Skip to main content

Modeling Risk Emergence and Propagation in Buyer-Supplier-Customer Relationships

  • Chapter
  • First Online:
Supply Chain Risk Management

Abstract

The present study aims to identify and formalize the structural and relational patterns, which account for risk emergence and propagation in buyer-supplier-customer service triads. Following the guidelines of the design science research approach and based on the existing literature, buyer-supplier-customer service triads are categorized into a coherent typology according to the role that each supply chain dyad plays in the emergence and propagation of risk within the triad it forms. In the context of this study, such triads are referred to as Risk-aware Service Triads (RaSTs). To explore all the feasible forms of RaSTs, including the ones that have not yet been addressed in the literature, this study adopts the formalism of weighted directed graphs. As a result, a typology based on thirty different types of RaSTs is suggested. This typology allows: (i) to systematize and formally represent a variety of hypothetical scenarios when each of the dyadic structures within buyer-supplier-customer service triads acts as risk trigger, risk taker or risk neutral component of the respective RaST; and (ii) to calculate the maximal and minimal risk index specific to each of the identified type of RaST, thereby facilitating the identification and assessment of risk exposures associated with buyer-supplier-customer service triads. An illustrative example of how the methodological approach underlying the suggested RaST typology facilitates risk assessment in service triads and service networks is presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    For the matrices shown in the Figs. 3.1, 3.2 and 3.3, the values for all diagonals equal to 0 as the RaST models presented in these figures do not account for risks/vulnerabilities inherent in the processes of each node (i.e. each member of the supply chain triad). This assumption is dictated by the fact that the focus of the RaSTs depicted in these figures is on network risks (risks imposed by one RaST member to another). However, for the purpose of calculating the RIs, it is assumed that all the diagonals are equal to 1. Indeed, if the diagonal values are considered as being equal to 0, this would result in 0 permanent for all RaSTs, thereby making problematic the calculation of the corresponding RIs. On the other hand, assuming the diagonal values equal to 1 allows to acquire meaningful (non-zero) values for RIs and thus to compare the risk levels of different RaSTs.

  2. 2.

    For additional information we suggest to refer to the extant literature on measuring matrix permanent for matrices with unlimited number of nodes, e.g.(Glynn 2010)

References

  • Aravind Raj, S., Sudheer, A., Vinodh, S., & Anand, G. (2013). A mathematical model to evaluate the role of agility enablers and criteria in a manufacturing environment. International journal of production research, 51(19), 5971–5984. doi: 10.1080/00207543.2013.825381

  • Barratt, M., Choi, T. Y., & Li, M. (2011). Qualitative case studies in operations management: Trends, research outcomes, and future research implications. Journal of Operations Management, 29(4), 329–342. doi:10.1016/j.jom.2010.06.002

  • Bastl, M., Johnson, M., & Choi, T. Y. (2013). Who’s seeking whom? Coalition behavior of a weaker player in buyer–supplier relationships. Journal of Supply Chain Management, 49(1), 8–28. doi:10.1111/j.1745-493x.2012.03274.x

  • Bastl, M., Johnson, M., Lightfoot, H., & Evans, S. (2012). Buyer-supplier relationships in a servitized environment: An examination with Cannon and Perreault’s framework. International Journal of Operations & Production Management, 32(6), 650–675.

    Article  Google Scholar 

  • Bellamy, M. A., & Basole, R. C. (2013). Network analysis of supply chain systems: A systematic review and future research. Systems Engineering, 16(2), 235–249. doi:10.1002/sys.21238

  • Bezuidenhout, C. N., Bodhanya, S., Sanjika, T., Sibomana, M., & Boote, G. L. N. (2011). Network-analysis approaches to deal with causal complexity in a supply network. International Journal of Production Research, 50(7), 1840–1849. doi:10.1080/00207543.2011.575088

  • Borgatti, S. P., & Li, X. U. N. (2009). On social network analysis in a supply chain context. Journal of Supply Chain Management, 45(2), 5–22. doi:10.1111/j.1745-493X.2009.03166.x

  • Carson, P., Carson, K., Knouse, S., & Roe, C. W. (1997). Balance theory applied to service quality: A focus on the organization, provider, and consumer triad. Journal of Business and Psychology, 12(2), 99–120.

