[1] 马丽,张光明,李平.供应链风险传递机制与传递路径研究[J].科技情报开发与经济,2007,17(31): 96-98. [2] 程国平,邱映贵.供应链风险传导模式研究[J].武汉理工大学学报,2009,22(2):36-41. [3] Tang C, Tomlin B. The power of flexibility for mitigating supply chain risks[J]. International Journal of Production Economics, 2008, 116(1): 12-27. [4] 顾孟迪,雷鹏.风险管理[M].北京:清华大学出版社,2005. [5] Prater E, Biehl M, Smith M A. International supply chain agility-tradeoffs between flexibility and uncertainty[J]. International Journal of Operations & Production Management, 2001, 21(5/6): 823-839. [6] Nagurney A, Dong J. Management of knowledge intensive systems as supernetworks: modeling, analysis, computations, and applications[J]. Mathematical and Computer Modelling, 2005, 42(3): 397-417. [7] Zsidisin G A, Ellram L M, Carter J R, et al. An analysis of supply risk assessment techniques[J]. International Journal of Physical Distribution & Logistics Management, 2004, 34(5): 397-413. [8] 王永刚,张金隆,唐扬洋,等.核电站备件供应风险测度模型研究[J].武汉理工大学学报:信息与管理工程版,2007,29(3):72-75. [9] Rosenau-Tornow D, Buchholz P, Riemann A, et al. Assessing the long-term supply risks for mineral raw materials—a combined evaluation of past and future trends[J]. Resources Policy, 2009, 34(4): 161-175. [10] 丁伟东,刘凯,贺国先.供应链风险研究[J].中国安全科学学报,2003,13(4):64-66. [11] Forbes K J, Rigobon R. No contagion, only interdependence: measuring stock market comovements[J]. The Journal of Finance, 2002, 57(5): 2223-2261. [12] Engle R. New frontiers for ARCH models[J]. Journal of Applied Econometrics, 2002, 17(5): 425-446. [13] Gallo G M, Velucchi M. Market interdependence and financial volatility transmission in east asia[J]. International Journal of Finance & Economics, 2009, 14(1): 24-44. [14] Hong Y, Liu Y, Wang S. Granger causality in risk and detection of extreme risk spillover between financial markets[J]. Journal of Econometrics, 2009, 150(2): 271-287. [15] 陈王,魏宇,淳伟德,等.中国股市与周边股市波动风险传导效应研究[J].中国管理科学,2011,19(6):31-39. [16] 夏喆,邓明然,黄洁莉.企业风险传导进程中的耦合性态分析[J].上海管理科学,2007,29(1):4-6. [17] Fu Y, Li M, Chen F. Impact propagation and risk assessment of requirement changes for software development projects based on design structure matrix[J]. International Journal of Project Management, 2012, 30(3): 363-373. [18] Feng N, Wang H J, Li M. A security risk analysis model for information systems: causal relationships of risk factors and vulnerability propagation analysis[J]. Information sciences, 2014, 256: 57-73. [19] Zegordi S H, Davarzani H. Developing a supply chain disruption analysis model: application of colored petri-nets[J]. Expert Systems with applications, 2012, 39(2): 2102-2111. [20] Ghadge A, Dani S, Kalawsky R. Systems thinking for modeling risk propagation in supply networks[C]∥Industrial Engineering and Engineering Management(IEEM), 2011 IEEE International Conference on. IEEE, 2011: 1685-1689. [21] Wei H, Dong M, Sun S. Inoperability input-output modeling(IIM)of disruptions to supply chain networks[J]. Systems Engineering, 2010, 13(4): 324-339. [22] 程国平,刘勤.供应链风险传导路径变化研究[J].价值工程,2009,28(4):1-3. [23] 陈玉印,宋国防,张莹.基于供应链节点间柔性的风险传导关键路径研究[J].物流技术,2010,29(23):147-149. [24] Jensen F V. An Introduction to bayesian networks[M]. London: UCL Press, 1996. [25] Siu N O, Kelly D L. Bayesian parameter estimation in probabilistic risk assessment[J]. Reliability Engineering & System Safety, 1998, 62(1): 89-116. |