Next Article in Journal
Sustainability Assessment of Bus Low-Fare Policy Considering Three Stakeholders of the Public, Bus Enterprises and Government: A Case Study of Shenzhen, China
Previous Article in Journal
The Exploration of Integrating the Midjourney Artificial Intelligence Generated Content Tool into Design Systems to Direct Designers towards Future-Oriented Innovation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Vulnerability Assessment for Port Logistics System Based on DEMATEL-ISM-BWM

1
School of Transportation and Logistics Engineering, Wuhan University of Technology, Wuhan 430063, China
2
State Key Laboratory of Maritime Technology and Safety, Wuhan University of Technology, Wuhan 430063, China
*
Author to whom correspondence should be addressed.
Systems 2023, 11(12), 567; https://doi.org/10.3390/systems11120567
Submission received: 4 November 2023 / Revised: 26 November 2023 / Accepted: 1 December 2023 / Published: 4 December 2023

Abstract

:
In order to identify and assess the vulnerability of the port logistics system itself, this paper further improves the methodology on the basis of previous studies by using the Deterministic Experimentation and Evaluation Laboratory (DEMATEL) and Interpretive Structural Modeling (ISM) methods to study the correlation between the vulnerability factors of the port logistics system, and the best-worst method (BWM) to identify the key vulnerability points of the system. The results of the study showed that in terms of the correlation between the factors, port consolidation capacity and average arrival time are the most direct factors affecting the vulnerability of the port logistics system, and the strength of government regulation and coordination and the level of port management are important indirect factors affecting the vulnerability of the port logistics system. This paper also found that port loading and unloading facilities and natural disasters are the main vulnerabilities affecting the port logistics system itself. Port enterprises should focus on reducing the vulnerability of the system by strengthening the above aspects. The model constructed in this paper can also be applied to future research on the resilience and sustainability of port logistics.

1. Introduction

The vulnerability of the port logistics system itself has rarely been studied in depth by scholars. Most of the existing research on the stability of logistics systems focuses on robustness, resilience, vulnerability, etc., but it is crucial to unearth the vulnerabilities that exist in the system because all system breakdowns start from the most vulnerable places, which in turn undermine the overall stability of the system. Ports are the most important and significant gathering and distributing point of global goods are important nodes for trade between countries, and their impact on the development of global trade is significant [1,2]. Ports are also important nodes in the global supply chain [3]. However, for their own reasons, ports are susceptible to a number of threats to port efficiency, the effects of which are transmitted to the various nodes of the supply chain [4,5]. At the same time, as a key transportation node connecting water and land, port logistics is susceptible to a variety of factors from both the seaside and the land side [6]. Any interruption of the seaport will have a direct impact on the supply chain to which the seaport belongs and will be transmitted to the supply chain network to have an indirect impact on the whole industry [7]. Therefore, with the deepening of international trade and cooperation, the healthy and sustainable development of port logistics, especially the vulnerability study of the port logistics system, has received more and more attention.
The occurrence of various port accidents has also prompted research on the vulnerability of port logistics. Natural disaster risks [8], security risks [9], trade risks [10], environmental risks [11], and operational risks [12] faced by ports can be the trigger for the port logistics system’s own vulnerability [13,14], which can lead to a decrease in the efficiency of port operation. However, less research has been completed on mining the vulnerabilities of the port logistics system itself. Most of the current vulnerability studies focus on the specific threats faced by the port logistics sector, neglecting the excavation of the potential vulnerability of the port logistics system under normal conditions, while the concept of the vulnerability of the port logistics system is not yet clear. Therefore, this paper starts from the inside of port logistics and explores the influence of factors such as natural geography, port infrastructure, port information systems, and port support systems. Moreover, it explores the influence of port logistics operations and reveals its physical vulnerability. Also, from the perspective of the entire port logistics efficiency (economic vulnerability), the vulnerabilities that restrict efficiency improvement are identified.
The mainstream methods for studying vulnerability include hierarchical analysis (AHP) [15], data envelopment analysis (DEA) [2,16], analytic network process (ANP) [17], (Technique for Order Preference by Similarity to an Ideal Solution) TOPSIS [18] model, ISM [15,19], DEMATEL [15,19], BWM [20] methods and so on. However, previous studies were unable to analyze in depth the relationship between various factors affecting vulnerability, and the process of determining the “vulnerability point” was too complicated. Therefore, we use DEMATEL, ISM, and BWM methods to identify the correlation of vulnerability factors of the port logistics system, determine their mutual influence (physical vulnerability), and identify key vulnerability factors (economic vulnerability) that affect its efficiency improvement, which previous research has not been completed.
Most of the previous studies have examined port-exposed vulnerabilities in the context of specific scenarios or threats, and there is a lack of mining and exploring potential vulnerabilities in the context of the normal functioning of port logistics systems. However, the correlation between factors is also often overlooked, as the outbreak of a particular source of vulnerability is often the result of the interaction of factors. In this paper, we focus on the port logistics system itself to find and rank the inherent vulnerability factors implicit in the system. Therefore, this paper builds on previous research [21] and proposes a generic vulnerability assessment framework aimed at comprehensively assessing the vulnerability of port logistics. The assessment of the port logistics system in this paper has two main objectives: first, to explore the relationship between the factors affecting the vulnerability of the port logistics system, and second, to identify the most critical vulnerabilities (i.e., bottlenecks) in the port logistics system, so as to capitalize on these vulnerabilities to improve the operational efficiency of the port logistics system and enhance the overall resilience of the port logistics system.
This paper is organized as follows. Section 2 contains a literature review that focuses on the port logistics system, the concept of vulnerability, the influence factors on the port logistics system, and vulnerability identification and research methods. Section 3 introduces the proposed port logistics vulnerability assessment framework. Section 4 presents the case study of a port in China. Results and discussions are shown in Section 5. Finally, Section 6 concludes the paper with its main contributions.

2. Literature Review

In order to have a more in-depth understanding of what vulnerability is, this section will cover the components of port logistics systems and their characteristics, the connotation of port logistics system vulnerability, and clarify the research methodology of this paper. In this section, the current research will be reviewed and summarized from four aspects: port logistics system, vulnerability, the concept of port logistics system vulnerability, and vulnerability research method.

2.1. Port Logistics System

Port logistics refers to the comprehensive logistics system centered on the combination of various kinds of transportation and the advantageous conditions of the environment, using the port’s own geographical conditions and its proximity to the sea [22,23].
Fluid, carrier, and flow direction are its three main components [24]. Through the mobility function of the port, the port undergoes logistics activities shortening the distance between the spatial locations of goods and sending them to where they are needed is the goal of port logistics [25]. The carrier is the infrastructure equipment through which the circulation takes place [26]. Flow direction is on behalf of the goods in the process of logistics operation, and finally to the distribution of the link, the goods from a comprehensive series of activities, and finally sent to the hands of consumers in a special form of delivery, to complete the final link of logistics [27]. The port realizes the function of a modern logistics center with composite advantage, the port’s multiple identities have strategic status in international logistics, and the port provides value-added services through the logistics system [28].
The port logistics system is a highly integrated and complex system. The port performs the transformation task of multiple modes of transport, and the internal functional modules of the port are also diverse. Therefore, the factors influencing the development of port logistics are also diverse.

