Autonomous Supplier Evaluation and Data Stewardship with AI: Building Transparent and Resilient Supply Chains
DOI:
https://doi.org/10.22399/ijcesen.3854Keywords:
Autonomous supplier evaluation, Data stewardship, Policy-as-code, Calibrated ranking, Graph analyticsAbstract
Global supply chains remain fragile with geopolitical tensions, pandemic disruption, port congestion, and climate shocks. Conventional supplier scorecards are sluggish, passive, and rarely audit-worthy, opening up areas of blindness in risk identification and decision making. This paper provides a machine learning-ready supply analysis methodology and incorporates high-quality data governance. Autonomous supplier assessment refers to an automated judgment system that proposes calibrated probabilities and prescriptive steps of the judgment, or actions, namely: block, review, or allow, by implementing policy-as-code, a constraint by compliance requirements. The strategy unites three types of evidence: tabular data, such as lead-time volatility, OTIF performance, and defect rates; unstructured evidence, including audit reports, certificates, and contracts; and network-based features that capture the length of the tier and the risk of the community. Data are processed by entity resolution, normalization, and temporal cross-validation and leakage-safe labeling. Governance processes such as data contracts, lineage, quality SLAs, and decision logs provide accountability and audit-readiness. Trust and adoption are further increased through counterfactual explanations and human-in-the-loop triage. Experiments show that it is better for early warning of risks in delivery, quality, and compliance by combining the use of tabular and text features and graphs. The calibrated ranking strategies are more effective than the static thresholds in a limited review capacity because they can detect more adverse issues without dealing with false positives. The results reinforce that stewardship practices do not create overhead but enable resilient, transparent, and explainable autonomy. The work collectively gives methodological contributions and a business roadmap for implementing trustworthy AI in procurement.
References
[1] Agent, P., & Diaz, Y. (2024). Invitation to bid (itb) no. 24-101670 for fence and gate repair (three (3) year multiyear contract) dekalb county, georgia.
[2] Caracciolo, M. (2023). Policy as Code, how to automate cloud compliance verification with open-source tools (Doctoral dissertation, Politecnico di Torino).
[3] Cha, Y., & Lee, Y. (2024). Advanced sentence-embedding method considering token importance based on explainable artificial intelligence and text summarization model. Neurocomputing, 564, 126987.
[4] Chavan, A. (2022). Importance of identifying and establishing context boundaries while migrating from monolith to microservices. Helina. http://doi.org/10.47363/JEAST/2022(4)E168
[5] Dhanagari, M. R. (2024). MongoDB and data consistency: Bridging the gap between performance and reliability. Journal of Computer Science and Technology Studies, 6(2), 183-198. https://doi.org/10.32996/jcsts.2024.6.2.21
[6] Dhanagari, M. R. (2024). Scaling with MongoDB: Solutions for handling big data in real-time. Journal of Computer Science and Technology Studies, 6(5), 246-264. https://doi.org/10.32996/jcsts.2024.6.5.20
[7] Druetto, A., & Grosso, A. C. (2021). Column generation bounds on a network flow model to minimize the total weighted completion time for a single parallel batching machine. In 31st European Conference on Operational Research (pp. 294-294). Rudolf Vetschera.
[8] Georgiev, G. S. (2023). Is" Public Company" Still a Viable Regulatory Category?. Harv. Bus. L. Rev., 13, 1.
[9] Hanna, L. (2023). Quality Management in Primary Healthcare-a study of patients' perception of service quality in general practice in regional New South Wales.
[10] Karwa, K. (2024). The role of AI in enhancing career advising and professional development in design education: Exploring AI-driven tools and platforms that personalize career advice for students in industrial and product design. International Journal of Advanced Research in Engineering, Science, and Management. https://www.ijaresm.com/uploaded_files/document_file/Kushal_KarwadmKk.pdf
[11] Konneru, N. M. K. (2021). Integrating security into CI/CD pipelines: A DevSecOps approach with SAST, DAST, and SCA tools. International Journal of Science and Research Archive. Retrieved from https://ijsra.net/content/role-notification-scheduling-improving-patient
[12] Kumar, A. (2019). The convergence of predictive analytics in driving business intelligence and enhancing DevOps efficiency. International Journal of Computational Engineering and Management, 6(6), 118-142. Retrieved from https://ijcem.in/wp-content/uploads/THE-CONVERGENCE-OF-PREDICTIVE-ANALYTICS-IN-DRIVING-BUSINESS-INTELLIGENCE-AND-ENHANCING-DEVOPS-EFFICIENCY.pdf
[13] Malik, G. (2025). Business continuity & incident response. Journal of Information Systems Engineering and Management, 10(45s), 451–473. https://www.jisem-journal.com/index.php/journal/article/view/8891
[14] Malik, G., & Prashasti, P. (2025). Shift left security. The Eastasouth Journal of Information System and Computer Science, 2(03), 219–245. https://doi.org/10.58812/esiscs.v2i03.528
[15] Mantzoukas, K. (2020). Runtime monitoring of security SLAs for big data pipelines: design implementation and evaluation of a framework for monitoring security SLAs in big data pipelines with the assistance of run-time code instrumentation (Doctoral dissertation, City, University of London).
