Sie sind auf Seite 1von 8

International Journal of Automation and Computing 1 (2005) 85-92

A Subjective Risk Analysis Approach


of Container Supply Chains
Zai-Li Yang, Jin Wang∗ , Steve Bonsall
School of Engineering, Liverpool John Moores University, Liverpool, L3 3AF, UK

Jian-Bo Yang
Manchester Business School, The University of Manchester, Manchester, M60 1QD, UK

Quan-Gen Fang
Merchant Marine College, Shanghai Maritime University, Shanghai, 200135, PRC

Abstract: After the 9/11 terrorism attacks, the lock-out of the American West Ports in 2002 and the breakout of SARS
disease in 2003 have further focused mind of both the public and industrialists to take effective and timely measures for
assessing and controlling the risks related to container supply chains (CSCs). However, due to the complexity of the risks
in the chains, conventional quantitative risk assessment (QRA) methods may not be capable of providing sufficient safety
management information, as achieving such a functionality requires enabling the possibility of conducting risk analysis in
view of the challenges and uncertainties posed by the unavailability and incompleteness of historical failure data. Combing
the fuzzy set theory (FST) and an evidential reasoning (ER) approach, the paper presents a subjective method to deal with
the vulnerability-based risks, which are more ubiquitous and uncertain than the traditional hazard-based ones in the chains.

Keywords: Container supply chains, risk assessment, evidential reasoning, fuzzy sets, vulnerability.

1 Introduction chains, Garg et al.[4] developed and applied an inno-


vative approach for designing Six Sigma supply chain
Container supply chains (CSCs), with many com- networks to qualify reliable supply chains with synchro-
plex physical and information flows, have contributed nized delivery. After reviewing the existing techniques
themselves to economic prosperity and also rendered used in decision making for risk analysis, Pai et al.[5]
themselves uniquely vulnerable by many risks. In the presented a modelling and analysis framework for as-
past decade, some specific events closely related to the sessing logistics risks and evaluating safeguards to se-
risks include the Kobe earthquake which affected sup- cure supply chains. Svensson[6] generated a framework
ply chains across the globe in 1995; the Asian economic for managing vulnerability in supply chains and anal-
crisis in 1997; the Y2K-related IT problems at the end ysed the vulnerability from firms’ inbound and out-
of the 20th century; the fuel protest of September 2000 bound logistics flows. Chapman et al.[1] identified sup-
across Europe; the terrorist attacks of 11th Septem- ply chain vulnerability and used an advanced “3-P”
ber 2001 in USA; the lock-out of American West Ports approach to manage risks in logistics supply chains.
of October 2002; the breakout of SARS disease in the Although prior research has greatly increased our
world in 2003; and the blasts of Madrid commuter understanding that a) the risks in CSCs originate from
trains in 2004[1,2]. These accidents showed that the def- vulnerability; b) effectively preventive actions may sig-
initions of the risks existing in the chains have changed nificantly reduce the frequency and damage of the risks,
and broadened forever. They, together with the com- few studies have considered the vulnerability in the
plexity of CSCs in nature, have stimulated the research chains as the marriage of hazards and threats and also
and development of novel risk analysis methods in the generated an appropriate approach to deal with highly
supply chain context. uncertain situations resulting from those threats.
A method for quantifying the reliability of supply Many typical safety assessment approaches (such as
chains for contingent logistics systems was developed a Qualitative Risk Assessment (QRA) approach), iden-
based on a reliability interference theory[3] . Introduc- tified as deductive risk assessments, have been widely
ing the concept of Six Sigma into the field of supply used and easily conducted based on historical data.
——————— However, such historical data is not always available,
Manuscript received August 27, 2004; revised July 13, 2005. and its collection is time-consuming and expensive as
∗ Corresponding author. E-mail address: J.Wang@livjm.ac.uk well as depends on many uncertainties. Consequently,
86 International Journal of Automation and Computing 1 (2005) 85-92

