{"id":2497,"date":"2024-03-30T18:46:47","date_gmt":"2024-03-30T17:46:47","guid":{"rendered":"https:\/\/scnode.com\/?page_id=2497"},"modified":"2024-11-29T12:07:27","modified_gmt":"2024-11-29T11:07:27","slug":"enterprise-risk-management-for-resilient-supply-chain","status":"publish","type":"page","link":"https:\/\/scnode.com\/index.php\/enterprise-risk-management-for-resilient-supply-chain\/","title":{"rendered":"Enterprise Risk Management for resilient supply chain"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2497\" class=\"elementor elementor-2497\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a3b6d15 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-parent\" data-id=\"a3b6d15\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f2e8b68 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"f2e8b68\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">enterprise risk management for resilient supply chain<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7c58e3a e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-parent\" data-id=\"7c58e3a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d01c53b elementor-widget elementor-widget-spacer\" data-id=\"d01c53b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0499db2 elementor-widget elementor-widget-heading\" data-id=\"0499db2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Mitigating risks via Enterprise Risk Management tools<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3daa17 elementor-widget elementor-widget-text-editor\" data-id=\"a3daa17\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Risk management in the supply chain is undoubtfully a very complex topic, requiring a structured approach to effectively navigate the myriad uncertainties and potential disruptions.<\/p><p>Without a systematic framework in place, identifying, assessing, and mitigating risks can be daunting tasks fraught with ambiguity. However, leveraging and embracing advanced methodologies and tools based on probabilistic modeling offers a structured means of quantifying and monitoring risks.<\/p><p>By integrating probabilistic techniques with data-driven insights, organizations can gain a deeper understanding of the probabilistic dependencies and interrelationships within the supply chain ecosystem. This enables them to proactively identify vulnerabilities, assess the likelihood and impact of various risk events, and implement targeted mitigation strategies to enhance resilience and mitigate the potential impact of disruptions on supply chain operations.<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f46814 elementor-widget elementor-widget-heading\" data-id=\"0f46814\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Bayesian Networks for effective risk monitoring<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-864b3f0 elementor-widget elementor-widget-text-editor\" data-id=\"864b3f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In the labyrinth of decision-making, where uncertainties lurk at every corner, Enterprise Risk Management tools, mainly based on Bayesian Networks, emerge as guiding beacons, illuminating pathways through the darkness of ambiguity. At their core lies a mathematical schema that intertwines probability theory with graphical representations, enabling the modeling, inference, and understanding of complex systems.\u00a0<\/p><p><strong>Conditional Probability:<\/strong><\/p><p>Central to Bayesian networks is conditional probability, a cornerstone of probability theory. It quantifies the likelihood of an event occurring given the occurrence of another event. Mathematically, it&#8217;s expressed as:<\/p><p><span class=\"math math-inline\"><span class=\"katex\"><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"mord mathnormal\">P<\/span><span class=\"mopen\">(<\/span><span class=\"mord mathnormal\">A<\/span><span class=\"mord\">\u2223<\/span><span class=\"mord mathnormal\">B<\/span><span class=\"mclose\">)<\/span><span class=\"mrel\">= <span class=\"mord\"><span class=\"mfrac\"><span class=\"vlist-t vlist-t2\"><span class=\"vlist-r\"><span class=\"vlist\"><span class=\"sizing reset-size6 size3 mtight\"><span class=\"mord mtight\"><span class=\"mord mathnormal mtight\">P<\/span><span class=\"mopen mtight\">(<\/span><span class=\"mord mathnormal mtight\">A<\/span><span class=\"mbin mtight\">\u2229<\/span><span class=\"mord mathnormal mtight\">B<\/span><span class=\"mclose mtight\">)\/<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><span class=\"base\"><span class=\"mord\"><span class=\"mfrac\"><span class=\"vlist-t vlist-t2\"><span class=\"vlist-r\"><span class=\"vlist\"><span class=\"sizing reset-size6 size3 mtight\"><span class=\"mord mtight\"><span class=\"mord mathnormal mtight\">P<\/span><span class=\"mopen mtight\">(<\/span><span class=\"mord mathnormal mtight\">B<\/span><span class=\"mclose mtight\">)<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/p><p>Here, <span class=\"math math-inline\"><span class=\"katex\"><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"mord mathnormal\">P<\/span><span class=\"mopen\">(<\/span><span class=\"mord mathnormal\">A<\/span><span class=\"mord\">\u2223<\/span><span class=\"mord mathnormal\">B<\/span><span class=\"mclose\">)<\/span><\/span><\/span><\/span><\/span> denotes the probability of event A occurring given that event B has occurred, <span class=\"math math-inline\"><span class=\"katex\"><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"mord mathnormal\">P<\/span><span class=\"mopen\">(<\/span><span class=\"mord mathnormal\">A<\/span><span class=\"mbin\">\u2229<\/span><\/span><span class=\"base\"><span class=\"mord mathnormal\">B<\/span><span class=\"mclose\">)<\/span><\/span><\/span><\/span><\/span> represents the joint probability of both events A and B occurring, and <span class=\"math math-inline\"><span class=\"katex\"><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"mord mathnormal\">P<\/span><span class=\"mopen\">(<\/span><span class=\"mord mathnormal\">B<\/span><span class=\"mclose\">)<\/span><\/span><\/span><\/span><\/span> is the probability of event B occurring.<\/p><p><strong>Graphical Representation:<\/strong><\/p><p>Bayesian networks are epitomized by directed acyclic graphs (DAGs), where nodes represent variables or events. Directed edges between nodes denote probabilistic dependencies or causal relationships. Each node is associated with a conditional probability distribution, quantifying the likelihood of the node&#8217;s value given the values of its parent nodes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3b2db36 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"3b2db36\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-647569f elementor-widget elementor-widget-image\" data-id=\"647569f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"950\" height=\"608\" src=\"https:\/\/scnode.com\/wp-content\/uploads\/2024\/03\/Immagine5-1024x655.png\" class=\"attachment-large size-large wp-image-2502\" alt=\"Directed acyclic graph\" srcset=\"https:\/\/scnode.com\/wp-content\/uploads\/2024\/03\/Immagine5-1024x655.png 1024w, https:\/\/scnode.com\/wp-content\/uploads\/2024\/03\/Immagine5-300x192.png 300w, https:\/\/scnode.com\/wp-content\/uploads\/2024\/03\/Immagine5-2000x1279.png 2000w, https:\/\/scnode.com\/wp-content\/uploads\/2024\/03\/Immagine5-1536x982.png 1536w, https:\/\/scnode.com\/wp-content\/uploads\/2024\/03\/Immagine5-2048x1310.png 2048w, https:\/\/scnode.com\/wp-content\/uploads\/2024\/03\/Immagine5-24x15.png 24w, https:\/\/scnode.com\/wp-content\/uploads\/2024\/03\/Immagine5-36x23.png 36w, https:\/\/scnode.com\/wp-content\/uploads\/2024\/03\/Immagine5-48x31.png 48w\" sizes=\"100vw\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f72cb59 elementor-widget elementor-widget-text-editor\" data-id=\"f72cb59\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Conditional Probability Tables (CPTs):<\/strong><\/p><p>Conditional probability tables are the scaffolding upon which Bayesian networks are built. They capture the conditional probabilities of each node given its parent nodes&#8217; values. For nodes with parents, the CPT specifies the probability distribution of the node&#8217;s possible states conditioned on the parent nodes&#8217; states.