Preview

Supply Chain Security – Threats and Solutions

Powerful Essays
Open Document
Open Document
13121 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Supply Chain Security – Threats and Solutions
Chapter 8

Supply Chain Security – Threats and Solutions
Daniel Ekwall
Additional information is available at the end of the chapter http://dx.doi.org/10.5772/48365 1. Introduction
In recent years, the cargo transport process has improved mainly in the areas of logistics efficiency and documentation handling. The World Trade Centre terror attack in 2001 changed the world and with it the conditions for logistics world-wide. The logistics consequences were according to[1]: It is instructive to note that these disruptions were not caused by the attack itself, but rather by the government’s response to the attack: closing borders, shutting down air traffic and evacuating buildings throughout the country. The aftermath to the attack brought needed attention to the vulnerability of modern supply chains. Supply chain vulnerability reflects sensitivity of the supply chain to disruption [2]. This vulnerability can in many cases be described as “unwanted effects” in the supply chain caused either by internal or external forces that create disturbances larger than the supply chain is designed to handle. The objective of Supply chain security is to prevent antagonistic threats from affecting the supply chain performance. Antagonistic threats and other risks and uncertainties are demarcated by three key words: deliberate (caused), illegal (defined by law), and hostile (negative impact for transport network activities) [3].
This chapter presents first the major antagonistic threats to the supply chain and secondly how these threats should be prevented. This leads to the current development of different supply chain security programs.

2. Supply chain and the transport network
[4] defines the supply chain as, “The network of organisations that are involved through upstream and downstream relationships in the different processes and activities that produce value in the form of products and services in the hands of the ultimate customer”. These



References: [1] Sheffi, Y. (2001), “Supply chain management under the threat of international terrorism” [2] Waters, D. (2007),”Supply chain risk management: vulnerability and resilience in logistics” [3] Ekwall, D. (2009) Managing the Risk for Antagonistic Threats against the Transport network, Division of Logistics and Transportation, Chalmers University of Technology: [4] Christopher, M (2005), Logistics and Supply Chain Management – Creating Value-adding Networks, Prentice Hall, London [5] Bowersox, D.J. and Closs, D. J. and Cooper, M. B. (2002), Supply Chain Logistics Management, McGraw Hill/Irwin series, Boston (2nd Edition) [6] Lumsden, K. (2006), Logistikens grunder. Studentlitteratur, Lund (in Swedish) [7] Ruijgrok, C [9] Ekwall, D. (2010), ”On analyzing the official statistics for antagonistic threats against transports in EU: a supply chain risk perspective” Economics, Vol. 31, pp 215-236 [11] Eurostat, 2009, Criminal and criminal justice [12] EUICS (2005), The Burden of Crime in the EU, A Comparative Analysis of the European Survey of Crime and Safety [13] NRSS (2002), National Retail Security Survey. University of Florida [14] ECR (2003), Shrinkage: A Collaborative Approach to Reducing Stock Loss in the Supply Chain. ECR Europe, Brussels, Belgium [15] TAPA (2006), TAPA Loss Data Benchmark Survey 2006. [16] Anderson, B. (2007), “Securing the Supply Chain – Prevent Cargo Theft”. Security, No 5, Vol [17] EP - European Parliament 's Committee on Transport and Tourism, (2007), Organised theft of commercial vehicles and their loads in the European union Brussels [18] ECMT (2001), Theft of goods and goods vehicles [19] IRU (2008), Attacks on drivers of international heavy goods vehicles. [23] Robinson P. V. (2009), ”Freight crime in Europe: what happens next?”. A presentation at ESCB 09, Prague [24] Muir, J. (1996), “Theft at work”. Work Study; Vol. 45. [25] Beck, A. (2002), “Automatic product identification & shrinkage: Scoping the potential”. ECR Europe, Brussels, Belgium [26] Europol, (2009), Cargo theft report: Applying the Brakes to Road Cargo Crime in Europe. Europol, The Hague [27] Napoleoni, L (2004), Terror inc [28] Europol (2010), “EU Terrorism Situation and Trend Report 2010”. The Hague, Netherlands [29] Johnston, R. B. and Nedelescu, O. M. (2006), “The impact of terrorism on financial markets” [30] Rystad, G. (2006), Politiska mord – det yttersta argumentet. Historiska media, Lund (in Swedish) [31] Sjöberg, L. (2008), “Antagonism, trust and perceived risk”. Risk Management, 10, 32 – 55. agreement n°SI2.448309 [36] EU Commission (2008), Public Consultation in preparation of a Legal Proposal to combat [42] Naylor, R (2004), Wages of crime. Cornell University Press. Ithaca. [43] Antonopoulos, G. A. (2007), “Cigarette smugglers: A note on four “unusual suspects””. development state backgrounds. School of Engineering, University of Borås, Sweden [45] Abeyratne R (2010) Managing the twenty-first century piracy threat

You May Also Find These Documents Helpful

Related Topics