Next Article in Journal
Industrial Packaging Performance Indicator Using a Group Multicriteria Approach: An Automaker Reverse Operations Case
Previous Article in Journal
Reverse Logistics Strategies and Their Effect on the Competitiveness of Fast-Moving Consumer Goods Firms in South Africa
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Weighted Interpretive Structural Modeling for Supply Chain Risk Management: An Application to Logistics Service Providers in Turkey

1
Department of Tourism Management, Ondokuz Mayis University, Samsun 55440, Turkey
2
Department of Advertising & Public Relations, Trabzon University, Trabzon 61335, Turkey
3
Department of Systems and Technology, Auburn University, Auburn, AL 36849-6266, USA
*
Author to whom correspondence should be addressed.
Logistics 2022, 6(3), 57; https://doi.org/10.3390/logistics6030057
Submission received: 29 June 2022 / Revised: 4 August 2022 / Accepted: 9 August 2022 / Published: 11 August 2022

Abstract

:
Background: The aim of this paper is to introduce weighted interpretive structural modeling approach to supply chain risk management efforts by presenting an application to identify micro risks of logistics service providers at the industry level in Turkey. Methods: In this research, eighteen risk factors in the logistics sector have been identified through both literature review and recommendations from a group of academicians and experts in the sector. A survey was conducted to rank these risks. They were further analyzed through a weighted interpretive structural modeling (WISM) approach in order to demonstrate mutual relationships among these risks. Results: Finally, using a WISM approach, an analysis was conducted to identify the driving and dependence power of the risk factors. This study covers a variety of micro-risk factors of logistics service providers and demonstrates the relationships among them and clusters them based on their driving and dependence power. Conclusions: Such a clustering of the risk factors helps us identify those that affect the others and are of paramount importance in risk management and mitigation.

1. Introduction

The logistics industry is considered one of the fastest growing markets in today’s global economy. The share of the logistics sector in the world gross domestic product (GDP) is approximately 15% and industry growth rate has currently exceeded average growth rate of the economies of European Union (EU) member States. This is also relevant to the Turkish logistics industry, since Turkey has an advantageous position between the Middle East and Europe and functions as a transfer center between these regions [1], and the logistics sector appears to be one of the most important growth industries in Turkey [2]. With the rise of competition and the increase in supply chain complexity, logistics service providers (LSPs), today, increasingly recognize the potential and significance of supply chain risk management (SCRM).
For effective risk management in supply chains, researchers have developed various approaches. These mainly consist of mathematical models such as mathematical programming [3], multi-criteria decision making such as analytic hierarchy process (AHP) and the “technique for order preference by similarity to ideal solution” (TOPSIS) [4,5,6,7]; and a decision tree approach [8]. Prior research on supply chain risk management in the logistics industry has investigated possible risk factors and their impact on performance. However, they have not been studied in the context of the degree to which a given risk factor drives or influences other risk factors, nor have they investigated the extent to which a given risk factor is dependent on the other risk factors. As Tavakolan and Etemadinia [9] have pointed out, if risk managers take into account the interaction of one risk with those of others, the interaction of risk factors with other risks changes the potential and impact of that risk, allowing for a more in-depth analysis of the assessment, response, control, and monitoring of that particular risk.
Given this gap in the literature, the goal of this paper is to introduce WISM approach to supply chain risk management efforts. The focus of this paper is to explore the drive and dependency power, relatively speaking, of the various risk factors. Based on the cluster in which a given risk factor is categorized, it will have an impact in terms of prioritized decision making. As Jüttner et al. [10] emphasized that more empirically grounded research in specific industries is needed on supply chain risk management. To the best of our knowledge, previous studies on risk factors of logistics service providers in Turkey have not been examined on an inter-relational level. To fill this gap, research objectives (ROs) of this study are as follows:
  • To identify micro-risk factors of logistics service providers in general, and those of logistics service providers in Turkey;
  • To reveal inter-relationships among these risk factors (through measures of driving and dependence power);
  • To rank the significance of the risk factors;
  • To discuss the implications of the findings for effective risk management of logistics service providers in Turkey.
The rest of the paper is organized as follows: the next section provides a brief conceptual background and literature review, while Section 3 touches on logistics industry in Turkey. Then, Section 4 presents the methodological framework, while Section 5 discusses the results. Finally, Section 6 provides some concluding remarks.

2. Conceptual Definitions and Literature Review

The terms logistics and supply chain management are sometimes used interchangeably, but they have a clear usage. Logistics refers to the movement, storage and flow of goods, services and information throughout the supply chain, and supply chain management means an integrated philosophy. In doing so, several processes are linked to each other and manage the entire flow of distribution channels from the supplier to the end user in order to achieve a competitive advantage [11].
Norrman and Jansson [12] defined supply chain risk management (SCRM) “to collaborate with partners in a supply chain to apply risk management process tools to deal with risks and uncertainties caused by, or impacting on, logistics related activities or resources”.

2.1. Categorization of Supply Chain Risks

In a contemporary world, supply chains operate in a dynamic environment and risk management has a vital role in logistics networks in the existence of various risk factors. Thus, through the years, SCRM has attracted the attention of academicians and practitioners alike. For an effective SCRM, many researchers have identified and categorized supply chain risks. Additionally, far-reaching literature reviews have been published to brand and assess previous studies’ risk classifications [13,14,15]. Even though different researchers have identified multiple risk factors such as supply risks, demand risks, process risks, operational risks, environmental risks, physical risks, financial risks, informational risks, and behavioral and political/social risks [7,16,17,18], a majority of the researchers has categorized the supply chain risks as internal and external risks [19,20,21]. A similar categorization includes macro and micro risks. Macro risks present the negative effects of rare external situations such as war and earthquakes. Micro risks are relatively frequent events that arise directly from a company’s internal activities or relationships with other partners in the supply chain [22]. When it comes to the likelihood of an event occurring, micro risks have a greater impact on SCRM than macro risks.
Reviewing the existing literature on supply chain risk sources, Jüttner et al. [10] and Jüttner [23] identified risk concepts that are relevant to particular sectors and also those that are exclusive to supply chains [24]. One reason is that the industry-specific concept of risk seems to help managers assess and manage risk in their supply chain. Based on this proposal, the practical part of the proposed research focuses on the risk factors of Turkish logistic service providers. It may then shed light on the details of the risk factors in Turkey’s logistics sector. Based on the proposed analytical method that leverages the driving force and dependence of risk factors, it may further influence management’s decision-making in a preferential sense.

2.2. Methods and Approaches in SCRM Research

Since risk identification/classification is the first step in SCRM, many qualitative and quantitative approaches have been used and applied to SCRM over the last decade. The second category of work in this area deals with SCRM methods. Several literature reviews have made important contributions to this body of knowledge [10,13,22,24,25,26,27].
With regard to the methodology used in SCRM papers, Ho et al. [22] reviewed 224 studies published between 2003–2013 and demonstrated that the number of studies using quantitative methods is much higher than those using qualitative methods. Tran et al. [15] also conducted similar research for SCRM articles published between 2002 and the beginning of 2017. Supporting the results of Ho et al. [22], Tran et al. [15] concluded that in half of the reviewed work, quantitative approaches (including single and multiple methods) were most commonly used to assess supply chain risk. Quantitative methods have been used primarily to classify or identify the risks of SCRM studies, or to explain the stages of SCRM, but qualitative studies that explain how the SCRM approach can be applied to real-world case studies are limited [22]. Thus, future research that integrates qualitative approaches and quantitative methods and show applications to real life case studies can help our understanding and present a practical insight into SCRM [15]. To this end, using the exploratory interviews conducted to discover industry experts’ risk perceptions, this study seeks to provide new solutions to logistics service providers’ SCRM efforts by integrating qualitative and quantitative information.
The structural evaluation of quantitative studies clearly demonstrates that most of the quantitative studies used a single method, such as linear programming [28], Bayesian network [29,30,31,32,33,34], or other approaches. Multiple regression models [35,36,37,38], i.e., structural equation modeling [39], covariance-based structural equation model [40], input-output (I-O) models [41], conjoint analysis [42], and correlation analysis [43], are examples of other approaches. Integrated methods that combine two or more approaches have not attracted much attention in the literature [15]. Among the integrated methods, fuzzy methods, analytic hierarchy process (AHP), and data envelopment analysis (DEA) are some of the most frequently used methods [22]. Recently, de Souza Feitosa et al. [44] has proposed a supply chain risk management (SCRM) maturity model combined with a fuzzy TOPSIS classification method to evaluate and sort an organization into a pre-defined maturity level. Presenting results of a systematic literature review and content analysis in order to provide a comprehensive overview of the methods that are currently used for SCRM, Bier et al. [45] indicated that research in this field is interdisciplinary and that no common modeling language has emerged thus far. Past research mainly based on to graph theory and/or social network analysis although a few methods have been developed recently specifically for supply chain risk management. As one of them, Chalmeta and Barqueros-Muñoz [46] have combined quantitative and qualitative methods for SCRM using Big Data analytics. As an integrated method, WISM can overcome the restrictions or improve the performance of the single methods. As one of the integrated methods, weighted interpretive structural modeling (WISM) is not widely used in the SCRM area. To the best of our knowledge, there are no other studies using WISM in this area. Using a similar method, interpretive structural modeling (ISM), there are several papers that focus on SCRM. In one of them, Nishat et al. [47] suggested an approach to influence supply chain risk lessening by comprehending the dynamics between various providers that help to decrease risk in a supply chain. Pfohl et al. [48] also showed how ISM helps managers in SCRM. Using the same approach, Diabat et al. [49] have developed a model in which the various risks involved in a food supply chain are analyzed. Indrawati et al. [50] used ISM and the analytical network process in describing supply chain risks interrelationships. Venkatesh et al. [51] also analyzed supply chain risks in the Indian apparel retail chains using ISM. Ganguly and Das [52] developed a morphological model for supply risk management processes and link it to a supplier selection process. Shahabadkar et al. [53] presented an overview in deployment of ISM in SCRM and emphasized the need for new studies in this field. An advantage of WISM over ISM is that weights are assigned to the risk factors based on their perceived importance.
The criticism of current quantitative research is that analytical methods are much more focused in the SCRM literature than empirical methods. One of the main reasons is that it is difficult for analysts to communicate with experts, access industry data and conduct empirical research [22]. Therefore, to fill this gap, the risk factors of Turkish logistics service providers were identified in this study through both literature reviews and recommendations from a group of experts in the sector.