they may not be well suited for dealing with the CSC set and ER methods.
systems in situations of having a high level of uncer-
tainty. One realistic way to cope with imprecision is 2.1 Complex CSCs
to use linguistic assessments. However, such linguis-
tic descriptions define risk assessment parameters to Modern CSCs are very large and complex. A typi-
a discrete extent so that they can at times be inade- cal door-to-door journey using a shipping container will
quate. Fuzzy set theory is well suited to model such involve the interaction of approximately 25 different
subjective linguistic variables and deal with discrete participants, generate 30-40 documents, use 2-3 differ-
problems[7] . In the theory, such linguistic variables can ent modes and be handled at as many as 12-15 phys-
be characterised by their membership functions to a set ical locations[9] . Compared to other logistics systems,
of categories, which describe the degrees of the linguis- CSCs have two distinctive features. One is that both
tic variables. physical and information flows move in the same direc-
tion, although the information flow should always be
From the viewpoint of risk analysis, a CSC can be
ahead of the physical flow. The other is that another
regarded as a complex engineering system, which is
sub-flow – custody flow is identified under the umbrella
constructed by some subsystems (i.e. ports and con-
of the physical flow in order to attempt critical assess-
tainerships) with the support of many components (i.e.
ment of the risks in the systems as comprehensively as
cranes and engines). In such a hierarchical structure, it
possible.
is usually the case that safety analysis at a higher level
makes use of the information produced at lower levels. Facing the complexity of the chains, the effec-
It is therefore extraordinarily important to synthesise tive risk analysis requires a generic model to describe
the risk evaluations of the components in a rational the functions, features, characteristics and attributes,
way so as to obtain the risk evaluations of the subsys- which are common to all CSCs. The generic model is
tems and the whole system. Actually, the importance therefore not a ‘typical’ container transport chain con-
of such a synthesis means is further enforced by the sidered in isolation but the hub of a chain of systems –
requirements of combining all judgements of multiple with a physical cargo flow system at the centre, follow-
experts on either one component or the whole system. ing an information flow system at the beginning and
deciding a custody flow system at the end. Each of
Unlike the risk evaluations in QRA, which are pre-
these systems interacts dynamically with the others at
cisely expressed by some numerical values (e.g. po-
and across all levels to constitute a comprehensive pic-
tential loss of life), the risk evaluations using fuzzy
ture of the CSC operation process, as shown in Fig.1.
sets are impossibly synthesized by using normal math-
ematic logical operations. An Evidential Reasoning
(ER) approach is well suited to model subjective cred-
ibility induced by partial evidence. The kernel of this
approach is an ER algorithm developed on the basis
of the Dempster-Shafer (D-S) theory, which requires
modelling the narrowing of the hypothesis set with the
requirements of the accumulation of evidence[8] .
The current study aims at developing a subjective
risk assessment method by combining fuzzy set theory
and an ER approach to deal with the uncertainty in
CSCs. In order to achieve this purpose, the paper iden-
tifies the major problems of CSC risk analysis; creates
four parameters to assess threat-based risks; applies a
Fault Tree Analysis (FTA) method to construct a hi-
erarchical structure so as to enable the application of Fig.1 The generic model of CSCs
the ER approach in the realm of supply chains; and
validates its feasibility by a case study of terrorists at-
tacking ports. 2.2 Definition of vulnerability

2 Major problems in the CSC risk anal- Although the vulnerability concept has been in
ysis use for more than twenty years since Timmerman’s
conceptualisation[10], presently, there is still no com-
The proposed subjective approach consists of the mon conceptualization of vulnerability, and the mean-
solutions of three major problems, which outline the ings of vulnerability are still ambiguous and fuzzy[11] .
necessary steps required for risk analysis using fuzzy Many of the discrepancies in the meanings of vulner-
Z. L. Yang et al./A Subjective Risk Analysis Approach of Container Supply Chains 87

