1 Introduction

1.1 Background

In the supply chain environment, the competition between individual enterprises has become the competition between the supply chains where the enterprises are located. How to select suppliers scientifically and effectively implement supply chain strategies is a common problem faced by enterprises themselves. With the development of technology and information technology and the advent of the internet era, market-oriented companies are changing rapidly, competition between companies is intensifying, and the frequency of cooperation between companies has greatly increased because it is difficult for a single company to give full play to its advantages. Companies no longer fight alone but rely on the standpoint of supply chain integration to compete in the industry. Especially now, several new business management methods, such as global procurement and sales, outsourcing, inventory reduction, lean logistics, and flexible supply chains, are further increasing or expanding the impact of risks. For example, while enjoying the high returns of the global supply chain, companies need to face risks such as social unrest, cultural differences, and economic crises in many countries and regions. Moral hazards and the risk of outsourcing are ignored, and there is a risk of disrupting the operation of a flexible supply chain. With the improvement of the level of supply chain management, the ties between companies are becoming increasingly closer. The problem of an agile supply chain will not only directly damage the business within the chain but also affect the entire supply chain.

1.2 Significance

In the context of economic and trade globalization, supply chain structures and interactions have become increasingly complex from traditional chain structures to complex network structures. The behavioral dependence and coupling of operators in the supply chain are also increasing, and the characteristics of synergy and coexistence are becoming increasingly obvious. There are also complex activation relationships among the risk factors of different supply chains. When a specific risk event is triggered, many secondary, derivative, or many other risk events will occur at the same time. Searching for specific links or specific risks in such a complex environment is not only very difficult but also somewhat one-sided. In contrast, studying the overall risk management of the supply chain system from the perspective of the macro-network structure and rules may better solve the objective reality of supply chain operations. The overall operation level of the supply chain system needs to be improved.

1.3 Related work

American scholars study the relationship between China’s supply chain and the USA. Weber R’s study shows an assessment of China’s aggressive actions in cyberspace (due to its ambitions, it hopes to rival the USA or replace the USA as a global superpower, and use intellectual property rights), primarily in the form of theft and cyber espionage, have formed unusual commonalities in Congress, which may clear the way for new developments and stricter cyber security requirements to protect industrial supply chains and the overall security of critical infrastructure and US innovation [1]. Although it is in line with expectations in most directions, it does not mention the development factors of China's supply chain due to external environmental factors. In some parts of the forecast, there are errors. To strengthen the stability and efficiency of the national supply chain, Callan B's research shows that the White House issued a presidential executive order to assess and strengthen the US manufacturing and defense industry base and supply chain resilience. The recommendations made by the order were originally scheduled to be completed in April 2018, but the work is progressing smoothly and may be completed soon. Although it is not clear what the scope of this assessment is, it is time for the USA (and other countries) to consider its ability to generate military power [2]. However, the development speed of the supply chain is becoming increasingly faster, and it is obviously inappropriate to predict the future development speed of the supply chain as compared to the previous development speed. Research on the role of the supply chain in certain areas is crucial. Barbosa M W conducted a bibliometric analysis to rigorously examine the evolution of the agri-food supply chain (AFSC) research field from 2008 to 2019. In addition to using different analytical scientific measurement tools (topic mapping, common citations, coauthors, and coverage visualization network), Barbosa also identified commonly used keywords, new and popular research topics, and frequently studied supply chain management (SCM) practice. Frequently used keywords are food supply chain, food waste, sustainability, food safety, SCM, food industry, and food safety. New research topics include contracts, blockchain, Internet of Things, resilience, and short-term food supply chains. This is a topic that needs further research, especially due to the international COVID-19 pandemic and the need for farmers to be closer to consumers [3]. 5G information systems have a place in many fields. Modarress B's research shows that the feedback scheme developed for traditional MIMO systems in LTE is not efficient for massive MIMO systems because the overhead increases almost linearly with the number of antennas. In addition, the massive MIMO codebook is very large, and it is difficult to design using LTE methods. This paper proposes a novel CSI feedback scheme, namely, CSI feedback based on hierarchical multipath information (LMPIF), which can be used in dual-polarized antennas. The system achieves higher spectrum efficiency with lower feedback overhead. The MIMO channel is decomposed into long-term components and short-term components [4]. Although the research perspective is forward-looking, there are still many unachievable parts of the technology.

