Critical Nodes - Watson Project

[...] However, the vulnerability to fraud represented by these roles in different supply chains is still indicated in Fig 2.