Supply Chain Security – Threats and Solutions

Topics: Crime, Criminology, Rational choice theory Pages: 28 (13121 words) Published: November 3, 2014
Chapter 8

Supply Chain Security – Threats and Solutions
Daniel Ekwall
Additional information is available at the end of the chapter http://dx.doi.org/10.5772/48365

1. Introduction
In recent years, the cargo transport process has improved mainly in the areas of logistics efficiency and documentation handling. The World Trade Centre terror attack in 2001 changed the world and with it the conditions for logistics world-wide. The logistics consequences were according to[1]: It is instructive to note that these disruptions were not caused by the attack itself, but rather by the government’s response to the attack: closing borders, shutting down air traffic and evacuating buildings throughout the country. The aftermath to the attack brought needed attention to the vulnerability of modern supply chains. Supply chain vulnerability reflects sensitivity of the supply chain to disruption [2]. This vulnerability can in many cases be described as “unwanted effects” in the supply chain caused either by internal or external forces that create disturbances larger than the supply chain is designed to handle. The objective of Supply chain security is to prevent antagonistic threats from affecting the supply chain performance. Antagonistic threats and other risks and uncertainties are demarcated by three key words: deliberate (caused), illegal (defined by law), and hostile (negative impact for transport network activities) [3]. This chapter presents first the major antagonistic threats to the supply chain and secondly how these threats should be prevented. This leads to the current development of different supply chain security programs.

2. Supply chain and the transport network
[4] defines the supply chain as, “The network of organisations that are involved through upstream and downstream relationships in the different processes and activities that produce value in the form of products and services in the hands of the ultimate customer”. These processes can be in different companies or in the same company. The different building blocks in a supply chain can, literally, be located throughout the world and connected through the use of a transport network. The transport network is designed to use economy of scale when moving products © 2012 Ekwall, licensee InTech. This is an open access chapter distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

158 Risk Management – Current Issues and Challenges

from consignor to consignee in a supply chain, through nodes and links. This means the transport network only physically integrates the supply chain with the fulfilment of its transport demands [5]. Therefore, several different supply chains can be present at the same time and the same place in the transport network. This indicates that the relationship between supply chains and transport activities would be better described with complexity theory, especially if the interactions between components are the object of the research [3]. Looking at transport from a system perspective, we find that logistics is made up of different levels, infrastructure, resources and material known as the three levels of logistics [6]. A logistics system consists of links and nodes, where nodes are geographically fixed points such as factories and terminals, while the links are the elements connecting the nodes, i.e., the modes of conveyance. The flow of materials is the first level of the system, because it is the reason for the system’s existence. Moving material from one place to another requires a flow of movable resources such as Lorries, trains, airplanes, and ships. These movable resources need infrastructure like roads, harbours, airports, and terminals [7, 8]. The complexity in logistics can be explained by displaying the four flows always involved in...

References: [1] Sheffi, Y. (2001), “Supply chain management under the threat of international
terrorism”
[2] Waters, D. (2007),”Supply chain risk management: vulnerability and resilience in
logistics”
[3] Ekwall, D. (2009) Managing the Risk for Antagonistic Threats against the Transport network,
Division of Logistics and Transportation, Chalmers University of Technology:
[4] Christopher, M (2005), Logistics and Supply Chain Management – Creating Value-adding
Networks, Prentice Hall, London
[5] Bowersox, D.J. and Closs, D. J. and Cooper, M. B. (2002), Supply Chain Logistics
Management, McGraw Hill/Irwin series, Boston (2nd Edition)
[6] Lumsden, K. (2006), Logistikens grunder. Studentlitteratur, Lund (in Swedish)
[7] Ruijgrok, C
[9] Ekwall, D. (2010), ”On analyzing the official statistics for antagonistic threats against
transports in EU: a supply chain risk perspective”
Economics, Vol. 31, pp 215-236
[11] Eurostat, 2009, Criminal and criminal justice
[12] EUICS (2005), The Burden of Crime in the EU, A Comparative Analysis of the European
Survey of Crime and Safety
[13] NRSS (2002), National Retail Security Survey. University of Florida
[14] ECR (2003), Shrinkage: A Collaborative Approach to Reducing Stock Loss in the Supply Chain.
ECR Europe, Brussels, Belgium
[15] TAPA (2006), TAPA Loss Data Benchmark Survey 2006.
[16] Anderson, B. (2007), “Securing the Supply Chain – Prevent Cargo Theft”. Security, No 5,
Vol
[17] EP - European Parliament 's Committee on Transport and Tourism, (2007), Organised
theft of commercial vehicles and their loads in the European union
Brussels
[18] ECMT (2001), Theft of goods and goods vehicles
[19] IRU (2008), Attacks on drivers of international heavy goods vehicles.
[23] Robinson P. V. (2009), ”Freight crime in Europe: what happens next?”. A presentation at
ESCB 09, Prague
[24] Muir, J. (1996), “Theft at work”. Work Study; Vol. 45.
[25] Beck, A. (2002), “Automatic product identification & shrinkage: Scoping the potential”.
ECR Europe, Brussels, Belgium
[26] Europol, (2009), Cargo theft report: Applying the Brakes to Road Cargo Crime in Europe.
Europol, The Hague
[27] Napoleoni, L (2004), Terror inc
[28] Europol (2010), “EU Terrorism Situation and Trend Report 2010”. The Hague,
Netherlands
[29] Johnston, R. B. and Nedelescu, O. M. (2006), “The impact of terrorism on financial
markets”
[30] Rystad, G. (2006), Politiska mord – det yttersta argumentet. Historiska media, Lund (in
Swedish)
[31] Sjöberg, L. (2008), “Antagonism, trust and perceived risk”. Risk Management, 10, 32 – 55.
agreement n°SI2.448309
[36] EU Commission (2008), Public Consultation in preparation of a Legal Proposal to combat
[42] Naylor, R (2004), Wages of crime. Cornell University Press. Ithaca.
[43] Antonopoulos, G. A. (2007), “Cigarette smugglers: A note on four “unusual suspects””.
development state backgrounds. School of Engineering, University of Borås, Sweden
[45] Abeyratne R (2010) Managing the twenty-first century piracy threat
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • supply chain Essay
  • Supply Chain & Logistic Solution Essay
  • Essay on supply chain
  • Supply chain Management Essay
  • supply chain history Essay
  • E-Supply Chain Problems and Solutions Essay
  • Essay on Supply chain security programs
  • Cyber Security in the Supply Chain Essay

Become a StudyMode Member

Sign Up - It's Free