International Journal of Application or Innovation in Engineering & Management... Web Site: www.ijaiem.org Email: , Volume 2, Issue 10, October 2013

advertisement
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
Volume 2, Issue 10, October 2013
ISSN 2319 - 4847
Towards the risk modeling of outsourcing
logistics: Case of mass market retailing
Jabir Arif, Fouad Jawab
Laboratory: Manufacturing, Energy and Sustainable Development
Laboratory: International Management, Technical Decision and Logistics
Sidi Mohamed Ben Abdellah University, Fes, Morocco
Abstract
Since the second half of the 1990s, outsourcing logistics has experienced a strong growth. However, despite their supposed
benefits, many outsourcing logistics projects fail to fulfill their promises. The reason returns, among other things, to poor risk
assessment.
We propose in this paper, the modeling of risk management related to outsourcing logistics. To achieve this end, we apply the
ARIS model to outsourcing logistics process to prioritize, anticipate and manage the risks. Our work will lead to the development
of an operational model specifying arbitration elements. Finally, our proposal will be validated on a specific case in the mass
market retailing.
Keywords: Outsourcing logistics, modeling, risk management, ARIS Model, mass market retailing.
1. INTRODUCTION
Businesses, whether industrial or commercial have conducted outsourcing operations for twenty years. These players have
made great efforts to improve their basic skills and thus have a new trend to outsource certain activities (IT and transport,
for example) considered an integral part of the company. The reason for this first wave of outsourcing was then purely
economic [1], based on cost criteria. Other incentives have reinforced this, including lack of internal references capacity
to achieve these benefits.
For some authors, outsourcing is simply to assign an activity to a service provider rather than make it in-house, others
believe that outsourcing should be defined more dynamically, as the strategic decision to entrust an external partner an
activity that was previously internalized [2]. Indeed, Barthélemy suggests that outsourcing means "the use of a service
provider or an outside vendor to perform an activity that was previously carried out within the company [3]. In parallel,
the use of a service is often accompanied by a transfer or assignment of resources. For Fimbel, this transfer may involve
teams and skills, real estate and / or personal, resources and means of production, material and / or immaterial items [4].
Regarding logistics specifically, it is directly involved in the outsourcing process. It moved from the first phase of
outsourcing, a logic driven flows, where the only issues were to transport and store, to a logic of drawn flow, with a more
business-oriented vision, placing the final consumer at the center of its concerns.
In fact, as shown in the Outsourcing Barometer 2010, 70% of European companies have recourse to outsourcing [5]. It
appears from this study that 73% of European companies have outsourced at least part or all of their "logistics".
The factors explaining the recourse to outsourcing specifically logistics can be grouped into four categories ([6] - [7] [8]): The desire to reduce the costs, the desire to focus on the core business, looking for flexibility and responsiveness of a
better response to customer expectations, and finally a better integration of the supply chain.
For our part, we will try to deal with the dimension of risk management in the context of outsourcing logistics, which
dimension is not new in management, but this is a new and growing subject in the context of supply chain management
[9].
This paper therefore aims to adapt the modeling approach that focuses on the study and control of risks in the field of
outsourcing logistics. It will be divided into three sections. In the first section we will develop the theoretical framework
through an analysis of the literature on the topic of outsourcing and specifically outsourcing logistics (1). The second
section will be devoted to introduce the context of industrial relations between companies, particularly logistics
partnerships that fail to meet their desired end, which is why we decided, in this paper, to address this issue by adopting
an approach based on the modeling of risk management which remains relatively rare (2), before concluding by
demonstrating our proposal through a validation over a concrete case (3). In this final section, we will first appeal to the
modeling tools, such as the ARIS model (3.1), we will afterwards try to position ourselves in relation to the literature
regarding the concept and risk management in order to lead our reflection in this regard (3.2, 3.3), before finally
validating our proposal in the field of outsourcing logistics through the modeling process in the case of Label'Vie
operating in the retail and outsourcing its logistics to the supplier IDlogistique (3.4, 3.5), we will apply the ARIS model
to the outsourcing logistics process. In the end, our work will lead to the development of an operational dashboard
specifying arbitration elements and action plan as well as preventive measures.