ability arise from different epistemological orientations can be considered as a hierarchical diagram, consists
and subsequent methodological practices. In a supply of many ‘OR’ and ‘AND’ gates. Therefore, a specific
chain context, vulnerability can be defined as ‘an expo- rule is required to assign the weights on a rational ba-
sure to serious disturbances, arising from risks within sis and defined as ‘all input events of an ‘OR’ gate are
the supply chain as well as risks external to the supply given the same weight equal to that of the output event
chain[1] ’. However, the current research has indicated of the gate, and the weights of all input events of an
that either internal or external risks would originate ‘AND’ gate are assigned through dividing the weight
from a hazard or threat. Thus, the vulnerability will of the output event of the gate by the number of the
be considered from another viewpoint – its nature and input events.
consequently is defined as ‘an exposure to serious dis-
turbances, arising from a hazard or threat’. Compared 3 Subjective risk assessment of CSCs
with Chapman et al.’s concept, the analysis from vul-
nerability nature will more redound to the risk anal- 3.1 Risk analysis using fuzzy sets
ysis. After all, the first step to achieve any effective
risk analysis is to better understand the true nature of After the study of traditional quantitative safety
those risks. methods like Failure Mode, Effects and Criticality
Further studying the definition of the vulnerabil- Analysis (FMECA), it can be seen that there are
ity of the chains, one will appreciate the distinction three basic parameters – failure likelihood, consequence
between hazards and threats. Differing from the defi- severity and failure consequence probability (i.e. the
nition of a hazard, a threat can be defined as an action probability that possible consequences happen, given
or a potential action rather than a physical situation the occurrence of the failure), which are used in as-
likely to cause damage, harm or loss[12] . Threat-based sessing the safety associated with each failure mode of
risks are potentially greater than hazard-based risks be- a component and in determining safety level through
cause they are sometimes not within the focal compa- “Safety scores”[7]. Given that the consequence severity
nies’ direct control. Furthermore, it may be difficult or of a threat is determined by its own damage capability
even impossible to precisely determine the probability and external recall ability, four new parameters are pro-
distribution of the parameters for a practical/potential posed to carry out threat-based risk estimation. They
action. Therefore, the emphasis of this container sup- are “Will”, “Damage capability”, “Recall difficulty” and
ply chain risk analysis is placed on those threat-based “Damage probability”. The “Will” decides the failure
risks. likelihood of a threat-based risk. The combination of
“Damage capability” and “Recall difficulty” responds
2.3 Application of FTA to the consequence severity of the threat-based risk.
The “Damage probability” represents the failure conse-
FTA is a diagrammatic method used to evaluate the quence probability of the risk.
probability of an accident resulting from sequences and In fuzzy set theory, linguistic variables that are used
combinations of faults and failure events[13] . Because to describe the probability of the four parameters, can
of its many advantages, specially in the combination of be characterised by their fuzzy set membership func-
the qualitative and quantitative analysis to provide de- tions to a set of categories which describe the degrees
cision makers with an objective means of measuring the of “Will”, “Damage capability”, “Recall difficulty” and
risk levels of a targeting system, FTA has been widely “Damage probability” and which are usually graduated
applied to the risk analysis of various industries, in- from low to high. The typical linguistic variables and
cluding logistics chains. The application of FTA to the their membership functions for the four parameters of
current study, however, is worth noting the following: a threat may be defined and characterised as shown in
i) The qualitative FTA diagram is considered as a Tables 1-4. It is obviously possible to have some flexi-
hierarchical structure to apply an ER approach. bility in the definition of membership functions to suit
The hierarchical structure should be a qualitative different situations.
FTA diagram, which means that the fault tree has
been reduced to a logically equivalent form (minimal Table 1 Will
Categories
cut sets) by using the Boolean algebra in terms of the Linguistic variables
1 2 3 4 5 6 7
specific combination of basic events sufficient for the Highly strong 0 0 0 0 0 0.75 1
undesired top event to occur[14] . Strong 0 0 0 0 0.75 1 0.25
ii) The weights of all events are distributed accord- Reasonably strong 0 0 0 0.75 1 0.25 0
Average 0 0 0.5 1 0.5 0 0
ing to a specifically defined rule.
Reasonably weak 0 0.25 1 0.75 0 0 0
The weights of all events in applying the ER method Weak 0.25 1 0.75 0 0 0 0
are determined considering that the fault tree, which Very weak 1 0.75 0 0 0 0 0
88 International Journal of Automation and Computing 1 (2005) 85-92

