Next Article in Journal
Transition Modeling for Low Pressure Turbines Using Computational Fluid Dynamics Driven Machine Learning
Next Article in Special Issue
Toward Low-Carbon European Union Society: Young Poles’ Perception of Climate Neutrality
Previous Article in Journal
Identification of Market Gap as a Chance for Enterprise Development—Example of Polish Raw Materials Industry
Previous Article in Special Issue
Strategic Analysis of Energy Security. Methodological Aspects of the Scenario Approach
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Tactical Risk Assessment Method for Resilient Fuel Supply Chains for a Military Peacekeeping Operation

by
Jacek Ryczyński
1,* and
Agnieszka A. Tubis
2
1
Faculty of Security Sciences, Institute of Safety Engineering, Tadeusz Kosciuszko Military University of Land Forces (MULF), Czajkowskiego Street 109, 51-147 Wroclaw, Poland
2
Department of Technical Systems Operation and Maintenance, Faculty of Mechanical Engineering, Wroclaw University of Science and Technology, Wyspianskiego Street 27, 50-370 Wroclaw, Poland
*
Author to whom correspondence should be addressed.
Energies 2021, 14(15), 4679; https://doi.org/10.3390/en14154679
Submission received: 28 June 2021 / Revised: 23 July 2021 / Accepted: 28 July 2021 / Published: 1 August 2021
(This article belongs to the Special Issue Energy Security - Sociological and Technical Aspects and Innovations)

Abstract

:
The article focuses on research on the functioning of liquid fuel supply chains, supplying troops carrying out peacekeeping and stabilisation operations in a foreign territory. Timely and complete supplies of fuels in war conditions determine the achievement of the assumed goals of a military operation. They often determine the health and life of soldiers. For this reason, the role of building the resilience of supply chains to disruptions, the type and frequency of which is entirely different from the undesirable events occurring in civil goods flows, is increasing. Therefore, the critical concept supporting building the resilience of fuel supply chains is risk management in these chains. The authors have developed a risk analysis method that integrates the Kaplan and Garrick approach and the fuzzy theory. The analysis identifies the existing disturbances and assigns them to the individual phases of the supply process. To illustrate the applicability of the proposed method, the authors analyse nine scenarios for the three most important stages of the procurement process in terms of building the resilience of the entire chain: Planning, delivery and storage. The fuzzy theory estimates the risk level for the analysed scenarios of adverse events. The proposed method is universal. It can be implemented to analyse the resistance of supply chains of other materials. It can also support the decision-making process for those responsible for planning, organisation and proper functioning of supply systems in all high-risk conditions, not only in the zone of war and stabilisation operations.

1. Introduction

The development of global supply chains and the increasing volatility of the environment require companies to adjust their standards in the area of the applicable logistics service. If they want to maintain the continuity of supplies in their material flows, then apart from cost optimisation, building the system’s resilience to disruptions becomes an important aspect. For this reason, the study of resilience in functioning chains is an important research topic today, which is interested not only in the scientific community and industry. The importance of this area issues may be confirmed, e.g., by the Supply Chain Resilience Reports, which have been published since 2009 (see: www.thebci.org, accessed on 15 May 2021). These reports inform about the level, range and cost of disruptions that organisations face and demonstrate how a disturbance in one organisation can spread out over the entire supply chain [1]. At the same time, it observed that many companies, such as Boeing, Cisco, Coca-Cola and Proctor and Gamble, are working with organisations across their supply chains to create resilience [2]. It is necessary to identify them and assess the related risks to prepare the process for the occurrence and effects of potential disruption. For this reason, risk management in the supply chain becomes the most crucial element in building the resilience of these systems.
The resilience of supply chains is critical in supplying selected products for the army, which carries out specific military missions in a foreign territory. The role of timely and complete deliveries, in this case, has a different meaning with the functioning of civil supply chains. In the case of deliveries carried out on the industrial or consumer market, the lack of high resilience to disruptions will affect the level of logistics services offered. The result of failure to deliver products by the adopted standards will be costs related to contractual penalties or fees of lost sales. In the case of military supply chains, the lack of timely and complete delivery of products, such as fuel or weapons, may endanger the lives and health of the mission participants. For this reason, the construction of delivery resilience is of particular importance in military procurement processes.
As presented in the second point of the article, there are numerous publications in the literature on the safety and resilience of supply chains and risk management for building this resilience. However, there are no publications on risk assessment in military supply chains responsible for supplying the army with strategic products necessary to implement the mission. Searching the databases of journals according to the key “army + resilience + supply chain”, “resilience + military + supply chain” returns only one publication. In contrast, the search according to the words “risk + military + supply chain”, “army + risk + supply” chain “returns only individual publications related to this topic. Therefore, it concluded that the scope of the research presented in this article fills the identified research gap, what is the lack of publications on risk assessment for the operation of chains supplying military missions.
The article aims to present the method of tactical risk assessment to build the resilience of military fuel supply chains for the military peacekeeping operation. The novelty of the proposed approach is the identification of scenarios of adverse events occurring in the supply of fuel for military operations and the assessment of the risk of their occurrence at the level of tactical management. The risk analysis model was built based on the fuzzy inference system, and the fuzzy rules were created based on the knowledge of NATO experts. The proposed approach was verified on the example of the ISAF (International Security Assistance Force) mission in Afghanistan. Following this, the main contribution of this study is that:
  • Identify the gap in research on tactical risk assessment in supply chains to supply military operations and use the assessment results to build supply chain resilience.
  • Identification of adverse events at the tactical level occurring in supply chains that deliver products for military missions. The identified scenarios include adverse events specific to fuel supply chains and the specificity of servicing military missions.
  • Development of a tactical risk assessment method for fuel supply chains based on a fuzzy inference system. Defining and measuring the probability and consequences of the assessed scenarios based on a survey of experienced NATO experts.
  • Verification of the proposed approach on the example of a selected military mission.
Therefore, apart from the Introduction section, the article structure includes reviewing the literature in supply chain risk management and resilience supply chain in Section 2. Next, a proposed model of tactical risk assessment method for military supply chains. In Section 4, the research area and characteristics of military fuel supply chains are characterised. Section 5 presents results and their interpretation. Section 6 discusses the applicability of the proposed method and its limitations. Finally, Section 7 provides conclusions and suggestions for the authors’ future research works.

2. Literature Review

The results presented in the article require the presentation of basic research concepts, which are considered when preparing the research methodology. For this reason, based on the literature review, there were the base characteristics of the analysed research areas designed.

2.1. Supply Chain Resilience

We are currently observing an intensive development of the concept of resilience. It is the subject of analysis in many research areas, such as engineering, social sciences and economics [3]. Resilience is defined in the literature as returning to its original operational state or moving to a more desirable state after being [2]. This concept is also developed in assessing the functioning of logistics systems, including supply chain management. The most cited approach to the resilience of delivery systems is the definition of Christopher & Peck [4], who defined it as the ability of a supply chain to return to normal operating performance, within an acceptable period, after being disturbed. Noteworthy is also the approach taken by Ponomarov and Holcomb [5]. They have defined resilience as the adaptive capability of the supply chain to prepare for unexpected events, respond to disruptions, and recover from them by maintaining continuity of operations at the desired level of connectedness and control over structure and function. It should be clarified that by the term “supply chain disruption”, we shall understand any interruption in material flow [6]. These disruptions generate a certain level of turbulence [7] and uncertainty in the supply chain [8], which together hurt the current operations [9].
The primary sources of disruption include [10]:
  • Terrorist incidents;
  • Accidents, like the fire of supplier’s factory;
  • Operational difficulties, connected, e.g., with variability in supply, demand uncertainties, price variability;
  • Natural disasters, such as earthquakes, cyclones, epidemics.
In their research, Sheffi and Rice emphasise that the nature of the disruption and the dynamics of the company’s response can be characterised by the eight phases [11]: (1) Preparation, (2) disruptive event, (3) first response, (4) initial impact, (5) full impact, (6) recovery preparations, (7) recovery, (8) long-term impact. The highlighted phases are shown in Figure 1.
In line with the approach presented by Sheffi and Rice [11], the greater the system’s resilience, the shorter the recovery time and the lower the impact on the implementation of logistics operations. Therefore, increasing the resilience of supply chains should be seen as a positive phenomenon [12]. For this reason, many authors focus their research on providing guidelines for strengthening the resilience of enterprises in supply chains (e.g., [13,14].
Numerous publications from the last decade also confirm the importance of building and assessing the resilience of supply chains. The purpose is to review the literature in each area. The most important of them include [15,16,17]. However, published reviews of the literature mainly cover industrial supply chains. Meanwhile, the resilience of supply chains is of particular importance in logistics systems supplying military operations. The importance attributed to resistance to these chains is unique, as the lack of timely and complete deliveries of specific product groups determines the success of the military operation and the life and health of its participants.
The conducted review of publications available in civilian journal databases resulted in one publication on the resistance of military supply chains. This research proposes a “Parallel Model” as a new Military Supply Chain structure and simulates its performance in wartime resilience [18]. Meanwhile, the subject of military supply chains can be considered from the perspective of developing the concept of building the resilience of systems supporting material flows, considering the specificity of this sector. Therefore, this research area can be considered as a research gap.

