<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Empowering Supply Chain Risk Monitoring with Ontology-Guided Knowledge Graph Extraction by LLMs</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Shuhan Zheng</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Keita Mizushina</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ken Naono</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Research and Development Group, Hitachi, Ltd.</institution>
          ,
          <addr-line>Tokyo</addr-line>
          ,
          <country country="JP">Japan</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>With business globalization and increasing product complexity, companies often operate supply chains distributed around the world. Such globally distributed supply chains face various disruption risks, highlighting the need for procurement oficers to efectively monitor these risks. A popular paradigm is to apply information extraction technologies to open data for risk extraction. Here, we introduce an ontology-guided method for supply chain risk extraction that leverages large language models. Our method iteratively extracts a supply chain risk knowledge graph from unstructured open data, guided by a user-specified ontology. We also developed knowledge graph verification and formatting modules. Our wholistic methods enable consistent and automated identification and extraction of risk knowledge, thereby empowering procurement oficers to monitor supply chain risks.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Knowledge graph</kwd>
        <kwd>Ontology</kwd>
        <kwd>Large language model</kwd>
        <kwd>Supply chain</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Business background: Modern enterprise supply chains are distributed around the world. With
the broad geographical distribution, supply chains are facing various disruption risks, ranging from
natural hazards to regional conflicts [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. To achieve eficient supply chain risk monitoring, extracting
semantic information of risk events from a large volume of open data (e.g., news, government report) is
a promising approach. By informing procurement oficers (POs) about risk semantic information, POs
are able to take targeted countermeasure to mitigate potential risk impacts on their supply chains.
Investigations on existing solutions: There has been a sustained interest in the supply chain research
community in developing techniques to extract supply chain risks. Our literature investigation identifies
two main categories of approaches. The first category comprises ontology-based semantic methods.
These methods utilize static ontology metadata as data schema to organize extracted risk data [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ]. The
second category reflects the emerging trend of leveraging artificial intelligence (AI) for risk extraction
and assessment. This includes the application of deep learning models [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ], and state-of-the-art
natural language processing (NLP) models [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ], as evidenced in a recent survey [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Although previous
methods difer in detailed algorithms and input data, they share two notable drawbacks.
      </p>
      <p>
        First, previous ontology-based semantic approaches did not efectively incorporate ontology within
the risk extraction process. While these methods rely heavily on experts to build the ontology, the
resulting ontology serves as a static metadata of data schema [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. It does not play an active role in
guiding or improving the extraction, which limits the integration of expert knowledge in the extraction
process.
      </p>
      <p>
        Second, recent AI-based models face challenges related to low explainability, limited interpretability,
and poor adaptability to dynamic environments [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. In supply chain risk assessment, stakeholders
require clear insights into why a model makes a specific prediction or decision. However, many existing
AI models function as black boxes. Furthermore, the supply chain environment is inherently dynamic
and constantly evolving [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Adaptability is not just desirable—it is essential. Yet, many AI-based
models are trained for a specific domain and remain fixed once trained, making them dificult to be
adjusted. As a result, POs are unable to tailor these models easily to new risk challenges.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Methods</title>
      <p>
        We propose an ontology-guided, iterative method that uses Large Language Models (LLMs) to extract a
supply chain risk knowledge graph (KG), addressing the limitations of previous approaches. Compared
with similar methodologies [
        <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
        ], our method is distinguished by two key innovations: (i) the ontology
is user-specified, allowing it to be tailored to specific risk-monitoring needs; and ( ii) the ontology guides
the LLM in a stepwise, chain-of-thought [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] iterative extraction process.
      </p>
      <p>The process consists of three main stages:
1. Ontology Specification. An ontology should be specified to guide the LLM in the knowledge
graph extraction process. While we provide templates (e.g., NaturalHazard ontology), users can
create custom ontology like MilitaryConflict (e.g., involving defined labels like ConflictEvent,
ConflictSideA, ConflictSideB) for monitoring conflict risks.
2. Iterative Knowledge Extraction. The extraction begins when source documents (e.g., news) are
collected. Initially, the LLM is provided with a system prompt containing the complete ontology
and instructions for KG extraction. Then, the extraction process iterates through each relation
triple defined in the ontology (e.g., &lt;ConflictSideA&gt;–involvesIn–&lt;ConflictEvent&gt;). In
each iteration, the LLM is prompted with the target relation triple, the source document, and
the KG extracted so far. The LLM extracts new KG nodes and relationships in the text. An
illustration is given in Figure 1. This iterative feedback loop creates an explicit chain-of-thought
process, progressively assembling a comprehensive and context-aware KG.
3. Verification and Formatting. Here, we verify and format extracted nodes and relationships.</p>
      <p>First, a dedicated judge LLM verifies nodes and relationships against the source text. The judge
LLM returns a confidence score reflecting how faithfully the relation is supported by the text.
Nodes and relationships with scores below a threshold are discarded, while higher-scoring ones
are kept. Second, another LLM formats key entities to a standard format (e.g., dates to ISO 8601)
to enhance consistency across the final KG.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Applications and Case Study Validation</title>
      <p>The adaptability of our ontology-guided method enables diverse applications. By allowing users to
specify the ontology, the resulting KG can be tailored to unique monitoring needs. We demonstrate this
with the following applications:
1. Versatile Risk Monitoring: Our method allows for supply chain risk monitoring adaptable to
various risk domains by changing the guiding ontology.</p>
      <p>• Natural Hazards: Guided by a NaturalHazard ontology (see Figure 2), the LLM extracts
natural hazard risk events from open data. The resulting KG, containing location information,
can be linked to supplier locations, alerting POs to potential disruptions. For explainability,
source URLs are included as metadata, enabling information traceability.</p>
      <p>• Conflicts: To monitor conflict risks, users can design a Conflict ontology (e.g., with
deifned labels like ConflictEvent, ConflictSideA, ConflictSideB), guiding the LLM
to extract relevant knowledge from news data.
2. Impact Annotations: Our method supports analyzing the potential impact of future risks using
historical data. For instance, to help domestic procurement teams contextualize overseas events
(e.g., a cyclone in India), a NaturalHazardSupplyChainImpact ontology (see Figure 2) can guide
the LLM to extract the semantic details of how past cyclones have afected supply chains in that
region. This structured historical knowledge enables the annotation of future risk alerts with
meaningful impact predictions for better-informed decision-making.</p>
      <p>
        To validate our method, we introduce a brief case study of Impact Annotations. We focused on
cyclone hazards in the Indian Ocean region. We collected over 7,000 news articles via an open data API
and applied the NaturalHazardSupplyChainImpact ontology to guide an LLM in extracting a KG. The
process yielded a KG with 30,881 entities and 51,893 relationships. From this graph, we generated 9,592
specific impact annotations through Cypher queries [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], including 2,058 detailing power disruptions
and 839 related to flight suspensions. This case study illustrates our framework’s ability to produce
rich, actionable impact annotations, enabling POs to better anticipate and manage future supply chain
disruptions.
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusions and Future Works</title>
      <p>We proposed an LLM-based, ontology-guided method for supply chain risk monitoring. Our
ontologyguided method provides semantically rich knowledge graph extraction and achieves adaptability to
diferent risk scenarios.</p>
      <p>Future works include modeling the severity of events to make the KG not only semantically rich but
also quantitatively informative. Enhancing data orchestration with active metadata is another direction.
To fully realize the potential of the proposed method, developing a data platform capable of supporting
active ontology metadata is necessary.</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgment</title>
      <p>We would like to thank Qi Xiu (Hitachi, Ltd.) for providing mentorship to Shuhan during his first year
of research. We also thank Tsunehiko Baba (Hitachi, Ltd.) and Mika Takata (Hitachi, Ltd.) for their
supports during this research.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the author(s) used ChatGPT in order to: Grammar and spelling
check. The author(s) reviewed and edited the content as needed and take(s) full responsibility for the
publication’s content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Qin</surname>
          </string-name>
          , C.-W. Su,
          <string-name>
            <given-names>M.</given-names>
            <surname>Umar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.-R.</given-names>
            <surname>Lobonţ</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. G.</given-names>
            <surname>Manta</surname>
          </string-name>
          ,
          <article-title>Are climate and geopolitics the challenges to sustainable development? novel evidence from the global supply chain</article-title>
          ,
          <source>Economic Analysis and Policy</source>
          <volume>77</volume>
          (
          <year>2023</year>
          )
          <fpage>748</fpage>
          -
          <lpage>763</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J.</given-names>
            <surname>Woetzel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Rogers</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Boland</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Samandari</surname>
          </string-name>
          ,
          <article-title>Could climate become the weak link in your supply chain?</article-title>
          ,
          <source>McKinsey Sustainability</source>
          (
          <year>2020</year>
          ). URL: https://www.mckinsey.com/capabilities/ sustainability/our-insights/
          <article-title>could-climate-become-the-weak-link-in-your-supply-chain.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Emmenegger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Hinkelmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Laurenzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Thönssen</surname>
          </string-name>
          ,
          <article-title>Towards a procedure for assessing supply chain risks using semantic technologies</article-title>
          ,
          <source>in: International Joint Conference on Knowledge Discovery, Knowledge Engineering, and Knowledge Management</source>
          , Springer,
          <year>2012</year>
          , pp.
          <fpage>393</fpage>
          -
          <lpage>409</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>C.</given-names>
            <surname>Palmer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. N.</given-names>
            <surname>Urwin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Niknejad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Petrovic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Popplewell</surname>
          </string-name>
          ,
          <string-name>
            <surname>R. I. Young</surname>
          </string-name>
          ,
          <article-title>An ontology supported risk assessment approach for the intelligent configuration of supply networks</article-title>
          ,
          <source>Journal of Intelligent Manufacturing</source>
          <volume>29</volume>
          (
          <year>2018</year>
          )
          <fpage>1005</fpage>
          -
          <lpage>1030</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>M. M. Bassiouni</surname>
            ,
            <given-names>R. K.</given-names>
          </string-name>
          <string-name>
            <surname>Chakrabortty</surname>
            ,
            <given-names>O. K.</given-names>
          </string-name>
          <string-name>
            <surname>Hussain</surname>
            ,
            <given-names>H. F.</given-names>
          </string-name>
          <string-name>
            <surname>Rahman</surname>
          </string-name>
          ,
          <article-title>Advanced deep learning approaches to predict supply chain risks under covid-19 restrictions</article-title>
          ,
          <source>Expert Systems with Applications</source>
          <volume>211</volume>
          (
          <year>2023</year>
          )
          <fpage>118604</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Song</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Ding</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Nie</surname>
          </string-name>
          ,
          <article-title>Using long short-term memory model to study risk assessment and prediction of china's oil import from the perspective of resilience theory</article-title>
          ,
          <source>Energy</source>
          <volume>215</volume>
          (
          <year>2021</year>
          )
          <fpage>119152</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.</given-names>
            <surname>Deiva Ganesh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Kalpana</surname>
          </string-name>
          ,
          <article-title>Supply chain risk identification: a real-time data-mining approach</article-title>
          ,
          <source>Industrial Management &amp; Data systems 122</source>
          (
          <year>2022</year>
          )
          <fpage>1333</fpage>
          -
          <lpage>1354</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Shahsavari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. K.</given-names>
            <surname>Hussain</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Saberi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Sharma</surname>
          </string-name>
          ,
          <article-title>Event identification for supply chain risk management through news analysis by using large language models</article-title>
          ,
          <source>The Review of Socionetwork Strategies</source>
          <volume>18</volume>
          (
          <year>2024</year>
          )
          <fpage>255</fpage>
          -
          <lpage>278</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Jahin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Naife</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Saha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mridha</surname>
          </string-name>
          ,
          <article-title>Ai in supply chain risk assessment: A systematic literature review and bibliometric analysis</article-title>
          ,
          <source>arXiv preprint arXiv:2401.10895</source>
          (
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>A.-M. Nitsche</surname>
            ,
            <given-names>C.-A.</given-names>
          </string-name>
          <string-name>
            <surname>Schumann</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Franczyk</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Reuther</surname>
          </string-name>
          ,
          <article-title>Artificial intelligence inspired supply chain collaboration: a design-science research and system dynamics approach</article-title>
          , in: 2021 IEEE International Conference on Engineering, Technology and Innovation, IEEE,
          <year>2021</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>N.</given-names>
            <surname>Mihindukulasooriya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tiwari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. F.</given-names>
            <surname>Enguix</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Lata</surname>
          </string-name>
          ,
          <article-title>Text2kgbench: A benchmark for ontologydriven knowledge graph generation from text</article-title>
          , in: International Semantic Web Conference, Springer,
          <year>2023</year>
          , pp.
          <fpage>247</fpage>
          -
          <lpage>265</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Cauter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Yakovets</surname>
          </string-name>
          ,
          <article-title>Ontology-guided knowledge graph construction from maintenance short texts</article-title>
          ,
          <source>in: Proceedings of the 1st Workshop on Knowledge Graphs and Large Language Models</source>
          ,
          <year>2024</year>
          , pp.
          <fpage>75</fpage>
          -
          <lpage>84</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>J.</given-names>
            <surname>Wei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Schuurmans</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bosma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Ichter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Xia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. H.</given-names>
            <surname>Chi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q. V.</given-names>
            <surname>Le</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <article-title>Chainof-thought prompting elicits reasoning in large language models</article-title>
          ,
          <source>in: Proceedings of the 36th International Conference on Neural Information Processing Systems</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>24824</fpage>
          -
          <lpage>24837</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>N.</given-names>
            <surname>Francis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Green</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Guagliardo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Libkin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Lindaaker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Marsault</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Plantikow</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Rydberg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Selmer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Taylor</surname>
          </string-name>
          , Cypher:
          <article-title>An evolving query language for property graphs</article-title>
          ,
          <source>in: Proceedings of the 2018 International Conference on Management of Data</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>1433</fpage>
          -
          <lpage>1445</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>