2.3. Industries Used in SCRM Research

As for the industries that have been considered in SCRM research, it was found that nearly all industries have been addressed. However, a major part is still focused on manufacturing supply chains [54]. Literature reviews show that the foremost applications are in the automobile industry, followed by the gadgets and aviation industry, while service supply chains are quite unexplored. Given the significance of service supply chains, it is imperative for analysts to increase their attention to this sector [22]. As one of the service supply chains, the logistics industry needs to be further developed, since there are a relatively limited number of studies. Chang et al. [55] analyzed the risks of container transportation from the perspective of logistics. Govindan and Chaudhuri [56] analyzed the interrelationships between the threats faced by third-party logistics service providers (3PL) by using Dematel. Wang [57] investigated the role of supply chain and risk in logistics performance in the Australian courier industry. Meyer et al. [58] investigate the key causes of supply chain disruption and vulnerability in South African logistics companies and establishes current tools or methods used by supply chain practitioners to mitigate supply chain risks. Cheung et al. [59] reviewed studies on measures that enhance cybersecurity in logistics and supply chain management. Amin et al. [60] looked at the sustainable supply chain risk management in Pakistan’s logistics industry using a novel fuzzy VIKOR–CRITIC technique. Focusing on the integrated supply chain of logistics services, we used the optimistic behavior of integrators as a starting point for research and investigated the factors that influence the performance of the logistics services supply chain.
In summarizing prior research in this area, we find that there are many studies that identify various types of risk factors that exist in supply chains. Some papers proceed to measure the “degree of risk” through qualitative or quantitative methods. Consequently, they either optimize a chosen objective (such as maximizing net profit or minimizing transportation costs), or discuss trade-offs between multiple objectives. Some papers prioritize the risk factors through a chosen scheme.
However, a fundamental gap that exists in the prior literature is that they do not study the relationships (as in a network) between the various risk factors, so as to establish which factors most impact the other factors. In our study, we establish these factors through a measure called the “driving power”. Second, we also establish the cluster of factors that are mostly impacted by the other factors. Here, again, we identify these factors through a measure called the “dependence power”. Some major advantages occur through such cluster identification in the mitigation of risk. It is based on the driving and dependence power of the risk factors, not a single measure as a priority weight, as identified in prior research. For risk factors identified with a high “driving power” and a low “dependence power”, for risk mitigation, these are of utmost importance to management. For risk factors with high “dependence power” and low “driving power”, since these do not significantly impact the other factors, management may adopt a strategy to control these factors to make them robust, such that the effect of other risk factors on them can be somewhat mitigated. Such analysis of risk mitigation through some prioritization scheme has not been explored in the prior literature in this sector. To sum up, the original contribution of this study is to introduce WISM as a new approach to supply chain risk management efforts by presenting an application to identify micro risks of logistics service providers at the industry level in Turkey, further providing insight on the driving and dependence factors.

3. Logistics Industry in Turkey

In Turkey, after the automotive and textile industry, the logistics industry represents the third largest sector in the economy [61]. Since Turkey is advantageously located between the center of transport corridors connecting Asia, Europe, and the Middle East [62], it has links to important energy, trade, and transport networks, and has the potential to meet ambitious foreign trade targets that are within the realm of Turkey’s national strategic plans [63]. This strategic position strengthens the potential of the country to become one of the world’s leading international logistics centers. As a widely recognized indicator of growth published by the World Bank, the logistics performance index (LPI) scores also verify this assertion. Accordingly, Turkey is a leading performer in Europe and the Central Asian region and is classified 39th in relation to total logistics performance worldwide [64]. Moreover, Turkey is the 11th pre-eminent country in logistics out of 41 emerging markets, according to Agility Emerging Markets Logistics Index provided by Transport Intelligence [65]. Both internal (growing international trade) and external (foreign investments and EU integration process) dynamics have contributed to the rapid growth of the logistics sector [66].
Cavusoglu and Keskin [1] stated that the two-fold digit development rates in the sector have drawn numerous players. There are many small-, medium-, and large-sized local companies in the sector. Arkas, Borusan, Horoz, Omsan, and Balnak are some of the leading local companies in the Turkish logistics industry [65]. Since growth rates in the logistics sector continue to rise, Turkey has also become significant to many international logistics companies. Today, DHL, UPS, and TNT have expanded their presence in the Turkish logistics market [2]. Additionally, all of the leading 10 world-wide third-party logistics corporations are quite active in Turkey by either operating directly or through associated agencies [65]. Moreover, the future of the sector is promising. Through a Delphi study, Özcan and Çetin [67] have forecasted the future of the Turkish logistics industry and claimed that the market position would improve with respect to the Logistics Performance Index. Turkey could arise as an international logistics center because of its geographically favorable location, and new foreign logistics companies would get into the market where the competing profits of the global logistics firms, over their Turkish competitors, would expand. These aspects make Turkey an interesting and a relevant case to study.

4. Materials and Methods

Interpretive structural modeling was introduced by Warfield [68,69,70]. It is a means that can impose an order for different relationships that exist between elements in complex systems. The theoretical roots of the interpretive structural modeling come from graph theory in such a way that theoretical, conceptual, and computational advantage are exploited to explain the complex pattern of conceptual relations among the variables [71].
This method is classified as an interpretive method because the evaluation of the participants affects whether and how the items are related to each other. Cross-impact matrix multiplication applied to classification (Matrice d’Impacts Croises-Multipication Applique en Classment) is abbreviated as MICMAC. It was developed by Duperrin and Galet [72] and developed to study the response path and loop impact on the development of hierarchies for the set members. The MICMAC principle is based on the matrix multiplication property. This indicates that if element A directly affects element B and element B directly affects element C, changes that affect A can affect C. Therefore, there is an indirect connection between A and C that cannot be displayed in the direct relationship matrix. However, squaring (multiplying the matrix by itself) the matrix using Boolean algebra reveals a quadratic relationship, e.g., second-order relations are revealed, such as A to C. Similarly, if the 3rd, 4th, 5th, … nth powers of the direct relationship matrix are obtained, the 3rd, 4th, 5th, … nth order reveals indirect connections. Each time the process repeats a new hierarchy can be derived between the elements. MICMAC analysis is used to analyze the drive power and dependence power of various factors that exist in the system.
An aggregate research method consisting of a questionnaire-based survey to obtain the opinions of professionals and experts in the field was used utilizing an ISM approach in order to identify the relationships between the chosen factors. The mean rating, based on a 5-point Likert scale, is calculated for each risk factor. Thereafter, the mean scores are ranked, from the highest to the lowest. For each factor, the inverse rank (Ki) is found, based on which Log Ki is calculated. Here, a weight is assigned to each risk factor based on its perceived risk. The weight, Wi, is determined next by using the definition in Equation (1) shown below:
A weight score Wi, associates with risk factor I, is designated to be strong when its value is 1, it is designated to be neutral when its value is 0, and is designated to be weak when its value is −1. Note that the value of the weight score, Wi, is influenced by its corresponding percentage score, log Ki, with the cut-off values as indicated in Equation (1)
For each risk factor i, a weighted measure of importance is given by:
IMPi = Wi × Log Ki
Finally, an effectiveness index (EI) of the process is given by [73] summing the importance measures over all the risk factors:
E I = i W i   × Log   K i
The effectiveness index (EI) = 14.1771, is the sum of the entries in the last column (Wi Log Ki). Theoretically, EI may range between −15.7982 and +15.7982, in this case. This is because the upper and lower limits of the EI are equal to ∑Log Ki and −∑Log Ki, respectively, when all the weights (Wi) are i or −i, respectively. For the sake of brevity, detailed explanation of this procedure is omitted and may be found in Cleveland [73], Chand et al. [74,75], and Singh et al. [76]. A weighting factor (Wi) was determined for each factor based on the logarithm of the inverse rank (Ki), which is found based on the mean score of the responses. The factor with the highest mean score is assigned the highest inverse rank. This assures that factors with high mean scores will have a higher weighted measure of importance. Subsequently, an effectiveness index (EI) is calculated based on the sum of the product of the weights and the log (inverse ranks). These methodologies and their associated results are discussed in the following sections.