2.2. Vulnerability

Vulnerability is a property of the system itself. The inadequacy of the system when exposed to a threat is an important manifestation of this. Although vulnerability is proposed on the basis of risk analysis, they have different emphases. Risk analysis often focuses on human, environmental, and property losses or impacts caused by events [29]. When analyzing the vulnerability of the system, research should focus on “the extended set of threats and consequences”, “reducing the risk of the system and restoring the system to a new stable state”, and “the chain-breaking time before the system establishes a new stability”.
Based on the development of vulnerability theory in other fields such as ecology, many experts have offered insights into vulnerability in port studies. Zhang Weixi et al. [30] pointed out that the vulnerability of the logistics system is the basic characteristic of the port. Any change in port-dependent logistics activities will cause changes in the whole system, including transportation, industrial trade, finance, and multimodal transport. Not only is port logistics a relatively complex system, but it is also closely linked to the external environment, which makes it difficult to study the vulnerability of port logistics. At the same time, the port itself is a highly integrated system with multiple components. Assessing the vulnerability of a port is very challenging, as can be seen from the following aspects: first, there are multidimensional definitions of port vulnerability [31] and different experts focus on different latitudes; second, there are no statistics on the critical threshold for the occurrence of major disasters in ports [32]; and third, how to construct vulnerability indicators [33].
The definition of vulnerability of port logistics systems is not yet completely clear, but some experts have provided their own insights. For example, under the disturbance and interference of internal and external factors, the port logistics system loses all or part of its operational capacity due to the instability and sensitivity of its own system, resulting in the decline or stagnation of the efficiency of the logistics system [21].

2.3. Vulnerability on Port Logistics System

Although there are various research results on port risk or vulnerability analysis, there are more articles on the vulnerability of ports due to the number of port accidents in recent years. It is generally believed that the factors affecting the vulnerability of port logistics can be broadly divided into two aspects. First, natural environmental factors, which mainly include some natural disasters such as earthquakes, tsunamis, sea level rise, lightning, natural fires, climate change, extreme weather, etc.
Joan Pau Sierra et al. [34] assessed the vulnerability of the Catalan port group in the northwestern Mediterranean to sea level rise using linear wave theory and emphasized the need to integrate climate change into long-term port planning and management. Melissa Nursey Bray et al. [35] argued that climate change will have an impact on the port’s environment, infrastructure, staff safety, and supply chain, and made suggestions on the port’s appropriate response to climate change from the perspective of adaptability and social elasticity. Nathan J. Wood et al. [36] used Geographic Information System (GIS) technology to assess the impact of earthquakes and tsunamis on port vulnerability. However, this method also has certain limitations. For example, the results of the GIS assessment are too objective, and the weight of specific issues needs to be measured manually.
On the other hand, human environmental factors mainly include operational accidents, man-made fires, improper management, terrorist attacks, sabotage, explosions, etc. Patterson et al. [37] used the (Time-varying Coefficients) TVC model under the Critical Asset Protection Risk Analysis and Management Framework (RAMCAP) to analyze the potential vulnerability of the port infrastructure, personnel, and transportation system of the Santiago United Port in the event of terrorist attacks. Lin Zhou et al. [38] analyzed the “8.12” fire and explosion accident in Tianjin port by using Hfacs-Hc and human factors and classification of hazardous chemicals system and determined the impact of human factors at different levels on port vulnerability. At present, most academic research on vulnerability is based on the context of climate change, natural disasters, and human causes. There are fewer studies on potential vulnerability threats under normal operation of port logistics systems.

2.4. Vulnerability Identification and Research Methods

M. Jiang et al. [39] assessed the vulnerability of ports from the perspective of the supply chain, considering robustness, importance, efficiency, and elasticity as factors affecting vulnerability, and proposed to complete the construction of a vulnerability assessment system by fuzzy logic method and (Entity-relationship) ER method. Hsieh and C.-H. [40] used GIS technology to evaluate the vulnerability of the port in terms of natural disasters faced by the port. It can be seen that the port vulnerability study needs to consider the application of different knowledge. S. Raicu et al. [41] believed that the factors affecting the vulnerability of port logistics can be divided into two main aspects. One is the risk in port logistics operation, such as delayed delivery, excess inventory, poor forecasting, financial risk, port machinery failure, human error, information technology system failure, etc. Second, the external risks of port logistics, such as politics, economic policies, natural disasters, price fluctuations, wars, etc. Cao et al. [42] revealed that there are two major difficulties in using traditional vulnerability assessment methods: one is that the uncertainty of port data is difficult to overcome, and the other is that the correlation between different data is difficult to explore in vulnerability reasoning. Furthermore, they proposed a rapid response port vulnerability assessment framework based on fuzzy evidence reasoning (ER) [43,44] and fuzzy similar ideal solution ranking method (TOPSIS) [18], taking Tianjin Port under the background of the 2015 explosion as a case. However, this method is applied to post-vulnerability and does not consider the combination with pre-vulnerability for research. Vulnerability factors usually have strong concealment and fuzziness, and there are relatively great difficulties and challenges in collecting vulnerability factors. From the research literature at home and abroad, vulnerability identification methods in the field of transportation usually refer to risk identification methods. Later, researchers slowly began to explore the vulnerability of the system measured by quantitative methods. Quantitative vulnerability methods were first developed in the field of ecology. Me. Bar et al. [45] believed that vulnerability is the level of critical value of disasters. Shieh integrated three systems analysis methods of DEMATEL, ISM, and ANP (Analytic Network Process) [17,19] to identify the vulnerability factors affecting the transport system, effectively integrating the characteristics of the vulnerability factors and the interaction between the vulnerability factors. Similarly, Chen et al. [15] integrated DEMATEL, ISM, and AHP to overcome the challenges of vulnerability factor identification. Wang et al. [16] used the DEA and complex network method to study the attractiveness of hub ports. Ozmen [20] applied the BWM-ABAC (alternative by alternative comparison) methodology for vulnerability assessment of seismic hazard management, confirming the validity of the evaluation methodology. Dongping Gui et al. [46] used Bayesian networks (BNs) to analyze the vulnerability risk of port congestion. As shown in Table 1, this paper summarizes typical approaches to studying risk and vulnerability.
In previous studies, experts usually combine DEMATEL and ISM models to analyze the correlations between factors and use the AHP/ANP method to identify the key crisp points of the system. The interrelationships between vulnerability factors in port logistics systems are often very complex, and clarifying the influence relationships between them is crucial to determining the key vulnerability points of the system. Through the combination of DEMATEL and ISM methods, the relationship between vulnerability influencing factors can be well identified, presented in the form of a correlation diagram, and quantitatively expressed their importance in the entire system. This is the application of this article. However, there is a disadvantage in applying the AHP/ANP method as follows: firstly, it is computationally large, and n(n − 1)/2 comparisons (n is the number of indicators) are required when making comparisons between indicators. Second, a large number of judgment matrices need to be constructed, which makes the process quite cumbersome. Third, the consistency of the calculation results is poor. Therefore, in order to overcome the above problems, this paper introduces the BWM method, which has relatively fewer calculations and a relatively simple process when performing the identification of vulnerability points, has better consistency, and improves the reliability of the assessment.

