Professional Documents
Culture Documents
Journal
ELSEVIER
• . 1I0Mafdll.... ; od ;O,...,.;M
......
Aa:epIcd ....... ..-be:i 10 tile ,..rMiolI 0/. atntqy' within a -IW'Y '*'"
rc:liaoo: e:- ~ IIbility of IlJoe ~ "'nctionf
of the .....~ to cunlrilulc ~ _ of thMllnle«r. ThiI; oonll'ibu1iQa Qlmcb II IIIl1d110 the ICCIIriIy fmocI:il>D ., iI
<loa 10 awkc1iDc ..... producbon. Thl: toOls ....::a<uy 10 support WI axItribulioQ IIIUS( be easy 10 _ , -nil ~ in llJoeir
OIllput, In rootn5t 10 lIM: more ~ lOOlI mel frameaooru appropriote for lbo: &foboII mal. decisiool makinI of the
COO'lIIW'Y. A partirular techn>que. tDoom .. Oual~ System Dynamk:a{OSD) iI presenled. Tboe _lbod illCflI to be IIimf'Ie
L Saw My . . . .....,. let rt'ss !he idea of all orpniaatioa in whid!. RnteP: mo-
otpb eUler,., from all. Ievd5 and fnnctiont. of the
Scntev rihia lbe: portfolio of. ownpanya .aM- orpnisatioa aaudinc to their dcl'« of (I)Otad wilh
tiQ is IIIUaIJy _ ali .. • . . ·1b'1titta IIpOI die impor- the outJide Mldd aDd their "",",Iired knlJwied&e ol
tant .iI:a.oa iD eontJul with die day-to-<by opw.OOIllS the operati0n5 ol die pany. n- ~
ul the OfPtliAtiol1. It • to do witb problem$ (II" modeb of an j1iol> mati. an IIOIW !!lOre
opponllllitic:l MIicb IIa¥t a kla& .i mle aDd wlUc:b widely iklt'CptnI (Quiao, 1\llIO; Qu.inn et at, (992).
require Iarp aUocaliom of ~ and SJIllD' of Tbe "meg)' of the COll1patl)' is :lUll as • two-way
control. SlratelY is to do with lhe biI isweJ. proceu. Ardlilti:tural hlirleWOrkJ arc p;lSSCd down
As such it has been Ken in tbe pal II Ihe hems ff'Dll:l the top, while pt'OpOIIis for the elementl of
domain of senior memben of the U«\Itive, to the ltflllety and judgements of feuibilily are passed up-
alellt thaI a whole'corpus of $ln.teP;: Ihintiog (the w.rdl. III this model the top mant&tment are seen as
Desipt JoChool) <M.iatzberlo 1994) aees IInlegy as e~· mucb to be lIClcctilll from a menu of pullltive "rile·
dUlively the preroptive of the CEO. Stategy i5 pes ali they are iDvelltitl& new ooes from la"IU:h.
pwed down from the: top IlId il iI Ihe role of the Under suclI • concepl of stratepe deci$ioIl makiltJ aU
SlIIbordi.Dates merely to ialpleJnetu an idea wbleb ol the fImctioas iDdudUil tile IOmCtimClI lIta\«lcd
tpriDp fuIJy fOl'lbed rn:.:. the out-tray of the top -tty functioa within !be ...... paay arc in I poIitioa
e-=uti¥e. Altemati¥c cootemporaf}' lllood. praenl 10 ooo!ribule 10 the ~ ilnttl)'.
Withill adll framc:=0lk. tbeo, the seo.aricy "","IL
ill aJoapitk the opentioIlt mro • r or ...... hal
·Ceo. I ... _ . a Rip(' -.aiIy as -.B II • ri,bl 10 ooouibluc 10 the
"*
O95J.l~/9Ifl".oo
'I' SotH·I"unlHOU·4
•• ~ sa.- Irdoad Ucl. AI .... .-..L
clementi of a <;()fJIplUIy strategy. In each ease sl,l(h of variables which it is difficult, if not impoaible, to
contnllutions mll5l be limited to the function's area of quantify. While, for e:tample, we rnay be able to say
competence and relevance. but there arc strong con- whal our price- margin in the market pIao;e viJ-i.-vis
neclionS between the security function and tbe com- the competitors' producu may be, it is often difficult
petitive advantage and competence of the firm. Just to be sure about the clolely IlUOciated underlying corn
as a company luis to defend alllinsl commercially-dc. advantage. It is even more difficult to state numeri-
rived preSSllres (Poner, 1979), w it must not ignore: in cally the level of a more qualitative but critical vari-
its bu~eSll planning the il'DponaDCC of threalS and able such lIS, say, Ihe intensity aDd nature of threats
prnsurc:s whicb o~te ouuide th.ilt COIlImertial to our bluiness from new entrants to the industry. A
structure, what will be called here exogenous threats. qualitative model is more likely to have the breadth
Moreover there is a po5$ibility that with the correct and flexibility of content DUded for the represcnta-
tools, core competenccs deriving from tbe SCCllrity tion of strategic and sccurity dynamic$, and although
fuoction of a company, and in particular that of threat the precision of numerical models may be desired,
pallem recognition un make a positive contribulion that precision, in the area of strategy at least, is often
to the competitive advantage of the romp.my. illlllOl)'.