Volume 2, Issue 10, October 2013
Page 285
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
Volume 2, Issue 10, October 2013
ISSN 2319 - 4847
2. CONTEXT AND ISSUES
For fifteen years, the context of industrial relations between enterprises has become more complex and turbulent [10] [11]. In fact to get into an outsourcing logistics process is a too important strategic act, because it is one of the main
drivers for the creation of a new organizational form. According to Hallikas and al, logistics partnerships have become
very complex and vulnerable to various types of risks [12]. To Harland and al, this complexity results from different
sources of risk, such as globalization, increasing complexity, outsourcing, e-commerce, and consumer demands [10].
Thus, due to the increasing outsourcing of logistics activities, logistics service proves to be a relevant field of analysis for
the study of inter-organizational relationships [13]. These relationships are part of long term stability and require a
minimum number of mutual trust and an agreement between agents [14].
This evolution of outsourcing has gradually changed the contours of Logistics Service Provider (LSP) [15]. These LSP
fall into the category of third actors just as a consulting company and could accumulate not only the operationalization of
mutualisation but also its management, in a strategic sense [15]. However, despite the advantages and benefits of
outsourcing logistics, many relationships are not renewed at the end of their contract or do not last till the initial term.
Therefore, risk management has become a major concern in outsourcing [17] - [18].
Although the literature is rich in theoretical models and empirical studies dealing with the outsourcing decision, its
determinants, its factor of success and failure, we note that studies that deal with outsourcing by adopting an approach
based on risk management approach is relatively rare [19]. Most of the work, including [10] - [20] - [21] - [22], can be
summarized in five basic phases, but actually quite conventional in management: identification, assessment, control,
monitoring and treatment of residual risks [23].
3. MODELING THE RISK OF OUTSOURCING LOGISTICS
3.1 The modeling tools
Modeling reduces reality to a certain purpose: to communicate, train, manage, leverage, and simulate. Among all the
modeling approaches, the process approach encourages analysis and reorganization focusing on business processes.
Logistics management is based on a process and inter-organizational approach to ensure throughout the chain, the
achievement of physical operations in the best conditions of cost, quality and time [24]. It is a means of identifying agents
directly involved in the implementation process and those support and management processes, by keeping a focus on
customer satisfaction process vision. This identification is required for a better performance evaluation. Perfect and
precise knowledge of the doublet (actor, action) facilitates the extraction of information needed to build a comprehensive
view and draw the desired information, the assumption that each actor identified contributes to total quality, it is also
used to conduct an in-depth risk analysis which may distort the expected result of a process [25].
Among the tools used for process modeling, there is the logical flow diagram which represents the course of a procedure.
It describes the sequence of operations performed by the actors. This is a simple a tool that promotes understanding by the
maximum number of people involved in the process. Another tool is the chain diagram unrealized appreciation (CVD), it
offers a concise overview of the activities of a process and the links between them. Note that these are tools that we
borrowed from ARIS.
3.2 Definition of risk
In a study on the aerospace, Zsidisin defines the risk as the following: "supply risk is defined as the probability of an
incident associated with inbound supply from individual supplier failure or the supply market occurring, in which its
outcomes result in the inability of the purchasing firm to meet customer demand or cause threats to customer life and
safety" [26].
For Jüttner and al, it is a change in the distribution of possible outcomes within supply chains, their probability and
subjective value [27].
Others, such as Harland and al believe it is intimately linked to a likelihood of danger, damage, loss, injury or other
adverse consequences in the supply chain [10].
Wagner and Bode consider that it is never positive and interpret it as a negative deviation of a target value expected by
the firm, resulting in totally undesirable consequences [28].
And finally, Manuj and Mentzer suggest that it is certain that there are differences as to how to define the risk across
disciplines, three elements are present in most conceptualizations of risk. They formulated these elements into three
questions [29]:
a. What are the potential losses, if the risk is realized, what losses would result? b. What is the probability of occurrence
of these losses: the likelihood (probability) of the occurrence of an event that may lead to the realization of the risk? c.
What is the importance of the consequences of the loss?
For us, we tried to model the concept of risk as shown in the following figure, as we designed in ARIS.
