strategic risk from supply chain disruptions - michigan rosswebuser.bus.umich.edu/whopp/working...

87
Strategic Risk from Supply Chain Disruptions Wallace J. Hopp Stephen M. Ross School of Business, University of Michigan, Ann Arbor, MI Seyed M. R. Iravani and Zigeng Liu Department of Industrial Engineering and Management Science, Northwestern University, Evanston, IL Abstract Supply chain disruptions can lead to both tactical (loss of short term sales) and strategic (loss of long term market share) consequences. In this paper, we model the impact of regional supply disruptions on competing supply chains. We describe generic strategies that consist of two stages: (i) preparation, which involves investment prior to a disruption in dedicated backup capacity and/or measures that facilitate quick detection of a problem, and (ii) response, which involves post-disruption purchase of shared (non-dedicated) backup capacity for a component whose availability has been compromised. Using expected loss of profit due to lack of preparedness as a measure of risk, we characterize the conditions that pose the greatest risk and suggest ways to reduce the risk exposure. This analysis reveals that a dominant firm in the market should focus primarily on protecting its market share, while a weaker firm should focus on being ready to take advantage of a supply disruption to gain market share. We distinguish between preparedness activities related to monitoring and detection as systemic preparation, which affects many components simultaneously, and preparedness activities related to securing extra dedicated backup capacity as targeted preparation, which affects only a specific component. We characterize conditions that affect the optimal ratio of investment in these two types of preparation and conclude that larger firms should use targeted preparation defensively, while smaller firms should use it offensively. Finally, we discuss how firms can use both long term information (e.g., estimates of the likelihood of disruptions) and real-time information (e.g., severity of disruption after it occurs) as part of their preparedness strategy. Keywords: supply chain disruption, risk, preparedness ——————————————————————————————————————————————— 1 Introduction High profile incidents of global terrorism have elevated concerns about risks in all aspects of private and public life, including management of business operations. However, while terrorist activities are particularly newsworthy, other sources of risk, such as natural disasters and political/economic shocks, present a more widespread challenge to managers. Regardless of the source, it is clear that preparation for and management of major disruptions is an important part of modern operations management. In this paper, we focus on the risk of supply disruption, which is inherent in global supply chains. We divide this risk into two categories: (1) tactical risk, which characterizes events that result in only a short term loss of sales revenue, and (2) strategic risk, which is associated with events that result in a long term loss of market share, in addition to a loss of sales. An example of a strategic risk event occurred on March 17, 2000, when a ten-minute fire at a Royal Philips Electronics semiconductor plant in Albuquerque, New Mexico, “touched off a corporate crisis that shifted the balance of power between two of Europe’s biggest electronics companies...” (Wall Street 1

Upload: lamthuan

Post on 01-Apr-2019

239 views

Category:

Documents


0 download

TRANSCRIPT

Strategic Risk from Supply Chain Disruptions

Wallace J. HoppStephen M. Ross School of Business, University of Michigan, Ann Arbor, MI

Seyed M. R. Iravani and Zigeng LiuDepartment of Industrial Engineering and Management Science,

Northwestern University, Evanston, IL

Abstract

Supply chain disruptions can lead to both tactical (loss of short term sales) and strategic (loss of longterm market share) consequences. In this paper, we model the impact of regional supply disruptionson competing supply chains. We describe generic strategies that consist of two stages: (i) preparation,which involves investment prior to a disruption in dedicated backup capacity and/or measures thatfacilitate quick detection of a problem, and (ii) response, which involves post-disruption purchase ofshared (non-dedicated) backup capacity for a component whose availability has been compromised.Using expected loss of profit due to lack of preparedness as a measure of risk, we characterize theconditions that pose the greatest risk and suggest ways to reduce the risk exposure. This analysisreveals that a dominant firm in the market should focus primarily on protecting its market share,while a weaker firm should focus on being ready to take advantage of a supply disruption to gainmarket share. We distinguish between preparedness activities related to monitoring and detectionas systemic preparation, which affects many components simultaneously, and preparedness activitiesrelated to securing extra dedicated backup capacity as targeted preparation, which affects only a specificcomponent. We characterize conditions that affect the optimal ratio of investment in these two typesof preparation and conclude that larger firms should use targeted preparation defensively, while smallerfirms should use it offensively. Finally, we discuss how firms can use both long term information (e.g.,estimates of the likelihood of disruptions) and real-time information (e.g., severity of disruption afterit occurs) as part of their preparedness strategy.

Keywords: supply chain disruption, risk, preparedness

———————————————————————————————————————————————

1 Introduction

High profile incidents of global terrorism have elevated concerns about risks in all aspects of private

and public life, including management of business operations. However, while terrorist activities are

particularly newsworthy, other sources of risk, such as natural disasters and political/economic shocks,

present a more widespread challenge to managers. Regardless of the source, it is clear that preparation

for and management of major disruptions is an important part of modern operations management.

In this paper, we focus on the risk of supply disruption, which is inherent in global supply chains.

We divide this risk into two categories: (1) tactical risk, which characterizes events that result in only a

short term loss of sales revenue, and (2) strategic risk, which is associated with events that result in a

long term loss of market share, in addition to a loss of sales.

An example of a strategic risk event occurred on March 17, 2000, when a ten-minute fire at a Royal

Philips Electronics semiconductor plant in Albuquerque, New Mexico, “touched off a corporate crisis

that shifted the balance of power between two of Europe’s biggest electronics companies...” (Wall Street

1

2Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

19981997 1999 2000 2001 2002 2003 2004

Market Share

10%

30%

20% MOTOROLA

SAMSUNG

NOKIA

End of OutageFire at Philips’ Plant

Year ERICSSON

Figure 1: Global Mobile Market Share from 1997 to 2004 (Gartner (2006)).

Journal, January 29, 2001). This occurred because, besides directly destroying several thousand chips for

mobile phones, the fire contaminated the clean room environment in the semiconductor plant, effectively

shutting it down for weeks. At the time, both Nokia and Ericsson were sourcing microchips from the

Philips plant. However, while Nokia was able to quickly shift production to other Philips plants and

some Japanese and American suppliers, Ericsson was trapped by its sole source dependence on the

Philips plant. Consequently, Ericsson had no way to make a rapid response to the disruption, and wound

up losing around $400 million in sales by the end of the first disruption-impacted quarter (Elgin (2003)).

Worse, six months after the fire, Ericsson’s market share of the global handset market had fallen by

3%, its stock price had decreased by 12%, and Ericsson’s mobile phone division reported a $2.34 billion

loss for 2000 (Sheffi (2005)). This setback almost certainly accelerated Ericsson’s decline in the handset

market (see Figure 1). In combination with a variety of other problems, this led Ericsson to merge its

mobile phone unit with Sony in 2001 (Kharif (2001), Sheffi (2005)).

Such dramatic consequences from a seemingly minor disruption seem to be the rule rather than

the exception. Hendricks and Singhal (2005) considered a sample of 827 disruptions (ranging from a

shipment delay to a key part shortage) announced between 1989 and 2000 and examined stock prices

over a three-year period beginning one-year prior to the announcement of a disruption and ending two

years after it. They found that firms who reported supply chain disruptions had stock returns over the

three-year period that were nearly 40 percent lower than comparable firms that did not report disruptions.

Evidently, supply chain disruptions are major business events that have lasting effects.

However, not all consequences of supply chain disruptions are negative. At the end of 2001, Nokia

and Samsung reported large increases in market share, while Motorola stopped a steady decline in market

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 3

share (see Figure 1). Apparently, Ericsson’s loss was these other firms’ gain, since some customers who

were unsupplied by Ericsson shifted their purchases to other brands. Evidently, supply chain disruptions

can pose opportunities for strategic gain, as well as loss.

To understand why the Philips disruption had such an unbalanced impact on Nokia and Ericsson, we

must go back to the year 1995. At that time, due to poor delivery performance and a relatively weak

product line, Nokia was experiencing mismatches between supply and demand. To remedy the situation,

Nokia installed a monitoring process, which enabled it to spot the disruption quickly (even before Philips

officially notified it of the problem) and to initiate a dialogue with Philips about alternate supplies. Once

Nokia’s component-purchasing manager knew about the fire, he quickly reported it to his upper-level

managers, in keeping with Nokia’s culture of encouraging dissemination of bad news. Nokia decided to

scrutinize the situation and call Philips daily to monitor the event. When Nokia realized the shortage due

to the fire would last for more than month, it assembled a task force to investigate all possible alternative

sources of supply (Sheffi (2005)). This included capacity of other Philips facilities, as well as that of other

suppliers. The ability to use non-Philips chips was facilitated by an earlier decision by Nokia to redesign

its phones to accommodate a wider range of chips that could be supplied by various suppliers in Japan

and the United States. In contrast, Ericsson did not realize the severity of the disruption until Nokia

had locked up all available supplies of the original chips and Ericsson did not have product flexibility to

allow use of other more widely available chips.

A major reason that a small-scale disruption resulted in a huge loss for Ericsson is that it resulted

in the loss of unsatisfied customers (Stauffer (2003)). In hindsight, it is clear that Ericsson grossly

underestimated the impact of what it thought would be a one-week delay of its chip supply. When

Philips called two weeks after the fire to explain that the delay would be much longer, Ericsson realized

too late that it would have thousands of disappointed customers, some of whom would not return. In

recognition of this type of customer dynamics, Zsidisin et al. (2000) concluded that firms implementing

high efficiency supply management techniques (e.g., single sourcing, just-in-time deliveries for production)

must be aware that such practices may increase their exposure to risk. Stauffer (2003) noted that it is

no longer feasible to try to cover losses from supply chain disruptions through insurance, since the 9/11

terrorist attack and other major events have altered the policies of insurance companies to limit coverage.

Although there has been a great deal of research devoted to the design, coordination and improvement

of supply chains (see, e.g., Fisher et al. (1997), Fine (2000), Lee (2003), Graves and Willems (2003), Gan

et al. (2005)), relatively little of this has focused on supply chain risks. Much of what has been done is

descriptive in nature. For example, Johnson (2001) divided supply chain risks into two categories: (a)

4Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

demand risks, including seasonal imbalances, fab volatility, and new product adoption, and (b) supply

risks, such as manufacturing and logistics capacity limitations, currency fluctuations, and supply disrup-

tions from political issues. Chopra and Sodhi (2004) further refined these into a taxonomy of risks faced

in supply chains and qualitatively discussed the different strategies for mitigating them. Kleindorfer and

Saad (2005) discussed the implications of designing supply chain systems to deal with disruption risks,

based on a conceptual framework, which they termed the “SAM-SAC” Framework, and generated several

empirical results from a data set of the U.S. Chemical Industry. Christopher and Peck (2004) also dis-

cussed how to design resilient supply chains in qualitative terms, with an emphasis on fully recognizing

the nature of supply chain risks. In this same vein, Christopher and Lee (2004) suggested that improved

end-to-end visibility is a key element for mitigating supply chain risk.

Some researchers have considered supply chain disruptions in multi-echelon settings. Snyder and

Shen (2006) investigated both supply uncertainty and demand uncertainty in simple multi-echelon supply

chains using simulation. They pointed out that these two types of uncertainties require opposite responses

and therefore firms should consider both types simultaneously to identify an optimal strategy. Hopp and

Liu (2006) developed an analytical model for striking a balance between the costs of inventory and/or

capacity protection and the costs of lost sales in an arborescent assembly network subject to disruption.

They showed that, under certain conditions, it is optimal locate inventory or capacity protection at no

more than one node along each path to the customer. In a related vein, Tomlin (2006) considered a

firm that has two suppliers: one inexpensive and unreliable and the other expensive and reliable with

volume flexibility. They described management strategies for using the two types of supplier to mitigate

disruptions under various environmental assumptions. Tomlin and Snyder (2006) further considered

disruption mitigation strategies for the situation in which disruptions are stochastic and the firm gets

some advance warning of the disruptions. Tomlin and Tang (2008) studied five stylized models (which

correspond to five types of flexible strategies) and suggested that flexibility can be used as a powerful

defensive protection mechanism to mitigate supply chain risks.

While the above research is beginning to reveal principles of supply chain risk mitigation, to our

knowledge, there is not yet a comprehensive modeling framework with which to evaluate both tactical

and strategic risks to a firm from supply disruptions. In this paper, we develop such a framework and use

it to analyze both how firms in competitive environments should prepare for potential disruptions and

how they should respond to disruptions once they occur. In some cases, this analysis gives quantitative

confirmation of intuitive behavior. In others, it reveals insights that are not otherwise apparent.

The remainder of this paper is structured as follows: In Section 2, we introduce a duopoly model

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 5

with a third party, in which two firms compete for a common backup supply after a disruption of the

primary supply of a key component, but the third party, which produces a competitive product, is not

affected by the disruption. Note that this matches the Philips-Nokia-Ericsson scenario, in which Nokia

and Ericsson are the duopoly and firms like Samsung and Motorola collectively constitute the outside

firm. Section 2.1 analyzes the Backup Capacity Competition (BC Competition) within this model in order

to characterize the optimal plan of action to be followed by firms after a disruption. In Section 2.2 we

study the Advanced Preparedness Competition (AP Competition), in which firms compete by investing

in strategies for mitigating supply chain risks in advance of a disruption. In Section 2.3 we perform a

sensitivity analysis of factors that influence the AP Competition. In Section 3 we investigate the factors

that influence the degree of strategic risk faced by firms and develop insights into preparation strategies.

Section 4 summarizes our conclusions and points to future research directions.

2 Model Formulation

To create a framework within which to evaluate the strategic impact of a supply disruption, we begin

by considering a market consisting of two firms, A and B, that sell competing products. Both products

require a key component that is purchased from a common supplier or region that is subject to disruption.

Because the key components is essential, a disruption in supply will prevent production. In addition to

the two firms affected by the disruption, there is a third firm C, which offers a substitute for the products

offered by firms A and B. However, because the third firm C’s product is sufficiently different from those

of firms A and B to allow it to rely on different components, it is not affected by the supply disruptions

under consideration. Because of this, a disruption presents an opportunity for Firm C to steal customers

from Firms A and B, but not for Firms A and B to steal customers from Firm C.1

We model the disruption as a random event that completely stops the supply of the disrupted com-

ponent and consists of two periods: (i) a fixed lead time T between the time of the disruption and the

time when the backup capacity is able to begin supplying the key component, and (ii) a random duration

of time after the lead time that extends to the end of the outage, which we assume follows a cumulative

probability distribution F (·) with an average of µ units of time (see Figure 2).

To create a model, we suppose Firm i (i ∈ A,B) has capacity to produce Ki products per unit

time and sells its products at a profit margin of ri per product. Each product requires one unit of the

key component. Before a disruption, demand for Firm i’s product is d0i

per unit time. To allow us to

1Note that if firms have independent suppliers, a disruption will affect only one of the competing firms. In our framework,this can be represented by a model with Firms A and C, but no Firm B. As such, it represents a simpler case than the onewe consider in this paper.

6Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

TimeOutage

EndsBackup CapacityComes On Line

Outage Occurs

(with mean )µ Remaining Outage Time

(T) Fixed Lead Time

Pre-Disruption Period Outage (Post-Disruption Period)

Figure 2: Time sequence of events after a disruption.

consider cases where the firm purchases more backup capacity for the key component than it actually

needs, we define the “holding cost” for one unit unused backup capacity for Firm i be hi per unit time.

We assume that, during the outage, customers of Firm i who are unable to purchase from Firm i will

buy the product from the other firm, Firm j, as long as Firm j can provide substitute products. If there

is no alternate supply with which to replace the disrupted parts, then neither firm will be able to meet

demand. We further assume that, the third party, Firm C, offers a less-than-perfect substitute for the

products offered by Firms A and B, which customers may turn to if neither Firm A nor Firm B have

supply available.

We focus primarily on the situation where a backup supplier exists that could provide an alternate

supply of the disrupted parts. However, if the backup capacity is limited, as we would expect it to be,

the question of how it is allocated is critical. Several factors could influence which firm (A or B) has an

advantage in securing the backup capacity. One firm might have a prior relationship with the backup

supplier that gives them an edge. Or a firm’s size or reputation might make them a more desirable

customer. Or, as seems to have been the case in the competition between Nokia and Ericsson, it might

simply be a matter of who monitors the situation more carefully and therefore asks first. Our framework

will accommodate any of these, but we will focus on the first-come-first-serve rule as the most interesting

scenario.

We assume a contractual business-to-business (OEM) relationship between the firms and their cus-

tomers. That is, the firms have contracts with their existing customers and are therefore obligated to fill

orders from these customers before filling orders from new customers. In contrast, in a retail business-to-

consumer environment, firms often cannot control which customers—existing or new—have their orders

filled first. (For example, Kellogg cannot ensure that their corn flakes go to loyal Kellogg customers, as

opposed to Post customers who are unable to buy their usual brand.) Under the business-to-business

conditions, a firm will supply its own customers first. But if the firm is able to secure a backup capacity of

the disrupted parts beyond those needed for its own customers (and it has ample supplies of other parts

and the necessary production capacity), then it could meet demand from the competitor’s customers. We

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 7

assume that the firm will take advantage of the situation to do this if the competitor firm is unable to

satisfy its own customers during the outage. If one firm makes sales to the other firm’s customers, then

the second firm will lose revenue in the short term. Furthermore, if some of these customers shift their

future sales to the new firm, then the second firm will also lose long term market share.

Our assumption that, during the outage, customers of a firm unable to meet demand are willing to

switch to another firm, is motivated by the fact that these customers are themselves firms. If the customer

firms make use of lean practices, they will have limited supplies of components on hand. To avoid shutting

down production, they must seek alternate supplies almost immediately in the face of a disruption. This is

what happened when cellular services companies unable to obtain Ericsson handsets were quick to satisfy

their customers with alternate brands. However, whether a customer will switch permanently depends

on his/her brand loyalty. We model brand loyalty of Firm i’s (i ∈ A,B) customer by the length of time

that customers of Firm i wait during the disruption before they permanently switch to the other firm’s

product. Specifically, we assume that a customer of Firm i who uses Firm j’s (j 6= i, j ∈ A,B, C)product during an outage, waits for an exponentially distributed amount of time with an average of γij

before permanently switching to Firm j’s product, and hence we refer to γij as Firm i’s customer loyalty

relative to Firm j. We define mij as the (finite) net present value of the long term market share that

Firm j gains from one customer who permanently switches from Firm i to Firm j, where j 6= i; define

mii as the (finite) net present value of the market share of Firm i to Firm i.

In situations where the first firm (either A or B) to detect the disruption and contact the backup

supplier will have the option to buy as much of the backup capacity as it chooses, there is incentive

to invest in early detection capabilities. Indeed, this is precisely what Nokia did when it installed its

new monitoring system. Hence, we include a preparedness period, in which firms invest in monitoring

technology, research potential backup suppliers and take other measures to enable them to be first to

secure the backup capacity in the event of a disruption. Specifically, we consider the following two periods:

• Pre-Disruption Period: Before a disruption occurs, both Firm A and Firm B serve their own

customers. Each firm estimates the likelihood of a disruption of the key component, which may differ

from the true likelihood of the disruption (p0). After a disruption occurs, firms will seek available

backup capacity for the key component. There are two types of backup capacity: (a) dedicated

capacity that is committed to a specific firm (e.g., due to a contractual or informal relationship),

and (b) shared capacity, for which the two firms compete, if the dedicated backup capacity is

not enough to cover the shortage. To model this competition, we denote the amount of Firm i’s

sales (i ∈ A,B) that cannot be covered by the dedicated capacity as d0i, and the shared backup

8Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

capacity by S. Both firms know that if the disruption occurs, the firm that detects the disruption

and moves first has the advantage of securing some or all of the total available backup capacity

for the key component. Therefore, each firm must decide how to invest in preparedness in order to

be able to detect the disruption first. This results in an Advanced Preparedness Competition (AP

Competition), in which the two firms invest in preparedness and thereby determine their respective

probabilities of being first to detect the problem in the event of a disruption.

• Post-Disruption Period: After the disruption occurs, the firm (either A or B) that detects the

disruption must decide how much of the total available backup capacity of S to buy in order to

maximize its short- and long term profits. This results in a Backup Capacity Competition (BC

Competition), in which one of the firms (i.e., the winner of the AP competition) is designated as the

“Leader” and gets first chance at purchasing the backup capacity. After the first firm has made its

purchase, the other firm, the “Follower”, then decides how much of the leftover backup capacity to

purchase. Once both firms have made their purchase amount decisions, there is a lead time period

required to bring the backup capacity on-line. During this period, both Firm A and Firm B lose

all of their short term sales, as well as some long term market share, to Firm C. The amount of the

market share of Firm i (i ∈ A,B) that is lost to Firm C during the lead time is d0i− di , where

di is the demand for Firm i’s product at the end of the lead time. Since the profit loss during

the lead time is unavoidable for both firms, we can treat the moment immediately after the lead

time as the beginning of the post-disruption period. Furthermore, we assume that, after the lead

time, if the available backup capacity is not enough to cover the total market, then all unsatisfied

customers will buy substitute products from Firm C during the outage. The number of customers

that permanently switch to Firm C, depends on the customer brand loyalty.

It is clear that if ample backup capacity of the key component existed (i.e., S is infinite), then there

would be no AP Competition or BC Competition between Firm A and Firm B, because there would be

no shortage to allow an opportunity to “poach” customers from the other firm. Hence, Firm i will only

purchase di units of the capacity per unit time to satisfy its own customers (i, j ∈ A,B). However,

when the backup capacity is limited, then both the AP Competition and the BC Competition have

an important impact on firms’ short- and long-term profits and market shares. We analyze these two

competitions (games) in reverse order, using profit maximization for the objective in the BC Competition

and a Nash equilibrium to define the outcome in the AP Competition.

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 9

2.1 Backup Capacity Competition (BC Competition)

In this section we consider the beginning of the post-disruption period when the winner of the AP

competition, which we call the Leader, has detected the disruption before the other firm, which we call

the Follower. The question that the Leader faces is how much of the shared backup capacity it should

buy, while the Follower can only purchase from whatever backup capacity is left after the Leader has

made its purchase. Both firms will seek to maximize profit from both short term sales and long term

sales. Note that it may be optimal for the Leader to purchase more capacity than it needs for its own

customers and to poach those of the Followers.

One factor that each firm must consider when making its purchase of backup capacity is its production

capacity, which corresponds to the maximum number of products it can produce given ample supplies of

raw materials. If, for instance, Firm A has only enough production capacity to meet demand from its

existing customers, then it cannot make sales to the customers of Firm B, regardless of how much backup

capacity it purchases.

We define Yi,k as the amount of backup capacity that Firm i (i ∈ A,B) buys, when Firm i is in

position k (k ∈ L,F, where L = Leader, F = Follower). Let ci (i ∈ A,B) be the premium cost of

one unit of the backup capacity for Firm i, and consider Πi,k (for i ∈ A,B and k ∈ L,F) as the sum

of the total expected profit of Firm i, given it is in position k during the outage. The total expected

profit includes both the short term sales profit during the outage and also the long term sales profit due

to market share gained from the competitor. Without loss of generality, suppose Firm A is the Leader

and Firm B is the Follower. Then we have:

ΠA,L(YA,L , YB,F ) = rA(Average number sold to A’s customers during the outage)

+rA(Average number sold to B’s customers during the outage)

+mBA(Average number of customers (i.e., market share) gained from B)

−mAB(Average number of customers (i.e., market share) lost to B)

−mAC (Average number of customers (i.e., market share) lost to C)

−cA(Average backup capacity bought during the outage)

−hA(Average “inventory” of unused backup capacity during the outage).

Since it is clear that the Follower will not purchase backup capacity in excess of its own production

10Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

capacity (because it cannot use it), we can express the expected profit of the Leader as:

ΠA,L(YA,L , YB,F ) = rA

(∫ ∞

0min

YA,L , dA

tdF0(t)

)

+rA

(∫ ∞

0min

[dB − YB,F ]+,min

[YA,L − dA ]+,KA − dA

tdF0(t)

)

+mBA

( ∫ ∞

0min

[dB − YB,F ]+, min

[YA,L − dA ]+,KA − dA

× (1− e− t

γBA )dF0(t)

)

−mAB

( ∫ ∞

0min

[YB,F − dB ]+, [dA − YA,L ]+

(1− e

− tγAB )dF0(t)

)

−mAC

(∫ ∞

0

[[dA − YA,L ]+ − [YB,F − dB ]+

]+(1− e

− tγAC )dF0(t)

)

−cA

(∫ ∞

0YA,LtdF0(t)

)

−hA

(∫ ∞

0

[YA,L −minYA,L , dA −min

[dB − YB,F ]+,

min[YA,L − dA ]+,KA − dA]+

tdF0(t)).

After some algebra, we can reduce this to:

ΠA,L(YA,L , YB,F ) = rA min

YA,L , dA

µ

+ψA min

[dB − YB,F ]+, min[YA,L − dA ]+, KA − dA

−mABξAB min

[YB,F − dB ]+, [dA − YA,L ]+

−mAC ξAC

[[dA − YA,L ]+ − [YB,F − dB ]+

]+

−cAYA,Lµ

−hA

[YA,L −minYA,L , dA −

min

[dB − YB,F ]+, min[YA,L − dA ]+,KA − dA

]+µ, (1)

where ψi = riµ + mjiξji, and

ξij =∫ ∞

0(1− e

− tγij )dFo(t) : j 6= i, i ∈ A,B, j ∈ A,B, C

is defined as the probability that a customer of Firm i permanently switches to Firm j after the outage.

Since Firm B (the Follower) knows its demand, and cannot obstruct Firm A, it has no incentive to

hold inventory. Therefore, we can write its profit function as:

ΠB,F (YA,L , YB,F ) = rB min

YB,F , dB

µ + ψB min

[dA − YA,L ]+, [YB,F − dB ]+

−mBAξBA min

min[YA,L − dA ]+,KA − dA

, [dB − YB,F ]+

−mBC ξBC

[[dB − YB,F ]+ −min

[YA,L − dA ]+, KA − dA

]+− cBYB,F µ. (2)

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 11

Hence, for a given YB,F , where 0 ≤ YB,F ≤ minS, KB, the problem of finding the optimal backup

capacity purchase for Firm A (the Leader) reduces to the following optimization problem:

Problem PA: max∀ Y

A,L

ΠA,L(YA,L , YB,F )

Subject to:

0 ≤ YA,L ≤ S

The optimal backup capacity purchase for the Follower (Firm B) can also be obtained for a given YA,L ,

where 0 ≤ YA,L ≤ minS, KA, from the optimization problem as follows:

Problem PB: max∀ Y

B,F

ΠB,F (YA,L , YB,F )

Subject to:

0 ≤ YB,F ≤ maxS − YA,L , 0

Proposition 1 shows that the optimal backup capacity purchases for both firms are restricted to a

small number of possible values, and shows how these values depend on the Leader’s production capacity

(KA) and the amount of available backup capacity (S). The proof of Proposition 1 and all other analytical

results can be found in the Online Appendix.

PROPOSITION 1:

(Large Capacity Leader:) If the Leader’s production capacity is greater than the combined market

share of both firms (i.e., KA ≥ dA + dB), and

(1) if the backup capacity is less then the combined market share of both firms (i.e., S ≤ dA + dB), then

the only possible choices for the optimal backup capacity purchases for the two firms are:

(Y ∗A,L

, Y ∗B,F

) ∈

(0, 0), (0, dB ),(0,minKB , S), (S − dB , 0), (S − dB , dB),

(dA , 0), (dA , S − dA), (S, 0)

;

(2) if the backup capacity is larger than the combined market share of both firms (i.e., S > dA + dB),

then the only possible choices for the optimal backup capacity purchases for the two firms are:

(Y ∗A,L

, Y ∗B,F

) ∈

(0, 0), (0, dB ),(0, minKB , dA + dB

), (dA , 0), (dA , dB ),

(dA + dB , 0), (S, 0)

.

(Small Capacity Leader:) If the Leader’s production capacity cannot cover the combined market share

of both firms (i.e., KA < dA + dB), and

12Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

(1) if the backup capacity is less than the Leader’s market share (i.e., S ≤ KA), then the only possible

choices for the optimal backup capacity purchases for the two firms are:

(Y ∗A,L

, Y ∗B,F

) ∈

(0, 0), (0, dB ), (0, minKB , S), (S − dB , 0), (S − dB , dB ),

(dA , 0), (dA , S − dA), (S, 0)

;

(2) if the backup capacity is larger than the Leader’s market share, but it is smaller than the combined

market share of both firms (i.e., KA < S ≤ dA + dB), then the only possible choices for the optimal

backup capacity purchases for the two firms are:

(Y ∗A,L

, Y ∗B,F

) ∈

(0, 0), (0, dB ), (0, minKB , S), (S − dB , 0), (S − dB , dB ),

(dA , 0), (dA , S − dA), (KA , 0), (KA , S −KA)

;

(3) if the backup capacity can cover the combined market share of both firms (i.e., S > dA + dB), then

the only possible choices for the optimal backup capacity purchases for the two firms are:

(Y ∗A,L

, Y ∗B,F

) ∈

(0, 0), (0, dB ), (0, minKB , dA + dB), (dA , 0), (dA , dB), (KA , 0),(S − (dA + dB ) + KA , 0

),

(S − (dA + dB) + KA , (dA + dB )−KA

).

Proposition 1 presents a set of solutions that dominates all feasible solutions of the BC Competition,

and therefore includes all candidates for the optimal solution. Using the results of this proposition, we

characterize the structure of the optimal solution of the BC Competition in Proposition 2.

