Facilitating uncertainty treatment in the risk assessment of container supply chains

Over the last few years there has been a growing international recognition that Container Supply Chains (CSCs) contribute to economic prosperity. But they are uniquely vulnerable to many risks caused by both the traditional hazards, such as physical breaches in the integrity of shipments and the newly rising threats associated with pirate and terrorist attacks. To allow better understanding and control of the risks, it is necessary for the stakeholders to proactively assess the chains’ security and safety in advance, or reactively discover risks after a detrimental event occurs. This paper explores the various CSC risks, identifies common themes, and deals with the corresponding uncertainties by developing two novel risk modelling methods. One is to develop a fuzzy evidential reasoning approach for carrying out the security estimation of a vulnerable port system against terrorism attacks and the other is to produce a Bayesian network decision support tool for identifying vulnerable assets in a port security protection scenario. Consequently, the methods can be used to assemble and process subjective risk information on different aspects of a container transport system from multiple experts in a systematic way. Outcomes of the models can also provide decision makers with a transparent tool to evaluate CSC safety and security policy options for a specific scenario in a cost-effective manner.

[1]  M. Bohanec,et al.  The Analytic Hierarchy Process , 2004 .

[2]  M. U. Thomas,et al.  Supply chain reliability for contingency operations , 2002, Annual Reliability and Maintainability Symposium. 2002 Proceedings (Cat. No.02CH37318).

[3]  Joanne Bechta Dugan,et al.  A discrete-time Bayesian network reliability modeling and analysis framework , 2005, Reliab. Eng. Syst. Saf..

[4]  Yasuhiro Monden,et al.  Toyota Production System: An Integrated Approach to Just-In-Time , 1993 .

[5]  David Rosenberg,et al.  Maritime Security in the South China Sea: Coordinating Coastal and User State Priorities , 2008 .

[6]  Shankar Ganesan Determinants of Long-Term Orientation in Buyer-Seller Relationships , 1994 .

[7]  David J Marchette Bayesian Networks and Decision Graphs , 2003, Technometrics.

[8]  Y. Sugimori,et al.  Toyota production system and Kanban system Materialization of just-in-time and respect-for-human system , 1977 .

[9]  Hau L. Lee,et al.  Mitigating supply chain risk through improved confidence , 2004 .

[10]  Kun Jai Lee,et al.  Application of Bayesian network to the probabilistic risk assessment of nuclear waste disposal , 2006, Reliab. Eng. Syst. Saf..

[11]  Sankaran Mahadevan,et al.  Validation of reliability computational models using Bayes networks , 2005, Reliab. Eng. Syst. Saf..

[12]  Jianlin Yuan The Risk Management of Supply Chain , 2010, 2010 International Conference on Management and Service Science.

[13]  G. Svensson A conceptual framework of vulnerability in firms’ inbound and outbound logistics flows , 2002 .

[14]  新郷 重夫,et al.  A revolution in manufacturing : the SMED system , 1985 .

[15]  Taiichi Ohno,et al.  Toyota Production System : Beyond Large-Scale Production , 1988 .

[16]  Baback Yazdani Book reviewToyota production system: an integrated approach to Just-In-Time (2nd ed): Yasuhiro Monden Chapman & Hall, London (1994) 423 pp, £39.95 ISBN 0-412-58220-1 , 1995 .

[17]  T. C. E. Cheng A state-of-the-art review of just-in-time production , 1990 .

[18]  Shigeo Shingo A Revolution in Manufacturing: The SMED System , 1985 .

[19]  Catherine Zara Raymond,et al.  Maritime Terrorism in Southeast Asia: A Risk Assessment , 2006 .

[20]  Andrzej Rucinski,et al.  USING TECHNOLOGY TO BRIDGE MARITIME SECURITY GAPS , 2005 .

[21]  Tao Li Risk Assessment in the Supply Chain Management Based on Fuzzy AHP Model , 2012 .

[22]  Jian-Bo Yang,et al.  On the evidential reasoning algorithm for multiple attribute decision analysis under uncertainty , 2002, IEEE Trans. Syst. Man Cybern. Part A.

[23]  J. Coyle,et al.  The management of business logistics , 1976 .

[24]  Jin Wang,et al.  Fuzzy Rule-Based Bayesian Reasoning Approach for Prioritization of Failures in FMEA , 2008, IEEE Transactions on Reliability.

[25]  M. R. Wilhelm,et al.  A fuzzy linguistic approach to implementing a strategy for computer integrated manufacturing , 1991 .

[26]  Shouyang Wang,et al.  Risk management in supply chains , 2011 .

[27]  Ernst G. Frankel Systems Reliability and Risk Analysis , 1983 .

[28]  A. G. Eleye-Datubo,et al.  Marine and Offshore Safety Assessment by Incorporative Risk Modeling in a Fuzzy‐Bayesian Network of an Induced Mass Assignment Paradigm , 2008, Risk analysis : an official publication of the Society for Risk Analysis.

[29]  Hans-Jürgen Zimmermann,et al.  Fuzzy Set Theory - and Its Applications , 1985 .

[30]  Y. Narahari,et al.  Design of synchronized supply chains: a six sigma tolerancing approach , 2000, Proceedings 2000 ICRA. Millennium Conference. IEEE International Conference on Robotics and Automation. Symposia Proceedings (Cat. No.00CH37065).

[31]  Hong-Zhong Huang,et al.  Bayesian reliability analysis for fuzzy lifetime data , 2006, Fuzzy Sets Syst..

[32]  M. Mizumoto,et al.  Improvement of Fuzzy Control Methods , 1995 .

[33]  S Bonsall,et al.  Use of Fuzzy Evidential Reasoning in Maritime Security Assessment , 2009, Risk analysis : an official publication of the Society for Risk Analysis.

[34]  Enrico Cagno,et al.  Using AHP in determining the prior distributions on gas pipeline failures in a robust Bayesian approach , 2000, Reliab. Eng. Syst. Saf..

[35]  Jin Wang,et al.  Use of hybrid multiple uncertain attribute decision making techniques in safety management , 2009, Expert Syst. Appl..

[36]  MengChu Zhou,et al.  Methods toward supply chain risk analysis , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).

[37]  T. Saaty,et al.  The Analytic Hierarchy Process , 1985 .

[38]  Y. Narahari,et al.  Design of six sigma supply chains , 2004, IEEE Transactions on Automation Science and Engineering.

[39]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[40]  Luis Martínez-López,et al.  Self-tuning of fuzzy belief rule bases for engineering system safety analysis , 2008, Ann. Oper. Res..

[41]  Paul Chapman,et al.  Identifying and Managing Supply Chain Vulnerability , 2002 .

[42]  Juergen Weichselgartner,et al.  Disaster mitigation: the concept of vulnerability revisited , 2001 .

[43]  James R. Evans Applied production and operations management , 1987 .

[44]  Jian-Bo Yang,et al.  Engineering System Safety Analysis and Synthesis Using the Fuzzy Rule‐based Evidential Reasoning Approach , 2005 .

[45]  Jin Wang,et al.  A fuzzy-logic-based approach to qualitative safety modelling for marine systems , 2001, Reliab. Eng. Syst. Saf..

[46]  大野 耐一,et al.  Toyota production system : beyond large-scale production , 1988 .

[47]  Sushil Kumar,et al.  Dependency and its predictions for systems and its components , 2003 .

[48]  Göran Svensson,et al.  A conceptual framework for the analysis of vulnerability in supply chains , 2000 .

[49]  M. Singh,et al.  An Evidential Reasoning Approach for Multiple-Attribute Decision Making with Uncertainty , 1994, IEEE Trans. Syst. Man Cybern. Syst..

[50]  Chris Carr,et al.  Lessons from Nissan′s British Suppliers , 1992 .

[51]  John King,et al.  The security of merchant shipping , 2005 .

[52]  J. Urbański,et al.  The Safety and Security Systems of Maritime Navigation , 2008, Journal of Navigation.