<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1d1 20130915//EN" "http://jats.nlm.nih.gov/publishing/1.1d1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" article-type="research-article" xml:lang="en">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">JTSCM</journal-id>
<journal-title-group>
<journal-title>Journal of Transport and Supply Chain Management</journal-title>
</journal-title-group>
<issn pub-type="ppub">2310-8789</issn>
<issn pub-type="epub">1995-5235</issn>
<publisher>
<publisher-name>AOSIS</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">JTSCM-16-623</article-id>
<article-id pub-id-type="doi">10.4102/jtscm.v16i0.623</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Original Research</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Managing reputational risk during supply chain disruption recovery: A triadic logistics outsourcing perspective</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-7754-5768</contrib-id>
<name>
<surname>Blom</surname>
<given-names>Tanja</given-names>
</name>
<xref ref-type="aff" rid="AF0001">1</xref>
</contrib>
<contrib contrib-type="author" corresp="yes">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-3304-0159</contrib-id>
<name>
<surname>Niemann</surname>
<given-names>Wesley</given-names>
</name>
<xref ref-type="aff" rid="AF0001">1</xref>
</contrib>
<aff id="AF0001"><label>1</label>Department of Business Management, Faculty of Economic and Management Sciences, University of Pretoria, Pretoria, South Africa</aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><bold>Corresponding author:</bold> Wesley Niemann, <email xlink:href="wesley.niemann@up.ac.za">wesley.niemann@up.ac.za</email></corresp>
</author-notes>
<pub-date pub-type="epub"><day>31</day><month>01</month><year>2022</year></pub-date>
<pub-date pub-type="collection"><year>2022</year></pub-date>
<volume>16</volume>
<elocation-id>623</elocation-id>
<history>
<date date-type="received"><day>09</day><month>06</month><year>2021</year></date>
<date date-type="accepted"><day>27</day><month>11</month><year>2021</year></date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2022. The Authors</copyright-statement>
<copyright-year>2022</copyright-year>
<license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>Licensee: AOSIS. This work is licensed under the Creative Commons Attribution License.</license-p>
</license>
</permissions>
<abstract>
<sec id="st1">
<title>Background</title>
<p>The coronavirus disease 2019 (COVID-19) pandemic has opened the world&#x2019;s eyes to the impact that supply chain disruptions have on our society. Supply chain disruptions can result in various long-term effects, of which reputational risk is one of the biggest. A good reputation can create value for all stakeholders of a firm, however it can also expose a firm to risk. Reputational risk has been extensively studied in supply chain management; however, the management of reputational risk during supply chain disruption recovery (SCDR) has been neglected.</p>
</sec>
<sec id="st2">
<title>Objective</title>
<p>This study explores reputational risk management during SCDR, between a logistics triad consisting of third party logistics providers (3PLs), their upstream suppliers and downstream customers within a South African context.</p>
</sec>
<sec id="st3">
<title>Method</title>
<p>A generic qualitative design was employed to collect data from five logistics triads using semi-structured interviews.</p>
</sec>
<sec id="st4">
<title>Results</title>
<p>The study found that reputational risk has a predominantly positive influence on the SCDR process. Furthermore, the study expands on existing literature by identifying additional approaches to manage corporate reputation during SCDR not evident in literature. These approaches include the use of control centres and involvement of the key account manager.</p>
</sec>
<sec id="st5">
<title>Conclusion</title>
<p>This study creates awareness for the importance of reputational risk during SCDR and also provides managers with valuable insight into how reputational risk should be managed during SCDR.</p>
</sec>
</abstract>
<kwd-group>
<kwd>reputational risk</kwd>
<kwd>disruption recovery</kwd>
<kwd>3PLs</kwd>
<kwd>triadic perspective</kwd>
<kwd>generic qualitative design</kwd>
<kwd>South Africa</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s0001">
<title>Introduction</title>
<p>Recent global events such as the coronavirus disease 2019 (COVID-19) pandemic, terrorist attacks, high-impact political affairs such as the United Kingdom&#x2019;s (UK) Brexit and the trade wars between China and the United States of America (US) have emphasised the vulnerability of supply chains (Cohen &#x0026; Kupferschmidt <xref ref-type="bibr" rid="CIT0020">2020</xref>:963; Gerschel, Martinez &#x0026; Mejean <xref ref-type="bibr" rid="CIT0040">2020</xref>:7; S&#x00E1;enz, Revilla &#x0026; Acero <xref ref-type="bibr" rid="CIT0087">2018</xref>:2). The vulnerability of supply chains does not only stem from external events, but can also originate internally within a firm, that is, labour unrest and information systems downtime (Baghersad <xref ref-type="bibr" rid="CIT0008">2018</xref>:4; Nel et al. <xref ref-type="bibr" rid="CIT0074">2018</xref>:7). These events may lead to supply chain disruptions (SCDs), which are occurrences that disrupt the standard flow of goods and generate various short- and long-term risks to the supply chain (DuHadway, Carnovale &#x0026; Hazen <xref ref-type="bibr" rid="CIT0027">2019</xref>:180; He et al. <xref ref-type="bibr" rid="CIT0046">2019</xref>:134). Financial losses are seen as the main risk caused by SCDs, however firms also experience substantial reputational damage as a result of SCDs (Elluru et al. <xref ref-type="bibr" rid="CIT0028">2019</xref>:199; Mithun Ali &#x0026; Nakade <xref ref-type="bibr" rid="CIT0072">2014</xref>:88).</p>
<p>The Business Continuity Institute reports that 31.2&#x0025; of firms experienced damage to their reputation and image as a consequence of SCDs that occurred within the firm&#x2019;s supply chains (BCI <xref ref-type="bibr" rid="CIT0017">2019</xref>:30). This reputational risk is the manifestation of events resulting from negative reactions by stakeholders, which have the possibility to harm the firm&#x2019;s image and ultimately lead to a decline in the customer base or lost profit potential (Galuchi, Rosales &#x0026; Batalha <xref ref-type="bibr" rid="CIT0034">2019</xref>:158). A good reputation can create value for all stakeholders of a firm; however it can also expose a firm to reputational risk as the expectations by stakeholders of a firm with a good reputation are higher than towards a firm with a bad reputation (Morgan <xref ref-type="bibr" rid="CIT0073">2018</xref>:1; Szwajca <xref ref-type="bibr" rid="CIT0095">2018</xref>:165&#x2013;166).</p>
<p>Supply chains are increasingly advancing into extended networks, where network partners are becoming more dependent on each other (Kamalahmadi &#x0026; Parast <xref ref-type="bibr" rid="CIT0057">2016</xref>:116; Sanchez Rodrigues, Harris &#x0026; Mason <xref ref-type="bibr" rid="CIT0089">2015</xref>:631). This interconnectedness indicates a mutual dependency on the behaviours and efforts of one another (Horn et al. <xref ref-type="bibr" rid="CIT0051">2015</xref>:193). If one network partner acts in an adverse manner, the other network partners&#x2019; reputations may be placed at risk (Petersen &#x0026; Lemke <xref ref-type="bibr" rid="CIT0079">2015</xref>:495). This behaviour can be demonstrated in the network of third party logistics providers (3PLs), their upstream suppliers and downstream customers. The 3PLs provide various logistical services, such as transportation and storage of goods for their clients (Akman &#x0026; Baynal <xref ref-type="bibr" rid="CIT0003">2014</xref>:3; Grant et al. <xref ref-type="bibr" rid="CIT0043">2014</xref>:214). They take on multiple roles in the supply chain, which vary from simple outsourcing contractors to more progressive roles such as integrators and orchestrators within focal firms&#x2019; supply chains (Azad, Dhayanidhi &#x0026; Narashiman <xref ref-type="bibr" rid="CIT0007">2011</xref>:34).</p>
<p>The outsourcing of logistical services may expose firms to various SCDs (Nel et al. <xref ref-type="bibr" rid="CIT0074">2018</xref>:10). These SCDs can lead to unmet expectations that have the potential to create a bad reputation for the 3PL with regard to poor logistics performance (Alfarsi, Lemke &#x0026; Yang <xref ref-type="bibr" rid="CIT0004">2019</xref>:1528). A good reputation has been identified as an approach to mitigate the negative consequences of an SCD (Lemke &#x0026; Petersen <xref ref-type="bibr" rid="CIT0063">2013</xref>:414; Vanhamme &#x0026; Grobben <xref ref-type="bibr" rid="CIT0099">2009</xref>:273). As stakeholders find reputational risk to be the greatest challenge to contemporary firms, further research in this field is considered as valuable (Szwajca <xref ref-type="bibr" rid="CIT0095">2018</xref>:166).</p>
</sec>
<sec id="s0002">
<title>Problem statement</title>
<p>Previous studies have investigated risks, such as macro-environmental risks (Tukamuhabwa et al. <xref ref-type="bibr" rid="CIT0098">2015</xref>:5593), supply and demand risks (He <xref ref-type="bibr" rid="CIT0045">2013</xref>:541) and process risks (Samvedi, Jain &#x0026; Chan <xref ref-type="bibr" rid="CIT0088">2013</xref>:2435). However, reputational risk is one of the biggest supply chain risks that has been overlooked, as reputational risk is not directly disruptive to resources (Lemke &#x0026; Petersen <xref ref-type="bibr" rid="CIT0063">2013</xref>:413; Tannous &#x0026; Yoon <xref ref-type="bibr" rid="CIT0096">2018</xref>:193).</p>
<p>Whilst many researchers have studied reputational risk from the perspective of external stakeholders such as the firm&#x2019;s customers, only a few have explored reputational risk from the perspective of a firm&#x2019;s upstream suppliers and downstream customers (Rebs et al. <xref ref-type="bibr" rid="CIT0083">2018</xref>:197). To encapsulate this perspective, it is suggested that a logistics triad model is followed. This will enable researchers to gain a holistic perspective of the logistics triad&#x2019;s interactions with one another (Stefansson <xref ref-type="bibr" rid="CIT0094">2006</xref>:77; Wikner &#x0026; B&#x00E4;ckstrand <xref ref-type="bibr" rid="CIT0102">2018</xref>:6). The logistics triad consists of a goods buyer, a goods supplier and a 3PL (Larson &#x0026; Gammelgaard <xref ref-type="bibr" rid="CIT0062">2001</xref>:204). This study centres its focus on 3PLs, as there is a high probability of SCDs occurring during the outsourcing of logistical services (Klibi, Martel &#x0026; Guitouni <xref ref-type="bibr" rid="CIT0060">2010</xref>:287). The 3PLs are also known to play a significant role in implementing effective supply chain risk management initiatives, emphasising the need to use 3PLs as the focus point of the research (Meyer et al. <xref ref-type="bibr" rid="CIT0070">2019</xref>:2). The 3PLs are known to operate in various industries, such as the fast-moving consumer goods (FMCG) industry, the automotive industry, the manufacturing industry and the retail industry (Foulds <xref ref-type="bibr" rid="CIT0032">2013</xref>:32). These industries experience distinct SCDs and risks (Oke &#x0026; Gopalakrishnan <xref ref-type="bibr" rid="CIT0076">2009</xref>:171&#x2013;174). Furthermore, South African firms are known to be more vulnerable and susceptible to SCDs as South Africa is a developing country (Essers <xref ref-type="bibr" rid="CIT0029">2013</xref>:63; Gereffi &#x0026; Luo <xref ref-type="bibr" rid="CIT0039">2015</xref>:56). The scope of supply chain risk management literature conducted in developing countries is limited when compared with the research conducted in developed countries (Prakash, Soni &#x0026; Rathore <xref ref-type="bibr" rid="CIT0082">2017</xref>:78).</p>
<p>Reputational risk has been studied in various elements of supply chain management, such as sustainable supply chain management (Roehrich, Grosvold &#x0026; Hoejmose <xref ref-type="bibr" rid="CIT0086">2014</xref>:695&#x2013;719), supply chain risk management (Gaudenzi, Confente &#x0026; Christopher <xref ref-type="bibr" rid="CIT0037">2015</xref>:248&#x2013;260) and educational practices in supply chain (Lemke &#x0026; Petersen <xref ref-type="bibr" rid="CIT0063">2013</xref>:413&#x2013;428). However, as far as could be determined, no studies exploring reputational risk in supply chain disruption recovery (SCDR) have been conducted.</p>
<p>This generic qualitative study explores reputational risk management during SCDR, between a logistics triad consisting of 3PLs, their upstream suppliers and downstream customers within a South African context. In particular, the study attempts to determine which approaches the logistics triad use to manage reputational risk during SCDR. Furthermore, the study also investigates what influence reputational risk has on the SCDR process. Data were collected through semi-structured interviews with senior managers of 3PLs operating in South Africa, their upstream suppliers and downstream customers across five industries.</p>
<p>This study was guided by the following two research questions:</p>
<list list-type="bullet">
<list-item><p>How do logistics triads manage reputational risk during SCDR?</p></list-item>
<list-item><p>How does reputational risk influence the SCDR process between members of a logistics triad?</p></list-item>
</list>
<p>The contribution of this study is twofold. First, the study expands on existing literature by identifying various approaches to manage reputational risk in an SCDR context. Managers can now actively manage the reputational risk that occurs in the SCDR process by having pre-determined, suggested approaches in place. This may be valuable to managers as it would ultimately enable a more effective SCDR process. Second, this study brings awareness of the importance of managing reputational risk during SCDR, as it could result in great benefits if managed properly and conversely could result in lasting negative consequences when not managed at all.</p>
<p>The remainder of this article is structured as follows. First, an extensive review of current literature is conducted. Second, the methodology used in the study is outlined. Thereafter, the findings of the study are presented and a conclusion is drawn. Finally, the study&#x2019;s potential managerial and theoretical implications are outlined followed by the limitations of the study and recommendations for further research.</p>
</sec>
<sec id="s0003">
<title>Literature review</title>
<sec id="s20004">
<title>The South African third-party logistics service providers industry</title>
<p>South Africa is the most developed country in Africa engaging in 3PL services (Karrapan et al. <xref ref-type="bibr" rid="CIT0058">2017</xref>:3). The logistics industry in South Africa is a significant contributor to the economy and supports the country in achieving a global competitive advantage (Havenga, De Bod &#x0026; Simpson <xref ref-type="bibr" rid="CIT0044">2016</xref>:6). The South African 3PL industry is also highly competitive, as an increasing number of firms are outsourcing their logistical functions (Waugh &#x0026; Luke <xref ref-type="bibr" rid="CIT0101">2011</xref>:377). A 3PL performs various logistical activities for shippers or distributors and customers (Grant et al. <xref ref-type="bibr" rid="CIT0043">2014</xref>:214). These logistical activities include: warehousing, inbound and outbound transportation and value-added services, such as repackaging and logistics network design (Coyle et al. <xref ref-type="bibr" rid="CIT0021">2013</xref>:118). The 3PLs operate in various industry verticals, which include the FMCG industry, the automotive industry, the manufacturing industry, and the retail industry (Foulds <xref ref-type="bibr" rid="CIT0032">2013</xref>:32). The role of 3PLs in developing countries such as South Africa is changing, as they can now be viewed as value-adding orchestrators within supply chains (Niemann et al. <xref ref-type="bibr" rid="CIT0075">2018</xref>:1743). The 3PLs are more focused on new ways of interaction with their clients and the type of value-added services offered (Niemann et al. <xref ref-type="bibr" rid="CIT0075">2018</xref>:1743). Furthermore, developing countries are more at risk to experience SCDs than developed countries (Tukamuhabwa, Stevenson &#x0026; Busby <xref ref-type="bibr" rid="CIT0097">2017</xref>:487). The South African logistics industry is particularly vulnerable to SCDs, as found in a recent study by Nel et al. (<xref ref-type="bibr" rid="CIT0074">2018</xref>:1&#x2013;12). These SCDs include, but are not limited to, labour unrest, border delays, cargo theft and political instability.</p>
</sec>
<sec id="s20005">
<title>Supply chain disruptions</title>
<p>Firms are vulnerable to various risks, ranging from operational risks and financial risks to reputational risks (Porterfield, Macdonald &#x0026; Griffis <xref ref-type="bibr" rid="CIT0081">2012</xref>:400&#x2013;401; Verbano &#x0026; Venturini <xref ref-type="bibr" rid="CIT0100">2013</xref>:189). A SCD can be described as an unanticipated or unforeseen event that results in an interruption in the ordinary flow of goods and materials within a supply chain network (Craighead, Blackhurst, Rungtusanatham &#x0026; Handfield <xref ref-type="bibr" rid="CIT0022">2007</xref>:132; Porterfield et al. <xref ref-type="bibr" rid="CIT0081">2012</xref>:402). The effects of SCDs propagate throughout the entire supply chain network and can have detrimental effects on each network member (Heckmann, Comes &#x0026; Nickel <xref ref-type="bibr" rid="CIT0047">2015</xref>:121). Supply chain disruptions are inevitable. It is no longer a matter of whether SCDs will occur, but rather when they will occur (Glendon &#x0026; Bird <xref ref-type="bibr" rid="CIT0041">2013</xref>:4). In order to limit the effect of SCDs on firm performance and corporate reputation, firms have to identify, respond and retaliate to SCDs in a timely and effective manner (Chang, Ellinger &#x0026; Blackhurst <xref ref-type="bibr" rid="CIT0019">2015</xref>:643; Markova et al. <xref ref-type="bibr" rid="CIT0068">2018</xref>:26). This illustrates the importance of implementing appropriate supply chain disruption management (SCDM) processes (Behdani et al. <xref ref-type="bibr" rid="CIT0011">2012</xref>:7&#x2013;8; Revilla &#x0026; Saenz <xref ref-type="bibr" rid="CIT0085">2017</xref>:7).</p>
</sec>
<sec id="s20006">
<title>Supply chain disruption management</title>
<p>Both proactive and reactive approaches exist to analyse SCDs. These approaches can respectively be referred to as supply chain risk management and SCDM (Dani &#x0026; Deep <xref ref-type="bibr" rid="CIT0026">2010</xref>:396). Traditional risk management practices involve the process of detecting potential sources of risks and the implementation of appropriate strategies to reduce the probability of an SCD from occurring (Behdani <xref ref-type="bibr" rid="CIT0010">2013</xref>; J&#x00FC;ttner, Peck &#x0026; Christopher <xref ref-type="bibr" rid="CIT0056">2003</xref>:200). The disruption management cycle is only implemented once traditional risk management practices fail to prevent the SCD from occurring (Behdani <xref ref-type="bibr" rid="CIT0010">2013</xref>). Despite the vast amount of planning and research in the field of risk management, SCDs still occur (Behdani et al. <xref ref-type="bibr" rid="CIT0011">2012</xref>). The SCDM can be defined as a systematic and ongoing process of managing and analysing the impact of SCDs throughout their entire disruption lifecycle (Behdani et al. <xref ref-type="bibr" rid="CIT0011">2012</xref>:8). The disruption management cycle comprises four actions, namely disruption detection, disruption reaction, disruption recovery and disruption learning (Ahmad, Hafeez, Rodriguez &#x0026; Dawood <xref ref-type="bibr" rid="CIT0002">2016</xref>:80&#x2013;93; Behdani <xref ref-type="bibr" rid="CIT0010">2013</xref>).</p>
