Optimizing Protection Strategies for Supply Chains: Comparing Classic Decision-Making Criteria in an Uncertain Environment

被引:19
作者
Liberatore, Federico [1 ]
Scaparra, Maria Paola [1 ]
机构
[1] Univ Kent, Kent Business Sch, Canterbury CT2 7PE, Kent, England
基金
英国工程与自然科学研究理事会;
关键词
fortification; interdiction; optimization; reliability; supply chains; CRITICAL INFRASTRUCTURE; LOCATION; NETWORK; ALGORITHMS; SECURITY; SINGLE;
D O I
10.1080/00045608.2011.584294
中图分类号
P9 [自然地理学]; K9 [地理];
学科分类号
0705 ; 070501 ;
摘要
The inherent and growing complexity characterizing today's infrastructure systems has considerably increased their vulnerability to external disruptions. Recent world events have demonstrated how damage to one or more infrastructure components can result in disastrous political, social, and economic effects. This, in turn, has fostered the development of sophisticated quantitative methods that identify cost-effective ways of strengthening supply systems in the face of disruption. Stochastic and robust optimization can be used to tackle these strategic problems when uncertainty is present. The uncertainty dealt with in this article is related to the extent to which supply systems can be disrupted. More specifically, we propose and analyze different protection optimization models for minimizing the damage to a system resulting from the disruption of an uncertain number of system components. We compare a cost-based model and two original regret models that, to the best of our knowledge, represent the state of the art in the field of protection in location analysis. Also, we discuss how to build an operational envelope for the models considered, which can be used to identify the range of possible impacts associated with different protection strategies. The models are tested on a benchmark data set and on a new data set that was built using the Census 2001 data of the United Kingdom. We analyze and compare the protection plans generated by the models and provide some useful insights related to the robustness of the different modeling approaches.
引用
收藏
页码:1241 / 1258
页数:18
相关论文
共 67 条
[1]  
[Anonymous], 1998, Practical bi-level optimization
[2]  
[Anonymous], 2003, SUPPLY CHAIN MANAGEM
[3]   Minmax regret median location on a network under uncertainty [J].
Averbakh, I ;
Berman, O .
INFORMS JOURNAL ON COMPUTING, 2000, 12 (02) :104-110
[4]  
Averbakh I., 1997, LOCATION SCI, V5, P246
[5]   Optimal resource allocation for security in reliability systems [J].
Azaiez, M. N. ;
Bier, Vicki M. .
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2007, 181 (02) :773-786
[6]  
BARRIONUEVO A, 2005, NY TIMES 0901
[7]   The use of game theory to measure the vulnerability of stochastic networks [J].
Bell, MGH .
IEEE TRANSACTIONS ON RELIABILITY, 2003, 52 (01) :63-68
[8]  
Brack K., 1998, IND DISTRIB, V87, P19
[9]  
Brown GG, 2005, Emerging theory, methods, and applications, P102
[10]   Robust location problems with Pos/Neg weights on a tree [J].
Burkard, RE ;
Dollani, H .
NETWORKS, 2001, 38 (02) :102-113