Documente Academic
Documente Profesional
Documente Cultură
www.elsevier.com/locate/dsw
Department of Management, Worcester Polytechnic Institute, 100 Institute Road, Worcester, MA 01609-2280, USA
Received 20 July 1998; accepted 22 September 1999
Abstract
This paper discusses and reviews the use of super-eciency approach in data envelopment analysis (DEA) sensitivity
analyses. It is shown that super-eciency score can be decomposed into two data perturbation components of a
particular test frontier decision making unit (DMU) and the remaining DMUs. As a result, DEA sensitivity analysis
can be done in (1) a general situation where data for a test DMU and data for the remaining DMUs are allowed to vary
simultaneously and unequally and (2) the worst-case scenario where the eciency of the test DMU is deteriorating
while the eciencies of the other DMUs are improving. The sensitivity analysis approach developed in this paper can be
applied to DMUs on the entire frontier and to all basic DEA models. Necessary and sucient conditions for preserving
a DMUs eciency classication are developed when various data changes are applied to all DMUs. Possible infeasibility of super-eciency DEA models is only associated with extreme-ecient DMUs and indicates eciency stability
to data perturbations in all DMUs. 2001 Elsevier Science B.V. All rights reserved.
Keywords: Data envelopment analysis (DEA); Eciency; Linear programming; Sensitivity analysis; Super-eciency
1. Introduction
During the recent years, the issue of sensitivity
and stability of data envelopment analysis (DEA)
results has been extensively studied. Some studies
focus on the sensitivity of DEA results to the
variable and model selection, e.g., Ahn and Seiford
(1993) and Smith (1997). Most of the DEA sensitivity analysis studies focus on the misspecication
of eciency classication of a test decision making
unit (DMU). However, we shall note that DEA is
0377-2217/01/$ - see front matter 2001 Elsevier Science B.V. All rights reserved.
PII: S 0 3 7 7 - 2 2 1 7 ( 9 9 ) 0 0 4 3 3 - 6
444
method is dependent on a particular SCSC solution, among others, and therefore the resulting
analysis may vary.
In this paper, we focus on the DEA sensitivity
analysis methods based on super-eciency DEA
models. For the DEA sensitivity analysis based on
the inverse of basis matrix, the reader is referred to
Neralic (1994). It is well known that certain supereciency DEA models may be infeasible for some
extreme-ecient DMUs. Seiford and Zhu (1999)
develop the necessary and sucient conditions for
infeasibility of various super-eciency DEA
models. Although the super-eciency DEA models employed in Charnes et al. (1992) and Charnes
et al. (1996) do not encounter the infeasibility
problem, the models used in Seiford and Zhu
(1998a) do. Seiford and Zhu (1998a) discover the
relationship between infeasibility and stability of
eciency classication. That is, infeasibility means
that the CCR eciency of the test DMU remains
stable to data changes in the test DMU. Furthermore, Seiford and Zhu (1998b) show that this relationship is also true for the simultaneous data
change case and other DEA models, such as BCC
model of Banker et al. (1984) and additive model
of Charnes et al. (1985b). This nding is critical
since super-eciency DEA models in Seiford and
Zhu (1998b) are frequently infeasible for realworld data sets, indicating eciency stability with
respective to data variations in inputs/outputs associated with infeasibility.
This study attempts to generalize the results in
Seiford and Zhu (1998b) to a situation where
variable percentage data changes are assumed for
a test DMU and for the remaining DMUs. We
consider the same worst-case analysis as in Seiford
and Zhu (1998b). It is shown that a particular
super-eciency score can be decomposed into two
data perturbation components of a particular test
DMU and the remaining DMUs. Also, necessary
and sucient conditions for preserving a DMUs
eciency classication are developed when various
data changes are applied to all DMUs. As a result,
DEA sensitivity analysis can be easily applied if we
employ various super-eciency DEA models.
The current article proceeds as follows. In
Section 2, we present some basic DEA models and
dene the data variations in a test frontier DMU
445
2. Preliminaries
Suppose we have a set of n DMUs. Each
DMUj j 1; . . . ; n, produces s dierent outputs
yrj r 1; . . . ; s utilizing m dierent inputs
xij i 1; . . . ; m. Two types of orientation DEA
models are often used to evaluate DMUs relative
eciency: CRS models, such as CCR model, and
VRS models, such as BCC model. For example, an
input-oriented CRS model can be expressed as
h0CRS
h0CRS
min
n
X
o
s:t:
kj xij s
i hCRS xi0 ;
j1
i 1; 2; . . . ; m;
n
X
kj yrj
j1
s
r
yr0 ;
r 1; 2; . . . ; s;
h0CRS ;
kj ; s
i ; sr P 0;
where, xi0 and yr0 are respectively the ith input and
we add
rth output for DMU0 under evaluation.
