{"id":"https://openalex.org/W2402047234","doi":"https://doi.org/10.3233/978-1-60750-785-7-77","title":"Supply Chain Risk Analysis with Linked Open Data","display_name":"Supply Chain Risk Analysis with Linked Open Data","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W2402047234","doi":"https://doi.org/10.3233/978-1-60750-785-7-77","mag":"2402047234"},"language":"en","primary_location":{"id":"doi:10.3233/978-1-60750-785-7-77","is_oa":false,"landing_page_url":"https://doi.org/10.3233/978-1-60750-785-7-77","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5116358909","display_name":"Hofman Wout","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hofman Wout","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5116358909"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.7187,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.75304223,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10215","display_name":"Semantic Web and Ontologies","score":0.9147999882698059,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10215","display_name":"Semantic Web and Ontologies","score":0.9147999882698059,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4530205726623535},{"id":"https://openalex.org/keywords/supply-chain","display_name":"Supply chain","score":0.4345329999923706},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.41784343123435974},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.33005207777023315},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.06126025319099426}],"concepts":[{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4530205726623535},{"id":"https://openalex.org/C108713360","wikidata":"https://www.wikidata.org/wiki/Q1824206","display_name":"Supply chain","level":2,"score":0.4345329999923706},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.41784343123435974},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.33005207777023315},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.06126025319099426}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/978-1-60750-785-7-77","is_oa":false,"landing_page_url":"https://doi.org/10.3233/978-1-60750-785-7-77","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"The":[0,103],"main":[1],"application":[2],"of":[3,49,97,110],"ontologies":[4,70],"is":[5,26,41],"currently":[6],"in":[7,28],"Linked":[8,75,111],"Open":[9,76,112],"Data.":[10],"Open,":[11],"encompassing":[12],"data":[13,48,98],"published":[14,27,63],"by":[15],"government":[16,93],"organizations":[17],"that":[18],"can":[19],"be":[20,59],"re-used":[21],"for":[22,43,74,92,114],"many":[23,53],"applications.":[24],"Data":[25,77,113],"a":[29],"structured":[30],"format":[31],"like":[32],"XML":[33],"(eXtensible":[34],"Markup":[35],"Language).":[36],"RDF":[37],"(Resource":[38],"Description":[39],"Framework)":[40],"used":[42],"specifying":[44],"links":[45],"between":[46],"different":[47,50],"resources.":[51],"In":[52],"applications,":[54],"the":[55,62,108],"semantics":[56],"has":[57],"to":[58,68,78,86,100],"derived":[60],"from":[61],"data.":[64],"This":[65],"paper":[66,104],"proposes":[67],"apply":[69],"and":[71],"architectural":[72],"patterns":[73],"monitoring":[79],"operational":[80],"behaviour.":[81],"Not":[82],"only":[83],"enterprises":[84],"require":[85],"monitor":[87],"their":[88],"behaviour,":[89],"but":[90],"also":[91],"authorities":[94],"gather":[95],"lots":[96],"related":[99],"law":[101],"enforcement.":[102],"specifically":[105],"focuses":[106],"on":[107],"implementation":[109],"supply":[115],"chain":[116],"risk":[117],"analysis.":[118]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
