ed.),
tions based on decision making and trust. Com-
Proceedings of the 35th Hawaii International
putational Intelligence, 18(4), 583-595.
Conference on System Sciences (HICSS35 2002),
Hawaii. IEEE Press.




Chapter X
Trading E-Coalition Modeling
for Supply Chain
Pierre F. Tiako
Langston Univerisity, USA

ABStRAct

As the Internet grew and evolved, it became more widely used by everyone. What once was utilized by
the military and used for academic purposes is now employed by companies for e-business marketing
strategies and alliances in the supply chain. Historically, companies have found many ways to work
together, playing different roles with regard to manufacturing, supplying, selling, delivering, and buy-
ing in the supply chain. Most of the time, according to role, members of each company get together in
a shared space (i.e., marketplace) to work on a particular project (i.e., delivering quality goods or ser-
vices to customers). The emergence of the Internet has brought an appropriate media to expand markets
and enable collaboration with partners in all stages of product manufacturing, testing, and delivering
through electronic commerce. Support for these collaborations over the Internet, called e-coalition here,
is what this chapter is about.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Trading E-Coalition Modeling for Supply Chain

intRoDUction rations over the Internet, called e-coalition here,


is what this chapter is about.
Recently, several research works on software pro- Traditional electronic commerce models en-
cess technology (e.g., Tiako, Lindquist, & Gruhn, able the online offering, ordering, payment, and
2001) have proposed models for organizing distrib- delivery of goods. One common characteristic of
uted software development among autonomous different models is their isolation. Though they
and remote software enterprises. The suggested are connected to the Web, they are still isolated
models of collaboration rely on Internet technolo- islands in the online universe; they cannot interact
gies, which offer a communication medium. They with each other without media-breaks. The isola-
allow software development ventures in a dynamic tion is enforced by the limited support for ad-hoc
manner and help automate a variety of contract modeling and coordination of interactions among
types among enterprises (Tiako, 2002). The ways partners in the lifecycle for delivering quality
e-commerce companies interact to build a supply goods or services. Support for these relationships
chain (Simchi-Levi, Kaminsky, & Simchi-Levi, over the Internet provides opportunities to bundle
2000) over the Internet and deal with constraints complementary needs of partners according to
for delivering products to customers are about the unpredictable requirements in the market. This
same as those used by software enterprises, as chapter augments existing electronic commerce
described above. Related work in e-commerce, models by defining an infrastructure for collabora-
at some level, provides framework for negotiation tive electronic markets. It considers an example
(Benyoucef & Keller, 2000) or mediation (Mou- of a trading coalition between a travel agency
kas, Guttman, & Maes, 1998; Guttman & Maes, and its partners. It also describes the underlying
1998) in dealing with e-business relationships, technologies for implementing the proposal.
but is still limited in terms of infrastructure for This chapter is organized as follows: we present
ad-hoc collaboration in the marketplace. some basic definitions of supply chain and a brief
A coalition for supply chain is important in history of electronic commerce. Then we describe
production networks where suppliers and partners an approach for e-coalition modeling and a typical
work together for specific purposes. Such coalition scenario of usage where e-coalitions involving a
includes several activities resulting in formal or travel agency and its partners for supplying flight
informal arrangements. Activities define ways and tickets are considered. The underlying technolo-
constraints on what to exchange, how to exchange gies used to develop this proposal are presented,
and when, as well as the condition. Coalition also followed by related work and a conclusion.
deals with all aspects of teaming and partnering,
such as partner assessment and selection, quality
of product to deliver to customers, and profit and BASicS oF SUPPLY chAin
risks taken and shared. To increase individual
profits in the face of globalization, participants A production supply chain involves getting a
have to work together to attain new markets and smooth and efficient flow of goods, services,
develop quality products or render services. The and information from raw materials through
emergence of the Internet has brought an appro- to finished goods in the hands of the ultimate
priate media to expand markets and enable col- customer (Ellram, 1990; Jones & Riley, 1985;
laboration with partners in all stages of product Bolumole, 2000). Key supply chain activities in-
manufacturing, testing, and delivering through clude production planning, purchasing, materials
electronic commerce. Support for these collabo- management, distribution, customer service, and


Trading E-Coalition Modeling for Supply Chain

sales forecasting (Saunders, 1997; Fenstermacher Voisin, 1996). It has been defined more broadly
& Zeng, 2000). These processes are critical to the as an integrative philosophy to managing the
success of any operation, whether they are manu- flow of products, services, and information along
facturers, wholesalers, or service providers. distribution channels from suppliers through to
the ultimate consumers (Houlihan, 1985; Stevens,
traditional Supply-Push Model 1989; Bolumole, 2000b).

In the traditional supply chain model, the raw


material suppliers are at one end of the supply eLectRonic coMMeRce
chain. They are connected to manufacturers and BAcKgRoUnD
distributors, which are in turn connected to a
retailer and the end customer. Although the cus- Electronic commerce and the Internet are funda-
tomer is the source of the profits, they are only part mentally changing the nature of supply chains,
of the equation in this push model (E-Future, and redefining how consumers learn about, select,
2006). The order and promotion processwhich purchase, and use products and services. The
involves customers, retailers, distributors, and result has been the emergence of new business-to
manufacturersoccurs through time-consuming business supply chains that are consumer focused
paperwork. By the time customers needs are fil- rather than product focused. As goods move from
tered through the agendas of all the members of the raw material processors through to manufacturers,
supply chain, the production cycle ends up serving distributors, and retailers, extensive coordination
suppliers every bit as much as customers. is required throughout the supply chain (Fenster-
macher & Zeng, 2000).
e-commerce Supply-Pull Model Support for electronic commerce (Wrigley,
Wagenaar, & Clarke, 1994; Milosevic & Bond,
Driven by e-commerces capabilities to empower 1995) requires: (1) computing and communication
clients, many companies are moving from the platforms for end-to-end electronic transfer of
traditional push business model, where manu- messages; (2) electronic data interchange (EDI)
facturers, suppliers, distributors, and marketers structures and protocols for common understand-
have most of the power, to a customer-driven ing of messages between enterprises; and (3)
pull model (E-Future, 2006). This new business enterprise models that reflect market activities,
model is less product-centric and more directly relationships among partners, as well as coalition
focused on the individual consumer. To succeed for supply chain.
in the business environment, companies have
recognized that there is an ongoing shift in the Figure 1. Electronic commerce components
balance of power in the commerce model, from hierarchy
suppliers to customers.
Enterprise Enterprise Enterprise
the Formation of Supply chain Modeling Modeling Modeling

Relationships
EDI EDI EDI
Protocols Electronic Protocols Electronic Protocols
A production supply chain requires the forma- Data Data
Interchange Interchange
tion of partnerships and long-term relationships Technology Technology Technology
within and between organizations on the supply Domain Domain Domain
chain (Johnston & Lawrence, 1988; Balsmeier &


Trading E-Coalition Modeling for Supply Chain

We present ECs history according to these companies, as opposed to the scenario of the past
three facets with the aim of identifying compo- whereby only large corporations could afford such
nents that are still missing for fully integrated technology. In addition to the increased types of
electronic commerce activities, in particular business on the Net, EDI provides the Web with
those that refer to the coordination and control flexible ways to locate and access suitable partners
of activities for manufacturing activities among to establish business relationships.
partners for quality product delivery and customer
satisfaction. eDi over the internet

eDi Systems To support EDI for electronic commerce over


the Internet was an important goal during the
Electronic commerce applications were first past decade. At that time, companies struggled
launched within transportation carriers and as- with setting up EDI relationships among them-
sociated shippers, brokers, customs, freight for- selves using paper documents. Frequently, the
warders, and bankers (Milosevic & Bond, 1995). set up was conducted in a lengthy process of
The computing and communication framework agreements on EDI messages to be used. To deal
platforms were based on the use of value-added with the barriers for using EDI, some initiatives
networks. EDI is the computer-to-computer have been made to improve EDI principles. Such
exchange of business data in standard formats. initiatives led to the development of Open-EDI
In EDI, information is organized according to a (1996) and the specification of new EDI rules. The
specified format set by both parties, allowing a prime thrust of this idea was to enable electronic
hands-off computer transaction that requires commerce using Open-EDI to be established
no human intervention on either end. All infor- between trading partners without the need for
mation contained in an EDI transaction set is, for upfront trading or interchange agreements. The
the most part, the same as on a conventionally target is to make short-term and ad hoc trad-
printed document. ing relationships practical. Jointly conducted
The motivations of the first EDI system were by several organizations, new EDI rules were
to extend the business scope of enterprises, as well defined and the system labeled UNCID (UNi-
as reduce paper flow among partners and shorten form rules of Conduct for Interchange of Data
time needed for transaction execution (Wrigley et by teletransmission). The objective of UNCID
al., 1994). EDI standards come under the auspices was to complement EDIFACT (2006).
of the United Nations with the label EDIFACT During the past decade, goals have been
(2006). The standard was developed in the United reached with the arrival of systems such as EDI-
States by the American National Standards Insti- CORBA (Common Object Request Broker Ar-
tute (ANSI). These two EDI standards have been chitecture), which allows distributed components
used by thousands of organizations worldwide to of the marketplace to communicate, as well as
access new business opportunities to collaborate the emerging of EDI-XML (Extensible Markup
with partners or expand their activities. EDI Language) for exchanging documents over the
systems based on value-added networks have Internet. However, new problems occurred with
undeniably augmented business activities over the need of teaming and contacting in the face
the Internet. The wide penetration of the Internet of globalization, requiring organizations to work
enables a broader range of businesses which can in a coalition in the supply chain. The problems
utilize networking technology for their business are now at the level of enterprise modeling in the
dealings. This includes small and medium-size hierarchy of Figure 1. Current work at that level


Trading E-Coalition Modeling for Supply Chain

proposes how to support semantics of complex fer is when a traveler, usually from home, sends
business scenarios (Milosevic & Dromey, 2002), electronic information on the checking account
transactions (Xiong & Ling, 2003, 2004) among of a travel agency to purchase tickets. We present
partners, as well as alliances among them (Tiako, the different types of components, parts of chain
2003). But an appropriate model of coalition to supplies that make up the trading community,
support and control supply chain formation for before developing the model for supporting their
producing and delivering a quality product to e-business relationships.
costumers is still missing.
Below we address the problem of modeling and components of Supply chain
performing coalition to support lifecycle supply
chain as well as enterprises processes. The model Types of components operating in the supply chain
presented is illustrated by a detailed example. (see Figure 3) are described as follows:

Methodology for Modeling Customer: The end user in the trading


e-coalition and Processes community that buys goods or services from
suppliers from home, via the Web, and using
Basically, there are two forms of e-commerce: credit card for payment.
business-to-business (B2B) and business-to-con- Supplier: Builds shopping malls to provide
sumer (B2C). The first relates to electronic trans- products to customers. For example, it con-
actions that aim to automate business processes nects to banks for payment and to deliverers
between two companies, without consideration for delivering, besides linking with other
to the final consumer. Here, companies interact suppliers or manufacturers for supplying.
with each other using Electronic Data Interchange Bank: It manages the flow of money in the
(EDI). The second involves purchase of goods by trading community using SET Secure
the final consumer through the Internet, interact- Electronic Transaction (Drew, 1999; Pan-
ing with companies using electronic fund transfer. urach, 1996) for secured payments.
Figure 2 presents B2B and B2C in the context of Delivery: When neededTip: Some
a traveling agency. itineraries may require paper tickets, and a
An example that involves electronic data in- $14.99 shipping and handling fee is charged
terchange transaction is the supply of flights by for paper tickets. Expedia.comit allows
flying companies to travel agencies. An example the physical movement of products between
of a transaction that involves electronic fund trans- components.

Figure 2. Business-to-business and business-to- Figure 3. Components of the supply chain and
consumer transactions their relation

Deliver Buy/Sale
Company Agency Costumer Costumer
Electronic Electronic Deliver Supplier
Data Fund er
Interchange Transfer Pay Supply
Flying Travel
Company Agency Traveler Bank


Trading E-Coalition Modeling for Supply Chain

MoDeLing e-coALition AnD sub-activities. Precisely one role is assigned to


e-BUSineSS PRoceSSeS an activity. An agent will perform this role. A
product can form an input to an activity, an output
Scenarios of the supply chain (see Figure 4) from an activity, or an intermediate result of an
for travel packages in an agency are consid- activity. An agent is a model entity that performs
ered here. Components interacting are: (1) roles in the trading community, therefore carry-
customersfamilies and individualsthat ing out activities. During the e-business process
make reservations for packages. A package has definition, some activities can be assigned to a role,
three elements: (a) round-trip flight, (b) accom- and several agents can be identified to perform
modation, and (c) car rental; (2) travel agencies a role. A direction is a model entity that defines
(TAs) that interact with customers, flight compa- objectives of an activity, including constraints to
nies, hotels, and car rental companies for travel be respected, and may provide advisory guidance
arrangements; (3) flight companies (FCs) for on carrying out activities. The only requirement
traveling; (4) car rental companies (CRCs) for imposed by the model is that direction provides
transportation at arrival; (5) hotels to provide ac- instructions to complete an activity.
commodation; (6) banks for managing payments; A trading e-coalition, adopted and adapted
and (7) shipping companies (SCs) for delivering from the organizational model (Tiako, 1999)
tickets. This example is used to illustrate models presented in Figure 4, is composed of a name
of e-coalition. and relationships with entities events, direction,
E-coalition models are involved with several tool, competence, and eventually its sub-alli-
components, while e-business (B2B or B2C) pro- ances. Competence is a model entity that defines
cess models are made up of single components. the function a component must satisfy before
Both models are interdependent. E-coalitions involvement in a coalition. A coalition involves
belong to the family of organizational processes, several competences. Several components can be
while e-business processes are in rapport with identified to fulfill the same competence within
business processes. The generic metamodel an e-coalition. An event is a model entity that
of federation introduced by Tiako (1999) and defines objects of any nature (goods, services,
further developed by Tiako et al. (2001) can be and information) that can be exchanged in the
specialized to support e-coalitions and e-business marketplace. Sub-coalitions function as e-coali-
processes. tions. Direction and tool have the same semantics
The generic metamodel supports various types as defined above for e-business process. Each
of processes (software, business, and workflow) component can define models of an e-coalition
that an organization can plan to define. Each in its own way and according to purpose of the
process has several activitiespieces of work marketplace. A model is instantiated into e-coali-
that must be done. The philosophy of defining tions with appropriated partners. Enactment of an
both models is the same. The definition of a e-coalition allows establishing and maintaining
model starts by creating its entities and relations trading collaboration. Its performance allows
from the metamodel. An activity for e-business controlling the fulfillment of the commitment
process is composed of a name and relationships of each component during trading, including
with entities product, direction, tool, role, and distribution of events among them.


Trading E-Coalition Modeling for Supply Chain

Figure 4. High-level trading organizational modeling

OrganizationName
Organization Name

Description
SendEvent
History

Organizational
Process Properties
Objective
Objective

SubProcess
ReceiveEvent
Direction

Tool
Competence Participant

Elementary Entity Zero or one Entity required


Zero or many or
Oneone
or many
Composite Entity

Validation of trading e-coalition ing to order flights for the travel agency; and (11)
Model Confirmation to notify that flights are booked.
The travel agency also makes B2B inquiries
In the example, a travel agency makes a B2B to reserve rooms for accommodation at the des-
inquiry for booking flights. A flight company tination. The basic process for supplying a room
responds by performing a process (defined in and its activities are defined in the component
the component Airline in Figure 5) for supplying Hotel of Figure 5. This process is about the same
tickets as follows. Activity Availability checks as the one used by the flight company to supply
flight availability before performing Reject tickets to the travel agency. The trading e-coali-
for rejecting the inquiry if there is no flight. If tion coordinating interactions between the travel
available, Booking is performed to book flights agency and hotels is defined as follows in Figure 5:
and notify the travel agency. Tickets can then be (04) activity Inquiry for asking prices and rooms
delivered to the travel agency electronically or availability; (05) Notification to inform the travel
by mail. Then activity Cash is started to send an agency to rooms availability; (06) Ordering to
invoice to the travel agency with the bank account order reservation by the travel agency; and (07)
to be credited. Before closing the process, the Confirmation to confirm rooms reservation.
flight company starts activity Flight to transport The travel agency continues by B2B inquiries for
Traveler, for a check-in and check-out will be a car reservation at destination. The basic process
necessary. The trading e-coalition coordinating for reservation is defined in the component Car
interactions between the travel agency and the Rental of Figure 5. The e-coalition for coordinating
flight company is defined as follows in Figure 5: interactions between the travel agency and the car
(08) activity Inquiry for asking prices and flights rental companies is defined as follows in Figure
availability; (09) Notification for informing the 5: (12) activity Inquiry for asking prices and cars
travel agency to flights availability; (10) Order- availability; (13) Notification to inform the travel

00
Trading E-Coalition Modeling for Supply Chain

Figure 5. Model of e-coalition, including e-business processes

27 Checking
Request Reject Balance Check Notify
Account
Evaluate for others
Travel Payment
25 Checking Reject
Voucher
Deal Balance
Account
Order Credit
Stay
Tickets E-tickets, Accept
Payment Debit
Secure Instructions,
Payment Voucher
Buyer: Traveler Package
Supplier: Bank
17
Deliver 21 Confirmation, 18
Tickets Conditions 24 Credit
Acknowledge 01 Checking
20 Balance Order Fund Account
Ordering a Account transfer Payment
Package Shipper, Package
03 16 Hotel, Fly,
26
Deliver Package Deal Car
Notify 23
Request for a 02
Package
Ship
Order Payment
Notify 22
Cash Package
Ordering for 19 Cash
Inquiry
shipping

Supplier: Shipper Ordering for Deliver


Rental Car
14 Available Reject
12
Available Reject Inquiry for
Rental Car 13
Hotel Supplier: Travel Agency
Informed 15
Cash

Reserved Inquiry for


11 Order Reserved
Prices, flights, Reservation
Booking Order
Rental Availability
Booking
Informed Inquiry for Informed
Hotel
Supplier: Car Rental 10 Booked 08 04 06 07
09 05
Entity/Activity
Entity/Activity

Participant Available Reject Available Reject

Trading Process Fly Hotel


Cash Cash

What to Send

Booking Reserving
Fly CheckIn
What to Receive

E-business Process Supplier: Airline Supplier: Hotel

agency to availability; (14) Ordering by the travel component Traveler of Figure 5) are defined as
agency to make reservation; and (15) Confirmation follows: activity Request is performed to inquire
to confirm that cars are reserved. travel agencies for package deals. Then Deal is
At this point, the travel agency is ready to performed to receive travel agencies proposals,
interact with the traveler for delivering pack- before performing Evaluate to evaluate them.
ages. Traveler, from homes Web system, defines Traveler, through the process, can receive
or uses an existing B2C procurement process a maximum of deals before evaluation, by just
for ordering tickets. The basic process Travel performing Request several times. After evalu-
for buying packages and its activities (see the ation, Traveler can reject them, request other

0
Trading E-Coalition Modeling for Supply Chain

deals, or close the process. If there are good deals, Delivery includes tickets, vouchers, and all the
the process continues by contacting the selected necessary instructions for traveling. Performance
travel agency for ordering. Order will then be of Cash orders the bank to credit the travel agencys
performed, followed by Tickets, for receiving account with the travelers payment; at the same
tickets. If the shipping company delivers tickets, time, the activation of Payment orders the bank to
an acknowledgment is required. The performance pay suppliers, if any. Process Package will close
of Voucher will provide information and instruc- when the travel agency receives correct balance
tions for the package. Then Stay starts to man- accounts from the bank regarding the packages
age the trip. Back home, Traveler will close the transactions.
whole processes after receiving and verifying the The e-coalition coordinating interactions
checking balance account from Bank regarding between Travel Agency, Traveler, Bank, and
trips expenses. Shipping Company is defined by the following
The e-coalition coordinating interactions e-coalition activities of Figure 5: (19) Ordering
between Traveler, Travel Agency, Bank, and that orders the shipping company to ship the
Shipping Company is defined by the following package; (22) Notification allows the shipping
activities in Figure 3: (01) Request that queries company to notify the travel agency after deliv-
prices and package availability; (02) Deals to ered; (23) Credit, orders the bank to credit the
inform the traveler to package deals availability; travel agencys account; (24) Debit debits the
(03) Ordering to order a package; (16) Confirma- travel agencys account to pay suppliers involved
tion to confirm packages reservationhere FCs, in the package deal; and (26) Balance returns the
hotels, and car rental companies supposed already travel agencys balance account from the bank.
to have supplied the travel agency as presented Other activities involved with the travel agency
above; (17) Payment uses SET to transfer account have already been defined above.
information to the travel agency for payment; Next, the infrastructure of communication
(18) E-Tickets delivers electronic tickets to the of the system is presented to validate the model
traveler; as option, (20) Deliver delivers package suggested.
via the shipping company and (21) Acknowledge
for deliverys acknowledgment; (25) Checking
allows the travel agency interacting with Bank SoFtWARe
to receive its checking balance account. Let us inFRAStRUctURe FoR
describe how the travel agency acts with its own e-coALitionS AnD PRoceSSeS
e-business process for selling packages.
After receiving an inquiry for packages, the The Internet and proliferation of distributing
travel agency will start the process Package for technologies provide basic infrastructure for
selling them, as presented in the component e-commerce. Unfortunately, the corresponding
Travel Agency of Figure 5. It is composed of the infrastructure for properly modeling various
activities that follow: Available that determines e-commerce activities and their evolution is still
the availability of stock to honor the order. If not, missing. The software infrastructure for support-
Inquiry is performed to ask additional packages ing the supply chain has to be open enough for
elements from suppliers, before beginning Order integrating new components. Main underlying
to make order. If the package is still not available, technologies for e-commerce and other distributed
the travelers request is rejected by performing Web applications are CORBA, DCOM (Distrib-
Reject. If available, Deliver is performed to deliver, uted Component Object Model), and Java Virtual
electronically or by mail, the deal to the traveler. Machine (JVM), and their APIs (Jutla, Bodorik,

0
Trading E-Coalition Modeling for Supply Chain

Hajnal, & Davis, 1999). CORBA specifies inter- allows querying an infrastructures repositories of
faces and protocols for a distributed infrastructure, e-business products (goods, services) and e-busi-
working through ORBs (object request brokers). ness activities (processes, e-coalitions, artifacts,
DCOM allows writing its components in several etc.).
languages, including C++ and Java. Java provides A generic server integrated into the firmware
a mechanism for components to discover each supports e-business processes in a trading com-
others interfaces at runtime and may run on dif- munity. It allows accessing local ORB and beyond
ferent platforms because of the JVM. CORBA architecture, ways to reach remote ORBs,
This infrastructure (see Figure 6) for support- and then access other components of the commu-
ing e-coalitions and e-business processes uses the nity. To simplify the prototyping of the proposed
protocol TCP/IP (Transmission Control Proto- architecture and the portability of the resulting
col/Internet Protocol) on which protocols HTTP platform, we have adopted the Java implementa-
(Hypertext Transfer Protocol) and IIOP (Internet tion. On each remote computer connected to the
Inter-ORB Protocol) are grafted. They are basic trading community resides a wrappera piece
elements for distributing components in a trading of software that provides a generic interface for
community. Components functioning as custom- components that cannot communicate directly
ers must at least lay out a Web browser including with the message protocol that is the ORB. A con-
a JVM and the plug-ins necessary for enacting crete wrapper that is specific for each e-coalition
and performing e-business processes, and for in- component is generated from the generic wrapper
teracting with the community. It will interact with at runtime using the description of the function
the different servers of the architecture through of the component in the marketplace.
the HTTP protocol, which is the native protocol Such infrastructure allows defining, estab-
of communication between a browser and a Web lishing, enacting, and performing various types
server. Servers are designed using a firmware that of e-coalitions among the partners involved in

Figure 6. Infrastructure for supporting the supply chain in a trading community

Remote E-business
Goods and E-business Processes Processes
Services and
Repository Trading Processes

1 W Firmware COM Wrapper


Web Sites
W
Repository Services
W Goods and
sit Services
Server COM Components Remote
e
www CORBA
server Processes objects
Local CORBA Objects
Server
-Modeling
-Enactment
ORB ORB
-Monitoring

HTTP IIOP/CORBA BUS

WWW Java Virtual Machine Other Components


Browser

0
Trading E-Coalition Modeling for Supply Chain

the market. E-coalitions performance allows tionships among e-coalition components with an
controlling partners by requiring them to fulfill architecture for their distribution. Components are
their commitments in the marketplace. not only on a different location, but also entirely
autonomous. They can define, enact, and moni-
tor all kinds of relationships they would like to
ReLAteD WoRK establish among them.
AnD concLUSion

The approach of combined negotiation (Benyou- ReFeRenceS


cef & Keller, 2000) is close to this work because
it coordinates activities in the marketplace. It is Alonso, G., Fiedler, U., Hagen C., Lazcano, A.,
based on a combined negotiation support system Schuldt, H., & Weiler, N. (1999). WISE: Business
that helps users conduct negotiations. This solution to business e-commerce. In Proceedings of the
does not model negotiation and its evolution for 9th International Workshop on Research Issues
unpredictable markets. What WISE (Alonso et on Data Engineering: Information Technology
al., 1999; Schuldt, Scheck, & Tresch, 1998) and for Virtual Enterprises (RIDE-VE99).
this chapter have in common is coordination of
Balsmeier, P.W., & Voisin, W.J. (1996). Supply
e-business processes. WISE provides a priori
chain management: A time-based strategy. In-
defined protocols for coordination, while it is
dustrial Management, 38(5), 24-28.
explicitly modeled here by e-coalitions. Supply
chain process by QPR (see www.qprsoftware. Benyoucef, M., & Keller, R. (2000). A conceptual
com) includes phases from customer inquiries, architecture for a combined negotiation support
purchase, and production, to product delivery to system. In Proceedings of the 11th International
the customer. Here, the customer is not considered Workshop on Database and Expert Systems
as an equal partner or as a supplier. For instance, Application.
the customer just provides input information for
Bolumole, Y. (2000). Supply chain manage-
processes. In this work, the customer has an equal
ment: A review of relevant literature and theory.
function as other components within the supply
Working Papers Series, Cranfield School of
chain and plays roles in e-coalitions. Strategic alli-
Management.
ances (Hoffman, 1997) favor business relationship
types for long-term collaboration, but the approach Bolumole, Y. (2000b). Supply chain integration:
is different because it does not provide a support A forecourt perspective. Working Papers Series,
for e-business processes modeling. Cranfield School of Management.
Several works present possible cooperation
Drew, G. (1999). Using SET for secure electronic
and conditions under which the achievement of a
commerce. Englewood Cliffs, NJ: Prentice-
variety of coalitions is feasible, but they are still
Hall.
limited because they do not model coalitions in
the manner to support unpredictable aspects of EDIFACT. (2006). Electronic data interchange
the marketplace. for administration, commerce and transport,
This work proposes an appropriated infrastruc- EDIFACT syntax rules (ISO 9735) and EDIFACT
ture for modeling and coordinating e-business data element directory (ISO 7372). Retrieved
processes using e-coalitions. The idea combines July 4, 2006, from http://www.unece.org/trade/
a support for modeling and coordinating rela- untdid/welcome.htm

0
Trading E-Coalition Modeling for Supply Chain

E-Future. (2006). Supply chain basics. Retrieved In Proceedings of the 6th International Enter-
July 4, 2006, from www.e-future.ca/alberta/pdf/ prise Distributed Object Computing Conference
efc_supply_chain_basics.pdf (EDOC02).
Ellram, L.M. (1990). The supplier selection Moukas, A., Guttman, R., & Maes, P. (1998).
decision in strategic partnerships. Journal of Agent-mediated electronic commerce: An MIT
Purchasing and Materials Management, 26(4), media laboratory perspective. In Proceedings of
8-14. the 1st International Conference on Electronic
Commerce (ICEC98).
Fenstermacher, K.D., & Zeng, D. (2000). Know
your supply chain. In Proceedings of the AAAI00 Open-EDI. (1996). The Open-EDI reference
Workshop on Knowledge Based Electronic Mar- model (working draft). Retrieved July 4, 2006,
kets, Austin, TX. from http://www.icaris.net/icaris/newcd.doc
Guttman, R., & Maes, P. (1998). Agent-mediated Panurach, P. (1996). Money in electronic com-
integrative negotiation for retail electronic com- merce: Digital cash, electronic fund transfer, and
merce. In Proceedings of the Workshop on Agent- e-cash. Communications of the ACM, 39(6).
Mediated Electronic Trading (AMET98).
Schuldt, H., Scheck, H.J., & Tresch, M. (1998).
Hoffman, T. (1997). Strategic alliances for com- Coordination in CIM: Bringing database func-
petitive advantage. Alliance Ventures Group. tionality to application systems. In Proceedings
of the 5th European Concurrent Engineering
Houlihan, J. (1995). International supply chain
Conference (ECEC98), Erlangen, Germany.
management. International Journal of Physi-
cal Distribution and Materials Management, Simchi-Levi, D., Kaminsky, P., & Simchi-Levi,
15(1), 22-38. E. (2000). Designing and managing the supply
chain: Concepts, strategies, and cases. New
Johnston, R., & Lawrence, P.R. (1988, July-Au-
York: McGraw-Hill.
gust). Beyond vertical integration: The rise of
value adding relationships. Harvard Business Stevens, G. (1989). Integrating the supply chain.
Review, 94-101. International Journal of Physical Distribution
and Materials Management, 19(8), 3-8.
Jones, T.C., & Riley, D.W. (1985). Using inven-
tory for competitive advantage through supply Tiako, P. (1999). Modeling the federation of pro-
chain management. International Journal of cess sensitive engineering environments. PhD
Physical Distribution and Materials Manage- dissertation, Inria-Loria Lab & INPL, France.
ment, 15, 16-26.
Tiako, P. (2002). Maintenance in joint software
Jutla, D., Bodorik, P., Hajnal, C., & Davis, C. development. In Proceedings of the 26th IEEE In-
(1999). Making business sense of electronic ternational Computer Software and Applications
commerce. IEEE Computer. Conference (COMPSAC 2002), Oxford, UK.
Milosevic, Z., & Bond, A. (1995). Electronic Tiako, P.F. (2003). E-commerce approach for
commerce on the Internet: What is still missing? supporting trading alliances. Proceedings of the
In Proceedings of the Internet Societys Interna- International Conference in Information and
tional Networking Conference (INET95). Communication Technologies in Tourism.
Milosevic, Z., & Dromey, R.G. (2002). On ex- Tiako, P., Lindquist, T., & Gruhn, V. (2001).
pressing and monitoring behavior in contracts. Report on process support for distributed team-

0
Trading E-Coalition Modeling for Supply Chain

based software development workshop. ACM APPenDix: LiSt oF


Software Engineering Notes, 26(6). ABBReViAtionS AnD teRMS
Wrigley, C.D., Wagenaar, R.W., & Clarke, R.A.
ANSI: american national standards institute
(1994). Electronic data interchange in interna-
B2B: business-to-business
tional trade: Frameworks for the strategic analysis
B2C: business-to-consumer
of ocean port communities. Journal of Strategic
CORBA: common object request broker
Information Systems, 3(3), 211-234.
architecture
Xiong, L., & Ling, L. (2003). A reputation-based DCOM: distributed component object model
trust model for peer-to-peer e-commerce com- EDI: electronic data interchange
munities. In Proceedings of the IEEE Conference HTTP: hypertext transfer protocol
on E-Commerce (CEC03). IIOP: internet inter-orb protocol
JVM: java virtual machine
Xiong, L., & Liu, L. (2004). PeerTrust: Supporting
ORB: object request broker
reputation-based trust in peer-to-peer communi-
SET: secure electronic transaction
ties. To appear in IEEE Transactions on Knowl-
TCP/IP: transmission control protocol/in-
edge and Data Engineering (TKDE), Special Issue
ternet protocol
on Peer-to-Peer Based Data Management.
XML: extensible markup language

0
0

Section III

Best Practices and


Performance Management
0

Chapter XI
E-Supply Chain System at
Valvex and Its Integration with
ERP Systems
1

Raktim Pal
James Madison University, USA

Indranil Bose
The University of Hong Kong

Alex Ye
The University of Hong Kong

ABStRAct

ERP and SCM systems have been used in China for some time. Although these two systems comple-
ment each other, the integration of these two systems is challenging. We present a case on a leading
Chinese manufacturer of industrial valves named Valvex that successfully integrated the ERP systems
from Entreplan and the SCM system from Excelvision. The project improved the operations at Valvex
and resulted in many benefits. This chapter describes the implementation of the e-SCM system at Valvex
and its integration with the existing ERP system. The process of implementation and integration was
marked by many challenges, and some of them were unique to a Chinese manufacturing organization.
Using several smart strategies the project team was able to overcome these challenges and complete the
project successfully. Several lessons can be learned from the experience of Valvex which may be useful
for organizations that plan to undertake similar projects.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
E-Supply Chain Systems at Valvex and Its Integration with ERP Systems

intRoDUction Logistics cost accounts for a significant part in


the cost structure of manufacturing companies,
Chinese manufacturing industry has obtained a especially for those with inefficient supply chain
high growth rate in the past 25 years and is ex- management. Poor management of supply chain
pected to maintain a speedy growth in a number causes excessive inventory, inaccurate tracking,
of years to come. According to Chinas statis- low labor productivity, poor inventory turnover,
tics bureau, the gross output of manufacturing and little or no collaboration with customers
industry is about US$709 billion and it makes and vendors. As ERP systems are primarily not
up 40% of the national GDP in 2004 (China Sta- suitable to address these problems (Ball, Ma,
tistical Yearbook, 2004). But a critical problem Raschid, & Zhao, 2002; Dhingra, 2001; Tarn,
facing the Chinese manufacturing industry is Yen, & Beaumont, 2002), more and more Chinese
its low productivity, which is only a fraction of manufacturing companies are turning to SCM
the productivities of the United States and Japan systems to drive efficiency (Boston Consulting
(Peoples Daily, 2003). Group Report, 2005). However, implementation of
In the last few years an increasing number of ERP and SCM systems do not come easythere
Chinese manufacturing companies have increased are a lot of issues including system architecture
their investments in information technology to im- design, software vendor and consulting service
prove productivity. According to CCW Research, provider selection, disparate data sources, busi-
the amount of IT investments of manufacturing ness process reengineering, system integration,
industry in 2005 is expected to be US$3.5 bil- and project management (Bakowski, 2002; Xue,
lion and it has grown by 14.8% compared to the Liang, Boulton, & Snyder, 2005). Apart from
investment figure in 2004 (CCW Report, 2005). technical factors, appropriate organizational
Many large manufacturing companies in China orientation is also critical (Wang, Ying, Jiang, &
have implemented ERP systems (Wang, Xu, Klein, 2006). Kobayashi, Tamaki, and Komoda
Liu, & Qin, 2005; Zhang, Lee, Huang, Zhang, (2003), Kumar, Maheshwari, and Kumar (2002),
& Huang, 2005). These enterprise systems have and Umble, Haft, and Umble (2003) discussed the
not only transformed the operations of these best practices in implementing enterprise systems.
companies and improved management efficiency, The benefits from enterprise systems vary a lot.
but also they have established a reasonably good Organizations across the world have seen mixed
information technology applications environment. results (Hendricks, Singhal, & Stratman, 2006).
For instance, most of these companies have high- Here we discuss these issues and show with the
end servers, multiple work terminals, and TCP/IP help of a case study on Valvex, a leading Chinese
networks with high bandwidth. Also they have manufacturer of valves, how these enterprise
established clean data sources and have trained systems can improve business operations.
the employees so that the enterprise systems can
be utilized well. Most of them also have estab- eRP and ScM Systems in china
lished IT departments to maintain and support
the hardware and software. All these efforts have An enterprise resource planning (ERP) system
created a good infrastructure base to further is used to integrate different functions of various
improve the utilization of IT in their business departments across a company into a single decision
operations. In fact some of the companies have support system. ERP combines these functions into
moved further by implementing supply chain a single integrated software program that runs on
management (SCM) systems and integrating them a single database so that personnel from different
with ERP systems. departments can share information easily and avoid

0
E-Supply Chain Systems at Valvex and Its Integration with ERP Systems

duplication. A successful ERP implementation not nance by the global players in the Chinese market is
only needs appropriate software and hardware, but due to various reasons, including incompatibilities
also it requires appropriate alignment of business between business requirements and the ERP pack-
processes with the overall goal of the organization. age in terms of data format, issues associated with
Many times, the ways an organization does busi- translating English instruction into pictographic
ness as well as the ways people do their jobs need Chinese language, higher cost of ownership, and
to be changed. However, change does not happen disparity in business practice and corporate culture
overnight without pain. Transitioning to a new ERP (He, 2004; Hong & Kim, 2002).
system usually takes between one to three years The success rate of ERP system application is
on an average (Koch, 2006). As the ERP system quite low in Chinait is lower than 20% (Enet.
implementations require coordination of various com Report, 2005). For instance, Valvex suffered
tasks involving multiple expertise areas including two major setbacks in ERP system implementation
IT, business management, project management, and before it finally selected and implemented its cur-
industry expertise, such projects usually become rently used ERP system. Besides the complexity of
quite complicated. implementation, there are some other factors that
ERP systems are designed to integrate busi- affect ERP implementation in China. Both foreign
ness functions by providing information exchange and local ERP system providers face unique chal-
capabilities among different departments in an lenges. The ERP systems from foreign providers
organization. A typical ERP system consists of are designed based on the best business practices
modules from accounting, distribution, market- originating in business environments that are
ing, sales, manufacturing, and human resources different from that in China. These packages are
(Tarn et al., 2002). It helps an organization conduct not customized well to meet the needs of Chinese
key business operations using a single application companies. While the ERP packages from local
package in a seamless fashion. For example, once providers address China-specific issues, often
the sales department records an order on the ERP the packages are not mature, business concepts
system, it is seen by other departments in the used in these packages are not up to date, and
organization. The purchasing department plans functionalities are not user friendly. Also from
for obtaining raw materials if the inventory level the perspective of implementation, there are many
is low, the manufacturing department enters the issues that hinder successful ERP projects. Due to
order in production plan, the transportation/lo- pressure of cost-cutting initiatives, often Chinese
gistics department plans for inbound shipment of ERP system providers are not able to provide
raw materials and outbound shipment of finished sufficient resources during implementation. Also
goods, the customer service department prepares there is no independent party to evaluate the result
delivery date and quotations based on these plans, of ERP system implementation and there are no
and the accounting department sends an invoice agreed-on criteria to do the evaluation. Hence, it
after delivery of goods. A number of companies is difficult to understand where to improve and
in China have implemented an ERP system in the how to improve during implementation. ERP
recent past, and many are considering an imple- system implementation needs many consultants
mentation in near future (Wang et al., 2005). with diverse knowledge of IT, business processes
Although global market leaders like SAP and reengineering, project management, and indus-
Oracle have significant presence in China, local ven- try expertise. As the demand for ERP systems
dors such as UFSoft, Kingdee, GenerSoft, HJSoft, is growing in China, shortage of experienced
Anyi, and Riamb play major roles in the Chinese consultants is turning out to be another factor in
ERP market (Xue et al., 2005). The lack of domi- ERP implementation failures.

0
E-Supply Chain Systems at Valvex and Its Integration with ERP Systems

SCM systems are designed for supporting internal efficiency and align business strategies
multi-organization-wide coordination and execu- with a broader view of the supply chain consisting
tion of production and distribution activities (Ball of networks of vendors, suppliers, manufacturers,
et al., 2002). The main focus of SCM systems is distributors, retailers, and other partners. Consid-
centered around the fact that supply chain partners ering the low labor cost in China, value of SCM
should work collaboratively to drive efficiency, systems in terms of efficiency may appear to be
and an organization should look beyond its four unattractive, but its capability in offering broad
walls to align supply chain strategies to business visibility and channel transparency definitely
strategies (Lin, Huang, & Lin, 2002; Tarn et al., helps businesses (Cecere, 2005). Some of the ERP
2002). In an ever-changing business environ- systems rely on ad-hoc arrangements to get inven-
ment, SCM systems provide speed and agility tory information from different sources including
to respond to demand uncertainty and means to warehouses, and it does not work very well. On the
influence demand to some extent with the help of other hand, SCM systems are suitable for tracking
well-concerted efforts from business partners. inventory of different entities in the supply chain.
The use of SCM systems in China has increased While SCM systems are suitable for performing
in recent years. SCM systems use intelligent deci- continuous adjustments in the decision-making
sion rules and algorithms to help users improve process, including scenario modeling, evaluation
the efficiency of the supply chain, including faster of sourcing and logistics alternatives, and dynamic
flow of materials and information, and reduction of pricing and risk assessment, ERP systems are not
inventory. With the help of SCM systems, compa- suitable for offering these types of functionalities.
nies can make intelligent sourcing, manufacturing, They are not designed to identify problems proac-
delivery, and return decisions, and different steps tively, and it takes time (a few minutes to hours)
in business operations across multiple organiza- to generate reports on ERP systems. While major
tions can be automated. In China, there are many ERP vendors are introducing advanced planning
international players such as EXE, I2, and SAP, and optimization capabilities, SCM vendors are
who play significant roles in the high-end SCM advancing their products further with additional
software market. On the other hand, local SCM features (Dhingra, 2001). Nonetheless, the two
providers (e.g., Boke, Dichain, Kingdee) dominate types of enterprise systems have different focus,
the middle and low-end SCM software markets. strengths, and weaknesses. While ERP captures,
In 2004, revenue from the license fee of SCM processes, and disseminates necessary data and
software in China was about $50 million. The business intelligence within an organization, SCM
manufacturing industry, third-party logistics provides additional layers of decision support ca-
industry, and energy industry accounted for about pabilities. It is important that organizations have
80% of the total SCM software market in China access to data exchange, process integration, and
(CCID Consulting Report, 2005). analysis tools to remain competitive. Hence, it is
While ERP systems provide a means for sharing natural that complementary capabilities of ERP
information across various departments within an and SCM are integrated to generate more benefits
organization to achieve internal efficiency, SCM for businesses.
systems focus on handling relationships between In the subsequent sections, we describe how
trading partners in the supply chain and enable Valvex, a leading Chinese valve manufacturing
collaborative workflows across organizational company, leverages IT to transform its supply
boundaries. Collaboration among trading partners chain and improve its business operations. We
is crucial for success in a highly competitive busi- explain the issues faced by this company in
ness environment (Hui, 2004). Modern organiza- managing its supply chain and how these issues
tions have realized that they have to move beyond are addressed with the help of an SCM system


E-Supply Chain Systems at Valvex and Its Integration with ERP Systems

called e-SCM. We also describe how the e-SCM main categories: one category includes ball and
system is integrated with the existing ERP system. globe valves, and the other category includes gate,
Finally, we discuss potential future improvements check, and butterfly valves. Each manufacturing
in supply chain management for this company. facility produces one category of valves. There
are about 20,000 types of raw materials stored
in the two raw material warehouses at the two
BAcKgRoUnD inFoRMAtion on manufacturing facilities. Except for a few standard
VALVex valves, Valvex primarily follows a make-to-order
fulfillment policy. Around 85% of these made-
Valvex is a Sino-USA joint venture with more than to-order valves are exported.
1,000 employees and revenue of about US$50 mil-
lion in 2004. Being a leading valve manufacturer existing eRP System at Valvex
in China, Valvex has fulfilled the qualifications
to manufacture a wide range of industrial valves Valvexs existing ERP system was provided
for the most severe and demanding usage in the and implemented by Entreplan, a Chinese ERP
oil and gas, chemical, marine, power, and pipeline system provider. The ERP system at Valvex has
industry segments. Valvexs products include a four major subsystems: Sales and Distribution,
wide variety of valves including ball, butterfly, Manufacturing, Human Resources, and Account-
check, gate, and globe valves, with sizes ranging ing and Financial Analysis.
from one-half inch to 52 inches and class ratings
ranging from 150 pounds to 2,500 pounds. Using Sales and Distribution (S&D)
a variety of materials ranging from conventional
cast or forged steel to special alloy like Monel, This subsystem supports customer management,
Inconel, Hastelloy, and Duplex steel, Valvex is order management, order fulfillment management,
able to produce valves for a working temperature and distributor management. As a reporting and
range of 196C650C complying with the ASTM, analytical tool for order fulfillment, the S&D sub-
ANSI, API, BS, and DIN standards. Valvexs qual- system gives users access to aggregated operational
ity assurance is dedicated to the pursuit of a zero data from all sources, helps users complete their
defect valve. Valvex is an ISO 9001:2000-certi- entire sales cycle from price quotation to invoicing
fied firm and holds the production license of API and payment, and supports better decisions. By
6D, ABS, and CE/PED. Valvex is the first valve providing real-time storage information access,
manufacturer in China to be certified by CE/PED S&D subsystem assists users to respond faster
and TA Luft for low fugitive emission tests. and more efficiently to customers demands. This
Valvexs manufacturing base is in China, and it subsystem includes the following features:
has a distributor/agent network in North America,
Europe, the Middle East, and the Far East. It sells Online information tracking and handling
valves to end users, engineering contractors, and at every distributor level
stockicts. It also has two manufacturing facili- Automatic invoice generation and financial
ties located in Suzhou, a major industrial city of transaction
Jiangsu province in China. Each of them has two Sophisticated customer profiling tools pro-
raw materials warehouses, one semi-finished viding sufficient customer credit analysis
products warehouse, and one finished products and credit control
warehouse. Approximately 3,000 models of valves Ability to print, edit, and manage sales
are produced, and they can be classified into two reports


E-Supply Chain Systems at Valvex and Its Integration with ERP Systems

Manufacturing Inventory management: This feature pro-


vides critical safety-stock information that
The manufacturing subsystem supports manu- is used for coordination of procurement,
facturing planning, inventory planning and sales, and production planning.
control, and scheduling. This subsystem helps Production planning management: This
users manage, track, and control all phases of the feature allows manufacturers to develop
product lifecycle. It enables users to communi- optimized production schedules based on
cate production information quickly and easily prioritization of market demand, and ensure
among production units, maintenance units, and feasibility of production schedules satisfying
other departments within the organization. This the material and capacity constraints.
subsystem includes the following features:
Human Resources
Quality management: This feature enables
users to begin quality planning during the This subsystem supports staff management,
product design phase, create foundation for payroll management, time management, organiza-
quality inspection processes and in-process tional management, performance evaluation, and
control during production, and provide career planning management. This subsystem is
enterprise-wide instant access to the most based on the Chinese legal welfare and tax system,
current quality manual. and is flexible enough to support international hu-
Asset/equipment maintenance manage- man resource practices and salary regulations.
ment: This feature manages equipment up-
grades and refurbishment records, monitors Accounting and Financial Analysis
equipment work-orders, keeps users informed
of the conditions of assets and the status of This subsystem supports accounting entry,
maintenance work, automatically adjusts financial control, and financial analysis. It in-
work schedules according to equipment tegrates all financial and business performance
availability, provides integrated procurement information during the management processes,
process, and creates acquisition for spare parts and provides comprehensive and systematic
based on the inventory levels. financial reports.

Figure 1. Main subsystems of the existing ERP system at Valvex


Sales and Distribution Manufacturing
Quotation Pricing Customers Credit Manufacturing resource Manufacture Equipments
planning order schedule
Customer Orders Purchasing Jobs

Business plan Vendor Tasks

Shipping Forecast Quality assurance

Customer service Inventory

A/R invoice A/P invoice Costing Attendance


A/R reciept A/P payment Payroll
Financial
statements General ledger
HR Employees
Cash Budget Project Fixed Asset

Accounting and financial analysis Human Resources


E-Supply Chain Systems at Valvex and Its Integration with ERP Systems

The relationship among these four subsystems be accomplished well. Even if the company ben-
is illustrated in Figure 1. As shown in Figure 1, all efited from the ERP system, there was a growing
four subsystems are seamlessly integrated. This need for a system to overcome the limitations of
ERP system eliminated disorders in production the existing ERP system and manage the execution
planning, improved production capacity, standard- of activities in a coordinated fashion.
ized and streamlined the order-fulfillment process Figure 2 illustrates the process flow after
from purchasing to delivery, and established an Valvex implemented the ERP system. It used
open environment for corporate-wide data shar- to place purchase orders for materials largely
ing. It has established a very good basis for Valvex based on anticipated demands and safety stocks.
to further improve its business operation with the When vendors delivered materials to Valvex, they
help of information technology. were received and put away into the warehouses.
The ERP system at Valvex dealt with resource Materials were then pulled from the warehouse
planning within the whole enterprise through by the manufacturing department, and either
fulfillment of orders. It did not track or instruct returned to the semi-finished goods stockroom
the execution of planning. During the execution awaiting orders/instructions for assembly opera-
activities, there was a lot of paperwork between tions or sent to the finished goods warehouse for
handoff points and the business process relied upon customer shipment. The operational processes
many manual inputs from collected data. Also, the improved substantially after the ERP system was
coordination with vendors and customers could not implemented. However, a number of problems

Figure 2. Process flow with existing ERP system at Valvex

Customers order

May be unable to pick due


Delays occur in waiting to
Documents can be to inaccurate inventory or
accumulate documents ,
delayed or misplaced vendors delay in shipping
which can be misplaced

Manufacturing When inventory is Notify purchasing


ERP system generates Prints request Request for materials brought supervisor accumulates Pick from available and/or wait until
manufacturing tasks for materials to manufacturing supervisor materials request for warehouse inventory is available
processing
It is time-consuming to
look for correct
inventory in the After quality assurance , materials
warehouse are put away to warehouse. It is
time consuming to find right
locations to put

Delays and/or errors


may occur in creation
of purchase orders

Finished products are Picked raw materials and


put away to finished semi-finished products are Semi-finished products Picked materials are Generates and
products warehouse delivered to production line are put into semi - Vendors send materials delivers purchases to
delivered to production line
finished warehouse to warehouse vendors
for assembly

Finished products are picked , packed,


and shipped to customers


E-Supply Chain Systems at Valvex and Its Integration with ERP Systems

remained. Most handoff processes were through goods inventories. Earlier it was taking one to
paperwork, which caused delays and human er- two days for Valvexs employees to record the
rors. Warehouse operation, one of the most critical change in inventory levels on paper and input it
components in the overall process, was also not into the ERP system. Sometimes the paperwork
managed well. In the next section we will discuss was misplaced or lost, and the information was not
these problems. entered into ERP system. This caused inaccuracies
in the inventories shown in the ERP system.
Also materials in the warehouse went miss-
PRoBLeMS With exiSting ing or got damaged occasionally. However, these
eRP SYSteM AnD BUSineSS events were not recorded in the ERP system on
PRActiceS time. This caused some of the manufacturing
orders, which had been released and were being
non-Value-Added Activities processed, to be sitting in an incomplete state for
an indefinite period of time due to lack of raw
Operations at Valvex required a lot of paperwork. materials. Eventually the order fill rate was low,
Printing and delivery of paper-based memos, resulting in dissatisfaction among customers.
and filing and maintaining the paperwork were Due to inaccurate and outdated inventory,
non-value-added activities that consumed a lot of safety stocks and purchase order quantities were
resources. Paperwork also caused delays in col- set at higher levels than the levels they should
lection and recording of information in the ERP be at if inventories were up to date. As a result,
system. Lost or damaged documents as well as inventory turnover rates were low and inventory
reading or writing errors caused incorrect record- costs were higher than they should be. Sometimes
ing. Hand-off delays in the operational process inaccurate and outdated inventory created confu-
was another critical problem. Hand-off delays sion, resulting in delayed supplies from vendors
resulted in long cycle time for order fulfillment. As and unreliable forecasts as well.
inventory in the warehouse was not well arranged
and tracked, time was wasted in excessive travel Inefficient Warehouse Operation and
during picking or putting away operations. improper Material tracking

inaccurate and outdated inventory Each raw material warehouse stored about 20,000
in eRP System SKUs. It was very time consuming to pinpoint the
right locations in the warehouse to pick up or put
There were various activities that would change away materials, especially for the new employees.
inventory levels in the raw material warehouse, One type of material was usually placed at vari-
semi-finished product warehouse, or finished ous locations within the same warehouse, which
products warehouse. For instance, raw materials added to the difficulty of the picking job. Workers
or semi-finished products were picked up and sent mostly relied on experience to pick up and put
to the production line, semi-finished or finished away materials. It used to take several weeks for
products were delivered from the production line to new workers to get accustomed to the workplace.
warehouses, and finished products were picked up When the experienced workers were not on duty,
and shipped to customers. These activities would it was very time consuming for relatively newer
change the levels of raw material inventories, employees to do the job.
semi-finished product inventories, and finished


E-Supply Chain Systems at Valvex and Its Integration with ERP Systems

The pickers were not usually able to track Inefficient Interaction with Vendors
materials properly as they did not have sufficient
access to important information such as lot number Valvex needed to coordinate various activities
and expiration date. Also they could not ensure such as pricing, ordering, shipping, and product
proper rotation of inventory, such as first-in-first- inspection with its vendors. There was much scope
out (FIFO) and last-in-first-out (LIFO). to improve coordination and enhance efficiency.
After raw materials were picked up and de- Also, Valvex did not have effective methods to
livered to the production line, work-in-process evaluate vendors and to add or drop vendors as
inventory in the production line was not recorded needed from time to time.
and tracked in the ERP system. It was not possible
to track fulfillment of manufacturing orders until
manufacturing was completed and associated neW e-ScM SYSteM At VALVex
information was entered into the ERP system.
In the finished products warehouse, workers In order to address the above issues and improve
encountered more problems. As many products operational efficiency, Valvex implemented a
were made to order, products were put into the supply chain execution information systeman
warehouse with a label indicating which order e-supply chain management system (e-SCM).
they belonged to. Sometimes these labels got The system was obtained from a vendor named
misplaced, and finished products belonging to Excelvision. This system not only coordinates
different orders got mixed up as well. interactions with vendors and customers, but
also deals with internal activities involved in
Insufficient Productivity Measures warehousing and manufacturing operations.
and Low employee Morale Figure 3 provides a schematic representation of
the e-SCM system.
As there was no accurate measurement of labor Through its interface with the ERP system,
performance, supervisors were not able to pro- the e-SCM system obtains up-to-date planning
vide instant feedbacks or rewards as activities information and generates various tasks based
were completed. As a result, employees are not on this planning information. According to
motivated enough to work hard. Due to lack of required durations of these tasks, the e-SCM
visibility of operation, supervisors could not system allocates the tasks to workers and then
properly identify bottlenecks. Therefore, on-time instructs the workers to finish assigned tasks
corrective measures could not be undertaken. through radio frequency handhelds which have
wireless connections to the local area network.
Inefficient Interaction with Customers These devices measure the performance of each
worker with respect to their assigned tasks. As
In the day-to-day operation, Valvex needed to soon as the tasks are finished, relevant feedback
interact well with its customers. These interac- information on worker performance is sent to the
tions were in the form of quotations, pricing, ERP system as XML files. Using the handheld
ordering, product specification confirmation, devices, the workers collect accurate inventory and
shipping, order fulfillment inquiry, and customer other information in real time. This eliminates the
service. A large number of employees were dedi- need for manual paperwork that caused numerous
cated to dealing with customers. Such a system human errors in the past. As soon as tasks are
was time consuming, inefficient, and prone to finished, relevant feedback information is sent
human error. to the ERP system as XML files through system


E-Supply Chain Systems at Valvex and Its Integration with ERP Systems

Figure 3. The e-SCM system at Valvex


ERP system

XML
Vendors
Recieving Vendors

Warehousing
XML,
E-supply chain
fax,
management system Manufacturing
telephone

Shipping Customers
Customers

interface. The main functionalities of the e-SCM e-SCM system ensures visibility of inventory as
system at Valvex, namely receiving and put away, soon as materials are received and keeps track of
warehouse management, pickup and shipping, and materials in various zones. In the receiving and
order management, are discussed below. putting away process, materials are located in the
following zones:
Receiving and Put Away
Receiving yard and receiving zone: Vendors
Receiving and put away operations take place in all send materials to the receiving yard of ware-
raw materials warehouses, semi-finished product house, then receivers receive and put those
warehouses, and finished product warehouses at materials into the receiving zone. The system
Valvex. The ERP system sends receiving task- prints an inspection label for each receiving
related information to the e-SCM system through task to track associated materials.
the system interface in advance. All materials go Quality assurance zone: The system di-
through a quality assurance process before they rects workers to pick and put the received
are put to the warehouse. The materials that do materials into the quality assurance zone.
not meet the quality standards are re-sent by the As soon as the materials are put into the
vendors. The system records these materials as quality assurance zone, the system gener-
well to evaluate vendors performance. After ates inspection tasks. Quality inspectors
materials are received, the system fills relevant can inquire about the unfinished inspection
purchase orders and prints an inspection label tasks using personal computers. Quality
for each receiving activity. After materials are inspectors inspect the materials and input
inspected as qualified, the system searches for the inspection results through system clients
most advantageous locations and directs work- installed on personal computers. Then the
ers to put away. Workers scan tracking barcode system auto-prints inspection result labels,
labels, location-zone barcode labels, or location- and inspectors stick those labels onto as-
address barcodes to confirm the completion of sociated packages of materials.
each step of the process. After finishing the put Return zone: The system generates put-
away operation in the warehouse, the system away-to-return-zone tasks for the materials
searches for shortage records. If there is any short- inspected as unqualified and directs workers
age of materials, the system releases and assigns to put them into the return zone. Then the
picking tasks, and directs workers to pick. The system notifies vendors of the inspection


E-Supply Chain Systems at Valvex and Its Integration with ERP Systems

results. Vendors make arrangements for system has to track materials correctly after
taking back the unqualified materials from relocation to ensure right pick up.
the return zone. Freeze and purge management: Some-
Put away area: The system generates put times, inventory needs to be frozen for
away tasks for the materials inspected as quality issues. For instance, a vendor may
qualified and directs workers to put them notify Valvex that certain lots of a component
into the warehouse. are defective. Valvex can freeze these lots
of components using the lot numbers so that
Warehouse operation they cannot be picked up during the frozen
period. Supervisors can freeze/unfreeze
Warehouse operation largely involves the follow- inventories by SKUs, by locations, and/or
ing operations: by specific receiving. Also they can purge
defective inventories from the system if
Cycle count: Though the system can assure needed.
a high degree of inventory accuracy, there
may be some missing or damaged invento- Pickup and Shipping
ries due to human error. Cycle count is done
from time to time to overcome these errors. Outbound process involves picking up and ship-
All SKUs are categorized into A, B, and C ping raw materials or semi-finished products from
classes depending on annual dollar usage. warehouse to production line, and picking up and
Each class has different requirements for shipping finished products from warehouse to
cycle count frequency. For instance, A class customers. The system uses the following func-
of inventory is counted every 3 months, B tionalities to manage the outbound process:
class of inventory is counted every 6 months,
and C class of inventory is counted every Stock allocation: As soon as pick up orders
12 months. According to the ABC classi- are released, the system allocates the right
fication, the system generates cycle-count amount of right materials to the orders based
tasks for each SKU and assigns those tasks on appropriate material rotation rules. The
to workers when they are free. Hence, it is stock allocation reserves the amount of
not necessary to close the warehouse during stock for the outbound orders and ensures
cycle counting. all picking tasks have enough materials to
Inventory adjustment: Supervisors investi- pick. Also there is provision for supervisors
gate the inventory discrepancies found after to free up already allocated inventory to
cycle count and figure out the root causes meet higher priority outbound orders.
for it. Then supervisors take corrective mea- Container planning: The system records
sures, adjust the discrepancy, and notify the the volume of materials when they are re-
ERP system to ensure accurate inventory. ceived. Using this information, the system
Inventory relocation: There are several calculates the number and size of containers
situations when inventories need to be re- needed for picking orders after the orders are
located. For instance, if supervisors want to released. Finally, the pickers are instructed
free up a large space, they relocate materials to select the right containers.
to other locations. Sometimes, supervi- Order consolidation: If manufacturing and
sors need to combine materials from two shipping schedules permit, supervisors may
containers into one. In these situations, the want to consolidate several picking tasks to


E-Supply Chain Systems at Valvex and Its Integration with ERP Systems

increase efficiency. The system instructs the released. In that case, shortage is recorded
pickers about the sequence in which orders and a new cycle count task is generated in
should be picked. the system.

order Management
BeneFitS PRoViDeD BY
Order management has the following compo- the e-ScM SYSteM
nents:
inventory tracking
Order entry: There are two types of orders
at Valvex: inbound orders and outbound or- Inventory tracking is no longer a problem as before.
ders. The system generates inbound orders As soon as raw materials, semi-finished products,
based on purchase orders sent by the ERP or finished products are received, the system
system. It also generates outbound orders prints barcode labels that are stuck to the package
based on production orders or customer and they help in tracking the package. A unique
orders transmitted by the ERP system. In address is assigned to each location within the
order to ensure order data accuracy, orders warehouse, and this appears in the barcode label.
are entered electronically into the system. As soon as inventory is received and put away at
Order maintenance: As soon as there is a location, the system tracks this inventory using
change (including addition, deletion, and the barcode label of the inventory and the barcode
modification) in any purchase orders, pro- address of the location. Then the system instructs
duction orders, or customer orders, the ERP the workers on where to pick the materials from
system notifies the e-SCM system through and how much to pick at a particular location. The
system interface and the e-SCM system system even uses optimization algorithms to find
undertakes corrective measures. out the best putting away routes and picking
Priority management: Usually, the system up routes when a worker needs to put and pick
processes orders in a sequence that is created multiple items in a single trip.
internally based on required finish dates.
But sometimes due to change in produc- System-Directed Activities
tion schedule, these sequences need to be
adjusted. In such cases, the system generates The system directs all activities from incoming
priorities for orders based on constraints materials processing to manufacturing and order
imposed by supervisors as well as required fulfillment, assuring that the correct materials are
finish dates. getting to the right place, at the right time, and in
Automatic order release: Inbound orders appropriate quantities to satisfy production orders
and outbound orders are released automati- or customer orders. This eliminates non-value-
cally. No human intervention is required. added activities and improves overall efficiency.
Shortage management: The system does Labor also has become system directed through
not release outbound orders when there is a radio frequency handheld devices. Activities
shortage of materials to pick. However, there are recorded on a real-time basis to ensure that
may be exceptions. Due to inaccurate inven- inventory is accurate and current information is
tory count or damaged inventory, sometimes always available in the form of reports and for
there may not be enough inventories to information sharing with other systems. The
pick for outbound orders that have been system also optimizes picking and putting away