PROPOSITION 2: The optimal policy of the Backup Capacity Competition has a five-region structure.

The thresholds that describe the five regions of the optimal policies for both the Leader and the

Follower are presented in Table 8 and Table 9 in Online Appendix B. Based on the system parameters,

the optimal policy for the BC Competition results in one of the following five scenarios: (i) Firms A and

B Forfeit, (ii) Firm A is aggressive, (iii) Firm A protects, (iv) Firm A forfeits to Firm B, and (v) Firm

B forfeits to Firm A.

To further describe the optimal policy, we present an example in Figure 3, in which maxdA , dB ≤S ≤ KA < dA + dB . As Figure 3 shows, the optimal solution results in five different scenarios:

(i) Firms A and B Forfeit: When rA ≤ cIA

and rB ≤ c1B, the optimal strategies for the Leader and

Follower are (Y ∗A,L

, Y ∗B,F

) = (0, 0).2 This scenario presents situations in which neither Firm A nor Firm B is

willing to buy any backup capacity due to its high premium cost. Consequently, all unsatisfied customers

2Note that the thresholds, cIA

and c1B

, do not depend on the result of the BC Competition, but only on the firms’ systemparameters. Furthermore, cI

Aand c1

Bare increasing functions of cA and cB , respectively, (see Table 9 in Online Appendix

B).

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 13

rAA

( 0 , minS, K )B

A Forefeits

A is Aggressive

( S , 0 )

( S , 0 )

B Forefeits

( S - d , 0 )B

A Protects

B B

( d , 0 )

( S - d , d ) ( d , S - d )AA

A

A & B Forefeit

( 0 , 0 )

B

B

c

c

cA

cIAc

rB

II

IV II

1

Figure 3: Five-region structure for optimal BC Competition strategy when (maxdA, d

B ≤)S ≤ K

A< d

A+d

B.

will buy from Firm C, and depending on their customer loyalty, some of them may permanently switch

to Firm C after the outage.

(ii) Firm A is Aggressive: When rA > cIIA

and rB > cIIB

, the optimal strategies for the Leader and

Follower are (Y ∗A,L

, Y ∗B,F

) =(minS, KA, [S −KA ]+

), where the Leader (Firm A) buys the minimum

of the entire backup capacity and its full production capacity. The reason is one of the following: (1)

it is profitable for Firm A to satisfy its own customers and Firm B’s customers using backup capacity,

or (2) although it is not profitable to satisfy Firm A’s customers due to the high premium cost, it is

still profitable for Firm A to satisfy Firm B’s customers. (Recall that, we are considering a business-to-

business environment, in which Firm A must satisfy all its own customers before it satisfies any of Firm

B’s customers.) Thus, under either of these two cases, Firm A buys either the entire backup capacity

or an amount equivalent to its full production capacity. Notice that, although there may be still some

remaining backup capacity for Firm B to purchase, it is guaranteed that the unsatisfied customers of

Firm B will be enough for Firm A to use up all of its production capacity.

(iii) Firm A Protects: When the premium cost of the backup capacity is high, it is not profitable

in the short term for Firm A to serve its customers using the backup capacity; however, the firm may

need to protect itself in the long term from losing customers to Firms B and C. There are two types of

protection strategies for Firm A (the Leader):

• (Y ∗A,L

= S − dB ), which occurs when Firm A mainly focuses on protecting itself from losing market

share to Firms B. To prevent Firm B from poaching Firm A’s customers, Firm A purchases an

amount that leaves only dB units of backup capacity for Firm B to satisfy its own customers. Note

14Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

that this case occurs when Firm A’s customer loyalty relative to Firm C is high, so that even if Firm

A cannot satisfy its customers during the outage, it will lose relatively few unsatisfied customers to

Firm C.

• (Y ∗A,L

= dA), which occurs when Firm A protects itself from losing market share to both Firms B

and Firm C. In contrast to the above case, this case occurs when Firm A’s customer loyalty relative

to Firm C is low. Thus, compared to the high premium cost of the backup capacity, it is economical

for Firm A to buy the backup capacity and prevent Firm C from poaching its customers.

(iv) Firm A Forfeits: In this case Y ∗A,F

= 0 (but Y ∗B,F

6= 0), which corresponds to the situation where the

premium cost of the backup capacity is too expensive for Firm A to purchase for any purpose; therefore,

Firm A does not buy any capacity.

(v) Firm B Forfeits: This corresponds to (Y ∗A,F

, Y ∗B,F

) =(minS, dA + dB , KA, 0

). In this case, the

premium cost of the backup capacity is too expensive for Firm B to use it to satisfy its own customers.

Therefore, Firm B does not buy any capacity.

2.2 Advanced Preparedness Competition (AP Competition)

In the previous section, we assumed the allocation of backup capacity is entirely determined by which firm

approaches the backup supplier first. But we recognize that supplier behavior may be influenced by other

factors, such as: (1) firm size: the largest firm may receive the highest priority; (2) business history: the

firm perceived by the supplier as a better customer may receive higher priority. (3) contractual agreements:

a firm may contract with a supplier to provide backup capacity if needed (effectively converting shared

backup capacity to dedicated backup capacity). In practice, the outcome may well be determined by a

combination of these factors, as well as the firms’ preparedness, which affects the speed with which they

recognize the situation and approach the shared backup supplier.

While a firm can take advantage of the first two factors; it cannot easily influence them. A firm

can invest in dedicated backup capacity to influence the third factor, so we will examine when this is

attractive later in the paper. Here we focus on the firms’ preparedness, which seems to have been the

dominant factor in the competition between Nokia and Ericsson. We consider a case in which the firm

can affect the outcome by making more effort to carefully monitor the situation and detect the disruption

first. This results in the Advanced Preparedness Competition (AP Competition).

Suppose xi (i ∈ A,B) is the effort that Firm i spends in preparedness activities such as monitoring

and detection. We assume that, πi, the probability that Firm i detects the disruption first (and therefore

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 15

becomes the Leader in the BC Competition) is proportional to the preparedness effort of Firm i as a

fraction of total preparedness effort. Specifically, we assume:

πi =xi

xi + xj: j 6= i, and i, j ∈ A,B,

and πj = 1− πi, i 6= j.

Recall that we defined p0 as the true likelihood of a disruption. However, it is often the case that

firms do not know p0 and so can only estimate it. Hence, we define:

• pi0 is Firm i’s estimate of the likelihood of a disruption;

• pj0,i is Firm i’s belief of Firm j’s estimate of the likelihood of a disruption.

In the following, we define the AP Competition for Firm i (i ∈ A,B) as the game in which Firm i

plays the AP Competition based on its estimate of the likelihood of a disruption (i.e., pi0), its belief of

Firm j’s estimate of the likelihood of a disruption (i.e., pj0,i), and its belief that Firm j knows Firm i’s

estimate of the disruption probability is pi0 .

We let Ce denote the cost per unit of effort spent on preparedness activity, and ΠAPi is defined as

Firm i’s total expected profit in the AP Competition for Firm i, which is given by:

ΠAPi = pi0

(πiΠi,L(Y ∗

i,L, Y ∗j,F )+πjΠi,F (Y ∗

i,F , Y ∗j,L)−miC(d0

i −di))

+(1−pi0)(rid

0i (µ+T )

)−Cexi +miid

0i ,

where rid0i (µ+T ) is the total regular sales profit of Firm i during the (µ+T )-day interval if no disruption

occurs and miid0i is Firm i’s discounted future sales profit.

At the same time, Firm i believes that Firm j uses pj0,i as its estimate for the likelihood of a disruption,

and hence, believes that Firm j is maximizing the following:

ΠAPj,i = pj0,i

(πjΠj,L(Y ∗

j,L, Y ∗i,F )+πiΠj,F (Y ∗

j,F , Y ∗i,L)−mjC(d0

j−dj))+(1−pj0,i)

(rjd

0j (µ+T )

)−Cexj+mjjd

0j .

Symmetrically, Firm j solves its own AP competition problem, in which it maximizes ΠAPj and believes

that Firm i maximizes ΠAPi,j , in which the probability of a disruption is thought to be pi0,j .

To simplify notation we use Π∗i,L and Π∗i,F instead of Πi,L(Y ∗i,L, Y ∗

j,F ) and Πi,F (Y ∗i,F , Y ∗

j,L), respectively.

Hence, the AP Competition for Firm i is to find xi that maximizes ΠAPi , the firm’s total expected profit:

maxxi

ΠAPi = pi0

(πiΠ∗i,L + πjΠ∗i,F −miC(d0

i − di))

+ (1− pi0)(rid

0i (µ + T )

)− Cexi + miid

0i j 6= i,

where πi = xi/(xi + xj) and πj = 1− πi.

Note that both firms would like to increase their chance (πi) to become the Leader in the BC Com-

petition. This can be achieved by increasing preparedness effort (i.e., xi). However, increasing xi does

16Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

not necessarily guarantee an increase in the probability of being first, since this probability also depends

on the amount of effort by the other firm. This results in a competition in preparedness efforts between

the two firms (Firm A and Firm B).

PROPOSITION 3: A unique Nash Equilibrium exists for each firm’s Advanced Preparedness Compe-

tition.

By Proposition 3, there is a unique Nash Equilibrium for the AP Competition for Firm i, i.e., (x∗i , x∗j ),

and there is also a unique Nash Equilibrium for the AP Competition of Firm j, i.e., (w∗j , w∗i ). That is, x∗i is

the actual preparedness effort Firm i spends given it believes Firm j’s preparedness effort x∗j , while, w∗j is

the actual preparedness effort Firm j spends given it believes Firm i’s preparedness effort w∗i . Therefore,

the preparedness investment by Firms A and B in the AP Competition is given by (x∗i , w∗j ), which is the

result of the Nash equilibrium of two games (AP Competition for Firm i and AP Competition for Firm

j). Consequently, Firm i’s probability of becoming the Leader in the BC Competition is,

π∗i =x∗i

x∗i + w∗j, π∗j = 1− π∗i .

Note that both Firms A and B find their optimal effort levels based on their estimates of the probability

of a disruption, which might be different from the actual probability of disruption. Considering the actual

probability of a disruption, p0 , the actual expected profit of Firm i, Πi under the effort levels (x∗i , w∗j ) is

Πi = p0

( x∗ix∗i + w∗j

Π∗i,L +w∗j

x∗i + w∗jΠ∗i,F −miC(d0

i − di))

+ (1− p0)(rid

0i (µ + T )

)− Cex

∗i + miid

0i .

2.3 Sensitivity Analysis

To better understand the AP Competition, we consider the case we call the symmetric information

case, in which both firms know the other firm’s estimate of the likelihood of a disruption (i.e., pi0,j =

pi0 , i 6= j, i, j ∈ A,B), but their estimate of the likelihood of a disruption may be accurate (i.e.,

pi0,j = pi0 = p0 , i 6= j, i, j ∈ A,B) or may be inaccurate (i.e., pi0,j = pi0 6= p0 , i 6= j, i, j ∈ A,B),where p0 is the actual likelihood of a disruption.

Under these conditions, Proposition 4 shows that we can clearly characterize the sensitivity of the

optimal effort level of the firms to cost structure and customer loyalty.

PROPOSITION 4: Under the symmetric information conditions, for a given level of Firm j’s pre-

paredness effect, the optimal preparedness effort of Firm i (i.e., x∗i ) is nondecreasing in mij, miC , mji,

and ri, and is nonincreasing in γij, γiC , γji, ci, and hi, for j 6= i, and i, j ∈ A,B.

Consider cases in which the system parameters of the problem (e.g., profit margin, production capacity,

etc.) are such that the optimal backup capacity purchasing policy corresponds to the “A is Aggressive”

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 17

area (see Figure 3). That is, if it is the Leader, Firm A will buy all available backup capacity in an

attempt to steal sales from Firm B. We define Firm A to be an “aggressive” firm if this occurs.

PROPOSITION 5: Under the symmetric information conditions, if both firms are “aggressive” and

are identical except for their size (i.e., dA 6= dB), then both firms spend the same amount of effort on

preparedness, and therefore will have the same chance (50%) to become the Leader in the BC Competition.

Intuitively, the larger firm faces a small market share gain (from the competitor) as the Leader, but

faces a large market share loss (to the competitor) as the Follower in the BC Competition. In contrast, the

smaller firm faces a large market share gain as the Leader, but a small market share loss as the Follower.

Since the two firms are identical except for their size, the opportunity cost (i.e., the gap between the

expected profit from being the Leader and that of being the Follower) is exactly the same for both firms.

Hence, both firms will invest the same amount in preparedness in the AP Competition.

3 Numerical Study

Characterizing the optimal policies in the BC Competition and the AP Competition gives us a basic

understanding of the behavior of competing firms in the face of supply chain disruptions. But from a

management perspective, the most valuable outcome of our framework is the insight it can provide into

the conditions that present the greatest risk from supply chain disruptions.

To qualitatively and quantitatively investigate the factors that influence the consequences of a dis-

ruption, we use our framework to examine the sensitivity of a specific risk measure to a variety of factors.

The measure of risk we use is Firm i’s loss due to lack of preparedness, which is defined as:

Ωi = Πi −(p0

(Π∗i,F −miC(d0

i − di))

+ (1− p0)(rid

0i (µ + T )

)+ miid

0i

). (3)

This measure represents the difference between the expected profit to Firm i if it made strategic prepa-

ration in the AP Competition and if it did not. We assume that in both cases, the rival firm prepares

optimally. Therefore, when Firm i does not prepare, it usually winds up being the Follower in the BC

Competition. Hence, Ωi characterizes risk as the opportunity cost of not preparing for a disruption. Note

that, it is possible for Ωi to be negative in extreme cases where Firm i would “over-prepare” because

its estimate on the likelihood of a disruption is much larger than the true likelihood. In such cases, not

preparing at all is economically preferred to such over-preparation. Without loss of generality, we focus

on the loss due to lack of preparation for Firm A, ΩA .

Although we have an analytic relation between Ωi and the various parameters of the model, it is so

complex that, at most, we can perform single parameter sensitivity analysis using it. The expression itself

cannot show us how the model factors interact and compare with each other. Therefore, we make use of

18Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

regression analysis to generate a statistical relation between loss due to lack of preparedness (ΩA) and

the various factors in the model. The results of this regression show us which factors are most important

in identifying high risk situations.

3.1 Design of Numerical Experiments

Our numerical study is based on a test suite that includes 322 × 2× 4 cases, created using values for the

32 model parameters that cover the range of scenarios we could observe in practice. For example, we

chose values of $60, $90, and $120, for the profit margin ri for Firm i. These numbers were chosen to

reflect the cell phone market with a 50% gross margin (Marsal (2007)). Another example is the set of

values for p0, which is 0.01, 0.05, 0.2, 0.4. Since p0 is the true likelihood that a disruption occurs this

year, p0 = 0.05 means that such a failure will happen on average once every 20 years. To motivate our

choices of p0, we note that the annual frequency of earthquakes in the U.S. with magnitude larger than

seven is 0.03 events per year (Mathewson (1999)), while the rate in Taiwan is five to ten times higher

than this. For details on the definitions and values for all model parameters see Online Appendix A.

From a managerial perspective, we are interested in identifying the most important factors that affect

the firm’s risk exposure from a given component, so that management can target their preparedness efforts

where they will have the greatest impact. Since it is not reasonable to expect a firm with thousands of

components to estimate all of the model parameters for every part in their portfolio, our hope is that a

simpler model consisting of only a few important factors can reliably identify the high risk components.

In our numerical study we look at the top five factors that affect risk. To find the top five factors that

have the most impact on the strategic risk for each firm, we performed a stepwise regression analysis in

which, Ωi, the strategic risk for firm i (i.e., loss due to lack of preparedness) was the dependent variable.

We considered a set of 547 independent variables corresponding to the 8 system parameters, 5 profit

factors, and 19 normalized factors. Specifically, we considered 32 linear terms, 19 squared terms, and 496

interaction terms (combinations of the 32 predictor variables). The value of α for entering or removing

a variable in our step-wise regression was 0.05. We performed the step-wise regression to find the best

regression model with 1, 2, . . . , and 5 independent variables that best explain the variation in Ωi (i.e.,

have the highest R-square).

To get a sense of how different competitive conditions affect the factors that characterize supply chain

risk, we consider both the ABC and AB environments in our numerical studies.

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 19

Number of Independent Variables in the Regression ModelVariables in the Model R2 p0LLC p0LLB

dA

S |pB0−p0p0

| KB−d

B

dA

1 42.1 +2 46.8 + +3 47.6 + + +4 48.7 + + + −5 49.2 + + + − +

Table 1: Regression models with the five most important factor(s) under the ABC Model when Firm A is largerthan Firm B. Sign + or − corresponds to the sign of coefficients in the regression model.

3.2 ABC Model

In this section, our regression studies are based on the ABC Model, which considers two competitors

(Firms A and B) subject to disruption and a third firm (Firm C) not vulnerable to disruption.

In Table 1 we display the best fitting regression models with one to five parameters under the condition

that Firm A is larger than Firm B. The results of Table 1 show that:

Top 1 Factor: If only one factor were included in the regression model, it would be p0LLC, Firm A’s

expected worst-case long term loss to the third party C, which is clearly essential in quantifying risk and

can be written as:

p0LLC =p0 ×mAC

γAC

× (T × d0

A+ µ× dA).

As expected, this term has a positive coefficient. While we have seen expected short term loss used as

a gauge of supply chain risk in industry, we are not aware of any firms that evaluate long term risk. So

this observation is of practical significance. It says that, under the range of conditions described by our

numerical examples, the expected long term loss to the third party C (not to the competitor, Firm B) is

the most important factor in determining the risk of a supply disruption.

Top 2 Factors: The best two-factor model adds p0LLB, Firm A’s expected worst-case long term loss

to Firm B, which can be written as:

p0LLB = p0 ×mAB ×µ

γAB

× dA ,

to Firm A’s expected worst-case long term loss to the third party C. Again this factor appears in the

model with a positive coefficient, as expected. Along with expected long term loss to Firm C, this factor

characterizes total expected long term loss.

Top 5 Factors: The regression model with five factors has an R2 of about 50%, and, in addition to the

two long term loss factors, includes

20Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

Number of Independent Variables in the Regression ModelVariables in the Model R2 p0LLC p0LG p0LLB

KA−d

A

dB

p0SG

1 27.2 +2 35.1 + +3 39.6 + + +4 41.1 + + + +5 42.1 + + + + +

Table 2: Regression models with the five most important factor(s) under the ABC Model when Firm A is smallerthan Firm B. Sign + or − corresponds to the sign of coefficients in the regression model.

1. Firm A’s sales relative to the total available backup capacity (dAS ), which implies that Firm A faces

greater risk when backup capacity is limited,

2. the absolute percent error in Firm B’s estimate of the likelihood of a disruption (|pB0−p0

p0|), which

has a negative coefficient and hence implies that more error (i.e., positive or negative) by Firm B

in estimating the likelihood of a disruption results in less risk to Firm A, and

3. the fraction of Firm A’s demand that Firm B has capacity to meet after satisfying its own customers

(KB−d

Bd

A), which we term Firm B’s “poaching potential”. This factor has a positive coefficient,

implying that risk to Firm A increases in Firm B’s poaching potential.

In Table 2 we display the best regression models with one to five factors under the condition that

Firm A is smaller than Firm B. From the results of Table 2, we can conclude the following:

Top 1 Factor: The best one factor model again uses p0LLC, Firm A’s expected worst-case long term

loss to the third party C.

Top 2 Factors: The best two-factor model adds p0LG, Firm A’s expected best-case long term gain,

which can be written as:

p0LG = p0 ×mBA ×µ

γBA

× dB

This is an interesting and potentially significant result, since it suggests that the smaller firm in a market

should consider the possibility of gaining market share during a supply chain disruption. Failure to do

this can substantially decrease expected profit.

Top 5 Factors: The regression model with five factors has an R2 of about 42%, and, in addition to

the two factors already mentioned, includes (1) Firm A’s expected worst-case long term loss to Firm B

(p0LLB), (2) Firm A’s “poaching potential” (KA−d

Ad

B), and (3) Firm A’s expected best-case short term

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 21

gain (p0SG), which can be written as:

p0SG = p0 × µ× rA × dB .

Thus, the most important factors for predicting risk when Firm A is smaller than Firm B are similar to

those for the case where Firm A is larger than Firm B, except that they also include some factors related

to potential market share gains during a disruption.

To gain more insight into these results, we classify factors related to a firm’s sales profit and/or market

share losses as loss factors and factors related to a firm’s capability to capture sales and/or market share

from the competitor firm as gain factors. Any factors that are in neither of these categories are classified

as neutral factors.3 For instance, in Table 1, p0LLC (Firm A’s expected worst-case long term loss to the

third party C) is a loss factor from Firm A’s perspective. Note that none of the factors listed in Table 1

are gain factors for Firm A. The factor p0LG (Firm A’s expected best-case long term gain) in Table 2 is

a gain factor from Firm A’s perspective. Based on the above results, we conclude that,

Observation 1:

• When Firm A is larger than Firm B, loss factors (e.g., expected long term loss, “poaching potential”of competition, ...) are the primary determinants of the level of strategic risk faced by Firm A.

• When Firm A is smaller than Firm B, gain factors (e.g., expected long term gain, Firm A’s “poach-ing potential”, ...) become important determinants of the level of strategic risk that faced by FirmA.

The structural reason behind the first conclusion of Observation 1 follows from the fact that for the

larger firm fewer outcomes lead to gains than to losses. For instance, when dAS is large (greater than one,

i.e., Firm A’s sales exceed the total available backup capacity), then even if Firm A is the Leader in the

BC Competition, it will still lose some customers to the third party C. On the other hand, when dAS is

quite small (i.e., total backup capacity is substantially larger than the total sales of Firms A and B),

then, although it is profitable for Firm A to purchase supply sufficient to cover its own customers, it is

too expensive for Firm A to corner the backup capacity market in order to steal customers from Firm

B. This is because, to do that, Firm A must buy all backup capacity S, even though some of them (i.e.,

S − dA − dB ) will not be used. Only when backup capacity is in a relatively narrow vicinity of dA + dB

does Firm A have a good opportunity to gain sales and market share from Firm B. The fact that “gain

scenarios” tend to require specialized conditions implies that Firm A will be more likely to find products

where the value of preparation is in the prevention of loss than in the generation of gain. This observation3We classify all 32 model parameters into these three categories (i.e., loss factors, gain factors, and neutral factors) in

Table 6 of Online Appendix A.

22Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

is consistent with the widely used financial investment strategy known as dollar-cost averaging (DCA),

which is based on the Sharpe ratio and is also known as the reward-to-variability ratio. This strategy

attempts to reduce the risk of investing too much at the “wrong” time and too little at the “right” time

by balancing the upside potential and the downside risk. The DCA strategy weights downside risk more

heavily than upside potential, even though this may result in investors losing opportunities to profit from

the upside potential. Despite some recent research questioning the use of the Sharpe ratio as the preferred

measure (e.g., Leggio and Lien (2003)), researchers still find that the DCA ranking based on different

performance measures (e.g., the Sortino ratio) tends to outperform alternative investment strategies, such

as lump-sum investing.

The intuition behind the second conclusion of Observation 1 is that when Firm A is the smaller player

in the market (i.e., dA < dB ), it has incentive to pay more attention to gain factors when evaluating

protection policies, because in this case there is more market share (up to the total demand of the

competitor, dB ) to poach than the case in which Firm A is the larger player. Hence, Firm A, the smaller

player, considers more “gain factors” in selecting components to focus on. Therefore, when a firm has

market sales smaller than those of the competitor, the firm should consider the important factors listed

in Table 2 in selecting components to prioritize in its preparation strategy.

Our numerical study confirms that a firm faces the greatest risk when (1) the likelihood of a disruption

is large, (2) its market share is valuable, (3) its customers loyalty (especially relative to the third party

unaffected by a disruption) is low, (4) its market sales exceed the available total backup capacity, and

(5) total backup capacity exceeds sales of the competition and the competitor firm has a high “poaching

potential”.

Although these risk factors are all qualitatively intuitive, they: (a) validate our model, (b) confirm

our intuition, and more importantly (c) provide quantitative comparison of the relative importance of

the individual factors, as they are ranked in Tables 1 and 2.

Since Firm B is in direct competition with Firm A, and since its product is a assumed to be a closer

substitute to the product of Firm A than is the product of Firm C, one would expect that Firm A

should be more concerned about its customers’ loyalty relative to Firm B than to Firm C. Observation

2, however, shows that this is not the case.

Observation 2: Under our assumptions that the third party: (1) is not affected by the disruption, (2)provides a less-than-perfect substitute for the products offered by Firms A and B, which customers onlyturn to if neither Firm A nor Firm B has product available, and (3) has enough production capacity, afirm’s customer loyalty relative to the third party is a more important factor than its customer loyaltyrelative to the competitor.

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 23

This observation comes from the fact that the third party is always ready to poach any unsatisfied

customers, regardless of whether the firm is the Leader or the Follower in the AB Competition. More

specifically,

• When the firm is the Follower, the competitor can poach the firm’s customer only after satisfying its

own customers. So, even when the (shared) backup capacity is limited (S ≤ the competitor’s sales)

and thus the firm faces no danger of losing customers to the competitor, it can still lose customers

to the third party.

• When the firm is the Leader, although the competition cannot poach the firm’s customer, the firm

can still lose customers to the third party (during the lead time T ).

An implication of Observation 2 is that the closer the substitute provided by the third party (Firm C),

the greater the risk to Firm A. The reason is that a more attractive product from Firm C will diminish

Firm A’s customer loyalty relative to Firm C.

As an example, consider three different firms, Huawei, Cisco and Juniper, that manufacture routers.

Although Huawei’s routers are not yet in the same class as the high-end models offered by Cisco and

Juniper, it represents a potential threat to the Cisco-Juniper duopoly because its cut-rate pricing has a

huge appeal to smaller-scale telecommunication firms and it has deep-pocketed support from the Chinese

government. Therefore, it is logical to assume that Huawei is waiting for chances to take business from

the Cisco-Juniper duopoly. Both Cisco and Juniper source microchips mainly from Taiwan, while Huawei

sources from both Taiwan and Shanghai, so if a disruption of Taiwan were to affect a Cisco product and

the competing Juniper product, then a less-than-perfect Huawei substitute might pick up demand because

it could remain available while Cisco and Juniper are unable to meet demand. As long as the Huawei

product is perceived as a sufficiently acceptable substitute by some customers, then the disruption delays

may drive some Cisco and Juniper customers to Huawei. As the quality of the Huawei offerings improve,

the risk to Cisco and Juniper will increase.

3.3 AB Model

The above results show that supply chain risk is influenced strongly by the presence of a third party

(Firm C), which is not subject to a supply chain disruption. This is not surprising, since, unless customer

loyalty is extremely high, a disruption event is an excellent opportunity for the third party to steal market

share from the disrupted firms.

To get a deeper understanding of the drivers of risk, we now consider the situation where there is no

third party. That is, the market consists of a duopoly in which both firms are subject to a supply chain

24Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

Number of Independent Variables in the Regression ModelVariables in the Model R2 p0LLB p0LG

dA

S |pB0−p0p0

| KA−d

A

dB

1 33.1 +2 40.8 + +3 43.1 + + −4 45.4 + + − −5 46.0 + + − − +

Table 3: Regression models (without the third party) with the top 1–5 most important factor(s) under the ABModel when Firm A is larger than Firm B.

Number of Independent Variables in the Regression ModelVariables in the Model R2 p0LG

dB

S p0SGK

A−d

A

dB

|pB0−p0p0

|1 31.7 +2 34.3 + −3 37.1 + − +4 38.8 + − + +5 39.9 + − + + −

Table 4: Regression models (without the third party) with the top 1–5 most important factor(s) under the ABModel when Firm A is smaller than Firm B.

disruption. More specifically, we assume that products by competitors who do not rely on the vulnerable

supplier are not close substitutes for the products produced by the duopoly firms.

We repeated our regression analysis under these conditions, which resulted in Tables 3 and 4, from

which we can draw the following conclusions:

Observation 3: Gain factors have more impact on Firm A’s strategic risk in the AB Model than in theABC Model.

As Table 3 shows, when Firm A is larger than Firm B, there is only one loss factor among the five,

namely Firm A’s expected worst-case long term loss (p0LLB). On the other hand, when Firm A is smaller

than Firm B, there is no loss factor among the five factors listed in Table 4. As stated in Observation 1,

loss factors are the primary determinants of the strategic risks.

Intuitively, the isolated market in the AB Model (involving only Firms A and B) makes it more

attractive to firms to pay attention to gain factors when evaluating protection policies, since they are

not at risk of losing customers to a third party. In a sense, this duopolistic market presents a zero sum

situation, in which Firms A and B compete for each others’ customers.

3.4 Predictive Power of the First Important Factor

As we noted previously, some firms in industry (including a firm with whom we have worked, which is

widely considered to be among the most sophisticated about managing supply chain risks) use expected

Wally Hopp
Cross-Out
Wally Hopp
Replacement Text
when a third party firm is not present (
Wally Hopp
Inserted Text
)
Wally Hopp
Cross-Out
Wally Hopp
Replacement Text
when the third party is present (
Wally Hopp
Inserted Text
)
Wally Hopp
Sticky Note
Seyed - it makes sense to try to have our observations be general, rather than specifically about our model. We've done this elsewhere in the observations. To make this one match that tone, I've adjusted the language here a bit.

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 25

short term loss as a measure of supply chain risk. We call this the expected short-term loss heuristic. Of

course, the five factor models summarized in Tables 1-4 provide a more accurate characterization of risk.