<\/p><p><strong>Bayes&#8217; Theorem:<\/strong><\/p><p>Bayes&#8217; theorem, a fundamental principle underpinning Bayesian networks, facilitates the updating of probabilities based on new evidence. Mathematically, it&#8217;s expressed as:<\/p><p><span class=\"math math-inline\"><span class=\"katex\"><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"mord mathnormal\">P<\/span><span class=\"mopen\">(<\/span><span class=\"mord mathnormal\">A<\/span><span class=\"mord\">\u2223<\/span><span class=\"mord mathnormal\">B<\/span><span class=\"mclose\">)<\/span><span class=\"mrel\">=<\/span><\/span><span class=\"base\"><span class=\"mord\"><span class=\"mfrac\"><span class=\"vlist-t vlist-t2\"><span class=\"vlist-r\"><span class=\"vlist\"><span class=\"sizing reset-size6 size3 mtight\"><span class=\"mord mtight\"><span class=\"mord mathnormal mtight\">P<\/span><span class=\"mopen mtight\">(<\/span><span class=\"mord mathnormal mtight\">B<\/span>\u2223<span class=\"mord mathnormal mtight\">A<\/span><span class=\"mclose mtight\">)<\/span><span class=\"mbin mtight\">\u00d7<\/span><span class=\"mord mathnormal mtight\">P<\/span><span class=\"mopen mtight\">(<\/span><span class=\"mord mathnormal mtight\">A<\/span><span class=\"mclose mtight\">)\/<span class=\"mord mathnormal mtight\">P<\/span><span class=\"mopen mtight\">(<\/span><span class=\"mord mathnormal mtight\">B<\/span>)<\/span><\/span><\/span><\/span><span class=\"vlist-s\">\u200b<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/p><p>Here, <span class=\"math math-inline\"><span class=\"katex\"><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"mord mathnormal\">P<\/span><span class=\"mopen\">(<\/span><span class=\"mord mathnormal\">A<\/span><span class=\"mord\">\u2223<\/span><span class=\"mord mathnormal\">B<\/span><span class=\"mclose\">)<\/span><\/span><\/span><\/span><\/span> is the posterior probability of A given B, <span class=\"math math-inline\"><span class=\"katex\"><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"mord mathnormal\">P<\/span><span class=\"mopen\">(<\/span><span class=\"mord mathnormal\">B<\/span><span class=\"mord\">\u2223<\/span><span class=\"mord mathnormal\">A<\/span><span class=\"mclose\">)<\/span><\/span><\/span><\/span><\/span> is the likelihood of B given A, and <span class=\"math math-inline\"><span class=\"katex\"><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"mord mathnormal\">P<\/span><span class=\"mopen\">(<\/span><span class=\"mord mathnormal\">A<\/span><span class=\"mclose\">)<\/span><\/span><\/span><\/span><\/span> and <span class=\"math math-inline\"><span class=\"katex\"><span class=\"katex-html\" aria-hidden=\"true\"><span class=\"base\"><span class=\"mord mathnormal\">P<\/span><span class=\"mopen\">(<\/span><span class=\"mord mathnormal\">B<\/span><span class=\"mclose\">)<\/span><\/span><\/span><\/span><\/span> are the prior probabilities of A and B, respectively.<\/p><p>The mathematical schema characterizing Bayesian networks embodies the fusion of probability theory, graphical representations, and inferential methodologies. As organizations traverse the landscapes of uncertainty, Bayesian networks stand as formidable allies, guiding them through the complexities of decision-making and illuminating pathways to resilience and innovation. In an era defined by uncertainty, Bayesian networks serve as lighthouses, casting rays of clarity amidst the fog of ambiguity.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-403c690 elementor-widget elementor-widget-heading\" data-id=\"403c690\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Main applications of Bayesian Networks<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cac2159 elementor-widget elementor-widget-text-editor\" data-id=\"cac2159\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Bayesian networks empower diverse applications, from machine learning and artificial intelligence to risk management and diagnostic systems. In this article, we will explore two main usage of such methodology: Supply chain risk management and Predictive maintenance.<\/p><p>In the first case the DAG is used to explore the impact of risks on the whole supply chain and simulate plausible combination of events (i.e. a port closure and lack of containers).<\/p><p>In the second, DAGs support diagnostic maintenance by leveraging probabilistic inference to identify the root causes of failures and prognostic maintenance by predicting future machinery health.<\/p><p>Both the two cases deal with risk management, but at a different level of abstraction.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4ce925 elementor-widget elementor-widget-heading\" data-id=\"f4ce925\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1. ERM for the supply chain <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1fa0215 elementor-widget elementor-widget-text-editor\" data-id=\"1fa0215\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex-1 overflow-hidden\"><div class=\"react-scroll-to-bottom--css-atyyg-79elbk h-full\"><div class=\"react-scroll-to-bottom--css-atyyg-1n7m0yu\"><div><div class=\"flex flex-col text-sm pb-9\"><div class=\"w-full text-token-text-primary\" data-testid=\"conversation-turn-25\"><div class=\"px-4 py-2 justify-center text-base md:gap-6 m-auto\"><div class=\"flex flex-1 text-base mx-auto gap-3 md:px-5 lg:px-1 xl:px-5 md:max-w-3xl lg:max-w-[40rem] xl:max-w-[48rem] group final-completion\"><div class=\"relative flex w-full flex-col agent-turn\"><div class=\"flex-col gap-1 md:gap-3\"><div class=\"flex flex-grow flex-col max-w-full\"><div class=\"min-h-[20px] text-message flex flex-col items-start gap-3 whitespace-pre-wrap break-words [.text-message+&amp;]:mt-5 overflow-x-auto\" data-message-author-role=\"assistant\" data-message-id=\"a3b582cf-532b-4da4-b369-e0504c7e2a63\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p>In supply chain risk management, Bayesian networks offer probabilistic modeling, scenario analysis, and decision support, enabling organizations to navigate uncertainties with confidence. They aid in building anti-fragile supply chains by identifying vulnerabilities, dynamically managing risks, and optimizing resilience strategies.<\/p><p>Risks, in the supply chain, can derive from many different sources, here shortly summarized.<\/p><ol><li><p><strong>Supplier Reliability:<\/strong> In a manufacturing supply chain, a company relies on multiple suppliers to provide raw materials. However, the reliability of each supplier varies, and disruptions in the supply chain can occur if a critical supplier fails to deliver on time. A Bayesian network can be constructed to assess the reliability of each supplier based on historical performance data, lead times, geographical location, and other relevant factors. By incorporating conditional probabilities, the network can calculate the likelihood of a supplier meeting delivery deadlines or encountering disruptions, enabling the company to prioritize suppliers and implement contingency plans accordingly.<\/p><\/li><li><p><strong>Demand Forecasting and Inventory Management:<\/strong> Accurate demand forecasting is essential for optimizing inventory levels and ensuring customer satisfaction. A Bayesian network can be used to model the probabilistic relationships between various factors influencing demand, such as seasonality, marketing campaigns, economic indicators, and competitor activities. By incorporating historical sales data and external variables, the network can generate probabilistic forecasts of future demand. These forecasts can then be used to optimize inventory levels, reduce stockouts, and minimize excess inventory, leading to improved supply chain efficiency and cost savings.