A grey-layered ANP based decision support model for analyzing strategies of resilience in electronic supply chains

A grey-layered ANP based decision support model for analyzing strategies of resilience in electronic supply chains

Engineering Applications of Artificial Intelligence 87 (2020) 103338 Contents lists available at ScienceDirect Engineering Applications of Artificia...

4MB Sizes 1 Downloads 16 Views

Engineering Applications of Artificial Intelligence 87 (2020) 103338

Contents lists available at ScienceDirect

Engineering Applications of Artificial Intelligence journal homepage: www.elsevier.com/locate/engappai

A grey-layered ANP based decision support model for analyzing strategies of resilience in electronic supply chains✩ R. Rajesh Management Division, ABV-Indian Institute of Information Technology & Management, Gwalior 474015, India

ARTICLE

INFO

Keywords: Supply chain resilience Supply chain risk Resilient strategies Grey theory Analytic network process

ABSTRACT Augmented globalization and vertical integration have made contemporary supply chains an intricate network subject to a number of vulnerabilities. Preemptive measures are needed for dealing with mutable risks and vulnerabilities to safeguard robust supply chain systems. Supply chain risk management (SCRM) connotes a set of risk management responses essentially instigated to confront supply chain risks. As supply chain risks are intertwined, one resilient strategy for risk mitigation can moderate several supply chain risks. A complex decision making problem involving twelve major supply chain risks and twenty one resilient strategies for risk mitigation have been acknowledged in this research with archetypal focus on electronics manufacturing supply chains. A combination of Multi criteria decision aid (MCDA) and artificial intelligence (AI) is increasingly used in decision making of complex real world problems. A decision support model incorporating an amalgamation of grey theory and layered analytic network process (ANP) has been employed for quantifying various resilient strategies for risk mitigation. The proposed model was also applied in a practical setting taking a case study of an electronics manufacturing company. Sensitivity analysis was also conducted to ensure the robustness of obtained results. The combined methodology proposed in this research could be effectively used by top management, to pigeonhole the resilient supply chain strategies for better managing their supply chains.

1. Introduction Supply chain systems are becoming more lengthy and complex, as a result of increased globalization and vertical integrations. In this scenario, proactive practices need to be adopted for securing supply chain systems by tackling core vulnerabilities. Vulnerabilities along with associated supply chain risks increases with increasing interactive complexities of the supply networks (Christopher and Peck, 2004). Hence, complex decision making situations involving evaluation of multiple criteria using several decision aids is becoming typical in modern supply chains. Multi criteria decision aid (MCDA) and artificial intelligence (AI) have been applied for increasing the success of decision making considering complex real world problems. Supply chain risk management (SCRM) characterizes tools and practices of complex real world problems to better manage various supply chain risks (Christopher and Lee, 2004). SCRM extends its principles and practices over three major areas namely, supply chain management, enterprise risk management and crises management. As most of the companies develop plans to protect their supply chains against recurrent low impact risks and usually avoid high impact low likelihood risks, it is essential that SCRM should be integrated with supply chain planning (Chopra and Sodhi, 2012).

The resilience capabilities and the sustainable competitive advantage of the firm increases when the level of risk sharing and the top management support increases (Ponomarov and Holcomb, 2009). The level of risk sharing is dependent on continual risk assessment, risk analysis and risk mitigation practices. Natural disasters, war, terrorism or any other external factors could lead to sudden unexpected break downs of supply chain, known as disruptions. Apart from that, security related issues are more frequently atop the minds of end consumers making it necessary for the members in the supply chain to take a new look at vulnerability measures. As observed from a complexity perspective of SCRM, managers are advised to reduce the interactive complexity of the supply chain by reducing the level of buffers at different stages. If the network is having a reasonably high interactive complexity, improved buffer levels are recommended to manage potential vulnerabilities (Yang and Yang, 2010). Managers will be able to tailor balanced and effective risk mitigation strategies for their firms, by properly understanding the supply chain risks, its variety and inter connectedness. Also, managers should take into consideration of the frequency of occurrence of similar risks, as a measure of supply chain vulnerability (Manuj and Mentzer, 2008). In general, in order to meet the challenges of a turbulent business environment and to tackle vulnerabilities, structural flexibility of the supply

✩ No author associated with this paper has disclosed any potential or pertinent conflicts which may be perceived to have impending conflict with this work. For full disclosure statements refer to https://doi.org/10.1016/j.engappai.2019.103338. E-mail addresses: [email protected], [email protected].

https://doi.org/10.1016/j.engappai.2019.103338 Received 30 June 2016; Received in revised form 12 March 2018; Accepted 28 October 2019 Available online xxxx 0952-1976/Β© 2019 Elsevier Ltd. All rights reserved.

R. Rajesh

Engineering Applications of Artificial Intelligence 87 (2020) 103338

chains, as the lack of a single component can halt total production and deliverables. As supply chain risks are customarily intertwined, one resilient strategy for risk mitigation can curb the effects of many related risks. This leads to a number of research questions as; which resilient strategy for risk mitigation has an overall high effectiveness on curbing various supply chain risks? How to prioritize the implementation of resilient strategies in consideration of its risk reduction capabilities? Can the effects of resilient strategies over diverse supply chain risks be quantified? A grey-based decision support model has been proposed in this research to rationally quantify the strategies of supply chain resilience. Since the number of strategies considered in this research is relatively large, conventional decision making models needs very large amount of data to be processed making it practically infeasible or results less reliable. Concept of layered ANP model has been proposed in this research to quantify attributes when the number of attributes to be considered is quite large. Incorporation of grey theory aids in transforming human/judgmental information into grey values that could be further analyzed using computations involving grey theory. A combination of grey theory and layered ANP could effectively find answer to the above posed research questions. This paper is further organized as follows. Section 2 discusses on the motivation and the background of the study. This is followed by constructing the framework of supply chain risks and resilient strategies for risk mitigation in the context of electronic supply chains and the relevant literature, as indicated in Section 3. The procedure of proposed methodology using a combination of grey theory and layered ANP to identify and quantify resilient strategies for supply chain risk mitigation is described in Section 4. Section 5 details the evaluation of the proposed framework for selection of resilient strategies in a real case electronics manufacturing company. Section 6 talks over the results and Section 7 discusses on the implications of this research from the case company perspective, which is followed by the conclusions and scope of future work as discussed in Section 8.

Nomenclature SCR RSCS PNEV βŠ— π‘Žπ‘˜π‘–π‘— βŠ— π‘π‘˜π‘”π‘–π‘— π‘˜ βŠ— π‘β„Žπ‘–π‘—

βŠ— π‘ŽΜƒπ‘–π‘— βŠ— π‘Μƒβ„Žπ‘–π‘— βŠ— 𝑏̃ 1 𝑔𝑖𝑗 βŠ— 𝑏̃ 2 𝑔𝑖𝑗 βŠ— 𝑏̃ 3 𝑔𝑖𝑗 βŠ— 𝑏̃ 𝑓 𝑔𝑖𝑗 βŠ— π‘ŽΜ‡ 𝑖𝑗 βŠ— 𝑏̇ 𝑓 𝑔𝑖𝑗 βŠ— 𝑐̇ β„Žπ‘–π‘— π‘Žπ‘–π‘— 𝑏𝑓 𝑔𝑖𝑗 π‘β„Žπ‘–π‘— π‘Žβˆ— 𝑖𝑗 𝑏𝑓 βˆ— 𝑔𝑖𝑗 𝑐 βˆ— β„Žπ‘–π‘— π΄βˆ—

Supply Chain Risk Resilient Supply Chain Strategy Principal Normalized Eigen Vector Grey matrices representing importance of SCR β€˜π‘–β€™ over β€˜π‘—β€™ rated by the π‘˜π‘‘β„Ž analyst Grey matrices representing the importance of RSCS β€˜π‘–β€™ over β€˜π‘—β€™ for each SCR, β€˜π‘”β€™, rated by the π‘˜π‘‘β„Ž analyst Grey matrices representing the importance of SCR β€˜π‘–β€™ over β€˜π‘—β€™ for each RSCS, β€˜β„Žβ€™, rated by the π‘˜π‘‘β„Ž analyst Average grey matrix of importance relations among SCR Average grey matrices of importance relations of SCR for each RSCS Grey matrices of importance relations among RSCS βˆ€ 1 ≀ 𝑖 ≀ π‘›βˆ•3; 1 ≀ 𝑗 ≀ π‘›βˆ•3; 1 ≀ 𝑔 ≀ π‘š Grey matrices of importance relations among RSCS βˆ€ π‘›βˆ•3 < 𝑖 ≀ 2π‘›βˆ•3; π‘›βˆ•3 < 𝑗 ≀ 2π‘›βˆ•3; 1 ≀ 𝑔 ≀ π‘š Grey matrices of importance relations among RSCS βˆ€ 2π‘›βˆ•3 < 𝑖 ≀ 𝑛; 2π‘›βˆ•3 < 𝑗 ≀ 𝑛; 1 ≀ 𝑔 ≀ π‘š Grey matrices of importance relations among RSCS; 1≀𝑓 ≀3 Normalized grey matrix of βŠ— π‘ŽΜƒπ‘–π‘— Normalized grey matrices of βŠ— 𝑏̃ 𝑓 𝑔𝑖𝑗 Normalized grey matrices of βŠ— π‘Μƒβ„Žπ‘–π‘— Total normalized crisp matrix of βŠ— π‘ŽΜƒπ‘–π‘— Total normalized crisp matrices of βŠ— 𝑏̃ 𝑓 𝑔𝑖𝑗 Total normalized crisp matrices of βŠ— π‘Μƒβ„Žπ‘–π‘— Final crisp matrix of βŠ— π‘ŽΜƒπ‘–π‘— Final crisp matrices of βŠ— 𝑏̃ 𝑓 𝑔𝑖𝑗 Final crisp matrices of βŠ— π‘Μƒβ„Žπ‘–π‘— Crisp relation matrix of π‘Žβˆ— 𝑖𝑗

𝐡𝑔𝑓 βˆ— πΆβ„Žβˆ— 𝐴̇ βˆ—

Crisp relation matrices of 𝑏𝑓 βˆ— 𝑔𝑖𝑗 Crisp relation matrices of 𝑐 βˆ— β„Žπ‘–π‘— AHP input matrix of π‘Žβˆ— 𝑖𝑗

𝐡̇ 𝑔𝑓 βˆ— 𝐢̇ βˆ— 𝑒1 𝑒𝑔2

AHP input matrices of 𝑏𝑓 βˆ— 𝑔𝑖𝑗 AHP input matrices of 𝑐 βˆ— β„Žπ‘–π‘— PNEV value corresponding to 𝐴̇ βˆ— Set of PNEV values corresponding to 𝐡̇ 𝑔1βˆ—

𝑒𝑔3

Set of PNEV values corresponding to 𝐡̇ 𝑔2βˆ—

𝑒𝑔4

Set of PNEV values corresponding to 𝐡̇ 𝑔3βˆ—

π‘’β„Ž5

Set of PNEV values corresponding to 𝐢̇ β„Žβˆ— ANP super matrix of Layer 1 comprising of PNEV values, 𝑒1 , 𝑒𝑔2 and π‘’β„Ž5 ANP super matrix of Layer 1 comprising of PNEV values, 𝑒1 , 𝑒𝑔3 and π‘’β„Ž5 ANP super matrix of Layer 1 comprising of PNEV values, 𝑒1 , 𝑒𝑔4 and π‘’β„Ž5 AHP input matrix of Layer 2 of importance relations among RSCS for each SCR AHP input matrix of Layer 2 of importance relations among SCR for each RSCS ANP super matrix of Layer 2 comprising of PNEV values, 𝑒1 , 𝑒𝑔6 and π‘’β„Ž7

