2013 年 2013 巻 SAI-016 号 p. 04-
This paper analyzes the vulunerability of firms transaction networks empirically. First we try to reproduce the product and money flows on the network using firms' attributes and input-output table. Then we apply the flows to large real transaction dataset. Finally, we identify the most critical firms and industries for the network vulunerability.