4.1. Overview of the ISM Technique

Weighted ISM (WISM) is a more advanced variant of ISM that was created by Chand et al. [74]. Each factor is given a weight in order to calculate the efficiency index (EI). The process of creating a relationship map in which a collection of directly or indirectly connected elements/factors is organized into a comprehensive systematic model is known as ISM. The model uses visuals and words to describe the structure of a complex topic or problem, a system, or a subject of study in a well-organized pattern. The following are the steps in the ISM methodology:
Step 1: Determine the level of uncertainty and risk factors associated with the described problem (through literature review and expert opinion)
Step 2: Using a survey or a group problem-solving technique, identify uncertainty and risk factors. With respect to pairs of risk factors, a contextual relationship is formed between the uncertainty and risk factors.
Step 3: A structural self-interaction matrix (SSIM) is created, indicating the link between the system’s numerous risk variables.
Step 4: SSIM is then transformed into a binary matrix (Initial reachability matrix)
Step 5: The SSIM is used to create a reachability matrix (RM), which is then regulated to represent transitivity. In ISM, the assumption of transitivity of a contextual connection asserts that if element A is related to B and B is related to C, then A is related to C.
Step 6: Iterations are used to split the RM into different levels until all of the risk factors’ levels are found in the diagram. The RM is transformed into its conical form, with the majority of zero (0) elements in the upper diagonal half and the majority of unitary (1) elements in the lower diagonal half.
A diagram or, as previously noted, a relationship map with transitive links is generated based on the relationships specified in the reachability matrix. The risk factor nodes are replaced with statements in the resulting diagram, which is then turned into an ISM-based model. A diagram is produced based on the above study, and transitivity linkages are deleted. After that, the digraph is transformed into an ISM model by replacing the risk factor nodes with statements.
Step 7: The model is examined for conceptual inconsistencies and any necessary changes are made. The consecutive steps in this procedure are depicted in Figure 1.
Step 8: A MICMAC analysis is used to categorize the components according to their driving and reliance power.

4.2. Questionnaire-Based Survey

The major goal of the survey was to rank the various aspects according to experts’ opinions so that a relationship matrix could be developed as a first step toward constructing an ISM model. The questionnaire had a lot of different study objectives; thus, there were a lot of questions. On a five-point Likert scale, respondents were asked to rate the importance of the thirty-four risk variables included in the questionnaire. On this scale, a rating of ‘very low’ to ‘very high’ corresponded to 1 and 5, respectively. The respondents were asked to rate how challenging it is for logistics service providers to manage these uncertainty and risk issues. Chief executives, general managers, and senior executives from Turkish logistics companies were asked to complete the survey.
As a preliminary study, interviews with 19 branch managers in the Black Sea Region were conducted to determine risk factors of importance in Turkey. All branch managers were fairly in agreement in terms of the chosen risk factors. Subsequently, a convenience sampling method was employed. Sixty-four branch managers in the Black Sea Region were chosen and a face-to-face survey was conducted. As a demographic profile of the 64 branch managers, 56 of the respondents (87.5%) were male and 8 (12.5%) were female. The average age was about 42.
Table 1 shows the logistics service providers operating in Turkey. As can be seen, cargo companies in Turkey have a total number of branches of 8127, along with the number of branches from each company represented in our sample. Because of the technical and financial limitations, the sample was constrained to only the Black Sea Region of the country. However, it was further verified that no new opinions were offered through interviewing additional managers.

4.3. Evaluation of the Effectiveness Index (EI)

The thirty-four risk factors mentioned previously were reduced to eighteen. This reduction was accomplished by considering “lead to” type factors and using the opinions of the sixty-nine experts in this domain. The 64 branch managers from industry, 2 experts, and 3 researchers from academia were consulted in developing the contextual relationship among these factors. The factors, with their mean score and rank, are shown in Table 2.
This EI value helps the organization to benchmark its performance to national and international standards. Here, the qualitative values of the factor ratings are converted into quantitative values representing weighted importance values. Management may incorporate these values to make decisions regarding appropriate risk remedial actions.

4.4. ISM Technique for Modeling the Risk Factors of Uncertainty and Risk in Logistics Service Providers

The various steps which lead to the development of the model are illustrated below:
Steps 1 and 2: Establish the contextual relationship between factors
Initially, in the preliminary study phase, risks and uncertainties were determined by face-to-face interviews with nineteen branch managers of parcel service companies from seven geographical regions. As a result of data obtained from interviews and also via a literature review, 34 risk factors were determined. Subsequently, these factors were reduced to 18 (see Table 2).
The existence of a relation between any two factors (i and j) and the related direction of this link is determined while keeping in mind the contextual relationship for each factor. The direction of the relationship between two factors (i and j) has been denoted by the following four symbols:
  • If factor i influences or reaches factor j, V is utilized.
  • If factor j influences ore reaches factor i, A is utilized.
  • If factors i and j interact, X is utilized.
  • If factors i and j are unrelated, O is utilized.
Step 3: Development of a structural self-interaction matrix (SSIM)
  • The SSIM is created based on the contextual relationship between factors. The SSIM was discussed with a group of specialists in order to reach an agreement. The SSIM has been finalized and is provided in Table 3 based on their responses. The statements below show how to use the symbols in SSIM.
  • For example, risk factor 4 leads to 18, indicated by the symbol V in the corresponding cell; there was no relationship between risk factors 3 and 7, indicated by the symbol O in the corresponding cell.
Steps 4 and 5: Development of the reachability matrix (RM)
  • The SSIM is used to create the reachability matrix (RM). The initial and final reachability matrixes are the two types of reachability matrixes. By swapping the V, A, X, and O with 1 and 0, the SSIM is turned into a binary matrix termed the initial reachability matrix. The following rules govern the replacement of 1s and 0s.
  • If cell (i, j) is denoted by the symbol V in the SSIM, then the cell (i, j) is replaced by 1, implying that i leads to j and the cell (j, i) becomes 0 (implying that j does not lead to i) in the initial reachability matrix.
  • If the cell (i, j) is denoted by the symbol A in the SSIM, then the cell (i, j) becomes 0 and the cell (j, i) becomes 1 in the initial reachability matrix.
  • If the cell (i, j) is denoted by the symbol X in the SSIM, then both the cells (i, j) and (j, i) become 1 (implying that there is a mutual relationship) in the initial reachability matrix.
  • If the cell (i, j) is assigned with symbol O in the SSIM, then both the cells (i, j) and (j, i) become 0 (implying that there is no relationship between these factors) in the initial reachability matrix.
  • The RM developed is known as the initial RM, which is shown in Table 4. For developing the final reachability matrix, transitivity is applied so that some of the cells of the initial reachability matrix are filled through inference. The transitivity concept is used in order to develop a more complete model and relationship map. Transitivity is applied once in this study and it can be thought as the composite function or applying function in matrices to express the relationship between two nodes. Simply speaking, if i leads to j and j leads to k, when applying transitivity, it can be said that i may lead to k. The final reachability matrix after incorporating the concept of transitivity is presented in Table 5. The numbers with an asterisk, for example 1*, implies that it was derived using the principle of transitivity.
Table 4. Initial reachability matrix.
Table 4. Initial reachability matrix.
123456789101112131415161718
1100100000000010000
2110000000000110000
3111110000000000000
4001100000010000001
5000110000000000000
6110111000000010101
7110000100010010000
8110100011000110110
9110100011000110000
10001001000110000001
11101111000010000001
12100101101101101111
13110110010000100000
14100100000010010000
15100010000010001000
16110100000000000100
17110010011000010110
18000000000000000001
Table 5. Final reachability matrix.
Table 5. Final reachability matrix.
123456789101112131415161718
1101*10000001*0010001*
21101*1*001*001*0110000
311111000001*01*1*0001*
41*1*111*0000010000001
5001*11000001*0000001*
611011100001*01*10101
7111*1*1*1*1000101*10001*
8111*11*001101*0110111*
9111*11*001101*01101*1*1*
101*1*11*1*100011001*01*01
1111*111100001001*01*01
1211*1*11*111*111*111*1111
13111*110011*01*011*01*1*1*
14101*11*1*000010010001*
15101*1*11*00001001*1001*
16111*10000001*01*00101*
171101*1001101*01*10110
18000000000000000001
1* entries are included to incorporate transitivity.
Step 6: Partitioning the reachability matrix (RM)
Based on Warfield [68,69,70], from the final RM, the reachability set (RS) and antecedent set (AS) consist of uncertainty and risk factors. After finding the RS and AS, the intersection set (IS) of these two is determined. Those factors for which the RS and IS have the same elements take their place at the top level in the ISM hierarchy. This rule is used for each iteration until no risk factors are left to be assigned.
Once the top-level risk factor(s) is identified, it is extracted from all the remaining factors’ RS, AS, and IS and thereby modified. This method is repeated until all of the structure’s levels have been identified. The construction of the diagram and the final model is enabled by these indicated phases. The digraph’s top-level factor(s) are placed at the top, and so on. Using Table 5, a data risk factor of 18, whose RS and IS set consists of factor 18, is found to be at the top level I, and is positioned at the top of the hierarchy. This may also be viewed in Figure 2.
Table 6, Table 7, Table 8, Table 9, Table 10, Table 11, Table 12 and Table 13, depicting iterations 1–8, respectively, show the RS, AS, and IS sets and also the appropriate hierarchy levels of the risk factors.
Step 7: Development of the conical matrix, digraph and ISM model
A conical matrix is created in this stage by grouping factors that are on the same level across the rows and columns of the final reachability matrix. Counting the “1” values in the rows and columns, respectively, yields the factor’s drive and dependence power. The highest ranks are given to the components that have the greatest number of “1” values in the rows and columns, respectively, as shown in Table 14.
An initial diagram with transitivity relations is created using the conical matrix. This is accomplished by forming nodes and connecting them with lines of edges. After the indirect links are removed, a final digraph is created. The digraph is then transformed into an ISM model by replacing the element nodes with statements, as shown in Figure 2. The top-level factor(s) are placed at the top of the digraph, the second level factor(s) at the second position, and so on until the bottom level factor(s) are placed at the lowest position in the diagram.
Step 8: Classification of uncertainty and risk factors on the basis of MICMAC analysis
The goal of the MICMAC study is to look at factors in terms of their drive and dependence power. The drive and dependence power matrices are then generated and illustrated in Table 15. All of the risk factors are grouped into four categories in this section. The first cluster (Cluster I) is made up of ‘autonomous measures’ with low drive and dependence power. They are relatively cut off from the system, with which they have only a few tenuous relations. These factors do not affect the system and are not affected by the system. Factor 15 (lack of transportation trucks/equipment) and Factor 16 (lack of customer relationship management) are autonomous factors in our study.
The second cluster (Cluster II) consists of ‘dependent measures’ which have weak drive power but strong dependence power. These have strong links with the general system. Factors 1, 2, 3, 4, 5, 14, and 18 are dependent factors.
The third cluster (Cluster III) contains ‘linkage measures’, which have both high driving and dependence power. These are unstable. Any action taken in response to these will have an impact on others as well as a self-feedback effect. The study’s connection factors are Factor 13 (accepting packages that do not meet standards) and Factor 11 (conflicts between workers and managers).
The fourth cluster (Cluster IV) consists of the ‘independent measures’ that have strong drive power but weak dependence power. These affect the other factors so that they are crucial parameters. They deserve a high priority in terms of management decision making to mitigate risk. Factors 6, 7, 8, 9, 10, 12, and 17 are independent factors.