<\/p><\/li><li><p><strong>Disruptions:<\/strong> Supply chains are vulnerable to various risks, including natural disasters, geopolitical tensions, transportation delays, and quality issues. A Bayesian network can be employed to assess the likelihood and impact of different risks on supply chain operations. By incorporating historical data, expert knowledge, and external factors, the network can quantify the probabilities of various risk events occurring and their potential consequences. This information can then be used to prioritize risks, develop mitigation strategies, and allocate resources effectively to minimize the impact of disruptions on the supply chain.<\/p><\/li><li><p><strong>Supplier Selection and Contract Negotiation:<\/strong> When selecting suppliers and negotiating contracts, companies must consider various factors such as cost, quality, lead times, and reliability. A Bayesian network can assist in this process by modeling the probabilistic relationships between supplier attributes and performance metrics. By analyzing historical data and expert assessments, the network can calculate the probabilities of different suppliers meeting performance targets and the expected costs associated with each option. This information can help companies make informed decisions about supplier selection, contract terms, and risk allocation, ultimately leading to more robust and resilient supply chains.<\/p><\/li><\/ol><p>These examples illustrate the versatility of Bayesian networks in addressing various challenges and opportunities in supply chain management. By leveraging probabilistic modeling and inference techniques, Bayesian networks enable companies to make data-driven decisions, enhance operational efficiency, and mitigate risks in an uncertain and dynamic environment.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a3185e elementor-widget elementor-widget-heading\" data-id=\"2a3185e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2. Bayesian network for predictive maintenance<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1029de elementor-widget elementor-widget-text-editor\" data-id=\"e1029de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex-1 overflow-hidden\"><div class=\"react-scroll-to-bottom--css-atyyg-79elbk h-full\"><div class=\"react-scroll-to-bottom--css-atyyg-1n7m0yu\"><div class=\"flex flex-col text-sm pb-9\"><div class=\"w-full text-token-text-primary\" data-testid=\"conversation-turn-25\"><div class=\"px-4 py-2 justify-center text-base md:gap-6 m-auto\"><div class=\"flex flex-1 text-base mx-auto gap-3 md:px-5 lg:px-1 xl:px-5 md:max-w-3xl lg:max-w-[40rem] xl:max-w-[48rem] group final-completion\"><div class=\"relative flex w-full flex-col agent-turn\"><div class=\"flex-col gap-1 md:gap-3\"><div class=\"flex flex-grow flex-col max-w-full\"><div class=\"min-h-[20px] text-message flex flex-col items-start gap-3 whitespace-pre-wrap break-words [.text-message+&amp;]:mt-5 overflow-x-auto\" data-message-author-role=\"assistant\" data-message-id=\"a3b582cf-532b-4da4-b369-e0504c7e2a63\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p>Bayesian networks can also be utilized for diagnostic and prognostic purposes in supply chain management. Here&#8217;s how they can be applied in these contexts:<\/p><ol><li><p><strong>Diagnostic Maintenance:<\/strong><\/p><p>In supply chain operations, diagnostic maintenance involves identifying the root causes of failures or disruptions in machinery, equipment, or processes. Bayesian networks can aid in this process by modeling the probabilistic relationships between various factors contributing to failures and guiding diagnostic efforts.<\/p><p><strong>Example:<\/strong> Consider a distribution center where conveyor belts are critical for material handling. A Bayesian network can be constructed to model the relationships between factors such as belt tension, motor temperature, vibration levels, conveyor speed and failures. Once a failure has happened, the maintenance crew can leverage the DAG to easily derive the potential causes that led to the failure and obtain probabilities of involvement of certain components and conditions, without even having inspected the equipment!<\/p><\/li><li><p><strong>Prognostic Maintenance:<\/strong><\/p><p>Prognostic maintenance involves predicting the future health and performance of machinery or equipment based on current conditions and historical data. Bayesian networks can be instrumental in prognostic maintenance by modeling degradation patterns, analyzing trends, and forecasting potential failures.<\/p><p><strong>Example:<\/strong> In a manufacturing facility, CNC machines are critical for production. A Bayesian network can be developed to model the degradation of machine components based on factors such as operating hours, tool wear, temperature fluctuations, and vibration levels. By continuously updating the network with sensor data and historical maintenance records, operators can predict the remaining useful life of critical components, schedule proactive maintenance interventions, and avoid costly unplanned downtime.<\/p><\/li><li><p><strong>Integrated Diagnostic and Prognostic Systems:<\/strong><\/p><p>Bayesian networks can also be integrated into comprehensive diagnostic and prognostic systems that combine real-time monitoring, data analytics, and decision support capabilities. These systems enable proactive maintenance strategies, enhance equipment reliability, and minimize operational disruptions in the supply chain.<\/p><p><strong>Example:<\/strong> In a logistics company managing a fleet of delivery vehicles, an integrated diagnostic and prognostic system utilizes Bayesian networks to monitor vehicle health indicators such as engine performance, fuel consumption, and tire pressure. By continuously analyzing sensor data and historical maintenance records, the system predicts potential failures, diagnoses underlying issues, and recommends maintenance actions to fleet managers. This proactive approach reduces vehicle downtime, improves fleet reliability, and ensures on-time deliveries, ultimately enhancing customer satisfaction and operational efficiency.<\/p><\/li><\/ol><\/div><\/div><\/div><div class=\"mt-1 flex justify-start gap-3 empty:hidden\"><div class=\"flex-1 overflow-hidden\"><div class=\"react-scroll-to-bottom--css-atyyg-79elbk h-full\"><div class=\"react-scroll-to-bottom--css-atyyg-1n7m0yu\"><div><div class=\"flex flex-col text-sm pb-9\"><div class=\"w-full text-token-text-primary\" data-testid=\"conversation-turn-27\"><div class=\"px-4 py-2 justify-center text-base md:gap-6 m-auto\"><div class=\"flex flex-1 text-base mx-auto gap-3 md:px-5 lg:px-1 xl:px-5 md:max-w-3xl lg:max-w-[40rem] xl:max-w-[48rem] group final-completion\"><div class=\"relative flex w-full flex-col agent-turn\"><div class=\"flex-col gap-1 md:gap-3\"><div class=\"flex flex-grow flex-col max-w-full\"><div class=\"min-h-[20px] text-message flex flex-col items-start gap-3 whitespace-pre-wrap break-words [.text-message+&amp;]:mt-5 overflow-x-auto\" data-message-author-role=\"assistant\" data-message-id=\"76d4413a-5c8a-46e5-a2f3-606e55b9b393\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p>\u00a0<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f33f1c5 elementor-widget elementor-widget-image\" data-id=\"f33f1c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"950\" height=\"507\" src=\"https:\/\/scnode.com\/wp-content\/uploads\/2024\/03\/ERM-1024x547.jpg\" class=\"attachment-large size-large wp-image-2507\" alt=\"Enterprise risk management\" srcset=\"https:\/\/scnode.com\/wp-content\/uploads\/2024\/03\/ERM-1024x547.jpg 1024w, https:\/\/scnode.com\/wp-content\/uploads\/2024\/03\/ERM-300x160.jpg 300w, https:\/\/scnode.com\/wp-content\/uploads\/2024\/03\/ERM-24x13.jpg 24w, https:\/\/scnode.com\/wp-content\/uploads\/2024\/03\/ERM-36x19.jpg 36w, https:\/\/scnode.com\/wp-content\/uploads\/2024\/03\/ERM-48x26.jpg 48w, https:\/\/scnode.com\/wp-content\/uploads\/2024\/03\/ERM.jpg 1267w\" sizes=\"100vw\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6f07cb elementor-widget elementor-widget-heading\" data-id=\"d6f07cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2.1 Integrating Bayesian networks with enterprise tools<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-664e228 elementor-widget elementor-widget-text-editor\" data-id=\"664e228\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Integrating a Bayesian network with a Computerized Maintenance Management System (CMMS) and Programmable Logic Controllers (PLCs) can yield significant benefits in terms of predictive maintenance, root cause analysis, and continuous improvement. Here&#8217;s how such integration can operate and the pros associated with it:<\/p><ol><li><p><strong>Predictive Maintenance with Bayesian Networks:<\/strong><\/p><p>Bayesian networks can be integrated with CMMS and PLCs to predict equipment failures and maintenance needs based on real-time data and historical maintenance records. By analyzing sensor data, historical performance data, and maintenance logs, Bayesian networks can identify patterns and trends indicative of impending failures. This allows maintenance teams to proactively schedule preventive maintenance activities before equipment breakdowns occur, reducing unplanned downtime and maintenance costs.