<?xml version="1.0" encoding="utf-8" ?><rss version="2.0" xml:base="http://scrmblog.dumke.me/taxonomy/term/513/all" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:og="http://ogp.me/ns#" xmlns:article="http://ogp.me/ns/article#" xmlns:book="http://ogp.me/ns/book#" xmlns:profile="http://ogp.me/ns/profile#" xmlns:video="http://ogp.me/ns/video#" xmlns:product="http://ogp.me/ns/product#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:sioc="http://rdfs.org/sioc/ns#" xmlns:sioct="http://rdfs.org/sioc/types#" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#">
  <channel>
    <title>graph theory</title>
    <link>http://scrmblog.dumke.me/taxonomy/term/513/all</link>
    <description></description>
    <language>en</language>
     <atom:link href="http://scrmblog.dumke.me/taxonomy/term/513/all/feed" rel="self" type="application/rss+xml" />
      <item>
    <title>Assessing Vulnerability of a Supply Chain</title>
    <link>http://scrmblog.dumke.me/review/assessing-vulnerability-of-a-supply-chain</link>
    <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;At this year&amp;#8217;s &lt;a href=&quot;http://www.hicl.org&quot; title=&quot;Hamburg International Conference of Logistics&quot;&gt;&lt;span class=&quot;caps&quot;&gt;HICL&lt;/span&gt; conference&lt;/a&gt; in Hamburg, I was able to present some of my own research. In the follow-up discussions several points were highlighted, especially focussing on the viability of supply chain wide cooperation and collaboration efforts and on the difficulties of doing a realistic quantification of supply chain risks.&lt;/p&gt;

	&lt;p&gt;I already read a great paper on this topic some time ago: &amp;#8220;Assessing the vulnerability of supply chains using graph theory&amp;#8221; by Stephan M. Wagner and Nikrouz Neshat (2010), which I present you today.&lt;/p&gt;

	&lt;h5&gt;Disruptions and vulnerabilities&lt;/h5&gt;

	&lt;p&gt;Several authors argue that several factors help increase the vulnerabilities of today&amp;#8217;s supply chains. When supply chain complexity increases (e.g. supply chain length, higher division of labor, &amp;#8230;), the vulnerabilities also rise. Furthermore there is evidence that natural and man-made disasters are on the rise as well (figure 1).&lt;/p&gt;

	&lt;p&gt;&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;178&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/neshathistorydisasters.png&quot; title=&quot;History of Disasters&quot; alt=&quot;Distribution of natural and man-made over time. (Source: Centre for Research on the Epidemiology of Disasters, 2004.)&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 1: History of Disasters (Wagner and Neshat, 2010)&lt;/div&gt;&lt;/div&gt;Figure 2 shows the links between supply chain vulnerability drivers and disruptions.&lt;br /&gt;
So, since natural- and man-made-disaster most often cannot be influenced directly, the authors argue that the focus has to be on reducing the vulnerabilities themselves.&lt;/p&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;250&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/neshatinfluencerisks.png&quot; title=&quot;Connections between Vulnerabilities, Disruptions and Risks&quot; alt=&quot;Supply chain vulnerability and disruption&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 2: Connections between Vulnerabilities, Disruptions and Risks (Wagner and Neshat, 2010)&lt;/div&gt;&lt;/div&gt;

	&lt;h5&gt;Assessment of vulnerabilities&lt;/h5&gt;

	&lt;p&gt;Wagner and Neshat suggest a four step algorithm based on graph theory, which is used to calculate a &lt;em&gt;Supply Chain Vulnerability Index&lt;/em&gt; (&lt;span class=&quot;caps&quot;&gt;SCVI&lt;/span&gt;). The algorithm is based on &lt;a href=&quot;http://en.wikipedia.org/wiki/Graph_theory&quot; title=&quot;Wikipedia: Graph Theory&quot;&gt;graph theory&lt;/a&gt; (which has been part of another study &lt;a href=&quot;http://scrmblog.dumke.me/archives/184-Managing-Information-Risks.html&quot; title=&quot;SCRM Blog: Managing Information Risks&quot;&gt;here&lt;/a&gt;). Key to the understanding of the &lt;span class=&quot;caps&quot;&gt;SCVI&lt;/span&gt; is the risk driver mentioned above. Figure 3 shows an abstract example with three vulnerability drivers (D1 to D3) and their links.&lt;/p&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;241&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/neshatexample.png&quot; title=&quot;Vulnerability Drivers and their Links with the corresponding Matrix&quot; alt=&quot;Example of vulnerability digraph representation and its adjacency matrix&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 3: Vulnerability Drivers and their Links with the corresponding Matrix (Wagner and Neshat, 2010)&lt;/div&gt;&lt;/div&gt;

	&lt;p&gt;To calculate the &lt;span class=&quot;caps&quot;&gt;SCVI&lt;/span&gt; the supply chain risk manager has to create a map / graph of the current risk drivers (step 1), find the corresponding relations between the risk drivers (step 2), calculate the &amp;#8220;influence matrix&amp;#8221; (step 3) and deduce the &lt;span class=&quot;caps&quot;&gt;SCVI&lt;/span&gt;. As a forth step &lt;span class=&quot;caps&quot;&gt;SCVI&lt;/span&gt;s of different companies can be compared to gain further insights for optimization and risk reduction.&lt;/p&gt;

