Skip to main content

2017 | OriginalPaper | Buchkapitel

Modeling Company Risk and Importance in Supply Graphs

verfasst von : Lucas Carstens, Jochen L. Leidner, Krzysztof Szymanski, Blake Howald

Erschienen in: The Semantic Web

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Managing one’s supply chain is a key task in the operational risk management for any business. Human procurement officers can manage only a limited number of key suppliers directly, yet global companies often have thousands of suppliers part of a wider ecosystem, which makes overall risk exposure hard to track. To this end, we present an industrial graph database application to account for direct and indirect (transitive) supplier risk and importance, based on a weighted set of measures: criticality, replaceability, centrality and distance. We describe an implementation of our graph-based model as an interactive and visual supply chain risk and importance explorer. Using a supply network (comprised of approximately 98, 000 companies and 220, 000 relations) induced from textual data by applying text mining techniques to news stories, we investigate whether our scores may function as a proxy for actual supplier importance, which is generally not known, as supply chain relationships are typically closely guarded trade secrets. To our knowledge, this is the largest-scale graph database and analysis on real supply relations reported to date.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Aggarwal, C.C.: An introduction to social network data analytics. In: Aggarwal, C.C. (ed.) Social Network Data Analytics, pp. 1–15. Springer, Heidelberg (2011)CrossRef Aggarwal, C.C.: An introduction to social network data analytics. In: Aggarwal, C.C. (ed.) Social Network Data Analytics, pp. 1–15. Springer, Heidelberg (2011)CrossRef
2.
Zurück zum Zitat Alhomidi, M., Reed, M.: Attack graph-based risk assessment and optimisation approach. Int. J. Netw. Secur. Appl. 6(3), 31 (2014) Alhomidi, M., Reed, M.: Attack graph-based risk assessment and optimisation approach. Int. J. Netw. Secur. Appl. 6(3), 31 (2014)
3.
Zurück zum Zitat Aqlan, F., Lam, S.S.: A fuzzy-based integrated framework for supply chain risk assessment. Int. J. Prod. Econ. 161, 54–63 (2015)CrossRef Aqlan, F., Lam, S.S.: A fuzzy-based integrated framework for supply chain risk assessment. Int. J. Prod. Econ. 161, 54–63 (2015)CrossRef
4.
Zurück zum Zitat Bisias, D., Flood, M.D., Lo, A.W., Valavanis, S.: A survey of systemic risk analytics. US Department of Treasury, Office of Financial Research 0001 (2012) Bisias, D., Flood, M.D., Lo, A.W., Valavanis, S.: A survey of systemic risk analytics. US Department of Treasury, Office of Financial Research 0001 (2012)
5.
Zurück zum Zitat Blome, C., Schoenherr, T.: Supply chain risk management in financial crises - a multiple case-study approach. Int. J. Prod. Econ. 134(1), 43–57 (2011)CrossRef Blome, C., Schoenherr, T.: Supply chain risk management in financial crises - a multiple case-study approach. Int. J. Prod. Econ. 134(1), 43–57 (2011)CrossRef
6.
Zurück zum Zitat Borgatti, S.P., Li, X.: On social network analysis in a supply chain context. J. Supply Chain Manage. 45(2), 5–22 (2009)CrossRef Borgatti, S.P., Li, X.: On social network analysis in a supply chain context. J. Supply Chain Manage. 45(2), 5–22 (2009)CrossRef
7.
Zurück zum Zitat Ghadge, A., Dani, S., Chester, M., Kalawsky, R.: A systems approach for modelling supply chain risks. Supply Chain Manage. Int. J. 18(5), 523–538 (2013)CrossRef Ghadge, A., Dani, S., Chester, M., Kalawsky, R.: A systems approach for modelling supply chain risks. Supply Chain Manage. Int. J. 18(5), 523–538 (2013)CrossRef
8.
Zurück zum Zitat Hallikas, J., Karvonen, I., Pulkkinen, U., Virolainen, V.-M., Tuominen, M.: Risk management processes in supplier networks. Int. J. Prod. Econ. 90(1), 47–58 (2004)CrossRef Hallikas, J., Karvonen, I., Pulkkinen, U., Virolainen, V.-M., Tuominen, M.: Risk management processes in supplier networks. Int. J. Prod. Econ. 90(1), 47–58 (2004)CrossRef
9.
Zurück zum Zitat Harland, C., Brenchley, R., Walker, H.: Risk in supply networks. J. Purch. Supply Manage. 9(2), 51–62 (2003)CrossRef Harland, C., Brenchley, R., Walker, H.: Risk in supply networks. J. Purch. Supply Manage. 9(2), 51–62 (2003)CrossRef
10.
Zurück zum Zitat Huang, X., Vodenska, I., Havlin, S., Stanley, H.E.: Cascading failures in bi-partite graphs: model for systemic risk propagation. Sci. Rep. 3, Article no: 1219 (2013). doi:10.1038/srep01219 Huang, X., Vodenska, I., Havlin, S., Stanley, H.E.: Cascading failures in bi-partite graphs: model for systemic risk propagation. Sci. Rep. 3, Article no: 1219 (2013). doi:10.​1038/​srep01219
11.