2.2. Supply Chain Risk Management

An essential element of building the supply chain’s resilience is implementing a risk assessment and management system. Resilience must be strengthened by tools and procedures that will allow enterprises to return to the standard or desired logistics processes in the shortest possible time. The scope of applied solutions is developed as part of risk management and corresponds to identifying and analysing adverse events.
We can find various definitions of risk in the literature. Noteworthy is the literature review prepared by Aven [19]. Due to the diversity of approaches presented in the literature, it is worth referring to the definition described in the ISO31000: 2018 standard. In line with the proposed method, risk is defined as the effect of uncertainty on objectives [20]. However, according to the definition adopted in this way, risk can be perceived in both a negative and a positive aspect. Thanks to this, it is possible to identify two main trends in risk analysis [21]:
  • Approach 1—identifying the risk through the prism of the occurrence of adverse events;
  • Approach 2—interpreting risk as events affecting negative (disruptions) and positive (opportunities).
In the conducted research, we adopted approach 1, as it is consistent with the guidelines described in the military documentation and corresponds to the specificity of military operations. It is also a dominant approach in many scientific studies. As the analyses presented in [22] show, most articles on risk management focus on measuring the effectiveness of various risk management systems, examining only the effectiveness of risk management in the area of protection against adverse events.
Risk is a measurable phenomenon [23], and therefore, it can be described by quantitative parameters. It is most often expressed as the product of the probability of its occurrence and its effects. However, some assessment methods also add other risk assessment parameters (e.g., FMEA analysis).
There are three basic risk management strategies [24,25]: (1) Risk communication strategy; (2) risk prevention/reduction strategy; (3) discursive strategy. However, as Aven [19] notes, the appropriate approach to risk management is a mixture of all three strategies in most cases. The structure of the risk management process is described in detail in ISO 31000: 2018 [20]. It assumes three main stages of the procedure: (1) Establishing the context, (2) risk assessment (which consists of three steps: Risk identification, analysis and evaluation), (3) risk management. These three stages of the procedure are continuously accompanied by two supporting processes: (1) Communication and consultation and (2) monitoring and review. The method prepared by us will consider the analytical approach recommended by the ISO standard.
Risk management is a fundamental issue in the operation of complex systems, such as supply chains. For this reason, the Supply Chain Risk Management (SCRM) concept was developed for their management. However, as Sodhi et al. [26] note, currently, there is no single standard definition for determining the concept of supply chain risk or Supply Chain Risk Management. In the prepared literature review, Ho et al. [27] presented the definitions of various authors presented over the last 20 years. According to supply chain risk, they prepared an illustration of the likelihood and impact of unexpected macro and/or micro-level events or conditions that adversely influence any part of a supply chain leading to operational, tactical, or strategic level failures or irregularities [27].
Based on the literature review, most authors classify risks in supply chains and divide them into internal and external threats. Examples of classifications proposed by selected authors are shoved in Table 1.
Ho et al. distinguished seven areas of assessment under SCRM based on their research. These are [27]: (1) Macro risk assessment; (2) demand risk assessment; (3) manufacturing risk assessment; (4) supply risk assessment; (5) financial risk assessment; (6) information risk assessment; (7) general risk assessment. The following events can be included in the most frequently assessed scenarios [31,32]:
  • Warehousing and production interruption;
  • Low integration between intermediate and final-product suppliers;
  • Lack of information transparency;
  • Damages in transport;
  • No transport solution alternatives;
  • Unplanned machine stoppages;
  • Serious forecasting errors;
  • Poor quality of raw material.
These are areas dedicated to civil supply chains, but they were the starting point for our research. Of course, they supplemented with the specifics of military delivery processes.
Both quantitative, qualitative and hybrid methods are used to assess the risk [33]. Qualitative techniques are primarily used for risk identification and risk analysis steps [34]. Quantitative methods are based on analytical and simulation models and are used in the risk assessment stage. Research on applying analytical optimisation models for analysing supply disruptions and selecting the optimal mitigation strategies is presented, among other things, in [35,36]. Researchers are currently watching an increasing trend in using simulation techniques for supply chain design, management and risk analysis, due to its modelling flexibility [34].
Additionally, simulation can be an effective tool for visualising supply chain risks. Hence, its increasingly widespread use. Simulation models were used for risk assessment in the following publications [37,38,39]. Hybrid models combine quantitative and qualitative techniques. They are used in situations with high uncertainty or in the absence of complete quantitative data on the assessed phenomenon/event [34]. The most common tools used for the hybrid modelling of risks in supply chains are: AHP [40,41], fuzzy logic [34,42] and cluster analysis [43]. In the research procedure proposed by us, the concept of fuzzy logic was applied. Its use is justified in the proposed risk assessment method for military supply chains, due to the lack of access to reliable historical data.

2.3. Fuzzy Theory in Risk Assessment

In the proposed assessment model, we used fuzzy set theory to estimate the probability measures and the occurrence of each of the analysed scenarios. The fuzzy set theory was developed in 1965 by Zadeh [44], who dedicated it to support the analysis of challenging and complex problems. According to [45], the researcher should use this method in a situation where vague phenomenon (vague relations in modelling the issues), information vagueness and heuristic algorithms. Then, one may use linguistic variables when assessing qualitatively or give intervals instead of exact crisp values in evaluating the data quantitatively [46].
Fuzzy logic is implemented through a “fuzzy inference system” (FIS) [47]. A FIS is a nonlinear procedure that derives its output based on fuzzy reasoning and a set of IF-THEN rules. The strength of FIS relies on their twofold identity [48]: (1) It can handle linguistic concepts; (2) it is a universal approximator able to perform nonlinear mappings between inputs and outputs. Novak [49] presented a procedure involving three basic steps:
  • Define and measure the likelihood of occurrence and severity of the risk in verbal opinions and transform them into fuzzy numbers accordingly.
  • Define the fuzzy inference to connect input and output parameters using fuzzy IF-THEN rules and “fuzzy arithmetic operators”.
  • Defuzzification of the fuzzy outcomes into numerical values using appropriate quantifiers.
It should also be noted that, based on literature review in the area of fuzzy logic implementation, Guillaume [48] distinguished two kinds of FIS: (1) Fuzzy expert systems or fuzzy controllers—fuzzy rules built on expert knowledge. This kind of FIS uses fuzzy logic to model natural language; and (2) Automatic learning from data—neural networks have become the most popular tool using a numerical performance index, typically based on the mean square error. Their accuracy distinguishes these kinds of development, and their main drawback is their “black-box” approach. We used the first type of FIS in the proposed model because fuzzy expert systems provide an easy way to deal with situations involving fuzzy sets, both linear and uncertain properties [50]. The results are based on expert judgment, quality assessment, causal relationships and impact analysis in these proceedings. [51]. At the same time, Fakhravar [52] notes that any fuzzy expert system should have three essential components: Fuzzy membership function, fuzzy rules and fuzzy inference mechanism. We used the Mamdani inference because it is an improved, more general method and well-accepted in the fuzzy expert system [53].
Fuzzy methods are currently widely used in various research and models supporting decision-making processes. In the literature, its implementations can be found in decision support methods, such as AHP fuzzy [54], TOPSIS fuzzy [55] and many others. Fuzzy set theory is also prevalent in risk assessment models. Its implementations concerning the estimation of the size of the occurring risks appear, among other things, in the area of cybersecurity [46]; gas and dust explosion risk [56], but also supply chain risk assessment [37,42].
The fuzzy set theory has gained popularity as it provides the opportunity to use numerical and qualitative approaches to improve decision analysis in uncertainty. However, as Fakhravar [52] notes, the coding of linguistic expression, its quantitative aggregation process, choice of relationships for data, and computational methods are identified as complex problems. Greavery et al. [57] underline in their results that the validation technique of fuzzy-based decision analysis is also neglected in studies. However, this research stage is critical from the perspective of practical implementations of the developed models. Choi and Mahadevan [58] also note that fuzzy-based risk assessment models do not provide realistic risk assessment. Sometimes, avoiding complex risk makes it impossible for experts to capture all possible risk scenarios when making risk assessment judgments.

3. Fuzzy-Based Risk Assessment Method for Military Supply Chain

The subject of the assessment is the risk of adverse events occurring at the level of tactical supply chain management. Therefore, the authors describe risk by the Kaplan and Garrick approach, which is defined as follows [59]:
R = { S i ,   P i ,   C i } ,                   i = 1 ,   2 ,   ,   N
where: R—risk; {}—must be interpreted as a “set of”; S—a scenario (undesirable event) description; P—the probability of a scenario; C—the measure of consequences or damage caused by a scenario; N—the number of possible scenarios.
The formulation of the stages of the procedure in the risk assessment method was based on the guidelines defined in ISO 31000: 2018 [20]. Thanks to this, the proposed approach meets the quality standards indicated for risk management systems in modern organisations. The model also takes into account the assumptions defined in NATO’s internal documentation [60].
The proposed method of risk assessment is qualitative and quantitative. Following the guidelines of ISO 31000: 2018, it includes three main phases of the analytical procedure related to the identification, analysis, and evaluation of risk in processes. The detailed research procedure is presented in Figure 2.
The first stage of the proposed method aims to identify the scenarios describing the potential adverse events at the tactical level of securing the continuity of fuel supplies for the mission. According to the guidelines [61], a hazard can be defined as conditions with the potential of causing injury to personnel, damage to equipment, loss of material, or lessening the ability to perform a task or mission. The most probable hazards are those created by readiness shortcomings in the operational environment. Selected analytical tools described, among others in ISO 31000:2018, were used in the identification process. An important issue at this stage is preparing an analysis considering the process approach used in research on supply chains. It allows for identifying inputs and outputs for individual steps of the process, the relations between separate operations and the required resources (physical and nonphysical assets) needed for their implementation. The process analysis will determine the existing limitations of the logistics system and potential disruptions in the performance of goods flow. Used it, it will be possible to describe the characteristics of conceivable scenarios with the highest frequency of occurrence. The detailed qualitative procedure is presented in Section 3.1.
The next stage of the procedure includes estimating the probability and effects of each of the analysed scenarios. The frequency of undesirable events occurring during military missions in a foreign territory is characterised by statistical nonrepeatability. In addition, information about them appears only in military reports and is not always the subject of quantitative analyses—rather, cause-effect analyses. The lack of detailed historical data makes it impossible for analysts to estimate the actual probability and the potential effects of the analysed scenarios. For this reason, the described method proposes the estimation of both parameters by selected NATO experts, using the fuzzy logic concept. The analytical procedure is presented in Section 3.2.
The final step in the proposed method is to evaluate the risk and make decisions about future actions. In this case, the primary purpose of using the analysis results is to ensure the required liquidity of supplies and high fuel availability during the mission. Its lack may determine the level of the mission’s goal achievement and the safety of its participants. Possible directions of activities are presented in Section 3.3.

3.1. Qualitative Analysis

The adverse event scenarios were identified based on the analysis of previous military missions carried out in Afghanistan. First, three basic logistics processes were distinguished within the supply chain supplying military missions with fuel. They are (1) the planning process, (2) the delivery process, and (3) the storage process. The process structure defined in this way has become the starting point for describing the scenarios of undesirable events. The qualitative what-if technique was used to identify adverse events and the studies conducted among selected participants of previous missions. On this basis, nine scenarios are distinguished, which are described in Table 2.
According to the adopted process approach, each of the above scenarios is assigned to the appropriate phase of the logistics service of fuel supplies. These relations are presented in Figure 3.
At the same time, it noted that individual scenarios could also be grouped according to the reason for their occurrence. The analysis of the nine described scenarios distinguishes the following sources of hazards: Information flow, infrastructure, human factor, participation of third parties, organisation of the process. On this basis, an additional classification of events can be performed, which is presented in Figure 4.
Identification of the source of the analysed scenario is crucial for further risk management decisions. The remedial proceedings undertaken may be related to prevention or only to reduce the effects. The choice of the procedure depends on the level of influence (control) over the hazards. The critical task here is to identify those scenarios whose source of hazard is specific only to military missions.

3.2. Qualitative Analysis—Assessment of Risk Score

To estimate each scenario’s probability and effects, direct interviews were conducted with a group of NATO experts who were directly involved in the planning, organisation, and supervision of the proper functioning of the fuel supply chains in Afghanistan. Linguistic variables were used to express the opinions of experts on both assessed parameters. Then these variables were modelled using the fuzzy set theory. According to this theory, the risk parameters of each scenario, consequences and the risk level are treated as a fuzzy number (FN) and the associated membership function (MF). Membership functions can take various shapes. Shape selection for some fuzzy set (linguistic attribute/value) is subjective and depends on the problem. The presented risk assessment method proposed using a triangular MF (probability and consequences of scenario) and trapezoidal MF (level of risk).
A triangular FN is presented by a triplet Az = (a, b, c), and its MF is given by (2):
μ z ( x ) = { 0       for   x < a x a b a         for   a x b c x c b         for   b x c 0       for   x > c
The MF parameters meaning is straightforward—a and c are the lower and upper bounds of fuzzy number Az, respectively, and b is the modal value of fuzzy number Az. Following the up notations, a trapezoidal FN defined as Az = (a, b, c, d) has its MF given by (3):
μ z ( x ) = { 0                                 for   x < a x a b a         for   a x b 1                         for   b x   c d x d c         for   c x d 0                                   for   x > d
The linguistic variables of chosen membership functions are presented in Table 3 (probability) and Table 4 (consequences). The output variables for the risk level are given in Table 5.
To perform aggregation operations to obtain the risk level, it is necessary to use expert opinion. One of the methods [62] is the use of the arithmetic mean aggregation operator. The aggregation represent operator, defined on triangular FN (a1, b1, c1), (a2, b2, c2) … (an, bn, cn), where n is a number of experts, delivers the result as (x, y, z) according to the formulae:
{ x = 1 n k = 0 n a k y = 1 n k = 0 n b k z = 1 n k = 0 n z k
The individual stages of this phase are aimed at risk quantification. This process is based on the use of the Mamdani fuzzy model [63]. The Mamdani fuzzy interference mechanism is based on the method proposed by Zadeh [44]. According to this rule, the elements of the Mamdani fuzzy model are four modules: Fuzzification, Knowledge base, Fuzzy Interference System and Defuzzification [64]. Figure 5 shows a diagram of the implemented Mamdani fuzzy model in the defined research area.
From the beginning of Section 3.2, we know that the fuzzification process is based on triangular FNs. The triangular FN transforms linguistic scales in the 0–1 range by using its MF.
The system’s task is to map the fuzzy inputs and control the outputs using the fuzzy set theory. Due to the use of the Mamdani model, FIS relied on the implementation of the MIN and MAX operators. The MIN operator is used in combination and implication operations. In comparison, MAX is used to fuzzy aggregate results [65]. The composition of MIN-MAX is shown in Figure 6.
The last stage of the proposed model is the process of defuzzification. Its purpose is to convert the fuzzy output into a crisp output signal. Thus, the method of defuzzification of the centroid of area, following the research results given, for example, in [66,67]. The output value is determined by the Equation [64]:
Centroid   of   area ,   z * =   μ A ( z ) × dz   μ A ( z ) dz
where: z*—defuzzified output; μ A ( z ) —the aggregated output MF; z—the universe of discourse.
The effect of defuzzification is a clear output value entering the output phase.

3.3. Overall Scenario Risk Level Assessment

The risk evaluation stage is the last step in the proposed tactical risk assessment method, following the ISO 31000: 2018 standard. It is necessary to define the level of acceptance for the estimated risk amounts in the evaluation process. Policymakers can subjectively determine this level, and, as research shows, it may depend on many factors, such as age, gender, character and education [21]. The values of the estimated risk for individual scenarios are compiled with the adopted level of acceptance, and on this basis, future actions related to risk management are determined. This stage is crucial because of the conducted procedure; priority is given to activities. As a result, the necessary solutions implemented that increase the security of mission implementation and the resistance of the supply chain to adverse events.
A critical issue for the performance of the mission is the implementation of risk reduction measures for scenarios where the current indicator is not acceptable. Actions taken by the mission command should be aimed at reducing risk through:
  • Limiting the likelihood of the scenario occurrence—taking protective/predictive actions, connected with, e.g., introducing systems/procedures securing external access to the mission’s resources, techniques for monitoring fuel supplies and fuel storage systems, employee training;
  • Minimising the scenario occurrence effects—building rapid response systems to adverse events (resilience aspects).
For scenarios where the current risk indicator is at the acceptance level, no reduction measures are usually taken. However, this does not exclude the need to constantly monitor its class in terms of changes in the size of any of the parameters. If the increase of one of the parameters causes the risk indicator to exceed the acceptance level, the command should take immediate actions to reduce it.

