Skip to main content
Log in

Supplier risk assessment based on trapezoidal intuitionistic fuzzy numbers and ELECTRE TRI-C: a case illustration involving service suppliers

  • General Paper
  • Published:
Journal of the Operational Research Society

Abstract

Many companies today have embraced the concept of risk management, usually in the form of enterprise risk management or supply chain risk management. Both are based on a holistic view of risks. Hence, risks related to specific functions within a company must be considered more broadly than previously. Risks, however, involve uncertainty, and the less specific the context in which risks are viewed, the more uncertainty will be involved. One particular way to express uncertainty is through trapezoidal intuitionistic fuzzy numbers (TrIFNs). In this paper, risks that are relevant for supplier risk assessments are first collected from the literature. Then it is illustrated how the multi-criteria decision analysis method ELECTRE TRI-C can be used for sorting suppliers into risk categories, when the risks as well as some of the method’s parameters are expressed with TrIFNs. In order to do this, we make use of a small modification of an existing method for converting TrIFNs into crisp values. The approach is illustrated in a case problem based on a company that is looking for service providers (suppliers) of electrical maintenance. The problem involves 20 suppliers that are sorted into three risk categories based on evaluations from 27 criteria. Results from the case study point to two low risk suppliers. A further ad-hoc analysis suggests one of these to be less risky than the other.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. The extended version of the review paper is published in European Journal of Operations Research (Govindan and Jepsen, 2015)

  2. Committee of Sponsoring Organizations of the Treadway Commission.

  3. Open Compliance and Ethics Group.

  4. Federation of European Risk Management Associations.

  5. Sometimes the axes are referred to as profit impact and supply risk (Gelderman and Van Weele, 2005).

  6. Ravindran et al (2009) note that ‘value-at-risk (VaR) type risks are used to model less frequent events which disrupt operations at suppliers and can bring severe impacts to buyers (eg labour strike, terrorist attack, natural disaster, etc)’ and miss-the-target risks ‘are used to model events that might happen more frequently at suppliers with lesser damage to buyers (eg, late delivery, missing quality requirements, etc)’.

  7. Note that in Appendix A, Section A.6, the performance of a characteristic action is denoted as g j (b h ). To use the definition in this section, a performance should be considered as D(T hj ).

  8. Note that we let D(T 0j B)=100.

  9. Note that, when comparing two alternatives a, a′∈A in ELECTRE IS, III, and IV, the notation changes, such that for example the indifference threshold function becomes q j (a, a′)=α qj ·g j (a)+β qj (direct thresholds) or (inverse thresholds). In ELECTRE TRI, TRI-C, and TRI-nC, the indifference thresholds will be , where b is a reference norm (profile or characteristic action). Similar changes apply to the preference threshold.

References

  • Adhitya A, Srinivasan R and Karimi IA (2009). Supply chain risk identification using a HAZOP-based approach. AIChE Journal 55 (6): 1447–1463.

    Article  Google Scholar 

  • Araz C and Ozkarahan I (2007). Supplier evaluation and management system for strategic sourcing based on a new multicriteria sorting procedure. International Journal of Production Economics 106 (2): 585–606.

    Article  Google Scholar 

  • Atanassov KT (1986). Intuitionistic fuzzy sets. Fuzzy Sets and Systems 20 (1): 87–96.

    Article  Google Scholar 

  • Bandaly D, Shanker L, Kahyaoglu Y and Satir A (2013). Supply chain risk management—II: A review of operational, financial and integrated approaches. Risk Management (Bas) 15 (1): 1–31.

    Article  Google Scholar 

  • Bauer S (2012). A literature review on operational it risks and regulations of institutions in the financial service sector. In: CONF-IRM 2012 Proceedings, The University of Auckland and WU Vienna, Vienna, Paper 58.

  • Berenji HR, Anantharaman RN and Karegar M (2011). A new two-stage fuzzy decision making model in supply chain risk management. International Proceedings of Economics Development and Research, 14, 44–49.

  • Bergeron M, Martel JM and Twarabimenye P (1996). The evaluation of corporate loan applications based on the MCDA. Journal of Euro-Asian Management 2 (2): 16–46.

    Google Scholar 

  • Blackhurst JV, Scheibe KP and Johnson DJ (2008). Supplier risk assessment and monitoring for the automotive industry. International Journal of Physical Distribution & Logistics Management 38 (2): 143–165.

    Article  Google Scholar 

  • Bohlouli N, Shahbazpour A and Tabrizi MRG (2012). Identify and prioritize supply chain risks by TOPSIS (Case study: Motorsazan company). Australian Journal of Basic and Applied Sciences 6 (7): 406–416.

    Google Scholar 

  • Bouchard C, Abi-Zeid I, Beauchamp N, Lamontagne L, Desrosiers J and Rodriguez M (2010). Multicriteria decision analysis for the selection of a small drinking water treatment system. Journal of Water Supply Research and Technology-Aqua 59 (4): 230–242.

    Article  Google Scholar 

  • Bromiley P, McShane M, Nair A and Rustambekov E (2015). Enterprise risk management: Review, critique, and resear.ch directions. Long Range Planning 48 (4): 265–276.

    Article  Google Scholar 

  • Bustince H and Burillo P (1996). Vague sets are intuitionistic fuzzy sets. Fuzzy Sets and Systems 79 (3): 403–405.

    Article  Google Scholar 

  • Canbolat YB, Gupta G, Matera S and Chelst K (2008). Analysing risk in sourcing design and manufacture of components and sub-systems to emerging markets. International Journal of Production Research 46 (18): 5145–5164.

    Article  Google Scholar 

  • Cavinato JL (2004). Supply chain logistics risks: From the back room to the board room. International Journal of Physical Distribution & Logistics Management 34 (5): 383–387.

    Article  Google Scholar 

  • Certa A, Enea M, Galante G and La Fata CM (2009). Multi-objective human resources allocation in R&D projects planning. International Journal of Production Research 47 (13): 3503–3523.

    Article  Google Scholar 

  • Chai J, Liu JNK and Ngai EWT (2013). Application of decision-making techniques in supplier selection: A systematic review of literature. Expert Systems with Applications 40 (10): 3872–3885.

    Article  Google Scholar 

  • Chan FTS and Kumar N (2007). Global supplier development considering risk factors using fuzzy extended AHP-based approach. Omega 35 (4): 417–431.

    Article  Google Scholar 

  • Chan HK and Wang X (2013). An integrated fuzzy approach for aggregative supplier risk assessment. In: Fuzzy Hierarchical Model for Risk Assessment. Springer: London, pp 45–69.

    Chapter  Google Scholar 

  • Chen P-S and Wu M-T (2013). A modified failure mode and effects analysis method for supplier selection problems in the supply chain risk environment: A case study. Computers & Industrial Engineering 66 (4): 634–642.

    Article  Google Scholar 

  • Chen S-M and Tan J-M (1994). Handling multicriteria fuzzy decision-making problems based on vague set theory. Fuzzy Sets and Systems 67 (2): 163–172.

    Article  Google Scholar 

  • Choi H-G and Ahn J (2010). Risk analysis models and risk degree determination in new product development: A case study. Journal of Engineering and Technology Management 27 (1–2): 110–124.

