Assessing the vulnerability of logistics service supply chain based on complex network

Fei Ma, Huifeng Xue*, Kum Fai Yuen, Qipeng Sun, Shumei Zhao, Yanxia Zhang, Kai Huang

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

27 Citations (Scopus)

Abstract

The reliable operation of a logistics service supply chain (LSSC) is a key factor for improving logistics efficiency and service level, and vulnerability is an important indicator of reliable LSSC operation. Based on complex network theory, we reconstructed the running mechanism of logistics service providers, integrators, and demanders. We constructed an improved structure model of LSSC. By observing the selected three indicators (clustering coefficient, maximum connectivity, and network connectivity efficiency), the influence caused by the problem will continue to spread to more subjects along the network when a problem exists in one part of the network. The results showed that the destructive power of deliberate attacks is far greater than the damage caused by random attacks, and the disruption of logistics service integrators will considerably increase the vulnerability of the LSSC. However, even if logistics service integrators are removed completely, the LSSC still can operate at low efficiency. Through a case analysis, we identified the vulnerable nodes in logistics service, clarify the vulnerable mechanism in LSSC, and provide guidance for the operation of LSSC in real life.

Original languageEnglish
Article number1991
JournalSustainability
Volume12
Issue number5
DOIs
Publication statusPublished - Mar 1 2020
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2020 by the authors.

ASJC Scopus Subject Areas

  • Geography, Planning and Development
  • Renewable Energy, Sustainability and the Environment
  • Environmental Science (miscellaneous)
  • Energy Engineering and Power Technology
  • Management, Monitoring, Policy and Law

Keywords

  • Attack strategy
  • Complex network
  • Logistics service supply chain
  • Vulnerability measure

Fingerprint

Dive into the research topics of 'Assessing the vulnerability of logistics service supply chain based on complex network'. Together they form a unique fingerprint.

Cite this