    Article  Google Scholar 

  • Choi, T. Y., & Kim, Y. (2008). Structural embeddedness and supplier management: A network perspective. Journal of Supply Chain Management, 44(4), 5–13. doi:10.1111/j.1745-493X.2008.00069.x

  • Choi, T. Y., & Wu, Z. (2009). Triads in supply networks: Theorizing buyer–supplier–supplier relationships. Journal of Supply Chain Management, 45(1), 8-25. doi:10.1111/j.1745-493X.2009.03151.x

  • Choi, T. Y., Zhaohui, W., Ellram, L., & Koka, B. R. (2002). Supplier-supplier relationships and their implications for buyer-supplier relationships. Engineering Management, IEEE Transactions on, 49(2), 119–130. doi:10.1109/TEM.2002.1010880

  • Ellram, L. M., Tate, W. L., & Billington, C. (2008). Offshore outsourcing of professional services: A transaction cost economics perspective. Journal of Operations Management, 26(2), 148–163.

    Article  Google Scholar 

  • Finne, M., & Holmström, J. (2013). A manufacturer moving upstream: Triadic collaboration for service delivery. Supply Chain Management: An International Journal, 18(1), 21–33. doi:10.1108/13598541311293159

  • Glynn, D. G. (2010). The permanent of a square matrix. European Journal of Combinatorics, 31(7), 1887–1891.

    Article  Google Scholar 

  • Gunasekaran, A., & Kobu, B. (2007). Performance measures and metrics in logistics and supply chain management: A review of recent literature (1995–2004) for research and applications. International journal of production research, 45(12), 2819–2840. doi:10.1080/00207540600806513

  • Holma, A. M. (2012). Interpersonal interaction in business triads—case studies in corporate travel purchasing. Journal of Purchasing and Supply Management, 18(2), 101–112. doi:10.1016/j.pursup.2012.04.002

    Article  Google Scholar 

  • Holmström, J., Ketokivi, M., & Hameri, A.-P. (2009). Bridging practice and theory: A design science approach. Decision Sciences, 40(1), 65–87. doi:10.1111/j.1540-5915.2008.00221.x

  • Holmström, J., & Romme, G. (2012). Exploring the future of operations management: Toward an innovation mindset among practitioners and researchers. Journal of Operations Management: Operations & Supply Management Forum, Vol. Essay 15, No. pp.

    Google Scholar 

  • Kim, Y., Chen, Y.-S., & Linderman, K. (2015). Supply network disruption and resilience: A network structural perspective. Journal of Operations Management, 33–34, 43–59. doi:10.1016/j.jom.2014.10.006

    Article  Google Scholar 

  • Li, M. E. I. (2011). The impacts of bridge transfer on service outsourcing: A social network perspective. (Doctoral Dissertation), Arizona State University.

    Google Scholar 

  • Li, M. E. I., & Choi, T. Y. (2009). Triads in services outsourcing: Bridge, bridge decay and bridge transfer. Journal of Supply Chain Management, 45(3), 27–39.

    Article  Google Scholar 

  • Modi, S. B., Wiles, M. A., & Mishra, S. (2015). Shareholder value implications of service failures in triads: The case of customer information security breaches. Journal of Operations Management, 35, 21–39. doi:10.1016/j.jom.2014.10.003

    Article  Google Scholar 

  • Neiger, D., Rotaru, K., & Churilov, L. (2009). Supply chain risk identification with value-focused process engineering. Journal of Operations Management, 27(2), 154–168. doi:10.1016/j.jom.2007.11.003

    Article  Google Scholar 

  • Niranjan, T. T., & Metri, B. A. (2008). Client-vendor-end user triad: A service quality model for is/ites outsourcing. Journal of Services Research, 8(1), 123–138.

    Google Scholar 

  • Peng, T.-J. A., Lin, N.-J., Martinez, V., & Yu, C.-M. J. (2010). Managing triads in a military avionics service maintenance network in Taiwan. International Journal of Operations & Production Management, 30(4), 398–422.

    Article  Google Scholar 

  • Rajesh, R., Ravi, V., & Venkata Rao, R. (2014). Selection of risk mitigation strategy in electronic supply chains using grey theory and digraph-matrix approaches. International Journal of Production Research, 53(1), 238–257. doi:10.1080/00207543.2014.948579

    Article  Google Scholar 

  • Rossetti, C. L., & Choi, T. Y. (2005). On the dark side of strategic sourcing: Experiences from the aerospace industry. The Academy of Management Executive, 19(1), 46–60.

