Brookline College Phoenix Managing Resources Questions

User Generated

SPOZRFFV10

Writing

Brookline College Phoenix

Description

1. In what two ways does sustainable supply chain present opportunities for firms in their global operations?

2. Does is make sense for buying firms to impose their sustainability standard on suppliers often at cost to the suppliers?

Please use the questions as your main section headers for your paper.

NOTE: This assignment should not exceed two (2) pages. It should be double spaced, using 12-point Times New Roman font, or its equivalent. Be as detailed as you can and Question needs to be backed by numbers, facts, graphs etc. Outside source needs to be cited.

Submit your MS Word assignment using the Turnitin dropbox located in the Assignments area of the course.

Following Instructions are a must:

1. I wanted to send a few tips in regards to writing that will make the great points in your papers even better, more convincing, and more robust. Whenever you make a statement of opinion or assertion, you should address at least one of these questions; why? so what? how? like what? or who cares?. If the opinion or assertion cannot answer or address at least one of the questions above, you should rewrite it.

2. You can support your opinion in one of two ways. The first way is to state your opinion, and then through an exercise of breadth and depth and critical analysis you simply support your opinion by explaining why, so what, who cares, how, like what, etc. Or, in other words you explain why your opinion is credible, believable, and informed. The second way to support your opinion is to find referenced material that agrees with you. Combining both methods together is the benchmark. By doing one or the other, or both, you bring context and credibility to the opinions you present. Thus, your great opinions become believable.