3.4. Application of the Proposed Approach

In the first step of building a fuzzy model, the input parameters must be fuzzy. The next step is to transform expert linguistic assessments into appropriate numbers of fuzzy sets. In the constructed Matlab Mamdani model, the input variables are the probability and consequences of selected scenarios, and the output variable is the risk level for the scenario. Membership functions (triangular and trapezoidal) used in the analysed case study to represent the linguistic scales of the input and output parameters are shown in Figure 7 (according to Table 2, Table 3 and Table 4).
The final phase of building the risk assessment model includes formulating IF-THEN rules to calculate the risk level. According to the expert knowledge in the safe operation of fuel supply chains, 25 rules were proposed, as shown in Table 6.
The fuzzy inference engine analyses all user-defined fuzzy rules in the rule base, and the results of these rules are interpreted using the Mamdani algorithm (Figure 8). To obtain the final value of the risk level from the constructed FIS, Equation (3) is used to defuse the fuzzy set.

4. Characteristics of the Research Area

The area of research is related to the functioning of supply chains supplying military missions carried out in a foreign territory. Such chains provide a wide range of essential products necessary for maintaining the army and carrying out assigned tasks—e.g., food, water, medical supplies, fuel, spare parts. Therefore, timely and complete deliveries determine the achievement of the assumed mission objectives and often determine the health and life of soldiers. For this reason, the role of building the resilience of supply chains to disruptions, the type and frequency of which is entirely different from the adverse events occurring in civil goods flows, is increasing.
The proposed risk assessment method was validated against the ISAF (International Security Assistance Force) operation in Afghanistan. The specificity of the war in Afghanistan was using one type of fuel (with various additives) to supply engines, regardless of the type of engine (diesel engines, spark-ignition engines, turbojet engines). This concept is called “the concept of Single Fuel Policy”. Therefore, fuel was the most sensitive part of the entire chain. Additionally, Afghanistan has no oil refinery; therefore, 100% of the fuel is imported. This fact forced additional measures to increase the reliability of fuel supply chains.
NATO forces have begun efforts to build resilience in critical supply chains. Therefore, a logistic fuel supply network developed at a strategic level based on the diversification of supply sources.
DLA Energy became the leading organisation responsible for the supply. DLA is an agency of the US Department of Defense (DoD) and reports to the Secretary of Defense. DLA is the leading supplier of consumables and logistics for DoD. It provides the armed forces with food, supplies, equipment and fuel. DLA Energy is a field activity of DLA, whose task is to provide effective and efficient energy solutions. DLA Energy manages the oil supply chain from the source of supply to the customer’s collection point. As an integrated fuel manager, DLA Energy’s responsibilities include the consolidation and review of bulk oil requirements, procurement, financing, budgeting, storage and designated distribution of crude oil to meet the commander’s operational needs. DLA Energy has contracted several Pakistan and Central Asia companies to complete the service requirements, including Red Star Enterprises Limited and Supreme Fuels Trading FZE [68]. Contractors were required to supply fuel to the main fuel hubs in Afghanistan, from which they would further distribute fuel to military units in fuel tanks. DLA Energy began to award contracts covering the entire supply chain, and ISAF forces began to rely more and more on contractors who went beyond the main fuel hubs and supplied fuel directly to end-users.
However, the beginnings of the missions conducted in Afghanistan proved that the supplies carried out by military supply chains do not ensure the required fuel availability, which should be in line with the reported demand. For this reason, the ISAF Operational Command in Europe, together with Brunssum’s Joint Force Command (JFC HQ), developed the concept of agreements to provide commercial fuel support to NATO ISAF members. These agreements are commonly known as NATO Fuel Basic Ordering Agreement or, in short, Basic Ordering Agreement (BOA). BOA was a unique solution that allowed NATO to provide fuel support to ISAF member states that could not independently provide fuel support to their fighting forces without financial support from NATO’s joint budgets [69]. BOA was not a single contract. Instead, it was a series of commercial fuel support agreements granted by acquiring and contracting companies from NATO member states. Because NATO owned and managed the BOA fuel supply chain, it acted as an intermediary between ISAF members and contractors. At any time, a member country could decide whether to use BOA fuel services. Individual countries paid for fuel only when contractors provided services or delivered fuel to designated locations. ISAF members did not incur any additional costs and paid for the fuel supplied. The contractors selected under BOA helped in many cases to provide complete logistics services, such as strategic fuel acquisition, management and operation of domestic fuel infrastructure, organisation of local fuel storage systems, internal distribution systems and delivery to the end-user (aircraft, generator, vehicle, the base of operations).
Although BOAs ensure full fuel distribution, not all customers choose to use these services. Similarly, BOA cannot operate in specific locations, such as RC East, because it is outside the BOA’s area of responsibility. To ensure fuel supplies throughout Afghanistan, the NATO Support Agency (NSPA) and US Sustainable Command Afghanistan (JSC-A) have developed contract transport solutions. NSPA provides a NATO mass transport contract managed by the commercial company XeLES. The system is very similar to the US Universal Purchase Agreement. Instead of contacting the supplier directly, however, NSPA instructs XeLES to mediate in obtaining offers from various transport subcontractors. In addition to NSPA, JSC-A is the second element involved in contracted transport. However, JSC-A focuses on a concept at the national and regional level that legally restricts competition for Afghan companies. National Afghan Trucking Agreements provide transport services throughout Afghanistan and use private security companies, Afghan public security forces, or US government security services to protect shipments. The Afghan Transport Network (ATN) contracts are a typical US collective purchase agreement because they meet the repetitive needs of supplies or services. ATN is headquartered and uses local Afghan leaders to provide secure transport support. JSC-A sets the concessions and penalties for the contractor for nondelivery, delay, contaminated shipments, excessive parking times and lost fuel in fuel supplies. Contracting Officer Technical Representatives supervise ATN contracts.
The creation of additional support for supplying the mission with fuel through deliveries in the BOA and contract transport solutions systems contributed to an increase in the resilience of the analysed supply chain to the occurring disruptions and limitations in supplies at the strategic level. However, due to the specific supply environment of Afghanistan, the ongoing war, the proper functioning of the fuel supply chain was a challenging operation, an operation at high risk on a tactical level. Therefore, a need identified to develop a tactical risk assessment method for supply chains supporting the flows of critical products for military missions.