Table 2 Damage capability Then, those fuzzy operations in Equation (2) can
Categories be analysed and described as follows:
Linguistic variables
1 2 3 4 5 6 7 i) Cartesian product. Two Cartesian product oper-
Extremely big 0 0 0 0 0 0.75 1 ations can be separately defined by:
Big 0 0 0 0 0.75 1 0.25
Moderately big 0 0 0 0.75 1 0.25 0 µR×D = (µij
R×D )7×7
Average 0 0 0.5 1 0.5 0 0
Moderately small 0 0.25 1 0.75 0 0 0 µP ×W = (µij
P ×W )7×7 (4)
Small 0.25 1 0.75 0 0 0 0
Extremely small 1 0.75 0 0 0 0 0 where µij i j ij i j
R×D = min(µR , µD ), µP ×W = min(µP , µW ),
both i and j = 1, 2, · · · , 7.
Table 3 Recall difficulty
ii) Composition. The composition operation can be
Categories
Linguistic variables defined by:
1 2 3 4 5 6 7
Very difficult 0 0 0 0 0 0.75 1
µS = µ(R×D)◦ (P ×W ) = (µjS )1×7 (5)
Difficult 0 0 0 0 0.75 1 0.25
Moderately difficult 0 0 0 0.75 1 0.25 0
Average 0 0 0.5 1 0.5 0 0 where µjS = max(max(min(µ1i ij
R×D , µP ×W )), max(min
ij ij
Moderately easy 0 0.25 1 0.75 0 0 0 (µ2i 7i
R×D , µP ×W )), · · · , max(min(µR×D , µP ×W ))), both i
Easy 0.25 1 0.75 0 0 0 0 and j = 1, 2, · · · , 7.
Very easy 1 0.75 0 0 0 0 0
However, µS obtained only presents a relative safety
level, which can be measured in terms of the defined
Table 4 Damage probability
fuzzy safety expressions (i.e. “Poor”, “Fair”, “Aver-
Categories
Linguistic variables age” and “Good”). In another word, the risk of a threat
1 2 3 4 5 6 7
Definite 0 0 0 0 0 0.75 1 is required to be expressed by degrees to which it be-
Highly likely 0 0 0 0 0.75 1 0.25 longs to the safety expressions. The safety expressions
Reasonably likely 0 0 0 0.75 1 0.25 0 defined on the basis of Tables 1-4 can be shown in Table
Average 0 0 0.5 1 0.5 0 0
5 through satisfying the following conditions:
Reasonably unlikely 0 0.25 1 0.75 0 0 0
Unlikely 0.25 1 0.75 0 0 0 0 i) The expressions are exclusive for each category
Absolutely unlikely 1 0.75 0 0 0 0 0 by normalizing the membership values of the variables.
ii) SPoor = (RVery difficult × DExtremely big )◦
If W, D, R and P represent respectively “Will”, (PDefinite × WExtremely strong ).
“Damage capability”, “Recall difficulty” and “Damage iii) SFair = (RModerately difficult × DModerately big )◦
probability”, the fuzzy safety score S can be defined (PReasonably likely × WModerately strong ).
by using the following fuzzy set manipulation, which is iv) SAverage = (RModerately easy ×DModerately small )◦
developed on the basis of Karowski’s formula[15,7] : (PReasonably unlikely × WModerately weak ).
v) SGood = (RVery easy × DExtremely small )◦
S = (R × D)◦ (P × W ) (1) (PAbsolutely unlikely × WExtremely weak ).

where the symbol “◦” represents composition opera- Table 5 Safety expressions
tion and “×” the Cartesian product operation in the Categories
Linguistic variables
fuzzy set theory. The membership function of S is thus 1 2 3 4 5 6 7
described by: Poor 0 0 0 0 0 0.75 1
Fair 0 0 0 0.5 1 0.25 0
Average 0 0.25 1 0.5 0 0 0
µS = µ(R×D)◦ (P ×W ) . (2)
Good 1 0.75 0 0 0 0 0

Judging from the above formula, the membership


Using the Best-Fit method[7] , the obtained fuzzy
function of S is denoted by the membership val-
safety score description Si of a threat judged by asses-
ues of four parameters (R, D, P and W ) respectively.
sor i can be mapped onto one (or all) of the defined
Suppose the membership values for the elements in
safety expressions. The method uses the distance be-
S, R, D, P and W can be expressed as follows:
tween Si and each of the safety expressions to represent
µS = (µ1S , µ2S , · · · , µ7S ) the degree to which Si is confirmed to each of them.
For example, the distance between Si and the safety
µR = (µ1R , µ2R , · · · , µ7R ) expression “Poor” can be shown as follows:
µD = (µ1D , µ2D , · · · , µ7D )  1/2
7

µP = (µ1P , µ2P , · · · , µ7P )
di1 (Si , P oor) = (µkSi − µkPoor )2 . (6)
µW = (µ1W , µ2W , · · · , µ7W ). (3) k=1
Z. L. Yang et al./A Subjective Risk Analysis Approach of Container Supply Chains 89

The analyses for other distances between Si and 3.2 Synthesis of safety evaluations by hi-
other safety expressions can be conducted in a similar erarchical ER
way. The smaller the distance is, the closer Si to the
corresponding safety expressions. When the distance The S(Si ) obtained represents only the piece of es-
dij (j = 1, 2, 3 or 4) is equal to zero, Si is just the same timation from one assessor. When more pieces of es-
as the jth safety expression in terms of membership timation from different assessors emerge, they can be
functions. Because each dij is an unscaled distance, effectively synthesized by using an ER approach. The
in order to more clearly express the safety level of Si , approach has been widely applied to risk and safety
the reciprocals of the relative distances between Si and assessment[7]. In continuously researching and practic-
each safety expression dij are normalised into a new ing processes, the evidential reasoning algorithm has
index αij , (j = 1, 2, 3, 4). If dij = 0 it follows that αij been developed, improved and modified toward a more
is equal to 1 and the others are equal to 0. The αij can rational way[8] . The algorithm can be analysed by the
be defined as follows in other situations: following pathway.
Let A represent the set of the four safety expres-
1/dij
aij = 4
, j = 1, 2, 3, 4. (7) sions, which has been synthesized by two subsets A1