But they also require considerably more data. Therefore, to get a sense of how well a single factor risk

metric can work, we suppose that Firm A considers its specific environment (e.g., ABC or AB ; larger or

smaller than Firm B), and uses the single most important factor from the regression model to identify the

products in their portfolio for which they should invest in specific preparedness activities (e.g., setting up

tighter supply monitoring mechanisms, cultivating a closer relationship with the supplier, pre-qualifying

backup suppliers, modifying designs to make products more flexible with regard to input components,

etc.). Clearly, a single factor is not a perfect predictor of risk due to lack of preparedness (i.e., the

R2 of our single-factor regression model is not very high), but it does not need to be. The problem is

not to predict actual losses (or gains) with numerical precision, but rather to accurately identify those

components for which risk is greatest.

To test the utility of our model, we evaluate the ability of the most important factor in Tables 1, 2, 3,

and 4, which we call the Top 1 Factor heuristic, or T1F heuristic, against the expected short term loss

heuristic to choose top five riskiest components among 150 randomly picked items from our test suite.

We did this by computing the expected short term loss heuristic:

p0 × (T + µ)× rA × d0

A

for each component, and then performing the following simulation experiment:

Step 1: Randomly pick 150 components from the set of scenarios. The record for each component

contains (1) the values for all of the model factors from which we can calculate the exact value of

ΩA , and (2) the value of the most important factor (which depends on the specific environment)

and the value of the expected short term loss heuristic.

Step 2: Sequence (from large to small) the components according to the value of the most important

factor from 1 to 150, and calculate the total risk from the top five components as UFactor =∑5

i=1 Ω(i)A

.

Step 3: Sequence (from large to small) the components according to the value of the expected short term

loss heuristic, and calculate the total risk from the top five components as UHeuri =∑5

i=1 Ω(i)A

. (Note

that this value will differ from that in Step 2 if the indices are different.)

Step 4: Record the value Udiff

= (UFactor −UHeuri)/UHeuri, which represents the percent gain of profit

that Firm A experiences if the firm invests in preparedness for the five items determined by the

26Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

Difference in ABC Model AB ModelPerformance A is Larger A is Smaller A is Larger A is Smaller

Umax

diff207.5% 127.9% 229.4% 248.4%

Udiff

126.14% 71.98% 120.96% 104.77%

Table 5: Numerical study of the percent gain of Firm A’s expected profit due to using the most important factorin place of the expected short term loss heuristic.

value of the most important factor, rather than investing in the five components determined by the

expected short-term loss heuristic.

Step 5: Go to Step 1 until 50 replicates have been run (so that the obtained sample mean is close to the

true mean). Find the maximum and mean of Udiff

and denote them by Umax

diffand U

diff, respectively.

The results of this experiment are shown in Table 5.

Observation 4: On average, using the most important factor (i.e., T1F heuristic) to select the riskiestcomponents is much better than using the expected short term loss heuristic to rank components. Whencustomer loyalty differs across products, the T1F heuristic significantly outperforms the expected shortterm loss heuristic in most cases because it explicitly considers expected long term loss.

Observation 5: When customer loyalty is similar across products or when customer loyalty is lower foritems with higher short term loss of sales (i.e., so that short term loss is highly correlated with long termloss), then the expected short term loss heuristic is also a good predictor of total risk.

Note that in practice, the condition in Observation 5 that, “customer loyalty is lower for items with

higher short term sales loss”, does not always hold. In general, we would expect high demand products

to have high customer loyalty because of customers’ preference and due to network externality effects.

For example, comparing Apple’s notebook with Toshiba’s notebook, Apple’s notebook has high sales and

high customer loyalty because of network externalities. On the other hand, Toshiba’s notebook is not as

big a seller as Apple’s notebook in the U.S. market and does not have the same level of network driven

loyalty (Martellaro (2008) and Hruska (2008)). Hence, we would expect a disruption to cause a larger

short term loss of sales to Apple’s notebook but a larger long term loss of market share to Toshiba’s

notebook. Consequently, short term loss may not be a good predictor of long term loss, which implies

that firms using short term loss to allocate preparedness efforts may not be investing optimally. Indeed,

as we note in the following observation, the loss can be substantial.

Observation 6:

• In both ABC and AB models, the percent gain in profit a firm experiences from using the T1Fheuristic in place of the expected short term loss heuristic in evaluating Firm A’s risk due to lackof preparation is substantial.

Wally Hopp
Cross-Out
Wally Hopp
Replacement Text
Regardless of whether the third party is present or not (i.e., in
Wally Hopp
Inserted Text
)

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 27

• For the smaller firm, the percent gain is higher in the AB model than the ABC Model.

As Table 5 shows, the average percent gain in profit in most cases is more than 100%. This implies

that firms can gain a significant increase in their profit, if they prepare for a supply possible supply chain

disruption based on the most important factor presented in this paper rather than the expected short

term loss factor.

Furthermore, as shown in Table 5, when Firm A is the smaller firm, the average and maximum of the

percent gain (104.77% and 248%) are higher in the AB model than in the ABC Model (71.98% and 127%).

The reason is as follows. Comparing Table 2 and Table 4, we see that the smaller firm’s most important

risk factor is a “loss factor” in the ABC model, but a “gain factor” in the AB model. In contrast, the

expected short-term loss heuristic uses a loss factor to evaluate the smaller firm’s risk. Knowing that the

smaller firm in the AB model should focus on the gain factor (which is what the T1F heuristic does),

we expect the performance of the T1F heuristic to be better than that of the expected short-term loss

heuristic in the AB model, but not so much better in the ABC model.

3.5 Impact of the Post-disruption Information

In our basic modeling assumptions, we assumed that (1) firms do not know the true likelihood of a

disruption and so can only estimate it, and (2) a random duration of outage time after the lead time

follows a cumulative probability distribution with an average of µ units of time, which represents cases

in practice where a firm has some knowledge about the ability of its key components suppliers to recover

from a disruptive event. For example, in the 1990’s, Lattice Semiconductor Corp. mainly sourced

semiconductor products from wafer fabs in Japan (Seiko Epson) instead of the more popular Taiwan

area. This decision was based on historical data for Seiko Epson that showed its average recovery period

from a disruptive event was less than two weeks. So, while Seiko Epson was vulnerable to earthquake as

were the Taiwanese suppliers, it was expected to be disrupted for less time by such an event. Long term

recovery data can help manufacturers reduce risk of supply chain disruptions.

In addition to long term data, firms can also make use of real time data about the severity of the

outage (i.e., the length of the mean outage time) immediately after disruption occurs. For instance,

knowing that the disruption is due to a fire, an earthquake, or other incident can help the firm refine its

estimate of the outage time. Gathering information about the incident, as Nokia did from Philips, can

help firms refine their estimate even further.

In this section, we examine (1) whether or not our previous insights (Observations 1 to 3) still hold

under the case in which the post-disruption information exists, and (2) which firm, the firm with a larger

28Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

market share or the firm with a smaller market share, benefits more from the post-disruption information.

To do these, we consider the following information scenarios:

• Pre-Disruption Information: Prior to a disruption, Firm i knows that, if a disruption occurs, it

could be one the following two types:

(a) with probability pS

i0the disruption will be a long disruption with Severe consequences, which

lasts an average of µS units of time with distribution FS (·), or

(b) with probability of pM

i0the disruption will be a short disruption with Minor consequences,

which lasts an average of µM units of time with distribution of FM (·).

Firms use this information to play the Advanced Preparedness Competition and decide how much

to invest in preparation. We refer to the disruption with severe consequences as a type S disruption,

and the one with minor consequences as a type M disruption.

• Post-Disruption Information: After the disruption, we use the conditional probability Pi(h|h),

i ∈ A,B, and h ∈ S, M, to denote the probability that Firm i is correct about the type of

disruption. This conditional probability represents the accuracy of the firm in its assessment of

the disruption type. If the post-disruption information is perfect, then Pi(S|S) = 1, Pi(S|M) = 0,

Pi(M |S) = 0, and Pi(M |M) = 1. Note that, we assume Pi(h|h) 6= Pj (h|h), because we want to

investigate the impact of one firm having more accurate post-disruption information than the other.

We incorporate these new information scenarios as follows:

Advanced Preparedness (AP) Competition: Firm i plays the AP Competition based on its esti-

mates of the likelihoods of each type of disruption, pS

i0and p

M

i0, and its belief of Firm j’s estimates

of these likelihoods, pS

j0,iand p

M

j0,i(i 6= j and i, j ∈ A,B).

Backup Capacity (BC) Competition: After a disruption occurs, firms play the BC Competition

based on the conditional probability Pi(h|h), i ∈ A,B, and h, h =∈ S,M. We define Πh|hi,L(·, ·)

to represent Firm i’s expected profit when it is the Leader in the BC Competition, and it believes

the disruption is of type h when the disruption is actually of type type h. Note that, since Firm

i believes the disruption is type h, it will use the distribution of Fh(·) with an average of µ

hto

optimize its expected profit.

We also introduce the following new factors to study the impact of the Post-disruption Information:

µS/µM : the ratio of the mean outage times of the two types of disruption.

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 29

pS

0/p

M

0: the ratio of the probabilities of the two types of disruption.

We repeated the regression analysis of Sections 3.2 and 3.3 under these conditions. We observed the

same top five factors that have the most impact on ΩA, Firm A’s loss due to lack of preparedness, and

hence Observations 1 to 3 hold under the case in which post-disruption information exists.

To answer the question of which firm benefits more from post-disruption information, we evaluated

the Value of Information, which measures the difference between the expected profit of Firm i in the

following two cases:

• Complete post-disruption information case in which Firm i knows for sure whether the disruption

is severe or minor, immediately after it occurs.

• Incomplete post-disruption information case in which Firm i knows only the estimated (i.e., condi-

tional) probabilities of the two types of disruption.

Note that, in both cases, the profit of Firm i depends on whether Firm j has the complete information or

not. To make a conservative (lower bound) assessment of the value of information for Firm i, we assume

that in the complete information case, Firm j also has complete information, and in the incomplete

information case, Firm j also uses its estimates of the probabilities of the two types of disruption.

Regression analysis on “Value of Information” reveals most of the same top factors we observed earlier

for the regressions on “Loss Due to Lack of Preparedness”. However, µS/µM , the ratio of mean outage

times of the two types of disruption, enters the top five factors correlated with the “Value of Information”

for the larger firm under both the ABC and AB Models and for the smaller firm under the ABC Model

(see Tables 11 to 14 in Online Appendix C for details). This variable also becomes the sixth factor for the

smaller firm under the AB Model. The ratio of the probabilities of the two types of disruption, pS

0/p

M

0, is

the seventh factor correlated with the “Value of Information” for the larger firm and the eleventh factor

for the smaller firm under both the ABC and AB Models. These results indicate that the longer and

more likely type S disruptions become, the greater the value of post-disruption information. However, as

we note below, the size of the firm affects the value of information.

Observation 7: The firm with the larger market share benefits from post-disruption information morethan the one with the smaller market share.

The intuition behind this observation is that the larger firm should pay more attention to loss factors

when evaluating protection policies than the smaller firm, and is therefore more inclined to pay for the

additional protection provided by better post-disruption information.

30Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

3.6 Dedicated Backup Capacity as a Protection Option

Up to this point, we have assumed that there are two types of backup capacity: (a) dedicated capacity

that is committed to a specific firm (e.g., due to a contractual or informal relationship), and (b) shared

capacity, for which the two firms compete. We have treated the dedicated backup capacity as fixed. But

in practice firms may be able to take steps (e.g., negotiate contracts) to acquire additional dedicated

backup capacity to use in case of a disruption. To examine the conditions under which investment in

such capacity is an attractive alternative to investment in monitoring and detection (i.e., xi, i ∈ A,B),we define θi, i ∈ A,B as the effort by Firm i devoted to acquiring extra dedicated backup capacity. We

define Cθ

e,i(i ∈ A,B) as the cost per unit of such effort. The effort level θi can also be considered as

the cost of purchasing capacity options from other suppliers, which will be exercised only if there is a

disruption of the regular supplier.

Once Firms A and B have made their investments in dedicated backup capacity (i.e., chosen θA

and θB), which will come on line when the outage occurs, the model becomes the same as that studied

above, so all results in Sections 3.2 – 3.4 hold. But we now face the new question of which factors affect

the investment ratio θ∗i /(θ∗i + x∗i ), the fraction of preparation investment that is devoted to acquiring

dedicated backup capacity if needed, as opposed to reacting quickly.

In Section 2.2, we defined ΠAPi as Firm i’s total expected profit in the AP Competition for Firm i with

two (decision) variables: xi (i ∈ A,B). In this Section ΠAPi becomes a function with four (decision)

variables: xi and θi (i ∈ A,B), which are simultaneously decided. Adding θi into the AP Competition

changes the game. See Online Appendix D for details of the game and corresponding analytical results.

To find the top factors that have the most impact on the preparation investment ratio, we performed

regression analysis of a numerical study like those presented earlier with θ∗i /(θ∗i + x∗i ) as the dependent

variable. Because the 4th

and 5th

factors have a very small effect on R2, and hence do not offer much

predictive value, we report only the top three factors. These are:

• If Firm A has the larger market share, then

1. the most important factor affecting the investment ratio for Firm A is p0LLC (Firm A’s

expected worst-case long term loss to Firm C) with a positive sign. So, the larger firm that

pays more attention to loss factors when evaluating protection policies, will invest more in

extra dedicated backup capacity as its expected worst-case long term loss to Firm C increases,

which implies the risk level Firm A faces gets higher.

2. the second most important factor isd0

AS (Firm A’s uncovered demand after using the original

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 31

dedicated backup capacity relative to the total available shared backup capacity), with a

positive sign. Intuitively, when the shared backup capacity is very limited, as the larger firm,

which pays more attention to loss factors when evaluating protection policies, it has more

incentive to protect against a loss by securing extra dedicated backup capacity.

3. the third most important factor is p0LLB (Firm A’s expected worst-case long term loss to

Firm B) with a positive sign. Intuitively, the larger Firm A’s expected worst-case long term

loss to Firm B, the higher level of risk it faces, and hence, as the firm paying more attention

to loss factors when evaluating protection policies, it will increase the preparation investment

in securing extra dedicated backup capacity.

• If Firm A has the smaller market share, then

1. the most important factor is p0LG (Firm A’s expected best-case long term gain from Firm

B) with a negative sign. Intuitively, when the opportunity for gain increases, the smaller

firm, which pays more attention to gain factors when evaluating protection policies, has more

incentive to try to win the AP Competition vis investment in monitoring and detection, rather

than avoiding it through investment in extra dedicated backup capacity. When the shared

backup capacity, S, is enough to satisfy Firm A’s customers plus some or all of the competitor’s

unsatisfied customers, Firm A prefers to invest more in monitoring and detection with an eye

toward acquiring the extra shared backup capacity and poaching the competitor’s unsatisfied

customers. However, when the shared backup capacity is limited (S < mindA , dB), then the

firm cannot acquire enough shared backup capacity to poach the competitor’s customers. So,

it may be worthwhile to invest more in extra dedicated backup capacity to be positioned to

take market share from the competitor.

2. the second and third most important factors affecting the investment balance in preparedness

activities of Firm A are p0LLC and p0LLB with positive signs, which implies that when Firm

A’s expected worst-case long term loss to Firm C/B increases, Firm A will invest more in

securing extra dedicated backup capacity.

Based on the above results, we conclude that,

Observation 8: Increased opportunity for gain motivates Firm i with the smaller market share toincrease the fraction of its preparedness effort in monitoring and detection rather than in securing extradedicated backup capacity than the firm with the larger market share (i.e., θ∗i /(θ∗i + x∗i ) is smaller forsmaller firm). This ratio for Firm i increases as the available shared backup capacity S decreases and thededicated backup capacity of Firm j decreases.

32Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

Observation 8 discusses situations in which firm should increase its investment in acquiring dedicated

backup capacity (i.e., conditions that cause θ∗i /(θ∗i + x∗i ) to increase). In the following, we examine the

conditions that cause firms to prefer to devote more effort to monitoring and detection than to securing

extra dedicated backup capacity (i.e., cause θ∗i /(θ∗i + x∗i ) < 0.5). To do this, we group the regression

results from the above numerical study into two groups: one with preparation investment ratios less than

0.5; the other with preparation investment ratios greater than or equal to 0.5. We compared the values

of independent variables in these two groups and observed:

Observation 9: The firm with the larger market share prefers investing in monitoring and detection when(1) its customer loyalty relative to the competitor and the third party are both high, (2) its uncovereddemand (before using the extra dedicated backup capacity) relative to the total available shared backup

capacity (d0

iS ) is low, and (3) its expected worst-case long term loss to the third party (p0LLC) is low.

Observation 10: The firm with the smaller market share prefers investing in monitoring and detectionwhen (1) its competitor’s customer loyalty relative to the firm (γji) is low, (2) its uncovered demand(before using the extra dedicated backup capacity) relative to the total available shared backup capacity

(d0

iS ) is low, and (3) its expected best-case long term gain from the competitor (p0LG) is high.

From Observations 9 and 10, we can see that the larger firm prefers to invest in monitoring and

detection when its customer loyalty is high, which makes the firm feel safe to take a relatively aggressive

action. In contrast, the smaller firm prefers to invest in monitoring and detection when its competitor’s

customer loyalty relative to the firm is low, which gives it a great opportunity for gain by poaching the

competitor’s unsatisfied customers.

From a managerial perspective, preparedness activities related to monitoring and detection can be

viewed as a systemic preparation, since they can protect majority or all components. The Nokia-Ericsson

story is an example of systematic preparedness. To appreciate Nokia’s response to the Philips fire in

March 2000, it is informative to look back to the year 1995. At that time, Nokia was experiencing poor

delivery performance and frequent imbalances between supply and demand. To fix these problems, Nokia

launched a collaborative planning process involving its key suppliers and installed a monitoring process.

This system was critical to the detection and evaluation of the situation in the wake of the Philip fire.

The seeds for Nokia’s fast response in 2000 had been sown years earlier. Moreover, the monitoring system

that proved so useful in the Philips fire would be equally useful for other types of disruptions of other

components.

In contrast, preparedness activities related to securing extra dedicated backup capacity can be viewed

as targeted preparation, since they are specific to a small number of components. A firm with thousands of

components probably cannot economically provide extra dedicated backup capacity for all its components.

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 33

Hence, such protection makes sense only for very critical or very risky components. An example of such

protection was Intel’s response to the 1999 Taiwan earthquake. At the time, Taiwan was the world’s third

largest supplier of semiconductor materials, including microprocessor chips. These chips were central to

the battle between the AMD Athlon and the Intel Pentium III, which was in full swing in 1999. Prior to

the earthquake, AMD believed it was poised to exploit surging demand with its powerful new Athalon

K7. Unfortunately, all Athlon facilities were located in Taiwan, while Intel had a Pentium III facility in

Korea (i.e., dedicated backup capacity), which sourced semiconductors from Korean suppliers (XbitLabs

(1999)). Because Intel was able to exploit this capacity during the Taiwan outage, it weathered the event

better than AMD and thus staved off a potential loss of market share.

3.7 Impact of Firms’ Risk Attitude

Note that, up to this point, we have assumed that all firms are risk neutral. In this section, we perform

a detailed numerical study to extend our results in Sections 3.2 and 3.3 to cases where firms are Risk

Averse (RA) or Risk Seeking (RS). Specifically, we consider: (1) a risk-averse (RA) exponential utility

function of the form u(x) = −e−ax

, and (2) a risk-seeking (RS) exponential utility function of the form

u(x) = eax

, where a is a positive constant. We test cases where a = 0.1, 1, 10, and 100 and compared the

results to the risk neutral case. Since there are three types of risk attitude (Risk Averse, Risk Seeking

and Risk Neutral) for each of the two firms, Firms A and B, we have nine main cases as shown in Table

15 in Online Appendix E. Comparing these revealed the following:

Observation 11: A risk averse firm tends to pay more attention to loss factors when evaluating protectionpolicies (i.e., with more loss factors in its top five risk factors), while a risk seeking firm tends pay moreattention to gain factors when evaluating protection policies (i.e., with more gain factors in its top fiverisk factors). Furthermore, the fact that the competitor is more risk averse motivates a firm to pay moreattention to gain factors when evaluating protection policies. In contrast, a more risk seeking competitormotivates a firm to pay more attention to loss factors when evaluating protection policies.

This observation complements our previous observations about firm size. Larger and/or risk averse

firms should pay attention to loss factors when evaluating protection policies, while smaller and/or risk

seeking firms should pay attention to gain factors when evaluating protection policies. Factors that make

the opponent pay more attention to loss (gain) factors when evaluating protection policies tend to make

a firm pay more attention to gain (loss) factors when evaluating protection policies. These results are

intuitive, but they confirm that our earlier insights about the conditions that magnify the risks from

supply chain disruptions are still valid when firms are not risk neutral.

34Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

4 Conclusions and Future Work

In this paper we have developed a modeling framework that captures both the tactical consequences

(short term sales loss) and the strategic consequences (long term market share shifts) of supply chain

disruptions in competitive environments. The resulting models help strike a balance between the costs

of preparedness and the risks of disruptions in such environments.

To gain structural insights into policies for protecting supply chains against disruptions, we separated

the overall process into two periods: (1) a “pre-disruption period” in which the Advanced Preparedness

(AP) Competition occurs (i.e., firms invest in dedicated backup capacity and/or monitoring and detection

to enhance their probabilities of being first to detect a disruption), and (2) a “post-disruption period”,

during which the Backup Capacity (BC) Competition occurs (i.e., firms purchase shared backup capacity

and use it to satisfy their own customers and possibly steal market share from the opponent).

For the BC Competition, we showed that the optimal backup capacity purchasing policy is a five-region

policy, which can be computed by comparing a small number of possible values. For the AP Competition,

we showed a unique Nash Equilibrium exists for each firm, which describes the preparedness investment

for the market.

From a managerial perspective, our numerical results suggest that a firm will face large tactical and

strategic risks when (1) the likelihood of a disruption is large, (2) the firm’s market share is highly

valuable, (3) its customers exhibit low loyalty (especially relative to a third party), (4) its market sales

exceed the available backup capacity, and (5) the backup capacity exceeds sales of the competitor firm

and the competitor has the potential to use this capacity to steal market share. To reduce the firm’s risk

due to lack of preparedness, it should (a) improve its speed of detecting and reacting to a disruption, (b)

cultivate greater customer loyalty, and (c) increase the amount of backup capacity (this includes both

developing additional dedicated backup capacity and making it more likely that the firm will get whatever

backup capacity is shared). On-Line Appendix F provides a list of policies firms can pursue to mitigate

the tactical and strategic consequences of supply chain disruptions.

Since collecting data is time-consuming and expensive, it is not practical for firms to carefully estimate

all of the parameters used in this paper. Fortunately, our results suggest that the single most important

factor (i.e., Top 1 Factor) can make reasonable predications of which components in the firm’s catalog

pose the highest risks. The data collection overhead of this single factor is similar to that for a single

factor method currently being used in industry, although it can predict risks much more accurately. From

a qualitative standpoint, our regression studies illustrate that large and/or risk averse firms should focus

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 35

on investing in preparedness to protect sales and market share from disruptions, while small and/or risk

seeking firms should invest in preparedness in hopes of taking advantage of a disruption to gain market

share.

We can distinguish between preparedness activities related to monitoring and detection as systemic

preparation, which affect many components simultaneously, and preparedness activities related to securing

extra dedicated backup capacity as targeted preparation, which affect only a few specific component.

Because of their limited range, targeted protection is only economical for vital or highly risky components.

Systemic protection can be achieved in a variety of ways, most of which revolve around acquiring, sharing,

and using information. This includes both long term information (e.g., estimates of the likelihood and

duration of disruptions) and real-time information (e.g., severity of disruption after it has begun). Our

results suggest that larger firms have more incentive to invest in both types of information because they

have more market share to lose than do smaller firms.

While our framework offers significant managerial insights into the science of supply chain risk man-

agement, there is still considerable need for further research. We describe two of these below.

First, in this paper we have studied the scenario in which a disruption affects a single component of

a single product of one firm and its competitor is affected in a symmetric fashion. However, a firm may

have many final products that rely on the disrupted key component. Alternatively, a disruption (e.g., an

earthquake) may affect an entire region and hence several components at once. To help guide real-world

decision making, the framework needs to be extended to cover these scenarios.

Second, we have considered only business-to-business (OEM) relationships between firms and their

customers. The business-to-consumer (retail) environment remains open. In a retail situation, firms have

no control over which customers – existing or new – will have their orders filled first. Hence, even if a firm

secures an amount of backup capacity of the disrupted component that is smaller than its sales, it may

still make some sales to unsatisfied customers of the competitor. This may mean that environments with

small amount of available backup capacity present greater risk than they do under the OEM assumption.

To characterize risk in this setting, we first need to better understand the customer brand loyalty, so we

can model the dynamics of how customers choose products and switch between brands.

Acknowledgement: This research was supported in part by the National Science Foundation under

grants DMI-0243377 and DMI-0423048.

References

Chopra, S. and M.S. Sodhi, 2004. Managing Risk to Avoid Supply-chain Breakdown. MIT Sloan ManagementReview 46, 53-61.

36Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

Christopher, M. and H. Peck, 2004. Building the Resilient Supply Chain. International Journal of LogisticsManagement 15 (2), 1-13.

Christopher, M. and H. Lee, 2004. Mitigating Supply Chain Risk Through Improved Confidence. InternationalJournal of Physical Distribution and Logistics Management 34 (5), 388-396.

Eglin, R., 2003. Can Suppliers Bring Down Your Firm? Sunday Times (London), November 23rd, page 6.

Fine, C.H., 2000. Clockspeed-based Strategies for Supply Chain Design. Production and Operations Management9 (3), 213-221.

Fisher, M., Hammond, J., Obermeyer, W. and A. Raman, 1997. Configuring a Supply Chain to Reduce the Costof Demand Uncertainty. Production and Operations Management 6 (3), 211-225.

Gan, X., Sethi, S.P., and H. Yan, 2005. Channel Coordination with a Risk-neutral Supplier and a DownsideRisk-adverse Retailer. Production and Operations Management 14 (1), 80-89.

Gartner, 1999-2006. Gartner Press Releases, www.gartner.com.

Graves, S.C. and S.P. Willems, 2003. Supply Chain Design: Safety Stock Placement and Supply Chain Configu-ration. Handbooks in OR&MS 11, Elsevier, Amsterdam.

Hendricks, K.B. and V.R. Singhal, 2005. An Empirical Analysis of the Effect of Supply Chain Disruption onLong-Run Stock Price Performance and Equity Risk of the Firm. Production and Operations Management14 (1), 35-52.

Hager, W.W., and S.Park, 2004. The Gradient Projection Method with Exact Line Search. Journal of GlobalOptimization 30 (1), 103-118.

Hopp, W.J., and Z.-G. Liu, 2006. Protecting supply chain networks against catastrophic failures. Working paper,Department of Industrial Engineering and Management Sciences. Northwestern University.

Hruska, J., 2008. Apple, Dell big winners as PC market shows healthy growth. July, 16, 2008. Available onhttp://arstechnica.com/news.ars/post/20080716-apple-dell-big-winners-as-pc-market-shows-healthy-growth.html.

Johnson, M.E., 2001. Learning From Toys: Lessons in Managing Supply Chain Risk from the Toy Industry.California Management Review 43 (3), 106-124.

Kharif, Olga, 2001. Will Ericsson Hang Up on Cell-Phones Altogether? February 12, 2001. Available onhttp://www.businessweek.com/bwdaily/dnflash/feb2001/nf20010212 208.htm

Kleindorfer, P.R., and G. Saad, 2005. Managing Disruption Risks in Supply Chains. Productions and OperationsManagement 14 (1), 53-68.

Lee, H., 2003. Aligning Supply Chain Strategies with Products Uncertainties. California Management Review 44(3), 105-119.

Leggio, K.B., and D. Lien, 2003. Comparing Alternative Investment Strategies Using Risk-Adjusted PerformanceMeasures. Journal of Financial Planning 16, (1), 82-86,

Marsal, Katie, 2007. Apple may see 50 percent margin on each iPhone sale. January 18, 2007. Available onhttp://www.appleinsider.com/articles/07/01/18/apple may see 50 percent margin on each iphone sale.html

Martellaro, John, 2008. Apple Notebook Market Share Rises, Steals from Acer, Toshiba. September 17th, 2008.Available onhttp://www.macobserver.com/tmo/article/Apple Notebook Market Share Rises Steals from Acer Toshiba /

Mathewson, S.B., 1999. U.S. Earthquake Frequency Estimation – Ratemaking for Unusual Events. CAS ForumRatemaking Discussion Papers, Winter 1999, 133-152.INFORMS Annual Meeting 2003, Atlanta, GA. 85.

Sheffi, Y., 2005. The Resilient Enterprise: Overcoming Vulnerability for Competitive Advantage. MIT Press.Cambridge, Massachusetts.

Snyder, L.V., and Z.-J. Shen, 2006. Supply and demand uncertainty in multi-echelon supply chains. Workingpaper, Department of Industrial Engineering and Operations Research. University of California, Berkeley.

Stauffer, D., 2003. Supply Chain Risk: Deal With It. HBS Working Knowledge, Available onhttp://hbswk.hbs.edu/item/3442.html.

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 37

Tomlin, B.T., 2006. On the value of mitigation and contingency strategies for managing supply chain disruptionrisks. Management Science 52 (5), 639-657.

