2018
DOI: 10.1016/j.ress.2017.09.018
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of vulnerabilities in maritime supply chains

Abstract: This paper aims to analyze the different concepts of "vulnerability" used in maritime supply chains, and to develop a novel framework with supporting models to identify and analyze the relevant vulnerabilities in the chains. A real case of the Maersk shipping line in its Asia-Europe route is studied to demonstrate the applicability of the proposed framework. We find that the investigated network has stronger robustness against random failures than that when facing deliberate attacks. Furthermore, to identify v… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
36
0
4

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 82 publications
(41 citation statements)
references
References 34 publications
1
36
0
4
Order By: Relevance
“…This will inevitably lead to a relatively large deviation between the calculated results and the actual situations, as the information provided by a single centrality does not reflect the overview of the entire shipping network. To measure the overall impact of the port and rank it according to the summary information of different centrality indicators, this paper integrates the results from different centrality measures by scoring them using a Borda Count method (18)(19)(20). The Borda Count method is a voting method in which candidates are ranked in order of priority (21).…”
Section: Centrality Measuresmentioning
confidence: 99%
See 1 more Smart Citation
“…This will inevitably lead to a relatively large deviation between the calculated results and the actual situations, as the information provided by a single centrality does not reflect the overview of the entire shipping network. To measure the overall impact of the port and rank it according to the summary information of different centrality indicators, this paper integrates the results from different centrality measures by scoring them using a Borda Count method (18)(19)(20). The Borda Count method is a voting method in which candidates are ranked in order of priority (21).…”
Section: Centrality Measuresmentioning
confidence: 99%
“…In this study, the vulnerability of the MSR shipping network is investigated as a validation of the results obtained from the proposed multi-centrality method, in which centrality indicates the extent of the middle of ports, whereas vulnerability reflects the impact of ports on the functionality of a shipping network. They reflect the importance of a port from different angles ( 26 ). Different metrics have been proposed to measure the drop of network performance in relation to a network’s vulnerability including global network efficiency ( 27 ), average shortest distance ( 28 ), and the size of the largest connected subgraph ( 29 ).…”
Section: Multi-centrality Of Ports Along the Msrmentioning
confidence: 99%
“…Supply chain vulnerability as a concept within supply chain risk management literature remains inconclusive as it varies with regards to its research contexts, definition and framework (Liu et al, 2018). Most studies, present supply chain vulnerability as an elusive concept that occurs through certain traits of a supply chain, such as its design and the environment in which the supply chain exists.…”
Section: Review Of Literaturementioning
confidence: 99%
“…The concept of vulnerability was first proposed by Timmerman (1981), who described vulnerability as the severity of adverse consequences caused by disruptive events. The concepts of the term “vulnerability” evolve in different research contexts (Liu et al , 2018b), including (1) the opposite perspective of the concept “network robustness”, (2) the importance of elements (i.e. “vulnerability index”) and (3) node dependence.…”
Section: Literature Reviewmentioning
confidence: 99%