1.4 Innovation

The innovations of this article are as follows: (1) Establish a supply chain network risk investigation framework model based on complex network theory. This paper takes supply chain network risk as a research difficulty and uses virus growth models, node importance evaluation models, immune system theory, and other methods to identify and evaluate supply chain risks and transmission mechanisms and systematically build immune strategies and network optimization design molds. This paper constructs a supply chain security evaluation model and indicator system. This indicator system classifies supplier evaluation indicators from different perspectives, which can reflect the performance of candidate suppliers in a more systematic and detailed manner and provide a reference for future research. (2) We propose a multi-index evaluation model based on the "best strategy" (best strategy, TOS). (3) Establish a multilevel evaluation model from business risk to supply chain network risk. (4) The SIS-RP diffusion model introduces the supply chain risk diffusion model. Supply chain risk communication research introduces dynamic communication theory in complex networks and introduces the SIS-RP dynamic risk communication model. This better reflects the macro-process of supply chain risk communication in the network.

2 Complex network theory

Supply chain risk management and complex network theory have been hot research topics in recent years. The core work of this article is to conduct cross-cutting research between complex network theory and supply chain risk and explore the research of complex network theory in supply chain risk management. Therefore, before carrying out various studies, it is necessary to comprehensively discuss the concepts, origins, and main research results of theories such as risk, supply chain, supply chain risk, and complex networks to provide basic theoretical support for subsequent research. A supplier evaluation index system model was established, the reasons for its selection based on the supply chain were explained, and the evaluation indices were processed in a dimensionless manner.

2.1 Statistical characteristics of complex networks

In recent years, people have proposed many concepts and methods for describing the topological structure of complex network structures. Among them, there are four basic statistical concepts: degree distribution, average path length, clustering coefficient (clustering coefficient), and betweenness. The statistical characteristics of these networks are introduced below [5, 6].

  1. (1)

    Degree and degree distribution

The number of edges connected to a node (the number of neighboring nodes) is the degree of the node, which can be defined by the adjacency matrix [7].

$$ k_{i} = \mathop \sum \limits_{j \in N} a_{ij} $$
(1)

The object described by the degree index is a specific node in the network, which usually represents the influence of the node, and the greater the degree, the greater its influence. The node degree reflects only the nature of a single node. If all the node degrees in the network are summed and the arithmetic average is calculated, the average node degree of the network is obtained, which is generally denoted as <k>.

$$ \left\langle k \right\rangle = \frac{1}{N}\mathop \sum \limits_{i = 1}^{N} k_{i} $$
(2)

Degree distribution refers to the probability that a node will be randomly selected by a network with degree k. This can be represented by the probability distribution function P, which represents the dispersion of each node in the network [8, 9]. Statistically speaking, it can be expressed as the ratio of the number of nodes with degree k to the total number of network nodes:

$$ P\left( k \right) = \frac{{n_{k} }}{N} $$
(3)

where \(n_{k}\) represents the number of nodes with node degree k, and N represents the network scale, that is, the total number of nodes in the network [10]. Another index describing the statistical characteristics of network degrees is the cumulative degree distribution. As the name suggests, the cumulative degree distribution is the probability that the degree of a statistical node is greater than or equal to k, expressed as follows:

$$ P_{k} = \mathop \sum \limits_{{k_{1} = k}}^{\infty } P\left( {k_{1} } \right) $$
(4)

The average path length is a measure used to describe the effectiveness of network information or hardware forwarding and refers to the average shortest distance between all pairs of nodes in the network [11, 12]. The shortest distance between two nodes and the average path length of the \({d}_{ij}\) network are N, so the total number of edges that intersect the fastest path between any two nodes i and j in the network can be determined:

$$ L = \frac{2}{{N\left( {N - 1} \right)}}\mathop \sum \limits_{i \ge j} d_{{{\text{ij}}}} $$
(5)

L is the path and N is the number of nodes. i, d, j are the corresponding parameters. Because the calculation process of the average path length is relatively complicated, it is often difficult to calculate it through the abovementioned method for a large-scale network [7]. After studying the WWW network, Albert et al. proposed the fitting relationship between the average shortest path length of a large-scale network and the network node size N, as shown below:

$$ L = 0.35 + 2.06\lg \left( N \right) $$
(6)

This fitting relationship is mainly based on the WWW network. It is only an approximate algorithm and is not suitable for all large-scale networks.

  1. (2)

    Clustering coefficient

Supplier evaluation and selection in the supply chain environment is different from the evaluation index system used in general supplier evaluation and selection. The general supplier evaluation index pays more attention to some short-term, procurement-related indicators, such as price, quality and delivery time, historical performance, etc. The clustering coefficient, also known as the cluster coefficient, is an important parameter that has attracted much attention in complex network theory and empirical research, and it describes the degree of clustering between nodes [13]. Assuming that the degree of the number of nodes in the network is \(n_{i}\), the number of neighboring nodes of this node is \(n_{i}\). Obviously, there can be at most \(n_{i}\) edges between the \(n_{i} (n_{i} \, - \,1)/2\) neighboring nodes. Assuming the actual number of edges \({E}_{i}\) between the \({n}_{i}\) neighboring nodes, the clustering coefficient of node i can be obtained as \(C_{i}\):

$$ C_{i} = \frac{{2E_{i} }}{{n_{i} \left( {n_{i} - 1} \right)}} $$
(7)

In the network group based on the 5G information system, at the same time, it can be considered that the so-called supply chain refers to the supply and demand network composed of raw material suppliers, wholesalers, retailers, and final consumers involved in product production and circulation. The clustering coefficient can be used not only to measure the degree to which a node in a network and its neighboring nodes gather to form a community but also to calculate the clustering coefficient C of the entire network by averaging the clustering coefficients of all nodes in the network. The expression is:

$$ C = \frac{1}{N}\mathop \sum \limits_{i = 1}^{N} C_{i} $$
(8)

The average clustering coefficient of the network can also be obtained by another equivalent method:

$$ C = \frac{3 \times \Delta }{{N_{\Delta } }} $$
(9)

where △ is the total number of triangles in the network, and M is the total number of three connected nodes in the network [14].

  1. (3)

    Betweenness

Betweenness can reflect the comprehensive role and influence of nodes or edges in the entire network. Unlike node degree, betweenness is more focused on describing the global importance of nodes or edges, while node degree focuses on the importance of nodes at the micro-level [15]. Therefore, the expression formula for the betweenness of node i is:

$$ g\left( i \right) = \mathop \sum \limits_{s \ne t,s \ne v} \frac{{\delta_{{{\text{st}}}} \left( i \right)}}{{\delta_{{{\text{st}}}} }} $$
(10)

where \(\delta_{{{\text{st}}}} \left( e \right)\) is the number of shortest paths between nodes passing through node f, and \(\delta_{{{\text{st}}}}\) is the total number of all shortest paths between node S and node t. Similarly, edge intermediary (EB) is defined as the ratio of the shortest path through an edge to all the shortest paths calculated in the network [16]. Therefore, the expression for the betweenness of edge e is:

$$ g\left( e \right) = \mathop \sum \limits_{s \ne t,s \ne v} \frac{{\delta_{{{\text{st}}}} \left( e \right)}}{{\delta_{{{\text{st}}}} }} $$
(11)

Among them, %(P) is the number of shortest paths between node J and node f through edge e.

2.2 Classification of complex networks

There are multiple classification methods for complex networks. For example, the network can be divided into directed and undirected networks, depending on the direction of the network edge. According to the weight of the edge in the network, it can be divided into weighted and unweighted networks and dense and sparse networks (depending on the edge) [17, 18]. However, usually from the perspective of network topology, the main classification of complex networks can be roughly divided into regular networks, random networks, small-world networks, and scale-free networks (BAs). The following is a brief introduction to the network generation model and network characteristics.

The finally constructed 5G information system can efficiently operate the entire supply chain, reduce costs, improve services, and enhance rapid response capabilities, thereby providing practical support and guarantees for improving core competitiveness. A regular network is a network with a certain degree of regularity in the topological structure and translational symmetry. The closest adjacent link network is a network in which each node in the network can only be connected to the closest adjacent node K/2 on both sides of the network, where K is an even number less than or equal to IV, and the value of K is directly related to the dilution of the network. Obviously, the nearest neighbor link network model is a network model with a ring structure and periodic boundary conditions [19, 20]. If the value K is large, the grouping factor C of the adjacent link network model is:

$$ C = \frac{{3\left( {k - 2} \right)}}{{4\left( {K - 1} \right)}} \approx \frac{3}{4} $$
(12)

For a fixed value of K, the average path length L of the nearest neighbor coupling network is:

$$ L = \frac{N}{2K} \to \infty $$
(13)

The star coupling network has only one central node with the highest degree of nodes, and the remaining nodes are only connected to this central node [21, 22]. Therefore, for a star-connected network, the degree of the central node is N-1, and the degree of other nodes is 1. The clustering factor C and the average path length 3 of the closest adjacent link model are:

$$ C = \frac{N - 1}{N} \to 1\left( {N \to \infty } \right) $$
(14)
$$ L = 2 - \frac{{2\left( {N - 1} \right)}}{{N\left( {N - 1} \right)}} \to 2\left( {N \to \infty } \right) $$
(15)

3 Supply chain information flow evaluation model

With the issuance of China's 4G LTE license along with the help of new technologies, wireless networks based on cellular networks have once again improved the overall performance of the network. In addition, the popularity of smartphones, the rise of mobile internet, the emergence of new mobile applications, new services, new user experiences, and the demand for new mobile communication systems have led to a huge demand for wireless mobility. Strict delay requirements, not only in the network but also in time, have led to huge energy consumption. Today's latest 4G networks can no longer meet the future demand for high-speed data transmission and mobile communications. The industry has been studying fifth-generation mobile communication systems one after another. By analyzing the principles and processes of supplier evaluation index system construction, as well as existing research results at home and abroad, a supplier evaluation index system based on the supply chain was constructed. Figure 1 shows the 5G network architecture.

Fig. 1
figure 1

5G network architecture diagram

3.1 Construction of risk assessment index system

Combining the description of supply chain information flow risk and the analysis of the factors affecting the internal information flow risk of supply chain node enterprises in accordance with the existing principles and standards, through the analysis and combination of relevant documents, a preliminary supply chain enterprise internal information flow risk assessment index system is obtained. The internal information flow risk assessment indicator system of supply chain enterprises is composed of three secondary indicators and nine tertiary indicators. The specific indicator system is shown in Fig. 2:

Fig. 2
figure 2

Preliminary indicator system of supply chain information flow risk assessment

Therefore, this study conducted interviews and questionnaire surveys with experts familiar with the content of this research at various universities in Yunnan Province and used a Likert scale to quantitatively analyze the impact of various indicators on the information flow risk of supply chain enterprises. To improve research efficiency and avoid duplication of work, the questionnaire was divided into two parts. At the same time, it investigated the indicators that affect the risk of internal information flow of supply chain node enterprises and the indicators that affect the risk of information flow between supply chain node enterprises. The impact of the indicator was divided into five levels: "huge impact", "large impact," "normal impact," "small impact," and "basically no impact," and values of 5, 4, 3, and 2 were assigned in turn. 1. A total of 110 questionnaires were distributed in this survey, and 84 questionnaires were recovered, with an effective rate of 76.36%. First, the reliability of the questionnaire was analyzed, and the Cronbach coefficient was used for reliability measurement. The data collected in this questionnaire were analyzed by SPSS 17.0 software, and the results obtained are shown in Table 1:

Table 1 Total reliability statistics table

Table 1 shows that the total reliability index of the questionnaire was Cronbach = 0.825 > 0.8, indicating that the reliability of the questionnaire survey was relatively high. Subsequently, SPSS 17.0 software was used to perform factor analysis to screen the indicators. F1 ~ F9 in turn represent information processing capability, corporate information management system, internal network security, corporate organizational structure, information uncertainty, ideology, degree of informatization, information management personnel quality, and employee information security awareness. The principal component analysis method was used, the maximum variance orthogonal rotation method was used to rotate, and the number of factors extracted according to the principle that the eigenvalue was greater than 1. The score coefficient matrix of the factor analysis results is shown in Table 2:

Table 2 Factor scoring coefficient matrix

The supplier evaluation indicator system in the supply chain environment pays more attention to indicators related to strategy, sustainability, complementarity, and compatibility. According to the data in Table 3, the indices whose loads in all factors are all less than 0.5 are eliminated. That is, the indicators "corporate organizational structure," "information uncertainty of oneself," "degree of informatization," and "employee information security awareness" are removed from the evaluation system.

Table 3 Combination weight table of subjective and objective matrix

3.2 Combining rough set theory and analytic hierarchy process to construct objective matrix

On this basis, an objective judgment aid is constructed, using p1, p2, p3, p4, and p5 as the condition attributes, and d represents the decision attribute, corresponding to the decision attribute D (criterion layer). Eleven experts were selected to evaluate the importance of the correlation between "risk probability," "risk impact," and "uncontrollability" and the five security events at the program level. According to the difference in the importance of their correlation, the value range is { 1, 2, 3, 4}, and the meaning of the attribute value represents 1 (no impact), 2 (slight impact), 3 (general impact), and 4 (very impact). The following selects 11 experts as the object set U. The experts evaluated the security incidents based on their own experience and experience. According to the combined weight calculation formula W = W(l)W(2) of each security incident regarding the importance of the security incident, Table 3 is obtained, and the subjective and objective matrix combination weight table is shown.

The results show that the final combined weights of risk factors P1, P2, P3, P4, and P5 are 0.2945, 0.1658, 0.1595, 0.2056, and 0.1787, respectively. The security incident "hardware failure" (P1) has the highest degree of risk, followed by "data leakage" (P4), followed by "denial of service" (P5), and "operational error" (P2). The lowest security risk is "Denial of Service" (P3). Since P1 has a relatively large security risk weight, when performing security control on the information system, the measures that should be taken are regular and high-frequency inspections of computer hardware.

3.3 Hybrid nonlinear goal programming model

One relevant example is the cigarette supply and marketing network of a province in China. Because cigarettes are monopoly products prescribed by the state, a provincial tobacco company is responsible for the overall planning and implementation management of the entire supply and marketing network. At present, there are three cigarette production enterprises (manufacturers) in the province, and the production capacity of each manufacturer is cap = 2000. To further expand the market, the provincial headquarters promoted a new product plan and planned three alternative distribution centers and nine alternative sales markets around the distribution and sales of new products. Therefore, the cigarette supply and marketing network is a three-level supply chain network. The following is a simulation analysis of the optimization design problem of the distribution center and sales market layout in the cigarette supply chain network, as shown in Table 4:

Table 4 Sensitivity analysis results of the probability change of the interruption status

As the probability of Condition 2 increases, the probability of Condition 1 and Condition 4 decreases and increases. The level of profit is declining significantly. At the same time, due to the increase in the possibility of interruption by manufacturer No. 2, the supply chain path with manufacturer No. 2 as the origin no longer occupies a major position, and the No. 2 alternative distribution center through which these supply chain paths pass is naturally taken from. The supply chain network was removed, which also resulted in the removal of the No. 4 and No. 5 sales markets that only received products from the No. 2 distribution center from the supply chain network. However, this layout changed when the probability of situation 2 increased to 0.55. This is mainly because the supply of the entire product becomes increasingly secure when the possibility of interruption of the No. 2 manufacturer reaches a certain level. At this time, the product supply will be biased toward the market with more demand and greater profit. Due to the high cost of the supply chain path through the No. 1 alternative distribution center and low market demand, the No. 2 alternative distribution center has obvious advantages. Therefore, the No. 1 alternative distribution center was eliminated, and the No. 2 alternative distribution center was reincorporated into the supply chain network. At the same time, alternative sales market No. 1.2.3, which only picked up goods from alternative distribution center No. 1, was also eliminated. It can also be found that, compared with the No. 1 manufacturer, the supply chain path with the No. 2 manufacturer as the point of origin has greater profit margins.

This section mainly considers the problem of supply chain network optimization design when market demand is uncertain and product supply is interrupted due to risk events. A hybrid nonlinear objective programming model is given, and the model is analyzed from the perspective of the robustness of the solution: Optimized around the problem of solving the model, a method based on piecewise linear transformation is proposed, and finally, a case was used to model and solve the target programming problem, which verifies the effectiveness of the model and the solution method.

4 Experiment and result analysis

This paper analyzes the experimental data and verifies the validity and accuracy of the acceptability evaluation model through simulation experiments. The direction of the experiment is mainly to verify the validity of the trust model and the risk model in the acceptability model, as well as the comparison between the acceptability model and the Josang evaluation model.

The feasibility verification of the e-commerce network transaction model needs to consider the following three parts: (1) the validity verification of the trust degree model; (2) the validity verification of the risk degree model; and (3) the validity verification of the acceptability model feasibility verification. Because the global reputation is only the expected value of the local reputation of the node relative to the neighbor node in the experiment of the simulation trust degree model, it is only necessary to verify the accuracy of the local reputation calculation and the reliability of the trust degree model; in the experiment of the risk degree model simulation model, verify the influence of risk factors on the results of risk calculation; in the simulation experiment of the acceptability model, the simulation compares the acceptability model and the Josang model. To accurately ensure the validity and credibility of the experimental results, representative data are selected for simulation experiments to improve the reliability of the experimental results.

Experiment 1: Validity analysis of acceptability model.

Figure 3 shows that as the transaction time is farther away from the current moment, the local reputation gradually decays and converges to a fixed value. From the figure, it can be found that if the transaction amount between nodes is larger, the node evaluation accounts for the greater the proportion of, the greater the local reputation value of the node.

Fig. 3
figure 3

The impact of transaction time and transaction amount on the node's local reputation

In addition to factors such as cost, quality, and delivery to investigate and study the evaluation index system for companies choosing suppliers, researchers must also consider the relationship of creditworthiness. Figure 4 shows the change value of the node's trust degree in a certain period of time. It can be seen from the figure that when the global reputation value is 0.5 and the local reputation value is 0.8 and 0.7, the trust degree changes with the change of the confidence factor. It can be seen that as the value of the confidence factor becomes smaller and smaller, the trust degree converges more and more to the global reputation, and vice versa.

Fig. 4
figure 4

The influence of confidence factor on trust

Figure 5 simulates the impact of risk factors and transaction failure values on the results of the risk calculation. With the continuous delay of online transaction time, the failure value of the transaction gradually increases. It can be seen from Fig. 5 that when the value of the risk factor is 0.4, 0.7, and 0.8, the calculation result of the risk degree will gradually become larger and eventually converge toward a certain fixed value: When the failure value of the network transaction gradually increases, the risk of online transactions has also become greater.

Fig. 5
figure 5

The impact of risk factors and transaction failure values on risk

Experiment 2: Comparative experiment.

The simulation in Fig. 6 compares the acceptability model and the Josang reputation model. It can be seen from Fig. 6 that the acceptability model comprehensively considers trust and risk, and the calculated value is lower than Josang and other reputation-based evaluation models, which can effectively avoid transactions with malicious nodes. Therefore, when the risk degree is introduced into the transaction evaluation model, the node transaction decision result of the model evaluation is more accurate and reliable.

Fig. 6
figure 6

Comparison of the acceptability model and Josang reputation model

Experimental conclusion: The acceptability transaction evaluation model proposed in this paper combines objective risks into transaction decisions for the first time, making the results of model calculations more accurate, effectively improving the accuracy of nodes participating in network transaction decisions, and thus avoiding inaccurate transactions occurring at the node.

5 Conclusion

To improve agility, many companies invest much money to build cross-organizational information systems to enhance coordination between companies so that they can quickly respond to continuous market changes. However, many companies cannot adapt well to changing demands. With the advent of the internet and the era of big data, the business environment has become increasingly complex. To adapt to changes in the environment, traditional supply chain companies have evolved into a complex system with increasingly larger scales and increasingly complex organizations through continuous development. In the process of this change, faced with its own large scale and complex organization, the supply chain risk problem that the company has to solve has become increasingly prominent. In the production and operation of supply chain enterprises, information flow is an important channel connecting logistics and capital flow. With the increase in supply chain business partners, the growth of the number of transactions, and the diversification of cooperative relations, the data that enterprises need to receive and output are increasing. In the face of significant growth in the amount of information, it is particularly important for companies to guide the correct, efficient, and safe flow of information. The ever-increasing information flow is filled with considerable information noise, and only good information flow management can provide decision support for the enterprise's logistics and capital flow; otherwise, it will only mislead managers to make incorrect decisions. Therefore, if companies intend to develop well and stand out in today's highly competitive environment, they must pay attention to the risk of information flow in the supply chain. Compared with the traditional supply chain, the 5G information system brings more benefits to enterprises. For example, flexibility and rapid market response enable enterprises to obtain higher financial performance. The reason behind the competitive advantage brought by these technologies in the supply chain is the enhancement of the perception and resilience enabled by information technology. In addition to directly improving the two agility capabilities of the enterprise, the flexible 5G information system in this article can also alleviate the negative impact of supply chain resource advantages on agility.