[16] Matwin, S., Milios, A., Prałat, P., Soares, A., & Théberge, F. (2021). Survey of generative methods for social media analysis. arXiv preprint arXiv:2112.07041.
[17] Mintzer, S., & Snyder, D. V. (2023). International Trade and Forced Labor Compliance: Using Contracts to Avoid Prohibited Imports from China and the World. Contracts for Responsible and Sustainable Supply Chains: Model Contract Clauses, Legal Analysis, and Practical Perspectives, Susan A. Maslow & David V. Snyder, eds.(ABA 2023), American University, WCL Research Paper, (2023-12).
[18] Neupane, S., Ables, J., Anderson, W., Mittal, S., Rahimi, S., Banicescu, I., & Seale, M. (2022). Explainable intrusion detection systems (x-ids): A survey of current methods, challenges, and opportunities. IEEE Access, 10, 112392-112415.
[19] Nyati, S. (2018). Transforming telematics in fleet management: Innovations in asset tracking, efficiency, and communication. International Journal of Science and Research (IJSR), 7(10), 1804-1810. Retrieved from https://www.ijsr.net/getabstract.php?paperid=SR24203184230
[20] Paleti, S. (2024). Data Engineering for AI-Powered Compliance: A New Paradigm in Banking Risk Management. European Advanced Journal for Science & Engineering (EAJSE)-p-ISSN 3050-9696 en e-ISSN 3050-970X, 2(1).
[21] Ramezankhani, M., & Boghosian, A. (2024). A transductive learning-based early warning system for housing and stock markets with off-policy optimization. IEEE Access.
[22] Renckens, S., & Auld, G. (2022). Time to certify: Explaining varying efficiency of private regulatory audits. Regulation & governance, 16(2), 500-518.
[23] Romanazzi, L. (2024). Exploring the Influence of Behavioral Biases on Project Evaluation and Cost Management.
[24] Rostamzadeh, R., Akbarian, O., Banaitis, A., & Soltani, Z. (2021). Application of DEA in benchmarking: a systematic literature review from 2003–2020. Technological and Economic Development of Economy, 27(1), 175-222.
[25] Sardana, J. (2022). The role of notification scheduling in improving patient outcomes. International Journal of Science and Research Archive. Retrieved from https://ijsra.net/content/role-notification-scheduling-improving-patient
[26] Sedlak, B., Pujol, V. C., Donta, P. K., & Dustdar, S. (2024, July). Diffusing high-level SLO in microservice pipelines. In 2024 IEEE International Conference on Service-Oriented System Engineering (SOSE) (pp. 11-19). IEEE.
[27] Sikos, L. F., & Philp, D. (2020). Provenance-aware knowledge representation: A survey of data models and contextualized knowledge graphs. Data Science and Engineering, 5(3), 293-316.
[28] Singh, V. (2022). Explainable AI in healthcare diagnostics: Making AI models more transparent to gain trust in medical decision-making processes. International Journal of Research in Information Technology and Computing, 4(2). https://romanpub.com/ijaetv4-2-2022.php
[29] Singh, V. (2022). Visual question answering using transformer architectures: Applying transformer models to improve performance in VQA tasks. Journal of Artificial Intelligence and Cognitive Computing, 1(E228). https://doi.org/10.47363/JAICC/2022(1)E228
[30] Sissodia, R., Rauthan, M. S., & Barthwal, V. (2024). Service level agreements (SLAs) and their role in establishing trust. In Analyzing and Mitigating Security Risks in Cloud Computing (pp. 182-193). IGI Global Scientific Publishing.
[31] Soriano-Salvador, E., & Guardiola-Múzquiz, G. (2021). Sealfs: Storage-based tamper-evident logging. Computers & Security, 108, 102325.
[32] Steenwinckel, B., De Paepe, D., Vanden Hautte, S., Heyvaert, P., Bentefrit, M., Moens, P., ... & Ongenae, F. (2021). FLAGS: A methodology for adaptive anomaly detection and root cause analysis on sensor data streams by fusing expert knowledge with machine learning. Future Generation Computer Systems, 116, 30-48.
[33] Vyas, P. (2020). Business Continuity and Disaster Recovery Management System (Doctoral dissertation, Institute of Technology).
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.