<p>The first step in the disruption management cycle is to ensure that a disruption can be detected as fast as possible (DuHadway et al. <xref ref-type="bibr" rid="CIT0027">2019</xref>:190). In this step, the characteristics and expected repercussions of the SCD are outlined (Sheffi <xref ref-type="bibr" rid="CIT0092">2015</xref>:36). After the SCD has occurred, it is of vital importance to react in a timely and efficient manner. The goal of the disruption reaction step is to return the operations of the affected firm back to a normal state of functioning (Ivanov &#x0026; Dolgui <xref ref-type="bibr" rid="CIT0053">2020</xref>:2907). This step can be conducted through implementing a pre-determined plan, which can result in timesaving during the reaction period and could potentially limit the impact of the SCD on the firm&#x2019;s performance (Scholten, Sharkey Scott &#x0026; Fynes <xref ref-type="bibr" rid="CIT0090">2014</xref>:222). If this step fails to bring the operations back to a normal state of functioning, the following steps should be deployed.</p>
<p>In the disruption recovery step, the SCD is continuously monitored whilst information pertaining to the SCD is collected (Holzhauer <xref ref-type="bibr" rid="CIT0050">2016</xref>:34). Collaboration during this stage is crucial, as it is too late to implement preventative measures and it is known that parties can recover more successfully when working together (Scholten et al. <xref ref-type="bibr" rid="CIT0090">2014</xref>:219). The SCDR is not only the third step of the SCDM process, but it also forms an integral part of the supply chain resilience (SCRES) (Adobor &#x0026; McMullen <xref ref-type="bibr" rid="CIT0001">2018</xref>:1452; Hohenstein, Feisel &#x0026; Hartmann <xref ref-type="bibr" rid="CIT0049">2015</xref>:99). The basic premise of SCRES is to restore a firm&#x2019;s operations back to a normal state of functioning after an SCD has occurred (Ambulkar, Blackhurst &#x0026; Grawe <xref ref-type="bibr" rid="CIT0006">2015</xref>:112). The SCRES also builds the ability and capability to recover from SCDs and to adapt to new risk environments (Bukowski &#x0026; Feliks <xref ref-type="bibr" rid="CIT0016">2012</xref>:3). The main elements of SCRES include: readiness, response, recovery and growth (Hohenstein et al. <xref ref-type="bibr" rid="CIT0049">2015</xref>:99&#x2013;101). Recovery is viewed as a central element to SCRES by many researchers (Blackhurst, Kaitlin &#x0026; Craighead <xref ref-type="bibr" rid="CIT0013">2011</xref>:383; Wu et al. <xref ref-type="bibr" rid="CIT0103">2013</xref>:678). The recovery element focuses on the spontaneous response to SCDs, as pre-determined plans failed to suffice (Holzahuer <xref ref-type="bibr" rid="CIT0050">2016</xref>:34). A part of the SCDR process is to restore damaged reputations between supply chain network partners, as a damaged reputation is a direct consequence of an SCD (Paul, Sarker &#x0026; Essam <xref ref-type="bibr" rid="CIT0078">2018</xref>:2; Porterfield et al. <xref ref-type="bibr" rid="CIT0081">2012</xref>:417).</p>
<p>The final step in the SCDM cycle refers to the evaluation of the implemented measures during the lifetime of the SCD (Behdani <xref ref-type="bibr" rid="CIT0010">2013</xref>). In this step, the lessons learnt will be documented in order to prepare for future SCDs.</p>
</sec>
<sec id="s20007">
<title>Corporate reputation</title>
<p>A corporate reputation is the derived impression of who and what a firm represents. This impression can be acquired through either observing the way that a firm manages its assets or through individual experiences (Lloyd <xref ref-type="bibr" rid="CIT0067">2011</xref>:109; Reese &#x0026; Kossovsky <xref ref-type="bibr" rid="CIT0084">2011</xref>:24). Individuals can use various approaches to develop their impressions of a firm. These include personal experiences, the media, interaction with the firm&#x2019;s employees and their history of conducting business with a firm (Lemke &#x0026; Petersen <xref ref-type="bibr" rid="CIT0063">2013</xref>:414). A corporate reputation can further be referred to as a collection or accumulation of these individual perceptions and can be both positive and negative (Kim, Youn &#x0026; Lee <xref ref-type="bibr" rid="CIT0059">2019</xref>:683).</p>
<p>A corporate reputation has a high probability of being shifted from one network member to another (Horn et al. <xref ref-type="bibr" rid="CIT0051">2015</xref>:193). The supply chain network consists of both &#x2018;reputational owners&#x2019; and &#x2018;reputational borrowers&#x2019;. The reputational owners can be viewed as the firms that readily develop their corporate reputation by means of their market offering, communication with its customers and their participation in the community in which they operate. The reputation borrowers are the other firms in the supply chain network, such as the upstream suppliers and downstream customers, which gain corporate reputation from the reputation owners by means of association (Hoejmose, Roehrich &#x0026; Grosvold <xref ref-type="bibr" rid="CIT0048">2014</xref>:80; Petersen &#x0026; Lemke <xref ref-type="bibr" rid="CIT0079">2015</xref>:418). The transference of corporate reputation from one network member to another illustrates the ripple effect that corporate reputation has (Morgan <xref ref-type="bibr" rid="CIT0073">2018</xref>:1). A good corporate reputation can serve as a foundation to competitive advantage (Flatt &#x0026; Kowalczyk <xref ref-type="bibr" rid="CIT0031">2011</xref>:4), it can reduce the negative impact of an SCD on a firm (Vanhamme &#x0026; Grobben <xref ref-type="bibr" rid="CIT0099">2009</xref>:275) and ultimately it can increase the interest of potential clients (Soppe et al. <xref ref-type="bibr" rid="CIT0093">2011</xref>:310). Consequently, a good corporate reputation is regarded as a valuable and scarce resource and should be managed accordingly (Iwu-Egwuonwu <xref ref-type="bibr" rid="CIT0054">2011</xref>:198; Szwajca <xref ref-type="bibr" rid="CIT0095">2018</xref>:165).</p>
</sec>
<sec id="s20008">
<title>Reputational risk management</title>
<p>Reputational risk can be defined as the risk of failure to fulfil customer expectations with regard to performance and behaviour (Fitzsimmons &#x0026; Atkins <xref ref-type="bibr" rid="CIT0030">2017</xref>:39; Roehrich et al. <xref ref-type="bibr" rid="CIT0086">2014</xref>:698). The expectations of customers can be compromised through events that stem from both external and internal events. External events refer to the location of the supplier, the industry environment in which the firm operates and uncontrollable events, such as natural disasters. Internal events refer to firm-specific issues and managerial decision making (Hoejmose et al. <xref ref-type="bibr" rid="CIT0048">2014</xref>:80). There are various sources of reputational risks that can occur as a result of firm activities or the actions of their network partners (Roehrich et al. <xref ref-type="bibr" rid="CIT0086">2014</xref>:698). Gaudenzi et al. (<xref ref-type="bibr" rid="CIT0037">2015</xref>:248&#x2013;260) categorised the sources of reputational risk as macro-environmental risk drivers, operations risk drivers, finance risk drivers and supply chain risk drivers. Consequently, it is known that no firm is immune to reputational risk originating from negligible practices in their supply chain network. This calls for the effective management of reputational risk.</p>
<sec id="s30009">
<title>Reputational risk management framework</title>
<p>Various approaches exist to manage risks, which include risk avoidance, risk transference, risk mitigation and risk acceptance (Markova et al. <xref ref-type="bibr" rid="CIT0068">2018</xref>:26). However, because of the complex nature of reputational risk, it cannot be managed by applying traditional risk management practices. Estimating the likelihood of occurrence of reputational risk and the cost to the firm requires great effort and is known to be complicated (Lemke &#x0026; Petersen <xref ref-type="bibr" rid="CIT0063">2013</xref>:416). Despite it being possible to quantify the physical damage of an SCD, it is not possible to assess its impact on the consumer&#x2019;s perception of a firm&#x2019;s performance. The following framework (see <xref ref-type="fig" rid="F0001">Figure 1</xref>) suggested by Gatzert and Schmidt (<xref ref-type="bibr" rid="CIT0036">2015</xref>:26&#x2013;45), presents a methodical framework, which includes the necessary steps and processes for managing reputational risk. There are four broad areas to be discussed, each with comprehensive steps. These four areas are risk strategy, risk assessment, risk governance and risk culture, which are illustrated in <xref ref-type="fig" rid="F0001">Figure 1</xref> (Gatzert &#x0026; Schmidt <xref ref-type="bibr" rid="CIT0036">2015</xref>:31).</p>
<fig id="F0001">
<label>FIGURE 1</label>
<caption><p>Reputational risk management framework.</p></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="JTSCM-16-623-g001.tif"/>
</fig>
<p>In the first step of this framework, the activities to be conducted must be aligned and coordinated with the firm&#x2019;s overall strategic objectives. Thereafter, a risk appetite will be developed, which will define the reputation risk and how it will be measured. Based on the firm&#x2019;s distinct characteristics, experiences and objectives, the firm will choose to either accept, transfer, mitigate or avoid certain reputational risks (Gatzert &#x0026; Schmidt <xref ref-type="bibr" rid="CIT0036">2015</xref>:31; Grace et al. <xref ref-type="bibr" rid="CIT0042">2015</xref>:295).</p>
<p>The second step of this framework includes the performing of the following activities. First, the reputational risk will be identified by assigned knowledgeable teams. This is performed through brainstorming sessions and interviews with internal and external experts. The potential risks identified should include both intra-organisational risks and risks that can stem from external network partners, such as upstream suppliers and downstream customers. Second, an evaluation of the potential risk sources should be conducted. In order to successfully measure the potential reputational risk sources both qualitative and quantitative measures will be used. Thereafter, the appropriate risk response should be implemented. Possible risk responses include risk avoidance, risk mitigation, risk transfer or risk acceptance. Risk avoidance will mean that the firm will refrain from conducting certain activities in order to avoid the potential reputational risk from occurring in its entirety. Risk mitigation entails conducting certain activities that can reduce the likelihood and/or negative impact of an SCD. Risk transfer is the shifting of reputational risk to an external party through buying reputational insurance policies (Cummins, Lewis &#x0026; Wei <xref ref-type="bibr" rid="CIT0025">2006</xref>:2610; Gatzert <xref ref-type="bibr" rid="CIT0035">2015</xref>:486). In the case of risk acceptance, a firm will continue to operate without implementing preventive measures and is willing to bear all costs implicated by the risk. This will only be done if the risk has little relevance to the firm and it has a low probability of occurring. The final activity within this step is to monitor the risk by actively updating the risk identification information to ensure that the correct measures are taken to accommodate for the changing environment (Gatzert &#x0026; Schmidt <xref ref-type="bibr" rid="CIT0036">2015</xref>:31&#x2013;32; Kunitsyna, Britchenko &#x0026; Kunitsyn <xref ref-type="bibr" rid="CIT0061">2018</xref>:946).</p>
<p>Risk governance entails the identification of key stakeholders, the establishment of risk ownership and the development of strong internal and external communication channels. In this step, the &#x2018;risk owner&#x2019; is identified within a firm. The risk owner will be one person in a firm who is responsible for the overall management of reputation risks, including the building and defending of a corporate reputation, as well as to define strategies that will limit the damages to the reputation. Another activity to be conducted within this step is to establish a communication and response strategy to potential reputational risks. This will include the development of an internal reporting system and the appointment of a spokesperson who will be responsible for all communication with external parties regarding the reputation of the firm (Binkhorst &#x0026; Kingma <xref ref-type="bibr" rid="CIT0012">2012</xref>:917; Gatzert &#x0026; Schmidt <xref ref-type="bibr" rid="CIT0036">2015</xref>:32).</p>
<p>The final step in this framework refers to the establishment of a strong risk culture that will ensure the general risk awareness of the firm and increased accountability for internal actions. Senior management is responsible for setting an example to lower level employees by demonstrating the required risk approaches. Employees are also trained to increase their awareness of newly evolving reputational risks (Gabbi, Pianorsi &#x0026; Soana <xref ref-type="bibr" rid="CIT0033">2017</xref>:179; Gatzert &#x0026; Schmidt <xref ref-type="bibr" rid="CIT0036">2015</xref>:34). This will ensure increased accountability when making decisions (Brooks <xref ref-type="bibr" rid="CIT0015">2010</xref>:87).</p>
</sec>
<sec id="s30010">
<title>Tools for effective reputational risk management</title>
<p>Various tools for the effective management of reputational risk management exist, to facilitate the creation of brand awareness, increasing the image of the firm and to analyse customer feedback (Altunbas &#x0026; Diker <xref ref-type="bibr" rid="CIT0005">2015</xref>:43). Social media can be viewed as one of the most effective tools for the management of reputational risk, as it can be used to gain customer loyalty, increase customer satisfaction and identify potential risks (Altunbas &#x0026; Diker <xref ref-type="bibr" rid="CIT0005">2015</xref>:45). It is important to note that social media can further impose risks to a firm&#x2019;s corporate reputation and should therefore be managed cautiously (Becker &#x0026; Wan Lee <xref ref-type="bibr" rid="CIT0009">2019</xref>:233). More traditional tools to manage reputational risk include surveys, focus groups and polls. These tools are specifically used to gain feedback in order to measure the success of a firm&#x2019;s corporate reputation and its relationships with its network members (McCorkindale &#x0026; DiStaso 2015:503&#x2013;504). Reputational risk can also be managed through conventional contractual obligations concerning agreed upon service levels, regarding availability, quality and cost (Petersen &#x0026; Lemke <xref ref-type="bibr" rid="CIT0079">2015</xref>:508). Partnering programmes can also be used to manage reputational risk. These programmes entail network members working together in order to minimise the risk and are known to be effective (Jakob <xref ref-type="bibr" rid="CIT0055">2012</xref>:259). However, they have a limited influence on network members further down the supply network (Petersen &#x0026; Lemke <xref ref-type="bibr" rid="CIT0079">2015</xref>:508).</p>
</sec>
</sec>
</sec>
<sec id="s0011">
<title>Methodology</title>
<sec id="s20012">
<title>Research design</title>
<p>This study used a generic qualitative research design to explore a phenomenon in its natural environment and to gain a deeper understanding thereof (Creswell &#x0026; Poth <xref ref-type="bibr" rid="CIT0024">2017</xref>:7). In this case, the researchers explored reputational risk management during the SCDR process. The study employed primary data that were collected through semi-structured interviews with various participants.</p>
</sec>
<sec id="s20013">
<title>Sampling</title>
<p>The units of analysis for this study were the triadic relationships between 3PLs, their upstream suppliers and downstream customers, operating in South Africa. Fifteen individuals from different firms participated in this study, of which five were upstream suppliers, five were 3PLs and five were downstream customers. This allowed for the successful interviewing of five logistics triads. Through implementing purposive sampling, the researchers were able to select and recruit applicable logistics triads and the most suitable individuals who could make a valuable contribution to the phenomenon under investigation (Creswell <xref ref-type="bibr" rid="CIT0023">2012</xref>:206; Gentles et al. <xref ref-type="bibr" rid="CIT0038">2015</xref>:1778).</p>
<p>Snowball and homogenous sampling were used as the specific purposive sampling methods. Snowball sampling requires researchers to request referrals from participants who form part of the inclusion criteria. Therefore, snowball sampling was the most appropriate method, as the study required the perspective of triadic relationships between 3PLs, upstream suppliers and downstream customers. Another sampling method used was homogenous sampling, which is used to recruit participants who possess similar characteristics (Creswell <xref ref-type="bibr" rid="CIT0023">2012</xref>:208). Homogenous sampling is particularly useful when a deeper comprehension about the phenomenon under investigation is required, as it decreases the variability in the sample (Isaacs <xref ref-type="bibr" rid="CIT0052">2014</xref>:320; Polit &#x0026; Beck <xref ref-type="bibr" rid="CIT0080">2012</xref>:518). In this study, the 3PL firms were sampled first and then the respective upstream suppliers and downstream customers, all of which met the set inclusion criteria.</p>
<p>The first level of sampling included the recruitment of the 3PL firms and the firms of their respective upstream suppliers and downstream customers and was conducted as follows: First, as the study required a triadic perspective, firms who did not form part of a direct relationship with the 3PL were excluded from the study. Second, the relationship between the firms had to be established for a minimum duration of 1 to 2 years, as an established relationship would be of strategic nature and not merely transactional. In addition, all participating firms had to operate in South Africa. Finally, the participating firms had to experience a mutual SCD, that is, within their supply chain network, as SCDR forms part of the context of the study.</p>
<p>The second level of sampling included the recruitment of the individual participants. The individual participants were selected based on the following inclusion criteria. First, the individuals had to be in either mid- or senior-level management, as this ensured that the participant had experience in his or her field. Second, the individual had to be working at the firm in question for at least 12 months and should have had frequent interaction with the rest of the firms in the logistics triad. This ensured that the direct link between the firms could be investigated. Finally, the participant must have experienced an SCD with the other firms in the logistics triad, as this enabled the participants to provide valuable insights concerning the SCDR process. <xref ref-type="table" rid="T0001">Table 1</xref> outlines the details of the participants interviewed.</p>
