2013 Volume 2013 Issue SAI-016 Pages 04-
This paper analyzes the vulunerability of firms transaction networks empirically. First we try to reproduce the product and money flows on the network using firms' attributes and input-output table. Then we apply the flows to large real transaction dataset. Finally, we identify the most critical firms and industries for the network vulunerability.