3. Port Logistics System Vulnerability Assessment Model

This paper first adopts the qualitative analysis method and establishes the method resume evaluation index system based on expert interviews as well as a literature review. The DEMATEL method is used to construct the overall impact matrix of the vulnerability factors of the port logistics system, reflecting the comprehensive impact relationship among the factors, and the multilevel structural model is established by combining with the ISM model to describe the hierarchical relationship of the vulnerability factors intuitively. The BWM method is used to identify the important factors affecting the vulnerability of the port logistics system. Through the above steps, the key vulnerability factors of the port logistics system are identified, and their mutual influence relationship is clarified through the correlation analysis of the vulnerability factors.

3.1. Port Logistics System Vulnerability Indicator System Construction

Considering that the port logistics system is a complex system, it is difficult to collect data and analyze data using the quantitative indicator method, this paper uses quantitative indicators in establishing the indicator system, and is based on interviews with several experts in the port field and previous relevant studies. The Delphi method is used to collect relevant data and establish a vulnerability assessment system for the port logistics system [21] (Table 2).

3.2. DEMATEL Method

DEMATEL is a method for systematic factor analysis using graph theory and matrix tools. The specific steps are as follows:
Step 1: The Delphi method, brainstorming method, or expert interviews were used to determine each factor (Table 2).
Step 2: Determine the degree of direct influence among the elements. First, the direct influence matrix of vulnerability impact factors was determined using the expert scoring method. The relationship between factors is divided into five levels. Level 0 means no influence relationship, 1 means weak influence, 2 means relatively weak influence, 3 means moderate influence and 4 means strong influence.
Thus, direct influence matrix A is created. aij denotes the effect of i on j, the elements in column j = 1 n a i j denotes the sum of the rows in the matrix.
A = ( a i j ) n × n
Step 3: Normalized direct influence matrix. Use Equation (1) to calculate the normalized direct influence matrix G.
G = A m a x 1 < i < n j = 1 n a j
where m a x 1 < i < n j = 1 n a j denotes the largest row and value in the direct impact matrix.
Step 4: Determine the integrated impact matrix. The normalized direct impact matrix is calculated by Equation (2).
T = G ( E G ) 1
where E is the unit matrix.
Step 5: Calculate the degree of influence and the degree of being influenced. The degree of interaction and influence among risk factors is calculated according to Equation (3).
The influence value of the corresponding vulnerability factor in each row that is influenced by other factors is called the degree of influence.
f i = j = 1 n t i j , e i = i = 1 n t i j
where fi is the sum of the row elements in the integrated influence matrix T, indicating the degree of risk factor i the degree of direct or indirect influence on risk factor j; ei is the sum of the column elements in the integrated influence matrix T.
Step 6: Determine the centrality and causality of factors.
R i = f i + e i
C i = f i e i
where Ri indicates the centrality of the vulnerability factor and Ci indicates the causality of the vulnerability factor.
Step 7: Plotting four-quadrant Cartesian coordinates.
The causality was plotted using the degree of cause Ci and the degree of center Di + Ri as the vertical and horizontal axes. Let the intersection of the horizontal and vertical coordinates be (x,0) and x be the average of the corresponding centrality of each factor.
x = 1 n i = 1 n C i

3.3. ISM Method

The basic idea of the ISM model is to screen the main factors that constitute the vulnerability of the port logistics system through expert discussions and questionnaires, and then use the vulnerability factor matrix and the adjacency matrix of the directed graph to identify the relationships between the main vulnerabilities and their impacts.
Based on the basis of DEMATEL analysis, the adjacency matrix F of the vulnerability factors of the port logistics system is obtained by using Equation (8) (given β = 0.01).
F = [ f i j ] b × b , f i j = { 0 , t i j < β 1 , t i j β ( i , j = 1 , 2 , 3 , , 18 )
As shown in Equation (9), the adjacency matrix F is added to the unit matrix E to obtain the multiplication matrix B. Then, the multiplication matrix B is successively multiplied until the matrix no longer varies to obtain the reachable matrix R.
B = ( W + E ) B B 2 B 3 B r = B r + 1 = = B n = R
Based on the reachable matrix, the factor levels are divided and the skeleton matrix is obtained, and finally, a multi-order directed graph is drawn based on the skeleton matrix.

3.4. BWM Method

Step 1: In a set of evaluation indicators C = { C 1 , C 2 , , C n } , the best indicator C B and the worst indicator C W are selected.
Step 2: Compare the optimal indicator C B with all other indicators within this evaluation indicator set two by two with each other, so as to construct a comparison set A B = { a B 1 , a B 2 , , a B n } based on the optimality criterion, where a B n denotes the relative degree of preference between C B and the C n , which is scored on a scale from 1 to 9.
Step 3: Similar to step 2, the worst indicator C W is compared with all other indicators within this evaluation indicator set two by two with each other to construct a comparison set based on the worst-case criterion A W = { a 1 W , a 2 W , a n W } T , where a n W denotes the degree of preference of the C n over C W .
Step 4: Solve the best weights using Equation (10). Solving the following nonlinear programming problem yields the optimal weights W j for each evaluation metric and an indication δ * of the result of solving for the weights. The closer δ * is to 0, the smaller the error in the result of solving for the weights, and the more plausible it is.
| w B a B j w j | δ * w j , j = 1 , 2 , , n | w j a j w w w | δ * w w , j = 1 , 2 , , n j w j = 1 w j 0 , j = 1 , 2 , , n
where δ = m a x { | w B w i a B j | , | w j w w a j w | } , W B is the weight of the best indicators and W W is the weight of the worst indicators.

3.5. Vulnerability Assessment Model

By introducing the unit matrix to transform the comprehensive impact matrix into the overall impact matrix, and utilizing certain calculation methods to transform the overall impact matrix into the reachable matrix, the integration of the two methods can not only quantitatively calculate the importance of the vulnerability factors of the port logistics system to the accidents, but also clarify the interrelated relationship between the impact factors through the delineation of the hierarchy. Finally, the key vulnerability factors are identified by combining the BWM method. The vulnerability assessment model of the port logistics system in this paper is shown in Figure 1.