5. Results

The proposed tactical risk assessment method was implemented for ad post-analysis of a selected military operation in Afghanistan. The conducted analytical procedure made it possible to verify the correctness of the adopted assumptions and the developed evaluation model. The proposed approach makes it possible to translate the knowledge and experience of the military command into the language of linguistic variables that describes the assessed scenarios.
The data used in the case study section was obtained during face-to-face expert interviews with senior NATO officials who are directly responsible for the organisation of the fuel supply chain in Afghanistan. The selection of experts was not random—the critical factor was experience measured in months of direct service under ISAF—the shortest internship was 17 months, the longest 39 months. In addition, the authors made sure that the experts represented both officers working directly at the ISAF Headquarters and the so-called liaisons officers of the national components of the coalition states that make up the ISAF. The obtained responses were convergent and were averaged—however, it should emphasise that they were always within the same blur intervals. A detailed analysis was carried out in a response that differs significantly from the others, whether it is an unexpected situation or an essential component of the model that the authors did not consider. In such a situation, each time, it turned out that we are dealing with a single incident resulting from the specificity of operations in the area covered by the war and rejected such a response.
Complete results obtained in the mission evaluation process are presented in Table 7, Figure 9 and Figure 10.
Figure 9 show the resultant values of preliminarily estimated: The probability of assessed adverse event scenarios and their consequences, which have been calculated based on the knowledge of NATO experts. The assessment of consequences was related to the possibility of complete and uninterrupted execution of the military operation and the safety of its participants. The lowest, orange-red part of the plot represents the resultant level of risk caused by low-frequency scenarios, with insignificant damage potential. The highest level, red-pink part of the plot represents catastrophic risks related to high-probability scenarios that may result in loss of ability to accomplish the mission. Events that will be assessed at such a high-risk level become scenarios of a critical nature, requiring immediate action, with a wide range of impact.
Figure 10 shows the influence of the course of the input functions on the obtained risk level at the output of the proposed model. When analysing the content of these charts, one should remember the specific properties of the Mamdani system implemented in Fuzzy Logic Designer in Matlab. For Mamdani systems, the output range depends on both the input and output MF ranges because both inputs and outputs are fuzzy sets. The MF ranges are defined by the “parameter” field of each MF. The output signal range should usually be chosen to include the minimum and maximum values of all output MF. A completely different situation occurs in Sugeno systems, where the output range is uniquely defined by the scope and type of input membership functions. Therefore, the selection of the input range does not affect the course of the surface. For Sugeno systems, this approach should be considered a limitation as the output data are not fuzzy sets.
In military operations, the most important are preventive measures to reduce adverse events with the highest risk level—i.e., those scenarios whose occurrence threatens the performance of the mission and the health and life of soldiers. At the same time, decision-making officers are characterised by the level of risk perception, which determines the greater propensity to undertake risk-bearing activities.
For this reason, the level of accepted risk is very high, and, according to experts’ assessment, it may be as high as RS = 70. Risk reduction actions are taken for scenarios with such a determined acceptance level, and the risk score is above 70 points. These will, therefore, be those adverse events that fall into the High (R5) and Medium-high (R4) categories, according to Table 5.
The lack of risk acceptance concerns the S1, S3, S4, S5 and S8 scenarios in the analysed case. Specific risk mitigation actions are taken immediately in the events described in the S3 and S5 scenarios. These are the events where the risk score reaches the maximum level (above 90 points). This means the necessity to undertake multidirectional actions to simultaneously reduce the probability of occurrence and limit the possible consequences. However, in the S1, S4 and S8 scenarios, appropriate preventive actions should be taken, significantly reducing the frequency of occurrence of the events described. The risk index for the S2, S6 and S9 scenarios, is at the acceptance level. However, their value is close to the acceptance threshold. For this reason, it is necessary to monitor the probability parameter of these events constantly. The increase in the frequency of their registration in prepared reports will require immediate actions to reduce the level of risk, primarily through preventive actions.

6. Discussion

The tactical risk assessment method presented in the article applied to fuel supply chains. This is reflected when identifying adverse event scenarios and later estimating the parameters of the risk involved. Due to the lack of complete and reliable historical data on adverse events in the assessed fuel chain, we implemented the fuzzy inference system (FIS) to estimate the risk. We chose it, among other reasons, because it is one of the most famous applications of fuzzy logic and fuzzy sets theory [48]. The proposed risk assessment model uses fuzzy rules built based on the knowledge of NATO experts. According to research by Guillaume [48], this kind of FIS offers a high semantic level and a good generalisation capability.
However, the FIS model used in the proposed method has some limitations. If the FIS model is based solely on expert knowledge, it may show insufficient measurement accuracy in complex systems. Therefore, if the researchers require a very accurate model, some other techniques are better (like Neural Nets, multilayer perceptions and radial basis functions). These techniques do not have the inconvenience that fuzzy has, e.g., the curse of dimensionality [70]. The critical issue, in this case, is also the selection of experts. The obtained results are highly dependent on the knowledge and experience of people participating in the study as experts. In the conducted research, the selection of experts was not random. The researchers were guided primarily by the experience and knowledge of experts in logistics services for military missions, particularly those carried out in Afghanistan. However, their readiness to cooperate in the research conducted was also not without significance. However, it should be noted that the selection of experts with different qualifications or experience (e.g., in other areas) could provide completely different results for the conducted assessment. For this reason, the process of selecting experts for research should be carried out with due diligence.
Proper selection of experts applies to each stage of the procedure carried out. Their qualifications and experience are essential to measuring the probability and effects of each of the analysed scenarios and identifying possible adverse events. The scenarios presented in the article were identified based on the knowledge of NATO experts on the research day. However, this collection cannot be considered closed. Each subsequent stage of the ongoing mission may provide new scenarios that should also be assessed. For this reason, the assessment procedure cannot be carried out once. However, it should be repeated periodically, and the results should be updated with new scenarios and the effects of the implemented preventive actions.
The results described above should become the basis for improving planning fuel supplies for the needs of military operations performed in the selected territory. By taking preventive actions and creating emergency scenarios, it will be possible to increase the resilience of military supply chains serving missions. The periodic risk analysis will identify those disruptions under the control of the army operations command and operators serving the supply chains. Thanks to this, it will be possible to make rational decisions aimed at mitigating the occurring risk. It is also possible to prepare contingency scenarios in advance by indicating critical events whose sources are independent of the organised military operation (natural disaster or terrorist incidents). This will shorten the reaction time of decision-makers and increase the flexibility of military supply chains. Thanks to such actions, the supply chain resilience to disruptions will be increased, and the security of the supported military operation will be improved.

7. Conclusions

NATO documents recommend preparing a risk assessment to implement military operations, particularly those carried out in areas affected by hostilities. Such analyses are organised regularly, but they usually concern the level of strategic management of supply chains. Meanwhile, such studies also need such studies at the tactical decisions regarding securing the continuity of supplies. Such risk analyses are mainly required for chains supplying critical products, such as food, fuel, or medical supplies. In these supply systems, the key is to build the resilience of supply chains not only at the strategic level and at the operational level. Meanwhile, the prepared literature review indicates a research gap for this area of analysis. Therefore, the article proposes a method of tactical risk assessment for the supply chain, which is responsible for coordinated deliveries to military units carrying out missions in a foreign territory.
The authors’ significant contribution is that the conducted research considered the specificity of both fuel supplies and the organisation of military operations. This was reflected in the identified adverse event scenarios and at the stage of estimating the probability and consequences of their occurrence. Thanks to the involvement of NATO experts in evaluating these values, unique research material was obtained based on specialist knowledge and experience that is difficult to obtain. Their participation made it possible to estimate the value of risk parameters reliably and evaluate each identified scenario using the fuzzy set theory. As a result, the obtained results may constitute a practical contribution to improving the preparation of future military operations. At the same time, it is possible to use the model to assess other scenarios of emerging new adverse events for the assessed supply chain. However, in recording quantitative data on the frequency and effects of the analysed adverse events in military reports, it would be possible to use other strictly quantitative assessment techniques, such as event trees, Petri nets, or Bayesian networks.
The authors can further develop the proposed tactical risk assessment method. One of the planned directions of further research work is the introduction of weights for experts’ opinions, which will depend on the experience of the expert. It is a method to strengthen the opinion of those experts who can demonstrate knowledge and expertise strategically and operational (e.g., higher weight for the views of experts participating in similar missions and similar environmental conditions). Thanks to the comparative analysis, the impact of the selection of experts on the obtained results of the risk analysis can be assessed.
The authors plan to implement the proposed method for other critical supply chains serving the supplies of military missions. Each military operation is unique and depends on many factors, both internal and external. Therefore, while the proposed assessment procedure is universal, the results obtained are specific for a given supply chain of a selected product. In the presented method, the adverse event scenarios assessed in the proposed way can be divided into two groups. The first group includes those adverse events that are characteristic of fuel supply chains. This group consists of the S4, S5, S6 and S7 scenarios. The second group of adverse events considers the specific conditions of implementing military missions in a foreign territory. These include scenarios S1, S2, S3, S8, S9. These scenarios can also be analysed when assessing logistics systems that also supply soldiers with other products. Therefore, in further research, it is necessary to estimate the risk of these scenarios and the conditions accompanying the logistical handling of different supply chains. It is also reasonable to supplement these scenarios with adverse events characteristic of the analysed group of products (e.g., food, clothing, weapons, drugs). Selected experts will assess all these scenarios with knowledge and experience handling the analysed supply chains for the assessed military missions. The envisaged direction for further research includes risk assessments for military supply chains at the tactical level.

Author Contributions

Conceptualisation, J.R. and A.A.T.; methodology, J.R. and A.A.T.; software, J.R.; validation, J.R. and A.A.T.; formal analysis, J.R. and A.A.T.; investigation, J.R. and A.A.T.; data curation, J.R.; writing—original draft preparation, A.A.T.; writing—review and editing, A.A.T.; visualisation, A.A.T.; funding acquisition, J.R. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author. The data are not publicly available due to the fact that the data are the property of the authors.

Conflicts of Interest

Authors declare no conflicts of interest.