<\/p><\/li><li><p><strong>Pros of Integration:<\/strong><\/p><p>a. <strong>Early Detection of Failures:<\/strong> Bayesian networks can detect potential failures before they occur by analyzing sensor data and identifying early warning signs. This allows maintenance teams to address issues proactively, minimizing downtime and disruption to operations.<\/p><p>b. <strong>Root Cause Analysis:<\/strong> When a failure occurs, the integrated system can initiate a work order in the CMMS to conduct a deep analysis of root causes. Bayesian networks can assist in this analysis by identifying potential causes based on historical data and sensor readings. This enables maintenance teams to address underlying issues and prevent future failures.<\/p><p>c. <strong>Continuous Improvement through Operator Feedback:<\/strong> Operators play a crucial role in providing feedback to the Bayesian network about the real causes of failures. By incorporating operator input into the network, it can be continuously retrained and refined to improve its accuracy and effectiveness over time. This iterative process of learning and adaptation ensures that the network remains up-to-date and capable of accurately predicting and diagnosing equipment failures.<\/p><\/li><li><p><strong>Example Scenario:<\/strong><\/p><p>Let&#8217;s consider a manufacturing plant that integrates a Bayesian network with its CMMS and PLCs:<\/p><ul><li>The Bayesian network continuously monitors sensor data from PLCs installed on critical equipment, such as motors, pumps, and conveyors.<\/li><li>When deviations from normal operating conditions are detected, the Bayesian network analyzes historical data and predicts potential failure modes.<\/li><li>If a failure is predicted, the Bayesian network triggers a work order in the CMMS to investigate the issue further.<\/li><li>Maintenance technicians use the CMMS to conduct root cause analysis, documenting their findings and actions taken.<\/li><li>Operators provide feedback to the Bayesian network about the actual cause of the failure, which is used to update and refine the network.<\/li><li>Over time, the Bayesian network becomes more accurate in predicting failures and identifying root causes, leading to improved equipment reliability and reduced maintenance costs.<\/li><\/ul><\/li><\/ol><p>In conclusion, integrating a Bayesian network with CMMS and PLCs offers numerous advantages in predictive maintenance, root cause analysis, and continuous improvement. By leveraging real-time data, historical records, and operator feedback, the integrated system enhances equipment reliability, minimizes downtime, and drives operational excellence in the supply chain.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-899e870 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-parent\" data-id=\"899e870\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5227a6b elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5227a6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-be3a00e e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-parent\" data-id=\"be3a00e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-0fcc7d7 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"0fcc7d7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4d4aeff e-con-full e-transform e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"4d4aeff\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_transform_scale_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0.9,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1e40998 elementor-widget elementor-widget-heading\" data-id=\"1e40998\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">01<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f01a9b6 elementor-widget elementor-widget-heading\" data-id=\"f01a9b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Simulation modelling for disruption analysis and mitigation action testing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2fa74f8 elementor-widget elementor-widget-text-editor\" data-id=\"2fa74f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Learn how simulation modelling can support deeper understanding of disruptions and enable your business to test mitigation actions in a risk-free environment<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e5ecda elementor-align-center elementor-widget elementor-widget-button\" data-id=\"0e5ecda\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-size-xs\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Coming soon!<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0fe6b05 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"0fe6b05\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-9ad5b73 e-con-full e-transform e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"9ad5b73\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_transform_scale_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0.9,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f8b326d elementor-widget elementor-widget-heading\" data-id=\"f8b326d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">02<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e7735d0 elementor-widget elementor-widget-heading\" data-id=\"e7735d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Monitoring risks via probabilistic modelling and  bayesian networks<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0868b7 elementor-widget elementor-widget-text-editor\" data-id=\"a0868b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Discover how to continuously monitor the risk profile thanks to an Enterprise Risk Management tool based on Bayesian Networks, Direct Acyclic Graphs and conditional probabilities<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2eb0fc elementor-align-center elementor-widget elementor-widget-button\" data-id=\"a2eb0fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/scnode.com\/index.php\/enterprise-risk-management-for-resilient-supply-chain\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Deep dive<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ffa98bf e-con-full e-transform e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"ffa98bf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_transform_scale_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0.9,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\">\n\t\t<div class=\"elementor-element elementor-element-4aa4842 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"4aa4842\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-37e9350 elementor-widget elementor-widget-heading\" data-id=\"37e9350\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">03<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a80b47a elementor-widget elementor-widget-heading\" data-id=\"a80b47a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Monte carlo method to discover all about risks based on their severity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e35ce0f elementor-widget