	&lt;p&gt;Figure 4 shows the main drivers of supply chain vulnerability. &lt;/p&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;283&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/neshatdrivers.png&quot; title=&quot;Selection of Vulnerability Drivers in Structure, Demand and Supply&quot; alt=&quot;Supply chain vulnerability drivers&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 4: Selection of Vulnerability Drivers in Structure, Demand and Supply (Wagner and Neshat, 2010)&lt;/div&gt;&lt;/div&gt;

	&lt;p&gt;Using graph theory makes it possible for the risk manager to get an overview of the influencing factors of supply chain risks. It also enables him to act on this knowledge. Figure 5 shows a possible simplification / vulnerability reduction.&lt;/p&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;246&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/neshatmitigation.png&quot; title=&quot;Reduction of Supply Chain Vulnerability Drivers leads to a Simplification of the respective Graphs&quot; alt=&quot;Vulnerability graph, before and after applying SCRM.&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 5: Reduction of Supply Chain Vulnerability Drivers leads to a Simplification of the respective Graphs (Wagner and Neshat, 2010)&lt;/div&gt;&lt;/div&gt;

	&lt;p&gt;D3 in figure 5 &amp;#8220;is called a &amp;#8216;sink&amp;#8217; &amp;#8211; which means that D3 can only be influenced by three other drivers and cannot influence others. Considering the graph nodes and edges, supply chain managers can apply risk management methods and implement mitigation strategies to omit or alleviate some of the vulnerability drivers. Figure 5 shows the graph after D3 has been omitted. As one can see, the resulting graph contains less vulnerability than it did prior to implementing the measures.&amp;#8221;&lt;/p&gt;

	&lt;h5&gt;Empirical data for the &lt;span class=&quot;caps&quot;&gt;SCVI&lt;/span&gt;&lt;/h5&gt;

	&lt;p&gt;The authors also conduct a survey with over 700 participants from different industries. Based on their feedback the authors assess the Supply Chain Vulnerability Index for eight different industries. The results are summarized in figure 5. And give support to the hypothesis that the automotive industry has one of the highest risk levels. &lt;/p&gt;

&lt;div class=&quot;scrm_image_center&quot; style=&quot;width: 500px&quot;&gt;&lt;div class=&quot;scrm_imageComment_img&quot;&gt;&lt;img class=&quot;scrm_image_center&quot; width=&quot;500&quot; height=&quot;316&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/images/neshatsurveyresults.png&quot; title=&quot;Supply Chain Vulnerability within several Industries compared&quot; alt=&quot;Supply chain vulnerability indices (SCVIs) for different industries&quot; /&gt;&lt;/div&gt;&lt;div class=&quot;scrm_imageComment_txt&quot;&gt;Figure 6: Supply Chain Vulnerability within several Industries compared (Wagner and Neshat, 2010)&lt;/div&gt;&lt;/div&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;I really like the graph approach to assessing supply chain vulnerabilities. And I think it is a great method to support the understanding of a complex system like the supply chain. The article combines two very interesting aspects of it: the practical implementation and the assessment of supply chain vulnerability and a survey to compare different vulnerability levels across industries. The complete article, where you find more details on the survey results and the algorithm for calculating the index, can be downloaded &lt;a href=&quot;http://www.scm.ethz.ch/publications/Academic_publications/Wagner_Neshat_2010_Assessing_the_vulnerability_of_supply_chains_using_graph_theory.pdf&quot; title=&quot;ETH Zürich: Assessing the vulnerability of supply chains using graph theory&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;
From a business and research point of view this article should direct the supply chain risk management efforts especially in the industries with the highest risk levels, Automotive and &lt;span class=&quot;caps&quot;&gt;ICT&lt;/span&gt;.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/InternationalJournalOfProductionEconomics2010WagnerAssessingTheVulnerabilityOfSupplyChainsUsingGraphTheory.png?itok=28QMZy-5&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;	&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=International+Journal+of+Production+Economics&amp;amp;rft_id=info%3A%2F&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=Assessing+the+vulnerability+of+supply+chains+using+graph+theory&amp;amp;rft.issn=&amp;amp;rft.date=2010&amp;amp;rft.volume=126&amp;amp;rft.issue=&amp;amp;rft.spage=121&amp;amp;rft.epage=129&amp;amp;rft.artnum=&amp;amp;rft.au=Wagner%2C+S.M.&amp;amp;rft.au=Neshat%2C+N.&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other%2CBusiness+Management%2C+Supply+Chain+Management&quot;&gt;Wagner, S.M., &amp;amp; Neshat, N. (2010). Assessing the vulnerability of supply chains using graph theory &lt;span style=&quot;font-style: italic;&quot;&gt;International Journal of Production Economics, 126&lt;/span&gt;, 121-129&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/513/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--2&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give Assessing Vulnerability of a Supply Chain 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give Assessing Vulnerability of a Supply Chain 2/5&lt;/option&gt;&lt;option value=&quot;60&quot;&gt;Give Assessing Vulnerability of a Supply Chain 3/5&lt;/option&gt;&lt;option value=&quot;80&quot;&gt;Give Assessing Vulnerability of a Supply Chain 4/5&lt;/option&gt;&lt;option value=&quot;100&quot;&gt;Give Assessing Vulnerability of a Supply Chain 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-ZJ4vMhrNX9jgMMgZ7rycosHdnfkYHF-gpX66CKj4zHI&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/graph-theory&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;graph theory&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/index&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;index&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/survey&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;survey&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/vulnerability&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;vulnerability&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/framework&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;framework&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-count-pixel field-type-text-long field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 10 Oct 2011 14:42:00 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1671 at http://scrmblog.dumke.me</guid>
  </item>
  </channel>
</rss>