Volume 2, Issue 10, October 2013
Page 286
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
Volume 2, Issue 10, October 2013
ISSN 2319 - 4847
Figure 1: Risk conceptual model in ARIS
3.3 Modeling risk management in its environment
We used the SADT/IDEEF0 tool to develop risk management as shown in Figure 2. Risk management is an activity that
involves several categories of actors as experts from the field of study, experts of risk management, auditors, while using
a set of resources. It transforms the knowledge of the study system and information about its operating environment
decisions (objectives, guidelines and other constraints) and instructions for control or support systems. It also supplies
knowledge bases in a spirit of corporate knowledge in the form of feedback.
Figure 2: The risk management – an external view
In developing this representation, we divided the "risk management" entity into four binders: "Context Framing" binder,
"Risk assessment" binder, also divided into three stages (identification, analysis and evaluation), "Risk Processing" binder
and finally "Risk monitoring" binder.
a- Binder: Context Framing
Figure 3: Context
The first binder used to frame the process of risk management in setting the boundaries of the study by delimiting the
environment and fundamental parameters.
Description: In collaboration with experts in the field, the Risk Manager sets the context by setting goals and then
conducting a stakeholder analysis (business / PSL) around them. Following the analysis of stakeholders, all stakeholders
in the context elements will be selected to accompany the rest of the process. The Risk Manager then prepares a master
plan specifying the objectives of the risk management, the planning of steps, the roles and the responsibilities of actors
and other essential resources for the process.
Volume 2, Issue 10, October 2013
Page 287
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
Volume 2, Issue 10, October 2013
ISSN 2319 - 4847
Note that the risk manager is in no way intended to replace the Supply Chain Manager, whose main mission is to ensure
an efficient physical flow and information between the various organizations that make up the supply chain. He develops
a culture of risk in the business. This can go through the constant search of anticipation, and he shall also have the
guarantee of the management to assist in the prioritization of risks, because even if the risks are known, all of them
cannot be managed. Similarly, transverse to the company, the risk manager spreads the best practices across the different
occupations. He will also serve as a conduit for installing common indicators to measure performance in all areas.
b- Binder: Risk assessment
Figure 4: Risk assessment
Identifying the risk: Identifying the existence of potential risks by developing a comprehensive inventory of existing
risks.
Description: This step is mainly to identify and document the risks and information to understand the context in which
they occur. Risk identification is achieved through the establishment of a register and a typology of risks to establish a
shared vision of the risks that the project is exposed to.
Risk Analysis: Characterize the risk and understand the operating procedure.
Description: The first step is to discover the existing system, that is to say, a comprehensive risk assessment of the
situation by a group of actors according to criteria defined in accordance with the predetermined context.
From the first stage, comes a detailed analysis of the causes characterized by a set of risk factors that can influence a risk
event and the result is a dichotomous structure consisting of the risk situation and the risk impact. Thus emerges a
structuring of risk that will determine the risk participants and specify the criteria under which the risk will be defined
[30].
Risk Evaluation: Assess the risks in terms of quantitative or qualitative scale and develop a prioritization of them in
order to guide decisions towards the treatment.
Description: Risk assessment begins with an activity of quantification or qualification of risks determining the magnitude
of their probability of occurrence and impact. The latter is defined by the result of the evaluation of risks. Once each risk
is assessed, the Risk Manager establishes a mapping of a set of selected risks according to the criteria given ( scale ,
nature , cause, consequence , etc. . ). The Risk Manager relies on the mapping for prioritizing risk treatment. This
priority determines whether a risk will be treated or not .When processing, the processing order is determined.
a- Binder : Risk processing
Figure 5: Risk processing
Risk processing: sets treatment options to change the value of the priority risks so that the overall level of risks is consistent
with the risk adversity.
Volume 2, Issue 10, October 2013
Page 288
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
Volume 2, Issue 10, October 2013
ISSN 2319 - 4847
Description: The Risk Manager considers each priority risk and establishes treatment goals by defining the target position
of risk mapping. These objectives are realized by one or more of the four following treatment tactics: accept the risk, avoid
the risk, share the risk , mastering the risk by implementing an action to modify the probability of occurrence or impact
([31] - [32]). Once the tactics are known, a set of compatible treatment scenarios should be identified.
a- Binder : Risk monitoring
Figure 6: Risk monitoring
Risk Monitoring: Observing the internal and external environment to understand the evolution of risks, and collect the
information needed to update the records of risks.
