Abstract
Container Line Supply Chain (CLSC) plays a dominant role in world cargo transportation, but also subjects to various threats during its operation due to its inherent features. The threats can not only cause disruptions for CLSC operation, they may also lead to various disasters globally. To help to manage the potential disasters, in this chapter, current research on security for CLSC operation is reviewed. Specifically, the research is divided into three categories: (1) research from a general level, including standards, regulations, codes, etc. issued by international, national and industrial organizations, aiming at improving CLSC security, (2) research on specific security issues in CLSC, e.g., threats faced by CLSC, features of CLSC, criteria for security assessment of CLSC, etc., and (3) research on different risk analysis tools and their applications in CLSC security related areas. Further, the limitations of current research are also analyzed and potential directions for future research in this field are suggested.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
J.O. Aagedal, F. Braber, T. Dimitrakos, B.A. Gran, D. Raptis and K. Stolen, “Model-based risk assessment to improve enterprise security,” Proceedings of the Sixth International Enterprise Distributed Object Computing Conference, Lausanne, Switzerland, pp. 51–62, 2002.
V. Agarwal and S. Seshadri, “Risk intermediation in supply chains”, IIE Transactions, Vol. 32, No. 9, pp. 819–831, 2000.
N.J. Bahr, “System safety engineering and risk assessment”, Taylor & Francis: London, 1997.
N.O. Bakir, “A brief analysis of threats and vulnerabilities in the maritime domain”, in I. Linkov et al. (eds.), Managing Critical Infrastructure Risks, Springer: Netherlands, pp. 17–49, 2007.
R. Banomyong, “The impact of port and trade security initiatives on maritime supply chain management”, Maritime Policy & Management, Vol. 32, No. 1, pp. 3–13, 2005.
Ø. Berleetal, B.E. Asbjørnslett and J.B. Rice, “Formal Vulnerability Assessment of a maritime transportation system”, Reliability Engineering and System Safety, Vol. 96, pp. 696–705, 2011.
K. Bichou, “Security and risk-based models in shipping and ports: review and critical analysis”, OECD International Transport Forum, Discussion Paper No. 2008-20, 2008. November 27, 2012 23:14 Atlantis Press Book - 9.75in x 6.5in book_Vitoriano-Montero 112 Decision Aid Models for Disaster Management and Emergencies.
S.A. Butler, “Security attribute evaluation method: a cost-benefit approach”, Proceedings of the 24th International Conference on Software Engineering, Florida, U.S., pp. 232–240, 2002.
CBP, “Container Security Initiative”, Custom Border Protection, 2002a.
CBP, “Customs-Trade Partnership Against Terrorism”, Custom Border Protection, 2002b.
S. Chopra and P. Meindl, “Supply chain management: strategy, planning and operations”, 2nd edition, Pearson Prentice Hall: New Jersey, 2004.
M. Christopher and H. Lee, “Mitigating supply chain risk through improved confidence”, International Journal of Physical Distribution & Logistics Management, Vol. 34, No. 5, pp. 388–96, 2004.
D. Closs and E. McGarrell, “Enhancing Security Throughout the supply chain”, IBM Center for the Business of Government Special Report Series, 2004.
S. Cooperman, “Tracking Cargo”, Security, Vol. 41, No. 8, pp. 20–22, 2004.
M. David, “Editorial; High-tech tracking tools secure incoming cargo”, Electronic Design, Feb. 17, 2005.
DHS, “Strategy to Enhance International Supply Chain Security”, U.S. Department of Homeland Security, 2007.
EC, “Commission Regulation (EC) No. 884/2005: laying down procedures for conducting Commission inspections in the field of maritime security”, European Commission, 2005a.
EC, “Directive 2005/65/EC of the European Parliament and of the Council on Enhancing Port Security”, European Commission, 2005b.
EC, “Regulation (EC) No. 725/2004 of the European Parliament and of the Council on Enhancing Ship and Port Facility Security”, European Commission, 2004.
D.G. Firesmith, “Common Concepts Underlying Safety, Security, and Survivability Engineering”, Technical Report CMU/SEI-2003-TN-033, Carnegie Mellon Software Engineering Institute, 2003.
J.C. Fransoo and C.Y. Lee, “Ocean container transport: an underestimated and critical link in global supply chain performance”, Production and Operations Management, in press, 2011.
GAO, “Container Security: Expansion of Key Customs Programs Will Require Greater Attention to Critical Success Factors”, Government Accountability Office Report, GAO-03-770, 2003.
GAO, “Container Security: A Flexible Staffing Model and Minimum Equipment Requirements Would Improve Overseas Targeting and Inspection Efforts”, Government Accountability Office Report, GAO-05-557, 2005.
