{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T14:27:33Z","timestamp":1770042453265,"version":"3.49.0"},"reference-count":59,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2012,3,9]],"date-time":"2012-03-09T00:00:00Z","timestamp":1331251200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3,9]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>To counteract the effects of global competition, many organizations have extended their enterprises by forming supply chain networks. However, as organizations increase their dependence on these networks, they become more vulnerable to their suppliers' risk profiles. The purpose of this paper is to present a methodology for modeling and evaluating risk profiles in supply chains via Bayesian networks.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>Empirical data from 15 casting suppliers to a major US automotive company are analyzed using Bayesian networks. The networks provide a methodological approach for determining a supplier's external, operational, and network risk probability, and the potential revenue impact a supplier can have on the company.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>Bayesian networks can be used to develop supplier risk profiles to determine the risk exposure of a company's revenue stream. The supplier risk profiles can be used to determine those risk events which have the largest potential impact on an organization's revenues, and the highest probability of occurrence.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>A limitation to the use of Bayesian networks to model supply chain risks is the proper identification of risk events and risk categories that can impact a supply chain.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>The methodology used in this study can be adopted by managers to formulate supply chain risk management strategies and tactics which mitigate overall supply chain risks.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Social implications<\/jats:title><jats:p>The methodology used in this study can be used by organizations to reduce supply chain risks which yield numerous societal benefits.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>As part of a comprehensive supplier risk management program, organizations along with their suppliers can develop targeted approaches to minimize the occurrence of supply chain risk events.<\/jats:p><\/jats:sec>","DOI":"10.1108\/02635571211204317","type":"journal-article","created":{"date-parts":[[2012,3,5]],"date-time":"2012-03-05T14:32:06Z","timestamp":1330957926000},"page":"313-333","source":"Crossref","is-referenced-by-count":50,"title":["Modeling supplier risks using Bayesian networks"],"prefix":"10.1108","volume":"112","author":[{"suffix":"III","given":"Archie","family":"Lockamy","sequence":"first","affiliation":[]},{"given":"Kevin","family":"McCormack","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022021520275725800_b1","unstructured":"Atkinson, W. (2010), \u201cToyota's quality woes provide purchasing with a valuable supplier relations lesson\u201d, Purchasing, Vol. 139 No. 3, p. 48."},{"key":"key2022021520275725800_b2","unstructured":"Basel Committee on Banking Supervision (2006), \u201cInternational convergence of capital and capital standards\u201d, available at: www.bis.org\/ (accessed 14 June 2011)."