4. Instance Verification

In this paper, five more experts (two professors from the Maritime Management Department of the school, two logistics operators with 15 years of service from the terminal, and one from a relevant maritime government department) in the port field were invited to analyze various potential threats in the daily operation of the port logistics system and to score the DEMATEL method and the BWM method [26]. The combined results (direct influence matrix A) of their opinions are shown in Appendix A (Table A1). The normalized direct influence matrix G is shown in Table A2. The integrated impact matrix T is shown in Table A3.
According to Equations (1)–(5), the row sum (fi) and column sum (ei) of the integrated influence matrix, as well as the centrality (Ri) and the cause degree (Ci) of each element were obtained, as shown in Table 3.
As can be seen from Table 3, the top three influencing factors are frequency of natural disasters (C3) (fi = 2.103), personnel management ability and staff quality (C10) (fi = 2.055), and port construction conditions (C2) (fi = 1.666). These three factors are most likely to have an impact on the others. In the analysis of the degree of being influenced, the main factors with higher scores are average ship time in port (C9) (ei = 3.191), port consolidation capacity (C15) (ei = 3.094), and port berth condition (C6) (ei = 2.524), suggests that these three factors are the most influenced by other factors and the most susceptible to perturbation.
The causality-centrality coordinates of the factors influencing port logistics vulnerability are plotted according to Table 2, as shown in Figure 2.
In terms of the centrality of factors, the first three factors include port consolidation capacity (C15), average time of ships in port (C9), and port berth status (C6). Improving these factors is essential to reduce the vulnerability of the port logistics system.
In terms of the causality of the factors, the outcome factor with the highest rank among all the outcome factors is the average time of the ships in port (C9), which indicates that it is vulnerable to other factors. Among all the causal factors, the factor with the higher rank is the frequency of natural disasters (C3), indicating that the occurrence of natural disasters is most likely to affect other factors.
From the subsystem perspective, a high infrastructure centrality value also indicates that the port infrastructure is more important in the overall port logistics system, and its overall causality value is negative, indicating that the overall vulnerability of the port infrastructure is high and the system is more vulnerable to shocks. Collapse under the influence of internal and external factors. Meanwhile, the port operations subsystem has a high utility score and a low centrality score, which means that the system can easily have a significant impact on other systems directly or indirectly and is one of the most sensitive.
According to Equation (8), this paper takes β to be 0.1, and the resulting reachability matrix F is shown in Table A4. The reachability matrix was entered directly into the SPSS software and analyzed directly using its internal ISM modeling program. ISM modeling of the vulnerability influences of the port logistics system was conducted, and a directed relationship diagram (Figure 3) was obtained and graded for 18 vulnerability influences affecting the port logistics system (Table 4).
According to Table 4, among all the 18 factors, C4 (conditions of port handling facilities), C5 (port storage conditions), C6 (port berthing conditions), C7 (transportation conditions in the port), C9 (average time of ships in port), C11 (level of cargo information management), C12 (level of ship entry and exit management), C13 (level of customer relationship management), C14 (port peripheral facilities), C15 (port consolidation and distribution efficiency), C16 (level of development of port-side industries) are at the top level, indicating that these factors are most easily disturbed by other factors and play a more direct role in the vulnerability of the port logistics system. C18 (government supervision and coordination), C17 (administrative level of the port), C10 (people management skills and staff quality), and C3 (natural disasters) are located at the lower level, which means that these factors are most easily influence other factors and play an indirect role in the vulnerability of the port logistics system.
Applying Equation (9), this paper derived the weights for the 18 vulnerability factors (Table 5) and utilized them to determine the primary vulnerability factors impacting the port logistics system.

5. Result and Discussion

(1)
In terms of the correlation between the factors, it is more likely that the impact will affect vulnerability factors such as port loading and unloading facility conditions, port storage conditions, port consolidation and distribution efficiency, port berth conditions, average ship time in port, and port peripheral supporting facilities are more likely to be influenced by other vulnerability factors. While factors such as government supervision and coordination, the administrative management level of the port, and natural disasters are more likely to have an impact on other factors, which shows the interaction between influencing factors better than previous studies [13].
(2)
From a subsystem perspective, the port infrastructure system and the operation management system are the two main aspects that affect the vulnerability of port logistics. Port infrastructure is the first to be hit in the event of an emergency, so it is critical that port infrastructure is screened for vulnerability, and routine inspection and maintenance of port infrastructure should be strengthened to troubleshoot exposed risks of failure to ensure that it is resilient to risk when it occurs. Operational management systems are critical for port recovery from shocks [35,37] and their influence on the overall vulnerability of the port logistics system to threats is critical. Therefore, enterprises should promote the modernization and reform of operational management systems and constantly improve their ability to deal with and defend against threats, thereby strengthening the resilience of the system [22]. Relevant port departments should focus on identifying and controlling risks in these two aspects, actively maintaining and repairing port infrastructure, and improving the efficiency of port operations and management. The relevant port departments should focus on identifying and controlling risks in these two aspects, actively maintaining and repairing port infrastructure, and improving the efficiency of port operations and management.
(3)
From the viewpoint of the port logistics system as a whole, frequency of natural disasters (C3) and port handling facilities conditions (C4), with weights of 0.2483 and 0.2695, respectively, are the two most critical vulnerability factors. The port should focus on strengthening the detection of natural disasters and early warning, so as to minimize the vulnerability of the port logistics system. The port should focus on strengthening the detection of natural disasters and early warning [13,15,31], and maintain and manage the related handling facilities as much as possible, so as to minimize the vulnerability of the port logistics system.
Port companies should focus on improving the operation and maintenance level of port facilities as well as the professionalism of operators to ensure that the infrastructure is able to maintain a normal level of operation when subjected to internal and external shocks and no interruptions in the supply chain. Government departments responsible for port management should strengthen supervision of the standardized activities of port enterprises and strive to improve the level of coordinated development of ports and inland cities, so as to reduce the vulnerability of the port logistics system and increase overall resilience.