β„Ž

𝐴̈ 𝐡̈ 𝐢̈

π΅π‘”βˆ—βˆ— πΆβ„Žβˆ—βˆ— 𝐷̈

2. Motivation and background of the study Supply chain systems are prone to ample internal and external turbulence that could often lead to mismatches in demand and supply, or even disruptions. Effective implementation of supply chain risk management practices is essential to build resilience in supply chain systems (Rajesh, 2019). These risk management practices can act as resilient strategies for risk mitigation in supply chains. The right combination of resilient strategies for risk mitigation should be carefully planned to effectively reduce their combined effect over the entire risk profile of the company (Rajesh and Ravi, 2017; Rajesh, 2017). As we see many of the disruptions in the past were supply related, upstream of supply chains need to adopt flexible supply strategies. This can include strategies for multiple suppliers or flexible supply contracts. The famous Nokia–Ericsson case, remind us the need of flexible strategies for sourcing. Relying on single sourcing was the prime reason for the huge loss incurred by Ericsson, while Nokia managed to continue their production due to flexible strategies. Reading from the literature on artificial intelligence and risk analytics, we could perceive that the topic has gained considerable attention during the past decade. This is due to the increasing need of specialized tools for handling the amplified uncertainties of today’s supply chains in the era of globalization, vertical integration, and increased collaborations. Wu et al. (2015) have provided a comprehensive review on decision-making problems in Enterprise Risk Management (ERM). They analyzed the development of management science models in three of the major risk management application areas such as; financial risk analytics, supply chain risk analytics, and environmental and social risk analytics. They reviewed a broad spectrum of management science modeling ranging from analytic models for optimizing decisions, mathematical programming models for optimizing interacting systems, and simulation modeling for numerical analysis of uncertainties.

chain is looked-for, which can build flexible options into the design of supply chains (Christopher and Holweg, 2011). Electronic manufacturing supply chains are typical cases in point of vulnerable supply 2

R. Rajesh

Engineering Applications of Artificial Intelligence 87 (2020) 103338

with real insights. Ponomarov and Holcomb (2009) recognized the scope of resilience from ecological, economic, social and psychological perspectives. Tang and Nurmaya Musa (2011) pointed out the need of multidisciplinary, integrated view of SCRM practices for proactive risk management. Chopra and Sodhi (2012) opined that by continually stress testing the supply chains and tailoring reserves, managers will be in a position to protect and improve the bottom line against different types of supply-chain risks. Monroe et al. (2014) conducted a vast literature study on supply chain vulnerabilities and disruptions to develop vivid understanding of the possible supply chain risks and the risk mitigation strategies. Hofmann et al. (2013) suggested practices for addressing sustainability issues in resilient supply chains. It is also seen that risk models and methodologies were also developed in literature (Fahimnia et al., 2015). Talluri et al. (2013) proposed a methodology incorporating data envelopment analysis and nonparametric statistical methods to analyze and rank alternative mitigation strategies. Marley et al. (2014) examined current supply chain processes and analyzed alternative strategies of risk mitigation using normal accident theory and its constructs. Vilko et al. (2014) examined supply chain risk management by considering the levels and nature of uncertainty in supply chains. Rajesh et al. (2015) conducted studies on the positive and negative influences of risk mitigation strategies on various risks and formulated an index for the selection of best risk mitigation strategy. However, the study needs to be extended to address the following questions; How effectively resilient strategies can mitigate overall risks by considering each and every individual importance relation? How to quantify resilient strategies for risk mitigation if the dependence relations among risks are prominent? How do the importance relations among various supply chain risks changes when a particular risk mitigation strategy alone is considered? Answering these questions, the actual problem of prioritization of risk mitigation strategies has to be modified to a complex problem involving several dependence relations and network connections. Also, supply chain risks are customarily interlinked and can be seen in association with certain characteristics in general, like lead time, flexibility, integration and sourcing. This reveals the existence of pronounced clusters of supply chain risks. In general, risk mitigation strategies may have effects over a cluster of supply chain risks due to their general traits. These clusters might have diverse priorities allowing for the nature of supply chains. ANP is found to be the best tool in cases of the aforesaid situations where there are dependences, network connections and an increased need for setting cluster priorities in the decision making model. Several classifications of supply chain risks and mitigation approaches can be seen in literature, of which the categories relevant to electronic manufacturing supply chains were identified and framed for this study. The risks identified were classified into four clusters for the ease of monitoring. Also, it facilitates the managers to set cluster priorities in the decision making models if desired. The clusters representing risk groups are as follows, (i) Lead-time related risks: Forecast risks, delay risks and receivable risks are classified under this cluster. Forecast errors and inadequate insights of quantitative forecasting can affect the responsiveness of the supply chain and could extend the lead times of delivery (Chopra and Sodhi, 2012). Delay risks are the resulting risks arising from longer lead times and that could culminate in lost sales or diminished reputations of the firms (Braunscheidel and Suresh, 2009). Receivable risks occur when the lead time of receivables extends often due to bad financial status of the customers (Tsai, 2008). (ii) Flexibility related risks: Supply chain design risks, capacity risks, inventory risks and risks of contingencies are categorized under this cluster. Design risks occur when the supply chain design become inflexible to accommodate market fluctuations or changing needs of customers (Klibi et al., 2010). Too high or too low capacity utilizations results in capacity inflexibility where the firm cannot meet fluctuations

Wu and Birge (2016) have given a brief review on the need of risk analytics in the era of big data. They have proposed a fieldbased and property-based classification of risks and commented on the importance of new risk management techniques, such as Enterprise Risk Management (ERM) in the era of big data. This is important as it seeks the most effective ways to manage and mitigate financial and operational risks through a systematic and integrated approach. Wu and Wu (2016) conducted studies on the pricing strategies of firms during uncertain demands. They have analyzed the deterministic and stochastic policies for monopoly and duopoly cases of markets, and commented that the price volatility and dynamic pricing allow firms to use information to have greater control over the uncertainties. The influence of demand uncertainties over the pricing strategies of the firm are determined by parameters such as discount rates and demand/ cost dynamics. Wu et al. (2017) analyzed the increasing practices of incorporating artificial intelligence into problems for decision-making in engineering risk analytics. According to them, today’s systems carry high levels of uncertainties and hence, intelligent systems such as expert systems, artificial neural networks, support vector machines, evolutionary computations, fuzzy systems, knowledge based systems, case based reasoning, agent based systems etc. are needed to tackle the increasing levels of uncertainties. They also commented that risk analytics and artificial intelligence are most important topics for today’s supply chain systems in the era of globalizations in consideration of the increasing threats from natural, engineering, economic, and technical sources. From the literature, it is evident that the needs for artificial intelligence and related tools have proliferated for risk analytics in modern supply chain systems. This is the primary motivation for this research. For the effective implementation of resilient strategies for risk mitigation, it is desirable to quantify them for their effectiveness over individual risks. The problem become complex as the resilient strategies for risk mitigation can have influence over themselves. The same stands true for the case of risks as; one risk may have a direct or indirect effect over the other. We have used a combination of grey theory and a proposed a layed analytic process approach to deal with this complex problem. Since there are judgmental decisions in the inputs, grey theory finds suitable to deal with the related uncertainties. Uncertainties in decision making environments can be of different forms such as: (i) stochastic uncertainties, which deals with uncertainties associated with probabilistic outcomes; (ii) un-ascertainties, dealing with events or data where only some of the possible outcomes of an event are known; (iii) rough uncertainties, dealing with uncertainties in approximating data or values; (iv) fuzzy uncertainties, which are related to cognitive uncertainties in decision-making; and (v) grey uncertainties that occur due to uncertainties in informational data (Deng, 1989). We have taken judgmental data for inputs and the related uncertainties are informational uncertainties. Hence, the use of grey systems and related theories are recommended to handle the associated uncertainties. Grey theory is every so often used when there are clear extensions and unclear intentions, while fuzzy theory is used when there are clear intentions and unclear extensions (Wang et al., 2014). The initial uncertainties in decision-making are managed through grey numbers and a sequence of operators for whitenization of the grey data. 3. Framework of risks and resilient strategies for risk mitigation JΓΌttner et al. (2003) demarcated the concepts of supply chain vulnerability and its managerial counterpart, supply chain risk management. Christopher and Peck (2004) in their research defined supply chain resilience and elaborated strategies for constructing a resilient supply chain. They concluded that resilience can chiefly be achieved through flexibility and agility. Sheffi (2005) explained supply chain resilience with practical acumens and pointed measures for building resilient supply chains through redundancy and flexibility. Tang and Tomlin (2008) identified six of commonly occurring risks in supply chains and proposed flexible strategies for mitigating those risks 3

R. Rajesh

Engineering Applications of Artificial Intelligence 87 (2020) 103338

theory and layered ANP methodologies has been used in this research to quantify the resilient strategies for risk mitigation. In general, risk mitigation strategies may have effects over a cluster of supply chain risks due to their general traits. These clusters might have diverse priorities allowing for the nature of supply chains. ANP is found to be the best tool in cases of the aforesaid situations where there are dependences, network connections and an increased need for setting cluster priorities in the decision making model. Still, there are quite a few issues to be addressed, when ANP is used as a tool for solving the present problem. Exact information for inputs to ANP is not available as most of the supply chain risks and mitigation strategies are seldom quantifiable; hence a combination of grey theory to deal with judgmental information becomes essential. Apart from that, the problem needs comparison of importance among each risk with respect to every mitigation strategy and the importance of each mitigation strategy for every individual risks for making the selection problem more transparent and effective. But it will ultimately result in an outsized number of comparison matrices resulting in a massive super matrix, as detailed under step (6), Section 4. The concept of layered ANP has been proposed in the research where the specific outputs obtained from the ANP selection model of one layer is used as inputs to the next layer, thereby reducing the number of comparison matrices as well as the size of the super matrix, which is elaborated for the case under step (6) of Section 5. By employing the proposed methodology, the most effective strategies for supply chain resilience can be identified, analyzed and implemented for effectively reducing the overall vulnerability of the supply chain. This is possible as it considers the entire importance relations among individual risk for every mitigation strategy and vice versa, through a meticulous analysis. A flow chart representation of the proposed methodology using a combination of these methodologies is shown in Fig. 1. The notations used for representing various ratings, values, and matrices are shown in the nomenclature part of this paper. I will make a brief of the notations used for demonstrating the methodology, which is a combination of grey theory and layered ANP approaches. βŠ— π‘Žπ‘˜π‘–π‘— can

in demand (Cucchiella and Gastaldi, 2006). Similarly, too high or too low levels of inventory results in inventory inflexibilities, which would be reflected in product strategies (Cachon, 2004). Risks of contingencies are usually high impact risks which can be managed through a mix of several flexibilities. (iii) Integration related risks: Technology risks and system risks are classified under this cluster, where technology risks occur when the manufacturer uses obsolete technologies or fails to integrate recent technologies into their supply chains (Tomlin, 2006). System risks occur due to the integration of inappropriate system applications into the core supply chain operations (Tang and Nurmaya Musa, 2011). (iv) Sourcing related risks: Procurement risks, continuity risks and IPR risks are categorized under this cluster. Sourcing risks of procurement can occur in three forms; related with supply cost, supply commitment and supply stability (Xu, 2010). Continuity of supply chains is one of the greatest challenges associated with logistics outsourcing. Operators form partnerships that increase the likelihood of diminishing transparency of the supply chain (Craighead et al., 2007). Outsourcing or offshoring also results in severe IPR risks, as it is difficult to protect the IPR when the firm is a global manufacturer or supplier (Holweg et al., 2011). A framework showing the risk categories considered for the present study and their relevant literatures are shown in Table 1. A number of risk mitigation approaches are generally practiced by leading manufacturing firms for building resilience in their supply chains. The detailed framework of resilient strategies for risk mitigation considered, their contribution in resilience of the supply chain and the related literatures are presented in Table 2. For the ease of reference and convenience of understanding the supply chain risks (SCRs) and the resilient supply chain strategies (RSCSs) were given four letter reference codes, as shown in Tables 1 and 2, respectively. 4. Methodology Integration of MCDA and AI provides new capabilities for structuring complex decision making situations in static and distributed environments. Some of them are to handle massive information or to model ill-structured information, while some others aid in the construction of advanced decision models or to develop efficient computational optimization algorithms. Grey theory can be effectively used for the construction and evaluation of advanced decision models. It was formulated from grey sets by combining principles of system theory, space theory and control theory (Deng, 1982). It can be meritoriously used to generate satisfactory outcomes using a relatively small amount of data or data with great variability among factors and to solve uncertainty problems in cases of discrete data and incomplete information (Deng, 1989; Rajesh and Rajendran, 2019). Grey theory has been widely used by researchers to handle ambiguity generated from human judgments through regularizing the data with proper treatment (Wang et al., 2014; Zeng et al., 2016). Also, it is easy to convert grey numbers into crisp numbers by applying modified-CFCS (Converting the Fuzzy data into Crisp Scores) method, employing a three step procedure (Fu et al., 2012). Analytic Network Process (ANP) is a powerful tool for analyzing cases of various decision making problems with dependence and feedback connections (Saaty, 1996). In ANP, criteria, sub-criteria and alternatives considered for selection are treated equally as nodes in a network. Each of these nodes might be compared to any other nodes as long as there exists a relation between them. Nodes are grouped in clusters so as to introduce cluster priorities, if desired. A matrix is constructed by representing all nodes of the network horizontally and vertically named as unweighted super matrix in the network model, where each element represents a relation between the nodes. This matrix is then normalized to weighted super matrix of the network model. The alternatives are ranked by calculating the limit matrix through synthesizing the weighted super matrix. A combination of grey

