Posts

COSO. Enterprise Risk Management — Integrated Framework – Executive Summary. Committee of Sponsoring Organizations of the Treadway Commission. September 2004. (CORE1106)

Summary: The Committee of Sponsoring Organizations of the Treadway Commission, COSO, defines Enterprise Risk Management, ERM, as a process, effected by an entity’s board of directors, management and other personnel, applied in strategy setting and across the enterprise, designed to identify potential events that may affect the entity, and manage risk to be within its risk appetite, to provide reasonable assurance regarding the achievement of entity objectives. The entity objectives are set forth in following four categories: (i) Strategic – high-level goals, aligned with and supporting its mission; (ii) Operations – effective and efficient use of its resources; (iii) Reporting – reliability of reporting; and (iv) Compliance – compliance with applicable laws and regulations. According to COSO, ERM enables management to effectively deal with uncertainty and associated risk and opportunity, enhancing the capacity to build value. Within the context of FP7-CORE project – and, supply chain security management in general – ERM can be seen as a useful approach particularly when it comes to aligning security risk appetite and strategy; to enhancing security risk response decisions; and to reducing security related operational surprises and losses. Some other ERM aspects such as seizing opportunities (“positive risks”) may not apply in supply chain security management context. One more interesting note, which could also be applied for supply chain security: everyone in an entity has some responsibility for ERM. This executive summary document is available for download at: http://www.coso.org/documents/coso_erm_executivesummary.pdf

[s2If is_user_logged_in()]

Full review:

Background: The first version of the “Internal Control – Integrated Framework” was issued by the Committee of Sponsoring Organizations of the Treadway Commission, COSO, in early 1990s, to help businesses and other entities assess and enhance their internal control systems. The change of the millennium saw heightened concern and focus on risk management, and it became clear that a need exists for a robust framework to effectively identify, assess, and manage risk. In 2001, COSO initiated a project, and engaged PricewaterhouseCoopers, to develop a framework that would be readily usable by managements to evaluate and improve their organizations’ enterprise risk management.

According to COSO (p.1), Enterprise Risk Management, ERM, encompasses:

  • Aligning risk appetite and strategy – Management considers the entity’s risk appetite in evaluating strategic alternatives, setting related objectives, and developing mechanisms to manage related risks.
  • Enhancing risk response decisions –Enterprise risk management provides the rigor to identify and select among alternative risk responses – risk avoidance, reduction, sharing, and acceptance.
  • Reducing operational surprises and losses – Entities gain enhanced capability to identify potential events and establish responses, reducing surprises and associated costs or losses.
  • Identifying and managing multiple and cross-enterprise risks – Every enterprise faces a myriad of risks affecting different parts of the organization, and enterprise risk management facilitates effective response to the interrelated impacts, and integrated responses to multiple risks.
  • Seizing opportunities – By considering a full range of potential events, management is positioned to identify and proactively realize opportunities.
  • Improving deployment of capital – Obtaining robust risk information allows management to effectively assess overall capital needs and enhance capital allocation.

COSO (pp.3-4) states that ERM consists of eight interrelated components, derived from the way management runs an enterprise and are integrated with the management process:

  • Internal Environment – The internal environment encompasses the tone of an organization, and sets the basis for how risk is viewed and addressed by an entity’s people, including risk management philosophy and risk appetite, integrity and ethical values, and the environment in which they operate.
  • Objective Setting – Objectives must exist before management can identify potential events affecting their achievement. Enterprise risk management ensures that management has in place a process to set objectives and that the chosen objectives support and align with the entity’s mission and are consistent with its risk appetite.
  • Event Identification – Internal and external events affecting achievement of an entity’s objectives must be identified, distinguishing between risks and opportunities. Opportunities are channeled back to management’s strategy or objective-setting processes.
  • Risk Assessment – Risks are analyzed, considering likelihood and impact, as a basis for determining how they should be managed. Risks are assessed on an inherent and a residual basis.
  • Risk Response – Management selects risk responses – avoiding, accepting, reducing, or sharing risk – developing a set of actions to align risks with the entity’s risk tolerances and risk appetite.
  • Control Activities – Policies and procedures are established and implemented to help ensure the risk responses are effectively carried out.
  • Information and Communication – Relevant information is identified, captured, and communicated in a form and timeframe that enable people to carry out their responsibilities. Effective communication also occurs in a broader sense, flowing down, across, and up the entity.
  • Monitoring – The entirety of enterprise risk management is monitored and modifications made as necessary. Monitoring is accomplished through ongoing management activities, separate evaluations, or both.