Description: The follow-up stage is subject to regular monitoring and is periodically communicated to stakeholders. This
stage is made operational by setting goals and putting in place a monitoring system to oversee the implementation of
processing actions for stakeholders, who review the monitoring information, to interpret them in the appropriate context of
the product or service covered by the outsourcing project. This is in order to identify trends to which it is subject and
identify new risks it is exposed to.
3.4 Modeling Risk Management: The Case of LABEL’VIE
Label'Vie SA is a limited company under Moroccan law. Its mission is the buying and selling, in the self-service form or
any other form, of any item and food and non-food consumer product. With the acquisition of Metro Cash & Carry in 2011,
the group Label'Vie now covers all forms of distribution. The surface of the Skhirate platform, the studied case, is spread
over an area of 24,000 sqm. This area includes the cool and dry warehouse (APLS/surgelés + F&L + Marée), plus the car
park area dedicated to unload trucks. The total storage capacity is 23,012 pallets; 19,316 pallets in height and 3696 pallet
picking.
The main logistic activity in the Skhirate platform is characterized by four processes: receiving, storage, preparing and
shipping. The following figure shows the risk management model of outsourcing logistics as we have conceived.
Figure 7: Risk management model of outsourcing logistics
Volume 2, Issue 10, October 2013
Page 289
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
Volume 2, Issue 10, October 2013
ISSN 2319 - 4847
The planning stage sets goals and a master plan. It sets up a team of officials from the platform to conduct the outsourcing
procedure by defining the objectives of outsourcing their warehouse and evaluating the decision to keep the activity of
internal storage. The design stage is characterized by collaboration between each manager in order to define a structure and
modes of operation. Indeed, this stage is to develop the specifications and choosing the right provider at the base of criteria.
The deployment is the phase where the service provider IDL manages the warehouse of Label'Vie namely: receiving,
storing, preparing and shipping.
Finally, the piloting stage is the implementation of dashboards to assess the capacity of IDL to deliver a service that meets
the specifications defined in the contract. When the contract expires, Label'Vie can renegotiate and renew the contract with
IDL. Otherwise, there are two options available: a) Reassessing the choice to outsource by re-planning the process again
(restarting from the planning phase). b) Deciding to continue to outsource its logistics function but changing the service
provider (restarting from the design stage).
Note that the first two phases (Planning, Receiving) have already been completed, so we agreed, in consultation with the
head of the platform to model the risk management of the "Deploying" phase (figure below), carried out by the IDL service
provider and subject of the study.
Figure 8: Modeling "Deploying" phase
Discussions
We conducted an analysis of the risk management of outsourcing logistics in the field of the retail sector, the case of
service provider Label'Vie IDLogistique . At the basis of this modelling and incorporating the "risk management "
dimension at each step of the outsourcing process .The analysis revealed the potential risks that could impact the
outsourcing relationship, through interviews and discussions with managers and staff directly involved in each activity.
Cutting the outsourced service into sub constituent processes encouraged identifying areas of risk that should be
monitored. We proposed a risk matrix (see Table 1 below) validated with the head of the platform and the head of control
and steering as well as the various stakeholders in each activity. This matrix summarizes the risks posed, the description
of each risk and its corresponding activity.
For example, the contractor requires that products are always available, that there is a safety stock at all times on all
items. The inventory manager wants instead to minimize the inventory levels and keep only the bare necessities. The
vision of these two individuals is different and this makes it difficult to establish an effective risk management. So you
have to sit all the players around the table and develop a common strategy to deal with risk management. Consequently
everyone must act accordingly on a daily basis.
Volume 2, Issue 10, October 2013
Page 290
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
Volume 2, Issue 10, October 2013
ISSN 2319 - 4847
Table 1: Risk Matrix
Activity
concerned
Risk family
Risk
Family
Subfamily
Risk of receiving unordered articles or
articles with incorrect barcodes.
Conformity
Legal &
regulatory
Number of items approved does not
match the quantity shown on the
delivery slip.
Conformity
Efficiency &
effectiveness
Failure risk of the supplier in deadline
and / or quality, unprofessionalism,
non-conformity of the goods received
according to the standard packaging,
status of delivery trucks, etc…
Operational
Efficiency &
effectiveness
Bulk delivery which results in
additional costs to the platform
(temporary, stretch film ...)