Tomlin, B.T., and L.V. Snyder, 2006. On the value of a threat advisory system for managing supply chaindisruptions. Working paper, Department of Industrial and Systems Engineering, Lehigh University.

Tomlin, B.T., and C. Tang, 2008. The power of flexibility for mitigating supply chain risks. Working paper.Anderson Graduate School of Management. University of California, Los Angeles.

XbitLabs. 1999. Earthquake in taiwan. Available on: www.xbitlabs.com.

Zsidisin, G.A., Panelli, A., and R. Upton, 2000. Purchasing Organization Involvement in Risk Assessments, Con-tingency Plans, and Risk Management: An Exploratory Study. Supply Chain Management: An InternationalJournal 5 (4), 187-197.

38Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

ONLINE APPENDIX A

Design of Numerical Experiments

We created a large set of scenarios (322 × 2× 4 cases in total) using values for the 32 model parameters

chosen to cover the majority of realistic scenarios we could observe in practice. We randomly picked onemillion scenarios from this large set and fit a regression model to this reduced sample.

Below we summarize the 8 parameters of the model, along with 5 profit factors, and 19 normalized factorsused in our numerical studies. We classify the factors as gain, loss, or neutral factors in Table 6.

A.1 Single Parameters:

We consider eight parameters in our model including p0, µ, CV (= σ/µ), T , γAB , γAC , γBA , and γBC .The values of these parameters are summarized in Table 7. Note that, given the distribution of the outagetime, the customer loyalty coefficients of 18, 42, 130, 260 correspond to cases in which (approximately)80%, 50%, 20%, 10% of customers who use the competitor’s (or the third party’s) products during theoutage will permanently switch to those firms. We assume that the remaining outage times (after leadtime T ) are normally distributed.

A.2 Profit Factors:

We include the following five variables corresponding to the profit loss or gain for each firm, i.e., SLTotal

,LLB, LLC, LG, and SG.

• Firm A’s worst-case short term loss:

SLTotal

= SLT + SLµ = T × rA × d0

A+ µ× rA × dA

which is the loss of profit during the lead time and outage that occurs, if Firm A cannot satisfy anyof its customers.

• Firm A’s worst-case long term loss to Firm B (i.e., LLB) and to Firm C (i.e., LLC):

LLB = mAB ×µ

γAB

× dA

LLC = LLCT + LLCµ = mAC ×T

γAC

× d0

A+ mAC ×

µ

γAC

× dA

These long terms losses correspond to the worst case in which Firm A cannot satisfy any of itsown customers. Note that, Firm A’s worst-case long term loss to Firm B is actually expressed asmAB × ξAB × dA , where

ξAB =∫ ∞

0(1− e

− tγAB )dFo(t),

and Fo is a distribution with mean µ and standard deviation σ. However when σ → 0, we have,

ξAB = 1− e− µ

γAB ' µ

γAB

.

Therefore, to simplify, we define,

LLB = mAB ×µ

γAB

× dA .

We use the same approximation to define LLC and LG.

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 39

Firm A’s Gain Factors Firm A’s Loss Factors Firm A’s Neutral FactorsSG SL

Totalp0

LG LLB, LLC µ,CV ,TγBA γAB ,γAC γBC

mAA365rA

, mBB365rB

, mBC365rA

mBA365rB

mAB365rA

, mAC365rA

crA

|pB0−p0

p0|

KA−dAdB

KB−dBdA

|pA0,B−p

A0

pA0

|rA

rB

|pA0−p0

p0| 365hA

rA,365hB

rBdAS ,dB

S

|pB0,A−p

B0

pB0

| Sd

A+d

B

Table 6: Firm A’s classified model factors.

• Firm A’s best-case short term gain (i.e., SG) and long term gain (i.e., LG):

SG = µ× rA × dB LG = mBA ×µ

γBA

× dB

which correspond to the case where Firm B cannot satisfy any of its own customers.

A.3 Normalized Factors:

We consider the following 19 normalized factors (whose ranges are determined by the values of associatedparameters and summarized in Table 7):

• rA

rB

, which is the relative profitability of the two firms;

• mij

365ri, which is the present-worth factor of one unit market share of Firm i for Firm j based on a 15%

interest factor for continuous compounding interest (Thuesen et al. 1977), i ∈ A,B, j ∈ A,B, C.So, for example, if mAB

365rA= 0.1 and rA = $120, then mAB = $4380;

• 365hiri

, which is the relative annual cost for Firm i to hold one unit of unused backup capacity,i ∈ A,B;

• crA

, which is the relative premium Firm A pays per unit of backup capacity;

• diS , which is Firm i’s sales relative to the total available backup capacity, i ∈ A, B;

• Ki−didj

, which is defined as the “poaching potential” of Firm i (notice that, the numerator is Firmi’s remaining production capacity after satisfying its own customers), i 6= j, i, j ∈ A,B;

• Sd

A+d

B, which is the fraction of total market sales represented by the backup capacity;

• |pi0−p0p0

|, which is the absolute percent error in Firm i’s estimate of the likelihood of a disruption,i ∈ A,B;

• |pj0,i−pj0

pj0|, which is the absolute percent error in Firm i’s belief of Firm j’s estimate of the likelihood

of a disruption, i 6= j, i, j ∈ A,B.

40Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

Unnormalized Parameters Normalized FactorsParameters Values Factors Rangesµ (day) 15, 30, 60CV (σ

µ) 16 , 1

3

T (day) 5, 10, 15γAB (day) 18, 42, 130γAC (day) γAB , γAB + 100, 260γBA (day) 18, 42, 130γBC (day) γBA , γBA + 100, 260rA ($/unit) 60, 90, 120rB ($/unit) 60, 90, 120 r

ArB

0.5 ∼ 2mAB ($/unit) 4380, 16425, 54750 m

AB365r

A0.1 ∼ 2.5

mAC ($/unit) 4380, 16425, 54750 mAC

365rA

0.1 ∼ 2.5mAA ($/unit) 4380, 16425, 54750 m

AA365r

A0.1 ∼ 2.5

mBA ($/unit) 4380, 16425, 54750 mBA

365rB

0.1 ∼ 2.5mBC ($/unit) 4380, 16425, 54750 m

BC365r

B0.1 ∼ 2.5

mBB ($/unit) 4380, 16425, 54750 mBB

365rB

0.1 ∼ 2.5

(365hA) ($/unit/year) 12, 22.5, 30 365hA

rA

0.1 ∼ 0.5

(365hB ) ($/unit/year) 12, 22.5, 30 365hB

rB

0.1 ∼ 0.5c ($/unit) 12, 90, 150 c

rA

0.1 ∼ 2.5

dA (unit) 1000, 3000, 5000 dAS 0.1 ∼ 10

dB (unit) 1000, 3000, 5000 dBS 0.1 ∼ 10

KA (unit) dA , dA + 0.5dB , dA + dB

KA−d

Ad

B0 ∼ 1

KB (unit) dB , dB + 0.5dA , dA + dB

KB−d

Bd

A0 ∼ 1

S (unit) 500, 5000, 10000 Sd

A+d

B0.05 ∼ 5

p0 0.01, 0.05, 0.2, 0.4pA0 when p0 = 0.01 0.005, 0.01, 0.05 |pA0

−p0p0

| 0 ∼ 4

when p0 = 0.05 0.025, 0.05, 0.1 |pA0−p0

p0| 0 ∼ 1

when p0 = 0.2 0.1, 0.2, 0.3 |pA0−p0

p0| 0 ∼ 0.5

when p0 = 0.4 0.2, 0.4, 0.6 |pA0−p0

p0| 0 ∼ 0.5

pB0 when p0 = 0.01 0.005, 0.01, 0.05 |pB0−p0

p0| 0 ∼ 4

when p0 = 0.05 0.025, 0.05, 0.1 |pB0−p0

p0| 0 ∼ 1

when p0 = 0.2 0.1, 0.2, 0.3 |pB0−p0

p0| 0 ∼ 0.5

when p0 = 0.4 0.2, 0.4, 0.6 |pB0−p0

p0| 0 ∼ 0.5

pB0,A when pB0 < 0.1 0.5pB0 , pB0 , 2pB0 |pB0,A−p

B0

pB0

| 0 ∼ 1

when pB0 ≥ 0.1 0.5pB0 , pB0 , 1.5pB0 |pB0,A−p

B0

pB0

| 0 ∼ 0.5

pA0,B when pA0 < 0.1 0.5pA0 , pA0 , 2pA0 |pA0,B−p

A0

pA0

| 0 ∼ 1

when pA0 ≥ 0.1 0.5pA0 , pA0 , 1.5pA0 |pA0,B−p

A0

pA0

| 0 ∼ 0.5

Table 7: Values of input parameters and ranges of factors for numerical studies.

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 41

References

Thuesen, H.G., Fabrycky, W.J., and G.J.Thuesen, 1977. Engineering Economy (5rd Ed.). Prentice-Hall, Inc.,New Jersey.

42Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

ONLINE APPENDIX B

Proofs of Analytical Results

PROPOSITION 1:

(Large Capacity Leader:) If the Leader’s production capacity is greater than the combined market share of bothfirms (i.e., K

A≥ d

A+ d

B), and

(1) if the backup capacity is less then the combined market share of both firms (i.e., S ≤ dA

+ dB), then the only

possible choices for the optimal backup capacity purchases for the two firms are:

(Y ∗A,L

, Y ∗B,F

) ∈

(0, 0), (0, dB ),(0, minKB , S), (S − dB , 0), (S − dB , dB ),

(dA, 0), (d

A, S − d

A), (S, 0)

;

(2) if the backup capacity is larger than the combined market share of both firms (i.e., S > dA

+ dB), then the

only possible choices for the optimal backup capacity purchases for the two firms are:

(Y ∗A,L

, Y ∗B,F

) ∈

(0, 0), (0, dB ),(0,minK

B, d

A+ d

B), (d

A, 0), (d

A, d

B),

(dA + dB , 0), (S, 0)

.

(Small Capacity Leader:) If the Leader’s production capacity cannot cover the combined market share of bothfirms (i.e., KA < dA + dB ), and

(1) if the backup capacity is less than the Leader’s market share (i.e., S ≤ KA), then the only possible choicesfor the optimal backup capacity purchases for the two firms are:

(Y ∗A,L

, Y ∗B,F

) ∈

(0, 0), (0, dB), (0, minK

B, S), (S − d

B, 0), (S − d

B, d

B),

(dA , 0), (dA , S − dA), (S, 0)

;

(2) if the backup capacity is larger than the Leader’s market share, but it is smaller than the combined marketshare of both firms (i.e., K

A< S ≤ d

A+ d

B), then the only possible choices for the optimal backup capacity

purchases for the two firms are:

(Y ∗A,L

, Y ∗B,F

) ∈

(0, 0), (0, dB), (0, minK

B, S), (S − d

B, 0), (S − d

B, d

B),

(dA , 0), (dA , S − dA), (KA , 0), (KA , S −KA)

;

(3) if the backup capacity can cover the combined market share of both firms (i.e., S > dA

+ dB), then the only

possible choices for the optimal backup capacity purchases for the two firms are:

(Y ∗A,L

, Y ∗B,F

) ∈

(0, 0), (0, dB), (0, minK

B, d

A+ d

B), (d

A, 0), (d

A, d

B), (K

A, 0),

(S − (d

A+ d

B) + K

A, 0

),

(S − (d

A+ d

B) + K

A, (d

A+ d

B)−K

A

).

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 43

PROOF OF PROPOSITION 1:

We only present the proof for the case of Large Capacity Leader, i.e., KA≥ d

A+ d

B. The proof for Small Capacity

Leader is similar, and is therefore omitted. To simplify notation, we let

φij

= mijξij: i 6= j, i ∈ A,B, j ∈ A, B,C

Since KA ≥ dA + dB , then we have KA − dA ≥ dB ≥ [dB − Y ∗B,F

(YA,L)]+, where Y ∗B,F

(YA,L) is Firm B’s optimalpurchase amount of backup capacity after Firm A purchases Y

A,L.

min

[dB− Y ∗

B,F(Y

A,L)]+, min

[Y

A,L− d

A]+,K

A− d

A

=

min

[dB− Y ∗

B,F(Y

A,L)]+, [Y

A,L− d

A]+,K

A− d

A

= min

[d

B− Y ∗

B,F(Y

A,L)]+, [Y

A,L− d

A]+

.

Therefore, equation (31) becomes:

ΠA,L

(Y

A,L, Y ∗

B,F(Y

A,L))

= rA

min

YA,L

, dA

µ

+ψA

min

[dB− Y ∗

B,F(Y

A,L)]+, [Y

A,L− d

A]+

−φAB

min

[Y ∗B,F

(YA,L

)− dB]+, [d

A− Y

A,L]+

−φAC

[[d

A− Y

A,L]+ − [Y ∗

B,F(Y

A,L)− d

B]+

]+

−cAYA,Lµ

−hA

[Y

A,L−minY

A,L, d

A −min

[d

B− Y ∗

B,F(Y

A,L)]+, [Y

A,L− d

A]+

]+

µ. (4)

It is easy to show that ΠA,L

is a piecewise linear function in YA,L

. It is linear because equation (4) is linear in YA,L

,and it is piecewise linear due to the existence of Min and Max functions.

To proof the results for Parts (1) and (2) of the case for “Large Capacity Leader” (i.e., KA ≥ dA +dB ), we considerthe following two corresponding cases:

• Case 1: When S ≤ dA + dB ;

• Case 2: When S > dA + dB .

CASE 1: If S ≤ dA + dB , then equation (4) becomes

ΠA,L

(Y

A,L, Y ∗

B,F(Y

A,L))

= rA

min

YA,L

, dA

µ + ψ

Amin

[d

B− Y ∗

B,F(Y

A,L)]+, [Y

A,L− d

A]+

− φAB

min

[Y ∗B,F

(YA,L

)− dB]+, [d

A− Y

A,L]+

− φAC

[[dA − YA,L ]+ − [Y ∗

B,F(YA,L)− dB ]+

]+

− cAYA,Lµ. (5)

For the piecewise linear functions, it is proven that the optimal solution is one of the break points (Hager andPark 2004). Hence, the optimal value of Y

A,Lis one of four break points of equation (5), namely 0, [S − d

B]+,

mindA, S, and S. Below we consider each of these three cases:

Case 1-i, YA,L

= 0: For this case, the objective function of Firm A is

ΠA,L

(0, Y ∗

B,F(YA,L)

)

= −φAB

min

[Y ∗B,F

(YA,L

= 0)− dB]+, d

A

− φ

AC

[d

A− [Y ∗

B,F(Y

A,L= 0)− d

B]+

]+

= −φAB

[Y ∗B,F

(YA,L

= 0)− dB]+ − φ

AC

(d

A− [Y ∗

B,F(Y

A,L= 0)− d

B]+

). (6)

Note that, since S ≤ dA

+ dB, we have [Y ∗

B,F(Y

A,L= 0)− d

B]+ ≤ S − d

B≤ d

A.

On the other hand, equation (32) is reduced to

ΠB,F (0, YB,F ) = rB min

YB,F , dB

µ + ψB min

dA , [YB,F − dB ]+

− φBC [dB − YB,F ]+ − cBYB,F µ

= rB

minYB,F

, dBµ + ψ

B[Y

B,F− d

B]+ − φ

BC[d

B− Y

B,F]+ − c

BY

B,Fµ, (7)

44Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

which is piecewise linear and has three break points: 0, mindB, S, and minK

B, S. So, the optimal value of

Y ∗B,F

0, dB, minK

B, S

. Consequently, the possible combination of the optimal capacity purchase for firms

A and B in this case are

(Y ∗A,L

, Y ∗B,F

) ∈

(0, 0), (0, dB), (0,minK

B, S)

.

Case 1-ii, YA,L

= [S − dB]+: Notice that, if [S − d

B]+ = 0, i.e., S ≤ d

B, then it becomes similar to Case 1-i, so

here we are only interested in the case of [S − dB]+ = S − d

B.

Since S ≤ dA + dB , YA,L = S − dB ≤ dA and Y ∗B,F

(YA,L) ≤ dB must hold. Then the objective function of Firm Abecomes

ΠA,L

(S − dB , Y ∗

B,F(YA,L)

)= (rA − cA)(S − dB )µ− φAC

(dA − (S − dB )

). (8)

It is easy to see that the reason why YA,L

= S − dB

is that Firm A aims at protecting itself from loosing marketshare to Firm B (although sales profit is negative), i.e., if Y

A,L= 0, then Y ∗

B,F= S due to the linearity property of

the profit function. Based on Firm A’s protection strategy, the objective function of Firm B becomes

ΠB,F

(S − dB, Y

B,F) = (r

B− c

B)Y

B,Fµ− φ

BC(d

B− Y

B,F), (9)

which is a linear function with two end points: 0 and dB. Thus, the optimal capacity purchase Y ∗

B,F∈ 0, d

B.

Consequently, in this case the only possible combination of the optimal capacity purchase for firms A and B are

(Y ∗A,L

, Y ∗B,F

) ∈

(S − dB , 0), (S − dB , dB )

.

Case 1-iii, YA,L = mindA , S: For this case, the objective function of Firm A is

ΠA,L

(mind

A, S, Y ∗

B,F(Y

A,L))

= (rA− c

A)mind

A, Sµ− φ

AC

(d

A−mind

A, S)

= (rA − cA)mindA , Sµ− φAC [dA − S]+. (10)

On the other hand, since Firm A purchases capacity to only satisfy its own customers, i.e.,YA,L = mindA , S, theobjective function of Firm B, becomes

ΠB,F

(mindA, S, Y

B,F) = (r

B− c

B)Y

B,Fµ− φ

BC(d

B− Y

B,F), (11)

which is a linear function with two end points: 0 and [S − mindA, S]+ = [S − d

A]+. Thus, Y ∗

B,F∈ 0, [S −

mindA, S]+ = [S − d

A]+. Consequently, in this case the only possible combination of the optimal capacity

purchase for firms A and B are

(Y ∗A,L

, Y ∗B,F

) ∈

(mindA, S, 0), (mind

A, S, [S − d

A]+)

.

Case 1-iv, YA,L

= S: For this case, Y ∗B,F

(YA,L

) = 0 is the only possibility. Since S ≤ dA

+dB, then [S−d

A]+ ≤ d

B

must hold. Hence, the objective function of Firm A is

ΠA,L

(S, 0) = rA

minS, dAµ + ψ

A[S − d

A]+ − φ

AC[d

A− S]+ − c

ASµ, (12)

and the objective function of Firm B, becomes

ΠB,F

(S, 0) = −φBA

min[S − d

A]+, d

B

− φBC

(d

B− [S − d

A]+

).

The only possible combination of the optimal capacity purchase for this case is (Y ∗A,L

, Y ∗B,F

) ∈ (S, 0).

If we combine the results for Case 1-i to Case 1-iv, we get the following possible combinations of the optimalcapacity purchase for firms A and B, when S ≤ d

A+ d

B

(Y ∗A,L

, Y ∗B,F

) ∈

(0, 0), (0, dB ),(0,minKB , S), (S − dB , 0), (S − dB , dB ),

(mindA , S, 0)

,(mindA , S, [S − dA ]+

), (S, 0)

.

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 45

Note that, (1) the sixth possible combination(mind

A, S, 0)

becomes (dA, 0), when d

A≤ S, and reduces to the

last one, (S, 0), when dA

> S; (2) the seventh possible combination(mind

A, S, [S− d

A]+

)becomes (d

A, S− d

A),

when dA≤ S, and reduces to the last one, (S, 0), when d

A> S. Thus, the total possible combinations are:

(Y ∗A,L

, Y ∗B,F

) ∈

(0, 0), (0, dB),

(0, minK

B, S), (S − d

B, 0), (S − d

B, d

B

),

(dA, 0), (d

A, S − d

A), (S, 0)

.

This completes the proof for Part (1) of Proposition 1 for the case with “Large Capacity Leader”.

CASE 2: Similar to Case 1, it is easy to show that if S > dA

+dB, then equation (31) is a piecewise linear function

with four break points: 0, dA, d

A+ d

Band S. We now discuss each of the four cases.

Case 2-i, YA,L

= 0: For this case, the objective function of Firm A becomes

ΠA,L

(0, Y ∗

B,F(Y

A,L))

= −φAB

min[Y ∗

B,F(Y

A,L= 0)− d

B]+, d

A

− φAC

[d

A− [Y ∗

B,F(Y

A,L= 0)− d

B]+

]+. (13)

On the other hand, the objective function of Firm B is reduced to

ΠB,F (0, YB,F ) = rB min

YB,F , dB

µ + ψB min

dA , [YB,F − dB ]+

− φBC

[dB− Y

B,F]+ − c

BY

B,Fµ, (14)

which is a piecewise linear function with three break points: 0, dB , and minKB , dA + dB, which constitutes thepotential values for Y ∗

B,F. Consequently, the possible combinations for the optimal capacity purchase for Firms A

and B are

(Y ∗A,L

, Y ∗B,F

) ∈

(0, 0), (0, dB ),(0, minKB , dA + dB

).

Case 2-ii, YA,L = dA : For this case, the objective function of Firm A becomes

ΠA,L

(dA , Y ∗

B,F(YA,L)

)= (rA − cA)dAµ. (15)

Due to Firm A’s protection strategy, the objective function of Firm B becomes

ΠB,F

(dA, Y

B,F) = r

Bmin

Y

B,F, d

B

µ− φ

BC[d

B− Y

B,F]+ − c

BY

B,Fµ

= (rB− c

B)Y

B,Fµ− φ

BC[d

B− Y

B,F]+, (16)

which is a piecewise linear function and has two break points: 0 and dB. Consequently, the possible combinations

of the optimal capacity purchase for Firms A and B are

(Y ∗A,L

, Y ∗B,F

) ∈ (d

A, 0), (d

A, d

B).

Case 2-iii, YA,L = dA + dB : As shown in equation (1), the coefficient of the h is

[YA,L −minYA,L, dA −min

[dB − Y ∗

B,F (YA,L)]+,min[YA,L − dA ]+,KA − dA

]+

µ, (17)

Since in this case, YA,L = dA + dB , then we have

YA,L −minYA,L, dA = (d

A+ d

B)− d

A= d

B.

Hence, (17) becomes: [d

B−min

[d

B− Y ∗

B,F (YA,L)]+,mind

B,K

A− d

A

]+

µ. (18)

Note that, KA − dA ≥ dB holds, and hence (18) reduces to[dB −min

[dB − Y ∗

B,F (YA,L)]+, dB

]+

µ.

46Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

• If dB≥ Y ∗

B,F (YA,L), then the coefficient of the h is Y ∗B,F (YA,L)µ.

• If dB

< Y ∗B,F (YA,L), then the coefficient of the h is d

Bµ.

Therefore,

ΠA,L

(d

A+ d

B, Y ∗

B,F(Y

A,L))

= rAd

Aµ + ψ

A[d

B− Y ∗

B,F(Y

A,L)]+

− cA(d

A+ d

B)µ− h

Amin

d

B, Y ∗

B,F(Y

A,L= d

A+ d

B)µ. (19)

On the other hand, the objective function of Firm B is reduced to

ΠB,F

(dA

+ dB, Y

B,F) = (r

B− c

B)Y

B,Fµ− φ

BA[d

B− Y

B,F]+, (20)

which is a piecewise linear function and has two break points: 0 and minS − dA − dB , dB. Thus, Y ∗B,F

=0, minS − d

A− d

B, d

B.

However, the combination of(Y ∗

A,L= d

A+ d

B, Y ∗

B,F= minS − d

A− d

B, d

B) implies that only part of Y ∗

A,L,

which is the difference between dB

and Y ∗B,F

, will be used by Firm A to gain both sales profit and market sharefrom Firm B. But, due to the linearity property, it cannot be an optimal solution, because, in this case, if oneunit of firm B’s customer is profitable, then Firm A will definitely want to gain all possible units. So, if FirmA knows that B will buy all or some of the remaining backup capacity, i.e., minS − d

A− d

B, d

B, to protect

itself, the decision of dA

+ dB

will never be optimal for Firm A. Therefore, Y ∗A,L

= dA

+ dB

can be optimal onlyif Y ∗

B,F= 0, i.e., the only possible combinations of the optimal capacity purchase for firms A and B in this case is

(Y ∗A,L

, Y ∗B,F

) ∈ (dA

+ dB, 0).

Case 2-iv, YA,L

= S: In this case, Y ∗B,F

(YA,L

= S) = 0 is the only possibility. Thus, (Y ∗A,L

, Y ∗B,F

) ∈ (S, 0). Theobjective function of Firm A is

ΠA,L(S, 0) = rAdAµ + ψAdB − cASµ− hA(S − dA − dB )µ. (21)

If we combine the results for Case 2-i to Case 2-iv, we get the following possible combinations of the optimalcapacity purchase for firms A and B, when S > d

A+ d

B,

(Y ∗A,L

, Y ∗B,F

) ∈

(0, 0), (0, dB ),(0, minKB , dA + dB

), (dA , 0), (dA , dB ), (dA + dB , 0), (S, 0)

.

This completes the proof for Part (2) of Proposition 1 for the case of “Large Capacity Leader”. ¤

PROPOSITION 2: The optimal policy of the Backup Capacity Competition has a five-region structure.

PROOF OF PROPOSITION 2:

We present the proof for the case of Large Capacity Leader, i.e., KA ≥ dA + dB . The proof for Small CapacityLeader is similar, and is therefore omitted.

PROOF for the Follower, Firm B:

We first determine the regions for the optimal capacity purchase for the Follower. We consider the following twocorresponding cases (same as the configuration of the proof for Proposition 1):

• Case 1: When S ≤ dA + dB . For this case, we introduce three thresholds on Firm B’s unit profit margin to

(i) separate the region in which Firm B forfeits and the region in which Firm B is aggressive,

(ii) separate the region in which Firm B forfeits and the region in which Firm B protects, and

(iii) separate the region in which Firm B protects and the region in which Firm B is aggressive.

• Case 2: When S > dA + dB . For this case, we introduce four thresholds on Firm B’s unit profit margin to

(i) separate the region in which Firm B forfeits and the region in which Firm B is aggressive,

(ii) separate the region in which Firm B forfeits and the region in which Firm B protects,

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 47

(iii) separate the region in which Firm B protects and the region in which Firm B is aggressive, and

(iv) separate the following two responses: Given Firm A purchases the amount of dA + dB , Firm B caneither buy the remaining to protect itself from losing customers to Firm A (this response implies thatd

A+ d

Bcannot be optimal for Firm A), or buy nothing (this response implies that d

A+ d

Bis optimal

for Firm A).

The summary of the thresholds introduced in this proof can be found in Table 8.

We present the proof based on the same cases that we presented in Proposition 1.

Case 1-i, YA,L = 0: Define

cIB

= cB− φ

AB

[minK

B, S − d

B

]+ + φBC

mind

B, minK

B, S

µ minKB, S .

We now show that when rB ≥ cIB, then ΠB,F

(0, minK

B, S) ≥ Π

B,F(0, 0). By equation(7) we have

ΠB,F

(0,minK

B, S)−Π

B,F(0, 0)

= rB

min

minKB, S, d

B

µ + ψ

B

[minK

B, S − d

B

]+

− φBC

[d

B−minK

B, S]+ − c

BminK

B, Sµ

−(rB min0, dBµ + ψB [0− dB ]+ − φBC [dB − 0]+ − cB (0)µ

),

= rB

min

minKB, S, d

B

µ + (r

Bµ + φ

AB)[minK

B, S − d

B

]+

− φBC

[d

B−minK

B, S]+ − c

BminK

B, Sµ

− (−φBC

dB),

= rB

minKB, Sµ + φ

AB

[minK

B, S − d

B

]+

+ φBC mindB ,minKB , S− cB minKB , Sµ,

= rB

minKB, Sµ−

(c

BminK

B, Sµ

− φAB

[minK

B, S − d

B

]+ − φBC

mind

B,minK

B, S

).

It is clear that if rB≥ cI

B, then the right-hand side is positive, which implies

ΠB,F

(0, minK

B, S) ≥ Π

B,F(0, 0).

Therefore, if rB≥ cI

B, then Y ∗

B,F(Y

A,L= 0) = minK

B, S; otherwise, Y ∗

B,F(Y

A,L= 0) = 0.

DefinecII

B= c

B− φ

BC

µ.

We now show that when rB≥ cII

B, then Π

B,F(0, d

B) ≥ Π

B,F(0, 0). By equation (7) we have

ΠB,F

(0, dB)−Π

B,F(0, 0) = r

Bd

Bµ− c

Bd

−(r

Bmin0, d

Bµ + ψ

B[0− d

B]+ − φ

BC[d

B− 0]+ − c

B(0)µ

),

= (rB− c

B)d

Bµ− (−φ

BCd

B),

= rBd

Bµ− (c

Bd

Bµ− φ

BCd

B).

It is clear that if rB≥ cII

B, then the right-hand side is positive, which implies

ΠB,F

(0, dB) ≥ Π

B,F(0, 0).

Therefore, if rB≥ cII

B, then Y ∗

B,F(Y

A,L= 0) = d

B; otherwise, Y ∗

B,F(Y

A,L= 0) = 0.

DefinecIII

B= c

B− φ

AB

µ.

48Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

We now show that when rB≥ cIII

B, then Π

B,F

(0, minK

B, S) ≥ Π

B,F(0, d

B). By equation (7) we have

ΠB,F

(0,minK

B, S)−Π

B,F(0, d

B)

= rB min

minKB , S, dB

µ + (rBµ + φAB )

[minKB , S − dB

]+

− φBC

[dB −minKB , S]+ − cB minKB , Sµ

−((rB − cB )dBµ

),

= (rB− c

B)minK

B, Sµ + φ

AB

(minK

B, S − d

B

)

− (rB− c

B)d

Bµ,

= rB

(minKB , S − dB

)µ−

(cB

(minKB , S − dB

− φAB

(minKB , S − dB

)).

It is clear that if rB ≥ cIIIB

, then the right-hand side is positive, which implies

ΠB,F

(0,minK

B, S) ≥ Π

B,F(0, d

B).

Therefore, if rB≥ cIII

B, then Y ∗

B,F(Y

A,L= 0) = minK

B, S; otherwise, Y ∗

B,F(Y

A,L= 0) = d

B.

Case 1-ii, YA,L

= S − dB: We now show that when r

B≥ cII

B, then Π

B,F(S − d

B, d

B) ≥ Π

B,F(S − d

B, 0). By

equation (9) we have

ΠB,F

(S − dB, d

B)−Π

B,F(S − d

B, 0) = (r

B− c

B)d

Bµ− φ

BC(d

B− d

B)

−((r

B− c

B)(0)µ− φ

BC(d

B− 0)

),

= (rB− c

B)d

Bµ + φ

BCd

B,

= rBd

Bµ− (c

Bd

Bµ− φ

BCd

B).

It is clear that if rB≥ cII

B, then the right-hand side is positive, which implies

ΠB,F

(S − dB , dB

) ≥ ΠB,F (S − dB , 0).

Therefore, if rB ≥ cIIB

, then Y ∗B,F

(YA,L = S − dB ) = dB ; otherwise, Y ∗B,F

(YA,L = S − dB ) = 0.

Case 1-iii, YA,L

= dA: By equation (11), it is easy to see that, if r

B≥ cII

B, then Y ∗

B,F(Y

A,L= d

A) = S − d

A;

otherwise, Y ∗B,F

(YA,L

= dA) = 0.

Case 2-i, YA,L

= 0: Define

ciB

= cB −φAB

(minKB , dA + dB − dB

)+ φBC dB

µ minKB, d

A+ d

B .

By equation (14), we have

ΠB,F

(0, minKB , dA + dB

)−ΠB,F (0, 0)

= rB

min

minKB, d

A+ d

B, d

B

µ + ψ

B

[minK

B, d

A+ d

B − d

B]+

− φBC

[dB −minKB , dA + dB

]+ − cB minKB , dA + dBµ−

(r

Bmin

0, d

B

µ + ψ

Bmin

d

A, [0− d

B]+

− φBC

[dB− 0]+ − c

B(0)µ

),

= rB

min

minKB, d

A+ d

B, d

B

µ

+ (rBµ + φ

AB)[minK

B, d

A+ d

B − d

B

]+− c

BminK

B, d

A+ d

− (−φBC

dB),

= rB minKB , dA + dBµ−(cB minKB , dA + dBµ

− φAB

(minKB , dA + dB − dB

)− φBC dB

).

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 49

It is clear that, if rB≥ ci

B, then the right-hand-side is positive, which implies that

ΠB,F

(0, minK

B, d

A+ d

B) ≥ Π

B,F(0, 0).

Therefore, if rB ≥ ciB

holds, then Y ∗B,F

(YA,L = 0) = minKB , dA + dB; otherwise, Y ∗B,F

(YA,L = 0) = 0.

Definecii

B= cB −

φBC

µ= cII

B.

By equation (14), we have

ΠB,F

(0, dB)−Π

B,F(0, 0) = (r

B− c

B)d

Bµ− (−φ

BCd

B),

= rBd

Bµ− (c

Bd

Bµ− φ

BCd

B).

It is clear that, if rB≥ cII

B, then the right-hand-side is positive, which implies that

ΠB,F

(0, dB) ≥ Π

B,F(0, 0).

Therefore, if rB ≥ cIIB

holds, then Y ∗B,F

(YA,L = 0) = dB ; otherwise, Y ∗B,F

(YA,L = 0) = 0.

Defineciii

B= c

B− φ

AB

µ= cIII

B.

By equation (14), we have

ΠB,F

(0,minKB , dA + dB

)−ΠB,F (0, dB )

= rB

min

minKB, d

A+ d

B, d

B

µ + ψ

B

[minK

B, d

A+ d

B − d

B]+

− φBC

[dB −minKB , dA + dB

]+ − cB minKB , dA + dBµ−

((r

B− c

B)d

Bµ),

= rB

min

minKB, d

A+ d

B, d

B

µ

+ (rBµ + φ

AB)[minK

B, d

A+ d

B − d

B

]+− c

BminK

B, d

A+ d

− (rB− c

B)d

Bµ,

= rB

(minK

B, d

A+ d

B − d

B

)µ−

(c

B

(minK

B, d

A+ d

B − d

B

− φAB

(minKB , dA + dB − dB

)).

It is clear that, if rB ≥ cIIIB

, then the right-hand-side is positive, which implies that

ΠB,F

(0, minK

B, d

A+ d

B) ≥ Π

B,F(0, d

B).

Therefore, if rB ≥ cIIIB

holds, then Y ∗B,F

(YA,L = 0) = minKB , dA + dB; otherwise, Y ∗B,F

(YA,L = 0) = dB .

Case 2-ii, YA,L = dA : By equation (16), we have

ΠB,F

(dA, d

B)−Π

B,F(d

A, 0) = r

Bd

Bµ− c

Bd

Bµ− (−φ

BCd

B)

= rBd

Bµ− (c

Bd

Bµ− φ

BCd

B).

It is clear that, if rB ≥ cIIB

, then the right-hand-side is positive, which implies that

ΠB,F

(dA, d

B) ≥ Π

B,F(d

A, 0).

Therefore, if rB ≥ cIIB

holds, then Y ∗B,F

(YA,L = dA) = dB ; otherwise, Y ∗B,F

(YA,L = dA) = 0.

Case 2-iii, YA,L = dA + dB : Define

civB

= cB− φ

BA

µ,

50Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

and notice that, cIIB≥ civ

B, since we have assumed that ξ

BA≥ ξ

BC. By equation (20)

ΠB,F (dA + dB ,minS − dA − dB , dB)−ΠB,F (dA + dB , 0)

= rB

min

minS − dA− d

B, d

B, d

B

µ

− φBA

[dB −minS − dA − dB , dB

]+− c

BminS − d

A− d

B, d

− (−φBA

dB)

=(r

B− (c

B− φ

BA

µ))minS − d

A− d

B, d

Bµ.

Therefore, if rB≥ civ

Bholds, then Y ∗

B,F(Y

A,L= d

A+d

B) = minS−d

A−d

B, d

B; otherwise, Y ∗

B,F(Y

A,L= d

A+d

B) =

0.

In summary, we found thresholds on Firm B’s unit profit margin in two cases (same as the configuration of theproof for Proposition 1): (The summary of the thresholds can be found in Table 8.)

• Case 1: When S ≤ dA

+ dB. For this case, we introduce three thresholds on Firm B’s unit profit margin,

namely,

(i) cIB, separating the region in which Firm B forfeits and the region in which Firm B is aggressive,

(ii) cIIB

, separating the region in which Firm B forfeits and the region in which Firm B protects, and

(iii) cIIIB

, separating the region in which Firm B protects and the region in which Firm B is aggressive.

• Case 2: When S > dA + dB . For this case, we introduce four thresholds on Firm B’s unit profit margin,namely,

(i) ciB, separating the region in which Firm B forfeits and the region in which Firm B is aggressive,

(ii) ciiB(= cII

B), separating the region in which Firm B forfeits and the region in which Firm B protects,

(iii) ciiiB

(= cIIIB

), separating the region in which Firm B protects and the region in which Firm B is aggressive,and

(iv) civB

, which separates the following two responses: Given Firm A purchases the amount of dA

+dB, Firm

B can either buy the remaining to protect itself from losing customers to Firm A (this response impliesthat dA + dB cannot be optimal for Firm A), or buy nothing (this response implies that dA + dB isoptimal for Firm A).

PROOF for the Leader, Firm A:

We now present our proofs for the regions of the optimal capacity purchasing policy for the Leader. We considerthe following two corresponding cases:

• Case 1: When S ≤ dA + dB ;

• Case 2: When S > dA

+ dB.

CASE 1, S ≤ dA + dB : For this case, in the following we will construct the threshold structure for optimal backupcapacity competition strategy under condition KA ≥ dA +dB ≥ S. We consider the following four sub-cases, whichcan occur depending on the profit margin of Firm B:

1. As Firm A’s profit margin increases (i.e., we move from left to right along the x-axis of the five-regionstructure), the following three scenarios occur:

• Both Firm A and Firm B forfeit, i.e., (Y ∗A,L

, Y ∗B,F

) = (0, 0), which guarantees that Y ∗B,F

(∀ YA,L

) = 0.

• Firm A protects and Firm B forfeits, i.e., (Y ∗A,L

, Y ∗B,F

) = (S − dB , 0) and (Y ∗A,L

, Y ∗B,F

) = (dA , 0).

• Firm A buys all and Firm B forfeits, i.e., (Y ∗A,L

, Y ∗B,F

) = (S, 0).

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 51

In this sub-case, we want to construct the relationship among ΠA,L

(0, 0), ΠA,L

(S − dB, 0), Π

A,L(d

A, 0), and

ΠA,L

(S, 0). In other words, we want to find the thresholds among the “A and B Forfeit” region, the “AProtects” region, and the “B Forfeits” region.

2. As Firm A’s profit margin increases (i.e., we move from left to right along the x-axis of the five-regionstructure), the following three scenarios occur:

• Firm A forfeits and Firm B protects, i.e., (Y ∗A,L

, Y ∗B,F

) = (0, dB). This guarantees that when the Leader,

Firm A, decides to protect itself against losing customers to Firm B (and Firm C), the Follower, FirmB, will purchase to satisfy as many of its own customers as possible to protect against losing customersto Firm C.

• Both Firm A and Firm B protect, i.e., (Y ∗A,L

, Y ∗B,F

) = (S − dB, d

B) and (Y ∗

A,L, Y ∗

B,F) = (d

A, S − d

A).

• Firm A is aggressive, which results in (Y ∗A,L

, Y ∗B,F

) = (S, 0).

In this sub-case, we want to construct the relationship among ΠA,L

(0, dB), Π

A,L(S−d

B, d

B), Π

A,L(d

A, S−d

A),

and ΠA,L

(S, 0). In other words, we want to find the thresholds among the “A Forfeits” region, the “AProtects” region, and the “A is Aggressive” region.

3. As Firm A’s profit margin increases (i.e., we move from left to right along the x-axis of the five-regionstructure), the following three scenarios occur:

• Firm A forfeits and Firm B is aggressive, i.e., (Y ∗A,L

, Y ∗B,F

) = (0,minKB , S).• Firm A protects and Firm B forfeit, i.e., (Y ∗

A,L, Y ∗

B,F) = (S − d

B, 0) and (Y ∗

A,L, Y ∗

B,F) = (d

A, 0).

• Firm A is aggressive, which results in (Y ∗A,L

, Y ∗B,F

) = (S, 0).

In this sub-case, we want to construct the relationship among ΠA,L(0, minKB , S), ΠA,L(S − dB , 0),ΠA,L(dA , 0), and ΠA,L(S, 0). In other words, we want to find the thresholds among the the “A Forfeits”region, the “A Protects” region, and the “A is Aggressive” region.

4. As Firm A’s profit margin increases (i.e., we move from left to right along the x-axis of the five-regionstructure), the following three scenarios occur:

• Firm A forfeits and Firm B is aggressive, i.e., (Y ∗A,L

, Y ∗B,F

) = (0,minKB , S).• Both Firm A and Firm B protect, i.e., (Y ∗

A,L, Y ∗

B,F) = (S − d

B, d

B) and (Y ∗

A,L, Y ∗

B,F) = (d

A, S − d

A).

• Firm A is aggressive, which results in (Y ∗A,L

, Y ∗B,F

) = (S, 0).

In this sub-case, we want to construct the relationship among ΠA,L(0, minKB , S), ΠA,L(S − dB , dB ),ΠA,L(dA , S − dA), and ΠA,L(S, 0). In other words, we want to find the thresholds among the “A Forfeits”region, the “A Protects” region, and the “A is Aggressive” region.

CASE 1 – Subcase 1: In this sub-case, by investigating the relationship among ΠA,L

(0, 0), ΠA,L

(S − dB, 0),

ΠA,L

(dA, 0), and Π

A,L(S, 0), we find the thresholds among the “A and B Forfeit” region, the “A Protects” region,

and the “B Forfeits” region.If rA ≥ cI

A, which is defined as

cIA

= cA− φ

AC

µ,

then by equation (6) and equation (8), we have

ΠA,L(S − dB , 0)−ΠA,L(0, 0) = (rA − cA)(S − dB )µ− φAC

(dA − (S − dB )

)− (−φAC dA)

=(r

A− (c

A− φ

AC

µ))(S − d

B)µ ≥ 0;

also, by equation (8) and equation (10), we have

ΠA,L

(dA, 0)−Π

A,L(S − d

B, 0) = (r

A− c

A)d

Aµ−

((r

A− c

A)(S − d

B)µ− φ

AC

(d

A− (S − d

B)))

=(rA − (cA −

φAC

µ))(

dA − (S − dB ))µ ≥ 0.

That is, cIA

is the threshold between the “A and B Forfeit” region and the “A Protects” region. Also, cIA

is thethreshold between the following two scenarios: the “A Protects against only B” scenario and the “A Protectsagainst both B and C” scenario.

52Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

• If rA≥ cI

A, then we have

ΠA,L

(dA, 0) ≥ Π

A,L(S − d

B, 0) ≥ Π

A,L(0, 0).

Now, to check the relationship between ΠA,L(S, 0) and ΠA,L(dA , 0), we define

cIIA

= cA− φBA

µ.

If rA≥ cII

A, then by equation (10) and equation (12), we have

ΠA,L

(S, 0)−ΠA,L

(dA, 0) = r

Ad

Aµ + ψ

A(S − d

A)− c

ASµ− (

rAd

Aµ− c

Ad

Aµ)

=((r

Aµ + φ

BA)− c

Aµ)(S − d

A)

=(r

A− (c

A− φ

BA

µ))(S − d

A)µ ≥ 0.

That is, cIIA

is the threshold between the “A Protects” region and the “B Forfeits” region.

• If rA

< cIA, then we have

ΠA,L

(0, 0) ≥ ΠA,L

(S − dB, 0) ≥ Π

A,L(d

A, 0).

Now, to check the relationship between ΠA,L

(S, 0) and ΠA,L

(0, 0), we define

cIIIA

= cA− φ

BA[S − d

A]+ + φ

ACmind

A, S

µS.

If rA ≥ cIIIA

, then by equation (6) and equation (12), we have

ΠA,L

(S, 0)−ΠA,L

(0, 0) = rA

minS, dAµ + ψ

A[S − d

A]+ − φ

AC[d

A− S]+ − c

ASµ− (−φ

ACd

A)

= rASµ− (

cASµ− φ

BA[S − d

A]+ − φ

ACmind

A, S) ≥ 0.

That is, cIIIA

is the threshold between the “A and B Forfeit” region and the “B Forfeits” region.

CASE 1 – Subcase 2: In this sub-case, by investigating the relationship among ΠA,L

(0, dB), Π

A,L(S − d

B, d

B),

ΠA,L

(dA, S − d

A), and Π

A,L(S, 0), we find the thresholds among the “A Forfeits” region, the “A Protects” region,

and the “A is Aggressive” region.

By equation (6), equation (8), and equation (10), we know

• if rA ≥ cIA, then

ΠA,L(dA , S − dA) ≥ ΠA,L(S − dB , dB ) ≥ ΠA,L(0, dB ).

That is, cIA

is the threshold between the “A Forfeits” region and the “A Protects” region.By equation (10) and equation (12), we know, if r

A≥ cII

A, then

ΠA,L

(S, 0) ≥ ΠA,L

(dA, S − d

A).

That is, cIIA

is the threshold between the “A Protects” region and the “A is Aggressive” region.

• if rA

< cIA, then

ΠA,L(0, dB ) ≥ ΠA,L(S − dB , dB ) ≥ ΠA,L(dA , S − dA).

By equation (6) and equation (12), we know, if rA ≥ cIIIA

, then

ΠA,L(S, 0) ≥ ΠA,L(0, dB ).

That is, cIIIA

is the threshold between the “A Forfeits” region and the “A is Aggressive” region.

CASE 1 – Subcase 3: In this sub-case, by investigating the relationship among ΠA,L(0, minKB , S), ΠA,L(S−d

B, 0), Π

A,L(d

A, 0), and Π

A,L(S, 0), we find the thresholds among the “A Forfeits” region, the “A Protects” region,

and the “A is Aggressive” region.

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 53

If rA≥ cIV

A, which is defined as

cIVA

= cA−

φAB

(minK

B, S − d

B

)+ φ

AC

((S − d

B)− (

minKB, S − d

B

))

µ(S − dB)

= cA− φ

AC

µ− (φ

AB− φ

AC)(minK

B, S − d

B

)

µ(S − dB)

,

then by equation (6) and equation (8), we have

ΠA,L

(S − dB, 0)−Π

A,L

(0,minK

B, S)

= (rA− c

A)(S − d

B)µ− φ

AC

(d

A− (S − d

B))

−(− φ

AB[minK

B, S − d

B]+ − φ

AC

(d

A− [

minKB , S − dB

]+))

= rA(S − d

B)µ−

(c

A(S − d

B)µ

− φAB

(minK

B, S − d

B

)− φAC

((S − d

B)− (

minKB, S − d

B

))) ≥ 0.

That is, cIVA

is the threshold between the “A Forfeits” region and the “A Protects against only B” region.If r

A≥ cV

A, which is defined as

cVA

= cA −φ

AB

[minK

B, S − d

B

]+ + φAC

(d

A− [

minKB, S − d

B

]+)

µdA

= cA− φ

AC

µ− (φ

AB− φ

AC)[minK

B, S − d

B

]+µd

A

,

(Notice that dA ≥ [S − dB ]+, so cV

A≥ cIV

A.)

then by equation (6) and equation (10), we have

ΠA,L(dA , 0)−ΠA,L

(0,minKB , S)

= (rA − cA)dAµ

−(− φ

AB

[minK

B, S − d

B

]+ − φAC

(d

A− [

minKB, S − d

B

]+))

= rAd

Aµ−

(c

Ad

− φAB

[minK

B, S − d

B

]+ − φAC

(d

A− [

minKB, S − d

B

]+))≥ 0.

That is, cVA

is the threshold between the “A Forfeits” region and the “A Protects against both B and C” region.

Recall, by equation (8) and equation (10), we have shown, if rA ≥ cIA, then

ΠA,L(dA , 0)−ΠA,L(S − dB , 0) = (rA − cIA)(dA − (S − dB )

)µ ≥ 0.

Therefore, (Note that cIA≥ cV

A≥ cIV

Aautomatically holds),

• if rA ≥ cIA, then

ΠA,L

(dA, 0) ≥ Π

A,L(S − d

B, 0) ≥ Π

A,L(0, minK

B, S).

That is, cIA

is the threshold between the “A Forfeits” region and the “A Protects” region.Now, we want to check the relationship between ΠA,L(S, 0) and ΠA,L(dA , 0). Note that, we have shown thatif rA ≥ cII

A, then

ΠA,L(S, 0) ≥ ΠA,L(dA , 0).

That is, cIIA

is the threshold between the “A Protects against both B and C” region and the “A is Aggressive”region.

• if rA ≤ cIA

but rA ≥ cVA

(so rA ≥ cIVA

must hold), then

ΠA,L

(S − dB, 0) ≥ Π

A,L(d

A, 0) ≥ Π

A,L(0, minK

B, S);

54Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

also if rA≤ cV

Abut r

A≥ cIV

A, then

ΠA,L

(S − dB, 0) ≥ Π

A,L(0, minK

B, S) ≥ Π

A,L(d

A, 0);

Now, to check the relationship between ΠA,L

(S, 0) and ΠA,L

(S − dB, 0), we define

cV IA

= cA −φ

BA[S − d

A]+ + φ

AC

(mind

A, S − (S − d

B))

µdB

.

If rA≥ cV I

A, then by equation (8) and equation (12), we have

ΠA,L

(S, 0)−ΠA,L

(S − dB, 0) = r

AminS, d

Aµ + ψ

A[S − d

A]+ − φ

AC[d

A− S]+ − c

ASµ

−((r

A− c

A)(S − d

B)µ− φ

AC

(d

A− (S − d

B)))

= rAd

Bµ−

(c

Ad

−φBA

[S − dA]+ − φ

AC

(mind

A, S − (S − d

B))) ≥ 0.

That is, cV IA

is the threshold between the “A Protects against only B” region and the “A is Aggressive”region.

• if rA≤ cIV

A, then

ΠA,L

(0, minKB, S) ≥ Π

A,L(S − d

B, 0) ≥ Π

A,L(d

A, 0).

Now, to check the relationship between ΠA,L

(S, 0) and ΠA,L

(0,minKB, S), we define

cV IIA

= cA− φ

AB[minK

B, S − d

B]+ + φ

BA[S − d

A]+

µS

−φAC

(mindA , S − [

minKB , S − dB

]+)

µS.

If rA≥ cV II

A, then by equation (6) and equation (12), we have

ΠA,L

(S, 0)−ΠA,L

(0, minK

B, S)

= rA

minS, dAµ + ψ

A[S − d

A]+ − φ

AC[d

A− S]+ − c

ASµ

−(− φ

AB

[minK

B, S − d

B

]+ − φAC

(d

A− [

minKB, S − d

B

]+))

= rASµ−(cASµ− φAB

[minKB , S − dB

]+ − φBA [S − dA ]+

− φAC

(mindA , S − [

minKB , S − dB

]+))≥ 0.

That is, cV IIA

is the threshold between the “A Forfeits” region and the “A is Aggressive” region.

CASE 1 – Subcase 4: In this sub-case, by investigating the relationship among ΠA,L

(0, minKB, S), Π

A,L(S−

dB , dB ), ΠA,L(dA , S − dA), and ΠA,L(S, 0), we find the thresholds among the “A Forfeits” region, the “A Protects”region, and the “A is Aggressive” region.

By equation (6) and equation (8), we know, if rA≥ cIV

A, then

ΠA,L

(S − dB, d

B) ≥ Π

A,L

(0,minK

B, S).

By equation (6) and equation (10), we know, if rA ≥ cVA

, then

ΠA,L(dA , S − dA) ≥ ΠA,L

(0, minKB , S).

By equation (8) and equation (10), we know, if rA ≥ cIA, then

ΠA,L

(dA, S − d

A) ≥ Π

A,L(S − d

B, d

B).

Therefore, (Not that cIA≥ cV

A≥ cIV

Aautomatically holds),

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 55

• if rA≥ cI

A, then

ΠA,L

(dA, S − d

A) ≥ Π

A,L(S − d

B, d

B) ≥ Π

A,L(0,minK

B, S).

That is, cIA

is the threshold between the “A Forfeits” region and the “A Protects” region.

By equation (10) and equation (12), we know, if rA≥ cII

A, then

ΠA,L

(S, 0) ≥ ΠA,L

(dA, S − d

A).

That is, cIIA

is the threshold between the “A Protects against both B and C” region and the “A is Aggressive”region.

• if rA≤ cI

Abut r

A≥ cV

A(so r

A≥ cIV

Amust hold), then

ΠA,L

(S − dB, d

B) ≥ Π

A,L(d

A, S − d

A) ≥ Π

A,L(0,minK

B, S),

and if rA≤ cV

Abut r

A≥ cIV

A, then

ΠA,L

(S − dB, d

B) ≥ Π

A,L(0, minK

B, S) ≥ Π

A,L(d

A, S − d

A).

By equation (8) and equation (12), we know, if rA≥ cV I

A, then

ΠA,L

(S, 0) ≥ ΠA,L

(S − dB, d

B).

That is, cV IA

is the threshold between the “A Protects against only B” region and the “A is Aggressive”region.

• if rA≤ cIV

A, then

ΠA,L

(0,minKB, S) ≥ Π

A,L(S − d

B, d

B) ≥ Π

A,L(d

A, S − d

A).

By equation (6) and equation (12), we know, if rA≥ cV II

A, then

ΠA,L(S, 0) ≥ ΠA,L

(0, minKB , S).

That is, cV IIA

is the threshold between the “A Forfeits” region and the “A is Aggressive” region.

CASE 2, S > dA + dB : For this case, in the following we will construct the threshold structure for the optimalbackup capacity competition strategy under condition KA ≥ dA + dB and S > dA + dB . We consider the followingfive sub-cases:

1. As Firm A’s profit margin increases (i.e., we move from left to right along the x-axis of the five-regionstructure), the following three scenarios occur:

• Both Firm A and Firm B forfeit, i.e., (Y ∗A,L

, Y ∗B,F

) = (0, 0), which guarantees that Y ∗B,F

(∀ YA,L

) = 0.

• Firm A protects and Firm B forfeits, i.e., (Y ∗A,L

, Y ∗B,F

) = (dA, 0).

• Firm A buys enough to satisfy the total market and Firm B forfeits, i.e., (Y ∗A,L

, Y ∗B,F

) = (dA

+ dB, 0).

In this sub-case, we want to construct the relationship among ΠA,L(0, 0), ΠA,L(dA , 0), and ΠA,L(dA + dB , 0).In other words, we want to find the thresholds among the “A and B Forfeit” region, the “A Protects” region,and the “B Forfeits” region.

2. As Firm A’s profit margin increases (i.e., we move from left to right along the x-axis of the five-regionstructure), the following three scenarios occur:

• Firm A forfeits and Firm B protects, i.e., (Y ∗A,L

, Y ∗B,F

) = (0, dB). This guarantees that when the Leader,

Firm A, decides to protect itself against losing customers, the Follower, Firm B, will purchase to satisfyas many of its own customers as possible to protect against losing customers to Firm C.

• Both Firm A and Firm B protect, i.e., (Y ∗A,L

, Y ∗B,F

) = (dA, d

B).

• Firm A is aggressive, which results in (Y ∗A,L

, Y ∗B,F

) = (S, 0).

In this sub-case, we want to construct the relationship among ΠA,L(0, dB ), ΠA,L(dA , dB ), and ΠA,L(S, 0). Inother words, we want to find the thresholds among the “A Forfeits” region, the “A Protects” region, and the“A is Aggressive” region.

56Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

3. As Firm A’s profit margin increases (i.e., we move from left to right along the x-axis of the five-regionstructure), the following three scenarios occur:

• Firm A forfeits and Firm B is aggressive, i.e., (Y ∗A,L

, Y ∗B,F

) = (0,minKB, d

A+ d

B).

• Firm A protects and Firm B forfeits, i.e., (Y ∗A,L

, Y ∗B,F

) = (dA , 0).

• Firm A is aggressive and Firm B forfeits. More specifically, The Follower, Firm B, decides to buynothing when the Leader, Firm A, purchases the amount of d

A+ d

Bto cover the total market, i.e.,

(Y ∗A,L

, Y ∗B,F

) = (dA + dB , 0).

In this sub-case, we want to construct the relationship among ΠA,L

(0,minKB, d

A+ d

B), Π

A,L(d

A, 0), and

ΠA,L

(dA

+ dB, 0). In other words, we want to find the thresholds among the “A Forfeits” region, the “A

Protects” region, and the “A is Aggressive” region.

4. As Firm A’s profit margin increases (i.e., we move from left to right along the x-axis of the five-regionstructure), the following three scenarios occur:

• Firm A forfeits and Firm B is aggressive, i.e., (Y ∗A,L

, Y ∗B,F

) = (0,minKB , dA + dB).• Firm A protects and Firm B forfeit, i.e., (Y ∗

A,L, Y ∗

B,F) = (d

A, 0).

• Firm A is aggressive, which results in (Y ∗A,L

, Y ∗B,F

) = (S, 0). Note that, comparing with the thirdscenario in the above sub-case, here, instead of purchasing the amount of d

A+ d

B, Firm A has to buy

all available backup capacity to corner the whole market, because if Firm A purchases the amount ofdA + dB , Firm B will buy the remaining backup capacity to protect itself against losing customers toFirm A, and hence d

A+ d

Bis not optimal for Firm A.

In this sub-case, we want to construct the relationship among ΠA,L(0,minKB , dA + dB), ΠA,L(dA , 0), andΠ

A,L(S, 0). In other words, we want to find the thresholds among the “A Forfeits” region, the “A Protects”

region, and the “A is Aggressive” region.

5. As Firm A’s profit margin increases (i.e., we move from left to right along the x-axis of the five-regionstructure), the following three scenarios occur:

• Firm A forfeits and Firm B is aggressive, i.e., (Y ∗A,L

, Y ∗B,F

) = (0,minKB, d

A+ d

B).

• Both Firm A and Firm B protect, i.e., (Y ∗A,L

, Y ∗B,F

) = (dA , dB ).

• Firm A is aggressive, which results in (Y ∗A,L

, Y ∗B,F

) = (S, 0).

In this sub-case, we want to construct the relationship among ΠA,L(0, minKB , dA +dB), ΠA,L(dA , dB ), andΠA,L(S, 0). In other words, we want to find the thresholds among the “A Forfeits” region, the “A Protects”region, and the “A is Aggressive” region.

CASE 2 – Subcase 1: In this sub-case, by investigating the relationship among ΠA,L

(0, 0), ΠA,L

(dA, 0), and

ΠA,L(dA + dB , 0), we find the thresholds among the “A and B Forfeit” region, the “A Protects” region, and the “BForfeits” region.