6. Conclusions

This paper quantified the vulnerability risk of each part and subsystem of the port logistics system using the port logistics vulnerability assessment model constructed by DEMATEL, ISM model, and BWM method. Based on input from mostly port experts, which reveals more about the reasons for the vulnerability of the port logistics system itself than previous studies [22,34,45], the most vulnerable links and main vulnerability factors in the port logistics system are identified. This paper identifies the frequency of natural disasters and port handling facility conditions. These are the two key factors that most affect the vulnerability of the port logistics system, and the port operators concerned should take effective measures to increase the robustness. At the same time, they should pay attention to potential risks in port infrastructure and operations to reduce overall vulnerability.
The contribution of this article is mainly twofold:
(1)
Vulnerability mining of the system itself is taken as the main research objective, which is lacking in the current research.
(2)
The insights on port logistics systems presented in this paper can also provide a reference for research on the overall security of ports and promote research on port resilience, which is conducive to the sustainable and healthy development of port logistics.
However, this paper could be improved in the future. First, regarding the evaluation indicator system, the paper summarizes the existing literature and opinions of experts and scholars but needs further development. Secondly, it is possible to consider dynamic influence relationships between influencing factors, which can be helpful for analyzing the vulnerability of the entire system. Third, the compartment indicator system can be expanded for different port types, which can make the evaluation more convenient. Fourthly, one could consider involving more experts and scientists in the evaluation of the indicators in order to exclude chance as far as possible. Therefore, future research can improve and refine the above aspects to further confirm the responsiveness of the evaluation model.

Author Contributions

Conceptualization, Y.Q. and H.W.; methodology, Y.Q.; formal analysis, Y.Q.; investigation, Y.Q.; resources, Y.Q.; data curation, Y.Q.; writing—original draft preparation, Y.Q.; writing—review and editing, H.W.; supervision, H.W. All authors have read and agreed to the published version of the manuscript.

Funding

The research is financially supported by the National Key R&D Program of China (2020YFB1712400) and the National Natural Science Foundation of China (52272423).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Table A1. Port Logistics System Vulnerability Impact Factors Direct Impact Matrix A.
Table A1. Port Logistics System Vulnerability Impact Factors Direct Impact Matrix A.
FactorsC1C2C3C4C5C6C7C8C9C10C11C12C13C14C15C16C17C18
C1021213103002011100
C2200343303002002300
C3030334204013033200
C4000023104003004200
C5010203103032013100
C6010320103002004100
C7000322002021003000
C8000111203322002200
C9000014100013003100
C1000033223 4033402030
C11000232122002102000
C12000213214020003000
C13000000011200001000
C14020121101011003400
C15000211204011010300
C16000112102000132012
C17000000041323202000
C18000000030212242330
Table A2. Port Logistics System Vulnerability Normalized Direct Influence Matrix G.
Table A2. Port Logistics System Vulnerability Normalized Direct Influence Matrix G.
FactorsC1C2C3C4C5C6C7C8C9C10C11C12C13C14C15C16C17C18
C10.0000.0630.0310.0630.0310.0940.0310.0000.0940.0000.0000.0630.0000.0310.0310.0310.0000.000
C20.0630.0000.0000.0940.1250.0940.0940.0000.0940.0000.0000.0630.0000.0000.0630.0940.0000.000
C30.0000.0940.0000.0940.0940.1250.0630.0000.1250.0000.0310.0940.0000.0940.0940.0630.0000.000
C40.0000.0000.0000.0000.0630.0940.0310.0000.1250.0000.0000.0940.0000.0000.1250.0630.0000.000
C50.0000.0310.0000.0630.0000.0940.0310.0000.0940.0000.0940.0630.0000.0310.0940.0310.0000.000
C60.0000.0310.0000.0940.0630.0000.0310.0000.0940.0000.0000.0630.0000.0000.1250.0310.0000.000
C70.0000.0000.0000.0940.0630.0630.0000.0000.0630.0000.0630.0310.0000.0000.0940.0000.0000.000
C80.0000.0000.0000.0310.0310.0310.0630.0000.0940.0940.0630.0630.0000.0000.0630.0630.0000.000
C90.0000.0000.0000.0000.0310.1250.0310.0000.0000.0000.0310.0940.0000.0000.0940.0310.0000.000
C100.0000.0000.0000.0940.0940.0630.0630.0940.1250.0000.0940.0940.1250.0000.0630.0000.0940.000
C110.0000.0000.0000.0630.0940.0630.0310.0630.0630.0000.0000.0630.0310.0000.0630.0000.0000.000
C120.0000.0000.0000.0630.0310.0940.0630.0310.1250.0000.0630.0000.0000.0000.0940.0000.0000.000
C130.0000.0000.0000.0000.0000.0000.0000.0310.0310.0630.0000.0000.0000.0000.0310.0000.0000.000
C140.0000.0630.0000.0310.0630.0310.0310.0000.0310.0000.0310.0310.0000.0000.0940.1250.0000.000
C150.0000.0000.0000.0630.0310.0310.0630.0000.1250.0000.0310.0310.0000.0310.0000.0940.0000.000
C160.0000.0000.0000.0310.0310.0630.0310.0000.0630.0000.0000.0000.0310.0940.0630.0000.0310.063
C170.0000.0000.0000.0000.0000.0000.0000.1250.0310.0940.0630.0940.0630.0000.0630.0000.0000.000
C180.0000.0000.0000.0000.0000.0000.0000.0940.0000.0630.0310.0630.0630.1250.0630.0940.0940.000
Table A3. Port Logistics System Vulnerability Integrated Tmpact Matrix T.
Table A3. Port Logistics System Vulnerability Integrated Tmpact Matrix T.
FactorsC1C2C3C4C5C6C7C8C9C10C11C12C13C14C15C16C17C18
C10.0050.0770.0310.1270.0920.1810.0820.0070.1960.0020.0360.1300.0040.0500.1380.0830.0030.005
C20.0640.0190.0020.1770.1930.2090.1530.0100.2300.0030.0530.1480.0080.0300.2000.1520.0060.010
C30.0070.1160.0000.2000.1930.2660.1450.0140.2940.0030.0940.2010.0090.1240.2670.1520.0060.009
C40.0010.0100.0000.0620.1110.1760.0800.0090.2240.0020.0410.1530.0060.0210.2220.1080.0040.007
C50.0030.0420.0000.1290.0650.1800.0830.0140.2000.0020.1290.1320.0070.0480.2000.0830.0030.005
C60.0020.0390.0000.1460.1100.0830.0770.0070.1900.0020.0370.1220.0040.0180.2130.0790.0030.005
C70.0010.0080.0000.1410.1070.1300.0390.0090.1480.0010.0920.0880.0050.0130.1750.0400.0020.003
C80.0000.0080.0000.0990.0930.1210.1130.0230.2010.0990.1100.1330.0200.0180.1660.1020.0130.006
C90.0010.0090.0000.0540.0720.1790.0680.0090.0830.0020.0600.1360.0040.0140.1670.0640.0030.004
C100.0010.0130.0000.1820.1750.1880.1340.1300.2830.0310.1650.2030.1420.0190.2210.0640.0990.004
C110.0010.0090.0000.1160.1380.1360.0750.0710.1580.0090.0410.1220.0350.0130.1540.0420.0020.003
C120.0010.0090.0000.1200.0850.1710.1060.0410.2170.0050.0980.0670.0050.0130.1890.0450.0020.003
C130.0000.0020.0000.0200.0180.0240.0170.0410.0640.0680.0180.0240.0100.0040.0580.0130.0070.001
C140.0040.0710.0000.0900.1140.1080.0770.0090.1260.0030.0640.0850.0090.0270.1800.1700.0070.011
C150.0010.0090.0000.1080.0770.1050.0980.0080.1990.0020.0620.0850.0070.0500.0880.1290.0050.008
C160.0010.0130.0000.0760.0730.1180.0660.0170.1350.0120.0330.0550.0420.1140.1440.0510.0400.066
C170.0000.0050.0000.0580.0530.0710.0510.1520.1320.1140.1100.1540.0820.0100.1460.0370.0120.002
C180.0010.0140.0000.0640.0610.0770.0560.1290.1120.0910.0860.1330.0890.1470.1670.1500.1080.009
Table A4. Port Logistics System Vulnerability Impact Factors Reachability Matrix F.
Table A4. Port Logistics System Vulnerability Impact Factors Reachability Matrix F.
FactorsC1C2C3C4C5C6C7C8C9C10C11C12C13C14C15C16C17C18
C1000101001001001000
C2000111101001001100
C3010111101001011100
C4000011001001001100
C5000101001011001000
C6000110001001001000
C7000111001000001000
C8000001101011001100
C9000001000001001000
C10000111111011101000
C11000111001001001000
C12000101101000001000
C13000000000000000000
C14000011001000001100
C15000101001000000100
C16000001001000011000
C17000000011111001000
C18000000011001011110