1/dij and A2 from two different assessors. Then, A, A1 and
j=1
A2 can separately be expressed by:

Each αij (j = 1, 2, 3, 4) represents the extent to A = {α1 “P oor”, α2 “F air”, α3 “Average”, α4 “Good”}
which Si belongs to the jth defined safety expression. A1 = {α11 “P oor”, α21 “F air”, α31 “Average”, α41 “Good”}
Thus, the safety levels of threat-based risks determined
by using a fuzzy set can be expressed as follows: A2 = {α12 “P oor”, α22 “F air”, α32 “Average”, α42 “Good”}.

S(Si ) ={(αi1 , “P oor”), (αi2 , “F air”), (αi3 , “Average”), Suppose the normalized relative weights of two
(αi4 , “Good”)}. safety assessors in the safety evaluation process are
given as ω1 and ω2 (ω1 + ω2 = 1) and ω1 and ω2 can be
To produce the risk degree of a threat for ranking estimated by using established methods such as simple
purposes, it is necessary to describe the four safety ex- rating methods or more elaborate methods based on
pressions using numerical values. The numerical values pair-wise comparisons.
associated with the defined safety expressions can be Suppose M1m and M2m (m = 1, 2, 3 or 4) are individ-
calculated by studying the categories and membership ually degrees to which the subsets A1 and A2 support
values in Table 5. Suppose Wp , Wf , Wa and Wg rep- the hypothesis that the safety evaluation is confirmed
resent the unscaled numerical values associated with to the four safety expressions. Then, M1m and M2m can
“Poor”, “Fair”, “Average” and “Good”, respectively. be obtained as follows:
Ws , Wm

, Wp and Wg can be calculated as follows:

Wp = [0.75/(0.75+1)]×0.83+[1/(0.75+1)]×1 = 0.927 M1m = ω1 αm


1 , M2m = ω2 αm
2 (10)
Wf = [0.5/(0.5 + 1 + 0.25)]×0.5 + [1/(0.5 + 1 + 0.25)]
where m = 1, 2, 3, 4. Therefore,
×0.67 + [0.25/(0.5 + 1 + 0.25)]×0.83 = 0.644
Wa = [0.25/(0.25 + 1 + 0.5)]×0.17 + [1/(0.25 + 1+ M11 = ω1 α11 , M21 = ω2 α12
0.5)] ×0.33 + [0.5/(0.25 + 1 + 0.5)]×0.5 = 0.356 M12 = ω1 α21 , M22 = ω2 α22
Wg = [1/(1+0.75)]×0+[0.75/(1+0.75)]×0.17 = 0.073. M13 = ω1 α31 , M23 = ω2 α32
(8) M14 = ω1 α41 , M24 = ω2 α42 . (11)
The above values give numerical relations between
the safety expressions. The reciprocally normalized Suppose H1 and H2 are the individual remain-
vector [wp , wf , wa , wg ] is then obtained as follows, ing belief values unassigned for M1m and M2m (m =
where “Good” takes the largest value of 1 (i.e. wg = 1): 1, 2, 3, 4). Then, H1 and H2 can be expressed as
follows[8] :
[wp , wf , wa , wg ] = [0.079, 0.384, 0.695, 1].

Naturally, a numerical risk degree of the threat, can be H1 = H̄1 + H̃1 , H2 = H̄2 + H̃2 (12)
obtained by the following calculation:
where H̄n (n = 1 or 2), which represents the degree to
PS(Si) = αi1 ×0.079+αi2 ×0.384+αi3 ×0.695+αi4 ×1. which the other assessor can play a role in the assess-
(9) ment, and H̃n (n = 1 or 2), which is caused due to the
90 International Journal of Automation and Computing 1 (2005) 85-92