First of all, it is easy to see that ΠA,L

(YA,L

= dA

+ dB, Y

B,F= 0) ≥ Π

A,L(Y

A,L= S, Y

B,F= 0) is always satisfied

due to the saving of holding cost.

• If rA≥ ci

A, which is defined as

ciA

= cA −φ

AC

µ= cI

A,

then by equation (13) and equation (15), we have

ΠA,L

(dA, 0)−Π

A,L(0, 0) = (r

A− c

A)d

Aµ− (−φ

ACd

A)

=(r

A− (c

A− φ

AC

µ))d

Aµ ≥ 0.

That is, cIA

is the threshold between the “A and B Forfeit” region and the “A Protects” region.

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 57

• If rA≥ cii

A, which is defined as

ciiA

= cA− φ

BA

µ= cII

A,

then by equation (15) and equation (19), we have

ΠA,L

(dA

+ dB, 0)−Π

A,L(d

A, 0) = r

Ad

Aµ + ψ

Ad

B− c

A(d

A+ d

B)µ− (r

A− c

A)d

=(r

A− (c

A− φ

BA

µ))d

Bµ ≥ 0.

That is, cIIA

is the threshold between the “A Protects” region and the “B Forfeits” region.

• If rA≥ ciii

A, which is defined as

ciiiA

= cA− φ

BAd

B+ φ

ACd

A

µ(dA

+ dB)

,

then by equation (13) and equation (19), we have

ΠA,L

(dA

+ dB, 0)−Π

A,L(0, 0) = r

Ad

Aµ + ψ

Ad

B− c

A(d

A+ d

B)µ− (−φ

ACd

A)

=(r

A(d

A+ d

B)µ− (

cA(d

A+ d

B)µ− φ

BAd

B− φ

ACd

A

)) ≥ 0.

That is, ciiiA

is the threshold between the “A and B Forfeit” region and the “B Forfeits” region.

CASE 2 – Subcase 2: In this sub-case, by investigating relationship among ΠA,L(0, dB ), ΠA,L(dA , dB ), andΠ

A,L(S, 0), we find the thresholds among the “A Forfeits” region, the “A Protects” region, and the “A is Aggressive”

region.

• By equation (13) and equation (15), we know, if rA≥ ci

A(i.e., cI

A), then

ΠA,L

(dA, d

B) ≥ Π

A,L(0, d

B).

That is, cIA

is the threshold between the “A Forfeits” region and the “A Protects” region.

• If rA ≥ civA

, which is defined as

civA

= cA

S − dA

dB

+hA(S − d

A− d

B)

dB

− φBA

µ,

then by equation (15) and equation (21), we have

ΠA,L(S, 0)−ΠA,L(dA , dB ) = rAdAµ + ψAdB − cASµ− hA(S − dA − dB)µ− ((rA − cA)dAµ

)

= rAd

Bµ−

(c

A(S − d

A)µ + hA(S − d

A− d

B)µ− φ

BAd

B

)≥ 0.

That is, civA

is the threshold between the “A Protects” region and the “A is Aggressive” region.

• If rA≥ cv

A, which is defined as

cvA

= cA

S

dA + dB

+hA(S − dA − dB )

dA + dB

− φBAdB

µ(dA + dB )− φAC dA

µ(dA + dB ),

then by equation (13) and equation (21), we have

ΠA,L

(S, 0)−ΠA,L

(0, dB) = rAdAµ + ψAdB − cASµ− hA(S − dA − dB)µ− (−φ

ACd

A)

= rA(d

A+ d

B)µ−

(c

ASµ + hA(S − d

A− d

B)µ− φ

BAd

B− φ

ACd

A

)≥ 0.

That is, cvA

is the threshold between the “A Forfeits” region and the “A is Aggressive” region.

CASE 2 – Subcase 3: In this sub-case, by investigating the relationship among ΠA,L(0,minKB , dA + dB),Π

A,L(d

A, 0), and Π

A,L(d

A+ d

B, 0), we find the thresholds among the “A Forfeits” region, the “A Protects” region,

and the “A is Aggressive” region.

58Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

• If rA≥ cvi

A, which is defined as

cviA

= cA− φ

AB

(minK

B, d

A+ d

B − d

B

)

µdA

−φ

AC

(d

A− (

minKB, d

A+ d

B − d

B

))

µdA

,

= cA− φ

AC

µ− (φ

AB− φ

AC)(minK

B, d

A+ d

B − d

B

)

µdA

,

then by equation (13) and equation (15), we have

ΠA,L(dA , 0)−ΠA,L

(0,minKB , dA + dB

)

= (rA− c

A)d

−(− φ

ABmin

minK

B, d

A+ d

B − d

B, d

A

− φ

AC

[d

A− (

minKB, d

A+ d

B − d

B

)]+)

= rAd

Aµ−

(c

Ad

− φAB

(minK

B, d

A+ d

B − d

B

)− φAC

(d

A− (minK

B, d

A+ d

B − d

B))) ≥ 0.

That is, cviA

is the threshold between the “A Forfeits” region and the “A Protects” region.

• We have shown that if rA≥ cII

A, then

ΠA,L

(dA

+ dB, 0) ≥ Π

A,L(d

A, 0).

That is, cIIA

is the threshold between the “A Protects” region and the “A is Aggressive” region.

• If rA≥ cvii

A, which is defined as

cviiA

= cA −φAB

(minKB , dA + dB − dB

)

µ(dA + dB )− φBAdB

µ(dA + dB )

−φ

AC

(d

A− (

minKB, d

A+ d

B − d

B

))

µ(dA

+ dB)

,

then by equation (13) and equation (19), we have

ΠA,L

(dA

+ dA, 0)−Π

A,L

(0, minK

B, d

A+ d

B)

= rAd

Aµ + ψ

Ad

B− c

A(d

A+ d

B)µ

−(− φ

ABmin

minK

B, d

A+ d

B − d

B, d

A

− φAC

[d

A− (

minKB, d

A+ d

B − d

B

)]+)

= rA(d

A+ d

B)µ−

(c

A(d

A+ d

B)µ

− φAB

(minKB , dA + dB − dB

)− φBAdB

− φAC

(d

A− (

minKB, d

A+ d

B − d

B

)))≥ 0.

That is, cviiA

is the threshold between the “A Forfeits” region and the “A is Aggressive” region.

CASE 2 – Subcase 4: In this sub-case, by investigating the relationship among ΠA,L

(0,minKB, d

A+ d

B),

ΠA,L(dA , 0), and ΠA,L(S, 0), we find the thresholds among the “A Forfeits” region, the “A Protects” region, andthe “A is Aggressive” region.

• We have shown that if rA≥ cvi

A, then

ΠA,L

(dA, 0) ≥ Π

A,L

(0, minK

B, d

A+ d

B).

That is, cviA

is the threshold between the “A Forfeits” region and the “A Protects” region.

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 59

• If rA≥ civ

A, then by equation (15) and equation (21), we have

ΠA,L

(S, 0)−ΠA,L

(dA, 0)

= rAdAµ + ψAdB − cASµ− hA(S − dA − dB)µ− (

(rA− c

A)d

Aµ)

= rAdBµ−(cA(S − dA)µ + hA(S − dA − dB )µ− φBAdB

)≥ 0.

That is, civA

is the threshold between the “A Protects” region and the “A is Aggressive” region.

• If rA≥ cviii

A, which is defined as

cviiiA

= cA

S

dA

+ dB

+hA(S − d

A− d

B)

dA

+ dB

− φAB

(minK

B, d

A+ d

B − d

B

)

µ(dA

+ dB)

− φBA

dB

µ(dA

+ dB)

−φ

AC

(d

A− (

minKB, d

A+ d

B − d

B

))

µ(dA

+ dB)

,

then by equation (13) and equation (21), we have

ΠA,L

(S, 0)−ΠA,L

(0, minKB, d

A+ d

B)

= rAdAµ + ψAdB − cASµ− hA(S − dA − dB)µ

−(− φAB min

minKB , dA + dB − dB , dA

− φAC

[dA −

(minKB , dA + dB − dB

)]+)

= rA(d

A+ d

B)µ−

(c

ASµ + hA(S − d

A− d

B)µ

− φAB

(minK

B, d

A+ d

B − d

B

)− φBA

dB

− φAC

(dA − (minKB , dA + dB − dB )

)) ≥ 0.

That is, cviiiA

is the threshold between the “A Forfeits” region and the “A is Aggressive” region.

CASE 2 – Subcase 5: In this sub-case, by investigating the relationship among ΠA,L

(0,minKB, d

A+ d

B),

ΠA,L(dA , dB ), and ΠA,L(S, 0), we find the thresholds among the “A Forfeits” region, the “A Protects” region, andthe “A is Aggressive” region.

• By equation (13) and equation (15), we know, if rA ≥ cviA

, then

ΠA,L

(dA, d

B) ≥ Π

A,L

(0, minK

B, d

A+ d

B).

That is, cviA

is the threshold between the “A Forfeits” region and the “A Protects” region.

• By equation (15) and equation (21), we know, if rA≥ civ

A, then

ΠA,L(S, 0) ≥ ΠA,L(dA , dB ).

That is, civA

is the threshold between the “A Protects” region and the “A is Aggressive” region.

• By equation (13) and equation (21), we know, if rA≥ cviii

A, then

ΠA,L(S, 0) ≥ ΠA,L(0,minKB , dA + dB).That is, cviii

Ais the threshold between the “A Forfeits” region and the “A is Aggressive” region.

This completes the proof of Proposition 2 for the “Large Capacity Leader”. ¤

PROPOSITION 3: A unique Nash Equilibrium exists for each firm’s Advanced Preparedness Competition.

PROOF OF PROPOSITION 3:

To prove that a unique Nash Equilibrium exists for the AP Competition of Firm A, first we must show the following(Rudin 1976):

60Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

Thresholds Expression

When S ≤ dA + dB

cIA

cA −φ

ACµ

cIIA

cA −φ

BAµ

cIIIA

cA −φ

BA[S−d

A]+

µS − φAC

mindA

,SµS

cIVA

cA −φ

ACµ − (φ

AB−φ

AC)(

minKB

, S−dB

)µ(S−d

B)

cVA

cA −φ

ACµ −

(φAB

−φAC

)

[minK

B, S−d

B

]+

µdA

cV IA

cA −φ

BA[S−d

A]+

µdB

−φ

AC

(mind

A,S−(S−d

B)

)

µdB

cV IIA

cA −φ

AB

[minK

B, S−d

B

]+

µS − φBA

[S−dA

]+

µS −φ

AC

(mind

A, S−

[minK

B, S−d

B

]+)

µS

cIB

cB −φ

AB

[minK

B, S−d

B

]+

µ minKB

, S −φ

BCmin

d

B,minK

B, S

µ minKB

, S

cIIB

cB −φ

BCµ

cIIIB

cB −φ

ABµ

When S > dA + dB

cIA

cA −φ

ACµ

cIIA

cA −φ

BAµ

ciiiA

cA −φ

BAd

Bµ(d

A+d

B) −

φAC

dA

µ(dA

+dB

)

cviA

cA

S−dA

dB

+ hA(S−dA−d

B)

dB

− φBAµ

cvA

cAS

dA

+dB

+ hA(S−dA−d

B)

dA

+dB

− φBA

dB

µ(dA

+dB

) −φ

ACd

Aµ(d

A+d

B)

cviA

cA −φ

ACµ − (φ

AB−φ

AC)(

minKB

, dA

+dB−d

B

)µd

A

cviiA

cA −φ

AB

(minK

B, d

A+d

B−d

B

)µ(d

A+d

B) − φ

BAd

Bµ(d

A+d

B) −

φAC

(d

A−(

minKB

, dA

+dB−d

B

))

µ(dA

+dB

)

cviiiA

cAS

dA

+dB

+ hA(S−dA−d

B)

dA

+dB

− φAB

(minK

B, d

A+d

B−d

B

)µ(d

A+d

B)

− φBA

dB

µ(dA

+dB

) −φ

AC

(d

A−(

minKB

, dA

+dB−d

B

))

µ(dA

+dB

)

ciB

cB −φ

AB

(minK

B, d

A+d

B−d

B

)

µ minKB

, dA

+dB − φ

BCd

Bµ minK

B, d

A+d

B

cIIB

cB −φ

BCµ

cIIIB

cB −φ

ABµ

civB

cB −φ

BAµ

Table 8: Thresholds for the “Large Capacity Leader” case.

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 61

Thresholds Expression

cIA

cA −φ

ACµ

cIIA

cA −φ

BAµ

cIIIA

cA −φ

BA[S−d

A]+

µS − φAC

mindA

,SµS

cIVA

cA −φ

ACµ −

(φAB

−φAC

)

(minK

B, S−d

B

)

µ(S−dB

)

cVA

cA −φ

ACµ −

(φAB

−φAC

)

[minK

B, S−d

B

]+

µdA

cV IA

cA −φ

BA[S−d

A]+

µdB

−φ

AC

(mind

A,S−(S−d

B)

)

µdB

cV IIA

cA −φ

AB

[minK

B, S−d

B

]+

µS − φBA

[S−dA

]+

µS −φ

AC

(mind

A, S−

[minK

B, S−d

B

]+)

µS

c8A

cA −φ

BA(K

A−d

A)

µKA

− φAC

dA

µKA

c9A

cA −φ

BA(K

A−d

A)

µ

(K

A−(S−d

B)

) −φ

AC

(d

A−(S−d

B)

)

µ

(K

A−(S−d

B)

)

c10A

cA −φ

AB

[minK

B, S−d

B

]+

µKA

− φBA

(KA−d

A)

µKA

−φ

AC

(d

A−[

minKB

, S−dB

]+)

µKA

c11A

cA

S−(2dA

+dB

)+KA

µ(KA−d

A) + hA

S−(dA

+dB

)

µ(KA−d

A) −

φBAµ

c12A

cA

S−(dA

+dB

)+KA

KA

+ hAS−(d

A+d

B)

KA

− φBA

(KA−d

A)

µKA

− φAC

dA

µKA

c13A

cA −φ

AB

(minK

B, d

A+d

B−d

B

)µ(d

A+d

B) −

φAC

(d

A−(

minKB

, dA

+dB−d

B

))

µ(dA

+dB

)

c14A

cA −φ

AB

(minK

B, d

A+d

B−d

B

)µK

A− φ

BA(K

A−d

A)

µKA

−φ

AC

(d

A−(

minKB

, dA

+dB−d

B

))

µKA

c15A

cA

S−(dA

+dB

)+KA

µKA

+ hAS−(d

A+d

B)

µKA

− φAB

(minK

B, d

A+d

B−d

B

)µK

A

− φBA

(KA−d

A)

µKA

−φ

AC

(d

A−(

minKB

, dA

+dB−d

B

))

µKA

c1B

cB −φ

AB

[min

mind

A+d

B,S, K

B

−d

B

]+

µ min

mind

A+d

B,S, K

B

−φ

BCmin

d

B,min

mind

A+d

B,S, K

B

µ min

mind

A+d

B,S, K

B

cIIB

cB −φ

BCµ

cIIIB

cB −φ

ABµ

c4B

cB −φ

BCµ − (φ

BA−φ

BC)(S−d

A−d

B)

µ(S−KA

)

c5B

cB −φ

BCµ − (φ

BA−φ

BC)(K

A−d

A)

µdB

Table 9: Thresholds for the “Small Capacity Leader” case.

62Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

• Function ΠAPi does have a unique maximum, i ∈ A,B.

• Function ΠAPj,i does have a unique maximum, i 6= j and i, j ∈ A,B.

• Function xi(x

j) is continuous in x

jand strictly concave in x

j, i 6= j and i, j ∈ A,B.

Let Π∗i,L and Π∗i,F be the optimal expected profits for Firm i when it is the Leader and the Follower, respectively,in the BC Competition. It is easy to see that for Firm i, the profit of being the Leader in the BC Competitionis, at least, as much as being the Follower, and furthermore, if Π∗i,L = Π∗i,F , then Firm i will definitely have nointerest in the AP Competition, which is obviously not an interesting case. So here we assume that Π∗i,L > Π∗i,F ,i ∈ A,B. Also xi > 0, since xi represents Firm i’s preparedness effort, and that zero implies that Firm i has nointerest in the AP Competition.

To show that, for any given Firm B’s preparedness effort xoB, function ΠAP

i has a unique maximum, xA, consider

f(xA|xo

B) ≡ ΠAP

A = pA0

AΠ∗

A,L+ π

BΠ∗

A,F−m

AC(d0

A− d

A))

+ (1− pA0)rA

d0A(µ + T )

−CexA+ m

AAd0

A,

= CAL

( xA

xA + xoB

)+ CA

F

( xoB

xA + xoB

)− CexA

+ constant, (22)

where CAL = p

A0Π∗A,L

, CAF = p

A0Π∗A,F

. Note that CAL , CA

F and Ce are independent of xi, and xi is positive. So,

f′(x

A|xo

B) =

d

d xA

f(xA|xo

B) =

(CAL − CA

F )xoB

(xA

+ xoB)2

− Ce.

By setting f′(x

A|xo

B) = 0, and solving for x

A, we get

xA

=

√(CA

L − CAF )

Cexo

B− xo

B,

=

√pA0(Π∗A,L

−Π∗A,F

)Ce

xoB− xo

B. (23)

Notice that, CAL − CA

F ≥ 0 always holds, since p0 is non-negative and we have already argued that Π∗A,L

> Π∗A,F

.It is clear that for any fixed xo

B, there exists a unique x

A, which is a non-negative real number, i.e., the optimal

solution of f(xA|x

B) does exist and it is unique.

Furthermore,

f′′(x

A|xo

B) =

−2(CAL − CA

F )xoB

(xA + xoB)3

< 0,

which implies that the optimal solution of f(xA |xB ) is a maximum.

Similarly, we can show that, for any given Firm A’s preparedness effort xoA, function ΠAP

B,Ahas a unique maximum,

xB. Consider,

f(xB |xoA) ≡ ΠAP

B,A= pB0,A

(πBΠ∗

B,L+ πAΠ∗

B,F−mBC (d0

B− dB )

)+ (1− pB0,A)rBd0

B(µ + T )

−CexB+ m

BBd0

B

= pB0,A

Π∗B,L

( xB

xoA

+ xB

)+ p

B0,AΠ∗

B,F

( xoA

xoA

+ xB

)− CexB

+ constant, (24)

and,

xB

=

√p

B0,A(Π∗

B,L−Π∗

B,F)

Cexo

A− xo

A. (25)

We now show that function xA(x

B) is continuous in x

Band strictly concave in x

B. Letting H =

√CA

L−CAF

Ce, which

is a non-negative constant, from equation (23) we obtain

xA(x

B) = H ×√x

B− x

B+ constant.

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 63

First of all, it is easy to see that the above expression of xA(x

B) is continuous by the form of its function. Secondly,

it is strictly concave becaused2

dx2B

xA(x

B) = −1

4H × (x

B)−3/2 < 0

is satisfied. Similarly, xB(x

A) is continuous and strictly concave.

Having the above results, we now show that Nash Equilibrium exists and is unique. Since we have already shownthat x

A(x

B) is strictly concave, to prove that the Nash Equilibrium exists, we need to show that at the very

beginning of the range of xB∈ (0,∞), we must have d

dxB

xA(x

B) > 1 (Rudin 1976). Intuitively, this condition

guarantees xA(xB ) will intersect with the line, xA = xB , and the similar condition of xB (xA) will guarantee itsintersection with x

A= x

B. Therefore, a unique Nash Equilibrium does exist.

We now check whether there exists a xB, which is within the very beginning of the range (0,∞), such that

H2 (xB )−1/2 − 1 > 1.

d

dxB

xA(x

B) =

H

2(x

B)−1/2 − 1 > 1

⇔ x1/2B

< H4

⇔ xB <CA

L−CAF

16Ce,

which obviously can be easily satisfied by some xB

within the very beginning of the range (0,∞), since the right-hand-side is just a positive constant. Similar arguments hold for xB (xA). This completes the proof of Proposition3. ¤

PROPOSITION 4: Under the symmetric information conditions, for a given level of Firm j’s preparedness effect,the optimal preparedness effort of Firm i (i.e., x∗i ) is nondecreasing in mij, miC , mji, and ri, and is nonincreasingin γij, γiC , γji, ci, and hi, for j 6= i, and i, j ∈ A, B.

PROOF OF PROPOSITION 4:

We assumed that both firms know the other firm’s estimate of the likelihood of a disruption, i.e., pi0,j = pi0 , i 6=j, i, j ∈ A, B, and based on the firm’s knowledge on the actual likelihood of a disruption, we consider two mutuallyexclusive and collectively exhaustive sub-cases:

• Case 1: both firms know the actual likelihood of a disruption.

• Case 2: their estimate of the likelihood of a disruption may not be accurate.

Since the proof procedure is similar, we will just give one detailed example. In the following, we show that theproposition hold under Case 1.

In the proof of Proposition 3, we have already shown that, for any given Firm B’s preparedness effort xoB, Firm

A’s optimal preparedness effort is

xA

=

√CA

L − CAF

Cexo

B− xo

B.

Thus, to show that xA is nondecreasing (or nonincreasing) in say parameter α, we only need to show that CAL −CA

F

is nondecreasing (or nonincreasing) in α. According to equations (31) and (32), under complete information, wehave

CAL = po

(rA min

Y ∗

A,L, dA

µ + ψA min

[dB − Y ∗

B,F]+, min

[Y ∗

A,L− dA ]+,KA − dA

−mABξAB min

min[Y ∗

B,F− dB ]+,KB − dB

, [dA − Y ∗

A,L]+

−mAC ξAC

[[dA − YA,L ]+ −min

[Y ∗

B,F− dB ]+,KB − dB

]+

− cAY ∗A,L

µ− hA(some non-negative terms)),

64Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

and

CAF = po

(rA min

Y ∗

A,F, dA

µ + ψA min

[dB − Y ∗

B,L]+,min

[Y ∗

A,F− dA ]+,KA − dA

−mAB

ξAB

min

min[Y ∗

B,L− d

B]+,K

B− d

B

, [d

A− Y ∗

A,F]+

−mAC

ξAC

[[d

A− Y ∗

A,F]+ −min

[Y ∗

B,L− d

B]+, K

B− d

B

]+

− cAY ∗

A,Fµ).

Therefore,

CAL − CA

F = po

(r

A

(minY ∗

A,L, d

A −minY ∗

A,F, d

A)µ

− cA(Y ∗

A,L− Y ∗

A,F)µ− h

A(some non-negative terms)

+ ψA min

[dB − Y ∗B,F

]+, min[Y ∗

A,L− dA ]+,KA − dA

− ψA

min

[dB− Y ∗

B,L]+, min

[Y ∗

A,F− d

A]+,K

A− d

A

−mAB

ξAB

min

min[Y ∗

B,F− d

B]+,K

B− d

B

, [d

A− Y ∗

A,L]+

+ mABξAB min

min[Y ∗

B,L− dB ]+,KB − dB

, [dA − Y ∗

A,F]+

−mAC

ξAC

[[d

A− Y ∗

A,L]+ −min

[Y ∗

B,F− d

B]+,K

B− d

B

]+

+ mAC ξAC

[[dA − Y ∗

A,F]+ −min

[Y ∗

B,L− dB ]+,KB − dB

]+). (26)

It is easy to see that for Firm i, the purchasing amount when the firm is the Leader is at least as many as that whenthe firm is the Follower. The reason is the when the firm is the Leader it has access to a larger backup capacitythan that when it is the Follower. Thus, Y ∗

A,L≥ Y ∗

A,Fand Y ∗

B,L≥ Y ∗

B,F. We have

• With respect to the coefficient of ψA , i.e., the third and the fourth lines on the right-hand-side of equation(26), we have [dB − Y ∗

B,F]+ ≥ [dB − Y ∗

B,L]+ and [Y ∗

A,L− dA ]+ ≥ [Y ∗

A,F− dA ]+, so

min

[dB− Y ∗

B,F]+, min

[Y ∗

A,L− d

A]+,K

A− d

A

−min

[d

B− Y ∗

B,L]+, min

[Y ∗

A,F− d

A]+, K

A− d

A

≥ 0,

i.e., the coefficient of ψA

in equation (26) is non-negative. Furthermore, we know

ψA

= rAµ + m

BAξ

BA

= rAµ + mBA

∫ ∞

0

(1− e− t

γBA )dFo(t).

So, equation (26) (and therefore xA) is nondecreasing in mBA and nonincreasing in γBA . Furthermore, thesummation of the third and the fourth lines on the right-hand-side of equation (26) is also nondecreasing inr

A.

• With respect to the coefficient of rA

in the first line on the right-hand-side of equation (26), we have

minY ∗A,L

, dA −minY ∗

A,F, d

A ≥ 0

since Y ∗A,L

≥ Y ∗A,F

. Therefore, we can conclude that the coefficient of rA in the first line on the right-hand-sideof equation (26) is non-negative, and therefore equation (26) (and therefore xA) is nondecreasing in rA .

• With respect to the coefficient of mABξAB , i.e., the fifth and the sixth lines on the right-hand-side of equation(26), we know [Y ∗

B,L− d

B]+ ≥ [Y ∗

B,F− d

B]+ and [d

A−Y ∗

A,F]+ ≥ [d

A−Y ∗

A,L]+, so the coefficient of mABξAB in

equation (26) is non-negative. So, equation (26) (and therefore xA) is nonincreasing in γ

AB. Furthermore, the

coefficient of mAB

(i.e., the fifth and the sixth lines in on the right-hand-side of equation (26)) is non-negative.Therefore, that part of equation (26) is non-decreasing in mAB .

• With respect to the other coefficient of mAC ξAC , i.e., the last two lines on the right-hand-side of in equation(26), we will show that

[[d

A− Y ∗

A,L]+ −min

[Y ∗

B,F− d

B]+,K

B− d

B

]+

−[[dA − Y ∗

A,F]+ −min

[Y ∗

B,L− dB ]+,KB − dB

]+

≤ 0. (27)

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 65

It is easy to see that,

– if [dA−Y ∗

A,L]+ = 0, then equation (27) is smaller than or equal to zero. This is because δ ≡ min

[Y ∗

B,F−

dB]+,K

B−d

B

≥ 0 since both [Y ∗B,F

−dB]+ ≥ 0 and K

B−d

B≥ 0. Therefore, the first term of equation

(27) becomes [0− δ]+ = 0. Furthermore, the second term of equation (27) is non-negative.

– if dA − Y ∗A,L

> 0, then by Proposition 1, we know, Y ∗A,L

∈ 0, S − dB. Hence,

∗ if Y ∗A,L

= 0, then Y ∗A,F

= 0 and Y ∗B,L

= Y ∗B,F

must hold. This is because Y ∗A,F

≤ Y ∗A,L

always holds,so Y ∗

A,L= 0 implies that Y ∗

A,F= 0. Thus, Firm A always purchases nothing, i.e., Firm A’s position

in the BC Competition has no effect on Firm B’s purchase decision, and hence Y ∗B,L

= Y ∗B,F

. As aresult, equation (27) is equal to zero.

∗ if Y ∗A,L

= S − dB , then it is easy to see that, Y ∗B,L

= minKB , S and Y ∗B,F

∈ 0, dB must hold.Because Y ∗

A,L= S − d

Bmeans that to be the Leader Firm A protects, which by Proposition 2

implies that Firm B must be aggressive to steal Firm A’s customers. So Y ∗B,L

= minKB, S, and

Y ∗B,F

∈ 0, dB can be obtained directly from Proposition 1. As a result, equation (27) becomes

(dA − (S − dB )

)−(dA −minS − dB ,KB − dB

)

= minS − dB,K

B− d

B − (S − d

B) ≤ 0.

Therefore, equation (27) is non-positive, i.e., the coefficient of mAC

ξAC

in equation (26) is non-negative.Consequently, equation (26) (and therefore x

A) is nonincreasing in γ

AC. Furthermore, we can conclude that

equation (26) (and therefore xA) is nondecreasing in mAC .

Finally, it is clear that equation (26) (and therefore xA) is nonincreasing in cA and hA . This completes the prooffor Case 1. The proof of Case 2 is similar, and therefore omitted. ¤

PROPOSITION 5: Under the symmetric information conditions, if both firms are “aggressive” and are identicalexcept for their size (i.e., d

A6= d

B), then both firms spend the same amount of effort on preparedness, and therefore

will have the same chance (50%) to become the Leader in the BC Competition.

PROOF OF PROPOSITION 5:

We know that the probability for Firm i to be the Leader in the BC Competition is,

π∗i =x∗i

x∗i + w∗j, π∗j = 1− π∗i ,

where x∗i is the preparedness effort Firm i spends in the AP Competition and w∗j is the preparedness effort Firm jspends in the AP Competition.

Based on the proof of Proposition 3, we have the expression of x∗A from equations (23) and (25). Recall that x∗i isFirm A’s actual preparedness effort Firm i given it believes Firm j’s preparedness effort is x∗j . Plugging the uniqueNash Equilibrium for the AP Competition for Firm i, i.e., (x∗A, x∗B), into equations (23) and (25), under interfirminformation, we have

x∗A =

√p

A0(Π∗A,L−Π∗

A,F)

Cex∗B − x∗B ,

and

x∗B =

√p

A0(Π∗B,L−Π∗

B,F)

Cex∗A − x∗A.

Note that interfirm information indicates pi0,j = pi0 , i, j ∈ A,B, and identical firms implies pA0 = p

B0 .