References

  1. Nowakowski, T.; Scroubelos, G.; Tubis, A.; Werbińska-Wojciechowska, S.; Chlebus, M. Sustainable Supply Chains Versus Safety and Resilience. In Sustainable Logistics and Production in Industry 4.0. EcoProduction (Environmental Issues in Logistics and Manufacturing); Grzybowska, K., Awasthi, A., Sawhney, R., Eds.; Springer: Cham, Switzerland, 2020. [Google Scholar] [CrossRef]
  2. Brandon-Jones, E.; Squire, B.; Autry, C.W.; Petersen, K.J. A contingent resource-based perspective of supply chain resilience and robustness. J. Supply Chain. Manag. 2014, 50, 55–73. [Google Scholar] [CrossRef] [Green Version]
  3. Elleuch, H.; Dafaoui, E.; Elmhamedi, A.; Chabchoub, H. Resilience and vulnerability in supply chain: Literature review. IFAC-PapersOnLine 2016, 49, 1448–1453. [Google Scholar] [CrossRef]
  4. Christopher, M.; Peck, H. Building the resilient supply chain. Int. J. Logist. Manag. 2004, 15, 1–14. [Google Scholar] [CrossRef] [Green Version]
  5. Ponomorov, S.; Holcomb, M. Understanding the concept of supply chain resilience. Int. J. Logist. Manag. 2009, 20, 124–143. [Google Scholar] [CrossRef]
  6. Sapna Isotupa, K.P.; Kelly, M.; Kleffner, A. Building Resilient Supply Chains Using Supply Chain and Traditional Risk Management and Insurance Techniques. Available online: http://www.aria.org/drupal/sites/default/files/annual_meeting_docs/aria%20supply%20chain%20isotupa%20kelly%20kleffner%20Final.pdf. (accessed on 14 February 2014).
  7. Hamel, G.; Valikangas, L. The quest for resilience. Harv. Bus. Rev. 2003, 81, 52–63. [Google Scholar]
  8. van der Vorst, J.; Beulens, A. Identifying sources of uncertainty to generate supply chain redesign strategies. Int. J. Phys. Distrib. Logist. Manag. 2002, 32, 409–430. [Google Scholar] [CrossRef]
  9. Radhakrishnan, S.; Harris, B.; Kamarthi, S. Supply chain resiliency: A review. In Supply Chain Risk Management; Khojasteh, Y., Ed.; Springer Nature Singapore Pte Ltd.: Singapore, 2018; pp. 215–235. [Google Scholar] [CrossRef]
  10. Singhal, P.; Agarwal, G.; Lal Mittal, M. Supply chain risk management: Review, classification and future research directions. Int. J. Bus. Sci. Appl. Manag. 2011, 6, 15–42. [Google Scholar]
  11. Sheffi, Y.; Rice, J.B., Jr. A supply chain view of the resilient enterprise. MIT Sloan Manag. Rev. 2005, 47, 41–48. [Google Scholar]
  12. Blackhurst, J.; Dunn, K.S.; Craighead, C.W. An empirically derived framework of global supply resiliency. J. Bus. Logist. 2011, 32, 374–391. [Google Scholar] [CrossRef]
  13. Mensah, P.; Merkuryev, Y. Developing a Resilient Supply Chain. Procedia-Soc. Behav. Sci. 2014, 110, 309–319. [Google Scholar] [CrossRef] [Green Version]
  14. Mari, S.I.; Lee, Y.H.; Memon, M.S. Sustainable and Resilient Supply Chain Network Design under Disruption Risks. Sustainability 2014, 6, 6666–6686. [Google Scholar] [CrossRef] [Green Version]
  15. Francis, R.; Bekera, B. A metric and frameworks for resilience analysis of engineered and infrastructure systems. Reliab. Eng. Syst. Saf. 2014, 121, 90–103. [Google Scholar] [CrossRef]
  16. Hosseini, S.; Barker, K.; Ramirez-Marquez, J.E. A review of definitions and measures of system resilience. Reliab. Eng. Syst. Saf. 2016, 145, 47–61. [Google Scholar] [CrossRef]
  17. Patriarca, R.; Bergstrom, J.; Di Gravio, G.; Constantino, F. Resilience engineering: Current status of the research and future challenges. Saf. Sci. 2018, 102, 79–100. [Google Scholar] [CrossRef]
  18. Kim, H.; Moon, S.; Moon, H. Parallel military supply chain for resilience. Int. J. Adv. Logist. 2017, 6, 80–87. [Google Scholar] [CrossRef]
  19. Aven, T. Risk assessment and risk management: Review of recent advances on their foundation. Eur. J. Oper. Res. 2016, 253, 1–13. [Google Scholar] [CrossRef] [Green Version]
  20. ISO 31000:2018-08: Risk Management—Principles and Guidelines; 2018, the International Organization for Standardization. Available online: www.iso.org (accessed on 15 February 2020).
  21. Tubis, A. Operational Risk Management Method in Road Transport; Publ. House of Wroclaw University of Science and Technology: Wroclaw, Poland, 2018. (In Polish) [Google Scholar]
  22. Andersen, T.J. The Performance Relationship of Effective Risk Management: Exploring the Firm-Specific Investment Rationale. Long Range Plan. 2008, 41, 155–176. [Google Scholar] [CrossRef]
  23. Acen, T. The risk concept—Historical and recent development trends. Reliab. Eng. Syst. Saf. 2012, 99, 33–44. [Google Scholar] [CrossRef]
  24. Renn, O. Risk Governance: Coping with Uncertainty in a Complex World; Earthscan: London, UK, 2008. [Google Scholar]
  25. SRA. Foundations of Risk Analysis—Discussion Document. Available online: www.sra.com (accessed on 14 August 2015).
  26. Sodhi, M.S.; Son, B.G.; Tang, C.S. Researchers’ perspectives on supply chain risk management. Prod. Oper. Manag. 2012, 21, 1–13. [Google Scholar] [CrossRef]
  27. Ho, W.; Zheng, T.; Yildiz, H.; Talluri, S. Supply chain risk management: A literature review. Int. J. Prod. Res. 2015, 53, 5031–5069. [Google Scholar] [CrossRef]
  28. Wu, T.; Blackhurst, J.; Chidambaram, V. A Model for Inbound Supply Risk Analysis. Comput. Ind. 2006, 57, 350–365. [Google Scholar] [CrossRef]
  29. Kumar, S.K.; Tiwari, M.K.; Babiceanu, R.F. Minimisation of Supply Chain Cost with Embedded Risk Using Computational Intelligence Approaches. Int. J. Prod. Res. 2010, 48, 3717–3739. [Google Scholar] [CrossRef]
  30. Olson, D.L.; Wu, D.D. A Review of Enterprise Risk Management in Supply Chain. Kybernetes 2010, 39, 694–706. [Google Scholar] [CrossRef] [Green Version]
  31. Abdel-Basset, M.; Gunasekaran, M.; Chilamkurti, N. A framework for risk assessment, management and evaluation: Economic tool for quantifying risks in supply chain. Future Gener. Comput. Syst. 2019, 90, 489–502. [Google Scholar] [CrossRef] [Green Version]
  32. Prakash, A.; Agarwal, A.; Kumar, A. Risk Assessment in Automobile Supply Chain. Mater. Today Proc. 2018, 5, 3571–3580. [Google Scholar] [CrossRef]
  33. Nahootko, S. Economic Risk in Business Activity; Publ. House of Organizational Progress Center: Bydgoszcz, Poland, 2001. (In Polish) [Google Scholar]
  34. Aqlan, F.; Lam, S.S. A fuzzy-based integrated framework for supply chain risk assessment. Int. J. Prod. Econ. 2015, 161, 54–63. [Google Scholar] [CrossRef]
  35. Sawik, T. Selection of supply portfolio under disruption risks. Omega 2011, 39, 194–208. [Google Scholar] [CrossRef]
  36. Sarkar, A.; Mohapatra, P.K.J. Determining the optimal size of supply base with the consideration of risks of supply disruptions. Int. J. Prod. Econ. 2009, 119, 122–135. [Google Scholar] [CrossRef]
  37. Gao, Q.; Guo, S.; Liu, X.; Manogaran, G.; Chilamkurti, N.; Kadry, S. Simulation analysis of supply chain risk management system based on IoT information platform. Enterp. Inf. Syst. 2020, 14, 1354–1378. [Google Scholar] [CrossRef]
  38. Carvalho, H.; Barroso, A.P.; MacHado, V.H.; Azevedo, S.; Cruz-Machado, V. Supply chain redesign for resilience using simulation. Comput. Ind. Eng. 2012, 62, 329–341. [Google Scholar] [CrossRef]
  39. Giannakis, M.; Louis, M. A multi-agent based framework for supply chain risk management. J. Purch. Supply Manag. 2011, 17, 23–31. [Google Scholar] [CrossRef]
  40. Gaudenzi, B.; Borghesi, A. Managing risks in the supply chain using the AHP method. Int. J. Logist. Manag. 2006, 17, 114–136. [Google Scholar] [CrossRef]