represent the importance relations among risks, as rated by analysts, π‘˜ can represent the importance relations for whereas; βŠ— π‘π‘˜π‘”π‘–π‘— , and βŠ— π‘β„Žπ‘–π‘— each risk in consideration of the resilient strategies, and the importance relations for each resilient strategy in consideration of risks. βŠ— π‘ŽΜƒπ‘–π‘— , and βŠ— π‘Μƒβ„Žπ‘–π‘— can represent the average grey matrices for calculation, and the matrices βŠ— π‘π‘˜π‘”π‘–π‘— are separated into three set of sub-matrices, represented by βŠ— 𝑏̃ 1 𝑔𝑖𝑗 , βŠ— 𝑏̃ 2 𝑔𝑖𝑗 , and βŠ— 𝑏̃ 3 𝑔𝑖𝑗 . The above matrices are normalized and the normalized matrices are represented as; βŠ— π‘ŽΜ‡ 𝑖𝑗 , βŠ— 𝑏̇ 𝑓 𝑔𝑖𝑗 , and βŠ— 𝑐̇ β„Žπ‘–π‘— . The total normalized matrices are calculated for grey value whitenization and are represented as; π‘Žπ‘–π‘— , 𝑏𝑓 𝑔𝑖𝑗 , and π‘β„Žπ‘–π‘— , respectively. The values of crisp relation matrices obtained in succession are respectively represented as; π‘Žβˆ— 𝑖𝑗 , 𝑏𝑓 βˆ— 𝑔𝑖𝑗 , and 𝑐 βˆ— β„Žπ‘–π‘— . Also, these matrices are named as; π΄βˆ— , 𝐡𝑔𝑓 βˆ— , and πΆβ„Žβˆ— , respectively. The above matrices are to be converted into input matrices for AHP to obtaining their respective weightings, which are represented as; 𝐴̇ βˆ— , 𝐡̇ 𝑔𝑓 βˆ— , and 𝐢̇ β„Žβˆ— , respectively. The principal normalized Eigen values (PNEV) calculated for the above matrices are indicated as; 𝑒1 , 𝑒𝑔2 , 𝑒𝑔3 , 𝑒𝑔4 , 𝑒𝑔5 . From the above values, I have constructed the ANP decision matrices, called as the super matrices that are indï 𝐡, ̈ and 𝐢, ̈ respectively. These matrices constitute the Layer1 cated by 𝐴, of the model and the ANP super matrices of the Layer 2 are indicated ̈ And, 𝐡 βˆ—βˆ— , and 𝐢 βˆ—βˆ— can represent the AHP input matrices of Layer by 𝐷. 𝑔 β„Ž 2. The detailed step by step procedure of the proposed methodology is elaborated as follows: Step 1: Identify the supply chain risks and the resilient strategies Identify the possible supply chain risks and resilient strategies for supply chain risk mitigation with specific focus on electronic manufacturing industry. Let the number of supply chain risks identified be β€˜m’ and the resilient strategies for risk mitigation to be β€˜n’. There are β€˜l’ 4

R. Rajesh

Engineering Applications of Artificial Intelligence 87 (2020) 103338 Table 1 Categories of supply chain risks and their relevant literature. Risk clusters

Sl No.

Supply chain risk categories

Ref. codes

Cluster relation

Relevant literature Remarks

SCR 1

Forecast

FRCT

Forecast errors could extend the lead times of delivery

Gaudenzi and Risks arising from inaccurate Borghesi (2006) and forecasts due to seasonality, Chopra and Sodhi product variety and shorter (2012) lifecycles come under forecast risks.

SCR 2

Delays

DLYS

Lead time of deliverables Braunscheidel and High capacity utilizations or poor extends beyond Suresh (2009) and yield of the firm results in expectations Chopra and Sodhi deferred deliverables, constituting (2012) delay risks.

SCR 3

Receivables

RCBS

Lead time of receivables extends beyond expectations

Tsai (2008) and Chopra and Sodhi (2012)

SCR 4

Supply chain design

SCDN

Design inflexibilities of products

Christopher and Lee Design risks arise when (2004) and Klibi manufacturer fails to incorporate et al. (2010) design changes or to adapt with the current market situations.

SCR 5

Capacity

CPTY

Capacity inflexibilities or misutilisations

Underutilization or overutilization Cucchiella and Gastaldi (2006) and of capacities results in poor responses towards changing Tang and demands that are classified under Nurmaya Musa capacity risks. (2011)

SCR 6

Inventory

INRY

Inflexibilities in product strategies

Cachon (2004) and Risks arising from too high or too low inventories can be Tang and Zimmerman (2013) categorized under inventory risks. Excess inventory for products with high value or short lifecycle increases the inventory holding costs.

SCR 7

Contingencies

CNGS

Managed through flexible - Fischhoff et al. supply strategies, process (2006) and Tomlin (2006) strategies, product strategies and pricing strategies

SCR 8

Technology

TCGY

Inappropriate technology integrations

Tomlin (2006) and When the manufacturer uses Chopra and Sodhi obsolete technologies or fails to integrate technological changes, (2012) customer dissatisfaction or unfulfilled demand occurs, constituting technology risks.

SCR 9

System

SYTM

Incongruous system integrations

Harland et al. (2003) and Tang and Nurmaya Musa (2011)

SCR 10

Procurement

PRCT

Sourcing risks related with Giunipero and supply cost, supply Eltantawy (2004) commitment and supply and Xu (2010) continuity

SCR 11

Continuity

CNTY

Transparency of supply Craighead et al. Continuity in supply chains is one chain is waning as logistic (2007) and Tuncel of the greatest challenges processes are outsourced and Alpan (2010) associated with logistics outsourcing, as there are chances of forming partnership relations among operators.

SCR 12

IPR

IPRR

Outsourcing or off-shoring Finch (2004) and makes it difficult to Holweg et al. protect IP (2011)

Lead time related risks

Flexibility related risks

Integration related risks

Sourcing related risks

supply chain analysts chosen for rating the importance relations among supply chain risks and resilient strategies.

Risks arising from delayed receivables from the customers due poor financial strength of the customers or having too fewer number of customer accounts contribute to receivable risks.

Occurrence of events like natural disaster, labor disputes, war and terrorism are rare and unpredictable but has a very high impact over the supply chain. These risks of disruptions can be categorized under contingencies.

Risks arising from system integrations, excessive networking, e- commerce applications or even information breakdowns can be included under system risks. Unanticipated increase in acquisition costs due to exchange rate fluctuations, single sourcing and changing term contracts are categorized as procurement risks.

Increased vertical integration, amplified global outsourcing and having world-wide markets results in severe risks related to intellectual property rights.

Identified risks need to be classified into clusters in order to bring together analogous supply chain risks in consideration of its occurrence

Step 2: Classify the supply chain risks in clusters 5

R. Rajesh

Engineering Applications of Artificial Intelligence 87 (2020) 103338 Table 2 Resilient supply chain strategies for risk mitigation. Sl No.

Resilient supply chain strategies

RSCS 1

Ref. codes

Relevant literature

Remarks

Fine-tune supply chain FTSD design

Chiang et al. (2003) and Qi et al. (2010)

Supply chain design can be modified or adjusted in such a way keeping redundant paths throughout and by reducing the length of supply chains.

RSCS 2

Supply base strengthening

SBSG

Sturgeon and Lester (2004) and Nam et al. (2011)

Increasing the number of alternative suppliers make the supply chains resilient and thus enable the companies to shift order quantities across suppliers.

RSCS 3

Supply contract flexibility

SCFB

Milner and Rosenblatt (2002) Introducing flexibility in binding contracts enable the and Cheng et al. (2011) supply chain to shift order quantities across time.

RSCS 4

Dynamic assortment planning

DAPL

KΓΆk et al. (2009) and SaurΓ© and Zeevi (2013)

RSCS 5

Centralize demand

CTDM

Blanchard and Kiyotaki (1987) The unpredictability in demand under high forecast and Hein and Tarassow (2010) risks can be better managed by aggregating the demand.

RSCS 6

Capacity flexibility

CPFB

Hall and Liu (2010) and Chen Resilience can be enhanced by using decentralized et al. (2013) capacity for products with predictable demands and centralized capacity for products with unpredictable demands.

RSCS 7

Process standardization PSDN

Ma et al. (2011) and Costinot Process as well as products can be standardized to et al. (2013) reduce the inventory levels and to facilitate interchangeable assemblies.

RSCS 8

Agile operations

AOPN

Charles et al. (2010) and Gligor et al. (2013)

Agility can be imparted through flexible operations, which aids in delivering new products with shorter lead times.

RSCS 9

Manufacturing flexibility

MFFB

Stavrulaki and Davis (2010) and Liao et al. (2010)

Flexible manufacturing systems can be adopted to facilitate parallel operations to reduce process time and to increase resilience.

RSCS 10

Risk hedging

RHDG

Scholes (1996) and Corbett et al. (2012)

Collaborative working with partners increases trust among them and upsurges opportunities for risk hedging.

RSCS 11

Enhance visibility

EVBY

Barlas and Gunduz (2011) and Information distortions can be reduced by increasing Yao and Zhu (2012) the visibility of capacity and inventory so that the demand exaggerations during product shortages can be eluded.

RSCS 12

Cross-training of employees

CTEM

Aksin et al. (2010) and Closs et al. (2011)

Employees for one job are trained to perform other jobs too. This increases flexibility of labor to evade bottlenecks.

RSCS 13

Product flexibility via postponement

PFPT

Yang and Yang (2010) and Choi et al. (2012)

Product flexibility can be achieved through delayed differentiation. This helps in rapid incorporation of configuration changes for products

RSCS 14

Vindicate product ranges

VPRG

Christopher and Holweg (2011) and de Leeuw et al. (2013)

By rationalizing, products with higher risks can be avoided. The exposure to risk can be reduced by the proper choice of products

RSCS 15

Inventory flexibility

INFB

Kemahlıoğlu-Ziya and Bartholdi (2011) and Sarker (2014)

Decentralize inventory for products with stable demand and centralize inventory for products with uncertain demands.