    Article  Google Scholar 

  • Choo EU, Schoner B and Wedley WC (1999). Interpretation of criteria weights in multicriteria decision making. Computers & Industrial Engineering 37 (3): 527–541.

    Article  Google Scholar 

  • Chopra S and Sodhi MS (2004). Managing risk to avoid supply chain breakdown. Sloan Management Review 46 (1): 53–61.

    Google Scholar 

  • Christopher M and Peck H (2004). Building the Resilient supply chain. International Journal of Logistics Management 15 (2): 1–13.

    Article  Google Scholar 

  • Colicchia C and Strozzi F (2012). Supply chain risk management: A new methodology for a systematic literature review. Supply Chain Management: An International Journal 17 (4): 403–418.

    Article  Google Scholar 

  • Covas MT, Silva CA and Dias LC (2013). Multicriteria decision analysis for sustainable data centers location. International Transactions in Operational Research 20 (3): 269–299.

    Article  Google Scholar 

  • Cox LA (2008). What’s wrong with risk matrices? Risk Analysis 28 (2): 497–512.

    Article  Google Scholar 

  • Cucchiella F and Gastaldi M (2006). Risk management in supply chain: A real option approach. Journal of Manufacturing Technology Management 17 (6): 700–720.

    Article  Google Scholar 

  • Curkovic S, Scannell T, Wagner B and Vitek M (2013). A longitudinal study of supply chain risk management relative to COSO’s enterprise risk management framework. Modern Management Science & Engineering 1 (1): 13–36.

    Google Scholar 

  • Czyzak P and Slowinski R (1996). Possibilistic construction of fuzzy outranking relation for multiple-criteria ranking. Fuzzy Sets and Systems 81 (1): 123–131.

    Article  Google Scholar 

  • De Boer L, Labro E and Morlacchi P (2001). A review of methods supporting supplier selection. European Journal of Purchasing & Supply Management 7 (2): 75–89.

    Article  Google Scholar 

  • De la Torre E, Martner C, Martínez J, Olivares E and Moreno E (2013). Analyzing risk factors for highway theft in Mexico. In: Garzia F, Brebbia CA and Guarascio M (eds). Safety and Security Engineering. WIT Press: Southhampton, UK, pp 437–446.

    Chapter  Google Scholar 

  • Deleris LA and Erhun F (2005). Risk management in supply networks using Monte-Carlo simulation. In: Kuhl ME, Steiger NM, Armstrong FB and Joines, JA (eds). Proceedings of the 2005 Winter Simulation Conference, Institute of Electrical and Electronics Engineers, Inc, Piscataway, New Jersey, pp. 1643–1649.

  • Deleris LA and Erhun F (2011). Quantitative risk assessment in supply Chains: A case study based on engineering risk analysis concepts. In: Kempf KG, Keskinocak P and Uzsoy R (eds). Planning Production and Inventories in the Extended Enterprise. Springer: New York, pp 105–131.

    Chapter  Google Scholar 

  • Delgado M, Vila MA and Voxman W (1998). On a canonical representation of fuzzy numbers. Fuzzy Sets and Systems 93 (1): 125–135.

    Article  Google Scholar 

  • Dias JA (2011). Multiple criteria decision aiding for sorting problems : concepts, methodologies, and applications. Docteur en Informatique (Spécialité : Recherche Opérationnelle) et Docteur en Ingénierie et Management Industriel, Universidade Técnica de Lisboa Instituto Superior Técnico. Université Paris IX Dauphine.

  • Dias JA, Figueira JR and Roy B (2010). Electre Tri-C: A multiple criteria sorting method based on characteristic reference actions. European Journal of Operational Research 204 (3): 565–580.

    Article  Google Scholar 

  • Diehl D and Spinler S (2013). Defining a common ground for supply chain risk management—A case study in the fast-moving consumer goods industry. International Journal of Logistics Research and Applications 16 (4): 311–327.

    Article  Google Scholar 

  • Dotoli M, Fanti MP, Meloni C and Zhou MC (2005). A multi-level approach for network design of integrated supply chains. International Journal of Production Research 43 (20): 4267–4287.

    Article  Google Scholar 

  • Doumpos M and Zopounidis C (2002). Multi—criteria classification methods in financial and banking decisions. International Transactions in Operational Research 9 (5): 567–581.

    Article  Google Scholar 

  • Dubois D and Prade H (1978). Operations on fuzzy numbers. International Journal of Systems Science 9 (6): 613–626.

    Article  Google Scholar 

  • Elleuch H, Hachicha W and Chabchoub H (2014). A combined approach for supply chain risk management: Description and application to a real hospital pharmaceutical case study. Journal of Risk Research 17 (5): 641–663.

    Article  Google Scholar 

  • Faisal MN, Banwet DK and Shankar R (2007). Information risks management in supply chains: An assessment and mitigation framework. Journal of Enterprise Information Management 20 (6): 677–699.

    Article  Google Scholar 

  • Faisal MN (2009). Prioritization of risks in supply chains. In: Wu T and Blackhurst J (eds). Managing Supply Chain Risk and Vulnerability: Tools and Methods for Supply Chain Decision Makers. Springer-Verlag: London, pp 41–66.

    Chapter  Google Scholar 

  • Figueira J, Greco S, Roy B and Slowiński R (2010). ELECTRE methods: Main features and recent developments. In: Pardalos PM, Hearn D and Zopounidis C (eds). Handbook of multicriteria analysis. Applied optimization. Springer: Berlin, pp 51–89.

    Chapter  Google Scholar 

  • Figueira J, Mousseau V and Roy B (2005). ELECTRE methods. In: Figueira J, Greco S and Ehrgott M (eds). Multiple Criteria Decision Analysis: State of the Art Surveys. Springer: New York, pp 133–153.

    Chapter  Google Scholar 

  • Figueira JR and Roy B (2002). Determining the weights of criteria in the ELECTRE type methods with a revised Simos’ procedure. European Journal of Operational Research 139 (2): 317–326.

    Article  Google Scholar 

  • Fragoso RMdS (2013). Planning marketing channels: Case of the olive oil agribusiness in portugal. Journal of Agricultural & Food Industrial Organization 11 (1): 1–17.

    Article  Google Scholar 

  • Gaonkar R and Viswanadham N (2004). A conceptual and analytical framework for the management of risk in supply chains. In: Robotics and Automation, 2004. Proceedings. Vol. 3, IEEE International Conference on Robotics and Automation, ICRA ‘04. 26 April–1 May, Barcelona, Spain, pp. 2699–2704.

  • Gelderman CJ and Van Weele AJ (2005). Purchasing portfolio models: A critique and update. Journal of Supply Chain Management 41 (3): 19–28.

    Article  Google Scholar 

  • Ghadge A and Dani S (2012). Supply chain risk management: Present and future scope. International Journal of Logistics Management 23 (3): 313–339.

    Article  Google Scholar 

  • Giunipero LC and Eltantawy RA (2004). Securing the upstream supply chain: A risk management approach. International Journal of Physical Distribution & Logistics Management 34 (9): 698–713.

    Article  Google Scholar 

  • Govindan K and Jepsen MB (2014). ELECTRE: A comprehensive literature review on methodologies and applications. In: 79th Meeting of the European Working Group on Multiple Criteria Decision Aiding, 3–5 April, National Centre for Scientific Research “DEMOKRITOS”, Athens, Greece.