5. Discussion of Results

Several guidance themes that are of interest to top management may be drawn from the analyses of the results and the developed ISM model. It seems that lack of strategic planning and failure to sense and respond to market changes is a critical issue that has an enormous impact on a majority of the risk factors. It has the strongest driving power. Placing due emphasis on strategic planning and creating an agile environment, so that the organization may readily adapt to the dynamic changes in the market, will serve to diminish information technology (IT) infrastructure-related issues as well as information technology equipment-related needs.
Another outcome of placing an emphasis on strategic planning is that it impacts many other risk factors, such as lack of skilled workers, lack of customer relationship management, lack of motivation among workforce, and delays in delivery reports, to name just a few. This is observed from the developed ISM model, where “lack of strategic planning”, being at the lower level of the ISM model, is found to impact quite a few of the risk factors. This is the single most factor with enormous impact. Top management, by focusing on this measure, can therefore address many of the other issues associated with the risk mitigation of the logistics industry.
Two other risk factors that have a high driving power are “problems arising from the address-based information system” and “logistics service providers forms not adequately designed”. From the model, it is observed that the latter factor has a direct impact on the former factor, which subsequently impacts many other risk factors, such as “lack of customer relationship management”, “carelessness and a lack of motivation among workforce”, “accepting unclear, concise, and inaccurate address information”, “delays in delivery reports”, and others. Thus, by creating “adequately designed forms”, the organization should be able to address many of these issues.
From the analyses and the developed model, it is found that “accepting packages that do not meet standards” has a driving power similar to that of “logistics service providers forms not adequately designed”, discussed previously. Its dependence power is slightly higher than that of the risk factors of “logistics service providers’ forms not adequately designed” and “problems arising from the address-based information system”. We observe from the ISM model that addressing the factor “accepting packages that do not meet standards” obviously impacts the factor “accepting unclear, concise, and inaccurate address information” and vice versa. Furthermore, addressing this issue will also have an impact on some of the other risk factors at the upper level of the hierarchy. From the ISM model, the risk factors impacted will be “delays in delivery reports” and, consequently, those factors impacted by it.
Moving on to the risk factors at the next level of driving power, these are found to be “lack of information technology equipment”, “lack of information infrastructure”, and “lack of adequate promotion standards and requirements for managers”. The dependence power for each one of these risk factors is rather low. From the ISM model, we observe that addressing the factor of “lack of strategic planning and failure to sense and respond to market changes” directly impacts all three of the risk factors at this level, namely, “lack of information technology equipment”, “lack of information infrastructure”, and “lack of transportation trucks/equipment”. Hence, by dealing with the factor “lack of strategic planning and failure to sense and respond to market changes”, as the one with the highest driving power, initially, the risk factors at this level have been dealt with implicitly. Of the remaining risk factors, the one with a high driving power is “lack of skilled workers”. While this directly impacts “lack of customer relationship management” and, consequently, other risk factors up the chain of hierarchy, it is impacted by the other previously considered risk factors, which have a higher driving power. For example, the risk factors with the highest driving power, namely “lack of strategic planning” and the factor “lack of adequate promotion standards and requirements for managers”, with a higher driving power than that of this factor, have an impact on “lack of skilled workers”.

Insights on the Turkish Logistics Industry

Some insightful results, related to the logistics industry in Turkey, are observed from the analysis. Based on joint consideration of the driving power and dependence power of risk factors, a priority action for risk mitigation is to have a futuristic and participative strategic planning process that is responsive to market changes. Such an action seems logical, since the Turkish logistics sector meets demand from Europe, Middle East, and Asia. Supply and demand in these regions will impact the business of logistics industries in Turkey. Changes in the European Union policies may affect logistics operations in Turkey, and consequently, top management may have to be prepared to be agile. Several countries in the Middle East are also under conditions of instability, such as the war in Syria. This affects the logistic sector in Turkey as well.
Another distinctive result observed from the analysis is the factors of lack of forms not adequately designed and problems with address-based information systems. Both of these factors have high driving power and relatively small dependence power. For mitigation of risk, these should also be high on the list for consideration by top management. A reason for these two factors being of high importance in the Turkish logistics sector could be that the address Registration System in Turkey is not integrated with an urban information system. As a result, there are some functional problems in the Standardized Address Database [77]. Thus, the addressing system has not been comprehended adequately and implemented properly in Turkey [78]. Another reason could be the practices of changing names of places, such as streets and squares, as a popular method of attaching national values to public space in Turkey [79]. These changes may also create some problems in addressing systems.
Furthermore, another reason could be that all parts of the form are either not being filled out completely or that certain information required for sorting is not specifically identified in the forms. The burden of rectification, to some extent, may fall on the hands of the logistics providers. Since these two factors are more generic in nature, addressing them, initially, should improve the effectiveness and efficiency of operations. Goods will arrive faster and fewer wrong deliveries will be made with effective action on these two factors. Hence, this recommendation could be expanded to logistics industries, in general.
Another observation from the analysis, pertinent to the Turkish logistics sector for risk mitigation, seems to be the creation of adequate promotion standards and requirements for high level managers. This particular factor has generally not surfaced in prior studies. Possible reasons could be that nepotism exists in the filling of senior management. Alternatively, favoritism based on personal relationships are possibly rewarded over professional qualifications. Lack of such standards will obviously have an effect on the morale and motivation of employees who are impacted by these undeserving promoted personnel.