possible incompleteness in the subsets A1 and A2 , can The American West Coast Ports 11-day lock-out in
be described as follows respectively: October 2002 has caused a growing concern on how
serious the impacts of a major sophisticated attack re-
H̄1 = 1 − ω1 = ω2 , H̄2 = 1 − ω2 = ω1 (13) lated to container ports can be. Such a concern has fur-
4
 ther been underscored by progressive terrorism groups’
H̃1 = ω1 (1 − am 1 2 3 4
1 ) = ω1 [1 − (α1 + α1 + α1 + α1 )] activities. Therefore, in this section, risk analysis is
m=1 carried out to assess the safety level of ports in CSCs
4 and identify the major factors causing the risk on a
H̃2 = ω2 (1 − am 1 2 3 4
2 ) = ω2 [1 − (α2 + α2 + α2 + α2 )]. proritised list.
m=1 Terrorists attacking ports would highly likely hap-
 pen through two ways: to attack the channel/ water-
Suppose αm (m = 1, 2, 3 or 4) represents the non-
way or bomb the quayside infrastructures/ facilities of
normalized degree to which the safety evaluation is con-
the terminals. Using the FTA method, a fault tree re-
firmed to the four safety expressions as a result of the
lated to a terrorism threat in ports can be constructed
synthesis of the judgments produced by assessors 1 and
in Fig.2.
2. Suppose HU represents the non-normalized remain-
ing belief unassigned after the commitment of belief to
the four safety expressions as a result of the synthesis
of the judgments produced by assessors 1 and 2. The
evidential reasoning algorithm can be stated as follows:

αm = K(M1m M2m + M1m H2 + H1 M2m )
H̄U = K(H̄1 H̄2 )
H̃U = K(H̃1 H̃2 + H̃1 H2 + H1H̃2 )
4 
 4
K = [1 − M1T M2R ]−1 . (14)
T =1 R=1
R=T

After the above aggregation, the combined degrees


of belief are generated by assigning H̄U back to the
four safety expressions using the following normaliza-
tion process: Fig.2 A fault tree of terrorists attacking ports

am = am /1 − H̄U (m = 1, 2, 3, 4) Following the fault tree, the basic events can be
HU = H̃U /1 − H̄U (15) ranked in terms of their risk levels using the fuzzy set
approach described. The risk level of the top event can
where HU is the unassigned degree of belief represent- be calculated using the ER approach. The estimation
ing the extent of incompleteness in the overall assess- and calculation of the risk levels can be conducted as
ment. follows:
The above gives the process of combining two fuzzy Step 1. assigns the relative weights of the events
sets. If three fuzzy sets are required to be combined, in Fig.2 using the rule in Section 2.3, where the top
the result obtained from the combination of any two event is assigned value 1 as its weight. The results of
sets can be further synthesized with the third one us- the assignments are shown in Table 6.
ing the above algorithm. In a similar way, multiple
fuzzy sets from the judgements of multiple assessors or Table 6 The weight assignments of all events
the safety evaluations of lower level risks in the chain Events Weights Events Weights
systems (i.e. components or subsystems) can also be PORT 1 CONTAINER 1
CHANNEL 1 EXT-TER 1
combined. The two different and noteworthy points are TERMINAL 1 VES-TER 1
that the relative weights of every assessor will be nor- EXT-CHA 1 CARGO 0.5
malized first; and the relative weights of the lower level VES-CHA 1 EMPLOYEE 0.5
risks should satisfy the requirements of the specific rule
in Section 2.3 and a normalized distribution. Step 2 calculates the safety scores of the basic
events on the basis of the fuzzy estimations of the four
4 A risk analysis of terrorists attacking parameters from Tables 1-4. The safety scores are cal-
ports culated by using the fuzzy operations of the formula
Z. L. Yang et al./A Subjective Risk Analysis Approach of Container Supply Chains 91

‘µS = µ(R×D)◦ (P×W ) ’ and the Best-Fit method in Sec- above as the safety of the top event has been assessed
tion 3.1. The ranking of the basic events can then as ‘Good’ to the extent of 9.3 percent.
be obtained using the method of studying the fuzzy The above gives an overall picture of the safety es-
membership values and categories. The results of the timate of this top event. The safety score representing
calculation are shown in Table 7. the safety level of the top event can be seen as a refer-
Step 3. applies the ER approach and its attached ence for considering the effectiveness of risk control op-
software IDS (Intelligent Decision System via Eviden- tions and the comparison with other hazardous events
tial Reasoning)[8] to calculate the safety level of the top for making decisions if necessary.
event which can be expressed by its safety score shown
in Fig.3: 5 Conclusion
STerrorism ={0.276, “P oor”, 0.461, “F air”, 0.17, The safety consciousness in the supply chain indus-
try has been significantly growing over the last several
“Average”, 0.093, “Good”}.
years. This paper providing a subjective risk assess-
ment method for the organisations involved in CSCs
enables them to assess the vulnerability of the chains
and to support the safety planning for both mitigat-
ing and continuity actions. The marriage of fuzzy
sets and ER to deal with uncertainty can also facil-
itate risk assessment and be tailored and applied to
more management-related industries, where risks usu-
ally arise from threats rather than hazards.

References
[1] P. Chapman, M. Christopher, U. Jüttner, H. Peck, R. Wild-
ing, Identifying and managing supply-chain vulnerability,
Logistics & Transport Focus, vol. 4, no. 4, pp. 17, 2002.
[2] Z. L. Yang, S. Bonsall, W. Alan, J. Wang, Reliable container
Fig.3 The safety level expressed by safety score line supply chains - a new risk assessment framework for im-
proving safety performance, WMU Journal of Maritime Af-
fairs, vol. 4, no. 1, pp. 107–122, 2005.
From the above results, it is obvious that the six ba- [3] M. U. Thomas, Supply chain reliability for contingency oper-
sic events (i.e. EXT-CHA and VES-CHA) have been ations, Annual Reliability and Maintainability Symposium,
assessed as ‘Good’ to a quite small extent. For example, pp. 61–67, WA, USA, 2002.
[4] D. Garg, Y. Narahari, N. Viswanadham, Design of Six Sigma
the event EXT-CHA has been assessed as ‘Good’ with supply chains, Proceedings - IEEE International Conference
a belief of 13.9 percent; the event VES-CHA has been on Robotics and Automation, pp. 1737–1742, Taibei, 2003.
evaluated to a significantly smaller extent as ‘Good’ [5] R. R. Pai, V. R. Kallepalli, R. J. Caudill, M. C. Zhou, Meth-
with 1.8 percent. Since the safety of the top event is ods towards supply chain risk analysis, Proceedings of the
IEEE International Conference on Systems, Man and Cy-
determined by the safety of each basic event, the top bernetics, vol. 5, pp. 4560–4565, 2003.
event safety should be evaluated as ‘Good’ to a small [6] G. Svensson, A conceptual framework of vulnerability in
extent. This is in harmony with the results obtained firms’ inbound and outbound logistics flows, International

Table 7 The risk estimation of all basic events


Parameters Risk
Basic events Safety Scores
W D R P Rank
W = {0, 0.25, 1, 0.75, 0, 0, 0} D = {0, 0, 0.5, 1, 0.5, 0, 0} S = {0.139, “Poor”, 0.361, “Fair”, 0.361, 0.44
EXT-CHA
R = {0, 0, 0.5, 1, 0.5, 0, 0} P = {0, 0, 0, 0.75, 1, 0.25, 0} “Average”, 0.139, “Good”} 4
W = {0, 0, 0, 0, 0.75, 1, 0.25} D = {0, 0, 0, 0, 0, 0.75, 1} S = {0.021, “Poor”, 0.934, “Fair”, 0.027, 0.31
VES-CHA
R = {0, 0, 0, 0, 0,75, 1, 0.25} P = 0, 0, 0, 0.75, 1, 0.25, 0 “Average”, 0.018, “Good”} 1
W = {0, 0, 0, 0, 0, 0.75, 1} D = {0, 0, 0, 0, 0.75, 1, 0.25} S = {0.444, “Poor”, 0.199, “Fair”, 0.184, 0.4115
CARGO
R = {0, 0, 0.5, 1, 0.5, 0, 0} P = {0, 0, 0.5, 1, 0.5, 0, 0} “Average”, 0.173, “Good”} 3
W = {0, 0, 0.5, 1, 0.5, 0, 0} D = {0, 0.25, 1, 0.75, 0, 0, 0} S = {0.139, “Poor”, 0.361, “Fair”, 0.361, 0.44
EMPLOYEE
R = {0, 0.25, 1, 0.75, 0, 0, 0} P = {0, 0, 0, 0.75, 1, 0.25} “Average”, 0.139, “Good”} 4
W = {0, 0.25, 1, 0.75, 0, 0, 0} D = {0, 0, 0.5, 1, 0.5, 0, 0} S = {0.139, “Poor”, 0.361, “Fair”, 0.361, 0.44
EXT-TER
R = {0, 0, 0.5, 1, 0.5, 0, 0} P = {0, 0, 0, 0.75, 1, 0.25, 0} “Average”, 0.139, “Good”} 4
W = {0, 0, 0, 0., 0.75, 1, 0.25} D = 0, 0, 0, 0, 0.75, 1, 0.25 S = {0.686, “Poor”, 0.119, “Fair”, 0.101, 0.324
VES-TER
R = {0, 0, 0.5, 1, 05, 0, 0} P = {0, 0, 0, 0, 0.75, 1, 0.25} “Average”, 0.094, “Good”} 2
92 International Journal of Automation and Computing 1 (2005) 85-92