<table-wrap id="T0001">
<label>TABLE 1</label>
<caption><p>Details of participants interviewed.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left">Pseudonym</th>
<th valign="top" align="left">Position</th>
<th valign="top" align="left">Gender</th>
<th valign="top" align="left">Length of interview</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">U1</td>
<td align="left">Head: Courier division</td>
<td align="left">Male</td>
<td align="left">44:13:00</td>
</tr>
<tr>
<td align="left">T1</td>
<td align="left">Executive: Supply chain and business development</td>
<td align="left">Male</td>
<td align="left">35:25:00</td>
</tr>
<tr>
<td align="left">D1</td>
<td align="left">Inbound and outbound transport manager</td>
<td align="left">Male</td>
<td align="left">36:13:00</td>
</tr>
<tr>
<td align="left">U2</td>
<td align="left">Supply chain manager</td>
<td align="left">Female</td>
<td align="left">28:46:00</td>
</tr>
<tr>
<td align="left">T2</td>
<td align="left">Senior account director (consumer, retail and fashion)</td>
<td align="left">Male</td>
<td align="left">39:06:00</td>
</tr>
<tr>
<td align="left">D2</td>
<td align="left">Chief executive: Supply chain</td>
<td align="left">Male</td>
<td align="left">55:16:00</td>
</tr>
<tr>
<td align="left">U3</td>
<td align="left">Group planning manager</td>
<td align="left">Male</td>
<td align="left">28:34:00</td>
</tr>
<tr>
<td align="left">T3</td>
<td align="left">Key account manager</td>
<td align="left">Female</td>
<td align="left">31:33:00</td>
</tr>
<tr>
<td align="left">D3</td>
<td align="left">Supply chain executive</td>
<td align="left">Male</td>
<td align="left">45:01:00</td>
</tr>
<tr>
<td align="left">U4</td>
<td align="left">Head of supply chain (Africa and Brazil)</td>
<td align="left">Male</td>
<td align="left">37:54:00</td>
</tr>
<tr>
<td align="left">T4</td>
<td align="left">Key account manager</td>
<td align="left">Female</td>
<td align="left">26:31:00</td>
</tr>
<tr>
<td align="left">D4</td>
<td align="left">International &#x0026; 4PL supply chain manager</td>
<td align="left">Female</td>
<td align="left">26:31:00</td>
</tr>
<tr>
<td align="left">U5</td>
<td align="left">Deputy responsible pharmacist</td>
<td align="left">Male</td>
<td align="left">44:50:00</td>
</tr>
<tr>
<td align="left">T5</td>
<td align="left">Deputy DC manager</td>
<td align="left">Male</td>
<td align="left">40:39:00</td>
</tr>
<tr>
<td align="left">D5</td>
<td align="left">Senior pharmacist</td>
<td align="left">Female</td>
<td align="left">20:35:00</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn><p>Average length of interview 36:04:00.</p></fn>
</table-wrap-foot>
</table-wrap>
</sec>
<sec id="s20014">
<title>Data collection</title>
<p>Fifteen semi-structured interviews were conducted to gain a deeper understanding of the phenomenon under investigation (Creswell <xref ref-type="bibr" rid="CIT0023">2012</xref>:218; Patton <xref ref-type="bibr" rid="CIT0077">2015</xref>:14). The interviews were guided by a discussion guide; however, the interviews were not limited to these questions and questions were added spontaneously in order to gather more information (Cachia &#x0026; Millward <xref ref-type="bibr" rid="CIT0018">2011</xref>:268). The discussion guide was pre-tested with a participant who met the inclusion criteria. Interviews were conducted online using a webcam-enabled device. The interviews were conducted within a 45-min time frame and the average interview was 36 min long. Permission to audio&#x2248;record the conversation was obtained before the commencement of the interview. The informed consent form was also discussed and requested to be signed before the commencement of the interview.</p>
</sec>
<sec id="s20015">
<title>Data analysis</title>
<p>Thematic data analysis was used to analyse the data collected in this study. Transcriptions were extensively analysed and thereafter codes were identified. Certain extracts that related to the study&#x2019;s research questions were assigned tags, which made up the codes of the transcriptions. Thereafter, repetitive and overlapping codes were grouped together to prevent redundancy. Finally, sense-making of the data took place, where sub-themes and themes were identified (Braun &#x0026; Clarke <xref ref-type="bibr" rid="CIT0014">2012</xref>:57).</p>
</sec>
<sec id="s20016">
<title>Trustworthiness</title>
<p>The study applied Lincoln and Guba&#x2019;s (<xref ref-type="bibr" rid="CIT0066">1985</xref>) trustworthiness criteria, in order to demonstrate the credibility, dependability, confirmability and transferability of the study (Polit &#x0026; Beck <xref ref-type="bibr" rid="CIT0080">2012</xref>:584). Credibility requires the alignment of the participants&#x2019; perspectives and the true state of the phenomenon under investigation (Polit &#x0026; Beck <xref ref-type="bibr" rid="CIT0080">2012</xref>:585; Shenton <xref ref-type="bibr" rid="CIT0091">2004</xref>:64). Before the interviews commenced, the participants&#x2019; anonymity and confidentiality were communicated to ensure that the participants provided their full and honest account of events throughout the interviews. Dependability or auditability refers to the potential of a study&#x2019;s findings to be consistently replicated when applied to a comparable context with comparable participants (Polit &#x0026; Beck <xref ref-type="bibr" rid="CIT0080">2012</xref>:585) and to comply with the dependability criteria (Lincoln &#x0026; Guba <xref ref-type="bibr" rid="CIT0066">1985</xref>:43). The study includes an audit trail, which outlines the methodology applied (Lietz &#x0026; Zayas <xref ref-type="bibr" rid="CIT0065">2010</xref>:196). Confirmability indicates whether the findings of the study are a true reflection of the participants&#x2019; accounts and are presented in an objective manner that is not influenced by the researcher&#x2019;s own preferences or biases (Polit &#x0026; Beck <xref ref-type="bibr" rid="CIT0080">2012</xref>:585). The study developed broad open-ended interview questions so that participants could provide an unbiased account of events. The researchers also transcribed the interviews in great detail to ensure the accuracy of the data collected (Milne &#x0026; Oberle <xref ref-type="bibr" rid="CIT0071">2005</xref>:415). Transferability is the ability of a study&#x2019;s findings to be applied to a similar context or situation (Polit &#x0026; Beck <xref ref-type="bibr" rid="CIT0080">2012</xref>:585; Liamputtong <xref ref-type="bibr" rid="CIT0064">2013</xref>:26). The researchers provided sufficient detail on the study&#x2019;s context for future researchers. This will allow the future researchers to determine whether the study can be applied to a new context or not (Shenton <xref ref-type="bibr" rid="CIT0091">2004</xref>:70).</p>
</sec>
<sec id="s20017">
<title>Ethical considerations</title>
<p>Before the commencement of the interviews, each participant read and signed the informed consent form where they voluntarily agreed to participate in this study. The anonymity and confidentiality of the participant&#x2019;s names and responses were also discussed before the commencement of the interviews. Furthermore, the confidentiality and anonymity of the participants were ensured by assigning and using pseudonyms throughout the study.</p>
</sec>
</sec>
<sec id="s0018">
<title>Findings</title>
<p>This study has identified two main themes with four sub-themes that relate back to the study&#x2019;s research questions. The main themes include: approaches used to manage reputational risk during SCDR, and the influence of reputational risk on the SCDR process. These themes are followed by their respective sub-themes and are supported by raw data extracts. <xref ref-type="table" rid="T0002">Table 2</xref> illustrates the linkage between the themes, sub-themes and codes.</p>
<table-wrap id="T0002">
<label>TABLE 2</label>
<caption><p>Summary of themes, sub-themes and codes.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left">Research questions</th>
<th valign="top" align="left">RQ1: How do logistics triads manage reputational risk during supply chain disruption recovery?</th>
<th valign="top" align="left">RQ2: How does reputational risk influence the supply chain disruption recovery process between members of a logistics triad?</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">Themes</td>
<td align="left">Approaches used to manage reputational risk during supply chain disruption recovery.</td>
<td align="left">The influence of reputational risk on the supply chain disruption recovery process.</td>
</tr>
<tr>
<td align="left">Sub-themes</td>
<td align="left"><bold>Formal approaches:</bold>
<list list-type="bullet">
<list-item><p>Control centres</p></list-item>
<list-item><p>Customer service teams</p></list-item>
<list-item><p>Global corporate policies</p></list-item>
<list-item><p>Key account manager involvement</p></list-item>
<list-item><p>Use of performance measurement systems</p></list-item>
<list-item><p>Standard operating procedures</p></list-item>
</list>
<bold>Informal approaches:</bold>
<list list-type="bullet">
<list-item><p>Customer engagement during recovery</p></list-item>
<list-item><p>Internal collaboration</p></list-item>
<list-item><p>Network partner collaboration</p></list-item>
<list-item><p>Feedback sessions post recovery</p></list-item>
<list-item><p>Communication tools</p></list-item></list></td>
<td align="left"><bold>Enabling-facilitating impact</bold>
<list list-type="bullet">
<list-item><p>Enables quicker recovery</p></list-item>
<list-item><p>Helps gain confidence in service capability</p></list-item>
</list>
<bold>Damaging-hindering impact</bold>
<list list-type="bullet">
<list-item><p>Lost confidence in service ability</p></list-item>
<list-item><p>Unsuccessful recovery because of lost customers</p></list-item></list></td>
</tr>
</tbody>
</table>
</table-wrap>
<sec id="s20019">
<title>Theme 1: Approaches used to manage reputational risk during supply chain disruption recovery</title>
<p>The first theme corresponds with research question one, as it refers to the specific approaches that logistics triads follow to manage reputational risk during SCDR. The study identified 13 reputational risk management approaches used during SCDR. Subsequently, the approaches were categorised according to their uses, namely formal and informal approaches. <xref ref-type="table" rid="T0003">Table 3</xref> provides an outline of theme one with extracts from the data to support the findings.</p>
<table-wrap id="T0003">
<label>TABLE 3</label>
<caption><p>Reputational risk management approaches used during supply chain disruption recovery.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left" rowspan="2">Approaches used to manage reputational risk during SCDR</th>
<th valign="top" align="center" colspan="5">Upstream suppliers<hr/></th>
<th valign="top" align="center" rowspan="2">Total</th>
<th valign="top" align="center" colspan="5">3PLs<hr/></th>
<th valign="top" align="center" rowspan="2">Total</th>
<th valign="top" align="center" colspan="5">Downstream customers<hr/></th>
<th valign="top" align="center" rowspan="2">Total</th>
<th valign="top" align="left" colspan="2" rowspan="2">Supporting data extracts</th>
</tr>
<tr>
<th valign="top" align="center">U1</th>
<th valign="top" align="center">U2</th>
<th valign="top" align="center">U3</th>
<th valign="top" align="center">U4</th>
<th valign="top" align="center">U5</th>
<th valign="top" align="center">T1</th>
<th valign="top" align="center">T2</th>
<th valign="top" align="center">T3</th>
<th valign="top" align="center">T4</th>
<th valign="top" align="center">T5</th>
<th valign="top" align="center">D1</th>
<th valign="top" align="center">D2</th>
<th valign="top" align="center">D3</th>
<th valign="top" align="center">D4</th>
<th valign="top" align="center">D5</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" colspan="21"><bold>Formal approaches</bold></td>
</tr>
<tr>
<td align="left">Control centres</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">0</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">0</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">&#x2713;</td>
<td align="left"></td>
<td align="center">1</td>
<td align="left" colspan="2">&#x2018;&#x2026;the control centre lets you intervene from supplier all the way through to store&#x2026;&#x2019; (D4, female, International &#x0026; 4PL supply chain manager)</td>
</tr>
<tr>
<td align="left">Customer service teams</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">&#x2713;</td>
<td align="left"></td>
<td align="center">1</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">0</td>
<td align="center">&#x2713;</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">1</td>
<td align="left" colspan="2">&#x2018;we have a dedicated customer service team, group, that deals with these customer service interactions. They are trained to deal with our customers&#x2026;&#x2019; (U4, male, Head of supply chain)</td>
</tr>
<tr>
<td align="left">Global corporate policies</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">0</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">&#x2713;</td>
<td align="left"></td>
<td align="center">1</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">0</td>
<td align="left" colspan="2">&#x2018;We, we have, uh, global corporate policies in place around stuff like that&#x2026;&#x2019; (T4, female, Key account manager)</td>
</tr>
<tr>
<td align="left">Key account manager involvement</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">0</td>
<td align="left"></td>
<td align="left"></td>
<td align="center">&#x2713;</td>
<td align="center">&#x2713;</td>
<td align="left"></td>
<td align="center">2</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">0</td>
<td align="left" colspan="2">&#x2018;I mean, we&#x2019;re not going to allow reputation to just go down the drain, not at all. And, you know, we have, we have individuals who, you know, can also assist us with that kind of thing, such as our key accounts managers&#x2019;. (T4, female, Key account manager)</td>
</tr>
<tr>
<td align="left">Use of performance measurement systems</td>
<td align="center">&#x2713;</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">1</td>
<td align="left"></td>
<td align="center">&#x2713;</td>
<td align="left"></td>
<td align="center">&#x2713;</td>
<td align="center">&#x2713;</td>
<td align="center">3</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">0</td>
<td align="left" colspan="2">&#x2018;So, you need transparent KPIs where you can identify where things are going wrong&#x2026;&#x2019; (T2, male, Senior account director)</td>
</tr>
<tr>
<td align="left">Standard operating procedure</td>
<td align="center">&#x2713;</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">1</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">0</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">0</td>
<td align="left" colspan="2">&#x2018;Um, we obviously had our SOPs that governed us&#x2026;&#x2019; (U1, male, Head: Courier division)</td>
</tr>
<tr>
<td align="left" colspan="21"><hr/></td>
</tr>
<tr>
<td align="left"><bold>Total perspective</bold></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center"><bold>2</bold></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center"><bold>4</bold></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center"><bold>2</bold></td>
<td align="left"><bold>Total</bold></td>
<td align="left"><bold>8</bold></td>
</tr>
<tr>
<td align="left" colspan="21"><hr/></td>
</tr>
<tr>
<td align="left" colspan="21"><bold>Informal approaches</bold></td>
</tr>
<tr>
<td align="left">Customer engagement during recovery</td>
<td align="left"></td>
<td align="left"></td>
<td align="center">&#x2713;</td>
<td align="left"></td>
<td align="left"></td>
<td align="center">1</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">0</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">0</td>
<td align="left" colspan="2">&#x2018;&#x2026;I mean, we, we basically, sat together to speak to our customer and through that managed our image&#x2019;. (U3, male, Group planning manager)</td>
</tr>
<tr>
<td align="left">Internal collaboration</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">0</td>
<td align="left"></td>
<td align="left"></td>
<td align="center">&#x2713;</td>
<td align="left"></td>
<td align="left"></td>
<td align="center">1</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">&#x2713;</td>
<td align="center">1</td>
<td align="left" colspan="2">&#x2018;I worked very closely with my teams internally. Um, touching base with them on a daily basis&#x2026;&#x2019; (T3, female, Key account manager)</td>
</tr>
<tr>
<td align="left">Network partner collaboration</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">0</td>
<td align="left"></td>
<td align="center">&#x2713;</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">1</td>
<td align="left"></td>
<td align="left"></td>
<td align="center">&#x2713;</td>
<td align="center">&#x2713;</td>
<td align="left"></td>
<td align="center">2</td>
<td align="left" colspan="2">&#x2018;We would try and work with which ever one of our network partners dropped the ball and get them involved in the process of mitigating the reputational damage&#x2026;&#x2019; (T2, male, Senior account director)</td>
</tr>
<tr>
<td align="left">Feedback sessions post-recovery</td>
<td align="center">&#x2713;</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">1</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">0</td>
<td align="left"></td>
<td align="center">&#x2713;</td>
<td align="center">&#x2713;</td>
<td align="left"></td>
<td align="left"></td>
<td align="center">2</td>
<td align="left" colspan="2">&#x2018;&#x2026;I think it&#x2019;s important to touch base with your client base afterwards&#x2019;. (U1, male, Head: Courier division)</td>
</tr>
<tr>
<td align="left">Communication tools</td>
<td align="left"></td>
<td align="center">&#x2713;</td>
<td align="left"></td>
<td align="center">&#x2713;</td>
<td align="center">&#x2713;</td>
<td align="center">3</td>
<td align="center">&#x2713;</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">1</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">0</td>
<td align="left" colspan="2">&#x2018;Um, so clear communication, emails that&#x2019;s sent out explaining to them the situation and, um, and what processes and steps she&#x2019;s taken and what their expectations can be of us, um, needs to be in place&#x2019;. (T5, male, Deputy DC Manager)</td>
</tr>
<tr>
<td align="left" colspan="21"><hr/></td>
</tr>
<tr>
<td align="left"><bold>Total per member</bold></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center"><bold>5</bold></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center"><bold>3</bold></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center"><bold>3</bold></td>
<td align="left"><bold>Total</bold></td>
<td align="left"><bold>11</bold></td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn><p>SCDR, supply chain disruption recovery.</p></fn>
</table-wrap-foot>
</table-wrap>
<sec id="s30020">
<title>Formal approaches</title>