Operational
Efficiency &
effectiveness
Expiry date for
consumption
Receiving items with near expiration
dates
Operational
Referencing articles
Risk of non-attachment of barcode of
articles (ex: change in the bar code by
the supplier)
Operational
Efficiency &
effectiveness
Risk of disruption due to delivery
delays or exceptional provider
command, provider is in disruption,
increasing prices for items.
Operational
Efficiency &
effectiveness
Overstock
Risk of stock excess related to a decline
in orders from stores, constitution of
stocks in anticipation and an ineffective
flow management, etc..
Operational
Efficiency &
effectiveness
Storage condition
Risk related to the organization within
the platform, addressing problem, lack /
connection error at the SI,
misplacement, etc..
Operational
Efficiency &
effectiveness
Operational
Efficiency &
effectiveness
Operational
Efficiency &
effectiveness
Receiving unsolicited
or erroneous articles
Receipt error
Receipt
Delivery condition
Out of stock
Storage
Non-filling the
warehouse (financial
risk)
Preparation
activity volume /
destination exceeds
truck capacity
(planning)
Volume 2, Issue 10, October 2013
Mismanagement of supplies, nonavailability of items from suppliers,
delay placing orders ... etc.
Inadequate coordination with
transportation service that can lead to a
mobilization of space, risk of theft
(exchange items not loaded with those
damaged on the stock)
Legal &
regulatory
Page 291
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
Volume 2, Issue 10, October 2013
ISSN 2319 - 4847
Expedition
Monitoring &
Control
Internal
IS
Errors in shipments
Risk of error in the preparations sent to
stores (error location of supports)
Operational
Efficiency &
effectiveness
Damaged shipment
Risk of damaged shipment due to a
misuse of product during the journey to
the store, non-optimal preparation,
case of unsecured transport,
Operational
Efficiency &
effectiveness
The rest in
preparation areas
after loading the
trucks
Risk is in port linked to an estimation
error of tonnage, rush orders, special
orders, etc..
Operational
Efficiency &
effectiveness
Late delivery to stores
Risk of delayed supply shops,
forgetfulness / lack of order processing,
order not down at the system level
(order valued but not sent).
Operational
Efficiency &
effectiveness
Contractual failure in
logistics discounts
Risk that the discount logistics are not
contracted, including those relating to
historical suppliers.
Operational
Efficiency &
effectiveness
Lack of
communication of
volume with purchases
service
Risk associated with non-compliance
with volumes such as negotiated by
purchases service (purchases forecast is
largely disconnected from the forecast
of stores).
Operational
Efficiency &
effectiveness
Risk security
(Personal/means)
Risk personnel security at the platform
(safety device, handling equipment,
etc.).
Operational
QHSE
Diversion / theft
Risk of diversion / theft of goods at the
platform
Operational
Transparence
Risk of late / no exchange of
information between GOLD and
INFOLOG can cause loss of
information, ineffective monitoring,
etc..
Operational
Efficiency &
effectiveness
Risk of network outage that may impact
the functioning of the platform
operating system
Operational
Efficiency &
effectiveness
Exchange of
information between
the GOLD system
(Labelvie) and
INFOLOG (provider
IDlogistique)
Network failure
3.5 The criteria for risk measures
The criticality of the risk describes the potential harm to the platform. The assessment of the criticality of a risk based on
the assessment of two parameters:
a. The impact that evaluates the consequences on the platform
b. The probability of occurrence that assesses the uncertainty of the occurrence of the risk.
The impact can be measured by several independent criteria. We have identified five criteria:
Financial Impact: This indicator is the result of a monetary risk.
Brand Image Impact: This indicator is the result of a risk branding platform .
Legal Impact: This indicator corresponds to the type of condemnation which the platform would face in the event of a
risk.
IT Impact: This indicator relates to the consequence of a risk on the platform’s IT system
Propagation Impact: This indicator corresponds to the stakeholders affected by a risk. Customers / shareholders / State /
suppliers, etc.
