What You Should Do About Tainted Goods from China and Other Global Supply Chain Risks
- 25 September, 2008 09:50
The US government warnings about tainted imports from China are ominous and ongoing. In July 2007 poisonous chemicals were found in toothpaste. This was just a month after imports of farm-raised Chinese seafood and lead paint in Thomas the Tank Engine toy trains were detained. And May had seen contaminated pet foods sicken and kill thousand of US cats and dogs. Now its humans, when earlier this month every parents' nightmare became a reality: Melamine contaminated infant formula poisoned more than 50,000 Chinese infants and resulted in at least four deaths.
While much government attention focuses on the problems in China, experts say the emergence of these deficient goods highlights the risks associated with today’s global supply chains. The far-flung networks of suppliers and transportation systems connecting them to their destinations present a new set of challenges.
Longer supply chains mean more participants, and with that, come bigger risks. “There are more people that companies need to watch and make sure they trust,” says Yossi Sheffi, professor of engineering at MIT and an expert in risk analysis and supply chain management. Supplier visibility is a problem for many organizations, according to Mark Hillman, a research director at AMR Research, who says many companies operating globally don’t know every player in their supply chain as well as they should. In addition, increased speed means decreased time for product checks. Goods rarely stagnate in warehouses, so there is less opportunity to conduct quality checks, says Sheffi.
Such threats to the supply chain increase the importance of security, which like any other type of risk management, can be a hard sell. Getting it in place can be costly, and ROI is hard to justify, unless, of course, something goes wrong. The key to selling security, experts say, is to emphasize the collateral benefits—the kind of ROI that will be realized regardless of disaster. A 2006 Stanford report, which studied the supply chain behaviors of 11 logistics companies that are considered innovators in supply chain security, outlines some of those benefits: improved efficiency, better customer satisfaction, better inventory management, and reduced cycle and shipping time. (See a copy of the study here.)
Below are some of the most common supply chain risks according to Sheffi and Hillman, and ways you can manage them through security, resilience and vigilance.
What Can Go Wrong in a Global Supply Chain
The unexpected loss of a supplier: According to a study conducted by AMR Research in 2006, the number-one concern across industries is supplier failure and continuity. It’s particularly difficult to keep track of suppliers that may go out of business with little forewarning when you outsource, says Yossi Sheffi, an MIT professor and supply chain risk expert. “Suppliers in the US or Europe are easier to manage than those in the bowels of China.”
Geopolitical problems: A terrorist attack in the area of a major port can cause significant disruptions or shut down service altogether.
Damage to the brand: This could be related to product safety or counterfeiting, says Sheffi. “A company’s suppliers might be using child labor or sweatshops, or stealing intellectual property and copying the brand.”
Natural disasters and diseases: A hurricane near a major port, a disease outbreak (such as avian flu) or any other natural event over which there is limited control.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Queensland government to provide 200 services online by 2015
Call Centers Suffer From Big Data Overload
CIO 100: Carsales wins top gong for innovation
How to secure passwords and other critical numbers
Australian National University streamlines IT
Leveraging DCIM Software
Business executives are challenging their IT staffs to convert costly data centres into producers of business value. Only with higher visibility, more control and improved automation of reporting systems can help deliver on this commitment. Holistic management capabilities available today can enable data centre professionals to maximize their capacity to control their energy costs and to advise the business on how to utilize IT assets more effectively. This paper demonstrates how data centre infrastructure management (DCIM) software tools can simplify operational processes, cut costs, and speed up information delivery.
Embracing Behaviour-Based Pricing Models
The telecommunications industry is one of the most challenged, fast-moving and evolving industries thanks to the worldwide embrace of mobile lifestyles that demand new services, solutions and experiences. In this survey, we investigate where and how new thinking around data, analytics and the actionable customer intelligence can further monetise mobile subscribers. Click to download!
Desktop Virtualisation For All - Technical Overview
Many organisations embarking on the desktop virtualisation journey believe they need to follow the virtual desktop infrastructure (VDI) model where each user receives a virtual machine hosted in the data centre. Even though VDI is a great option, it is not the only one. In this whitepaper, we explore how IT departments can quickly and securely deliver virtual desktops and applications to any user in the enterprise. Download to find out more.