RSCS 16

Logistics flexibility

LGFB

Atasoy (2013) and Bruzzone and Longo (2014)

Implementing flexibility in routing increases responsiveness of products by changing the modes of transportation quickly

RSCS 17

Dynamic revenue management

DRMT

Jerath et al. (2010) and Meissner and Strauss (2012)

Demand and revenue management capability of the company can be enhanced by dynamically influencing the customer product selection

RSCS 18

Silent product rollover

SPRL

Barroso et al. (2011) and Billington et al. (2012)

Product rollover increases the control over product exposure to enhance the capability of managing supply and demand

RSCS 19

Proliferate customer accounts

PCAC

Pine et al. (2010) and Hofmann and Kotzab (2010)

Financial risks arising of delayed receivables from customers can be reduced via increasing the number of customer accounts

RSCS 20

Responsive pricing strategies

RPST

Chiu et al. (2011) and Ha et al. (2011)

Adopting responsive pricing strategies enable the company to swing production quantities across different products to reduce risks related with unstable pricing

RSCS 21

Using insurance

UINS

Lin et al. (2010) and Schmitt Insurance is the way of dealing with risks, by trying and Singh (2012) to avoid its effects. This helps to cover the direct loss or damages to any tangible items

6

Assortment planning allows the firm to make faster responses over the demands of different products through increased control.

R. Rajesh

Engineering Applications of Artificial Intelligence 87 (2020) 103338

Fig. 1. Flow chart of the proposed methodology for selection of resilient sc strategies.

(i) Rating the level of importance of supply chain risk (SCR) β€˜i’ over β€˜j’ on linguistic scales varying from ELI to EHI. (ii) Rating the level of importance of resilient supply chain strategy (RSCS) β€˜i’ over β€˜j’ for each SCR, β€˜g’ (iii) Rating the level of importance of SCR β€˜i’ over β€˜j’ considering each RSCS, β€˜h’.

and mitigating mechanisms. This also helps in ascertaining the effects of resilient strategy over a typical cluster of risks. Step 3: Compute the initial relation matrices Each supply chain analyst β€˜k’ is assigned the task of evaluating the importance relation among supply chain risk, as well as the importance relations among resilient strategies for risk mitigation on a linguistic scale varying from ELI, VLI, LI, MLI, MI, MHI, HI, VHI, EHI representing β€˜β€˜extremely low importance’’, β€˜β€˜very low importance’’, β€˜β€˜low importance’’, β€˜β€˜moderately low importance’’, β€˜β€˜medium importance’’, β€˜β€˜moderately high importance’’, β€˜β€˜high importance’’, β€˜β€˜very high importance’’, and β€˜β€˜extremely high importance’’ respectively. Three sets of relationship matrices were developed as,

Step 4: Compute the grey relation matrices The initial set of relationship matrices were converted to the corresponding grey relation matrices using the conversion scales shown in Table 3. Three sets of grey relation matrices were developed correspondingly as, 7

R. Rajesh

Engineering Applications of Artificial Intelligence 87 (2020) 103338

the grey number βŠ— 𝑏̃ 𝑓 𝑔𝑖𝑗 ; 1≀ f ≀ 3, and βŠ— 𝑐̇ β„Žπ‘–π‘— represents the normalized lower limit value of the grey number βŠ— π‘Μƒβ„Žπ‘–π‘— ( ) βŠ— π‘ŽΜ‡ 𝑖𝑗 = βŠ— π‘ŽΜƒπ‘–π‘— βˆ’π‘šπ‘–π‘› βŠ— π‘ŽΜƒπ‘–π‘— βˆ•π›₯π‘šπ‘Žπ‘₯ (10) 𝑗 π‘šπ‘–π‘› ( ) π‘šπ‘Žπ‘₯ 𝑓 ̃𝑓 βŠ— 𝑏̇ 𝑓 𝑔𝑖𝑗 = βŠ— 𝑏̃ 𝑓 𝑔𝑖𝑗 βˆ’π‘šπ‘–π‘› (11) π‘ž βŠ— 𝑏 𝑔𝑖𝑗 βˆ•πœƒ π‘šπ‘–π‘› ( ) π‘šπ‘–π‘› π‘šπ‘Žπ‘₯ βŠ— 𝑐̇ β„Žπ‘–π‘— = βŠ— π‘Μƒβ„Žπ‘–π‘— βˆ’π‘ž βŠ— π‘Μƒβ„Žπ‘–π‘— βˆ•π›½π‘šπ‘–π‘› (12)

(i) [βŠ— π‘Žπ‘˜π‘–π‘— ]: represents the importance of SCR β€˜i’ over β€˜j’ rated by the π‘˜π‘‘β„Ž analyst; where 1 ≀ i ≀ m; 1 ≀ j ≀ m; 1 ≀ k ≀ l. (ii) [βŠ— π‘π‘˜π‘”π‘–π‘— ]: represents the importance of RSCS β€˜i’ over β€˜j’ for each SCR, β€˜g’, rated by the π‘˜π‘‘β„Ž analyst; where 1 ≀ i ≀ n; 1 ≀ j ≀ n; 1 ≀ k ≀ l; 1 ≀ g ≀ m. π‘˜ ]: represents the importance of SCR β€˜i’ over β€˜j’ for each RSCS, (iii) [βŠ— π‘β„Žπ‘–π‘— β€˜h’, rated by the π‘˜π‘‘β„Ž analyst; where 1 ≀ i ≀ m; 1 ≀ j ≀ m; 1 ≀ k ≀ l; 1 ≀ h ≀ n. The grey numbers specify an upper and a lower range of values respectively, i.e. ) ( (1) βŠ— π‘Žπ‘˜π‘–π‘— = βŠ— π‘Žπ‘˜π‘–π‘— , βŠ— π‘Žπ‘˜π‘–π‘— ( ) βŠ— π‘π‘˜π‘”π‘–π‘— = βŠ— π‘π‘˜π‘”π‘–π‘— , βŠ— π‘π‘˜π‘”π‘–π‘— (2) ) ( π‘˜ π‘˜ π‘˜ (3) βŠ— π‘β„Žπ‘–π‘— = βŠ— π‘β„Žπ‘–π‘— , βŠ— π‘β„Žπ‘–π‘—

where βŠ— π‘ŽΜ‡ 𝑖𝑗 represents the normalized upper limit value of the grey number βŠ— π‘ŽΜƒπ‘–π‘— , βŠ— 𝑏̇ 𝑓 𝑔𝑖𝑗 represents the normalized upper limit value of the grey number βŠ— 𝑏̃ 𝑓 𝑔𝑖𝑗 ; 1≀ f ≀ 3, and βŠ— 𝑐̇ β„Žπ‘–π‘— represents the normalized upper limit value of the grey number βŠ— π‘Μƒβ„Žπ‘–π‘—

βŠ— π‘ŽΜƒπ‘–π‘— =

𝑙 (βˆ‘

βŠ— 𝑏̃ 𝑔𝑖𝑗 =

βŠ— π‘Μƒβ„Žπ‘–π‘—

π‘˜ π‘˜ βŠ— π‘Žπ‘–π‘—

βŽ› =⎜ ⎜ ⎝

π‘˜

βˆ‘ ,

βŠ— π‘π‘˜π‘”π‘–π‘— 𝑙

βˆ‘

π‘˜

π‘˜ βŠ— π‘β„Žπ‘–π‘—

𝑙

π‘˜ π‘˜ βŠ— π‘Žπ‘–π‘—

βˆ‘ , βˆ‘

,

π‘˜

βŠ— π‘π‘˜π‘”π‘–π‘—

π‘˜

(5)

(6)

(16)

(17)

(18)

(iii) Computing the final crisp values ( ( )) π‘Žβˆ— 𝑖𝑗 = π‘šπ‘–π‘› βŠ— π‘ŽΜƒπ‘–π‘— + π‘Žπ‘–π‘— Γ— π›₯π‘šπ‘Žπ‘₯ π‘šπ‘–π‘› ( ( )) π‘šπ‘Žπ‘₯ 𝑏𝑓 βˆ— 𝑔𝑖𝑗 = π‘šπ‘–π‘› βŠ— 𝑏̃ 𝑓 𝑔𝑖𝑗 + 𝑏𝑓𝑔𝑖𝑗 Γ— πœƒ 𝑓 π‘šπ‘–π‘› ( ( )) π‘šπ‘Žπ‘₯ 𝑐 βˆ— β„Žπ‘–π‘— = π‘šπ‘–π‘› βŠ— π‘Μƒβ„Žπ‘–π‘— + π‘β„Žπ‘–π‘— Γ— π›½π‘šπ‘–π‘› [ ] π΄βˆ— = π‘Žβˆ— 𝑖𝑗 [ ] 𝐡𝑔𝑓 βˆ— = 𝑏𝑓 βˆ— 𝑔𝑖𝑗 [ ] and πΆβ„Žβˆ— = 𝑐 βˆ— β„Žπ‘–π‘—

Step 6: Dividing the average grey relation matrices for resilient strategies When the number of alternatives (RSCS) become large, the size of matrix, [βŠ— 𝑏̃ 𝑔𝑖𝑗 ] become computationally intensive. In order to limit unnecessary computations and also, the aim of the model being the selection of best RSCS, the model has been simplified into a two layer model. The first layer considers the construction and evaluation of three super matrices for obtaining best two alternatives in each case, say RSCS-A&B, RSCS-C&D and RSCS-E&F, followed by the construction and evaluation of super matrix using selected alternatives in the second layer. The matrices, [βŠ— 𝑏̃ 𝑔𝑖𝑗 ] were divided into three sets of matri[ ] ces, [βŠ— 𝑏̃ 1 𝑔𝑖𝑗 ], [βŠ— 𝑏̃ 2 𝑔𝑖𝑗 ], βŠ— 𝑏̃ 3 𝑔𝑖𝑗 each consisting of ( 𝑛 Γ— 𝑛 ) dimension 3

(15)

(ii) Computing total normalized crisp values ( )) ( ) ( βŽ› ⎞ + βŠ— π‘ŽΜ‡ 𝑖𝑗 Γ— βŠ— π‘ŽΜ‡ 𝑖𝑗 ⎟ ⎜ βŠ— π‘ŽΜ‡ 𝑖𝑗 1 βˆ’ βŠ— π‘ŽΜ‡ 𝑖𝑗 π‘Žπ‘–π‘— = ⎜ ( ) ⎟ ⎜ ⎟ 1 βˆ’ βŠ— π‘ŽΜ‡ 𝑖𝑗 + βŠ— π‘ŽΜ‡ 𝑖𝑗 ⎝ ⎠ ( )) ( ) ( ⎞ βŽ› + βŠ— 𝑏̇ 𝑓 𝑔𝑖𝑗 Γ— βŠ— 𝑏̇ 𝑓 𝑔𝑖𝑗 ⎟ βŠ— 𝑏̇ 𝑓 𝑔𝑖𝑗 1 βˆ’ βŠ— 𝑏̇ 𝑓 𝑔𝑖𝑗 ⎜ 𝑓 𝑏𝑔𝑖𝑗 = ⎜ ( ) ⎟ ⎟ ⎜ 1 βˆ’ βŠ— 𝑏̇ 𝑓 𝑔𝑖𝑗 + βŠ— 𝑏̇ 𝑓 𝑔𝑖𝑗 ⎠ ⎝ ( ( )) ( ) βŽ› ⎞ + βŠ— 𝑐̇ β„Žπ‘–π‘— Γ— βŠ— 𝑐̇ β„Žπ‘–π‘— ⎟ ⎜ βŠ— 𝑐̇ β„Žπ‘–π‘— 1 βˆ’ βŠ— 𝑐̇ β„Žπ‘–π‘— π‘β„Žπ‘–π‘— = ⎜ ( ) ⎟ ⎜ ⎟ 1 βˆ’ βŠ— 𝑐̇ β„Žπ‘–π‘— + βŠ— 𝑐̇ β„Žπ‘–π‘— ⎝ ⎠

)

π‘˜ ⎞ βŠ— π‘β„Žπ‘–π‘— ⎟ ⎟ 𝑙 ⎠

𝑗

𝑗

(4)

𝑙

(14)

βŠ— 𝑏̃ 𝑓 𝑔𝑖𝑗 = π‘šπ‘Žπ‘₯ βŠ— 𝑏̃ 𝑓 𝑔𝑖𝑗 βˆ’π‘šπ‘–π‘› 𝑗

π‘šπ‘Žπ‘₯ π›½π‘šπ‘–π‘› = π‘šπ‘Žπ‘₯ π‘Μƒβ„Žπ‘–π‘— βˆ’π‘šπ‘–π‘› βŠ— π‘Μƒβ„Žπ‘–π‘— 𝑗

)

𝑙

(13)

π‘šπ‘Žπ‘₯ πœƒ 𝑓 π‘šπ‘–π‘›

𝑗

Step 5: Compute the average grey relation matrices ] ] [ ] [ [ The average grey relation matrices βŠ— π‘ŽΜƒπ‘–π‘— , βŠ— 𝑏̃ 𝑔𝑖𝑗 π‘Žπ‘›π‘‘ βŠ— π‘Μƒβ„Žπ‘–π‘— can [ ] be constructed from 3 Γ— l grey relation matrices respectively, βŠ— π‘Žπ‘˜π‘–π‘— , [ ] [ ] π‘˜ ; k = 1 – l as, βŠ— π‘π‘˜π‘”π‘–π‘— and βŠ— π‘β„Žπ‘–π‘— (βˆ‘

π‘šπ‘–π‘› βŠ— π‘ŽΜƒπ‘–π‘— π›₯π‘šπ‘Žπ‘₯ π‘šπ‘–π‘› = π‘šπ‘Žπ‘₯ βŠ— π‘ŽΜƒπ‘–π‘— βˆ’π‘—

(19) (20) (21) (22) (23) (24)

Step 8: Convert into Analytic Hierarchy Process (AHP) input matrices The crisp relation matrices were converted into AHP input matrices by using a conversion scale for the values as shown in Table 4. The values were so ranged to make the pair-wise comparisons in the same way as in AHP, where the relative importance of one factor over the other varies within a range of β€˜9’ to β€˜1/9’ (Sabu et al., 2018). The matrices were converted into AHP input matrices shown correspondingly as,

3

matrices as, (i) [βŠ— 𝑏̃ 1 𝑔𝑖𝑗 ] consists of importance relations among RSCS βˆ€ 1 ≀ i ≀ n/3; 1 ≀ j ≀ n/3; 1 ≀ g ≀ m, (ii) [βŠ— 𝑏̃ 2 𝑔𝑖𝑗 ] consists of importance relations among RSCS βˆ€ n/3 < i ≀ 2n/3; n/3 < j ≀ 2n/3; 1 ≀ g ≀ m, (iii) [βŠ— 𝑏̃ 3 𝑔𝑖𝑗 ] consists of importance relations among RSCS βˆ€ 2n/3 < i ≀ n; 2n/3 < j ≀ n; 1 ≀ g ≀ m. These matrices, [βŠ— 𝑏̃ 1 𝑔𝑖𝑗 ], [βŠ— 𝑏̃ 2 𝑔𝑖𝑗 ] and [βŠ— 𝑏̃ 3 𝑔𝑖𝑗 ] in general can be represented for convenience as, [βŠ— 𝑏̃ 𝑓 𝑔𝑖𝑗 ]; where 1 ≀ f ≀ 3. Step 7: Compute the crisp relation matrices from the average grey relation matrices The grey values can be converted into crisp values by modifiedCFCS method by a three step procedure elaborated as follows; (i) Normalization of the grey values ( ) βŠ— π‘ŽΜ‡ 𝑖𝑗 = βŠ— π‘ŽΜƒπ‘–π‘— βˆ’π‘šπ‘–π‘› βŠ— π‘ŽΜƒπ‘–π‘— βˆ•π›₯π‘šπ‘Žπ‘₯ (7) 𝑗 π‘šπ‘–π‘› ( ) π‘šπ‘Žπ‘₯ βŠ— 𝑏̃ 𝑓 𝑔𝑖𝑗 βˆ•πœƒ 𝑓 π‘šπ‘–π‘› (8) βŠ— 𝑏̇ 𝑓 𝑔𝑖𝑗 = βŠ— 𝑏̃ 𝑓 𝑔𝑖𝑗 βˆ’π‘šπ‘–π‘› 𝑗 ( ) π‘šπ‘–π‘› π‘šπ‘Žπ‘₯ βŠ— 𝑐̇ β„Žπ‘–π‘— = βŠ— π‘Μƒβ„Žπ‘–π‘— βˆ’π‘— βŠ— π‘Μƒβ„Žπ‘–π‘— βˆ•π›½π‘šπ‘–π‘› (9)

π΄βˆ— β†’ 𝐴̇ βˆ—

(25)

𝐡𝑔𝑓 βˆ— β†’ 𝐡̇ 𝑔𝑓 βˆ— ; 1 ≀ 𝑓 ≀ 3; 1 ≀ 𝑔 ≀ π‘š

(26)

πΆβ„Žβˆ—

(27)

β†’

𝐢̇ β„Žβˆ— ; 1 ≀ β„Ž ≀ 𝑛

Step 9: Calculating the Principal Normalized Eigen Vectors (PNEVs) Set of principal normalized Eigen vectors for the matrices (π΄βˆ— , 𝐡𝑔𝑓 βˆ— , βˆ— πΆβ„Ž ) are to be calculated, where 1 ≀ h ≀ n; 1 ≀ g ≀ m; 1 ≀ f ≀ 3. The corresponding PNEVs for matrices are shown as, (i) 𝑒1 represents the PNEV value corresponding to 𝐴̇ βˆ— (ii) 𝑒𝑔 represents the set of PNEV values corresponding to 𝐡̇ 1βˆ— βˆ€ 1 ≀ g 2

𝑔

≀m (iii) 𝑒𝑔3 represents the set of PNEV values corresponding to 𝐡̇ 𝑔2βˆ— βˆ€ 1 ≀ g ≀m

where, βŠ— π‘ŽΜ‡ 𝑖𝑗 represents the normalized lower limit value of the grey number βŠ— π‘ŽΜƒπ‘–π‘— , βŠ— 𝑏̇ 𝑓 𝑔𝑖𝑗 represents the normalized lower limit value of 8

R. Rajesh

Engineering Applications of Artificial Intelligence 87 (2020) 103338

(iv) 𝑒𝑔4 represents the set of PNEV values corresponding to 𝐡̇ 𝑔3βˆ— βˆ€ 1 ≀ g ≀m (v) π‘’β„Ž5 represents the set of PNEV values corresponding to 𝐢̇ β„Žβˆ— βˆ€ 1 ≀ h ≀n The values are obtained by keeping a Consistency Ratio (CR) less than 0.1 (Saaty, 1996).

Table 3 Linguistic assessment and the associated grey values.

Step 10: Construct the ANP super matrix The ANP super matrix, 𝐴̈ is constructed based on the values obtained from step 9, is as shown in Table 5. 𝐴̈ comprises of PNEV values, 𝑒1 , 𝑒𝑔2 and π‘’β„Ž5 . Similarly ANP super matrices, 𝐡̈ and 𝐢̈ are to be constructed based on PNEV values, (𝑒1 , 𝑒𝑔3 and π‘’β„Ž5 ); (𝑒1 , 𝑒𝑔4 and π‘’β„Ž5 ), respectively.

Linguistic assessment

Associated grey values

Extremely low importance (ELI) Very low importance (VLI) Low importance (LI) Moderately low importance (MLI) Medium importance (MI) Moderately high importance (MHI) High importance (HI) Very high importance (VHI) Extremely high importance (EHI)

[0.0, [0.1, [0.2, [0.3, [0.4, [0.5, [0.6, [0.7, [0.8,

0.2] 0.3] 0.4] 0.5] 0.6] 0.7] 0.8] 0.9] 1.0]

Table 4 Conversion scales from final crisp to AHP input values.

Step 11: Solve and rank resilient strategies The resilient strategies were ranked by raising the super matrix to the power of (π‘˜ βˆ’ 1), where π‘˜ is an arbitrary number and the best of the ̈ 𝐡̈ and 𝐢. ̈ Let the two resilient strategies were taken from each sets of 𝐴, resilient strategies, say RSCS (A) and RSCS (B) be selected by solving ̈ the resilient strategies, say RSCS (C) and RSCS (D) be selected by 𝐴, solving 𝐡̈ and the resilient strategies, say RSCS (E) and RSCS (F) be ̈ respectively. selected by solving 𝐢, Step 12: Compute AHP input matrices for Layer 2 The AHP input matrices for Layer 2 were constructed by considering the selected resilient strategies from Layer 1; RSCS (A), RSCS (B), RSCS (C), RSCS (D), RSCS (E) and RSCS (F) and the considered β€˜m’ supply chain risks. π΅π‘”βˆ—βˆ— and πΆβ„Žβˆ—βˆ— were constructed by pair-wise comparisons over a range of 9 to 1/9, same as in Layer 1, where 1 ≀ g ≀ m; 1 ≀ h ≀ 6. Step 13: Compute the ANP super matrix of Layer 2 Matrix, 𝐴̇ βˆ— obtained in step 8 along with π΅π‘”βˆ—βˆ— and πΆβ„Žβˆ—βˆ— are used as inputs for the ANP super matrix of Layer 2 by calculating their PNEV values, 𝑒1 , 𝑒𝑔6 and π‘’β„Ž7 ; respectively, where 1 ≀ g ≀ m; 1 ≀ h ≀ 6. The ANP super matrix of Layer 2, 𝐷̈ is constructed alike as the construction of the super matrix, 𝐴̈ as in Layer 1.

Crisp value ranges

AHP input conversion

(0.00, (0.10, (0.15, (0.20, (0.25, (0.30, (0.35, (0.40, (0.45, (0.55, (0.60, (0.65, (0.70, (0.75, (0.80, (0.85, (0.90,

1/9 1/8 1/7 1/6 1/5 1/4 1/3 1/2 1 2 3 4 5 6 7 8 9

0.10] 0.15] 0.20] 0.25] 0.30] 0.35] 0.40] 0.45] 0.55] 0.60] 0.65] 0.70] 0.75] 0.80] 0.85] 0.90] 1.00)

international offices at Hong Kong, Dubai, USA and Nepal. The global supply chain network of PQR is shown in Fig. 2. The following methodology was incorporated to have a qualitative and quantitative analysis of various strategies for building resilience in their supply chains. A selection model was considered with resilient strategies as the alternatives and supply chain risks as the factors, by checking how effective those strategies are in mitigating the individual risks? From the constructed ANP selection model as shown in Fig. 3, it can be seen that the selection problem is practically a tedious task requiring large number of pairwise comparisons among variables. The methodology described in Section 4 is practically implemented for the case supply chain of PQR in a step by step procedure as follows:

Step 14: Selection of the best resilient strategy By raising the super matrix to the power of (π‘˜ βˆ’ 1), where π‘˜ is ̈ the six selected strategies are ranked on its an arbitrary number, 𝐷, importance based on their supply chain risk reduction capabilities. This helps managers in identifying the best RSCS. The strategies having more influence on risk mitigation environment should be implemented and practiced to improve supply chain resilience.

Step 1: Twelve supply chain risks and twenty one resilient strategies for risk mitigation were identified with specific focus to electronic manufacturing industry. Three supply chain analysts, experts in the field of supply chain resilience were chosen for rating the importance relations among supply chain risks and risk mitigation strategies. The identified supply chain risks and the resilient strategies for risk mitigation are shown in Tables 1 and 2 respectively.