PIf
n
an additional convex constraint of
j1 kj 1
into (1), we obtain an input-oriented VRS model.
The dual to (1) can be written as
max
s:t:
s
X
r1
s
X
r1
m
X
ur yr0
ur yrj
m
X
i1
vi xi0 1;
i1
ur ; vi P 0:
vi xij 6 0;
j 1; . . . ; n;
er
er
min hsup
hsup
0
0
n
X
er
s:t:
kj xij 6 hsup
xi0 ;
0
j1; j60
i 1; 2; . . . ; m;
n
X
kj yrj P yr0 ;
j1; j60
r 1; 2; . . . ; s;
er
;
hsup
0
kj j 6 0 P 0:
er
er
max /sup
/sup
0
0
n
X
er
s:t:
kj yrj P /sup
yr0 ;
0
j1; j60
r 1; . . . ; s;
n
X
kj xij 6 xi0 ;
4
i 1; . . . ; m;
j1; j60
er
; kj j 6 0 P 0:
/sup
0
446
Table 1
Sample DMUs
DMU
x1
x2
h0sup er h0If1;2g
h0If1g
h0If2g
A
B
C
D
1
1
1
1
2
3
6
2
5
3
2
7
15/13
26/21
3/2
1
5/4
14/9
Infeasible
1
7/5
17/12
3/2
5/7
and
y^r0 sr yr0 ;
y^r0 yr0 ;
and
sr ;
y^rj yrj =~
y^rj yrj ;
for DMUj j 6 0,
x^ij xij =d~i ; d~i P 1; i 2 I;
i 62 I;
x^ij xij ;
0 < s~r 6 1; r 2 O;
r 62 O;
di P 1; i 2 I;
i 62 I;
0 < sr 6 1; rr 2 O;
r 62 O;
r62O
r62O
i 2 I;
j1; j60
n
X
kj xij 6 xi0 ;
i 62 I;
j1; j60
n
X
kj yrj P yr0 ;
h0I ; kj j 6 0 P 0
and
s:t:
max
n
X
/0O
kj yrj P /0O yr0 ;
r 2 O;
j1; j60
n
X
kj yrj P yr0 ;
r 62 O;
j1; j60
n
X
kj xij 6 xi0 ;
Models (5) and (6) measure the maximum increase rate of inputs associated with I and the
maximum decrease rate of outputs associated with
O, respectively, required for DMU0 to reach the
frontier of DMUj j 6 0 when other inputs and
outputs are kept at their current levels. For example, consider B in Table 1 (Fig. 1) and model
(5). If I f1g; hBf1g 149 indicates that B reaches
B1 by changing its x1 to 149 3 143. If I f2g;
indicates that B reaches B2 by changing
hBf2g 17
12
its x2 to 17
3 174. If I f1; 2g; hBf1;2g hBsup er
12
26
gives the input increase rate for B in order to
21
reach B0 .
Associated with the optimal values in models
(3)(6), we have:
Lemma 2.
er
1, then h0I 6 1;
(i) If hsup
0
er
(ii) If /sup
1, then /0O P 1.
0
r 1; 2; . . . ; s;
j1; j60
/0O
447
i 1; . . . ; m;
j1; j60
/0O ; kj j 6 0 P 0:
If
I fkg; k 2 f1; . . . ; mg and O flg;
l 2 f1; . . . ; sg;
then optimal values of
h0I h0k k 1; . . . ; m and
/0O /0l l 1; . . . ; s
are used by Zhu (1996) and Seiford and Zhu
(1998a) to compute the exact (largest) stability
region for DMU0 when variations in the data are
only applied to DMU0 .
Lemma 3.
er
448
know that for any di P 1 and d~i P 1, with an objective function value of 1, vi and ur is a feasible
solution to (2) in which inputs are replaced by
x^ij for i 2 I and xij for i 62 I. Thus, DMU0 remains in set F after input data changes set I in
all DMUs.
(ii) The proof is similar to that of (i).
Corollary 1.
