Towards Trusted Trade-lanes (CORE1207)

Summary: The paper explores the concept of trusted trade-lane. In trusted trade-lanes operators implement an internal control system that makes possible to detect, handle and report dubious events in a way that meet requirements of customs agencies. Writers identify three essential characteristics of trusted trade-lanes: single partners are considered reliable and trustworthy, collaboration is based on long-term partnerships powered by viable business opportunities and managed by a clear decision-making mechanism, and control systems ensures integrity of traded goods and transferred data. In addition, the paper presents three alternative scenarios how the trusted partnerships can be designed in cross-border trade. The paper can be viewed here: https://pure.uvt.nl.

[s2If is_user_logged_in()]

Full review: The paper present recent developments in designing forms of partnerships that make possible to manage, predict and reconstruct supply chain operations and events. Customs agencies can use the control system to complete law enforcement and administrative tasks in a way they can reduce or even refrain from physical inspections and checks. The trading partners that have adopted the common control system and expanded it to the needs of regulatory bodies form trusted trade-lanes. Writers identify three essential characteristics of a trusted trade-lane. First, all partners operate transparently, reliable and trustworthy in their business relationships.  Second, partners are committed in long-term collaboration that gives all partners opportunities to succeed. The government structure has clear decision making mechanisms and selected legal representative. Third, partners must implement and manage a control system that ensures integrity of transported goods and transformed data within the partners and to the authorities.

The writers design three alternatives how partnerships can evolve into trusted trade-lanes. First, a focal company can act as a supply chain orchestrator and provider technical infrastructure for use of trading partners and logistics operators. The focal company lodges customs declarations and risk information to customs administrations on behalf of the trusted trade-lane partners. In the second alternative, a service provider manages a peer-to-peer information platform that supply chain operators use to communicate between each other and with customs agencies. Data on the platform is reused for both commercial and regulatory purposes (piggy packing). Partners can join and leave the platform as they see appropriate. The platform uses open standards and database management systems. Third, a service provider offers additional ‘assurance’ services for legally independent companies of a specific industrial area. The service provider acts as a trusted trader and defines common rules and requirements for the membership.

The paper demonstrates preliminary results in the CORE project. The project partners adapt trusted trade-lane concept in their own concrete business and logistics processes as well as in their information systems. The models and scenarios are further amended and developed during the project.

Reference: Hulstijn, J., Hofman, W., Zomer, G., & Tan, Y-H. (2016). Towards trusted trade-lanes. In H. J. Scholl, O. Glassey, M. Janssen, & E. (Eds.), Proceedings of the 15th IFIP E-Government conference (EGOV 2016): Electronic Government. (pp. 299-311). (Lecture Notes in Computer Science; Vol. 9820). Guimaraes, Portugal: Springer International Publishing.

 

CORE1207

[/s2If]

Integrating carrier selection with supplier selection decisions to improve supply chain security (CORE1206)

Summary: The paper describes a collaborative decision making process that makes possible to select optimal combination of suppliers and carriers that meet both business operational and security requirements. Security information is quantified in order to create a pool of qualified suppliers and logistics providers. Quantification enables to incorporate security with other business criteria such as price, delivery and quality into an optimization model. Logistics and purchasing managers can use the model to analyze the tradeoff between these criteria. The paper can be viewed here: http://onlinelibrary.wiley.com.

[s2If is_user_logged_in()]

Full review: Different managers typically carry out security assessments and selections for logistics providers and suppliers separately. The study presents a mechanism for quantifying and measuring supply chain security that justifies removing of suppliers and carriers from further consideration if they fail to meet the minimum required security performance. In the next phase security is incorporated into an optimization model that minimize procurement and quality costs caused by late and rejected deliveries. The optimization model allows selecting a combination of suppliers and logistics providers that best suits their individual situation defined by risks and operational requirements. The study demonstrates how the tradeoff between security and cost can be assessed parallel in a way that the process leads to the better solutions than if assessed separately.

The paper presents a dynamic optimization tool that can be considered both revolutionary and easy to implement in practice. There are security-rating systems that set minimum requirements for suppliers and carriers such as TAPA Facility Security and Trucking Requirements that enable to create a pool of qualified service providers for transportation of high-value goods. However, several manufacturing and logistics companies are outside the TAPA system, because the goods produced and transported are not prone to thefts and hold-ups. For them it is a matter of internal management coordination when choosing suppliers and carriers and willingness to carry out necessary steps to minimize the cost of providing a secure supply chain. It is also a strategic decision, if company aims at minimizing internal costs by managing suppliers and carriers by contracts or operation management principles. Several international companies have chosen the first option by selecting one or two main service providers instead of issuing regularly quotations for materials and transportation services. The paper proves it is more a question of company practices to select suppliers and carries than minimizing internal management costs.