GAO, “Supply Chain Security: Examinations of High Risk Cargo at Foreign Seaports Have Increased, but Improved Data Collection and Performance Measures Are Needed”, Government Accountability Office Report, GAO-08-187, 2008.
G. Giaglis, I. Minis, A. Tatarakis and V. Ziempekis, “Minimizing logistics risk through real time vehicle routing and mobile technologies”, International Journal of Physical Distribution & Logistics Management, Vol. 34, No. 9, pp. 749–64, 2004.
J.S. Helmick, “Port and maritime security: A research perspective”, Journal of Transportation Security, Vol. 1, No. 1, pp. 15–28, 2008.
A.G. Hessami,”A Systems Framework for Safety and Security: The Holistic Paradigm”. Systems Engineering, 7(2), pp. 99–112, 2004.
IMO, “International Ship and Port Facility Security Code”, International Maritime Organization, 2002a.
IMO, “Guidelines for Formal Safety Assessment for Use in the IMO Rule-making process”, IMO, 2002b.
ISO, “ISO 28000:2007: Specification for security management systems for the supply chain”, International Organization for Standardization, 2007a. November 27, 2012 23:14 Atlantis Press Book - 9.75in x 6.5in book_Vitoriano-Montero Bibliography 113.
ISO, “ISO 28001:2007: Security management systems for the supply chain – Best practices for implementing supply chain security, assessments and plans – Requirements and guidance”, International Organization for Standardization, 2007b.
ISO, “ISO 28003:2007: Security management systems for the supply chain – Requirements for bodies providing audit and certification of supply chain security management systems”, International Organization for Standardization, 2007c.
ISO, “ISO 28004:2007: Security management systems for the supply chain – Guidelines for the implementation of ISO 28000”, International Organization for Standardization, 2007d.
ITPWG, “The International Shippers and Freight Forwarders Security Code”, International Trade Procedures Working Group of United Nations Centre for Trade Facilitation and Electronic Business, 2003.
E. Jonsson, “An integrated framework for security and dependability”, In Proceedings of the New Security Paradigms Workshop, pages 22–25, Charlottesville, VA, USA, September 1998.
O. Khan and B. Burnes, “Risk and supply chain management: creating a research agenda”, The International Journal of Logistics Management, Vol. 18 No. 2, pp. 197–216, 2007.
O. Khan, M. Christopher and B. Burnes, “The impact of product design on supply chain risk: a case study”, International Journal of Physical Distribution & Logistics Management, Vol. 38 No. 5, pp. 412–32, 2008.
S.J. Kim, G.F. Deng, S.K.S. Gupta, M. Murphy-Hoye, “Intelligent networked containers for enhancing global supply chain security and enabling new commercial value”, the 3rd International Conference on Communication System Software and Middleware, Bangalore, Jan.6-10, 2008, pp. 662–669.
C.A. Kontovas and H.N. Psaraftis, “Formal Safety Assessment: A Critical Review”, Marine Technology, Vol. 46, No. 1, pp. 45–59, 2009.
O. Lau, “The ten commandments of security”, Computers & Security, Vol. 17, Issue. 2, pp. 119–123, 1998.
K.X. Li and K. Cullinane, “An Economic Approach to Maritime Risk Management and Safety Regulation”, Maritime Economics and Logistics, Vol. 5, No. 3, pp. 268–284, 2003.
H.L. Lee and M. Wolfe, “Supply chain security without tears”, Supply Chain Management Review, Vol. 7, No. 1, pp. 12–20, 2003.
M. Levinson, “The box: How the shipping container made the world smaller and the world economy bigger”, Princeton University Press: Princeton, 2006.
J. Liu, J.B. Yang, J. Wang and H.S. Sii, “Engineering system safety analysis and synthesis using fuzzy rule-based evidential reasoning approach”, Quality and Reliability Engineering International, Vol. 21, pp. 387–411, 2005.
P. Lois, J. Wang, A. Wall and T. Ruxton, “Formal safety assessment for cruise ships”, Tourism Management, Vol. 25, pp. 93–109, 2004.
LRQA, “Supply Chain Security Management Systems and the role of the Assurance Provider”, Lloyd’s Register Quality Assurance, 2009.
Manuj and J.T.Mentzer, “Global supply chain risk management”, Journal of Business Logistics, Vol. 29, No. 1, pp. 133–56, 2008.
E. McCormack, M. Jensen, and A. Hovde, “Evaluating the Use of Electronic Door Seals (E-Seals) on Shipping Containers”, International Journal of Applied Logistics, 1 (4), 13–29, October-December 2010.
S. Noda, “Container Shipping and Security Issues: the Carriers’ Responsibility in the Fight against Terrorism”, Maritime Economics & Logistics, Vol. 6, No. 2, pp. 157–186, 2004.
OECD, “Security in Maritime Transport: Risk Factors and Economic Impact”, Organisation for Economic Co-operation and Development Report, 2003.
OECD, “Report on Container Transport Security across modes: Executive Summary and Conclusions”, Organisation for Economic Co-operation and Development Report, 2004. November 27, 2012 23:14 Atlantis Press Book - 9.75in x 6.5in book_Vitoriano-Montero 114 Decision Aid Models for Disaster Management and Emergencies.
OECD, “Container Transport Security across Modes”, Organisation for Economic Cooperation and Development Report, 2005.
R.R. Pai, V.R. Kallepalli, R.J. Caudill and M.C. Zhou, “Methods toward supply chain risk analysis”, IEEE International Conference on Systems, Man and Cybernetics, Vol. 5, Washington, U.S., pp. 4560–4565, 2003.
U. Paulsson, “Managing risks in supply chains: an article review”, Presented at NOFOMA, Oulu, Finland, 2003.
PECC, “Study on the Mutually Supportive Advancement of APEC’S Trade Facilitation and Secure Trade Goals post September 11”, Analysis and Case Studies prepared for APEC, Singapore Pacific Economic Cooperation Council, 2004.
M. Perry, “Natural disaster management planning: a study of logistics managers responding to the tsunami”, International Journal of Physical Distribution & Logistics Management, Vol. 37, No. 5, pp. 409–33, 2007.
C.H. Piersall, “Securing the global supply chain”, ISO Focus, October, pp. 33–35, 2007.
C.A. Pinto, G. Rabadi and W.K. Talley, “U.S. Port Security”, in W.K. Talley. (eds.), “Maritime Safety Security and Piracy”, Informa: London, 2008.
H.N. Psaraftis, “EU Ports Policy: Where do we Go from Here?”, Maritime Economics & Logistics, Vol. 7, No. 1, pp. 73–82, 2005.
S. Rao and T. Goldsby, “Supply chain risks: a review and typology”, The International Journal of Logistics Management, Vol. 20, No. 1, pp. 97–123, 2009.
J. Ren, I. Jenkinson, H.S. Sii, J. Wang, D.L. Xu and J.B. Yang, “An offshore safety assessment framework using fuzzy reasoning and evidential synthesis approaches”, Journal of Marine Engineering & Technology, No. A6, pp. 3–16, 2005.
J. Ren, J. Wang, I. Jenkinson, D. L. Xu, J. B. Yang, “An offshore risk analysis method using fuzzy Bayesian network”, Journal of Offshore Mechanics and Arctic Engineering, Vol. 131, No. 4, 2009.
W. Robert and J.D. Kelly, “Containing the Threat: Protecting the Global Supply Chain through Enhanced Cargo Container Security”, The Reform Institute, reform brief, 2007.
T. Rosqvist and R. Tuominen, “Qualification of Formal Safety Assessment: an exploratory study”, Safety Science, Vol. 42, pp. 99–120, 2004.
G. Shafer, “A mathematical theory of evidence”, Princeton, N.J.: Princeton University Press, 1976.
R. Sarathy, “Security and the Global Supply Chain”, Transportation journal, Vol. 45, No. 4, pp. 28–51, 2006.
H.S. Sii, J.Wang, A.G. Eleye-Datubo, J.B. Yang and J. Liu, “Safety assessment of FPSO turretmooring system using approximate reasoning and evidential reasoning”, Journal of Marine Technology, Vol. 42, No. 2, pp. 88–102, 2005.
C.G. Soares and A.P. Teixeira, “Risk assessment in maritime transportation”, Reliability Engineering and System Safety, Vol. 74, pp. 299–309, 2001.
K. Sørby, “Relationship between security and safety in a security-safety critical system: Safety consequences of security threats”, Master thesis, Norges Teknisk-Naturvitenskapelige Universitet, Trondheim, Norway, 2003.
D. Stasinopoulos, “Maritime Security – The Need for a Global Agreement”, Maritime Economics & Logistics, Vol. 5, No. 3, pp. 311–320, 2003.
C. Tang, “Robust strategies for mitigating supply chain disruptions”, International Journal of Logistics Research and Applications, Vol. 9, No. 1, pp. 33–45, 2006.
TAPA, “Freight Suppliers Minimum Security Requirements”, Transported Asset Protection Association, 2011.
TAPA, “Freight Suppliers Minimum Trucking Security Requirements”, Transported Asset Protection Association, 2008. November 27, 2012 23:14 Atlantis Press Book - 9.75in x 6.5in book_Vitoriano-Montero Bibliography 115.
P. Tirschwell, “An opportunity for container seals,” Journal of Commerce, Feb. 7, 2005.
B. Tomlin, “On the value of mitigation and contingency strategies for managing supply chain disruption risks”, Management Science, Vol. 52, No. 5, pp. 639–57, 2006.
D.R. Towill, “The impact of business policy on bullwhip induced risk in supply chain management”, International Journal of Physical Distribution & Logistics Management, Vol. 35, No. 8, pp. 555–75, 2005.
TRANSEC, “A brief overview of the United Kingdom National Maritime Security Programme”, Department of Transport, the UK, 2011.
D. Tsamboulas, “Terrorism and the Threat to Multimodal Transport – An Overview”, in M. Bell, et al. (eds.), Security and Environmental Sustainability of Multimodal Transport, Springer: Netherlands, pp. 3–22, 2010.
S.T. Ung, “The Development of Safety and Security Assessment Techniques and their Application to Port Operations”, PhD Thesis, Liverpool John Moores University, 2007.
U.S. Congress, “Security and Accountability For Every Port Act”, Public Law, 109–347, 2006.
J. Wang, “The current status and future aspects in formal ship safety assessment”, Safety Science, Vol. 38, pp. 19–31, 2001.
J. Wang and P. Foinikis, “Formal safety assessment of containerships”, Marine Policy, Vol. 25, No. 2, pp. 143–157, 2001.
C. Wang and S. Webster, “Channel coordination for a supply chain with a risk neutral manufactures and a loss averse retailer”, Decision Sciences, Vol. 38, No. 3, pp. 361–89, 2007.
WCO, “SAFE Framework of Standards”, World Customs Organization, 2007.
H.H. Willis and D.S. Ortiz, “Evaluating The Security Of The Global Containerized Supply Chain”, RAND Technical Report Series, TR-214-RC, 2004.
M. Wilson, “The impact of transportation disruptions on supply chain performance”, Transportation Research, Part E, Vol. 43, No. 4, pp. 295–320, 2007.
K.J. Wydajewski and B.L. White, “Processes and techniques for providing critical data to first responders to maritime security incidents”, Oceans 2002 IEEE/MTS Conference Proceedings, Vol. 2, Mississippi, U.S., pp. 1180–1190, 2002.
Y.C. Yang, “Risk management of Taiwan’s maritime supply chain security”, Safety Science, Vol. 49, pp. 382–393, 2011.
Z.L. Yang, “Risk Assessment and Decision Making of Container Supply Chains”, PhD Thesis, Liverpool John Moores University, 2006.
J. B. Yang, J. Liu, J.Wang, H. S. Sii and H.W.Wang, “A belief rule-base inference methodology using the evidential reasoning approach – RIMER”, IEEE Transactions on Systems, Man, and Cybernetics – Part A, Vol. 36, No. 2, pp. 266–285, 2006.
J.B. Yang and M.G. Singh, “An evidential reasoning approach for multiple attribute decision making with uncertainty”, IEEE Transactions on Systems, Man, and Cybernetics, Vol. 24, No. 1, pp. 1–18, 1994.
J.B. Yang and D.L. Xu, “On the evidential reasoning algorithm for multi-attribute decision analysis under uncertainty”, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, Vol. 32, No. 3, pp. 289–304, 2002.
W.J. Yoon, S.H. Chung, S.J. Lee and Y.S. Moon, “Design and Implementation of an Active RFID System for Fast Tag Collection,” 7th IEEE International Conference on Computer and Information Technology, Fukushima Prefecture, Japan, pp. 961–966, 2007.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Atlantis Press
About this chapter
Cite this chapter
Tang, D., Xu, DL., Yang, JB., Chen, Yw. (2013). Security Based Operation in Container Line Supply Chain: a Literature Review. In: Vitoriano, B., Montero, J., Ruan, D. (eds) Decision Aid Models for Disaster Management and Emergencies. Atlantis Computational Intelligence Systems, vol 7. Atlantis Press, Paris. https://doi.org/10.2991/978-94-91216-74-9_5
Download citation
DOI: https://doi.org/10.2991/978-94-91216-74-9_5
Published:
Publisher Name: Atlantis Press, Paris
Print ISBN: 978-94-91216-73-2
Online ISBN: 978-94-91216-74-9
eBook Packages: Computer ScienceComputer Science (R0)