6. Conclusions

In the current century, it is not feasible to be agile to market needs unless an adequate IT infrastructure is in place for rapid dissemination of information requirements at all levels of the organization. Such actions will improve both effectiveness and efficiency and make the company more robust to related risk factors. With the high driving power of the factor, lack of strategic planning, it is imperative for senior management to firmly implant such a structure within the organization. Doing so will create other benefits, such as a forward-thinking organization that is constantly looking ahead to identify the changing and unmet needs of the customer. It will also assist in keeping the organization ahead of its competitors.
On an overall basis, we are in a position to summarize our conclusions for risk mitigation in the logistics industry of Turkey. Top management needs to put the highest emphasis on strategic planning. In developing their goals and objectives, they need to be cognizant of market changes, since customer needs are dynamic and change with time. Beyond this important action item, designing adequate forms for logistics service providers seems to be of importance. The impact of both of these action items permeates throughout all levels of the organization. The first action item has a direct impact on keeping the organization at the forefront of the industry. It indirectly affects morale and motivation of the workforce as well as customer relationship management, an important consideration in the logistics industry. All of this helps to improve effectiveness and efficiency. The second action item is more specific and deals with design of the appropriate forms for the service providers. Adequate design will reduce errors in delivery, improve delivery time, and, consequently, also improve customer relationship management, since there will be fewer customers who will be displeased. An indirect benefit of this action may be a reduction in “accepting packages that do not meet standards”, since clear guidelines will be specified on completing information requirements on the stipulated forms. This will also help in reducing delays in service as well as delivery reports. The third action item is to improve “lack of adequate promotion standards and requirements for high level managers”. Addressing this will impact the “skill level of workers” and foster improvement in “customer relationship management”. Direct benefits of such an action include reduction in errors and improvement in efficiency. Indirect benefits of this action include improved morale and motivation of the workforce and fewer conflicts between workers and managers.
Since the data were collected from logistics companies in Turkey, the conclusions are relevant to such organizations in Turkey. However, we feel that the general conclusions drawn from the study could be of interest to logistics companies in general. The rationale behind this statement is based on the thoroughness of the study. Given the variety of risk factors considered in the study, eighteen to be precise, and the network relationship between the factors, we believe that for logistics companies in other countries, similar risk mitigation actions could be relevant. Furthermore, feedback from practitioners and academics, all familiar with the logistics industry, provides us with some degree of confidence regarding the issues that are faced by logistics service providers in Turkey and possibly beyond its boundaries.
As emphasized by Pfohl et al. [48], one point to be careful of when determining the relationships between risks is that participating experts have to be instructed to focus solely on bi-directional linkages between two risks. If transitive dependencies are used, the model will produce too many cycles, and therefore, will not derive a hierarchy based on the input. With a careful research design, WISM can be used as an applicable methodology to supply chain risk management efforts.
There are some limitations of the interpretive structural modeling (ISM) procedure. First, it is not practical in systems with too many elements in operation. Second, while ISM cannot be statistically validated, using a Delphi method by seeking input from experts in the field provides some validation to the chosen risk factors and their relative importance. Third, ISM cannot deal with the dynamic and time-related behavior of the risk factors. Fourth, since convenience sampling was used in this study, future studies could perhaps draw a larger sample size of Turkish managers that represents a broader geographical region. Fifth, based on the risk classification of Ho et al. [22], we considered only micro-level risk factors of the service providers in Turkey. Perhaps, future studies could include micro- and macro-level risk factors and in order to yield an in-depth understanding of the sectoral risks in Turkey.
Other areas of future research in this context are as follows. Since the ISM technique is static in nature, perhaps system dynamic models could address the dynamic and time-related behavior of risk factors. Furthermore, for future studies, perhaps structural equation modeling (SEM) techniques could be used in order to derive statistically valid inferences. However, in that situation, for testing of research hypothesis, assumptions may have to be made on the data for proper use of a specified technique. Finally, in-depth interviews with top management teams of logistic service providers in Turkey can be used to collect holistic data on the risks of supply chain management in future studies.

Author Contributions

Conceptualization, Z.C.U., C.B. and A.M.; data curation, Z.C.U. and C.B.; formal analysis, Z.C.U. and C.B.; investigation, Z.C.U., C.B. and A.M.; methodology, Z.C.U., C.B. and A.M.; writing—original draft, Z.C.U., C.B. and A.M.; writing—review and editing, Z.C.U., C.B. and A.M. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

Not applicable.