The paper brings very interesting viewpoint to the CORE project. The CORE project focus on managing risks and unexpected events through additional sensors and information systems. However, commercialization and selling of the CORE technologies and data management platforms requires understanding procurement processes in private and public organizations.  The presented model embeds security into the selection process of suppliers and carriers. It is essential the CORE project can identify decision-making moments that give opportunity to introduce new technologies and practices and improve collaboration in supply chain network. Only collaboration between logistics managers and purchasing managers as well as among buyers, suppliers, and carriers can result in improved supply chain security performance in the whole network.

Reference: Meixell, M. J., & Norbis, M. (2012). Integrating carrier selection with supplier selection decisions to improve supply chain security. International Transactions in Operational Research, 19(5), 711–732.

 

CORE1206

[/s2If]

Three new Senior Experts

We have the pleasure to announce that the following three top experts in illicit trade and maritime security have recently joined the CBRA’s Consulting Team, as Senior Consultants: Ms. Vittoria Luda di Cortemiglia, Mr. Michael Ellis and Mr. Lars W Lorenzen. We work closely with them in monitoring new calls and preparing project proposals – and, once new projects are funded, they play a key role in executing the actual research, consulting and training work. In the meanwhile, each one of them carries out other “non-CBRA professional activities”. In today’s CBRA Blog we introduce all the three of them, by sharing their short bios below. Please do not hesitate to contact us in case you see interesting joint project opportunities in the future! Have a great weekend everyone, Juha.

Ms. Vittoria Luda di Cortemiglia, Senior Consultant, Illicit Trade and Human Trafficking, Italy

Ms. Luda di Cortemiglia is a senior researcher and consultant with extensive experience on various criminal justice and supply chain security issues at international level. Experience specifically includes applied research and analysis as well as project management and training for professionals, in the field of illicit trafficking and supply chain security, including trafficking in persons, trafficking in counterfeit products, illicit trade in precious metals, illegal waste trade and eco-crimes, cybercrime and misuse of technologies. After graduating in Law at the University of Turin, Italy, 1999, Ms. Luda di Cortemiglia obtained a Master degree in International Relationships and Diplomacy at St. John’s University, New York, USA, in 2001, joining the United Nations in October 2001. Until September 2016 she has coordinated the programs and activities of the Emerging Crimes Unit at the United Nations Interregional Crime and Justice Research Institute (UNICRI). She has acted as UNICRI Focal Point for the United Nations Crime Prevention and Criminal Justice Programme Network (PNI), and from 2009 until 2016 she represented UNICRI within the United Nations Inter-Agency Coordination Group against Human Trafficking (UN-ICAT).

Mr. Michael Ellis, Senior Consultant, Illicit Trade in Global Supply Chains, United Kingdom

Mr. Ellis has nearly 40 years of experience in law enforcement, coming from an operational policing background. He served with the London Metropolitan Police fighting against serious international and organised crime for 20 years, He was then engaged in the corporate security function in multinational firms, dealing with anti-counterfeit and illicit trade issues on a global basis for a further 16 years. Michael was with Universal Music, with IFPI, the music industry’s trade association, and with Beiersdorf. Most recently he was the Assistant Director of Police Services at INTERPOL and the Head of the INTERPOL Program on Traffic in Illicit Goods and Counterfeit. Michael was responsible for managing and coordinating INTERPOL’s global strategy to fight against this criminal activity, and he lead the police organisations international efforts in this area. Michael has a Master’s degree in Social Science, where he specifically researched the extensive links between organised crime and illicit trade and counterfeiting. Michael joined CBRAs consulting team on 1 October, 2016, as a Senior Consultant. He will be involved in various projects related to illicit trade and counterfeit goods in global supply chains.