    Google Scholar 

  • Sabharwal, S., & Garg, S. (2013). Determining cost effectiveness index of remanufacturing: A graph theoretic approach. International Journal of Production Economics, 144(2), 521–532. doi:10.1016/j.ijpe.2013.04.003

    Article  Google Scholar 

  • Tate, W. L., Ellram, L. M., & Brown, S. W. (2009). Offshore outsourcing of services: A stakeholder perspective. Journal of Service Research, 12(1), 56–72.

    Article  Google Scholar 

  • van Aken, J. E. (2004). Management research based on the paradigm of the design sciences: The quest for field-tested and grounded technological rules. Journal of Management Studies, 41(2), 219–246. doi: 10.1111/j.1467-6486.2004.00430.x

  • van de Valk, W., & van Weele, A. (2011). Business service triads: A new area for service research. Paper presented at the IPSERA 2011 Conference Proceedings, Maastricht, Netherlands

    Google Scholar 

  • van der Valk, W., & van Iwaarden, J. (2011). Monitoring in service triads consisting of buyers, subcontractors and end customers. Journal of Purchasing and Supply Management, 17(3), 198–206.

    Article  Google Scholar 

  • van Iwaarden, J., & van der Valk, W. (2013). Controlling outsourced service delivery: Managing service quality in business service triads. Total Quality Management & Business Excellence, 24(9–10), 1046–1061. doi:10.1080/14783363.2013.776766

  • Wagner, S. M., & Bode, C. (2008). An empirical examination of supply chain performance along several dimensions of risk. Journal of Business Logistics, 29(1), 307–325. doi:10.1002/j.2158-1592.2008.tb00081.x

  • Wagner, S. M., & Neshat, N. (2010). Assessing the vulnerability of supply chains using graph theory. International Journal of Production Economics, 126(1), 121–129.

    Article  Google Scholar 

  • Wagner, S. M., & Neshat, N. (2012). A comparison of supply chain vulnerability indices for different categories of firms. International Journal of Production Research, 50(11), 2877–2891. doi:10.1080/00207543.2011.561540

  • Wasserman, S., & Faust, K. (1994). Social network analysis: Methods and applications (Vol. 8). Cambridge, UK: Cambridge University Press.

    Book  Google Scholar 

  • West, D. B. (2001). Introduction to graph theory (Vol. 2). Upper Saddle River, NJ: Prentice hall Upper Saddle River.

    Google Scholar 

  • Wu, Z., Choi, T. Y., & Rungtusanatham, M. J. (2010). Supplier–supplier relationships in buyer–supplier–supplier triads: Implications for supplier performance. Journal of Operations Management, 28(2), 115–123. doi:http://dx.doi.org/10.1016/j.jom.2009.09.002

  • Wuyts, S., Rindfleisch, A., & Citrin, A. (2015). Outsourcing customer support: The role of provider customer focus. Journal of Operations Management, 35, 40–55. doi:10.1016/j.jom.2014.10.004

    Article  Google Scholar 

  • Wynstra, F., Spring, M., & Schoenherr, T. (2015). Service triads: A research agenda for buyer–supplier–customer triads in business services. Journal of Operations Management, 35, 1–20. doi:10.1016/j.jom.2014.10.002

    Article  Google Scholar 

  • Zhang, J. J., Lawrence, B., & Anderson, C. K. (2015). An agency perspective on service triads: Linking operational and financial performance. Journal of Operations Management, 35, 56–66. doi:10.1016/j.jom.2014.10.005

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kristian Rotaru .

Editor information

Editors and Affiliations

Appendix A

Appendix A

Permanent Calculation Formula of the RaST Adjacency Matrix

$$ A = \left[ {\begin{array}{*{20}l} {r_{11} } \hfill & {r_{12} } \hfill & {r_{13} } \hfill \\ {r_{21} } \hfill & {r_{22} } \hfill & {r_{23} } \hfill \\ {r_{31} } \hfill & {r_{32} } \hfill & {r_{33} } \hfill \\ \end{array} } \right] $$
$$ \varvec{Per}\left( \varvec{A} \right) = r_{11} r_{22} r_{33} + r_{11} r_{23} r_{32} + r_{22} r_{13} r_{31} + r_{33} r_{12} r_{21} + r_{12} r_{23} r_{31} + r_{13} r_{21} r_{32} $$

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this chapter

Cite this chapter

Rotaru, K., Pournader, M. (2018). Modeling Risk Emergence and Propagation in Buyer-Supplier-Customer Relationships. In: Khojasteh, Y. (eds) Supply Chain Risk Management. Springer, Singapore. https://doi.org/10.1007/978-981-10-4106-8_3

Download citation

Publish with us

Policies and ethics