<p>Formal approaches refer to established approaches that form part of the contractual obligations set between the members of the logistics triad. These approaches are developed before the initiation of the relationships and are set in place to guide network members through SCDs. The formal approaches identified include: control centres, customer service teams, global corporate policies, key account manager involvement, the use of performance measurement systems and standard operating procedures.</p>
<p>Control centres are centralised pre-established teams that take the lead in managing reputational risk once a disruption has occurred. These teams serve as the hub of managing reputational risk, as they govern all decisions to be made during SCDR. This assists firms in managing the reputational risk during SCDR. One participant mentioned control centres as an approach to managing reputational risk during SCDR.</p>
<p>Customer service teams are dedicated teams that deal with customer queries during SCDR and help to manage the customer-induced uncertainty. Customer service teams consist of trained professionals who deal with the customers of firms. These teams help to manage the reputational risk from the customer&#x2019;s perspective during SCDR. Two participants highlighted the implementation of customer service teams as an approach in managing reputational risk during SCDR.</p>
<p>Another approach used to manage reputational risk during SCDR is the use of global corporate policies and standard operating procedures. Two participants described these as blueprints that are set by a firm&#x2019;s head offices that guide firms through reputational risk management during SCDR. These policies and procedures are agreed upon by all network members and help to govern the actions of the members during SCDR. This helps to manage reputational risk, as all network members have a clear understanding of their role in the SCDR process.</p>
<p>Key account manager&#x2019;s involvement can also be used as an approach to manage reputational risk during SCDR. Key account managers are assigned employees who consistently engage with a firm&#x2019;s suppliers during SCDR, and this assists in managing the reputational risk. The key account managers are dedicated to these specific suppliers and serve as the link in communication between the two network members. Two participants described the use of key account manager involvement as an approach to manage reputational risk during SCDR.</p>
<p>The final approach to managing reputational risk during SCDR is the use of performance measurement systems, such as service level agreements and formal key performance indicators. Four participants mentioned these measurements as approaches that can help firms to identify areas where reputational risk occurs. They also aid firms in monitoring these high-risk areas and subsequently manage SCDR.</p>
<p>Evidently 3PLs view the use of formal approaches as imperative in managing reputational risk during SCDR, whereas upstream suppliers and downstream customers only use formal approaches to a limited extent. As 3PLs are service providers to both upstream suppliers and downstream customers, it is important that they use formal approaches to manage reputational risk during SCDR. This will aid them in providing a consistent service to all their customers. This is confirmed by the raw data extracts found in <xref ref-type="table" rid="T0004">Table 4</xref>.</p>
<table-wrap id="T0004">
<label>TABLE 4</label>
<caption><p>Influences of reputational risk on the supply chain disruption recovery process.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left" rowspan="2">The influence of reputational risk on the supply chain disruption recovery process</th>
<th valign="top" align="center" colspan="5">Upstream suppliers<hr/></th>
<th valign="top" align="center" rowspan="2">Total</th>
<th valign="top" align="center" colspan="5">3PLs<hr/></th>
<th valign="top" align="center" rowspan="2">Total</th>
<th valign="top" align="center" colspan="5">Downstream customers<hr/></th>
<th valign="top" align="center" rowspan="2">Total</th>
<th valign="top" align="left" colspan="2" rowspan="2">Supporting data extracts</th>
</tr>
<tr>
<th valign="top" align="center">U1</th>
<th valign="top" align="center">U2</th>
<th valign="top" align="center">U3</th>
<th valign="top" align="center">U4</th>
<th valign="top" align="center">U5</th>
<th valign="top" align="center">T1</th>
<th valign="top" align="center">T2</th>
<th valign="top" align="center">T3</th>
<th valign="top" align="center">T4</th>
<th valign="top" align="center">T5</th>
<th valign="top" align="center">D1</th>
<th valign="top" align="center">D2</th>
<th valign="top" align="center">D3</th>
<th valign="top" align="center">D4</th>
<th valign="top" align="center">D5</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" colspan="21"><bold>Enabling-facilitating impact</bold></td>
</tr>
<tr>
<td align="left">Enables quicker recovery</td>
<td align="center">&#x2713;</td>
<td align="left"></td>
<td align="center">&#x2713;</td>
<td align="left"></td>
<td align="left"></td>
<td align="center">2</td>
<td align="center">&#x2713;</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">&#x2713;</td>
<td align="center">2</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">0</td>
<td align="left" colspan="2">&#x2018;So, it helped us to recover faster should it happen again. So now that it has happened, um, we know what to expect and then we basically did disaster planning, should it happen again&#x2019;. (T5, male, Deputy DC Manager)</td>
</tr>
<tr>
<td align="left">Enables higher service level</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">0</td>
<td align="center">&#x2713;</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">1</td>
<td align="left"></td>
<td align="left"></td>
<td align="center">&#x2713;</td>
<td align="left"></td>
<td align="left"></td>
<td align="center">1</td>
<td align="left" colspan="2">&#x2018;The spindle was that we actually won additional contracts that were in a test phase of our supply chain, it sort of gave it credence and gave it a proper validation and customers onboarded themselves quicker than they would have done naturally as a proof in the pudding kind of concept by executing our services&#x2019;. (T1, male, Executive: Supply Chain &#x0026; Business development)</td>
</tr>
<tr>
<td align="left" colspan="21"><hr/></td>
</tr>
<tr>
<td align="left"><bold>Total per perspective</bold></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center"><bold>2</bold></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center"><bold>2</bold></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center"><bold>1</bold></td>
<td align="left"><bold>Total</bold></td>
<td align="left"><bold>5</bold></td>
</tr>
<tr>
<td align="left" colspan="21"><hr/></td>
</tr>
<tr>
<td align="left" colspan="21"><bold>Damaging-hindering impact</bold></td>
</tr>
<tr>
<td align="left">Lost confidence in service ability</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">0</td>
<td align="left"></td>
<td align="left"></td>
<td align="center">&#x2713;</td>
<td align="left"></td>
<td align="left"></td>
<td align="center">1</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">0</td>
<td align="left" colspan="2">&#x2018;&#x2026;there&#x2019;s a bit of reluctance for some of the projects because they they&#x2019;re quite scared that what they face this year is going to roll on to next year. So none of the plans for next year and the projects that we want to do for next year will be successful if we&#x2019;re in the same situation as what we are currently in&#x2019;. (T3, female, Key account manager)</td>
</tr>
<tr>
<td align="left">Unsuccessful recovery due to lost customers</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">0</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">&#x2713;</td>
<td align="center">1</td>
<td align="center">&#x2713;</td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center">1</td>
<td align="left" colspan="2">&#x2018;Um, if we cannot deliver the, um, our services to the best, it&#x2019;s easy for our customers, uh, to open accounts with another wholesaler&#x2019;. (T5, male, Deputy DC manager)</td>
</tr>
<tr>
<td align="left" colspan="21"><hr/></td>
</tr>
<tr>
<td align="left"><bold>Total per member</bold></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center"><bold>0</bold></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center"><bold>2</bold></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="left"></td>
<td align="center"><bold>1</bold></td>
<td align="left"><bold>Total</bold></td>
<td align="left"><bold>3</bold></td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s30021">
<title>Informal approaches</title>
<p>Informal approaches refer to reputational risk management approaches that are developed spontaneously during the attempt to recover from a SCD. These approaches are not regulated by set rules or contractual obligations. Therefore, these specific approaches can be categorised as unplanned, informal approaches. The informal approaches identified include: customer engagement during recovery, internal collaboration, network partner collaboration, feedback sessions post recovery and communication tools.</p>
<p>Customer engagement during recovery refers to the linkage that is formed between customers and suppliers during SCDR to help manage reputational risk. One participant explained how regular interaction with customers during SCDR can help to manage reputational risk. The customer is constantly kept updated on the recovery process, which helps to manage the firm&#x2019;s reputation.</p>
<p>Internal collaboration takes place when firms&#x2019; internal functions work together to manage reputational risk that occurs with their network partners during SCDR. One participant explained how the functions of a firm can convey a consistent message to network partners, which aids in managing the reputational risk during SCDR.</p>
<p>Network partner collaboration helps to manage reputational risk during SCDR as the firm and its network partners work together to recover from a disruption. This external collaboration helps network partners to identify responsible parties that have to take the lead in managing the SCDR processes and in turn protects the corporate reputation of the other network partners involved. Three participants mentioned the use of network partner collaboration as an effective approach to managing reputational risk during SCDR.</p>
<p>Feedback sessions post recovery were highlighted as an important approach to manage reputational risk during SCDR by three participants. These feedback sessions refer to regular meetings or sessions held with network partners after the SCDR process has taken place. This helps to establish a trusting relationship, which aids in managing reputational risk during SCDR.</p>
<p>Finally, communication tools such as emails and social media are used to communicate with network partners, which assist in managing the reputational risk of firms during SCDR. These communication tools are put in place to convey important messages to the firm&#x2019;s network partners. These messages usually contain real-time information, which helps network partners to understand the SCDR process better and in turn helps to manage the reputational risk. Four participants mentioned the use of communication tools to manage reputational risk during SCDR.</p>
<p>Evidently upstream suppliers prefer to use informal approaches to manage reputational risk during SCDR, whereas 3PLs and downstream customers use informal tools only to a limited extent. This may be as a result of the position of the upstream supplier in the supply chain network. Upstream suppliers have more difficulty in managing SCDs downstream, and therefore they cannot plan and develop formal approaches. Hence, upstream suppliers prefer to use unplanned, spontaneous informal approaches to manage reputational risk during SCDR. This is confirmed by the raw data extracts found in <xref ref-type="table" rid="T0003">Table 3</xref>.</p>
<p>The findings confirm various approaches to manage reputational risk found in literature. First, the study confirms the use of social media as an effective reputational risk management approach used during SCDR (Altunbas &#x0026; Diker <xref ref-type="bibr" rid="CIT0005">2015</xref>:45). Second, the use of more traditional approaches, such as customer engagement and communication, is also confirmed (McCorkindale &#x0026; DiStaso 2015:503&#x2013;504). Third, the findings correlate with the use of contractual obligations as an approach to manage reputational risk during SCDR, as the study found formal approaches, such as set standard operating procedures and service level agreements to be evident (Bernstein 2015:563; Petersen &#x0026; Lemke <xref ref-type="bibr" rid="CIT0079">2015</xref>:508). Finally, partnering programmes or collaborative efforts as observed by Jakob (<xref ref-type="bibr" rid="CIT0055">2012</xref>:259), were also found to be evident in this study&#x2019;s findings. Furthermore, the study identified additional approaches to managing reputational risk during SCDR that are not evident in literature. These approaches are all categorised as formal and include the use of control centres, global corporate policies and key account manager involvement.</p>
</sec>
</sec>
<sec id="s20022">
<title>Theme 2: The influence of reputational risk on the supply chain disruption recovery process</title>
<p>The second theme relates back to research question two as it addresses the influence that reputational risk has on the SCDR process. The study identified four different impacts that reputational risk has on the SCDR process. Thereafter, the impacts were divided according to whether they enabled the process or hindered the process. <xref ref-type="table" rid="T0004">Table 4</xref> provides a summary of theme two and includes data extracts that support the findings.</p>
<sec id="s30023">
<title>Enabling-facilitating impact</title>
<p>The Enabling-facilitating impact refers to how reputational risk can, in effect, allow the SCDR process to be conducted more effectively and efficiently. The enabling or facilitating impact stems from two sources, namely quicker recovery and the motivation to perform at a higher service level. The study found that reputational risk served as a motivator for firms to retain their customers and resulted in a more successful recovery. Four participants mentioned that reputational risk helped them to recover quicker from the SCD, as they were focused on maintaining a strong corporate reputation and therefore had to act quicker in the recovery process. This is illustrated by the data extract found in <xref ref-type="table" rid="T0004">Table 4</xref>. One participant mentioned that reputational risk enabled a more effective recovery, as the firm was forced to perform at a higher service level in order to maintain the strong corporate reputation. This also resulted in the establishment of successful future relationships, which is a direct result of a successful SCDR process. The supporting data extract can be found in <xref ref-type="table" rid="T0004">Table 4</xref>.</p>
</sec>
<sec id="s30024">
<title>Damaging-hindering impact</title>
<p>The Damaging-hindering impact refers to the negative consequences that reputational risk can have on the SCDR process. The study found that reputational risk can serve as a hindrance in recovering more successfully from an SCD. This is as a result of two factors, namely the network partners&#x2019; loss of confidence in the firm&#x2019;s service ability and ultimately the loss of customers. One participant mentioned that the reputational risk hindered successful recovery as a result of their network partners losing confidence in their firm&#x2019;s ability to perform at certain service levels. The network partners were reluctant to engage with the firm in future projects and this resulted in the recovery process being unsuccessful. The supporting data extract can be found in <xref ref-type="table" rid="T0004">Table 4</xref>. Two participants observed that they lost customers because of the reputational risk, which in turn hindered the SCDR process. As the firm was unable to deliver at certain service levels, its network partners decided to take their business elsewhere. The loss of customers because of an SCD is a prime example of a failed SCDR attempt and thus exemplifies how reputational risk can lead to an unsuccessful SCDR process. This is illustrated by the data extract found in <xref ref-type="table" rid="T0004">Table 4</xref>.</p>
<p>The study found that more participants view the influence of reputational risk on the SCDR process as positive since reputational risk motivated the firms to recover in a more efficient and effective manner. These findings were evenly distributed across all perspectives and it can be concluded that all perspectives have the same perception of the influence that reputational risk has on the SCDR process.</p>
<p>Existing literature emphasises how reputational risk can be damaging to all aspects of a firm, including its ability to recover from SCDs (Galuchi et al. <xref ref-type="bibr" rid="CIT0034">2019</xref>:158; Morgan <xref ref-type="bibr" rid="CIT0073">2018</xref>:1). However, the findings of this study clearly contradict this statement as most participants stated that reputational risk has an enabling or facilitating impact on the SCDR process. Instead, reputational risk enables the SCDR process to be conducted more efficiently and effectively. Reputational risk also serves as a motivator for firms to perform at higher service levels and results in more positive outcomes, such as the winning of additional contracts and maintaining a strong corporate reputation.</p>
</sec>
</sec>
</sec>
<sec id="s0025">
<title>Conclusion</title>
<sec id="s20026">
<title>Discussion of the findings and theoretical contribution</title>
<p>The aim of this study was to (1) identify the various approaches that members of a logistics triad use to manage reputational risk during SCDR, and (2) to determine the influence that reputational risk has on the SCDR process.</p>
<p>The first research question addressed the approaches that members of a logistics triad use to manage reputational risk during SCDR. The study identified 11 approaches, which were categorised as formal approaches and informal approaches. The study confirmed various approaches existent in literature. These include the use of social media (Altunbas &#x0026; Diker <xref ref-type="bibr" rid="CIT0005">2015</xref>:45), traditional approaches, such as customer engagement and communication (McCorkindale &#x0026; DiStaso 2015:503&#x2013;504), contractual obligations (Bernstein 2015:563; Petersen &#x0026; Lemke <xref ref-type="bibr" rid="CIT0079">2015</xref>:508) and partnering programmes or collaborative efforts (Jakob <xref ref-type="bibr" rid="CIT0055">2012</xref>:259). Furthermore, the study identified approaches not evident in literature. These approaches relate to the use of control centres, global corporate policies and key account manager involvement.</p>
<p>The second research question addressed the influence that reputational risk has on the SCDR process. The study found that the reputational risk can have both an enabling and a damaging impact on the SCDR process. However, the findings of this study contradict the findings of Galuchi et al. (<xref ref-type="bibr" rid="CIT0034">2019</xref>:158) and Morgan (<xref ref-type="bibr" rid="CIT0073">2018</xref>:1), as it was found that reputational risk may have a positive impact on the SCDR process and is only found to be occasionally less damaging to a firm and its SCDR processes. In fact, reputational risk serves as a motivator for firms to recover quicker from an SCD and also to perform at a higher service level during SCDR.</p>