Zurück zum Zitat Jüttner, U.: Supply chain risk management: understanding the business requirements from a practitioner perspective. Int. J. Logist. Manage. 16(1), 120–141 (2005)CrossRef Jüttner, U.: Supply chain risk management: understanding the business requirements from a practitioner perspective. Int. J. Logist. Manage. 16(1), 120–141 (2005)CrossRef
12.
Zurück zum Zitat Kim, Y., Choi, T.Y., Yan, T., Dooley, K.: Structural investigation of supply networks: a social network analysis approach. J. Oper. Manage. 29(3), 194–211 (2011)CrossRef Kim, Y., Choi, T.Y., Yan, T., Dooley, K.: Structural investigation of supply networks: a social network analysis approach. J. Oper. Manage. 29(3), 194–211 (2011)CrossRef
13.
Zurück zum Zitat Mitchell, M.: An Introduction to Genetic Algorithms. MIT Press, Cambridge (1998)MATH Mitchell, M.: An Introduction to Genetic Algorithms. MIT Press, Cambridge (1998)MATH
14.
Zurück zum Zitat Nugent, T., Leidner, J.L.: Risk mining: company-risk identification from unstructured sources. In: IEEE International Conference on Data Mining, ICDM, pp. 1308–1311 (2016) Nugent, T., Leidner, J.L.: Risk mining: company-risk identification from unstructured sources. In: IEEE International Conference on Data Mining, ICDM, pp. 1308–1311 (2016)
15.
Zurück zum Zitat Phillips, C.A., Swiler, L.P.: A graph-based system for network-vulnerability analysis. In: Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22–25, 1998, pp. 71–79 (1998) Phillips, C.A., Swiler, L.P.: A graph-based system for network-vulnerability analysis. In: Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22–25, 1998, pp. 71–79 (1998)
16.
Zurück zum Zitat Poolsappasit, N., Dewri, R., Ray, I.: Dynamic security risk management using Bayesian attack graphs. IEEE Trans. Dependable Sec. Comp. 9(1), 61–74 (2012)CrossRef Poolsappasit, N., Dewri, R., Ray, I.: Dynamic security risk management using Bayesian attack graphs. IEEE Trans. Dependable Sec. Comp. 9(1), 61–74 (2012)CrossRef
17.
Zurück zum Zitat Simchi-Levi, D., Schmidt, W., Wei, Y.: From superstroms to factory fires: managing unpredictable supply chain disruptions. Harv. Bus. Rev. 92(1), 96–100 (2014) Simchi-Levi, D., Schmidt, W., Wei, Y.: From superstroms to factory fires: managing unpredictable supply chain disruptions. Harv. Bus. Rev. 92(1), 96–100 (2014)
18.
Zurück zum Zitat Stergiopoulos, G., Kotzanikolaou, P., Theocharidou, M., Gritzalis, D.: Risk mitigation strategies for critical infrastructures based on graph centrality analysis. IJCIP 10, 34–44 (2015) Stergiopoulos, G., Kotzanikolaou, P., Theocharidou, M., Gritzalis, D.: Risk mitigation strategies for critical infrastructures based on graph centrality analysis. IJCIP 10, 34–44 (2015)
19.
Zurück zum Zitat Tan, K.H., Zhan, Y., Ji, G., Ye, F., Chang, C.: Harvesting big data to enhance supply chain innovation capabilities: an analytic infrastructure based on deduction graph. Int. J. Prod. Econ. 165, 223–233 (2015)CrossRef Tan, K.H., Zhan, Y., Ji, G., Ye, F., Chang, C.: Harvesting big data to enhance supply chain innovation capabilities: an analytic infrastructure based on deduction graph. Int. J. Prod. Econ. 165, 223–233 (2015)CrossRef
20.
Zurück zum Zitat Tayur, S., Ganeshan, R., Magazine, M.: Quantitative Models for Supply Chain Management, vol. 17. Springer, Heidelberg (2012)MATH Tayur, S., Ganeshan, R., Magazine, M.: Quantitative Models for Supply Chain Management, vol. 17. Springer, Heidelberg (2012)MATH
21.
Zurück zum Zitat Timmer, M.P., Dietzenbacher, E., Los, B., Stehrer, R., Vries, G.J.: An illustrated user guide to the world input-output database: the case of global automotive production. Rev. Int. Econ. 23(3), 575–605 (2015)CrossRef Timmer, M.P., Dietzenbacher, E., Los, B., Stehrer, R., Vries, G.J.: An illustrated user guide to the world input-output database: the case of global automotive production. Rev. Int. Econ. 23(3), 575–605 (2015)CrossRef
22.
Zurück zum Zitat Wagner, S.M., Neshat, N.: Assessing the vulnerability of supply chains using graph theory. Int. J. Prod. Econ. 126(1), 121–129 (2010)CrossRef Wagner, S.M., Neshat, N.: Assessing the vulnerability of supply chains using graph theory. Int. J. Prod. Econ. 126(1), 121–129 (2010)CrossRef
23.
Zurück zum Zitat Xu, N.-R., Liu, J.-B., Li, D.-X., and Wang, J.: Research on evolutionary mechanism of agile supply chain network via complex network theory. In: Mathematical Problems in Engineering 2016 (2016) Xu, N.-R., Liu, J.-B., Li, D.-X., and Wang, J.: Research on evolutionary mechanism of agile supply chain network via complex network theory. In: Mathematical Problems in Engineering 2016 (2016)
Metadaten
Titel
Modeling Company Risk and Importance in Supply Graphs
verfasst von
Lucas Carstens
Jochen L. Leidner
Krzysztof Szymanski
Blake Howald
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-58451-5_2

Neuer Inhalt