References

  1. Lam, J.S.L.; Su, S. Disruption risks and mitigation strategies: An analysis of Asian ports. Marit. Policy Manag. 2015, 42, 415–435. [Google Scholar] [CrossRef]
  2. Nong, T.N.M. Performance efficiency assessment of Vietnamese ports: An application of Delphi with Kamet principles and DEA model. Asian J. Shipp. Logist. 2023, 39, 1–12. [Google Scholar] [CrossRef]
  3. Do Bagus, M.R.; Hanaoka, S. Threat Utility of the Seaport Risk Factors: Use of Rough Set-Based Genetic Algorithm. J. Mar. Sci. Eng. 2022, 10, 1484. [Google Scholar] [CrossRef]
  4. Fuchs, S.; Birkmann, J.; Glade, T. Vulnerability assessment in natural hazard and risk analysis: Current approaches and future challenges. Nat. Hazards 2012, 64, 1969–1975. [Google Scholar] [CrossRef]
  5. Repetto, M.P.; Burlando, M.; Solari, G.; De Gaetano, P.; Pizzo, M. Integrated tools for improving the resilience of sea-ports under extreme wind events. Sustain. Cities Soc. 2017, 32, 277–294. [Google Scholar] [CrossRef]
  6. Cao, X.; Lam, J.S.L. Catastrophe risk assessment framework of ports and industrial clusters: A case study of the Guangdong province. Int. J. Shipp. Transp. Logist. 2019, 11, 1–24. [Google Scholar] [CrossRef]
  7. Cao, X.; Lam, J.S.L. Simulation-based catastrophe-induced port loss estimation. Reliab. Eng. Syst. Saf. 2018, 175, 1–12. [Google Scholar] [CrossRef]
  8. Babson, A.L.; Bennett, R.O.; Adamowicz, S.; Stevens, S. Coastal Impacts, Recovery, and Resilience Post-Hurricane Sandy in the Northeastern US. Estuaries Coasts. 2020, 43, 1603–1609. [Google Scholar] [CrossRef]
  9. Abdelfattah, M.; Elsayeh, M.E.; Abdelkader, S. A proposed port security risk assessment approach, with application to a hypothetical port. Aust. J. Marit. Ocean Aff. 2021, 14, 21–38. [Google Scholar] [CrossRef]
  10. Lim, S.; Pettit, S.; Abouarghoub, W.; Beresford, A. Port sustainability and performance: A systematic literature review. Transp. Res. Part D Transp. Environ. 2019, 72, 47–64. [Google Scholar] [CrossRef]
  11. Dvorak, Z.; Rehak, D.; David, A.; Cekerevac, Z. Qualitative Approach to Environmental Risk Assessment in Transport. Int. J. Environ. Res. Public Health 2020, 17, 5494. [Google Scholar] [CrossRef] [PubMed]
  12. He, R.; Wan, C.; Jiang, X. Risk Management of Port Operations: A Systematic Literature Review and Future Directions. In Proceedings of the 6th International Conference on Transportation Information and Safety (ICTIS), Wuhan, China, 22–24 October 2021. [Google Scholar]
  13. John, A.; Paraskevadakis, D.; Bury, A.; Yang, Z.; Riahi, R.; Wang, J. An integrated fuzzy risk assessment for seaport operations. Saf. Sci. 2014, 68, 180–194. [Google Scholar] [CrossRef]
  14. Arisha, A.; Mahfouz, A. Seaport Management Aspects and Perspectives: An Overview. In Proceedings of the 12th Irish Academy of Management Conference, Galway, Ireland, 2–4 September 2009. [Google Scholar]
  15. Chen, Y.-J.; Liu, Q.; Wan, C.-P.; Li, Q.; Yuan, P.-W. Identification and Analysis of Vulnerability in Traffic-Intensive Areas of Water Transportation Systems. J. Mar. Sci. Eng. 2019, 7, 174–189. [Google Scholar] [CrossRef]
  16. Wang, C.; Dou, X.; Haralambides, H. Port centrality and the Composite Connectivity Index: Introducing a new concept in assessing the attractiveness of hub ports. Marit. Econ. Logist. 2022, 24, 67–91. [Google Scholar] [CrossRef]
  17. Mandal, A.; Deshmukh, S.G. Vendor selection using interpretive structural modeling (ISM). Int. J. Oper. Prod. Manag. 1994, 14, 52–59. [Google Scholar] [CrossRef]
  18. Chen, C.T. Extensions of the TOPSIS for group decision-making under fuzzy environment. Fuzzy Sets Syst. 2000, 114, 1–9. [Google Scholar] [CrossRef]
  19. Shieh, J.-I.; Wu, H.-H.; Huang, K.-K. A DEMATEL method in identifying key success factors of hospital service quality. Knowl. Based Syst. 2010, 23, 277–282. [Google Scholar] [CrossRef]
  20. Ozmen, M. Evaluating earthquake vulnerability of 2023 Kayseri, Turkiye via BWM-ABAC method. Sadhana-Acad. Proc. Eng. Sci. 2023, 48, 179. [Google Scholar]
  21. Qian, Y.; Wang, H. Development of Vulnerability Assessment Framework of Port Logistics System Based on DEMATEL. In Proceedings of the 3rd International Conference on Artificial Intelligence and Logistics Engineering (ICAILE2023), Wuhan, China, 11–12 March 2023. [Google Scholar]
  22. Yang, S.; Tan, J.; Chen, B. Robust Spike-Based Continual Meta-Learning Improved by Restricted Minimum Error Entropy Criterion. Entropy 2022, 24, 455. [Google Scholar] [CrossRef]
  23. Wang, M.; Wang, H. Exploring the Failure Mechanism of Container Port Logistics System Based on Multi-Factor Coupling. J. Mar. Sci. Eng. 2023, 11, 1067. [Google Scholar] [CrossRef]
  24. Leivestad, H.H. Who cares about the cargo? Container economies in a European transshipment port. Focaal J. Glob. Hist. Anthropol. 2021, 89, 52–63. [Google Scholar]
  25. Talley, W.K. Maritime transport chains: Carrier, port and shipper choice effects. Int. J. Prod. Econ. 2014, 151, 174–179. [Google Scholar] [CrossRef]
  26. Wang, L.; Goodchild, A.; Wang, Y. The effect of distance on cargo flows: A case study of Chinese imports and their hinterland destinations. Marit. Econ. Logist. 2018, 20, 456–475. [Google Scholar] [CrossRef]
  27. Chen, Z. Port Logistics Function Evaluation Model Based on Entropy Weight TOPSIS Method. Discret. Dyn. Nat. Soc. 2022, 2022, 5006900. [Google Scholar] [CrossRef]
