“…The literature has not yet structured the potential vulnerabilities concerned with relational properties between the members of supply chain triads and has not provided a structured analytical approach towards the assessment of such vulnerabilities. We noticed that this issue could be effectively resolved using the modelling apparatus of graph theory, a mathematical approach widely adopted in operations research (e.g., Ahmadi-Javid, Ardestani-Jaafari, Foulds, Hojabri, & Farahani, 2015;Li, Kilgour, & Hipel, 2005;Ng, Cheng, Bandalouski, Kovalyov, & Lam, 2014) The aim of this study is two-fold: (i) using the toolset of graph theory, to model different cross-organizational pathways according to which risks can emerge and propagate in service triads seen as an elementary form of service supply networks; and (ii) to provide a method for vulnerability assessment of the suggested graph models of service triads, taking into consideration the typology and direction of the cross-organizational relationships within graph models of supply chain triads.…”