elementor-widget-text-editor\" data-id=\"e35ce0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Estimate the potential effect of the power of chaos and randomicity on your supply chain. Empower any static risk analysis with steroids thanks to Monte carlo method<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb353b4 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"eb353b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/scnode.com\/index.php\/monte-carlo-method-for-anti-fragile-supply-chain\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Deep dive<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5c9ebb7 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-parent\" data-id=\"5c9ebb7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c8402e3 elementor-widget elementor-widget-spacer\" data-id=\"c8402e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a1f832 elementor-widget elementor-widget-html\" data-id=\"8a1f832\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/flic.kr\/p\/85ECJ\">Photo<\/a> by <a href=\"https:\/\/www.flickr.com\/photos\/johnwardell\/80125882\">John Wardell<\/a> on <a href=\"https:\/\/www.flickr.com\">flickr<\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>enterprise risk management for resilient supply chain Mitigating risks via Enterprise Risk Management tools Risk management in the supply chain is undoubtfully a very complex topic, requiring a structured approach to effectively navigate the myriad uncertainties and potential disruptions. Without a systematic framework in place, identifying, assessing, and mitigating risks can be daunting tasks fraught with ambiguity. However, leveraging and embracing advanced methodologies and tools based on probabilistic modeling offers a structured means of quantifying and monitoring risks. By integrating probabilistic techniques with data-driven insights, organizations can gain a deeper understanding of the probabilistic dependencies and interrelationships within the supply chain ecosystem. This enables them to proactively identify vulnerabilities, assess the likelihood and impact of various risk events, and implement targeted mitigation strategies to enhance resilience and mitigate the potential impact of disruptions on supply chain operations. \u00a0 Bayesian Networks for effective risk monitoring In the labyrinth of decision-making, where uncertainties lurk at every corner, Enterprise Risk Management tools, mainly based on Bayesian Networks, emerge as guiding beacons, illuminating pathways through the darkness of ambiguity. At their core lies a mathematical schema that intertwines probability theory with graphical representations, enabling the modeling, inference, and understanding of complex systems.\u00a0 Conditional Probability: Central to Bayesian networks is conditional probability, a cornerstone of probability theory. It quantifies the likelihood of an event occurring given the occurrence of another event. Mathematically, it&#8217;s expressed as: P(A\u2223B)= P(A\u2229B)\/P(B) Here, P(A\u2223B) denotes the probability of event A occurring given that event B has occurred, P(A\u2229B) represents the joint probability of both events A and B occurring, and P(B) is the probability of event B occurring. Graphical Representation: Bayesian networks are epitomized by directed acyclic graphs (DAGs), where nodes represent variables or events. Directed edges between nodes denote probabilistic dependencies or causal relationships. Each node is associated with a conditional probability distribution, quantifying the likelihood of the node&#8217;s value given the values of its parent nodes. Conditional Probability Tables (CPTs): Conditional probability tables are the scaffolding upon which Bayesian networks are built. They capture the conditional probabilities of each node given its parent nodes&#8217; values. For nodes with parents, the CPT specifies the probability distribution of the node&#8217;s possible states conditioned on the parent nodes&#8217; states. Bayes&#8217; Theorem: Bayes&#8217; theorem, a fundamental principle underpinning Bayesian networks, facilitates the updating of probabilities based on new evidence. Mathematically, it&#8217;s expressed as: P(A\u2223B)=P(B\u2223A)\u00d7P(A)\/P(B)\u200b Here, P(A\u2223B) is the posterior probability of A given B, P(B\u2223A) is the likelihood of B given A, and P(A) and P(B) are the prior probabilities of A and B, respectively. The mathematical schema characterizing Bayesian networks embodies the fusion of probability theory, graphical representations, and inferential methodologies. As organizations traverse the landscapes of uncertainty, Bayesian networks stand as formidable allies, guiding them through the complexities of decision-making and illuminating pathways to resilience and innovation. In an era defined by uncertainty, Bayesian networks serve as lighthouses, casting rays of clarity amidst the fog of ambiguity. Main applications of Bayesian Networks Bayesian networks empower diverse applications, from machine learning and artificial intelligence to risk management and diagnostic systems. In this article, we will explore two main usage of such methodology: Supply chain risk management and Predictive maintenance. In the first case the DAG is used to explore the impact of risks on the whole supply chain and simulate plausible combination of events (i.e. a port closure and lack of containers). In the second, DAGs support diagnostic maintenance by leveraging probabilistic inference to identify the root causes of failures and prognostic maintenance by predicting future machinery health. Both the two cases deal with risk management, but at a different level of abstraction. 1. ERM for the supply chain In supply chain risk management, Bayesian networks offer probabilistic modeling, scenario analysis, and decision support, enabling organizations to navigate uncertainties with confidence. They aid in building anti-fragile supply chains by identifying vulnerabilities, dynamically managing risks, and optimizing resilience strategies. Risks, in the supply chain, can derive from many different sources, here shortly summarized. Supplier Reliability: In a manufacturing supply chain, a company relies on multiple suppliers to provide raw materials. However, the reliability of each supplier varies, and disruptions in the supply chain can occur if a critical supplier fails to deliver on time. A Bayesian network can be constructed to assess the reliability of each supplier based on historical performance data, lead times, geographical location, and other relevant factors. By incorporating conditional probabilities, the network can calculate the likelihood of a supplier meeting delivery deadlines or encountering disruptions, enabling the company to prioritize suppliers and implement contingency plans accordingly. Demand Forecasting and Inventory Management: Accurate demand forecasting is essential for optimizing inventory levels and ensuring customer satisfaction. A Bayesian network can be used to model the probabilistic relationships between various factors influencing demand, such as seasonality, marketing campaigns, economic indicators, and competitor activities. By incorporating historical sales data and external variables, the network can generate probabilistic forecasts of future demand. These forecasts can then be used to optimize inventory levels, reduce stockouts, and minimize excess inventory, leading to improved supply chain efficiency and cost savings. Disruptions: Supply chains are vulnerable to various risks, including natural disasters, geopolitical tensions, transportation delays, and quality issues. A Bayesian network can be employed to assess the likelihood and impact of different risks on supply chain operations. By incorporating historical data, expert knowledge, and external factors, the network can quantify the probabilities of various risk events occurring and their potential consequences. This information can then be used to prioritize risks, develop mitigation strategies, and allocate resources effectively to minimize the impact of disruptions on the supply chain. Supplier Selection and Contract Negotiation: When selecting suppliers and negotiating contracts, companies must consider various factors such as cost, quality, lead times, and reliability. A Bayesian network can assist in this process by modeling the probabilistic relationships between supplier attributes and performance metrics. By analyzing historical data and expert assessments, the network can calculate the probabilities of different suppliers meeting performance targets and the expected costs associated with &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/scnode.com\/index.php\/enterprise-risk-management-for-resilient-supply-chain\/\" class=\"more-link\">Leggi tutto<span class=\"screen-reader-text\"> &#8220;Enterprise Risk Management for resilient supply chain&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"om_disable_all_campaigns":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"ppma_author":[18],"class_list":["post-2497","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Enterprise Risk Management for resilient supply chain - SCNODE.COM<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/scnode.com\/index.php\/enterprise-risk-management-for-resilient-supply-chain\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enterprise Risk Management for resilient supply chain - SCNODE.COM\" \/>\n<meta property=\"og:description\" content=\"enterprise risk management for resilient supply chain Mitigating risks via Enterprise Risk Management tools Risk management in the supply chain is undoubtfully a very complex topic, requiring a structured approach to effectively navigate the myriad uncertainties and potential disruptions. Without a systematic framework in place, identifying, assessing, and mitigating risks can be daunting tasks fraught with ambiguity. However, leveraging and embracing advanced methodologies and tools based on probabilistic modeling offers a structured means of quantifying and monitoring risks. By integrating probabilistic techniques with data-driven insights, organizations can gain a deeper understanding of the probabilistic dependencies and interrelationships within the supply chain ecosystem. This enables them to proactively identify vulnerabilities, assess the likelihood and impact of various risk events, and implement targeted mitigation strategies to enhance resilience and mitigate the potential impact of disruptions on supply chain operations. \u00a0 Bayesian Networks for effective risk monitoring In the labyrinth of decision-making, where uncertainties lurk at every corner, Enterprise Risk Management tools, mainly based on Bayesian Networks, emerge as guiding beacons, illuminating pathways through the darkness of ambiguity. At their core lies a mathematical schema that intertwines probability theory with graphical representations, enabling the modeling, inference, and understanding of complex systems.\u00a0 Conditional Probability: Central to Bayesian networks is conditional probability, a cornerstone of probability theory. It quantifies the likelihood of an event occurring given the occurrence of another event. Mathematically, it&#8217;s expressed as: P(A\u2223B)= P(A\u2229B)\/P(B) Here, P(A\u2223B) denotes the probability of event A occurring given that event B has occurred, P(A\u2229B) represents the joint probability of both events A and B occurring, and P(B) is the probability of event B occurring. Graphical Representation: Bayesian networks are epitomized by directed acyclic graphs (DAGs), where nodes represent variables or events. Directed edges between nodes denote probabilistic dependencies or causal relationships. Each node is associated with a conditional probability distribution, quantifying the likelihood of the node&#8217;s value given the values of its parent nodes. Conditional Probability Tables (CPTs): Conditional probability tables are the scaffolding upon which Bayesian networks are built. They capture the conditional probabilities of each node given its parent nodes&#8217; values. For nodes with parents, the CPT specifies the probability distribution of the node&#8217;s possible states conditioned on the parent nodes&#8217; states. Bayes&#8217; Theorem: Bayes&#8217; theorem, a fundamental principle underpinning Bayesian networks, facilitates the updating of probabilities based on new evidence. Mathematically, it&#8217;s expressed as: P(A\u2223B)=P(B\u2223A)\u00d7P(A)\/P(B)\u200b Here, P(A\u2223B) is the posterior probability of A given B, P(B\u2223A) is the likelihood of B given A, and P(A) and P(B) are the prior probabilities of A and B, respectively. The mathematical schema characterizing Bayesian networks embodies the fusion of probability theory, graphical representations, and inferential methodologies. As organizations traverse the landscapes of uncertainty, Bayesian networks stand as formidable allies, guiding them through the complexities of decision-making and illuminating pathways to resilience and innovation. In an era defined by uncertainty, Bayesian networks serve as lighthouses, casting rays of clarity amidst the fog of ambiguity. Main applications of Bayesian Networks Bayesian networks empower diverse applications, from machine learning and artificial intelligence to risk management and diagnostic systems. In this article, we will explore two main usage of such methodology: Supply chain risk management and Predictive maintenance. In the first case the DAG is used to explore the impact of risks on the whole supply chain and simulate plausible combination of events (i.e. a port closure and lack of containers). In the second, DAGs support diagnostic maintenance by leveraging probabilistic inference to identify the root causes of failures and prognostic maintenance by predicting future machinery health. Both the two cases deal with risk management, but at a different level of abstraction. 1. ERM for the supply chain In supply chain risk management, Bayesian networks offer probabilistic modeling, scenario analysis, and decision support, enabling organizations to navigate uncertainties with confidence. They aid in building anti-fragile supply chains by identifying vulnerabilities, dynamically managing risks, and optimizing resilience strategies. Risks, in the supply chain, can derive from many different sources, here shortly summarized. Supplier Reliability: In a manufacturing supply chain, a company relies on multiple suppliers to provide raw materials. However, the reliability of each supplier varies, and disruptions in the supply chain can occur if a critical supplier fails to deliver on time. A Bayesian network can be constructed to assess the reliability of each supplier based on historical performance data, lead times, geographical location, and other relevant factors. By incorporating conditional probabilities, the network can calculate the likelihood of a supplier meeting delivery deadlines or encountering disruptions, enabling the company to prioritize suppliers and implement contingency plans accordingly. Demand Forecasting and Inventory Management: Accurate demand forecasting is essential for optimizing inventory levels and ensuring customer satisfaction. A Bayesian network can be used to model the probabilistic relationships between various factors influencing demand, such as seasonality, marketing campaigns, economic indicators, and competitor activities. By incorporating historical sales data and external variables, the network can generate probabilistic forecasts of future demand. These forecasts can then be used to optimize inventory levels, reduce stockouts, and minimize excess inventory, leading to improved supply chain efficiency and cost savings. Disruptions: Supply chains are vulnerable to various risks, including natural disasters, geopolitical tensions, transportation delays, and quality issues. A Bayesian network can be employed to assess the likelihood and impact of different risks on supply chain operations. By incorporating historical data, expert knowledge, and external factors, the network can quantify the probabilities of various risk events occurring and their potential consequences. This information can then be used to prioritize risks, develop mitigation strategies, and allocate resources effectively to minimize the impact of disruptions on the supply chain. Supplier Selection and Contract Negotiation: When selecting suppliers and negotiating contracts, companies must consider various factors such as cost, quality, lead times, and reliability. A Bayesian network can assist in this process by modeling the probabilistic relationships between supplier attributes and performance metrics. By analyzing historical data and expert assessments, the network can calculate the probabilities of different suppliers meeting performance targets and the expected costs associated with &hellip; Leggi tutto &quot;Enterprise Risk Management for resilient supply chain&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/scnode.com\/index.php\/enterprise-risk-management-for-resilient-supply-chain\/\" \/>\n<meta property=\"og:site_name\" content=\"SCNODE.COM\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-29T11:07:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/scnode.com\/wp-content\/uploads\/2024\/03\/Immagine5.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2250\" \/>\n\t<meta property=\"og:image:height\" content=\"1439\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"12 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/scnode.com\/index.php\/enterprise-risk-management-for-resilient-supply-chain\/\",\"url\":\"https:\/\/scnode.com\/index.php\/enterprise-risk-management-for-resilient-supply-chain\/\",\"name\":\"Enterprise Risk Management for resilient supply chain - SCNODE.COM\",\"isPartOf\":{\"@id\":\"https:\/\/scnode.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/scnode.com\/index.php\/enterprise-risk-management-for-resilient-supply-chain\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/scnode.com\/index.php\/enterprise-risk-management-for-resilient-supply-chain\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/scnode.com\/wp-content\/uploads\/2024\/03\/Immagine5-1024x655.png\",\"datePublished\":\"2024-03-30T17:46:47+00:00\",\"dateModified\":\"2024-11-29T11:07:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/scnode.com\/index.php\/enterprise-risk-management-for-resilient-supply-chain\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/scnode.com\/index.php\/enterprise-risk-management-for-resilient-supply-chain\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/scnode.com\/index.php\/enterprise-risk-management-for-resilient-supply-chain\/#primaryimage\",\"url\":\"https:\/\/scnode.com\/wp-content\/uploads\/2024\/03\/Immagine5.png\",\"contentUrl\":\"https:\/\/scnode.com\/wp-content\/uploads\/2024\/03\/Immagine5.png\",\"width\":2250,\"height\":1439,\"caption\":\"Directed acyclic graph\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/scnode.com\/index.php\/enterprise-risk-management-for-resilient-supply-chain\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/scnode.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Enterprise Risk Management for resilient supply chain\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/scnode.com\/#website\",\"url\":\"https:\/\/scnode.com\/\",\"name\":\"SCNODE.COM\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/scnode.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/scnode.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/scnode.com\/#organization\",\"name\":\"SCNODE.COM\",\"url\":\"https:\/\/scnode.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/scnode.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/scnode.com\/wp-content\/uploads\/2024\/09\/SCNODE-logo.png\",\"contentUrl\":\"https:\/\/scnode.com\/wp-content\/uploads\/2024\/09\/SCNODE-logo.png\",\"width\":1570,\"height\":1571,\"caption\":\"SCNODE.COM\"},\"image\":{\"@id\":\"https:\/\/scnode.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/scnode\/?viewAsMember=true\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Enterprise Risk Management for resilient supply chain - SCNODE.COM","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/scnode.com\/index.php\/enterprise-risk-management-for-resilient-supply-chain\/","og_locale":"it_IT","og_type":"article","og_title":"Enterprise Risk Management for resilient supply chain - SCNODE.COM","og_description":"enterprise risk management for resilient supply chain Mitigating risks via Enterprise Risk Management tools Risk management in the supply chain is undoubtfully a very complex topic, requiring a structured approach to effectively navigate the myriad uncertainties and potential disruptions. Without a systematic framework in place, identifying, assessing, and mitigating risks can be daunting tasks fraught with ambiguity. However, leveraging and embracing advanced methodologies and tools based on probabilistic modeling offers a structured means of quantifying and monitoring risks. By integrating probabilistic techniques with data-driven insights, organizations can gain a deeper understanding of the probabilistic dependencies and interrelationships within the supply chain ecosystem. This enables them to proactively identify vulnerabilities, assess the likelihood and impact of various risk events, and implement targeted mitigation strategies to enhance resilience and mitigate the potential impact of disruptions on supply chain operations. \u00a0 Bayesian Networks for effective risk monitoring In the labyrinth of decision-making, where uncertainties lurk at every corner, Enterprise Risk Management tools, mainly based on Bayesian Networks, emerge as guiding beacons, illuminating pathways through the darkness of ambiguity. At their core lies a mathematical schema that intertwines probability theory with graphical representations, enabling the modeling, inference, and understanding of complex systems.\u00a0 Conditional Probability: Central to Bayesian networks is conditional probability, a cornerstone of probability theory. It quantifies the likelihood of an event occurring given the occurrence of another event. Mathematically, it&#8217;s expressed as: P(A\u2223B)= P(A\u2229B)\/P(B) Here, P(A\u2223B) denotes the probability of event A occurring given that event B has occurred, P(A\u2229B) represents the joint probability of both events A and B occurring, and P(B) is the probability of event B occurring. Graphical Representation: Bayesian networks are epitomized by directed acyclic graphs (DAGs), where nodes represent variables or events. Directed edges between nodes denote probabilistic dependencies or causal relationships. Each node is associated with a conditional probability distribution, quantifying the likelihood of the node&#8217;s value given the values of its parent nodes. Conditional Probability Tables (CPTs): Conditional probability tables are the scaffolding upon which Bayesian networks are built. They capture the conditional probabilities of each node given its parent nodes&#8217; values. For nodes with parents, the CPT specifies the probability distribution of the node&#8217;s possible states conditioned on the parent nodes&#8217; states. Bayes&#8217; Theorem: Bayes&#8217; theorem, a fundamental principle underpinning Bayesian networks, facilitates the updating of probabilities based on new evidence. Mathematically, it&#8217;s expressed as: P(A\u2223B)=P(B\u2223A)\u00d7P(A)\/P(B)\u200b Here, P(A\u2223B) is the posterior probability of A given B, P(B\u2223A) is the likelihood of B given A, and P(A) and P(B) are the prior probabilities of A and B, respectively. The mathematical schema characterizing Bayesian networks embodies the fusion of probability theory, graphical representations, and inferential methodologies. As organizations traverse the landscapes of uncertainty, Bayesian networks stand as formidable allies, guiding them through the complexities of decision-making and illuminating pathways to resilience and innovation. In an era defined by uncertainty, Bayesian networks serve as lighthouses, casting rays of clarity amidst the fog of ambiguity. Main applications of Bayesian Networks Bayesian networks empower diverse applications, from machine learning and artificial intelligence to risk management and diagnostic systems. In this article, we will explore two main usage of such methodology: Supply chain risk management and Predictive maintenance. In the first case the DAG is used to explore the impact of risks on the whole supply chain and simulate plausible combination of events (i.e. a port closure and lack of containers). In the second, DAGs support diagnostic maintenance by leveraging probabilistic inference to identify the root causes of failures and prognostic maintenance by predicting future machinery health. Both the two cases deal with risk management, but at a different level of abstraction. 1. ERM for the supply chain In supply chain risk management, Bayesian networks offer probabilistic modeling, scenario analysis, and decision support, enabling organizations to navigate uncertainties with confidence. They aid in building anti-fragile supply chains by identifying vulnerabilities, dynamically managing risks, and optimizing resilience strategies. Risks, in the supply chain, can derive from many different sources, here shortly summarized. Supplier Reliability: In a manufacturing supply chain, a company relies on multiple suppliers to provide raw materials. However, the reliability of each supplier varies, and disruptions in the supply chain can occur if a critical supplier fails to deliver on time. A Bayesian network can be constructed to assess the reliability of each supplier based on historical performance data, lead times, geographical location, and other relevant factors. By incorporating conditional probabilities, the network can calculate the likelihood of a supplier meeting delivery deadlines or encountering disruptions, enabling the company to prioritize suppliers and implement contingency plans accordingly. Demand Forecasting and Inventory Management: Accurate demand forecasting is essential for optimizing inventory levels and ensuring customer satisfaction. A Bayesian network can be used to model the probabilistic relationships between various factors influencing demand, such as seasonality, marketing campaigns, economic indicators, and competitor activities. By incorporating historical sales data and external variables, the network can generate probabilistic forecasts of future demand. These forecasts can then be used to optimize inventory levels, reduce stockouts, and minimize excess inventory, leading to improved supply chain efficiency and cost savings. Disruptions: Supply chains are vulnerable to various risks, including natural disasters, geopolitical tensions, transportation delays, and quality issues. A Bayesian network can be employed to assess the likelihood and impact of different risks on supply chain operations. By incorporating historical data, expert knowledge, and external factors, the network can quantify the probabilities of various risk events occurring and their potential consequences. This information can then be used to prioritize risks, develop mitigation strategies, and allocate resources effectively to minimize the impact of disruptions on the supply chain. Supplier Selection and Contract Negotiation: When selecting suppliers and negotiating contracts, companies must consider various factors such as cost, quality, lead times, and reliability. A Bayesian network can assist in this process by modeling the probabilistic relationships between supplier attributes and performance metrics. By analyzing historical data and expert assessments, the network can calculate the probabilities of different suppliers meeting performance targets and the expected costs associated with &hellip; Leggi tutto \"Enterprise Risk Management for resilient supply chain\"","og_url":"https:\/\/scnode.com\/index.php\/enterprise-risk-management-for-resilient-supply-chain\/","og_site_name":"SCNODE.COM","article_modified_time":"2024-11-29T11:07:27+00:00","og_image":[{"width":2250,"height":1439,"url":"https:\/\/scnode.com\/wp-content\/uploads\/2024\/03\/Immagine5.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Tempo di lettura stimato":"12 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/scnode.com\/index.php\/enterprise-risk-management-for-resilient-supply-chain\/","url":"https:\/\/scnode.com\/index.php\/enterprise-risk-management-for-resilient-supply-chain\/","name":"Enterprise Risk Management for resilient supply chain - SCNODE.COM","isPartOf":{"@id":"https:\/\/scnode.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/scnode.com\/index.php\/enterprise-risk-management-for-resilient-supply-chain\/#primaryimage"},"image":{"@id":"https:\/\/scnode.com\/index.php\/enterprise-risk-management-for-resilient-supply-chain\/#primaryimage"},"thumbnailUrl":"https:\/\/scnode.com\/wp-content\/uploads\/2024\/03\/Immagine5-1024x655.png","datePublished":"2024-03-30T17:46:47+00:00","dateModified":"2024-11-29T11:07:27+00:00","breadcrumb":{"@id":"https:\/\/scnode.com\/index.php\/enterprise-risk-management-for-resilient-supply-chain\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/scnode.com\/index.php\/enterprise-risk-management-for-resilient-supply-chain\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/scnode.com\/index.php\/enterprise-risk-management-for-resilient-supply-chain\/#primaryimage","url":"https:\/\/scnode.com\/wp-content\/uploads\/2024\/03\/Immagine5.png","contentUrl":"https:\/\/scnode.com\/wp-content\/uploads\/2024\/03\/Immagine5.png","width":2250,"height":1439,"caption":"Directed acyclic graph"},{"@type":"BreadcrumbList","@id":"https:\/\/scnode.com\/index.php\/enterprise-risk-management-for-resilient-supply-chain\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/scnode.com\/"},{"@type":"ListItem","position":2,"name":"Enterprise Risk Management for resilient supply chain"}]},{"@type":"WebSite","@id":"https:\/\/scnode.com\/#website","url":"https:\/\/scnode.com\/","name":"SCNODE.COM","description":"","publisher":{"@id":"https:\/\/scnode.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/scnode.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/scnode.com\/#organization","name":"SCNODE.COM","url":"https:\/\/scnode.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/scnode.com\/#\/schema\/logo\/image\/","url":"https:\/\/scnode.com\/wp-content\/uploads\/2024\/09\/SCNODE-logo.png","contentUrl":"https:\/\/scnode.com\/wp-content\/uploads\/2024\/09\/SCNODE-logo.png","width":1570,"height":1571,"caption":"SCNODE.COM"},"image":{"@id":"https:\/\/scnode.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/scnode\/?viewAsMember=true"]}]}},"coauthors":[{"link":"https:\/\/scnode.com\/index.php\/author\/scnode-com\/","display_name":"scnode.com"}],"author_meta":{"author_link":"https:\/\/scnode.com\/index.php\/author\/scnode-com\/","display_name":"scnode.com"},"relative_dates":{"created":"Pubblicato 2 anni fa","modified":"Aggiornato 1 anno fa"},"absolute_dates":{"created":"Pubblicato il 30 Marzo 2024","modified":"Aggiornato il 29 Novembre 2024"},"absolute_dates_time":{"created":"Pubblicato il 30 Marzo 2024 18:46","modified":"Aggiornato il 29 Novembre 2024 12:07"},"featured_img_caption":"","featured_img":false,"series_order":"","_links":{"self":[{"href":"https:\/\/scnode.com\/index.php\/wp-json\/wp\/v2\/pages\/2497","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scnode.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/scnode.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/scnode.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/scnode.com\/index.php\/wp-json\/wp\/v2\/comments?post=2497"}],"version-history":[{"count":34,"href":"https:\/\/scnode.com\/index.php\/wp-json\/wp\/v2\/pages\/2497\/revisions"}],"predecessor-version":[{"id":3334,"href":"https:\/\/scnode.com\/index.php\/wp-json\/wp\/v2\/pages\/2497\/revisions\/3334"}],"wp:attachment":[{"href":"https:\/\/scnode.com\/index.php\/wp-json\/wp\/v2\/media?parent=2497"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/scnode.com\/index.php\/wp-json\/wp\/v2\/ppma_author?post=2497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}