},{"key":"key2022021520275725800_b3","doi-asserted-by":"crossref","unstructured":"Chen, L. and Kang, F. (2007), \u201cIntegrated vendor\u2010buyer cooperative inventory models with variant permissible delay in payments\u201d, European Journal of Operational Research, Vol. 183 No. 2, pp. 658\u201073.","DOI":"10.1016\/j.ejor.2006.10.035"},{"key":"key2022021520275725800_b4","doi-asserted-by":"crossref","unstructured":"Chen, M., Yusen Xia, Y. and Wang, X. (2010), \u201cManaging supply uncertainties through Bayesian information update\u201d, IEEE Transactions on Automation Science and Engineering, Vol. 7 No. 1, pp. 24\u201036.","DOI":"10.1109\/TASE.2009.2018466"},{"key":"key2022021520275725800_b5","unstructured":"Chopra, S. and Sodhi, M.S. (2004), \u201cManaging risk to avoid supply\u2010chain breakdown\u201d, Sloan Management Review, Vol. 46 No. 1, pp. 53\u201061."},{"key":"key2022021520275725800_b6","doi-asserted-by":"crossref","unstructured":"Cousins, P., Lamming, R.C. and Bowen, F. (2004), \u201cThe role of risk in environment\u2010related Initiatives\u201d, International Journal of Operations & Production Management, Vol. 24 No. 6, pp. 554\u201065.","DOI":"10.1108\/01443570410538104"},{"key":"key2022021520275725800_b7","doi-asserted-by":"crossref","unstructured":"Craighead, C.W., Blackhurst, J., Rungtusanatham, M.J. and Handfield, R.B. (2007), \u201cThe severity of supply chain disruptions: design characteristics and mitigation capabilities\u201d, Decision Sciences, Vol. 38 No. 1, pp. 131\u201056.","DOI":"10.1111\/j.1540-5915.2007.00151.x"},{"key":"key2022021520275725800_b8","doi-asserted-by":"crossref","unstructured":"Croxton, K., Lambert, D., Garcia\u2010Dastugue, S. and Rogers, D. (2002), \u201cThe demand management process\u201d, International Journal of Logistics Management, Vol. 13 No. 2, pp. 51\u201066.","DOI":"10.1108\/09574090210806423"},{"key":"key2022021520275725800_b9","doi-asserted-by":"crossref","unstructured":"Cucchiella, F. and Gastaldi, M. (2006), \u201cRisk management in supply chain: a real option approach\u201d, Journal of Manufacturing Technology Management, Vol. 17 No. 6, pp. 700\u201020.","DOI":"10.1108\/17410380610678756"},{"key":"key2022021520275725800_b10","doi-asserted-by":"crossref","unstructured":"Engle, R.F. and Manganelli, S. (2004), \u201cCAViaR: conditional autoregressive value at risk by regression quantiles\u201d, Journal of Business and Economic Statistics, Vol. 22 No. 4, pp. 367\u201081.","DOI":"10.1198\/073500104000000370"},{"key":"key2022021520275725800_b11","doi-asserted-by":"crossref","unstructured":"Faisal, M.N., Banwet, D.K. and Shankar, R. (2006a), \u201cMapping supply chains on risk and customer sensitivity dimensions\u201d, Industrial Management & Data Systems, Vol. 106 No. 6, pp. 878\u201095.","DOI":"10.1108\/02635570610671533"},{"key":"key2022021520275725800_b12","doi-asserted-by":"crossref","unstructured":"Faisal, M.N., Banwet, D.K. and Shankar, R. (2006b), \u201cSupply chain risk mitigation: modeling the enablers\u201d, Business Process Management Journal, Vol. 12 No. 4, pp. 535\u201052.","DOI":"10.1108\/14637150610678113"},{"key":"key2022021520275725800_b13","doi-asserted-by":"crossref","unstructured":"Gaudenzi, B. and Borghesi, A. (2006), \u201cManaging risks in the supply chain using the AHP method\u201d, The International Journal of Logistics Management, Vol. 17 No. 1, pp. 114\u201036.","DOI":"10.1108\/09574090610663464"},{"key":"key2022021520275725800_b14","doi-asserted-by":"crossref","unstructured":"Giunipero, L.C. and Eltantawy, R.A. (2004), \u201cSecuring the upstream supply chain: a risk management approach\u201d, International Journal of Physical Distribution & Logistics Management, Vol. 34 No. 9, pp. 