How robustness and resilience support security business against antagonistic threats in transport network
详细信息    查看全文
  • 作者:Dafang Zhang (1)
    Payam Dadkhah (2)
    Daniel Ekwall (2)
  • 关键词:Antagonistic threats ; Supply chain security ; Supply chain resilience ; Security business ; Robust supply chain
  • 刊名:Journal of Transportation Security
  • 出版年:2011
  • 出版时间:September 2011
  • 年:2011
  • 卷:4
  • 期:3
  • 页码:201-219
  • 全文大小:1196KB
  • 参考文献:1. Adams B (2010) Supply chain risk and security - A focus on trends and solutions for the US-Canada Marketplace-Webinar Presentation
    2. Borodzicz EP (2005) Risk, crisis and security management. John Wiley & Sons, Chichester
    3. Brindley C, Ritchie B (2004) Introduction. In: Brindley C (ed) Supply chain risk. Ashgate Publishing Company, p 205
    4. Burke RJ (2005) International terrorism and threats to security, implications for organizations and management. Disaster Prev Manag 14(5)
    5. Christopher M, Lee H (2004) Mitigating supply chain risk through improved confidence. Int J Phys Distrib Logist Manag 34(5):388-96 CrossRef
    6. Christopher M, Peck H (2004) Building the resilient supply chain. Int J Logist Manag 15(2)
    7. Closs DJ, Mcgarrell EF (2004) Enhancing security throughout the supply chain. IBM Center for The Business of Government, Chicago
    8. Closs D, Speier C, Whipple J, VOSS DM (2008) A framework for protecting your supply chain. Supply Chain Manag Rev 12(2):38-5
    9. Colbert JL (1991) Understanding the relationship between business risk and inherent risk. Manag Audit J 6(3):4-
    10. CSCMP. Supply Chain Management Definition. [online]. [Accessed 10 June 2010]. Available from World Wide Web: <HYPERLINK -a href="http://cscmp.org/aboutcscmp/definitions.asp" class="a-plus-plus">http://cscmp.org/aboutcscmp/definitions.asp-http://cscmp.org/aboutcscmp/definitions.asp>
    11. DOFF R (2008) Defining and measuring business risk in an economic-capital framework. J Risk Finance 9(4):317-33 CrossRef
    12. Ekwall D (2009) Managing the risk for antagonistic threats against the transport network, doctoral dissertation. G?teborg: Chalmers Universty of Technology
    13. Ekwall D (2010) On analyzing the official statistics for antagonistic threats against transports in EU: a supply chain risk perspective. J Transp Secur 3(4):213-30 CrossRef
    14. European Commission (2009) A sustainable future for transport: towards an integrated, technology-led and userfriendly system (COM(2009) 279 (final) of 17 June 2009). Publications Office of the European Union, Luxemburge
    15. Geunes J, Taffe K (2008) Transportation system overview. In: Don Taylor G (ed) Logistics engineering handbook. CRC Press, Boca Raton, p 14
    16. Gutierrez X, Hintsa J (2006) Voluntary supply chain security programs: a systematic comparison. In: ILS 2006, The International Conference on information systems, logistics and supply chain. Lyon, France
    17. Helliar C, Lonie A, Power D, Sinclair D (2001) Attitudes of UK managers to risk and uncertainty. Balance Sheet 9(4):7-0 CrossRef
    18. Husdal J (2008) Robustness, flexibility and resilience in the supply chain. [online]. [Accessed 20 July 2010]. Available from World Wide Web: <HYPERLINK -a href="http://www.husdal.com/2008/04/28/robustness-flexibility-and-resilience-in-the-supply-chain/" class="a-plus-plus">http://www.husdal.com/2008/04/28/robustness-flexibility-and-resilience-in-the-supply-chain/-http://www.husdal.com/2008/04/28/robustness-flexibility-and-resilience-in-the-supply-chain/>
    19. Hussey J, Hussey R (1997) Business research: a practical guide for undergraduate and postgraduate students. Palgrave Macmillan
    20. Juttner U (2005) Supply chain risk management: understanding the business requirements from a practitioner perspective. Int J Logist Manag 16(1):120-41 CrossRef
    21. Jüttner U, Peck H, Christopher M (2003) Supply chain risk management: outlining an agenda for future research. Int J Logist Res Appl 6(4):197-10 CrossRef
    22. Lalwani CS, Disney SM, Naim MM (2006) On assessing the sensitivity to uncertainty in distribution network design. Int J Phys Distrib Logist Manag 36(1):5-1 CrossRef
    23. Lee HL, Whang S (2005) Higher supply chain security with lower cost: lessons from total quality management. Int J Prod Econ 96(3):289-00 CrossRef
    24. Lumsden K (2009) Economy of transportation systems. Chalmers University of Technology, G?teborg
    25. metoffice.gov.uk (2010) [online]. [Accessed 25 Jul 2010]. Available from World Wide Web: <HYPERLINK -a href="http://www.metoffice.gov.uk/corporate/pressoffice/2010/volcano.html" class="a-plus-plus">http://www.metoffice.gov.uk/corporate/pressoffice/2010/volcano.html-http://www.metoffice.gov.uk/corporate/pressoffice/2010/volcano.html>
    26. Pettit TJ, Fiksel J, Croxton KL (2010) Ensuring supply chain resilience: development of a conceptual framework. J Bus Logist 31(1):1-1 CrossRef
    27. Popper K (1959) The logic of scientific discovery. Routledge, London
    28. Rice JB Jr, Spayd PW (2005) “Investing in supply chain security: collateral benefits- Special Report Series, IBM Center for The Business of Government, available at: http://www.ibm.com
    29. Rowe WD (1977) An anatomy of risk (Wiley series on systems engineering & analysis). John Wiley & Sons Inc, New York
    30. Sarathy R (2006) Security and the global supply chain. Transp J 28-51
    31. Sheffi Y (2005) The resilient enterprise: overcoming vulnerability for competitive advantage. MIT Press, London
    32. Sutherland JL (2008) Logistics from a historical perspective. In: Don Taylor G (ed) Logistics engineering handbook. CRC Press, Boca Raton, p 1
    33. Svensson G (2002) A conceptual framework of vulnerability in firms-inbound and outbound logistics flows. Int J Phys Distrib Logist Manag 32(2):110-34 CrossRef
    34. Tang CS (2006) Robust strategies for mitigating supply chain disruptions. Int J Logist Res Appl 9(1):33-5 CrossRef
    35. TAPA (2010) Quarterly bulletin Q1 2010
    36. The Local.se. 2009. [online]. [Accessed 25 Jul 2010]. Available from World Wide Web: <HYPERLINK -a href="http://www.thelocal.se/22234/20090923/" class="a-plus-plus">http://www.thelocal.se/22234/20090923/-http://www.thelocal.se/22234/20090923/>
    37. University of Cranfield 2002. Supply chain vulnerbility
    38. Waters D (2007) Supply chain risk management - vulnerability and resilience in logistics. Kogan Page, London
    39. Williams Z, Lueg JE, Lemay SA (2008) Supply chain security: an overview and research agenda. Int J Logist Manag 19(2):254-81 CrossRef
  • 作者单位:Dafang Zhang (1)
    Payam Dadkhah (2)
    Daniel Ekwall (2)

    1. Business School, University of Shanghai for Science and Technology, No.516, Jungong Rd, Shanghai, China
    2. School of Engineering, University of Bor?s, 501 90, Bor?s, Sweden
文摘
Supply chain disruptions may derive from various sources but the antagonistic threats are centered in supply chain disruption. Antagonistic threats are dynamic due to the spiral input, processes and feedbacks which create a very complex situation to analyze, assess and making decision. Beside risks, vulnerability derived from supply chain characteristics is the other issue which should be measured. Antagonistic threats are magnified in such vulnerable supply chains. After 9/11, 2001, the Security and Efficiency of the global supply chain has become an important issue in global transportation. This leads firms to consider Supply chain security as part and parcel of a company’s comprehensive risk-management program. In a security business, it is essential to understand different type risks and evaluate transportation assets, do risk based prioritization, and protect customers through cost effective actions. This could be occurred corresponding to risk management methods. Providing security may occur internally by firms or they outsource it to security providers which could be performed in higher quality or more cost effectively. In this article, we focus on managing the risks and securing the supply chain business with the security theory and strategies in the supply chain and transportation network. In order to discover risks throughout the supply chain, security provider needs to find risk hot spots where the likelihood of risk is higher. We propose two approaches (geographical and elements/process) to seek probable risks. The next step is to take strategies for risk prevention and risk mitigation. Consequently, we connect the security strategies from the literature review and collected information from security business to suggest a suitable model of how to handle the risks and achieve security in a systemic and scientific way.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700