  • Govindan K and Jepsen MB (2015). ELECTRE: A comprehensive literature review on methodologies and applications. European Journal of Operational Research. (in press) doi:10.1016/j.ejor.2015.07.019.

  • Greco S, Predki B and Slowinski R (2002). Searching for an equivalence between decision rules and concordance-discordance preference model in multicriteria choice problems. Control and Cybernetics 31 (4): 921–935.

    Google Scholar 

  • Harland C, Brenchley R and Walker H (2003). Risk in supply networks. Journal of Purchasing and Supply Management 9 (2): 51–62.

    Article  Google Scholar 

  • Hillson D (2002). Extending the risk process to manage opportunities. International Journal of Project Management 20 (3): 235–240.

    Article  Google Scholar 

  • Ho W, Xu X and Dey PK (2010). Multi-criteria decision making approaches for supplier evaluation and selection: A literature review. European Journal of Operational Research 202 (1): 16–24.

    Article  Google Scholar 

  • Hoffmann P (2012). Innovative supply risk management. In: Bogaschewsky R, Eßig M, Lasch R and Stölzle W (eds). Supply Management Research. Gabler: Verlag, pp 79–104.

    Chapter  Google Scholar 

  • Hong DH and Choi C-H (2000). Multicriteria fuzzy decision-making problems based on vague set theory. Fuzzy Sets and Systems 114 (1): 103–113.

    Article  Google Scholar 

  • Hong E-S, Lee I-M, Shin H-S, Nam S-W and Kong J-S (2009). Quantitative risk evaluation based on event tree analysis technique: Application to the design of shield TBM. Tunnelling and Underground Space Technology 24 (3): 269–277.

    Article  Google Scholar 

  • Hoyt RE and Liebenberg AP (2011). The value of enterprise risk management. The Journal of Risk and Insurance 78 (4): 795–822.

    Article  Google Scholar 

  • Hubbard D and Evans D (2010). Problems with scoring methods and ordinal scales in risk assessment. IBM Journal of Research and Development 54 (3): 2:1–2:10.

    Article  Google Scholar 

  • Jianqiang W and Zhong Z (2009). Aggregation operators on intuitionistic trapezoidal fuzzy number and its application to multi-criteria decision making problems. Journal of Systems Engineering and Electronics 20 (2): 321–326.

    Google Scholar 

  • Juttner U (2005). Supply chain risk management: Understanding the business requirements from a practitioner perspective. International Journal of Logistics Management 16 (1): 120–141.

    Article  Google Scholar 

  • Juttner U, Peck H and Christopher M (2003). Supply chain risk management: Outlining an agenda for future research. International Journal of Logistics: Research and Applications 6 (4): 197–210.

    Article  Google Scholar 

  • Kamann D-JF and Bakker EF (2004). Changing supplier selection and relationship practices: A contagion process. Journal of Purchasing and Supply Management 10 (2): 55–64.

    Article  Google Scholar 

  • Kaplan S and Garrick BJ (1981). On the quantitative definition of risk. Risk Analysis 1 (1): 11–27.

    Article  Google Scholar 

  • Khan O and Burnes B (2007). Risk and supply chain management: Creating a research agenda. International Journal of Logistics Management 18 (2): 197–216.

    Article  Google Scholar 

  • Khoury N, Martel JM and Yourougou P (1994). A multicriterion approach to country selection for global index funds. Global Finance Journal 5 (1): 17–35.

    Article  Google Scholar 

  • Klir GJ (1994). On the alleged superiority of probabilistic representation of uncertainty. IEEE Transactions on Fuzzy Systems 2 (1): 27–31.

    Article  Google Scholar 

  • Kraljic P (1983). Purchasing must become supply management. Harvard Business Review 61 (5): 109–117.

    Google Scholar 

  • Kull TJ and Talluri S (2008). A supply risk reduction model using integrated multicriteria decision making. IEEE Transactions on Engineering Management 55 (3): 409–419.

    Article  Google Scholar 

  • Levary RR (2007). Ranking foreign suppliers based on supply risk. Supply Chain Management: An International Journal 12 (6): 392–394.

    Article  Google Scholar 

  • Levine ES (2012). Improving risk matrices: The advantages of logarithmically scaled axes. Journal of Risk Research 15 (2): 209–222.

    Article  Google Scholar 

  • Li D-F (2010). A ratio ranking method of triangular intuitionistic fuzzy numbers and its application to MADM problems. Computers & Mathematics with Applications 60 (6): 1557–1570.

    Article  Google Scholar 

  • Li D-F (2014). Decision and Game Theory in Management with Intuitionistic Fuzzy Sets. Springer-Verlag: Berlin, Heidelberg.

    Book  Google Scholar 

  • Li D-F and Yang J (2013). A difference-index based ranking bilinear programming approach to solving bimatrix games with payoffs of trapezoidal intuitionistic fuzzy numbers. Journal of Applied Mathematics doi:10.1155/2013/697261.

  • Li G, Lin Y, Wang S and Yan H (2006). Enhancing agility by timely sharing of supply information. Supply Chain Management: An International Journal 11 (5): 425–435.

    Article  Google Scholar 

  • Li L, Wang J, Leung H and Jiang C (2010). Assessment of catastrophic risk using bayesian network constructed from domain knowledge and spatial data. Risk Analysis 30 (7): 1157–1175.

    Article  Google Scholar 

  • Liu J, Zou P and Gong W (2013). Managing project risk at the enterprise level: Exploratory case studies in China. Journal of Construction Engineering and Management 139 (9): 1268–1274.

    Article  Google Scholar 

  • Lourenzutti R and Krohling RA (2013). A study of TODIM in a intuitionistic fuzzy and random environment. Expert Systems with Applications 40 (16): 6459–6468.

    Article  Google Scholar 

  • Macurová P and Jurásková K (2013). Analysis of risks generated by suppliers during the period of economic fluctuations. Amfiteatru Economic 15 (33): 27–43.

    Google Scholar 

  • Manuj I and Mentzer JT (2008). Global supply chain risk management strategies. International Journal of Physical Distribution & Logistics Management 38 (3): 192–223.

    Article  Google Scholar 

  • Massam BH (1991). The location of waste transfer stations in Ashdod, Israel, using a multi-criteria decision support system. Geoforum 22 (1): 27–37.

    Article  Google Scholar 

  • Matook S, Lasch R and Tamaschke R (2009). Supplier development with benchmarking as part of a comprehensive supplier risk management framework. International Journal of Operations & Production Management 29 (3): 241–267.

    Article  Google Scholar 

  • Merad M, Dechy N, Marcel F and Linkov I (2013). Multiple-criteria decision-aiding framework to analyze and assess the governance of sustainability. Environment Systems and Decisions 33 (2): 305–321.

    Article  Google Scholar 

  • Merad MM, Verdel T, Roy B and Kouniali S (2004). Use of multi-criteria decision-aids for risk zoning and management of large area subjected to mining-induced hazards. Tunnelling and Underground Space Technology 19 (2): 125–138.

    Article  Google Scholar 

  • Micheli GJL, Cagno E and Di Giulio A (2009). Reducing the total cost of supply through risk-efficiency-based supplier selection in the EPC industry. Journal of Purchasing and Supply Management 15 (3): 166–177.

