Modeling Company Risk and Importance in Supply Graphs
Managing one’s supply chain is a key task in the operational risk management for any business. Human procurement officers can manage only a limited number of key suppliers directly, yet global companies often have thousands of suppliers part of a wider ecosystem, which makes overall risk exposure hard to track. To this end, we present an industrial graph database application to account for direct and indirect (transitive) supplier risk and importance, based on a weighted set of measures: criticality, replaceability, centrality and distance. We describe an implementation of our graph-based model as an interactive and visual supply chain risk and importance explorer. Using a supply network (comprised of approximately 98, 000 companies and 220, 000 relations) induced from textual data by applying text mining techniques to news stories, we investigate whether our scores may function as a proxy for actual supplier importance, which is generally not known, as supply chain relationships are typically closely guarded trade secrets. To our knowledge, this is the largest-scale graph database and analysis on real supply relations reported to date.
KeywordsSupply chain analysis Graph analysis Risk analysis Vulnerability analysis Linked data Procurement
We would like to thank Khalid Al-Kofahi and the CTO office for supporting this work and thank Giuseppe Saltini, Shai Hertz, Yoni Mataraso and Geoffrey Horrell for discussions and data.
- 2.Alhomidi, M., Reed, M.: Attack graph-based risk assessment and optimisation approach. Int. J. Netw. Secur. Appl. 6(3), 31 (2014)Google Scholar
- 4.Bisias, D., Flood, M.D., Lo, A.W., Valavanis, S.: A survey of systemic risk analytics. US Department of Treasury, Office of Financial Research 0001 (2012)Google Scholar
- 10.Huang, X., Vodenska, I., Havlin, S., Stanley, H.E.: Cascading failures in bi-partite graphs: model for systemic risk propagation. Sci. Rep. 3, Article no: 1219 (2013). doi: 10.1038/srep01219
- 14.Nugent, T., Leidner, J.L.: Risk mining: company-risk identification from unstructured sources. In: IEEE International Conference on Data Mining, ICDM, pp. 1308–1311 (2016)Google Scholar
- 15.Phillips, C.A., Swiler, L.P.: A graph-based system for network-vulnerability analysis. In: Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22–25, 1998, pp. 71–79 (1998)Google Scholar
- 17.Simchi-Levi, D., Schmidt, W., Wei, Y.: From superstroms to factory fires: managing unpredictable supply chain disruptions. Harv. Bus. Rev. 92(1), 96–100 (2014)Google Scholar
- 18.Stergiopoulos, G., Kotzanikolaou, P., Theocharidou, M., Gritzalis, D.: Risk mitigation strategies for critical infrastructures based on graph centrality analysis. IJCIP 10, 34–44 (2015)Google Scholar
- 23.Xu, N.-R., Liu, J.-B., Li, D.-X., and Wang, J.: Research on evolutionary mechanism of agile supply chain network via complex network theory. In: Mathematical Problems in Engineering 2016 (2016)Google Scholar