Volume 2, Issue 10, October 2013
Page 292
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
Volume 2, Issue 10, October 2013
ISSN 2319 - 4847
For each of the indicators and consequences, we proposed four scores (1 to 4) linked to a severity scale: Score 1: the
lowest impact, Score 4: the greatest impact (see Table 2 below). Then we assigned a weight to each criterion based on its
importance to the platform (Financial: 5 , Brand image: 4 Legal : 3, IT: 2 and propagation: 1).
.
Table 2: Impact criteria
Impact
Scoring
Marks
Financial
Brand image
Legal
0
Inapplicable, no financial impact
1
<100 kMAD
2
Between 100kMAD and 500kMAD
3
Between 500kMAD and 1.000kMAD
4
Between 1.000kMAD and 2.000kMAD
0
Inapplicable, no impact on the brand image
1
Low impact on the brand image not requiring communication
2
Short-term damage to brand image ( less than year)
3
Medium-term damage to brand image (between 1 and 3 years)
4
Long term damage to brand image (more than 3 years)
0
Inapplicable, no legal impact
1
Warning
2
Fine
3
Condemnation of the company to the civilian
4
Condemnation of the managers to the penal
0
Inapplicable, No impact on the information system
1
Information
System
Propagation
2
Anomaly of the IS perturbing processing and being able to be
mastered
Anomaly of the IS perturbing processing and not being able to be
mastered
3
Unavailability of an application
4
Total unavailability of the IS
0
Inapplicable, no propagation impact
1
Suppliers, Providers
2
Employees
3
Shareholders
4
Customers
3.5.1 Calculate the impact
The average of the impact is the weighted average of the impacts listed in the formula by degree of consequence that we
considered important which the platform will face: financial, Brand image, legal, IT and propagation.
Formula for calculating the weighted average:
Volume 2, Issue 10, October 2013
Page 293
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
Volume 2, Issue 10, October 2013
ISSN 2319 - 4847
[(Financial impact * 5) + (Brand image Impact * 4) + (Legal Impact * 3) + (IT Impact * 2) + (Propagation Impact *
1)] / (5 +4 +3 +2 +1).
Average weighted
<1,2
<2
<3
<4
Measure of impact
I
II
III
IV
Impact Category
weak
Significant
Critical
Strategic
3.5.2 The determination of the likelihood of a risk
The probability of a risk relates to the chance / frequency of an incident linked to the risk materializes. We have 5
different values assigned to this probability.
Choice of frequency
A
B
Signification
Very rare
Rare
C
less probable
D
E
Probable
Very probable
Descriptions
more than 60 months (5 years)
between 12 and 60 months (1-5 years)
between 6 and 12 months (6 months – 1
year)
between 15 days and 6 months
less than 15 days
Table 3 can be considered as a dashboard to measure the impact of each risk and the appropriate action plan to be taken.
Indeed, modeling has allowed us, in the analysis of the aspects of the mission, nature, structure, to establish a generic risk
management process variable depending on the severity and impact of each risk identified. So we ended up with a
dashboard, in which monitoring is shared between officials of each entity and the officers directly involved in the activity,
with the ultimate objective to ensure a successful delivery. This concept of sharing also highlights the need for
collaboration between the platform and the provider to achieve the overall performance.
In conclusion, in order for the risk modeling to be effective, two conditions must be met :
- This strategy requires changing the approach of risk managers and their state of mind . They must understand that they
are capable of identifying risks, qualifying and managing them .
- Risk management must be transversal in the platform.
This model is therefore to be useful at three levels, it is both :
- A guide for analysis
- A diagnostic tool
- And finally a prioritization and planning of actions and prevention measures .
Table 3: Risk management Dashboard
Volume 2, Issue 10, October 2013
Page 294
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
Volume 2, Issue 10, October 2013
ISSN 2319 - 4847
4. CONCLUSION
At a time, when the increasing organizational and operational complexity is forcing companies to consider new
constraints and have recourse to external service providers, a reflection on a risk management approach to the
outsourcing logistics seems quite relevant . Risk management is not necessarily synonymous with Dodge or risk
avoidance, but depends on the purposes of the rules and values that each organization chooses to adopt in its relations
with its environment and with other actors in the supply chain. Taking into account the risks and the implementation of a
risk management approach would promote the success of outsourcing logistics and building a partnership for a long time,
along with limiting the causes of its failure.