</sec>
<sec id="s20027">
<title>Managerial recommendations</title>
<p>This study presents various managerial recommendations. First, the findings aid in creating awareness for the importance of managing reputational risk during SCDR, as it can provide various benefits if managed effectively and can potentially result in permanent damage if not managed at all. Managers can subsequently develop proactive strategies to manage the reputational risk should it occur. This will allow managers to be more prepared in managing reputational risk in future SCDs. Second, the findings provide managers with various approaches that can be used to manage reputational risk during SCDR. These approaches are applicable to all managers, irrespective of their position in the supply chain network. Managers can decide which approach is more fitting for their specific firm and potentially implement it to help manage reputational risk during SCDR.</p>
</sec>
<sec id="s20028">
<title>Limitations and directions for future research</title>
<p>This study only obtained the opinions of the participants with regard to the approaches in managing reputational risk. The study fails to measure to what extent these approaches are practically feasible. Future investigations should consider a quantitative research methodology to consider the nature and extent of the relationships under investigation. In addition, future studies may investigate the enablers and barriers to a good corporate reputation during SCDR. Furthermore, this study was only conducted in a South African developing country context. This limited the study&#x2019;s findings to perspectives of a single country, which complicates the generalisability of the study&#x2019;s findings. Future studies can consider replicating the study in a developed country setting, to ensure consistency and transferability of the findings.</p>
</sec>
</sec>
</body>
<back>
<ack>
<title>Acknowledgements</title>
<sec id="s20029" sec-type="COI-statement">
<title>Competing interests</title>
<p>The authors declare that they have no financial or personal relationships that may have inappropriately influenced them in writing this article.</p>
</sec>
<sec id="s20030">
<title>Authors&#x2019; contributions</title>
<p>This article is based on the MPhil dissertation of T.B. who was the main researcher. W.N. acted as the supervisor with the conceptualisation, literature review, research instrument and development of this manuscript.</p>
</sec>
<sec id="s20031">
<title>Funding information</title>
<p>This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors.</p>
</sec>
<sec id="s20032">
<title>Data availability</title>
<p>Data are stored according to institutional policy.</p>
</sec>
<sec id="s20033">
<title>Disclaimer</title>
<p>The views and opinions expressed in this article are those of the authors and do not necessarily reflect the official policy or position of any affiliated agency of the authors, and the publisher.</p>
</sec>
</ack>
<ref-list id="references">
<title>References</title>
<ref id="CIT0001"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Adobor</surname>, <given-names>H</given-names></string-name>. &#x0026; <string-name><surname>Mcmullen</surname>, <given-names>R.S</given-names></string-name></person-group>., <year>2018</year>, &#x2018;<article-title>Supply chain resilience: A dynamic and multidimensional approach</article-title>&#x2019;, <source><italic>The International Journal of Logistics Management</italic></source> <volume>29</volume>(<issue>4</issue>), <fpage>1451</fpage>&#x2013;<lpage>1471</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/IJLM-04-2017-0093">https://doi.org/10.1108/IJLM-04-2017-0093</ext-link></comment></mixed-citation></ref>
<ref id="CIT0002"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Ahmad</surname>, <given-names>M.A</given-names></string-name>., <string-name><surname>Hafeez</surname>, <given-names>M.A</given-names></string-name>., <string-name><surname>Rodriguez</surname>, <given-names>S</given-names></string-name>. &#x0026; <string-name><surname>Dawood</surname>, <given-names>N</given-names></string-name></person-group>., <year>2016</year>, <source><italic>BIM: A disruptive process towards traditional practice</italic></source>, <comment>viewed 01 June 2020, from <ext-link ext-link-type="uri" xlink:href="https://www.researchgate.net/profile/Sergio_Rodriguez12/publication/316601594_BIM_A_disruptive_process_towards_traditional_practice/links/5911a3174585152e1980c5ce/BIM-A-disruptive-process-towards-traditional-practice.pdf">https://www.researchgate.net/profile/Sergio_Rodriguez12/publication/316601594_BIM_A_disruptive_process_towards_traditional_practice/links/5911a3174585152e1980c5ce/BIM-A-disruptive-process-towards-traditional-practice.pdf</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0003"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Akman</surname>, <given-names>G</given-names></string-name>. &#x0026; <string-name><surname>Baynal</surname>, <given-names>K</given-names></string-name></person-group>., <year>2014</year>, &#x2018;<article-title>Logistics service provider selection through an integrated fuzzy multicriteria decision making approach</article-title>&#x2019;, <source><italic>Journal of Industrial Engineering</italic></source> <volume>2014</volume>(<issue>1</issue>), <fpage>1</fpage>&#x2013;<lpage>16</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1155/2014/794918">https://doi.org/10.1155/2014/794918</ext-link></comment></mixed-citation></ref>
<ref id="CIT0004"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Alfarsi</surname>, <given-names>F</given-names></string-name>., <string-name><surname>Lemke</surname>, <given-names>F</given-names></string-name>. &#x0026; <string-name><surname>Yang</surname>, <given-names>Y</given-names></string-name></person-group>., <year>2019</year>, &#x2018;<article-title>The importance of supply chain resilience: An empirical investigation</article-title>&#x2019;, <source><italic>Procedia Manufacturing</italic></source> <volume>39</volume>(<issue>1</issue>), <fpage>1525</fpage>&#x2013;<lpage>1529</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.promfg.2020.01.295">https://doi.org/10.1016/j.promfg.2020.01.295</ext-link></comment></mixed-citation></ref>
<ref id="CIT0005"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Altunbas</surname>, <given-names>H</given-names></string-name>. &#x0026; <string-name><surname>Diker</surname>, <given-names>E</given-names></string-name></person-group>., <year>2015</year>, &#x2018;<article-title>Corporate reputation management and social media: An analysis on Facebook accounts of the most valuable 5 brands in turkey</article-title>&#x2019;, Akademia <volume>4</volume>(<issue>2</issue>), <fpage>40</fpage>&#x2013;<lpage>54</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.17680/akademia.37335">https://doi.org/10.17680/akademia.37335</ext-link></comment></mixed-citation></ref>
<ref id="CIT0006"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ambulkar</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Blackhurst</surname>, <given-names>J</given-names></string-name>. &#x0026; <string-name><surname>Grawe</surname>, <given-names>S</given-names></string-name></person-group>., <year>2015</year>, &#x2018;<article-title>Firm&#x2019;s resilience to supply chain disruptions: Scale development and empirical examination</article-title>&#x2019;, <source><italic>Journal of Operations Management</italic></source> <volume>33</volume>(<issue>1</issue>), <fpage>111</fpage>&#x2013;<lpage>122</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.jom.2014.11.002">https://doi.org/10.1016/j.jom.2014.11.002</ext-link></comment></mixed-citation></ref>
<ref id="CIT0007"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Azad</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Dhayanidhi</surname>, <given-names>K</given-names></string-name>. &#x0026; <string-name><surname>Narashiman</surname>, <given-names>K</given-names></string-name></person-group>., <year>2011</year>, &#x2018;<article-title>The use of third party logistics services: A literature review</article-title>&#x2019;, <source><italic>International Journal of Operations System and Human Resource Management</italic></source> <volume>1</volume>(<issue>1&#x2013;2</issue>), <fpage>29</fpage>&#x2013;<lpage>43</lpage>.</mixed-citation></ref>
<ref id="CIT0008"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Baghersad</surname>, <given-names>M</given-names></string-name></person-group>., <year>2018</year>, <source><italic>Firms&#x2019; resilience to supply chain disruptions</italic></source>, <comment>viewed 15 April 2020, from <ext-link ext-link-type="uri" xlink:href="https://vtechworks.lib.vt.edu/handle/10919/96311">https://vtechworks.lib.vt.edu/handle/10919/96311</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0009"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Becker</surname>, <given-names>K</given-names></string-name>. &#x0026; <string-name><surname>Wan Lee</surname>, <given-names>J</given-names></string-name></person-group>., <year>2019</year>, &#x2018;<article-title>Organizational usage of social media for corporate reputation management</article-title>&#x2019;, <source><italic>Journal of Asian Finance, Economics and Business</italic></source> <volume>6</volume>(<issue>1</issue>), <fpage>231</fpage>&#x2013;<lpage>240</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.13106/jafeb.2019.vol6.no1.231">https://doi.org/10.13106/jafeb.2019.vol6.no1.231</ext-link></comment></mixed-citation></ref>
<ref id="CIT0010"><mixed-citation publication-type="thesis"><person-group person-group-type="author"><string-name><surname>Behdani</surname>, <given-names>B</given-names></string-name></person-group>., <year>2013</year>, &#x2018;<article-title>Handling disruptions in supply chains: An integrated framework and an agent-based model</article-title>&#x2019;, <comment>PhD thesis</comment>, <publisher-name>Delft University of Technology</publisher-name>, <publisher-loc>Delft, The Netherlands</publisher-loc>, <comment>viewed 11 April 2020, from <ext-link ext-link-type="uri" xlink:href="http://repository.tudelft.nl/view/ir/uuid:6f5e8db3-c1b7-4b2d-8035-3ae37a617564/">http://repository.tudelft.nl/view/ir/uuid:6f5e8db3-c1b7-4b2d-8035-3ae37a617564/</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0011"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Behdani</surname>, <given-names>B</given-names></string-name>., <string-name><surname>Adhitya</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Lukszo</surname>, <given-names>Z</given-names></string-name>. &#x0026; <string-name><surname>Srinivasan</surname>, <given-names>R</given-names></string-name></person-group>., <year>2012</year>, <source><italic>How to handle disruptions in supply chains: An integrated framework and a review of literature</italic></source>, <comment>viewed 11 April 2020, from <ext-link ext-link-type="uri" xlink:href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2114201">https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2114201</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0012"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Binkhorst</surname>, <given-names>J</given-names></string-name>. &#x0026; <string-name><surname>Kingma</surname>, <given-names>S.F</given-names></string-name></person-group>., <year>2012</year>, &#x2018;<article-title>Safety vs. reputation: Risk controversies in emerging policy networks regarding school safety in the Netherlands</article-title>&#x2019;, <source><italic>Journal of Risk Research</italic></source> <volume>15</volume>(<issue>8</issue>), <fpage>913</fpage>&#x2013;<lpage>935</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/13669877.2012.686049">https://doi.org/10.1080/13669877.2012.686049</ext-link></comment></mixed-citation></ref>
<ref id="CIT0013"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Blackhurst</surname>, <given-names>J</given-names></string-name>., <string-name><surname>Kaitlin</surname>, <given-names>S.D</given-names></string-name>. &#x0026; <string-name><surname>Craighead</surname>, <given-names>C.W</given-names></string-name></person-group>., <year>2011</year>, &#x2018;<article-title>An empirically derived framework of global supply resiliency</article-title>&#x2019;, <source><italic>Journal of Business Logistics</italic></source> <volume>32</volume>(<issue>4</issue>), <fpage>374</fpage>&#x2013;<lpage>391</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1111/j.0000-0000.2011.01032.x">https://doi.org/10.1111/j.0000-0000.2011.01032.x</ext-link></comment></mixed-citation></ref>
<ref id="CIT0014"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Braun</surname>, <given-names>V</given-names></string-name>. &#x0026; <string-name><surname>Clarke</surname>, <given-names>V</given-names></string-name></person-group>., <year>2012</year>, &#x2018;<chapter-title>Thematic analysis</chapter-title>&#x2019;, in <person-group person-group-type="editor"><string-name><given-names>H</given-names>. <surname>Cooper</surname></string-name> (ed.)</person-group>, <source><italic>APA handbook of research methods in psychology: Volume 2 Research designs</italic></source>, pp. <fpage>57</fpage>&#x2013;<lpage>71</lpage>, <publisher-name>American Psychological Association</publisher-name>, <publisher-loc>Washington, DC</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0015"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Brooks</surname>, <given-names>D.W</given-names></string-name></person-group>., <year>2010</year>, <source><italic>Creating a risk-aware culture</italic></source>, <comment>viewed 28 April 2020, from <ext-link ext-link-type="uri" xlink:href="https://mpra.ub.uni-muenchen.de/45421/1/MPRA_paper_45421.pdf">https://mpra.ub.uni-muenchen.de/45421/1/MPRA_paper_45421.pdf</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0016"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Bukowski</surname>, <given-names>L.A</given-names></string-name>. &#x0026; <string-name><surname>Feliks</surname>, <given-names>J</given-names></string-name></person-group>., <year>2012</year>, <source><italic>Multi-dimensional concept of supply chain resilience</italic></source>, <comment>viewed 12 April 2020, from <ext-link ext-link-type="uri" xlink:href="http://clc2012.tanger.cz/files/proceedings/09/reports/1218.pdf">http://clc2012.tanger.cz/files/proceedings/09/reports/1218.pdf</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0017"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Business Continuity Institute</collab></person-group>, <year>2019</year>, <source><italic>Supply chain resilience report 2019</italic></source>, <comment>viewed 01 March 2020, from <ext-link ext-link-type="uri" xlink:href="https://www.thebci.org/uploads/assets/uploaded/c50072bf-df5c-4c98-a5e1876aafb15bd0.pdf">https://www.thebci.org/uploads/assets/uploaded/c50072bf-df5c-4c98-a5e1876aafb15bd0.pdf</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0018"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Cachia</surname>, <given-names>M</given-names></string-name>. &#x0026; <string-name><surname>Millward</surname>, <given-names>L</given-names></string-name></person-group>., <year>2011</year>, &#x2018;<article-title>The telephone medium and semi-structured interviews: A complementary fit</article-title>&#x2019;, <source><italic>Qualitative Research in Organizations and Management: An International Journal</italic></source> <volume>6</volume>(<issue>3</issue>), <fpage>265</fpage>&#x2013;<lpage>277</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/17465641111188420">https://doi.org/10.1108/17465641111188420</ext-link></comment></mixed-citation></ref>
<ref id="CIT0019"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Chang</surname>, <given-names>W</given-names></string-name>., <string-name><surname>Ellinger</surname>, <given-names>A.E</given-names></string-name>. &#x0026; <string-name><surname>Blackhurst</surname>, <given-names>J</given-names></string-name></person-group>., <year>2015</year>, &#x2018;<article-title>A contextual approach to supply chain risk mitigation</article-title>&#x2019;, <source><italic>The International Journal of Logistics Management</italic></source> <volume>26</volume>(<issue>3</issue>), <fpage>642</fpage>&#x2013;<lpage>656</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/IJLM-02-2014-0026">https://doi.org/10.1108/IJLM-02-2014-0026</ext-link></comment></mixed-citation></ref>
<ref id="CIT0020"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Cohen</surname>, <given-names>J</given-names></string-name>. &#x0026; <string-name><surname>Kupferschmidt</surname>, <given-names>K</given-names></string-name></person-group>., <year>2020</year>, &#x2018;<article-title>Strategies shift as coronavirus pandemic looms</article-title>&#x2019;, <source><italic>Science</italic></source> <volume>367</volume>(<issue>6481</issue>), <fpage>962</fpage>&#x2013;<lpage>963</lpage>, <comment>viewed 01 March 2020, from <ext-link ext-link-type="uri" xlink:href="https://science.sciencemag.org/content/367/6481/962.summary?casa_token=uXUtorEMfzkAAAAA:BFF5jH8UO75QFTO-s6NExaMFSiq4Uc-Wqb35dt2vAgbKnXl3t-MJqSDB0fHacW0-t5MNtPyGvhQ:YtTkU">https://science.sciencemag.org/content/367/6481/962.summary?casa_token=uXUtorEMfzkAAAAA:BFF5jH8UO75QFTO-s6NExaMFSiq4Uc-Wqb35dt2vAgbKnXl3t-MJqSDB0fHacW0-t5MNtPyGvhQ:YtTkU</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0021"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Coyle</surname>, <given-names>J.J</given-names></string-name>., <string-name><surname>Langley</surname>, <given-names>C.J</given-names></string-name>., <string-name><surname>Novack</surname>, <given-names>R.A</given-names></string-name>. &#x0026; <string-name><surname>Gibson</surname>, <given-names>B</given-names></string-name></person-group>., <year>2013</year>, <source><italic>Supply chain management: A logistics perspective</italic></source>, <publisher-name>Cengage</publisher-name>, <publisher-loc>Mason, OH</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0022"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Craighead</surname>, <given-names>C.W</given-names></string-name>., <string-name><surname>Blackhurst</surname>, <given-names>J</given-names></string-name>., <string-name><surname>Rungtusanatham</surname>, <given-names>M.J</given-names></string-name>. &#x0026; <string-name><surname>Handfield</surname>, <given-names>R.B</given-names></string-name></person-group>., <year>2007</year>, &#x2018;<article-title>The severity of supply chain disruptions: Design characteristics and mitigation capabilities</article-title>&#x2019;, <source><italic>Decision Sciences</italic></source> <volume>38</volume>(<issue>1</issue>), <fpage>131</fpage>&#x2013;<lpage>156</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1111/j.1540-5915.2007.00151.x">https://doi.org/10.1111/j.1540-5915.2007.00151.x</ext-link></comment></mixed-citation></ref>