Mr. Lars W Lorenzen, Senior Consultant, Maritime and Port Security, Denmark

Mr. Lorenzen has had a career with the Maersk Group spanning 37 years within a number of business units, notably within container transportation in the broadest sense. His particular knowledge and expertise covers the operational, equipment management, security, safety, standardization and regulatory sphere. He has been leading the Maersk Group work in obtaining and maintaining US C-TPAT and EU AEO-F supply chain security certifications and validations since the inception of both initiatives, while engaging with customers in shaping their profiles. As part of his security tasks, Lars has built and maintained a security response programme for the Maersk Line organisation, being also the focal point and first responder to security breaches. For a period, he was a member of the WCO PSCG (World Customs Organization Private Sector Consultative Group). During the past 20+ years he has been an appointed national expert in standardization work, mainly within ISO TC104 and TC204, including leadership of working groups – while heading the Danish delegation. Lars has served as a civil expert to NATO and other military initiatives by appointment of the Danish Government for the past 12 years, providing commercial views and factual information relating to logistics, and in the course of this participated in developing and conducting table top and other exercises.

blog-191116-2

Interview with Mr. Boley, SC Johnson, Switzerland

17.11.2016: Today’s CBRA Interview with Mr. Bill Boley focuses on supply chain security management at SC Johnson

Hi Bill, and thanks for joining CBRA Interview, here at the TAPA EMEA Conference in Noordwijk, the Netherlands.

Good afternoon Juha, first I want to thank you and the CBRA team for all the great work you have done for the Supply Chain Security Community over the years. It seems that every time I attend an event CBRA is there…

We first met in 2008, and worked together on the World Bank Supply chain security guidebook, good ol’ times…. In your current job, which supply chain security standards and guidebooks your company follows?

Here at SC Johnson we actually first strive to meet the guidelines laid out in the WCO SAFE Framework of Standards. This is important for us as a global player, global citizen and manufacturer with many supply chains, to do our part in assisting Customs and Law Enforcement Agencies making the Global Supply Chain more safe and secure. At the same time, safe and secure supply chains support the overall optimisation and predictability, helping us to meet the customer and consumer demands. This is why we pursue the various AEO schemes already in place around the world, be it C-TPAT, EU AEO, or Kenyan AEO – in other words, we strive to certify so Customs can focus on the unknowns…  At the warehouse level we have adapted the TAPA FSR standard as the “SCJ standard”. As a global company with many different nationalities, languages and moving parts both upstream and downstream a universal standard written for the practitioners is a key for us. It is also a requirement for our service providers and the transporters moving our product. Soon we will start to give preferential consideration to those service providers who have the TAPA TSR certification, as part of the contract award process.

What about information on actual threats and risks with your global supply chain – which sources you use for that? 

As you are well aware, we are facing many threats around the world: stowaways, weapons and drug smuggling, hijackings, cyber threats particularly with the Internet of Things, and counterfeiting, just to name a few…  At SC Johnson we are fortunate to have a buy-in from our C-Suite on the importance of Supply Chain Security programmes and tools we have been implementing. We have established a Global Security Operations Centre at our World Headquarters and, our Product Supply, Logistics, and Procurement Leaders around the world are very proactive on the topic of supply chain security.  SCJ has actually built an own network of information providers such as BSI, IJet, OSAC, and of course Law Enforcement Agencies, as well as select Customs regimes. The TAPA IIS system, FreightWatch International, and yes, even CBRA, also feed into our information portal. Getting involved at every level to develop a community of interest on supply chain security is a key. As they say, it takes a network to defeat a network.

interview-171116-2

Can you share any stories on how these supply chain security standards and risk information have helped you to do your job as a SC Johnson supply chain security manager better?

Yes absolutely, most recently we fell victim to two separate events. One was facility related while the other was on transport. We conducted an analysis on how our mitigation measures failed, and it became evident that we lacked timely, accurate and relevant information to change our measure to adapt to the latest Modus Operandi of the criminal networks. Delivery times to our facilities, pick-ups, chain of custody, liaison with local Law Enforcement and audits of our service providers have been instrumental. In fact, just last week local Law Enforcement in Nigeria was able to interdict and recover a high value shipment, thanks to our close communication and cooperation with the Government of Nigeria.

Yesterday I briefed you about our on-going TAPA study titled “Total Cost of Cargo Theft (TCCT)”… Would your company be interested to join the study?

SC Johnson would be very receptive to taking part of this study. First, as we have suffered Supply chain losses there is a misunderstanding on what is covered by insurance or not. And, second, if we can then place a more precise value or declaration on what those stolen finished goods will cost outside of the retail value, that would be great. Loss of customers or at least their confidence in a non-delivery, recovering our full costs of production, investigative costs, etc. are just some of the cascading effects and costs we encounter.