E-Supply Chain Systems at Valvex and Its Integration with ERP Systems

operations by interweaving the multiple tasks of iMPLeMenAtion AnD


the workers, and optimizing picking and putting integRAtion oF e-ScM SYSteM
routes. The system also determines the most At VALVex
advantageous placement of SKUs to improve the
efficiency of picking. In this section the details of the project for
implementing the e-SCM system and integrat-
Paperless environment ing it with the existing ERP system at Valvex
are discussed.
Paperwork is no longer required at the handoff
points. Data is captured at every hand-off point gathering initial information
when materials either move from one location for Project Scoping
to another or the material status changes. Data
entry captures critical information including, but Before starting the project it was critical to define
not limited to, SKU, time, user ID, from and to its scope. In order to do this job, Valvexs long-
locations, lot number, serial number, and so forth. term goals were reviewed, knowledge about the
Electronic data displayed by handheld devices existing practices was gathered, and the resource
replaces most of the paperwork. Information commitments from top management was esti-
can be updated almost instantaneously from the mated. As a part of the exercise, the following
handoff points to the e-SCM system database. The information was gathered:
paperless environment assures improved accuracy
(no reading or writing errors) and elimination of Affected parties: Valvex figured out
lost or damaged documents. Figure 4 shows how which departments and personnel would
the e-SCM has revolutionized the data capturing be affected during implementation, and
and data sharing activities at Valvex. who would use the e-SCM system. Also it
found out how they would be affected and
collaboration with Suppliers and their degree of involvement during imple-
customers mentation. Affected parties were various
internal departments including accounting,
Based on information collected by the e-SCM purchasing, manufacturing, logistics, and
system, Valvex also provides a Web-based ap- customer service, as well as outside entities
plication for its customers and suppliers. Now, like vendors and customers. Employees in
customers can do price quotations, ordering, warehouse and logistics management would
product inquiry, and order fulfillment inquiry be primary users of the system.
on the Internet. Most of the collaboration with Legacy system: As Valvex had an exist-
vendors is also achieved through the Web-based ing ERP system, it became necessary to
application. The customer and vendor informa- investigate the relation between the e-SCM
tion remains separated from each other because system and the ERP system during imple-
Valvexs customers and vendors have their own mentation.
unique login and password to use this Web-based Hardware environment: As Valvex had
application. already implemented the ERP system, it was

0
E-Supply Chain Systems at Valvex and Its Integration with ERP Systems

Figure 4. Data capture at various handoff points at Valvex

Customers Vendors Receiving

Shipping Quality assurance

Packaging Inventory

Inventory Quality assurance Manufacturing

Semi-finished
products inventory

important to find out if any hardware could were critical for successful implementation of
be shared. If purchase of new hardware was the project. It contained detailed information on
necessary, it was to be figured out as well. process reengineering, software and hardware
Facilities: It was crucial to know how specifications, system interface, project plan,
materials flow through the raw material and value proposition, and was approved by the
warehouse, production line, semi-finished project management team. Details of some of the
product warehouse, and finished product components are provided below:
warehouse. Also existing put away and pick
up operations were examined as well. Software customization: Customer re-
Operational processes: The operational quirements were written clearly by R&D
processes in Valvexs supply chain including engineers to customize some functionalities
production order fulfillment, purchase order of the software. Only a few people partici-
fulfillment, and internal logistics flow were pated in this process to minimize informa-
investigated. A knowledge base of finished tion distortion.
products, raw materials and components, and Installation and testing of hardware
production environment was prepared. environment: As hardware configuration
Root cause of customers problems: Find- in the project was quite complicated, it was
ing the root cause(s) of the problems faced inspected thoroughly to ensure smooth
by the customers was not always trivial. functioning during the software testing
Hence, the project team worked with both phase. The hardware included application
customers and Valvex personnel to figure and database servers, TCP/IP network,
out where the real problems were and what wireless network, radio frequency handheld
could be done to address the issues. devices, barcode printers, and laser printers.
The hardware testing involved inspecting
Project Specifications individual components as well as ensuring
that they function well collectively.
After outlining the broad scope of the project and Software testing: Software testing involved
coming to a consensus about it, detailed specifica- individual features testing, integrated
tions were finalized. Appropriate specifications system testing, and on-site testing. The


E-Supply Chain Systems at Valvex and Its Integration with ERP Systems

first two could be done internally by R&D every 30 minutes and a full backup at 1:00
engineers and testing engineers. After the a.m. every day automatically. The specialists
first two tests were finished, software was from the information technology department
installed in a real hardware environment for of Valvex were trained to perform routine
on-site testing that simulated the real work system maintenance.
environment. The bugs found during on-site Service from software vendor: After the
testing were fixed by R&D engineers, and e-SCM system was implemented, different
the system was re-tested. levels of service including 247 phone re-
Initial data loading: After the software was sponse, remote assistance, on-site assistance,
tested satisfactorily, clean and most updated data backup, and retrieval assistance were
data were loaded into the system. The data- provided to Valvex by the software vendor
sets included initial inventory information, based on the service contract agreement.
warehouse location information, purchase
orders, and so forth. Extra efforts were made organization of implementation
to ensure that accurate and high-quality team
data were loaded. Another set of tests was
performed with these real-life datasets, and The organization of team structure was important
after successful completion of these, test data for successful implementation of the project. The
were reloaded and the old and new systems implementation team was formed by drawing
were run in parallel for some periods before personnel from three organizations: Valvex, ERP
switching to the new system. system providerEntreplan, and e-SCM system
Employee training: Training with differ- providerExcelvision. The degree and length of
ent degrees of details were conducted. For engagement of different members varied during
example, supply chain concept training was the implementation cycle. The designations of
provided to senior managers and logistics the different members in the team are provided
managers, software operation training was below.
provided to logistics managers, and training
on handheld devices was provided to work- Valvex
ers in the logistics department.
On-site assistance: At the initial stage of Vice general manager: Helped in acquiring
running the system, on-site assistance from resources as needed and ensured coordina-
the software vendor was necessary as the tion among various departments.
users were not very comfortable with the new Logistics manager: Managed the project
environment even after training. Also few from the customers side and took major
bugs were not found that were not identified decisions in the project.
during the testing phase. The on-site experts Information technology specialist
addressed these issues efficiently to ensure
smooth transition. Entreplan
System backup and maintenance: System
backup is important to recover the data when ERP system specialist: Participated in the
data got corrupted or lost due to various negotiation and finalization process of the
unforeseen events including human error. system interface design, and coordinated
Storage disks with the RAID mechanism with R&D engineer to develop interface for
were used to protect data. The system was the ERP system.
programmed to make incremental backups R&D engineer


E-Supply Chain Systems at Valvex and Its Integration with ERP Systems

Excelvision Project Management

Project manager The three major tasks of overall project man-


Supply chain management consultant: agement were initial project planning, progress
Played a major role in re-engineering of the monitoring, and transition and maintenance
business processes planning.
R&D engineer
System tester and trainer Initial Project Planning

hardware environment This involved initial requirements gathering, IT


infrastructure planning, project staffing, detailed
The hardware used are listed below: scheduling, budgeting and financing, and transi-
tion planning. The project management team
Network consisted of project managers from all three
organizations involved: Valvex, Entreplan (ERP
TCP/IP local area network: Used to con- provider), and Excelvision (e-SCM provider).
nect server, PCs, printers, and wireless The team reported to the vice general manager
network. of Valvex. The management team defined the
Wireless network: Used to establish wire- scope of the project very clearly. Few key issues
less connections needed for the operation of in inventory tracking, order management, and
radio frequency handheld devices. resource allocation were targeted to ensure rapid
return on investment. Plans were made to execute
Servers necessary functional changes in the existing busi-
ness processes, aligning them with the technical
Memory: 2 GB, two processors with 2.8 modifications. Some of the manually intensive
GHz. activities were strategically planned to be replaced
Storage: 100 GB. by automated processes.

Radio Frequency Handheld Devices Progress Monitoring and Control


and Scanner
All parties involved in the project conferred to
Handheld devices equipped with scanners are come up with the project plan. Some of the tasks
used for instructing workers to finish tasks and were carried out concurrently to keep the project
collect information during their job. Each of the duration short. Initially, one month was spent fi-
devices has a wireless network card to connect nalizing the project scope. After the kick-off, the
to the local area network. project was finished in 15 weeks. Representatives
from all groups with various job responsibilities
Barcode Printer and Laser Printer met every other day to resolve the issues encoun-
tered during implementation. The issues were
As all materials are tracked by specific barcodes, prioritized and logged, and the status of issues is
barcode printers are used quite often. updated in the next meeting. Sharing responsibili-


M

E-Supply Chain Systems at Valvex and Its Integration with ERP Systems

ties and exchanging ideas among all team members resolution. Valvex paid 20% of the license fee to
ensured consistent progress. Most of the project Excelvision for maintenance support per year,
went as planned except a few unexpected issues which included assistance in software upgrade
that caused changes in due dates of some tasks and resolution of day-to-day issues.
a few times. Progress was monitored closely by
the three project managers from the three parties.
At the end of the weekly update meetings, the iSSUeS AnD chALLengeS
project manager from Valvex reported the status enncoUnteReD DURing
to the vice general manager, who was the execu- iMPLeMentAtion
tive sponsor of the project. His intervention was
necessary if a conflict/issue could not be resolved During the course of the implementation, the
by the teams. Also he attended the status update project team faced a number of issues and chal-
meetings occasionally and met with project team lenges. In the following section we discuss how
members quite frequently on an informal basis. these issues were discussed and resolved.
Active involvement of a top executive helped the
team finish the project on time. System interface Design

Transition and Maintenance Planning Due to the complexities of the ERP and e-SCM
systems, it was difficult to figure out which in-
Extensive testing initiatives were undertaken formation should be exchanged at what stage of
before going live. Required functionalities of both the business process. Also the implementation
the e-SCM system and the updated ERP system team had to decide on how the information was
were independently tested. The actual field data to be exchanged so as to ensure accuracy and
was loaded into the newly integrated system, and security. In order to deal with the first set of
the system was tested and validated thoroughly. issues, roles of the ERP and e-SCM systems in
After finishing all functional and technical testing, running the business were clearly defined and
the go-live was announced. Valvex personnel were duplicate functionalities were identified. Also the
trained well in advance to take over responsibili- information requirements of these two systems at
ties of running the systems from Entreplan and various stages of process flow were determined.
Excelvision. Some of their early involvement in Personnel from Valvex, Entreplan, and Excelvi-
the project helped in making a smooth transition. sion took part in a number of meetings to come
The system was designed to make an incremental to a consensus. Data transmission from ERP to
data backup once in every five minutes and a full the e-SCM system included item masters, initial
backup for all data every night automatically. inventory levels, inbound orders, and outbound
Other maintenance work was performed at night orders. Data sent from the e-SCM system to ERP
to avoid conflict with busy daytime operations. included receiving and put-away information,
The core system maintenance team consisted of inspection result, pick-up and shipping informa-
a hardware engineer from Valvex and one system tion, and inventory adjustments.
engineer from Excelvision who created the system Regarding the means of exchanging informa-
log. The IT department manager at Valvex checked tion between the ERP and e-SCM systems, the
the log daily and pointed out potential problems system specialist from the two system providers
to Excelvisions system engineer for possible agreed on using XML so that data accuracy could
be maintained.


E-Supply Chain Systems at Valvex and Its Integration with ERP Systems

change in Business Processes handheld Devices and Barcode


Printers
Successful use of e-SCM system required changes
in some of the existing business processes. The The handheld devices were to access the e-SCM
task was quite challenging. A good amount of system using a variety of telnet emulation terminal
time was spent preparing for the transition. All software. Two models of handheld devices were
the Valvex employees who were affected by the selected. There were some incompatibility issues
change were trained rigorously so that they could with one model. Although emulation terminal
be effective in the new working environment. As software that used telnet protocol was installed in
the new processes were complex and involved new this model, it could not display Chinese characters.
task-like operating handheld devices, training the It was found out that incompatible character sets
workers was not easy and it required thorough between the host system and the emulation termi-
planning. The training sessions were designed nal software was causing the problem. Compatible
to cover both theoretical concepts and practical Chinese character set was reinstalled in the emula-
hands-on exercises in simulated environments. tion terminal to resolve the problem. Also some
Also the training programs were tailored accord- information could not be displayed in one whole
ing to varying needs of system users. screen and some characters even disappeared. This
was due to the small display screen and limited
initial Data Loading range of possible adjustment for character size.
In order to address this issue, display information
Most of the data that were loaded initially into was simplified and the information at the host
the e-SCM system came from the databases of system side was adjusted according to the size
the ERP system. There were a few issues with of display of the handheld devices. The barcode
these datasets. Data structures were different printers also had issues with Chinese characters.
between the ERP and e-SCM systems, and the Initially the printers were not able to print the
inventory data in the ERP system was inaccurate Chinese characters. Compatible characters were
and outdated. Also there were many tasks that reinstalled to eliminate the problem.
were being processed, and the corresponding data
were not entered in the ERP system. Since the network
ERP system had to keep running during the data
loading process, data often changed during this There was a 2 MB bandwidth optical network
period and the data transfer was not up to date. connecting the two manufacturing facilities that
A two-step solution was adopted to address the were 10 kilometers apart. Before the e-SCM sys-
above issues. First, all in-process tasks were fin- tem was implemented, data transfer in the ERP
ished by a specific date. Then the data was loaded system consumed almost all the network capacity.
at midnight of a specific date, transformed into The existing optical network was not sufficient
acceptable format, and loaded into the database to handle the large volume of data transfer that
of the e-SCM system. Secondly, live cycle counts was going to take place in a real-time system like
for all SKUs in the warehouse were performed the e-SCM system. Response time of handheld
and accurate data were sent to the ERP system. devices was quite slow due to the limited band-
This ensured that inventory data in both systems width, particularly when the ERP system was also
were in sync and accurate. exchanging data. In order to address the capacity
.


E-Supply Chain Systems at Valvex and Its Integration with ERP Systems

issue, another optical network connection between coordination Among team Members
the two manufacturing facilities was built; this from three organizations
took one month. The e-SCM system was not able
to run well during this period. As a result, progress As project team members were drawn from
of the project was stalled to an extent. The lessons three organizations, coordination among them
learned from this glitch helped the project team to was challenging. Especially when dealing with
be more proactive in designing IT infrastructures system interface negotiation between ERP and
at later stages of the implementation. e-SCM system providers, it was difficult to find
a final agreement. If there were multiple ways to
Model Selection for resolve one issue, each of the system providers
handheld Devices would choose the one(s) that minimized their
workload and degree of responsibility. Often
A number of models of handheld devices equipped they argued for a long period of time without
with a scanner, telnet emulation terminal, and coming to a consensus. In order to resolve such
wireless network card met the basic requirements issues, involvement of Valvexs senior manage-
for working with the e-SCM system. It was im- ment in the project was required. Every week the
portant to figure out which ones would be most project manager had to evaluate the progress of
suitable. The price of qualified handheld devices implementation and take corrective actions when
varied from US$500 to US$2,500. After long the status lagged behind schedule. As the project
deliberation, two models were finally selected. manager was from the e-SCM system provider, it
One of them was manufactured by Symbol, the was difficult for him to push the personnel from
worlds leading handheld provider for logistics the ERP system provider to expedite their tasks.
applications; this had a price tag of US$1,625. The Many times senior managements interference
other model was manufactured by a Taiwanese was needed. Also the team members from the
company named Biotech with a price tag of only ERP system provider worked on multiple projects
US$500. Since this model had not been used in simultaneously. Hence, it was difficult to get full
the logistics industry before, there were concerns commitment from them to finish their job in the
about using it in a demanding environment of a e-SCM project on time. Often negotiation and
dirty and crowded warehouse. However, the price insistence from senior management was needed
was attractive and risk was not very high as a to complete the tasks as planned.
small number of devices were to be purchased
initially. Hence, the project team decided to buy Unexpected Problems
a few cheaper units as well. The project was
implemented in two phases. In the first phase, Even if the project team prepared well, at the
out of eight handheld devices needed, five were initial stage many unexpected issues surfaced
expensive units and three were cheaper units. As which included software bugs, incorrect data,
the cheaper model did not perform well in the first inconvenient software functionalities, human
phase, all 12 units required in the second phase errors, and information exchange errors between
were procured from Symbol. ERP and e-SCM systems. Hence a problem-solv-


E-Supply Chain Systems at Valvex and Its Integration with ERP Systems

ing mechanism was put in place. Every two days, embedding daily demand-pull subroutine in the
a meeting among representatives from all parties e-SCM system, which instructs the system to react
was arranged so that problems were recognized to new or changed customer orders that create the
and necessary actions could be taken without actual demand for a product. This subroutine can
much delay. Outstanding issues and their resolu- provide the suppliers with precise descriptions
tions were discussed in the subsequent meetings. and amounts of materials to deliver to meet the
In order to make the process efficient, problems demands at Valvex. The subroutine is particularly
were classified into different categories according effective in reducing the capital commitments for
to importance and urgency, and different resolu- expensive raw materials or components with short
tion strategies were applied for each category. lead time when suppliers are within close proxim-
Also there was a weekly status update meeting ity of Valvexs manufacturing facility. At Valvex
involving all team members. inexpensive items and expensive items with long
lead time are replenished according to a min/max
effectiveness of the inventory policy. Appropriate safety stock levels
e-ScM implementation for these items are maintained, and they are or-
dered in economic order quantities. The demand
There were many operational problems associated pull subroutine can reduce the inventory levels
with the existing ERP system at Valvex which ranged for these items, as well result in less investment
from inaccurate and inefficient inventory control to in inventory. Additional benefits include reduced
poor order fulfillment. The e-SCM changed many space requirements in the warehouse and on the
of the basic business processes at Valvexs facilities manufacturing floor.
and was able to bring in a number of benefits includ- The demand pull or Kanban system was
ing real-time inventory information update, better invented and successfully implemented by the
picking activities, and establishment of effective Japanese manufacturing companies. The main
collaboration with vendors and customers. Table idea is to minimize inventory by supplying inven-
1 summarizes the benefits obtained by Valvex in tory only when it is needed. Work in progress is
terms of operational measures, one to two months closely monitored to avoid shortage. This concept
after the integration of the e-SCM system with the can be used for low value inventory by utiliz-
ERP system was completed. ing electronic Kanban or e-Kanban. The use of
e-Kanban enables the system to pull materials
efficiently as needed from the most convenient
FUtURe iMPRoVeMentS locations. When production line personnel detect
a low inventory level, they can scan the SKUs
The traditional techniques used by Valvex for barcode label to transmit the information on item
making production schedules are based on meet- description and location to the e-SCM system.
ing forecasts or reaching preset inventory levels. Then the system displays open deliveries and open
Frequently, large batch orders are processed at each orders for that SKU. It also identifies changes in
department based on the workflow, and materials usage patterns for that SKU so that appropriate
are pushed to the next department after the jobs adjustments can be made to order quantities and/or
are finished. This type of flow usually causes delivery schedules. After the users confirm the
excess inventories, long cycle times, and some requirements, the system determines the best
non-value-added activities. Even after implement- course of action and assigns tasks to appropriate
ing the e-SCM system, these issues were not fully personnel to transfer inventory. Inventories are
resolved. However, these issues can be tackled by pulled in a predetermined sequence. One example


E-Supply Chain Systems at Valvex and Its Integration with ERP Systems

Table 1. Benefits of using the integrated ERP and e-SCM system at Valvex

Operational Measures Pre-Implementation Post-Implementation

Outbound order fulfillment

Commitment to fulfillment percentage 80% 98%

Average lead time 45 min 30 min

On-time delivery percentage 80% 95%

Inventory

Average safety stock period 40 days 25 days

Inventory accuracy 85% 99%

Average monthly purchase frequency 50 10

Figure 5. Workflow in the demand pull/e-Kanban subroutine

E-supply chain
If no existing blanket
management order request P.O.
ERP P.O. to vendor and
order acknowledgment
system

Demand generated If no, issue


from customer or Line side bin Local Remote
Search If no, search If no, search release against Material vendor
manufacturing locations warehouse warehouse blanket P.O.
order

Yes
Available

Yes
Available
Yes
Available
Yes
Available

of the sequence is a search for a SKU first in the pull order (or e-Kanban card) to the supplier via
bin next to the production line followed by a XML, e-mail, or fax to trigger delivery activi-
search in the consignment warehouse location. ties. In the event that an open order for the SKU
After the search is over, inventory is allocated does not exist or an existing order is insufficient
to the production line in a particular order, and to cover the demand, the system provides alerts
personnel are directed to the specific inventory and notifies the purchasing department that an
locations to perform pick, pack, and ship opera- additional purchase order is required. Suppliers
tions. At times, it can be found that for certain are required to provide electronic or manual ac-
SKUs, inventory is not kept internally or inven- knowledgements after receiving the orders. The
tory level is not sufficient to meet demand. In that workflow in the demand pull subroutine that may
case, the system determines first whether there is be added in the future is provided in Figure 5.
an open blanket purchase order and then issues a


E-Supply Chain Systems at Valvex and Its Integration with ERP Systems

concLUSion enterprise and might not be seen in other parts


of the world where standard English characters
Although the existing ERP had a number of prob- are used. The selection of XML as the standard
lems, it had established a good infrastructure at for data exchange between the ERP and e-SCM
Valvex to implement other information technology systems proved useful because of its simplicity.
applications. Hardware and local area network had There are some interesting lessons in project
been established, and personnel were accustomed management in this case. The senior manage-
to working with decision support tools. Also the ment had to be responsible for moving forward
ERP system acted as a repository of many critical the project on schedule. This was particularly
datasets that might be needed in other application important in a set up where a number of teams
software. The e-SCM system implementation at from different organizations worked together.
Valvex benefited from the previous ERP project. Had the entire task of coordination been left
Nonetheless, there were many challenges includ- with the ERP provider and e-SCM provider, the
ing business processes reengineering, integration project might not have completed on time. The
with a legacy ERP system, and new supply chain ERP provider had already implemented the ERP
system development and installation. Eventually system, and there were few people from that or-
the challenges were handled successfully with the ganization who were present on-site. The active
help of competent team selection, active execu- involvement of top management ensured due
tive supports, sound system architecture design, diligence from all sides involved. Timely meet-
appropriate use of project management method- ings and well-defined follow-up procedures for
ologies, and proper end user training. various issues encountered during implementation
Several lessons can be learned from the case helped smooth the progress. Staff planning with
study of Valvex. Valvex had rightly identified necessary skill set was also found to be one of
that it needs to look beyond the existing ERP the critical factors for success. The consultants
system and implement an e-SCM system in or- from the ERP provider and SCM system provider
der to maintain its competitive advantage. Also, comprehended the requirements of a Chinese
it did not select companies like SAP or Oracle, manufacturing organization quite well. Most
but gave the contract to Excelvision, which had of the team members were Chinese and native
a Chinese-speaking implementation team and speakers of Mandarin, which made communica-
stressed customization. Valvex is a large manu- tion among them a non-issue. The implementation
facturing organization with a great variety of started with a relatively simple workflow, and
products. Hence, Valvex put emphasis on a few eventually more complex functionalities were
key manufacturing processes such as receiving added. The success of this type of approach was
and put away, picking up, and order management, reported earlier in the literature (Kobayashi et
which narrowed the scope of the project. This al., 2003). Past implementations elsewhere have
ensured rapid return on investment. demonstrated that well-defined prior planning
During implementation of the e-SCM system, for undertaking the business process changes is
Valvex had to deal with problems and/or issues crucial, although it often gets lost among the mess
related to design of appropriate interfaces between of complex technical details (Chang, 2002). The
the two systems, data management, handling ability of the Valvex project management team to
of Chinese characters in handheld devices and balance between the two was important for the
barcode printers, computer network capacity, success of the implementation.
and handheld device selection. Among these After the implementation, Valvex benefited
challenges, some were distinct for a Chinese from increased accuracy of inventory, lower


E-Supply Chain Systems at Valvex and Its Integration with ERP Systems

inventory tracking cost, elimination of various Ball, M.O., Ma, M., Raschid, L., & Zhao, Z.
non-value-added activities, and improved col- (2002). Supply chain infrastructures: System
laboration with customers and vendors. The integration and information sharing. SIGMOD
existing ERP system had many shortcomings that Record, 31(1), 61-66.
ranged from inaccurate and inefficient inventory
Boston Consulting Group Report. (2005, June
control to poor order fulfillment. The e-SCM
1). China is trying to cope with its logistics chal-
changed many of the basic operational processes
lenges but gaps persist. Retrieved June 1, 2006,
at Valvexs manufacturing facilities and was able
from http://knowledge.wharton.upenn.edu/index.
to bring in tangible benefits in terms of better
cfm?fa=printArticle&ID=1167
picking activities, real-time inventory informa-
tion update, and provisions of collaboration with CCID Consulting Report. (2005, October 1). China
vendors and customers. Valvex paid Excelvision supply chain management software market and
US$15,000 as the license fee for the e-SCM sys- trend. Retrieved June 1, 2006, from http://www.
tem. The annual maintenance fee for the system ccidconsulting.com/
was US$3,000. Valvex had to pay US$6,000 to
CCW Report. (2005). Retrieved June 1, 2006,
Entreplan for modification and customization of
from http://www.ccwresearch.com.cn
the ERP system and US$30,000 to Excelvision
as a consultation fee for installation. The initial Cecere, L. (2005). Succeeding in China: Facing
budget required for implementation of the e-SCM tough SCM issues in the fifth dragon economy.
system and the integration project amounted to AMR Research.
nearly US$92,000. The project resulted in direct
Chang, H.H. (2002). A model of computerization
cost savings for Valvex. The reduction in the
of manufacturing systems: An international study.
safety stockholding period by 15 days resulted in
Information & Management, 39(7), 605-624.
inventory cost reduction by approximately $1 mil-
lion per year. By reducing the monthly purchase China Statistical Yearbook. (2004). Retrieved June
frequency from 50 to 10, the e-SCM system was 1, 2006, from http://www.stats.gov.cn/english/sta-
able to produce a savings of US$4,800 per year. tisticaldata/yearlydata/yb2004-e/indexeh.htm
The reduction of lost sales due to unavailable
Dhingra, V. (2001). Enterprise resources planning
inventory resulted in savings of US$20,000 per
systems and supply chain management. Retrieved
year approximately. These figures go on to show
June 1, 2006, from http://projects.bus.lsu.edu/in-
that the overall supply chain operations at Valvex
dependent_study/vdhing1/erp/#vs
have become more efficient, although there is
scope for further improvement. Enet.com Report. (2005, July). How to select the
ERP system. Retrieved June 1, 2006, from http://
www.enet.com.cn/cio/zhuanti/erpxx/
ReFeRenceS
He, X. (2004). The ERP challenge in China: A
resource-based perspective. Information Systems
Bakowski, M. (2002). C-commerce. Would mix-
Journal, 14(2), 153-167.
ing ERP, CRM, e-procurement and SCM be an
efficient strategy for the future? In Proceedings of Hendricks, K.B., Singhal, V.R., & Stratman, J.K.
the 10th International Systems Integration Confer- (in press). The impact of enterprise systems on
ence, Prague, Czech Republic (pp. 107-114). corporate performance: A study of ERP, SCM,
and CRM system implementations. Journal of
Operations Management.

0
E-Supply Chain Systems at Valvex and Its Integration with ERP Systems

Hong, K.K., & Kim, Y.G.. (2002). The critical Umble, E.J., Haft, R.R., & Umble, M.M. (2003).
success factors for ERP implementation: An Enterprise resource planning: Implementation
organizational fit perspective. Information & procedures and critical success factors. European
Management, 40(1), 25-40. Journal of Operational Research, 146(2), 241-257.
Hui, L.T. (2004). Business timeliness: The inter- Wang, C., Xu, L., Liu, X., & Qin, X. (2005).
sections of strategy and operations management. ERP research, development and implementation
International Journal of Operations & Production in China: An overview. International Journal of
Management, 24(6), 605-624. Production Research, 43(18), 3915-3932.
Kobayashi, T., Tamaki, M., & Komoda, N. (2003). Wang, E.T.G.., Ying, T.C., Jiang, J.J., & Klein,
Business process integration as a solution to the G.. (2006). Group cohesion in organizational
implementation of supply chain management innovation: An empirical examination of ERP
systems. Information & Management, 40(8), implementation. Information and Software Tech-
769-780. nology, 48, 235-244.
Koch, C. (2006). The ABCs of ERP. Retrieved Xue, Y., Liang, H., Boulton, W.R., & Snyder, C.A.
June 1, 2006, from http://www.cio.com/research/ (2005). ERP implementation failures in China:
erp/edit/erpbasics.html Case studies with implications for ERP vendors.
International Journal of Production Economics,
Kumar, V., Maheshwari, B., & Kumar, U. (2002).
97(3), 279-295.
ERP systems implementation: Best practices in
Canadian government organizations. Government Zhang, Z., Lee, M.K.O., Huang, P., Zhang, L., &
Information Quarterly, 19, 147-172. Huang, X. (2005). A framework of ERP systems
implementation success in China: An empirical
Lin, F., Huang, S., & Lin, S. (2002). Effect of
study. International Journal of Production Eco-
information sharing on supply chain performance
nomics, 98(1), 56-80.
in electronic commerce. IEEE Transactions on
Engineering Management, 49(3), 258-268.
Peoples Daily. (2003, September 9). Manufactur- enDnote
ing industry in China still an Aurora Industry.
Retrieved June 1, 2006, from http://english.people. 1
Fictitious names Valvex, Entreplan, and
com.cn/200309/09/eng20030909_124031.shtml Excelvision have been used to protect the
identity of the valve manufacturer, ERP pro-
Tarn, J.M., Yen, D.C., & Beaumont, M. (2002).
vider, and e-SCM provider respectively.
Exploring the rationales for ERP and SCM inte-
gration. Industrial Management & Data Systems,
102(1), 26-34.




Chapter XII
Coordination of a Supply Chain
with Satisficing Objectives
Using Contracts
Chunming (Victor) Shi
Washington State University, USA

Bintong Chen
Washington State University, USA

ABStRAct

Setting performance targets and managing to achieve them is fundamental to business success. As a
result, it is common for managers to adopt a satisficing objectivethat is, to maximize the probability
of achieving some preset target profit level. This is especially true when companies are increasingly
engaged in short-term relationships enabled by electronic commerce. In this chapter, our main focus is
a decentralized supply chain consisting of a supplier and a retailer, both with the satisficing objective.
The supply chain is examined under three types of commonly used contracts: wholesale price, buy back,
and quantity flexibility contracts. Because a coordinating contract has to be Pareto optimal regardless
of the bargaining powers among the agents, we first identify the Pareto-optimal contract(s) for each
contractual form. Second, we identify the contractual forms that are capable of coordination of the supply
chain with the satisficing objectives. In contrast to the well-known results for the supply chain with the
objectives of expected profit maximization, we show that wholesale price contracts can coordinate the
supply chain with the satisficing objectives, whereas buy back contracts cannot. Furthermore, quantity
flexibility contracts have to degenerate into wholesale price contracts to coordinate the supply chain.
This provides an important justification for the popularity of wholesale price contracts besides their
simplicities and lower administration costs. Finally, we discuss possible extensions to the model by
considering different types of objectives for different agents.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Coordination of a Supply Chain with Satisficing Objectives Using Contracts

intRoDUction With the increasingly popular use of electronic


commerce, suppliers and retailers are increasingly
The decentralized supply chain has been a major engaged in short-term relationships. For example, in
research issue in supply chain management. In par- addition to their traditional long-term procurement
ticular, an important research stream has focused contracts, more and more companies have gone
on the supply chain coordination with contracts. to spot markets for procurement and/or disposal
Without coordination, each agent in a decentralized of excess inventory (Johnson & Klassen, 2005).
supply chain tends to make decisions for his own Therefore, it is fair to say that agents in supply chains
objective instead of the interest of the whole chain. are increasingly risk-averse, instead of risk-neutral
To improve the overall performance of the chain, it and adopting the objective of expected profit maxi-
is necessary to have some mechanism so that each mization, which is more appropriate for long-term
agents interest is aligned with the interest of the relationship. To operationalize risk-aversion, an
whole chain. Such an alignment could be achieved important approach is the mean-variance analysis
through appropriately designed contracts, which (Markowitz, 1959). This approach works the best
provide incentives for the agents in the chain to when the random variable under consideration is
coordinate through profit allocation and sharing. close to being symmetrically distributed, which,
Much of the research has assumed that each agent however, may not be the case for many inventory
in a supply chain is risk-neutral and his objective is and supply chain management problems. Without
to maximize (minimize) the expected profit (cost). a relatively symmetrical distribution, it is better
Under this assumption, a supply chain is said to to operationalize risk-aversion using different
be coordinated when the summation of individual measures of downside risk. These measures in-
expected profits (costs) are maximized (minimized). clude semi-variance and critical probability. With
A number of contractual forms have been studied semi-variance, one is concerned with the volatil-
recently under the risk-neutral assumption. These ity of the outcomes below the mean. With critical
include the three popular contracts: wholesale price probability, one is concerned with the probability
(WP) contracts (Lariviere & Porteus, 2001; Corbett of the outcomes in some critical region. In this
et al., 2004), buy back (BB) contracts (Pasternack, chapter, we choose to operationalize risk-aver-
1985), and quantity flexibility (QF) contracts (Tsay, sion as the critical probability of achieving some
1999; Cachon, 2003). predetermined target profit.
With a WP contract, the supplier charges a Setting performance targets and managing to
constant unit wholesale price to the retailer. With achieve them is fundamental to business success.
a BB contract, the supplier charges a constant unit Targets provide explicit directions to an organiza-
wholesale price, but offers the retailer a partial tion and motivate management to strive for even
refund for all of the unsold units. With a QF con- higher levels of performance. However, target
tract, the supplier charges the retailer a constant setting is both an art and a science. Too high
unit wholesale price, but offers the retailer the a target will provoke frustration and cynicism,
flexibility of adjusting the initial order quantity whereas too low a target will engender apathy
without any penalty. For the one-period setting and risk the organizations survival. Different
where a risk-neutral supplier sells to a risk-neutral methods of target setting have been practiced by
retailer, it has been show that BB and QF contracts many decision makers. In the approximate order of
are capable of supply chain coordinating. However, most to least used, they include plucking it out of
it is well known that WP contracts are incapable of thin air, a percentage improvement on last period,
coordinating the channel due to the phenomena of and benchmarking (Barr, 2003). For example, Jack
double marginalization (Spengler, 1950). Welch describes the setting of stretch targets as


Coordination of a Supply Chain with Satisficing Objectives Using Contracts

one of General Electrics three main operating to non-zero shortage cost. Lau and Lau (1988)
principles (McTaggart & Gillis, 1998). Lovell et further extend the results to a newsvendor with
al. (1997) evaluate the target-setting procedure two products. A special case when the demand
employed by a large financial institution, whose is exponentially distributed is studied by Li, Lau,
management annually sets performance targets for and Lau (1991). More recently, Parlar and Weng
each of its branch offices based on local, regional, (2003) study the problem of balancing two desir-
and national economic conditions. able but conflicting objectives: maximizing the
The satisficing objective to maximize expected profit and maximizing the probability
the probability of exceeding a target level of of achieving the expected profit. Finally, Brown
performancehas been commonly used in and Tang (2004) identify specific performance
business practice. In one of the earliest studies metrics, including the satisficing objective, for the
examining the objectives of managers, Lanzil- newsvendor problem and analyze their impacts
lotti (1958) interviews the officials of 20 large on the order quantity.
companies (including General Electric, General To the best of our knowledge, there have been
Foods, and Goodyear) and verifies empirically few studies that deal with supply chain coordina-
that the most typical goal cited by the managers tion where all agents involved adopt the satisfic-
was a target return on investment. Simon (1959) ing objectives. This chapter attempts to fill this
summarizes the five most important attacks on gap. The contractual forms we consider include
the crucial assumption of profit maximization WP, BB, and QF contracts. We focus these three
in the theory of the firm. One of them is due to contractual forms for three reasons. Firstly, they
the fact that maximizing profit is an ambiguous are popular contracts in business practice (Tayur,
goal when there is imperfect competition among Ganeshan, & Magazine, 1999). Secondly, they
firms, for what action is optimal for one firm have been extensively studied in the supply chain
depends on the actions of the other firms. Simon literature, mostly in the framework of expected
then argues that most firms goals are to attain profit maximization (Cachon, 2003). Thirdly, WP,
a certain level or rate of profit, a certain share BB, and QF contracts have one, two, and three
of the market, or a certain level of sales. Brown contract parameters, respectively. Hence, our
and Tang (2004) survey 250 MBA students and 6 research will answer the question if increased
professional buyers and find that meeting a profit degrees of freedom in contractual forms will be
target is considered as one of the most important beneficial to coordination of supply chains with
performance metrics. In reality, missing a target the satisficing objectives.
often leads to serious consequences. This is When the agents involved in a supply chain
clearly demonstrated by what happened to the adopt the satisficing objectives, it is not obvious as
online auction house eBay in the fourth quarter to what the objective function of the supply chain
of 2004. Its profit of 33 cents a share missed the entity should be. In our research, we adopt the
expectation of 34 cents from Wall Street analysts general definition of supply chain coordination
by just one cent. However, its stock price fell by with contracts proposed by Gan, Sethi, and Yan
12% right after the report. (2004). A supply chain is said to be coordinated
There have been a few studies investigating with a contract if the optimizing actions of the
the newsvendor model with the objective of at- agents under the contract lead to Pareto optimal-
taining a preset target profit. Kabak and Schiff ity, that is, no agent in the chain can be better off
(1978) first study the problem with zero shortage without making any other agent worse off. The
cost. Lau (1980) and Sankarasubramanian and associated contract is said to be a Pareto-optimal
Kumaraswamy (1983) generalize the problem contract. By definition, only Pareto-optimal con-


Coordination of a Supply Chain with Satisficing Objectives Using Contracts

tracts should be selected. This is due to the fact Newsvendor with the Satisficing
that if a contract is not Pareto optimal, it is open objective
to counteroffers that make no one worse off and
at least one of the other agents strictly better off. In this section, we briefly review and extend
In another word, Pareto-optimal contracts are the results for the newsvendor model under the
self-enforcing. Furthermore, a contract has to be satisficing objective. The purpose is to provide a
Pareto optimal first to coordinate a supply chain. basis for the subsequent analysis.
There have been limited studies on supply chain Consider a standard newsvendor with a
contracts utilizing Pareto optimality criterion. procurement cost c and sell to his customers
Cachon (2004) considers the Pareto-optimal at a fixed unit price r. The customer demand D
push (same as WP), pull, and advance-purchase follows a probability density function (PDF) f()
discount contracts in the traditional framework of and a cumulative density function (CDF)F(). The
expected profit maximization. However, the satis- newsvendor has only one order opportunity and
ficing objective is not considered in his paper. determines his order quantity before the actual
In this chapter, we will restrict ourselves to demand is realized. If the newsvendor under-
the feasible Pareto-optimal contracts. A contract orders, he will suffer lost sales. For simplicity,
is feasible when it satisfies the participation con- we assume zero shortage cost throughout the
straint (PC) of each agent. There are various forms chapter. If he over-orders, he will dispose the
of PC. For example, an agent may enter a contract unsold inventory at salvage price v, which leads
only if he will get his reservation profit level. In to a loss as well. Moreover, the newsvendor has
this chapter, we operationalize PC in terms of a preset target profit of t, and his objective is to
probability of achieving a target profit: the prob- choose an order quantity q to maximize the prob-
ability must be larger than a threshold for each ability of achieving the target: to maximize P (q)
agent. For simplicity, the threshold probability is = P { (q) t}.
assumed to be zerothat is, each agent will enter The random profit of the newsvendor for a
a contract only if his target is attainable. Under given order quantity q is given by:
this assumption, each agent then tries to maximize
the probability of attaining that target. (q) = (r c) q (r v) (q D)+
In the reminder of this chapter, we first briefly
(r v) D (c v)q if D < q
review the standard newsvendor model with the = (1)
satisficing objective. We then design Pareto- ( r c ) q if D < q
optimal WP, BB, and QF contracts for a supply
chain where all agents adopt satisficing objectives. which is shown in Figure 1.
These Pareto-optimal contracts are then evaluated
based on whether they can coordinate the supply
Figure 1. The profit function of a newsvendor for
chain or not. We then proceed to discuss possible
a given order quantity q
extensions to the model by considering different
(q)
objectives for different agents. Finally we sum-
(r c)q
marize the results obtained in this chapter.

q D
(c v ) q


Coordination of a Supply Chain with Satisficing Objectives Using Contracts

In view of Figure 1, the probability of achieving Design of Pareto-optimal contracts


the target profit t for the newsvendor is given by: under the Satisficing Objectives

t In this section, we consider a supply chain where


0 if q a supplier sells to a retailer facing a random
r c
P(q) = (2) demand from customers. The target profit levels
1 Ff (c v)q + t if q t for the supplier and the retailer are set externally

r v r c
at ts and tr, respectively. The retail price is fixed
at r. The supplier procures or produces the good
Clearly the participation constraint (PC) for at a constant marginal cost c. Any unsold unit
the newsvendor is q t / (r c). Once the PC is in the supply chain can be salvaged at a price v
satisfied, P(q) decreases in q. Therefore, under per unit. It is assumed v < c < r to avoid trivial
the satisficing objective, the optimal order quan- situations.
tity and the associated maximal probability are The business transaction and profit allocation
given by q* = t/ (r c) and P* = 1 F (t/(r c)), between the agents are determined by a contract,
respectively. which in turn is specified by its parameter set .
Notice that the optimal order quantity takes a The contractual forms we consider include WP,
surprising simple form and is independent of the BB, and QF contracts.
demand distribution. Further, with the optimal Both the supplier and the retailer in the supply
order quantity q*, the newsvendors maximal chain adopt satisficing objectives. The supplier
possible profit is the preset target profit t, which wants to maximize the probability of achieving the
occurs only when the realized demand D is larger predetermined target profit ts, to maximize Ps(q,
than the optimal order quantity. ) = P{ s(q, ) ts}. Similarly, the objective of
It is interesting to compare the optimal quan- the retailer is to maximize Ps(q, ) = P{r (q, )
tity q*above with the optimal quantity qe*= F-1((r tr} . We assume that the target profits ts and tr,
c) / (r v)) that maximizes the expected profit. once endogenously determined, become common
If the newsvendor orders q*, his expected profit knowledge. For convenience, let = ts / tr denote
is given by: the target ratio. A larger thus indicates a higher
q*
relative target profit level of the supplier.
E (D, q*) = t
0
F ( x)dx . In the next three subsections, we design the
Pareto-optimal contractsthat is, the Pareto-
Interestingly, although the probability of achiev- optimal contract parametersfor each contrac-
ing t is maximized, the associated expected tual form. Moreover, we identify the associated
profit will be less than t. On the other hand, if Pareto-optimal order quantity and the maximal
the newsvendor sets the target profit at t = E probabilities of achieving the target profits for the
(D,qe*), the associated optimal order quantity to supplier and the retailer.
maximize the probability of achieving the target
is given by: Design of Pareto-Optimal WP Contracts
qe*
q* = qe* (rv) / (rc) 0
F ( x)dx < qe* . In this subsection, we consider WP contracts.
With a WP contract, the supplier charges a per
This is consistent with the finding that a risk-averse unit wholesale price w to the retailer. Hence, a
newsvendor tends to order less in comparison WP contract is characterized by its parameter
with a risk-neutral newsvendor. set = w.


Coordination of a Supply Chain with Satisficing Objectives Using Contracts

Figure 2. The probabilities of achieving the target tr + t s


profits for the supplier (bold line) and the retailer q* = (4)
r c
under a WP contract with w
t +t
Ps* = 1 and Pr* = 1 F r s (5)
Ps ( q,
q) r c
1
t
1 F r
r w Pr ( q,
q) Proof
It can be seen from Figure 2 that, given a WP con-
o o
tract with parameter set = w, the unique feasible
ts tr q Pareto-optimal order quantity is given by:
wc r w

ts t
Under a WP contract with parameter set , the q* ( ) = max{ , r } (6)
wc r w
suppliers profit s(q,) = (w c)q is deterministic.
Hence, the suppliers participation constraint (PC)
is q ts/(w c) for a given target profit ts. Once The corresponding probabilities of achieving
the PC is satisfied, the suppliers probability of the target profits for the supplier and the retailer
achieving his target is always 1. are, respectively:
The retailer is a newsvendor with procurement ( w v)q* ( ) = tr
cost w. Therefore, the PC for the retailer is q Ps (q* ( )) = 1 and Pr (q * ( )) = 1 F (7)
r v
t r /(r w) and the probability of achieving her
target is given by:
Since Ps(q*())= 1, for WP contracts to be
Pareto optimal, it suffices to maximize Pr(q*()),
t or equivalently, to minimize:
0 < r
if q
rw
Pr (q, ) = (3)
1 F ( w v)q + tr iif q tr
r v rw
t t
( w v) max s , r (8)
w c r w
Figure 2 shows the probabilities of achieving
their target profits for the supplier and the retailer Note that (8) first decreases and then increases
when tr / (r w) ts / (w c), i.e., w (c + r) / (1 with respect to w, and the minimum is attained
+ ) = . The figure corresponding to the case when ts /(w c) = tr /(rw), that is, w = . Hence,
of w > is similar. Note that the wholesale price a WP contract is Pareto optimal if the wholesale
is a linear combination of procurement cost c price w = . Equations (4) and (5) are obtained
and selling price r, with 1 and the target ratio by substituting w = into (6) and (7).
as the weights, respectively.
Example
Theorem 1 Consider a toy supply chain with a manufacturer
A WP contract is Pareto optimal if the wholesale (the supplier) and a retailer who faces a Normal
price w = . The associated Pareto-optimal order demand with mean of 300 units and standard
quantity and maximal probabilities of achieving deviation of 70 units. There is only one selling
the targets are given by: season for this particular type of toy. Due to the


Coordination of a Supply Chain with Satisficing Objectives Using Contracts

long lead time, the retails have to commit an It can be seen from Table 1 that the retailers
order quantity before the selling season so that probability of achieving her profit target is quite
the manufacturer can plan the manufacturing ac- sensitive near the Pareto-optimal wholesale price
cordingly. The manufacturer produces the toys at . As the wholesale price decreases from 22 to
a unit cost c = $18 and the retailer sells at a unit 21 (4.5%), Pr*(w) decreases from 0.92 to 0.80
price r = $25. Any unsold toy has a unit salvage (13%). As the wholesale price increases from 22
cost of v = $8. The target profits for the manu- to 23 (4.5%), Pr*(w) decreases from 0.92 to 0.50
facturer and the retailer are set at ts = $800 and (45.7%).
tr = $600, respectively. If the profit allocation is The probabilities for the supplier and the
implemented through a WP contract, what would retailer to achieve their respective target profits
be the Pareto-optimal contract parameter w and depend on not only the wholesale price but also
how sensitive is it? the retailers order quantity q. This is demonstrated
The answer to the above example is sum- by Table 2. The first and the second values in each
marized in Table 1. Under a WP contract with cell, if not infeasible, represent the probabilities
a wholesale price w, q*(w) and Pr*(w) denote, of achieving target profits for the supplier and the
respectively, the associated Pareto-optimal order retailer, respectively. Any combination is infea-
quantity and the retailers maximal probability of sible if at least one of the PCs is not satisfied.
achieving her profit target. The Pareto-optimal In Table 2, q* is the corresponding Pareto-
wholesale price is given by = 22. Note that optimal order quantity for the satisficing objec-
under a feasible WP contract with a wholesale tives, and qe* is the optimal order quantity for
price w, the suppliers profit is deterministic and the objective of expected profit maximization.
Ps*(w) = 1 always holds. Notice that the performance of the supply chain

Table 1. The associated Pareto-optimal order quantity and the retailers maximal probability of achiev-
ing her target profit under a WP contract with wholesale price w

w 21 21.6 21.8 =22 22.2 22.4 23


q (w)
*
267 222 211 200 214 231 300
Pr (w)
*
0.81 0.89 0.91 0.92 0.89 0.84 0.50

Table 2. The probabilities of achieving the target profits for the supplier and the retailer with different
combinations of wholesale price and order quantity under WP contracts

w
21 21.6 21.8 = 22 22.2 22.4 23
q

170 Infeasible Infeasible Infeasible Infeasible Infeasible Infeasible Infeasible


200 (q )*
Infeasible Infeasible Infeasible (1,0.92) Infeasible Infeasible Infeasible
230 Infeasible (1,0.88) (1,0.87) (1,0.86) (1,0.85) Infeasible Infeasible
284 (qe )
*
(1,0.75) (1,0.70) (1,0.69) (1,0.67) (1,0.65) (1,0.63) Infeasible


Coordination of a Supply Chain with Satisficing Objectives Using Contracts

under the satisficing objectives is very sensitive Now we consider the retailer. The retailer is
to the choice of both w and q. Even though most a newsvendor with a procurement cost of w and
combinations of w and q we choose are close to a salvage price of b . In view of equation (2),
the optimal one ( = 22, q* = 200), more than half the retailers probability of achieving her target
of the combinations are infeasible. tr is given by:

Design of Pareto-Optimal BB Contracts


if q <
tr
0 r w (11)
Pr (q, ) =
With WP contracts, the supplier takes no risk from 1 F ( w b)q + tr if q tr

the demand uncertainty. With BB contracts, the r b rw
supplier charges a unit wholesale price w, but offers
the retailer a unit buy back price b for all of the Hence, the PC for the retailer is q ts /(wc).
unsold units. Therefore, with BB contracts, the The probability functions Ps (q,) and Pr (q,)
supplier takes part of the risk from demand uncer- when w < are plotted in Figure 3.
tainty. Each BB contract can be characterized by
a parameter set = [w, b]. To avoid uninteresting Theorem 2
scenarios, we assume that v b w. The three sets of BB contracts summarized in
We will study the supplier first. Under a BB Table 3 are Pareto optimal. The second column of
contract with parameter set = [w, b], if the the table identifies the conditions for the contract
retailer orders q products, the suppliers profit parameter set = [w,b] to be Pareto optimal.
is given by: The associated Pareto-optimal order quantity
and maximal probabilities of achieving the target
s (q, ) = (w c)q (b v)(q D)+ (9) profits for the supplier and retailer are given by
q*(), Ps(), and Pr (), respectively.
It is worthwhile noticing that the contract
parameters (w,b) need to be chosen such that Proof
w(cv) b w. The requirement of the second We first examine the BB contracts with wholesale
inequality is to prevent the retailer from profiting price w = . In this case, the PCs for both the
through the buy back process. Similarly, since the supplier and the retailer reduce to q (tr + ts) / (r
suppliers marginal revenue and the marginal cost c). Since both Ps(q,,b) and Pr(q,,b) decrease
are w b and c v, respectively, the first inequal-
ity prevents the supplier from profiting through
the buy back process.
It follows that the suppliers probability of Figure 3. The probabilities for the supplier (bold
achieving his target profit ts is given by: line) and the retailer to achieve their target profits
under a BB contract with w <
ts
0 if q <
wc t
Ps (q, ) =
ts
(10) 1 F s
1 Ff (b + c w v)q + t if q wc

bv wc
t Ps (q,
q)
1 F r
Therefore, the PC for the supplier is q ts r w
Pr (q,
q)
/(w c), which only depends on the wholesale
price w. o
tr ts
o
q
r w wc


Coordination of a Supply Chain with Satisficing Objectives Using Contracts

in q, the Pareto-optimal order quantity is q*(,


tr
b) = (tr + ts) / (r c). As a result, the associated Pr(q*()) = 1 F (15)
r w
maximal probabilities for both the supplier and
the retailer are given by Ps* (, b) = Pr* (, b) =
1 F((tr + ts)/(r c)). This case corresponds to Since Ps(q*()) increases in w but Pr(q*())
Pareto-optimal set BB1 in Table 3. decreases in w, any w < is Pareto optimal. This
Next we consider the BB contracts with case corresponds to the Pareto-optimal set BB2
wholesale price w < . Based on Figure 3, it is in Table 3.
clear that q* () = ts /(w c) is the unique feasible The results for the case of w > , correspond-
Pareto-optimal order quantity. The associated ing to set BB3 in Table 3, can be proven similarly.
probability functions of achieving the suppliers Finally, one can verify that the three parameter
and the retailers profit targets are, respectively: sets identified in Table 3 are all Pareto optimal
since the resulting maximal probabilities Ps()
t
Ps(q*())=1 F s (12) and Pr() do not dominate each other.
wc Notice that wholesale price w in a BB contract
plays an important role for the contract to be
Pareto optimal. When c < w < , the buy back
( w b)ts + ( w c)tr
Pr(q*())=1 F (13) price b needs to be at its upper bound w in order
( w c)(r b) for the BB contract to be Pareto optimal. On the
other hand, when < w < r, the buy back price b
Simple calculation shows that: needs to be at its lower bound w (c v) in order
Pr (q * ( )) ( w b)ts + ( w c)tr ( w c)tr = (r w)ts
for the BB contract to be Pareto optimal. When w
=f >0 = , the BB contract is Pareto optimal regardless
b ( w c )( r b ) ( w c )( r b) 2
(14) of the buy back price b, as long as the general
requirement of w (c v) b w holds.
Hence, the Pareto-optimal buy back price
satisfies b = w. The retailers probability then
reduces to:

Table 3. Pareto-optimal BB contracts for the supply chain with the satisficing objectives

Sets = [w,b] q*() Ps() Pr()

tr + t s t +t t +t
BB1 w= 1 F r s 1 F r s
r c r c r c

ts
BB2 c < w < , b = w
wc
t t
1 F s 1 F r
tr wc r w
BB3 <w<r, b= w (c v)
rw

0
Coordination of a Supply Chain with Satisficing Objectives Using Contracts

Design of Pareto-Optimal QF Contracts order quantities depend on the parameter set


except that inequalities q1() q3() and q2()
With a QF contract, the supplier charges the re- q4() hold under all situations.
tailer a constant unit wholesale price w but offers Under a QF contract with parameter set =
the retailer the flexibility of adjusting the initial [w,u,d], if the retailer places an initial order quan-
order quantity. Suppose the retailer places an tity of q, her random profit is given by:
initial order quantity of q. Depending on demand
from customers, the retailer can adjust the initial r(q,)=(r w)uq(r w)(uq D)+(wv)(dq D)+
quantity q to be anywhere within [dq, uq] without (19)
extra financial charge, where 0 d l and u 1
represent the downward and upward adjustment It can be verified that the probability func-
parameters, respectively. Therefore, the retailers tion for the retailer to achieve her target profit tr
actual order quantity will be dq, D, and uq if the is given by:
realized demand is D dq, dq D uq, and D
uq, respectively. The supplier is responsible to
0 if q < q2 ( )
supply up to quantity uq for the supply chain.
Each QF contract can be characterized by its tr
Pr (q, ) = 1 F if q4 ( ) > q > q2 ( )
parameter set = [w, u, d]. For convenience, let r w
t + ( w v)dq
= d / u denote the adjustment ratio. Since the 1 F r if q q4 ( )
r v
stocking level in the channel will be uq, 0
1 represents the fraction for which the retailer (20)
is responsible. In addition, a higher indicates
less flexibility for the retailer. A QF contract Clearly, the maximal probability for the retailer
degenerates into a WP contract if = 1, that is, to achieve her target is 1 F(tr/(r w)), which is
u = d = 1. always less than 1.
For notational simplicity, we define two Now we consider the supplier. The profit func-
wholesale prices and four order quantities: tion of the supplier, given the retailers initial order
quantity q, is given as:
c + r v+ r + c v
w1 = , w2 = (16) s(q, ) = (w c)uq (w v)(ug D)++(w v)(dq D)+
1+ (1 + )
(21)
ts tr
q1 ( ) = , q2 ( ) = (17) Hence, the suppliers minimum profit is (w v)dq
u ( w c) u (r w)
(c v)uq, which occurs when D dq. It turns
out that the suppliers probability of achieving
ts tr his target depends on if his minimum profit is
q3 ( ) = , q4 ( ) =
d ( w v ) u (c v ) d (r w) positive or not. If the contract parameter set is
(18) chosen such that w v + (c v)/a, the minimum
profit is non-positive. The suppliers probability
It can be easily verified that c < w1 w2 of achieving his target profit ts is given as:
and w1 = w2 = when = 1. Note that w1 and w2 0 if q < q1 ( )
defined in (16) are not actual wholesale prices; they
Pr (q, ) = ts + (c v)uq
are actually equation constraints for the parameter 1 F if q q1 ( )
set . Finally, the relative magnitudes of the four wv
(22)


Coordination of a Supply Chain with Satisficing Objectives Using Contracts

which is always less than 1. On the other hand, if to be 1. This means a QF contract will be Pareto
the contract parameter set is chosen such that optimal if it degenerates into a WP contract with
w > v + (c v)/, the minimum profit is positive. wholesale price w = . Second, the Pareto-optimal
The suppliers probability function of achieving QF contracts depend on the downward and upward
his target profit ts is then given as: adjustment parameters only through the adjust-
ment ratio . However, the associated Pareto order
quantity may depend on the upward adjustment
0 if q < q1 ( )
parameter only, which is the case for the Pareto
t + ( c v )uq set QF1. Finally, the Pareto-optimal QF contracts
Pr (q, ) = 1 F s if q3 ( ) > q q1 ( )
w v depend on the suppliers and the retailers target
1 if q q3 ( ) profits only through the target ratio .
(23)
Example
Therefore, if w > v+ (cv)/a, the suppliers Consider a supply chain with a supplier and a
probability of achieving his target can be as retailer who faces a Gamma demand with mean
high as 1. 400 and coefficient of variation 0.5. The supplier
Now we proceed to design Pareto-optimal QF procures the good at a unit cost c = 15 and the
contracts for the supply chain under the satisfic- retailer sells at a unit price r = 20. Any unsold
ing objectives. For the clarity of exposition, we unit has a salvage cost v = 8. The terms of trade
first summarize our results on Pareto-optimal QF between the supplier and the retailer are speci-
contracts in Table 4 (see the Appendix for a deri- fied by a QF contract. Both the supplier and the
vation). The second column of the table identifies retailer adopt the satisficing objective. The target
the conditions for the contract parameter set to profits for the supplier and the retailer are set at
be Pareto optimal. The associated Pareto-opti- ts = 1200 and tr = 800, respectively.
mal order quantity and maximal probabilities of What are the pareto-optimal QF contracts?
achieving their target profits are given by q*(), Figure 4 illustrates the Pareto optimality. The
Ps() and Pr(), respectively. region bounded by the solid line and the dotted
So far we have derived the Pareto-optimal line represents the Pareto-optimal QF contracts
QF contracts, for which we have the following under the satisficing objectives. We use the dotted
observations. First, for a QF contract to be Pareto line to emphasize the fact that the dotted line is
optimal, its contract parameters must satisfy w1 excluded from the region.
w . When w = , the adjustment ratio has

Table 4. Pareto-optimal QF contracts for the supply chain with the satisficing objectives

Sets = [w, u, d] or [w, ] q*() Ps () Pr ()

c + r
w<
c + r ts t t
QF1 1 F s 1 F r
1+ 1+ u ( w c) wc r w

c + r tr + t s t +t
QF2 w= , = 1 1 1 F r s
1+ r c r c


Coordination of a Supply Chain with Satisficing Objectives Using Contracts

Figure 4. The Pareto-optimal QF contracts for the supply chain with the satisficing objectives (the region
bounded by the dotted line and the solid line)
20 -

19.5 -

19 -

18.5 -

18 -
Wholesale price

17.5 -

17 -

16.5 -

16 -

15.5 -

15 -
-

-
-

-
-

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1


The Adjustment Ratio alpha

Coordination of the Supply Chain with the Theorem 3


Satisficing Objectives Let ts and tr be the profit targets for the supplier
So far we have designed the Pareto-optimal con- and the retailer, respectively. If both of them
tracts for the three contractual forms under the adopt the satisficing objective, the supply chain
satisficing objectives. In this section, our goal is is coordinated if and only if:
to identify the contractual forms that are capable (1) The retailer chooses the optimal order
of coordination of the supply chain with satisfic- quantity q*=(tr + ts)/(r c), which is the solution
ing objectives. to the chain optimization problem: max P{(q)ts
To this end, we adopt the general definition of + tr}, where (q)= s (q,) + r(q,) is the total
supply chain coordination with contracts proposed profit of the supply chain.
by Gan et al. (2004). A supply chain is said to (2) The supplier and the retailer follow the
be coordinated with a contract if the optimizing optimal profit allocation rule *=[*s, *r], where
actions of the agents under the contract lead to *s and *r are profits allocated to the supplier
Pareto optimality, that is, no agent in the chain and the retailer, respectively: For any demand
can be better off without making any other agent realization (q*), set *s ts and r tr if (q*)
worse off. We have the following theorem (see the ts + tr; Otherwise, set either *s= ts and *r =
Appendix for proof) on supply chain coordination (q*) ts, or *r= tr and *s= (q*) tr.
with contracts under the satisficing objectives.


Coordination of a Supply Chain with Satisficing Objectives Using Contracts

Based on Theorem 3, the coordinating contract such a supply chain, it has to degenerate into a
for the supply chain with the satisficing objectives WP contract.
has a very simple structure. First, the retailers order It is also worthwhile noticing the interesting
quantity needs to be chosen so that the probability wholesale price , for which we have the follow-
for the whole chain to achieve the chain profit target ing observations. First, it is a linear combination
ts+ tr is maximized. Second, the supply chains of procurement cost c and selling price r, with
profit should be allocated such that at least one 1 and the target ratio as the weights, respec-
of the agents (either the supplier or the retailer), tively. Second, for a WP contract to coordinate
and both agents whenever possible, achieve their the supply chain, its wholesale price has to be .
profit targets. The resulting probability pair for the Third, by setting the wholesale price to , a BB
supplier and the retailer is either [1, 1F((tr + ts)/(r contract will be Pareto optimal regardless of the
c))] or [1F ((tr + ts)/(r c)), 1]. buy back price b. Finally, for a QF to coordinate
Obviously the Pareto-optimal WP contract (see the supply chain, it has to degenerate into a WP
Theorem 1) can coordinate the supply chain with contract with wholesale price .
satisficing objectives, which results in the prob- However, the resulting probability pair of the
ability pair [1, 1F((tr + ts)/(r c))]. However, the coordinating WP and QF contracts is [1, 1F ((tr
Pareto-optimal BB contracts (see Table 3) cannot + ts)/(r c))]. This is equivalent to saying that the
coordinate the supply chain with satisficing objec- supplier gets his target profit and the retailer gets
tives. This is because all three resulted probability the rest. There is another type of Pareto-optimal
pairs are dominated by either [1, 1F((tr +ts)/(rc))] profit allocation where the retailer gets her target
or [1F((tr + ts)/(r c)), 1]. As for Pareto-optimal profit of tr and the supplier gets the restthat is,
QF contracts (see Table 4), the probability pair the resulting probability pair will be [1F ((tr +
from set QF1 is dominated by [1 F((tr + ts)/(r c)), ts)/(r c)),1]. This can be implemented through
1]. Therefore, the Pareto-optimal QF contracts in simple slotting fee contracts (Lariviere & Pad-
set QF1 cannot coordinate such a supply chain. manabhan, 1997), in which the retailer receives
However, the Pareto-optimal QF contract in set a fixed slotting fee and the supplier gets the rest
QF2, which is a WP contract with wholesale price of the profit (or loss). By setting the slotting fee
, coordinates the supply chain. Hence, for a QF equal to the retailers profit target tr, the slotting
contract to coordinate the supply chain under the fee contract is Pareto optimal and coordinates the
satisficing objective, it has to degenerate into a supply chain with the satisficing objectives.
WP contract.
The results above provide an important ad- Coordination of the Supply Chain with
ditional justification for the popularity of WP Different Objectives
contracts besides their simplicities and lower Our work so far assumes that both the supplier
administration costs. Recall that WP, BB, and and the retailer in the supply chain adopt the
QF contracts have one, two, and three contractual satisficing objectives. However, there are other
parameters, respectively. Intuitively, more con- types of objectives for managers and/or companies
tractual parameters mean more design freedom, in business practice. These objectives include
which is indeed the case for the supply chain expected profit maximization (EPM), expected
with the objective of expected profit maximiza- utility maximization, and expected profit maximi-
tion (Cachon, 2003). However, we show that WP zation subject to downside-risk constraint (Gan et
contracts are better BB contracts when it comes al., 2005). If this is the case, how could we design
to coordination of the supply chain with the satis- Pareto-optimal and/or coordinating contracts for
ficing objectives. For a QF contract to coordinate such a supply chain?


Coordination of a Supply Chain with Satisficing Objectives Using Contracts

For the purpose of illustration, we consider the E r ts (r v)ts z (r c)( w c)


same decentralized supply chain as the one in the = (26)
w z ( w c )3
previous sections. The terms of trade between the
two agents are specified by a simple WP contract.
For simplicity, we assume the demand follows a which increases first and then decreases with
uniform distribution on [0, z]. If the supply chain regard to w. By setting (26) equal to 0, we obtain
is centralized and both agents adopt the EPM ob- the Pareto-optimal wholesale price:
jective, it can be verified that the Pareto-optimal
order quantity is given by qe*= F-1((rc)/(rv))=
ts (r v)
(rc)z/(rv) and the maximal expected profit is w* = c + (27)
given by: z (r c)

which maximizes Er(q*). It can be verified that


z (r c) 2
o
=
2(r v)
(24) w* lies in the interval of [c + (r c) / 4, r], and
hence is economically sensible. Furthermore,
the Pareto-optimal order quantity becomes q* =
Now we consider the supply chain where the (rc)z/(rv), which is independent of ts. It is also
retailer adopts the EPM objective while the sup- interesting to note that q* = qe*, which is Pareto
plier still adopts the satisficing objective. How optimal for the supply chain where both agents
does one design the Pareto-optimal WP contract adopt the EPM objective.
for such a supply chain? Of course, the results we obtained above are
Given a WP contract with wholesale price unlikely to hold for more general cases. It would
w, the retailer will order qr =F-1((rw)/(rv)) to be interesting to design Pareto-optimal and/or
maximize her expected profit. For the supplier, coordinating contracts for the supply chain where
his PC is qsts/(wc)=qs given his target profit different agents adopt other different objectives,
level ts. Once the PC is satisfied, the probability to and/or some agent adopts multiple objectives.
achieve his target profit will always be 1, and thus
is maximized. Here we also assume o/2 ts 2
o. Note that setting his target profit to at least half concLUSion
of o indicates the supplier has relatively larger
bargaining power. In addition, it is reasonable to Setting performance targets and managing to
set his target profit no more than twice o. achieve them is fundamental to business success.
Therefore, the Pareto-optimal order quantity As a result, it is common for managers to adopt
for the supply chain is q* =max (qr,qs). The asso- a satisficing objective, that is, to maximize the
ciated probability for the supplier to achieve his probability of achieving some preset target profit
target is 1, and the associated expected profit of level. This is especially true when companies are
the retailer is given as: increasingly engaged in short-term relationships
enabled by electronic commerce. However, there
q* has been little research in supply chain literature
E r (q
*
) = (r w)q* (r v)
0
F ( x)dx (25) with such a satisficing objective. We attempt to fill
the gap in this chapter. The supply chain consists
Under the assumption of o/2 ts 2 o, it of a supplier and a retailer, selling a short lifecycle
can be verified that q* = ts / (wc) and: goods/service to the customer. Furthermore, the


Coordination of a Supply Chain with Satisficing Objectives Using Contracts

profit allocation between the two agents could can coordinate the supply chain and should be
be implemented by one of the three contractual adopted. Furthermore, a QF contract has to de-
forms, namely, WP, BB, and QF contracts. generate into a WP contract to coordinate such
For each contractual form, we first design a supply chain. Since the satisficing objective is
the Pareto-optimal contracts. By definition, only quite realistic and popular in business practice,
Pareto-optimal contracts should be selected in we provide another important justification of the
practice, no matter what the negotiation process and wide use of WP contracts besides the simplicities
negotiation powers among the agents. This is due and lower administration costs.
to the fact that if a contract is not Pareto optimal, it
is open to a counteroffer that makes no one worse
off and at least one of the other agents strictly bet- AcKnoWLeDgMent
ter off. Furthermore, a contract has to be Pareto
optimal first to coordinate a supply chain. Bintong Chens research was partially supported
Next, we identify the contractual forms that by the National Natural Science Foundation of
are capable of supply chain coordination. It is China, Grant No. 70640420143.
shown that WP contracts can coordinate the supply
chain with the satisficing objective, whereas BB
contracts cannot. Furthermore, QF contracts have ReFeRenceS
to degenerate into WP contracts to coordinate a
supply chain with satisficing objectives. Brown, A., & Tang, C.S. (2004). The impact of al-
We then proceed to discuss the possible ternative performance measures on single-period
extension to the model by considering different inventory policy. working paper, UCLA, USA.
objectives for different agents, and/or some agent
Barr, S. (2003). Target setting: Art or science?
may adopt multiple objectives simultaneously. For
Or both? Mezhermnt, 4, 1-5.
the purpose of illustration, we design the Pareto-
optimal WP contract for the supply chain where Cachon, G. (2003). Supply chain coordination with
the supplier adopts the satisficing objective and contracts. In A.G. de Kok & S.C. Graves (Eds.),
the retailer adopts the objective of expected profit Supply chain management: Design, coordination
maximization. and operation. Elsevier.
It is worthwhile noticing that the results we
Cachon, G. (2004). The allocation of inventory
obtained in this chapter are contrary to those
risk in a supply chain: Push, pull, and advance-
obtained for supply chain coordination with the
purchase discount contracts. Management Sci-
objective of expected profit (cost) maximiza-
ence, 50, 222-238.
tion (minimization). Under such an objective,
BB and QF contracts can coordinate the supply Gan, X., Sethi, S., & Yan, H. (2004). Coordina-
chain, whereas WP contracts cannot. As a re- tion of a supply chain with risk-averse agents.
sult, advanced contracts, such as the BB and QF Production and Operations Management, 13,
contracts, have been advocated to improve the 135-149.
performance of the supply chain (Tayur et al.,
1999). However, our results indicate that for the Gan, X., Sethi, S., & Yan, H. (2005). Channel
supply chain with the satisficing objectives, the coordination with a risk-neutral supplier and a
simple WP contracts, instead of BB contracts, downside-risk-averse retailer. Production and
Operations Management, 14, 80-89.


Coordination of a Supply Chain with Satisficing Objectives Using Contracts

Kabak, I.W., & Schiff, A.I. (1978). Inventory European Journal of Operational Research, 98,
models and management objectives. Sloan Man- 290-299.
agement Review, 19, 53-59.
McTaggart, J., & Gillis, S. (1998). Setting targets
Johnson, P.F., & Klassen, R.D. (2005). E-procure- to maximize shareholder value. Strategy Leader-
ment. Sloan Management Review, 46, 6-10. ship, 26, 18-21.
Lanzillotti, R.F. (1958). Pricing objectives in Pasternack, B. (1985). Optimal pricing and returns
large companies. American Economics Review, policies for perishable commodities. Marketing
48, 921-940. Science, 4, 166-176.
Lariviere, M., & Padmanabhan, V. (1997). Slot- Sankarasubramanian, E., & Kumaraswamy, S.
ting allowances and new product introductions. (1983). Optimal order quantity for pre-deter-
Marketing Science, 16, 112-128. mined level of profit. Management Science, 29,
512-514.
Lariviere, M., & Porteus, E. (2001). Selling to the
newsvendor: An analysis of price-only contracts. Simon, H.A. (1959). Theories of decision-making
Manufacturing and Service Operations Manage- in economics and behavioral science. American
ment, 3, 293-305. Economics Review, 49, 253-283.
Lau, H. (1980). The newsboy problem under al- Spengler, J. (1950). Vertical integration and an-
ternative optimization objectives. Journal of the titrust policy. Journal of Political Economics,
Operational Research Society, 31, 393-403. 58, 347-352.
Lau, A., & Lau, H. (1988). Maximizing the prob- Tsay, A.A. (1999). The quantity flexibility contract
ability of achieving a target profit level in a two- and supplier-customer incentives. Management
product newsboy problem. Decision Sciences, Science, 45, 1339-1358.
19, 392-408.
Tayur, S., Ganeshan, R., & Magazine, M. (Eds.).
Li, J., Lau, H., & Lau, A. (1991). A two-product (1999). Quantitative models for supply chain
newsboy problem with satisficing objective and management. Boston: Kluwer.
independent exponential demands. IIE Transac-
Van Neumann, J., & Morgenstern, O. (1944).
tion, 23, 29-39.
Theory of games and economic behavior. Princ-
Lovell, C.A.K., & Pastor, J.T. (1997). Target set- eton, NJ: Princeton University Press.
ting: An application to a bank branch network.


Coordination of a Supply Chain with Satisficing Objectives Using Contracts

APPenDix A1. Note that it is also possible that q3() q2()


under Case 1.1.
Derivation of Pareto-optimal QF
contracts It can be seen from Figure A1 that the Pareto-
optimal order quantity set is given by:
To design Pareto-optimal QF contracts, it is
worthwhile noticing that the suppliers probability q*()[max(q2(),q3(),q4()] (A1)
function takes different forms depending on if
the parameter set satisfies inequality w > v + (c The associated probabilities for the supplier
v)/ or not. Hence, we design Pareto-optimal and the retailer are:
QF contracts for Case 1 of w > v + (c v)/ and
Case 2 of w v + (c v)/, respectively. t
d- Ps (q* ( ), ) = 1 and Pr (q* ( ), ) = 1 F r
r w
Case : w > v + (c v) /
(A2)
Under Case 1, the probability function of the sup-
plier to achieve his target profit is given by (23). Obviously Pr(q* (),) decreases with respect to
Furthermore, it can be seen below that Pareto w. Hence we choose w*(u,d)=w2. The associated
optimality depends on the relative magnitudes of retailers probability is:
q1(), q2(), q3(), and q4(). Therefore, we consider (tr + ts )
the following three subcases. Pr (q* ( w2 , u , d ) ) = 1 F
( r v ) (c v )

Case 1.1: w w2 (A3)


Under Case 1.1, we have q1() q3() q4(). The
probability functions Ps (q,) and Pr (q,) for the which is maximized at =1. Note that w2 = when
supplier and the retailer are plotted in Figure =1. Moreover, substituting =1 into (A1) an (A3),
we have the Pareto-optimal set QF2 in Table 4.

Figure A1. The probability functions of achieving their target profits for the supplier (bold line) and the
retailer under Case 1.1


Ps ((q,)
q ,q )
t
1 F s
wc
dts
1 F o
d ( w v ) u (c v )
t Pr ((q,)
q,q )
1 F r
r w

o
q1 (()
q) q2 (()
q) q3 (()
q) q4 (()
q) q


Coordination of a Supply Chain with Satisficing Objectives Using Contracts

Case 1.2: w w1 The associated probabilities for the supplier


Under Case 1.2, we have q2() q4() q1() and the retailer are:
q3(). The probability functions of the supplier
and the retailer are shown in Figure A2. t + ts
Therefore, both q3() and q1() are Pareto-op- Ps (q* ( w1 , u , d ), ) = 1 F r (A6)
timal order quantities. It can be verified that the (r c)
order quantity q3() will eventually lead to the t + ts
Pr (q* ( w1 , u , d ), ) = 1 F r
Pareto-optimal set QF2 in Table 4. On the other r c (A7)
hand, if the retailer orders q1(), the probabilities
for the supplier and the retailer are given by:
Because the two probabilities vary in different
t 1
Ps (q1 ( ), ) = 1 F s and Pr (q1 ( ), ) = 1 F
wv
tr + w c ts
directions as changes, any is Pareto optimal.
wc r v
In summary, the resulting Pareto-optimal set is
(A4) a special case of the Pareto-optimal set QF1 in
Table 4 when w = w1.
Since both Ps(q1(),) and Ps(q1(),) increase
with respect to w, we choose w* (u,d)= w1. The Case 1.3: w1w<w2
associated Pareto-optimal order quantity q1() Under Case 1.3, we have q1() q4() q3(). Once
then becomes: again, it can be verified that both q3() and q1()
are Pareto optimal, and q3() will eventually
dts + utr lead to the Pareto-optimal set QF2 in Table 4.
q* ( w1 , u , d ) = (A5) If the retailer orders q1(), the suppliers prob-
ud (r c)
ability of achieving his target profit Ps(q* (),)
is less than 1, and the retailers probability is

Figure A2. The probabilities of achieving their target profits for the supplier (bold line) and the retailer
under Case 1.2


t
1 F r Ps ((q,)
q ,q )
r w
t
1 F s
wc
dts o
1 F
d ( w v ) u (c v )
Pr ((q,)
q ,q )

o
q2 (()
q ) q4 ()
(q ) q1 ()
(q ) q3 (()
q) q


Coordination of a Supply Chain with Satisficing Objectives Using Contracts

Figure A3. The probabilities of achieving their target profits for the supplier (bold line) and the retailer
under Case 1.3


t
Ps ((q,)
q ,q )
1 F r
Pr ((q,)
q ,q )
r w
t
1 F s
wc
o
dt s
1 F
d ( w v ) u (c v )

o
(q ) q1 ()
q2 () (q ) q ) q3 (()
q4 (() q) q

Pr(q* (),)=1F(tr/(rw)). To make sure that the Case 2: w v + (c v) /


resulting Pareto-optimal set will not be dominated
by set QF2, we need to have: Under Case 2, the probability of the supplier to
achieve his target profit is given by (22), which
is always less than 1. Furthermore, the retailers
t +t
Pr (q1 ( ), ) > 1 F s r (A8) probability will be no larger than 1 F (tr/(r w)).
r c Therefore, to guarantee the resulting Pareto-op-
timal set is not dominated by set QF2 in Table 4,
which is equivalent to w < . Therefore, we only we need to have:
need to consider the case when w1 w < , for
which q2() q1(). The probability functions of
t t +t
the supplier and the retailer are plotted in Figure 1 F r >1 F s r (A10)
A3. r w r c
It can be seen from Figure A3 that the prob-
abilities of the supplier and the retailer associated which is equivalent to w < or q2() q1().
with order quantity q1() are: Now we consider the two subcases as follows.

t t
Pr (q1 ( ), ) = 1 F s and Pr (q1 ( ), ) = 1 F r Case 2.1: w1w<
w c r w
Under Case 2.1, we have q2() q1() q4(). It
(A9) can be verified that the order quantity q1() is Pa-
reto optimal, with the suppliers and the retailers
probabilities given by:
Because the two probabilities vary in different
directions as w changes, any w is Pareto optimal. t t
Ps (q1 ( ), ) = 1 F s and Pr (q1 ( ), ) = 1 F r
In summary, this Pareto-optimal set is given as wc r w

QF1 in Table 4. (A11)

0
Coordination of a Supply Chain with Satisficing Objectives Using Contracts

Therefore, any w in Case 2.1 is Pareto opti- for both the supplier and the retailer to achieve
mal, which gives the Pareto-optimal set QF1 in their profit targets simultaneously, no matter what
Table 4. the demand realization. Therefore, q'<q* cannot be
Pareto optimal. Now we consider the case of q' >
Case 2.2: w w1 q*. We have the following based on Figure 1:
Under Case 2.2, we have q2() q4() q1(). It
can be verified that the order quantity q1() is Pa-
(q ') > (q* ) = tr + ts if D > q
reto optimal, with the suppliers and the retailers *
probabilities given by: (q ') < (q ) = tr + ts if q > D > q* (A13)
*
(q ') < (q ) < tr + ts if D < q
t 1 wv
Ps (q1 ( ), ) = 1 F s and Pr (q1 ( ), ) = 1 F tr + ts
wc r v wc

(A12) where:

Because both probabilities increase with t r + t s + (c v ) q '


respect to w, we have w*(u,d)= w1. Substituting q* < q = < q' (A14)
r v
w*(u,d)= w1 into q1() and (A12), we end up with
a special case of the Pareto-optimal set QF1 in
Table 4 when w = w1. If D > q or D <q*, the order quantities q* and
q' lead to the same probability pair with the al-
Proof of Theorem  location rule *. If q >>DD>>q*q, *the order quantity
q* leads to the probability pair [1,1] for the sup-
ONLY IF: We show that the optimal profit al- plier and retailer. Hence, q* Pareto dominates q'
location rule * is necessary by contradiction. under the case of q >> D D >> qq**. In summary, the
First note with the optimal allocation rule *, order quantity q* is Pareto optimal.
we have P{*s ts}=1 and P{*r tr}=1 if (q*)
ts+tr. Otherwise, we have P{*s ts}=1 or P{*r IF: Let =P{(q*) < tr +ts,*s =ts}, based on
tr}=1. Now consider ANY other allocation rule the profit allocation rule *, we have:
= ['s, 'r]. If the chain profit (q*)ts+tr, rule
implies either 's<ts or 'r<tr, and hence, P{'s P {*s ts}= P{ (q*) tr + ts } + (1 P { (q*) tr + ts})
t}s =0 or P{'rtr}=0. If (q*)<ts+tr, rule implies (A15)
's<ts and 'r < tr, and hence, P{'s ts}= 0 and
P{'r tr}= 0. In either case, the probability pair Similarly, we also have:
[P{'s ts}, P{'r tr}] is dominated by [P{*s
ts},P{*r tr}]. Therefore the profit allocation rule P{*r tr} = P{ (q*) tr + ts } + (1 P{ (q*) tr + ts})(1 )
* is Pareto optimal. (A16)
Next we show that order quantity q* is neces-
sary. Consider ANY other order quantity q' q*. Since both P {*s ts} and P {*r tr} increase in
If q' < q*, the maximum chain profit is (q')= P{(q*) tr + ts } and P{(q*) tr + ts } is maximized
(rc)q' < ts+ tr. This implies that it is impossible at q*, [ P {*s ts}, P {*r tr}] is Pareto optimal.




Chapter XIII
Information Feedback Approach
for Maintaining Service Quality
in Supply Chain Management
R. Manjunath
Bangalore University, India

ABStRAct

Maintaining the service quality in a supply chain has become a challenging task with increased complex-
ity and number of players down the line. Often several supply chains cross over the common resources,
calling for the sharing of resources and prioritization. This leads to the definition of pre-specified service
quality as seen by the end user of the supply chain. In this chapter, a feedback mechanism that conveys
the status of the supply line starting from the tail end is discussed. The advantages of using a predicted
and shifted slippage or loss rate as the feedback signal are highlighted. Based on the feedback, the
source is expected to change the rate of transfer of the commodity over the supply chain. With this, the
resources would get utilized effectively, reducing the stranded time of the commodity down the line. The
service quality in terms of delay and loss rate gets improved.

intRoDUction In this work the concept of differential feed-


back is explored for the effective utilization of
The enormous business size in recent days call the information for the communication among
for distributed supply units to be located across the members of the supply chain. The model
the globe and connected through a sophisticated that translates individual behavior to the collec-
network. Throughout this work, these isolated tive behavior of the chain is given. The resource
business structures are referred to as mobile contention for communication along the chain is
business units. They resemble the distributed addressed and the solution is modeled.
computing environment in the sense that a time- Maintaining a constant agreed ratio of defects
bound, constraint-based command, signal, and or lossesquality of service (QoS)in a supply
information get exchanged among them. chain is often tricky. The problem gets further

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Information Feedback Approach for Maintaining Service Quality in Supply Chain Management

complicated when the supply chain contains mul- This property may be used as lead-lag compo-
tiple source streams. In this work, a differential nents in controlling the information transfer over
feedback-based model has been developed to pre- the network. Closed-loop feedback is utilized to
dict the defects or losses. A shifted version of the control the signals transferred over the network.
same will be used as a feedback signal. Simulation Intermediate self-similar structures or switches
results show that the number of defects observed may modulate feedback signals and control the
at any point in the supply chain gets reduces with system behavior.
the shifted feedback signal. With the defects In order to meet the real-time transfer of the
getting reduced, for a given demand at any point signal, stringent service quality parameters are
down the supply chain, the quantum of input may defined over the data transfers down the supply
be reduced with differential feedback to achieve chain. This chapter provides techniques to meet
the same performance. The defense supply and these requirements with minimal resources. In-
deployment into the battlefield, the fair mixing time flow of the commodities to the end user is
of reactants in a chemical reaction chamber, and the basic requirement in a supply chain. The tools
so forth stand as good examples. and techniques used to meet this goal are different
The shifted feedback information from the end in different supply chains. The example of real-
user or any other intermediate player in the line time transfer of information for the end user is
may be used to achieve some additional quality considered throughout this chapter. The supply
of service deadlines such as the absolute delay chain involves various routers, switches, and
guarantee, fraction of the service loss, and so forth. media in between. The goal is to get the real-time
The same would be agreed up on with the different performance in the chain with minimal retrans-
units down the line, well in advance. Simulation missions. The concepts may be easily extended
results prove that the usage of shifted signals can to any other form of supply chain.
stabilize the QoS and improve the service qual- A supply chain has four areas of decision:
ity in terms of overall successful operations in a location, production, inventory, and transporta-
given time. This reduces the stranded time of the tion or distribution. It is known that the rate of
information or loss along the supply chain. production bears a direct relation with the rate of
Analysis shows that a system exhibits self- consumption. However, the other factors during
similarity to maximize the entropy (Manjunath the transportation, such as the influence of adjacent
& Gurumurthy, 2005a). It is proved that, to supply chains and the stranded time of commodi-
maximize entropy, the system makes use of ties within the chain, need to be considered. In this
differential feedback of different degrees. They chapter, these factors are explained in depth.
form various levels of abstraction and by and Simulation plays an important role in the
large carry redundant information (Manjunath modeling of a supply chain before it becomes
& Gurumurthy, 2005a). The self-similar property operational. It provides a closer look at the issues
has been exploited here to maintain the quality that may crop up in a supply chain and handle them
of service constraints appropriately during the implementation.
Because of abstraction and redundancy, even if a Supply chains have to make two categories of
portion of the information is lost or if it is required decisionshe long-term strategic and short-term
to predict the future uncertainties with minimum operational decisions. A lot of data is required
available information, it can be repaired or re-syn- for making decisions. A model-based approach
thesized using the available information. is extremely helpful to reduce the sample size.
The self-similar property of the component The model consists of an auto regressive (AR)
induces interesting properties into the system. and a moving average (MA) part. The ARMA


Information Feedback Approach for Maintaining Service Quality in Supply Chain Management

followed by a non-linear limiter can enhance the performance of the supply chain. Here the differential
predictability in the data set. The model described feedback model is introduced (Manjunath, 2004).
here is called differentially fed artificial neural The different components of an organization,
network (DANN) (Manjunath & Gurumurthy, such as marketing, distribution, planning, and
2002) and is a variant of ANN. production in the supply chain, operate quite
independently with their own agendas and priori-
ties. The marketing department targets maximum
BAcKgRoUnD profit while the production division calls for
more investment. The scientific way of bringing
A supply chain is basically a network from produc- together these conflicting goals is the theme of
tion to the consumption, involving the producer, supply chain management.
the end consumer, and the intermediate distribu- The real-time supply chain solution has to
tion agents or brokers. The underlying philosophy provide up-to-the-minute information for the
of a supply chain exists in diverse fields such as end user. Hence the quality of the information
manufacturing industries, the troops deployed in is very important. The system cannot afford to
the battlefield, and so forth. undo the implications of usage of information of
In an industrial supply chain, the material bad quality or transmit the data again. Stringent
undergoes changes metamorphically along the service quality parameters are imposed over the
chain. The models that describe the supply chain supply chain. Especially when multiple chains
are very specific in nature. In this work a more pass through the common resources in between,
generic approach has been taken. priority would come into the picture for the logical
The literature in supply chain management sharing of the resources.
dates back to the work of Geoffrion and Graves
(1974). Their work describes an optimal flow of
multi-commodity logistics from the plants to inFoRMAtion FeeDBAcK FoR
the end users. This model is further explored in SUPPLY chAin
Geoffrion and Powers (1995) as a review of the
evolution of the distribution strategies. When feedback informationthat is, the infor-
In the supply chain the intervening agents can mation to the source about the status at the tail
have distinct characteristics. end of the supply chainis provided, the system
Cohen and Lee (1985) gave a framework for starts exhibiting interesting behavior (Manjunath
manufacturing strategy analysis, with several & Gurumurthy, 2002). As a result of feedback that
stochastic sub-models describing the supply chain. uses a set of previous values, the feedback signal
Finally these sub-models got integrated heuristi- exhibits multi-resolution property. That is, the
cally, which they presented in Cohen and Lee (1988). output signal can be expressed as a weighted sum
The other successful implementation of the supply of a set of orthogonal signals, each of which is a
chain model is at General Motors by Breitman and replica of the other but for a scale (Manjunath &
Lucas (1987). The optimal resource utilization in Gurumurthy, 2003). These replicas are called hy-
a supply chain has been considered by the work of perplanes, as they form a linear transformation in
Cohen and Lee (1989). Another cost and time op- the hyperspace. Any of these hyperplanes may be
timization model has been considered in Arntzen, obtained from the other plane by convolving with
Brown, Harrison, and Trafton (1995). a Gaussian pulse of appropriate scale factor.
Differential feedback of the status of the com- The architecture is based on feedforward and
modity that flows along the supply chain improves the feedback paths. The feedforward path consists of


Information Feedback Approach for Maintaining Service Quality in Supply Chain Management

the actual information or data or commodity flow the traffic. The abstract levels of hyperplanes of
departing from the source depending up on the DANN contribute to self-similarity of the traffic
simulation application. It is data packets in a com- when observed over different time scales.
munication network, a commodity in a product In essence, insertion of DANN in the traffic
supply chain, and investment in a finance supply loop makes the entire network behave as a dif-
chain. The feedback signal comprises the posi- ferentially fed neural network, manifesting all its
tion and status of the commodity or information properties. The network here refers to the forward
as observed at the destination. The differentially and feedback paths. Hence DANNs play a role
fed neural network sits as a controller in the loop more than replacing the conventional ANNs in
comprising the source, the forward path, the traffic shaping. The traffic shaping involves main-
destination, and the feedback path. taining the schedules, reduction in the delays, and
The presence of such a controller imparts all reduction in stranded times or reschedules, while
of its properties to the system. That is, the supply keeping up the agreed service parameters.
chain on either direction behaves as a system with A multi-bit closed-loop feedback mechanism is
differential feedback provided. assumed here, with the bits representing the drop
In general, when a controller is used as an or failure probability and express congestion status
estimator, it starts throwing the output depending of the network. The notification signal or feedback
up on the underlying algorithm and decision rules. signal is time shifted to get better performance.
An ideal estimator gives the weighted sum of the This algorithm is called random early prediction
outputs from the different estimators. When the (REP) (Manjunath, 2004). Generally, feedback-
differentially fed controller is used as an estimator, based control is used in systems that need precise
there will be different output for each order of the adaptive control. Any mismatch in the feedback
differential feedback. The ideal controller is the would drive the system into an unstable region.
one that corresponds to infinite ordered feedback. Models of the traffic are critical in providing a high
As the order of differential feedback is increased, quality of service. The complexity of traffic in a network
it starts moving closer to the ideal estimator. Also, is a natural consequence of integrating diverse ranges
any of the estimators may be expressed as the of members from different sources that significantly
weighted sum of other estimators. differ in their traffic patterns as well as their perfor-
The feedback information in a supply chain mance requirements over the same path.
results in the reduction or increase of the source
operation rate. It in turn helps in proper supply Shifted Feedback in Data network
line scheduling. Based on the congestion status, Supply chain
different congestion control algorithms are used.
Each one of them may be thought of as an esti- The similarities between supply chain model and
mator. A DANN works as an ideal estimator to the data propagation over a network are exploited
replace all of them. in this section. Basically the data network is a
Since the differentially fed artificial neural net- particular form of the supply chain. The concept
work is a part of the loop, its presence has profound developed with the networks is applicable for all
effect on the traffic in the loop. Traffic here refers variants of the chain. This perception throws all
to the movement of the commodity or the like. The the associated problems of the network on to the
DANNs make use of a large number of previous supply chain. Consider two different classes of
samples for decision making. Decisions thrown the data flow. It may be generalized for multiple
out by such a system contribute to long-range de- classes. The relative service parameters come into
pendency in the movement of the commodity or the picture when the different classes of the flow