We can write out the preparedness investment by Firm A in the AP Competition, x∗A, as follows:

x∗A

=pA0

Ce

(∆Π∗A)2∆Π∗B(∆Π∗A + ∆Π∗B)2

, (28)

where ∆Π∗i = Π∗i,L −Π∗i,F , i ∈ A,B.

66Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

Similarly, we obtain w∗B

based on equations (23) and (25) as follows:

w∗B

=p

A0

Ce

(∆Π∗B)2∆Π∗A(∆Π∗B + ∆Π∗A)2

. (29)

Now, by the Equations (28) and (29), the probability for Firm i to be the Leader in the BC Competition becomes,

π∗i

=x∗i

x∗i + w∗j=

∆Π∗i∆Π∗i + ∆Π∗j

.

Therefore, to show π∗i

= 50%, we only need to show that ∆Π∗i = ∆Π∗j .

In the following, since two firms are identical except the firm size, we omit the subscript of all parameters exceptthe firm size that indicates Firm i or Firm j (e.g., K ≡ KA = KB ). Also, without loss of generality, we assumed

A> d

B.

When dA

> dB, based on the relationship among d

A, d

B, K, and d

A+d

Bwe have the following two different cases:

dB≤ d

A≤ K ≤ d

A+ d

Band d

B≤ d

A≤ d

A+ d

B≤ K. Furthermore, under each case, we also need to discuss the

relationship among the backup capacity S, firms’ sales, the total market sales, and their production capacities, sofor each case, we consider five mutually exclusive and collectively exhaustive sub-cases:

• Case 1: dB≤ d

A≤ K ≤ d

A+ d

B:

– S ≤ dB;

– dB ≤ S ≤ dA ;

– dA≤ S ≤ K;

– K ≤ S ≤ dA + dB ;

– dA

+ dB≤ S.

• Case 2: dB≤ d

A≤ d

A+ d

B≤ K:

– S ≤ dB;

– dB ≤ S ≤ dA ;

– dA≤ S ≤ d

A+ d

B;

– dA + dB ≤ S ≤ K;

– K ≤ S.

Since the proof procedure is similar, we will just give one detailed example. In the following, we show that theproposition hold under the situation where d

B≤ d

A≤ K ≤ S ≤ d

A+ d

B.

When K ≤ S ≤ dA + dB , based on Proposition 1, since both firms are “aggressive”, i.e., given the chance, a firmwill buy all available backup capacity in an attempt to steal sales from the competitor, it is easy to see that theonly two possible optimal purchases combinations are:

(Y ∗i,L, Y ∗

j,F ; Y ∗j,L, Y ∗

i,F ) ∈

(K, S −K;K,S −K), (K, 0; K, 0)

.

• If (Y ∗i,L, Y ∗

j,F ;Y ∗j,L, Y ∗

i,F ) = (K,S −K; K,S −K), then we have,

∆Π∗i = rµ(di − (S −K)

)+ (rµ + mξ)(K − di) + mξ(K − dj) + mξ

C

((di + dj)− S

)

−cµ(K − (S −K)

),

= (r − c)µ(2K − S) + mξ(2K − (di + dj)

)+ mξC

((di + dj)− S

),

which clearly depends on the total duopoly market size, di + dj .

• If (Y ∗i,L, Y ∗

j,F ;Y ∗j,L, Y ∗

i,F ) = (K, 0;K, 0), then we have,

∆Π∗i = (r − c)µK + mξ(2K − (di + dj)

)+ mξ

C

((di + dj)−K

),

which clearly depends on the total duopoly market size, di + dj .

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 67

So, when dB≤ d

A≤ K ≤ S ≤ d

A+ d

B, ∆Π∗i = ∆Π∗j holds, and hence each firm has a probability of 50% to win

the BC Competition. This completes the proof for this case. The proofs of other cases are similar, and thereforeomitted. ¤

References

Rudin, W., 1976. Principles of Mathematical Analysis (3rd Ed.). McGraw-Hill, New York.

68Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

ONLINE APPENDIX C

Numerical Study on Impact of the Post-disruption Information

In this appendix, we examine the impact of post-disruption information on the firm’s preparedness investment, aswell as on their capacity decisions after the disruption. To do this, we consider the following information scenarios:

• Pre-Disruption Information: Prior to a disruption, Firm i knows that, if a disruption occurs, it could be onethe following two types:

(a) with probability pS

i0the disruption will be a long disruption with Severe consequences, which lasts an

average of µS

units of time with distribution FS(·), or

(b) with probability of pM

i0the disruption will be a short disruption with Minor consequences, which lasts

an average of µM

units of time with distribution of FM

(·).Firms use this information to play the Advanced Preparedness Competition and decide how much to investin preparation. We refer to the disruption with severe consequences as a type S disruption, and the one withminor consequences as a type M disruption.

• Post-Disruption Information: After the disruption, we use the conditional probability Pi(h|h), i ∈ A,B,

and h ∈ S,M, to denote the probability that Firm i is correct about the type of disruption. This conditionalprobability represents the accuracy of the firm in its assessment of the disruption type after the disruptionoccurs. If the post-disruption information is perfect, then Pi(S|S) = 1, Pi(S|M) = 0, Pi(M |S) = 0, andPi(M |M) = 1. Note that, we assume Pi(h|h) 6= Pj (h|h), because we want to investigate the impact of onefirm having more accurate post-disruption information than the other.

We incorporate these new information scenarios as follows:

Advanced Preparedness (AP) Competition: Firm i plays the AP Competition based on its estimates of thelikelihoods of each type of disruption, p

S

i0and p

M

i0, and its belief of Firm j’s estimates of these likelihoods,

pS

j0,iand p

M

j0,i(i 6= j and i, j ∈ A,B).

So we have, ΠAPi , which defined as Firm i’s total expected profit in the AP Competition for Firm i as:

ΠAPi = p

S

i0

( xi

xi + xjΠ

S

i,L(Y ∗i,L, Y ∗

j,F ) +xj

xi + xjΠ

S

i,F (Y ∗i,F , Y ∗

j,L)−miC (d0i − di)

)

+pM

i0

( xi

xi + xjΠ

M

i,L(Y ∗i,L, Y ∗

j,F ) +xj

xi + xjΠ

M

i,F (Y ∗i,F , Y ∗

j,L)−miC (d0i − di)

)

+(1− pS

i0− p

M

i0)(rid

0i (µ + T )

)− Cexi + miid

0i ,

where Πh

i,k(Y ∗i,k, Y ∗

j,k) (i, j ∈ A,B and i 6= j, k, k ∈ L,F, and h ∈ S,M) is defined as the sum of the

total expected profit of Firm i, given it is in position k during a type h disruption.

At the same time, Firm i believes that Firm j uses pS

j0,iand p

M

j0,ias its estimates for the likelihood of a

disruption, and hence, believes that Firm j is maximizing the following:

ΠAPj,i = p

S

j0,i

( xj

xi + xjΠ

S

j,L(Y ∗j,L, Y ∗

i,F ) +xi

xi + xjΠ

S

j,F (Y ∗j,F , Y ∗

i,L)−mjC (d0j − dj)

)

+pM

j0,i

( xj

xi + xjΠ

M

j,L(Y ∗j,L, Y ∗

i,F ) +xi

xi + xjΠ

M

j,F (Y ∗j,F , Y ∗

i,L)−mjC (d0j − dj)

)

+(1− pS

j0,i− p

M

j0,i)(rjd

0j (µ + T )

)− Cexj + mjj d

0j .

Backup Capacity (BC) Competition: After a disruption occurs, firms play the BC Competition based on theconditional probability Pi(h|h), i ∈ A,B, and h, h =∈ S, M. We define Π

h|hi,k (Y ∗

i,k, Y ∗j,k

) (i, j ∈ A,Band i 6= j, k, k ∈ L,F, and h, h ∈ S, M) to represent Firm i’s expected profit when it is in position kin the BC Competition, and it believes the disruption is of type h when the disruption is actually of type h.Note that, since Firm i believes the disruption is type h, it will use the distribution of F

h(·) with an average

of µh

to optimize its expected profit in the BC Competition.

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 69

To answer the question of which firm benefits more from post-disruption information, we evaluated the Value ofInformation, which measures the difference between the expected profit of Firm i in the following two cases:

• Complete post-disruption information case in which, immediately after the disruption occurs, Firm i knowsfor sure whether the disruption is severe or minor.

• Incomplete post-disruption information case in which Firm i knows only the estimated (i.e., conditional)probabilities of the two types of disruption.

Note that the expected profit of Firm i in both cases depend on whether Firm j has the complete informationor not. To get a conservative (i.e., lower bound) on the value of information for Firm i, we assume that in thecomplete information case, Firm j also has complete information, and in the incomplete information case, Firm jdoes not have he complete information and uses its estimates of the probabilities of the two types of disruption.

For the case of incomplete post-disruption information, Firm i’s actual expected profit under effort levels (x∗i , w∗j )

is:

Πincmpl

i = pS

0Pi(S|S)

( x∗ix∗i + w∗j

ΠS|Si,L (Y ∗

i,L, Y ∗j,F ) +

w∗jx∗i + w∗j

ΠS|Si,F (Y ∗

i,F , Y ∗j,L)−m

iC(d0

i − di))

+pS

0P

i(M |S)

( x∗ix∗i + w∗j

ΠM|Si,L (Y ∗

i,L, Y ∗j,F ) +

w∗jx∗i + w∗j

ΠM|Si,F (Y ∗

i,F , Y ∗j,L)−m

iC(d0

i − di))

+pM

0Pi(M |M)

( x∗ix∗i + w∗j

ΠM|Mi,L (Y ∗

i,L, Y ∗j,F ) +

w∗jx∗i + w∗j

ΠM|Mi,F (Y ∗

i,F , Y ∗j,L)−miC (d0

i − di))

+pM

0Pi(S|M)

( x∗ix∗i + w∗j

ΠS|Mi,L (Y ∗

i,L, Y ∗j,F ) +

w∗jx∗i + w∗j

ΠS|Mi,F (Y ∗

i,F , Y ∗j,L)−miC (d0

i − di))

+(1− pS

0− p

M

0)(rid

0i (µ + T )

)− Cex

∗i + miid

0i ,

On the other hand, Firm i’s actual expected profit under the effort levels (x∗i , w∗j ) when both firms have complete

post-disruption information can be written as,

Πcmpl

i = pS

0

( x∗ix∗i + w∗j

ΠS|Si,L (Y ∗

i,L, Y ∗j,F ) +

w∗jx∗i + w∗j

ΠS|Si,F (Y ∗

i,F , Y ∗j,L)−m

iC(d0

i − di))

+pM

0

( x∗ix∗i + w∗j

ΠM|Mi,L (Y ∗

i,L, Y ∗j,F ) +

w∗jx∗i + w∗j

ΠM|Mi,F (Y ∗

i,F , Y ∗j,L)−m

iC(d0

i − di))

+(1− pS

0− p

M

0)(rid

0i (µ + T )

)− Cex

∗i + miid

0i ,

We define the difference between Πcmpl

i and Πincmpl

i as a conservative proxy (i.e., an underestimation) for the “Valueof Information for Firm A”.

We introduce the following new factors to study the impact of the Post-disruption Information:

µS/µ

M: the ratio of the mean outage times of the two types of disruption.

pS

0/p

M

0: the ratio of the probabilities of the two types of disruption.

The ranges of the new parameters and factors are summarized in Table 10 for (i, j ∈ A,B and i 6= j; q ∈ M,S.In Tables 11 to 14, we display the best regression models with one to five factors (corresponding to the“Value of Information for Firm A” as the dependent variable) under the conditions that Firm A is eitherlarger than Firm B or smaller than Firm B and under either the ABC model or AB model. Note that,

p0 = pM

0+ p

S

0, µ = p

M

0× µM + p

S

0× µS .

70Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

Un-normalized Parameters Normalized FactorsParameters Values Factors Rangesµ

M(day) 10, 20, 30

µS

(day) = µM× µ

S

µM

µS

µM

1.5, 3, 5

pM

00.01, 0.05, 0.1, 0.25

pS

00.01, 0.05, 0.1, 0.25

pS

0

pM

0

0.04 ∼ 25

pq

i0when p

q

0= 0.01 0.005, 0.01, 0.05 |p

q

i0−p

q

0p

q

0| 0 ∼ 4

when pq

0= 0.05 0.025, 0.05, 0.1 |p

q

i0−p

q

0p

q

0| 0 ∼ 1

when pq

0= 0.1 0.05, 0.1, 0.15 |p

q

i0−p

q

0p

q

0| 0 ∼ 0.5

when pq

0= 0.25 0.125, 0.25, 0.375 |p

q

i0−p

q

0p

q

0| 0 ∼ 0.5

pq

j0,iwhen p

q

j0< 0.05 0.5p

q

j0, p

q

j0, 2p

q

j0|p

q

j0,i−p

q

j0

pq

j0| 0 ∼ 1

when pq

j0≥ 0.05 0.5p

q

j0, p

q

j0, 2p

q

j0|p

q

j0,i−p

q

j0

pq

j0| 0 ∼ 1

Pi(S|S) 0, 0.25, 0.75, 1

Pi(M |S) = 1− P

i(S|S)

Pi(M |M) 0, 0.25, 0.75, 1Pi(S|M) = 1− Pi(M |M)

Table 10: Values of new input parameters and ranges of new factors for numerical studies.

Number of Independent Variables in the Regression ModelVariables in the Model R2 p0LLC p0LLB

µS

µM

dA

S |pB0−p0p0

|1 29.1 +2 36.8 + +3 40.1 + + +4 42.5 + + + +5 43.3 + + + + −

Table 11: Regression models with the top 5 most important factor(s) corresponding to the “Value of Informationfor Firm A” under the ABC Model when Firm A is larger than Firm B.

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 71

Number of Independent Variables in the Regression ModelVariables in the Model R2 p0LLC p0LG p0LLB

µS

µM

KA−d

A

dB

1 26.7 +2 33.2 + +3 38.1 + + +4 40.5 + + + +5 41.3 + + + + +

Table 12: Regression models with the top 5 most important factor(s) corresponding to the “Value of Informationfor Firm A” under the ABC Model when Firm A is smaller than Firm B.

Number of Independent Variables in the Regression ModelVariables in the Model R2 p0LLB p0LG

dA

S

µS

µM

KA−d

A

dB

1 31.9 +2 38.3 + +3 42.7 + + −4 46.2 + + − +5 47.8 + + − + +

Table 13: Regression models with the top 5 most important factor(s) corresponding to the “Value of Informationfor Firm A” under the AB Model when Firm A is larger than Firm B.

Number of Independent Variables in the Regression ModelVariables in the Model R2 p0LG

dB

S p0SGK

A−d

A

dB

|pB0−p0p0

|1 24.1 +2 32.2 + −3 36.0 + − +4 38.5 + − + +5 39.1 + − + + −

Table 14: Regression models with the top 5 most important factor(s) corresponding to the “Value of Informationfor Firm A” under the AB Model when Firm A is smaller than Firm B.

72Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

ONLINE APPENDIX D

Analytical Results for the Model with Systematic andTargeted Preparedness Investments

In this appendix, in addition to the effort that Firm i spends in preparedness activities related to moni-toring and detection (i.e., xi, i ∈ A, B), we also consider the effort that Firm i spends in preparednessactivities related to acquiring extra dedicated backup capacity (i.e., θi, i ∈ A,B). We considered C

θ

e,i

(i ∈ A,B) as the cost per unit of effort θi. The effort level θi can also be considered as the cost ofpurchasing capacity options from other suppliers, where the options will be exercised only if there is adisruption at the regular supplier. We define Θi (i ∈ A, B) as the upper limit on the available extradedicated backup capacity for Firm i.

We define ΠAPi (xi | xj) (i ∈ A,B) as Firm i’s total expected profit in the AP Competition for Firm

i (given Firm j’s preparedness effort level is xj) with one decision variables: xi. ΠAPi (xi, θi | xj , θj),

i ∈ A,B, Firm i’s total expected profit in the AP Competition for Firm i (given Firm j’s preparednesseffort levels are xj and θj), is a function with two decision variables: xi and θi, which are simultaneouslydecided by Firm i. Note that, we still consider two periods: Pre-Disruption Period and Post-DisruptionPeriod, but after adding θi into the AP Competition, we have:

• Pre-Disruption Period: Before a disruption occurs, both Firm A and Firm B serve their own cus-tomers. After a disruption occurs, firms will seek available backup capacity for the key component.There are three types of backup capacity: (a) dedicated capacity that is specific to each firm, (b)additional dedicated backup capacity that has already been contracted to be used in case of a dis-ruption, and (c) shared capacity, for which the two firms compete, if the dedicated backup capacityis not enough to cover the shortage. To model this competition with three possible backup capacitysources, we denote the amount of Firm i’s sales (i ∈ A,B) that cannot be covered by the dedi-cated capacity as d0

i, and the amount of Firm i’s sales (i ∈ A,B) that cannot be covered after

using both the dedicated capacity and the additional dedicated backup capacity is d0i− θi, where θi

is defined as the investment by Firm i (measured in unit capacity) devoted to acquiring additionaldedicated backup capacity. We denote the shared backup capacity by S. Under this setting, eachfirm must decide (1) how to invest in acquiring extra dedicated backup capacity, and (2) how toinvest in monitoring and detection in order to be able to detect the disruption first. This resultsin an Advanced Preparedness Competition for Firm i with two decision variables: xi and θi, whichare simultaneously decided.

• Post-Disruption Period: After the disruption occurs, the firm (either A or B) that detects thedisruption must decide how much of the total available backup capacity of S to buy in order tomaximize its total short- and long-term profits. This results in a Backup Capacity Competition(BC Competition). Once both firms have made their purchase decisions, there is a lead time periodrequired to bring the backup capacity (i.e., dedicated and shared) on line. During this period, bothFirm A and Firm B lose all of their short term sales, as well as some long term market share, toFirm C. The amount of the demand of Firm i (i ∈ A,B) that is lost to Firm C during the leadtime is (d0

i− θi)− di , where di is the demand for Firm i’s product at the end of the lead time.

All detailed analytical results are given in the following. Note that,

• adding θi (i ∈ A,B) into the AP Competition only changes the structure of the AP Competition:previously firm only makes one decision on how to invest in monitoring and detection, but nowfirm needs to make two simultaneous decisions of how to invest in acquiring extra dedicated backupcapacity and how to invest in monitoring and detection. Therefore, Proposition 3 needs to be provenin this new setting. On the other hand, since the relationship between the optimal preparednesseffort in monitoring and detection of Firm i (i.e., x∗i ) and the system parameters (e.g., mij , miC ,mji, ri, γij , γiC , γji, ci, and hi) will not be affected by adding θi into the AP Competition, it is easy

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 73

to see that Proposition 4 will still hold in the new setting. Also, the competition between two firmson the preparedness effort in monitoring and detection still exists and its investment structure willnot be affected by adding θi into the AP Competition. Thus, Proposition 5 will also hold in thenew setting.

• adding θi (i ∈ A,B) into the AP Competition does not change the structure of the BC Compe-tition: after the disruption occurs, same as previous setting, firms still competition on the shardbackup capacity. The only difference is that, previously before the disruption occurs, the amount ofunsatisfied customers of Firm i was d0

i; now, before the disruption occurs, that is d0

i−θi. Therefore,

it is clear that the structure of the Backup Capacity Competition will not be affected by addingθi into the AP Competition, and hence Proposition 1 and Proposition 2 will still hold in the newsetting.

Two new propositions are the main contents of this Online Appendix. Proposition 6 shows the possiblechoices for the optimal extra dedicated backup capacity purchases for both firms, and Proposition 7shows that a unique Nash Equilibrium exists for each firm’s Advanced Preparedness Competition withtwo kinds of preparedness activities under some situation.

PROPOSITION 6:

CASE 1: If ΘA < d0A, and

(1) if ΘB < d0B, then the only possible choices for the optimal extra dedicated backup capacity purchases

for both firms are:

(θ∗A, θ∗

B) ∈

(0, 0), (0, ΘB ), (ΘA, 0), (ΘA, ΘB)

;

(2) if d0B ≤ ΘB < d0

A +d0B, then the only possible choices for the optimal extra dedicated backup capacity

purchases for both firms are:

(θ∗A, θ∗

B) ∈

(0, 0), (0, d0

B), (0, ΘB ), (ΘA, 0), (ΘA, d0B),

(ΘA, mind0

B + (d0A −ΘA),ΘB

);

(3) if ΘB ≥ d0A + d0

B, then the only possible choices for the optimal extra dedicated backup capacitypurchases for both firms are:

(θ∗A, θ∗

B) ∈

(0, 0), (0, d0

B), (0, d0A + d0

B), (ΘA, 0), (ΘA, d0B),

(ΘA, d0

B + (d0A −ΘA)

);

CASE 2: If d0A ≤ ΘA < d0

A + d0B, and

(1) if ΘB < d0B, then the only possible choices for the optimal extra dedicated backup capacity purchases

for both firms are:

(θ∗A, θ∗

B) ∈

(0, 0), (0, ΘB ), (d0

A, 0), (d0A, ΘB ),

(mind0

A + (d0B −ΘB ), ΘA, ΘB

), (ΘA, 0)

;

(2) if d0B ≤ ΘB < d0

A +d0B, then the only possible choices for the optimal extra dedicated backup capacity

purchases for both firms are:

(θ∗A, θ∗

B) ∈

(0, 0), (0, d0

B), (0, ΘB ), (d0A, 0), (d0

A, d0B), (ΘA, 0)

;

74Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

(3) if ΘB ≥ d0A + d0

B, then the only possible choices for the optimal extra dedicated backup capacitypurchases for both firms are:

(θ∗A, θ∗

B) ∈

(0, 0), (0, d0

B), (0, d0A + d0

B), (d0A, 0), (d0

A, d0B), (ΘA, 0)

;

CASE 3: If ΘA ≥ d0A + d0

B, and

(1) if ΘB < d0B, then the only possible choices for the optimal extra dedicated backup capacity purchases

for both firms are:

(θ∗A, θ∗

B) ∈

(0, 0), (0,ΘB ), (d0

A, 0), (d0A,ΘB),

(d0

A + (d0B −ΘB ), ΘB

), (d0

A + d0B, 0)

;

(2) if d0B ≤ ΘB < d0

A +d0B, then the only possible choices for the optimal extra dedicated backup capacity

purchases for both firms are:

(θ∗A, θ∗

B) ∈

(0, 0), (0, d0

B), (0,ΘB), (d0A, 0), (d0

A, d0B), (d0

A + d0B, 0)

;

(3) if ΘB ≥ d0A + d0

B, then the only possible choices for the optimal extra dedicated backup capacitypurchases for both firms are:

(θ∗A, θ∗

B) ∈

(0, 0), (0, d0

B), (0, d0A + d0

B), (d0A, 0), (d0

A, d0B), (d0

A + d0B, 0)

;

PROOF OF PROPOSITION 6:

Before we show that the optimal extra backup capacity purchases for both firms are restricted to a smallnumber of possible values, we need to show:

• Part I: ΠAPA (xA, θA | xB, θB), Firm i’s total expected profit in the AP Competition for Firm i

given Firm j’s preparedness effort levels are xj and θj , is linear in θA, and ΠAPA (xA, θA | xB, θB)

can be written as,

ΠAPA (xA, θA | xB, θB) = pA0

( xA

xA + xBΠA,L(Y ∗

A,L, Y ∗

B,F| θA, θB) +

xB

xA + xBΠA,F (Y ∗

B,L, Y ∗

A,F| θA, θB)

−mAC (d0A − θA)(1− e

− TγAC )

)+ (1− pA0)

(rA(d0

A − θA)(µ + T ))

−Cx

exA − C

θ

eθA + mAA(d0

A − θA), (30)

where Πi,k(Y ∗i,k

, Y ∗j,k| θi, θj) (i, j ∈ A,B and i 6= j, and k, k ∈ L,F) is the total expected profit

of Firm i when it is in position k in the BC Competition, given firms’ preparedness effort levels onacquiring extra dedicated backup capacity are θi and θj . For simplification, in the following, wewill write Πi,k(Y ∗

i,k, Y ∗

j,k| θi, θj) as Πi,k(θi, θj).

• Part II: ΠAPA (xA, θA | xB, θB) is piecewise linear in θA for given xj and θj .

Part I: In this part, we will show that ΠAPA (xA, θA | xB, θB) is linear in θA for given xj and θj .

First of all, it is easy to see that all terms in equation (30) except the first term,

pA0

xA

xA + xBΠA,L(θA, θB),

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 75

and the second term,

pA0

xB

xA + xBΠA,F (θA, θB),

are linear in θA, so we only need to show that both ΠA,L(θA, θB) and ΠA,F (θA, θB) are also linear in θA.

In the following, we will show that for any given θB, both Π∗A,L

(θA, θB) and Π∗B,F

(θA, θB) are linear inθA. Let’s look at the Backup Capacity Competition.

Part I – Case 1. d0i < θi ≤ Θi, i ∈ A,B:

It is easy to see that this case cannot be optimal. (All customers of Firm i can be satisfied by Firm i,so it cannot be optimal for the competitor of Firm i to buy more than what it needs to satisfy its owncustomers, i.e., the amount of d0

i .)

Part I – Case 2. θi = d0i , i ∈ A,B:

It is clear that in this case, no firm will play the Backup Capacity Competition.

Part I – Case 3. d0i < θi ≤ Θi, but θj ≤ mind0

j , Θj: For simplification, we call this as CONDITION3 .

Under CONDITION 3 , there are two possible cases:

• Subcase 1: If d0j ≤ Θj , then θj ≤ mind0

j , Θj becomes θj ≤ d0j . But, note that, it is easy to

show that the combination of d0i < θi and θj = d0

j cannot be optimal, so CONDITION 3 becomesd0

i < θi(≤ Θi), but θj < d0j (≤ Θj).

• Subcase 2: If d0j > Θj , then θj ≤ mind0

j , Θj becomes θj ≤ Θj . CONDITION 3 becomesd0

i < θi(≤ Θi), but θj ≤ Θj(< d0j ).

In both cases, Firm i not only can cover all its own customers, but also has an amount of θi − d0i extra

capacity, which can be used to steal the competitor’s unsatisfied customers. Therefore, the optimalamount of the shared backup capacity that Firm i will buy is the difference between the remaining extracapacity, θi − d0

i , and the number of competitor’s unsatisfied customers, dj (θj) − Yj,F , where dj (θj)(=

(d0j − θj)e

− TγjC ) is the uncovered demand of Firm j’s product at the end of the lead time, which is a

function of θj . Without loss of generality, let i = A and j = B, the optimal shared backup capacitypurchase amount of Firm A given it is the Leader in the BC competition is

Y ∗A,L

=[[dB (θB)− YB,F ]+ − (θA − d0

A)]+

,

where dB (θB) = (d0B − θB)e−

TγBC .

It is easy to see that, for any given θB, both ΠA,L(θA, θB) and ΠB,F (θA, θB) are linear in θA.

76Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

Part I – Case 4. For all other values of θi: We have,

ΠA,L(YA,L , YB,F | θA, θB) = rA min

YA,L , dA(θA)

µ

+ψA min

[dB (θB)− YB,F ]+,min[YA,L − dA(θA)]+,KA − dA(θA)

−mABξAB min

[YB,F − dB (θB)]+, [dA(θA)− YA,L ]+

−mAC ξAC

[[dA(θA)− YA,L ]+ − [YB,F − dB (θB)]+

]+

−cAYA,Lµ

−hA

[YA,L −minYA,L , dA(θA) −min

[dB (θB)− YB,F ]+,

min[YA,L − dA(θA)]+,KA − dA(θA)

]+µ, (31)

where di(θi) = (d0i − θi)e

− TγiC , which is linear in θi, i ∈ A,B, and

ΠB,F (YA,L , YB,F | θA, θB) = rB min

YB,F , dB (θB)

µ

+ψB min

[dA(θA)− YA,L ]+, [YB,F − dB (θB)]+

−mBAξBA min

min[YA,L − dA(θA)]+,KA − dA(θA)

,

[dB(θB)− YB,F ]+

−mBCξBC

[[dB (θB)− YB,F ]+

−min[YA,L − dA(θA)]+,KA − dA(θA)

]+

−cBYB,F µ. (32)

The forms of equations (31) and (32) are the same as equations (1) and (2), respectively. It is easy toshow that, for any given θB, both ΠA,L(θA, θB) and ΠB,F (θA, θB) are linear in θA.

Part II: In this part, we will show that ΠAPA (xA, θA | xB, θB) is piecewise linear. Actually, it is clear that

ΠAPA (xA, θA | xB, θB) is piecewise linear due to the existence of Min and Max functions in Πi,k(Y ∗

i,k, Y ∗

j,k|

θi, θj) for i, j ∈ A,B and i 6= j, and k, k ∈ L,F, as shown in equations (31) and (32).

Based on what we proved in Parts I and II, in the following we will show that the optimal extra backupcapacity purchases for both firms are restricted to a small number of possible values.

We examine the nine possible scenarios, i.e.,

• Scenario 1: ΘB < d0B and ΘA < d0

A.

• Scenario 2: ΘB < d0B and d0

A ≤ ΘA < d0A + d0

B.

• Scenario 3: ΘB < d0B and ΘA ≥ d0

A + d0B.

• Scenario 4: d0B ≤ ΘB < d0

A + d0B and ΘA < d0

A.

• Scenario 5: d0B ≤ ΘB < d0

A + d0B and d0

A ≤ ΘA < d0A + d0

B.

• Scenario 6: d0B ≤ ΘB < d0

A + d0B and ΘA ≥ d0

A + d0B.