    Article  Google Scholar 

  • Micheli GJL, Cagno E and Zorzini M (2008). Supply risk management vs supplier selection to manage the supply risk in the EPC supply chain. Management Research News 31 (11): 846–866.

    Article  Google Scholar 

  • Milani AS and Shanian A (2006). Gear material selection with uncertain and incomplete data. Material performance indices and decision aid model. International Journal of Mechanics and Materials in Design 3 (3): 209–222.

    Article  Google Scholar 

  • Montazer GA, Saremi HQ and Ramezani M (2009). Design a new mixed expert decision aiding system using fuzzy ELECTRE III method for vendor selection. Expert Systems with Applications 36 (8): 10837–10847.

    Article  Google Scholar 

  • Morais D, de Almeida A and Figueira J (2014). A sorting model for group decision making: A case study of water losses in Brazil. Group Decision and Negotiation 23 (5): 937–960.

    Google Scholar 

  • Mutikanga H, Sharma S and Vairavamoorthy K (2011). Multi-criteria decision analysis: A strategic planning tool for water loss management. Water Resources Management 25 (14): 3947–3969.

    Article  Google Scholar 

  • Oke A and Gopalakrishnan M (2009). Managing disruptions in supply chains: A case study of a retail supply chain. International Journal of Production Economics 118 (1): 168–174.

    Article  Google Scholar 

  • Oliveira E, Antunes CH and Gomes A (2011). Incorporation of preferences in an evolutionary algorithm using an outranking relation: The EvABOR approach. International Journal of Natural Computing Research 2 (1): 63–85.

    Article  Google Scholar 

  • Olson DL and Wu D (2010). Enterprise Risk Management Models. Springer-Verlag: Berlin, Heidelberg.

    Book  Google Scholar 

  • Peng M, Peng Y and Chen H (2014). Post-seismic supply chain risk management: A system dynamics disruption analysis approach for inventory and logistics planning. Computers & Operations Research 42 (0): 14–24.

    Article  Google Scholar 

  • Rao S and Goldsby TJ (2009). Supply chain risks: A review and typology. International Journal of Logistics Management 20 (1): 97–123.

    Article  Google Scholar 

  • Ravindran AR, Bilsel RU, Wadhwa V and Yang T (2009). Risk adjusted multicriteria supplier selection models with applications. International Journal of Production Research 48 (2): 405–424.

    Article  Google Scholar 

  • RIMS and Advisen Ltd (2011). 2011 Enterprise Risk Management Survey. Mary Roth, ARM, RIMS, Thomas Ruggieri, Advisen Ltd, New York.

  • RIMS and Advisen Ltd (2013). ‘2013 RIMS Enterprise Risk Management Survey’. Mary Roth, ARM, RIMS, Thomas Ruggieri, Advisen Ltd, New York.

  • Risk and Insurance Management Society (RIMS) (2011). An overview of widely used risk management standards and guidelines—RIMS Executive Report—The Risk Perspective.

  • Ritchie B and Brindley C (2009). Effective management of supply chains: Risks and performance. In: Wu D and Blackhurst J (eds). Managing Supply Chain Risk and Vulnerability. Springer-Verlag: London, pp 9–28.

    Chapter  Google Scholar 

  • Rogers M and Bruen M (1998). A new system for weighting environmental criteria for use within ELECTRE III. European Journal of Operational Research 107 (3): 552–563.

    Article  Google Scholar 

  • Rogers M, Bruen M and Maystre LY (2000). ELECTRE and Decision Support: Methods and Applications in Engineering and Infrastructure Investment. Springer Science+Business Media: New York.

    Book  Google Scholar 

  • Roy B (1991). The outranking approach and the foundations of electre methods. Theory and Decision 31 (1): 49–73.

    Article  Google Scholar 

  • Roy B (1996). Multicriteria Methodology for Decision Aiding. Kluwer Academic Publishers. Dordrecht. Original version in French Méthodologie multicritère d’aide à la décision Economica: Paris 1985.

    Book  Google Scholar 

  • Samvedi A and Jain V (2013). A grey approach for forecasting in a supply chain during intermittent disruptions. Engineering Applications of Artificial Intelligence 26 (3): 1044–1051.

    Article  Google Scholar 

  • Sawadogo M and Anciaux D (2011). Intermodal transportation within the green supply chain: An approach based on ELECTRE method. International Journal of Business Performance and Supply Chain Modelling 3 (1): 43–65.

    Article  Google Scholar 

  • Segal S (2011). Defining ERM. In: Corporate Value of Enterprise Risk Management. John Wiley & Sons, Inc.: Hoboken, NJ.

    Google Scholar 

  • Sodhi MS, Son B-G and Tang CS (2012). Researchers’ perspectives on supply chain risk management. Production and Operations Management 21 (1): 1–13.

    Article  Google Scholar 

  • Sodhi MS and Tang CS (2012a). Managing Supply Chain Risk. Springer Science+Business Media: New York.

    Book  Google Scholar 

  • Sodhi MS and Tang CS (2012b). Risk assessment. In: Managing Supply Chain Risk. Springer Science+Business Media: New York, pp 33–49.

    Chapter  Google Scholar 

  • Spekman RE and Davis EW (2004). Risky business: Expanding the discussion on risk and the extended enterprise. International Journal of Physical Distribution & Logistics Management 34 (5): 414–433.

    Article  Google Scholar 

  • Stecke KE and Kumar S (2009). Sources of supply chain disruptions, factors that breed vulnerability, and mitigating strategies. Journal of Marketing Channels 16 (3): 193–226.

    Article  Google Scholar 

  • Supply & Demand Chain Executive and IHS (2012). Benchmarking supplier risk: A survey of the supply chain, http://www.ihs.com/info/sc/a/supplier-risk.aspx, accessed 15 June 2014.

  • Tang CS (2006). Perspectives in supply chain risk management. International Journal of Production Economics 103 (2): 451–488.

    Article  Google Scholar 

  • Tang O and Musa SN (2011). Identifying risk issues and research advancements in supply chain risk management. International Journal of Production Economics 133 (1): 25–34.

    Article  Google Scholar 

  • Tummala R and Schoenherr T (2011). Assessing and managing risks using the supply Chain risk management process (SCRMP). Supply Chain Management: An International Journal 16 (6): 474–483.

    Article  Google Scholar 

  • Vedel M and Ellegaard C (2013). Supply risk management functions of sourcing intermediaries: An investigation of the clothing industry. Supply Chain Management: An International Journal 18 (5): 509–522.

    Article  Google Scholar 

  • Viswanadham N and Samvedi A (2013). Supplier selection based on supply chain ecosystem, performance and risk criteria. International Journal of Production Research 51 (21): 6484–6498.

    Article  Google Scholar 

  • Wagner SM and Bode C (2008). An empirical examination of supply chain performance along several dimensions of risk. Journal of Business Logistics 29 (1): 307–325.

    Article  Google Scholar 

  • Waters D (2007). Identifying risks. In: Supply Chain Risk Management: Vulnerability and Resilience in Logistics. Kogan Page Limited: London, Philadelphia, pp 97–125.

    Google Scholar 

  • Weber CA, Current JR and Benton WC (1991). Vendor selection criteria and methods. European Journal of Operational Research 50 (1): 2–18.

    Article  Google Scholar 

  • Wiendahl H-P, Selaouti A and Nickel R (2008). Proactive supply chain management in the forging industry. Production Engineering 2 (4): 425–430.

    Article  Google Scholar 

  • Wu C and Barnes D (2011). A literature review of decision-making models and approaches for partner selection in agile supply chains. Journal of Purchasing and Supply Management 17 (4): 256–274.

    Article  Google Scholar 

  • Wu T, Blackhurst J and Chidambaram V (2006). A model for inbound supply risk analysis. Computers in Industry 57 (4): 350–365.

    Article  Google Scholar 

  • Wu T, Blackhurst J and O’grady P (2007). Methodology for supply chain disruption analysis. International Journal of Production Research 45 (7): 1665–1682.

    Article  Google Scholar 

  • Xidonas P, Mavrotas G and Psarras J (2010). A multiple criteria decision-making approach for the selection of stocks. Journal of the Operational Research Society 61 (8): 1273–1287.

    Article  Google Scholar 

  • Xu Z and Cai X (2012). Intuitionistic Fuzzy Information Aggregation: Theory and Applications. Science Press, Springer-Verlag: Beijing, Berlin, Heidelberg.

    Book  Google Scholar 

  • Yates JF and Stone ER (1992). The risk construct. In: Yates J (ed.). Risk Taking Behavior. Wiley: New York.

    Google Scholar 

  • Ye J (2012). Multicriteria group decision-making method using vector similarity measures for trapezoidal intuitionistic fuzzy numbers. Group Decision and Negotiation 21 (4): 519–530.

    Article  Google Scholar 

  • Zadeh LA (1965). Fuzzy sets. Information and Control 8 (3): 338–353.

    Article  Google Scholar 

  • Zandi F, Tavana M and Martin D (2011). A fuzzy group electre method for electronic supply chain management framework selection. International Journal of Logistics Research and Applications 14 (1): 35–60.

    Article  Google Scholar 

  • Zhang Z, Tian D and Li K (2014). Parameterized intuitionistic fuzzy trapezoidal operators and their application to multiple attribute group decision making. Journal of Intelligent and Fuzzy Systems 26 (3): 1401–1431.

    Google Scholar 

  • Zouggari A and Benyoucef L (2012). Simulation based fuzzy TOPSIS approach for group multi-criteria supplier selection problem. Engineering Applications of Artificial Intelligence 25 (3): 507–519.

    Article  Google Scholar 

  • Zsidisin GA (2003a). A grounded definition of supply risk. Journal of Purchasing and Supply Management 9 (5–6): 217–224.

    Article  Google Scholar 

  • Zsidisin GA (2003b). Managerial perceptions of supply risk. Journal of Supply Chain Management 39 (4): 14–26.

    Article  Google Scholar 

  • Zsidisin GA and Ellram LM (2003). An agency theory investigation of supply risk management. Journal of Supply Chain Management 39 (2): 15–27.

    Article  Google Scholar 

  • Zsidisin GA, Ellram LM, Carter JR and Cavinato JL (2004). An analysis of supply risk assessment techniques. International Journal of Physical Distribution & Logistics Management 34 (5): 397–413.

    Article  Google Scholar 

  • Zsidisin GA, Panelli A and Upton R (2000). Purchasing organization involvement in risk assessments, contingency plans, and risk management: An exploratory study. Supply Chain Management: An International Journal 5 (4): 187–198.

    Article  Google Scholar 

  • Zsidisin GA and Wagner SM (2010). Do perceptions become reality? The moderating role of supply chain resiliency on disruption occurrence. Journal of Business Logistics 31 (2): 1–20.

    Article  Google Scholar 

  • Zsidisin GA, Wagner SM, Melnyk SA, Ragatz GL and Burns LA (2008). Supply risk perceptions and practices: An exploratory comparison of German and US supply management professionals. International Journal of Technology, Policy and Management 8 (4): 401–419.

    Article  Google Scholar 

  • Õzkan A (2013). Evaluation of healthcare waste treatment/disposal alternatives by using multi criteria decision making techniques. Waste Management & Research 31 (2): 141–149.

    Article  Google Scholar 

  • Zardari NH, Cordery I and Sharma A (2010). An objective multiattribute analysis approach for allocation of scarce irrigation water resources. Journal of the American Water Resources Association 46 (2): 412–428.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kannan Govindan.

Appendices

Appendix A

A.1. Decision matrix

An MCDA problem generally include a set of alternatives or actions A={a i :i=1, 2, …, n}, which has to be evaluated on a set of criteria F={g j :j=1, 2, …, m}. It is common to denote an evaluation or performance of alternative a i on criterion g j as g j (a i ), where g j ( ⋅ ) is a criterion function corresponding to the scale and the possible values of evaluations on criterion g j .

A decision matrix M n × m with n rows and m columns is defined as:

Note that in standard matrix notation m is used to indicate the number of rows and n to indicate the number of columns. In MCDA problems, it is customary to use n and m to indicate the number of alternatives, respectively, criteria. Since we prefer to present alternatives in rows, we use n rows and m columns.

When analysing an MCDA problem, we need to know the direction of preferences on each criterion, i.e. if a high or a low value of g j (a i ) is preferred. Criteria of the former type are referred to as benefit criteria and criteria of the latter type as cost criteria.

A.2. Criteria weights

Many MCDA methods require that each criterion be given a weight, in order to indicate the relative importance of the criteria. These weights are interpreted differently in various MCDA methods (Choo et al, 1999). In ELECTRE methods, each weight is interpreted as the voting power of the corresponding criterion in a coalition in favour of an outranking (Figueira et al, 2005).

Several methods have been proposed to aid a DM in determining criteria weights (Choo et al, 1999). Some applications of such methods can be found in Massam (1991) (AHP), Milani and Shanian (2006) (Entropy method), Certa et al (2009) (ANP), and Zardari et al (2010) (Conjoint analysis). Specifically aimed at ELECTRE, Rogers and Bruen (1998) proposed the ‘resistance to change grid’, Figueira and Roy (2002) presented the revised Simos’ card procedure, and Greco et al (2002) proposed to use decision rules obtained by a dominance-based rough set approach. For ELECTRE TRI, a number of preference disaggregation procedures have been developed (see Govindan and Jepsen, 2015).

We denote a set of criteria weights as {k j |k j >0, ∀jJ}.

A.3. Discrimination thresholds and types of criteria

The most general form of criteria used in ELECTRE methods are pseudo-criteria. A pseudo-criterion takes into account the imperfect nature of a DM’s evaluations of the alternatives. For a pseudo-criterion g j F, two threshold functions must be defined (Figueira et al, 2010):

  • Indifference threshold q j ( ⋅ )

  • Preference threshold p j ( ⋅ )

These two thresholds are generally referred to as discrimination thresholds. An indifference threshold indicates a zone, in which the difference of the evaluations of two alternatives does not justify a preference of one over the other. The preference threshold, on the other hand, indicates a level, such that in order for an alternative a to be regarded as better than alternative a′, the difference g j (a)−g j (a′) of the evaluations must exceed the given threshold level. If the difference lies in a zone between the indifference threshold and the preference threshold, then a hesitation between indifference and preference occurs (Figueira et al, 2005).