Acknowledgments

The authors are grateful to the participants who contributed to the research.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Cavuşoğlu, D.; Keskin, H. Comparing the Logistics Vocational Education in Germany and Turkey. 2016. Available online: https://abegitim.academia.edu/DidemCavusoglu/Coauthors (accessed on 6 April 2019).
  2. Mitra, A.; Basfirinci, C. Competitive Assessment of Quality Attributes of a Service Provider. J. Serv. Sci. Res. 2018, 10, 189–232. [Google Scholar] [CrossRef]
  3. Kumar, M.; Vrat, P.; Shankar, R. A fuzzy programming approach for vendor selection problem in a supply chain. Int. J. Prod. Econ. 2006, 101, 273–285. [Google Scholar] [CrossRef]
  4. Chan, F.T.; Kumar, N. Global supplier development considering risk factors using fuzzy extended AHP-based approach. Omega 2007, 35, 417–431. [Google Scholar] [CrossRef]
  5. Blackhurst, J.V.; Scheibe, K.P.; Johnson, D.J. Supplier risk assessment and monitoring for the automotive industry. Int. J. Phys. Distrib. Logist. Manag. 2008, 38, 143–165. [Google Scholar] [CrossRef]
  6. Ho, W.; Dey, P.K.; Lockström, M. Strategic sourcing: A combined QFD and AHP approach in manufacturing. Supply Chain. Manag. Int. J. 2011, 16, 446–461. [Google Scholar] [CrossRef] [Green Version]
  7. Samvedi, A.; Jain, V.; Chan, F.T. Quantifying risks in a supply chain through integration of fuzzy AHP and fuzzy TOPSIS. Int. J. Prod. Res. 2013, 51, 2433–2442. [Google Scholar] [CrossRef]
  8. Berger, P.D.; Gerstenfeld, A.; Zeng, A.Z. How many suppliers are best? A decision-analysis approach. Omega 2004, 32, 9–15. [Google Scholar] [CrossRef]
  9. Tavakolan, M.; Etemadinia, H. Fuzzy weighted interpretive structural modeling: Improved method for identification of risk interactions in construction projects. J. Constr. Eng. Manag. 2007, 143, 04017084. [Google Scholar] [CrossRef]
  10. Jüttner, U.; Peck, H.; Christopher, M. Supply chain risk management: Outlining an agenda for future research. Int. J. Logist. Res. Appl. 2003, 6, 197–210. [Google Scholar] [CrossRef] [Green Version]
  11. Cooper, M.C.; Lambert, D.M.; Pagh, J.D. Supply chain management: More than a new name for logistics. Int. J. Logist. Manag. 1997, 8, 1–14. [Google Scholar] [CrossRef]
  12. Norrman, A.; Jansson, U. Ericsson’s proactive supply chain risk management approach after a serious sub-supplier accident. Int. J. Phys. Distrib. Logist. Manag. 2004, 34, 434–456. [Google Scholar] [CrossRef]
  13. Hudnurkar, M.; Deshpande, S.; Rathod, U.; Jakhar, S.K. Supply chain risk classification schemes: A literature review. Oper. Supply Chain. Manag.—Int. J. 2017, 10, 182–199. [Google Scholar] [CrossRef] [Green Version]
  14. Louis, M.; Pagell, M. Categorizing Supply Chain Risks: Review, Integrated Typology and Future Research. In Revisiting Supply Chain Risk; Zsidisin, G.A., Henke, M., Eds.; Springer: Cham, Switzerland, 2019; pp. 329–366. [Google Scholar]
  15. Tran, T.H.; Dobrovnik, M.; Kummer, S. Supply chain risk assessment: A content analysis-based literature review. Int. J. Logist. Syst. Manag. 2018, 31, 562–591. [Google Scholar] [CrossRef]
  16. Cavinato, J.L. Supply chain logistics risks: From the back room to the board room. Int. J. Phys. Distrib. Logist. Manag. 2004, 34, 383–387. [Google Scholar] [CrossRef]
  17. Manuj, I.; Mentzer, J.T. Global supply chain risk management strategies. Int. J. Phys. Distrib. Logist. Manag. 2008, 38, 192–223. [Google Scholar] [CrossRef] [Green Version]
  18. Tang, C.S.; Tomlin, B. The power of flexibility for mitigating supply chain risks. Int. J. Prod. Econ. 2008, 116, 12–27. [Google Scholar] [CrossRef] [Green Version]
  19. Kumar, S.K.; Tiwari, M.K.; Babiceanu, R.F. Minimisation of supply chain cost with embedded risk using computational intelligence approaches. Int. J. Prod. Res. 2010, 48, 3717–3739. [Google Scholar] [CrossRef]
  20. Olson, D.L.; Dash Wu, D. A review of enterprise risk management in supply chain. Kybernetes 2010, 39, 694–706. [Google Scholar] [CrossRef] [Green Version]
  21. Wu, T.T.; Blackhurst, J.J.; Chidambaram, V.V. A model for inbound supply risk analysis. Comput. Ind. 2006, 57, 350–365. [Google Scholar] [CrossRef]
  22. Ho, W.; Zheng, T.; Yildiz, H.; Talluri, S. Supply chain risk management: A literature review. Int. J. Prod. Res. 2015, 53, 5031–5069. [Google Scholar] [CrossRef]
  23. Jüttner, U. Supply chain risk management: Understanding the business requirements from a practitioner perspective. Int. J. Logist. Manag. 2005, 16, 120–141. [Google Scholar] [CrossRef]
  24. Baird, I.; Thomas, H. What is risk anyway? In Risk, Strategy and Management; Bettis, T., Thomas, H., Eds.; JAI Press: Greenwich, CT, USA, 1990; pp. 21–52. [Google Scholar]
  25. Rao, S.; Goldsby, T.J. Supply chain risks: A review and typology. Int. J. Logist. Manag. 2009, 20, 97–123. [Google Scholar] [CrossRef]
  26. Sodhi, M.S.; Son, B.G.; Tang, C.S. Researchers’ perspectives on supply chain risk management. Prod. Oper. Manag. 2012, 21, 1–13. [Google Scholar] [CrossRef]
  27. Tang, C.S. Perspectives in supply chain risk management. Int. J. Prod. Econ. 2006, 103, 451–488. [Google Scholar] [CrossRef]
  28. Qiang, P.; Nagurney, A. A bi-criteria indicator to assess supply chain network performance for critical needs under capacity and demand disruptions. Transp. Res. Part A Policy Pract. 2012, 46, 801–812. [Google Scholar] [CrossRef]
  29. Badurdeen, F.; Shuaib, M.; Wijekoon, K.; Brown, A.; Faulkner, W.; Amundson, J.; Boden, B. Quantitative modeling and analysis of supply chain risks using Bayesian theory. J. Manuf. Technol. Manag. 2014, 25, 631–654. [Google Scholar] [CrossRef]
  30. Garvey, M.D.; Carnovale, S.; Yeniyurt, S. An analytical framework for supply network risk propagation: A Bayesian network approach. Eur. J. Oper. Res. 2015, 243, 618–627. [Google Scholar] [CrossRef]
  31. Käki, A.; Salo, A.; Talluri, S. Disruptions in supply networks: A probabilistic risk assessment approach. J. Bus. Logist. 2015, 36, 273–287. [Google Scholar] [CrossRef]
  32. Lockamy, A., III. Assessing disaster risks in supply chains. Ind. Manag. Data Syst. 2014, 114, 755–777. [Google Scholar] [CrossRef]
  33. Lockamy, A., III; McCormack, K. Analysing risks in supply networks to facilitate outsourcing decisions. Int. J. Prod. Res. 2010, 48, 593–611. [Google Scholar] [CrossRef] [Green Version]
  34. Qazi, A.; Quigley, J.; Dickson, A.; Kirytopoulos, K. Project Complexity and Risk Management (ProCRiM): Towards modelling project complexity driven risk paths in construction projects. Int. J. Proj. Manag. 2016, 34, 1183–1198. [Google Scholar] [CrossRef] [Green Version]
  35. Hung, K.T.; Ryu, S. Changing risk preferences in supply chain inventory decisions. Prod. Plan. Control 2008, 19, 770–780. [Google Scholar] [CrossRef]
  36. Laeequddin, M.; Sardana, G.D.; Sahay, B.S.; Abdul Waheed, K.; Sahay, V. Supply chain partners’ trust building process through risk evaluation: The perspectives of UAE packaged food industry. Supply Chain. Manag. Int. J. 2009, 14, 280–290. [Google Scholar] [CrossRef]
  37. Skipper, J.B.; Hanna, J.B. Minimizing supply chain disruption risk through enhanced flexibility. Int. J. Phys. Distrib. Logist. Manag. 2009, 39, 404–427. [Google Scholar] [CrossRef]
  38. Welburn, J.; Bier, V.; Hoerning, S. Import security: Assessing the risks of imported food. Risk Anal. 2016, 36, 2047–2064. [Google Scholar] [CrossRef] [PubMed]
  39. Zhao, L.; Huo, B.; Sun, L.; Zhao, X. The impact of supply chain risk on supply chain integration and company performance: A global investigation. Supply Chain. Manag. Int. J. 2013, 18, 115–131. [Google Scholar] [CrossRef]
  40. Khan, M.; Lee, H.Y.; Bae, J.H. The role of transparency in humanitarian logistics. Sustainability 2019, 11, 2078. [Google Scholar] [CrossRef] [Green Version]
  41. Wei, H.; Dong, M.; Sun, S. Inoperability input output modeling (IIM) of disruptions to supply chain networks. Syst. Eng. 2010, 13, 324–339. [Google Scholar] [CrossRef]
  42. Atwater, C.; Gopalan, R.; Lancioni, R.; Hunt, J. Measuring supply chain risk: Predicting motor carriers’ ability to withstand disruptive environmental change using conjoint analysis. Transp. Res. Part C Emerg. Technol. 2014, 48, 360–378. [Google Scholar] [CrossRef]
  43. Hendricks, K.B.; Singhal, V.R. Association between supply chain glitches and operating performance. Manag. Sci. 2005, 51, 695–711. [Google Scholar] [CrossRef]
  44. De Souza Feitosa, I.S.C.; Carpinetti, L.C.R.; De Almeida-Filho, A.T. A supply chain risk management maturity model and a multi-criteria classification approach. Benchmarking Int. J. 2021, 28, 2636–2655. [Google Scholar] [CrossRef]
  45. Bier, T.; Lange, A.; Glock, C.H. Methods for mitigating disruptions in complex supply chain structures: A systematic literature review. Int. J. Prod. Res. 2020, 58, 1835–1856. [Google Scholar] [CrossRef]
  46. Chalmeta, R.; Barqueros-Muñoz, J.E. Using big data for sustainability in supply chain management. Sustainability 2021, 13, 7004. [Google Scholar] [CrossRef]
  47. Nishat Faisal, M.; Banwet, D.K.; Shankar, R. Supply chain risk mitigation: Modeling the enablers. Bus. Process Manag. J. 2006, 12, 535–552. [Google Scholar] [CrossRef]
  48. Pfohl, H.C.; Gallus, P.; Thomas, D. Interpretive structural modeling of supply chain risks. Int. J. Phys. Distrib. Logist. Manag. 2011, 41, 839–859. [Google Scholar] [CrossRef]
  49. Diabat, A.; Govindan, K.; Panicker, V.V. Supply chain risk management and its mitigation in a food industry. Int. J. Prod. Res. 2012, 50, 3039–3050. [Google Scholar] [CrossRef] [Green Version]
  50. Indrawati, C.D.; Karningsih, P.D.; Vanany, I. Development of supply chain risks interrelationships model using interpretive structural modeling and analytical network process. IPTEK J. Proc. Ser. 2015, 1, 449–453. [Google Scholar]
  51. Venkatesh, V.G.; Rathi, S.; Patwa, S. Analysis on supply chain risks in Indian apparel retail chains and proposal of risk prioritization model using Interpretive structural modeling. J. Retail. Consum. Serv. 2015, 26, 153–167. [Google Scholar] [CrossRef]
  52. Ganguly, K.; Das, D. Modelling the enablers of supply risk management using interpretive structural methodology. In Research, Practices, and Innovations in Global Risk and Contingency Management; Strang, K.D., Korstanje, M.E., Vajjhala, N., Eds.; IGI Global: Pennsylvania, PA, USA, 2018; pp. 286–304. [Google Scholar]
  53. Shahabadkar, P.; Hebbal, S.S.; Prashant, S. Deployment of interpretive structural modeling methodology in supply chain management-an overview. Int. J. Ind. Eng. Prod. Res. 2012, 23, 195–205. [Google Scholar]
  54. Shaikh, A.; Ahmed, W. Understanding influence of supply chain relationships in retail channels on risk management. Decision 2022, 49, 153–176. [Google Scholar] [CrossRef]
  55. Chang, C.H.; Xu, J.; Song, D.P. Risk analysis for container shipping: From a logistics perspective. Int. J. Logist. Manag. 2015, 26, 147–171. [Google Scholar] [CrossRef]
  56. Govindan, K.; Chaudhuri, A. Interrelationships of risks faced by third party logistics service providers: A DEMATEL based approach. Transp. Res. Part E Logist. Transp. Rev. 2016, 90, 177–195. [Google Scholar] [CrossRef] [Green Version]
  57. Wang, M. Impacts of supply chain uncertainty and risk on the logistics performance. Asia Pac. J. Mark. Logist. 2018, 30, 689–704. [Google Scholar] [CrossRef]
  58. Meyer, A.; Niemann, W.; Uys, G.; Beetge, D. An exploration of supply chain risk management in the South African third-party logistics industry. Acta Commer. 2019, 19, a612. [Google Scholar] [CrossRef] [Green Version]
  59. Cheung, K.F.; Bell, M.G.; Bhattacharjya, J. Cybersecurity in logistics and supply chain management: An overview and future research directions. Transp. Res. Part E Logist. Transp. Rev. 2021, 146, 102217. [Google Scholar] [CrossRef]
  60. Amin, F.U.; Dong, Q.L.; Grzybowska, K.; Ahmed, Z.; Yan, B.R. A Novel Fuzzy-Based VIKOR–CRITIC Soft Computing Method for Evaluation of Sustainable Supply Chain Risk Management. Sustainability 2022, 14, 2827. [Google Scholar] [CrossRef]
  61. UTIKAD (Association of International Forwarding and Logistics Service Providers). Turkish Logistics Sector Evaluation. 2013. Available online: https://www.utikad.org.tr/images/HizmetRapor/ (accessed on 21 May 2021).
  62. Kucukaltan, B.; Irani, Z.; Aktas, E. A decision support model for identification and prioritization of key performance indicators in the logistics industry. Comput. Hum. Behav. 2016, 65, 346–358. [Google Scholar] [CrossRef] [Green Version]
  63. Vural, C.A.; Tuna, O. The prioritisation of service dimensions in logistics centres: A fuzzy quality function deployment methodology. Int. J. Logist. Res. Appl. 2016, 19, 159–180. [Google Scholar] [CrossRef]
  64. Aktas, E.; Agaran, B.; Ulengin, F.; Onsel, S. The use of outsourcing logistics activities: The case of Turkey. Transp. Res. Part C Emerg. Technol. 2011, 19, 833–852. [Google Scholar] [CrossRef]
  65. Akman, G.; Baynal, K. Logistics service provider selection through an integrated fuzzy multicriteria decision making approach. J. Ind. Eng. 2014, 2014, 794918. [Google Scholar] [CrossRef] [Green Version]
  66. Saatcioglu, Ö.Y.; Deveci, D.A.; Guldem Cerit, A. Logistics and transportation information systems in Turkey: E-government perspectives. Transform. Gov. People Process Policy 2009, 3, 144–162. [Google Scholar]
  67. Özcan, İ.Ç.; Çetin, V.R.; Albayrak, M.B.K. A Delphi-based scenario analysis of Turkish logistics industry for 2023. Int. J. Logist. Syst. Manag. 2018, 29, 349–373. [Google Scholar]
  68. Warfield, J.N. Binary matrices in system modeling. IEEE Trans. Syst. Man Cybern. 1973, 5, 441–449. [Google Scholar] [CrossRef] [Green Version]
  69. Warfield, J.N. Developing interconnection matrices in structural modeling. IEEE Trans. Syst. Man Cybern. 1974, 1, 81–87. [Google Scholar] [CrossRef] [Green Version]
  70. Warfield, J. Interpretive Structural Modeling, In Systems & Control Encyclopedia Theory, Technology, Applications; Singh, M.G., Ed.; Pergamon: Oxford, UK, 1987; pp. 2575–2580. [Google Scholar]
  71. Charan, P.; Shankar, R.; Baisya, R.K. Analysis of Interactions among variables of supply chain performance measurement system implementation. Bus. Process Manag. J. 2008, 14, 512–529. [Google Scholar] [CrossRef]
  72. Duperrin, J.C.; Godet, M. Method De Hierarchization des Elements D’um System. Rapp. Econ. De CEA; No. CEA-R-45-41; Paris. 1973. Available online: https://inis.iaea.org/collection/NCLCollectionStore/_Public/05/115/5115595.pdf (accessed on 21 May 2021).
  73. Cleveland, G.; Schroeder, R.G.; Anderson, J.C. A theory of production competence. Decis. Sci. 1989, 20, 655–668. [Google Scholar] [CrossRef]
  74. Chand, M.; Raj, T.; Shankar, R. Analyzing the operational risks in supply chain by using weighted interpretive structure modelling technique. Int. J. Serv. Oper. Manag. 2014, 18, 378–403. [Google Scholar]
  75. Chand, M.; Raj, T.; Shankar, R. Weighted-ISM technique for analyzing the competitiveness of uncertainty and risk measures in supply chain. Int. J. Logist. Syst. Manag. 2015, 21, 181–198. [Google Scholar]
  76. Singh, R.K.; Garg, S.K.; Deshmukh, S.G. Competitiveness analysis of a medium scale organization in India: A case. Int. J. Glob. Bus. Compet. 2008, 2, 27–40. [Google Scholar]
  77. Türk, T. Adres Kayıt Sistemi ile Kent Bilgi Sistemleri’nin Bütünleştirilmesi. HKM Jeodezi Jeoinformasyon ve Arazi Yönetimi Derg. 2008, 99, 13–22. [Google Scholar]
  78. Kılıc, B.; Gulgen, F. Türkiye’de Kullanılan Posta Adres Bilgilerinde Uyum Düzeylerinin Belirlenmesi. Harit. Derg. 2019, 161, 26–34. [Google Scholar]
  79. Jongerden, J. Crafting space, making people: The spatial design of nation in modern Turkey. Eur. J. Turk. Stud. Soc. Sci. Contemp. Turk. 2009, 10, 1–25. [Google Scholar] [CrossRef]
Figure 1. Flowchart for ISM.
Figure 1. Flowchart for ISM.
Logistics 06 00057 g001
Figure 2. ISM model.
Figure 2. ISM model.
Logistics 06 00057 g002
Table 1. Logistics service providers in Turkey.
Table 1. Logistics service providers in Turkey.
Logistics ProvidersThe Number of Branches in TurkeyThe Number of Branches in Our Study
PTT (Posta ve Telgraf Teşkilati)425012
MNG (Mehmet Nazif Günal) KARGO80014
YURTICI KARGO90013
ARAS KARGO90010
SURAT KARGO8009
DHL (Dalsey Hillblom Lyn)571
UPS (United Parcel Service)1541
TNT (Thomas Nationwide Transport)451
INTER GLOBAL36-
METRO KARGO1852
FEDEX (Federal Express)TNT assigned.-
Total812764
Table 2. Mean score, rank, and weighted measure of importance of selected factors.
Table 2. Mean score, rank, and weighted measure of importance of selected factors.
S. No.Factors (n = 64)MeanRankInverse Rank (Ki)Log Ki Weight (Wi)Wi × Log Ki
1.Delays in cargo delivery times 4.56251181.255211.2552
2.Accepting unclear, concise, and inaccurate address information 4.54692171.230411.2304
3.Carelessness and a lack of motivation among workforce4.53133161.204111.2041
4. Conflicts between workers and customers4.51564151.176011.1760
5.Storage and handling damages on parcels 4.45315141.146111.1461
6. Lack of skilled workers4.39066131.113911.1139
7.Lack of information technology equipment (Barcode devices etc.)4.39067121.079111.0791
8.Problems arising from the address-based information system (data and addresses are incorrect)4.39068111.034111.0341
9.Logistics service providers forms not adequately designed4.3125910111
10.Lack of adequate promotion standards and requirements for high level managers4.23441090.954210.9542
11.Conflicts between workers and managers 4.21881180.903010.9030
12.Lack of strategic planning and failure to sense and respond to market changes 4.21881270.845010.8450
13. Accepting packages that do not meet standards 4.20311360.778110.7781
14. Delays in delivery reports (both branches and headquarters)4.18751450.698910.6989
15.Lack of transportation
trucks/equipment
4.18751540.602000
16. Lack of customer relationship management (CRM)4.14061630.477100
17. Lack of information infrastructure 4.07811720.3010−1−0.3010
18. High employee turnover rates4.04691810−10
Table 3. Structural self-interaction matrix.
Table 3. Structural self-interaction matrix.
18171615141312111098765432
1OAAAXAAAOAAAAOVAA
2OAAOVXOOOAAAAOOA
3OOOOOOOAAOOOOVX
4VOAOAAAXOAAOAA
5OAOAOAOAOOOOA
6VOVOVOAAAOOO
7OOOOVOAVOOO
8OXVOVXOOOX
9OAOOVVAOO
10VOOOOOAV
11VOOAAOO
12VVVVOV
13OOOOO
14OAOO
15OOO
16OA
17O
Table 6. Iteration 1.
Table 6. Iteration 1.
FactorsRSASISLevels
11, 3, 4, 11, 14, 181, 2, 3, 4, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 171, 3, 4, 11, 14
21, 2, 4, 5, 8, 11, 13, 142, 3, 4, 6, 7, 8, 9, 10, 11, 12, 13, 16, 172, 4, 8, 11,13
31, 2, 3, 4, 5, 11, 13, 14, 181, 3, 4, 7, 8, 9, 10, 11, 12, 13, 14, 15, 161, 3, 4, 11, 13, 14
41, 2, 3, 4, 5, 11, 181, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 171, 2, 3, 4, 5, 11
53, 4, 5, 11, 182, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 173, 4, 5, 11
61, 2, 4, 5, 6, 11, 13, 14, 16, 186, 7, 10, 11, 12, 14, 156, 11, 14
71, 2, 3, 4, 5, 6, 7, 11, 13, 14, 187, 127
81, 2, 3, 4, 5, 8, 9, 11, 13, 14, 16, 17, 182, 8, 9, 12, 13, 172, 8, 9, 13, 17
91, 2, 3, 4, 5, 8, 9, 11, 13, 14, 16, 17, 188, 9,12, 13, 17 8, 9, 13, 17
101, 2, 3, 4, 5, 6, 10, 11, 14, 16, 1810, 1210
111, 2, 3, 4, 5, 6, 11, 14, 16, 181, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 171, 2, 3, 4, 5, 6, 11, 14, 16
121, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 181212
131, 2, 3, 4, 5, 8, 9, 11, 13, 14, 16, 17, 182, 3, 6, 7, 8, 9, 12, 13, 16, 172, 3, 8, 9, 13, 16, 17
141,3, 4, 5, 6, 11, 14, 181, 2, 3, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 171, 3, 6, 11, 14
151, 3, 4, 5, 6, 11, 14, 15, 1812, 1515
161, 2, 3, 4, 11, 13, 14, 16, 186, 8, 9, 10, 11, 12, 13, 16, 1711, 13, 16
171, 2, 4, 5, 8, 9, 11, 13, 14, 16, 178, 9, 12, 13, 178, 9, 13, 17
18181, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 1818I
Table 7. Iteration 2.
Table 7. Iteration 2.
FactorsRSASISLevels
11, 3, 4, 11, 141, 2, 3, 4, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 171, 3, 4, 11, 14II
21, 2, 4, 5, 8, 11, 13, 142, 3, 4, 6, 7, 8, 9, 10, 11, 12, 13, 16, 172, 4, 8, 11,13
31, 2, 3, 4, 5, 11, 13, 141, 3, 4, 7, 8, 9, 10, 11, 12, 13, 14, 15, 161, 3, 4, 11, 13, 14
41, 2, 3, 4, 5, 111, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 171, 2, 3, 4, 5, 11II
53, 4, 5, 112, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 173, 4, 5, 11II
61, 2, 4, 5, 6, 11, 13, 14, 166, 7, 10, 11, 12, 14, 156, 11, 14
71, 2, 3, 4, 5, 6, 7, 11, 13, 147, 127
81, 2, 3, 4, 5, 8, 9, 11, 13, 14, 16, 172, 8, 9, 12, 13, 172, 8, 9, 13, 17
91, 2, 3, 4, 5, 8, 9, 11, 13, 14, 16, 178, 9,12, 13, 17 8, 9, 13, 17
101, 2, 3, 4, 5, 6, 10, 11, 14, 1610, 1210
111, 2, 3, 4, 5, 6, 11, 14, 161, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 171, 2, 3, 4, 5, 6, 11, 14, 16II
121, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 171212
131, 2, 3, 4, 5, 8, 9, 11, 13, 14, 16, 172, 3, 6, 7, 8, 9, 12, 13, 16, 172, 3, 8, 9, 13, 16, 17
141, 3, 4, 5, 6, 11, 141, 2, 3, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 171, 3, 6, 11, 14
151, 3, 4, 5, 6, 11, 14, 1512, 1515
161, 2, 3, 4, 11, 13, 14, 166, 8, 9, 10, 11, 12, 13, 16, 1711, 13, 16
171, 2, 4, 5, 8, 9, 11, 13, 14, 16, 178, 9, 12, 13, 178, 9, 13, 17
Table 8. Iteration 3.
Table 8. Iteration 3.
FactorsRSASISLevels
22, 8, 13, 142, 3, 6, 7, 8, 9, 10, 12, 13, 16, 172, 8, 13
32, 3, 13, 143, 7, 8, 9, 10, 12, 13, 14, 15, 163, 13, 14
62, 6, 13, 14, 166, 7, 10, 12, 14, 156, 14
72, 3, 6, 7, 13, 147, 127
82, 3, 8, 9, 13, 14, 16, 172, 8, 9, 12, 13, 172, 8, 9, 13, 17
92, 3, 8, 9, 13, 14, 16, 178, 9,12, 13, 178, 9, 13, 17
102, 3, 6, 10, 14, 1610, 1210
122, 3, 6, 7, 8, 9, 10, 12, 13, 14, 15, 16, 171212
132, 3, 8, 9, 13, 14, 16, 172, 3, 6, 7, 8, 9, 12, 13, 16, 172, 3, 8, 9, 13, 16, 17
143, 6, 142, 3, 6, 7, 8, 9, 10, 12, 13, 14, 15, 16, 173, 6, 14III
153, 6, 14, 1512, 1515
162, 3, 13, 14, 166, 8, 9, 10, 12, 13, 16, 1713, 16
172, 8, 9, 13, 14, 16, 178, 9, 12, 13, 178, 9, 13, 17
Table 9. Iteration 4.
Table 9. Iteration 4.
FactorsRSASISLevels
22, 8, 132, 3, 6, 7, 8, 9, 10, 12, 13, 16, 172, 8, 13IV
32, 3, 133, 7, 8, 9, 10, 12, 13, 15, 163, 13
62, 6, 13, 166, 7, 10, 12, 156
72, 3, 6, 7, 137, 127
82, 3, 8, 9, 13, 16, 172, 8, 9, 12, 13, 172, 8, 9, 13, 17
92, 3, 8, 9, 13, 16, 178, 9,12, 13, 17 8, 9, 13, 17
102, 3, 6, 10, 1610, 1210
122, 3, 6, 7, 8, 9, 10, 12, 13, 15, 16, 171212
132, 3, 8, 9, 13, 16, 172, 3, 6, 7, 8, 9, 12, 13, 16, 172, 3, 8, 9, 13, 16, 17IV
153, 6, 1512, 1515
162, 3, 13, 166, 8, 9, 10, 12, 13, 16, 1713, 16
172, 8, 9, 13, 16, 178, 9, 12, 13, 178, 9, 13, 17
Table 10. Iteration 5.
Table 10. Iteration 5.
FactorsRSASISLevels
333, 7, 8, 9, 10, 12, 15, 163V
66, 166, 7, 10, 12, 156
73, 6, 77, 127
83, 8, 9, 16, 178, 9, 12, 178, 9, 17
93, 8, 9, 16, 178, 9,12, 178, 9, 17
103, 6, 10, 1610, 1210
123, 6, 7, 8, 9, 10, 12, 15, 16, 171212
153, 6, 1512, 1515
163, 166, 8, 9, 10, 12, 16, 1716
178, 9, 16, 178, 9, 12, 178, 9, 17
Table 11. Iteration 6.
Table 11. Iteration 6.
FactorsRSASISLevels
66, 166, 7, 10, 12, 156
76, 77, 127
88, 9, 16, 178, 9, 12, 178, 9, 17
98, 9, 16, 178, 9,12, 178, 9, 17
106, 10, 1610, 1210
126, 7, 8, 9, 10, 12, 15, 16, 171212
156, 1512, 1515
16166, 8, 9, 10, 12, 16, 1716VI
178, 9, 16, 178, 9, 12, 178, 9, 17
Table 12. Iteration 7.
Table 12. Iteration 7.
FactorsRSASISLevels
666, 7, 10, 12, 156VII
76, 77, 127
88, 9, 178, 9, 12, 178, 9, 17VII
98, 9, 178, 9,12, 178, 9, 17VII
106, 1010, 1210
126, 7, 8, 9, 10, 12, 15, 171212
156, 1512, 1515
178, 9, 178, 9, 12, 178, 9, 17
Table 13. Iteration 8.
Table 13. Iteration 8.
FactorsRSASISLevels
777, 127VIII
101010, 1210VIII
127, 10, 12, 15, 171212
151512, 1515VIII
171712, 1717VIII
Table 14. Conical matrix.
Table 14. Conical matrix.
Uncertainty and Risk Factors185141421631511617710138912Driving Power
181000000000000000001
51101000101000000005
11011100101000000006
41111010101000000007
141111100101100000008
20111110001000011008
161011011101000010008
31111110101000010009
151111100111100000009
1111111111011000000010
611111110011000100010
1701111110010100111011
711111101011010100011
1011111111011001000011
1311111111010100111013
811111111010100111013
911111111010100111013
1211111111111111111118
Dependence power161516171413914217752210651
Table 15. Clusters of uncertainty and risk factors in logistics service providers.
Table 15. Clusters of uncertainty and risk factors in logistics service providers.
1812
17
16
15 IV III
14
13 98 13
12
11 7, 10 17
10 6 11
9 15 3
8 16 214
7 4
6 1
5 5
4 I II
3
2
1 18
Driving/Dependence power123456789101112131415161718
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Uk, Z.C.; Basfirinci, C.; Mitra, A. Weighted Interpretive Structural Modeling for Supply Chain Risk Management: An Application to Logistics Service Providers in Turkey. Logistics 2022, 6, 57. https://doi.org/10.3390/logistics6030057

AMA Style

Uk ZC, Basfirinci C, Mitra A. Weighted Interpretive Structural Modeling for Supply Chain Risk Management: An Application to Logistics Service Providers in Turkey. Logistics. 2022; 6(3):57. https://doi.org/10.3390/logistics6030057

Chicago/Turabian Style

Uk, Zuhal Cilingir, Cigdem Basfirinci, and Amit Mitra. 2022. "Weighted Interpretive Structural Modeling for Supply Chain Risk Management: An Application to Logistics Service Providers in Turkey" Logistics 6, no. 3: 57. https://doi.org/10.3390/logistics6030057

Article Metrics

Back to TopTop