Great news, thanks a lot Bill, for both the interview and for agreeing to join the TCCT-study! Juha.

interview-171116-3

Supply chain security culture: measure development and validation, 2009 (CORE1200)

Summary: Supply chain security culture (SCSC) is as an overall organizational philosophy embracing norms and values that keep employees vigilant when performing supply chain security practices. The article presents a scale that makes possible to gauge supply chain security culture and its correlation to organization’s ability to respond to unexpected disruptions. Employees are asked to assess two topics: security strategy of the company and impacts of significant supply chain breech to business operations. According the study improved supply chain security culture makes company more resilient against major disruptions. This research helps executives to justify their expenditures on security efforts. The reviewed document can be purchased here: http://dx.doi.org.

[s2If is_user_logged_in()]

Full review: Researchers have stressed the importance of having an organizational culture that highlights proactivity and vigilance toward supply chain security breaches. In security-focused supply chain management environment workers are empowered to detected and handle supply chain security threats without seeking formal permission from supervisors and managers. Company security strategy gives specific attention how SCS concepts are embedded into firm processes and procedures. Alignment with organizational culture and business or corporate-level strategies is believed to result in enhanced organizational performance. In addition, organization culture encompasses supply chain continuity management. The paper presents a scale for measuring supply chain security culture defined as the overall organizational philosophy that creates supply chain security as a priority among its employees through embracing and projecting norms and values to support secure activities and to be vigilant with security efforts.

The study makes possible to assess how implemented FP7-CORE security technologies, tools and practices influence on supply chain resilience based on the perception of company managers and employees. The article gives also guidelines how to develop survey forms and protocols in order to assess the influence of implemented security measures on other KPIs such as supply chain visibility and reliability. The survey tools based on perceived operational and organizational changes complete toolbox to measure impacts of introduced security interventions.

Reference: Zachary Williams, Nicole Ponder, Chad W. Autry, “Supply chain security culture: measure development and validation”, The International Journal of Logistics Management, Vol. 20 Iss: 2, pp.243 – 260

 

CORE1200

[/s2If]

Global supply chain design considerations: Mitigating product safety and security risks (Speier et al. 2011)

Summary

There is a broad consensus among supply chain professionals that supply chain disruptions are very bad for business: supply chain glitches commonly lower operational performance and reduce shareholder value. Regardless of this, there is surprisingly little research on supply chain design strategies that have the highest potential to mitigate the risk of disruptions. Based on interviews with 75 US-based managers, an industry survey and a case study, Speier et al. (2011) identify types of SCS strategies and examine how contextual factors influence business managers to select a set of SCS design strategies. They argue that the depth and breadth of security initiatives depend mainly on top management mindfulness, operational complexity, product risk and coupling. The abstract is available at: http://www.sciencedirect.com.

Review by Toni Männistö (CBRA) based on his doctoral thesis.

[s2If is_user_logged_in()]

Full review

The paper of Speier et al. (2011) is quite theoretical and it has therefore only a limited impact on CORE work. It is useful for people for the CORE demonstrators to be aware of various supply chain design strategies and factors that support their selection. All in all, the paper introduces an interesting table that shows what supply chain factors typically affect selection of certain supply chain design strategies (see table below). The paper also includes a useful discussion about the nature of supply chain security risks. The authors point out that supply chain security covers risks of contamination, damage and destruction of products or other supply chain assets, and that these risks may arise from intentional or unintentional activities.

coreobservatory300620162

Reference

Speier, C., Whipple, J. M., Closs, D. J., & Voss, M. D. (2011). Global supply chain design considerations: mitigating product safety and security risks. Journal of Operations Management, 29(7), 721-736.

[/s2If]

Supply chain security orientation: conceptual development and a proposed framework (Autry and Bobbit 2008)

Summary

Even though supply chain security has become an increasingly important managerial domain, there is little understanding about what security aware firms are, what enables and drives security awareness, and what are the outcomes of supply chain security (SCS) orientation. Autry and Bobbit (2008) set out conceptualize, validate and operationalize the construct of SCS orientation. Based on 31 interviews with US-based managers, they conclude that SCS orientation comprises four general categories of security solutions: security preparation and planning, security-related partnerships, organizational adaptation and security-dedicated communications and technology. The authors write that these security solutions “could result in supply chain risk management-related efficiencies, such as decreased lead times to customers, greater product reliability, waste reduction, and increased delivery reliability, due to the lessened need for operations workers to perform security-related tasks such as redundant container checking, securing shipments, or other similar tasks.” The abstract is available at: http://www.emeraldinsight.com.

Review by Toni Männistö (CBRA) based on his doctoral thesis.

[s2If is_user_logged_in()]

Full review

The CORE demonstrators could a learn lesson from the research paper of Autry and Bobbit (2008) that organizational commitment to security plays a critical role in the fight against supply chain crime. Ideas and findings of the research paper also contribute to the development of the CORE educational and training material (WP19). The article shows that top management support, employee security attitudes, employee integrity/loyalty are key internal factors that strengthen the SCS orientation. External contributing factors include political political/legal factors/support, partner cooperation, and partner support. Strong SCS orientation is expected to translate into higher business performance, customer satisfaction and supply chain chain continuity.

Reference

Autry, C.W. & Bobbitt, L.M., 2008. Supply chain security orientation: conceptual development and a proposed framework. The International Journal of Logistics Management, 19(1), pp.42–64.

[/s2If]

Interview with Mr. Thorsten Neumann on TAPA EMEA

21.6.2016: Today’s CBRA Interview is with Mr. Thorsten Neumann, from TAPA EMEA and Microsoft.

Hey Thorsten, can you first tell a bit about yourself and what you do?

Hey Juha, thanks for the opportunity to give an interview for the CBRA. First of all, my name is Thorsten Neumann, and I’m the chair of the Transport Assets Protection Association TAPA Europe, Middle East and Africa. I’m leading the board of directors in EMEA and I am the representative in the TAPA Worldwide Council. Furthermore, I’m the director for channel security management at Microsoft within the ANTIPIRACY services department, and I’m leading all our risk management-related Original Equipment Manufacturer (OEM) and Volume Licensing (VL) efforts inside our company. I’m in charge of business resilience, as well.

Can you tell more on TAPA EMEA: What are your main activities in the field of supply chain security?

Since TAPA was founded in 1997 in the US by four major global manufacturing companies, the organization has transformed into a completely new business model. And what we mainly do is, that we connect the dots within the end-to-end supply chain security world. In TAPA EMEA, we have people who are experts in various technologies, industries and countries. If you take a look what we’ve achieved in the last ten to twenty years, you can see that our security certification model has been very successful. It is today one of the most important pillars within the TAPA organization globally. The certification program covers mainly the Freight Security Requirements (FSR) and the Truck Security Requirements (TSR). We are now also working on new Parking Security Requirements (PSR). We also offer a lot of other services and systems, like the Incident Information Service (IIS) that provide tremendous benefits to our members. TAPA is involved in regulatory affairs, as well: we are interacting with the European Commission, the United Nations, the World Customs Organization and other great institutions – they all see us as the leading industry association fighting cargo theft in the global supply chain.

How would you describe both the benefits and challenges of conducting industry-academia research in the field of supply chain security?

Considering the ongoing TAPA-CBRA work, I think increased transparency and the opportunity to identify and fix the weakest security links in the supply chain are the main benefits. I do strongly believe in proactive partnerships with research experts who are capable of identifying and analysing return on investment linked to the great work we are doing as an association. I trust on CBRA’s professional skills and their outstanding network. I’m convinced that, with inputs from TAPA members, CBRA will build the most robust model possible for estimating the total cost of cargo theft. From the study point of view, I’m looking forward to work with you guys.

Can you elaborate a bit on the “Total Cost of Cargo Theft” study background and the expected outcomes of it?

In the first kick-off phase, we try to estimate the total cost of cargo theft in all three TAPA regions – EMEA, Americas and APAC. This study gives us a unique, global overview on the total cost of cargo theft and estimates on various cost components that account for the total cost. I’m proud to work together with CBRA, the Borås University in Sweden and Texas A&M in the US. The plan is also to engage the Singapore Institute for Materials Management (SIMM) in the study.

The background and motive of this study is the following: we are operating in a very competitive business environment, and therefore security managers need to justify and explain budget that they spend on cargo security. With this study, we could underline how dramatic impact cargo theft has not only on company profits but also on the entire economy of a country. If you take a look on what is happening right now for example in Germany, Italy, Netherlands, France, but also in South Africa, Brazil, Malaysia and so forth, you realize the seriousness of modern cargo crime. The study would give us the analytical background and results we need to sell what we do also to the government, to our own companies, to the CEO, CFO, but also of course the WCO, as one of the driving factors of fight against criminals within the supply chain.

Thanks a lot for this interview, Thorsten! By the way, HEC University of Lausanne Executive MBA students learn every spring about the latest & greatest in supply chain security management, including from “TAPA activists” like our buddy Gilad…. Maybe next year you could also join as a guest lecturer at the UNIL eMBA class?

I would be really happy and proud to be a guest lecturer at your university. This fits quite nicely my current activities as I’m already running lectures at the University in Bremen. Count me in and see you in the class room next year. Thanks!

CASSANDRA compendium. Standards in supply chain management (Ch. 9)

Summary: Chapter 9 of the CASSANDRA compendium lists and discusses various standards that set the context for international supply chain management. The chapter focuses especially on management standards (e.g., ISO28000), technical standards (e.g., RFID, electronic seals and barcodes), standards for exchange of information among supply chain stakeholders (e.g., UN/EDIFACT and XML messaging), and customs security standards (especially the World Customs Organisations’ SAFE Framework of Standards). GS1 Global Visibility Framework and other industry standards are included in the discussion, as well. The chapter points out that because a large variety of standards are already available, the challenge is not a lack of standardisation but the lack of harmonisation between different standards. The section also concludes that even if the diversity of standards was harmonised, the next step would be to ensure that the standards would be consistently implemented in different contexts.

[s2If is_user_logged_in()]

Full review: The chapter focuses on listing different standards that affect the modern supply chain management. There not much details to be reported in this section. However, especially people working with CORE work package 6 “SCS Reference Framework and Standards” should read the brief listing and general discussion of standards and standardisation. Other chapters of the CASSANDRA compendium provide complementary information about standardisation in the field of supply chain management (e.g., Ch. 5 & 6).

Reference

Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapter 9

CORE2007

[/s2If]

CASSANDRA compendium. Technologies for supply chain visibility and security (Ch. 8)

Summary: Chapter 8 of the CASSANDRA compendium reviews current and future technologies that help managers to improve visibility and security over global end-to-end supply chains. The supply chain visibility technologies, in essence, provide logistics managers with a variety of information – shipment data, performance metrics, inventory levels, production / delivery schedules and sales forecast, for example – in or close to real time. The chapter’s review on supply chain security technologies focus mainly on security sensors (e.g., motion detectors), container seals, biometric user authentication devices (e.g., fingerprints), and non-intrusive inspection equipment (e.g., X-ray screening stations). The section also elaborates modern ways for sharing information among stakeholders that are concerned about security of the supply chain. The CASSANDRA compendium is available for download: www.cassandra-project.eu. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review: Chapter 8 includes some interesting details and insights about modern visibility and security technologies, many of which are relevant especially for CORE demonstrations but also for other work packages such as WP2 (SCS controls), WP7 (CORE Connectivity Infrastructure and Solutions Development Environment) and WP8 (CORE Ecosystem).

Many large logistics operators have developed own supply chain visibility systems to coordinate and organise logistics operations. A large logistics service provider, Kühne+Nagel uses its KN login visibility system that allows the company to optimise its complex global operations in terms of speed, time-certainty, security and cost-efficiency and many other relevant metrics. DHL, a German-based international express courier and logistics company, uses its LOGIS software for its operations. Previous EU projects have also developed visibility systems, for example Smart CM SICIS (Shared Intermodal Container Information System).

These visibility systems enable fast response to most operational contingencies that are about cause deviations from original plans. For instance, if a shipper got instant information about a stolen container, a new delivery could be quickly arranged and the consignee could be informed as soon as possible about the reshipment. Moreover, the visibility systems often interface ITC systems of other key stakeholders in the international supply chains. Customs, for example, receive advance cargo information (ACI) automatically from these systems.

The second part of the chapter 8 focuses exclusively on security technologies. The review starts with description of security sensors that are designed to detect tampering, unplanned detours, and other suspicious events in the supply chain. The modern sensor technologies sense at least changes in lighting, acceleration, location (geo-fencing functionality), motion and CO2 levels (used, e.g., to detect stowaways inside shipping containers). The chapter introduces modern user authentication technologies (e.g., fingerprints, face, retina, hand geometry and other unique biometric characteristics). Some information is provided regarding non-intrusive screening solutions that are often considered to be necessary for fast and secure screening operations. The rest of the chapter discusses various technical and institutional solutions for exchanging security-relevant information among supply chain operators and relevant government agencies. Especially interoperability of ICT systems seems to be crucial for effective security efforts in the global supply chains. The CASSANDRA compendium is available for download: www.cassandra-project.eu. Review by Toni Männistö (CBRA)

Reference

Hintsa, J. and Uronen, K. (Eds.) (2012), “Common assessment and analysis of risk in global supply chains “, Compendium of FP7-project CASSANDRA, Chapter 8

CORE2007

[/s2If]