5. Illustration of proposed model in a case company A representative case study of the proposed methodology for testing the impact of mitigation strategies was carried out in an electronic manufacturing company β€˜PQR’ in India, who are global manufacturers of electronic gadgets, particularly mobiles and tablets. The supply chain of PQR is primarily targeted in improving the satisfaction levels of customers with assured services available. Having a global manufacturing network intensifies the risks and chances of vulnerability of its supply chain. All products in range are manufactured by ensuring strict social and environmental standards. Also, all of the suppliers are expected to keep the same standards in manufacturing their supply components. The products of PQR are having wide global markets across Bangladesh, Nepal, Srilanka, Maldives, UAE, KSA, Kuwait, Qatar, Oman, Afghanistan, Brazil and South Africa. Their supply chain presently occupies the global market with nearly two percent of the total mobile sales in the world. After gaining a significant market in urban areas, in recent years PQR is aiming to hit the rural markets with efficient and responsive products. Their market strategy of β€˜β€˜sell deep and sell more’’ has been widely popularized and they have always concentrated on the development of their core productive capabilities. They have a major manufacturing and assembly plant in India with

Step 2: The risks identified and classified into four clusters are shown in Table 6. Step 3: Three sets of initial relationship matrices were constructed as per the particulars shown under step 3 in Section 4; on linguistic scales varying from ELI to EHI. Step 4: Three sets of grey relation matrices were developed as per conversions shown in Table 3. The matrix, [βŠ— π‘Žπ‘˜π‘–π‘— ] (upper triangular); k = 1, obtained is presented in Table 7. Similarly 12 Γ— 3 (36) grey relationship π‘˜ ] matrices, [βŠ— π‘π‘˜π‘”π‘–π‘— ] and 21 Γ— 3 (63) grey relationship matrices, [βŠ— π‘β„Žπ‘–π‘— were constructed based on Eqs. (1)–(3).

[ ] [ ] [ ] Step 5: The average grey relation matrices, βŠ— π‘ŽΜƒπ‘–π‘— , βŠ— 𝑏̃ 𝑔𝑖𝑗 π‘Žπ‘›π‘‘ βŠ— π‘Μƒβ„Žπ‘–π‘— were constructed [ ] [from 3] Γ— 3 [(9) sets] of grey relation matrices respecπ‘˜ . The average grey relation matrix tively as, βŠ— π‘Žπ‘˜π‘–π‘— , βŠ— π‘π‘˜π‘”π‘–π‘— and βŠ— π‘β„Žπ‘–π‘— 9

R. Rajesh

Engineering Applications of Artificial Intelligence 87 (2020) 103338

Fig. 2. Global supply chain network of illustrative case company PQR.

Fig. 3. ANP selection model considering various supply chain risks and resilient strategies for risk mitigation.

10

R. Rajesh

Engineering Applications of Artificial Intelligence 87 (2020) 103338 Table 5 ̈ Construction of ANP super matrix of Layer 1, 𝐴.

] [ is]shown in Table 8. Similarly 12 constructed, βŠ— π‘ŽΜƒπ‘–π‘— (upper triangular) [

Table 6 Supply chain risks categorized in clusters.

βŠ— π‘π‘˜π‘”π‘–π‘—

and 21 average grey relation average grey relation matrices, [ ] matrices, βŠ— π‘Μƒβ„Žπ‘–π‘— were developed by following Eqs. (4)–(6).

Step 6: As there are twenty one alternatives to be evaluated, the dimension of matrix, [βŠ— 𝑏̃ 𝑔𝑖𝑗 ] becomes 21 Γ— 21 and( there are) 12 such matrices to be computed with each matrix needing

(21Γ—21)βˆ’21 2

i.e., 210

paired comparisons. Hence, the total number of paired comparisons will be 210 Γ— 12 (2520) for the set of matrices [βŠ— 𝑏̃ 𝑔𝑖𝑗 ] alone, which is practically a tedious job. In order to simplify the problem, the average grey relation matrices, [βŠ— 𝑏̃ 𝑔𝑖𝑗 ] were divided into three sets of matrices, [βŠ— 𝑏̃ 𝑓 𝑔𝑖𝑗 ]; 1 ≀ f ≀ 3, each consisting of 7 Γ— 7 dimension so the (( matrices, ) ) number of paired comparisons can be reduced to

(7Γ—7)βˆ’7 2

Sl. No. Lead time related risks

Flexibility related risks

Integration related risks

Sourcing related risks

1 2 3 4

SCDN CPTY INRY CNGS

TCGY SYTM

PRCT CNTY IPRR

FRCT DLYS RCBS

the six strategies to be selected for the case study in their order of preference by implementing the methodology were β€˜β€˜risk hedging’’ >β€˜β€˜using insurance’’ > β€˜β€˜fine-tune supply chain design’’ >β€˜β€˜supply contract flexibility’’ > β€˜β€˜enhance visibility’’ > β€˜β€˜inventory flexibility’’.

Γ— 12 Γ— 3

i.e., 756. The selection model was also modified accordingly in order to practically simplify the model into a two layer network, which is shown in Fig. 4.

6. Results and discussion This research has attempted to quantify the effectiveness of various mitigation approaches on a practical perspective. Mitigation approaches, based on its effectiveness were sorted using combined methodologies of grey theory and layered ANP approaches. This model was also applied in the context of an Indian electronic manufacturing industry. Twelve major SCRs and twenty one RSCSs were considered for the case study. A two layer evaluation model was constructed and solved for the case problem and the most effective resilient strategies were found to be RSCS 10 (risk hedging ) and RSCS 21 (using insurance). For clarity, a digraph showing the overall importance of RSCS in mitigating various SCR, as seen from the importance ratings is plotted in Fig. 5. From the digraph, it is easy for the managers to understand the effects of RSCS over various SCR and it is also possible to easily identify those RSCS having broader effects. The results obtained for the problem strictly depend on the importance ratings given by supply chain analysts. How far the ranking priorities vary with the variations in weightings assigned for supply chain analysts? Do there exist any personal bias in the ranking priorities of resilient strategies for the case supply chain? Sensitivity analysis was conducted to answer these questions. We have assigned highest weightings to the importance ratings given by each of the supply chain analysts (analyst 1, analyst 2 and analyst 3) separately, keeping equal weightings for others. The weightings assigned for supply chain analysts during sensitivity analysis are shown in Table 14. Results of sensitivity analysis reveal that there are no serious changes in the final results obtained earlier. The selection indices obtained for various RSCS in Layer 1, during sensitivity analysis have been compared with that of the actual model to check the possibilities of any biases and is found to be unbiased. This can be perceived from

Step 7: The grey relation matrices were converted into crisp relation matrices using Eqs. (7) to (24). The crisp relation matrix obtained, π΄βˆ— (upper triangular) is shown in Table 9. Similarly the set of crisp relation matrices, 𝐡𝑔𝑓 βˆ— and πΆβ„Žβˆ— , were constructed. Step 8: The corresponding AHP input matrices were obtained from the crisp relation matrices using Table 4 and Eqs. (25)–(27). The AHP input matrix, 𝐴̇ βˆ— (upper triangular) developed is shown in Table 10. Similarly the set of matrices, 𝐡̇ 𝑔𝑓 βˆ— and 𝐢̇ β„Žβˆ— were formulated. Step 9: Set of principal normalized Eigen vectors, 𝑒1 , 𝑒𝑔2 , 𝑒𝑔3 , 𝑒𝑔4 , π‘’β„Ž5 for the matrices (π΄βˆ— , 𝐡𝑔𝑓 βˆ— , πΆβ„Žβˆ— ) were calculated by keeping a Consistency Ratio (CR) less than 0.1; where 1 ≀ h ≀ 21; 1 ≀ g ≀ 12; 1 ≀ f ≀ 3. Step 10: The ANP super matrix of Layer 1, 𝐴̈ is constructed according to Table 5, which is displayed in Table 11. Also, ANP super matrices of Layer 1, 𝐡̈ and 𝐢̈ were constructed. Step 11: The best of the two resilient strategies each, obtained by ̈ 𝐡̈ and 𝐢̈ are shown in Table 12. solving the super matrices, 𝐴, Step 12: The AHP input matrices for Layer 2 were constructed using the selected resilient strategies in Table 12 and the considered twelve supply chain risks. The set of matrices, π΅π‘”βˆ—βˆ— and πΆβ„Žβˆ—βˆ— were formulated, same as in Layer 1, where 1 ≀ g ≀ 12; 1 ≀ h ≀ 6. Step 13: The ANP super matrix of Layer 2,𝐷̈ was framed according to step 13 in Section 4; which is detailed in Table 13. Step 14: The six selected strategies were ranked on its importance based on their supply chain risk reduction capabilities and the best RSCS is identified to be as RSCS 10, β€˜β€˜risk hedging’’. The best of 11

R. Rajesh

Engineering Applications of Artificial Intelligence 87 (2020) 103338

Fig. 4. Revised model representing the selection problem considering various supply chain risks and resilient strategies for risk mitigation.

Table 7 Grey relation matrix showing relative importance of supply chain risks by sc analyst 1.

FRCT indicates the associated supply chain risk, β€˜Forecast risk’, as in Table 1. Similarly, the other elements of table can be read. The level of importance of SCR, i over SCR, j; rated by analyst 1, is represented as grey value, βŠ— π‘Ž1𝑖𝑗 .

the sensitivity analysis plot as shown in Fig. 6. Hence, it is evident

In order to validate the model for the case company we have

that there exists no serious bias in the ratings given by supply chain

critically analyzed the following best six RSCS obtained on basis of the

analysts. The best two of the strategies selected in Layer 1; by solving

proposed model and its practical implications of the case.

̈ 𝐡̈ and 𝐢̈ remains the same in all scenario, each super matrices, 𝐴, despite the weightings assigned for analysts. Hence, the Layer 2 remains

Risk hedging: The case company now directly works in collaboration

identical in all cases resulting in the same ranking order for strategies.

with its suppliers and partners, which opens opportunities for risk hedg-

The results of sensitivity analysis and the order of ranking for most

ing in their supply chains. Vendor Managed Inventory (VMI) practiced

effective resilient strategies are shown in Table 14.

with typical component suppliers increases the opportunities of risk 12

R. Rajesh

Engineering Applications of Artificial Intelligence 87 (2020) 103338 Table 8 Average grey relation matrix showing relative importance of supply chain risks.

FRCT indicates the associated supply chain risk, β€˜Forecast risk’, as in Table 1. Similarly, the other elements of table can be read. The average level of importance of SCR, i over SCR, j is represented as grey value, βŠ— π‘ŽΜƒπ‘–π‘— .

Table 9 Crisp relation matrix showing relative importance of supply chain risks.

FRCT indicates the associated supply chain risk, β€˜Forecast risk’, as in Table 1. Similarly, the other elements of table can be read. The crisp value showing level of importance of SCR, i over SCR, j is represented as, π‘Žβˆ— 𝑖𝑗 .

Table 10 AHP input matrix showing relative importance of supply chain risks.

FRCT indicates the associated supply chain risk, β€˜Forecast risk’, as in Table 1. Similarly, the other elements of table can be read. The AHP input value showing level of importance of SCR, i over SCR, j is represented as, π‘ŽΜ‡ βˆ— 𝑖𝑗 .

13

R. Rajesh

Engineering Applications of Artificial Intelligence 87 (2020) 103338

Table 11 ̈ ANP super matrix of Layer 1, 𝐴.

FRCT indicates the associated supply chain risk, β€˜Forecast risk’, as in Table 1 and FTSD indicates the resilient supply chain strategy, β€˜Fine-tune supply chain design’ as in Table 2, respectively. Similarly, the other elements of the table can be read.

Table 12 Selected resilient strategies from Layer 1.

FTSD indicates the risk mitigation strategy, β€˜Fine-tune supply chain design’ as in Table 2. Similarly, the other elements of the table can be read. Selection index represents the values obtained by synthesizing the super matrices of Layer 1.

Table 13 ̈ ANP super matrix of Layer 2, 𝐷.

hedging and reduced vulnerability of their supply chain to a large extend.

and enables them to extend beyond boundaries and practice new product innovations.