The tools needed to assist this contribution must be The extensive work on soft systems models of vari-
able to cope with more IhM the analysis of the ous types (Checkland, 1981; Oledland and Scholes,
strategic context. and tbe generalised issues of com- 1990) have shown themselves to be most effertive in
petitive advantage. indmt!}' structure and core com- tbe bands of expert users, but can be costly in time
petence&. General strategic questions demand gener- wllen used sporadically by a user wtw.:l5e day-tCHlay
alised tools: specific qucslions demand specific tools interest lies elsewhere.
and approaches. The strategic tools of value chain &tensive experience with security professionals bas
analysis and industry analysis (Mintzberg et 101., 1998) shown that an extension of Ille well-known systems
are essential to the undentanding of the wider strate- dynamics influence diagram (Coyle, 1996) is well·
gic picture and the setting of the overall architeclure, suitcd to Ihe representation of the dynamic interac-
bUI tbey are not specific enough in their OIItput for tions between sccurity issues and company strategy.
the specific functions of the complUly, and hence for The method has proved easy to learn by security
the IIOClIrity fuflction in particulaf. professionals from a wide variety of bacqrounds and
One of the !.ignificant chantcteristics of the impact in use gives a !lOUnd and contnbutory llCtioo planniD8
of business is!;uei upon the security function (and produl:t whil:h linb security thinkUIg with strategic
indeed other functionS of the company) is their dy- issues. Moreover, the system representationS are ac-
namic nature, Customer demand Wlllles and WllllC5, cessible to lI()ft-usera, 10 that it ill In etftdive tool for
peer companies shift from postures of co-operation to presentations to senior cxecutives. Lastly. the analysis
more ovenly competitive stances and the threats to process which it uses is intuitive and transpbrent,
which the security function must respond rise and faU providing a natural framework for reponing by both
in intensity. The contribution of Ihe security function written and spokn media.
to the ovcl1lll Slrategy, then. is to make sense of the This paper brieDy describes the qualitative systems
specific impact of the exoseoous tbreats and identify dynamica (QSD) influence diagram method 11$ gener·
the impact of tboK threats upon the sustainability ally used in 5«Urity applications together with the
and future SI/CCC$l!l of !he cornpany. For that purpose extension to ronvention.al loop anaIysU. This ap-
an easy 10 use dynamic analysis tool is required which proach is then iIlU5U'llted with a ClI$C study cumpk of
can weave security dynamics into the wider busil\CSl; the interaction between produC1 safety issues and
P'=. overall businesl performa~ for a large supermarket.
1. S,...... ~ _O'dlllMa
...
There are a number of candidate approaches to The central part of !be QSD approach is the reprc-
ana\y$ing wch dynamic proc:e&:Ca. Comparative sur- scntarion of the dynamic procc1se~ within the S)'ltem
veys of approaches and rnc:thods (Wilson, 1990) and under consideration through the medium of an infI.u-
more general coosideratioos of modelling aa part of ence diagram. It is appropriate here to dClcribc only
tbe decision making process (Roscnhead, 1989; Riv- the general approach alId grammar of these diagrams.
ett, 19')4), are readily ....ailable. Generally speaking, leaving advice on their generation to authoriries such
quantitative modelling metbods are not partic:ularly aa Coyle (1996), who offers particularly cIcar and
effective because of !he nature of the variablel in- practical instruction. In trials with security profession-
vuJved in strategic proces$C$ (and, indeed, in sccurity als the generation of the influence diagrams has not
iuelO. Both domains are concerned with a wide l1Inge only proven to be natural and eaay. bIIt has of itself
I.H. A>ood, I,," IJo 1': I s...n,..-... 10 (1M) lSl-l60
...
.-'.,- OIber facIors, -'IllDe derivio& from the etf«u of Olber
loop dyaantia within the uiIIins IlIOdeI and othas
front unexpre5lCd limitins ma:ltanlsms bul the \IIldcr,
lying instabiliry of the loop is nnertheless aD indic:a-
_.