<ref id="CIT0023"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Creswell</surname>, <given-names>J.W</given-names></string-name></person-group>., <year>2012</year>, <source><italic>Education research: Planning, conducting and evaluating quantitative and qualitative research</italic></source>, <edition>4th</edition> edn., <publisher-name>Pearson</publisher-name>, <publisher-loc>Boston, MA</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0024"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Creswell</surname>, <given-names>J.W</given-names></string-name>. &#x0026; <string-name><surname>Poth</surname>, <given-names>C.N</given-names></string-name></person-group>., <year>2017</year>, <source><italic>Qualitative inquiry and research design: Choosing among five approaches</italic></source>, <edition>4th</edition> edn., <publisher-name>Sage</publisher-name>, <publisher-loc>Thousand Oaks, CA</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0025"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Cummins</surname>, <given-names>J.D</given-names></string-name>., <string-name><surname>Lewis</surname>, <given-names>C.M</given-names></string-name>. &#x0026; <string-name><surname>Wei</surname>, <given-names>R</given-names></string-name></person-group>., <year>2006</year>, &#x2018;<article-title>The market value impact of operational loss events for US banks and insurers</article-title>&#x2019;, <source><italic>Journal of Banking &#x0026; Finance</italic></source> <volume>30</volume>(<issue>10</issue>), <fpage>2605</fpage>&#x2013;<lpage>2634</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.jbankfin.2005.09.015">https://doi.org/10.1016/j.jbankfin.2005.09.015</ext-link></comment></mixed-citation></ref>
<ref id="CIT0026"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dani</surname>, <given-names>S</given-names></string-name>. &#x0026; <string-name><surname>Deep</surname>, <given-names>A</given-names></string-name></person-group>., <year>2010</year>, &#x2018;<article-title>Fragile food supply chains: Reacting to risks</article-title>&#x2019;, <source><italic>International Journal of Logistics: Research and Applications</italic></source> <volume>13</volume>(<issue>5</issue>), <fpage>395</fpage>&#x2013;<lpage>410</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/13675567.2010.518564">https://doi.org/10.1080/13675567.2010.518564</ext-link></comment></mixed-citation></ref>
<ref id="CIT0027"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>DuHadway</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Carnovale</surname>, <given-names>S</given-names></string-name>. &#x0026; <string-name><surname>Hazen</surname>, <given-names>B</given-names></string-name></person-group>., <year>2019</year>, &#x2018;<article-title>Understanding risk management for intentional supply chain disruptions: Risk detection, risk mitigation, and risk recovery</article-title>&#x2019;, <source><italic>Annals of Operations Research</italic></source> <volume>24</volume>(<issue>12</issue>), <fpage>1</fpage>&#x2013;<lpage>20</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s10479-017-2452-0">https://doi.org/10.1007/s10479-017-2452-0</ext-link></comment></mixed-citation></ref>
<ref id="CIT0028"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Elluru</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Gupta</surname>, <given-names>H</given-names></string-name>., <string-name><surname>Kaur</surname>, <given-names>H</given-names></string-name>. &#x0026; <string-name><surname>Singh</surname>, <given-names>S.P</given-names></string-name></person-group>., <year>2019</year>, &#x2018;<article-title>Proactive and reactive models for disaster resilient supply chain</article-title>&#x2019;, <source><italic>Annals of Operations Research</italic></source> <volume>283</volume>(<issue>1&#x2013;2</issue>), <fpage>199</fpage>&#x2013;<lpage>224</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s10479-017-2681-2">https://doi.org/10.1007/s10479-017-2681-2</ext-link></comment></mixed-citation></ref>
<ref id="CIT0029"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Essers</surname>, <given-names>D</given-names></string-name></person-group>., <year>2013</year>, &#x2018;<article-title>Developing country vulnerability in light of the global financial crisis: Shock therapy</article-title>&#x2019;, <source><italic>Review of Development Finance</italic></source> <volume>3</volume>(<issue>1</issue>), <fpage>61</fpage>&#x2013;<lpage>83</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.rdf.2013.02.001">https://doi.org/10.1016/j.rdf.2013.02.001</ext-link></comment></mixed-citation></ref>
<ref id="CIT0030"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Fitzsimmons</surname>, <given-names>A</given-names></string-name>. &#x0026; <string-name><surname>Atkins</surname>, <given-names>D</given-names></string-name></person-group>., <year>2017</year>, <source><italic>Rethinking reputational risk: How to manage the risks that can ruin your business</italic></source>, <comment>viewed 25 April 2020, from <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0&#x0025;2C5&#x0026;q=&#x0025;22definition+of+reputational+risk&#x0025;22+AND+&#x0025;22Fitzsimmons&#x0025;22&#x0026;btnG=">https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0&#x0025;2C5&#x0026;q=&#x0025;22definition+of+reputational+risk&#x0025;22+AND+&#x0025;22Fitzsimmons&#x0025;22&#x0026;btnG=</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0031"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Flatt</surname>, <given-names>S.J</given-names></string-name>. &#x0026; <string-name><surname>Kowalczyk</surname>, <given-names>S.J</given-names></string-name></person-group>., <year>2011</year>, &#x2018;<article-title>Corporate reputation persistence and its diminishing returns</article-title>&#x2019;, <source><italic>International Journal of Business and Social Science</italic></source> <volume>2</volume>(<issue>19</issue>), <fpage>1</fpage>&#x2013;<lpage>10</lpage>.</mixed-citation></ref>
<ref id="CIT0032"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Foulds</surname>, <given-names>S</given-names></string-name></person-group>., <year>2013</year>, &#x2018;<article-title>Transportation management outsourcing</article-title>&#x2019;, <source><italic>Transport World Africa</italic></source> <volume>11</volume>(<issue>5</issue>), <fpage>32</fpage>&#x2013;<lpage>34</lpage>.</mixed-citation></ref>
<ref id="CIT0033"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Gabbi</surname>, <given-names>G</given-names></string-name>., <string-name><surname>Pianorsi</surname>, <given-names>M</given-names></string-name>. &#x0026; <string-name><surname>Soana</surname>, <given-names>M.G</given-names></string-name></person-group>., <year>2017</year>, <source><italic>The impact of risk culture on bank reputation</italic></source>, <comment>viewed 30 May 2020, from <ext-link ext-link-type="uri" xlink:href="https://link.springer.com/chapter/10.1007/978-3-319-57592-6_8#citeas">https://link.springer.com/chapter/10.1007/978-3-319-57592-6_8#citeas</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0034"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Galuchi</surname>, <given-names>T.P.D</given-names></string-name>., <string-name><surname>Rosales</surname>, <given-names>F.P</given-names></string-name>. &#x0026; <string-name><surname>Batalha</surname>, <given-names>M.O</given-names></string-name></person-group>., <year>2019</year>, &#x2018;<article-title>Management of socioenvironmental factors of reputational risk in the beef supply chain in the Brazilian Amazon region</article-title>&#x2019;, <source><italic>International Food and Agribusiness Management Review</italic></source> <volume>22</volume>(<issue>2</issue>), <fpage>155</fpage>&#x2013;<lpage>171</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.22434/IFAMR2018.0004">https://doi.org/10.22434/IFAMR2018.0004</ext-link></comment></mixed-citation></ref>
<ref id="CIT0035"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gatzert</surname>, <given-names>N</given-names></string-name></person-group>., <year>2015</year>, &#x2018;<article-title>The impact of corporate reputation and reputation damaging events on financial performance: Empirical evidence from the literature</article-title>&#x2019;, <source><italic>European Management Journal</italic></source> <volume>33</volume>(<issue>6</issue>), <fpage>485</fpage>&#x2013;<lpage>499</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/JRF-09-2015-0083">https://doi.org/10.1108/JRF-09-2015-0083</ext-link></comment></mixed-citation></ref>
<ref id="CIT0036"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gatzert</surname>, <given-names>N</given-names></string-name>. &#x0026; <string-name><surname>Schmidt</surname>, <given-names>J</given-names></string-name></person-group>., <year>2015</year>, &#x2018;<article-title>Supporting strategic success through enterprise-wide reputation risk management</article-title>&#x2019;, <source><italic>The Journal of Risk Finance</italic></source> <volume>17</volume>(<issue>1</issue>), <fpage>26</fpage>&#x2013;<lpage>45</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/JRF-09-2015-0083">https://doi.org/10.1108/JRF-09-2015-0083</ext-link></comment></mixed-citation></ref>
<ref id="CIT0037"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gaudenzi</surname>, <given-names>B</given-names></string-name>., <string-name><surname>Confente</surname>, <given-names>I</given-names></string-name>. &#x0026; <string-name><surname>Christopher</surname>, <given-names>M</given-names></string-name></person-group>., <year>2015</year>, &#x2018;<article-title>Managing reputational risk: Insights from an European survey</article-title>&#x2019;, <source><italic>Corporate Reputation Review</italic></source> <volume>18</volume>(<issue>4</issue>), <fpage>248</fpage>&#x2013;<lpage>260</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1057/crr.2015.16">https://doi.org/10.1057/crr.2015.16</ext-link></comment></mixed-citation></ref>
<ref id="CIT0038"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gentles</surname>, <given-names>S.J</given-names></string-name>., <string-name><surname>Charles</surname>, <given-names>C</given-names></string-name>., <string-name><surname>Ploeg</surname>, <given-names>J</given-names></string-name>. &#x0026; <string-name><surname>McKibbon</surname>, <given-names>K</given-names></string-name></person-group>., <year>2015</year>, &#x2018;<article-title>Sampling in qualitative research: Insights from an overview of the methods literature</article-title>&#x2019;, <source><italic>The Qualitative Report</italic></source> <volume>20</volume>(<issue>11</issue>), <fpage>1772</fpage>&#x2013;<lpage>1789</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.46743/2160-3715/2015.2373">https://doi.org/10.46743/2160-3715/2015.2373</ext-link></comment></mixed-citation></ref>
<ref id="CIT0039"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gereffi</surname>, <given-names>G</given-names></string-name>. &#x0026; <string-name><surname>Luo</surname>, <given-names>X</given-names></string-name></person-group>., <year>2015</year>, &#x2018;<article-title>Risks and opportunities of participation in global value chains</article-title>&#x2019;, <source><italic>Journal of Banking and Financial Economics</italic></source> <volume>2</volume>(<issue>4</issue>), <fpage>51</fpage>&#x2013;<lpage>63</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.7172/2353-6845.jbfe.2015.2.4">https://doi.org/10.7172/2353-6845.jbfe.2015.2.4</ext-link></comment></mixed-citation></ref>
<ref id="CIT0040"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gerschel</surname>, <given-names>E</given-names></string-name>., <string-name><surname>Martinez</surname>, <given-names>A</given-names></string-name>. &#x0026; <string-name><surname>Mejean</surname>, <given-names>I</given-names></string-name></person-group>., <year>2020</year>, &#x2018;<article-title>Propagation of shocks in global value chains: The Coronavirus case</article-title>&#x2019;, <source><italic>Notes IPP</italic></source> <volume>1</volume>(<issue>1</issue>), <fpage>2</fpage>&#x2013;<lpage>9</lpage>.</mixed-citation></ref>
<ref id="CIT0041"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Glendon</surname>, <given-names>L</given-names></string-name>. &#x0026; <string-name><surname>Bird</surname>, <given-names>L</given-names></string-name></person-group>., <year>2013</year>, <source><italic>5th annual survey supply chain resilience 2013</italic></source>, <comment>viewed 12 April 2020, from <ext-link ext-link-type="uri" xlink:href="https://www.zurich.co.nz/content/dam/marine/supply-chain-survey-report-2013.pdf">https://www.zurich.co.nz/content/dam/marine/supply-chain-survey-report-2013.pdf</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0042"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Grace</surname>, <given-names>M.F</given-names></string-name>., <string-name><surname>Leverty</surname>, <given-names>J.T</given-names></string-name>., <string-name><surname>Phillips</surname>, <given-names>R.D</given-names></string-name>. &#x0026; <string-name><surname>Shimpi</surname>, <given-names>P</given-names></string-name></person-group>., <year>2015</year>, &#x2018;<article-title>The value of investing in enterprise risk management</article-title>&#x2019;, <source><italic>The Journal of Risk and Insurance</italic></source> <volume>82</volume>(<issue>2</issue>), <fpage>289</fpage>&#x2013;<lpage>316</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1111/jori.12022">https://doi.org/10.1111/jori.12022</ext-link></comment></mixed-citation></ref>
<ref id="CIT0043"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Grant</surname>, <given-names>D</given-names></string-name>., <string-name><surname>Juga</surname>, <given-names>J</given-names></string-name>., <string-name><surname>Juntunen</surname>, <given-names>J</given-names></string-name>. &#x0026; <string-name><surname>Juntunen</surname>, <given-names>M</given-names></string-name></person-group>., <year>2014</year>, &#x2018;<article-title>Investigating brand equity of third party service providers</article-title>&#x2019;, <source><italic>Journal of Services Marketing</italic></source> <volume>28</volume>(<issue>3</issue>), <fpage>214</fpage>&#x2013;<lpage>222</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/JSM-06-2012-0104">https://doi.org/10.1108/JSM-06-2012-0104</ext-link></comment></mixed-citation></ref>
<ref id="CIT0044"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Havenga</surname>, <given-names>J.H</given-names></string-name>., <string-name><surname>De Bod</surname>, <given-names>A</given-names></string-name>. &#x0026; <string-name><surname>Simpson</surname>, <given-names>Z.P</given-names></string-name></person-group>., <year>2016</year>, &#x2018;<article-title>A logistics barometer for South Africa: Towards sustainable freight mobility</article-title>&#x2019;, <source><italic>Journal of Transport and Supply Chain Management</italic></source> <volume>10</volume>(<issue>1</issue>), <fpage>1</fpage>&#x2013;<lpage>7</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4102/jtscm.v10i1.228">https://doi.org/10.4102/jtscm.v10i1.228</ext-link></comment></mixed-citation></ref>
<ref id="CIT0045"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>He</surname>, <given-names>J</given-names></string-name></person-group>., <year>2013</year>, &#x2018;<article-title>Sequential price and quantity decisions under supply and demand risks</article-title>&#x2019;, <source><italic>International Journal of Production Economics</italic></source> <volume>141</volume>(<issue>2</issue>), <fpage>541</fpage>&#x2013;<lpage>551</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.ijpe.2012.09.010">https://doi.org/10.1016/j.ijpe.2012.09.010</ext-link></comment></mixed-citation></ref>
<ref id="CIT0046"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>He</surname>, <given-names>J</given-names></string-name>., <string-name><surname>Alavifard</surname>, <given-names>F</given-names></string-name>., <string-name><surname>Ivanov</surname>, <given-names>D</given-names></string-name>. &#x0026; <string-name><surname>Jahani</surname>, <given-names>H</given-names></string-name></person-group>., <year>2019</year>, &#x2018;<article-title>A real-option approach to mitigate disruption risk in the supply chain</article-title>&#x2019;, <source><italic>Omega</italic></source> <volume>88</volume>(<issue>1</issue>), <fpage>133</fpage>&#x2013;<lpage>149</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.omega.2018.08.008">https://doi.org/10.1016/j.omega.2018.08.008</ext-link></comment></mixed-citation></ref>
<ref id="CIT0047"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Heckmann</surname>, <given-names>I</given-names></string-name>., <string-name><surname>Comes</surname>, <given-names>T</given-names></string-name>. &#x0026; <string-name><surname>Nickel</surname>, <given-names>S</given-names></string-name></person-group>., <year>2015</year>, &#x2018;<article-title>A critical review on supply chain risk: Definition, measure and modelling</article-title>&#x2019;, <source><italic>Omega</italic></source> <volume>52</volume>(<issue>1</issue>), <fpage>119</fpage>&#x2013;<lpage>132</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.omega.2014.10.004">https://doi.org/10.1016/j.omega.2014.10.004</ext-link></comment></mixed-citation></ref>
<ref id="CIT0048"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hoejmose</surname>, <given-names>S.U</given-names></string-name>., <string-name><surname>Roehrich</surname>, <given-names>J.K</given-names></string-name>. &#x0026; <string-name><surname>Grosvold</surname>, <given-names>J</given-names></string-name></person-group>., <year>2014</year>, &#x2018;<article-title>Is doing more doing better? The relationship between responsible supply chain management and corporate reputation</article-title>&#x2019;, <source><italic>Industrial Marketing Management</italic></source> <volume>43</volume>(<issue>1</issue>), <fpage>77</fpage>&#x2013;<lpage>90</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.indmarman.2013.10.002">https://doi.org/10.1016/j.indmarman.2013.10.002</ext-link></comment></mixed-citation></ref>
<ref id="CIT0049"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hohenstein</surname>, <given-names>N.O</given-names></string-name>., <string-name><surname>Feisel</surname>, <given-names>E</given-names></string-name>. &#x0026; <string-name><surname>Hartmann</surname>, <given-names>E</given-names></string-name></person-group>., <year>2015</year>, &#x2018;<article-title>Research on the phenomenon of supply chain resilience: A systematic review and paths for further investigation</article-title>&#x2019;, <source><italic>International Journal of Physical Distribution &#x0026; Logistics Management</italic></source> <volume>45</volume>(<issue>1/2</issue>), <fpage>90</fpage>&#x2013;<lpage>117</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/IJPDLM-05-2013-0128">https://doi.org/10.1108/IJPDLM-05-2013-0128</ext-link></comment></mixed-citation></ref>
<ref id="CIT0050"><mixed-citation publication-type="thesis"><person-group person-group-type="author"><string-name><surname>Holzhauer</surname>, <given-names>K</given-names></string-name></person-group>., <year>2016</year>, &#x2018;<article-title>Managing supply chain risks and disruptions at an inland terminal with a focus on inter-organizational collaboration challenges</article-title>&#x2019;, <comment>MSc thesis</comment>, <publisher-name>Delft University of Technology</publisher-name>, <publisher-loc>Delft, The Netherlands</publisher-loc>, <comment>viewed 12 April 2020, from <ext-link ext-link-type="uri" xlink:href="https://repository.tudelft.nl/islandora/object/uuid&#x0025;3A2cea9aa5-4f8d-4725-954b-1862a5cd2e9b">https://repository.tudelft.nl/islandora/object/uuid&#x0025;3A2cea9aa5-4f8d-4725-954b-1862a5cd2e9b</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0051"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Horn</surname>, <given-names>I.S</given-names></string-name>., <string-name><surname>Taros</surname>, <given-names>T</given-names></string-name>., <string-name><surname>Dirkes</surname>, <given-names>S</given-names></string-name>., <string-name><surname>H&#x00FC;er</surname>, <given-names>L</given-names></string-name>., <string-name><surname>Rose</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Tietmeyer</surname>, <given-names>R</given-names></string-name>., <etal>et al.</etal></person-group>, <year>2015</year>, &#x2018;<article-title>Business reputation and social media: A primer on threats and responses</article-title>&#x2019;, <source><italic>Journal of Direct, Data and Digital Marketing Practice</italic></source> <volume>16</volume>(<issue>3</issue>), <fpage>193</fpage>&#x2013;<lpage>208</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1057/dddmp.2015.1">https://doi.org/10.1057/dddmp.2015.1</ext-link></comment></mixed-citation></ref>
<ref id="CIT0052"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Isaacs</surname>, <given-names>A.N</given-names></string-name></person-group>., <year>2014</year>, &#x2018;<article-title>An overview of qualitative research methodology for public health researchers</article-title>&#x2019;, <source><italic>International Journal of Medicine and Public Health</italic></source> <volume>4</volume>(<issue>4</issue>), <fpage>318</fpage>&#x2013;<lpage>323</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4103/2230-8598.144055">https://doi.org/10.4103/2230-8598.144055</ext-link></comment></mixed-citation></ref>
<ref id="CIT0053"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ivanov</surname>, <given-names>D</given-names></string-name>. &#x0026; <string-name><surname>Dolgui</surname>, <given-names>A</given-names></string-name></person-group>., <year>2020</year>, &#x2018;<article-title>Viability of intertwined supply networks: Extending the supply chain resilience angles towards survivability</article-title>&#x2019;, <source><italic>International Journal of Production Research</italic></source> <volume>58</volume>(<issue>10</issue>), <fpage>2904</fpage>&#x2013;<lpage>2915</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/00207543.2020.1750727">https://doi.org/10.1080/00207543.2020.1750727</ext-link></comment></mixed-citation></ref>
<ref id="CIT0054"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Iwu-Egwuonwu</surname>, <given-names>R.C</given-names></string-name></person-group>., <year>2011</year>, &#x2018;<article-title>Corporate reputation &#x0026; firm performance: Empirical literature evidence</article-title>&#x2019;, <source><italic>International Journal of Business and Management</italic></source> <volume>6</volume>(<issue>4</issue>), <fpage>197</fpage>&#x2013;<lpage>206</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.5539/ijbm.v6n4p197">https://doi.org/10.5539/ijbm.v6n4p197</ext-link></comment></mixed-citation></ref>
<ref id="CIT0055"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Jakob</surname>, <given-names>C.K</given-names></string-name></person-group>., <year>2012</year>, &#x2018;<article-title>The impact of financial crisis on corporate social responsibility and its implications for reputation risk management</article-title>&#x2019;, <source><italic>Journal of Management &#x0026; Sustainability</italic></source> <volume>2</volume>(<issue>1</issue>), <fpage>259</fpage>&#x2013;<lpage>272</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.5539/jms.v2n2p259">https://doi.org/10.5539/jms.v2n2p259</ext-link></comment></mixed-citation></ref>
<ref id="CIT0056"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ju&#x0308;ttner</surname>, <given-names>U</given-names></string-name>., <string-name><surname>Peck</surname>, <given-names>H</given-names></string-name>. &#x0026; <string-name><surname>Christopher</surname>, <given-names>M</given-names></string-name></person-group>., <year>2003</year>, &#x2018;<article-title>Supply chain risk management: outlining an agenda for future research</article-title>&#x2019;, <source><italic>International Journal of Logistics: Research and Applications</italic></source> <volume>6</volume>(<issue>4</issue>), <fpage>197</fpage>&#x2013;<lpage>210</lpage>.</mixed-citation></ref>
<ref id="CIT0057"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kamalahmadi</surname>, <given-names>M</given-names></string-name>. &#x0026; <string-name><surname>Parast</surname>, <given-names>M.M</given-names></string-name></person-group>., <year>2016</year>, &#x2018;<article-title>A review of the literature on the principles of enterprise and supply chain resilience: Major findings and directions for future research</article-title>&#x2019;, <source><italic>International Journal of Production Economics</italic></source> <volume>171</volume>(<issue>Part 1</issue>), <fpage>116</fpage>&#x2013;<lpage>133</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.ijpe.2015.10.023">https://doi.org/10.1016/j.ijpe.2015.10.023</ext-link></comment></mixed-citation></ref>
<ref id="CIT0058"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Karrapan</surname>, <given-names>C</given-names></string-name>., <string-name><surname>Sishange</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Swanepoel</surname>, <given-names>E</given-names></string-name>. &#x0026; <string-name><surname>Kilbourn</surname>, <given-names>P.J</given-names></string-name></person-group>., <year>2017</year>, &#x2018;<article-title>Benchmarking criteria for evaluating third-party logistics providers in South Africa</article-title>&#x2019;, <source><italic>Journal of Transport and Supply Chain Management</italic></source> <volume>11</volume>(<issue>1</issue>), <fpage>1</fpage>&#x2013;<lpage>10</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4102/jtscm.v11i0.305">https://doi.org/10.4102/jtscm.v11i0.305</ext-link></comment></mixed-citation></ref>
<ref id="CIT0059"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kim</surname>, <given-names>H</given-names></string-name>., <string-name><surname>Youn</surname>, <given-names>S</given-names></string-name>. &#x0026; <string-name><surname>Lee</surname>, <given-names>D</given-names></string-name></person-group>., <year>2019</year>, &#x2018;<article-title>The effect of corporate social responsibility reputation on consumer support for cause-related marketing</article-title>&#x2019;, <source><italic>Total Quality &#x0026; Business Excellence</italic></source> <volume>30</volume>(<issue>5</issue>), <fpage>682</fpage>&#x2013;<lpage>707</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/14783363.2017.1332482">https://doi.org/10.1080/14783363.2017.1332482</ext-link></comment></mixed-citation></ref>
<ref id="CIT0060"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Klibi</surname>, <given-names>W</given-names></string-name>., <string-name><surname>Martel</surname>, <given-names>A</given-names></string-name>. &#x0026; <string-name><surname>Guitouni</surname>, <given-names>A</given-names></string-name></person-group>., <year>2010</year>, &#x2018;<article-title>The design of robust value creating supply chain networks: A critical review</article-title>&#x2019;, <source><italic>European Journal of Operational Research</italic></source> <volume>203</volume>(<issue>2</issue>), <fpage>283</fpage>&#x2013;<lpage>293</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.ejor.2009.06.011">https://doi.org/10.1016/j.ejor.2009.06.011</ext-link></comment></mixed-citation></ref>
<ref id="CIT0061"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kunitsyna</surname>, <given-names>N</given-names></string-name>., <string-name><surname>Britchenko</surname>, <given-names>I</given-names></string-name>. &#x0026; <string-name><surname>Kunitsyn</surname>, <given-names>I</given-names></string-name></person-group>., <year>2018</year>, &#x2018;<article-title>Reputational risk, value of lossesand financial stability of commercial banks</article-title>&#x2019;, <source><italic>The International Journal of Entrepreneurship and Sustanability Issues</italic></source> <volume>5</volume>(<issue>4</issue>), <fpage>943</fpage>&#x2013;<lpage>957</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.9770/jesi.2018.5.4(17)">https://doi.org/10.9770/jesi.2018.5.4(17)</ext-link></comment></mixed-citation></ref>
<ref id="CIT0062"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Larson</surname>, <given-names>P.D</given-names></string-name>. &#x0026; <string-name><surname>Gammelgaard</surname>, <given-names>B</given-names></string-name></person-group>., <year>2001</year>, &#x2018;<article-title>Logistics in Denmark: A survey of the industry</article-title>&#x2019;, <source><italic>International Journal of Logistics: Research and Applications</italic></source> <volume>4</volume>(<issue>2</issue>), <fpage>191</fpage>&#x2013;<lpage>206</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/13675560110059984">https://doi.org/10.1080/13675560110059984</ext-link></comment></mixed-citation></ref>
<ref id="CIT0063"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Lemke</surname>, <given-names>F</given-names></string-name>. &#x0026; <string-name><surname>Petersen</surname>, <given-names>H.L</given-names></string-name></person-group>., <year>2013</year>, &#x2018;<article-title>Teaching reputational risk management in the <italic>supply chain</italic></article-title>&#x2019;, <source><italic>Supply Chain Management: An International Journal</italic></source> <volume>18</volume>(<issue>4</issue>), <fpage>413</fpage>&#x2013;<lpage>428</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/SCM-06-2012-0222">https://doi.org/10.1108/SCM-06-2012-0222</ext-link></comment></mixed-citation></ref>
<ref id="CIT0064"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Liamputtong</surname>, <given-names>P</given-names></string-name></person-group>., <year>2013</year>, <source><italic>Qualitative research methods</italic></source>, <edition>4th</edition> edn., <publisher-name>Oxford University Press</publisher-name>, <publisher-loc>Victoria</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0065"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Lietz</surname>, <given-names>C</given-names></string-name>. &#x0026; <string-name><surname>Zayas</surname>, <given-names>L.E</given-names></string-name></person-group>., <year>2010</year>, &#x2018;<article-title>Evaluating qualitative research for social work practitioners</article-title>&#x2019;, <source><italic>Advances in Social Work</italic></source> <volume>11</volume>(<issue>2</issue>), <fpage>188</fpage>&#x2013;<lpage>202</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.18060/589">https://doi.org/10.18060/589</ext-link></comment></mixed-citation></ref>
<ref id="CIT0066"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Lincoln</surname>, <given-names>Y.S</given-names></string-name>. &#x0026; <string-name><surname>Guba</surname>, <given-names>E.G</given-names></string-name></person-group>., <year>1985</year>, <source><italic>Naturalistic inquiry</italic></source>, <publisher-name>Sage</publisher-name>, <publisher-loc>Beverly Hills, CA</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0067"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Lloyd</surname>, <given-names>S</given-names></string-name></person-group>., <year>2011</year>, &#x2018;<article-title>Applying the nominal group technique to specify the domain of a construct</article-title>&#x2019;, <source><italic>Qualitative Market Research: An International Journal</italic></source> <volume>14</volume>(<issue>1</issue>), <fpage>105</fpage>&#x2013;<lpage>121</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/13522751111099346">https://doi.org/10.1108/13522751111099346</ext-link></comment></mixed-citation></ref>
<ref id="CIT0068"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Markova</surname>, <given-names>O.V</given-names></string-name>., <string-name><surname>Zavalko</surname>, <given-names>N.A</given-names></string-name>., <string-name><surname>Kozhina</surname>, <given-names>V.O</given-names></string-name>., <string-name><surname>Panina</surname>, <given-names>O.V</given-names></string-name>. &#x0026; <string-name><surname>Lebedeva</surname>, <given-names>O.Y</given-names></string-name></person-group>., <year>2018</year>, &#x2018;<article-title>Enhancing the quality of risk management in a company</article-title>&#x2019;, <source><italic>Espacios</italic></source> <volume>39</volume>(<issue>48</issue>), <fpage>1</fpage>&#x2013;<lpage>26</lpage>.</mixed-citation></ref>
<ref id="CIT0069"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>McCorkindale</surname>, <given-names>T</given-names></string-name>. &#x0026; <string-name><surname>DiStaso</surname>, <given-names>M.W</given-names></string-name></person-group>., <source><italic>The role of influencers: An analysis of social media discussion across platforms through a sustained crisis</italic></source>, <comment>viewed 01 May 2020, from <ext-link ext-link-type="uri" xlink:href="https://books.google.co.za/books?hl=en&#x0026;lr=&#x0026;id=rAgqDwAAQBAJ&#x0026;oi=fnd&#x0026;pg=PA374&#x0026;dq=McCorkindale+&#x0025;26+DiStaso&#x0026;ots=Kh1BipwBr3&#x0026;sig=6KbcOX-0HZWAtq-QAd_WHHNKlp0&#x0026;redir_esc=y#v=onepage&#x0026;q=McCorkindale&#x0025;20&#x0025;26&#x0025;20DiStaso&#x0026;f=false">https://books.google.co.za/books?hl=en&#x0026;lr=&#x0026;id=rAgqDwAAQBAJ&#x0026;oi=fnd&#x0026;pg=PA374&#x0026;dq=McCorkindale+&#x0025;26+DiStaso&#x0026;ots=Kh1BipwBr3&#x0026;sig=6KbcOX-0HZWAtq-QAd_WHHNKlp0&#x0026;redir_esc=y#v=onepage&#x0026;q=McCorkindale&#x0025;20&#x0025;26&#x0025;20DiStaso&#x0026;f=false</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0070"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Meyer</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Niemann</surname>, <given-names>W</given-names></string-name>., <string-name><surname>Uys</surname>, <given-names>G</given-names></string-name>. &#x0026; <string-name><surname>Beetge</surname>, <given-names>D</given-names></string-name></person-group>., <year>2019</year>, &#x2018;<article-title>An exploration of supply chain risk management in the South African third-party logistics industry</article-title>&#x2019;, <source><italic>Acta Commercii</italic></source> <volume>19</volume>(<issue>1</issue>), <fpage>1</fpage>&#x2013;<lpage>13</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4102/ac.v19i1.612">https://doi.org/10.4102/ac.v19i1.612</ext-link></comment></mixed-citation></ref>
<ref id="CIT0071"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Milne</surname>, <given-names>J</given-names></string-name>. &#x0026; <string-name><surname>Oberle</surname>, <given-names>K</given-names></string-name></person-group>., <year>2005</year>, &#x2018;<article-title>Enhancing rigor in qualitative description</article-title>&#x2019;, <source><italic>Journal of Wound Ostomy &#x0026; Continence Nursing</italic></source> <volume>32</volume>(<issue>6</issue>),<fpage>413</fpage>&#x2013;<lpage>420</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1097/00152192-200511000-00014">https://doi.org/10.1097/00152192-200511000-00014</ext-link></comment></mixed-citation></ref>
<ref id="CIT0072"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mithun Ali</surname>, <given-names>S</given-names></string-name>. &#x0026; <string-name><surname>Nakade</surname>, <given-names>K</given-names></string-name></person-group>., <year>2014</year>, &#x2018;<article-title>Scenario-based supply chain disruptions management framework: A quantitative approach</article-title>&#x2019;, <source><italic>Innovation and Supply Chain Management</italic></source> <volume>8</volume>(<issue>3</issue>), <fpage>81</fpage>&#x2013;<lpage>91</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.14327/iscm.8.81">https://doi.org/10.14327/iscm.8.81</ext-link></comment></mixed-citation></ref>
<ref id="CIT0073"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Morgan</surname>, <given-names>B</given-names></string-name></person-group>., <year>2018</year>, &#x2018;<article-title>Managing catastrophic risks in franchise systems</article-title>&#x2019;, <source><italic>Franchise Law Journal</italic></source> <volume>38</volume>(<issue>2</issue>), <fpage>207</fpage>&#x2013;<lpage>225</lpage>.</mixed-citation></ref>
<ref id="CIT0074"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Nel</surname>, <given-names>J</given-names></string-name>., <string-name><surname>De Goede</surname>, <given-names>E</given-names></string-name>. &#x0026; <string-name><surname>Niemann</surname>, <given-names>W</given-names></string-name></person-group>., <year>2018</year>, &#x2018;<article-title>Supply chain disruptions: Insights from South African third-party logistics service providers and clients</article-title>&#x2019;, <source><italic>Journal of Transport and Supply Chain Management</italic></source> <volume>12</volume>(<issue>1</issue>), <fpage>1</fpage>&#x2013;<lpage>12</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4102/jtscm.v12i0.377">https://doi.org/10.4102/jtscm.v12i0.377</ext-link></comment></mixed-citation></ref>
<ref id="CIT0075"><mixed-citation publication-type="conference"><person-group person-group-type="author"><string-name><surname>Niemann</surname>, <given-names>W</given-names></string-name>., <string-name><surname>Meyer</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Kotz&#x00E9;</surname>, <given-names>T</given-names></string-name>. &#x0026; <string-name><surname>Odendaal</surname>, <given-names>J</given-names></string-name></person-group>., <year>2018</year>, &#x2018;<article-title>The role of third party logistics providers as orchestrators in emerging markets</article-title>&#x2019;, <conf-name>Paper Presented at Twelfth Annual International Business Conference</conf-name>, <conf-loc>Mauritius</conf-loc>, <conf-date>23rd&#x2013;26th September</conf-date>, pp. <fpage>743</fpage>&#x2013;<lpage>1764</lpage>, <comment>viewed 15 March 2020, from <ext-link ext-link-type="uri" xlink:href="https://www.researchgate.net/profile/Wesley_Niemann/publication/330513194_THE_ROLE_O:F_THIRD_PARTY_LOGISTICS_PROVIDERS_AS_ORCHESTRATORS_IN_EMERGING_MARKETS/links/5c4577b992851c22a384a282/THE-ROLE-OF-THIRD-PARTY-LOGISTICS-PROVIDERS-AS-ORCHESTRATORS-IN-EMERGINGMARKETS.pdf">https://www.researchgate.net/profile/Wesley_Niemann/publication/330513194_THE_ROLE_O:F_THIRD_PARTY_LOGISTICS_PROVIDERS_AS_ORCHESTRATORS_IN_EMERGING_MARKETS/links/5c4577b992851c22a384a282/THE-ROLE-OF-THIRD-PARTY-LOGISTICS-PROVIDERS-AS-ORCHESTRATORS-IN-EMERGINGMARKETS.pdf</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0076"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Oke</surname>, <given-names>A</given-names></string-name>. &#x0026; <string-name><surname>Gopalakrishnan</surname>, <given-names>M</given-names></string-name></person-group>., <year>2009</year>, &#x2018;<article-title>Managing disruptions in supply chains: A case study of a retail supply chain</article-title>&#x2019;, <source><italic>International Journal of Production Economics</italic></source> <volume>118</volume>(<issue>1</issue>), <fpage>168</fpage>&#x2013;<lpage>174</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.ijpe.2008.08.045">https://doi.org/10.1016/j.ijpe.2008.08.045</ext-link></comment></mixed-citation></ref>