Thus, we have found that modeling is needed as a guide to analysis and also a diagnostic tool. It has served us to more
prioritize and implement a program of action plan of identified risks in each outsourced activity (receiving, storage,
preparation and shipping.) It should not be forgotten that these actions are necessarily measured according to the
resources that we want or that we can mobilize in risk management in relation to expected earnings.
Nevertheless, we believe that the work is only in its beginning, the research perspectives will aim to improve the risk
matrix and make it thinner and subsequently propose more personalized prevention measures that can be applied to any
company that operates in the mass market retailing.
Volume 2, Issue 10, October 2013
Page 295
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
Volume 2, Issue 10, October 2013
ISSN 2319 - 4847
REFERENCES
[1] R. Gheeraert, « Le phénomène de l'externalisation logistique aujourd'hui en France et le positionnement stratégique
des prestataires de services logistiques en étroite synergie avec les industriels à travers des partenariats forts ».
Mémoire de fin d’études. Université Paris1, Septembre, 2010.
[2] J. Barthélemy, C. Donada, « Décision et gestion de l'externalisation : une approche intégrée » Revue Française de
Gestion, Numéro 177, p. 101-111.
[3] J. Barthélemy, « Les renégociations des contrats d’externalisation : une étude empirique » Finance Contrôle
Stratégie, vol 9, n° 2, pp. 6 – 29, 2006.
[4] E. Fimbel, « Nature et enjeux stratégiques de l’externalisation », Revue française de gestion, vol 2, n° 143, pp. 27-42,
2003.
[5] Ernst and Young, « Baromètre Outsourcing: Pratiques et tendances du marché de l’externalisation en France »,
Paris. Andersen, 2010.
[6] R.C. Lieb, B. Bentz, “The Use of Third-Party Logistics Services by Large American Manufacturers, the 2003
Survey”, Transportation Journal, vol 43, n° 3, pp. 24-33, 2004.
[7] F. Fulconis, G. Paché, « Piloter des entreprises virtuelles. Quel rôle pour les prestataires de services logistiques ? »,
Revue française de gestion, N°156, pp. 167-186, 2005.
[8] N. Fabbe-Costes, C. Roussat, « Supply Chain Integration: Views from a Logistics Service Provider », Actes des
troisièmes Rencontres Internationales de la Recherche en Logistique (RIRL), Bordeaux (France), September 30th &
October 1st, 2010.
[9] O. Lavastre, A. Gunasekaran, A. Spalanzani, “Supply Chain Risk Management in French Companies”, Decision
Support Systems, vol. 52, n°4, pp. 828-838, 2012.
[10] C.M. Harland, R. Brenchley, H. Walker, “Risk in Supply Network”, Journal of Purchasing & Supply Management,
vol. 9, N°2, pp. 51-62, 2003.
[11] M. Hillman, “Strategies for Managing Supply Chain Risk”, Supply Chain Management Review, juillet-août, pp. 1113, 2006.
[12] J. Hallikas, K. Puumalainen, T. Vesterinen, V.M. Virolainen, “Risk-Based Classification of Supplier Relationships”,
Journal of Purchasing and Supply Management. vol 11, n° 2–3, pp.72-82, 2005.
[13] V. Fernandes, « Le rôle de la traçabilité dans la relation client - prestataire de services logistiques ». Actes de la
XVIème conférence de l'AIMS, 2007.
[14] F. Jawab, B. Driss, T. Abdennebi, « Le réapprovisionnement continu dans les réseaux industriels, vers une meilleure
gestion des interfaces de la supply chain ». Revue des sciences de gestion – France N°218 - mars-avril, 2004.
[15] A. Boissinot, E. Kacioui-Maurin, « L’innovation envisagée comme une stratégie «d’enracinement » dans le canal de
distribution par le prestataire de services logistiques », Logistique et Management, vol. 17, n° 2, 2009.
[16] V. Hiesse, « L’intermédiation du PSL dans les canaux de distribution : quels schémas logistiques émergents ? »,
Logistique & Management, vol. 17, N° 2, pp. 29-40, 2009.
[17] D. Waters, “Supply Chain Risk Management: Vulnerability and Resilience in logistics”, Kogan Page, London,
Philadelphia, 2007.