(i) If for any di P 1 and d~i P 1 i 2 I; DMU0
er
remains in set F, then (a) hsup
1 and
0
sup er
0
0
1 and hI 1;
hI < 1, or (b) h0
(ii) If for any 0 < sr 6 1 and 0 < s~r 6 1 r 2 O;
er
DMU0 remains in set F, then (a) /sup
1
0
sup er
0
0
1 and /O 1:
and /O > 1, or (b) /0
449
n
P
>
>
kj xij 6 xi0 ;
:
i 62 I;
j1; j60
er
which indicates that hsup
1 is a feasible so0
er
6 1. A conlution to (3). Therefore, hsup
0
0
tradiction. Thus, hI > 1.
(ii) The proof is similar to that of (i).
er
er
> 1 and /sup
< 1,
Theorem 3. Suppose hsup
0
0
then
(i) If 1 6 di d~i < h0I for i 2 I, then DMU0 remains
extreme-ecient. Furthermore, if equality holds
for di d~i h0I , that is, 1 6 di d~i 6 h0I , then
DMU0 remains on the frontier, where h0I is the
optimal value to (5).
(ii) If /0O < sr s~r 6 1 for r 2 O, then DMU0 remains extreme-ecient. Furthermore, if equality
holds for sr s~r /0O , that is, /0O 6 sr s~r 6 1, then
450
Proof.
(i) Note that from Lemma 4, h0I > 1. Now sup
0
0
0
pose 1 6 di d~i < hI , and DMU0 is not extreme-ecient when x^i0 d0i xi0 and x^ij xij =d~0i ;
2 I. Then, there exist kj j 6 0 P 0 and
er
6 1 in (3) such that
hsup
0
n
X
kj
j1; j60
xij
6 h0sup er doi xi0 ;
0
~
d
n
X
er
kj xij 6 hsup
xi0
0
j1; j60
n
X
i 2 I;
kj yrj P yr0 ;
6 xi0 ;
i 62 I;
e~
e X0 :
r 1; 2; . . . ; s:
j1; j60
er 0 ~0
di di is
This means that kj j 6 0 P 0 and hsup
0
sup er 0 ~0
d
a feasible
solution
to
(5).
But
h
0
i di <
er 0
0
hsup
h
6
h
violating
the
optimality
of
h0I .
0
I
I
0 ~0
0
Thus, if 1 6 di di < hI , then DMU0 remains extreme-ecient.
Next, if d0i d~0i h0I , then we assume DMU0 is
not a frontier point when x^i0 d0i x i0 and
er
x^ij xij =d~0i ; i 2 I. Thus, we
have hsup
< 1 in
0
sup er 0 ~0
sup er 0
di di 6 h0
hI < h0I
(3). Now we have h0
0
violating the optimality of hI . Thus, if 1 6
d0i d~0i 6 h0I , then DMU0 remains on the frontier.
Theorem 3 gives sucient conditions for preserving eciency. The following theorem implies
necessary conditions for preserving eciency of an
extreme-ecient DMU0 .
er
er
> 1 and /sup
< 1,
Theorem 4. Suppose hsup
0
0
then
(i) If di d~i > h0I for i 2 I, then DMU0 will not be
extreme-ecient, where h0I is the optimal value
to (5).
(ii) If sr s~r < /0O for r 2 O, then DMU0 will not
be extreme-ecient, where /0O is the optimal value to (6).
Proof.
(i) We assume that DMU0 remains extreme-ecient after the data changes in all DMUs with
di d~i > h0I . Consider the input constraints associated with set I in (5),
n
X
kj
j1; j60
xij ^0
6 hI di xi0 ;
d~i
i 2 I;
i 2 I:
j1; j60
Let h^0I be the optimal value. Obviously, h^0I
h0I =di d~i < 1, where h0I is the optimal value to
(5). On the basis of Lemma 4 (i), h^0I must be
greater than one in (5) with input constraints
of (8). A contradiction.
(ii) The proof is similar to (i), but is based on
(6).
451
i 2 I;
j1; j60
n
X
kj xij 6 xi0 ;
i 62 I;
j1; j60
n
X
9
kj yrj P 1 Cyr0 ;
r 2 O;
j1; j60
n
X
kj yrj P yr0 ;
r 62 O;
j1; j60
kj j 6 0 P 0;
C unrestricted:
452
pEquivalentlyp
1 C and sr s~r 1 C , then DMU0 still remains on the frontier. We shall assume that after
the data changes, DMU0 is a nonfrontier point,
and therefore can be enveloped by the adjusted
DMUj j 6 0. Thus,
n
X
kj
j1; j60
n
X
xij
6 di xi0 ;
d~i
kj xij 6 xi0 ;
i 2 I;
kj
i 62 I;
j1; j60
n
X
yrj
P sr yr0 ;
s~r
kj yrj P yr0 ;
r 2 O;
r 62 O:
kj xij 6 1 C xi0 ;
i 2 I;
j1; j60
i 62 I;
j1; j60
n
X
kj yrj P 1 C yr0 ;
r 2 O;
j1; j60
n
X
kj 1;
j1; j60
kj xij 6 xi0 ;
n
X
That is,
n
X
j1; j60
j1; j60
n
X
n
X
j1; j60
n
X
kj yrj P yr0 ;
r 62 O:
j1; j60
in the VRS models, we are able to discuss the simultaneous absolute data changes in all DMUs.
That is, absolute data perturbations (variations):
for DMU0
(
x^i0 xi0 ai ;
x^i0 xi0 ;
ai P 0; i 2 I;
i 62 I;
and
(
y^r0 yr0 br ;
y^r0 yr0 ;
br P 0; r 2 O;
r 62 O;
for DMUj (j 6 0)
(
x^ij xij a~i ; a~i P 0; i 2 I;
i 62 I;
x^ij xij ;
and
y^rj yrj b~r ;
y^rj yrj ;
b~r P 0; r 2 O;
r 62 O;
j1; j60
n
X
kj xij 6 xi0 ;
min
X
X
c
c
i
r
s:t:
i 2 I;
n
X
r2O
kj xij 6 xi0 c
i ;
i 2 I;
j1; j60
n
X
i 62 I;
kj xij 6 xi0 ;
i 62 I;
j1; j60
j1; j60
n
X
kj yrj P yr0 c;
j1; j60
n
X
r 2 O;
10
n
X
kj yrj P yr0 c
r ;
r 2 O;
11
j1; j60
kj yrj P yr0 ;
r 62 O;
j1; j60
n
X
n
X
kj yrj P yr0 ;
r 62 O;
j1; j60
kj 1;
j1; j60
c; kj j 6 0 P 0:
If I f1; 2; . . . ; mg and O f1; 2; . . . ; sg, then
model (10) is used by Charnes et al. (1992) to study
the sensitivity of eciency classications in the
additive model via L1 norm when variations in the
data are only applied to DMU0 .
Theorem 6. Suppose DMU0 is a frontier point.
If 0 6 ai a~i 6 c i 2 I; 0 6 br b~r 6 c r 2 O,
then DMU0 remains as a frontier point, where c is
the optimal value to (10).
Proof. The proof is similar to that of Theorem 4 by
noting that
n
X
``minimize
i2I i
r2O cr '' and obtain the
following super-eciency DEA model:
i2I
c min c
n
X
s:t:
kj xij 6 xi0 c;
453
n
X
kj 1;
j1; j60
c
i ; cr ; kj j 6 0 P 0:
j1; j60
kj 1:
454
4. Conclusions
The current paper develops a new approach for
the sensitivity analysis of DEA models by using
various super-eciency DEA models in which a
test DMU is not included in the reference set. The
new sensitivity analysis approach simultaneously
considers the data perturbations in all DMUs,
namely, the change of the test DMU and the
changes of the remaining DMUs. The data perturbation in the test DMU and the data perturbation in the remaining DMUs can be dierent
when all remaining DMUs work at improving
their eciencies against the deteriorating of the
eciency of the test ecient DMU. We also develop necessary and sucient conditions for preserving eciency when data changes are made for
all DMUs. It is obvious that larger optimal values
to the super-eciency DEA models presented in
the current study correspond to greater stability of
the test DMU in preserving eciency when the
inputs and outputs of all DMUs are changed simultaneously and unequally.
By using super-eciency DEA models, the
sensitivity analysis of DEA eciency classication
can be easily achieved. Since the approach uses
optimal values to various super-eciency DEA
models, the results are stable and unique. From
the management perspective, our approach provides ``what-if'' tool to the standard DEA analysis
kit. We are able to know what may happen to a
DMUs eciency, if data variation occurs in all
DMUs as a result of new strategicP
planning.
n
By the additional constraint on j1; j60 kj , the
approach can easily be modied to study the sensitivity of other DEA models that satisfy dierent
returns to scale (Seiford and Thrall, 1990; Charnes
et al., 1994; Fare et al., 1994). The new sensitivity
analysis technique can well be applied to inecient
DMUs if we are interested in preserving the inefciency of inecient DMUs.
References
Ahn, T.S., Seiford, L.M., 1993. Sensitivity of DEA to models
and variable sets in a hypothesis test setting: The eciency
of university operations. In: Yuji, I. (Ed.), Creative and
455