Lastly, as potential readers / users of this report, COSO suggests following: Board of Directors; Senior Management; Managers and other personnel; Regulators; Professional Organizations; and Educators.

CORE1106

[/s2If]

CORE-Observatory

Progress in combating cigarette smuggling: controlling the supply chain (CORE1203)

Summary: The paper presents cases how government agencies have reduced illicit tobacco trade by making the industry liable for controlling their supply chains. Tobacco companies were required to monitor the movement of lawfully manufactured tobacco products in their supply chains, and even retrospectively track the route taken when products were seized due to suspected excise fraud. According the paper illicit trade was substantially reduced, if manufacturers stopped delivering lawfully manufactured tobacco products in amounts that exceeded the tobacco market in the countries with lower excise duties. The criminal market dried out due to unavailability of illicit tobacco products that had been smuggled to the countries of higher excise duties by organized criminal groups. The document can be viewed at: http://tobaccocontrol.bmj.com.

[s2If is_user_logged_in()]

Full review: The paper focuses on excise fraud and organized smuggling of originally legally produced tobacco products to the United Kingdom, Spain and Italy. Based on internal company documents and court judgments the authors summarize evidence how the tobacco industry was involved directly and indirectly in the large-scale excise fraud. First, the companies delivered intentionally large quantities of tobacco products to the countries of low excise tax rates and uncontrolled distribution network. Then organized criminal groups shipped the purchased tobacco products illegally through their smuggling networks into the countries of higher excise duties.

The cutting off the tobacco supply to the illicit market is the key to intervene in large-scale organized tobacco smuggling. According the article by means of legislative and punitive interventions tobacco industry was forced to implement new export polices and practices. Tobacco companies invested in tracking and tracing systems that helped to identify points where shipped tobacco products diverted from the legal supply chain to the illicit markets. The companies implemented security processes in order to clearly identify they business partners and ensure business partners had no criminal records. Government agencies increased information sharing and inter-agency cooperation on a national and international level.  The interventions led to a substantial fall in customs seizures and a rise in legal sales.

CORE project can learn two things in the article. First, the global scope and multifaceted nature of the illicit tobacco trade requires visibility over shipment processes and efficient collaboration between governmental agencies and private sector. Second, the study implies risk to investigations and punitive damages made tobacco companies to pay attention in which markets their products finally end up. In other words, enforceable measures not voluntary agreements made industry liable for controlling their end-to-end supply chain and reduce societal risk.

Reference: Lara Joossens, L., & Raw, M. (2008). Progress in combating cigarette smuggling: controlling the supply chain. Tobacco Control, 17(6), 399–404.

 

CORE1203

[/s2If]

Conflict resolution in supply chain security, 2009 (CORE1202)

Summary: The paper presents a mathematical tool for conflict resolution based on conflict modeling theories. Decision and policy making on supply chain security is sensitive to technical, political, environmental, ethical and economical aspects. What aspects are emphasized depends on whom we ask. Consequently, broadly endorsed decisions and policies require balancing between these dimensions.  The presented conflict resolution approach identifies involved decision makers, their individual and collective goals and gives options how to agree on security interventions. A case study on trade facilitation and security enforcement illuminates the approach. The article can be purchased at: http://www.inderscienceonline.com.

[s2If is_user_logged_in()]

Full review: Conflicts are preprogrammed in supply chain security management, because different operators such as customs, port authorities, manufacturing companies, logistics providers and financial institutes collaborate with conflicting goals. For  example, a purchasing manager can be interested in ordering products manufactured in high-risk country due to lower cost while security manager might assess risks related to the seller exceeding the potential benefits. Port operation manager aims at loading and unloading cargo swiftly and safely to and from vessels under time pressure, while port security dislikes the idea of expediting shipments at the cost of inspections. Supply chain security is a multidisciplinary issue that can be addressed efficiently only through agreeing about decision-making and policy-making mechanisms.

The paper focuses on resolution of strategic conflicts that result from the interaction of different stakeholders that collaborate with different emphases in global supply chains. The approach enables conflicting parties to focus on critical aspects of the conflict resolution process. It identifies the roles of involved decision makers, individual preferences and collective goals, underlying causes of conflict and options to achieve conflict resolution. In other words, it provides bases for cooperation and collaboration between involved parties. In addition, the paper introduces a mathematical tool for conflict resolution based on conflict modeling theories.

Decision supporting tools and port security management systems are developed in the CORE project, but they do not take into consideration possible conflicting goals in the decision-making. The CORE technologies and tools assist to mitigate identified negative threats and their consequences. However, negative effects have a threshold that must be exceeded to make different actors convinced about necessity of mitigation actions and controls. For example, estimated 0.2% annual profit loss due to possible security breach may give or not a reason to risk-profile suppliers or invest in container tracking systems. Especially when the questions are more strategic than operational the related decisions are prone to have conflicting interests. The CORE project does not try to address this problematic.

Reference: Lara Gracia, M. A., & Nof, S. Y. (2009). Conflict resolution in supply chain security. International Journal of Value Chain Management, 3(2), 168–186.

 

CORE1202

[/s2If]

The effect of supply chain security management on security performance in container shipping operations, 2012 (CORE1201)

Summary: The study creates a supply chain security framework that can be adapted on assessing how security management measures affect on safety and customs clearance performance in container shipping firms. Security management interventions are clustered in four categories: facility and cargo management, accident prevention and processing, information management, and partner relationship management. Findings indicated that container shipping firms that mainly focus on facility and cargo management and less on partner relationship management are generally more dissatisfied with their company’s customs clearance performance than companies that prioritize partnerships with governmental and commercial companies. The governmental agencies and commercial actors can employ supply chain security management framework, its attributes and dimensions in order to assess the supply chain security performance of container shipping firms.  The reviewed document is available at: http://dx.doi.org.

[s2If is_user_logged_in()]

Full review:  Several authors have clustered supply chain security measures into different categories, but only few authors have provided statistical models to test how well these categories can be used to assess benefits of security measures. The study establishes four security categories/dimensions: facility and cargo management, accident prevention and processing, information management, and partner relationship management. The results imply that partner relationship management is positively related to customs clearance performance. Further, information management and partner relationship management are positively related to safety performance. However, facility and cargo management and accident prevention and processing were not found to have substantial positive impacts on security performance what is controversial to many safety studies. Improved access control, material handling, information processing and reporting of anomalies are clearly factors that are positively related to safety performance based on several work place safety studies. The difference is probably due to questions that defined safety performance: the study addressed accidents and property damages while safety studies measure often near misses and their reporting.

The FP7 CORE project utilizes key performance Indicators (KPIs) to assess and monitor organization’s performance at the operational level. Two CORE KPI’s measure address safety and customs clearance performance, consequently the supply chain security framework can well be adapted on the CORE context. Improved access control, cargo handling, shipping information processing and reporting of anomalies can be measured by using the construct for ‘facility and cargo management’. CORE Training and education can be embedded into the factor ‘accident prevention and processing’ that captures documenting and disseminating of security information. ‘Partner relationship management’ can be tested as a mediating factor that controls how strongly implemented CORE interventions influence on organizational performance indicators in specific demonstrations. Customs agencies can consider using four dimensions of supply chain security as criteria for assessing security performance in container shipping firms. Finally the dimensions and attributes of the framework provide a tool to analyse qualitative data in the project where getting reliable quantitative data is challenging.

Reference: Ching‐Chiao Yang, Hsiao‐Hsuan Wei, “The effect of supply chain security management on security performance in container shipping operations”, Supply Chain Management: An International Journal, Vol. 18 Iss: 1, pp.74 – 85

 

CORE1201

[/s2If]

Supply chain security culture: measure development and validation, 2009 (CORE1200)

Summary: Supply chain security culture (SCSC) is as an overall organizational philosophy embracing norms and values that keep employees vigilant when performing supply chain security practices. The article presents a scale that makes possible to gauge supply chain security culture and its correlation to organization’s ability to respond to unexpected disruptions. Employees are asked to assess two topics: security strategy of the company and impacts of significant supply chain breech to business operations. According the study improved supply chain security culture makes company more resilient against major disruptions. This research helps executives to justify their expenditures on security efforts. The reviewed document can be purchased here: http://dx.doi.org.

[s2If is_user_logged_in()]

Full review: Researchers have stressed the importance of having an organizational culture that highlights proactivity and vigilance toward supply chain security breaches. In security-focused supply chain management environment workers are empowered to detected and handle supply chain security threats without seeking formal permission from supervisors and managers. Company security strategy gives specific attention how SCS concepts are embedded into firm processes and procedures. Alignment with organizational culture and business or corporate-level strategies is believed to result in enhanced organizational performance. In addition, organization culture encompasses supply chain continuity management. The paper presents a scale for measuring supply chain security culture defined as the overall organizational philosophy that creates supply chain security as a priority among its employees through embracing and projecting norms and values to support secure activities and to be vigilant with security efforts.

The study makes possible to assess how implemented FP7-CORE security technologies, tools and practices influence on supply chain resilience based on the perception of company managers and employees. The article gives also guidelines how to develop survey forms and protocols in order to assess the influence of implemented security measures on other KPIs such as supply chain visibility and reliability. The survey tools based on perceived operational and organizational changes complete toolbox to measure impacts of introduced security interventions.

Reference: Zachary Williams, Nicole Ponder, Chad W. Autry, “Supply chain security culture: measure development and validation”, The International Journal of Logistics Management, Vol. 20 Iss: 2, pp.243 – 260

 

CORE1200

[/s2If]

Better Management of EU Borders through Cooperation, 2011 (CORE1114)

Summary: This report by the Center for the Study of Democracy investigates existing forms of cooperation between Border Guards and customs administrations in the European Union. The study highlights obstacles to cooperation and proposes solutions and best practices for overcoming them. The study finds that despite the common policy interest on border agency cooperation and the associated pan-European standardisation efforts, the individual Member states decide the extent and forms of customs-border guard co-operation on their own. As a result, the current state of border agency collaboration and potential for improvements differ substantially between the member states. The main differences arise from the institutional set-up (e.g., number and roles of border control agencies), powers and competencies of the border control agencies, and the legislative basis (especially legal differences in terms of privacy, data protection and confidentiality of trade information). Download the report here: http://ec.europa.eu. Review by Toni Männistö (CBRA)

[s2If is_user_logged_in()]

Full review: The study concludes with a large number of recommendations for the European Union, the member states, and for the customs and border guards. The European Union should generate political will to act upon remaining challenges of border agency cooperation by creating awareness through public debates, communications and impact assessments. The EU bodies should act mediators to reconcile institutional interests of different border control agencies. The EU could also commission pilot projects on border agency cooperation, encourage joint training and increase funding of related research and development activities. Also the mandate of Frontex could be expanded to cover customs cooperation.

The individual member states should, according to the report, also mediate negotiations between border control agencies to overcome possible conflicts of interest. The member states should also evaluate impacts of various forms of customs-border guard cooperation.

The border guards and customs administrations themselves should identify and exchange best practices for strengthening their mutual collaboration. The agencies, the report recommends, should take responsibility for the pilot projects and for evaluating outcomes of the different forms of cooperation. To further improve the cooperation across the entire EU customs union, the customs and border control agencies should use Frontex more as their platform to conduct joint operations at the EU’s external border.

Reference: Center for the Study of Democracy, (2011), “Better Management of EU Borders through Cooperation”, Study to Identify Best Practices on the Cooperation Between Border Guards and Customs Administrations Working at the External Borders of the EU

 

CORE1114

[/s2If]

COSO. Enterprise Risk Management — Integrated Framework – Executive Summary. Committee of Sponsoring Organizations of the Treadway Commission. September 2004. (CORE1106)

Summary: The Committee of Sponsoring Organizations of the Treadway Commission, COSO, defines Enterprise Risk Management, ERM, as a process, effected by an entity’s board of directors, management and other personnel, applied in strategy setting and across the enterprise, designed to identify potential events that may affect the entity, and manage risk to be within its risk appetite, to provide reasonable assurance regarding the achievement of entity objectives. The entity objectives are set forth in following four categories: (i) Strategic – high-level goals, aligned with and supporting its mission; (ii) Operations – effective and efficient use of its resources; (iii) Reporting – reliability of reporting; and (iv) Compliance – compliance with applicable laws and regulations. According to COSO, ERM enables management to effectively deal with uncertainty and associated risk and opportunity, enhancing the capacity to build value. Within the context of FP7-CORE project – and, supply chain security management in general – ERM can be seen as a useful approach particularly when it comes to aligning security risk appetite and strategy; to enhancing security risk response decisions; and to reducing security related operational surprises and losses. Some other ERM aspects such as seizing opportunities (“positive risks”) may not apply in supply chain security management context. One more interesting note, which could also be applied for supply chain security: everyone in an entity has some responsibility for ERM. This executive summary document is available for download at: http://www.coso.org/documents/coso_erm_executivesummary.pdf

[s2If is_user_logged_in()]

Full review:
Background: The first version of the “Internal Control – Integrated Framework” was issued by the Committee of Sponsoring Organizations of the Treadway Commission, COSO, in early 1990s, to help businesses and other entities assess and enhance their internal control systems. The change of the millennium saw heightened concern and focus on risk management, and it became clear that a need exists for a robust framework to effectively identify, assess, and manage risk.  In 2001, COSO initiated a project, and engaged PricewaterhouseCoopers, to develop a framework that would be readily usable by managements to evaluate and improve their organizations’ enterprise risk management.
According to COSO (p.1), Enterprise Risk Management, ERM, encompasses:
•    Aligning risk appetite and strategy – Management considers the entity’s risk appetite in evaluating strategic alternatives, setting related objectives, and developing mechanisms to manage related risks.
•    Enhancing risk response decisions –Enterprise risk management provides the rigor to identify and select among alternative risk responses – risk avoidance, reduction, sharing, and acceptance.
•    Reducing operational surprises and losses – Entities gain enhanced capability to identify potential events and establish responses, reducing surprises and associated costs or losses.
•    Identifying and managing multiple and cross-enterprise risks – Every enterprise faces a myriad of risks affecting different parts of the organization, and enterprise risk management facilitates effective response to the interrelated impacts, and integrated responses to multiple risks.
•    Seizing opportunities – By considering a full range of potential events, management is positioned to identify and proactively realize opportunities.
•    Improving deployment of capital – Obtaining robust risk information allows management to effectively assess overall capital needs and enhance capital allocation.
COSO (pp.3-4) states that ERM consists of eight interrelated components, derived from the way management runs an enterprise and are integrated with the management process:
•    Internal Environment – The internal environment encompasses the tone of an organization, and sets the basis for how risk is viewed and addressed by an entity’s people, including risk management philosophy and risk appetite, integrity and ethical values, and the environment in which they operate.
•    Objective Setting – Objectives must exist before management can identify potential events affecting their achievement.  Enterprise risk management ensures that management has in place a process to set objectives and that the chosen objectives support and align with the entity’s mission and are consistent with its risk appetite.
•    Event Identification – Internal and external events affecting achievement of an entity’s objectives must be identified, distinguishing between risks and opportunities. Opportunities are channeled back to management’s strategy or objective-setting processes.
•    Risk Assessment – Risks are analyzed, considering likelihood and impact, as a basis for determining how they should be managed.  Risks are assessed on an inherent and a residual basis.
•    Risk Response – Management selects risk responses – avoiding, accepting, reducing, or sharing risk – developing a set of actions to align risks with the entity’s risk tolerances and risk appetite.
•    Control Activities – Policies and procedures are established and implemented to help ensure the risk responses are effectively carried out.
•    Information and Communication – Relevant information is identified, captured, and communicated in a form and timeframe that enable people to carry out their responsibilities.  Effective communication also occurs in a broader sense, flowing down, across, and up the entity.
•    Monitoring – The entirety of enterprise risk management is monitored and modifications made as necessary.  Monitoring is accomplished through ongoing management activities, separate evaluations, or both.
Lastly, as potential readers / users of this report, COSO suggests following: Board of Directors; Senior Management; Managers and other personnel; Regulators; Professional Organizations; and Educators.
CORE1106
https://www.dropbox.com/s/aetbp8jr6dr4z31/CORE1106-coso_erm_executivesummary.pdf?dl=0

[/s2If]

Review on The Critical Infrastructure Gap: U.S. Port Facilities and Cyber Vulnerabilities, Policy Paper, July 2013, Center for 21st Century Security and Intelligence (CORE1095)

Summary: In a 50-page policy paper by the Brookings Institute and authored by Commander Joseph Kramek of the U.S.Coast Guard and a Federal Executive Fellow at the institute, the current state of affairs related to vulnerabilities at our national seaports is discussed and options to shore up cyber security are presented. In the executive summary, Commander Kramek writes that today’s U.S. port facilities rely as much upon networked computer and control systems as they do upon stevedores to ensure the flow of maritime commerce that the economy, homeland, and national security depend upon. Yet, unlike other sectors of critical infrastructure, little attention has been paid to the networked systems that undergird port operations. Report is available at: http://www.brookings.edu/~/media/research/files/papers/2013/07/02%20cyber%20port%20security%20kramek/03%20cyber%20port%20security%20kramek.pdf

[s2If is_user_logged_in()]

Full review: No cybersecurity standards have been promulgated for U.S. ports, nor has the U.S. Coast Guard, the lead federal agency for maritime security, been granted cybersecurity authorities to regulate ports or other areas of maritime critical infrastructure. In the midst of this lacuna of authority is a sobering fact: according to the most recent National Intelligence Estimate (NIE) the next terrorist attack on U.S. Critical Infrastructure and Key Resources (CIKR) is just as likely to be a cyber attack as a kinetic attack.

The potential consequences of even a minimal disruption of the flow of goods in U.S. ports would be high. The zero-inventory, just-in-time delivery system that sustains the flow of U.S. commerce would grind to a halt in a matter of days; shelves at grocery stores and gas tanks at service stations would run empty. In certain ports, a cyber disruption affecting energy supplies would likely send not just a ripple but a shockwave through the U.S. and even global economy.

Given the absence of standards and authorities, this paper explores the current state of cybersecurity awareness and culture in selected U.S. port facilities. The use of the post-9/11 Port Security Grant Program (PSGP), administered by the Federal Emergency Management Agency, is also examined to see whether these monies are being used to fund cybersecurity projects.

Full citation:   The Critical Infrastructure Gap: U.S. Port Facilities and Cyber Vulnerabilities, Policy Paper, July 2013, Center for 21st Century Security and Intelligence.

CORE1095

Keywords: Maritime Security, Cyber-security, Port Security Grant Program (PSGP), Port facility, Coast Guard, Maritime Transportation Security Act (MTSA).

[/s2If]

Review of Building Resilience in Supply Chains (CORE1055)

Summary: Review on Building Resilience in Supply Chains – An Initiative of the Risk Response Network – In collaboration with Accenture – World Economic Forum. The report broadens the view of resilient supply chains away from pure trucking towards taking all available transport modes into account. Additional relevance is given by building partnerships of private companies and creating strategic transport orientation in normal times and to be executed in harsh times. The views given are from large industry and insurers point of view thus serve as hints to SMEs. Demo-WPs concerned with resilience should have the ideas in mind in order to follow the worlds to forum and on the other side identified lacks (of focus on consumers of goods) should be avoided in CORE demonstration layouts.  Coding in CORE e-library is CORE1055. Source file at: http://www3.weforum.org/docs/WEF_RRN_MO_BuildingResilienceSupplyChains_Report_2013.pdf
Read more

Review of “Trade Compliance: a Burden or an Opportunity?” (CORE1054)

Summary: Review of “Trade Compliance: A Burden or an Opportunity?” This is a White Paper by DINALOG Dutch Institute for Advanced Logistics, VLM Vereining Logistiek Management. The information aims at Core Demo-WPs where the either trade compliance in general or single aspects of better cargo and data flow is to be demonstrated. This has an impact on the preceding WPs when defining rules and fixing systems. Coding CORE1054, in the CORE e-library. Available to General Public at: http://www.logistiek.nl/PageFiles/5478/010_logistiek-download-LOGNWS113052D01.pdf. Coding CORE1054, in the CORE e-library.

s2If is_user_logged_in()]

The document reads about the basics of Trade Compliance relevant for worldwide economy and movement of goods across borders and shows a quantification of the value for goods exported from the Netherlands. A discussion of administrative burdens conducting international trade follows. Main issues are diversity of applicable governmental laws including ex-, import and transshipped countries, increasing internationalization of trade and the obstacles of physical of goods. Different data sets partly with identical content have to be presented to various agencies and depending on goods, extra rules do apply sometimes. The electronic data transmission contains further obstacles and varies from agency to agency and from one commercial partner to another. Even already established rules on harmonization do not avoid constant update and adoption of ERP systems of traders. When following the physical movements of goods more obstacles unveil with governmental agencies resulting in delays. Certification is already established but does not lower burdens at the moment.

Innovations within compliance named and described then. These innovations are as follows:

  • Surveillance of the systems used for manufacturing and trade (System Based Control);
  • Physical and electronic coordination and interaction of all governmental agencies and data delivery systems (Single Window, One Stop Shop); and
  • Moving traditional border controls away from the border by Use of pre- and post-clearance in order not to disturb the physical movement; and by Disconnect data flows from cargo flow.

The document finalises by naming the challenges for national and international governments and trade companies with a brief review of the three innovations. The report contains very good ideas to follow in CORE Demo WPs but is very high level without giving details.

SWOT Analysis, with reference to CORE:

  • STRENGTHS: The focus on a few but high integrated measures applicable to countries organized in a supra-national organization is clearly an advantage for a research project than having many disconnected single improvements. Project results are easier to disseminate when a common direction is predetermined.
  • WEAKNESSES: The report is a brief one and names the innovations without telling too much detail or how to implement the theory. A balance of the single measures or different regional acceptance is not given. A discussion about trade when introducing these measures in one country and not in another is not given.
  • OPPORTUNITIES: Since no implementation details are given, measures are open for adoption in different regions or trade lanes where measures might be introduced. The list of measures is not exhaustive, additional rules might be implemented.
  • THREATS: When introducing all these measures the same time in a number of countries (e.g. the EU) might either fail due to national or regional established rules or lack of acceptance. By introducing these measures in different levels (ranging from full implementation to no implementation) might have an impact on trade flows, a further disconnection between first and third world might be worst case.

CORE impact anticipation:

  • To CORE: Re-reading of basic principles as shown in the document might open minds for different approaches or could start discussion and implementation from a different angle.
  • From CORE: The named threats and weaknesses of the report might be further evaluated and implementation ideas of named innovations should be evaluated as well as regional characteristics due to many trade lanes might be assessed.

Full Citation:

Trade Compliance: A Burden or an Opportunity? The quality of Dutch Trade Compliance Competences can strengthen our international position as a logistic control centre – Whitepaper Network Trade Compliance, Strategic Advisory Board, March 2012 – DINALOG Dutch Institute for Advanced Logistics , VLM Vereining Logistiek Management

Available to the general public at:

http://www.logistiek.nl/PageFiles/5478/010_logistiek-download-LOGNWS113052D01.pdf

Accessed: 15/01/2015

[/s2If]

Export product / commodity maps

Summary: An interesting web-source for multiple regional maps highlighting the main export products for countries around the world. Can be useful in CORE WP19, for the education and training materials. Source file at: http://www.globalpost.com/dispatch/news/business/global-economy/140502/world-commodities-exports-map

Read more