{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T11:11:41Z","timestamp":1770981101149,"version":"3.50.1"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2005,7,1]],"date-time":"2005-07-01T00:00:00Z","timestamp":1120176000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2005,7,1]],"date-time":"2005-07-01T00:00:00Z","timestamp":1120176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2005,7,1]],"date-time":"2005-07-01T00:00:00Z","timestamp":1120176000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2005,7,1]],"date-time":"2005-07-01T00:00:00Z","timestamp":1120176000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Automat Comput"],"published-print":{"date-parts":[[2005,7]]},"DOI":"10.1007\/s11633-005-0085-2","type":"journal-article","created":{"date-parts":[[2006,12,9]],"date-time":"2006-12-09T23:30:12Z","timestamp":1165707012000},"page":"85-92","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["A subjective risk analysis approach of container supply chains"],"prefix":"10.1007","volume":"2","author":[{"given":"Zai-Li","family":"Yang","sequence":"first","affiliation":[]},{"given":"Jin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Steve","family":"Bonsall","sequence":"additional","affiliation":[]},{"given":"Jian-Bo","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Quan-Gen","family":"Fang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"85_CR1","first-page":"17","volume":"4","author":"P. Chapman","year":"2002","unstructured":"P. Chapman, M. Christopher, U. J\u00fcttner, H. Peck, R. Wilding, Identifying and managing supply-chain vulnerability, Logistics & Transport Focus, vol. 4, no. 4, pp. 17, 2002.","journal-title":"Logistics & Transport Focus"},{"issue":"1","key":"85_CR2","first-page":"107","volume":"4","author":"Z. L. Yang","year":"2005","unstructured":"Z. L. Yang, S. Bonsall, W. Alan, J. Wang, Reliable container line supply chains \u2014 a new risk assessment framework for improving safety performance, WMU Journal of Maritime Affairs, vol. 4, no. 1, pp. 107\u2013122, 2005.","journal-title":"WMU Journal of Maritime Affairs"},{"key":"85_CR3","doi-asserted-by":"crossref","unstructured":"M. U. Thomas, Supply chain reliability for contingency operations, Annual Reliability and Maintainability Symposium, pp. 61\u201367, WA, USA, 2002.","DOI":"10.1109\/RAMS.2002.981621"},{"key":"85_CR4","doi-asserted-by":"crossref","unstructured":"D. Garg, Y. Narahari, N. Viswanadham, Design of Six Sigma supply chains, Proceedings \u2014 IEEE International Conference on Robotics and Automation, pp. 1737\u20131742, Taibei, 2003.","DOI":"10.1109\/ROBOT.2003.1241845"},{"key":"85_CR5","first-page":"4560","volume":"5","author":"R. R. Pai","year":"2003","unstructured":"R. R. Pai, V. R. Kallepalli, R. J. Caudill, M. C. Zhou, Methods towards supply chain risk analysis, Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, vol. 5, pp. 4560\u20134565, 2003.","journal-title":"Proceedings of the IEEE International Conference on Systems"},{"issue":"2","key":"85_CR6","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1108\/09600030210421723","volume":"32","author":"G. Svensson","year":"2002","unstructured":"G. Svensson, A conceptual framework of vulnerability in firms\u2019 inbound and outbound logistics flows, International Journal of Physical Distribution and Logistics Management, vol. 32, no. 2, pp. 110\u2013134, 2002.","journal-title":"International Journal of Physical Distribution and Logistics Management"},{"issue":"2","key":"85_CR7","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/0951-8320(96)00003-8","volume":"52","author":"J. Wang","year":"1996","unstructured":"J. Wang, J. B. Yang, P. Sen, Multi-person and multi-attribute design evaluations using evidential reasoning based on subjective safety and cost analyses, Reliability Engineering and System Safety, vol. 52, no. 2, pp. 113\u2013128, 1996.","journal-title":"Reliability Engineering and System Safety"},{"issue":"3","key":"85_CR8","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1109\/TSMCA.2002.802746","volume":"32","author":"J. B. Yang","year":"2002","unstructured":"J. B. Yang, D. L. Xu, On the evidential reasoning algorithm for multiple attribute decision analysis under uncertainty, IEEE Transactions on Systems, Man and Cybernetics \u2014 Part A: Systems and Humans, vol. 32, no. 3, pp. 289\u2013304, 2002.","journal-title":"IEEE Transactions on Systems, Man and Cybernetics \u2014 Part A: Systems and Humans"},{"key":"85_CR9","unstructured":"OECD, Security in maritime transport: risk factors and economic impact, Maritime Transport Committee of OECD Report, France, 2003."},{"key":"85_CR10","volume-title":"Institute of Environmental Studies","author":"P. Timmerman","year":"1981","unstructured":"P. Timmerman, Vulnerability, resilience and the collapse of society, Institute of Environmental Studies, University of Toronto, Toronto, 1981."},{"issue":"2","key":"85_CR11","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1108\/09653560110388609","volume":"10","author":"J. Weichselgartner","year":"2001","unstructured":"J. Weichselgartner, Disaster mitigation: the concept of vulnerability revisited, Disaster Prevention and Management, vol. 10, no 2, pp. 85\u201394, 2001.","journal-title":"Disaster Prevention and Management"},{"key":"85_CR12","volume-title":"Security Risk Assessment and Control","author":"H. T. Burns","year":"2003","unstructured":"H. T. Burns, P. Cordire, T. Eriksson, Security Risk Assessment and Control, Perpetuity Press Ltd., Leicester, UK, 2003."},{"key":"85_CR13","volume-title":"Technology and Safety of Marine Systems","author":"A. Pillay","year":"2003","unstructured":"A. Pillay, J. Wang, Technology and Safety of Marine Systems, Elsevier Science Ltd., Oxford, UK, 2003."},{"key":"85_CR14","volume-title":"Probability Risk Assessment","author":"E. J. Henley","year":"1992","unstructured":"E. J. Henley, H. Kumarnoto, Probability Risk Assessment, IEEE Press, NY, USA, 1992."},{"issue":"2","key":"85_CR15","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/0165-0114(86)90031-X","volume":"19","author":"W. Karwowski","year":"1986","unstructured":"W. Karwowski, A. Mital, Potential applications of fuzzy sets in industrial safety engineering, Fuzzy Sets and Systems, vol. 19, no. 2, pp. 105\u2013120, 1986.","journal-title":"Fuzzy Sets and Systems"}],"container-title":["International Journal of Automation and Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-005-0085-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11633-005-0085-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-005-0085-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-005-0085-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T02:29:51Z","timestamp":1744165791000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11633-005-0085-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,7]]},"references-count":15,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2005,7]]}},"alternative-id":["85"],"URL":"https:\/\/doi.org\/10.1007\/s11633-005-0085-2","relation":{},"ISSN":["1476-8186","1751-8520"],"issn-type":[{"value":"1476-8186","type":"print"},{"value":"1751-8520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,7]]},"assertion":[{"value":"27 August 2004","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 July 2005","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}