Using insurance: All major plants and warehouses of the case company are protected under the cover of multiple insurances, which makes the company feels secure against major disruptive events such as natural disasters. Insurance improves the confidence level of their supply chain

Fine-tune supply chain design: Supply chain designs are frequently tuned by β€˜PQR’ to adopt as per new market situations. Increased trends of online marketing and internet sales are utilized by them without 14

R. Rajesh

Engineering Applications of Artificial Intelligence 87 (2020) 103338 Table 14 Sensitivity analysis for selection of resilient strategies (Layer 1). Sl No. Scenario 1

1 2 3 4 5 6

Scenario 2

Scenario 3

Selection index Selected strategies (Layer 1)

Selection index Selected strategies (Layer 1)

Selection index Selected strategies (Layer 1)

0.2776 0.1722 0.2153 0.1851 0.2953 0.2723

0.2714 0.1759 0.2754 0.2561 0.2983 0.2677

0.2732 0.17 0.2766 0.2557 0.2866 0.27

FTSD SCFB EVBY RHDG UINS INFB

RSCS RSCS RSCS RSCS RSCS RSCS

A B C D E F

FTSD SCFB EVBY RHDG UINS INFB

RSCS RSCS RSCS RSCS RSCS RSCS

A B C D E F

FTSD SCFB EVBY RHDG UINS INFB

RSCS RSCS RSCS RSCS RSCS RSCS

A B C D E F

For different scenario; 1, 2 and 3, the respective weightings for supply chain analysts are assigned as (0.6, 0.2, 0.2), (0.2, 0.6, 0.2), and (0.2, 0.2, 0.6).

Fig. 5. Digraph representing the importance of RSCS in mitigating various SCR (Relations superior to moderately high importance are plotted).

Fig. 6. Sensitivity analysis plots for RSCS compared with that of the actual obtained model.

15

R. Rajesh

Engineering Applications of Artificial Intelligence 87 (2020) 103338

compromising on the speeds of delivery. Customer delights are ensured with ample services available and even by providing replacement warrantee for high end products.

electronic manufacturing supply chains can be considered as a scope of future research. Risk hedging emerges as the best strategy for resilience for the case supply chain and top level managers are recommended to increase their collaborative working capabilities to improving the level of risk hedging opportunities. Although not being a risk mitigation strategy, using insurance can alleviate the effects of certain risks, when processes go wrong. This is how it deals with the risks by avoiding its’ effects. Thus, insuring risky assets and operations can increase the resilience capabilities of supply chains. (iii) Implications to policy The study also offers several implications to policy makers. Establishing one or several policies to upsurge the effects of the aforementioned resilient strategies for risk mitigation can improve the overall resilience capabilities of supply chains. Some of the policy implications are; (a) Improving the level of collaborative working with partners: improving the information sharing and visibilities in supply chains can improve the collaborative capabilities in supply chains. (b) Improving the level of flexibilities in supply chains: Supply flexibilities can be increased by implementing strategies such as multiple supplier strategies or flexible supply contracts. Process flexibilities can be improved by implementing flexible manufacturing systems, and demand flexibilities can be improved by responsive pricing strategies and postponements. And, (c) Prioritize the resilient strategies for risk mitigation before implementing them.

Supply contract flexibility: Flexibility is imparted to the supply contracts by having collaborative partner relations. The company has built trust among their suppliers in having a collaborative relation through regular orders, on time payments and reduced bank debts during the recent years. Supply contracts were made to use this flexibility for utilizing the inventory and capacity by adopting enhanced information sharing practices. Enhance visibility: Virtuous information sharing practices and collaborative partner relations enhances the visibility of available resources and unforeseen risks associated with their supply chains. The pipeline inventories are more visible, which enable their supply chains to adopt postponement strategies which in turn reduce the cost of capacity and holding costs of inventory. Inventory flexibility: Inventory flexibility is achieved by the use of standard/ modular designs for their products, which are having same part family combinations. For most of the instances, they implement innovations of similar existing products, to catch immediate market attentions and this helps in utilizing the existing work-in-process (WIP) inventories. 7. Research implications

8. Conclusions and scope of future works The present study has several research implications. These implications can be extended towards the theoretical knowledge, practice, and policy of the supply chain decision-making environments. The implications are elaborated as follows; (i) Implications to theoretical knowledge This study proposes many implications to theoretic knowledge of organizations and their supply chains. The main contributions are in consideration of the resource based view of organizations and the complexity theory view of the supply chain. According to resource based view, organizations are sustained by harnessing those resources that are valuable, erratic, inimitable, and non-substitutable. The resources can be in several forms as; assets, capabilities, organizational processes, firm attributes, information and knowledge that enable firm to improving effectiveness, efficiency, and responsiveness. From the study, resilient strategies for risk mitigation can improve the overall flexibility of the system and can properly utilize the organizational resources to achieving effectiveness, efficiency, and responsiveness. Considering a complexity theory perspective into supply chains, any additional element (buffer) added to a supply chain will increase its interactive complexities. Organizations or their supply chains will become less predictable, when the level of interactive complexities increases. In this case, adding capacities and inventories are considered among the resilient strategies for risk mitigation. This is possible by building redundancies to improve flexibilities associated with capacities and inventories. But, these strategies have not emerged amongst the best five resilient strategies to deal with concomitant risks for the case supply chain. This is owing to the fact that improving capacities and inventories will eventually increase the interactive complexities of the system. Hence, some of the associated risks such as capacity risks and inventory risks gradually increase for the system. So considering the complexity theory perspective in supply chains, capacity and inventory flexibilities must be carefully observed according to the needs of the supply chain. (ii) Implications to practice Supply chain managers are recommended to implement the resilient strategies for risk mitigation in accordance with the strategic focus of supply chains. The results obtained are for a case electronic supply chain, and it can be assumed that similar pattern of prominence among resilient strategies for risk mitigation may exist for other electronic supply chains. An empirical study to evidence this, among several

Implementing proactive approaches to identify, measure, mitigate and monitor supply chain risks demands increasing attention in modern supply chains. Expertise practices are needed for dealing with vulnerability and improving the resilience of supply chains. Both qualitative and quantitative analyses of the strategies for risk mitigation are essential for reducing, monitoring and mitigating various supply chain risks. By quantifying the resilient strategies for risk mitigation, supply chain managers could assign weightings for its implementation and practice. The proposed methodology for decision support uses the benefits of grey theory and layered ANP approaches to deal with human judgments to be converted into a set of numerical values which could be used by managers for better decision making processes. This research has a lot of managerial implications as it is possible for the logistics management team to ascertain effective strategies for risk mitigation by simply concentrating on those with higher selection indices. Also, it is possible to take proactive initiatives to tackle supply chain risks by implementing suitable risk mitigation strategies and to impart supply chain resilience. The case study points into many insights of the model. It is seen that, building flexibility in different forms builds resilience in supply chain as a whole. Collaborative working with partners enabled them to utilize their capacity and inventory to a great extent. Insurance also improves confidence level among supply chain partners and enable them to open new product innovations by keeping buoyancy in the market. This has led to the improvement of their visibility, trust and even opens opportunities for risk hedging. There are some limitations of this research as well. The model only considers twelve major risks and twenty one strategies for supply chain resilience typically seen in an electronics manufacturing industry. Supply chain analysts need to have an exhaustive knowledge about the firm, its practices and products for critical evaluation of resilient attributes and strategies. Also, the ratings given by supply chain analysts might have reflected their personal biases towards certain variables. Cluster priorities were not introduced in the model for decision making; which might have further added complexity to the model. Future research could focus on extended applications of the model considering more supply chain risks and resilient strategies for risk mitigation. Also, the study can be extended by considering many of the human/ behavioral attributes contributing to the overall resilience of the supply chain. The model evaluates the mitigation approaches 16

R. Rajesh

Engineering Applications of Artificial Intelligence 87 (2020) 103338

at a strategic level. The same can be extended to check the resilience practices of the firm at tactical and operational levels by considering major risks and mitigation approaches at that levels. The representative case study has been done in case of an electronic manufacturing industry. The same model can be considered for application in different industries as well with some marginal changes.

Fahimnia, B., Tang, C.S., Davarzani, H., Sarkis, J., 2015. Quantitative models for managing supply chain risks: A review. European J. Oper. Res. 247 (1), 1–15. Finch, P., 2004. Supply chain risk management. Supply Chain Manage.: Int. J. 9 (2), 183–196. Fischhoff, B., de Bruin, W.B., GΓΌvenΓ§, Ü., Caruso, D., Brilliant, L., 2006. Analyzing disaster risks and plans: An avian flu example. J. Risk Uncertain. 33 (1–2), 131–149. Fu, X., Zhu, Q., Sarkis, J., 2012. Evaluating green supplier development programs at a telecommunications systems provider. Int. J. Prod. Econ. 140 (1), 357–367. Gaudenzi, B., Borghesi, A., 2006. Managing risks in the supply chain using the AHP method. Int. J. Logist. Manage. 17 (1), 114–136. Giunipero, L.C., Eltantawy, R.A., 2004. Securing the upstream supply chain: a risk management approach. Int. J. Phys. Distrib. Logist. Manage. 34 (9), 698–713. Gligor, D.M., Holcomb, M.C., Stank, T.P., 2013. A multidisciplinary approach to supply chain agility: Conceptualization and scale development. J. Bus. Logist. 34 (2), 94–108. Ha, A.Y., Tong, S., Zhang, H., 2011. Sharing demand information in competing supply chains with production diseconomies. Manage. Sci. 57 (3), 566–581. Hall, N.G., Liu, Z., 2010. Capacity allocation and scheduling in supply chains. Oper. Res. 58 (6), 1711–1725. Harland, C., Brenchley, R., Walker, H., 2003. Risk in supply networks. J. Purch. Supply Manage. 9 (2), 51–62. Hein, E., Tarassow, A., 2010. Distribution, aggregate demand and productivity growth: theory and empirical results for six OECD countries based on a post-Kaleckian model. Camb. J. Econ. 34 (4), 727–754. Hofmann, H., Busse, C., Bode, C., Henke, M., 2013. Sustainability-related supply chain risks: Conceptualization and management. Bus. Strategy Environ. 23 (3), 160–172. Hofmann, E., Kotzab, H., 2010. A supply chain-oriented approach of working capital management. J. Bus. Logist. 31 (2), 305–330. Holweg, M., Reichhart, A., Hong, E., 2011. On risk and cost in global sourcing. Int. J. Prod. Econ. 131 (1), 333–341. Jerath, K., Netessine, S., Veeraraghavan, S.K., 2010. Revenue management with strategic customers: Last-minute selling and opaque selling. Manage. Sci. 56 (3), 430–448. JΓΌttner, U., Peck, H., Christopher, M., 2003. Supply chain risk management: outlining an agenda for future research. Int. J. Logist.: Res. Appl. 6 (4), 197–210. KemahlΔ±oğlu-Ziya, E., Bartholdi, J.J., 2011. Centralizing inventory in supply chains by using shapley value to allocate the profits. Manuf. Serv. Oper. Manage. 13 (2), 146–162. Klibi, W., Martel, A., Guitouni, A., 2010. The design of robust value-creating supply chain networks: a critical review. European J. Oper. Res. 203 (2), 283–293. KΓΆk, A.G., Fisher, M.L., Vaidyanathan, R., 2009. Assortment planning: Review of literature and industry practice. In: Retail Supply Chain Management. Springer, US, pp. 99–153. de Leeuw, S., Grotenhuis, R., Van Goor, A., 2013. Assessing complexity of supply chains: evidence from wholesalers. Int. J. Oper. Prod. Manage. 33 (8), 1. Liao, Y., Hong, P., Rao, S.S., 2010. Supply management, supply flexibility and performance outcomes: an empirical investigation of manufacturing firms. J. Supply Chain Manage. 46 (3), 6–22. Lin, Z., Cai, C., Xu, B., 2010. Supply chain coordination with insurance contract. European J. Oper. Res. 205 (2), 339–345. Ma, J., Wang, K., Xu, L., 2011. Modelling and analysis of workflow for lean supply chains. Enterp. Inf. Syst. 5 (4), 423–447. Manuj, I., Mentzer, J.T., 2008. Global supply chain risk management strategies. Int. J. Phys. Distrib. Logist. Manage. 38 (3), 192–223. Marley, K.A., Ward, P.T., Hill, J.A., 2014. Mitigating supply chain disruptions–a normal accident perspective. Supply Chain Manage.: Int. J. 19 (2), 3. Meissner, J., Strauss, A., 2012. Network revenue management with inventory-sensitive bid prices and customer choice. European J. Oper. Res. 216 (2), 459–468. Milner, J.M., Rosenblatt, M.J., 2002. Flexible supply contracts for short life-cycle goods: The buyer’s perspective. Nav. Res. Logist. 49 (1), 25–45. Monroe, R.W., Teets, J.M., Martin, P.R., 2014. Supply chain risk management: an analysis of sources of risk and mitigation strategies. Int. J. Appl. Manage. Sci. 6 (1), 4–21. Nam, S.H., Vitton, J., Kurata, H., 2011. Robust supply base management: Determining the optimal number of suppliers utilized by contractors. Int. J. Prod. Econ. 134 (2), 333–343. Pine, B.J., Peppers, D., Rogers, M., 2010. Do You Want to Keep Your Customers Forever? Harvard Business Press, Boston. Ponomarov, S.Y., Holcomb, M.C., 2009. Understanding the concept of supply chain resilience. Int. J. Logist. Manage. 20 (1), 124–143. Qi, L., Shen, Z.J.M., Snyder, L.V., 2010. The effect of supply disruptions on supply chain design decisions. Transp. Sci. 44 (2), 274–289. Rajesh, R., 2017. Pseudo resilient supply chains: concept, traits, and practices. J. Risk Res. http://dx.doi.org/10.1080/13669877.2017.1304977. Rajesh, R., 2019. Network design for resilience in supply chains using novel crazy elitist TLBO. Neural Comput. Appl. http://dx.doi.org/10.1007/s00521-019-04260-3. Rajesh, R., Rajendran, C., 2019. Grey-and rough-set-based seasonal disaster predictions: an analysis of flood data in India. Natural Hazards 97 (1), 395–435. Rajesh, R., Ravi, V., 2017. Analyzing drivers of risks in electronic supply chains: a grey–DEMATEL approach. Int. J. Adv. Manuf. Technol. 92 (1–4), 1127–1145.

Acknowledgments The author sincerely thanks the Editor in Chief, Prof. Ajith Abraham and the unknown reviewers to improve the quality of contents to a greater extent. References Aksin, O.Z., Karaesmen, F., Γ–rmeci, E.L., 2010. Workforce cross training in call centers from an operations management perspective. In: David, A. Nembhard (Ed.), Workforce Cross Training. CRC Press, Boca Raton, pp. 211–234. Atasoy, B., 2013. Integrated Supply–Demand Models for the Optimization of Flexible Transportation Systems (Doctoral dissertation). Γ©cole polytechnique fΓ©dΓ©rale de lausanne. Barlas, Y., Gunduz, B., 2011. Demand forecasting and sharing strategies to reduce fluctuations and the bullwhip effect in supply chains. J. Oper. Res. Soc. 62 (3), 458–473. Barroso, A.P., Machado, V.H., Cruz Machado, V., 2011. The resilience paradigm in the supply chain management: a case study. In: IEEE International Conference on Industrial Engineering and Engineering Management (IEEM). pp. 928–932. Billington, C., Lee, H.L., Tang, C.S., 2012. Successful strategies for product rollovers. Sloan Manage. Rev. 39 (3), 23–30. Blanchard, O.J., Kiyotaki, N., 1987. Monopolistic competition and the effects of aggregate demand. Amer. Econ. Rev. 77 (4), 647–666. Braunscheidel, M.J., Suresh, N.C., 2009. The organizational antecedents of a firm’s supply chain agility for risk mitigation and response. J. Oper. Manage. 27 (2), 119–140. Bruzzone, A., Longo, F., 2014. An application methodology for logistics and transportation scenarios analysis and comparison within the retail supply chain. Eur. J. Ind. Eng. 8 (1), 112–142. Cachon, G.P., 2004. The allocation of inventory risk in a supply chain: Push, pull, and advance-purchase discount contracts. Manage. Sci. 50 (2), 222–238. Charles, A., Lauras, M., Van Wassenhove, L., 2010. A model to define and assess the agility of supply chains: building on humanitarian experience. Int. J. Phys. Distrib. Logist. Manag. 40 (8/9), 722–741. Chen, Y.J., Deng, M., Huang, K.W., 2013. Hierarchical screening for capacity allocation in supply chains: The role of distributors. Prod. Oper. Manage. 23 (3), 405–419. Cheng, F., Ettl, M., Lin, G.Y., Tonner, M., Yao, D.D., 2011. Designing flexible supply chain contracts with options. In: Karl, Keskinocak, Reha, Uzsoy (Eds.), Planning Production and Inventories in the Extended Enterprise. Springer, New York, pp. 207–229. Chiang, W.Y.K., Chhajed, D., Hess, J.D., 2003. Direct marketing, indirect profits: A strategic analysis of dual-channel supply-chain design. Manage. Sci. 49 (1), 1–20. Chiu, C.H., Choi, T.M., Tang, C.S., 2011. Price, rebate, and returns supply contracts for coordinating supply chains with price-dependent demands. Prod. Oper. Manage. 20 (1), 81–91. Choi, K., Narasimhan, R., Kim, S.W., 2012. Postponement strategy for international transfer of products in a global supply chain: A system dynamics examination. J. Oper. Manage. 30 (3), 167–179. Chopra, S., Sodhi, M.S., 2012. Managing risk to avoid supply-chain breakdown. MIT Sloan Manage. Rev. (Fall 2004) 46 (1), 53–61. Christopher, M., Holweg, M., 2011. Supply Chain 2.0: managing supply chains in the era of turbulence. Int. J. Phys. Distrib. Logist. Manage. 41 (1), 63–82. Christopher, M., Lee, H., 2004. Mitigating supply chain risk through improved confidence. Int. J. Phys. Distrib. Logist. Manage. 34 (5), 388–396. Christopher, M., Peck, H., 2004. Building the resilient supply chain. Int. J. Logist. Manag. 15 (2), 1–14. Closs, D.J., Speier, C., Meacham, N., 2011. Sustainability to support end-to-end value chains: the role of supply chain management. J. Acad. Mark. Sci. 39 (1), 101–116. Corbett, C.J., Blackburn, J.D., Van Wassenhove, L.N., 2012. Partnerships to improve supply chains. Sloan Manage. Rev. 40 (4), 71–82. Costinot, A., Vogel, J., Wang, S., 2013. An elementary theory of global supply chains. Rev. Econom. Stud. 80 (1), 109–144. Craighead, C.W., Blackhurst, J., Rungtusanatham, M.J., Handfield, R.B., 2007. The severity of supply chain disruptions: design characteristics and mitigation capabilities. Decis. Sci. 38 (1), 131–156. Cucchiella, F., Gastaldi, M., 2006. Risk management in supply chain: a real option approach. J. Manuf. Technol. Manage. 17 (6), 700–720. Deng, J.L., 1982. Control problems of grey systems. Systems Control Lett. 1 (5), 288–294. Deng, J.L., 1989. Introduction to grey system theory. J. Grey Syst. 1 (1), 1–24. 17

R. Rajesh

Engineering Applications of Artificial Intelligence 87 (2020) 103338 Tsai, C.Y., 2008. On supply chain cash flow risks. Decis. Support Syst. 44 (4), 1031–1042. Tuncel, G., Alpan, G., 2010. Risk assessment and management for supply chain networks: A case study. Comput. Ind. 61 (3), 250–259. Vilko, J., Ritala, P., Edelmann, J., 2014. On uncertainty in supply chain risk management. Int. J. Logist. Manage. 25 (1), 3–19. Wang, X., Qi, L., Chen, C., Tang, J., Jiang, M., 2014. Grey system theory based prediction for topic trend on internet. Eng. Appl. Artif. Intell. 29, 191–200. Wu, D., Birge, J.R., 2016. Risk intelligence in big data era: A review and introduction to special issue. IEEE Trans. Cybern. 46 (8), 1718–1720. Wu, D., Olson, D.L., Dolgui, A., 2015. Decision making in enterprise risk management: A review and introduction to special issue. Omega 57, 1–4. Wu, D., Olson, D.L., Dolgui, A., 2017. Artificial intelligence in engineering risk analytics. Eng. Appl. Artif. Intell. 65, 433–435. Wu, L.L.B., Wu, D., 2016. Dynamic pricing and risk analytics under competition and stochastic reference price effects. IEEE Trans. Ind. Inf. 12 (3), 1282–1293. Xu, H., 2010. Managing production and procurement through option contracts in supply chains with random yield. Int. J. Prod. Econ. 126 (2), 306–313. Yang, B., Yang, Y., 2010. Postponement in supply chain risk management: a complexity perspective. Int. J. Prod. Res. 48 (7), 1901–1912. Yao, Y., Zhu, K.X., 2012. Research noteβ€”Do electronic linkages reduce the bullwhip effect? An empirical analysis of the US manufacturing supply chains. Inf. Syst. Res. 23 (3-Part-2), 1042–1055. Zeng, B., Meng, W., Tong, M., 2016. A self-adaptive intelligence grey predictive model with alterable structure and its application. Eng. Appl. Artif. Intell. 50, 236–244.

Rajesh, R., Ravi, V., Venkata Rao, R., 2015. Selection of risk mitigation strategy in electronic supply chains using grey theory and digraph-matrix approaches. Int. J. Prod. Res. 53 (1), 238–257. Saaty, T.L., 1996. The Analytic Network Process: Decision Making with Dependence and Feedback; the Organization and Prioritization of Complexity. Rws publications, Pittsburgh. Sabu, M., Shaijumon, C.S., Rajesh, R., 2018. Factors influencing the adoption of ICT tools in kerala marine fisheries sector: an analytic hierarchy process approach. Technol. Anal. Strategic Manage. 30 (7), 866–880. Sarker, B.R., 2014. Consignment stocking policy models for supply chain systems: A critical review and comparative perspectives. Int. J. Prod. Econ. 155, 52–67. SaurΓ©, D., Zeevi, A., 2013. Optimal dynamic assortment planning with demand learning. Manuf. Serv. Oper. Manage. 15 (3), 387–404. Schmitt, A.J., Singh, M., 2012. A quantitative analysis of disruption risk in a multi-echelon supply chain. Int. J. Prod. Econ. 139 (1), 22–32. Scholes, M.S., 1996. Global financial markets, derivative securities, and systemic risks. J. Risk Uncertaint. 12 (2–3), 271–286. Sheffi, Y., 2005. The Resilient Enterprise: Overcoming Vulnerability for Competitive Advantage. MIT Press Books, Cambridge. Stavrulaki, E., Davis, M., 2010. Aligning products with supply chain processes and strategy. Int. J. Logist. Manage. 21 (1), 127–151. Sturgeon, T., Lester, R.K., 2004. The new global supply base: new challenges for local suppliers in east asia. In: Global Production Networking and Technological Change in East Asia. pp. 35–87. Talluri, S.S., Kull, T.J., Yildiz, H., Yoon, J., 2013. Assessing the efficiency of risk mitigation strategies in supply chains. J. Bus. Logist. 34 (4), 253–269. Tang, O., Nurmaya Musa, S., 2011. Identifying risk issues and research advancements in supply chain risk management. Int. J. Prod. Econ. 133 (1), 25–34. Tang, C., Tomlin, B., 2008. The power of flexibility for mitigating supply chain risks. Int. J. Prod. Econ. 116 (1), 12–27. Tang, C.S., Zimmerman, J., 2013. Information and communication technology for managing supply chain risks. Commun. ACM 56 (7), 27–29. Tomlin, B., 2006. On the value of mitigation and contingency strategies for managing supply chain disruption risks. Manage. Sci. 52 (5), 639–657.

Rajesh is presently working as Assistant Professor (Operations) in ABV-Indian Institute of Information Technology, Gwalior, India. He has completed Ph.D. from the Indian Institute of Space Science and Technology (IIST), Trivandrum, India and Post-doc from the Indian Institute of Technology Madras (IIT-M), India. He is working the areas of decision-making, supply chain risk management, resilience, sustainability, and operations management.

18