  28. Kurniawan, R.; Zailani, S.H.; Iranmanesh, M.; Rajagopal, P. The effects of vulnerability mitigation strategies on supply chain effectiveness: Risk culture as moderator. Supply Chain Manag. Int. J. 2017, 22, 1–15. [Google Scholar] [CrossRef]
  29. Aqlan, F.; Lam, S.S. A fuzzy-based integrated framework for supply chain risk assessment. Int. J. Prod. Econ. 2015, 161, 54–63. [Google Scholar] [CrossRef]
  30. Zhang, W.; Xi, T.; Zhang, R. A case research on vulnerability of logistics system in the Tianjin port. Energy Procedia 2011, 5, 2059–2064. [Google Scholar]
  31. Brooks, N. Vulnerability, risk and adaptation: A conceptual framework. Tyndall Cent. Clim. Change Res. Work. Pap. 2003, 38, 1–16. [Google Scholar]
  32. Yang, Z.L.; Wang, J.; Bonsall, S.; Fang, Q.G. Use of Fuzzy Evidential Reasoning in Maritime Security Assessment. Risk Anal. 2009, 29, 95–120. [Google Scholar] [CrossRef]
  33. Liu, J.; Yang, J.B.; Wang, J.; SII, H.S.; Wang, Y.M. Fuzzy rule-based evidential reasoning approach for safety analysis. Int. J. Gen. Syst. 2004, 33, 183–204. [Google Scholar] [CrossRef]
  34. Pau Sierra, J.; Casanovas, I.; Mosso, C.; Mestres, M.; Sanchez-Arcilla, A. Vulnerability of Catalan (NW Mediterranean) ports to wave overtopping due to different scenarios of sea level rise. Reg. Environ. Change 2016, 16, 1457–1468. [Google Scholar] [CrossRef]
  35. Nursey-Bray, M.; Blackwell, B.; Brooks, B.; Campbell, M.L.; Goldsworthy, L.; Pateman, H.; Rodrigues, I.; Roome, M.; Wright, J.T.; Francis, J.; et al. Vulnerabilities and adaptation of ports to climate change. J. Environ. Plan. Manag. 2013, 56, 1021–1054. [Google Scholar] [CrossRef]
  36. Wood, N.J.; Good, J.W. Vulnerability of port and harbor communities to earthquake and tsunami hazards: The use of GIS in community hazard planning. Coast. Manag. 2004, 32, 243–269. [Google Scholar] [CrossRef]
  37. Patterson, D.A.; Bridgelall, R. Attack risk modelling for the San Diego maritime facilities. Mar. Policy 2020, 121, 104210. [Google Scholar] [CrossRef]
  38. Zhou, L.; Fu, G.; Xue, Y. Human and organizational factors in Chinese hazardous chemical accidents: A case study of the ‘8.12’ Tianjin Port fire and explosion using the HFACS-HC. Int. J. Occup. Saf. Ergon. 2018, 24, 329–340. [Google Scholar] [CrossRef] [PubMed]
  39. Jiang, M.; Lu, J.; Qu, Z.; Yang, Z. Port vulnerability assessment from a supply Chain perspective. Ocean Coast. Manag. 2021, 213, 105851. [Google Scholar] [CrossRef]
  40. Hsieh, C.-H. Disaster risk assessment of ports based on the perspective of vulnerability. Natural Hazards. 2014, 74, 851–864. [Google Scholar] [CrossRef]
  41. Roșca, E.; Raicu, S.; Roșca, M.; Rusca, F.V. Risks and Reliability Assessment in Maritime Port Logistics. Adv. Mater. Res. 2014, 1036, 963–968. [Google Scholar] [CrossRef]
  42. Cao, X.; Lam, J.S.L. A fast reaction-based port vulnerability assessment: Case of Tianjin Port explosion. Transp. Res. Part A-Policy Pract. 2019, 128, 11–33. [Google Scholar] [CrossRef]
  43. Wang, J.; Yang, J.B.; Sen, P. Safety analysis and synthesis using fuzzy sets and evidential reasoning. Reliab. Eng. Syst. Saf. 1995, 47, 103–118. [Google Scholar] [CrossRef]
  44. Wang, J.; Yang, J.B.; Sen, P. Multi-person and multi-attribute design evaluations using evidential reasoning based on subjective safety and cost analyses. Reliab. Eng. Syst. Saf. 1996, 52, 113–128. [Google Scholar] [CrossRef]
  45. Me-Bar, Y.; Valdez, F. On the vulnerability of the ancient Maya society to natural threats. J. Archaeol. Sci. 2005, 32, 813–825. [Google Scholar] [CrossRef]
  46. Gui, D.; Wang, H.; Yu, M. Risk Assessment of Port Congestion Risk during the COVID-19 Pandemic. J. Mar. Sci. Eng. 2022, 10, 150. [Google Scholar] [CrossRef]
  47. Kamble, S.S.; Raoot, A.D.; Khanapuri, V.B. Improving port efficiency: A comparative study of selected ports in India. Int. J. Shipp. Transp. Logist. 2010, 2, 444–461. [Google Scholar] [CrossRef]
  48. Tamvakis, P.; Xenidis, Y. Resilience in transportation systems. Procedia Soc. Behav. Sci. 2012, 48, 3441–3450. [Google Scholar] [CrossRef]
  49. Mansouri, M.; Nilchiani, R.; Mostashari, A. A policy making framework for resilient port infrastructure systems. Mar. Policy 2010, 34, 1125–1134. [Google Scholar] [CrossRef]
  50. Felício, J.A.; Caldeirinha, V.R. The influence of the characterisation factors of the European ports on operational performance: Conceptual model testing. Int. J. Shipp. Transp. Logist. 2013, 5, 282–302. [Google Scholar] [CrossRef]
Figure 1. Flow chart of vulnerability assessment of port logistics system.
Figure 1. Flow chart of vulnerability assessment of port logistics system.
Systems 11 00567 g001
Figure 2. Vulnerability factor causality−centrality coordinates.
Figure 2. Vulnerability factor causality−centrality coordinates.
Systems 11 00567 g002
Figure 3. Directional relationships of vulnerability factors in port logistics systems.
Figure 3. Directional relationships of vulnerability factors in port logistics systems.
Systems 11 00567 g003
Table 1. Common vulnerability assessment methods.
Table 1. Common vulnerability assessment methods.
Developed MethodologiesInventorsQuantitativeQualitativeSubjectiveObjectiveApplicable Fields
AHP [16]Saaty, 1977×economic vulnerability or physical vulnerability
ANP [15]Saaty, 2005×cyber vulnerability or physical vulnerability