The threshold functions must satisfy the condition p j (g j (a))⩾q j (g j (a))⩾0 for all aA. They can either be constant or vary according to the evaluations. If a threshold is variable, then a distinction is made between a direct threshold and an inverse threshold, corresponding to whether the threshold is computed using the best or the worst evaluation, respectively, whenever two alternatives are under consideration (Figueira et al, 2010).

When using variable thresholds, further restrictions apply to the parameters of the functions. Usually the threshold functions are given as affine functions. In such a case, the function of a direct indifference threshold can be expressedFootnote 9 as , where , such that α qj >−1 on a benefit criterion and on a cost criterion. An inverse threshold is expressed as , where , such that on a benefit criterion and on a cost criterion. For preference thresholds, simply exchange q with p everywhere. If a threshold function is defined as direct (inverse), then the parameters necessary for the function for the inverse (direct) threshold can be obtained through a transformation, because direct and inverse thresholds are functionally linked. Note that when using variable thresholds in ELECTRE TRI, TRI-C, and TRI-nC, the threshold functions are based on the performance of a reference norm. These methods are created, such that the algorithm takes care of the transformations, because separate formulas are used if an alternative is compared to a norm or if a norm is compared to an alternative. In other ELECTRE methods with pseudo-criteria, the formulas are based on input in the form of direct thresholds; hence, if inverse thresholds are preferred, then the parameters must be transformed. For more details on variable thresholds, please refer to Dias (2011). In this paper, we only consider input in the form of constant thresholds.

Let p j (a′) and q j (a′) be the thresholds associated with criterion g j F and a particular alternative a′∈A. Then a pseudo-criterion g j reduces to (Roy, 1996):

  • A true criterion, if p j (a)=q j (a)=0 for all aA

  • A semi-criterion, if p j (a)=q j (a) for all aA

  • A pre-criterion, if q j (a)=0 for all aA

In ELECTRE I and II (and the unofficial ELECTRE IV), only true criteria are used, whereas the other ELECTRE methods are based on pseudo-criteria. Any single criterion in the latter methods can still be reduced to any of the other types of criteria though.

A.4. Veto thresholds

A veto threshold v j ( ⋅ ) can be assigned to each criterion. In the case of pseudo-criteria, it can be either constant or a function of the performances. As was the case for the discrimination thresholds, a further distinction is made between a direct and an inverse threshold if the threshold is variable. Generally, it must satisfy the condition v j (g j (a))⩾p j (g j (a)) for all aA and if variable thresholds are used, similar restrictions apply as the ones mentioned in Section A.3 for the indifference and preference thresholds. In the method referred to as ELECTRE IV and in applications, where veto thresholds are used in ELECTRE I and II, the thresholds are usually constant. In this paper, we only consider input in the form of constant thresholds.

A veto threshold indicates the maximum difference allowed between the performances of two alternatives on a specific criterion. A single veto threshold can invalidate an outranking regardless of what the other performances are, if the difference between two performances on a given criterion exceeds the veto thresholds (Roy, 1991).

A.5. Concordance, discordance, and credibility indices used in some ELECTRE methods

The formulas in the following subsections are used in ELECTRE III, TRI, TRI-C, and TRI-nC. The concordance formula is also used in ELECTRE IS.

A.5.1. Concordance indices

A concordance index c(x, y) for an ordered pair (x, y) is given as follows:

where c j (x, y) is the jth partial concordance index for (x, y) and given as follows:

For a benefit criterion:

The formula for c j (x, y) on a benefit criterion can be generalized to:

For a cost criterion:

The formula for c j (x,y) on a cost criterion can be generalized to:

A.5.2. Partial discordance indices

A partial concordance index d j (x, y) for an ordered pair (x, y) is given as follows:

For a benefit criterion

The formula above can be generalized to:

For a cost criterion

The formula above can be generalized to:

A.5.3. Credibility indices

A credibility index σ(x, y) for an ordered pair (x, y) is given as follows:

where

A.6. ELECTRE TRI-C

ELECTRE TRI-C was designed for the sorting problematic, but instead of using limits (profiles) to determine the categories as in ELECTRE TRI, a characteristic action must be defined for each category. A characteristic action indicates the typical performance on each criterion g j F of an action (alternative) in the corresponding category. Apart from these characteristic actions, an additional parameter, called a credibility level, needs to be determined. It is similar to the cutting level in ELECTRE TRI, but has an additional restriction. In ELECTRE TRI-C, the exploitation phase includes two assignment rules as in ELECTRE TRI, but they must be considered jointly. Hence, if the two rules do not assign a particular alternative to the same category, then the two different categories define a range of possible categories for the final assignment of the alternative.

A stepwise illustration is provided in the following sub-section. The illustration is based on the description in Dias et al (2010). Note that the notation in the illustration is based on constant thresholds. For variable thresholds, simply exchange the constant threshold with the expression for the variable threshold.

A.6.1. Stepwise illustration of ELECTRE TRI-C

The stepwise illustration below is based on the description in Dias et al (2010). Note that we interchangeably use the terms action and alternative in the illustration.

Step 1::

Create a decision matrix M and assign a weight k j to each criterion g j F.

Step 2::

Determine indifference and preference thresholds q j and p j for each criterion g j F, such that p j q j (see section A.3).

Step 3::

For any criterion g j F, a veto threshold v j p j can be determined if desired (see Section A.4)

Step 4::

In this step, a set of ordered categories must be defined. For this purpose, a set of characteristic actions b h , h=1, …, q must be defined, where q is the number of desired categories. Let g j (b h ) denote the performance value of b h on criterion g j and {C h } h =1, …, q the set of categories. A characteristic action b h must be defined, such that g j (b h ) is a typical performance value on criterion g j for an alternative assigned to category C h .

In what follows, let:

  • F +={g j F|g j is a benefit criterion}

  • F ={g j F|g j is a cost criterion}

The characteristic actions must as a minimum fulfil the following conditions:

  • g j (b h+1)⩾g j (b h ) for h=1, …, q−1 and for all g j F +

  • g j (b h+1)⩽g j (b h ) for h=1, …, q−1 and for all g j F

  • At least one of the following two conditions is true:

    • ° There is at least one g j F +, such that g j (b h+1)>g j (b h ) for h=1, …, q−1

    • ° There is at least one g j F , such that g j (b h+1)<g j (b h ) for h=1, …, q−1

  • The set {b h |h=1, …, q} of characteristic actions fulfills the weak separability condition (see Section A.6.2)

In addition, any of the two stronger conditions strict separability or hyper-strict separability can be applied (see Section A.6.2). The stronger the condition the set of characteristic actions fulfills, the better the categories can be distinguished by the ELECTRE TRI-C method.

Finally, two special characteristic actions b 0 and b q+1 must be defined, such that:

  • g j (b 0)<g j (a)<g j (b q+1) for all g j F +, aA

  • g j (b 0)>g j (a)>g j (b q+1) for all g j F , aA

  • g j (b 1)−g j (b 0)>0 for all g j F +

  • g j (b 0)−g j (b 1)>0 for all g j F

  • g j (b q+1)−g j (b q )>0 for all g j F +

  • g j (b q )−g j (b q+1)>0 for all g j F

That is, the two special characteristic actions represents the worst and the best possible performance, respectively, of an alternative on the specific criterion.

Let B={b h |h=0, …, q+1}.