Unformatted Attachment Preview

Why Protect Intellectual Properties (IP)? Intellectual property offers an opportunity for firms to gain competitive advantage. The lesson readings highlight the benefits and risks involved in managing intellectual properties in supply chains. Intellectual properties are usually in the form of patents, copyrights, trademarks, and trade secrets. Company can issue licenses for use of their IP from which they receive royalties. In other cases, companies have sued their competitors for using their intellectual property, sometimes receiving huge compensation. Thus, protecting intellectual property affords companies the opportunity to leverage their discoveries, brand name, or trade secrets (such as information about a company process, data, designs, blueprints, formulas, ingredients, research & development activities, etc.) to gain revenue or competitive advantage. It is imperative that they protect IP especially when they engage in supply chain relationships. In supply chain exchanges, firms are expected to share information about products, demand, markets, etc. Sharing knowledge can results in mutual gains but also has risk potential. Managing knowledge in supply chain exchanges is critical especially for firms with global operations. Why Focus on Knowledge Management in Supply Chains? There are several reasons why managers need to focus on knowledge management. 1. With increased outsourcing of critical functions such as manufacturing, firms will need to share proprietary information in order to achieve the outsourcing goals. This exposes the firm to potential misuse of IP. 2. With globalization of operations, firms are engaged in business activities in different parts of the world. Some of the countries where firms operate have very weak IP protection laws. For example, there are many cases of IP loss in China, which is partly blamed on weak laws governing protection of IP. 3. Licensing relationships are typically complex and difficult to monitor. As such, licensees may act opportunistically with the knowledge that the licensor may not have ability to monitor or enforce the licensing agreement. 4. Many companies are dependent on information that is shared both internally and externally. Indeed, with increased external hosting of company information (i.e., cloud computing, software hosting, file sharing, etc.), the risk of information loss is even higher. Thus, increased flow of information between companies may raise the potential for IP loss as well as other information security breaches. 5. There is high employee mobility between companies. These employees possess tacit knowledge about their past employers and sometimes information about IP. The potential for IP leakage is therefore increased. As a result, supply chain managers need to take a keen interest in knowledge management. What are Challenges in Protecting Intellectual Property? Managers and supply chain firms encounter many challenges when protecting their IP. 1. Many companies are monetizing their IP assets through direct sales of underutilized IP assets, enforcing piracy infringement, etc. This is partly to minimize the losses of IP but also to generate new revenue streams. After all, if the IP assets have not been used in the past except illegally, then holding them may not offer much competitive edge. 2. Many companies are also adopting mechanisms to ensure that licensing relationships benefit them. However, this is not an easy task because licensing relationships are typically difficult to manage. 3. In addition, enforcement of licensing and other IP protections in many countries is inadequate. This is further compounded by increased risks of potential IP leaks as more companies engage in extensive supply chain networks. Summary • • • • Firms need to focus on knowledge management not only because of its potential for competitive advantage but also because of the increased risk of IP loss in supply chain exchanges. Firms need to take cognizant of IP protection laws and enforcement when entering foreign countries. This is because the risk IP loss may be higher in these markets, which could undermine the firms’ entry to the market in the first place. Managers need to develop effective knowledge management measures especially in supply chain exchanges. These include the need to use relationship governance mechanisms, not just formal governance (contracts) in markets where contracts are difficult to enforce. Managers should explore the revenue generating potential of IP assets. Leveraging such assets can be a major source of revenue and competitiveness. Introduction Global supply chains are characterized by greater risks and security concerns. As a result, companies need to develop mechanisms to reduce risks or mitigate consequences of risk occurrence. Increased concerns regarding the security of goods in-transit, or the disruption to supply because of terrorism, has led many companies to review their supply chains and develop contingency plans. This lesson addresses these issues by examining various risk and security management challenges in the global supply chain. Risk Management (1 of 3) Risk is the expectation that an adverse event will occur that will be detrimental to the stakeholders in the supply chain. To understand the significance of the risk, it is important to know (1) the probability of an adverse event happening and (2) the losses associated with the event. Risk management involves identifying the sources and nature of risk, assessing the consequences, and developing measures to avoid or mitigate risks. Managers are concerned with the probability of a risk occurring, the total effect (consequence) to the firm if the risk occurs, and what to do either to avoid or minimize the effect. There are different sources of risk in a global supply chain. These include natural disasters (hurricanes, floods, earthquakes), epidemics (SARS, avian flu), political instability (civil war, expropriation of assets, coup d'etat), operational risks (plant breakdown, material shortage, plant accidents that cause a shutdown), terrorism and other security threats, and so forth. These acts and events cause global supply chain disruption. The first reading this week (Manuj, Dittman and Gaudenzi 2007) classifies supply chain risks into four categories: supply risk, operational risk, demand risk, and security risk. Risk Management (2 of 3) Since different sources of risk cause different levels of disruption, profiling both risks and risk prone supply chain stages is difficult. Managers need to assess vulnerabilities in the entire supply chain. While specific risks create vulnerabilities, supply chain characteristics also contribute to vulnerability. For example, supply chains characterized by single sourcing, low buffer inventories, and/or just-in-time inventory systems tend to be more susceptible to disruption. Supply chain disruption results in increased cost, stockouts, delivery delays, congestion and increased transportation lead times, longer order cycle times, lower customer service levels, customer dissatisfaction, reduced sales, and lower performance. Consequently, managers need to develop risk mitigation strategies. Risk mitigation involves developing approaches to prevent or minimize negative effects of supply chain disruption. Companies often develop early warning systems to detect and communicate the occurrence (or potential for occurrence) of disruption. Doing so gives the company time to address the risk. Companies might have alternative sources of supply that can be activated at a short notice, alternative modes of transportation, back-up systems, and so forth. Risk Management (3 of 3) As a mitigation strategy, companies often prepare procedures to follow if a disruption were to occur. In addition, many companies are asking their suppliers to provide contingency plans that detail alternative plans in case supply disruption occurs. Increasingly, managers are taking a proactive approach in risk management where they assess risks in supply chain processes rather than waiting to respond to risk occurrence. Manuj, Dittman and Gaudenzi (2007) provide a comprehensive risk management process model which details five steps to improve risk management. The steps are: 1. 2. 3. 4. 5. Identifying and profiling risk Risk assessment and evaluation Managing risks and risk management strategies SC risk management strategy implementation Mitigating supply chain risks What are the Main Sources of Risks in Global Supply Chains? Supply risk – disruption in supply – supplier unreliability, price escalation, material shortages, quality issues, etc. Operational risk – disruption in operations – machine breakdown, limited capacity, material shortages, labor conflicts, etc. Security risk – disruption due to security breaches/ terrorism – loss of proprietary information, reduced brand equity, loss of revenue, legal liability, regulatory scrutiny, etc. Product and process complexity – dispersion of and higher number of partners, variety of transactions, longer lead times and order cycle times, more regulations, different time zones; currency fluctuations, etc. Increased points of contact – many parties handle shipments increasing risk of disruption. Country of origin risks – country specific risks such as political and economic instability, etc. Resource dependence – dependence on other firms for critical resources exposures firm to disruptive actions by partner. Natural disasters – Disruptions due to earthquakes, volcanic eruption, hurricanes, etc. Etc. Supply Chain Security Supply chain security refers to: "The application of policies, procedures, and technology to protect supply chain assets (product, facilities, equipment, information, and personnel) from theft, damage, or terrorism, and to prevent the introduction of unauthorized contraband, people, or weapons of mass destruction into the supply chain." Types of Security Measures Companies protect not only their physical assets but also information and proprietary technology. Security must be multilayered, as is the case. At a residential area, security starts with manned gates to the complex, buzzer doors at the entrance of each apartment building, and the door locks for each apartment unit. Yet, a resident will need to keep valuable items, such as jewelry and confidential documents, in a safe or in a hidden place in the apartment. Thus, although the gate is manned and the apartment is locked, the resident must at all times take measures to ensure security and prevent theft inside the apartment. The same multi-layered approach is needed to ensure supply chain security. Companies need to ensure physical security of their facilities (background checks, access control, gates, CCTV, guards, etc.) as well as IT systems security (passwords, restricted access, anti-virus, spam filters and intrusion detectors, etc.). Companies also need to ensure the security of goods in transit (freight security) and attendant information. Why Should Companies Invest in Supply Chain Security? (1 of 2) These questions point to problems managers face when initiating and implementing global supply chain security. Supply chain security is complex given the many parties, processes, and systems that make up the chain. Companies that invest in security can realize several benefits. Investing in security minimizes supply chain disruptions since companies are able to detect or respond to disruptions faster and more comprehensively. Disruption can lead to lost sales, the shutting down of production, and the failure to fulfill customer orders. Thus, it increases costs and impacts customer service. Managers can borrow lessons from the total quality management. In TQM, quality defects are expensive and need to be addressed at the source. TQM emphasizes prevention and tracking of quality defects, process control, and involvement of all personnel in quality management. Similarly, supply chain security should be addressed at the source, should be monitored continuously, initiatives should involve all supply chain partners, and supply chain processes should be evaluated from time to time to detect any security gaps. Why Should Companies Invest in Supply Chain Security? (2 of 2) Since the terrorist attacks on September 11, 2001, the U.S. government has engaged the business community in developing several initiatives designed to improve the security of cargo entering the U.S. As a result, there are increased security regulations that companies must comply with. These requirements include more inspections and paperwork for goods entering the U.S. Companies that join the government-business initiatives and meet security requirements benefit from less inspection and expedited paperwork when processing their shipments. Investing in security increases supply chain visibility because companies have a better understanding of supply chain processes and information flows. It also improves product safety by eliminating or minimizing gaps where safety could be compromised. In addition, companies improve process control by mapping the supply chain processes to identify security gaps. Other benefits of improved security include better inventory management, reduced inspections and border delays for goods coming into the country, reduced claims and insurance premiums, supply chain resiliency, higher customer satisfaction, and overall improved performance. Government-Business Security Initiatives (1 of 3) Most security initiatives adopted since September 11, 2001, often require the collaboration of the business community. In general, there has been an increase in security regulations and documentation, and inspections of goods entering the U.S. However, firms that meet certain security requirements, or who are known shippers, benefit from expedited shipments inspections at border points. As a result, companies are seeking intermediaries and third party logistics providers that clearly stipulate security procedures, and meet security compliance (including C-TPAT certification). Government-Business Security Initiatives (2 of 3) The government-business initiatives include: • Importer Security Filing (commonly referred to as “10+2” Rule) - Requires importers or their agents to file “10” data elements 24 hours prior to loading of vessels destined for U.S. and • • • • the vessel operator is required to submit “2” additional data elements 48 hours after vessels departs foreign port. The main aim is to stop high-risk cargo from entering the U.S. C-TPAT (Customs-Trade Partnership Against Terrorism) - This is a voluntary program to encourage supply chain parties to improve security. Companies are required to assess their security elements and meet minimum standards published by Customs and Border Protection. Companies that join C-TPAT benefit from reduced cargo inspections, priority inspections, reduced wait times at border, etc. CSI (Container Security Initiative) - This is a bilateral agreement that places U.S. inspectors in foreign ports to inspect high risk cargo destined for the U.S. The participating foreign ports are required to implement port security procedures and automated risk management systems, and to share data with Customs and Border Protection. FAST (Fast and Secure Trade) - This is a program that allows known low-risk participants to receive expedited border crossing clearance to/from Canada and Mexico. Companies benefit from dedicated lanes, reduced inspections, etc., at the border crossings. SFI (Security Freight Initiative) - This program combines container imaging and radiation detection equipment to inspect cargo destined for the U.S. The program tests the feasibility of 100% container scanning. If implemented, the program will allow faster access to the U.S. market. Government-Business Security Initiatives (3 of 3) The benefits of implementing supply chain security initiatives include increased disruption preparedness, improved shipment tracking and supply chain visibility, reduced transit (pipeline inventory), reduced pilferage, reduced stockouts, reduced cycle times with less inspection delays at ports of entry, and improved customer service. However, there are costs involved including the cost of changing processes to meet security requirements, security-related IT systems, redundancy (i.e., cost of maintaining excess capacity), limitations in supply chain partner choice (i.e., requirement for suppliers to meet specific security standards reduces the pool of suppliers from which a company can choose from), security compliance, increased supply chain complexity with the addition of a security management layer, etc. How Can Companies Improve Supply Chain Security? • • Companies can improve supply chain security in several ways. For example, Rice and Caniato (2003) discuss different approaches to improve supply chain security and resilience. (see Rice, J.B. & F. Caniato (2003), "Building a secure and resilient supply network," Supply Chain Management Review, (Sept/Oct 2003), pp. 22-30). Companies need to collaborate with supply chain partners in security initiatives. They need to define each company's role in ensuring a secure supply chain, and to share security goals, information on risk occurrence, contingency plans, etc. Managers need to realize that business and security goals sometimes conflict. For example, while a business strategy may be to work with fewer suppliers and the lowest bidder, security considerations demand working with a known shipper rather than the lowest bidder, and having alternate suppliers to reduce the risk in case the primary suppliers fail. In addition, stringent procedures to ensure security may reduce cost efficiency and responsiveness. Consequently, managers need to examine how security procedures affect the overall business strategy to align the strategies for effective and efficient operations. • Companies need to develop flexible capabilities that allow them to respond promptly to supply chain disruptions. Initiatives include postponement strategies, multi-skilled workforce, sourcing that allows the switching of suppliers, IT systems that provide greater supply chain visibility, and contingency procedures for supply and distribution operations. • Companies can build redundancy in their operations by maintaining a greater capacity to respond effectively to supply chain disruptions. For example, by maintaining a higher buffer inventory and excess production capacity a company can meet demand or ramp-up production in case of a supply chain disruption. • Companies need to elevate the importance of supply chain security, and have top management buy-in. This way, they can achieve the necessary investment in security initiatives and take the measures needed to respond to a security breach. • Companies need to acquire or invest in the IT systems necessary to enhance security. These include tracking capabilities, RFID technology, smart (tamper proof) containers, etc. • Companies can join government-business initiatives such as the C-TPAT and FAST to ensure expedited processing of their shipments at ports of entry. This reduces transportation lead time, order cycle time, and cost. • Companies need to adopt a security-conscious organizational culture, where every employee understands the importance of security, just as is the case with quality initiatives. • It is important that companies develop contingency plans. Already, some companies are asking their supply chain partners to provide contingency plans as a prerequisite to signing a contract. Such measures ensure that if a disruption occurs, the supply chain will be resilient and bounce back sooner. • Companies should use third party logistics providers that meet security requirements or are C-TPAT certified. They can also hire 3PL companies that specialize in supply chain security to help them develop secure processes and strategies. • Companies must keep themselves informed of the changing security environment. Government security compliance requirements keep changing, and companies need to be informed of these changes. They need to have the capability to detect changes in the environment that will have significant implications on the supply chain. Lesson 2 Summary • • • • • Risk is inherent in global supply chains, and firms can’t do much to prevent most disruptions from happening. However, firms should be prepared to mitigate effects of SC disruptions – firms that have effective business continuity plans and other contingency measures tend to be more competitive. Security is a major concern in global supply chains – many firms are joining government security initiatives to ensure uninterrupted supply chain flow. Risk mitigation is costly – justifying such expenses is not easy. Yet, lack of preparation can have catastrophic effect. Risk mitigation strategies should be tailored to individual firms, business environment, and nature of risk
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: MANAGING RESOURCES

1

Managing Resources

Student’s Name

Institutional Affiliation

Date

MANAGING RESOURCES

2
Managing Resources

Introduction
Firms with global operations need supply chain networks that are responsive to their
needs and focus on attaining sustainability to foster and achieve competitive advantage in
marketplace. Sustainable supply chain reduce risks and security concerns associated with global
operations. Leading global corporations are going beyond the need to comply with supplier
schemes and working to enhance their sustainability performance of their supply chain
(Silvestre, 2016). Therefore, this essay discusses ways that sustainable supply chains present
opportunities for firms in global operations and the essence of firms imposing sustainability
standards on their suppliers.
Opportunities offered by sustainability in Supply Chain
The essential component of a sustainable supply chain is the trust that it develops
between supplier organizations and its customers. Effectively, a trusting relationship creates
more opportunitie...


Anonymous
Really useful study material!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags