SEARCH Articles Figures Tables Assessing the Vulnerability of Supply Chains Supply chain vulnerability Vulnerability