• Scenario 7: ΘB ≥ d0A + d0

B and ΘA < d0A.

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 77

• Scenario 8: ΘB ≥ d0A + d0

B and d0A ≤ ΘA < d0

A + d0B.

• Scenario 9: ΘB ≥ d0A + d0

B and ΘA ≥ d0A + d0

B.

Here we only present the proof for the first scenario , The proofs of the rest are similar to that of thefirst scenario and are therefore omitted.

Scenario 1: For the piecewise linear functions, it is proven that the optimal solution is one of the breakpoints. Hence, in this case, for any given xB, θB and any xA, the optimal value of θA is one of two breakpoints of ΠAP

A (xA, θA | xB, θB), namely 0 or ΘA. Similarly, for Firm B, for any given x0A, θ0

A and any xB,the optimal value of θB is one of two break points of ΠBP

B,A(xB, θB | x0A, θ0

A), namely 0 or ΘB. Therefore,in this scenario , the only possible choices for the optimal extra backup capacity purchases for both firmsare:

(θ∗A, θ∗

B) ∈

(0, 0), (0, ΘB ), (ΘA, 0), (ΘA, ΘB)

.

In summary, the only possible choices for the optimal extra backup capacity purchases for both firms are:

• If ΘB < d0B, then,

– when ΘA < d0A, we have

(θ∗A, θ∗

B) ∈

(0, 0), (0, ΘB ), (ΘA, 0), (ΘA, ΘB)

;

– when d0A ≤ ΘA < d0

A + d0B, we have

(θ∗A, θ∗

B) ∈

(0, 0), (0,ΘB), (d0

A, 0), (d0A,ΘB),

(mind0

A + (d0B −ΘB ),ΘA,ΘB

), (ΘA, 0)

;

– when ΘA ≥ d0A + d0

B, we have

(θ∗A, θ∗

B) ∈

(0, 0), (0, ΘB ), (d0

A, 0), (d0A, ΘB ),

(d0

A + (d0B −ΘB ),ΘB

), (d0

A + d0B, 0)

;

• If d0B ≤ ΘB < d0

A + d0B, then,

– when ΘA < d0A, we have

(θ∗A, θ∗

B) ∈

(0, 0), (0, d0

B), (0,ΘB ),

(ΘA, 0), (ΘA, d0B),

(ΘA, mind0

B + (d0A −ΘA), ΘB

);

– when d0A ≤ ΘA < d0

A + d0B, we have

(θ∗A, θ∗

B) ∈

(0, 0), (0, d0

B), (0, ΘB ), (d0A, 0), (d0

A, d0B), (ΘA, 0)

;

– when ΘA ≥ d0A + d0

B, we have

(θ∗A, θ∗

B) ∈

(0, 0), (0, d0

B), (0, ΘB ), (d0A, 0), (d0

A, d0B), (d0

A + d0B, 0)

;

• If ΘB ≥ d0A + d0

B, then,

78Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

– when ΘA < d0A, we have

(θ∗A, θ∗

B) ∈

(0, 0), (0, d0

B), (0, d0A + d0

B),

(ΘA, 0), (ΘA, d0B),

(ΘA, d0

B + (d0A −ΘA)

);

– when d0A ≤ ΘA < d0

A + d0B, we have

(θ∗A, θ∗

B) ∈

(0, 0), (0, d0

B), (0, d0A + d0

B), (d0A, 0), (d0

A, d0B), (ΘA, 0)

;

– when ΘA ≥ d0A + d0

B, we have

(θ∗A, θ∗

B) ∈

(0, 0), (0, d0

B), (0, d0A + d0

B), (d0A, 0), (d0

A, d0B), (d0

A + d0B, 0)

In all of our numerical study for cases with both targeted and systematic preparedness effort, we observedthat a unique Nash Equilibrium exists for each firm’s Advance Preparedness Competition. Although wewere not able to prove this for the general case, we prove this in Proposition 7 for a spacial case.

PROPOSITION 7: If both firms are “aggressive” and are identical except for their size (i.e., dA 6= dB),then a unique Nash Equilibrium exists for each firm’s Advanced Preparedness Competition with two kindsof preparedness activities.

PROOF OF PROPOSITION 7: For any given Firm B’s preparedness effort pair (xB , θB ), Firm A’stotal expected profit in the AP Competition for Firm A is

ΠAPA (xA, θA | xB, θB) = pA0

( xA

xA + xBΠA,L(Y ∗

A,L, Y ∗

B,F| θA, θB) +

xB

xA + xBΠA,F (Y ∗

B,L, Y ∗

A,F| θA, θB)

−mAC (d0A − θA)(1− e

− TγAC )

)+ (1− pA0)

(rA(d0

A − θA)(µ + T ))

−Cx

exA − C

θ

eθA + mAA(d0

A − θA).

To simplify notation we use ΠA,L(θA, θB) and ΠA,F (θA, θB) instead of ΠA,L(Y ∗A,L

, Y ∗B,F

| θA, θB) andΠA,F (Y ∗

B,L, Y ∗

A,F| θA, θB), respectively, and then we have

RA ≡ RA(θA, θB) ≡ ΠAPA (xA, θA | xB, θB) = pA0

( xA

xA + xBΠA,L(θA, θB) +

xB

xA + xBΠA,F (θA, θB)

−mAC (d0A − θA)(1− e

− TγAC )

)+ (1− pA0)

(rA(d0

A − θA)(µ + T ))

− Cx

exA − C

θ

eθA + mAA(d0

A − θA).

By setting R′A

= 0, and solving for xA , we get

xA =

√pA0

(ΠA,L(θA, θB)−ΠA,F (θA, θB)

)

Cx

exB

− xB . (33)

Similarly, for any given Firm A’s preparedness effort pair (xA , θA), we have

xB =

√pB0,A

(ΠB,L(θB, θA)−ΠB,F (θB, θA)

)

Cx

exA

− xA . (34)

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 79

By equations (33) and (34), we can write out x∗A

as follows

x∗A

=1

Cx

e

(pA0∆Π∗A)2(pB0,A∆Π∗B)(pA0∆Π∗A + pB0,A∆Π∗B)2

, (35)

where ∆Π∗i = Π∗i,L(θ∗i , θ∗j )−Π∗i,F (θ∗i , θ

∗j ), i = A,B, i 6= j. Similarly, we have

x∗B

=1

Cx

e

(pB0,A∆Π∗B)2(pA0∆Π∗A)(pA0∆Π∗A + pB0,A∆Π∗B)2

, (36)

After ignoring all constant terms, by equations (35) and (36), we have

RA(θ∗A, θ∗B) =p2

A0∆Π∗A

pA0∆Π∗A + pB0,A∆Π∗BΠ∗

A,L(θ∗A, θ∗B) +

pA0pB0,A∆Π∗BpA0∆Π∗A + pB0,A∆Π∗B

Π∗A,F

(θ∗A, θ∗B)

− (pA0∆Π∗A)2(pB0,A∆Π∗B)(pA0∆Π∗A + pB0,A∆Π∗B)2

−mAC (1− e− T

γAC )θ∗A − rA(1− pA0)(µ + T )θ∗A − Cθ

eθ∗A −mAAθ∗A.

In the proof of Proposition 5, we have shown that if both firms are “aggressive” and are identical exceptfor their size (i.e., dA 6= dB ), then we have ∆Π∗A = ∆Π∗B. Hence, we get

RA(θ∗A, θ∗B) =p2

A0

pA0 + pB0,A

Π∗A,L

(θ∗A, θ∗B) +pA0pB0,A

pA0 + pB0,A

Π∗A,F

(θ∗A, θ∗B)

− (pA0)2pB0,A

(pA0 + pB0,A)2(Π∗

A,L(θ∗A, θ∗B)−Π∗

A,F(θ∗A, θ∗B)

)

−mAC (1− e− T

γAC )θ∗A − rA(1− pA0)(µ + T )θ∗A − Cθ

eθ∗A −mAAθ∗A.

= ηA

1Π∗

A,L(θ∗A, θ∗B) + η

A

2Π∗

A,F(θ∗A, θ∗B)− η

A

3θ∗A + constant,

where

ηA

1=

p3A0

(pA0 + pB0,A)2, η

A

2=

2p2A0

pB0,A + pA0p2B0,A

(pA0 + pB0,A)2, and

ηA

3= mAC (1− e

− TγAC ) + rA(1− pA0)(µ + T ) + C

θ

e+ mAA .

Without loss of generality, let dA > dB . As we showed in the proof of Proposition 5, based on therelationship among dA , dB , K, and dA + dB we have the following two main cases, each including fivemutually exclusive and collectively exhaustive sub-cases:

• Case 1: dB ≤ dA ≤ K ≤ dA + dB :

– S ≤ dB ;

– dB ≤ S ≤ dA ;

– dA ≤ S ≤ K;

– K ≤ S ≤ dA + dB ;

– dA + dB ≤ S.

• Case 2: dB ≤ dA ≤ dA + dB ≤ K:

– S ≤ dB ;

– dB ≤ S ≤ dA ;

80Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

– dA ≤ S ≤ dA + dB ;

– dA + dB ≤ S ≤ K;

– K ≤ S.

Furthermore,

• based on the proof of Propositions 1 and 2, (Y ∗i,L, Y ∗

j,F ; Y ∗j,L, Y ∗

i,F ) can have different values. Forexample, given K ≤ S ≤ dA + dB , from Proposition 1, we know,

(Y ∗A,L

, Y ∗B,F

) ∈

(0, 0), (0, dB ), (0, minKB , S), (S − dB , 0), (S − dB , dB ),

(dA , 0), (dA , S − dA), (KA , 0), (KA , S −KA)

,

i.e., there are 9 possible optimal choices for the optimal shared backup capacity purchases whenK ≤ S ≤ dA + dB . Since we assume that, both firms are “aggressive”, i.e., given the chance, a firmwill buy all available backup capacity in an attempt to steal sales from the competitor, based on theproof of Proposition 2, it is easy to see that the only two possible optimal purchases combinationsare: (Y ∗

i,L, Y ∗j,F ; Y ∗

j,L, Y ∗i,F ) = (K,S −K;K,S −K) and (Y ∗

i,L, Y ∗j,F ; Y ∗

j,L, Y ∗i,F ) = (K, 0;K, 0).

• On the other hand, based on the proof of Proposition 6, there are a total of 9 possible combinationswith respect to the regions of ΘA and ΘB, i.e.,

– 1: ΘB < d0B and ΘA < d0

A.

– 2: ΘB < d0B and d0

A ≤ ΘA < d0A + d0

B.

– 3: ΘB < d0B and ΘA ≥ d0

A + d0B.

– 4: d0B ≤ ΘB < d0

A + d0B and ΘA < d0

A.

– 5: d0B ≤ ΘB < d0

A + d0B and d0

A ≤ ΘA < d0A + d0

B.

– 6: d0B ≤ ΘB < d0

A + d0B and ΘA ≥ d0

A + d0B.

– 7: ΘB ≥ d0A + d0

B and ΘA < d0A.

– 8: ΘB ≥ d0A + d0

B and d0A ≤ ΘA < d0

A + d0B.

– 9: ΘB ≥ d0A + d0

B and ΘA ≥ d0A + d0

B.

For example, given ΘA < d0A and ΘB < d0

B, from Proposition 6, the only possible choices for theoptimal extra dedicated backup capacity purchases for both firms are:

(θ∗A, θ∗

B) ∈

(0, 0), (0, ΘB ), (ΘA, 0), (ΘA, ΘB)

.

Since the proof procedure is similar, as an example we only present the proof for one scenario in which K ≤S ≤ dA+dB , (Y ∗

i,L, Y ∗j,F ; Y ∗

j,L, Y ∗i,F ) = (K,S−K;K, S−K), and (θ∗

A, θ∗

B) ∈

(0, 0), (0, ΘB ), (ΘA, 0), (ΘA, ΘB)

.

Now, we have

RA(θ∗A, θ∗B) = ηA

1

((r − c)µK + mξ(K − dA)

)+ η

A

2

((r − c)µ(S −K)−mξ(K − dB)

)

−ηA

3θ∗A + constant,

where di = (d0i − θ∗i )e

− TγiC . After some algebra, we get

RA(θ∗A, θ∗B) = (ηA

1mξe

− TγAC − η

A

3)θ∗A − η

A

2mξe

− TγBC θ∗B + constant.

It is easy to see that,

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 81

• if ηA

1mξe

− TγAC − η

A

3> 0, then Firm A prefers θ∗A = ΘA regardless of whether θ∗B = 0 or ΘB , i.e.,

ΘA is strictly dominated;

• if ηA

1mξe

− TγAC − η

A

3≤ 0, then Firm A prefers θ∗A = 0 regardless of wether θ∗B = 0 or ΘB , i.e., 0 is

(weakly) dominated.

That is, there is always a dominated strategy for Firm A.

For Firm B, we have the similar result,

• if ηB

1mξe

− TγBC − η

B

3> 0, then Firm B prefers θ∗B = ΘB regardless of whether θ∗A = 0 or ΘA , i.e.,

ΘB is strictly dominated;

• if ηB

1mξe

− TγBC − η

B

3≤ 0, then Firm B prefers θ∗B = 0 regardless of whether θ∗A = 0 or ΘA , i.e., 0 is

(weakly) dominated.

That is, there is always a dominated strategy for Firm B too.

We summarize the possible optimal extra dedicated backup capacity purchases combinations are:

• when ηA

1mξe

− TγAC − η

A

3> 0 and η

B

1mξe

− TγBC − η

B

3> 0, then (θ∗A, θ∗B) = (ΘA,ΘB);

• when ηA

1mξe

− TγAC − η

A

3> 0 and η

B

1mξthene

− TγBC − η

B

3≤ 0, (θ∗A, θ∗B) = (ΘA, 0);

• when ηA

1mξe

− TγAC − η

A

3≤ 0 and η

B

1mξe

− TγBC − η

B

3> 0, then (θ∗A, θ∗B) = (0,ΘB);

• when ηA

1mξe

− TγAC − η

A

3≤ 0 and η

B

1mξe

− TγBC − η

B

3≤ 0, then (θ∗A, θ∗B) = (0, 0).

So, we can claim that if both firms are “aggressive” and are identical except for their size (i.e., dA 6= dB ),then a unique Nash Equilibrium exists for each firm’s Advanced Preparedness Competition with twokinds of preparedness activities. ¤

82Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

ONLINE APPENDIX E

Numerical Study on Impact of Firms Risk Attitudes

In this appendix, we perform a numerical study which extends our results in Sections 3.2 and 3.3 forrisk-neutral firms to cases where firms are Risk Averse (RA) and/or Risk Seeking (RS). Specifically, weconsider: (1) a risk-averse (RA) exponential utility function of the form u(x) = −e

−ax, and (2) a risk-

seeking (RS) exponential utility function of the form u(x) = eax

, where a is a positive constant. We testcases where a = 0.1, 1, 10, and 100 and compare the results to the risk neutral cases.

Based on equation (3), as a RA firm, Firm i’s loss due to lack of preparedness is:

ΩRA

i = Πi −(p0

(− e−(Π∗i,F−miC(d0

i−di)+miid0i

))+ (1− p0)

(− e−(rid

0i (µ+T )+miid

0i

))), (37)

where Πi is the actual expected profit of Firm i, when the firm follows the optimal preparedness strategy:

Πi = p0

(− e

−(

x∗ix∗

i+w∗

j

(−e

−(Π∗i,L−miC (d0i−di)+miid0

i−Cex∗i ))+

w∗jx∗

i+w∗

j

(−e

−(Π∗i,F−miC (d0i−di)+miid0

i−Cex∗i ))))

+(1− p0)(− e−

(rid

0i (µ+T )+miid

0i−Cex∗i

)). (38)

The equation for the measure of risk for a RS firm can be obtained similarly.

Firm A (Larger) Firm B (Smaller)Case 1 Risk-averse Risk-averseCase 2 Risk-averse Risk-neutralCase 3 Risk-averse Risk-seekingCase 4 Risk-neutral Risk-averseCase 5 Risk-neutral Risk-neutralCase 6 Risk-neutral Risk-seekingCase 7 Risk-seeking Risk-averseCase 8 Risk-seeking Risk-neutralCase 9 Risk-seeking Risk-seeking

Table 15: Possible combinations of firms’ risk attitudes.

As shown in Table 15, since there are three types of risk attitude (Risk Averse, Risk Seeking and RiskNeutral) for each of the two firms, we will have 9 cases, each of which corresponds to a possible combinationof firms’ risk attitudes.

Tables 16 to 19 display the best regression models with five parameters under the ABC Model and ABModel with different combination of firms’ risk attitudes. Note that, the case in which both firms arerisk-neutral has already been studied in Sections 3.2 and 3.3, and is therefore omitted here.

As these tables show, when evaluating protection policies against disruption, a risk averse firm tends topay more attention to loss factors while a risk seeking firm tends to pay more attention to gain factors.Furthermore, we find that for cases where the competition is more risk averse, a firm should focus moreon gain factors. On the other hand, the competition being more risk seeking makes a firm paying moreattention to loss factors when evaluating protection policies.

This observation complements our previous observations about firm size. Larger and/or risk averse firmsshould pay attention to loss factors when evaluating protection policies, while smaller and/or risk seeking

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 83

firms should pay attention to gain factors when evaluating protection policies. Factors that make theopponent pay more attention to loss (gain) factors when evaluating protection policies tend to make a firmpay more attention to gain (loss) factors when evaluating protection policies. These results are intuitive,but they confirm that our earlier insights about the conditions that magnify the risks from supply chaindisruptions are still valid when firms are not risk neutral.

Firm A Firm B R2 Top 5 Factors

RA RA 57.1 p0LLC p0LLBK

B−d

B

dA

dA

S |pB0−p0p0

|RA RN 59.4 p0LLC p0LLB

KB−d

B

dA

dA

S p0SLtotal

RA RS 60.4 p0LLC p0LLBK

B−d

B

dA

p0SLtotal

dA

S

RN RA 45.2 p0LLC p0LLBd

A

S |pB0−p0p0

| KB−d

B

dA

RN RS 58.6 p0LLC p0LLBK

B−d

B

dA

dA

S |pB0−p0p0

|RS RA 50.3 p0LG p0LLC p0LLB

KA−d

A

dB

dA

S

RS RN 47.7 p0LGK

A−d

A

dB

p0LLCd

A

S p0LLB

RS RS 41.3 p0LG p0LLCK

A−d

A

dB

p0LLBd

A

S

Table 16: Regression models for the top five factors for Firm A in the ABC Model with different combination offirms’ risk attitudes, when Firm A is the larger firm.

Firm A Firm B R2 Top 5 Factors

RA RA 50.3 p0LLC p0LLBd

B

S p0LG |pB0−p0p0

|RA RN 52.8 p0LLC p0LLB

dB

S p0LG |pB0−p0p0

|RA RS 54.9 p0LLC p0LLB

dB

S

KB−d

B

dA

p0LG

RN RA 40.1 p0LLC p0LG p0LLBd

B

S

KA−d

A

dB

RN RS 52.7 p0LLC p0LLBd

B

S p0LGK

A−d

A

dB

RS RA 43.8 p0LGK

A−d

A

dB

p0LLC p0SG p0LLB

RS RN 41.5 p0LGK

A−d

A

dB

p0LLC p0SG p0LLB

RS RS 39.2 p0LGK

A−d

A

dB

p0SGd

B

S p0LLC

Table 17: Regression models for the top five factors for Firm A in the ABC Model with different combination offirms’ risk attitudes, when Firm A is the smaller firm.

84Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

Firm A Firm B R2 Top 5 Factors

RA RA 51.1 p0LLK

B−d

B

dA

dA

S

mAB

365rA

|pB0−p0p0

|RA RN 48.4 p0LL

KB−d

B

dA

dA

S

mAB

365rA

p0SLtotal

RA RS 55.6 p0LLK

B−d

B

dA

p0SLtotal

dA

S

mAB

365rA

RN RA 41.7 p0LL p0LGd

A

S |pB0−p0p0

| KA−d

A

dB

RN RS 54.4 p0LL p0LGd

A

S

KB−d

B

dA

|pB0−p0p0

|RS RA 44.3 p0LG p0LL

KA−d

A

dB

dA

S

KB−d

B

dA

RS RN 41.8 p0LGK

A−d

A

dB

p0LLd

A

S

KB−d

B

dA

RS RS 37.9 p0LG p0LLK

A−d

A

dB

KB−d

B

dA

dA

S

Table 18: Regression models for the top five factors for Firm A in the AB Model with different combination offirms’ risk attitudes, when Firm A is the larger firm.

Firm A Firm B R2 Top 5 Factors

RA RA 45.2 p0LL p0LGd

B

S |pB0−p0p0

| KB−d

B

dA

RA RN 41.1 p0LL p0LGd

B

S |pB0−p0p0

| KB−d

B

dA

RA RS 47.3 p0LLd

B

S

KB−d

B

dA

p0LG |pB0−p0p0

|RN RA 38.1 p0LG

dB

S p0SGK

A−d

A

dB

|pB0−p0p0

|RN RS 49.7 p0LG

dB

S p0LLK

A−d

A

dB

|pB0−p0p0

|RS RA 39.3 p0LG

KA−d

A

dB

p0SGd

A

S

mAB

365rA

RS RN 36.2 p0LGK

A−d

A

dB

p0SGd

A

S

mAB

365rA

RS RS 35.4 p0LGK

A−d

A

dB

p0SGd

B

S

dA

S

Table 19: Regression models for the top five factors for Firm A in the AB Model with different combination offirms’ risk attitudes, when Firm A is the smaller firm.

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 85

ONLINE APPENDIX F

Implications for Risk Management

We can boil down our insights from the our analytical and numerical analysis to produce the following list of policiesfirms can pursue to mitigate the tactical and strategic consequences of supply chain disruptions.

F.1. Speed Polices

In scenarios where a supply disruption affects multiple firms (i.e., the ABC and AB models), earlier detectionand quicker reaction make it more likely the firm will be able to secure the limited backup capacity before thecompetition. Therefore, we suggest firms (1) install monitoring processes on key components in order to spotdisruptions quickly and to better distinguish a true disruption from day-to-day variations, and (2) build a company-wide culture of awareness and communication so that relevant parties will be made aware of suspicious situationsquickly and will be able to work collaboratively to craft a response.

In addition to promoting detection and response speed from the within firms, firms can improve reaction speed toan external disruptive event by strengthening relationships with suppliers. Enhancing the firm’s reputation withsuppliers can make it more likely that these suppliers will share information with the firm and work with it toresolve a problem. For instance, the 1997 fire at Aisin (which made 99% of Toyota’s P-valves) provided an exampleof a successful business relationship between a manufacturer and a supplier, which led to a rapid collaborativeresponse to a disruptive situation (see Reitman (1997), Nishiguchi and Beaudet (1998) for discussions).

F.2. Customer Loyalty Polices

Under the ABC and AB models, our regression analysis indicates that Firm A faces lower risk when it has highercustomer loyalty (relative to either Firm B or Firm C). Indeed, high customer loyalty pays dividends not onlyduring disruptive events, but also during normal operations. It has been estimated that the cost of acquiring a newcustomer is six to ten times higher than the cost of maintaining a repeat customer (LeBoeuf (2000)). So a firm’smarketing dollars will go further if some of them are devoted to building, nurturing, and developing its currentcustomer relationships. Our results suggest that such efforts will also make the firm more resilient to supply chaindisruptions.

There are many ways a firm can cultivate greater customer loyalty, including:

• Discounts. During normal production, discounts for repeat customers can be an effective way to retaincustomers. In a similar fashion, firms can avoid permanently losing customers who cannot be satisfiedduring a supply outage by offering discounts or rebates to customers who are willing to return after theoutage. Similarly, if the firm has similar product(s) available as substitute(s) to the disrupted one(s), it candiscount these during the outage to encourage customers of the disrupted product(s) to buy them insteadof competitive products. Customer recover can substantially impact profitability. Studies indicate thatcustomer recovery investments yield returns of 30%-150% (Wreden (2009)).

• Exceed customer expectations. Delivering more than customers expect is one of the most powerful ways togain customer loyalty. For instance, Lexus had a recall early in its history in the United States. They calledcustomers, arranged to pick up their cars, and left identical cars as loaners for the day in their places. Whenthey returned the car that evening, it was fixed, cleaned, and had a full tank of gas and a coupon for a freeoil change. Lexus wisely used this disruption as an opportunity to impress its customers and hence increasecustomer loyalty (Sheffi (2005)).

• Pay great attention to unhappy customers. It is impossible for a firm to keep 100% of its customers happy, sostrategies are needed to identify unhappy customers who may be inclined to post negative comments (or evenvideos) on the web. A firm should consider giving unhappy customers an outlet for their comments, so thatit can monitor and respond to them. For example, in 1999, Intel was notified by a mathematics professorabout a floating-point-operation defect of its Pentium 486DX. When Intel failed to respond, the professorposted this problem on a mathematics web site, where it rapidly generated public attention. Intel initiallyresponded by offering to replace the 486DX chip for users who could prove a need for using floating-pointoperations. This served to further aggravate customer unhappiness and led to a demand for a complete recall.Intel finally gave in and recalled the 486DX, which cost more than four-hundred million dollars, and evenmore importantly, damaged its reputation and customer loyalty (Mueller and Soper (2001), Sheffi (2005)).An example of a successful response to a difficult situation occurred in 2001, after the 9/11 attack shut down

86Hopp et al. Strategic Risk from Supply Chain Disruptions

Article Submitted to Management Science

all U.S. air freight traffic, when Continental Teves (a supplier of automotive, industrial, and agriculturalproducts) saw an opportunity to impress customers affected by the disruption. On the afternoon of 9/11,Continental Teves picked out those shipments deemed most important to its customers, promised to reroutethem via ground transportation, and tried its best to deliver them on time. Although this action was costly,Continental Teves successfully impressed its customers and made them more loyal in the long term (Marthaand Vratimos (2002)).

F.3. Backup Capacity Polices

Our results show clearly that a firm faces the greatest risk when the shared backup supply for a component subjectto disruption is limited relative to sales. So, one way to reduce risk is to take steps to increase this potential supply.There are several ways this could be done, including:

• Increase the number of firms with capability to supply the needed component. This might be accomplishedby multi-sourcing a component or by otherwise allocating business to suppliers to help them develop specificcapabilities.

• Contractually obligate suppliers to be able to deliver more than the contracted amount within a specifiedamount of time. This would ensure that a secondary supplier could be turned into a primary supplier ifneeded. For research on capacity contracts, see Barnes-Schuster, Bassok, and Anupindi (2002), Kleindorferand Wu (2003), and Anupindi and Jiang (2008).

• Design products to be more flexible with regard to their constituent components. As we noted, Nokia didthis prior to the Philips fire and was able to purchase chips from suppliers who were not previously suitable.

• Cultivate process and organizational flexibility. For example, the previously cited case in which a host ofsuppliers were tapped by Toyota to produce p-valves to replace the supply disrupted by the fire at an Aisinplant is an illustration of the power of having an organizationally flexible supply chain. Working together intask force mode, the many firms in Toyota’s keiretsu quickly expanded p-valve capacity that did not existprior to the incident. For research on flexibility contracts, see Pasternack (1985), Tsay (1999), and Tsay andLovejoy (1999).

References

Anupindi, R. and L. Jiang, 2008. Capacity Investment Under Postponement Strategies, Market Competition, andDemand Uncertainty. Management Science, November 1, 54(11), 1876 - 1890.

Barnes-Schuster, D., Y. Bassok, and R. Anupindi, 2002. Coordination and Flexibility in Supply Contracts withOptions. Manufacturing and Service Operations Management, Vol. 4, No. 3, 171-207.

Kleindorfer, P. R. and D. J. Wu, 2003. Integrating Long- and Short-Term Contracting via Business-to-BusinessExchanges for Capital-Intensive Industries. Management Science, November 1, 49(11), 1597-1615.

LeBoeuf, M., 2000. How to Win Customers and Keep Them for Life. Berkley Trade.

Martha, J. and E. Vratimos, 2002. Creating a Just-in-Case Supply Chain for the Inevitable Disaster. MercerManagement Journal, No. 14.

Mueller, S. and M. E. Soper, 2001. Microprocessor Types and Specifications. June, 8, 2001. Available onhttp://www.informit.com/articles/article.aspx?p=130978&seqNum=28

Nishiguchi, T. and A. Beaudet, 1998. The Toyota group and the Aisin fire. MIT Sloan Management Review 40,No. 1, 49-59.

Pasternack, B., 1985. Optimal pricing and returns policies for perishable commodities. Marketing Science 4,166-176.

Reitman, V., 1997. To the Rescue: Toyota’s Fast Rebound After Fire at Supplier Shows Why It Is Tough. TheWall Street Journal, May 8th, page A1.

Sheffi, Y., 2005. The Resilient Enterprise: Overcoming Vulnerability for Competitive Advantage. MIT Press.Cambridge, Massachusetts.

Tsay, A. A., 1999. The Quantity Flexibility Contract and Supplier-Customer Incentives. Management Science,Vol. 45, No. 10, 1339-1358.

Hopp et al. Strategic Risk from Supply Chain DisruptionsArticle Submitted to Management Science 87

Tsay, A. A. and W. S. Lovejoy, 1999. Quantity Flexibility Contracts and Supply Chain Performance. Manufac-turing and Service Operations Management, Vol. 1, No. 2, 89-111.

Wreden, N., 2009. How to Recover Lost Customers. Available on: http://www.smartbiz.com/article/articleview/112/1/7/