698\u2010713.","DOI":"10.1108\/09600030410567478"},{"key":"key2022021520275725800_b15","doi-asserted-by":"crossref","unstructured":"Gunasekaran, A., Lai, K. and Cheng, T. (2008), \u201cResponsive supply chain: a competitive strategy in a networked economy\u201d, Omega, Vol. 36 No. 4, pp. 549\u201064.","DOI":"10.1016\/j.omega.2006.12.002"},{"key":"key2022021520275725800_b16","unstructured":"Hackett Group (2007), \u201cDow chemical company: supply risk management process is key to improving safety and security\u201d, Procurement Executive Insight, 9 October."},{"key":"key2022021520275725800_b17","doi-asserted-by":"crossref","unstructured":"Handfield, R. and McCormack, K. (2007), Supply Chain Risk Management: Minimizing Disruptions in Global Sourcing, Auberbach Publications, Boca Raton, FL.","DOI":"10.1201\/9781420013306"},{"key":"key2022021520275725800_b18","doi-asserted-by":"crossref","unstructured":"Hendricks, K.B. and Singhal, V.R. (2005), \u201cAn empirical analysis of the effect of supply chain disruptions on long\u2010run stock price performance and equity risk of the firm\u201d, Production and Operations Management, Vol. 14 No. 1, pp. 35\u201052.","DOI":"10.1111\/j.1937-5956.2005.tb00008.x"},{"key":"key2022021520275725800_b19","doi-asserted-by":"crossref","unstructured":"Jammernegg, W. and Reiner, G. (2007), \u201cPerformance improvement of supply chain processes by coordinated inventory and capacity management\u201d, International Journal of Production Economics, Vol. 108 Nos 1\/2, pp. 183\u201090.","DOI":"10.1016\/j.ijpe.2006.12.047"},{"key":"key2022021520275725800_b20","unstructured":"Jorion, P. (2006), Value at Risk: The New Benchmark for Managing Financial Risk, 3rd ed., McGraw\u2010Hill, New York, NY."},{"key":"key2022021520275725800_b21","doi-asserted-by":"crossref","unstructured":"Kao, H.Y., Huang, C.H. and Li, H.L. (2005), \u201cSupply chain diagnostics with dynamic Bayesian networks\u201d, Computers & Industrial Engineering, Vol. 49 No. 2, pp. 339\u201047.","DOI":"10.1016\/j.cie.2005.06.002"},{"key":"key2022021520275725800_b22","unstructured":"Kauffmann, P.J., Jacobs, D.A. and Fernandez, A.A. (2002), \u201cUse of Bayesian probabilities to identify and improve distribution center error rates\u201d, Production & Inventory Management Journal, Vol. 43 Nos 1\/2, pp. 1\u20105."},{"key":"key2022021520275725800_b23","doi-asserted-by":"crossref","unstructured":"Kim, S.W. (2006), \u201cEffects of supply chain management practices, integration and competition capability on performance\u201d, Supply Chain Management: An International Journal, Vol. 11 No. 3, pp. 241\u20108.","DOI":"10.1108\/13598540610662149"},{"key":"key2022021520275725800_b24","doi-asserted-by":"crossref","unstructured":"Kleindorfer, P.R. and Saad, G.H. (2005), \u201cManaging disruption risks in supply chains\u201d, Production and Operations Management, Vol. 14 No. 1, pp. 53\u201068.","DOI":"10.1111\/j.1937-5956.2005.tb00009.x"},{"key":"key2022021520275725800_b25","doi-asserted-by":"crossref","unstructured":"Kleindorfer, P.R. and Wassenhove, L.K. (2003), \u201cManaging risk in global supply chains\u201d, paper presented to Wharton Insurance and Risk Management Department Seminar, University of Pennsylvania, Philadelphia, PA.","DOI":"10.1017\/CBO9780511522093.013"},{"key":"key2022021520275725800_b26","unstructured":"Kopczak, L. and Johnson, M. (2003), \u201cThe supply\u2010chain management effect\u201d, MIT Sloan Management Review, Vol. 44 No. 3, pp. 27\u201034."},{"key":"key2022021520275725800_b28","doi-asserted-by":"crossref","unstructured":"Li, X. and Chandra, C. (2007), \u201cA knowledge integration framework for complex network management\u201d, Industrial Management & Data Systems, Vol. 107 No. 8, pp. 1089\u2010109.","DOI":"10.1108\/02635570710822769"},{"key":"key2022021520275725800_b27","doi-asserted-by":"crossref","unstructured":"Li, S., Ragu\u2010Nathan, B., Ragu\u2010Nathan, T. and Rae, S. (2006), \u201cThe impact of supply chain management practices on competitive advantage and organizational performance\u201d, Omega, Vol. 34 No. 2, pp. 107\u201024.","DOI":"10.1016\/j.omega.2004.08.002"},{"key":"key2022021520275725800_b29","doi-asserted-by":"crossref","unstructured":"Lockamy, A. III (2011), \u201cBenchmarking supplier risks using Bayesian networks\u201d, Benchmarking: An International Journal, Vol. 18 No. 3, pp. 409\u201027.","DOI":"10.1108\/14635771111137787"},{"key":"key2022021520275725800_b30","doi-asserted-by":"crossref","unstructured":"Lockamy, A. III and McCormack, K. (2009), \u201cExamining operational risks in supply chains\u201d, Supply Chain Forum, Vol. 10 No. 1, pp. 2\u201014.","DOI":"10.1080\/16258312.2009.11517204"},{"key":"key2022021520275725800_b31","doi-asserted-by":"crossref","unstructured":"Lockamy, A. III and McCormack, K. (2010), \u201cAnalysing risks in supply networks to facilitate outsourcing decisions\u201d, International Journal of Production Research, Vol. 48 No. 2, pp. 593\u2010611.","DOI":"10.1080\/00207540903175152"},{"key":"key2022021520275725800_b32","doi-asserted-by":"crossref","unstructured":"Makris, S., Zoupas, P. and Chryssolouris, G. (2011), \u201cSupply chain control logic for enabling adaptability under uncertainty\u201d, International Journal of Production Research, Vol. 49 No. 1, pp. 121\u201037.","DOI":"10.1080\/00207543.2010.508940"},{"key":"key2022021520275725800_b33","doi-asserted-by":"crossref","unstructured":"Meixell, M.J., Shaw, N.C. and Tuggle, F.D. (2008), \u201cA methodology for assessing the value of knowledge in a service parts supply chain\u201d, IEEE Transactions on Systems, Man and Cybernetics: Part C \u2013 Applications and Reviews, Vol. 38 No. 3, pp. 446\u201060.","DOI":"10.1109\/TSMCC.2008.919175"},{"key":"key2022021520275725800_b34","doi-asserted-by":"crossref","unstructured":"Milner, J.M. and Kouvelis, P. (2005), \u201cOrder quantity and timing flexibility in supply chains: the role of demand characteristics\u201d, Management Science, Vol. 51 No. 6, pp. 970\u201085.","DOI":"10.1287\/mnsc.1050.0359"},{"key":"key2022021520275725800_b35","unstructured":"Murphy, S. (2009), \u201cSuppy Chain 2010: building on the lessons learned\u201d, Supply Chain Management Review, Vol. 13 No. 9, pp. 2\u20109."},{"key":"key2022021520275725800_b36","doi-asserted-by":"crossref","unstructured":"Nagurney, A., Cruz, J., Dong, J. and Zhang, D. (2005), \u201cSupply chain networks, electronic commerce, and supply side and demand side risk\u201d, European Journal of Operational Research, Vol. 164 No. 1, pp. 120\u201042.","DOI":"10.1016\/j.ejor.2003.11.007"},{"key":"key2022021520275725800_b37","doi-asserted-by":"crossref","unstructured":"Narayanan, V.G., Raman, A. and Singh, J. (2005), \u201cAgency costs in a supply chain with demand uncertainty and price competition\u201d, Management Science, Vol. 51 No. 1, pp. 120\u201032.","DOI":"10.1287\/mnsc.1040.0211"},{"key":"key2022021520275725800_b38","doi-asserted-by":"crossref","unstructured":"Neiger, D. and Rotaru, K. (2009), \u201cSupply chain risk identification with value\u2010focused process