Step 5::

Compute a concordance index c(a, b h ) for any pair (a, b h ), aA, b h B. See section A.5.1 for formulas.

Step 6::

Compute a concordance index c(b h , a) for any pair (a, b h ), aA, b h B. See Section A.5.1 for formulas.

Step 7::

Compute partial discordance indices d j (a i , b h ) for any pair (b h , a), aA, b h B. See section A.5.2 for formulas.

Step 8::

Compute partial discordance indices d j (b h , a) for any pair (b h , a), aA, b h B. See Section A.5.2 for formulas.

Step 9::

Compute a credibility index σ j (a, b h ) for any pair (a, b h ), aA, b h B. See Section A.5.3 for formulas.

Step 10::

Compute a credibility index σ j (b h , a) for any pair (b h , a), aA, b h B. See Section A.5.3 for formulas.

Step 11::

Determine a minimum credibility level λ, 1/2⩽λ⩽1, such that

λ⩾max{σ(b h , b h+1)∣h=1, …, q−1}.

The credibility level is the minimum degree of credibility considered necessary to validate an outranking of one action over another. It should, in general, be within the range [0.5, 1]. If, however, the set of characteristic actions only fulfills the weak separability condition, then the minimum required credibility level is further restricted by the maximum of credibility indices σ(b h , b h+1), h=1, 2, …,q−1, such that in addition to the restriction λ∈[0.5, 1], also max{σ(b h , b h+1)∣h=1, 2, …, q−1}⩽λ⩽1 must be fulfilled (Dias et al, 2010).

Step 12::

As is the case for ELECTRE TRI, ELECTRE TRI-C uses two assignment (exploitation) procedures. In ELECTRE TRI-C, however, the resulting assignments should be considered jointly. That is, if the two procedures suggest different categories for an alternative to be placed in, then the two categories define a range of possible categories for the alternative under consideration.

Before the two procedures are illustrated in Steps 13–15, we need to define the possible preference situations between aA and b h B. Let aP + b h , denote a preference of a over b h and let aP b h denote the situation b h P + a. For the two special characteristic actions b 0 and b q+1, it is always the case that aP + b 0 and aP b q+1. Indifference is indicated as aIb h and incomparability as aRb h .

The preference situations between aA and b h B are defined as follows:

  • If σ(a, b h )⩾λ and σ(b h , a)⩾λ, then aIb h .

  • If σ(a, b h )⩾λ and σ(b h , a)<λ, then aP + b h .

  • If σ(a, b h )<λ and σ(b h , a)⩾λ, then aP b h .

  • If σ(a, b h )<λ and σ(b h , a)<λ, then aRb h .

Note that Dias et al (2010) use the notation aI λ b h (λ-indifference), aP λ b h (λ-preference of a i over b h ) and aR λ b h (λ-incomparability).

Step 13::

For the two assignment procedures, it is necessary to define a selecting function ρ, which is used to select between two consecutive categories for the assignment of an alternative in each of the procedures in Steps 14–15. Dias et al (2010) define a number of properties, the selecting function should have, and propose the use of the min selecting function defined as:

Step 14::

Apply the first assignment procedure called the descending rule.

Dias et al (2010) describe the descending rule as follows:

  • Decrease h from q+1 until the first value t, such that σ(a, b t )⩾λ

    • If t=q, select C q as a possible category for a

    • For 0<t<q, if ρ(a, b t )<ρ(a, b t+1), then select C t as a possible category for a, otherwise select C t+1

    • If t=0, select C 1 as a possible category for a

Step 15::

Apply the second assignment procedure called the ascending rule.

Dias et al (2010) describe the ascending rule as follows:

  • Increase h from zero until the first value t, such that σ(b t , a)⩾λ

    • ° If t=1, select C 1 as a possible category for a

    • ° For 1<t<q+1, if ρ(a, b t )>ρ(a, b t+1), then select C t as a possible category for a, otherwise select C t−1

    • ° If t=q+1, select C q as a possible category for a

Step 16::

For each alternative aA, define the range of possible categories based on the minimum and maximum categories selected in Steps 14–15.

A.6.2. Separability conditions on characteristic actions

In order to test the weak, strict and/or hyper-strict separability conditions on the set of characteristic actions {b h |h=1, …, q}, we have to go through the procedure of calculating concordance, discordance, and credibility indices for pairs of characteristic actions (b k , b k+1), k=1, …, q−1.

Step 1::

Determine concordance indices c j (b h , b h+1), h=1, …, q−1, j=1, …, m. See Section A.5.1 for formulas.

Step 2::

Determine partial discordance indices d j (b h , b h+1), h=1, …, q−1, j=1, …, m. See Section A.5.2 for formulas.

Step 3::

Determine credibility indices σ(b h , b h+1), h=1, …, q−1. See Section A.5.3 for formulas.

Step 4::

If σ(b h , b h+1)<1 for h=1, …, q−1, then the set of characteristic actions {b h |h=1, …, q}fulfills the weak separability condition.

Step 5::

If σ(b h , b h+1)<1/2 for h=1, …, q−1, then the set of characteristic actions {b h |h=1, …, q} also fulfills the strict separability condition.

Step 6::

If σ(b h , b h+1)=0 for h=1, …, q−1, then the set of characteristic actions {b h |h=1, …, q} also fulfills the hyper-strict separability condition.

Appendix B

Appendix B Intuitionistic fuzzy numbers

In this appendix, we go through some of the definitions necessary for our use of intuitionistic fuzzy numbers.

Definition 1

  • (Xu and Cai, 2012): Let X be a fixed set. An intuitionistic fuzzy set is a set

    where μ A is referred to as a membership function and is defined as the mapping,

    and v A is referred to as the non-membership function and is defined as the mapping

    such that

    The numerical values of μ A (x) and ν A (x) are called the membership degree and the non-membership degree of the element xX in A, respectively.

    If A is an IFS in X, then the value of

    is called the indeterminacy (or hesitancy) degree of the element xX to A.

    If ν A (x)=1−μ A (x) for all xX, then A degenerates into a fuzzy set.

Definition 2

  • (Li, 2014): Let w c ∈[0, 1] and u c ∈[0, 1] be a pair of real numbers, such that 0⩽w c +u c ⩽1. An intuitionistic fuzzy number c is a special intuitionistic fuzzy set on the set of real numbers , where the membership function μ c →[0, w c ] and the non-membership function ν c →[u c , 1] satisfy the following four conditions (1)–(4):

    1. 1)

      There exist at least two real numbers , such that μ c (x′)=w c and ν c (x′)=u c

    2. 2)

      μ c is quasi-concave and upper semi-continuous on

    3. 3)

      ν c is quasi-convex and lower semi-continuous on

    4. 4)

      The support of c is compact. Note that the support of c is the set

    The numbers w c and u c are called the maximum membership degree and the minimum non-membership degree, respectively.

    A general intuitionistic fuzzy number is defined by the membership function

    and the non-membership function

    where the functions and are continuous and non-decreasing, and satisfy the conditions , f l (c 1l )=w c , g r (c 2r )=u c , and the functions and are continuous and non-increasing and satisfy the conditions f r (c 1r )=w c , , , g r (c 2l )=u c .

    When , c 1l =c 2l , c 1r =c 2r and , we use the notation c=〈(c 1, c 2, c 3, c 4), w c , u c 〉 .

Definition 3

  • (Li, 2014): Let , such that a 1<a 2<a 3<a 4. A trapezoidal intuitionistic fuzzy number (TrIFN) a=〈(a 1, a 2, a 3, a 4), w a , u a 〉 is defined by the membership function

    and the non-membership function

    Figure B1 illustrates a TrIFN.

    Figure B1
    figure 1

    Trapezoidal intuitionistic fuzzy number.

    If a 1<a 2=a 3<a 4, then the TrIFN degenerates into a triangular intuitionistic fuzzy number (TIFN). The same formulas can be used for membership and non-membership functions if a 2xa 3 is replaced with a 2=x=a 3. Figure B2 illustrates a triangular intuitionistic fuzzy number.

    Figure B2
    figure 2

    Triangular intuitionistic fuzzy number.

    There are some other degenerate cases, which are not intuitionistic fuzzy numbers according to Definition 2. Nevertheless, they may be relevant in cases, where TrIFNs are used in real decision problems. For convenience, we use the notion of an intuitionistic fuzzy number also in these cases. Hence, in Definition 4, the membership and non-membership functions of what we refer to, as intuitionistic fuzzy numbers, do not fulfil all the conditions in Definition 2.

Definition 4

  • We add the following definitions:

    • Case 1: If a 1=a 2<a 3=a 4 then we say that a=〈(a 1,a 2, a 3, a 4), w a , u a 〉 is an intuitionistic fuzzy interval number. Figure B3 illustrates the case.

      Figure B3
      figure 3

      Illustration of Case 1.

    • Case 2: If a 1=a 2=a 3=a 4 then we say that a=〈(a 1, a 2, a 3, a 4), w a , u a 〉 is an intuitionistic crisp number. Figure B4 illustrates the case. Note that each of the two small squares are endpoint of the two lines.

      Figure B4
      figure 4

      Illustration of Case 2.

    • Case 3: If a 1=a 2<a 3<a 4, then we say that a=〈(a 1, a 2, a 3, a 4), w a , u a 〉 is a right TrIFN. Figure B5 illustrates the case.

      Figure B5
      figure 5

      Illustration of Case 3

    • Case 4: If a 1<a 2<a 3=a 4, then we say that a=〈(a 1, a 2, a 3, a 4), w a , u a 〉 is a left TrIFN. Figure B6 illustrates the case.

      Figure B6
      figure 6

      Illustration of Case 4.

    • Case 5: If a 1=a 2=a 3<a 4, then we say that a=〈(a 1, a 2, a 3, a 4), w a , u a 〉 is a right triangular intuitionistic fuzzy number. Figure B7 illustrates the case.

      Figure B7
      figure 7

      Illustration of Case 5.

    • Case 6: If a 1<a 2=a 3=a 4, then we say that a=〈(a 1, a 2, a 3, a 4), w a , u a 〉 is a left triangular intuitionistic fuzzy number. Figure B8 illustrates the case.

      Figure B8
      figure 8

      Illustration of Case 6.

Definition 5

  • (Li, 2014): Let a be an intuitionistic fuzzy number as in Definition 2 and let , such that 0⩽αw a and u a β⩽1.

    An α-cut set of a is defined as the set a α={xμ(x)⩾α, x}, which can be represented by a closed interval denoted as [L a (α), R a (α)].

    A β-cut set of a is defined as the set , which can be represented by a closed interval denoted as [L a (β), R a (β)].

Definition 6

  • (Li, 2014): Let a be an intuitionistic fuzzy number as in Definition 2 and let , such that 0⩽αw a and u a β⩽1.

    The value indices (or values for short) of the membership and the non-membership are defined as

    The ambiguity indices (or ambiguities for short) of the membership and the non-membership are defined as

    where f:[0, w c ]→[0, 1] is monotonic and non-decreasing and satisfy the condition f(0)=0, and g:[u c , 1]→[0, 1] is monotonic and non-increasing and satisfy the condition g(1)=0.

    The value indices are related to the concept of centroids of the membership and non-membership functions and the ambiguity indices can be seen as the global spreads of the membership and non-membership functions (Li, 2014).

Definition 7

  • (Li, 2014): Let a be an intuitionistic fuzzy number as in Definition 2 and let V μ (a), V ν (a), A μ (a) and A ν (a) be the value indices and ambiguity indices of a. Moreover, let 0⩽λ⩽1.

    The λ-weighted value index V λ (a) and the λ-weighted ambiguity index A λ (a) of a are defined as

    The parameter λ can be used to indicate preferences between the values of the membership and non-membership functions. This can also be seen as a preference between certainty and uncertainty. Hence, if λ<1/2, then uncertainty is preferred, if λ>1/2, then certainty is preferred and if λ=1/2, then certainty and uncertainty are equally preferred. For this paper, we let λ=0.5.

    The ranking of two intuitionistic fuzzy numbers a and b can be determined using λ-weighted values and λ-weighted ambiguities as follows:

    • if V λ (a)>V λ (b) then a>b

    • if V λ (a)<V λ (b) then a<b

    • if V λ (a)=V λ (b)∧A λ (a)<A λ (b) then a>b

    • if V λ (a)=V λ (b)∧A λ (a)>A λ (b) then b>a

    • if V λ (a)=V λ (b)∧A λ (a)=A λ (b) then a=b

Definition 8

  • (Li, 2014): Let a=〈(a 1, a 2, a 3, a 4), w a , u a 〉 be a TrIFN and let , such that 0⩽αw a and u a β⩽1. Then

    and

    If a is a TIFN with a 1<a 2=a 3<a 4, then the formulas can also be applied.

Definition 9

  • Let a=〈(a 1, a 2, a 3, a 4), w a , u a 〉 be a TrIFN and let 0⩽αw a and u a β⩽1. Moreover, let f(α)=α/w a and g(β)=(1−β)/(1−u a ). Then

    Note that if a is a TIFN with a 1<a 2=a 3<a 4, then it can be shown that the formulas also hold. For this paper, value and ambiguity indices will be based on the formulas from Definition 9.

Definition 10

  • (Li and Yang, 2013): Let a=〈(a 1, a 2, a 3, a 4),w a , u a 〉 be a TrIFN and let 0⩽αw a and u a β⩽1. Moreover, let V λ (a) and A λ (a) be the corresponding λ-weighted value and ambiguity index as in Definition 7. Then the λ-weighted difference index D λ (a) is defined as

    The ranking of two intuitionistic fuzzy numbers a and b is determined using λ-weighted difference indices as follows:

    • if D λ (a)>D λ (b) then a>b

    • if D λ (a)<D λ (b) then a<b

    • if D λ (a)=D λ (b) then a=b

Definition 11

  • If a=〈(a 1, a 2, a 3, a 4), w a , u a 〉 is one of the degenerate intuitionistic fuzzy numbers from Definition 4, then we define

    and

    and

Appendix C:

Data for the case study

Table C1

Table C1 Fuzzy decision matrix

Table C2

Table C2 Fuzzy characteristic actions

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Govindan, K., Jepsen, M. Supplier risk assessment based on trapezoidal intuitionistic fuzzy numbers and ELECTRE TRI-C: a case illustration involving service suppliers. J Oper Res Soc 67, 339–376 (2016). https://doi.org/10.1057/jors.2015.51

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/jors.2015.51

Keywords

Navigation