.- / tion thai the corresponding btJ5irIeK dyrwnica are
appropriate itertlli on the manapmenl agenda.
A loop wIticlt has • single neplive IiJII, bowever.
willl'JOl neeessarily cdlibit unstable behaviour, There
f\l.1. ApooolM!""" ".i= _ _ ~, mlY Ix: a tendency for the loop to "'bUise if tbe
i.H. "'-It, J.P. I1NJftJtrJ I ~~ II) (/993) /5/-161)
.. . . ..... . ..
1
.1
-... --./."-.1
• ., II~ IIlI 1 ...
r·. ~
.
. " ...
fla. (, ~ the ~Ion d • omall dIaflte IfOIlIId an
_ _ (ru.-.y) loop.
/
system, exhibit ally particular behaviour. Frequently
the inherent instability will be OOII.tained by the effect
.-
....... ·n,
I'll- 1. A IDop cnl'Ol:l<d r""" ... inlIuer><e di.>&Jam.
of the rest of the l)'IIeDl, but the inherent beluwtour
of the loop provides a IDtlUIS of determining the
pouible aetions open to an interested manager. Fig. 5
shows an eDIIlple of a managed (and lienee poten·
tially stable) loop by way of lII1 eumple.
effect of the negatively OOlttIaIOO OOIIlIeCIiOII is suf·
ficiently ill:n:.m,:. Unlike the runaway loop, there is the 3. J. Ac/Of" IINl1y:Iis
potential for !hili latter IypC w be IIllIIUIFd 10 a liable
limited condition, and such a loop is known in the A further step of loop ana/ysilI is ooneemed with
systems dynamialliteralure u a 'malIllI'=d' loop. Ihe degree 10 which interested panks, the actors,
Funher eMll1inalioo will reveal that, in examining have a motivation and/or a IIO""t'r to Iffect the dy-
the stability of a loop. two negatives will cancel one namics of the system. The objective here is 10 disooYer
another OUt, 50 that the oawre of a loop, i.e. whether management actions whieh can influence lhose par·
it ill inherently unstable or potenlially 51able. can be tk:!; 10 the benefit of the client orp.ni#lion. 115 aim is
detelIllined by applying the folklwing rule:A loop 10 identify the parlicular clemenu of the dynamics or
which has no ~tives or lUI even nwnber of negalive the system over which interested partie$ have oontrol
signs atladled to the l\ft'OW5 is • rutlaWll)' loop. If it in order to promote that power or atlenWite it acc0rd-
IIlllI an odd number of negatives it is 1I. managed loop. ing 10 our interest. Additionally, the motivalion of the
An example of this limple loop analysis is coo- parties is taken inlo account, since it may be within
~ in the ca&e S1udr below. the pqweT of a party 10 affccl a particular element of
This nile then provides the basil for • simple the dyrwuia but DOl in their inlerest. The process of
unssment of the nature of the dynamic prove.....' analysis is _nlially simple.
within a sys!ClII. Those loops which are identified lIS Firstly a list of interested pllrties iJ compiled. In the
being potentially UIIStabIe represent elements of a example of the product safety system commenced
IDI.IIIgement ageDda aimed al promoting those mech· above. the interested parties may be:
anisms whieh we wish to happen, and altenulllil\&
those dynamics wl1id:l we wish to suppre$. By extract· $, the market;
ing (by iDIpe<:tionJ from the inftuenee diagram aU the S, the !leCIlrity function of the company;
Joops and characterising them lIS <k:sen1led above, the C, lhe PR function of the company;
essential cbancteristics of a compOCated system can A, the decision matel'll of the animal rishts pres-
be IIDOO\Iered. 1be extraetion of the loops breaks suce group;
,,,
-
--
wto... 7,
....
e::--dooo,.01
~+
ca" tid..
....ll8\ji .
