Advertisement

Considerations for Crossing the Continuum

  • Bonnie Keith
  • Kate Vitasek
  • Karl Manrodt
  • Jeanne Kling

Abstract

You’ve done your homework. You’ve used the Business Model Mapping Toolkit and now have a preliminary understanding of which Sourcing Business Model is the most appropriate for your situation. But how do you take this information and turn it into action? In the past, you would have used a formal multistep strategic sourcing process. (Exhibit A1 in the appendix presents the most popular models.) But as we noted in chapter 1, existing models have many weaknesses, resulting in lower-than-expected performance.

Keywords

Price Model Supplier Selection Business Objective Category Management Risk Management Plan 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Notes

  1. 4.
    Gerard Chick and Robert Handfield, The Procurement Value Proposition (London: Kogan Page, 2012), p. 201.Google Scholar
  2. 10.
    Kate Vitasek telephone interview with Kelly Barner, March 2015. Jeanette Jones and Kelly Barner, Supply Market Intelligence for Procurement Supply Market: Research, Process and Resources (Plantation, FL: J. Ross Publishing, 2015).Google Scholar
  3. 13.
    Helen Clegg and Susan Montgomery, “7 Steps for Sourcing Information Products,” Information Outlook 9, no. 12 (December 2005), http://www.atkearneypas.com/knowledge/articles/2005/7steps.pdf; accessed March 20, 2015, quote p. 37.Google Scholar
  4. 14.
    Peter Kraljic, “Purchasing Must Become Supply Management,” Harvard Business Review (September 1983), https://hbr.org/1983/09/purchasing-must-become-supply-management; accessed July 5, 2015.Google Scholar
  5. 15.
    Kate Vitasek, Karl Manrodt, and Srini Krishna, Vested Case Study: Microsoft/Accenture OneFinance (Knoxville: University of Tennessee, College of Business Administration, 2010).Google Scholar
  6. 17.
    George Kimball, “Risk Allocation Liability Limits and Disputes in Outsourcing,” Outsourcing 2010: Structuring, Negotiation, and Governance, pp. 12–21; http://www.arnoldporter.com/resources/documents/Allocating_Risks_Outsourcing_2003.pdf; accessed July 6, 2015.Google Scholar
  7. 18.
    Rachel Abrams, “Target Puts Data Breach Costs at $148 Million,” New York Times, August 5, 2014; http://www.nytimes.com/2014/08/06/business/target-puts-data-breach-costs-at-148-million.html?_r=0; accessed March 29, 2015.Google Scholar
  8. 19.
    Kate Vitasek, Karl Manrodt, and Jeanne Kling; Vested: How P&G, McDonald’s, and Microsoft Are Redefining Winning in Business Relationships (New York: Palgrave Macmillan, 2012).Google Scholar
  9. 21.
    Cisco, “Procter & Gamble Revolutionizes Collaboration with Cisco TelePresence,” 2008; http://www.cisco.com/web/about/ac79/docs/wp/Procter_Gamble_Final.pdf.Google Scholar
  10. 24.
    Kate Vitasek, Karl Manrodt, and Jeanne Kling, Vested: How P&G, McDonald’s, and Microsoft Are Redefining Winning in Business Relationships (New York: Palgrave Macmillan, 2012).Google Scholar
  11. 26.
    Kate Vitasek, Mike Ledyard, and Karl B. Manrodt, Vested Outsourcing: Five Rules That Will Transform Outsourcing, 2nd ed. (New York: Palgrave Macmillan, 2013).CrossRefGoogle Scholar
  12. 28.
    Oliver Williamson, “Outsourcing: Transaction Cost Management and Supply Chain Management,” Journal of Supply Chain Management no. 2 (2008): 5–22.Google Scholar
  13. 30.
    Oliver E. Williamson, “The Theory of the Firm as Governance Structure: From Choice to Contract,” Journal of Economic Perspectives 16, no. (2002): 171–195. http://www.empresas.ufpr.br/williamson.pdf; accessed June 6, 2015.CrossRefGoogle Scholar
  14. 38.
    Dell, “Dell Streamlines Indirect Procurement with Ariba Buyer,” Issue 1 (2001); http://www.dell.com/content/topics/global.aspx/power/en/pslq01_dell_ariba?c=us&l=en&cs.Google Scholar
  15. 44.
    Kate Vitasek, Karl Manrodt, and Jeanne Kling, Vested: How P&G, McDonald’s, and Microsoft Are Redefining Winning in Business Relationships (New York: Palgrave Macmillan, 2012).Google Scholar

Copyright information

© Bonnie Keith, Kate Vitasek, Karl Manrodt, and Jeanne Kling 2016

Authors and Affiliations

  • Bonnie Keith
  • Kate Vitasek
  • Karl Manrodt
  • Jeanne Kling

There are no affiliations available

Personalised recommendations