engineering\u201d, Journal of Operations Management, Vol. 27 No. 2, pp. 154\u201068.","DOI":"10.1016\/j.jom.2007.11.003"},{"key":"key2022021520275725800_b39","doi-asserted-by":"crossref","unstructured":"Norrman, A. and Jansson, U. (2004), \u201cEricsson's proactive supply chain risk management approach after a serious sub\u2010supplier accident\u201d, International Journal of Physical Distribution & Logistics Management, Vol. 34 No. 5, pp. 434\u201056.","DOI":"10.1108\/09600030410545463"},{"key":"key2022021520275725800_b40","doi-asserted-by":"crossref","unstructured":"Pai, R., Kallepalli, V., Caudill, R. and Zhou, M. (2003), \u201cMethods toward supply chain risk analysis\u201d, IEEE International Conference on Systems, Man and Cybernetics, Vol. 5 No. 1, pp. 4560\u20105.","DOI":"10.1109\/ICSMC.2003.1245702"},{"key":"key2022021520275725800_b41","unstructured":"Paulsson, U. (2004), \u201cSupply chain risk management\u201d, in Brindley, C. (Ed.), Supply Chain Risk Management, Aldershot, Ashgate, pp. 79\u201096."},{"key":"key2022021520275725800_b42","unstructured":"Pearson, N. (2002), Risk Budgeting: Portfolio Problem Solving with Value\u2010at\u2010Risk, Wiley, New York, NY."},{"key":"key2022021520275725800_b43","doi-asserted-by":"crossref","unstructured":"Rahman, M.A., Sarker, B. and Escobar, L.A. (2011), \u201cPeak demand forecasting for a seasonal product using Bayesian approach\u201d, Journal of the Operational Research Society, Vol. 62 No. 6, pp. 1019\u201028.","DOI":"10.1057\/jors.2010.58"},{"key":"key2022021520275725800_b44","doi-asserted-by":"crossref","unstructured":"Sanders, D.R. and Manfredo, M.R. (2002), \u201cThe role of value\u2010at\u2010risk in purchasing: an application to the foodservice industry\u201d, Journal of Supply Chain Management, Vol. 38 No. 2, pp. 38\u201045.","DOI":"10.1111\/j.1745-493X.2002.tb00128.x"},{"key":"key2022021520275725800_b45","unstructured":"Sawhney, M., Wolcott, R.C. and Arroniz, I. (2006), \u201cThe 12 different ways for companies to innovate\u201d, Sloan Management Review, Vol. 47 No. 3, pp. 75\u201081."},{"key":"key2022021520275725800_b46","doi-asserted-by":"crossref","unstructured":"Shevtshenko, E. and Wang, Y. (2009), \u201cDecision support under uncertainties based on robust Bayesian networks in reverse logistics management\u201d, International Journal of Computer Applications in Technology, Vol. 36 Nos 3\/4, pp. 247\u201058.","DOI":"10.1504\/IJCAT.2009.028047"},{"key":"key2022021520275725800_b47","doi-asserted-by":"crossref","unstructured":"Singh, P., Smith, A. and Sohal, S. (2005), \u201cStrategic supply chain management issues in the automotive industry: an Australian perspective\u201d, International Journal of Production Research, Vol. 43 No. 16, pp. 3375\u2010400.","DOI":"10.1080\/00207540500095738"},{"key":"key2022021520275725800_b48","unstructured":"Supply Chain Council (2008), \u201cSupply chain operations reference model v. 9.0\u201d, Supply Chain Council, available at: www.supply\u2010chain.org\/ (accessed 14 June 2010)."