1. ISO 31000:2018, Risk management — Guidelines. Clause 6.4.2, "Risk identification," states that the purpose is to "find, recognize and describe risks that might help or prevent an organization achieving its objectives." It further suggests that this process should consider a wide range of factors, including the organization's "relationships with, and perceptions and values of, external stakeholders," which directly encompasses the supply chain. The analysis of the supply chain is a method to fulfill this requirement by identifying potential disruptions (vulnerabilities).
2. Sheffi, Y. (2005). The Resilient Enterprise: Overcoming Vulnerability for Competitive Advantage. MIT Press. In Chapter 2, "The Nature of Disruptions," Sheffi emphasizes that the first step in building resilience is understanding and identifying vulnerabilities throughout the supply chain. The book, a foundational text from a leading academic institution, frames supply-chain analysis as a critical tool for discovering these hidden weaknesses before they lead to a crisis.
3. Jüttner, U., Peck, H., & Christopher, M. (2003). Supply chain vulnerability: An investigation of the sources and drivers. International Journal of Logistics Management, 14(1), 1-18. This peer-reviewed article defines supply chain vulnerability as an organization's exposure to serious disturbances. The authors argue that a key management task is to conduct analyses to identify the sources of risk and drivers of vulnerability within the supply network and its external environment (p. 12). DOI: https://doi.org/10.1108/09574090310806479