The effects of vulnerability mitigation strategies on supply chain effectiveness: risk culture as moderatorThe effects of vulnerability mitigation strategies on supply chain effectiveness: risk culture as moderator

被引:106
作者
Kurniawan, Rofyanto [1 ]
Zailani, Suhaiza Hanim [2 ]
Iranmanesh, Mohammad [3 ]
Rajagopal, Premkumar [4 ]
机构
[1] Univ Sains Malaysia, Sch Management, George Town, Malaysia
[2] Univ Malaya, Fac Business & Accountancy, Kuala Lumpur, Malaysia
[3] Multimedia Univ, Fac Business, Melaka, Malaysia
[4] Malaysia Univ Sci & Technol, Transportat & Logist Dept, Kuala Lumpur, Malaysia
关键词
Risk management; Effectiveness; Supply chain vulnerability; MANAGEMENT; PERFORMANCE; IMPACT; MODELS; COMMUNICATION; DISRUPTIONS; RESILIENCE; SELECTION; LESSONS; CRISIS;
D O I
10.1108/SCM-12-2015-0482
中图分类号
F [经济];
学科分类号
02 ;
摘要
Purpose - The vulnerability issue in supply chains is among the most pressing concerns that firms are currently facing. As a preliminary attempt to address the lack of empirical research, this paper aims to primarily explore the relationship between vulnerability mitigation strategies and supply chain effectiveness with security culture as a moderator. Design/methodology/approach - Data are gathered via a survey of 209 Indonesian manufacturing firms. The data are analyzed using partial least squares technique. Findings - Results indicate that supply chain visibility, supply chain flexibility and supplier development strategies positively affect supply chain effectiveness. Moreover, risk culture positively moderates the effects of supply chain visibility and supplier development on supply chain effectiveness. Practical implications - The findings may improve supply chain effectiveness by mitigating the effects of vulnerability causes. Originality/value - This study contributes to the advancement of knowledge on the relationships between vulnerability mitigation strategies and supply chain effectiveness.
引用
收藏
页码:1 / 15
页数:15
相关论文
共 111 条
[91]  
Stanley FE., 2000, INT J PHYS DISTRIB L, V30, P472
[92]   Sources of Supply Chain Disruptions, Factors That Breed Vulnerability, and Mitigating Strategies [J].
Stecke, Kathryn E. ;
Kumar, Sanjay .
JOURNAL OF MARKETING CHANNELS, 2009, 16 (03) :193-226
[93]   CROSS-VALIDATORY CHOICE AND ASSESSMENT OF STATISTICAL PREDICTIONS [J].
STONE, M .
JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES B-STATISTICAL METHODOLOGY, 1974, 36 (02) :111-147
[94]  
Svensson Goran., 2004, INT J PHYS DISTR LOG, V34, P728
[95]   The antecedents of supply chain agility of a firm: Scale development and model testing [J].
Swafford, PM ;
Ghosh, S ;
Murthy, N .
JOURNAL OF OPERATIONS MANAGEMENT, 2006, 24 (02) :170-188
[96]  
Tang C.S., 2006, International Journal of Logistics: Research and Applications, V9, P33, DOI [10.1080/13675560500405584, DOI 10.1080/13675560500405584]
[97]  
Tyndall G., 1998, SUPERCHARGING SUPPLY
[98]   Cultural influences on risks and risk management: six case studies [J].
van Vuuren, W .
SAFETY SCIENCE, 2000, 34 (1-3) :31-45
[99]   Assessing the vulnerability of supply chains using graph theory [J].
Wagner, Stephan M. ;
Neshat, Nikrouz .
INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 2010, 126 (01) :121-129
[100]   USING PLS PATH MODELING FOR ASSESSING HIERARCHICAL CONSTRUCT MODELS: GUIDELINES AND EMPIRICAL ILLUSTRATION [J].
Wetzels, Martin ;
Odekerken-Schroder, Gaby ;
van Oppen, Claudia .
MIS QUARTERLY, 2009, 33 (01) :177-195