RESUMO
Circular supplier selection is the process of selecting suppliers in a closed-loop supply chain. Sustainable circular supplier selection addresses the social and environmental concerns in circular supplier selection problems. In this paper, for the first time, we combine the fuzzy best-worst method and the interval VIKOR technique to evaluate and prioritize sustainable suppliers in circular supply chains. The evaluation criteria are classified into three categories of economic, social, and circular factors extracted based on the domain expert's opinions. The fuzzy best-worst method is used to weigh the criteria, and the interval VIKOR technique is applied to evaluate the suppliers in the presence of uncertainty. This study contributes to the sustainable development goals (SDG's) of providing Decent Work and Economic Growth (SDG 8) and Responsible Consumption and Production (SDG 12). The proposed method is then used to evaluate six suppliers in the wire-and-cable industry in Iran. The results obtained from the implementation of the proposed approach and its sensitivity analysis indicate the applicability and efficiency of the proposed approach.
RESUMO
The primary goal in project portfolio management is to select and manage the optimal set of projects that contribute the maximum in business value. However, selecting Information Technology (IT) projects is a difficult task due to the complexities and uncertainties inherent in the strategic-operational nature of the process, and the existence of both quantitative and qualitative criteria. We propose a two-stage process to select an optimal project portfolio with the aim of maximizing project benefits and minimizing project risks. We construct a two-stage hybrid mathematical programming model by integrating Fuzzy Analytic Hierarchy Process (FAHP) with Fuzzy Inference System (FIS). This hybrid framework provides the ability to consider both the quantitative and qualitative criteria while considering budget constraints and project risks. We also present a real-world case study in the cybersecurity industry to exhibit the applicability and demonstrate the efficacy of our proposed method.