  41. Schoenherr, T.; Tummala, V.M.; Harrison, T.P. Assessing supply chain risks with the analytic hierarchy process: Providing decision support for the offshoring decision by a US manufacturing company. J. Purch. Supply Manag. 2008, 14, 100–111. [Google Scholar] [CrossRef] [Green Version]
  42. Moeinzadeh, P.; Hajfathaliha, A. A Combined Fuzzy Decision Making Approach to Supply Chain Risk Assessment. World Acad. Sci. Eng. Technol. 2009, 3, 1631–1647. [Google Scholar]
  43. Pavlou, S.; Manthou, V. Identifying and evaluating unexpected events as sources of supply chain risk. Int. J. Serv. Oper. Manag. 2008, 4, 604–617. [Google Scholar] [CrossRef]
  44. Zadeh, L.A. Fuzzy Sets. Inf. Control 1965, 8, 338–353. [Google Scholar] [CrossRef] [Green Version]
  45. Cai, K.Y. System failure engineering and fuzzy methodology an introductory overview. Fuzzy Sets Syst. 1996, 83, 113–133. [Google Scholar] [CrossRef]
  46. Tubis, A.A.; Werbińska-Wojciechowska, S.; Góralczyk, M.; Wróblewski, A.; Ziętek, B. Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use. Sensors 2020, 20, 7210. [Google Scholar] [CrossRef]
  47. Vilela, M.; Oluyemi, G.; Petrovski, A. A fuzzy inference system applied to value of information assessment for oil and gas industry. Decis. Mak. Appl. Manag. Eng. 2019, 2, 1–18. [Google Scholar] [CrossRef]
  48. Guillaume, S. Designing Fuzzy Inference Systems from Data: An Interpretability-Oriented Review. IEEE Trans. Fuzzy Syst. 2001, 9, 426–443. [Google Scholar] [CrossRef] [Green Version]
  49. Novák, V. Which logic is the real fuzzy logic? Fuzzy Sets Syst. 2006, 157, 635–641. [Google Scholar] [CrossRef]
  50. Tahami, H.; Mirzazadeh, A.; Arshadi-Khamseh, A.; Gholami-Qadikolaei, A. A periodic review integrated inventory model for buyer’s unidentified protection interval demand distribution. Cogent Eng. 2016, 3. [Google Scholar] [CrossRef]
  51. Fayek, A.; Oduba, A. Predicting Industrial Construction Labor Productivity using Fuzzy Expert Systems. J. Constr. Eng. Manag. ASCE 2005, 131, 938–941. [Google Scholar] [CrossRef]
  52. Fakhravar, H. Quantifying uncertainty in risk assessment using fuzzy theory. arXiv 2020, arXiv:2009.09334. [Google Scholar]
  53. Jin, Y.; Sendhoff, B. Extracting Interpretable Fuzzy Rules from RBF Networks. Neural Process. Lett. 2003, 17, 149–164. [Google Scholar] [CrossRef]
  54. Verma, S.; Chaudhri, S. Integration of fuzzy reasoning approach (FRA) and fuzzy analytic hierarchy process (FAHP) for risk assessment in mining industry. J. Ind. Eng. Manag. (JIEM) 2014, 7, 1347–1367. [Google Scholar] [CrossRef] [Green Version]
  55. Dong, G.; Wei, W.; Xia, X.; Woźniak, M.; Damaševičius, R. Safety Risk Assessment of a Pb-Zn Mine Based on Fuzzy-Grey Correlation Analysis. Electronics 2020, 9, 130. [Google Scholar] [CrossRef] [Green Version]
  56. Shi, S.; Jiang, B.; Meng, X. Assessment of gas and dust explosion in coal mines by means of fuzzy fault tree analysis. Int. J. Min. Sci. Technol. 2018, 28, 991–998. [Google Scholar] [CrossRef]
  57. Greaver, T.L.; Sullivan, T.J.; Herrick, J.D.; Barber, M.C.; Baron, J.S.; Cosby, B.J.; Deerhake, M.E.; Dennis, R.L.; Dubois, J.B.; Goodale, C.L.; et al. Ecological effects of nitrogen and sulfur air pollution in the US: What do we know? Front. Ecol. Environ. 2012, 10, 365–372. [Google Scholar] [CrossRef]
  58. Choi, H.; Mahadevan, S. Construction Project Risk Assessment Using Existing Database and Project-Specific Information. J. Constr. Eng. Manag. 2008, 134, 894–903. [Google Scholar] [CrossRef]
  59. Kaplan, S.; Garrick, B.J. On the quantitative definition of risk. Risk Anal. 1981, 1, 11–27. [Google Scholar] [CrossRef]
  60. Piper, J.W. Risk Management Framework: Qualitative Risk Assessment through Risk Scenario Analysis. Available online: https://www.sto.nato.int/publications/STO%20Meeting%20Proceedings/STO-MP-IST-166/MP-IST-166-07.pdf (accessed on 20 April 2021).
  61. Combat Health Support in Stability Operations and Support Operations (FM 8-42). Available online: https://www.globalsecurity.org/military/library/policy/army/fm/8-42/fm8-42.pdf (accessed on 11 April 2021).
  62. Fasanghari, M.; Roudsari, F.H. The fuzzy evaluation of e-commerce customer satisfaction. World Appl. Sci. J. 2008, 4, 164–168. [Google Scholar] [CrossRef]
  63. Mamdani, E.H.; Assilian, S. An experiment in linguistic synthesis with a fuzzy logic controller. Int. J. Man-Mach. Stud. 1975, 7, 1–13. [Google Scholar] [CrossRef]
  64. Tripathy, D.P.; Ala, C.K. Risk assessment in underground coalmines using fuzzy logic in the presence of uncertainty. J. Inst. Eng. Ser. D 2018, 99, 157–163. [Google Scholar] [CrossRef]
  65. Shapiro, A.F.; Koissi, M.C. Risk Assessment Applications of Fuzzy Logic. Available online: https://www.soa.org/globalassets/assets/Files/Research/Projects/2015-risk-assess-apps-fuzzy-logic.pdf (accessed on 10 February 2021).
  66. Chi, H.T.X.; Yu, V.F. Ranking generalized fuzzy numbers based on centroid and rank index. Appl. Soft Comput. 2018, 68, 283–292. [Google Scholar] [CrossRef]
  67. Chu, T.-C.; Tsao, C.-T. Fanking fuzzy numbers with an area between the centroid point and original point. Comput. Math. Appl. 2002, 43, 111–117. [Google Scholar] [CrossRef] [Green Version]
  68. Wald, C.F.; Captain, T. Energy Security American’s Best Defense: A Study of Increasing Dependence on Fossil Fuels in Wartime, and Its Contribution to Ever Higher Casualty Rates. Available online: https://legacy-assets.eenews.net/features/documents/2009/11/11/document_gw_02.pdf (accessed on 10 June 2020).
  69. Ryczyński, J.; Biernikowicz, W. The Concept of Uniform Fuel of Battlefield—Selected Problems. In Proceedings of the Transport Means—International Conference, Palanga (Lithuania), 2–4 October 2019; pp. 712–717. [Google Scholar]
  70. Espinosa, J.; Vandewalle, J. Fuzzy Modeling and Identication, A guide for the user. In Proceedings of the IEEE Singapore International Symposium on Control Theory and Applications, Singapore, 29–30 July 1997; pp. 437–443. [Google Scholar]
Figure 1. The phases of the disturbance occurrence and the system reaction at the operational and strategic level (based on [11]).
Figure 1. The phases of the disturbance occurrence and the system reaction at the operational and strategic level (based on [11]).
Energies 14 04679 g001
Figure 2. Risk analysis procedure in a fuel supply chain.
Figure 2. Risk analysis procedure in a fuel supply chain.
Energies 14 04679 g002
Figure 3. Relationship: Analysed scenario—phase of the supply process.
Figure 3. Relationship: Analysed scenario—phase of the supply process.
Energies 14 04679 g003
Figure 4. Matrix of classification of scenarios according to the criteria of the process and sources of risk.
Figure 4. Matrix of classification of scenarios according to the criteria of the process and sources of risk.
Energies 14 04679 g004
Figure 5. Diagram of the implemented Mamdani fuzzy model.
Figure 5. Diagram of the implemented Mamdani fuzzy model.
Energies 14 04679 g005
Figure 6. Mamdani FIS using MIN and MAX operators.
Figure 6. Mamdani FIS using MIN and MAX operators.
Energies 14 04679 g006
Figure 7. Membership functions: (a) probability of the scenario occurrence; (b) consequences of the scenario occurrence; (c) risk level.
Figure 7. Membership functions: (a) probability of the scenario occurrence; (b) consequences of the scenario occurrence; (c) risk level.
Energies 14 04679 g007
Figure 8. Mamdani algorithm in Matlab: (a) general view of the model; (b) FIS engine; (c) sample rule base.