~ ~ft~
messages in the media, so that any conjunl;tion of the management of the systcm which we have rcpre-
interests belwecn M and A in this respect is made scnted.
more significant. Our management action might then Before examining some of lhe por.«:!iealitics of the
include a specitK: intervemion by our PR function (C) approach wttidl ha~ cmerged from cxpcricnoc with
to rounter any tenOcll(')' of the press to lmen to the method. a Clllle study is prnc:nted in order to.oow
interested stories by the pressure group before such tbe metbod more fully and in order 10 provide a
ncp.tiYc ~ses arc placed. Sll(h aetiCHI might in. furthcr cumplc of the analysis stages.
dude early briefing to cllltlre that the company's facts
are plal:Cd before the ~ in advucc. oo.m to
morc specific IDCaSUrn 10 cnsure that indMdua! re-
portcn give our company a sympathetic hearing. This study reports an &llI!ys.is of tbe impact of
Thirdly. II u!ICfuI ancillary analysis stcp is to takc product safcly coosidcrations 00 the tmsincss »>an-
each particular loop and adopl: a stated specific view· ning of • large food distribut;oa company, mown
point upon it. For cxam:pIc, in the loop of Fig. 5 we here 115 Fo<x!Q), in partiatlar respccl of • large
would clearly wish to adopl: a viewpoint of the 5CCIlrity multiple retail outlet in Orlordshirc, UK.. The 5lore
function of the company. but we might equally well has a very wide ~ of prod\lCtS and is typjcaI of the
willi to improve our undcntanding of the situation we large supermarket complexes rlCar 10 .lmosl cvcry
are seeking to Ill.llMgC by taking .. number of other large lawn in &rope. Inevitably. pan of ita a1ensive
viewpoints, for cumplc, the prcs:wrc group or a ('ll)Ifto prodl.lC1 range wiIJ. include itclllJ whictJ may, witbout
pc1i1or. The ob;cttivc of this third analysis step is, wamin&, beeome the target of prodl.lC1 integrity at-
again, to identify the componcnu of an action plan tacks, cithcJ from. Illy. an a.nimaI ri&hu group dilsal·
whidl can contribute 10 our particular objectives in isfied with the product;oa or testina process or from
J.H."'-il,lP.M. r oI/~~/I(J998)JjJ-1MJ
............
TIM: opc:nlioDal planni", probk:m eaa l!lindon: be
~
ity of lbe product, eoasumcn' perexpOons of
product safety and lbe intenetiDn berweeu that
~ ~ and the ckgee of nepti¥c media
By ·1 _1M ....1..... ~ tlo< _ _
auentiort. 1'hiIi can be teen {oote b in F.,. 1) by
FoodCo - - . iokMiIy .. II ....... - " " ~
foUowing the dlaiD: \'\Ilnenbility of wF'-~r·
"'*" b Ill< I j.
cei¥cd produd safety-<iuality/fe.alures and by
obM:rvi", toward the left of Fil. 1 the effea or
'negalive media allention' mfucinl lbe 'per-
ccivi:d prodllCl safety',
Inilial discussions suge6ted a suitable Slarting point (e) Conlidcncx in the produeu sold by FoodCo is
as the attractiveness m
the larget - wblll malr.C$ Ilffected both by attacks on FoodCo and anacts
FoodCo a potential YiClim? It emersed thaI three on the rela.il food indllStty in general. Thus we
facton ClOIllribvtcd to the altBaivenesti of the Wpcr- see in Fi&- 1 (note c) a sct of conne:dions (in the
market u a talJCt. botlom left) between 'no of terrorisl allacq 011
F'trSl was a CXMlSidcration of tbc prllCalS Il50Cd in !be company' and 'number oflClTOrisl actions iII the:
lIWIufacture of its product nDF and its ClIViromncn- ilKIu5tri, Thc:se in tllfll affect the: media iDterest
tal ctfect. 1'hiIi comprised a broad audit of the tedJ- ('time on media') and the product safety.
..;qua IIKd by IUJlIltien .mio:h may QIIR a octtioll of (d) the effect of FoodCo's PR fullCtioD 011 the: IIIICdia
lOCict)' 10 ..... a Inrof campait:n ~ !be dla.ia. .is lIOI to be iplra!1.lld towanb !be richl lX1Itre
For ..... mpae. the II5C of b6cKhed paper bleac:bcd in of F.. 7 CDole d) ClllI be teeD lbe variab6c
!I)'pelle products, oe the: laC of ccnain iodiscrimiMle 'ddellJive OOll!Cnt of~, whidl ;, iDiIi-
Iishio.f mc\hod$ ...tDr;h QUIC unacttptable coUouen! pted by ·neptM. IIIICdia anenUon' and whidI
fatalitie5 /MY incite action by pr-essure poops. will raull io ao iDc:rtase in the '~ra:ived
TIM: second fxt:or was tlu.t of !be raw materials product safety' of FoodCo's produeU..
tbclll5e!vQ. PublX: la5Ic::s may differ, lor cDalpIc, over
!be II.pproprillteness of the lI§e of cemin animUs, While the four main mech.ani$/n$ above p«Mdcd
either as a food ilOUrt:e or u other raw material. A the ~ for the diagram, many otber arrows QlI be
HTIalJ 3Cgl'DCnt of the community may chooloc 10 wage _n conneetinJ the variables. Fot example, the 'at·
a ampalgn against a particular relailer as being the lractivene", of the largel' (centre right of Fig. 1) is
Jrl()$t high profile ilUpplier of the good which causes arfected by the unaa:eptll.bility to the pressure group
IlUCb Qlfence. Lastly. the tcstina methods are of sig- or the processes of manufaclure, raw maleriaJs. eN"
nificalllCe in nisirl& the threat foe lhe retailer. Stock· lesting metbods.. Tbe altTlClNeDess of the: hUICI is.,
iog OOIWDCbaI which inY'Olve lesting 00 animals is however, reduced by the atent to which the police
probably !be _ high profile aample of such are eoncenrnrioa upon wpp.--ing suc:b activity ('p0-
phenomcOll iII IllCCIll tima. lice CllpFlDmt'). ComelSoCly tbe animal ripUi ae-
1'hiIi audil of vulDerabWty suges;ted that FoodCo liviJU may be prooooked 10 attad; if FoodCo', 'profit'
0ClIlId indeed be at rid; from Mdt actMty. The AIpCT- .is hlah. DOt least because this represents a more
mad:e(', FDmlI attraetiYe_ as • WF1 ieadIi 10 a damapng ioIavmtioa. 011 their pan. Alleotioll is alto
~DtiaI iDcreI$C iII the V\ilnerabWty of partial- draWlIlpCcificaDy to the lXJml«Iioa between 'V\i!Der.
Iar producu. 1'hiIi product vub:nbility feem diuclIy abilit)' of product' aDd 'OOIC of pNi', a CJlIIlOecIioa
inlo the aast:QlDCn' ~ of the I&fety of !be wtUetl recopile:s that a ~ vulocrablc product ,.,iJ1
prod.... require addiliooal, roRIy meaJ!!fC$ to ensure ilS Afety,
such I!II deteaor do5Ures. or graler application or
4.1.I,1JIeitlJfl-ce~ 5CCllrit)' stalf's time.
"The influence: diagram of Fis. 1 emerged fmm 'The result of suc;h corWdentioo. <Wer a period of
CJDr\$identlom of a number of associated media· apprm. 6 h of group work, is the $ln.octure of lhe
nismlI: influence diagmn of F'lJ. 1, Funher lXlD5ideration of
the potential conlribulion of the: acton (So S. C. A. P,
(a) the relatiomhip befWUn cost of pxls, tbe price M) defiDed above, leads 10 tnc description of the
ill the martet, lUld the resu1tins demand and atenl to which tl\o$e acton OOlllrol the conn.eetion.
evenlual profit 10 FoodCo. This dynamit" QI\ be This ill 5bown in Fie. 8 by the attachment or
the
~
•
•
... -
--
,..
appropriate tenens} for the actors to the arrow SYIII- 4.1.2. T. Alrraclk'C,,~ of Ultgel ..... t'l</nmlbilil)' of
bolising the connection. The previous eumplc (Fig. 6) proJUi:t ..... no of ~rrt>riJt DtIlICks On company. This
can ll(l'W be Soecn to be an extract (rom the full closed loop oontllms only lI.JTOWI with + signs. Simple
diagram of Fig. 7, and illustrates the process of 'poli· loop analy$is thus indicates thai the panicular mecha-
ticisation' of the diagram. nism which it describes is ullSlllbJe. If il were not for
the controlling context of the rest of the system and
4./.1. Loop llM!yjU for compensating mlUlllgemenl action, this loop would
Inspection of Fig. 7 reveals a number of closed reHect the inc:reasi1Jl; tendency COf an existiDg lar&e1
\oop5. hut for the P'llJl"*' of illustration only one ClllI to appear even mon: attractive 10 an aggressor. We
be discussed here, although thoe discLl$Sion allcJ'l>e SUT- note that two of the atJQWS are controlled by both A
roulldill& the loop of Fig. 6 provides an lKlditional (the animal rights pressure group) and by S the
example. 1lle llClual ~uation anal~ i50laled all tbe security function of the company, an obselVation
loops in Fig. 7 and e:camined ca(:h in a way ~ilar 10 which merdy reflects the struggle for control of the
the analysis shown here. vulneQlb,lity of tbe: product and its tendeDC)' to be
lB. ~ I.P.BnMqonJ f$«wilflotmw/ IOf/99Il! JjJ-/6IJ
--
.••'1."- trolled. JlIlil as the 5«tJrity function will be highly
skilled ~t the OOIltlngellC)' planning foe, say, fire or