Information Feedback Approach for Maintaining Service Quality in Supply Chain Management

contend for the common resources such as the The proposed input rate prediction process
operating path, buffering space, or docking space captures the actual input traffic rate reasonably
that tend to get choked and require the maintenance well. In the steady state, the average queue size
of a fixed ratio of the flow members. changes more slowly compared to the instanta-
The resource status in a network may be simu- neous queue size. This means that the proposed
lated with the DANN included. The application of a active queue management method is successful
DANN component in network traffic shaping may in controlling the average size at the router in re-
be studied with this setup, and the parameters of the sponse to a dynamically changing load, and there
DANN may be fine tuned until the desired response is no global synchronization among the sources.
is achieved. The simulations are basically used to There will be some large variation of mean queue
analyze and tune the quality of service metrics and length during the initialization phase. This is
allow exploring different implementation options because it is assumed that the queue is initially
by conducting experiments. empty and it takes some time for the proposed
The simulation setup and the underlying meth- scheme to operate correctly.
odology is valid for other supply chains as well. Because the proposed scheme randomly drops
In the proposed scheme the predicted version incoming packets according to the severity of the
of the probability of cell loss is given as feedback incipient congestion, there is no global synchroni-
to the source. The DANN gets the training data zation. The large variation of the transient queue
from the background RED algorithm. For some size is due to the bursty input traffic.
time, the DANN will be in a learning phase. It With the number of traffic sources that exist
then predicts the data and arbitrary k steps in from the start to end of the simulation increasing
advance. This is provided as the feedback signal from 20 to 80, the total probability of cell loss
to the source. The source then re-computes the or area under the error signal remains the same.
transmission rate. It may be seen that the cell loss However, the variance of the queue length is
ratio has been reduced with feedback. considerably reduced with the proposed scheme.
In a simulation, 42 data points computed with The reduction in the variance is more pronounced
RED are used for training. The input consists of with large traffic.
20 sources supporting background traffic that exist The variance will be reduced with increase in
over the entire simulation time. The maximum the prediction. This happens for some time. Again
buffer size is 8,000 and the cell size is 512. The the variance shows upward trend. This is because
total cell loss ratio of an ordinary RED scheme is the autocorrelation function of a long-range depen-
found to be 1.6. With a neural network prediction, dent series exhibits oscillations. As the number of
it has been reduced to 0.05, and in a first-order sources increases, LRD is more pronounced, with
differentially fed neural network, it is reduced peaks of correlation separated far apart.
further to 0.04. RED detects incipient congestion by calculat-
It is desirable to keep the variance of the ing the average queue size at each packet arrival.
resource occupancy less. The variance can be In other words, in RED, congestion detection and
brought down with the increase of the differential the packet drop are performed in a small time
feedback order. The use of a differentially fed scale. On the contrary, in the case of the proposed
artificial neural network in Web traffic shaping scheme, the congestion detection and the packet
has been explained at length in Manjunath (2006). drop are performed at different time scales. When
As the order of differential feedback increases, network congestion occurs, it takes some time for
the error reduces. a traffic source to detect the congestion and reduce


Information Feedback Approach for Maintaining Service Quality in Supply Chain Management

sending rate to resolve the congestion situation. a single term of highest degree or shift. The plot
The shift for which further increase of shift shows of variance against load also behaves similar to
a reverse trend in the variance increases with the variance against the shift. In both cases, the vari-
increase in the load. ance initially gets reduced and later increases.
The proposed scheme can reduce the time for a The growth of buffer size is a reflection of the
traffic source to detect congestion, because the con- efficiency of the algorithm followed in routing the
gestion detection is determined in a large time scale. cells. When differential feedback concept is ap-
In case an incipient congestion is detected at a large plied, the maximum buffer occupancy is reduced,
time scale and a packet is lost within a sequence of resulting in reduced cell loss. Depending on the
packets, the successfully delivered packets following network condition and the kind of traffic, an ap-
the lost packets will cause the receiver to generate a propriate algorithm or rule may be applied for
duplicate acknowledgement ACK. The reception of packet scheduling and discard. A set of ANNs,
these duplicate ACKs is a signal of packet loss at the each learning a different scheduling algorithm,
sender. So, the traffic sources can detect incipient may be used. Any of them may be triggered
congestion before it really occurs. based on the cost function, once again decided by
By using the proposed scheme, the source another ANN. Each scheduling algorithm is an
can respond to the incipient congestion signal estimator. A single differentially fed ANN may be
faster than in the case of using RED gateway. used since an ideal estimator can replace all the
Therefore, both the average queue length and the Bayesian estimators. A differentially fed neural
variation of the average queue length are smaller network can merge and learn the multiple rules
when the gateway uses the active queue man- in one shot. It results in reduced hardware as well
agement scheme proposed in this chapter rather as improved switching efficiency in routing of the
than when the gateway uses RED. Because the cells. It may be observed that the differentially fed
proposed active queue management scheme can ANN-based estimator outperforms the multiple
control the average queue size and the variation scheduling schemes.
of the average queue size while accommodating The past history associated with the differential
transient bursty input traffic, it is well suited to feedback imparts a kind of long-range dependency
provide high throughput, low average delay, and in the output. With this, the switch performance
low average jitter in high-speed networks. is found to be better in terms of maximum buffer
The variance of queue is found to vary linearly size and the total time to flush the cells. The pro-
with the shift given to the feedback signal for dif- posed algorithm is independent of the underlying
ferent traffic loads. This confirms the existence scheduling algorithm. Green is another standard
of a constant term in the variance modulated by scheduling algorithm like RED. The proposed
a variable term. The slope is independent of the algorithm of random early prediction works well
load, while the constant depends on it. with Green. For small shift, variance is reduced
Since the variance can be written as variance with not much change in the cell loss. It is the
= k1+k 2/shift, k1 and k 2 being constants, the plot of reverse for large shifts.
variance against the reciprocal of shift is a straight The peak instantaneous value falls as the
line. The constant variance term represents the sources go off. When more sources come on,
bias. The second term happens to be the multi- with shift, it builds slowly and thus reduces rapid
resolution decomposition of variance and is the fluctuations of Q size. When Q changes rapidly,
sum of n terms, n being the order of differential. queuing models do not work well.
By the weighted averaging of hyperplanes, the When the optimization problem does not yield
two parts in the second term can be replaced by a solution, meaning that it is impossible to satisfy


Information Feedback Approach for Maintaining Service Quality in Supply Chain Management

all service guarantees simultaneously, some of the feedback control is used to achieve proportional
QoS guarantees are selectively ignored, based on a delay differentiation. Absolute differentiation is
precedence order specified in advance. Due to the expressed in terms of saturation constraints that
form of the constraints, the optimization problem limit the range of the controller. The control loop
is non-linear and can be solved only numerically. around an operating point is made stable through
The computational cost of solving a non-linear differential feedback, and a stability condition is
optimization upon each arrival to the link under derived on the linearized control loop. The stability
consideration may be prohibitive to consider condition gives useful guidelines for selecting the
the implementation of an optimization-based configuration parameter of the controller.
algorithm at high speeds. The REP algorithm is
effective in providing proportional and absolute
per-class QoS guarantees for delay and cancel- iSSUeS AnD SoLUtionS
lation or reschedule. The closed-loop algorithm
reacts immediately when the routes are going It is quite possible that the supply chains from the
from underload to overload and reacts swiftly various producers to the consumers crisscross or
when the routes go from overload to underload. intersect each other, calling for a kind of conten-
This indicates that the delay feedback loops used tion for the resources. The contention could be in
in the closed-loop algorithm are stable. various forms, in terms of financial investment
Proportional delay differentiation does not or storage space.
match the target proportional factors when the route The first step towards resolving this conten-
is underloaded, due to the fact that the algorithms are tion and optimizing the supply chains is to define
work conserving and therefore cannot artificially service classes for each of the chains passing
generate delays when the load is small. through the intermediate agents or the brokers. In
Results for ratios of delays indicate that pro- addition, for each of the service classes, a set of
portional loss differentiation (i.e., schedule can- quality parameters is defined. Both the absolute
cellation) is achieved when the outbound route is value and the relative value of these parameters
overloaded and traffic is dropped. However, it is are important for optimization. It is a requirement
not met in any of the algorithms when the queue to keep the absolute parameters within a certain
falls to 0. This implies that the algorithms basi- agreed limit and the relative parameters at a pre-
cally manipulate the queue of the flow members specified constant value. Various algorithms and
and scheduling of the members to meet the rela- implementation schemes exist considering the
tive delay and loss guarantees. With this the REP optimal utilization of resources.
feedback loops used in the closed-loop algorithm In the REP method of meeting service quality
appear to be robust to variations in the offered parameters, a differentially fed artificial neural
load, and the results of the REP closed-loop network is used as a system level controller.
algorithm are found to be better than the one The broker model, whereby the intermediate
without any shift. agents apparently shield the actual source from
The delays and losses experienced by classes the destination and often act as virtual sources
are monitored. It allows the algorithm to infer a down the line, may be thought of as an extreme
deviation compared to the expected service dif- case of the supply chain. In such a scenario, the
ferentiation. The algorithm then adjusts service service quality constraints are to be met by all
rate allocation and the drop rates to attenuate the agents in between.
the difference between the service experienced The issues arising out of the transfer of com-
and the service guaranteed. A prediction-based modity down the line and the solution based on


Information Feedback Approach for Maintaining Service Quality in Supply Chain Management

shifted feedback were discussed separately in supply chain. The elements of the supply chain
the previous section. The other issues in supply are quite often located at distinct physical and
chain management (SCM) are highlighted here. geographical locations. The data or commodity
Having a common goal among the players of the exchange among them can happen through a
supply chain is a tough task. Each element down shift-based protocol. The protocols of distributed
the line will have its own agenda. Appropriate computing are expected to bring some order into
common goals and interfaces need to be defined so the data exchange within the supply chain.
that the individuals align themselves towards the Advanced prediction of end user behavior
goal. The interfacing can be meaningfully defined would continue to contribute to the success of the
only if the units commit to adhere to some quality manufacturing supply chain: it reduces the over-
guideline. However, it requires some time. head on inventory. Further, development and usage
Interoperability is a major issue in the commu- of the customized prediction software tools as a
nication along the supply line. It may be improved part of the SCM suit would gain momentum. The
with a common protocol with a machine-indepen- usage of prediction of the health of the supply line
dent language such as XML. has been explained in the previous sections.
The language description would be bound to Supply chain automation would be a com-
the commodity and would be interpreted by all mon call in the future. The usage of automation
the players along the line. software would enter into all forms of the supply
The SCM models are required to be scalable. chain. With the SCM software, it would be pos-
The required scalability may be brought in with the sible to automatically route the commodities all
help of a DANN. The model remains invariant with along the line. A variant of the software is elec-
the inclusion of additional flows, the only change tronic shopping, where the end user can directly
being that the loss rate would increase faster. negotiate with the distributor over the Internet
and bypass the supply chain. This results in faster
movement of the commodities. The Web services
FUtURe tRenDS are coming along the supply chain. With this, it
is possible for all players of the supply chain to
The increased dimensions in the organization get into a common platform and instantly interact
call for the usage of collaborative and Web-based over the Internet.
technologies for data collection. The data han- With supply chains involving digital contents, it
dling and integration systems in a supply chain is possible to specify the distribution patterns and
come with increased communication and qual- rights through the associated meta-languages. The
ity capabilities. This happens through increased contents would be sold as commodities involving
collaboration among the elements of the supply various middlemen like distributors and resellers,
chain down the line. each having a specific rights over the contents.
Supply chain components make use of a vari- The nature of the supply chain gets complex
ety of software. Integration of these components with the inclusion of more players. Often the
and software under one platform would gain chains would contain branches or mergers down
momentum, paving a path for new software in the line. Some of the chains could include paral-
the market. lel paths in between and increase the complexity
The concept of distributed computing, multi- further. The SCM software has to consider all
agent software and technology is getting in to the these scenarios.


Information Feedback Approach for Maintaining Service Quality in Supply Chain Management

concLUSion Cohen, M.A., & Lee, H.L. (1989). Resource de-


ployment analysis of global manufacturing and
The timely management of an end-to-end sup- distribution networks. Journal of Manufacturing
ply chain has become a challenging task in large and Operations Management, 2, 81-104.
and medium enterprises with distributed units
Cohen, M.A., & Lee, H.L. (1985). Manufacturing
scattered across the globe. In this chapter, the
strategy concepts and methods. In P.R. Kleindor-
supply chain has been treated in a generic way,
fer (Ed.), The management of productivity and
and no assumption has been made on the nature
technology in manufacturing (pp. 153-188), UK:
of the chain. It could be the data transferred over
Plenum Press.
the Internet or the supply of arms to the ground
troop deployed in the war field. Cohen, M.A., & Lee, H.L. (1988). Strategic analysis
The different issues of the supply chain in- of integrated production-distribution systems: Models
cluding the secure and timely movement of the and methods. Operations Research, 36(2), 216-228.
commodities are addressed, and a solution has
Geoffrion, A., & Graves, G. (1974). Multicommod-
been sought based on a type of feedback from the
ity distribution system design by benders decom-
tail of the supply chain to the head. The feedback
position. Management Science, 29(5), 822-844.
includes a time-shifted version of the extrapolated
loss or delay parameter of the commodity as seen Geoffrion, A., & Powers, R. (1995). 20 years of
by the destination. The feedback signal controls strategic distribution system design: An evolution-
the overall flow in the supply chain. ary perspective. Interfaces, 25(5), 105-127.
The problem of resource contention at the
Manjunath, R. (2006). Compact architecture for the
intermediate nodes in the supply chain as a result
analysis and processing of subnet signals using dif-
of multiple flows has been defined, and the solu-
ferentiators as building blocks. Unpublished doctoral
tion in terms of relative quality parameters has
dissertation, University of Bangalore, India.
been explored.
Manjunath, R., & Gurumurthy, K.S. (2002). Sys-
tem design using differentially fed artificial neural
ReFeRenceS networks. In Proceedings of TENCON02.
Manjunath, R., & Gurumurthy, K.S. (2005a).
Arntzen, B.C., Brown, G.G., Harrison, T.P., &
Hyperplanes generation through convolution with
Trafton, L. (1995, January-February). Global
Gaussian kernels. IICAI
supply chain management at Digital Equipment
Corporation. Interfaces. Manjunath, R., & Gurumurthy, K.S. (2005b).
Bayesian estimator with differential feedback.
Breitman, R.L., & Lucas, J.M. (1987, January-Feb-
In Proceedings of MWSCAS.
ruary). Planets: A modeling system for business
planning. Interfaces, 17, 94-106.

0


Chapter XIV
Performance Management
Srikanth Srinivas
Opex Partners, Inc., USA

ABStRAct

The purpose of this chapter is to help you design a performance management framework that will result
in choosing, successfully implementing, and getting significant benefits from e-supply chain technolo-
gies. The framework is designed to stimulate action by pinpointing where the gaps are, and leveraging
technology to bridge those gaps. This is done using a balanced scorecard revolving around five critical
variables: value, variety, velocity, variability, and visibility. The maturity level of each of these critical
variables is classified using a six-level capability maturity continuum: ignorance, awareness, understand-
ing, approach, action, and culture. This integrated approach of combining critical variables, balanced
scorecard, and capability maturity helps leverage technology for the right purposes, and significantly
improves the performance and productivity of the supply chain.

LiteRAtURe ReVieW Copacino, 1994; Tompkins & Harmelink, 2004).


While this is good to understand and communicate
Supply chain literature tends to either focus on a the state of an organization, it is not conducive
process view or a functional view. In the process to understanding what the critical variables are,
view, the focus is on processes, such as source, what the high impact set of changes that can be
make, and deliver (Bolstorff & Rosenbaum, 2003; made are, and leveraging technology to the right
Hugos, 2003). In the functional view, the focus is set of activities. Keeping the primary focus on
on functions such as manufacturing, distribution, critical variables provides a way of looking at the
warehousing, and transportation (Robeson & relative impact of leveraging technology across
the different processes and functions.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
Performance Management

In addition, it is critical to learn from change I end by describing supply chain quotient
management literature to ensure technology (SQ) as a way to use the performance manage-
implementations result in successful change ment framework to assess the SQ or supply chain
and performance improvements. Current change performance quotient of an organizationto
management literature focuses on people and understand the current state (baseline) on a
organizational aspects of change (Cameron & maturity level continuum and where the key
Green, 2004; Hiatt, 2003). gaps are (assessment), and put in a structured
Tracking progress against a change program implementation plan to leverage e-supply chain
needs to be done with a carefully selected balanced technologies to bridge those gaps systematically
scorecard (Kaplan & Norton, 1996). and gain competitive advantage.

intRoDUction cRiticAL VARiABLeS

This chapter takes an action-oriented view of the A variable is something that can be changed, as
supply chain (as opposed to a process or functional opposed to a constant that cannot be changed.
view) and combines that with a capability view A critical variable is one where small, focused
of change management (as opposed to a people changes can make a big impact on the results that
or organizational view) to provide a performance matter to an organization.
management framework (with a supply chain bal- In every company I visit, I find a large num-
anced scorecard, as opposed to an organizational ber of employees spending much of their time
balanced scorecard) that will result in choosing, and energy on If only, I wish, Why cant
successfully implementing, and getting significant theythings that they cannot change. It is
benefits from e-supply chain technologies. therefore worth highlighting explicitly that it is
The key theme of the chapter is: E-Supply important to focus on variablesthings within
chain technologies create superior value by mak- your control and that can be changed, and more
ing focused changes to critical variables (see importantly, to focus on critical variablesthose
Srinivas [2003, 2005] for another perspective on that are worth changing, because they make a big
the theme0. I start by first defining what a critical impact on the results that matter.
variable is, and then defining and identifying the
critical variables that can be improved by e-supply For example, by better serving the 20% of custom-
chain technologies. ers that give you 80% of margins, you can improve
What gets measured gets done. To get the the penetration in the account and thereby increase
right things done, we need to take the trouble to your profitability even further.
measure the right things. It is important to build
a performance management framework around My focus will be on providing a framework
the critical variables. The measures associated for performance management. The specific mea-
with each of the critical variables are defined and sures to be used for each of the critical variables
discussed. For example, for cash flow velocity, will vary from organization to organization, and
measures like cash-to-cash cycle are discussed. therefore what is described here will only be
For shareholder value, measures like economic indicative of what can be used within the unique
surplus are discussed. As each of the framework context of a specific organization. However, the
elements are discussed, the relevant e-supply overall framework described here applies to every
chain technologies that create a large impact on organization.
that measure are discussed.


Performance Management

Value somewhere in between the two extremes and end


up with both problemsstress on the network and
The results that matter to an organization poor use of capital.
are primarily delivering superior value to its
stakeholdersits customers, shareholders, and Economic surplus (ES) overcomes this limi-
employees. While the relative importance of the tation by accounting for the cost of capital, and
stakeholders varies from organization to organiza- helps focus investments on those opportunities
tion and from time to time within an organization, that earn returns above the opportunity cost of
leaning too far in favor of one stakeholder at the capital.
cost of another stakeholder invariably causes Moreover, it is a myth that the share market
problems in the future. Every e-supply chain focuses only on short-term earnings. Studies have
technology evaluation and selection should start by shown that there is a high correlation between
understanding its impact on all stakeholders. economic surplus and share market valuation
(Copeland, Koller, & Murrin, 2000). Companies
Shareholder Value that earn returns less than their cost of capital
trade at or below their book value. Companies
Many organizations reduce shareholder value to that earn returns well above their cost of capital
earnings per share (EPS). This then gets translated trade at many times their book value. In other
into targets and goals that focus on quarterly in- words, using ES as a measure also aligns the or-
creases in EPS, many times at the cost of long-run ganization with the way investors evaluate their
cash flow returns. The most significant damage performance.
an EPS focus causes is making decisions without
taking the cost of capital into accountsharp dis- Economic surplus (ES) = (return on in-
counts at the end of the quarter to meet increasing vested capital (roic) % weighted average
quarterly targets can increase capacity and capital cost of capital (wacc) %) invested capital
requirements considerably, create uncontrolled (ic)
variability in demand patterns, stress employees, ROIC% = net operating profits less adjusted
and create overload on supplier infrastructure and taxes (NOPLAT)/invested capital
their ability to meet requirements. Invested Capital = operating working
capital + net property, plant & equipment
For example, if the average demand is 100 units, + other operating assets
by giving a 20% discount for customers placing WACC = % of debt after tax cost of debt
orders in the last week, demand in the last week + % of equity opportunity cost of equity
shoots up to 150 units. The system cannot cope
with such sharp spikes in demand. So one of two For further details about each of these terms,
things happens: (a) there is overtime all around, see Copeland et al. (2005).
employees get stressed, and immense pressure is
applied on the supplier network; or (b) the capacity customer Value
is increased to cope with 150 units, in which case
there is a lot of spare capacity during the rest of It is critical to monitor the impact of e-supply
the quarter. In reality most organizations end up chain technologies on the value provided to
customers.


Performance Management

For example, retailers like Wal-Mart and Target In summary, you want to measure the value you
use GMROI (Gross Margin Return On Invest- create for your customers. Some examples of such
ment) as a key indicator of performance. If you measures are the payback period for investments
are supplying goods to them, it would be good to in your goods and services, the return they get
track your GMROI, how that compares to your on the investments they make in your goods and
competitions GMROI, and how you can provide services, the savings they have in the total cost of
superior GMROI. ownership, and the fixed costs they can avoid by
buying from you. By comparing your performance
GMROI = GM% inventory turns on the appropriate metrics with your competitors,
you can identify where you provide superior value
For example, if your product has a gross margin to your customers, and communicate that to your
of 30% and turns over 12 times a year, the GM- customers to expand your market presence. By
ROI is 3.6. In other words, for every dollar the improving your performance on the appropriate
retailer invests in your product, they get back metrics over time, you can improve your market
$3.60 each year. presence over time.

If you can find ways to increase your customers employee Value


inventory turns, you can provide more value to
your customer while maintaining your margins. One of the most important contributors to em-
This will also help you get into a virtuous circle ployee energy, enthusiasm, and excitement is being
of market expansion. By measuring GMROI and in a place where they are growingfinancially, in
improving it constantly, your interests get aligned terms of their capabilities; and organizationally,
with your customers, you give them fresher prod- in terms of their responsibilities, the roles they
uct which moves faster, and because you make play, and the titles they have. On the other hand,
more money for the retailer, you get more shelf a company that is shrinking and reducing in size
space and the increased shelf space gives you can be one of the greatest sappers of energy and
more visibility and increases saleswhich gets morale.
you into a virtuous circle of expanding market In other words, a good way to measure em-
share, revenues, and profitability. ployee value will be to check if the pool of funds
Cash contribution ratio (CCR) is another available for employees is growing. The amount
good customer value measure (Srinivas, 2005). of value added by employees (VAE) is the differ-
It measures the cash contribution. ence between the revenues earned from custom-
ers and the cost of goods and services purchased
For example, if your customer pays you in 30 days, from suppliers. value added productivity (VAP)
and your products turn over every 10 days, your is the VAE/number of employees. If this number
customer has had the opportunity to earn cash 3 is growing from year to year, the pool of funds
times before they have paid you. In this case the available to employees is growing. If this number
CCR will be 3. is shrinkingeven if the organization is growing
by other metrics like shareholder value, revenues,
Providing superior CCR, and highlighting your market share, and so forththe morale of the
superior performance to your customers will give employees will tend to decline. This will make
you a significant competitive advantage. increases in the other areas unsustainable. It is
therefore critical to maintain and grow VAP.


Performance Management

Key Measures for Value 5. There are a few solutions that claim to
maximize revenues and margins. In my
1. Customer value: What is the return we are opinion, this is a gap that can be filled by
providing to the customer on their invest- new and innovative technologies.
ment? Measures can include gross margin 6. Very few solutions focus on maximizing
return on investment (GMROI) and cash economic surplus.
contribution ratio (CCR). 7. There are no solutions to maximize cus-
2. Shareholder value: Economic surplus. tomer and employee value.
3. Employee value: Value added productivity.
This helps answer the question: Is the pool critical Variables that contribute to
of funds available for employees increasing Value
with time?
You cannot improve value by improving value or
Key concepts Associated with Value by wishing for an improvement in value. Value is
an effect. In order to improve value, you need to
1. Measure value from multiple perspec- change the underlying causes of value. You need
tives: The value customers receive, the value to change the variables that create those effects.
shareholders receive, and whether the pool of The critical variables that have a strong connec-
funds available to employees is increasing. tion with value are:
2. Ensure that an economic surplus measure
is used to measure shareholder value. 1. Variety
3. Ensure you provide better value than your 2. Velocity
competition and communicate your supe- 3. Variability
rior value creation to your customers. 4. Visibility

Key technologies contributing Figure 1 provides an overview of the critical


to Value variables.
Subsequent sections get into the detail of each
1. There are a number of optimization of these critical variables.
solutions available that use a combination
of linear programming and mixed integer
programming algorithms to optimize inven- VARietY
tory, transportation costs, and total landed
cost. There are solutions tailored to solve Variety is one of the most critical variables, and
specific problems. also the one least used in practice. Henry Ford
2. Strategic questions: Should I consolidate was the master of eliminating variety. He said,
distribution centers (DCs)? What would be You can have any color car as long as it is black.
the best place to open a new DC? He was so successful at eliminating variety that
3. Near-term planning questions: How much the black Ford Model T became the best selling
should I make? Where? Where should I model in its time. He also brought down the cost
source from? of the car manifold and made it affordable to the
4. Execution questions: How do I consolidate common man.
orders into truckloads?


Performance Management

Figure 1. Critical variables insidious. Most importantly, it drains management


time and attention, and distracts them from what
matters most.
On the other hand, customers demand more
and more differentiated offerings. If there is a way
ity

Va
oc

you can deal with variety without its associated

rie
l
Ve

ty
costs of complexity, you have got the best of both
Value worldsthe variety that customers love, with the
simplicity that employees and shareholders love.
Va

y
ilit

For example, for Southwest Airlines to grow, they


ria

ib
bi

s
Vi
lit

need to introduce more variety in the routes they


y

offer. But at the same time, in order to eliminate


the complexities associated with variety, they have
to choose routes that have good synergy with the
For example, a more contemporary example of one aircraft they have chosen, and with the type
a company that focuses on eliminating variety is of customers they have chosen to serve.
Southwest Airlines. They operate only one type
of aircraftBoeing 737. That means they need to Wal-Mart has limited variety in its store formats.
train their engineers, pilots, and flight attendants The Supercenterwhich combines grocery along
on only one type of aircraft; they need to keep with their traditional product rangehas been
only one set of spare parts; and they need only the reason for their astronomical growth in recent
one FAA certification. This focus on eliminating years. This meant providing more product vari-
variety is one of the key reasons for Southwest ety at the shelves for the consumers shopping at
continuing to be the lowest cost airline. Wal-Mart. At the same time, they have eliminated
complexities associated with the increased variety
Jet Blue is another example of a company that by standardizing store formats and keeping the
eliminates variety by operating only one type of same distribution strategy that was the foundation
aircraft. of their success.
All too often e-supply chain technologies are
introduced when variety in operations makes it For most organizations it is more about manag-
too complex to manage efficiently. On many of ing variety than about eliminating variety. While
these occasions, effort should first be put into Henry Ford focused on eliminating variety, Jack
eliminating or minimizing variety before deploy- Welch focused on managing variety effectively.
ing technology. Any time you hear people saying His primary focus was on distinguishing between
the implementation failed because of performance good variety and bad variety. In his early days as
problems or because the solution was too complex, CEO of General Electric, he distilled it down to
variety is a good variable to check first before a few words, Number 1 or Number 2. Or Fix,
looking at improving the technology portion of Sell or Close the business. (Welch, 2001) Using
the solution. market share as a measure of good variety, he
A key question to ask is, Are the costs of identified the good businesses and nourished
differentiation and increased variety more than them. In turn, the businesses flourished with all
compensated for by increased revenues? If not, that good nourishment. Rather than waste scarce
eliminate it. The cost of variety is invisible and management time and attention on the business


Performance Management

with poor market share (bad variety), he instituted Value with better pricing and customer service; the
a policy of fix (if they were a close number 3 or 20% of products contributing to 80% of economic
4, and it could be fixed in a defined timeframe), surplus can be nourished with superior Velocity
sell (if there was enough value in the business for with more frequent manufacturing and replen-
someone else to be interested), or close the busi- ishment; the 20% of the facilities that contribute
ness altogether if it did not meet any of the criteria to 80% of shipments can be made more efficient
listed above. Just like a company is a portfolio of by implementing technology that provides real-
businesses, a business is a portfolio of customers, time inventory Visibility; the 20% of distributors
employees, processes, facilities, products, and that contribute to 80% of revenues can be sup-
suppliers. The same idea of good and bad variety ported by better forecasts that reduce Variability
can be applied in this context as well. and improve forecast accuracy. In other words,
The 80/20 rule is one of the best ways to good variety differentiation can be achieved by
measure variety. What this rule states is that 20% impacting the set of relevant critical variables
of causes contribute to 80% of the results. The and making them better for this 20% subset. By
20% of the businesses, customers, employees, measuring the extent to which this is done, you
processes, facilities, and products that contribute can get in the habit of continuously nourishing
to 80% of the revenues, economic surplus, and the good variety and making it grow.
cash flow represent good variety. The 20% of
the business, customers, employees, processes, For example, airlines give preferential treatment
facilities, products, and suppliers that contribute to their frequent flyers. The Executive Platinum
to 80% of the economic losses and unproductive members get through lines faster (better Velocity),
assets represent bad variety. get free upgrades (better Value), get special phone
numbers with more consistent service (less Vari-
good Variety ability), and get access to preferential information
first (superior Visibility).
We need to have measures that identify how much
of our products constitute good variety. Every Bad Variety Management
product that is introduced needs to be designed,
developed, and marketed. It also needs plant and Equally important, we need to make sure that bad
equipment to manufacture it, and the infrastruc- variety does not drain away capital, and the energy,
ture to distribute it. A good proportion of this is enthusiasm, and excitement of management talent.
fixed costs that have to be recovered. A good way Bad variety management can come in many forms.
to measure the extent of good variety is to find For example, pricing for the 20% of customers
the number of products that have earned money contributing to 80% of economic losses can be
to recover all these fixed costs (over and above increased to improve their Value contribution;
the variable costs incurred to sell each unit). This Velocity of the 20% of products contributing to
is the % of products that have crossed the fixed 80% of economic losses can be reduced by making
cost threshold. less frequent manufacturing and replenishment
so that they do not drag down the performance
Good Variety Differentiation of the winners; the items that have shipped the
least can be moved to the back of the Distribution
Good variety differentiation can come in many Center so it does not clutter the Visibility of the
forms. For example, the 20% of customers contrib- big movers; the distributors that are small and
uting to 80% of revenues can be provided superior


Performance Management

with high Variability in demand do not drive the Key concepts Associated with
complexity of the forecasting technology. In other Variety
words, bad variety management can be achieved
by impacting the set of relevant critical variables 1. Variety or complexity tends to slow down
and making sure they do not come in the way of systems, demand more monitoring and in-
making good variety nourish and prosper. By terventions from management, and create
measuring the extent to which this is done, you confusion and communication gaps. More
can get in the habit of continuously making sure importantly, all of this can be invisible and
bad variety does not come in the way of making difficult to track down. It can also result
good variety nourish and prosper. in poorer quality as processes are tweaked
to make things work. If we can resolve all
For example, U.S. car manufacturers have a much this satisfactorily and add variety without
greater variety in brands and models compared to increasing the complexity, then we have a
the Japanese. While the Big 3 Japanese car firms good system in place.
have just two brands eacha basic brand and a 2. Distinguish between good and bad variety
luxury brand (Toyota & Lexus, Honda & Acura, in terms of businesses, and within the busi-
Nissan & Infiniti), the U.S. car manufacturers nesses, in terms of customers, employees,
have a much higher number of brands. General products, processes, facilities, and suppliers.
Motors has Chevrolet, Buick, Pontiac, GMC, 3. Feed the good variety, and make it grow
Saturn, Hummer, Saab, Cadillac, Holden, Opel, and prosper.
and Vauxhall. Ford has Ford, Lincoln, Mercury, 4. Starve the bad variety and make it shrink.
Mazda, Volvo, Jaguar, and Aston Martin. The More importantly, prevent it from dragging
American car manufacturers have done a poor job the rest of the organization down, and drain-
of managing their bad variety. As a result, it has ing the energy, enthusiasm, and excitement
dragged down their performance considerably, of scarce management talent.
as opposed to the Japanese, who have managed 5. Are the costs of differentiation and in-
their variety much better. creased variety more than compensated
for by increased revenues?
Key Measures for Variety 6. Are the complexities and costs associated
with increased variety worth it?
1. Good variety: Identifying it and commu-
nicating the winners to everyone. Keeping Key technologies contributing to
track of the percentage of products that have Variety
earned their keep (recovered their fixed costs
invested in them). 1. Procurement: A number of technology
2. Good variety differentiation: Nourishing solutions have addressed eliminating variety
and making this grow. by standardizing items and suppliers, con-
3. Bad variety management: Making sure this solidating volume of purchase, and reducing
does not come in the way of the winners. costs in strategic sourcing, and direct and
indirect procurement.


Performance Management

2. Planning: Eliminating variety by stan- 1. Need time: The time between when a cus-
dardizing processes, and creating common tomer requests a product or service, and
frameworks to plan, collect actual data, when they need to get that product or service
report variances, and analyze root causes. fulfilled.
3. Good variety differentiation and bad 2. Lead time: The time it takes for you to
variety management are not addressed fulfill a customer request.
adequately by e-supply chain technology 3. Cycle time: The time taken for each of the
solutions. Most organizations currently rely process elements.
on spreadsheets on an individual basis rather 4. White space: The time between process ele-
than as a corporate-wide initiative (if they ments, spent waitingfor people, resources,
do this at all). assets, materials, cash, and so forth to start
a process element.

VeLocitY The gap between need time and lead time is


what creates the need for inventory. If you turn on
There are two fundamental ways to increase the switch, the electricity gets made, transmitted,
operational velocity: and powers your bulball in an instant. There is
no gap between need time and lead time. There
1. Reducing time is therefore no need for inventory.
2. Increasing frequency
For example, companies like Dell have worked
The result of increasing operational ve- hard to reduce the lead time to less than five days
locity will translate into an increase in asset by reducing cycle times, and more importantly,
velocityinventory and cash flow. Far too reducing the white space between process elements
often, organizations try to increase asset veloc- by synchronizing the various process elements
ity by reducing inventory without appropriate both within its organization and with supplier
changes in policies and processes to reduce time organizations. At the same time, Dell has worked
and/or increase frequency. This results in poorer on your expectations to be OK with a need time of
customer service. What you want to do is make five days (to give up the instant gratification that
underlying changes in operational velocity and comes from picking up the coolest gadget from
see the flow through effect of the improvement the store the same instant you had the desire for
in asset velocity. it). As a result, Dell does not need to keep any
finished goods inventory.
time
E-supply chain technologies have played a very
Reducing time and improving velocity has been critical role in making this possible by providing
the focus of attention for methods such as Lean the visibility needed for effective synchronization
Manufacturing (Womack & Jones, 1996). A and compressing the time requirements.
number of e-supply chain technology solutions The process elements themselves may be value
focus on understanding and compressing process adding (i.e., contribute towards what the customer
time requirements. would regard as valuable), value supporting (i.e.,
We need to distinguish between the following the organization needs this to support customer
time elements: value-added tasks), and waste (contributes neither
to customer value nor to support a value-creat-


Performance Management

ing process). By eliminating processes that are products contribute to 80% of the volume, by mak-
waste and minimizing value supporting ing that 20% subset daily, you create a significant
processes, cycle times can be improved signifi- improvement in asset velocity while managing
cantly. far less complexity, as the weighted average as-
set velocity with a stratified approach comes to
Frequency 0.8 * 1 (for the 80% that gets made daily) + 0.2
* 7 (for the 20% that gets made weekly) which is
While the Time element of Velocity has had a 2.2, compared to an average of 7, if everything
lot of attention, the Frequency aspect of velocity was made weekly.
has been ignored largely. Frequency of sourcing, Similar ideas can be applied for how often:
manufacturing, replenishment, and customer
service has a critical role in improving velocity, 1. Vendors replenish their inventories
and this has been largely untapped. Technology 2. DCs replenish their inventories from the plants
solutions available today also tend not to focus 3. Customer DCs are replenished by your
on this aspect of improving velocity. This aspect DCs
of improving velocity is ripe for streamlining. It 4. Customer store locations are replenished
is worth learning from the examples being set by (DSDdirect store delivery).
the leaders in this area.
While improving frequency, setup time and
For example, retailers like 7-11 Japan are pio- costs have to be taken into account. However, setup
neers in this area. Their stores get replenished times are given more importance than necessary.
multiple times a day. They turn their inventory Not enough time goes into questions such as:
over 50 times a year, which is close to 10 times
the industry average. 1. How can setup times be reduced to sys-
tematically increase the frequency?
Retailers like Wal-Mart and Target have a 2. Are we really using this to capacity? Is
streamlined frequency for replenishing their this really a constraint? In other words, will
storesranging from daily for the high-volume we really lose productivity by incurring this
stores, to weekly for the lower-volume stores. setup time?
3. What are the benefits of imposing such
Manufacturers like Proctor & Gamble and Uni- rigor on frequency? Are they worth having?
lever have consciously invested in improving the If so, how can we overcome the limitations
manufacturing frequency from monthly to weekly, of setup time to achieve those benefits?
and are working towards a daily frequency.
Setup costs, including waste during the ini-
Improving frequency directly improves the tial/setup portion of the run, can be more difficult
velocity of operations and reduces cycle stock to reduce compared to setup times, but can be
requirements dramatically. Since forecasts have achieved (Womack & Jones, 1996).
to be made over a shorter duration, the safety Just like manufacturing frequency needs to be
stock requirements also decline. traded off with setup time and costs, replenish-
If the number of products is large, you can ment frequency will have to be traded off with
also think in terms of a stratified manufacturing truckload considerations. If truckload consider-
frequency, with good variety being made daily ations come in the way of increasing frequency,
and the rest being made weekly. If 20% of the

0
Performance Management

multi-stop routes that together make a truckload 3. Asset velocity: Inventory turns, Cash flow
can be another strategy to increase the replenish- velocity (also referred to as cash conversion
ment frequency. cycle)

Asset Velocity Key concepts Associated with


Velocity
The important thing to understand is that asset
velocity should be the result of making improve- 1. Asset velocity is the result of improving
ments in operational velocityreducing time and operational velocity.
increasing frequency. Without these underlying 2. The gap between need time and lead
changes, inventory reduction will only result in time determines the amount of inventory
lost sales and poorer customer service. needed.
Asset velocity has two components: 3. Frequency is a largely untapped way of
increasing velocity. Key questions to ask in
1. Inventory relation to leveraging frequency include: Is
2. Cash flow it worth imposing rigor in frequency? What
are the benefits of imposing such rigor? Will
Inventory turns or the number of days of inven- they be worth it? What are the risks in im-
tory are the two most popular ways to measure posing such rigor? Are they worth taking?
inventory velocity. Inventory turns measures the
number of times the inventory turns over during a Key technologies contributing to
year. It is calculated as the annual Cost Of Goods Velocity
Sold (COGS)/Average Inventory during the year.
The number of days of inventory is the Average 1. A number of technology solutions address
Inventory/Average Daily Cost Of Goods Sold. the time element of velocity. They have
played a very critical role in providing the
Cash flow velocity = accounts receivable visibility needed for effective synchroni-
days + inventory days - accounts payable zation and compressing the time require-
days ments.
2. There are a number of technology solu-
For example, companies like Dell, McDonald's, tions that are compliant with Lean
and Wal-Mart have focused consciously on im- (Womack & Jones, 1996) and help you with
proving cash flow velocity and now have a nega- value stream mapping, a process that helps
tive cash flow velocity. They have reduced their classify the process elements, document
inventory days and accounts receivable days to cycle times, and white space.
such an extent that it is less than their accounts 3. There are few technology solutions that
payable days. address frequency. This is an area that is
ripe to be addressed, as it is a much simpler
Key Measures for Velocity route to improving velocity compared to
other methods.
1. Frequency: Manufacturing, Replenish- 4. While there are a number of e-supply
ment, Service frequency chain technology solutions available to
2. Time: Need time, Lead time, Cycle time, reduce inventory, technologies to optimize
White space


Performance Management

all of the components of cash flow velocity of exceptions could include poor training by the
are not as common. This is a gap that is ripe manager, narrow territory assignment, getting
to be addressed. lucky with a large order, and so forth.

It is useful to divide variability into output


VARiABiLitY variability, process variability, and input vari-
ability.
Deming was one of the foremost thinkers on vari-
ability. He provided Japanese management with output Variability
theories and methods that prepared the roadmap
of Japanese economic success, which has since 1. Customer demand fluctuates: Forecasts of
been expanded upon as TQM and Six Sigma customer demand can be compared against
implementations by organizations across the globe actual demand to calculate the forecast ac-
(Deming, 1986; Latzko & Saunders, 1995). curacy. mean absolute deviation (MAD) is
There will always be variabilityin the inputs one popular way to measure forecast ac-
you receive, the outputs you produce, and the curacy.
products and services you deliver. The key is to 2. Product quality also fluctuates: Product
contain the variability such that it is well below quality can be measured in terms of yield
limits of acceptability. So if your customer will (% of good product/total product) or defect
accept weights to the nearest gram, and the vari- rates (% of bad product/total product).
ability of your processes is in milligrams, your
product variability should not cause any problems Process Variability
to your customer.
In order to reach that level of sophistication, 1. Process capability fluctuates: Fill rate
it is important to distinguish between common measures the percentage of orders that were
causes that cause random variability, and special delivered in full on time.
causes. If there are no special causes, all the data 2. Process compliance fluctuates: Plan com-
points will be within upper and lower control pliance measures the deviations between
limits. Such a process is said to be stable or in what was planned and what was actually
control. The limits will depend on the nature of produced, delivered, and sold. Understand-
distribution. For normal distribution, three stan- ing the root causes of these deviations will
dard deviations on either side of the mean form help plan better and execute the plan bet-
the upper and lower control limits. A number of ter.
technology solutions exist to calculate and map 3. Process control: It is important to under-
control limits. stand whether the process is in control. The
number of data points that are more than
For example, all too often the salesperson who three standard deviations away from the
exceeds quota is rewarded and courted, and the mean is an indication of the extent to which
ones that do not are shunned or fired. By under- the process is out of control. What we want
standing the variability and the distribution pat- is zero data points outside these limits.
tern, it is possible to answer questions such as: Companies that have made great strides in
(a) Was this just a random variation that he may process control measure the number of data
not be able to repeat again? (b) Was this a com- points that are outside six sigma limits. This
mon cause or was this an exception? Examples can be used to truly understand variability


Performance Management

in quality, outputs (production, sales), and processes are stable, highlight the exceptions,
inputs (raw material arrivals, defects). create forecasts, and calculate buffers required to
protect against a given level of variability.
input Variability

Supplier capabilities fluctuate. ViSiBiLitY

1. Lead time variability measures the vari- The effects of visibility have been described effec-
ability in lead time. tively by Senge (1990). The beer game illustrates
2. Supplier defects and yields measure the the distortions caused by poor visibility. The three
variability quality of goods and services participants in the gamethe retailer, the whole-
provided by suppliers. saler, and the marketer/manufacturershare little
data among themselves other than the orders
Key Measures for Variability placed. Each participant also tries to maximize his
or her patch. As a result, when there is a small
1. Output variability: Demand variability, change in demand at the retailers end, it causes
forecast accuracy, yield. a bullwhip effect that results in bigger changes
2. Process variability: Fill rate, plan compli- in demand for the wholesaler, and even bigger
ance. changes in demand for the marketer/manufac-
3. Supplier variability: Supplier lead time turer. First there is growing demand that cannot
variability, yield. be met. Orders build throughout the system.
Inventories get depleted. Backlogs grow. Then
Key concepts Associated with the beer arrives en masse while incoming orders
Variability suddenly decline, and everyone ends up with large
inventories they cannot unload.
1. All processes have variability: There is While the beer game describes visibility prob-
variability in the inputs they receive, the lems between organizations, there are equally
outputs they produce, and in the resources, prevalent visibility problems within organizations.
costs, and time they consume to produce Organizations create teams to ensure specialized
those outputs. competencies are created and nurtured. Over time,
2. Understand variability: Minimize it where each of the teams starts to work within its silos,
possible; if not, minimize its impact by and the walls that get created distort visibility
buffering against the variability where it across the organization (the fog effect). Each
matters most. team begins to create its own set of numbers
3. Differentiate between common causes (forecasts, inventory buffers) that result in a lot
that do not need intervention and special of local optimization, but at the cost of global
causes that can be improved. optimization. This distorts demand and creates
bullwhip effects within the organization.
Key technologies contributing to A number of collaboration and workflow tools
Variability are available to solve visibility problems both with-
in the organization and between organizations.
A number of mature technology solutions are Technologies like barcode, EDI, and enterprise
available to understand variability, detect whether resource planning (ERP) have played a critical
role in improving visibility. Emerging technolo-


Performance Management

gies like RFID (Radio Frequency Identification) In creating visibility performance measures,
will result in an order of magnitude improvement it is useful to think in terms of internal visibility,
in visibility at the individual case or pallet level, customer visibility, and supplier visibility.
as opposed to the product level visibility that is
currently prevalent, and create all the benefits that customer Visibility
can come from such improved visibility.
1. %POS volume: Point-of-sale data refers to
For example, you know that the average time the data pertaining to what actually sold at
spent by an item in the DC is 5 days. With RFID the store. Many retailers now provide POS
technology, you can get fine-grained visibility of data to their suppliers. This gives a true
the movements of individual pallets and cases. indication of what is selling at the store
With that you can find out how many cases spent level, as opposed to what was bought by the
less than 2 days, how many were around for more retailer (which may still be sitting in a DC).
than 7 days, what the root causes of the differences Given our discussion about the bullwhip
are, and eliminate these root causes to improve effects caused by multiple layers in the sup-
velocity all around. ply chain, as the %POS volume increases,
the bullwhip effect should decrease. By
In addition, because of the automatic detec- measuring the %POS volume, you can look
tion capabilities of RFID, system inventory will at where you are and what you need to do
be more closely aligned with the real, physical to improve it.
inventory. Peoples faith in the inventory shown 2. %Collaboration volume: There are a
in the system will improve, and they will tend number of collaboration technologies avail-
to keep less (rather, hide) just-in-case stock. It able that help retailers, wholesalers, and
can also help trigger replenishment processes manufacturers share their forecast, capacity,
automatically. demand, inventory, and so forth. As condi-
tions change, the forecasts can be changed,
For example, Wal-Mart has leveraged RFIDs and the suppliers can be better prepared. By
improved visibility to streamline processes and measuring the %Collaboration volume, you
achieve a 16% reduction in stock-outs and two- can look at where you are and what you need
thirds drop in replenishment times. The company to do to improve.
used RFID to generate automatic pick-lists of
the specific items needed to restock shelves. internal Visibility
As customers go through checkout, they com-
bine point-of-sale data on their purchases with 1. One number: This measures the extent to
RFID-generated data on what is available in the which all the different organizations see and
backroom to produce the pick lists. Basically, use the same numbers for decision making.
RFID enabled Wal-Mart to change its pick-list ERP systems have this as their core value
generation process from a reactive one that re- propositionthe ability for the entire orga-
quired associates to take the initiative to determine nization to work off one set of numbers.
restocking needs, to a proactive one, in which lists 2. Update frequency: This can measure the
are automatically created in real time, based on frequency with which updates are made. For
sales. (Johnson, 2006) example, are inventory updates made in real
time? Are they done by the end of the day?


Performance Management

How can this be improved? When do the and expected volume of business. For suppliers
books get closed after the period is over? participating in the RFID pilot, they also provide
Can you see monthly results one business visibility to every movement (DC to store, store
day after the month has closed? After seven backroom to floor, etc.), within hours of the move-
business days? How can this be improved? ment happening.
Can you get true visibility on what hap-
pened last week by Monday morning? Can Just like bar codes have become mainstream
you understand all the variances and root technology, RFID will mature and become main-
causes, and apply the lessons learned for the stream technology in the years to come. When
coming week? that happens, the percentage of volume tagged
through RFID will serve as an effective measure
Supplier Visibility of visibility at a granular levelvisibility at the
individual items, cases, and pallets, as opposed
%VMI volume: Vendor-managed inventory to the product level.
(VMI), as the name implies, makes the vendor
responsible for the management of the inventory. Key Measures for Visibility
This helps foster improved visibility between the
organizations. For suppliers to manage inventory 1. Supplier visibility: Percentage of VMI,
well, they need visibility into forecasts and the collaboration volume.
accuracy of the forecasts. By combining this with 2. Internal visibility: Percentage of DCs with
the actual withdrawals, and their replenishment hourly/daily inventory updates, percentage
lead times and variability in lead times, they can of DSDs with daily updates, percentage of
manage their inventories efficiently. By measuring RFID volume, one number, time to close
the %VMI volume, you can look at where you are period.
and what you need to do to improve. There are a 3. Customer visibility: Percentage of VMI,
number of technology solutions available today POS, collaboration volume.
that address this problem effectively. For manu-
facturers providing VMI services to retailers, Key concepts Associated with
POS data can serve as an effective foundation for Visibility
improved visibility into what is actually selling
at the stores. 1. Improve visibility within the organi-
zation by designing policies, processes,
For Example, Wal-Mart pioneered supplier vis- performance measures, and systems that
ibility with its Retail Link. It continues to be the breakdown the visibility barriers between
benchmark for supplier visibility and the power marketing, sales, planning, manufacturing,
it provides for superior decision making by all distribution, and transportation.
participants in the supply chain. It provides vis- 2. Gain visibility to customers sales at the
ibility to suppliers on what has happenedPOS stores, the events and promotions they are
(Point Of Sale), Inventoryand all of the factors planning and their impact on forecasts, and the
the company needs to make smarter decisions inventories they have at the stores and DCs.
about what to expect in the future in terms of 3. Provide visibility to suppliers.
demographics by store clusters, sales forecasts,


Performance Management

Key technologies contributing to organizations, and therefore increased col-


Visibility laboration and visibility.
6. Technologies like RFID will revolutionize
1. E-supply chain technologies have played the granularity of visibility available by
a very critical role in improving visibility going from product level to case and pallet
significantly. level visibility.
2. Bar code and EDI have transformed the
industry and provided visibility across
organizations very effectively. PeRFoRMAnce MAnAgeMent
3. ERP solutions have greatly enhanced inter- FRAMeWoRK
nal visibility by providing one view across
the entire organization. It is now time to turn our attention to taking all
4. A variety of e-commerce, workflow, and of the individual elements we have discussed and
collaboration solutions and standards putting them together in an overall framework.
have greatly contributed to visibility across Figure 2 summarizes the performance manage-
the supply chain and its participants. ment framework.
5. Standards like XML and technologies like Below is a summary of the framework:
Web services have greatly simplified the
process of exchanging information between 1. The measures in the framework are con-
nected in a cause-effect relationship.

Figure 2. Performance management framework

e-Supply chain Performance Management Framework


WACC Good Variety
Economic
Shareholder Good Variety
Surplus ROIC Variety Differentiation
Bad Variety
Management

Time

Customer Velocity Frequency

Asset
Velocity
Value Output
Variability
Variability Process
Variability
Employee
Input
Variability
Customer
Visibility
Internal
Visibility
Visibility
Supplier
Supplier
Visibility
How?
Why?


Performance Management

2. The framework describes goalswhat For example, the framework highlights fre-
should be measured. It does not describe the quency. Whether it is manufacturing frequency,
actual measures. replenishment frequency, or sales call frequency
3. The measures should be designed with key will depend on what is currently constraining
principles in mind. performance.

cause-effect Relationship Principles

The measures in the framework are connected in When designing the performance management
a cause-effect relationship. As you go from left framework, keep the following principles in
to right, you get the How question answered. mind:
As you go from right to left, you get the Why
question answered. For example, to answer How 1. Measures should be aligned with purpose.
to improve the critical variable velocity, you go 2. Build the measures that highlight the right
to the right and you find that you can do that by set of critical variables that will help you
working on time, frequency, and asset velocity. achieve your purpose.
When creating measures, it is important for 3. While this framework applies to a wide range
every one (not just the person who created the of companies, no two companies will have
measure) to clearly understand why that measure the same set of measures.
is important and what it contributes to. Otherwise, 4. Take the trouble to make sure you measure
the measure will become just another number what needs to get done.
in a report. It will not change behavior or influ- 5. Leverage this framework to align the entire
ence decision making. Laying it out in such a organization.
visual framework will also help you think through 6. Measure the value you are providing to your
whether the cause-effect relationships are really customers. This will serve as a constant
true or not. We often make implicit assumptions, reminder to make sure you provide superior
and laying them out explicitly will force us to value
examine those assumptions more carefully.

goals SQ: SUPPLY chAin QUotient

The framework describes goalswhat should The performance management framework de-
be measured. It does not describe the actual mea- scribed in the previous section can be used to
sures. This is because the framework is applicable understand the current state (baseline) on a ma-
across different contexts. The specific measures turity level continuum, where the key gaps are
will be very specific to each organizations unique (assessment), and put in a structured implementa-
context, defined in terms of where improvements tion plan to leverage e-supply chain technologies
will result in competitive advantage. What gets to bridge those gaps systematically and gain
measured gets done. So to get the right things competitive advantage. Figure 3 describes this
done, we need to make sure that the right measures pictorially, and the text that follows explains the
are in place. A number of measures have been different elements of the picture. (The numbers in
discussed throughout this chapter. These can be the picture are for illustrative purposes only)
used as starting points and then tailored to suit In most organizations, each technology solu-
your unique situation. tion is evaluated independently. This framework


Performance Management

Figure 3. Supply chain quotient (SQ)


Critical
Goal Maturity Level CQ Comments Results Effort
Variable

Ignorance Awareness Understanding Approach Action Culture N/A


Will
Why Why How to Doing
What to Do? Continue
Bother? Change? Do? now
Doing
Score-> 0 1 2 3 4 5 5
1 Shareholder Value 0.3 0.7 3.8 Med High
2 Value Customer Value 0.5 0.5 2 Low Low
3 Employee Value 1 1 Med Low
4 Good Variety 1 1 Low Low
5 Variety Good Variety Differentiation 1 x 1 Low Low
6 Bad Variety Management 1 1 Low Low
7 Time 1 4 High High
8 Velocity Frequency 0.3 0.3 0.4 1.1 Low Low
9 Asset Velocity 1 5 High Med
10 Output Variability 1 4 High High
11 Variability Process Variability 1 5 High High
12 Input Variability 1 Y 2 High High
13 Customer Visibility 1 1 Low Low
14 Visibility Internal Visibility 0.2 0.8 3.4 High Med
15 Supplier Visibility 1 5 None None
16 Continuous Improvement 1 3 High High
17 Performance Focus 1 0 Low Low
18 Overall Synergy 1 2 Med Low
19 Winner's Mindset 1 1 Low Low
20 Agile 1 0 None None
Total Score 2.3 7.3 2.4 1.5 2.8 2.7 1 46.3 <-CQ

serves to highlight where the gaps are, and the right the past and not repeat the same mistakes.
technology solution can then be implemented to Since the primary purpose of this framework
bridge those gaps. In other words, this framework is to identify the best uses of technology,
helps evaluate the different technology solutions studying historical patterns of returns from
relative to each other and identifies the most rel- technology initiatives will help guide deci-
evant onesthe ones that will contribute most sions on the most successful applications of
to improving competitive advantage. technology.
Figure 3 succinctly summarizes the current
state of an organization: Critical Variables

1. The critical variables and the goals In addition to the critical variables described in
2. The maturity level of the organization previous sections (value, variety, velocity, visibil-
3. A scoring mechanism to quantify the cur- ity, variability), there are five overall variables that
rent maturity level need to be managed well in order for organizations
4. Current initiatives being undertaken and to compete successfully and win.
their impact in terms of maturity improve- For detailed illustrations, stories, and examples
ment (the arrows can be used to depict what highlighting these five overall variables, see
the current maturity level is and the maturity Srinivas (2005).
level that will be reached at the successful
completion of the initiative). Continuous Improvement
5. Initiatives undertaken in the past: The Nothing stays still. In this world of fierce competi-
effort and the return on the effort in terms tion and fleeting opportunities, to stand still is to
of superior results, so we can learn from be left behind. In order to cope with these ever-


Performance Management

evolving market dynamics, the organization has lot of internal political competition between the
to sustain a culture of continuous improvement. different teams and within individuals in a team
that destroys synergy. What is worse, it creates
Performance Focus negative energy. To maximize performance, the
Organizations tend to get carried away by fads and organization must change its course and set itself
what is hot at the moment. They can get process on a path of synergy within the organization, as
centric and get all carried away trying to reen- well as tap into the energy, enthusiasm, and ex-
gineer processes and perfecting them. They can citement of every individual in the organization
get carried away by tools and techniques. TQM, in a constructive and aligned manner.
Six Sigma, and Lean are all excellent tools, but
they are merely means to an end. They can get Winners Mindset
carried away by technologies like RFID, Web, Organizations tend to look at problems rather than
and optimization. To be performance focused, opportunities. They tend to reward the people who
the organization must have a culture where the put out fires, and manage the many crises that all
focus is on enhancing performance, and the right organizations inevitably face. Rarely does the
tools, technologies, and processes are deployed to individual who has taken all the proactive mea-
sustain superior performance. In general, enhanc- sures and completed his work smoothly without
ing performance will entail balanced attention any news or noise get the attention and rewards.
to a number of parameters. We started with a As a result, it takes effort to unlearn these habits
focus on performance measures. We then looked and create a winners mindsetwhere people
at designing and strengthening policies such as want to be proactive, want to find answers to
manufacturing and replenishment frequency. We problems (rather than find problems with every
looked at processes to reduce variability and bring answer), where they believe that it is possible even
them under control. It is important to take people if it is difficult (rather than it may be possible but
along a maturity continuumall the way from it is too difficult). Creating a winners mindset is
ignorance to embedding the right practices in the critical to competitive advantage.
organizations culture. Finally, it is the passion that
must pull it all together and drive performance. Agility
You have to pay attention to all the parameters There are many definitions of agility. The one I
needed to enhance performance. In other words, use is best described using an analogy. A plane
performance has to take center stage, and all the starts in London and is headed for Argentina. If it
other parameters should be used as necessary to is one degree off course, it will end up in Mexico
contribute to performance improvements. instead. Most planes are off course by more than
a degree 95% of the time, because of changes in
Synergy wind conditions, the load patterns in the plane,
When the lead goose flaps its wings, it creates and so forth. They still end up in Argentina. How
uplift for the one immediately following. By fly- do they manage to do that? By having constant
ing in a V formation, the whole flock flies at course correction. Similarly, businesses will be
least 70% more distance than if each bird flew buffeted about by market conditions. They should
on its own. You find synergy all around you in fully expect to be more than one degree off dur-
nature. However, it is not so common within ing the course of a week. An agile business is
organizations. There are walls erected between one that can make course corrections in time to
functions and between business units. There is a make a difference. If figures are only reviewed


Performance Management

monthly, and the monthly numbers only come out Each maturity level builds on the previous one
five days after a month is closed, it is too late to and extends the maturity of the organization. The
make course corrections. If figures are reviewed arrow above maturity level highlights the fact that
weekly, and the numbers are out the day after the organizations have to progress from one level to
week is closed, you get 52 opportunities to make the next in a staged manner.
course corrections to an annual plan. There is a
reasonable chance of being an agile business. Scores

Maturity Level The organizations maturity on each goal can be


rated on a scale from 0 to 5 (Ignorance to Culture).
For each of the critical variables (e.g., velocity) By systematically looking at the current state of
and goals (e.g., frequency), the organizations each goal, this framework helps establish the
maturity level can be classified into one of six organizations supply chain quotient.
categories: To account for the fact that some goals may be
partially accomplished (replenishment frequency
1. Ignorance: There is no organizational is being done, but manufacturing frequency is
knowledge of the importance of this goal. only at an awareness stage), the same one point
The key questions people ask in relation to could potentially be distributed across the dif-
this goal are: Why bother? Given everything ferent stages. The comments field can be used to
else on my plate, why should I give this any document the reason for the same goal in multiple
attention? Why me? stages of the maturity continuum.
2. Awareness: The organization is aware of the The overall score and the scores in the indi-
importance of this goal. It knows the answer vidual goals can be used to identify where the
to the question: Why we need to change? gaps are, what needs improvement most, and
3. Understanding: In addition to understand- where attention should be directed in terms of
ing the importance of the goal, the organiza- implementing new technologies.
tion now knows what needs to be done. Note that we have a scoring scheme that uses
4. Approach: Now the organization knows explicit, tangible, and specific factors to do the
how to achieve this goal. scoring rather than a generic Poor-to-Excellent
5. Action: This goal is already being achieved five-point scale. For example, if people understand
satisfactorily. the goal, they should be able to articulate it; if they
6. Culture: After the action is repeated many are taking actions, it should be obvious. This takes
times, it becomes an integral way of doing subjectivity out of the scoring mechanism.
business, an inherent part of the culture, and
stands the test of time. In other words, goals Current Initiatives
continue to be met, even when people change
and organization structures change, because The impact of any current initiatives can be
it is deeply embedded in the culture of the visually depicted, as highlighted by the arrows
organization. See Hellriegel, Slocum, and marked X and Y, which illustrate the improve-
Woodman (2001) for a detailed discussion on ments that can be expected from implementing
culture, and the relationship between culture initiatives X and Y.
and an organizations performance. Some current initiatives will not figure any-
where in the picture. The advantage with such a

0
Performance Management

framework is that it makes the irrelevance explicit. these capabilities, and practice them regularly
The fact that they do not contribute to improved until they become ingrained habits. Ensure that
performance is visible and cannot be hidden. In people have the passion for continuous improve-
that case, tough decisions must be made: ment and sustaining operational excellence. Creat-
ing this performance-focused organization will
1. Can the goal of the initiative be changed result in choosing, successfully implementing,
so it fits in the picture? and getting significant benefits from e-supply
2. Can it be run in maintenance mode so it chain technologies; and creating superior value
is not draining the best talent? for shareholders, customers, and employees.
3. Should it be eliminated? Performance management is a synthesis of
three key concepts:
Past Initiatives
1. An action-oriented view of the supply
This same framework can also be used to compare chain that focuses on what are the best areas
the return on investment of initiatives already to improve
completed in the last one to three years. Initiatives 2. Creating a supply chain balanced score-
with low effort and high results are what we card that is supply chain focused and tracks
need to learn from and repeat. Initiatives with progress
high effort and low returns are the ones we 3. Having a capability framework that lever-
want to avoid repeating. What were the lessons ages change management principles and
learned? practices
You also want to make sure that you have a
reasonable number of initiatives that have yielded While the effect of applying the synthesis of
good results for reasonable effort. If not, this can these three concepts has been field tested in a
highlight a major weakness in the way initiatives dozen organizations, further research is needed to
are conceived, managed, implemented, and fol- systematically study the impact of these concepts
lowed through. on improved performance on a broader basis.

concLUSion
ReFeRenceS
Fundamentally, it is all about choosing the right
race to run, and running faster than the com- Bolstorff, P., & Rosenbaum, R. (2003). Supply
petition by enhancing performance. Start with chain excellence: A handbook for dramatic im-
a balanced focus on performance measures. provement using the SCOR model. New York:
Then look at the right policies to grow the good AMACOM.
variety and limit the drag effect of bad variety,
Cameron, E., & Green, M. (2004). Making sense
and improve velocity by streamlining frequency
of change management: A complete guide to the
and compressing lead times and strengthen-
models, tools & techniques of organizational
ing policies that have become weak with time.
change. VA: Kogan Page.
Strengthen processes to reduce variability and
lead times, and improve visibility by focusing on Copeland, T., Koller, T., & Murrin, J. (2000).
cross-functional processes. Structure the change Valuation: Measuring and managing the value of
in bite-sized phases so that the people can digest companies. New York: John Wiley & Sons.


Performance Management

Deming, W.E. (2000). Out of the crisis. Boston: Srinivas, S. (2005). Shocking velocity! Rapidly
MIT Press. achieve more with less. Greenwich, CT: Informa-
tion Age Publishing.
Hellriegel, D., Slocum, J.W. Jr., & Woodman,
R.W. (2001). Organizational behavior. OH: South- Tompkins, J.A., & Harmelink, D. (2004). The
Western College Publishing. supply chain handbook. NC: Tompkins Press.
Hiatt, J.M., & Creasey, T.J. (2003). Change man- Welch, J. (2001). Jack: Straight from the gut. New
agement. CO: Prosci Research. York: Warner Business Books.
Hugos, M. (2003). Essentials of supply chain Womack, J.P., & Jones, D.T. (1996). Lean thinking:
management. New York: John Wiley & Sons. Banish waste and create wealth in your corpora-
tion. New York: Simon & Schuster.
Johnson, J. (2006, January). Transmissions from
the RFID front lines. RFID Watch.
Kaplan , R.S., & Norton, D.P. (1996). The bal-
APPenDix: ABBReViAtionS USeD
anced scorecard: Translating strategy into action.
Boston: Harvard Business School Press.
CCR: cash contribution ratio
Latzko, W.J., & Saunders, D.M. (1995). Four days DC: distribution center
with Dr. Deming: A strategy for modern methods DSD: direct store delivery
of management. Boston: Addison-Wesley. ERP: enterprise resource planning
ES: economic surplus
Robeson, J.F., & Copacino, W.C. (1994). The
GMROI: gross margin return on invest-
logistics handbook. New York: The Free Press.
ment
Senge, P. (1990). The fifth discipline: The art & IQ: intelligence quotient
practice of the learning organization. New York: POS: point of sale
Doubleday. RFID: radio frequency identification
ROA: return on assets
Srinivas, S. (2003, April). Leveraging technol-
SQ: supply chain quotient
ogy to improve supply chain performance. In
VAE: value added by employees
Proceedings of the 2003 Supply Chain World
VAP: value added productivity
Conference, Atlanta, GA.
VMI: vendor managed inventory




About the Authors

Qingyu Zhang is associate professor of decision sciences and MIS at Arkansas State University
(USA). He has published in Kybernetes: The International Journal of Systems and Cybernetics, Industrial
Management & Data Systems, International Journal of Services Technology and Management, Sup-
ply Chain Management: An International Journal, Journal of Operations Management, International
Journal of Operations and Production Management, International Journal of Production Research,
International Journal of Production Economics, International Journal of Logistics Management, Inter-
national Journal of Product Development, International Journal of Quality and Reliability Management,
European Journal of Innovation Management, and APICS: The Performance Advantage. Dr. Zhangs
research interests are supply chain management, value chain flexibility, e-commerce/e-business, Web-
based information systems, and product development.

***

Latif Al-Hakim is a senior lecturer of supply chain management in the Department of Economics
and Resources Management, Faculty of Business at the University of Southern Queensland, (Australia).
His experience spans 35 years in industry, research and development organizations, and universities.
Dr. Al-Hakim received his first degree in mechanical engineering (1968). His MSc (1977) in industrial
engineering and PhD (1983) in management science were awarded from University of Wales, (UK). He
has held various academic appointments and lectured on a wide variety of interdisciplinary manage-
ment and industrial engineering topics. He has published extensively on facilities planning, informa-
tion management, and systems modeling. His research papers have appeared in various international
journals, and have been cited in other research and postgraduate works. Dr. Al-Hakim is editor of the
International Journal of Information Quality and associate editor of the International Journal of Net-
working and Virtual Organizations.

Copyright 2007, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited.
About the Authors

Ozlem Bak is a member of the Strategic Operations Management Center, and taught seminars in
operations strategy and management at the University of East Anglia. She currently teaches as a lecturer
in supply chain management, international operations, and e-logistics at the University of Greenwich,
(UK). Her principal research interest is in the area of manufacturing operations management and espe-
cially on the value shifts within automotive supply chains. She also worked in multi-national automotive
corporations and on project management for companies in professional sectors in Germany, the UK, and
Turkey. Her research interests are supply chain management, value creation, marketspace, transforma-
tion, and the automotive industry.

Wade H. Baker is a PhD candidate in the Department of Business Information Technology at Virginia
Tech (USA), and an information risk management consultant for Cybertrust. His academic and profes-
sional interests involve information security, risk modeling and management, business intelligence, and
decision support systems. His work in these areas has been published in several academic journals and
security magazines. He is a member of the Decision Sciences Institute, INFORMS, the Anti-Phishing
Working Group, and recently served as a research and technical consultant for the Presidents Informa-
tion Technology Advisory Council.

Patcharee Boonyathan is a PhD student in the Department of Management and Marketing at the
University of Melbourne (Australia). She received her BEng (civil) degree from Kasetsart University,
(Thailand) and her MEng (Industrial IT) from Swinburne University (Australia). She was a visiting
scholar working with Dr. Latif Al-Hakim at the University of Southern Queensland (AugustOctober
2003), where the research work in this book was done. She is particularly interested in the areas of sup-
ply chain strategies, supply chain collaboration, business process modeling, and business improvement.
Her PhD research is looking at the empirical investigation of the relationship between strategic response
to supply chain uncertainty, supply chain relationship, and firm performance.

Indranil Bose is associate professor of IS in the School of Business at the University of Hong Kong.
His degrees include BTech from the Indian Institute of Technology, MS from the University of Iowa, and
MS and PhD from Purdue University. He has research interests in telecommunications, data mining,
electronic commerce, and supply chain management. His teaching interests are in telecommunications,
database management, systems analysis and design, and data mining. His publications have appeared
in Communications of the ACM, Computers and Operations Research, Decision Support Systems and
Electronic Commerce, Ergonomics, European Journal of Operational Research, Information and
Management, and Operations Research Letters.

Elizabeth Chang is professor in the School of Information Systems and director of the Center for
Extended Enterprises and Business Intelligence at the Curtin University of Technology (Western Aus-
tralia). Her research interests include information hiding, cryptography, multi-site software engineering,
and ontologies.

Bintong Chen graduated from Shanghai Jiao Tong University of China with a BS in ship building
and electrical engineering (1985). He obtained his PhD degree in operations research/management from
the Wharton School of the University of Pennsylvania (1990). Since then he has been working for the
Department of Management and Operations of Washington State University as assistant, associate, and


About the Authors

full professor. He was recently named the Don and Mary Ann Parachini faculty fellow by the College
of Business. He is currently a senior editor for Production and Operations Management Journal. His
research interests include continuation methods for complementarity problems, optimization techniques,
and their applications for business problems. More recently, he has been working with his students on
optimization models for supply chain management.

Ron Craig is professor of business in the Operations and Decision Sciences area of the School of
Business & Economics at Wilfrid Laurier University (Canada). His research interests cover small busi-
ness and information systems; he has published several articles and cases in these areas.

Gavin Finnie is professor of IS and director of the Smart Enterprises Research Center at Bond
University (Australia). His current research interests are primarily in the areas of AI/expert system
applications in information systems, intelligent agents and electronic commerce with a specific focus
on applications of artificial intelligence, and case-based reasoning in supply chain management and
electronic bargaining. Dr. Finnie is a member of ACM, ACS, and AIS.

John Hamilton is the director of e-business at James Cook University (Australia). His extensive
domestic business ownership and management experience includes: importing, exporting, mining,
rural, wholesale, manufacturing, and several small-medium businesses (supermarket, video wholesale,
fashion stores, florist/gifts, restaurants). His international business experience includes: sapphire mining,
processing, and gemstone sales; plastics manufacturing; importing/exporting; and international finance.
He has extensive consultant, business, management, and research experience. He is an active researcher,
and his current specializations include: development of strategic Web-based instruments including QFD,
strategic positioning, strategic e-marketing, logistics, strategic e-business models, and service value
networks. He is currently engaged in developing smart business networks delivering industry-wide new
technology solutions; and in the performance, value, and alignment of customer-business interfaces. He
is manager and research director of a major CRC.

R. Manjunath is a research scholar from the Visveswaraiah College of Engineering, Bangalore


University (India). His doctoral thesis spans signal processing, neural networks, data transfer over the
network, and data integration. He has published about 55 papers in international conferences and jour-
nals in diverse areas involving the applications of signal processing. He has chaired many international
conferences. His research interests include networking, signal processing, supply chain, and database
architecture. He has industrial and academic experience over 11 years in various fields including signal
processing, data transfers, data organization, and neural networks.

Charles L. Munson is associate dean for graduate programs in business at Washington State Uni-
versity (USA). His PhD and MSBA in operations management, as well as his BSBA, summa cum laude,
in finance, are from Washington Universitys John M. Olin School of Business. He formerly worked as
a financial analyst for Contel Corporation. He currently serves as vice chair of the board of directors of
the WSU Presidents Teaching Academy. His primary research interests include supply chain manage-
ment, quantity discounts, and international operations management. He has published articles in IIE
Transactions, Naval Research Logistics, Production and Operations Management, Decision Sciences,
Journal of the Operational Research Society, Interfaces, and Business Horizons.


About the Authors

Raktim Pal is assistant professor at James Madison University (USA). He holds a PhD in trans-
portation systems from Purdue University. Also he has a BTech (Hons) in civil engineering from the
Indian Institute of Technology, and MS degrees in civil engineering and industrial engineering from
Purdue University. His research interests are in the areas of supply chain management and logistics,
transportation systems modeling, electronic commerce, and applied operations research. His publica-
tions have appeared in ASCE Journal of Transportation Engineering, Communications of the ACM,
Computers and Operations Research, European Journal of Operational Research, and Transportation
Research Record.

Vidyasagar Potdar is a doctoral candidate working on information hiding techniques like steg-
anography and watermarking. He is associated with the Center for Extended Enterprises and Business
Intelligence, Curtin University of Technology (Western Australia).

Chunming (Victor) Shi is a PhD candidate at the College of Business, Washington State University
(USA). He received the BEng degree from the Department of Automation and the BBA degree from the
Department of Management Science, University of Science and Technology of China. His MEng degree
is from the Department of Electrical and Computer Engineering, National University of Singapore. His
research interests are in supply chain coordination, electronic commerce, price optimization, and other
applications of operations research. His previous research has been published in the Journal of the
Operational Research Society and IEEE Transactions on Systems, Man, and Cybernetics.

Gregory E. Smith is an assistant professor in the Department of Management Information Systems


at Xavier University (USA). He received his PhD in business information technology from Virginia
Tech. He also holds an MA in actuarial science from Ball State University and a BS in mathematics
from the University of Scranton. Dr. Smiths research interests center on the integration of computers,
mathematics, and artificial intelligence to solve business problems. He is a member of DSI, INFORMS,
POMS, and APICS.

Srikanth Srinivas is the managing partner of Opex Partnersa U.S. firm that specializes in helping
clients achieve breakthrough performance by creating a sustainable, actionable performance manage-
ment framework that enhances organizational capability systematically. He has extensive experience
in the areas of performance management, supply chain and information technology, and has added
significant value to customers in the United States, Australia, China, India, Korea, Mexico, Singapore,
and Taiwan. He is the author of Shocking Velocity! Rapidly Achieve More with Less, a book that has
received rave reviews.

Zhaohao Sun is a lecturer in information systems at the University of Wollongong (Australia). He


holds BSc, MSc, MSc, and PhD degrees from Hebei University, Brandenburg Technical University
Cottbus, and Bond University. He has experience of working as a lecturer at Hebei University, a visit-
ing scientist at RWTH Aachen, and a research assistant at both Technical University Cottbus and Bond
University. He has more than 70 publications including a monograph published by Springer (2004). His
current research interests are intelligent techniques in e-services, e-commerce, knowledge/experience
management, and case-based reasoning. He is a member of IEEE and AIS.


About the Authors

Pierre F. Tiako is a faculty member of computer science and information systems, and the director
of the Center of IT Research at Langston University (USA). Prior to his current position, he worked as a
visiting professor at Oklahoma State University and as an expert engineer at INRIA, the French national
institute for research in information technology. He also taught in several French research universities,
including the University of Rennes and Nancy. He is currently a member of IEEE and chairman of the
IEEE Oklahoma City Computer Society, as well as a member of the U.S. Association for Small Business
and Entrepreneurship, the Association of Collegiate Business Schools and Programs, and the Interna-
tional Council for Small Business. He earned a PhD in software and information systems engineering
from the French National Polytechnic Institute of Information Technology.

Kevin James Watson is an assistant professor in the Department of Management at the University of
New Orleans (USA). His academic and professional interests involve supply chain management, process
design/improvement, environmental management, and the theory of constraints. He has published a
number of articles in academic journals including the Journal of Operations Management, International
Journal of Production Research, and Management of Environmental Quality.

Chen Wu is a doctoral candidate working on distributed services architecture, service quality, and
service mediation. He is associated with the Center for Extended Enterprises and Business Intelligence,
Curtin University of Technology (Western Australia).

Shilei Yang is a PhD candidate in operations management at Washington State University (USA).
His BS in management science and BE in computer science are from University of Science and Technol-
ogy of China. Then he obtained his MA in economics and MS in mathematics from Middle Tennessee
State University (USA). His primary research interests include supply chain coordination, inventory
control, and optimization.

Alex Ye is currently pursuing his MBA at the University of Hong Kong. He holds an undergraduate
degree in mechanical engineering from Zhejiang University of China. His interests are in the areas of
supply chain management, information technology, and finance. He has extensive industry experience
in the area of implementation of information systems.


288 Index

Index

Symbols ANSI 206


application service provider (ASP) 49
80/20 rule 267 areto-optimal contract parameters 236
ARMA 253
A
artificial intelligence (AI)
abduction 184 85, 87, 173, 175, 185
with trick 184 asset velocity 271
accounting and financial analysis subsys- automated
tem 213 identification and data capture
acknowledgement (ACK) 257 (AIDC) 113, 138
active inventory control systems (AICS)
jamming approach 137 113
RFID tags 115, 118 auto regressive (AR) 253
advanced
encryption standard (AES) 135 B
planning systems (APSs) 38, 163 backend internal database 122
agents 199 bad variety 267
agile balanced scorecard
environment 3 69, 70, 73, 74, 262
manufacturing 2 barcode 113, 223, 273, 276
supply chains 42 printers 223, 225
model 60 benchmarking 3, 5
agility (variability) 42, 43, 91, 279 bottleneck effect 86, 91, 216
Amazon.com 23 brick-and-mortar
ANNs 254, 255, 257 services 88
Index 289

stores 23 filtering techniques 188


bricks-and-clicks solution 104 collective case-based reasoning (Col-
broad service value networks 89 CBR) 179
broker model 258 commerce portal 64
buffer overflow attacks 149 common object request broker architec-
bullwhip effect 84, 90, 93, 273 ture (CORBA) 202, 203, 206
business communication 90
block 70 competitive advantage 37, 69
e-supply chain 69 continuous process improvement (CPI)
models 71 11, 18
process reengineering (BPR) control
3, 5, 11, 18 loop 258
strategies 211 risk 147
value 64 coordinating contracts 245
business-customer core
dyad 102 competency (CC) 125, 129
encounter 87 functions 42
business-to-business (B2B) 44, 163, 16 cost
6, 198, 199, 200, 206 of goods sold (COGS) 271
e-commerce 83 reductions 90
integration 48 critical variables 262
supply chains 196 cryptographic protocols 137
business-to-consumer (B2C) customer
198, 199, 201, 206 behavior models 59
dyad 88 complaint handling 90
e-commerce 83 demand-driven needs 81
buy back (BB) 233, 234, 236, 246 experience management (CEM)
contracts 239 173, 176
buyer manager (control agent) 180 interface 177
relationship management (CRM)
C 38, 39, 163, 176, 181
case-based reasoning (CBR) 178, 179 systems 38, 39
cash contribution ratio (CCR) responses 2
264, 265, 282 satisfaction 61, 90
cause-effect relationship 277 targeted component 82
change management 262 targeting 93
closed-loop algorithm 258 touch-points 90
coalition for supply chain 195 value 64
collaboration 143, 145 customer-perceived
technologies 274 satisfaction levels 91
tools 165 value 103
collaboration, coordination, and coop- cycle time 269
eration protocols (3C) 189 D
collaborative
commerce 48 data
290 Index

management 122 process models 199


network 255 relationships 195
tampering 134 solutions 42, 46
decentralized supply chain 233 technologies 163
delivery reliability 90 coalition (e-coalition)
demand 195, 199, 202, 204
chain 62 models 199
management 61, 62 commerce (e-commerce) 2, 34, 40,
model 65 41, 173, 175, 178, 195, 196,
selling 62 197, 202, 233
pull system 227 models 195
risk 147, 148 data interchange (EDI) 163, 197, 198
demand-supply chain model 65 , 206, 273, 276
denial of service attacks 149, 155 -CORBA 197
differential feedback-based model 253 -XML 197
differentially fed artificial neu- structures 196
ral network (DANN) economy (e-economy) 36
254, 255, 256, 259 Kanban (e-Kanban) 227
direct store delivery (DSD) 270, 282 card 228
distributed network (e-network) 2, 4
case-based reasoning (DistCBR) 179 organizational (e-organizational) goals
component object model (DCOM) 46
202, 206 process (e-process) mapping 4
order management 64 product code (EPC)
supply units 252 data 122
distribution centers (DCs) 23, 25, 123, specifications 137
265, 267, 270, 275, 282 purchasing (e-purchasing) 60
dual development e-strategy 105 retailers (e-retailers) 25, 65
services (e-services) 176
E balanced scorecard 73
E2Open 43 industry 74
early adaptors 35 operation 55
earnings per share (EPS) 263 supply chain (e-SC) 60, 153, 159,
EC 197 173, 174, 177, 179, 188, 189,
economic surplus (ES) 263, 282 190, 263
economies of scale 81 networks 74, 75
electronic system 179
business (e-business) 1, 38, 40, 43, technologies 262, 263, 266, 269,
48, 60, 179, 199, 203 276, 281
-to-consumer solutions 65 supply chain management (e-SCM) 2,
-to-e-business solutions 65 3, 4, 5, 10, 36, 40, 44, 47,
applications 88 48, 49, 157, 174, 175, 178,
environment 175 216, 223, 225, 226, 230
network 38 environment 2
processes 202, 204 projects 45
Index 291

system 212, 217, 220, 222, 224, 41, 42, 75


225, 227, 229 front office 92
supply chain management business fuzzy logic
processes improvement (eSCM-I) methodologies 87
11, 12, 19 principles 85
theft 149
emergency lateral transshipment 24 G
end-to-end Gen-2 RFID tags 134
supply chain 260 global and local (glocal) solution 75
visibility 44 good variety 267
enterprise Green scheduling algorithm 257
resource planning (ERP) 38, 45, 46, gross
123, 163, 209, 223, 225, 226, domestic product (GDP) 36
229, 273, 282 margin return on investment (GMROI)
systems 38, 113, 209, 210, 211, 264, 265, 282
212, 214, 215, 217, 218, 220,
222, 224, 225, 274 H
systems (ESs) 38, 39
environmental risks 148 hacking 149
event management software 39 handheld readers 119
evolving supply process 60 hash-based access control protocol 135
expected profit maximization (EPM) high
244, 245 agility 69
expected utility maximization 244 frequency (HF) 115, 117, 119, 121
experience human resources subsystem 213
-based reasoning (EBR) 173, 185 Hypertext Transfer Protocol (HTTP)
management (EM) 173, 175 203, 206
extensible markup language (XML)
206, 224, 228, 229, 259, 276 I
documents 123 ICOM 7
files 216 IDEF0 7, 13, 14, 19
external models 8
business customer category 91 process mapping modeling technique
customer 91 2
services component 82 techniques 3, 4
extranets 60, 166 immediate services business 59
inbuilt volatile memory 121
F industrial, scientific, and medical (ISM)
Faraday cage 137 applications 118
fifth-party logistic providers (5PL) 41 information
first and communication technologies
-in-first-out (FIFO) 216 (ICTs) 34, 35, 38, 41, 46, 173
-tier suppliers 59 leakage 153
fixed RFID readers 119 sourcing 89
fourth-party logistic providers (4PL) systems (IS) 173, 175
292 Index

technology (IT) knowledge management (KM)


14, 84, 143, 149, 209 85, 173, 175
-enabled supply chains 145
-facilitated collaboration 143 L
-specific threats 143 "Love Bug" virus 155
adoption 40, 48 large businesses 35
infrastructures 47, 93, 226 last-in-first-out (LIFO) 216
online (ITOL) 42 late adaptors 35
risk management 143, 151 lead
security 145, 148, 149, 153 -lag components 253
solutions 44 times 91, 269
systems 90, 158 Lean 279
innovators 35 legacy systems 220
input low
/output (I/O) controller 120 -uncertainty, stable markets 60
variability 272 frequency (LF) 115, 116, 119, 121
intangible (virtual) balanced scorecard service integration 89
measures 73 LP Rule 29
integrated LRD 256
services schematic 58
supply chain division (ISCD) 43 M
integration management 122, 143
intelligent Web site 85 malicious code 149
internal man-in-the-middle attacks 149
business-to-business customer cat- manufacturing
egory 91 resource planning (MRP) 38, 123
customer 91 subsystem 213
services component 82 maturity level 280
Internet mean
business solutions (IBS) 42 -variance analysis 233
fraud 149 medium businesses 35
Inter-ORB Protocol (IIOP) 203, 206 micro businesses 35
protocol version 6 (IPv6) 86 Ministry of Economic Affairs, Small and
interoperability 259 Medium Enterprises Administra-
intranets 60 tion (MOEASMEA) 41
inverse modus ponens (IMP) 185 mobile business (m-business)
applications 88
J units 252
modus ponens (MP) 184, 188
Java Virtual Machine (JVM) 202, 206 with trick (MPT) 184, 186
K modus tollens (MT) 184
moving average (MA) 253
Kanban system 227 multi-agent
kill tag approach 137 electronic supply chains (MESC)
179, 182, 186, 188
Index 293

system for cooperation and negotia- participation constraint (PC)


tion in electronic supply chains 235, 236, 237
(MCNES) 180, 181 passive RFID tags 115
systems (MASs) 173, 178 peer-to-peer
multi-frequency client-server communication 145
operation readers 120 processing 90
tags 119 performance
blocks 83
N management 262
natural language interpretations 87 measures 281
nearest rule 28 targets 233
need time 269 phishing 149
network risks 147 physical
newsvendor model 234, 235, 236, 239 encounter system 93
non-emergency transshipmen 24 value chain 65
normative service models 59 pipeline
design 42
O structures 43
point of sale (POS) 113, 124, 282
object request brokers (ORBs) 203, 206 data 274, 275
on-time delivery 90 portable RFID readers 120
open-EDI 197 process
operating resource management 38 management 2
operational velocity 271 mapping 4
operations concept component 82 measurement 3, 5
optimization 279 risk 147
ordering processes 62 variability 272
organizational risks 147 production supply chain 195
original equipment manufacturer (OEM) putaway accuracy 124
167
output variability 272 Q
outsourcing 42
qualitative risk measurement 147
P quality of service (QoS) 252, 253, 258
quantity flexibility (QF) 233, 236, 246
"pull" model 196 contracts 234, 241
"push" model 196
Pareto-optimal 234, 235, 236, 237, R
238, 240, 242, 243, 245, 246
, 250 radio frequency identifier (RFID)
buy back (BB) contracts 244 adoption strategy 125
order quantity 245, 249 antennas 131
profit allocation 244 interrogators (readers) 113, 114, 119,
quantity flexibility (QF) contracts 121, 122, 124, 131, 136
244, 248 middleware 114, 119, 120, 122, 123,
wholesale price (WP) contracts 244 132
294 Index

printers 131 supply chains 85, 89


systems 114, 116, 121, 123, 131, value chain 69
132, 138 network 90
technology 42, 43, 113, 114, 123, value network 81, 83, 93, 94
124, 127, 132, 135, 136, 138, strategy 105
274, 275, 279, 282 services
transponders (tags) management 55
113, 114, 118, 119, provision 93
120, 131, 137, 138 topologies 58
read-many tags 115 SET 206
read-only tags 115, 116, 118 simple authentication and security layer
read-write tags 115, 116, 118 (SASL) 135
random early prediction (REP) single frequency
algorithm 255, 258 operation readers 120
closed-loop algorithm 258 tags 119
feedback loops 258 Six Sigma 279
method 258 implementations 272
ratio rule 28 limits 272
reader API 122 SKUs 215, 218, 220, 227
RED 256, 257 small
algorithm 256 and medium-sized enterprises (SMEs)
gateway 257 34, 35, 37, 38, 40, 41, 43, 4
Responsive supply chains 60 6,
risk-aversion 233 47, 48, 167
ROA 282 adoption 46
ROI estimation 125 businesses 35
smart
S cards 113
sales and distribution (S&D) subsystem tag approach 137
212 stable supply process 60
SAP 210 strategic business unit (SBU) 165
SBU level 170 structural equation modeling (SEM) 40
scheduling flexibility 90 supplier relationship management
security 122 (SRM) 163
seller (supplier) agent 180 systems 38
semi-active (semi-passive) RFID tags supply
115 networks 102
service risk 147
concept component 82 supply chain (SC) 36, 37, 45, 61, 14
delivery mechanisms 81 5, 152, 163, 170, 173, 174,
demand chain integration 89 189,
quality impact models 59 196, 199, 243, 245, 253, 254,
quality parameters 253 258, 259, 262
sector 55 aggregators 69
strategy triad 58 agility 46
Index 295

BPI procedure 12 transmission control protocol/Internet


collaboration 44, 144 protocol (TCP/IP) 203, 206
coordination mechanisms 10 Local Area Network 223
management (SCM) networks 209, 221
1, 10, 34, 36, 37, transshipment models 24
38, 39, 41, 44, 46, 59, 61, 12 transshipments 23
4,
143, 149, 164, 167, 168, 173, U
175, 209, 254, 259 ultra high frequency (UHF)
applications 40 115, 117, 119, 121
business units 164 uniform rules of conduct for interchange
infrastructure 44 of data by teletransmission (UN-
level 170 CID) 197
models 259 unique item identifier (UID) 135
portals 40 upstream amplification 84
quartile 167
strategic business unit 166 V
systems 45, 113, 211
model 255 value
operations reference (SCOR) -effector blocks 83
5, 14, 18 added by employees (VAE) 264, 282
process reference model 3 added productivity (VAP) 264, 282
operations refernce (SCOR) 11 chain 55, 64, 65, 66, 85
partnerships 92, 156 management model 65
projects 44 relationships 66
quotient (SQ) 282 variability 272, 273
relationships 43 variety 265
risk 143, 148 velocity 269, 270
strategies 43, 211 vendor-managed inventory (VMI)
structure 62 275, 282
visibility 39 virtual
Supply Chain Council (SCC) 3 global presence 90
system architecture design 209 service
business 89
T encounter 88, 90, 93
value 89
tags 121 value chain 65
authentication 135 visibility 273
placement and tag orientation (TPTO) voice and facial recognition 113
134 volume flexibility 90
tangible (physical) balanced scorecard
measures 73 W
telnet protocol 225
third-party logistic providers (3PLs) 41 warehouse management systems
touch-points 83 (WMSs) 113, 122, 123
TQM 272, 279
296 Index

Web 279
-based application 220
-based customer relationship manage-
ment (e-CRM) 60
white space 269
wholesale price (WP)
233, 234, 236, 246
contract 236, 238
winner's mindset 279
wireless network 223
WISE 204
write-once
read-many (WORM) tags 116, 118
RFID tags 115

S-ar putea să vă placă și