Figure 8. Mamdani algorithm in Matlab: (a) general view of the model; (b) FIS engine; (c) sample rule base.
Energies 14 04679 g008aEnergies 14 04679 g008b
Figure 9. Surface risk score for the proposed risk assessment model in Matlab (all rules are with weight = 1).
Figure 9. Surface risk score for the proposed risk assessment model in Matlab (all rules are with weight = 1).
Energies 14 04679 g009
Figure 10. The influence of the input function course on the obtained risk level results: (a) function of Probability of scenario occurrence; (b) function of Consequences of scenario occurrence.
Figure 10. The influence of the input function course on the obtained risk level results: (a) function of Probability of scenario occurrence; (b) function of Consequences of scenario occurrence.
Energies 14 04679 g010aEnergies 14 04679 g010b
Table 1. Examples of the risk classifications.
Table 1. Examples of the risk classifications.
AuthorsInternal RiskExternal Risk
Christopher and Peck [4]to the firm—process and control risksto the network—environmental risk; to the firm, but internal to the supply chain network—demand and supply risks
Wu, Blackhurst, and Chidambaram [28]internal controllable, internal partially controllable, internal uncontrollableexternal controllable, external somewhat controllable, external uncontrollable
Kumar, Tiwari, and Babiceanu [29]demand, production and distribution, supply risksterrorist attacks, natural disasters, exchange rate fluctuations
Olson and Wu [30]available capacity, internal operation, information system risksnature, political system, competitor and market risks
Table 2. Description of the analysed scenarios.
Table 2. Description of the analysed scenarios.
No. ScenarioScenario NameDescription
S1Accuracy of demand planning methodsDisruptions in the flow of information, affecting the accuracy of method planning regarding the needs of military units. The lack of accurate data on fuel consumption in military equipment prevents the correct implementation of the supply schedule.
S2Delays in the flow of informationDisruptions in the functioning of IT infrastructure elements.
S3Interruption of the supply chainDisruptions resulting from the cut-off of supply routes because of damage to supply routes. Cutting off supply routes because of political decisions.
S4Explosion during unloading tanksExplosion during a tank unloading, caused by noncompliance with procedures by technical personnel. Explosion due to accumulation of electric charges on the surfaces of tanks. Accidental ignition of fire as a result of using tools made of sparking materials.
S5External environmental factorsExternal factors related to functioning in the war zone firing at convoys, bombings of storage bases, destruction of inventory.
S6Quality changes of fuelsAgeing processes, evaporation processes, fuel contamination and distribution installations by microorganisms.
S7Infrastructure failureFire extinguishing systems failure, failure of Faraday mesh elements, leaks and fuel leaks from tanks, failure of pumping systems, failure of fuel dispensing stamps.
S8Human errors in the storage processAccidental mixing of different types of fuels. Imprecise dosing of chemical additives to fuel and inaccurate mixing additives (Single Fuel Policy rules). Inaccuracy in assessing the degree of valve opening and control of the fuel transmission speed. Errors in reading the fuel level in the storage tank. Overcharge/undercharging of storage tank—not detected.
S9Disruptions in OHS (Occupational Health and Safety) systemNoncompliance with OHS regulations by the organisation and employees.
Table 3. Probability of scenario occurrence.
Table 3. Probability of scenario occurrence.
Rating CategoryDescriptionFuzzy Value
CERTAIN (P5)Expected to occur regularly under normal circumstances.(7.5, 9, 10, 10)
VERY LIKELY (P4)Expected to occur at some time.(5.5, 6.5, 8)
POSSIBLE (P3)May occur at some time.(3.5, 4.5, 6)
UNLIKELY(P2)Not likely to occur in normal circumstances.(1.5, 2.5, 4)
RARE (P1)Could happen, but probably never will.(0, 0, 0.5, 2)
Table 4. Consequences of scenario occurrence.
Table 4. Consequences of scenario occurrence.
Rating CategoryDescriptionFuzzy Value
CATASTROPHIC (C5)Complete suspension of the military operation, threatening the health and life of the mission participants.(7.5, 9, 10, 10)
HIGH (C4)Inability to fully perform a military operation—limitation of carrying out basic tasks/activities, the threat to the health of the mission participants(5, 6.5, 8)
MODERATE (C3)System-level disruptions, inability to perform regular military operations, the introduction of contingency planning.(3, 4.5, 6)
MINOR (C2)Minor disruptions in fuel supplies were causing delays and changes in activity schedules. No threat to the safety of the participants of the military operation.(1, 2.5, 4)
NEGLIGIBLE (C1)No significant or slight impact on reliability or security.(0, 0, 0.5, 1.5)
Table 5. Risk level.
Table 5. Risk level.
Rating CategoryDescriptionFuzzy Value
HIGH (RL5)Consequences are catastrophic or high. Loss of ability to accomplish the mission is inevitable now or almost certain.(80, 90, 100 100)
MEDIUM HIGH (RL4)The certain or almost certain event that occurs with minor consequences or the unlikely event with critical consequences.(60, 70, 80, 90)
MEDIUM (RL3)The event is almost certain to occur—the consequences are minor/insignificant. The effects are high, and the event is unlikely to occur. Limiting the ability to conduct a military operation.(40, 50, 60, 70)
MINOR (RL2)The occurrence of an event is possible—minor/no significant consequences. Little impact on the accomplishment of the mission.(20, 30, 40, 50)
LOW (RL1)It is almost impossible for an event to occur. The consequences are negligible. No impact on the accomplishment of the mission.(0, 0, 15, 25)
Table 6. Risk decision matrix.
Table 6. Risk decision matrix.
P5MEDIUM HIGHMEDIUM HIGHMEDIUM HIGHHIGHHIGH
P4MEDIUMMEDIUMMEDIUM HIGHMEDIUM HIGHHIGH
P3MINORMINORMEDIUMMEDIUM HIGHMEDIUM HIGH
P2LOWMINORMINORMEDIUMMEDIUM HIGH
P1LOWLOWMINORMEDIUMMEDIUM
C1C2C3C4C5
Table 7. Expert opinions and risk score for all considered scenarios.
Table 7. Expert opinions and risk score for all considered scenarios.
ScenarioOccurrence Probability According to Military Reports (%)P (Fuzzy)P (Crisp)C (Fuzzy)C (Crisp)Risk Score
S146P34.67(2.73, 4.23, 5.83)4.2675
S237P34.67(2.33, 3.53, 4,83)3.5655
S385P59.13(6.83, 7.83, 9.13, 9.13)8.2391.4
S436P34.67(4.83, 5.63, 7.63)6.0375
S581P59.13(6.23, 7.63, 8.63, 8.63)7.7890.7
S652P34.67(3, 4.5, 6)4.5055
S737P22.67(2.33, 3.53, 4.83)3.5635
S854P34.67(5.13, 5.53, 7.63)6.1075
S919P10.63(5.5, 6.5, 8)6.5055
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Ryczyński, J.; Tubis, A.A. Tactical Risk Assessment Method for Resilient Fuel Supply Chains for a Military Peacekeeping Operation. Energies 2021, 14, 4679. https://doi.org/10.3390/en14154679

AMA Style

Ryczyński J, Tubis AA. Tactical Risk Assessment Method for Resilient Fuel Supply Chains for a Military Peacekeeping Operation. Energies. 2021; 14(15):4679. https://doi.org/10.3390/en14154679

Chicago/Turabian Style

Ryczyński, Jacek, and Agnieszka A. Tubis. 2021. "Tactical Risk Assessment Method for Resilient Fuel Supply Chains for a Military Peacekeeping Operation" Energies 14, no. 15: 4679. https://doi.org/10.3390/en14154679

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop