{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T14:55:15Z","timestamp":1777388115797,"version":"3.51.4"},"reference-count":42,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"abstract":"<jats:p>This article describes how as mankind has been ever-evolving, so are their needs, growing in leaps and bounds. Risk management in supply chains have become a prerequisite as it involves a series of steps like procuring, processing, and distribution, where risk has to be managed. Given the advent of technology and transformation of supply chain management from traditional to modern methods, a lot has changed, and of course with ever-evolving technology, the organisations have become adept at handling risks associated with many factors within the organisation and outside the organisation. In this article, the authors will analyse the percentage impact of external and internal supply chain risk factors on various supply chain decisions, and also project various tools available to mitigate Supply chain risks.<\/jats:p>","DOI":"10.4018\/ijisscm.2018070105","type":"journal-article","created":{"date-parts":[[2018,5,11]],"date-time":"2018-05-11T18:51:39Z","timestamp":1526064699000},"page":"87-104","source":"Crossref","is-referenced-by-count":17,"title":["Supply Chain Risk Management"],"prefix":"10.4018","volume":"11","author":[{"given":"K. Madhu Kishore","family":"Raghunath","sequence":"first","affiliation":[{"name":"School of Management, National Institute of Technology, Warangal, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S. Lakshmi Tulasi","family":"Devi","sequence":"additional","affiliation":[{"name":"School of Management, National Institute of Technology, Warangal, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"2432","reference":[{"key":"IJISSCM.2018070105-0","first-page":"21","article-title":"What is risk anyway?","author":"I.Baird","year":"1990","journal-title":"Risk, Strategy and Management"},{"key":"IJISSCM.2018070105-1","doi-asserted-by":"publisher","DOI":"10.1145\/567162.567166"},{"key":"IJISSCM.2018070105-2","author":"M.Christopher","year":"1992","journal-title":"Logistics and Supply Chain Management"},{"key":"IJISSCM.2018070105-3","doi-asserted-by":"publisher","DOI":"10.1108\/09600030410545436"},{"key":"IJISSCM.2018070105-4","doi-asserted-by":"publisher","DOI":"10.1108\/01443570410538104"},{"key":"IJISSCM.2018070105-5","first-page":"53","article-title":"Predicting and Managing Supply Chain Risks","author":"S.Dani","year":"2008","journal-title":"B. R. George A. Zsidisin, Supply Chain Risk: A handbook of assessment, management and performance"},{"key":"IJISSCM.2018070105-6","unstructured":"Dumke, D. (2011). Supply Chain Risk Sources, Consequences, Drivers and Mitigation. SCRMblog. Retrieved 25 May, 2017, from http:\/\/scrmblog.com\/review\/supply-chain-risk-sources-consequences-drivers-and-mitigation"},{"key":"IJISSCM.2018070105-7","unstructured":"Engardio, P. (2001). Why the supply chain broke down. Business Week, 3724, 41."},{"key":"IJISSCM.2018070105-8","unstructured":"Ferguson, R. (2003). Apriso, i2 tools manage supply chain business processes. eWeek. Retrieved April 15, 2017, from http:\/\/www.accessmylibrary.com\/coms2\/summary_0286-24895290_ITM."},{"key":"IJISSCM.2018070105-9","doi-asserted-by":"publisher","DOI":"10.4018\/IJISSCM.2017010102"},{"key":"IJISSCM.2018070105-10","doi-asserted-by":"publisher","DOI":"10.4018\/ijisscm.2014040105"},{"key":"IJISSCM.2018070105-11","doi-asserted-by":"publisher","DOI":"10.1016\/S1478-4092(03)00004-9"},{"key":"IJISSCM.2018070105-12","doi-asserted-by":"publisher","DOI":"10.1111\/j.1937-5956.2005.tb00008.x"},{"key":"IJISSCM.2018070105-13","doi-asserted-by":"publisher","DOI":"10.2307\/41166091"},{"key":"IJISSCM.2018070105-14","doi-asserted-by":"publisher","DOI":"10.1108\/09574090510617385"},{"key":"IJISSCM.2018070105-15","doi-asserted-by":"publisher","DOI":"10.4018\/jisscm.2011010104"},{"key":"IJISSCM.2018070105-16","doi-asserted-by":"publisher","DOI":"10.1287\/opre.41.5.835"},{"key":"IJISSCM.2018070105-17","unstructured":"Lim, S. J. (2010). Risk Response Strategies in the Supply Chain: Examining Attributes of Stakeholders and Risk Attitude. Retrieved from http:\/\/ink.library.smu.edu.sg\/etd_coll\/65"},{"key":"IJISSCM.2018070105-18","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.33.11.1404"},{"key":"IJISSCM.2018070105-19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlp.2011.03.004"},{"key":"IJISSCM.2018070105-20","unstructured":"M\u0103rinca\u015f, D. A., & Voicil\u0103, C. (2017). Using Web Technologies for Supply Chain Management. Retrieved from https:\/\/cdn.intechopen.com\/pdfs-wm\/17154.pdf"},{"issue":"4","key":"IJISSCM.2018070105-21","article-title":"Supply Chain Risk Management Using Software Tool.","volume":"12","author":"M.Matotek","year":"2015","journal-title":"Acta Polytechnica Hungarica"},{"issue":"1","key":"IJISSCM.2018070105-22","first-page":"26","article-title":"Commercial risk under JIT.","volume":"67","author":"G.McGillivray","year":"2000","journal-title":"Canadian Underwriter"},{"key":"IJISSCM.2018070105-23","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8551.1995.tb00089.x"},{"key":"IJISSCM.2018070105-24","author":"M.Modarres","year":"1993","journal-title":"What Every Engineer Should Know about Reliability and Risk Analysis"},{"key":"IJISSCM.2018070105-25","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888998002070"},{"key":"IJISSCM.2018070105-26","doi-asserted-by":"publisher","DOI":"10.1108\/EUM0000000005707"},{"key":"IJISSCM.2018070105-27","doi-asserted-by":"publisher","DOI":"10.4018\/IJEIS.2015070104"},{"key":"IJISSCM.2018070105-28","doi-asserted-by":"publisher","DOI":"10.1007\/s12159-010-0023-8"},{"key":"IJISSCM.2018070105-29","doi-asserted-by":"publisher","DOI":"10.1108\/09574090910954873"},{"key":"IJISSCM.2018070105-30","unstructured":"Business Queensland. (2017). Identifying supply chain risks. Retrieved 25 May, 2017, from-https:\/\/www.business.qld.gov.au\/running-business\/protecting-business\/risk-management\/supply-chains\/identifying"},{"key":"IJISSCM.2018070105-31","doi-asserted-by":"publisher","DOI":"10.4018\/IJRCM.2017100101"},{"key":"IJISSCM.2018070105-32","unstructured":"SCRLC. (2011). Supply chain risk Management: A Compilation of Bes Practices. Retrieved 23 May, 2017, from http:\/\/www.scrlc.com\/articles\/Supply_Chain_Risk_Management_A_Compilation_of_Best_Practices_final[1].pdf"},{"key":"IJISSCM.2018070105-33","doi-asserted-by":"publisher","DOI":"10.4018\/IJISSCM.2017040102"},{"key":"IJISSCM.2018070105-34","doi-asserted-by":"publisher","DOI":"10.1108\/09600030210421723"},{"key":"IJISSCM.2018070105-35","unstructured":"VICS CPFR Committee. (2004). Nine-step process model. Retrieved from http:\/\/www.vics.org\/topics\/cpfr\/cpfr"},{"key":"IJISSCM.2018070105-36","article-title":"Dominant risks and risk management practices in supply chains","author":"S. M.Wagner","year":"2008","journal-title":"Supply chain risk: A handbook of assessment, management and performance"},{"key":"IJISSCM.2018070105-37","author":"A.Waring","year":"1998","journal-title":"Configuring and managing strategic supplier portfolios"},{"key":"IJISSCM.2018070105-38","doi-asserted-by":"publisher","DOI":"10.1108\/17410381311327954"},{"issue":"Special Issue","key":"IJISSCM.2018070105-39","first-page":"73","article-title":"A Conceptual Model of Supply Chain Risk Mitigation: The Role of Supply Chain Integration and Organizational Risk Propensity.","author":"Y.Yu","year":"2015","journal-title":"Journal of Coastal Research"},{"issue":"6","key":"IJISSCM.2018070105-40","first-page":"110","article-title":"A grounded definition of supply risk.","volume":"9","author":"G. A.Zsidisin","year":"2003","journal-title":"Journal of Purchasing and Supply Management"},{"key":"IJISSCM.2018070105-41","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-493X.2003.tb00156.x"}],"container-title":["International Journal of Information Systems and Supply Chain Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=206164","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T23:52:55Z","timestamp":1651794775000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISSCM.2018070105"}},"subtitle":["An Invigorating Outlook"],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":42,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.4018\/ijisscm.2018070105","relation":{},"ISSN":["1935-5726","1935-5734"],"issn-type":[{"value":"1935-5726","type":"print"},{"value":"1935-5734","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7]]}}}