DEA [2,20]A.Charnes et al., 1978××economic vulnerability
TOPSIS [18]Hwang and Yoon, 1981×economic vulnerability or physical vulnerability
BWM [20]J. Figueira et al., 2010××economic vulnerability or physical vulnerability
DEMATEL [15,21]Fontela and Gabus, 1972×economic vulnerability or physical vulnerability
ISM [15]Watson, 1978×economic vulnerability or physical vulnerability
ER [43,44]Takagi and Sugeno, 1985××economic vulnerability or physical vulnerability
BNs [46]Judea Pearl, 1985cyber vulnerability
Risk matrix [1]ESC, 1995××economic vulnerability or physical vulnerability
GIS [5,37,41]Roger Tomlinson, 1960s×physical vulnerability or cyber vulnerability
Table 2. Port logistics system vulnerability evaluation index system.
Table 2. Port logistics system vulnerability evaluation index system.
Subsystem BiVulnerability Evaluation Factor CiIndicator ProposerNumber of Experts
physical Geographical Conditions B1water depth and channel conditions C1terminal workers3
port construction conditions C2terminal workers, university professors4
frequency of natural disasters C3port managers, terminal workers3
infrastructure conditions B2 [47]port handling facilities conditions C4terminal workers, port managers5
port storage conditions C5port managers, port managers2
port berth conditions C6university professors, terminal workers2
transportation conditions in the port C7port managers3
logistics Information System B3quality supervision and management level C8port managers, government maritime administrators4
average ship time in port C9terminal workers, port managers,2
people management skills and staff quality C10university professors, terminal workers5
cargo information management level C11 [48]-
ship access management level C12 [49]-
customer relationship management level C13 [30]-
port logistics support system and policy B4 [30]port peripheral facilities C14 [50]-
port concentration and diversion efficiency C15port managers1
harbourfront industry development level C16port managers, university professors3
administrative level of the port C17port managers, government maritime administrators4
government oversight and coordination C18government maritime administrators2
Table 3. fi, ei, Ri, Ci values of vulnerability elements.
Table 3. fi, ei, Ri, Ci values of vulnerability elements.
FactorsfieiRiCi
C11.2510.0921.3431.159
C21.6660.4722.1381.194
C32.1030.0342.1372.069
C41.2371.9703.206−0.733
C51.3251.8323.157−0.507
C61.1372.5243.661−1.387
C71.0011.5172.518−0.516
C81.3260.7012.0280.625
C90.9283.1914.119−2.263
C102.0550.4492.5041.606
C111.1271.3282.454−0.201
C121.1762.1713.347−0.995
C130.3880.4890.877−0.102
C141.1540.7331.8870.421
C151.0403.0944.134−2.054
C161.0561.5682.624−0.511
C171.1890.3251.5130.864
C181.4930.1601.6531.332
Table 4. Hierarchy of factors influencing the vulnerability of port logistics system.
Table 4. Hierarchy of factors influencing the vulnerability of port logistics system.
LevelsElements
First floor (top floor)C4 (conditions of port handling facilities), C5 (port storage conditions), C6 (port berthing conditions), C7 (transportation conditions in the port), C9 (average time of ships in port), C11 (level of cargo information management), C12 (level of ship entry and exit management), C13 (level of customer relationship management), C14 (port peripheral facilities), C15 (port consolidation and distribution efficiency), C16 (level of development of port-side industries)
Second layerC1 (water depth and channel conditions), C2 (port construction conditions), C8 (quality supervision and management level)
Third layerC3 (natural disasters), C10 (people management skills and staff quality)
Fourth layerC17 (administrative level of the port)
Fifth layer (ground floor)C18 (government supervision and coordination)
Table 5. Vulnerability factor weights were obtained from the BWM approach.
Table 5. Vulnerability factor weights were obtained from the BWM approach.
SubsystemSubsystem WeightsVulnerability IndicatorsIndicator Layer WeightsBWM Method Weights
B10.315789474C10.0769230770.024291498
C20.1367521370.043184885
C30.7863247860.248313091
B20.473684211C40.5689655170.269509982
C50.241379310.114337568
C60.1206896550.057168784
C70.0689655170.032667877
B30.157894737C80.0438169430.006918465
C90.4016553070.063419259
C100.0827653360.013068211
C110.1241480040.019602316
C120.2482960080.039204633
C130.0993184030.015681853
B40.052631579C140.5026595740.026455767
C150.2210771280.011635638
C160.1326462770.006981383
C170.094747340.004986702
C180.0488696810.002572088
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Qian, Y.; Wang, H. Vulnerability Assessment for Port Logistics System Based on DEMATEL-ISM-BWM. Systems 2023, 11, 567. https://doi.org/10.3390/systems11120567

AMA Style

Qian Y, Wang H. Vulnerability Assessment for Port Logistics System Based on DEMATEL-ISM-BWM. Systems. 2023; 11(12):567. https://doi.org/10.3390/systems11120567

Chicago/Turabian Style

Qian, Yuntong, and Haiyan Wang. 2023. "Vulnerability Assessment for Port Logistics System Based on DEMATEL-ISM-BWM" Systems 11, no. 12: 567. https://doi.org/10.3390/systems11120567

APA Style

Qian, Y., & Wang, H. (2023). Vulnerability Assessment for Port Logistics System Based on DEMATEL-ISM-BWM. Systems, 11(12), 567. https://doi.org/10.3390/systems11120567

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop