Supply Chain Risk Lexicon
By Andrew Cox, TSA

 

What is the difference between Risk Assessment and Risk Analysis? What is TTR? The SCRLC has initiated a project to develop a lexicon for Supply Chain Risk Management. This is very important since this discipline is a relatively young one and we think it is important to establish a common terminology that can be a standard for this emerging discipline. The SCRM lexicon is the result of the considerable work within the SCRLC membership. The SCRM lexicon is a living document that grows and changes with the passage of time. It can only develop with the active assistance and support of you the reader. If you consider a SCRM term should be included, amended or deleted please send us an email to info@scrlc.com.

 

Risk Term

Definition

Risk

The potential for loss or harm due to the likelihood of an unwanted event and its adverse consequences.  Risk typically implies that the likelihood of the event can be measured or estimated in some reliable manner. 

Uncertainty

The degree to which likelihood and consequence can be confidently estimated.  Events which are fundamentally random and uncorrelated can typically be estimated and hence have low degrees of uncertainty.  Events in which strategic actors are actively influence their likelihood of carrying out an event or seek to correlate a series of events carry a high degree of uncertainty and therefore low confidence in the estimate of likelihood. 

Security risk

The risk of a successful attack by an intelligent actor.  Security risk is typically represented as being a function of threat, vulnerability, and the impact of a successful attack or consequence.

Risk Management

The process of constructing and evaluating strategies for reducing losses from future adverse events.  Risk management strategies include a combination of options, such as providing information (i.e., risk communication), economic incentives (e.g., subsidies, fines), insurance, regulations, standards, and implementation of countermeasures.  These strategies enable organizations to avoid, transfer, mitigate, hedge, or accept their perceived risks.  In many cases, risk management strategies can be evaluated by undertaking cost effectiveness analyses to determine the trade-off between reduction of risk and the costs of undertaking such measures.  In other cases, benefits are harder to quantify and must rely on logical analysis. 

Risk Analysis

A process for studying the nature of risk across a set of systems and/or assets.  Risk analyses can be strategic or tactical, are typically broader in scope than risk assessments, and may involve risks to multiple assets, systems, transportation modes, and/or geographic regions.

System

A system is an assembly of components, subsystems, or elements that are related to each other and together perform one or more functions.  A system maintains its existence and operates as a whole through the interaction of its parts.  Systems generally exhibit the following characteristics: 1) Consist of components that are connected to each other physically, or through relationships, dependencies, information flows, etc., and demonstrate a degree of integration to perform a function. 2) Exhibit causal properties in that a change in a single component causes changes to other components, or to the overall system. 3)Exhibit feedback in that a change to a single component causes a subsequent change to a second component; in turn, the change to the second component causes a new change to the first component, and so forth.

Asset

An asset is any person, facility, material, information, or activity that has a positive value to the system being managed for risk.  Assets may be categorized in many ways, including: people, information, equipment, facilities, conveyances, and operations.

Threat

The likelihood or relative likelihood that an attack or adverse event will occur within a given timeframe.

Likelihood

The probability of an event.  Likelihood can be measured as a ratio of occurrence of an event over some set period of time given similar conditions.  Likelihood of natural events

Vulnerability

The relative likelihood that the attack or adverse event (the threat) will be successful in achieving worst, reasonable case consequences associated with a defined scenario, given that the attack is attempted.  Typically, vulnerability scores are calculated based on the recognizability, susceptibility, and resilience of a system or asset.  Vulnerabilities include any flaw or weakness in a system or asset design, implementation, or operation that can be exploited by an adversary.

Consequence

The outcome of an event, including immediate, medium- and long-term direct and indirect effects.  Effects or losses are typically measured in terms of deaths and casualties, economic damages, and may also include less tangible and less quantifiable effects such as behavioral consequences (political ramifications, decreased morale, break down in the rule of law, etc.).

Supply Chain Risk Management (SCRM)

The practice of managing the risk of any factor or event that can materially disrupt a supply chain whether within a single company or spread across multiple companies.  The ultimate purpose of supply chain risk management is to enable cost avoidance, customer service, and market position. 

Enterprise Risk Management

The practice of managing, as a whole, the set of risks across an enterprise that can materially disrupt the fundamental mission of an organization.  Common risks managed include financial, IT, supply-chain, marketing, acquisition, regulatory, and political.  Typically Enterprise Risk Management (ERM) is addressed through strategic planning, operations management, and internal controls. 

Internal Environment

The internal characteristics of a company which encompasses culture, organization structure, philosophy, ethics, internal politics, and oversight approach

Strategic Risk Objective

Strategic Risk Objectives are risk-informed statements of risk-reduction priorities that establish specific, measurable, realistic and attainable targets that, when achieved, will improve the a system’s risk profile.  They flow from an understanding of high-consequence risks to the system, and enable organizational leaders to focus risk management efforts appropriately and effectively.

Objective Setting

The process of setting risk objectives in relation to business objectives and risk tolerance in order to improve a system’s risk profile.  Objective setting is a precondition for event identification, risk assessment and risk response. 

Risk Tolerance

The threshold at which managers are willing to accept risks for the organization.  Organizations will differ in the amount and type of risk they are willing to accept. 

Event Identification

The process of identifying those incidents, occurring internally or externally, that could affect strategy and achievement of business objectives.  Events that may have a negative impact represent risks, which require management response or they have a positive impact represent natural offsets (opportunities), which management channels back to strategy setting

Risk Assessment

A structured method and process for identifying risk to a specific system or asset through the evaluation of threats, vulnerabilities (likelihood) and consequences (impact).  Risk assessments provide the basis for rank ordering of risks, usually within a narrow scope (e.g. at the asset level), and help establish priorities for the application of risk-reduction measures for the specific system or asset being assessed.

Risk Response

The processes in which management makes decisions on options to address specific risks with avoidance, reduction, sharing, or acceptance strategies and countermeasures.  Management evaluates options in relation to risk appetite, cost vs. benefit of potential risk responses, and degree to which a response will reduce impact and/or likelihood.  The response is evaluated with regard to whether residual risk is within risk tolerance

 

Control Activities

Specific processes/procedures designed to ensure that the countermeasures and strategies put in place to avoid risk are being carried out effectively and efficiently. 

Information & Communication

The process of capturing and communicating pertinent information in a form and timeframe that enables people to carry out their risk management responsibilities. (See risk communication below)

Risk Communication

The process used by risk analysts, decision makers, policy makers, and intelligent adversaries to provide data, information, and knowledge to change the risk perceptions of individuals and organizations and enable them to assess the risk differently than they otherwise might.  Risk communications can ensure more accurate public perceptions or risks, which helps minimize over-reactions and under-reactions to risks.

Monitoring

The process whereby risk managers assess the status of risk-reduction measures to determine effectiveness on an ongoing basis.

Physical Disruption Risk

The risk of the destruction of critical infrastructure in the supply chain.  Critical Infrastructure includes the physical components or assets necessary for the continuous operation of the transportation system including equipment and personnel

Process Disruption Risk

The risk of interrupting or destroying processes that involve day-to-day operations of supply chains.  Processes include the rules, actions, decisions, and information flows that give life to the physical level and are necessary for efficient and effective operation of the supply-chain system.  Processes are what allow material  components to work together—physically or  virtually—as a system or supply chain

Institutional Disruption Risk

Events that involve changes in company or supply-network governance and strategy.  Institutional considerations include the policies, guidance, and organizations that empower and constrain the operation of the supply chain to meet large-scale company goals.  Public sector examples of institutional disruptions include federal legislation, national policies, and state regulations.   Private sector examples include company reorganizations, mergers, market shifts, and technology breakthroughs.

Black Swan Risk

Large-impact, hard-to-predict, and rare event/risks beyond the realm of normal expectations.  Predictive information about Black Swan events either 1) does not exist, 2) cannot be obtained, or 3) cannot be understood because the observer of the event does not have a world-view that could “connect-the-dots” of the predictive information.  Popularized by author Nassim Taleb.  The term black swan comes from the ancient western conception that 'All swans are white'. In that context, a black swan was a metaphor for something that could not exist. The 17th Century discovery of black swans in Australia metamorphosed the term to connote that the perceived impossibility actually came to pass.

 

Narrative Fallacy

The fallacy associated with individuals’ vulnerability to over-interpretation of a series of events and a predilection for compact stories over raw truths.  The narrative fallacy is particularly acute when dealing with the aftermath of rare events when explanations are constructed to explain causality.  The common expressions “20-20 hindsight” and “Monday morning quarter-backing” indicate the same concept in which an individual develops a story to help explain an even assign responsibility for an event (good or bad) which could not have been foreseen prior to the event.  After the event, a “narrative” may have powerful explanatory attractiveness regardless of its factual veracity.

Time to Recover (TTR) 

Number of weeks required to restore 100% operational output following a supply chain disruption

Revenue Exposure

Weekly Product Revenue * TTR (weeks)

Substitute Product

A product that may be sold to a customer in lieu of one that is not available due

Business Continuity Planning (BCP)

Procedures by supply chain partners that enable them recover from a catastrophic event