[18] G.A. Zsidisin, B. Ritchie, (eds), “Supply Chain Risk: A Handbook of assessment, Management, and Performance.
Springer Publishers, New York, USA, 2008.
[19] B. Hon Kam, L. Chen, R. Wilding, “Managing Production Outsourcing Risks in China's Apparel Industry: A Case
Study of Two Apparel Retailers”, Supply Chain Management: An International Journal, vol 16, n° 6, pp.428-445,
2011.
[20] L.M. Hauser, “Risk-adjusted Supply Chain Management, Supply Chain Management Review, vol. 7, Is. 6, pp. 64-71,
2003.
[21] P. Kleindorfer, G. Saad, “Managing disruption risks in supply chains”, Production and Operations Management, vol.
14, N° 1, été, pp. 53-68, 2005.
[22] J. Hallikas, I. Karvonen, U. Pulkkinen, V.M. Virolainen, M. Tuominen, “Risk Management Processes in supplier
networks”, International Journal of Production Economics, Vol. 90, Is. 1, pp. 47-58, 2004.
[23] O. Lavastre, A. Spalanzani, « Comment gérer les risques liés à la chaîne logistique ? Une réponse par les pratiques
de SCRM (Supply Chain Risk Management) », XIXèmeConférence Internationale de Management Stratégique,
AIMS, Luxembourg, 2-4 juin, 30 pages, 2010.
[24] C. Camman-Ledi, F. Villesque, « pilotage stratégique de la chaîne logistique et système d’évaluation de la
performance », Rencontres Internationales de la Recherche en Logistique (RIRL), 2002.
[25] I. Ibn El Farouk, A. Talbi, F. Jawab, A. Jabir, B. Dakkak, Y. Chater, « Gestion des approvisionnements des produits
pharmaceutiques à l’hôpital : Quels indicateurs pour piloter la performance? », Rencontres Internationales de la
Recherche en Logistique (RIRL), 2012.
[26] G.A. Zsidisin, “A Grounded Definition of Supply Risk”, Journal of Purchasing and Supply Management, vol. 9, Is.
5/6, pp. 217-224, 2003.
Volume 2, Issue 10, October 2013
Page 296
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
Volume 2, Issue 10, October 2013
ISSN 2319 - 4847
[27] U. Jüttner, H. Peck, M. Christopher, “Supply Chain Risk Management: Outlining an Agenda for future research”,
International Journal of Logistics: Research & Applications, vol.6, n° 4, pp. 197-210, 2003.
[28] S.M. Wagner, C. Bode, “An Empirical Examination of Supply Chain Performance along Several Dimensions of
Risk”, Journal of Business Logistics, vol. 29, N°1, pp. 307-325, 2008.
[29] I. Manuj, J.T. Mentzer, “Global Supply Chain Risk Management”, Jourinal Of Business Logistics, vol. 29, No. 1,
2008.
[30] R. B. Ravalison, « Mise en scène des projets de système d’information : apports de la maîtrise des risques dans les
projets de système d’information ». Thèse de doctorat, Institut national polytechnique de Toulouse, 2006.
[31] ISO/DIS 31000, « Risk management- Principles and guidelines on Implementation », 2008.
[32] Coso, “Enterprise Risk Management - Integrated Framework”, Committee of Sponsoring Organizations of the
Treadway Commission, 2004.
AUTHOR
Jabir Arif received the engineering degree in industrial engineering and logistics from National School of
Applied Sciences in 2010. He worked as a production planner in a multinational company operating in the
automotive wiring harness in April 2011. He then joined the Ministry of Public Service and Administration
Modernization as a process engineer since July 2011. He is, in parallel, in his final year as a Phd student in the laboratory
of manufacturing, energy and sustainable development at the University Sidi Mohamed Ben Abdellah Fes, Morocco,
under the academic year 2013/2014.
Fouad Jawab is a qualified Professor in Logistics and Management at the Higher School of Technology of Fez.
He was Ex-Head of the field Management Logistics and Transport (MLT). He is appointed Head of Department
of Science and Technology Management. He is also the Director of the Research Laboratory in International
Management, Technical Decision and LOGistics (IMTDLOG). He is the Founder of the International Symposium
LOGISTIQUA.
Volume 2, Issue 10, October 2013
Page 297
Download