<ref id="CIT0077"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Patton</surname>, <given-names>M.Q</given-names></string-name></person-group>., <year>2015</year>, <source><italic>Qualitative research &#x0026; evaluation methods: Integrating theory and practice</italic></source>, <edition>4th</edition> edn., <publisher-name>Sage</publisher-name>, <publisher-loc>Upper Saddle River, NJ</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0078"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Paul</surname>, <given-names>S.K</given-names></string-name>., <string-name><surname>Sarker</surname>, <given-names>R</given-names></string-name>. &#x0026; <string-name><surname>Essam</surname>, <given-names>D</given-names></string-name></person-group>., <year>2018</year>, &#x2018;<article-title>A reactive mitigation approach for managing supply disruption in a three-tier supply chain</article-title>&#x2019;, <source><italic>Journal of Intelligent Manufacturing</italic></source> <volume>29</volume>(<issue>7</issue>), <fpage>1581</fpage>&#x2013;<lpage>1597</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s10845-016-1200-7">https://doi.org/10.1007/s10845-016-1200-7</ext-link></comment></mixed-citation></ref>
<ref id="CIT0079"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Petersen</surname>, <given-names>H.L</given-names></string-name>. &#x0026; <string-name><surname>Lemke</surname>, <given-names>F</given-names></string-name></person-group>., <year>2015</year>, &#x2018;<article-title>Mitigating reputational risks in supply chains</article-title>&#x2019;, <source><italic>Supply Chain Management: An International Journal</italic></source> <volume>20</volume>(<issue>5</issue>), <fpage>495</fpage>&#x2013;<lpage>510</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/SCM-09-2014-0320">https://doi.org/10.1108/SCM-09-2014-0320</ext-link></comment></mixed-citation></ref>
<ref id="CIT0080"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Polit</surname>, <given-names>D.F</given-names></string-name>. &#x0026; <string-name><surname>Beck</surname>, <given-names>C.T</given-names></string-name></person-group>., <year>2012</year>, <source><italic>Nursing research: Generating and assessing evidence for nursing practice</italic></source>, <edition>9th</edition> edn., <publisher-name>Lippincott Williams &#x0026; Wilkins</publisher-name>, <publisher-loc>Philadelphia, PA</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0081"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Porterfield</surname>, <given-names>T.E</given-names></string-name>., <string-name><surname>Macdonald</surname>, <given-names>J.R</given-names></string-name>. &#x0026; <string-name><surname>Griffis</surname>, <given-names>S.E</given-names></string-name></person-group>., <year>2012</year>, &#x2018;<article-title>An exploration of the relational effects of supply chain disruptions</article-title>&#x2019;, <source><italic>Transportation Journal</italic></source> <volume>51</volume>(<issue>4</issue>), <fpage>399</fpage>&#x2013;<lpage>427</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.5325/transportationj.51.4.0399">https://doi.org/10.5325/transportationj.51.4.0399</ext-link></comment></mixed-citation></ref>
<ref id="CIT0082"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Prakash</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Soni</surname>, <given-names>G</given-names></string-name>. &#x0026; <string-name><surname>Rathore</surname>, <given-names>A.P.S</given-names></string-name></person-group>., <year>2017</year>, &#x2018;<article-title>A critical analysis of supply chain risk management content: A structured literature review</article-title>&#x2019;, <source><italic>Journal of Advances in Management Research</italic></source> <volume>14</volume>(<issue>1</issue>), <fpage>69</fpage>&#x2013;<lpage>90</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.5325/transportationj.51.4.0399">https://doi.org/10.5325/transportationj.51.4.0399</ext-link></comment></mixed-citation></ref>
<ref id="CIT0083"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Rebs</surname>, <given-names>T</given-names></string-name>., <string-name><surname>Brandenburg</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Seuring</surname>, <given-names>S</given-names></string-name>. &#x0026; <string-name><surname>Stohler</surname>, <given-names>M</given-names></string-name></person-group>., <year>2018</year>, &#x2018;<article-title>Stakeholder influences and risks in sustainable supply chain management: A comparison of qualitative and quantitative studies</article-title>&#x2019;, <source><italic>Business Research</italic></source> <volume>11</volume>(<issue>1</issue>), <fpage>197</fpage>&#x2013;<lpage>237</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s40685-017-0056-9">https://doi.org/10.1007/s40685-017-0056-9</ext-link></comment></mixed-citation></ref>
<ref id="CIT0084"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Reese</surname>, <given-names>C.L</given-names></string-name>. &#x0026; <string-name><surname>Kossovsky</surname>, <given-names>N</given-names></string-name></person-group>., <year>2011</year>, &#x2018;<article-title>Intangibles and the new reality: Risk, reputation, and value creation</article-title>&#x2019;, <source><italic>Corporate Finance Review</italic></source> <volume>16</volume>(<issue>1</issue>), <fpage>20</fpage>&#x2013;<lpage>32</lpage>.</mixed-citation></ref>
<ref id="CIT0085"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Revilla</surname>, <given-names>E</given-names></string-name>. &#x0026; <string-name><surname>Saenz</surname>, <given-names>M.J</given-names></string-name></person-group>., <year>2017</year>, &#x2018;<article-title>The impact of risk management on the frequency of supply chain disruptions: A configurational approach</article-title>&#x2019;, <source><italic>International Journal of Operations &#x0026; Production Management</italic></source> <volume>37</volume>(<issue>5</issue>), <fpage>1</fpage>&#x2013;<lpage>34</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/IJOPM-03-2016-0129">https://doi.org/10.1108/IJOPM-03-2016-0129</ext-link></comment></mixed-citation></ref>
<ref id="CIT0086"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Roehrich</surname>, <given-names>J.K</given-names></string-name>., <string-name><surname>Grosvold</surname>, <given-names>J</given-names></string-name>. &#x0026; <string-name><surname>Hoejmose</surname>, <given-names>S.U</given-names></string-name></person-group>., <year>2014</year>, &#x2018;<article-title>Reputational risks and sustainable supply chain management: Decision making under bounded reality</article-title>&#x2019;, <source><italic>International Journal of Operations and Production Management</italic></source> <volume>34</volume>(<issue>5</issue>), <fpage>695</fpage>&#x2013;<lpage>719</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/IJOPM-10-2012-0449">https://doi.org/10.1108/IJOPM-10-2012-0449</ext-link></comment></mixed-citation></ref>
<ref id="CIT0087"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>S&#x00E1;enz</surname>, <given-names>M.J</given-names></string-name>., <string-name><surname>Revilla</surname>, <given-names>E</given-names></string-name>. &#x0026; <string-name><surname>Acero</surname>, <given-names>B</given-names></string-name></person-group>., <year>2018</year>, &#x2018;<article-title>Aligning supply chain design for boosting resilience</article-title>&#x2019;, <source><italic>Business Horizons</italic></source> <volume>61</volume>(<issue>3</issue>), <fpage>443</fpage>&#x2013;<lpage>452</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.bushor.2018.01.009">https://doi.org/10.1016/j.bushor.2018.01.009</ext-link></comment></mixed-citation></ref>
<ref id="CIT0088"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Samvedi</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Jain</surname>, <given-names>V</given-names></string-name>. &#x0026; <string-name><surname>Chan</surname>, <given-names>F.T.S</given-names></string-name></person-group>., <year>2013</year>, &#x2018;<article-title>Quantifying risks in a supply chain through integration of fuzzy AHP and fuzzy TOPSIS</article-title>&#x2019;, <source><italic>International Journal of Production Research</italic></source> <volume>51</volume>(<issue>8</issue>), <fpage>2433</fpage>&#x2013;<lpage>2442</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/00207543.2012.741330">https://doi.org/10.1080/00207543.2012.741330</ext-link></comment></mixed-citation></ref>
<ref id="CIT0089"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sanchez Rodrigues</surname>, <given-names>V</given-names></string-name>., <string-name><surname>Harris</surname>, <given-names>I</given-names></string-name>. &#x0026; <string-name><surname>Mason</surname>, <given-names>R</given-names></string-name></person-group>., <year>2015</year>, &#x2018;<article-title>Horizontal logistics collaboration for enhanced supply chain performance: An international retail perspective</article-title>&#x2019;, <source><italic>Supply Chain Management: An International Journal</italic></source> <volume>20</volume>(<issue>6</issue>), <fpage>631</fpage>&#x2013;<lpage>647</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/SCM-06-2015-0218">https://doi.org/10.1108/SCM-06-2015-0218</ext-link></comment></mixed-citation></ref>
<ref id="CIT0090"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Scholten</surname>, <given-names>K</given-names></string-name>., <string-name><surname>Sharkey Scott</surname>, <given-names>P</given-names></string-name>. &#x0026; <string-name><surname>Fynes</surname>, <given-names>B</given-names></string-name></person-group>., <year>2014</year>, &#x2018;<article-title>Mitigation processes: Antecedents for building supply chain resilience</article-title>&#x2019;, <source><italic>Supply Chain Management: An International Journal</italic></source> <volume>19</volume>(<issue>2</issue>), <fpage>211</fpage>&#x2013;<lpage>228</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/SCM-06-2013-0191">https://doi.org/10.1108/SCM-06-2013-0191</ext-link></comment></mixed-citation></ref>
<ref id="CIT0091"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Shenton</surname>, <given-names>A.K</given-names></string-name></person-group>., <year>2004</year>, &#x2018;<article-title>Strategies for ensuring trustworthiness in qualitative research projects</article-title>&#x2019;, <source><italic>Education for Information</italic></source> <volume>22</volume>(<issue>2</issue>), <fpage>63</fpage>&#x2013;<lpage>75</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3233/EFI-2004-22201">https://doi.org/10.3233/EFI-2004-22201</ext-link></comment></mixed-citation></ref>
<ref id="CIT0092"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sheffi</surname>, <given-names>Y</given-names></string-name></person-group>., <year>2015</year>, &#x2018;<article-title>Preparing for disruptions through early detection</article-title>&#x2019;, <source><italic>MIT Sloan Management Review</italic></source> <volume>57</volume>(<issue>1</issue>), <fpage>31</fpage>&#x2013;<lpage>42</lpage>.</mixed-citation></ref>
<ref id="CIT0093"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Soppe</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Schauten</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Soppe</surname>, <given-names>J</given-names></string-name>. &#x0026; <string-name><surname>Kaymak</surname>, <given-names>U</given-names></string-name></person-group>., <year>2011</year>, &#x2018;<article-title>Corporate social responsibility reputation (CSRR): Do companies comply with their raised CSR expectations?</article-title>&#x2019;, <source><italic>Corporate Reputation Review</italic></source> <volume>14</volume>(<issue>4</issue>), <fpage>300</fpage>&#x2013;<lpage>323</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1057/crr.2011.21">https://doi.org/10.1057/crr.2011.21</ext-link></comment></mixed-citation></ref>
<ref id="CIT0094"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Stefansson</surname>, <given-names>G</given-names></string-name></person-group>., <year>2006</year>, &#x2018;<article-title>Collaborative logistics management and the role of third-party service providers</article-title>&#x2019;, <source><italic>International Journal of Physical Distribution &#x0026; Logistics Management</italic></source> <volume>36</volume>(<issue>2</issue>), <fpage>76</fpage>&#x2013;<lpage>92</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/09600030610656413">https://doi.org/10.1108/09600030610656413</ext-link></comment></mixed-citation></ref>
<ref id="CIT0095"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Szwajca</surname>, <given-names>D</given-names></string-name></person-group>., <year>2018</year>, &#x2018;<article-title>Dilemmas of reputational risk management: Theoretical study</article-title>&#x2019;, <source><italic>Corporate Reputation Review</italic></source> <volume>21</volume>(<issue>1</issue>), <fpage>165</fpage>&#x2013;<lpage>178</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1057/s41299-018-0052-9">https://doi.org/10.1057/s41299-018-0052-9</ext-link></comment></mixed-citation></ref>
<ref id="CIT0096"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Tannous</surname>, <given-names>K.A</given-names></string-name>. &#x0026; <string-name><surname>Yoon</surname>, <given-names>S</given-names></string-name></person-group>., <year>2018</year>, &#x2018;<article-title>Summarizing risk, sustainability and collaboration in global supply chain management</article-title>&#x2019;, <source><italic>International Journal of Supply and Operations Management</italic></source> <volume>5</volume>(<issue>2</issue>), <fpage>192</fpage>&#x2013;<lpage>196</lpage>.</mixed-citation></ref>
<ref id="CIT0097"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Tukamuhabwa</surname>, <given-names>B</given-names></string-name>., <string-name><surname>Stevenson</surname>, <given-names>M</given-names></string-name>. &#x0026; <string-name><surname>Busby</surname>, <given-names>J</given-names></string-name></person-group>., <year>2017</year>, &#x2018;<article-title>Supply chain resilience in a developing country context: A case study on the interconnectedness of threats, strategies and outcomes</article-title>&#x2019;, <source><italic>Supply Chain Management: An International Journal</italic></source> <volume>22</volume>(<issue>6</issue>), <fpage>486</fpage>&#x2013;<lpage>505</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/SCM-02-2017-0059">https://doi.org/10.1108/SCM-02-2017-0059</ext-link></comment></mixed-citation></ref>
<ref id="CIT0098"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Tukamuhabwa</surname>, <given-names>B</given-names></string-name>., <string-name><surname>Stevenson</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Busby</surname>, <given-names>J</given-names></string-name>. &#x0026; <string-name><surname>Zorzini</surname>, <given-names>M</given-names></string-name></person-group>., <year>2015</year>, &#x2018;<article-title>Supply chain resilience: Definition, review and theoretical foundations for further study</article-title>&#x2019;, <source><italic>International Journal of Production Research</italic></source> <volume>53</volume>(<issue>18</issue>), <fpage>5592</fpage>&#x2013;<lpage>5623</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/00207543.2015.1037934">https://doi.org/10.1080/00207543.2015.1037934</ext-link></comment></mixed-citation></ref>
<ref id="CIT0099"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Vanhamme</surname>, <given-names>J</given-names></string-name>. &#x0026; <string-name><surname>Grobben</surname>, <given-names>B</given-names></string-name></person-group>., <year>2009</year>, &#x2018;<article-title>&#x201C;Too good to be true&#x201D;: The effectiveness of CSR history in countering negative publicity</article-title>&#x2019;, <source><italic>Journal of Business Ethics</italic></source> <volume>85</volume>(<issue>1</issue>), <fpage>273</fpage>&#x2013;<lpage>283</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s10551-008-9731-2">https://doi.org/10.1007/s10551-008-9731-2</ext-link></comment></mixed-citation></ref>
<ref id="CIT0100"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Verbano</surname>, <given-names>C</given-names></string-name>. &#x0026; <string-name><surname>Venturini</surname>, <given-names>K</given-names></string-name></person-group>., <year>2013</year>, &#x2018;<article-title>Managing risks in SMEs: A literature review and research agenda</article-title>&#x2019;, <source><italic>Journal of Technology Management &#x0026; Innovation</italic></source> <volume>8</volume>(<issue>3</issue>), <fpage>186</fpage>&#x2013;<lpage>197</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4067/S0718-27242013000400017">https://doi.org/10.4067/S0718-27242013000400017</ext-link></comment></mixed-citation></ref>
<ref id="CIT0101"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Waugh</surname>, <given-names>B</given-names></string-name>. &#x0026; <string-name><surname>Luke</surname>, <given-names>R</given-names></string-name></person-group>., <year>2011</year>, &#x2018;<article-title>Logistics outsourcing by manufacturers in South Africa</article-title>&#x2019;, <source><italic>Journal of Transport and Supply Chain Management</italic></source> <volume>5</volume>(<issue>1</issue>), <fpage>337</fpage>&#x2013;<lpage>360</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4102/jtscm.v5i1.81">https://doi.org/10.4102/jtscm.v5i1.81</ext-link></comment></mixed-citation></ref>
<ref id="CIT0102"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Wikner</surname>, <given-names>J</given-names></string-name>. &#x0026; <string-name><surname>B&#x00E4;ckstrand</surname>, <given-names>J</given-names></string-name></person-group>., <year>2018</year>, &#x2018;<article-title>Triadic perspective on customization and supplier interaction in customer-driven manufacturing</article-title>&#x2019;, <source><italic>Production &#x0026; Manufacturing Research</italic></source> <volume>6</volume>(<issue>1</issue>), <fpage>3</fpage>&#x2013;<lpage>25</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/21693277.2017.1415825">https://doi.org/10.1080/21693277.2017.1415825</ext-link></comment></mixed-citation></ref>
<ref id="CIT0103"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Wu</surname>, <given-names>T</given-names></string-name>., <string-name><surname>Huang</surname>, <given-names>S.M</given-names></string-name>., <string-name><surname>Blackhurst</surname>, <given-names>J</given-names></string-name>., <string-name><surname>Zhang</surname>, <given-names>X.L</given-names></string-name>. &#x0026; <string-name><surname>Wang</surname>, <given-names>S.S</given-names></string-name></person-group>., <year>2013</year>, &#x2018;<article-title>Supply chain risk management: An agent-based simulation to study the impact of retail stockouts</article-title>&#x2019;, <source><italic>IEEE Transactions on Engineering Management</italic></source> <volume>60</volume>(<issue>4</issue>), <fpage>676</fpage>&#x2013;<lpage>686</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/TEM.2012.2190986">https://doi.org/10.1109/TEM.2012.2190986</ext-link></comment></mixed-citation></ref>
</ref-list>
<fn-group>
<fn><p><bold>How to cite this article:</bold> Blom, T. &#x0026; Niemann, W., 2022, &#x2018;Managing reputational risk during supply chain disruption recovery: A triadic logistics outsourcing perspective&#x2019;, <italic>Journal of Transport and Supply Chain Management</italic> 16(0), a623. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4102/jtscm.v16i0.623">https://doi.org/10.4102/jtscm.v16i0.623</ext-link></p></fn>
</fn-group>
</back>
</article>