Journal of Physical Distribution and Logistics Management, erests include safety and reliability based design and operations
vol. 32, no. 2, pp. 110–134, 2002. of large marine and offshore systems.
[7] J. Wang, J. B. Yang, P. Sen, Multi-person and multi-
attribute design evaluations using evidential reasoning based
on subjective safety and cost analyses, Reliability Engineer- Steve Bonsall received his BSc in
ing and System Safety, vol. 52, no. 2, pp. 113–128, 1996. Marine Science from Liverpool Poly-
[8] J. B. Yang, D. L. Xu, On the evidential reasoning algorithm technic, UK in 1977 and PhD in Mar-
for multiple attribute decision analysis under uncertainty, itime Technology from Liverpool John
IEEE Transactions on Systems, Man and Cybernetics - Part Moores University, UK in 2001, respec-
A: Systems and Humans, vol. 32, no. 3, pp. 289–304, 2002. tively. He is currently the maritime
[9] OECD, Security in maritime transport: risk factors and eco- programme coordinator and principal
nomic impact, Maritime Transport Committee of OECD Re- lecturer at the School of Engineering
port, France, 2003. of Liverpool John Moores University,
[10] P. Timmerman, Vulnerability, resilience and the collapse of UK.
society, Institute of Environmental Studies, University of Dr. Bonsall’s major research inter-
Toronto, Toronto, 1981. ests include container terminal operations, container supply
[11] J. Weichselgartner, Disaster mitigation: the concept of vul- chains and developments in maritime leisure.
nerability revisited, Disaster Prevention and Management,
vol. 10, no. 2, pp. 85–94, 2001. Jian-Bo Yang received his BEng and
[12] H. T. Burns, P. Cordire, T. Eriksson, Security Risk Assess- MEng degrees in Control Engineering
ment and Control, Perpetuity Press Ltd., Leicester, UK, at North Western Polytechnic Univer-
2003. sity, Xi’an, China in 1981 and 1984,
[13] A. Pillay, J. Wang, Technology and Safety of Marine Sys- and PhD degree in Systems Engineer-
tems, Elsevier Science Ltd., Oxford, UK, 2003. ing at Shanghai Jiao Tong University,
[14] E. J. Henley, H. Kumarnoto, Probability Risk Assessment, Shanghai, China in 1987. He is Chair
IEEE Press, NY, USA, 1992. of Decision and System Sciences at the
[15] W. Karwowski, A. Mital, Potential applications of fuzzy sets Manchester Business School, The Uni-
in industrial safety engineering, Fuzzy Sets and Systems, vol. versity of Manchester, UK.
19, no. 2, pp. 105–120, 1986. Professor Yang’s main research int-
erests include intelligent decision analysis and support under un-
Zaili Yang received his BSc in For- certainties, multiobjective optimisation, system modelling, sim-
ulation and control with applications in both engineering and
eign Trade Transportation from Dalian
Maritime University, China in 2001 management systems.
and MSc in International Transport
from Cardiff University, UK in 2003, Quangen Fang received his BSc in
respectively. Since 2003, he has been a Navigation from Shanghai Maritime
PhD student in the School of Engineer- University, China in 1976 and MSc in
ing of Liverpool John Moores Univer- Maritime Education and Training from
sity, UK. His research interests include World Maritime University, Sweden in
risk assessment of container supply 1991, respectively. He is currently a
chains, in particular, subjective risk professor and Director of the Navi-
analysis using fuzzy set and Bayesian probability theories. gation Simulator Training Centre of
Shanghai Maritime University, China.
Jin Wang received his BSc in Ma- Professor Fang’s major research in-
rine Automation from Dalian Maritime terests include ship simulation, naviga-
tion studies and ship operations.
University, China in 1983, MSc in Ma-
rine Engineering and PhD in Maritime
Safety Engineering from the Univer-
sity of Newcastle upon Tyne in 1989
and 1994, respectively. He is Professor
of Marine Technology at the School of
Engineering of Liverpool John Moores
University, UK.
Professor Wang’s major research int-

Das könnte Ihnen auch gefallen