},{"key":"key2022021520275725800_b49","doi-asserted-by":"crossref","unstructured":"Suttner, U. (2005), \u201cSupply chain risk management: understanding the business requirements from a practitioner perspective\u201d, The International Journal of Logistics Management, Vol. 16 No. 1, pp. 120\u201041.","DOI":"10.1108\/09574090510617385"},{"key":"key2022021520275725800_b50","doi-asserted-by":"crossref","unstructured":"Taskin, S. and Lodree, E.J. (2011), \u201cA Bayesian decision model with hurricane forecast updates for emergency supplies inventory management\u201d, Journal of the Operational Research Society, Vol. 62 No. 6, pp. 1098\u2010108.","DOI":"10.1057\/jors.2010.14"},{"key":"key2022021520275725800_b52","doi-asserted-by":"crossref","unstructured":"Tomlin, B. (2009), \u201cImpact of supply learning when suppliers are unreliable\u201d, Manufacturing and Service Operations Management, Vol. 11 No. 2, pp. 192\u2010209.","DOI":"10.1287\/msom.1070.0206"},{"key":"key2022021520275725800_b51","doi-asserted-by":"crossref","unstructured":"Treleven, S. and Schweikhart, B. (1988), \u201cA risk\/benefit analysis of sourcing strategies: single vs multiple sourcing\u201d, Journal of Operations Management, Vol. 7 No. 4, pp. 93\u2010114.","DOI":"10.1016\/0272-6963(81)90007-3"},{"key":"key2022021520275725800_b53","unstructured":"Venkataraman, S. (1997), \u201cValue at risk for a mixture of normal distributions: the use of quasi\u2010bayesian estimation techniques\u201d, Economic Perspectives, Vol. 21 No. 2, pp. 2\u201014."},{"key":"key2022021520275725800_b54","doi-asserted-by":"crossref","unstructured":"Wagner, S.M. and Bode, C. (2006), \u201cAn empirical investigation into supply chain vulnerability\u201d, Journal of Purchasing and Supply Management, Vol. 12 No. 6, pp. 301\u201012.","DOI":"10.1016\/j.pursup.2007.01.004"},{"key":"key2022021520275725800_b55","doi-asserted-by":"crossref","unstructured":"Wu, J. (2005), \u201cQuantity flexibility contracts under Bayesian updating\u201d, Computers & Operations Research, Vol. 32 No. 5, pp. 1267\u201088.","DOI":"10.1016\/j.cor.2003.11.004"},{"key":"key2022021520275725800_b56","doi-asserted-by":"crossref","unstructured":"Wu, T., Blackhurst, J. and Chidambaram, V. (2006), \u201cA model for inbound supply risk analysis\u201d, Computers in Industry, Vol. 57 No. 4, pp. 350\u201065.","DOI":"10.1016\/j.compind.2005.11.001"},{"key":"key2022021520275725800_b57","doi-asserted-by":"crossref","unstructured":"Yelland, P.M. (2010), \u201cBayesian forecasting of parts demand\u201d, International Journal of Forecasting, Vol. 26 No. 2, pp. 374\u201096.","DOI":"10.1016\/j.ijforecast.2009.11.001"},{"key":"key2022021520275725800_b58","doi-asserted-by":"crossref","unstructured":"Yelland, P.M., Kim, S. and Stratulate, R. (2010), \u201cA Bayesian model for sales forecasting at Sun Microsystems\u201d, Interfaces, Vol. 40 No. 2, pp. 118\u201029.","DOI":"10.1287\/inte.1090.0477"},{"key":"key2022021520275725800_b59","doi-asserted-by":"crossref","unstructured":"Zsidisin, G., Melnyk, S. and Ragatz, G. (2005), \u201cAn institutional theory perspective of business continuity planning for purchasing and supply management\u201d, International Journal of Production Research, Vol. 43 No. 16, pp. 3401\u201020.","DOI":"10.1080\/00207540500095613"}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02635571211204317","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635571211204317\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635571211204317\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:38:40Z","timestamp":1753400320000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/112\/2\/313-333\/175460"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3,9]]},"references-count":59,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,3,9]]}},"alternative-id":["10.1108\/02635571211204317"],"URL":"https:\/\/doi.org\/10.1108\/02635571211204317","relation":{},"ISSN":["0263-5577"],"issn-type":[{"value":"0263-5577","type":"print"}],"subject":[],"published":{"date-parts":[[2012,3,9]]}}}